More Tools
Last updated
Last updated
Učite i vežbajte AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Učite i vežbajte GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
https://github.com/PaperMtn/lil-pwny : Proverite otkrivene naloge
https://www.nmmapper.com/sys/tools/subdomainfinder/ : 8 alata za pronalaženje poddomena, sublist3r, amass i još mnogo toga
https://github.com/blark/aiodnsbrute : Brute force imena domena asinkrono
https://crt.sh/?q=%.yahoo.com : Bruteforce poddomena
https://github.com/tomnomnom/httprobe: Proverite da li su web serveri u domenu dostupni
https://github.com/aboul3la/Sublist3r : Otkriće poddomena
https://github.com/gwen001/github-search/blob/master/github-subdomains.py : Otkriće poddomena u github-u
https://github.com/robertdavidgraham/masscan : Brzo skeniranje portova
https://github.com/Threezh1/JSFinder : Poddomeni i URL-ovi iz JS datoteka na webu
https://github.com/C1h2e1/MyFuzzingDict : Rečnik web datoteka
https://github.com/TypeError/Bookmarks/blob/master/README.md : BurpExtension za izbegavanje desetina repeater kartica
https://github.com/hakluke/hakrawler : Dobijanje resursa
https://github.com/izo30/google-dorker : Google dorks
https://github.com/sehno/Bug-bounty/blob/master/bugbounty_checklist.md : Web BugBounty kontrolna lista
https://github.com/Naategh/dom-red : Proverite listu domena protiv Open Redirection
https://github.com/prodigysml/Dr.-Watson : Burp dodatak, offline analiza za otkrivanje domena, poddomena i IP adresa
https://github.com/hahwul/WebHackersWeapons: Lista različitih alata
https://github.com/gauravnarwani97/Trishul : BurpSuite dodatak za pronalaženje ranjivosti (SQLi, XSS, SSTI)
https://github.com/fransr/postMessage-tracker : Chrome ekstenzija za praćenje post-messages funkcija
https://github.com/Quitten/Autorize : Automatski testovi autentifikacije (uklonite kolačiće i pokušajte da pošaljete zahtev)
https://github.com/pikpikcu/xrcross: XRCross je rekonstrukcija, skener i alat za penetraciju / BugBounty testiranje. Ovaj alat je napravljen za testiranje (XSS|SSRF|CORS|SSTI|IDOR|RCE|LFI|SQLI) ranjivosti
https://github.com/Mr-Un1k0d3r/PoisonHandler : Lateralni pokreti
https://freddiebarrsmith.com/trix/trix.html : LOL binarije
https://github.com/odzhan/injection : Tehnike injekcije procesa u Windows-u
https://github.com/BankSecurity/Red_Team : Red Team skripte
https://github.com/l0ss/Grouper2 : pronađite bezbednosne greške u Active Directory Group Policy.
https://www.wietzebeukema.nl/blog/powershell-obfuscation-using-securestring : Securestring obfuscation
https://pentestlab.blog/2020/02/24/parent-pid-spoofing/ : Lažiranje roditeljskog PID-a
https://github.com/the-xentropy/xencrypt : Enkriptovanje Powershell payload-a
https://windows-internals.com/faxing-your-way-to-system/ : Serija logova o Windows Internals
https://bestestredteam.com/2018/10/02/tracking-pixel-in-microsoft-office-document/ : Pratite ko otvara dokument
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet : Active Directory Cheat Sheet
Alati koje vidim da mogu biti korisni za analizu firmvera (automatski):
Post-krema:
Kako izvući firmver ako ga ne pronađemo online: https://www.youtube.com/watch?v=Kxvpbu9STU4
Evo firmvera sa ranjivostima za analizu: https://github.com/scriptingxss/IoTGoat
i ovde metodologija owasp za analizu firmvera: https://github.com/scriptingxss/owasp-fstm
Emulacija firmvera: FIRMADYNE (https://github.com/firmadyne/firmadyne/) je platforma za automatizaciju emulacije i dinamičke analize firmvera zasnovanog na Linux-u.
https://github.com/CoatiSoftware/Sourcetrail : Staticka analiza koda
https://github.com/skeeto/endlessh : SSH tarpit koji polako šalje beskonačnu poruku.
AWS i Cloud alati: https://github.com/toniblyx/my-arsenal-of-aws-security-tools
IFS (Interplanetarni sistem datoteka) za phishing: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/using-the-interplanetary-file-system-for-offensive-operations/
Usluge rotacije IP adresa: https://medium.com/@lokeshdlk77/how-to-rotate-ip-address-in-brute-force-attack-e66407259212
Linux rootkit: https://github.com/aesophor/satanic-rootkit
https://theia-ide.org/ : Online IDE
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters/ : Resursi za početak na BugBounties
https://github.com/ElevenPaths/HomePWN : Hacking IoT (Wifi, BLE, SSDP, MDNS)
https://github.com/rackerlabs/scantron : automatizacija skeniranja
https://github.com/doyensec/awesome-electronjs-hacking : Ova lista ima za cilj da pokrije teme vezane za bezbednost Electron.js.
https://github.com/serain/bbrecon : Informacije o BB programima
Učite i vežbajte AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Učite i vežbajte GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)