Skip to content

mailler0xa/GOLD-MINE

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 

Repository files navigation

###########################################
#GOLD MINE FOR REAL                       #
###########################################

#1->linux privilege escaltion

i. https://www.securitynewspaper.com/2018/04/25/proper-use-sudo-linux-privilege-escalation/?fbclid=IwAR22ZkLVZWDZPfjexuK9fntrwbiEKvRRN65hIgH4Yqo0gZE3EHaBZZSAX9s

ii.https://github.com/lukechilds/reverse-shell?fbclid=IwAR1wtIK7rCi5Bd8-mbhV26dIQRjQvwsCjgWNEOH30JGC146_lOr2oLmpfYQ

iii.https://gtfobins.github.io/?fbclid=IwAR1bDDxPEW_hCuc7NEIdrOGZQeXGF1d3IowpoSgafYvkSgSGSjuu1bFimPg

iv. https://www.exploit-db.com/exploits/44298/?fbclid=IwAR3WLH81B-zz7NeMdCVhAg_y7pv_iwCMuqbjnWpaFXRatQwoNFuqcMK-9a8

v. https://guif.re/linuxeop?fbclid=IwAR1S2fxnHcMyTuOZFYoZb55AJmHQ-MYTuOQpPsJFotW7HvmKRqpf7Ml9wTM

vi. https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/

vii. https://hackingandsecurity.blogspot.com/2017/09/oscp-linux-priviledge-escalation.html?m=

viii. https://github.com/Kabot/LinEnum?fbclid=IwAR0u_1DRK6WSzjd9G9QXWHMLSowsgMCcebg2Gtt0by-gMSZeG909ePMnsDs

ix. https://www.exploit-db.com/exploits/45175/

x. https://github.com/xairy/kernel-exploits/blob/master/CVE-2017-1000112/poc.c?fbclid=IwAR1Clh7cnBqOLYkPjBmx9Idy9Z8NmFS4NJxwotX-8dsZOcBmboLmpuBBBAk

xi. https://securingtomorrow.mcafee.com/mcafee-labs/linux-kernel-vulnerability-can-lead-to-privilege-escalation-analyzing-cve-2017-1000112/?fbclid=IwAR1s_QDQu68-x7i_lCjnYkLh1obrx4RMC7t4Z-u4kAzra0iodABV_vvX6NQ

xii. https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_windows.html?fbclid=IwAR0A0HAziFZVgl2RU_em1nvRF-YmEKfOspH3KRP04rGmy7z2IXm5KZ0RyMM

xiii. https://github.com/xairy/linux-kernel-exploitation?fbclid=IwAR0um6G67BVPKkwQ4OWNA6GRRnOYhKzQoQm40zGj4Dh-OizIRKMiPWfV_p4

xiv. https://latesthackingnews.com/2018/12/12/privilegeesc-linux-open-source-script-for-enumeration-on-linux/?fbclid=IwAR2r8kyTgDtO8SfadJvx7sJdE92zmsMeqY56ZDptKhQdtKtiawDoREnAecE

#2->windows privilege escalation

i. http://www.fuzzysecurity.com/tutorials/16.html?fbclid=IwAR38XtFqjVyXRVmo59ewqVNQ_qpkzLJSLroiO8BLwuhz85q8PJs1ZGw_eXo

ii. https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_windows.html?fbclid=IwAR1n1cs1dBadliOVI4iO7po3WmgS8hP4kBBGDXCl-ozy0F7tCOM5QAGOa4M

iii. https://www.prodefence.org/multiple-ways-to-exploiting-windows-pc-using-powershell-empire/?fbclid=IwAR2dIQ6XA_9DRq9MM7HnmNtwF2S3R2NuRs77qE3lZtwa8XxN5yTInewQbCo

iv. https://www.youtube.com/watch?v=9pwMCHlNma4&feature=youtu.be

v. https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/?fbclid=IwAR39P6CyPdcb67Cs8BtU6afQpeLREUtRw_DAsqEjnjjDv5t0kYNBQkM4aVs

vi. https://github.com/hausec/ADAPE-Script/tree/master?fbclid=IwAR0Rknful54lmO7gfM59yksrjSPYeLMmDsQyulz_EaFiZlXlHAZAaMWHjZQ

vii. https://github.com/OneLogicalMyth/zeroday-powershell?fbclid=IwAR3H7rHz-R2omfIVycOBAJ0S66atEWlhBCc3cJX65l6kxadCPgPMcXs7vsY

