The response has been limited to 50k tokens of the smallest files in the repo. You can remove this limitation by removing the max tokens filter.
├── CODE_OF_CONDUCT.md
├── CONTRIBUTING.md
├── LICENSE
├── README.md
└── awesome_security_gists.jpg


/CODE_OF_CONDUCT.md:
--------------------------------------------------------------------------------
 1 | # Code of Conduct
 2 | 
 3 | ## 1. Purpose
 4 | 
 5 | A primary goal of Awesome Security Gists is to be inclusive to the largest number of contributors, with the most varied and diverse backgrounds possible. As such, we are committed to providing a friendly, safe and welcoming environment for all, regardless of gender, sexual orientation, ability, ethnicity, socioeconomic status, and religion (or lack thereof).
 6 | 
 7 | This code of conduct outlines our expectations for all those who participate in our community, as well as the consequences for unacceptable behavior.
 8 | 
 9 | We invite all those who participate in Awesome Security Gists to help us create safe and positive experiences for everyone.
10 | 
11 | ## 2. Open Source Citizenship
12 | 
13 | A supplemental goal of this Code of Conduct is to increase open source citizenship by encouraging participants to recognize and strengthen the relationships between our actions and their effects on our community.
14 | 
15 | Communities mirror the societies in which they exist and positive action is essential to counteract the many forms of inequality and abuses of power that exist in society.
16 | 
17 | If you see someone who is making an extra effort to ensure our community is welcoming, friendly, and encourages all participants to contribute to the fullest extent, we want to know.
18 | 
19 | ## 3. Expected Behavior
20 | 
21 | The following behaviors are expected and requested of all community members:
22 | 
23 | *   Participate in an authentic and active way. In doing so, you contribute to the health and longevity of this community.
24 | *   Exercise consideration and respect in your speech and actions.
25 | *   Attempt collaboration before conflict.
26 | *   Refrain from demeaning, discriminatory, or harassing behavior and speech.
27 | *   Be mindful of your surroundings and of your fellow participants. Alert community leaders if you notice a dangerous situation, someone in distress, or violations of this Code of Conduct, even if they seem inconsequential.
28 | *   Remember that community event venues may be shared with members of the public; please be respectful to all patrons of these locations.
29 | 
30 | ## 4. Unacceptable Behavior
31 | 
32 | The following behaviors are considered harassment and are unacceptable within our community:
33 | 
34 | *   Violence, threats of violence or violent language directed against another person.
35 | *   Sexist, racist, homophobic, transphobic, ableist or otherwise discriminatory jokes and language.
36 | *   Posting or displaying sexually explicit or violent material.
37 | *   Posting or threatening to post other people’s personally identifying information ("doxing").
38 | *   Personal insults, particularly those related to gender, sexual orientation, race, religion, or disability.
39 | *   Inappropriate photography or recording.
40 | *   Inappropriate physical contact. You should have someone’s consent before touching them.
41 | *   Unwelcome sexual attention. This includes, sexualized comments or jokes; inappropriate touching, groping, and unwelcomed sexual advances.
42 | *   Deliberate intimidation, stalking or following (online or in person).
43 | *   Advocating for, or encouraging, any of the above behavior.
44 | *   Sustained disruption of community events, including talks and presentations.
45 | 
46 | ## 5. Consequences of Unacceptable Behavior
47 | 
48 | Unacceptable behavior from any community member, including sponsors and those with decision-making authority, will not be tolerated.
49 | 
50 | Anyone asked to stop unacceptable behavior is expected to comply immediately.
51 | 
52 | If a community member engages in unacceptable behavior, the community organizers may take any action they deem appropriate, up to and including a temporary ban or permanent expulsion from the community without warning (and without refund in the case of a paid event).
53 | 
54 | ## 6. Reporting Guidelines
55 | 
56 | If you are subject to or witness unacceptable behavior, or have any other concerns, please notify a community organizer as soon as possible. hackwithgithub@gmail.com.
57 | 
58 | 
59 | 
60 | Additionally, community organizers are available to help community members engage with local law enforcement or to otherwise help those experiencing unacceptable behavior feel safe. In the context of in-person events, organizers will also provide escorts as desired by the person experiencing distress.
