13 KiB
		
	
	
	
	
	
	
	
			
		
		
	
	{% hint style="success" %}
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: 
HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
 - Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
 - Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.
 

{% embed url="https://websec.nl/" %}
BlueTeam
- https://github.com/yarox24/attack_monitor
 - https://capsule8.com/blog/dont-get-kicked-out-a-tale-of-rootkits-and-other-backdoors/
 - https://github.com/ION28/BLUESPAWN
 - https://github.com/PaperMtn/lil-pwny : Check disclosed accounts
 - https://github.com/rabobank-cdc/DeTTECT
 
OSINT
- https://github.com/3vangel1st/kamerka
 - https://github.com/BullsEye0/google_dork_list
 - https://github.com/highmeh/lure
 - https://www.shodan.io/
 - https://censys.io/
 - https://viz.greynoise.io/table
 - https://www.zoomeye.org
 - https://fofa.so
 - https://www.onyphe.io
 - https://app.binaryedge.io
 - https://hunter.io
 - https://wigle.net
 - https://ghostproject.fr
 - https://www.oshadan.com/
 - https://builtwith.com/
 - https://www.spiderfoot.net/
 - https://github.com/zricethezav/gitleaks
 - https://www.nmmapper.com/sys/tools/subdomainfinder/ : 8 Subdomain finder tools, sublist3r, amass and more
 
WEB
- https://github.com/AlisamTechnology/ATSCAN
 - https://github.com/momenbasel/KeyFinder
 - https://github.com/hahwul/XSpear
 - https://github.com/BitTheByte/Monitorizer/
 - https://github.com/spinkham/skipfish
 - https://github.com/blark/aiodnsbrute : Brute force domain names asynchronously
 - https://crt.sh/?q=%.yahoo.com : Subdomain bruteforce
 - https://github.com/tomnomnom/httprobe: Check if web servers in a domain are accessible
 - https://github.com/aboul3la/Sublist3r : Subdomain discovery
 - https://github.com/gwen001/github-search/blob/master/github-subdomains.py : Subdomain discovery in github
 - https://github.com/robertdavidgraham/masscan : Fast port scanning
 - https://github.com/Threezh1/JSFinder : Subdomains and URLs from JS files in a web
 - https://github.com/C1h2e1/MyFuzzingDict : Web files dictionary
 - https://github.com/TypeError/Bookmarks/blob/master/README.md : BurpExtension to avoid dozens repeater tabs
 - https://github.com/hakluke/hakrawler : Obtain assets
 - https://github.com/izo30/google-dorker : Google dorks
 - https://github.com/sehno/Bug-bounty/blob/master/bugbounty_checklist.md : Web BugBounty checklist
 - https://github.com/Naategh/dom-red : Check a list of domain against Open Redirection
 - https://github.com/prodigysml/Dr.-Watson : Burp plugin, offline analysis to discover domains, subdomains and IPs
 - https://github.com/hahwul/WebHackersWeapons: List of different tools
 - https://github.com/gauravnarwani97/Trishul : BurpSuite Plugingto find vulns (SQLi, XSS, SSTI)
 - https://github.com/fransr/postMessage-tracker : Chrome extension for tracking post-messages functions
 - https://github.com/Quitten/Autorize : Automatic authentication tests (remove cookies and try to send the request)
 - https://github.com/pikpikcu/xrcross: XRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. This tool was built to test (XSS|SSRF|CORS|SSTI|IDOR|RCE|LFI|SQLI) vulnerabilities
 
Windows
- https://github.com/Mr-Un1k0d3r/PoisonHandler : Lateral movements
 - https://freddiebarrsmith.com/trix/trix.html : LOL bins
 - https://gist.github.com/netbiosX/ee35fcd3722e401a38136cff7b751d79 (https://pentestlab.blog/2020/01/13/persistence-image-file-execution-options-injection/): Persistence
 - https://github.com/odzhan/injection : Windows Process Injection techniques
 - https://github.com/BankSecurity/Red_Team : Red Team scripts
 - https://github.com/l0ss/Grouper2 : find security-related misconfigurations in Active Directory Group Policy.
 - https://www.wietzebeukema.nl/blog/powershell-obfuscation-using-securestring : Securestring obfuscation
 - https://pentestlab.blog/2020/02/24/parent-pid-spoofing/ : Parent PID Spoofing
 - https://github.com/the-xentropy/xencrypt : Encrypt Powershell payloads
 - https://shells.systems/introducing-ninja-c2-the-c2-built-for-stealth-red-team-operations/ : Stealth C2
 - https://windows-internals.com/faxing-your-way-to-system/ : Series of logs about Windows Internals
 - https://bestestredteam.com/2018/10/02/tracking-pixel-in-microsoft-office-document/ : Track who open a document
 - https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet : Active Directory Cheat Sheet
 
Firmware
Tools q veo q pueden molar para analizar firmares (automaticas):
- https://github.com/craigz28/firmwalker
 - https://github.com/fkie-cad/FACT_core
 - https://gitlab.com/bytesweep/bytesweep-go
 
Post-crema:
- https://blog.mindedsecurity.com/2018/09/pentesting-iot-devices-part-1-static.html
 - https://blog.mindedsecurity.com/2018/10/pentesting-iot-devices-part-2-dynamic.html
 
Como extraer firmware si no lo encontramos online: https://www.youtube.com/watch?v=Kxvpbu9STU4
Aqui un firware con vulnerabilidades para analizar: https://github.com/scriptingxss/IoTGoat
y por aqui la metodologia owasp para analizar firmware: https://github.com/scriptingxss/owasp-fstm
Firmware emulation: FIRMADYNE (https://github.com/firmadyne/firmadyne/) is a platform for automating the emulation and dynamic analysis of Linux-based firmware.
OTHER
- https://twitter.com/HackAndDo/status/1202695084543791117
 - https://github.com/weev3/LKWA
 - https://h0mbre.github.io/Learn-C-By-Creating-A-Rootkit/
 - https://github.com/skelsec/jackdaw
 - https://github.com/CoatiSoftware/Sourcetrail : Static code analysis
 - https://www.hackerdecabecera.com/2019/12/blectf-capture-flag-en-formato-hardware.html : Bluetooth LE CTF
 - https://github.com/skeeto/endlessh : SSH tarpit that slowly sends an endless banner.
 - AWS and Cloud tools: https://github.com/toniblyx/my-arsenal-of-aws-security-tools
 - IFS (Interplanetary File System) for phising: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/using-the-interplanetary-file-system-for-offensive-operations/
 - IP rotation services: https://medium.com/@lokeshdlk77/how-to-rotate-ip-address-in-brute-force-attack-e66407259212
 - Linux rootkit: https://github.com/aesophor/satanic-rootkit
 - https://theia-ide.org/ : Online IDE
 - https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters/ : Resources for starting on BugBounties
 - https://medium.com/macoclock/jailbreak-and-stuff-kickstart-tools-and-techniques-for-ios-application-pentesting-6fa53a3987ab : IOS pentesting tools
 - https://github.com/random-robbie/keywords/blob/master/keywords.txt : Keywords
 - https://github.com/ElevenPaths/HomePWN : Hacking IoT (Wifi, BLE, SSDP, MDNS)
 - https://github.com/rackerlabs/scantron : automating scanning
 - https://github.com/doyensec/awesome-electronjs-hacking : This list aims to cover Electron.js security related topics.
 - https://github.com/serain/bbrecon : Info about BB programs
 

{% embed url="https://websec.nl/" %}
{% hint style="success" %}
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: 
HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
 - Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
 - Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.