13 KiB
Support HackTricks and get benefits!
-
Do you work in a cybersecurity company? Do you want to see your company advertised in HackTricks? or do you want to have access to the latest version of the PEASS or download HackTricks in PDF? Check the SUBSCRIPTION PLANS!
-
Discover The PEASS Family, our collection of exclusive NFTs
-
Get the official PEASS & HackTricks swag
-
Join the 💬 Discord group or the telegram group or follow me on Twitter 🐦@carlospolopm.
-
Share your hacking tricks by submitting PRs to the hacktricks github repo.
BlueTeam
- https://github.com/yarox24/attack_monitor
- https://capsule8.com/blog/dont-get-kicked-out-a-tale-of-rootkits-and-other-backdoors/
- https://github.com/ION28/BLUESPAWN
- https://github.com/PaperMtn/lil-pwny : Check disclosed accounts
- https://github.com/rabobank-cdc/DeTTECT
OSINT
- https://github.com/3vangel1st/kamerka
- https://github.com/BullsEye0/google_dork_list
- https://github.com/highmeh/lure
- https://www.shodan.io/
- https://censys.io/
- https://viz.greynoise.io/table
- https://www.zoomeye.org
- https://fofa.so
- https://www.onyphe.io
- https://app.binaryedge.io
- https://hunter.io
- https://wigle.net
- https://ghostproject.fr
- https://www.oshadan.com/
- https://builtwith.com/
- https://www.spiderfoot.net/
- https://github.com/zricethezav/gitleaks
- https://www.nmmapper.com/sys/tools/subdomainfinder/ : 8 Subdomain finder tools, sublist3r, amass and more
WEB
- https://github.com/AlisamTechnology/ATSCAN
- https://github.com/momenbasel/KeyFinder
- https://github.com/hahwul/XSpear
- https://github.com/BitTheByte/Monitorizer/
- https://github.com/spinkham/skipfish
- https://github.com/blark/aiodnsbrute : Brute force domain names asynchronously
- https://crt.sh/?q=%.yahoo.com : Subdomain bruteforce
- https://github.com/tomnomnom/httprobe: Check if web servers in a domain are accessible
- https://github.com/aboul3la/Sublist3r : Subdomain discovery
- https://github.com/gwen001/github-search/blob/master/github-subdomains.py : Subdomain discovery in github
- https://github.com/robertdavidgraham/masscan : Fast port scanning
- https://github.com/Threezh1/JSFinder : Subdomains and URLs from JS files in a web
- https://github.com/C1h2e1/MyFuzzingDict : Web files dictionary
- https://github.com/TypeError/Bookmarks/blob/master/README.md : BurpExtension to avoid dozens repeater tabs
- https://github.com/hakluke/hakrawler : Obtain assets
- https://github.com/izo30/google-dorker : Google dorks
- https://github.com/sehno/Bug-bounty/blob/master/bugbounty_checklist.md : Web BugBounty checklist
- https://github.com/Naategh/dom-red : Check a list of domain against Open Redirection
- https://github.com/prodigysml/Dr.-Watson : Burp plugin, offline analysis to discover domains, subdomains and IPs
- https://github.com/hahwul/WebHackersWeapons: List of different tools
- https://github.com/gauravnarwani97/Trishul : BurpSuite Plugingto find vulns (SQLi, XSS, SSTI)
- https://github.com/fransr/postMessage-tracker : Chrome extension for tracking post-messages functions
- https://github.com/Quitten/Autorize : Automatic authentication tests (remove cookies and try to send the request)
- https://github.com/pikpikcu/xrcross: XRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. This tool was built to test (XSS|SSRF|CORS|SSTI|IDOR|RCE|LFI|SQLI) vulnerabilities
Windows
- https://github.com/Mr-Un1k0d3r/PoisonHandler : Lateral movements
- https://freddiebarrsmith.com/trix/trix.html : LOL bins
- https://gist.github.com/netbiosX/ee35fcd3722e401a38136cff7b751d79 (https://pentestlab.blog/2020/01/13/persistence-image-file-execution-options-injection/): Persistence
- https://github.com/odzhan/injection : Windows Process Injection techniques
- https://github.com/BankSecurity/Red_Team : Red Team scripts
- https://github.com/l0ss/Grouper2 : find security-related misconfigurations in Active Directory Group Policy.
