No description
Find a file
Carlos Polop a2ca955cb9 a
2024-02-09 01:36:13 +01:00
.gitbook/assets GITBOOK-4236: change request with no subject merged in GitBook 2024-01-14 22:36:27 +00:00
.github a 2024-02-05 21:00:40 +01:00
backdoors a 2024-02-08 22:36:15 +01:00
blockchain/blockchain-and-crypto-currencies a 2024-02-08 22:36:35 +01:00
c2 Update cobalt-strike.md 2023-02-17 12:42:27 -03:00
cryptography a 2024-02-08 22:36:35 +01:00
exploiting a 2024-02-05 03:29:11 +01:00
forensics/basic-forensic-methodology a 2024-02-09 01:36:13 +01:00
generic-methodologies-and-resources a 2024-02-09 01:36:13 +01:00
linux-hardening a 2024-02-09 01:36:13 +01:00
linux-unix/privilege-escalation a 2024-02-08 22:36:15 +01:00
macos-hardening a 2024-02-09 01:36:13 +01:00
misc a 2024-02-09 01:36:13 +01:00
mobile-pentesting a 2024-02-09 01:36:13 +01:00
network-services-pentesting GITBOOK-4247: change request with no subject merged in GitBook 2024-02-09 00:32:07 +00:00
pentesting-web a 2024-02-08 22:36:35 +01:00
physical-attacks a 2024-02-08 22:36:35 +01:00
radio-hacking a 2024-02-08 04:08:28 +01:00
reversing a 2024-02-08 22:36:35 +01:00
reversing-and-exploiting/linux-exploiting-basic-esp a 2024-02-08 04:08:28 +01:00
stego a 2024-02-08 22:36:35 +01:00
todo a 2024-02-08 04:08:28 +01:00
welcome GITBOOK-4247: change request with no subject merged in GitBook 2024-02-09 00:32:07 +00:00
windows-hardening a 2024-02-09 01:36:13 +01:00
.gitignore Update .gitignore 2023-06-25 15:55:55 +02:00
1911-pentesting-fox.md t 2024-02-04 11:58:49 +01:00
6881-udp-pentesting-bittorrent.md t 2024-02-04 11:58:49 +01:00
android-forensics.md t 2024-02-04 11:58:49 +01:00
burp-suite.md t 2024-02-04 11:58:49 +01:00
emails-vulns.md t 2024-02-04 11:58:49 +01:00
interesting-http.md t 2024-02-04 11:58:49 +01:00
LICENSE.md t 2024-02-04 11:58:49 +01:00
online-platforms-with-api.md t 2024-02-04 11:58:49 +01:00
other-web-tricks.md t 2024-02-04 11:58:49 +01:00
pentesting-dns.md t 2024-02-04 11:58:49 +01:00
post-exploitation.md t 2024-02-04 11:58:49 +01:00
README.md GITBOOK-4247: change request with no subject merged in GitBook 2024-02-09 00:32:07 +00:00
stealing-sensitive-information-disclosure-from-a-web.md t 2024-02-04 11:58:49 +01:00
SUMMARY.md GITBOOK-4247: change request with no subject merged in GitBook 2024-02-09 00:32:07 +00:00

HackTricks

Hacktricks logos & motion design by @ppiernacho.

{% hint style="success" %} Welcome to the wiki where you will find each hacking trick/technique/whatever I have learnt from CTFs, real life apps, reading researches, and news. {% endhint %}

To get started follow this page where you will find the typical flow that you should follow when pentesting one or more machines:

{% content-ref url="generic-methodologies-and-resources/pentesting-methodology.md" %} pentesting-methodology.md {% endcontent-ref %}

Platinum Sponsors

Your company could be here.

Corporate Sponsors

STM Cyber

STM Cyber is a great cybersecurity company whose slogan is HACK THE UNHACKABLE. They perform their own research and develop their own hacking tools to offer several valuable cybersecurity services like pentesting, Red teams and training.

You can check their blog in https://blog.stmcyber.com

STM Cyber also support cybersecurity open source projects like HackTricks :)

RootedCON

RootedCON is the most relevant cybersecurity event in Spain and one of the most important in Europe. With the mission of promoting technical knowledge, this congress is a boiling meeting point for technology and cybersecurity professionals in every discipline.

{% embed url="https://www.rootedcon.com/" %}

Intigriti

Intigriti is the Europe's #1 ethical hacking and bug bounty platform.

Bug bounty tip: sign up for Intigriti, a premium bug bounty platform created by hackers, for hackers! Join us at https://go.intigriti.com/hacktricks today, and start earning bounties up to $100,000!

{% embed url="https://go.intigriti.com/hacktricks" %}

Trickest


Use Trickest to easily build and automate workflows powered by the world's most advanced community tools.

Get Access Today:

{% embed url="https://trickest.com/?utm_campaign=hacktrics&utm_medium=banner&utm_source=hacktricks" %}

Intruder

Stay a step ahead in the cybersecurity game.

Intruder makes vulnerability management easy. Keep track of your attack surface, see where your company is vulnerable, and prioritize issues that leave your systems most exposed so you can focus on what matters most.

Run thousands of checks with a single platform that covers your entire tech stack from internal infrastructure to web apps, APIs and cloud systems. Integrate seamlessly with AWS, GCP, Azure and streamline DevOps so your team can implement fixes faster.

Intruder never rests. Round-the-clock protection monitors your systems 24/7. Want to learn more? Visit their site and take it for a spin with a free trial.

{% embed url="https://www.intruder.io/?utm_campaign=hacktricks&utm_source=referral" %}

HACKENPROOF

Join HackenProof Discord server to communicate with experienced hackers and bug bounty hunters!

Hacking Insights
Engage with content that delves into the thrill and challenges of hacking

Real-Time Hack News
Keep up-to-date with fast-paced hacking world through real-time news and insights

Latest Announcements
Stay informed with the newest bug bounties launching and crucial platform updates

Join us on Discord and start collaborating with top hackers today!


Pentest-Tools.com - The essential penetration testing toolkit

Instantly available setup for vulnerability assessment & penetration testing. Run a full pentest from anywhere with 20+ tools & features that go from recon to reporting. We don't replace pentesters - we develop custom tools, detection & exploitation modules to give them back some time to dig deeper, pop shells, and have fun.

{% embed url="https://pentest-tools.com/" %}

WebSec

WebSec is a professional cybersecurity company based in Amsterdam which helps protecting businesses all over the world against the latest cybersecurity threats by providing offensive-security services with a modern approach.

WebSec is an all-in-one security company which means they do it all; Pentesting, Security Audits, Awareness Trainings, Phishing Campagnes, Code Review, Exploit Development, Security Experts Outsourcing and much more.

Another cool thing about WebSec is that unlike the industry average WebSec is very confident in their skills, to such an extent that they guarantee the best quality results, it states on their website "If we can't hack it, You don't pay it!". For more info take a look at their website and blog!

In addition to the above WebSec is also a committed supporter of HackTricks.

{% embed url="https://www.youtube.com/watch?v=Zq2JycGDCPM" %}

License & Disclaimer

Check them in:

{% content-ref url="welcome/hacktricks-values-and-faq.md" %} hacktricks-values-and-faq.md {% endcontent-ref %}

Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!

Other ways to support HackTricks: