Repository to index interesting Capture The Flag tools and other stuff.
- Table of Contents
https://atenea.ccn-cert.cni.es/home
-
Web Hacking challenges: http://webhacking.kr/
-
Platform for learning modern cryptography: https://cryptohack.org/
-
Reversing platform: https://crackmes.one/
-
Forensics Challenges: https://ctf.unizar.es/ && https://freetraining.dfirdiva.com/dfir-ctfs-challenges && https://socvel.com/
-
PicoCTF: https://play.picoctf.org/login
-
Blue team: https://letsdefend.io/
https://gchq.github.io/CyberChef/
https://www.dcode.fr/tools-list#cryptography
-
Cipher Identifier and Analyzer: https://www.boxentriq.com/code-breaking/cipher-identifier
-
Data format identifier: https://geocaching.dennistreysa.de/multisolver/
-
Automated cryptogram solver (substitution) https://quipqiup.com/
-
Frequency Analysis: https://crypto.interactive-maths.com/frequency-analysis-breaking-the-code.html
-
Brute force Vigenere: https://guballa.de/vigenere-solver
-
RsaCtfTool: https://github.com/Ganapati/RsaCtfTool
-
Decrpyt emoji messages https://cryptoji.com/ & https://cryptii.com/pipes/morse-code-with-emojis
-
Padding-oracle-attacker: https://github.com/KishanBagaria/padding-oracle-attacker
-
Maritime signal flags dictionary: https://en.wikipedia.org/wiki/International_maritime_signal_flags
-
Enigma: https://cryptii.com/
-
Factoring: http://factordb.com/
-
Cryptanalysis recopilation: https://github.com/mindcrypt/Cryptanalysis
http://rumkin.com/tools/cipher/
-
Real time converter: https://kt.gy/tools.html#conv/
-
Simple script to calculate the onion address from a Tor hidden service descriptor or public key: https://gist.github.com/DonnchaC/d6428881f451097f329e (you need to modify the line 14 for working properly "onion_address = hashlib.sha1(key.exportKey('DER')[22:]).digest()[:10]").
-
Speech to text: https://speech-to-text-demo.ng.bluemix.net/
-
Lyrics song: https://codewithrockstar.com/online
-
Online generator md5 hash of a string: http://www.md5.cz/
-
Hash DB: https://crackstation.net/
-
Dehashed: https://www.dehashed.com/
-
Cracking Hashes: http://rainbowtables.it64.com/
-
Hash DB: https://www.onlinehashcrack.com/
-
Hash DB: https://md5decrypt.net/en/
-
Hash DB: https://hashkiller.io/
-
Hash DB: https://hashes.com/en/decrypt/hash
-
Ook! esoteric programming language decoder: https://www.dcode.fr/ook-language
-
Brainfuck esoteric programming language decoder: https://www.dcode.fr/brainfuck-language
-
Malboge esoteric programming language decoder: https://www.malbolge.doleczek.pl/
-
COW esoteric programming language: https://frank-buss.de/cow.html
-
Exiftool
-
Zsteg
-
Exiv2
-
Identify -verbose file
-
Magic Numbers Signatures: https://asecuritysite.com/forensics/magic && https://www.garykessler.net/library/file_sigs.html → Hexeditor
-
Shellcode detection: "8B EC"
-
Binwalk -e image
-
Foremost -i image -o outdir
-
Steghide: http://steghide.sourceforge.net/documentation/manpage_es.php (e.g: steghide extract -sf file , steghide info file)
-
Stegseek: https://github.com/RickdeJager/stegseek (Better than Stegcracker)
-
StegCracker: https://github.com/Paradoxis/StegCracker
-
Deeper steganography analysis tool: https://aperisolve.fr/
-
Spectrum Analyzer: https://academo.org/demos/spectrum-analyzer/
-
Stegsolve: https://github.com/zardus/ctf-tools/blob/master/stegsolve/install (running: java -jar steg_solve.jar)
-
Fourier Transform: http://bigwww.epfl.ch/demo/ip/demos/FFT/ && https://github.com/0xcomposure/FFTStegPic
-
Digital invisible ink stego tool: https://sourceforge.net/projects/diit/
-
Decoding files from 8-bit Atari turbo cassette tapes: https://github.com/baktragh/turbodecoder
https://incoherency.co.uk/image-steganography/#unhide
https://stegonline.georgeom.net/upload
https://stylesuxx.github.io/steganography/
https://skynettools.com/free-online-steganography-tools/
-
Morse Code Adaptive Audio Decoder: https://morsecode.world/international/decoder/audio-decoder-adaptive.html
-
Audacity (sudo apt-get install audacity) E.g: https://www.hackiit.cf/write-up-hackiit-ctf-biological-hazard-ii/
-
