Skip to content

Latest commit

 

History

History
1003 lines (504 loc) · 34.2 KB

README.md

File metadata and controls

1003 lines (504 loc) · 34.2 KB

Awesome-PenTest-Practice

Tips, Materials and commands that you can use in CTFs, RealPenTest and even Bug Bounty!

My LinkedIn: https://www.linkedin.com/in/joas-antonio-dos-santos/ >> Contains more than 170 articles by Red and Blue Team


Nmap Tricks:

nmap -sV -Pn --top-ports 1000 --min-rate 200 --max-rate 400 -T5 192.168.0.1/24 = High Fast Nmap Scan

nmap -v -sV -T5 --top-ports 1000 --min-rate 200 --max-rate 400 --scan-delay 2 --max-scan-delay 4 --min-rtt-timeout 2 --max-rtt-timeout 3 initial-rtt-timeout 1 192.168.0.1/24 = Ultra High Fast Nmap Scan

nmap --top-ports 1000 -sV -v --ttl 10 --badsum TCP -f --mtu 16 192.168.0.1/24 = Evasion Firewall

nmap --top-ports 1000 -sV -v --ttl 10 -f --mtu 16 192.168.0.1/24 = Evasion Firewall 2

https://www.liquidweb.com/kb/using-nmap-pro-tips-and-tricks/

https://blog.urfix.com/10-cool-nmap-tricks-techniques/

https://medium.com/@iphelix/nmap-scanning-tips-and-tricks-5b4a3d2151b3


Nmap Evasion Techniques:

http://www.dimz-it.com/berkas/Nmap_Firewall_Evasion_Techniques.pdf

https://nmap.org/book/firewall-subversion.html

https://dzone.com/articles/firewall-bypassing-techniques-with-nmap-and-hping3

https://www.youtube.com/watch?v=d5-wBkMRPQU (Hak5 Evade Firewall)

https://www.youtube.com/watch?v=4t4kBkMsDbQ&ab_channel=NetworkChuck (Network Chuck Nmap)

https://github.com/jasonniebauer/Nmap-Cheatsheet


Bug Bounty Tricks and Techniques:

https://github.com/KingOfBugbounty/KingOfBugBountyTips

https://github.com/djadmin/awesome-bug-bounty

https://github.com/Muhammd/awesome-bug-bounty

https://github.com/ngalongc/bug-bounty-reference

https://github.com/djadmin/awesome-bug-bounty

https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters

https://github.com/EdOverflow/bugbounty-cheatsheet

https://github.com/EdOverflow/bugbountyguide

https://github.com/devanshbatham/Awesome-Bugbounty-Writeups

https://github.com/1hack0/Facebook-Bug-Bounty-Write-ups

https://pentester.land/list-of-bug-bounty-writeups.html

https://medium.com/bugbountywriteup

CSRF Poc Generator (https://github.com/merttasci/csrf-poc-generator)

SubOver (https://github.com/Ice3man543/SubOver)

Knock SubDomain (https://github.com/guelfoweb/knock)

XSS Payloads (https://gist.github.com/rvrsh3ll/09a8b933291f9f98e8ec)

SQL Injection Payloads (https://github.com/payloadbox/sql-injection-payload-list)

Trick Recon (https://www.linkedin.com/pulse/tricks-de-recon-ataide-junior/?trackingId=lo%2FwG4h%2FSemwGplcWrHIhA%3D%3D)


Red Team - Tools and Techniques

https://github.com/infosecn1nja/Red-Teaming-Toolkit

https://github.com/yeyintminthuhtut/Awesome-Red-Teaming

https://github.com/m0nad/awesome-privilege-escalation

https://github.com/D35m0nd142/LFISuite

https://github.com/P0cL4bs/kadimus.git

https://github.com/MrPineMan/Awesome-Reverse-Shell

https://github.com/xl7dev/WebShell

https://portswigger.net/web-security

https://github.com/alphaSeclab/awesome-burp-suite

https://github.com/snoopysecurity/awesome-burp-extensions

https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_-_linux.html

https://sushant747.gitbooks.io/total-oscp-guide/list_of_common_ports.html

https://github.com/jakejarvis/awesome-shodan-queries

https://github.com/danielmiessler/SecLists

https://github.com/0x4D31/awesome-oscp

https://github.com/Aadi-0110/awesome-oscp

https://github.com/coolx28/Awesome-Oscp

https://github.com/JoaoPauloF/OSCP/blob/master/OSCPnotes.md

https://github.com/husnainfareed/Awesome-Ethical-Hacking-Resources

https://github.com/codeinthedark/awesome-power-mode/commits?author=ceh

https://github.com/Optixal/CEHv10-Notes

https://github.com/g0rbe/CEH

https://github.com/CyberSecurityUP/Guide-CEH-Practical-Master

https://docs.google.com/document/d/e/2PACX-1vTP5OvJToWToMOKyeMyPcIPJhqbnESgWY6dYje9seJY96-ezCEJbXsMkfMWhoqPRaCNRs6BOO7urQyF/pub?fbclid=IwAR3aWZoikOvDgfxxzdfjFsGS60Q9SE8ZL5ROqP6Bzvzuq-fIYbSGoxRjArY

https://drive.google.com/drive/folders/12Mvq6kE2HJDwN2CZhEGWizyWt87YunkU (e-books Joas)