61 | 
62 | ## 7. Addressing Grievances
63 | 
64 | If you feel you have been falsely or unfairly accused of violating this Code of Conduct, you should notify Hack With GitHub with a concise description of your grievance. Your grievance will be handled in accordance with our existing governing policies.
65 | 
66 | 
67 | 
68 | ## 8. Scope
69 | 
70 | We expect all community participants (contributors, paid or otherwise; sponsors; and other guests) to abide by this Code of Conduct in all community venues–online and in-person–as well as in all one-on-one communications pertaining to community business.
71 | 
72 | This code of conduct and its related procedures also applies to unacceptable behavior occurring outside the scope of community activities when such behavior has the potential to adversely affect the safety and well-being of community members.
73 | 
74 | ## 9. Contact info
75 | 
76 | hackwithgithub@gmail.com
77 | 
78 | ## 10. License and attribution
79 | 
80 | This Code of Conduct is distributed under a [Creative Commons Attribution-ShareAlike license](http://creativecommons.org/licenses/by-sa/3.0/).
81 | 
82 | Portions of text derived from the [Django Code of Conduct](https://www.djangoproject.com/conduct/) and the [Geek Feminism Anti-Harassment Policy](http://geekfeminism.wikia.com/wiki/Conference_anti-harassment/Policy).
83 | 
84 | Retrieved on November 22, 2016 from [http://citizencodeofconduct.org/](http://citizencodeofconduct.org/)
85 | 


--------------------------------------------------------------------------------
/CONTRIBUTING.md:
--------------------------------------------------------------------------------
 1 | # Contribution Guidelines
 2 | 
 3 | Please follow the instructions below to make a contribution.
 4 | 
 5 | This resource was made by the developers and hackers alike! We appreciate and recognize all [contributors](#contributors).
 6 | 
 7 | ## Table of Content
 8 | 
 9 | - [Adding to the list](#adding-to-the-list)
10 | - [To remove from the list](#to-remove-from-the-list)
11 | - [Contributors](#contributors)
12 | 
13 | ## Adding to the List
14 | 
15 | - Please add the content to the `README.md` file and make sure that the edited list is in alphabetical order.
16 | - Submit a pull request.
17 | 
18 | ## Removing from the List
19 | 
20 | - If you have any issues accessing any of the resources listed here, please let us know.
21 | 
22 | ## Contributors
23 | 
24 | - [Chandrapal](https://github.com/Chan9390)
25 | - [Yakup Ateş](https://github.com/y-ates)
26 | - [Derick Thomson](https://www.facebook.com/derick.thomson) (Image)
27 | 


--------------------------------------------------------------------------------
/LICENSE:
--------------------------------------------------------------------------------
  1 | CC0 1.0 Universal
  2 | 
  3 | Statement of Purpose
  4 | 
  5 | The laws of most jurisdictions throughout the world automatically confer
  6 | exclusive Copyright and Related Rights (defined below) upon the creator and
  7 | subsequent owner(s) (each and all, an "owner") of an original work of
  8 | authorship and/or a database (each, a "Work").
  9 | 
 10 | Certain owners wish to permanently relinquish those rights to a Work for the
 11 | purpose of contributing to a commons of creative, cultural and scientific
 12 | works ("Commons") that the public can reliably and without fear of later
 13 | claims of infringement build upon, modify, incorporate in other works, reuse
 14 | and redistribute as freely as possible in any form whatsoever and for any
 15 | purposes, including without limitation commercial purposes. These owners may
 16 | contribute to the Commons to promote the ideal of a free culture and the
 17 | further production of creative, cultural and scientific works, or to gain
 18 | reputation or greater distribution for their Work in part through the use and
 19 | efforts of others.
 20 | 
 21 | For these and/or other purposes and motivations, and without any expectation
 22 | of additional consideration or compensation, the person associating CC0 with a
 23 | Work (the "Affirmer"), to the extent that he or she is an owner of Copyright
 24 | and Related Rights in the Work, voluntarily elects to apply CC0 to the Work
 25 | and publicly distribute the Work under its terms, with knowledge of his or her
 26 | Copyright and Related Rights in the Work and the meaning and intended legal
 27 | effect of CC0 on those rights.
 28 | 
 29 | 1. Copyright and Related Rights. A Work made available under CC0 may be
 30 | protected by copyright and related or neighboring rights ("Copyright and
 31 | Related Rights"). Copyright and Related Rights include, but are not limited
 32 | to, the following:
 33 | 
 34 |   i. the right to reproduce, adapt, distribute, perform, display, communicate,
 35 |   and translate a Work;
 36 | 
 37 |   ii. moral rights retained by the original author(s) and/or performer(s);
 38 | 
 39 |   iii. publicity and privacy rights pertaining to a person's image or likeness
 40 |   depicted in a Work;
 41 | 
 42 |   iv. rights protecting against unfair competition in regards to a Work,
 43 |   subject to the limitations in paragraph 4(a), below;
 44 | 
 45 |   v. rights protecting the extraction, dissemination, use and reuse of data in
 46 |   a Work;
 47 | 
 48 |   vi. database rights (such as those arising under Directive 96/9/EC of the
 49 |   European Parliament and of the Council of 11 March 1996 on the legal
 50 |   protection of databases, and under any national implementation thereof,
 51 |   including any amended or successor version of such directive); and
 52 | 
 53 |   vii. other similar, equivalent or corresponding rights throughout the world
 54 |   based on applicable law or treaty, and any national implementations thereof.
 55 | 
 56 | 2. Waiver. To the greatest extent permitted by, but not in contravention of,
 57 | applicable law, Affirmer hereby overtly, fully, permanently, irrevocably and
 58 | unconditionally waives, abandons, and surrenders all of Affirmer's Copyright
 59 | and Related Rights and associated claims and causes of action, whether now
 60 | known or unknown (including existing as well as future claims and causes of
 61 | action), in the Work (i) in all territories worldwide, (ii) for the maximum
 62 | duration provided by applicable law or treaty (including future time
 63 | extensions), (iii) in any current or future medium and for any number of
 64 | copies, and (iv) for any purpose whatsoever, including without limitation
 65 | commercial, advertising or promotional purposes (the "Waiver"). Affirmer makes
 66 | the Waiver for the benefit of each member of the public at large and to the
 67 | detriment of Affirmer's heirs and successors, fully intending that such Waiver
 68 | shall not be subject to revocation, rescission, cancellation, termination, or
 69 | any other legal or equitable action to disrupt the quiet enjoyment of the Work
 70 | by the public as contemplated by Affirmer's express Statement of Purpose.
 71 | 
 72 | 3. Public License Fallback. Should any part of the Waiver for any reason be
 73 | judged legally invalid or ineffective under applicable law, then the Waiver
 74 | shall be preserved to the maximum extent permitted taking into account
 75 | Affirmer's express Statement of Purpose. In addition, to the extent the Waiver
 76 | is so judged Affirmer hereby grants to each affected person a royalty-free,
 77 | non transferable, non sublicensable, non exclusive, irrevocable and
 78 | unconditional license to exercise Affirmer's Copyright and Related Rights in
 79 | the Work (i) in all territories worldwide, (ii) for the maximum duration
 80 | provided by applicable law or treaty (including future time extensions), (iii)
 81 | in any current or future medium and for any number of copies, and (iv) for any
 82 | purpose whatsoever, including without limitation commercial, advertising or
 83 | promotional purposes (the "License"). The License shall be deemed effective as
 84 | of the date CC0 was applied by Affirmer to the Work. Should any part of the
 85 | License for any reason be judged legally invalid or ineffective under
 86 | applicable law, such partial invalidity or ineffectiveness shall not
 87 | invalidate the remainder of the License, and in such case Affirmer hereby
 88 | affirms that he or she will not (i) exercise any of his or her remaining
 89 | Copyright and Related Rights in the Work or (ii) assert any associated claims
 90 | and causes of action with respect to the Work, in either case contrary to
 91 | Affirmer's express Statement of Purpose.
 92 | 
 93 | 4. Limitations and Disclaimers.
 94 | 
 95 |   a. No trademark or patent rights held by Affirmer are waived, abandoned,
 96 |   surrendered, licensed or otherwise affected by this document.
 97 | 
 98 |   b. Affirmer offers the Work as-is and makes no representations or warranties
 99 |   of any kind concerning the Work, express, implied, statutory or otherwise,
100 |   including without limitation warranties of title, merchantability, fitness
101 |   for a particular purpose, non infringement, or the absence of latent or
102 |   other defects, accuracy, or the present or absence of errors, whether or not
103 |   discoverable, all to the greatest extent permissible under applicable law.
104 | 
105 |   c. Affirmer disclaims responsibility for clearing rights of other persons
106 |   that may apply to the Work or any use thereof, including without limitation
107 |   any person's Copyright and Related Rights in the Work. Further, Affirmer
108 |   disclaims responsibility for obtaining any necessary consents, permissions
109 |   or other rights required for any use of the Work.
110 | 
111 |   d. Affirmer understands and acknowledges that Creative Commons is not a
112 |   party to this document and has no duty or obligation with respect to this
113 |   CC0 or use of the Work.
114 | 
115 | For more information, please see
116 | <http://creativecommons.org/publicdomain/zero/1.0/>
117 | 


--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
 1 | ![Awesome Security Gists](awesome_security_gists.jpg)
 2 | 
 3 | ## Awesome Security Gists [![Tweet](https://img.shields.io/twitter/url/http/shields.io.svg?style=social)](https://twitter.com/intent/tweet?text=Discover%20the%20list%20of%20Awesome%20Security%20Gists%20by%20@HackwithGithub&url=https://github.com/Hack-with-Github/Awesome-Security-Gists&hashtags=security,hacking)
 4 | 
 5 | ### Explanation
 6 | 
 7 | - [**HowTo: Privacy & Security Conscious Browsing**](https://gist.github.com/atcuno/3425484ac5cce5298932) : Recommendations on how to browse in a privacy and security conscious manner
 8 | - [**Petya**](https://gist.github.com/vulnersCom/65fe44d27d29d7a5de4c176baba45759) : Petya fact sheet
 9 | - [**WannaCry**](https://gist.github.com/rain-1/989428fa5504f378b993ee6efbc0b168) : WannaCry fact sheet
10 | - [**WebSockets**](https://gist.github.com/subudeepak/9897212) : An introduction to Web Sockets
11 | 
12 | ### Payloads
13 | 
14 | - [**XXE Payloads**](https://gist.github.com/staaldraad/01415b990939494879b4) : Collection of XXE payloads
15 | 
16 | ### Pentest
17 | 
18 | - [**GitHub for Bug Bounty Hunters**](https://gist.github.com/EdOverflow/922549f610b258f459b219a32f92d10b) : Tips for finding security issues in GitHub projects
19 | - [**Proposal: Node.js penetration test framework**](https://gist.github.com/jesusprubio/8f092af4ca252e252eab) : Has a good collection of WebApp (NodeJS) pentesting tools in comments
20 | 
21 | ### Misc
22 | 
23 | - [**EQGroup**](https://gist.github.com/bontchev/e5d2e5090ebe1be89b4f821ebb1ad0f9) : Curated list of links describing the leaked Equation Group tools for Windows
24 | - [**GoogleHackMasterList.txt**](https://gist.github.com/cmartinbaughman/5877945) : The definitive super list for "Google Hacking"
25 | - [**InfoSec Newbie**](https://gist.github.com/mubix/5737a066c8845d25721ec4bf3139fd31) : Collection of resources on how to start in InfoSec
26 | - [**Most VPN Services are Terrible**](https://gist.github.com/kennwhite/1f3bc4d889b02b35d8aa) : Collection of terrible VPN services which are *not recommended*
27 | 


--------------------------------------------------------------------------------
/awesome_security_gists.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Hack-with-Github/Awesome-Security-Gists/68c82f69b72f44e592df782bfc15e7c6af60786c/awesome_security_gists.jpg


--------------------------------------------------------------------------------