Advertisement
opexxx

Links.txt

Jan 16th, 2020
819
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.70 KB | None | 0 0
  1. https://hackerone.com/h1-415-ctf -> #ctf #hackerone
  2. https://github.com/CJHackerz/ReverseSh3LL_As_R00tkit -> #kernel #reverseshell
  3. https://github.com/ffuf/ffuf -> #web #fuzzer
  4. https://github.com/0xb0bb/pwndra -> #ghidra
  5. https://subinsb.com/default-device-ttl-values/ -> #default #ttl #fingerprint
  6. https://websec.wordpress.com/2010/12/04/sqli-filter-evasion-cheat-sheet-mysql/ -> #sql #injection #filters
  7. http://blog.digital-horror.com/exploiting-microsoft-iis-tilde-enumeration/ -> #microsoft #iis #shortname
  8. https://iwantmore.pizza/posts/ctp-osce-guide.html -> #osce
  9. https://medium.com/@kamran.bilgrami/ethical-hacking-lessons-building-free-active-directory-lab-in-azure-6c67a7eddd7f -> #ad #windows
  10. https://miloserdov.org/?p=3867 -> #DS_Store
  11. https://www.sc0tfree.com/sc0tfree-blog/optimizing-rubber-ducky-attacks-with-empire-stagers -> #rubberducky
  12. https://vincentyiu.com/red-team-tips -> #tips #redteam
  13. https://www.peerlyst.com/posts/the-best-resources-for-learning-exploit-development -> #resources #exploitation
  14. https://medium.com/@sangeeta.igit/pool-of-resources-for-oscp-28d0dea9e5ed -> #oscp #resources
  15. https://github.com/ssh3ll/Windows-10-Hardening -> #windows #hardening
  16. https://medium.com/walmartlabs/reverse-engineering-an-obfuscated-malicious-macro-3fd4d4f9c439 -> #macros #oletools #reversing
  17. https://posts.xh4h.com -> #blog
  18. https://blog.blazeinfosec.com/leveraging-web-application-vulnerabilities-to-steal-ntlm-hashes-2/amp -> #web #ntlm #responder
  19. https://github.com/api0cradle/UltimateAppLockerByPassList/blob/master/Generic-AppLockerbypasses.md -> #applocker #bypass
  20. https://prune2000.github.io/tools/pentest -> #tools #list #collection
  21. https://www.owasp.org/images/a/a5/2018-02-05-AhmadAshraff.pdf -> #timing #web
  22. https://w3challs.com/index.php -> #challenges
  23. https://samcurry.net/filling-in-the-blanks-exploiting-null-byte-buffer-overflow-for-a-40000-bounty -> #bugbounty
  24. https://anee.me/reversing-a-real-world-249-bytes-backdoor-aadd876c0a32 -> #reversing
  25. https://github.com/ambionics/phpggc -> #unserialize #php
  26. https://github.com/stunn4/securitynotes/tree/master/binary/linux/x86/fusion -> #fusion #exercises
  27. https://exploit-exercises.lains.space/fusion/ -> #exercises
  28. https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite -> #privesc
  29. https://github.com/juliocesarfort/public-pentesting-reports -> #pentest #reports
  30. https://decoder.cloud/2019/12/12/from-iphone-to-nt-authoritysystem/amp -> #windows
  31. https://blog.hacktivesecurity.com/index.php?controller=post&action=view&id_post=43 -> #research #api #tim
  32. https://blahcat.github.io/2018/03/11/fuzzing-arbitrary-functions-in-elf-binaries/ -> #fuzzing
  33. https://www.reddit.com/r/HowToHack/comments/e7k4pu/xss_mind_map_by_jackmasa -> #xss #mindmap
  34. https://github.com/infosecn1nja/AD-Attack-Defense/blob/master/README.md -> #windows #ad #activedirectory
  35. https://www.slideshare.net/DirkjanMollema/aclpwn-active-directory-acl-exploitation-with-bloodhound -> #acl #pwn #windows
  36. https://www.ernw.de/download/BloodHoundWorkshop/ERNW_DogWhispererHandbook.pdf -> #bloodhound
  37. https://www.offensive-security.com/offsec/analyzing-a-creative-attack-chain -> #offsec
  38. https://labs.portcullis.co.uk/blog/se-and-you/ -> #windows #permissions #se*
  39. https://github.com/stunn4/securitynotes/tree/master/misc/privesc -> #checklist #basic #keepinmind
  40. https://weakpass.com -> #bruteforce #wordlists
  41. https://github.com/davtur19/DotGit -> #browsers #addon #git
  42. https://lab.pentestit.ru/pentestlabs/14 -> #pentest
  43. https://medium.com/@rudrasarkar/how-i-hacked-92k-users-information-using-open-s3-bucket-6471b30c1cf5 -> #aws #s3
  44. https://sinhack.blog -> #blog
  45. https://www.vulnhub.com/timeline -> #vulnhub #list
  46. https://cybersecurity.upv.es/attacks/offset2lib/offset2lib.html -> #pwn #linux #pie
  47. https://filippo.io/linux-syscall-table -> #linux #syscall #table
  48. https://http.cat -> #miao
  49. @exploitdbrss -> #exploitdb
  50. https://github.com/OlivierLaflamme/Cheatsheet-God -> #cheatsheet
  51. https://iwantmore.pizza/posts/quickzip-seh-win10-wow64.html -> #windows #binary
  52. https://github.com/Xh4H/CanaryBrute3 -> #pwn #canary #x64
  53. https://www.notsosecure.com/anatomy-of-a-hack-docker-registry/ -> #docker #APIs
  54. https://nytrosecurity.com/2019/06/30/writing-shellcodes-for-windows-x64/amp -> #shellcodes #windows #x64
  55. https://georgeom.net/StegOnline/checklist -> #stego
  56. https://iwantmore.pizza/posts/cve-2019-1414.html -> #vscode
  57. https://github.com/psmiraglia/ctf/blob/master/kevgir/000-redis.md -> #redis #ssh
  58. https://ironhackers.es/tutoriales/pwn-rop-bypass-nx-aslr-pie-y-canary/ -> #pwn #canary
  59. https://made0x78.com/bseries-defeat-stack-cookies/ -> #binary #canary #pwn
  60. http://microcorruption.com -> #reversing
  61. https://morph3sec.com -> #blog
  62. https://blog.hacktivesecurity.com/index.php?controller=post&action=view&id_post=42 -> #xss2rce
  63. https://blog.notso.pro/2019-10-24-tactical-debriefing1 -> #learned #offshore #hackthebox #c2 #pivoting
  64. https://gist.github.com/superkojiman/b28c801a3b042072bc69 -> #ropprimer #binaries #pwn
  65. https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a -> #kerberos #cheatsheet
  66. https://github.com/kablaa/CTF-Workshop -> #challenges
  67. https://github.com/stephenbradshaw/vulnserver -> #windows #binary
  68. https://teckk2.github.io/category/Red%20Teaming.html -> #redteaming
  69. https://iwantmore.pizza/posts/meterpreter-shellcode-inject.html -> #windows #mimikatz
  70. https://medium.com/@hackerb0y/rest-framework-admin-panel-bypass-and-how-i-recon-for-this-vulnerability-a0ee41b01102 -> #bugbounty
  71. https://labs.wizard-security.net is back! -> #ctf
  72. https://ippsec.rocks -> #ippsec
  73. https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en -> #binary #pwn #heap #cve
  74. https://github.com/shellphish/how2heap -> #binary #pwn #heap
  75. https://github.com/denisidoro/navi -> #cheatsheet
  76. https://curl.haxx.se/h2c -> #curl #converter
  77. https://github.com/incredibleindishell/SSRF_Vulnerable_Lab -> #web #ssrf
  78. https://youtu.be/4uCoI5YzOwk -> #ctf #hackthebox #htb #crypto
  79. https://1337red.wordpress.com/building-and-attacking-an-active-directory-lab-with-powershell -> #windows #training
  80. https://github.com/bkerler/exploit_me -> #pwn #binary #arm
  81. @itsecalert -> #channel
  82. https://iwantmore.pizza/posts/cve-2019-10392.html -> #jenkins
  83. @FZSec -> #channel
  84. https://ctf-wiki.github.io/ctf-wiki/pwn/linux/arm/arm_rop -> #pwn #arm #binary
  85. https://exploitnetworking.com/security/il-mio-primo-pwn-arm -> #italian #pwn #arm #ret2libc
  86. https://medium.com/@tarekmohamed_20773/add-new-user-with-admin-permission-and-takeover-the-organization-6318ee10154a -> #bugbounty
  87. https://medium.com/@h4x0r101/damn-vulnerable-applications-c4e286832147 -> #training
  88. https://polict.net/blog/web-tracking-via-http-cache-xs-leaks -> #xsleaks
  89. https://medium.com/@fatin151485/how-i-found-my-first-stored-xss-on-popular-eboighar-com-6bd497b0bb96 -> #xss
  90. https://ajinabraham.com/blog/exploiting-insecure-file-extraction-in-python-for-code-execution -> #python
  91. https://quentinkaiser.be/exploitdev/2019/08/30/exploit-CVE-2019-1663 -> #binary #arm
  92. https://www.systemtek.co.uk/2019/08/evilgnome-linux-backdoor -> #linux #backdoor
  93. http://qira.me -> #binary
  94. https://secgroup.dais.unive.it/teaching/security-course/format-strings/ -> #binary
  95. https://docs.dbatools.io -> #mssql
  96. https://www.kitploit.com/2019/08/theo-ethereum-recon-and-exploitation.html?m=1 -> #ethereum
  97. https://github.com/xct/ropstar -> #binary #pwn
  98. https://irumble.com/firsttweet -> #twitter
  99. https://gitlab.com/NicoNex/echotron -> #telegram
  100. https://github.com/Arvanaghi/CheckPlease -> #evasion
  101. https://github.com/firmianay/Binary-Reading-List -> #binary
  102. https://hackersonlineclub.com/mobile-security-penetration-testing/amp/ -> #mobile
  103. https://medium.com/@antonioblescia/google-account-takeover-challenge-3f8af5873fc9 -> #challenge
  104. https://github.com/bet4it/build-an-efficient-pwn-environment -> #pwn
  105. https://medium.com/@c5/darkweb-vendors-and-the-basic-opsec-mistakes-they-keep-making-e54c285a488c -> #opsec
  106. https://cse.google.com/cse?q=+&cx=006368593537057042503:efxu7xprihg#gsc.tab=0&gsc.q=%20&gsc.page=1 -> #telegram
  107. https://github.com/skelsec/pypykatz -> #windows
  108. https://github.com/InQuest/awesome-yara/blob/master/README.md -> #detection
  109. https://trustfoundry.net/basic-rop-techniques-and-tricks -> #pwn #rop
  110. https://ijustwannared.team -> #redteaming
  111. http://threatexpress.com -> #redteaming
  112. https://github.com/d35ha/CallObfuscator -> #windows
  113. https://github.com/o-o-overflow -> #pwn #binary
  114. https://twitter.com/phraaaaaaa/status/1149252294392844288 -> #rustbuster
  115. https://medium.com/@brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325 -> #dns
  116. https://youtu.be/bgr0VPxWIuY -> #bugbounty #web
  117. https://github.com/areyou1or0/OSCP -> #oscp #linux #windows
  118. https://medium.com/@markmotig/some-ways-to-dump-lsass-exe-c4a75fdc49bf -> #windows #lsass
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement