No description
Find a file
2024-12-12 10:48:04 +00:00
.gitbook/assets Recreating repository history 2024-12-12 11:39:29 +01:00
.github Recreating repository history 2024-12-12 11:39:29 +01:00
backdoors Recreating repository history 2024-12-12 11:39:29 +01:00
binary-exploitation Recreating repository history 2024-12-12 11:39:29 +01:00
blockchain/blockchain-and-crypto-currencies Recreating repository history 2024-12-12 11:39:29 +01:00
c2 Recreating repository history 2024-12-12 11:39:29 +01:00
crypto-and-stego Recreating repository history 2024-12-12 11:39:29 +01:00
cryptography Recreating repository history 2024-12-12 11:39:29 +01:00
exploiting Recreating repository history 2024-12-12 11:39:29 +01:00
forensics/basic-forensic-methodology Recreating repository history 2024-12-12 11:39:29 +01:00
generic-methodologies-and-resources Recreating repository history 2024-12-12 11:39:29 +01:00
hardware-physical-access Recreating repository history 2024-12-12 11:39:29 +01:00
linux-hardening Recreating repository history 2024-12-12 11:39:29 +01:00
linux-unix/privilege-escalation Recreating repository history 2024-12-12 11:39:29 +01:00
macos-hardening Recreating repository history 2024-12-12 11:39:29 +01:00
misc Recreating repository history 2024-12-12 11:39:29 +01:00
mobile-pentesting Recreating repository history 2024-12-12 11:39:29 +01:00
network-services-pentesting Recreating repository history 2024-12-12 11:39:29 +01:00
pentesting-web GITBOOK-4447: No subject 2024-12-12 10:48:04 +00:00
physical-attacks Recreating repository history 2024-12-12 11:39:29 +01:00
radio-hacking Recreating repository history 2024-12-12 11:39:29 +01:00
reversing Recreating repository history 2024-12-12 11:39:29 +01:00
reversing-and-exploiting/linux-exploiting-basic-esp Recreating repository history 2024-12-12 11:39:29 +01:00
stego Recreating repository history 2024-12-12 11:39:29 +01:00
todo Recreating repository history 2024-12-12 11:39:29 +01:00
welcome Recreating repository history 2024-12-12 11:39:29 +01:00
windows-hardening Recreating repository history 2024-12-12 11:39:29 +01:00
.gitignore Recreating repository history 2024-12-12 11:39:29 +01:00
1911-pentesting-fox.md Recreating repository history 2024-12-12 11:39:29 +01:00
6881-udp-pentesting-bittorrent.md Recreating repository history 2024-12-12 11:39:29 +01:00
android-forensics.md Recreating repository history 2024-12-12 11:39:29 +01:00
burp-suite.md Recreating repository history 2024-12-12 11:39:29 +01:00
consumer Recreating repository history 2024-12-12 11:39:29 +01:00
consumer.c Recreating repository history 2024-12-12 11:39:29 +01:00
emails-vulns.md Recreating repository history 2024-12-12 11:39:29 +01:00
interesting-http.md Recreating repository history 2024-12-12 11:39:29 +01:00
LICENSE.md Recreating repository history 2024-12-12 11:39:29 +01:00
online-platforms-with-api.md Recreating repository history 2024-12-12 11:39:29 +01:00
other-web-tricks.md Recreating repository history 2024-12-12 11:39:29 +01:00
pentesting-dns.md Recreating repository history 2024-12-12 11:39:29 +01:00
post-exploitation.md Recreating repository history 2024-12-12 11:39:29 +01:00
README.md Recreating repository history 2024-12-12 11:39:29 +01:00
stealing-sensitive-information-disclosure-from-a-web.md Recreating repository history 2024-12-12 11:39:29 +01:00
SUMMARY.md Recreating repository history 2024-12-12 11:39:29 +01:00

HackTricks

Hacktricks logos & motion design by @ppiernacho.

{% hint style="success" %} Welcome to the wiki where you will find each hacking trick/technique/whatever I have learnt from CTFs, real life apps, reading researches, and news. {% endhint %}

To get started follow this page where you will find the typical flow that you should follow when pentesting one or more machines:

{% content-ref url="generic-methodologies-and-resources/pentesting-methodology.md" %} pentesting-methodology.md {% endcontent-ref %}

Corporate Sponsors

STM Cyber

STM Cyber is a great cybersecurity company whose slogan is HACK THE UNHACKABLE. They perform their own research and develop their own hacking tools to offer several valuable cybersecurity services like pentesting, Red teams and training.

You can check their blog in https://blog.stmcyber.com

STM Cyber also support cybersecurity open source projects like HackTricks :)


RootedCON

RootedCON is the most relevant cybersecurity event in Spain and one of the most important in Europe. With the mission of promoting technical knowledge, this congress is a boiling meeting point for technology and cybersecurity professionals in every discipline.

{% embed url="https://www.rootedcon.com/" %}


Intigriti

Intigriti is the Europe's #1 ethical hacking and bug bounty platform.

Bug bounty tip: sign up for Intigriti, a premium bug bounty platform created by hackers, for hackers! Join us at https://go.intigriti.com/hacktricks today, and start earning bounties up to $100,000!

{% embed url="https://go.intigriti.com/hacktricks" %}


Trickest


Use Trickest to easily build and automate workflows powered by the world's most advanced community tools.

Get Access Today:

{% embed url="https://trickest.com/?utm_campaign=hacktrics&utm_medium=banner&utm_source=hacktricks" %}


HACKENPROOF

Join HackenProof Discord server to communicate with experienced hackers and bug bounty hunters!

  • Hacking Insights: Engage with content that delves into the thrill and challenges of hacking
  • Real-Time Hack News: Keep up-to-date with fast-paced hacking world through real-time news and insights
  • Latest Announcements: Stay informed with the newest bug bounties launching and crucial platform updates

Join us on Discord and start collaborating with top hackers today!


Get a hacker's perspective on your web apps, network, and cloud

Find and report critical, exploitable vulnerabilities with real business impact. Use our 20+ custom tools to map the attack surface, find security issues that let you escalate privileges, and use automated exploits to collect essential evidence, turning your hard work into persuasive reports.

{% embed url="https://pentest-tools.com/?utm_term=jul2024&utm_medium=link&utm_source=hacktricks&utm_campaign=spons" %}


SerpApi

SerpApi offers fast and easy real-time APIs to access search engine results. They scrape search engines, handle proxies, solve captchas, and parse all rich structured data for you.

A subscription to one of SerpApis plans includes access to over 50 different APIs for scraping different search engines, including Google, Bing, Baidu, Yahoo, Yandex, and more.
Unlike other providers, SerpApi doesnt just scrape organic results. SerpApi responses consistently include all ads, inline images and videos, knowledge graphs, and other elements and features present in the search results.

Current SerpApi customers include Apple, Shopify, and GrubHub.
For more information check out their blog, or try an example in their playground.
You can create a free account here.


8kSec Academy In-Depth Mobile Security Courses

Learn the technologies and skills required to perform vulnerability research, penetration testing, and reverse engineering to protect mobile applications and devices. Master iOS and Android security through our on-demand courses and get certified:

{% embed url="https://academy.8ksec.io/" %}


WebSec

WebSec is a professional cybersecurity company based in Amsterdam which helps protecting businesses all over the world against the latest cybersecurity threats by providing offensive-security services with a modern approach.

WebSec is an all-in-one security company which means they do it all; Pentesting, Security Audits, Awareness Trainings, Phishing Campagnes, Code Review, Exploit Development, Security Experts Outsourcing and much more.

Another cool thing about WebSec is that unlike the industry average WebSec is very confident in their skills, to such an extent that they guarantee the best quality results, it states on their website "If we can't hack it, You don't pay it!". For more info take a look at their website and blog!

In addition to the above WebSec is also a committed supporter of HackTricks.

{% embed url="https://www.youtube.com/watch?v=Zq2JycGDCPM" %}

License & Disclaimer

Check them in:

{% content-ref url="welcome/hacktricks-values-and-faq.md" %} hacktricks-values-and-faq.md {% endcontent-ref %}

Github Stats

HackTricks Github Stats

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}