-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathinteresting websites
52 lines (38 loc) · 1.81 KB
/
interesting websites
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
Tools for pentesting
GENERAL:
https://github.com/alancruzs/alanpentesting
https://www.exploit-db.com/
https://gchq.github.io/CyberChef/
https://www.revshells.com/
https://hashcat.net/wiki/doku.php?id=example_hashes
https://gtfobins.github.io/
Generals, but I use always!!
https://wadcoms.github.io
https://github.com/swisskyrepo/PayloadsAllTheThings
https://book.hacktricks.xyz/welcome/readme
______________________________________________________
LINUX PRIV ESC
https://sushant747.gitbooks.io/total-oscp-guide/content/privilege_escalation_-_linux.html
________________________________________________________________________________________________________________
KERBEROS
https://pentestbook.six2dez.com/post-exploitation/windows/ad/kerberos-attacks
https://www.tarlogic.com/blog/how-kerberos-works/
https://www.tarlogic.com/blog/how-to-attack-kerberos/
____________________________________________________________
SQLI cheat sheets
https://pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet
https://github.com/kleiton0x00/Advanced-SQL-Injection-Cheatsheet
______________________________________________________________________________________________________________
WINDOWS PRIV ESC
token imperson
https://steflan-security.com/linux-privilege-escalation-token-impersonation/
https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation/privilege-escalation-abusing-tokens
https://steflan-security.com/windows-privilege-escalation-cheat-sheet/
https://github.com/PowerShellMafia/PowerSploit
https://ss64.com/nt/syntax-security_groups.html
https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/manage/understand-security-groups
____________________________________________________________________________________________________________
TO STUDY
hackthebox
letsdefend
portswigger labs