Hacking Resources
Hacking Resources
Usefull Web Browser plugins
Cool Tools/Labs
Linux Privilege Escalation
Windows Privilege Escalation
Windows stuff
Powershell
Linux stuff
Pivoting
Brute force/Cracking
Red Team
Exploit Development/Reversing/AV|EDR Bypass/Malware Analysis
Compiling exploits
Obfuscators
Deobfuscators
Buffer Overflows
General Hacking Cheatsheets/Cool Articles/Podcasts
Cobalt Strike
Bug Bounty/Web Security
Subdomain finders
Subdomain takeover
Discovering of Target by using ASN (IP Blocks) and reverse whois
Screenshotting
Cool presentations/videos
Cool Books
Infosec twitter accounts to follow (itβs a really awesome way to learn as well!. Will keep adding them)
Hacking Resources
This isnβt more than another hacking resources list. I basically throw here every resource I get interested on taking a look/playing with it, or stuff that I use as a reference while trying to break something.
Usefull Web Browser plugins
https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard/ <ββ For Firefox
Cool Tools/Labs
Linux Privilege Escalation
Windows Privilege Escalation
https://github.com/worawit/MS17-010 <ββ Eternal blue without MSF
Windows stuff
https://gist.github.com/pwntester/72f76441901c91b25ee7922df5a8a9e4 <β DotNetNuke (CVE-2017-9822) Payloads
Powershell
https://vipulvyas0813.medium.com/introduction-to-powershell-for-penetration-testing-733236bc9547 <ββ Serie about Poershell for Penetration Testing (5 posts)
Linux stuff
Pivoting
Brute force/Cracking
https://github.com/Coalfire-Research/npk <ββ Distributed hash-cracking platform on serverless AWS componentes
Red Team
https://3xpl01tc0d3r.blogspot.com/2021/07/resource-based-constrained-delegation.html?m=1 <β Resource Based Constrained Delegation IN LINUX
https://www.harmj0y.net/blog/ **<ββ Awesome Active Directory Posts **
https://malicious.link/post/2016/kerberoast-pt1/ <ββ Serie about Kerberoasting (5 posts)
https://www.guidepointsecurity.com/blog/delegating-like-a-boss-abusing-kerberos-delegation-in-active-directory/ <β Abuse Constrained Delegation
Exploit Development/Reversing/AV|EDR Bypass/Malware Analysis
https://amsi.fail/ <β- Automatic generation of some AMSI Bypass
https://samsclass.info/126/126_F21.shtml <β Practical Malware Analysis Course!
https://raw.githubusercontent.com/Mr-Un1k0d3r/EDRs/main/cortex.txt <ββ NON documented APIβs, possible AV/EDR Bypass?
https://0xpat.github.io/Malware_development_part_1/ <β- Malware Devlopment series
https://pinvoke.net/ <ββ Documented APIs for Bypass
https://github.com/stephenfewer/ReflectiveDLLInjection β> ReflectiveDLLInjection en Powershell!!!!
https://github.com/PowerShellMafia/PowerSploit/blob/master/CodeExecution/Invoke-ReflectivePEInjection.ps1 β> Invoke-ReflectivePEInjection Powershell
Compiling exploits
Obfuscators
Deobfuscators
Buffer Overflows
General Hacking Cheatsheets/Cool Articles/Podcasts
https://github.com/chvancooten/OSEP-Code-Snippets <β- OSEP Code Snippets!
Cobalt Strike
Bug Bounty/Web Security
https://blog.usejournal.com/bug-hunting-methodology-part-1-91295b2d2066 **<ββ Serie of 3 post about Bug Hunting Methodology **
https://twitter.com/FaniMalikHack/status/1355145481479999488 **<ββ Tweet by @FaniMalikHack with an infographic about JWT **
Subdomain finders
https://www.crunchbase.com/search/acquisitions **<ββ Discovering searching by acquisitions **
Subdomain takeover
Discovering of Target by using ASN (IP Blocks) and reverse whois
Screenshotting
Cool presentations/videos
Defeating EDRs using Dynamic Invocation - Jean Francois Maes https://youtu.be/LXfhyTpQ7TM
A New Era Of SSRF: Exploiting Url Parsrs - Orange Tsai https://www.youtube.com/watch?v=D1S-G8rJrEk
HTTP Desync Attacks: Smashing into the Cell Next Door - albinowax https://www.youtube.com/watch?v=w-eJM2Pc0KI&t=1622s
A $7.500 BUG BOUNTY Bug Explained, step by step. (Blind XXE OOB over DNS) - STOK https://www.youtube.com/watch?v=aSiIHKeN3ys&t=26s&pbjreload=101
GitHub Recon and Sensitive Data Exposure https://youtu.be/l0YsEk_59fQ
Cracking the Lens: Targeting HTTPβs Hidden Attack-Surface https://www.youtube.com/watch?v=zP4b3pw94s0
How to Crush Bug Bounties in the first 12 Months https://www.youtube.com/watch?v=AbebbJ3cRLI
The Bug Hunterβs Methodology v4.0 - Recon Edition by @jhaddixβ at #NahamCon2020β https://youtu.be/p4JgIu1mceI
How i became a HackerOne MVH without writing a single line of python (Motivational talk) by STOK https://youtu.be/4YjCta2fcbw
My Journey to Cybersecurity CIA Keynote - Heath Adams (aka The Cyber Mentor) https://www.youtube.com/watch?v=q4h8A5dQsZw
Defeating EDRβs using D/Invoke - Jean-FranΓ§ois Maes - https://youtu.be/d_Z_WV9fp9Q
Cool Books
Infosec twitter accounts to follow (itβs a really awesome way to learn as well!. Will keep adding them)
securibee: https://twitter.com/securibee
codingo_: https://twitter.com/codingo_
hakluke: https://twitter.com/hakluke
JackRhysider: https://twitter.com/JackRhysider
Orange Tsai: https://twitter.com/orange_8361
MalwareTech: https://twitter.com/MalwareTechBlog
TomTomNom: https://twitter.com/TomNomNom
Jason Haddix: https://twitter.com/Jhaddix
NahamSec: https://twitter.com/NahamSec
John Hammond: https://twitter.com/_johnhammond
Jake Williams: https://twitter.com/MalwareJake
Deviant Ollman: https://twitter.com/deviantollam
J3rryBl4nks: https://twitter.com/JBl4nks
Tib3rius: https://twitter.com/0xTib3rius
TheColonial: https://twitter.com/TheColonial
Rob Fuller: https://twitter.com/mubix
g0tmi1k: https://twitter.com/g0tmi1k
TJ_Null: https://twitter.com/TJ_Null
Rasta Mouse: https://twitter.com/_RastaMouse
ippsec: https://twitter.com/ippsec
Chema Alonso: https://twitter.com/chemaalonso
FalconSpy: https://twitter.com/0xFalconSpy
0verfl0w: https://twitter.com/0verfl0w_
Markus HΓΆfer: https://twitter.com/HashtagMarkus
Jonas L: https://twitter.com/jonasLyk
Will Dormann: https://twitter.com/wdormann
Scott Piper: https://twitter.com/0xdabbad00
Last updated
Was this helpful?