123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111 |
- <!DOCTYPE html>
- <!-- Hi /g/~-->
- <html><head>
- <meta content="text/html; charset=UTF-8" http-equiv="Content-Type" rel="nofollow">
- <title>Cyberlife</title>
- <meta content="" name="description" rel="nofollow">
- <meta content="" name="keywords" rel="nofollow">
- <link href="Cyberlife.css" media="all" rel="stylesheet" type="text/css" rel="nofollow">
- <link rel="icon" type="image/x-icon" href="./images/favicon.ico" rel="nofollow">
- </head>
- <body>
- <div id="container" rel="nofollow">
- <div id="banner" rel="nofollow">
- </div>
- <div id="navigator" rel="nofollow">
- <nav>
- <a href="./index.html" rel="nofollow">Home</a>
- <a href="./essentials.html" rel="nofollow">Essentials</a>
- <a href="./cyberpunk_books.html" rel="nofollow">Books</a>
- <a href="./cyberpunk_movies.html" rel="nofollow">Movies</a>
- <a href="./cyberpunk_vidya.html" rel="nofollow">Games</a>
- <a href="./cyberpunk_anime.html" rel="nofollow">Anime</a>
- <a href="./cyberpunk_tv.html" rel="nofollow">TV</a>
- <a href="./cyberpunk_music.html" rel="nofollow">Music</a>
- <a href="./cyberpunk_philosophy.html" rel="nofollow">Philosophy</a>
- <a href="./braindump.html" rel="nofollow">Braindump</a>
- </nav>
- </div>
- <div id="main" rel="nofollow">
- <h2>- - - [ /sec/ Resources & Links ] - - -</h2>
- Now you too can be a le ebin h@xx0r just like HACKERMAN from the epic movie KUNG FURY! Thanks to <a href="" rel="nofollow">/g/</a> and <a href="https://git.hackers.town/banjofox/InfoSec_Bookmarks" rel="nofollow">banjofox</a> for most of these links.<br><br>
- <font size="3"><a href="https://gist.githubusercontent.com/heywoodlh/07570f45ea1a4c74b79d4b897847ea6d/raw/37f9ba608c58733c1615b4dc28875e303938a9c6/maderas.txt" rel="nofollow" rel="nofollow">@hackermaderas Cybersec Basics and Armory</a></font><br>
- Very useful for newbies and veterans alike, basically covers just about everything. Read this before you check out the links below.<br>
- <h2>- - - [ Pentesting ] - - -</h2>
- <a href="https://jivoi.github.io/2015/07/01/pentest-tips-and-tricks/" rel="nofollow">Pentest Tips and Tricks – EK</a><br>
- <a href="https://jivoi.github.io/2015/08/21/pentest-tips-and-tricks-number-2/" rel="nofollow">Pentest Tips and Tricks #2 – EK</a><br>
- <a href="https://pentestlab.blog/tag/pivot-attack/" rel="nofollow">Pivot Attack - Penetration Testing Lab</a><br>
- <a href="http://pentestmonkey.net/category/cheat-sheet" rel="nofollow">Cheat Sheets - pentestmonkey</a><br>
- <a href="https://www.faradaysec.com/#why-faraday" rel="nofollow">FaradaySEC - Multiuser Pentest Environment</a><br>
- <a href="https://blog.rapid7.com/2013/07/02/a-penetration-testers-guide-to-ipmi/" rel="nofollow">A Penetration Tester's Guide to IPMI and BMCs - Rapid7 Community and Blog</a><br>
- <a href="https://resources.infosecinstitute.com/use-firefox-browser-as-a-penetration-testing-tool-with-these-add-ons/" rel="nofollow">18 Extensions For Turning Firefox Into a Penetration Testing Tool</a><br>
- <a href="https://trickster0.wordpress.com/resources/" rel="nofollow">Resources - Trickster0: Penetration Tester Security Engineer</a><br>
- <a href="http://www.lo0.ro/2011/07/08/top-10-web-application-penetration-testing-tools-actually-11/" rel="nofollow">Top 10 Web Application Penetration Testing Tools (actually 11) - lo0.ro</a><br>
- <a href="https://github.com/robertdavidgraham/masscan" rel="nofollow">masscan: TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.</a><br>
- <a href="https://github.com/phillips321/python-portscanner/blob/master/nmap.py" rel="nofollow">python-portscanner</a><br>
- <a href="https://www.unix-ninja.com/p/A_cheat-sheet_for_password_crackers" rel="nofollow">A cheat-sheet for password crackers</a><br>
- <a href="https://highon.coffee/blog/cheat-sheet/" rel="nofollow">More cheat sheets, mostly for pentesting</a><br>
- <a href="https://gbhackers.com/sn1per-a-detailed-explanation-of-most-advanced-automated-information-gathering-penetration-testing-tool/" rel="nofollow">SN1PER - A Detailed Explanation of Most Advanced Automated Information Gathering Penetration Testing Tool - GBHackers On Security</a><br>
- <a href="http://nsa.unaligned.org/index.php" rel="nofollow">NSA@home bruteforce cracker</a><br>
- <a href="https://www.shellntel.com/blog/2016/6/7/weaponizing-nessus" rel="nofollow">Weaponizing Nessus — #_shellntel</a><br>
- <a href="https://github.com/jtesta/ssh-mitm" rel="nofollow">jtesta/ssh-mitm: SSH man-in-the-middle tool</a><br>
- <a href="https://testssl.sh/" rel="nofollow">/bin/bash based SSL/TLS tester: testssl.sh</a><br>
- <h2>- - - [ Reverse Engineering ] - - -</h2>
- <a href="https://beginners.re/main.html" rel="nofollow">Reverse Engieering for Beginners PDF</a><br>
- <a href="http://opensecuritytraining.info/IntroductionToReverseEngineering.html" rel="nofollow">Introduction To Reverse Engineering</a><br>
- <a href="http://fumalwareanalysis.blogspot.com/p/malware-analysis-tutorials-reverse.html" rel="nofollow">Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach</a><br>
- <a href="https://reversing.games/" rel="nofollow">Spoonfeeding reverse engineering for various games</a><br>
- <a href="https://www.kosagi.com/forums/viewtopic.php?id=189" rel="nofollow">OpenSource tools for OpenSource Reverese Engineering (Page 1) — Discussion — Kosagi Forums</a><br>
- <a href="http://dangerousprototypes.com/docs/Bus_Pirate_v4_vs_v3_comparison" rel="nofollow">Bus Pirate v4 vs v3 comparison - DP</a><br>
- <a href="https://www.seeedstudio.com/preorder-open-workbench-logic-sniffer-p-612.html?cPath=75" rel="nofollow">Open Workbench Logic Sniffer</a><br>
- <a href="http://opensecuritytraining.info/Training.html" rel="nofollow">Open Security Training</a><br>
- <a href="https://www.rcesecurity.com/2015/08/slae-dissecting-msfvenom-payloads-linux-x86/" rel="nofollow">SLAE: Dissecting Msfvenom Payloads (Linux/x86) - RCE Security</a><br>
- <h2>- - - [ OSINT ] - - -</h2>
- <a href="https://start.me/p/b5Aow7/asint_collection" rel="nofollow">ASINT Collection</a><br>
- <a href="https://www.randhome.io/blog/2019/01/05/2019-osint-guide/" rel="nofollow">OSINT Guide 2019</a></br>
- <a href="https://www.osintdojo.com/resources/" rel="nofollow"> OSINT Dojo Resources</a><br>
- <a href="https://builtwith.com/" rel="nofollow">BuiltWith Technology Lookup</a><br>
- <a href="https://www.bellingcat.com/category/resources/how-tos/" rel="nofollow"> Various guides from Bellingcat</a><br>
- <h2>- - - [ Vulnerabilities & Exploits ] - - -</h2>
- <small><p>Blah blah blah not personally responsible for what chaos you spew onto the earth with this shit.</small></p>
- <a href="https://www.rapid7.com/db/modules/post/windows/escalate/ms10_073_kbdlayout" rel="nofollow">CVE-2010-2743 Windows Escalate NtUserLoadKeyboardLayoutEx Privilege Escalation - Rapid7</a><br>
- <a href="https://github.com/PowerShellMafia/PowerSploit" rel="nofollow">PowerSploit - A PowerShell Post-Exploitation Framework</a><br>
- <a href="https://github.com/ecriminal/Discord-Exploit-Collection" rel="nofollow">Discord Exploit Collection</a><br>
- <a href="http://damnvulnerableiosapp.com/2013/12/get-started/" rel="nofollow">Getting Started with DVIA - DVIA (Damn Vulnerable iOS App)</a><br>
- <a href="https://github.com/secretsquirrel/the-backdoor-factory" rel="nofollow">secretsquirrel/the-backdoor-factory · GitHub</a><br>
- <a href="https://github.com/secretsquirrel/BDFProxy" rel="nofollow">secretsquirrel/BDFProxy · GitHub</a><br>
- <a href="https://packetstormsecurity.com/files/141759/OpenSSH-On-Cygwin-SFTP-Client-Directory-Traversal.html" rel="nofollow">OpenSSH On Cygwin SFTP Client Directory Traversal ≈ Packet Storm</a><br>
- <a href="http://netsec.ws/?p=309" rel="nofollow">Linux Privilege Escalation Scripts</a><br>
- <a href="https://www.rebootuser.com/?p=1623#.Vq1MElnMqUk" rel="nofollow">Local Linux Enumeration & Privilege Escalation Cheatsheet - Rebootuser</a><br>