AudioStego: https://github.com/danielcardeenas/AudioStego
-
Analyze suspicious files and urls to detect stegomalware: https://stegoinspector.com/#/
-
Aurebesh Translator: https://funtranslations.com/aurebesh
-
Bitcoin Steganography: https://incoherency.co.uk/stegoseed/
-
Mojibake Steganography: https://incoherency.co.uk/mojibake/
-
Chess Steganography : https://incoherency.co.uk/chess-steg/
-
Magic Eye Solver / Viewer: https://magiceye.ecksdee.co.uk/
-
QR decoder: https://online-barcode-reader.inliteresearch.com/ && https://zxing.org/w/decode.jspx
-
Stegosuite: http://manpages.ubuntu.com/manpages/bionic/man1/stegosuite.1.html
-
StegSecret: http://stegsecret.sourceforge.net/
-
Openstego: https://www.openstego.com/
-
Stegpic: https://domnit.org/stepic/doc/
-
Bytehist: https://www.cert.at/en/downloads/software/software-bytehist
https://www.bertnase.de/npiet/npiet-execute.php
-
Repair images: https://online.officerecovery.com/es/pixrecovery/
-
Tool for recovering passwords from pixelized screenshots: https://github.com/beurtschipper/Depix
-
Forensic Image Analysis: https://github.com/GuidoBartoli/sherloq
-
Unicode Steganography with Zero-Width Characters: https://330k.github.io/misc_tools/unicode_steganography.html
-
Stegsnow(Zero-Width Characters): https://pentesttools.net/hide-secret-messages-in-text-using-stegsnow-zero-width-characters/
-
SPAM language or PGP: https://www.spammimic.com/decode.shtml
-
f5stegojs: https://desudesutalk.github.io/f5stegojs/
-
Unshorten links: https://unshorten.it/
-
PNG dump: https://blog.didierstevens.com/2022/04/18/new-tool-pngdump-py-beta/
- Ip information: https://www.maxmind.com/en/geoip-demo
https://sitereport.netcraft.com/? && https://searchdns.netcraft.com/
-
GHDB (Google Hacking Database): https://www.exploit-db.com/google-hacking-database
-
Google CheatSheet: https://gist.github.com/sundowndev/283efaddbcf896ab405488330d1bbc06
https://ciberpatrulla.com/links/
-
Tools, flowcharts and cheatsheets to help you do your OSINT research: https://technisette.com/p/tools
-
Recopilation: https://osint.link/
-
World domain DB: http://web.archive.org/ && https://archive.eu/
-
DNS Search: https://dns.coffee/
-
Cyber Defense Search: https://www.onyphe.io/
-
Abuse Domain,IP: https://www.abuseipdb.com/
https://www.brightcloud.com/tools/url-ip-lookup.php
-
Reputation url checker: https://www.urlvoid.com/
-
The search engine for the Internet of Things: https://www.shodan.io/ && All filters cheatseet: https://beta.shodan.io/search/filters
-
IVRE: https://ivre.rocks/
-
Threat Intel Tools: https://cyberfive.uk/threat-intel-tools/
https://talosintelligence.com/
-
PGP Global Directory: https://keyserver2.pgp.com/vkd/GetWelcomeScreen.event
-
Hurricane Electric BGP: https://bgp.he.net/
-
Email2PhoneNumber: https://github.com/martinvigo/email2phonenumber
-
Honeypot or not: https://honeyscore.shodan.io/
-
Pwn email DB TOR: http://pwndb2am4tzkvold.onion/
-
Website to check if emails or passwords have been compromised: https://haveibeenpwned.com/
-
Leaks: https://leaks.sh/
-
Pwn email DB: https://intelx.io/
-
Pwn email DB: https://cybernews.com/personal-data-leak-check/
-
PwnDB Script: https://github.com/davidtavarez/pwndb
-
Search filtered credentials in plain text: https://esgeeks.com/pwndb-buscar-credenciales-filtradas-texto-plano/
-
Email checker: https://toolbox.googleapps.com/apps/checkmx/
-
Car Recognition: https://carnet.ai/
-
Hour of a picture, sun calculator: https://www.suncalc.org/#/27.6936,-97.5195,3/2024.01.09/09:23/1/3
-
General purpose: https://github.com/Moham3dRiahi/Th3inspector
-
Gooogle Image Search: https://www.google.es/imghp?hl=es , Yandex: https://yandex.com/images/ , Bing: https://www.bing.com/?scope=images&nr=1&FORM=NOFORM
-
Reverse Image Search: https://tineye.com/
-
Tool for tracking the redirection paths of URLs: https://wheregoes.com/
-
Phishing Domain DB: http://phishtank.org/
-
Phishing Domain DB: https://phishcheck.me/
-
Phishing Research: https://safeweb.norton.com/ , https://isitphishing.org/, https://openphish.com/ && https://opentip.kaspersky.com/.