- https://www.wietzebeukema.nl/blog/powershell-obfuscation-using-securestring : Securestring obfuscation
- https://pentestlab.blog/2020/02/24/parent-pid-spoofing/ : Parent PID Spoofing
- https://github.com/the-xentropy/xencrypt : Encrypt Powershell payloads
- https://shells.systems/introducing-ninja-c2-the-c2-built-for-stealth-red-team-operations/ : Stealth C2
- https://windows-internals.com/faxing-your-way-to-system/ : Series of logs about Windows Internals
- https://bestestredteam.com/2018/10/02/tracking-pixel-in-microsoft-office-document/ : Track who open a document
- https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet : Active Directory Cheat Sheet
Firmware
Tools q veo q pueden molar para analizar firmares (automaticas):
- https://github.com/craigz28/firmwalker
- https://github.com/fkie-cad/FACT_core
- https://gitlab.com/bytesweep/bytesweep-go
Post-crema:
- https://blog.mindedsecurity.com/2018/09/pentesting-iot-devices-part-1-static.html
- https://blog.mindedsecurity.com/2018/10/pentesting-iot-devices-part-2-dynamic.html
Como extraer firmware si no lo encontramos online: https://www.youtube.com/watch?v=Kxvpbu9STU4
Aqui un firware con vulnerabilidades para analizar: https://github.com/scriptingxss/IoTGoat
y por aqui la metodologia owasp para analizar firmware: https://github.com/scriptingxss/owasp-fstm
Firmware emulation: FIRMADYNE (https://github.com/firmadyne/firmadyne/) is a platform for automating the emulation and dynamic analysis of Linux-based firmware.
OTHER
- https://twitter.com/HackAndDo/status/1202695084543791117
- https://github.com/weev3/LKWA
- https://h0mbre.github.io/Learn-C-By-Creating-A-Rootkit/
- https://github.com/skelsec/jackdaw
- https://github.com/CoatiSoftware/Sourcetrail : Static code analysis
- https://www.hackerdecabecera.com/2019/12/blectf-capture-flag-en-formato-hardware.html : Bluetooth LE CTF
- https://github.com/skeeto/endlessh : SSH tarpit that slowly sends an endless banner.
- AWS and Cloud tools: https://github.com/toniblyx/my-arsenal-of-aws-security-tools
- IFS (Interplanetary File System) for phising: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/using-the-interplanetary-file-system-for-offensive-operations/
- IP rotation services: https://medium.com/@lokeshdlk77/how-to-rotate-ip-address-in-brute-force-attack-e66407259212
- Linux rootkit: https://github.com/aesophor/satanic-rootkit
- https://theia-ide.org/ : Online IDE
- https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters/ : Resources for starting on BugBounties
- https://medium.com/macoclock/jailbreak-and-stuff-kickstart-tools-and-techniques-for-ios-application-pentesting-6fa53a3987ab : IOS pentesting tools
- https://github.com/random-robbie/keywords/blob/master/keywords.txt : Keywords
- https://github.com/ElevenPaths/HomePWN : Hacking IoT (Wifi, BLE, SSDP, MDNS)
- https://github.com/rackerlabs/scantron : automating scanning
- https://github.com/doyensec/awesome-electronjs-hacking : This list aims to cover Electron.js security related topics.
- https://github.com/serain/bbrecon : Info about BB programs
Support HackTricks and get benefits!
-
Do you work in a cybersecurity company? Do you want to see your company advertised in HackTricks? or do you want to have access to the latest version of the PEASS or download HackTricks in PDF? Check the SUBSCRIPTION PLANS!
-
Discover The PEASS Family, our collection of exclusive NFTs
-
Get the official PEASS & HackTricks swag
-
Join the 💬 Discord group or the telegram group or follow me on Twitter 🐦@carlospolopm.
-
Share your hacking tricks by submitting PRs to the hacktricks github repo.