- <a href="http://www.toolswatch.org/2013/07/hacking-through-a-straw-pivoting-over-dns/" rel="nofollow">ToolsWatch.org – The Hackers Arsenal Tools Portal » Hacking through a Straw (Pivoting over DNS)</a><br>
- <a href="" rel="nofollow">Dirty COW (CVE-2016-5195) Linux Kernel Vuln</a><br>
- <a href="https://github.com/Veil-Framework/Veil-Evasion" rel="nofollow">Veil-Evasion: Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions</a><br>
- <a href="https://www.kitploit.com/2016/05/shellsploit-new-generation-exploit.html?m=1" rel="nofollow">Shellsploit - New Generation Exploit Development Kit</a><br>
- <a href="http://tim3warri0r.blogspot.com/2012/09/windows-post-exploitation-command-list.html" rel="nofollow">Windows Post-Exploitation Command List - warri0r_</a><br>
- <a href="https://resources.infosecinstitute.com/intro-to-fuzzing/" rel="nofollow">An Introduction to Fuzzing: Using fuzzers (SPIKE) to find vulnerabilities - InfoSec Resources</a><br>
- <a href="http://it-ovid.blogspot.com/2012/02/windows-privilege-escalation.html" rel="nofollow">Windows Privilege Escalation - a cheatsheet - Tim Arneaud</a><br>
- <a href="http://www.fuzzysecurity.com/tutorials/16.html" rel="nofollow">FuzzySecurity - Windows Privilege Escalation Fundamentals</a><br>
- <a href="https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/" rel="nofollow">Exploit writing tutorial part 1 : Stack Based Overflows - Corelan Team</a><br>
- <a href="https://www.tenouk.com/Bufferoverflowc/bufferoverflowvulexploitdemo32.html" rel="nofollow">A complete tutorial on the stack-based buffer overflow programming using C code on Linux opensource OS with real demonstration</a><br>
- <a href="https://gbhackers.com/xssight-automated-xss-scanner-and-payload-injector/" rel="nofollow">XSSight - Automated XSS Scanner And Payload Injector - GBHackers On Security</a><br>
- <a href="http://netsec.ws/?p=331" rel="nofollow">Creating Metasploit Payloads</a><br>
- <a href="https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/" rel="nofollow">SQL Injection Cheat Sheet - Netsparker</a><br>
- <a href="https://resources.infosecinstitute.com/stack-based-buffer-overflow-in-win-32-platform-part-5-writing-reverse-tcp-exploit/" rel="nofollow">Writing Reverse TCP Exploit - InfoSec Resources</a><br>
- <a href="http://pentestmonkey.net/tools/audit/unix-privesc-check" rel="nofollow">unix-privesc-check - pentestmonkey</a><br>
- <a href="https://github.com/longld/peda" rel="nofollow">GitHub - longld/peda: PEDA - Python Exploit Development Assistance for GDB</a><br>
- <a href="http://colesec.inventedtheinternet.com/hacking-apache-tomcat/" rel="nofollow">Hacking Apache Tomcat - ColeSec Security</a><br>
- <a href="https://www.veil-framework.com/framework/" rel="nofollow">Developers - Veil - AV Evasion</a><br>
- <a href="https://www.darknet.org.uk/2015/01/pwntools-ctf-framework-exploit-development-library/" rel="nofollow">pwntools - CTF Framework Exploit Development Library</a><br>
- <h2>- - - [ Etc ] - - -</h2>
- <a href="https://pastebin.com/raw/vyhNRqj8" target="_blank" rel="nofollow">Path to Pentesting - Anon's Quest</a><br>
- <a href="https://resources.infosecinstitute.com/creepy/#gref" rel="nofollow">Creepy, the Geolocation Information Aggregator</a><br>
- <a href="https://www.coursera.org/learn/crypto" rel="nofollow">Cryptography I - Stanford University - Coursera</a><br>
- <a href="https://0xrick.github.io/lists/stego/" >Steganography - A list of useful tools and resources - 0xRick</a><br>
- <a href="http://www.nsaplayset.org/" rel="nofollow">NSA Playset</a><br>
- <a href="http://offensiveiotexploitation.com/" rel="nofollow">Offensive IoT Exploitation training - Internet of Things Exploitation training course</a><br>
- <a href="http://www.catonmat.net/projects/cheat-sheets/" rel="nofollow">Cheat Sheets - good coders code, great coders reuse</a><br>
- <a href="http://pastebin.com/3Qtw6JQw" rel="nofollow">From 0x90 to 0x4c454554, a journey into exploitation</a><br>
- </div>
- </div>
- </body></html>
|