viii. https://github.com/hausec/ADAPE-Script/tree/master?fbclid=IwAR196t8_BgX-S_r6cUsDNnB0X1LhtH1NNWVA8D00Cu5CHB7pt_mvuQdQLj4

ix. https://github.com/ExpLife0011/awesome-windows-kernel-security-development?fbclid=IwAR2vObtRf4zDLPOgi0D4P0ddfW5TjrPWeEHnN4-VO03-tHgGAGSTN5MvdcU

x. https://hunter2.gitbook.io/darthsidious/privilege-escalation/alpc-bug-0day

xi. https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/

xii. https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment

#windows eploit

i. https://github.com/yeyintminthuhtut/Awesome-Advanced-Windows-Exploitation-References?fbclid=IwAR2u0iuH_AAyw3YDNfRlNo9N053Riwgm1kCGugSgIovrCmB9i0CdP4zny1c

ii. https://github.com/outflanknl/EvilClippy?fbclid=IwAR1st90HlUpqbOweGlyCuAKRYHV4cx3KaAyaQ-Fzb2VmKuMNExgCQZ2M8K0

iii. https://medium.com/red-team/dde-payloads-16629f4a2fcd?fbclid=IwAR2J2eZtjDgdFjLeM9i1rM3LXNA_0tQy954buNK4pE_fdZRHcXP11qnGYBk

iv. https://lolbas-project.github.io/?fbclid=IwAR1ATzHrj4irpV_DPldBiglF2pE7Cnb6mO7J2jFbehWGy1ROCH7wLpvCv_E#

v. https://www.prodefence.org/a-little-guide-to-smb-enumeration/?fbclid=IwAR0zi10rUUoPBSfGlPA7OmGQXJRW07IOUn3k0XyyX63hVr_0GnGZvTiYlCY

vi. https://github.com/PowerShellMafia/PowerSploit?fbclid=IwAR1GCKh1DDpV6nfKabv_weHoepEByp61g1EEM7Qpipmpe_2f7ZsP-TcAeas

#windows active directory

i. http://www.kalitut.com/2019/04/hacking-windows-active-directory-full.html?fbclid=IwAR3Iz1sk_2W0DLh2Kjz9Iof-UkH5jhY8Gj9O0y1DST-dhK7-tMYi63wPam4

ii. https://www.harmj0y.net/blog/redteaming/pass-the-hash-is-dead-long-live-localaccounttokenfilterpolicy/?fbclid=IwAR2V2-ZblQ55VG7DkrxTTIE9QltWlSuC-mKZhOoMTOwWHGERRY5BOpds-i4

iii. https://posts.specterops.io/a-red-teamers-guide-to-gpos-and-ous-f0d03976a31e?fbclid=IwAR0fhqNC9zUE05qub6Pl_y8SA9WM_RYiaUPU9fw7lAIZYHIyS8-Dn70hqkw

iv. http://www.harmj0y.net/blog/redteaming/abusing-active-directory-permissions-with-powerview/?fbclid=IwAR3wMtmiZxPU9wiEerLH79Y05Xx_UAgQvqxhILtQ7rUE4GPjbOW8D6qkuPc

v. https://www.slideshare.net/rootedcon/carlos-garca-pentesting-active-directory?fbclid=IwAR3AWoY0ewoV4H-t0Troy_HtuI6Begy2aGpzKns9_Nfawzt1CcHPEJ9thnk

vi. https://github.com/infosecn1nja/AD-Attack-Defense?fbclid=IwAR1Q1nf4tkY3OxhNU8VzAbdDPNASffMuhmfx3IdemN2h5nVqNRj2leh-f8A

vii. https://github.com/byt3bl33d3r/DeathStar?fbclid=IwAR2BsthMpmXbXdW_byc-ap7wYp84IMW4t2WB0HRp7Icb6pkwu9um2IRlfug

viii. https://www.prodefence.org/active-directory-penetration-testing-checklist/?fbclid=IwAR2fltKMYqN-_bBK6eTU5OzULx9vIyFLGc0SA-nnxLmRI9HwMIgNnNQKLOg

ix. https://www.prodefence.org/bloodhound-v2-0-5-released-active-directory-toolkit/?fbclid=IwAR22U2C_h-Up6yz55cZWJ-sok3yh_mXBGkVe3pu7B-k2hFEe6XVYA6LZILM

x. https://hausec.com/2019/03/05/penetration-testing-active-directory-part-i/?fbclid=IwAR2JTXDwZ99sl9Dx0InaVnP73uJpY9CvSQ6orfIjwoaXUGudMRQ7Ya9PE2Q

xi. https://github.com/Ridter/Exchange2domain?fbclid=IwAR3LvhEVqUn_cqyj9DdMvYAPUkEomuXWKI2FX1jVcgXf5tpwb2MYt3Rx6kM

#SQL injection -http://securityidiots.com/Web-Pentest/SQL-Injection/Part-1-Basic-of-SQL-for-SQLi.html?fbclid=IwAR2SxFy1jYBEr0GL_L3p_mSivlka-wFp73u0UOwb98JfPGabeFN9Oj8YjjA -https://www.youtube.com/watch?v=9Rrrm0JsLVw&fbclid=IwAR3sg8BVMXO-3QlTfVp47TnFND_BUYmuEK6o9t62uXRwYT7QUP0demdYKdc -https://gbhackers.com/perform-manual-sql-injection-2/?fbclid=IwAR0ZnkvB51Kka3h837U_o_wTNzfRQLhLcjMhbjoIn82MViIWCr7I67NdJGk -https://gbhackers.com/sqlmap-detecting-exploiting-sql-injection/?fbclid=IwAR35PJlLeYpSOWxuTUhJlzJjDtGkSOkOh4uv0s7plowVkkqNF2ELqa04pc4

#wireless penetration -https://github.com/s0lst1c3/eaphammer/blob/master/README.md?fbclid=IwAR1kP9vP_ROcyQLCDQgIiQTvKXRF_xeMMw7e_xSBYNVlFW-3YrbFaLPF_Vk -https://www.prodefence.org/ht-wps-breaker-high-touch-wps-breaker/?fbclid=IwAR3d4IV6wRHoGuN5e53F7HxpPnuQtS24lDk1ATE71IGSdi3464IhPuJfxu0 -https://www.udemy.com/wifi-hacking-from-a-penetration-testers-perspective/?couponCode=FINAL_FB_GIVEAWAY&fbclid=IwAR0rUXuZiZOGyZEjF1A-MDIZsSLrzmkEzjlBULd2Wkd_bGASx3UiFe9G26c -https://gbhackers.com/wireless-penetration-testing-checklist-a-detailed-cheat-sheet/?fbclid=IwAR37j40vqsPTrsd9EIudKNKrewVFMX-TjR8wNwVu4V9qYt5EfkFMp7WdwbQ -https://www.shellvoide.com/wifi/how-to-perform-automated-wifi-wpa-wpa2-cracking/?fbclid=IwAR27K6O4bO9hZ97lz_8DN6fc3cwddlFYM54Trr5xCzP8usX2lEbUWQ386y4 -https://wpa-sec.stanev.org/?submit&fbclid=IwAR14cLPiAsWfKLj7NLw_5lYHOWn3-lr5lVf6X66DpRsA8ltNBSf45NhzCBk -https://gbhackers.com/wireless-penetration-testing-checklist-a-detailed-cheat-sheet/?fbclid=IwAR0Ezy1Lon0Ef2AfyYH-oZ-WoCAG1KBu2UxSfZVJkD_Usi2QN-cql1MS_iQ

#voip -https://securityonline.info/sippts/?fbclid=IwAR0-wNU8W4LUToL3RbDJA4MEZ6f1-Oq0BSqlikVmIorl79qT0MbetGfSt5k

#malware analysis -https://docs.google.com/presentation/d/14nHfy7iEhVd7qA-i4-8kT_mnudT2phKNO7RE34AiEho/present?fbclid=IwAR0DlG5EzpJAVBQK7gMgO9iK_IcbNhTaD24e9srHGmOCbU36DgHFvBWhHCs#slide=id.p -https://gbhackers.com/most-important-tools/ -https://github.com/rshipp/awesome-malware-analysis?fbclid=IwAR1AQzGSV2VaC25mPK9ILlqXLhixJdzFqbnPGfpripf96p9gkJQS7tA5_bE -https://gbhackers.com/malware-analysis-cheat-sheet-and-tools-list/?fbclid=IwAR3giNTn-0LEBnX2lsgIgiVMKeGrJjYfC0fLj_HQn38ZGyyCFCpm_JuJyi0 -https://0x00sec.org/t/anti-forensic-and-file-less-malware/10008?fbclid=IwAR0etAl90lfep0swF4oYFeSYqWS-y1DAl8LOvxoM-ppW01rr69ZpBjycWAY -https://0ffset.net/miscellaneous/how-to-get-started-with-malware-analysis/?fbclid=IwAR3Acz5aPfOboyXjAYy8IWWkX9oeHgyK0lRVen_wjrNkrqSbjS33-ZjNSk4

#burpsuite -https://kalilinuxtutorials.com/burpsuite/?fbcli=IwAR3jFaR1WRAnpqR7ipXdvg7kQRLyCL3wSNnzZK1iPaJsGjLEs5k7hlWTTMs -https://training.peritusinfosec.com/p/burp-suite-mastery/?product_id=715832&coupon_code=BLACKFRI&fbclid=IwAR1t8pRg63tV5DthZk8YFeh2Apd5wmRUXLawyEnYCiamIumqQaTVAr25qv0

#network camera -https://neonsea.uk/blog/2018/08/01/hikvision-keygen.html?fbclid=IwAR3JFE3aShDT-eLQHcX8ArYbJJQG2VG7ANrTv_OBIrqPuPJ1f5d2x4kSBik

#buffer overflow -https://0xrick.github.io/binary-exploitation/bof3/?fbclid=IwAR18BNgHyRfLzgP_Pf-fqkODA9sLmWqcsjN_Z5UZzzzHNO4WdFV2IDj9Cow -https://blog.own.sh/introduction-to-network-protocol-fuzzing-buffer-overflow-exploitation/?fbclid=IwAR07sL_cgaRhj9SELba9ViZNG6YRz2mbELKvmtaNcfJoiIhWIX9X3S3FUEY -https://blog.own.sh/introduction-to-network-protocol-fuzzing-buffer-overflow-exploitation/?fbclid=IwAR07sL_cgaRhj9SELba9ViZNG6YRz2mbELKvmtaNcfJoiIhWIX9X3S3FUEY -https://www.youtube.com/watch?v=e059hzzg3Zo&feature=youtu.be&fbclid=IwAR3--qoCiPqjESBYzSruPL8uFJMYRfRufWye49jogJshoG44g07M-B43ZAM -https://www.youtube.com/watch?v=gJXoqEFNOcs&feature=youtu.be&fbclid=IwAR2uc2Zm7gJmet7N5QzfRQSOBAiKYGqSMtdaBpLdiHnQz3XEfycQunXAJkA -https://www.youtube.com/watch?v=r_ml1j9k-Gk&feature=youtu.be&fbclid=IwAR0O7K7A_wdE6YQDRnNz6jXUTMl-wJlH74NtDyMghKWErokJbHQO6nQWxls -https://www.youtube.com/watch?v=goF472hJYys&feature=youtu.be&fbclid=IwAR2PRBTW4d-ffzFTpOibd1CMbiHKKgTFENS8Pr74AO-HFpifFOtmNJh6dCM -https://www.youtube.com/watch?v=EaZTt7MIrzg&feature=youtu.be&fbclid=IwAR3HtTctQI-fOEw88anFOiwiqPLRaDOlJ4WvVDWdHr0m6L6FXb7v4tpbDps -https://www.youtube.com/watch?v=GZO2XPyAFts&feature=youtu.be&fbclid=IwAR1UgmISIm-LTbn_Z2DtbfzAZRwXZUzxj58nJGl3u7pEm-4WHYCCwRIDNxI -https://www.youtube.com/watch?v=_3fzj3qsLPU&feature=youtu.be&fbclid=IwAR0mdpAEdfJFn0t7wUvntFKh_NSPwcYxfxqPDhrYFc_1kVD4W4Kaca6ld_8 -https://proactivedefender.blogspot.com/?fbclid=IwAR0UYl6UgFYd0BTHXdG5Oo2jJ0A84XoVmCEjPBaj1idsNwmj3Zvfh-7GtVI -https://stacktrac3.co/vulnserver-write-up/?fbclid=IwAR1ytECmHB9QZZTochAt9YVMBKge43ifX1Q9PxlCPahP1dOQEXAU-RnPZgE

#OSCP notes -https://cyb3rsick.com/2019/01/20/oscp-exam-writeups-introduction/?fbclid=IwAR0tq8LrW955079Ac5fXRP792t-MvJGkTlZvjO5j84X6NUCxHQShVRm3vcE -https://github.com/slyth11907/Cheatsheets?fbclid=IwAR0aOTSrCCZZe7q4_m-XNviKnu9o2TkFR50Z2GKFnSSo1rtugtjj0w3UszQ -https://www.jscybersec.io/blogpage/Offensive-Security-Certified-Professional?fbclid=IwAR2gSCcEU1RXflPeus08SBJQlxO4Yn_D8uLg5B7MHRskUdWKxenYAKKBEs0 -https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-1-is-oscp-for-you-b57cbcce7440?fbclid=IwAR30YzWzYbZt4FHEzbJbEo9MadarABUez6sLFue2SP3wDT32oXw0evopEdo -https://scund00r.com/all/oscp/2018/02/25/passing-oscp.html?fbclid=IwAR3ASJhuElYv7iw7dpLjiRQEBMV9llYjIwL7YUVEtQLEQo2J9UPspt4Hu4Y#commands -https://github.com/s0wr0b1ndef/OSCP-note?fbclid=IwAR3i01n33Y8rxLrU98oBirsvCqmO_pxIWyBLkoicnYyh7W1aBLFaKkrjCEg -https://github.com/areyou1or0/OSCP?fbclid=IwAR0f-uWoDgs9w-ZlAS4p5yfANz-iNhxEYiqYh8LyvODJLSdglR6YFBkSDiU -https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_windows.html?fbclid=IwAR1n1cs1dBadliOVI4iO7po3WmgS8hP4kBBGDXCl-ozy0F7tCOM5QAGOa4M -https://www.secjuice.com/oscp-prep-guidance/?fbclid=IwAR02FTJVI1GRoOv9rxGhk20qczVJeuwgL65Xyg06E03WGQU6MBCy3vSJDK0 -https://acknak.fr/en/articles/oscp-tools/?fbclid=IwAR2ztMPOozEv73yiealZhMOg2SmUCFnrixWwv7HAq5cW6s4yPAGge3-DeCM -http://kunalpachauri.co.in/pathway-to-oscp.html?fbclid=IwAR04ADDHsHdImz1Dyqcr7Mw_5P_bOaniPaJu51MnwfAdjCXuB8wNz5cYiw4 -https://github.com/RustyShackleford221/OSCP-Prep?fbclid=IwAR1hNnWjDxiI-pdsC2HJAtpXJ9-Ks0MTKczxqRbKmm0tjoRAB3dH2N0lrWs -https://www.netsecfocus.com/oscp/2019/03/29/The_Journey_to_Try_Harder-_TJNulls_Preparation_Guide_for_PWK_OSCP.html?fbclid=IwAR2QPj9lOJpR1OeQqhtlYjzyiCHxTtYEvMzea3zKDzgesWTLc6mNyxk0aHQ -http://0xc0ffee.io/blog/OSCP-Goldmine?fbclid=IwAR2--FYsZo77AzCQ_F8EZqROHppPe6RAWUtskZ-pQkRrk-XZhlp7JmeUcEg -https://www.keiththome.com/oscp-course-review/?fbclid=IwAR239djLDCKmGkWpGST2D0WKA7rVeCUSoZoHnN660vwX5RqhbPmNagN1AQk -https://www.netmux.com/blog/purple-rain-attack?fbclid=IwAR1d8hN94aQSQ3ARujn8W3H7NS03phoaFtaKtA3KxtzQhKpbFCeH1uWoVl8 -https://www.vortex.id.au/?fbclid=IwAR2d5W21R85El_4EDPtcIMswHbPLiln82ZsXKy0uo63Z6zoGMB-EEKYJkN4 -https://thor-sec.com/review/oscp/oscp_review/?fbclid=IwAR1Yuzuj_lB7SqYLJ28i-KWGlPssSZpmrKYVsPef_3gXgDnM0717sNzMVZg -https://guif.re/?fbclid=IwAR1-vQsPeD97FJu6h-0gB9x1Gi2UgHhJlWl9rSlJT0zbvsgW7oECyxepCY4 -https://scriptdotsh.com/index.php/2018/04/17/31-days-of-oscp-experience/?fbclid=IwAR2PDO6B7jQXayS0vWr064bXJPcswuuj37VtCf2sHZ_I6Ss-KLouWaAA5r0 -https://paper.dropbox.com/doc/OSCP-Methodology-EnVX7VSiNGZ2K2QxCZD7Q -https://github.com/mohitkhemchandani/OSCP-Complete-Guide?fbclid=IwAR061y9Sn7qFpv0Lyn8NCPfAagxD1xbcq8-zWnj0S7StQk8SNBJiRLKwnHI

