└── README.md /README.md: -------------------------------------------------------------------------------- 1 | # My Personal Hacking Notes | n4ckhcker 2 | I made this repository to help the new members on this field with my own personal notes! :D 3 | 4 | (Maybe i forgot to add some of my notes but i'll do daily updates!) 5 | 6 | Also you can find my own writeups/tutorials on medium : [n4ckhcker-medium](https://medium.com/@n4ckhcker) 7 | 8 | Table Of Contents : 9 | - Tools 10 | - Cheat Sheets 11 | - Hacking Practise 12 | - Linux Privilege Escalation 13 | - Windows Privilege Escalation 14 | - Active Directory Pentesting 15 | - Programming 16 | - Binary Hacking Tutorials 17 | - Free Paid Courses 18 | - Favorite YouTube Channels 19 | 20 | ### 1. Tools 21 | 22 | Tools | Type 23 | ---- | ---- 24 | [nmap](#) | Enumeration 25 | [metasploit](#) | Exploitation 26 | [searchsploit](#) | Exploitation 27 | [dirbuster](#) | Web Enumeration 28 | [gobuster](#) | Web Enumeration 29 | [dirb](#) | Web Enumeration 30 | [nikto](#) | Web Enumeration 31 | [wpscan](#) | Web Enumeration 32 | [joomscan](#) | Web Enumeration 33 | [droopescan](#) | Web Enumeration 34 | [sqlmap](#) | Web Exploitation 35 | [burp suite](#) | Web Enumeration/Exploitation 36 | [wfuzz](#) | Web Enumeration/Exploitation 37 | [curl](#) | Web Enumeration/Exploitation 38 | [gdb](#) | Reverse Engineering / ExploitDev 39 | [gdb-peda](https://github.com/longld/peda) | Reverse Engineering / ExploitDev 40 | [gdb-gef](https://github.com/hugsy/gef) | Reverse Engineering / ExploitDev 41 | [radare2](#) | Reverse Engineering / ExploitDev 42 | [IDA-Pro](#) | Reverse Engineering / ExploitDev 43 | [OllyDbg](#) | Reverse Engineering / ExploitDev 44 | [pwntools](https://github.com/Gallopsled/pwntools) | Exploitdev Library 45 | [mimikatz](#) | Post Exploitation 46 | [impacket](https://github.com/CoreSecurity/impacket) | Windows Security 47 | [Veil](https://github.com/Veil-Framework/Veil) | AV Bypass 48 | [cewl](#) | Enumeration 49 | [hashcat](#) | Password Cracking 50 | [johntheripper](#) | Password Cracking 51 | [hydra](#) | Password Cracking 52 | [SET](#) | Social Engineering 53 | 54 | ### 2. Cheat Sheets 55 | 56 | Cheat Sheets | Type 57 | ---- | ---- 58 | [nmap - cheat sheet](https://blogs.sans.org/pen-testing/files/2013/10/NmapCheatSheetv1.1.pdf) | Enumeration 59 | [metasploit - cheat sheet](https://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf) | Exploitation 60 | [meterpreter - cheat sheet](https://www.blueliv.com/downloads/Meterpreter_cheat_sheet_v0.1.pdf) | Exploitation 61 | [msfvenom - cheat sheet](https://netsec.ws/?p=331) | Exploitation 62 | [netcat - cheat sheet](https://netsec.ws/?p=292) | Enumeration/Exploitation 63 | [gdb - cheat sheet](http://www.yolinux.com/TUTORIALS/GDB-Commands.html) | Reverse Engineering / ExploitDev 64 | [radare2 - cheat sheet](https://github.com/radare/radare2/blob/master/doc/intro.md) | Reverse Engineering / ExploitDev 65 | [sqlmap - cheat sheet](https://github.com/aramosf/sqlmap-cheatsheet/blob/master/sqlmap%20cheatsheet%20v1.0-SBD.pdf) | Web Explotation 66 | [curl - cheat sheet](https://www.cheatography.com/deleted-18501/cheat-sheets/curl-cheat-sheet/) | Web Enumeration/Exploitation 67 | [TTY Shell - cheat sheet](https://netsec.ws/?p=337) | Exploitation 68 | [Reverse Shell - cheat sheet](http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet) | Exploitation 69 | 70 | ### 3. Hacking Practise 71 | 72 | Site | Description 73 | ---- | ---- 74 | [Vulnhub](https://www.vulnhub.com/) | Vulnerable Machines (Download) 75 | [HackTheBox](http://hackthebox.eu/) | Amazing Penetration Testing Lab (ovpn) 76 | [pwnable.kr](http://pwnable.kr/) | Binary Hacking Challenges + 77 | [pwnable.tw](http://pwnable.tw/) | Binary Hacking Challenges Advance ++ 78 | [webhacking.kr](http://webhacking.kr/) | Web Hacking Challenges 79 | [Reversing.kr](http://reversing.kr/) | Reversing Challenges 80 | [Over The Wire](http://overthewire.org/wargames/) | Different types of wargames (ssh) 81 | [root-me.org](https://www.root-me.org/) | Ton of challenges (web/reverse/system++) 82 | [Ringzer0Team](https://ringzer0team.com/) | Ton of challenges (web/reverse/system++) 83 | [Exploit Exercises](https://exploit-exercises.com/) | Binary hacking/System Challenges 84 | [ROP Emporium](https://ropemporium.com/) | ROP Attack Challenges 85 | [PentesterLab](https://pentesterlab.com/) | Web Hacking Challenges 86 | 87 | ### 4. Linux Privilege Escalation 88 | 89 | Site | Description 90 | ---- | ---- 91 | [g0tmi1k](https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/) | Linux Priv Esc Cheat Sheet 92 | [Rebootuser](https://www.rebootuser.com/?p=1623) | Linux Priv Esc Cheat Sheet 93 | [0x00sec](https://0x00sec.org/t/enumeration-for-linux-privilege-escalation/1959) | Linux Priv Esc Cheat Sheet 94 | [payatu](https://payatu.com/guide-linux-privilege-escalation/) | Linux Priv Esc Cheat Sheet 95 | [touhidshaikh](http://touhidshaikh.com/blog/?p=790) | Abusing SUDO 96 | [n4ckhcker-hadi](https://www.exploit-db.com/docs/english/44592-linux-restricted-shell-bypass-guide.pdf) | rbash bypass 97 | [speakerdeck](https://speakerdeck.com/knaps/escape-from-shellcatraz-breaking-out-of-restricted-unix-shells) | rbash bypass 98 | [sans](https://pen-testing.sans.org/blog/2012/06/06/escaping-restricted-linux-shells) | rbash bypass 99 | [netsec](https://netsec.ws/?p=309) | Linux Priv Esc Scripts 100 | 101 | ### 5. Windows Privilege Escalation 102 | 103 | Site | Description 104 | ---- | ---- 105 | [exumbraops](http://www.exumbraops.com/penetration-testing-102-windows-privilege-escalation-cheatsheet/) | Windows Privilege Escalation Techniques 106 | [pentestblog](https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/) | Windows Privilege Escalation Techniques 107 | [Rahmat Nurfauzi](https://medium.com/@rahmatnurfauzi/windows-privilege-escalation-scripts-techniques-30fa37bd194) | Windows Privilege Escalation Techniques 108 | [FuzzySecurity](http://www.fuzzysecurity.com/tutorials/16.html) | Windows Privilege Escalation Techniques 109 | [HackingArticles](http://www.hackingarticles.in/7-ways-to-privilege-escalation-of-windows-7-pc-bypass-uac/) | Windows Privilege Escalation Techniques 110 | [bhafsec](http://www.bhafsec.com/wiki/index.php/Windows_Privilege_Escalation) | Windows Privilege Escalation Techniques 111 | 112 | ### 6. Active Directory Pentesting 113 | 114 | Site | Description 115 | ---- | ---- 116 | [ADSecurity](https://adsecurity.org/?p=1684) | Common Active Directory Security Issues 117 | [ADSecurity](https://adsecurity.org/?p=2362) | Methods for Gaining Domain Admin Rights 118 | [ADSecurity](https://adsecurity.org/?p=2398) | Dump Active Directory Database Credentials 119 | [ADSecurity](https://adsecurity.org/?p=1929) | Active Directory Persistence Tricks 120 | [ADSecurity](https://adsecurity.org/?p=2293) | Cracking Kerberos TGS Tickets 121 | [ADSecurity](https://adsecurity.org/?p=2207) | Mimikatz Tutorial 122 | [ADSecurity](https://adsecurity.org/?page_id=399) | More Here 123 | 124 | ### 7. Programming 125 | 126 | Language | Description 127 | ---- | ---- 128 | [Python](https://www.youtube.com/watch?v=YYXdXT2l-Gg&list=PL-osiE80TeTt2d9bfVyTiXJA-UTHn6WwU) | Awesome Python Playlist 129 | [Bash Scripting](https://ryanstutorials.net/bash-scripting-tutorial/) | Bash Scripting Tutorials 130 | [Assembly For Hackers](https://www.youtube.com/watch?v=K0g-twyhmQ4&list=PLue5IPmkmZ-P1pDbF3vSQtuNquX0SZHpB) | Assembly For Hackers 131 | [Assembly](https://www.aldeid.com/wiki/Category:Architecture/x86-assembly) | Assembly "Cheat Sheet" 132 | 133 | ### 8. Binary Hacking Tutorials 134 | 135 | Language | Description 136 | ---- | ---- 137 | [dhavalkapil](https://dhavalkapil.com/blogs/Buffer-Overflow-Exploit/) | Buffer Overflow Tutorial 138 | [exploit-db](https://www.exploit-db.com/docs/english/28475-linux-stack-based-buffer-overflows.pdf) | Buffer Overflow Tutorial 139 | [exploit-db](https://www.exploit-db.com/docs/english/28553-linux-classic-return-to-libc-&-return-to-libc-chaining-tutorial.pdf) | Return to libc 140 | [exploit-db](https://www.exploit-db.com/docs/english/28479-return-oriented-programming-(rop-ftw).pdf) | ROP 141 | 142 | ### 9. Free Paid Courses 143 | 144 | Site | Description 145 | ---- | ---- 146 | [Pentester Academy](https://mega.nz/#F!czhiBKwB!wC2f_IaMEMOWq9cSieTo_A) | Pentester Academy Courses 147 | [Sans](https://mega.nz/#F!ZZYRlTYb!YjFuu6oR0LEHRZD03aoUdg) | Sans Courses 148 | [More Here](https://0x00sec.org/t/knowledge-is-free/6270) | More Courses 149 | 150 | ### 10. Favorite Youtube Channels 151 | 152 | Channel | Description 153 | ---- | ---- 154 | [LiveOverflow](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w) | Binary Hacking/Web ++ 155 | [ippsec](https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA) | HackTheBox Writeups ++ 156 | --------------------------------------------------------------------------------