Skip to content

Latest commit

 

History

History
80 lines (57 loc) · 3.17 KB

useful.md

File metadata and controls

80 lines (57 loc) · 3.17 KB

Useful information

Attention: The articles published on this wiki are for education purpose, to use during a CTF or for an authorized penetrationtest. By using the wiki, you've agreed to use this knowledge in an ethical way and do not evil in any perspective.

Pentestmonkey

Pentestmonket, taking the monkey work out of pentesting. A great website with all kind of reverse shells and other cool stuff to make your work as pentester easier.

Visit: Pentestmonkey

GTFObins

GTFOBins is a curated list of Unix binaries that can used to bypass local security restrictions in misconfigured systems.

The project collects legitimate functions of Unix binaries that can be abused to get the f**k break out restricted shells, escalate or maintain elevated privileges, transfer files, spawn bind and reverse shells, and facilitate the other post-exploitation tasks.

It is important to note that this is not a list of exploits, and the programs listed here are not vulnerable per se, rather, GTFOBins is a compendium about how to live off the land when you only have certain binaries available.

GTFOBins is a collaborative project created by Emilio Pinna and Andrea Cardaci where everyone can contribute with additional binaries and techniques.

Visit: GTFObins

LOLBAS

LOLBAS is the Windows GTFObins.

Living Off The Land Binaries and Scripts (and now also Libraries)

Visit: LOLBAS

WADComs

WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.

Visit: WADComs

Payload All The Things

This is a super collection for pentesting on Github.

Visit: Payload All The Things

High on Coffee

A great website about pentesting with a nice cheatsheet

Visit: High on Coffee

Hacktricks

A great website with a lot of information about penetration testing.

Visit: Hacktricks

OWASP cheatsheets

OWASP published a lot of information about security online. Even some nice cheatsheets which could be handy.

Visit: OWASP Cheatsheets

OSINT Framework

OSINT Framework....... Visit: OSINT Framework

This person does not exist

This websites generates awesome photos of people who don't exist. These photos can be used for a fake profile. Every time the website is refreshed a new photo is generated Visit: This person does not exist

CVSS calculator v3.1

Common Vulnerability Scoring System Calculator or shorted to CVSS calculator v3.1 can be used to calculate a vulnerability score.

OWASP risk calculator

OWASP risk calculator based on the OWASP risk rating methodology