#CTF -https://blog.kartone.ninja/2019/03/25/when-a-reverse-me-ctf-binary-makes-you-loose-that-job/?fbclid=IwAR0BUrBkePDs3vYdtNLALhmmFrfBkoUdBUEtbRmdVvYbjidVfQzqCenZvuY -https://mrt -https://gtfobins.github.io/gtfobins/whois/?fbclid=IwAR2BGMKkGj6FDit8h20UwvybkYMsFOmd17mt9ryB2u7pwQtwiC0L5e7ZzcY -https://github.com/swisskyrepo/PayloadsAllTheThings?fbclid=IwAR0HOZxovFMKbW7eqZvByT_Wh_nqlNIs7b9X4XT7S13kuBniAoBgk1c2lio

#study materials -https://mega.nz/?fbclid=IwAR3gEKJW4BOsIAquls4DBnDO65OW92oRL7tCR7JEuexEr2gV0xajmAlL8FQ#F!NsdFhSYY!z-ecu4lbJkEKI5VVxe9-TA -https://uptusuccess.com/download-paid-udemy-courses-for-free/amp/?fbclid=IwAR0TU4ylkBxpyOtiGTQT3uN25183bAyEkCw_R3QxDhx18Sa_BW5WSE1Fz7Q -https://hackingvision.com/2018/03/15/hacking-books-pdf-collection-2018/?fbclid=IwAR1MIWPL_u9e1UWl2o_T4jgWAoO8xpPdSqGypCLD-8S-qIt43Be-Url-0Es -https://github.com/robertcanare/Study-File -https://comindt.blogspot.com/2019/01/linux-book-4.html?fbclid=IwAR2m-HmW5Nq5nu2wpeg73tTdrOxUPemzJGDO1KUVkWfhsPvOaKHVxn2AY-w -https://mega.nz/?fbclid=IwAR3FVBUitfEV7Kk1YiO4wyiUbVPPv16KjYNRNCD0Bdt8NVFXJX2wuGb4yFw#F!WUg2zIgI!Jrl_0ILGnqkNrC0XP40Ccg #ethical hacking free courses -https://mega.nz/?fbclid=IwAR28CDUlL44S0jKSViOL2A3TTj5XlJxbgrMu25xqN795EHq3J0vHU2VLfFo#F!BtZAjJIR!nek_MMo14Z_3_D_OLT5hsw --https://www.udemy.com/ethical-hacking-beginners-to-expert-level-kali-linux-tutorial/?couponCode=FBFREE001&fbclid=IwAR3B6jvs7saCQqH1SgqeYpN6sRGUzJnPDt3k1uTKPd9c_YS1crI2ZItqbgU -https://www.reddit.com/r/HowToHack/comments/b1486v/zero_to_hero_a_practical_network_pentesting/

#steganography -https://0xrick.github.io/lists/stego/?fbclid=IwAR3YCShRT6XOQSbky1H36XBexeaAncFPtSc0VoMOZOp2JK9YcqPy76tNAy4

#penetration testing -https://github.com/trimstray/the-book-of-secret-knowledge?fbclid=IwAR1n6pErXQ8oGnZu2SRR1lCwtRvaZR04kJADWSgP0L9nAQGBpFfi5jxnYU0 -https://www.linkedin.com/pulse/how-break-penetration-testing-lawrence-munro/?fbclid=IwAR2QTXANG0VhDKwNpdeOtKAPAueHCAg4c-fwrWYTNxGwTgoKAzBjTQDjIKQ -https://github.com/enaqx/awesome-pentest?fbclid=IwAR1q5yN4WfB_5brIldL1LY2fRD0O9iECZ0KEsDotaLtJ5fk9Qx3QyqyopDQ -https://jivoi.github.io/2015/07/01/pentest-tips-and-tricks/?fbclid=IwAR1GLvx8Cr8A7NYwpPRE5CKkSD6vKFLsuNgEUYaPUFSZZVJkrL0rxIxBe94 -https://www.notsosecure.com/pwning-with-responder-a-pentesters-guide/?fbclid=IwAR0QK_U09B1mhNSjpHP56TW8g8ExXRZENGaFqVXLZdzkhaCWhEksCZ6s5x8 -https://www.linkedin.com/pulse/how-perform-external-black-box-penetration-testing-james-ceh-/?fbclid=IwAR3_QK6-ENvfjlv0my17XbD3LTMq14ftV9_Vaa4s-f-iBB7MacXCOypzAu8 -https://github.com/OlivierLaflamme/Cheatsheet-God?fbclid=IwAR3NBv6uO8I0XF3yIcgIM5i39wdhdQ2QJ-2R-Je0hnk5AypZuw4Z3s6rpuQ -https://blog.eccouncil.org/6-ways-to-be-a-better-pen-tester-part-1/ -https://gbhackers.com/hacking-tools-list/?fbclid=IwAR34ItaRUnBH73fCEXVRF4sF3RVYgju3XpfT5Sa3NZC12ksQbMM-cs1xosQ -https://gbhackers.com/hacking-tools-list/?fbclid=IwAR34ItaRUnBH73fCEXVRF4sF3RVYgju3XpfT5Sa3NZC12ksQbMM-cs1xosQ -https://blog.eccouncil.org/6-ways-to-be-a-better-pen-tester-part-1/?fbclid=IwAR0y-g26kcaorSjdMebwmt474uvJJdLRRDEiELUQawCkF6K9jhVf0sqabFI

#windows evasion / bypassing AV -https://github.com/nccgroup/Winpayloads?fbclid=IwAR3tqJ5W3w7R8lSTIU_54riWHecVZy2QXbxQarPL_5JSZbTBaFMjXD2w8ds -https://null-byte.wonderhowto.com/how-to/hacking-windows-10-create-undetectable-payload-part-1-bypassing-antivirus-software-0185055/ -https://gbhackers.com/malicious-payload-evasion-techniques/?fbclid=IwAR09baVu0CZRJCv9HkuPaUTu2wbhL3RZiwGkz667Q66P6fblW2qtlVpb8xM -http://www.powershellempire.com/?page_id=149&fbclid=IwAR2_slvmYwJsiBt6o8zB8GHthCK2178i_5pPlGCkhhQvC272Bcendxc5Alg -https://gbhackers.com/bypassing-an-antivirus/?fbclid=IwAR2k_yi7AQGfDzNlhvHx-azLqueL6RRMVFpmgQYgapvl-92UQcoTIr17LAk

#bug bounty tips -https://forum.bugcrowd.com/t/researcher-resources-how-to-become-a-bug-bounty-hunter/1102?fbclid=IwAR0uFG98i2WUq0vyRs4PEQncxhMmGouL6R-KgxcuCjJlEZ-ee2L-TP9kTH0

#networking -https://mega.nz/?fbclid=IwAR3VW8gyZRsP_dv47BxcuxK7dUmWeioMkfnPI8KZxwlNRXeSMWsKqRjlijI#F!Su4iCYaA!n973_fvjnvhmVyrOn7smNA!TzA0BJAJ

#network security -https://www.blackhat.com/presentations/bh-europe-05/BH_EU_05-Berrueta_Andres/BH_EU_05_Berrueta_Andres.pdf?fbclid=IwAR38V0GIvzx46wVcxiD3NZGKvd8XQHPIeRCPv6quPk6U6oLIM0BkuXp4tOA -https://www.kinniyalibrary.com/?fbclid=IwAR3Z9_T9pBA34VuwFvsNedFZnu-LGdIkJzaQf5WvkOYOLqzfGXNjL36BC60

#web application -https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master?fbclid=IwAR3-X7ZjDicl__C2Zq1dIWJ7tQ7lsnWfIGLgc7FAgX0wh4qSnEUeLGDvSjI -https://github.com/minimaxir/big-list-of-naughty-strings?fbclid=IwAR0vAybYceatG1wujdiB9k0-KhCtOAMhDycRb0jTmW-wvvOA3pNEKMksP8k -https://n0where.net/php-webshells?fbclid=IwAR27-1MYEkojrxofzE1DHFCihLeJcgcIUhBRGTQVQV2Jz-rN0cugkvdvaIE -https://gbhackers.com/web-application-penetration-testing-checklist-a-detailed-cheat-sheet/ -https://latesthackingnews.com/2018/08/17/rapidscan-web-vulnerability-scanner-framework/?fbclid=IwAR2p0tYRVGo9CNBzHdo7aS8QCcEBqHDA4Iqu5vFQQySGC7sFZ5ByB-dB-i4 -https://github.com/swisskyrepo/PayloadsAllTheThings?fbclid=IwAR0HOZxovFMKbW7eqZvByT_Wh_nqlNIs7b9X4XT7S13kuBniAoBgk1c2lio -https://github.com/trimstray/htrace.sh?fbclid=IwAR0WNthDD3wSi1zT7xy88WgzK2oEL4CotOtIIdZnZkuhuScPuw_neSRs3UE -https://0x09al.github.io/waf/bypass/ssl/2018/07/02/web-application-firewall-bypass.html?fbclid=IwAR20DePpg-ZMUb3gSozLE-MmQFwyk67NRgMSXthPGzeA81JPdxBdXkUJWmk -https://gbhackers.com/penetration-testing-wordpress-website/?fbclid=IwAR0cxJP-934GybkZQW-26btvrfUuDVjKQhExmyYXW724mfj1LKu7BqizNHs -https://www.hacker101.com/videos?fbclid=IwAR05yhTqVn0EmfDj5QVxnD-RdcC9Z1rmWyo_Qc2IjvVAo-iY_gBWZSFOf50

