Advertisement
opexxx

Github.txt

Oct 23rd, 2020 (edited)
2,620
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.94 KB | None | 0 0
  1. BlueTeam
  2. https://github.com/yarox24/attack_monitor
  3. https://capsule8.com/blog/dont-get-kicked-out-a-tale-of-rootkits-and-other-backdoors/
  4. https://github.com/ION28/BLUESPAWN
  5. https://github.com/PaperMtn/lil-pwny : Check disclosed accounts
  6. https://github.com/rabobank-cdc/DeTTECT
  7. OSINT
  8. https://github.com/3vangel1st/kamerka
  9. https://github.com/BullsEye0/google_dork_list
  10. https://github.com/highmeh/lure
  11. https://www.shodan.io/
  12. https://censys.io/
  13. https://viz.greynoise.io/table
  14. https://www.zoomeye.org
  15. https://fofa.so
  16. https://www.onyphe.io
  17. https://app.binaryedge.io
  18. https://hunter.io
  19. https://wigle.net
  20. https://ghostproject.fr
  21. https://www.oshadan.com/
  22. https://builtwith.com/
  23. https://www.spiderfoot.net/
  24. https://github.com/zricethezav/gitleaks
  25. WEB
  26. https://github.com/AlisamTechnology/ATSCAN
  27. https://github.com/momenbasel/KeyFinder
  28. https://github.com/hahwul/XSpear
  29. https://github.com/BitTheByte/Monitorizer/
  30. https://github.com/spinkham/skipfish
  31. https://github.com/blark/aiodnsbrute : Brute force domain names asynchronously
  32. https://crt.sh/?q=%.yahoo.com : Subdomain bruteforce
  33. https://github.com/tomnomnom/httprobe: Check if web servers in a domain are accessible
  34. https://github.com/aboul3la/Sublist3r : Subdomain discovery
  35. https://github.com/gwen001/github-search/blob/master/github-subdomains.py : Subdomain discovery in github
  36. https://github.com/robertdavidgraham/masscan : Fast port scanning
  37. https://github.com/Threezh1/JSFinder : Subdomains and URLs from JS files in a web
  38. https://github.com/C1h2e1/MyFuzzingDict : Web files dictionary
  39. https://github.com/TypeError/Bookmarks/blob/master/README.md : BurpExtension to avoid dozens repeater tabs
  40. https://github.com/hakluke/hakrawler : Obtain assets
  41. https://github.com/izo30/google-dorker : Google dorks
  42. https://github.com/sehno/Bug-bounty/blob/master/bugbounty_checklist.md : Web BugBounty checklist
  43. https://github.com/Naategh/dom-red : Check a list of domain against Open Redirection
  44. https://github.com/prodigysml/Dr.-Watson : Burp plugin, offline analysis to discover domains, subdomains and IPs
  45. https://github.com/hahwul/WebHackersWeapons: List of different tools
  46. https://github.com/gauravnarwani97/Trishul : BurpSuite Plugingto find vulns (SQLi, XSS, SSTI)
  47. https://github.com/fransr/postMessage-tracker : Chrome extension for tracking post-messages functions
  48. https://github.com/Quitten/Autorize : Automatic authentication tests (remove cookies and try to send the request)
  49. https://github.com/pikpikcu/xrcross: XRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. This tool was built to test (XSS|SSRF|CORS|SSTI|IDOR|RCE|LFI|SQLI) vulnerabilities
  50. Windows
  51. https://github.com/Mr-Un1k0d3r/PoisonHandler : Lateral movements
  52. https://freddiebarrsmith.com/trix/trix.html : LOL bins
  53. https://gist.github.com/netbiosX/ee35fcd3722e401a38136cff7b751d79 (https://pentestlab.blog/2020/01/13/persistence-image-file-execution-options-injection/): Persistence
  54. https://github.com/odzhan/injection : Windows Process Injection techniques
  55. https://github.com/BankSecurity/Red_Team : Red Team scripts
  56. https://github.com/l0ss/Grouper2 : find security-related misconfigurations in Active Directory Group Policy.
  57. https://www.wietzebeukema.nl/blog/powershell-obfuscation-using-securestring : Securestring obfuscation
  58. https://pentestlab.blog/2020/02/24/parent-pid-spoofing/ : Parent PID Spoofing
  59. https://github.com/the-xentropy/xencrypt : Encrypt Powershell payloads
  60. https://shells.systems/introducing-ninja-c2-the-c2-built-for-stealth-red-team-operations/ : Stealth C2
  61. https://windows-internals.com/faxing-your-way-to-system/ : Series of logs about Windows Internals
  62. https://bestestredteam.com/2018/10/02/tracking-pixel-in-microsoft-office-document/ : Track who open a document
  63. https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet : Active Directory Cheat Sheet
  64. Firmware
  65. Tools q veo q pueden molar para analizar firmares (automaticas):
  66. https://github.com/craigz28/firmwalker
  67. https://github.com/fkie-cad/FACT_core
  68. https://gitlab.com/bytesweep/bytesweep-go
  69. Post-crema:
  70. https://blog.mindedsecurity.com/2018/09/pentesting-iot-devices-part-1-static.html
  71. https://blog.mindedsecurity.com/2018/10/pentesting-iot-devices-part-2-dynamic.html
  72. Como extraer firmware si no lo encontramos online: https://www.youtube.com/watch?v=Kxvpbu9STU4
  73. Aqui un firware con vulnerabilidades para analizar: https://github.com/scriptingxss/IoTGoat
  74. y por aqui la metodologia owasp para analizar firmware: https://github.com/scriptingxss/owasp-fstm
  75. OTHER
  76. https://twitter.com/HackAndDo/status/1202695084543791117
  77. https://github.com/weev3/LKWA
  78. https://h0mbre.github.io/Learn-C-By-Creating-A-Rootkit/
  79. https://github.com/skelsec/jackdaw
  80. https://github.com/CoatiSoftware/Sourcetrail : Static code analysis
  81. https://www.hackerdecabecera.com/2019/12/blectf-capture-flag-en-formato-hardware.html : Bluetooth LE CTF
  82. https://github.com/skeeto/endlessh : SSH tarpit that slowly sends an endless banner.
  83. AWS and Cloud tools: https://github.com/toniblyx/my-arsenal-of-aws-security-tools
  84. IFS (Interplanetary File System) for phising: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/using-the-interplanetary-file-system-for-offensive-operations/
  85. IP rotation services: https://medium.com/@lokeshdlk77/how-to-rotate-ip-address-in-brute-force-attack-e66407259212
  86. Linux rootkit: https://github.com/aesophor/satanic-rootkit
  87. https://theia-ide.org/ : Online IDE
  88. https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters/ : Resources for starting on BugBounties
  89. https://medium.com/macoclock/jailbreak-and-stuff-kickstart-tools-and-techniques-for-ios-application-pentesting-6fa53a3987ab : IOS pentesting tools
  90. https://github.com/random-robbie/keywords/blob/master/keywords.txt : Keywords
  91. https://github.com/ElevenPaths/HomePWN : Hacking IoT (Wifi, BLE, SSDP, MDNS)
  92. https://github.com/rackerlabs/scantron : automating scanning
  93. https://github.com/doyensec/awesome-electronjs-hacking : This list aims to cover Electron.js security related topics
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement