2023-09-30
网上接单注意

不管什么单子 必须在虚拟机里面跑

不得物理机运行未知应用程序 否则就会出事

Read More

2022-12-07
Useful Sources On Cyber Attack

learning resource and bug bounty

https://www.hacker101.com

https://www.hackerone.com

https://www.hacker101.com/resources

open source virus/malware in your arsenal

powershell obfuscator advanced, will bypass any av

post-exploit framework, evasion

https://github.com/PowerShellMafia/PowerSploit

https://github.com/cobbr/SharpSploit

https://github.com/EmpireProject/Empire

thefatrat is an exploiting tool which compiles a malware with famous payload, and then the compiled maware can be executed on Linux , Windows , Mac and Android. TheFatRat Provides An Easy way to create Backdoors and Payload which can bypass most anti-virus. the author has some tools to share.

pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C

venom - C2 shellcode generator/compiler/handler

virus samples

the malware repo

open source virus

thezoo A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.

malwares codebase, botnet

open source malware on github, repo list

virus for win10

kafan virus samples

vbgood

debugman reverse engineering


official blackhat arsenal under toolswatch category arsenal

massive hacking tools collection

burpa burp suite automation tool

twitter token generator register twitter in batch, has a large proxy list

i0gan some hacker with automated tools like awd_script

ichunqiu ctf educational resources

cyberchief online ctf interactive tools suite

bugku tools

ctftools curated online tool list

ctf online tools

kanxue home page, articles

52pojie hack tools

kanxue knowledge base

ctfshow

ctfhub tools

渗透师导航

resources recommended by ctfwiki

shellcode storm database can be queried via api

exploitdb find exploits, poc code, google hacking database for finding juicy information/urls, shellcodes with an advanced search interface

cracking.org

OSINT: open source (public source) intelligence is the practice of collecting information from published or otherwise publicly available sources

osint tools:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Maltego
Google dorks
Mitaka
SpiderFoot
Spyse
BuiltWith
Intelligence X
DarkSearch.io
Grep.app
Recon-ng
theHarvester
Shodan
Metagoofil
Searchcode
SpiderFoot
Babel X

Read More

2022-12-07
Tools From Breachforums

  1. Invicti

Invicti is a web application security scanner hacking tool to find SQL Injection, XSS, and vulnerabilities in web applications or services automatically.

  1. Fortify WebInspect

It is used to identify security vulnerabilities by allowing it to test the dynamic behavior of running web applications.

  1. Cain & Abel

It is used to recover the MS Access passwords

  1. Nmap (Network Mapper)

Used in port scanning, one of the phases in ethical hacking, is the finest hacking software ever.

  1. Nessus

Nessus is the world’s most well-known vulnerability scanner, which was designed by tenable network security. It is free and is chiefly recommended for non-enterprise usage.

  1. Nikto

Checks web servers and identifies over 6400 CGIs or files that are potentially dangerous

  1. Kismet

Kismet is basically a sniffer and wireless-network detector that works with other wireless cards and supports raw-monitoring mode.

  1. NetStumbler

Identifying AP (Access Point) network configuration

  1. Acunetix

Integration of scanner results into other platforms and tools

  1. Netsparker

Uniquely verifies identified vulnerabilities, showing that they are genuine, not false positives

  1. Intruder

Integrates with Slack, Jira, and major cloud providers

  1. Nmap

Contains a data transfer, redirection, and debugging tool

  1. Metasploit

Ideal for finding security vulnerabilities

  1. Aircrack-Ng

It can crack WEP keys and WPA2-PSK, and check Wi-Fi cards

  1. Wireshark

Allows coloring rules to packet lists to facilitate analysis

  1. OpenVAS

OpenVAS has the capabilities of various high and low-level Internet and industrial protocols, backed up by a robust internal programming language.

  1. SQLMap

Supports executing arbitrary commands

  1. Ettercap

Live connections sniffer

  1. Maltego

Performs real-time information gathering and data mining

  1. Burp Suite

Uses out-of-band techniques

  1. John the Ripper

Tests different encrypted passwords

  1. Angry IP Scanner

This is a free tool for scanning IP addresses and ports

  1. SolarWinds Security Event Manage

Recognized as one of the best SIEM tools, helping you easily manage memory stick storage

  1. Traceroute NG

Detects paths changes and alerts you about them

  1. LiveAction

Its packet intelligence provides deep analyses

  1. QualysGuard

Responds to real-time threats

  1. WebInspect

Tests dynamic behavior of web applications for the purpose of spotting security vulnerabilities

  1. Hashcat

Supports distributed cracking networks

  1. L0phtCrack

Fixes weak passwords issues by forcing a password reset or locking out accounts

  1. Rainbow Crack

  2. IKECrack

IKECrack is an authentication cracking tool with the bonus of being open source.

  1. Sboxr

Checks for over two dozen types of web vulnerabilities

  1. Medusa

One of the best tools for thread-based parallel testing and brute-force testing

  1. Cain and Abel

uncovers password fields, sniffs networks, recovers MS Access passwords, and cracks encrypted passwords using brute-force, dictionary, and cryptanalysis attacks.

  1. Zenmap

Administrators can track new hosts or services that appear on their networks and track existing downed services

Read More

2022-12-05
Ctf Related

Read More

2022-11-29
Hackthebox

这是一个靶场 和一般的CTF不一样 是有真的服务器在里面的

discord chats

alternatives

11 hack the box alternatives

9 alternatives from alternativesto

usage

official website

usage

hackthebox 2022 writeup

hackthebox october

内网靶机渗透

靶场练习

你也可以用metasploitable进行练习

Read More

2022-09-25
日站之随想

为什么要日站

因为自己电脑算力有限 要探索高级人工智能 要运行某些赚钱程序 必须免费白嫖别人的算力

日哪些站

到百度 各大搜索引擎找目标站点 扫描漏洞 不要打大站 先从小站打起走 往全自动化方向打起走

怎么日站

在一个沙箱下面日站 不要在root权限下面日

利用工具 目标站点IP 端口就直接填到工具里面就行 一边学工具一边日站

需要一个repo专门放有关的代码 同时可以同步到每个设备

需要一个可以搜索全文的搜索引擎 搜集我们已有的md文件 提取里面的链接 然后继续clone github的文件 继续搜集md文件 继续寻找链接

日站之后干什么

放传染性病毒 放挖币病毒 或者执行agi实验

Read More