https://www.exploit-db.com/google-hacking-database

https://iftm.edu.br/ERP/MPES/EVENTOS/arquivos/2015_10_16-09_20_01_anexo_resumo_expandido_bruno_rodrigo.pdf

https://www.youtube.com/watch?v=LgBcFpusC7A

https://www.blackhat.com/presentations/bh-europe-05/BH_EU_05-Long.pdf

https://www.oakton.edu/user/2/rjtaylor/cis101/Google%20Hacking%20101.pdf

https://www.a2hosting.com.br/kb/getting-started-guide/internet-and-networking/troubleshooting-dns-with-dig-and-nslookup

https://ipok.com.br/blog/usando-dig-para-pesquisas-de-dns-parte-1/

https://www.cloudns.net/blog/10-most-used-nslookup-commands/

https://www.somosagility.com.br/como-solucionar-problemas-de-dns-com-dig-e-nslookup-2/

https://www.youtube.com/watch?v=2KzpGjn7M9s

https://github.com/rebootuser/LinEnum

https://github.com/Arr0way/linux-local-enumeration-

https://highon.coffee/blog/linux-local-enumeration-/

https://github.com/Z3R0th-13/Enum

https://github.com/411Hall/JAWS

https://411hall.github.io/JAWS-Enumeration/

https://hakin9.org/privesccheck-privilege-escalation-enumeration--for-windows/

http://literacybasics.ca/strategic-planning/strategic-planning-assesssment/overview-and-information-gathering-tools/

https://www.dlsweb.rmit.edu.au/Toolbox/knowmang/content/gathering_data/information_gathering_methods.htm

https://www.youtube.com/watch?v=WW6myutKBYk

https://www.youtube.com/watch?v=zemNLx0-LRw

https://www.youtube.com/watch?v=xlxpfvlUZLA

https://www.youtube.com/watch?v=Q8hAjEaAgE8

https://www.youtube.com/watch?v=z2EUhV11QB4

https://www.youtube.com/watch?v=Hk-21p2m8YY

https://www.youtube.com/watch?v=GlVb44dD-dA

https://www.youtube.com/watch?v=7XMIFTRiAGA

https://null-byte.wonderhowto.com/how-to/hack-like-pro-advanced-nmap-for-reconnaissance-0151619/

https://www.youtube.com/watch?v=krnpQWDkf_c

https://hackertarget.com/nmap-tutorial/

https://www.youtube.com/watch?v=VFJLMOk6daQ

https://awesomeopensource.com/projects/information-gathering

https://github.com/topics/information-gathering

https://www.hindawi.com/journals/scn/2019/2627608/

https://www.researchgate.net/publication/328430317_Approaches_for_Preventing_Honeypot_Detection_and_Compromise

https://blog.rapid7.com/2016/12/06/introduction-to-honeypots/

https://ccdcoe.org/uploads/2018/10/d3r2s4_haltas.pdf

https://www.incibe-cert.es/en/blog/honeystation-en

https://www.youtube.com/watch?v=fQqWe8br2Gw

https://securityonline.info/adrecon-active-directory-gathering-information-tool/

https://www.youtube.com/watch?v=ze1UcSLOypwMitre Attack Discoverys

https://attack.mitre.org/techniques/T1010/

https://attack.mitre.org/techniques/T1046/

https://attack.mitre.org/techniques/T1007/

https://attack.mitre.org/techniques/T1033/

https://attack.mitre.org/techniques/T1049/

https://attack.mitre.org/techniques/T1063/

https://attack.mitre.org/techniques/T1018/

https://attack.mitre.org/techniques/T1069/

https://attack.mitre.org/techniques/T1201/

https://attack.mitre.org/matrices/enterprise/linux/

Wsus Exploit: Realizar movimento lateral e manipular componentes do WSUS

https://pentestit.com/wsuxploit-weaponized-wsus-exploit-/

https://github.com/AlsidOfficial/WSUSpendu

https://osiriansec.gitbooks.io/infosecuberwiki/chapter1/exploitation/internal/lan-attacks/attack-windows/attack-wsus.html

https://github.com/infosecn1nja/AD-Attack-Defense/blob/master/README.md

Linux Exploitation: Exploração avançadas, métodos de enumeração avançada, escalação de privilégio, pivoting e até exploração de serviços.

https://attack.mitre.org/techniques/T1184/

https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/

https://www.youtube.com/watch?v=dk2wsyFiosg

https://tools.kali.org/tools-listing

https://www.youtube.com/watch?v=SyE4y6qZPjM

https://www.youtube.com/watch?v=B2xu0QXXx54

https://www.youtube.com/watch?v=SjwjxQndOs8

https://www.youtube.com/watch?v=_wdESwXdMYg

https://www.youtube.com/watch?v=sZ_-KD5Dksw

https://www.youtube.com/watch?v=gsEvrdcn-DI

https://kalilinuxtutorials.com/infog-information-gathering-tool/

https://www.hackingloops.com/information-gathering-using-kali-linux-for-penetration-testing/

https://github.com/wwong99/pentest-notes/blob/master/oscp_resources/OSCP-Survival-Guide.md

https://medium.com/@aptbughunter/my-oscp-experience-0xapt-4fff90a8d408

https://www.offensivecon.org/trainings/2018/linux-kernel-exploitation-techniques-vitaly-nikolenko.html

https://github.com/xairy/linux-kernel-exploitation/blob/master/README.md

https://github.com/xairy/linux-kernel-exploitation

https://www.youtube.com/watch?v=Hrlc3GZQ4bA

https://artkond.com/2017/03/23/pivoting-guide/

https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Network%20Pivoting%20Techniques.md

https://resources.infosecinstitute.com/pivoting-exploit-system-another-network/#gref

https://gtfobins.github.io/

https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md

https://payatu.com/guide-linux-privilege-escalation

https://medium.com/@falconspy/oscp-approved-tools-b2b4e889e707

https://null-byte.wonderhowto.com/how-to/use-ssh-local-port-forwarding-pivot-into-restricted-networks-0179711/

https://www.cybrary.it/blog/0p3n/pivot-network-port-forwardingredirection-hands-look/

https://0xdf.gitlab.io/2019/01/28/pwk-notes-tunneling-update1.html

https://www.youtube.com/watch?v=mQ1hRS8scWM

Windows Exploitation:Vulnerability scanning, pivoting and sideways movement, password cracking and privilege escalation

https://github.com/yeyintminthuhtut/Awesome-Advanced-Windows-Exploitation-References

https://hackersguru.in/windows-exploitation-and-hacking/

https://pt.slideshare.net/utdcsg/advanced-windows-exploitation

https://www.offensive-security.com/offsec/microsoft-dll-hijacking-exploit-in-action/

https://www.youtube.com/watch?v=Pt9a6EQFs9s

https://www.youtube.com/watch?v=XR1F467LTrs

https://www.youtube.com/watch?v=2-kJ7Kh_5C4

https://www.youtube.com/watch?v=FJhVoXwoX_w

https://doublepulsar.com/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6

https://www.youtube.com/watch?v=keFx6yYA_WY

Mitre Attack:

https://attack.mitre.org/matrices/enterprise/windows/

https://attack.mitre.org/techniques/T1077/

https://attack.mitre.org/techniques/T1111/

https://attack.mitre.org/techniques/T1174/

https://attack.mitre.org/techniques/T1534/

https://attack.mitre.org/techniques/T1175/

https://attack.mitre.org/techniques/T1075/

https://github.com/gentilkiwi/mimikatz

https://www.varonis.com/blog/what-is-mimikatz/

https://www.youtube.com/watch?v=bTYR_xYSDIk

https://www.youtube.com/watch?v=0TBCzaBklcE

https://www.youtube.com/watch?v=FfoQFKhWUr0

https://blogs.jpcert.or.jp/en/2016/01/windows-commands-abused-by-attackers.html

https://osandamalith.com/2019/08/26/converting-an-exe-to-a-dll/?fbclid=IwAR2LtVQnTJy-0M4cM9sEWTydKOSGIiGI9wiqKlD4V33Wtl6mWyd8hlNnBXo

Desenvolvimento de exploits: Buffer Overflow, Bypass Software Protectors, Binary Exploitation, ROP, Shell codes, Fuzzing, Reverse Engineering, Egg Hunters, Debuggers and etc.

https://www.youtube.com/watch?v=iyAyN3GFM7A&list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN

https://github.com/FabioBaroni/awesome-exploit-development

https://github.com/mxamusic/awesome-exploit-development

https://www.youtube.com/watch?v=1S0aBV-Waeo&t=1s

https://www.youtube.com/watch?v=1TNecxUBD1w

https://www.youtube.com/watch?v=H2ZTTQX-ma4

https://www.youtube.com/watch?v=59_gjX2HxyA

https://www.youtube.com/watch?v=hrjdAv-aHCY

https://www.youtube.com/watch?v=VX27nq6EcjI&list=PLcKsaFvYl4l87C8_HhxkcFaoNhzC9bRw6

https://www.youtube.com/channel/UCXHBFtUcbhIssuuXXud2WcQ

https://www.youtube.com/watch?v=8Dcj19KGKWM

https://www.youtube.com/watch?v=wDosab_Y4Hs

https://www.youtube.com/watch?v=5FJxC59hMRY

https://www.youtube.com/watch?v=gIJOtP1AC3A&t=9s

https://www.youtube.com/watch?v=4_xSGvD0GNk

https://www.youtube.com/watch?v=6JBRXqT3USI

https://www.youtube.com/watch?v=YgezGxzwD8A

https://www.youtube.com/watch?v=7PMw9GIb8Zs&list=PLBf0hzazHTGPoP8BjixXswrM01ttNkfnp

https://github.com/secfigo/Awesome-Fuzzing

https://github.com/wtsxdev/fuzzing-resources

https://www.hackers-arise.com/post/2017/06/21/exploit-development-part-3-finding-vulnerabilities-by-fuzzing-with-spike

https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/babys-first-nxplusaslr-bypass/

https://medium.com/@dontsmokejoints/bypass-nx-and-aslr-with-rop-38a0e46a62da

https://intx0x80.blogspot.com/2018/04/bypass-aslrnx-part-1.html

https://www.youtube.com/watch?v=mPbHroMVepM

https://www.youtube.com/watch?v=BI_fO4gMW4Q

https://awesomeopensource.com/projects/shellcode

https://github.com/codeengn/awesome-korea-security-paper/blob/master/ReverseEngineering/Understanding%20Windows%20Shellcode%20%5Bskape%5D.pdf

