sexta-feira, 16 de junho de 2023

Conteúdos para área de Cibersegurança 👀

Offensive Security Guide.

--> General/Basic Exploitation 

http://www.pentest-standard.org/index.php/Main_Page 

https://www.offensive-security.com/metasploit-unleashed/ 

http://null-byte.wonderhowto.com/how-to/metasploit-basics/ 

https://www.owasp.org/index.php/Main_Page 

https://github.com/nixawk/pentest-wiki 

https://github.com/beefproject/beef 

https://portswigger.net/burp/ 

https://www.metasploit.com/ 

http://exploitpack.com/ 

https://github.com/commixproject/commix 

https://github.com/reverse-shell/routersploit 

--> Distros 

https://www.kali.org/ 

https://www.blackarch.org/ 

https://www.parrotsec.org/ 

--> Vulnscanner/Sniffer/Tools/Web Exploitation 

http://www.askapache.com/security/computer-security-toolbox-2/#common_security_programs 

https://pastebin.com/kP04r4PM 

http://www.irongeek.com/i.php?page=backtrack-r1-man-pages/netdiscover 

http://www.tenable.com/products/nessus-vulnerability-scanner 

https://www.rapid7.com/products/nexpose/ 

https://cirt.net/nikto2 

https://nmap.org/ 

https://github.com/netsniff-ng/netsniff-ng 

https://www.wireshark.org/ 

https://github.com/fwaeytens/dnsenum/ 

https://github.com/makefu/dnsmap/ 

http://www.tcpdump.org/ 

http://sqlmap.org/ 

https://www.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project 

https://wpscan.org/ 

http://networksecuritytoolkit.org/nst/index.html 

https://github.com/droope/droopescan 

https://github.com/andresriancho/w3af 

https://www.netsparker.com/ 

--> Password Cracker 

http://www.openwall.com/john/ 

http://hashcat.net/hashcat/ 

--> Online Tools 

http://crackstation.net 

http://www.tcpiputils.com/ 

https://shodan.io 

--> Exploits (Exploit/Vulnerability Databases) 

https://exploit-db.com/ 

http://kernel-exploits.com 

https://github.com/PenturaLabs/Linux_Exploit_Suggester 

https://nvd.nist.gov/ 

https://www.us-cert.gov/ 

https://blog.osvdb.org/ 

http://www.securityfocus.com/ 

http://seclists.org/fulldisclosure/ 

https://technet.microsoft.com/en-us/security/bulletins 

https://technet.microsoft.com/en-us/security/advisories 

https://packetstormsecurity.com/ 

http://www.securiteam.com/ 

http://cxsecurity.com/ 

https://www.vulnerability-lab.com/   

--> Payloads/Reverse Shells 

https://www.veil-framework.com/framework/veil-evasion/ 

http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet 

https://highon.coffee/blog/reverse-shell-cheat-sheet/ 

--> Info/Blogs/Techniques/etc 

http://wiki.bash-hackers.org/scripting/style 

https://www.corelan.be/index.php/articles/ 

https://www.veracode.com/security/xss 

http://www.thegeekstuff.com/2012/02/xss-attack-examples/ 

https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/ 

https://thehackernews.com/ 

http://securityidiots.com/Web-Pentest/SQL-Injection/Basic-Union-Based-SQL-Injection.html 

https://www.idontplaydarts.com/2011/02/using-php-filter-for-local-file-inclusion/ 

https://hakin9.org/voip-hacking-techniques/

Nenhum comentário:

Postar um comentário

Postagens mais visitadas

Postagem em destaque

Algumas comunidades de Cibersegurança

BSides San Francisco CCC – Confidential Computing Consortium CForum CIS – Center for Internet Security CompTIA CREST CSA – Cloud Security Al...