#reverse shell -https://netsec.ws/?p=331&fbclid=IwAR3D_du_PKB0E0dB_M3BobttN3YzLUV5ae1I1kjpjfbGZlLuF0o2oZN7BnU

#red teaming -https://ired.team/offensive-security-experiments/offensive-security-cheetsheets?fbclid=IwAR2zRgWIEdc59DWQNCehtw3HEEaJyfy9HBFmcJqllaglkHUaD2n6xpScRAk -https://medium.com/@adam.toscher/top-five-ways-the-red-team-breached-the-external-perimeter-262f99dc9d17?fbclid=IwAR0-ynimomdYAUx6MSA293GwRTJfHaYulsfnFlKVmCILeYjHoyVKdP33U1g -https://github.com/yeyintminthuhtut/Awesome-Red-Teaming?fbclid=IwAR1oxHbvqs6E2VwVwJjsMzRn9ln_faA5mJ-KwFYEBlPhhKRBpL7slAkZ1R4 -https://github.com/infosecn1nja/Red-Teaming-Toolkit/blob/master/README.md?fbclid=IwAR3eenVGF-dCquu4WhgM3sQ7Q-MDujEq-CRxw-TsGxu4mlm6tqdFLIhkCaQ -https://www.peerlyst.com/posts/the-red-team-guide-chapter-20-attacking-linux-unix-environments-chiheb-chebbi?utm_source=linkedin&utm_medium=Application_Share&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post -https://github.com/yeyintminthuhtut/Awesome-Red-Teaming?fbclid=IwAR1XSTFYKQUICzCQcVxNlub4Oq9J93c7JxW6kLy0V-i7dMMOWgK1osOSzcE -https://resources.infosecinstitute.com/red-team-assessment-phases-reconnaissance/?fbclid=IwAR3qVCUYm1Mi_pPjiOykFFW0ocHPWzx6ZydXiovAFnMr_cMZCqAEIa7zf4A

#sysadmin -https://github.com/trimstray/test-your-sysadmin-skills?fbclid=IwAR30T_eIudg7y1kLVftUWEaGNK3M7zNXjDw_OJI-lkNLuXti8wPxt-GBrYs#simple-questions -https://www.udemy.com/draft/1845852/?LSNPUBID=JVFxdTr9V80&ranEAID=JVFxdTr9V80&ranMID=39197&ranSiteID=JVFxdTr9V80-PE6GGymDtqcLyuaic8kqjQ&fbclid=IwAR2XLLOiIEtOFBhVFV8rSUybSDsDFvNkVZDo4tpK0aqScGOxxS26Ma6CcLY

#microsoft macros -https://github.com/mwrlabs/wePWNise?fbclid=IwAR17fns6AhI6QqRPwQJ8dHr7WlkTkNdI9uGjEpC-NISLdRHPMDO2i-DYgFw

#VPN -https://hide.me/en/?friend=5b268ebaf3b65&fbclid=IwAR2WkVpibWw9wYTQcdr2yTM2Ng75JBrZbsZpN41Zj-lYeZX4Oh_BSOfblc4

#secure code -https://nullcon.net/website/blog/all-you-need-to-know-about-secure-coding.php?fbclid=IwAR0wEpsk3fn831KrQ92StBi3o5jbvjLmypRUUpLgGph_34CJovZ-kW6xa1Y

#cloud computing -https://gbhackers.com/cloud-computing-penetration-testing-checklist-important-considerations/?fbclid=IwAR3EXRITGAaNNuXJpLtp-ysPk04eRKkdOYmcb8Vfa48OgEdEuQg_meHIz8s

#incident responce -https://gbhackers.com/cyber-incident-response-tools/?fbclid=IwAR2VUKIhalrJ1iCpY8_w64mI-SYZbWLQsK7vJj_xrCQcbZ247XCRbskMwy8

#mobile hacking -https://gbhackers.com/android-penetration-android-checklist/

#SANS -https://mega.nz/?fbclid=IwAR1LuLW9LlfNs69QPW2OY8ctW5a9L8UgFCOPdksWIVuVrM_4jvX-fW9TuWo#F!NsdFhSYY!z-ecu4lbJkEKI5VVxe9-TA!gsVxCA6Z

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published