https://0x00sec.org/t/linux-shellcoding-part-1-0/289

https://medium.com/@eaugusto/windows-ce-superh3-exploit-development-interlude-usable-null-free-risc-shellcode-and-ascii-3a4bbf3077bf

https://www.exploit-db.com/papers/18273

https://www.exploit-db.com/shellcodes

https://www.offensive-security.com/metasploit-unleashed/payloads/

https://www.offensive-security.com/metasploit-unleashed/payload-types/

https://www.youtube.com/watch?v=a2EkORFcSZo

https://www.youtube.com/watch?v=Ps3mZWQz01s&list=PLIfZMtpPYFP4MaQhy_iR8uM0mJEs7P7s3

https://www.youtube.com/watch?v=RF3-qDy-xMs&list=PLIfZMtpPYFP6_YOrfX79YX79I5V6mS0ci

https://medium.com/@rafaveira3/exploit-development-kolibri-v2-0-http-server-egg-hunter-example-1-5e435aa84879

https://www.fuzzysecurity.com/tutorials/expDev/4.html

https://www.corelan.be/index.php/2010/01/09/exploit-writing-tutorial-part-8-win32-egg-hunting/

https://www.securitysift.com/windows-exploit-development-part-5-locating-shellcode-egghunting/

https://www.shogunlab.com/blog/2017/09/02/zdzg-windows-exploit-3.html

https://securityimpact.net/2017/02/15/exploit-development-4-egg-hunting/

https://connormcgarr.github.io/Exception-Handlers-and-Egg-Hunters/

https://rastating.github.io/creating-a-custom-shellcode-encoder/

https://medium.com/syscall59/writing-a-custom-shellcode-encoder-31816e767611

https://medium.com/@habibiefaried/slae-0x4-combined-method-for-encoding-shellcode-x86-2f8637d87ed9

https://www.offensive-security.com/metasploit-unleashed/alphanumeric-shellcode/

https://www.youtube.com/watch?v=vpzpuzqhOCI

https://www.youtube.com/watch?v=IMnKb3BaUvM

http://www-inst.eecs.berkeley.edu/~cs161/fa08/papers/stack_smashing.pdf

https://www.youtube.com/watch?v=Y-4WHf0of6Y

https://pastebin.com/FvWQZmB7

https://repo.zenk-security.com/Techniques%20d.attaques%20%20.%20%20Failles/Exploit%20writing%20tutorial%20part%201-Stack%20Based%20Overflows.pdf

Command and Control (C2): Command and control consists of techniques that opponents can use to communicate with systems under their control in a network of victims. Opponents usually try to mimic normal and expected traffic to avoid detection. There are many ways in which an adversary can establish command and control with varying levels of stealth, depending on the structure of the network and the victim's defenses.

https://medium.com/@jeremy.trinka/five-pentesting-tools-and-techniques-that-sysadmins-should-know-about-4ceca1488bff

https://attack.mitre.org/tactics/TA0011/

https://pentestit.com/list-of-open-source-c2-post-exploitation-frameworks/

https://pentestlab.blog/2017/11/14/command-and-control-website/

https://pentester.land/

https://www.youtube.com/watch?v=bUqu8fh7xUg

https://www.youtube.com/watch?v=eTA7weRp2yk

https://www.youtube.com/watch?v=cK16knLi1Vk

https://www.youtube.com/watch?v=Wk6xobVsZf4

https://www.youtube.com/watch?v=2G5B8uhku78

https://www.youtube.com/watch?v=S_ejYRTM8J0

https://www.youtube.com/watch?v=_L-VW_1tYHA

https://www.trendmicro.com/vinfo/us/security/definition/command-and-control-server

https://www.paloaltonetworks.com/cyberpedia/command-and-control-explained

Web Attacks: Ataques avançados de injeção de SQL, Comando de Sistema, Execução de código remoto, deserialization, XSS impactante, SQL to RCE, XSS to RCE, Bypass File Extensions, IDOR, Open redirect e etc. Ataques que tem grande impactos em aplicações web.

https://owasp.org/www-project-top-ten/

https://github.com/infoslack/awesome-web-hacking

https://github.com/latestalexey/awesome-web-hacking

https://libraries.io/github/infoslack/awesome-web-hacking

https://www.exploit-db.com/papers/13646

https://null-byte.wonderhowto.com/how-to/advanced-techniques-bypass-defeat-xss-filters-part-1-0190257/

https://www.youtube.com/watch?v=zs30qw4CF2U

http://devfuria.com.br/seguranca-da-informacao/owasp-topten-2010/a02-cross-site-ing/

https://www.youtube.com/watch?v=T-EQfydIxu4

https://www.youtube.com/watch?v=O3hb6HV1ZQo&t

https://www.youtube.com/watch?v=FTeE3OrTNoA&t=1s

https://www.youtube.com/watch?v=0dgmeTy7X3I

https://www.youtube.com/watch?v=L5l9lSnNMxg

https://www.youtube.com/watch?v=eDfGpu3iE4Q

https://github.com/pwntester/ysoserial.net

https://www.youtube.com/watch?v=nkTBwbnfesQ

https://medium.com/@notsoshant/a-not-so-blind-rce-with-sql-injection-13838026331e

https://medium.com/bugbountywriteup/sql-injection-to-lfi-to-rce-536bed29a862

https://pwnrules.com/flickr-from-sql-injection-to-rce/

https://medium.com/@knownsec404team/the-analysis-of-mybb-18-20-from-stored-xss-to-rce-7234d7cc0e72

https://github.com/xapax/xss-to-rce

https://blog.ripstech.com/2019/mybb-stored-xss-to-rce/

https://github.com/timip/OSWE

https://github.com/nicolauns/hunter-php-java-obfuscator

https://github.com/tholu/php-packer

https://obfuscator.io/

https://medium.com/nodesimplified/obfuscation-what-is-obfuscation-in-java-why-obfuscation-is-used-f6a5f5bcf022

https://github.com/java-obfuscator/java-obfuscator

https://owasp.org/www-pdf-archive/XML_Based_Attacks_-_OWASP.pdf

https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing

https://gist.github.com/mgeeky/4f726d3b374f0a34267d4f19c9004870

https://www.acunetix.com/blog/articles/xml-external-entity-xxe-vulnerabilities/

https://www.netsparker.com/blog/web-security/xxe-xml-external-entity-attacks/

https://www.exploit-db.com/docs/english/45074-file-upload-restrictions-bypass.pdf

https://pentestlab.blog/2012/11/29/bypassing-file-upload-restrictions/

https://www.youtube.com/watch?v=Ue3wtxR9s0E

https://owasp.org/www-community/vulnerabilities/Unrestricted_File_Upload

https://github.com/attackercan/REGEXP-SECURITY-CHEATSHEET

https://nvisium.com/blog/2015/06/11/regex-regularly-exploitable.html

https://medium.com/@somdevsangwan/exploiting-regular-expressions-2192dbbd6936

https://portswigger.net/support/sql-injection-bypassing-common-filters

https://owasp.org/www-community/attacks/Session_hijacking_attack

https://cheatsheetseries.owasp.org/cheatsheets/Deserialization_Cheat_Sheet.html

https://www.youtube.com/watch?v=fxrCJNQ96Kg

https://www.youtube.com/watch?v=OtlaTf9065w

https://www.youtube.com/watch?v=jYcx7WtbB0A

https://www.geeksforgeeks.org/session-hijacking/

https://www.venafi.com/blog/what-session-hijacking

https://www.blackhat.com/presentations/bh-europe-08/Alonso-Parada/Whitepaper/bh-eu-08-alonso-parada-WP.pdf

https://cheatsheetseries.owasp.org/cheatsheets/LDAP_Injection_Prevention_Cheat_Sheet.html

https://www.youtube.com/watch?v=iUbqJy_MOiE

https://www.youtube.com/watch?v=DkKUDbEt46A

https://www.youtube.com/watch?v=Bdpc-LjmKLc

https://portswigger.net/kb/issues/00100500_ldap-injection

https://websec.wordpress.com/2010/12/04/sqli-filter-evasion-cheat-sheet-mysql/

https://websec.files.wordpress.com/2010/11/sqli2.pdf

https://medium.com/@Pentestit_ru/bypassing-waf-4cfa1aad16bf

https://owasp.org/www-pdf-archive/OWASP_Stammtisch_Frankfurt_-_Web_Application_Firewall_Bypassing_-_how_to_defeat_the_blue_team_-_2015.10.29.pdf

https://www.youtube.com/watch?v=iQqwQXHwQk0

https://www.youtube.com/watch?v=Z8K_13jzITk

https://www.youtube.com/watch?v=tSf_IXfuzXk

https://www.youtube.com/watch?v=3K1-a7dnA60&t

https://www.youtube.com/watch?v=rloqMGcPMkI

https://www.youtube.com/watch?v=4Jk_I-cw4WE

https://www.youtube.com/watch?v=-nOih7rolX8

https://www.youtube.com/watch?v=HZaYmeOGCmI&list=PLy8t3TIwSh3tMEAjyldNNbjtTmm5G7kFl

https://www.linkedin.com/pulse/t%C3%A9cnica-anti-forenses-para-pentesters-1-b%C3%A1sicas-dos-santos/

https://pentester.land/list-of-bug-bounty-writeups.html

https://www.facebook.com/ExWareLabs/

https://twitter.com/hashtag/bugbountywriteup

https://medium.com/search?q=bug%20bounty

https://github.com/infoslack/awesome-web-hacking

https://github.com/latestalexey/awesome-web-hacking

https://awesomeopensource.com/project/infoslack/awesome-web-hacking

https://owasp.org/www-project-top-ten/

https://owasp.org/www-project-mobile-top-10/

https://github.com/vaib25vicky/awesome-mobile-security

https://www.youtube.com/results?search_query=mobile+hacking

https://www.linkedin.com/search/results/content/?keywords=web%20attacks%20joas&origin=SWITCH_SEARCH_VERTICAL

https://www.linkedin.com/pulse/bug-bounty-como-se-tornar-um-especialista-em-ataques-web-dos-santos/

https://www.linkedin.com/pulse/advanced-web-attacks-joas-antonio-dos-santos/

https://www.linkedin.com/pulse/overview-da-certifica%C3%A7%C3%A3o-ewpt-elearning-web-tester-dos-santos/

https://www.linkedin.com/pulse/overview-da-certifica%C3%A7%C3%A3o-offensive-security-web-oswe-dos-santos/

https://www.linkedin.com/pulse/como-se-tornar-um-elliot-alderson-do-ctf-pt2-joas-antonio-dos-santos/

https://github.com/b1n4ry4rms/RedTeam-Pentest-Cheatsheets/tree/master/OSCE

https://tulpa-security.com/2017/07/18/288/

https://jhalon.github.io/OSCE-Review/

https://drive.google.com/drive/folders/12Mvq6kE2HJDwN2CZhEGWizyWt87YunkU (My Ebooks)

https://niiconsulting.com/checkmate/2017/06/a-detail-guide-on-oscp-preparation-from-newbie-to-oscp/

https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-1-is-oscp-for-you-b57cbcce7440

https://www.offensive-security.com/offsec/my-philosophical-approach-to-oscp/

https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XSS%20Injection

https://github.com/payloadbox/xss-payload-list

https://medium.com/@pravinponnusamy/xss-payloads-7079c53c8559

https://owasp.org/www-community/xss-filter-evasion-cheatsheet

https://twitter.com/xsspayloads

http://www.xss-payloads.com/

https://github.com/payloadbox/sql-injection-payload-list

https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet


Social Engineering

https://support.rackspace.com/how-to/email-spoofing-best-practices/

http://hackwithbrain.blogspot.com/2016/01/email-spoofing-tutorial.html

https://www.trustzone.com/how-to-produce-a-phishing-email-in-5-minutes/

https://www.youtube.com/watch?v=iPfL6n9TzOE (Email Spoofing)

https://www.youtube.com/watch?v=FH3sxFl-4is (Email Intercept)

https://dminc.com/blog/social-engineering-in-advanced-persistent-threat/

https://www.kaspersky.com/resource-center/definitions/advanced-persistent-threats

https://www.darkreading.com/vulnerabilities-and-threats/social-engineering-leads-apt-attack-vectors/d/d-id/1100142

https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack

https://www.proofpoint.com/us/threat-reference/advanced-persistent-threat

https://www.computerweekly.com/feature/How-to-combat-advanced-persistent-threats-APT-strategies-to-protect-your-organisation


Hardware Hacking

https://www.youtube.com/watch?v=YjQhS_95t7s

https://null-byte.wonderhowto.com/how-to/make-your-own-bad-usb-0165419/

https://devcraze.com/tutorials/cyber-security/create-a-rubber-ducky-using-arduino/

https://hackaday.com/tag/badusb/

https://medium.com/@rokolabrovic/bad-arduino-leonardo-16a712faebcb


Labs

https://pentesterlab.com/

https://owasp.org/projects/

https://www.hackthebox.eu/

https://www.vulnhub.com/

https://tryhackme.com/

https://www.offensive-security.com/labs/


Course Platforms

https://www.elearnsecurity.com/

https://www.pentesteracademy.com/

https://www.offensive-security.com/

https://cybrary.it/

https://www.udemy.com/

https://www.pluralsight.com/

https://www.udemy.com/

https://cybrary.it/


Youtube Channels

https://www.youtube.com/channel/UCxHzA-Z97sjfK3OISjkbMCQ (RoadSec)

https://www.youtube.com/channel/UC2QgCedRNj_tLDrGWSM3GsQ (Mindthesec)

https://www.youtube.com/channel/UCz1PsqIhim7PUqQfuXmD-Bw (Hackaflag)

https://www.youtube.com/user/BlackHatOfficialYT (Blackhat)

https://www.youtube.com/channel/UCqGONXW1ORgz5Y4qK-0JdkQ (Joe Grand)

https://www.youtube.com/user/DEFCONConference (Defcon)

https://www.youtube.com/channel/UC4dxXZQq-ofAadUWbqhoceQ (DeviantOllam)

https://www.youtube.com/channel/UC3s0BtrBJpwNDaflRSoiieQ (Hak5)

https://www.youtube.com/channel/UCimS6P854cQ23j6c_xst7EQ (Hacker Warehouse)

https://www.youtube.com/channel/UCe8j61ABYDuPTdtjItD2veA (OWASP)

https://www.youtube.com/channel/UC42VsoDtra5hMiXZSsD6eGg/featured (The Modern Rogue)

https://www.youtube.com/channel/UC3S8vxwRfqLBdIhgRlDRVzw (Stack Mashing)

https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w (Live Overflow)

https://www.youtube.com/channel/UCW6MNdOsqv2E9AjQkv9we7A (PwnFunction)

https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA (IppSec)

https://www.youtube.com/channel/UCUB9vOGEUpw7IKJRoR4PK-A (Murmus CTF)

https://www.youtube.com/channel/UCND1KVdVt8A580SjdaS4cZg (Colin Hardy)

https://www.youtube.com/user/GynvaelEN (GynvaelEN)

https://www.youtube.com/channel/UCBcljXmuXPok9kT_VGA3adg (Robert Baruch)

https://www.youtube.com/channel/UCGISJ8ZHkmIv1CaoHovK-Xw (/DEV/NULL)

https://www.youtube.com/user/RootOfTheNull (John Hammond)

https://www.youtube.com/channel/UCDbNNYUME_pgocqarSjfNGw (Kacper)

https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw (The Cyber Mentor)

https://www.youtube.com/channel/UCdNLW93OyL4lTav1pbKbyaQ (Mentorable)

https://www.youtube.com/channel/UCMACXuWd2w6_IEGog744UaA (Derek Rook)

https://www.youtube.com/channel/UCFvueUEWRfQ9qT9UmHCw_og (Prof. Joas Antonio)

https://www.youtube.com/user/ricardolongatto (Ricardo Longatto)

https://www.youtube.com/user/daybsonbruno (XTREME Security)

https://www.youtube.com/user/eduardoamaral07 (Facil Tech)

https://www.youtube.com/channel/UC70YG2WHVxlOJRng4v-CIFQ (Gabriel Pato)

https://www.youtube.com/user/Diolinux (Diolinux)

https://www.youtube.com/user/greatscottlab (Great Scott!)

https://www.youtube.com/user/esecuritytv (eSecurity)

https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA (Cybrary)

https://www.youtube.com/user/DanielDonda (Daniel Donda)

https://www.youtube.com/channel/UCQN2DsjnYH60SFBIA6IkNwg (STOK)

https://www.youtube.com/user/ZetaTwo (Calle Svensson)

https://www.youtube.com/channel/UCNKUSu4TPk979JzMeKDXiwQ (Georgia Wedman)

https://www.youtube.com/channel/UCqDLY9WFoJWqrhycW8cbv1Q (Manoel T)

https://www.youtube.com/channel/UCNRM4GH-SD85WCSqeSb4xUA (Bug Bounty Public Disclousere)

https://www.youtube.com/channel/UCwTH3RkRCIE35RJ16Nh8V8Q (Kindred)

https://www.youtube.com/channel/UCySphP8k4rv7Jf-7v3baWIA(Vinicius Vieira)

https://www.youtube.com/channel/UCVImyGhRATNFGPmJfxaq1dw (Bsides)

https://www.youtube.com/user/Wraiith75 (Wraiith)

https://www.youtube.com/user/genxweb (Michael LaSalvia)

https://www.youtube.com/channel/UCi8P9S-PW7AF71g8Pi0W6Jw (AcadiTI)

https://www.youtube.com/channel/UCuQ8zW9VmVyml7KytSqJDzg (Mente Binária)

https://www.youtube.com/channel/UC_JW_5_3XnGR6IdqKmZD7Rg (Cryptoroot)

https://www.youtube.com/user/adsecf (Guia Anônima)

https://www.youtube.com/channel/UCXHBFtUcbhIssuuXXud2WcQ (Helvio Junior)

https://www.youtube.com/user/securitycast (Security Cast)

https://www.youtube.com/channel/UCcYYP7JizTd24W9Mr7FIhxw (Hack N' Roll Academy)


Blogs and Notices

https://thehackernews.com/

https://www.hackread.com/

https://blog.eccouncil.org/

https://acaditi.com.br/blog/

https://www.cisoadvisor.com.br/

https://mundohacker.net.br/

https://olhardigital.com.br/

https://www.digitalhealth.net/

https://www.tecmundo.com.br/

https://www.forbes.com/

https://www.bbc.com/

https://www.cisomag.com/

https://cio.economictimes.indiatimes.com/

https://www.kaspersky.com.br/blog/

https://www.tripwire.com/

https://blog.trendmicro.com.br/

https://www.bleepingcomputer.com/

https://thehack.com.br/

https://cyware.com/cyber-security-news-articles

https://threatpost.com/

https://exchange.xforce.ibmcloud.com/

https://www.scmagazine.com/home/security-news/

https://www.infosecurity-magazine.com/news/

https://www.securitymagazine.com/topics/2236-cyber-security-news

https://www.darkreading.com/

http://hakin9.org/


My Articles

https://www.linkedin.com/pulse/base-para-ingressar-mercado-de-seguran%C3%A7a-da-joas-antonio-dos-santos/ (A base para ingressar no mercado de segurança da informação)

https://www.linkedin.com/pulse/iniciando-e-aprimorando-sua-carreira-na-%C3%A1rea-de-soc-dos-santos/ - Iniciando e aprimorando sua carreira na área de SOC (Security Operation Center)

https://www.linkedin.com/pulse/sou-iniciante-na-%C3%A1rea-de-seguran%C3%A7a-da-informa%C3%A7%C3%A3o-por-onde-dos-santos/ (Sou iniciante na área de segurança da informação, por onde eu devo começar?)

https://www.linkedin.com/pulse/o-colapso-do-mercado-de-seguran%C3%A7a-da-informa%C3%A7%C3%A3o-dos-santos/ (O Colapso do Mercado de Segurança da Informação?)

https://www.linkedin.com/pulse/como-se-qualificar-para-novas-vagas-de-seguran%C3%A7a-da-que-dos-santos/ (Como se qualificar para as novas vagas de segurança da informação que estão abrindo?)

https://www.linkedin.com/pulse/os-requisitos-para-trabalhar-mercado-de-seguran%C3%A7a-da-dos-santos/ (Os requisitos para trabalhar no mercado de segurança da informação)

https://www.linkedin.com/pulse/aprimorando-seu-conhecimento-para-se-tornar-um-em-da-dos-santos/ (Aprimorando seu conhecimento para se tornar um Especialista em Segurança da Informação)

https://www.linkedin.com/pulse/forma%C3%A7%C3%A3o-completa-para-se-tornar-um-cyber-security-dos-santos/ (Formação completa para se tornar um Cyber Security Analyst)

https://www.linkedin.com/pulse/se-tornando-um-offensive-defensive-security-joas-antonio-dos-santos/ (Se tornando um Engenheiro de Segurança Defensiva e Ofensiva)

https://www.linkedin.com/pulse/aprimore-agora-suas-habilidades-t%C3%A9cnicas-na-%C3%A1rea-de-da-dos-santos/ (Aprimore agora suas habilidades tecnicas na área de segurança da informaçãl)

https://www.linkedin.com/pulse/como-se-tornar-um-mestre-jedi-ctf-joas-antonio-dos-santos/ (Como se tornar um Mestre Jedi no CTF)

https://www.linkedin.com/pulse/ser%C3%A1-que-realmente-vale-pena-gastar-dinheiro-com-na-%C3%A1rea-dos-santos/ (Vale a pena gastar dinheiro com certificação?)

https://www.linkedin.com/pulse/qual-caminho-trilhar-na-%C3%A1rea-de-seguran%C3%A7a-da-joas-antonio-dos-santos/ (Qual caminho trilhar na área de segurança?)

https://www.linkedin.com/pulse/aonde-eu-posso-estudar-seguran%C3%A7a-da-informa%C3%A7%C3%A3o-nessa-dos-santos/ (Aonde eu posso estudar segurança da informação?)

https://www.linkedin.com/pulse/como-estudar-e-desenvolver-suas-habilidades-em-pt2-dos-santos/ (Como estudar e desenvolver suas habilidades em segurança da informação PT2)

https://www.linkedin.com/pulse/como-ser-um-%C3%B3timo-profissional-de-ti-joas-antonio-dos-santos/ (Como ser um ótimo profissional de TI)

https://www.linkedin.com/pulse/desenvolvendo-o-autodidatismo-na-%C3%A1rea-de-seguran%C3%A7a-da-dos-santos/ (Desenvolvendo o autodidatismo na área de segurança da informação)

https://www.linkedin.com/pulse/qualquer-um-pode-trabalhar-com-seguran%C3%A7a-da-joas-antonio-dos-santos/ (Qualquer um pode trabalhar com segurança da informação)

https://www.linkedin.com/pulse/guia-b%C3%A1sico-sobre-soc-security-operation-center-dos-santos/ (Guia básico sobre SOC - Security Operation Center)

https://www.linkedin.com/pulse/como-estudar-para-certifica%C3%A7%C3%B5es-sem-dinheiro-pt1-dos-santos/ (Como estudar para certificações sem dinheiro PT1)

https://www.linkedin.com/pulse/construa-seu-laborat%C3%B3rio-de-seguran%C3%A7a-da-informa%C3%A7%C3%A3o-e-dos-santos/ (Construa seu laboratorio de segurança da informação)

https://www.linkedin.com/pulse/fundamentos-qual-real-necessidade-de-aprender-joas-antonio-dos-santos/ (Fundamentos qual a real necessidade de aprender?)

https://www.linkedin.com/pulse/como-ingressar-mercado-de-seguran%C3%A7a-da-informa%C3%A7%C3%A3o-dos-santos/ (Como ingressar no mercado de segurança da informação?)

https://www.linkedin.com/pulse/se-tornando-um-pentester-ou-hacker-n%C3%ADvel-elliot-dos-santos/ (Se tornando um Hacker ou PenTest nivel Elliot)

https://www.linkedin.com/pulse/desenvolvendo-suas-habilidades-em-seguran%C3%A7a-da-dos-santos/ (Desenvolvendo suas habilidades em segurança da informação)

https://www.linkedin.com/pulse/expandindo-sua-mente-para-se-tornar-um-mestre-na-arte-dos-santos/ (Expandindo sua mente para se tornar um mestre na arte de PenTest)

https://www.linkedin.com/pulse/como-ser-um-mestre-jedi-na-%C3%A1rea-de-seguran%C3%A7a-da-dos-santos/ (Como ser um mestre jedi na área de segurança da informação)

https://www.linkedin.com/pulse/como-aproveitar-o-hack-box-para-seu-desenvolvimento-dos-santos/ (Como aproveitar o Hack the Box para seu desenvolvimento pessoal?)

https://www.linkedin.com/pulse/estou-perdido-por-onde-come%C3%A7ar-na-%C3%A1rea-de-seguran%C3%A7a-da-dos-santos/ (Estou perdido! Por onde começar na área de segurança)

https://www.linkedin.com/pulse/pentest-z3r0-h3r0-1-joas-antonio-dos-santos/ (PenTest Z3R0 TO H3R0)

https://www.linkedin.com/pulse/como-se-tornar-um-elliot-alderson-ctf-joas-antonio-dos-santos/ (Como se tornar um elliot alderson no CTF

https://www.linkedin.com/pulse/entenda-o-ataque-do-primeiro-epis%C3%B3dio-de-mr-robot-dos-santos-/ (Entenda o primeiro ataque da série Mr. Robot - Bônus)

https://www.linkedin.com/pulse/tudo-sobre-profiss%C3%A3o-analista-de-seguran%C3%A7a-da-dos-santos-/ (Tudo sobre a profissão de analista de segurança da informação)