-
Instagram: https://github.com/th3unkn0n/osi.ig
-
Censys: https://censys.io/ipv4
-
Zoomeye.org: https://www.zoomeye.org/
-
IVRE: https://ivre.rocks/
-
IOT search engine: https://www.thingful.net/
-
Find email addresses related to a domain: https://hunter.io/
-
People search engine: https://thatsthem.com/
-
Fofa search engine: https://fofa.so/ (Similar to Shodan)
-
Graphical OSINT platform: https://www.spiderfoot.net/#
-
Fullhunt: https://fullhunt.io/
-
Code search: https://grep.app/ && https://publicwww.com/
-
Natlas: https://natlas.io/
-
Spur: https://spur.us/
-
Public Wi-Fi database: https://www.mylnikov.org/
-
HTTP headers of a domain: https://www.webconfs.com/http-header-check.php
-
Metadata of public's documents: https://github.com/Josue87/MetaFinder
-
Twitter: https://github.com/twintproject/twint && https://tinfoleak.com/
-
Check your OWA (Outlook Web Access): https://checkmyowa.unit221b.com/
-
Whatspp IP Leak: https://github.com/bhdresh/Whatsapp-IP-leak?s=09
-
Book: https://i-intelligence.eu/uploads/public-documents/OSINT_Handbook_2020.pdf
Analysis I: https://centralops.net/co/
Analaysis II: https://viewdns.info/
Analysis III: https://sitereport.netcraft.com/
Analysis IV: https://www.ipaddress.com/
Malware: https://www.virustotal.com/gui/home/upload & https://opentip.kaspersky.com/
Reputation: https://talosintelligence.com/, https://www.abuseipdb.com/
Technology of a domain: https://builtwith.com/
Tool for tracking the redirection paths of URLs: https://wheregoes.com/
History of a Domain: https://web.archive.org/
Real-time blackhole list,ASNs: https://bgp.he.net/
SSL certificates: https://www.digicert.com/help/
Redirects: https://lookyloo.circl.lu/
Phishing Domain DB: http://phishtank.org/
Phishing Domain DB: https://phishcheck.me/
Phishing Domains CSV: https://phishstats.info/
Phishing Research: https://safeweb.norton.com/ , https://isitphishing.org/, https://openphish.com/ && https://opentip.kaspersky.com/.
Recopilation: https://osintframework.com/
Email account analysis: curl emailrep.io/john.smith@gmail.com
-
Online PCAP Analysis: https://lab.dynamite.ai/
-
Tool to identify strings from a pcap: https://github.com/bee-san/pyWhat. Ex:python3 -m pywhat redteam_test03-10423dd9015c050a40b7ccf2a53f57a9.pcapng > output
-
Advanced PCAP: https://www.kitploit.com/2023/08/bryobio-network-pcap-file-analysis.html
-
Wireshark. Cheat sheet: https://cdn.comparitech.com/wp-content/uploads/2019/06/Wireshark-Cheat-Sheet-1.jpg
-
Volatility. Cheat sheet: https://blog.onfvp.com/post/volatility-cheatsheet/ >>> Malfind,yarascan, Connscan y netscan
-
Foremost
-
Binwalk
-
Autopsy
-
PhotoRec: https://www.cgsecurity.org/wiki/PhotoRec
-
Photo forensics: https://29a.ch/photo-forensics/#forensic-magnifier
-
Recuva: https://www.ccleaner.com/recuva
-
Keys: https://www.nirsoft.net/utils/product_cd_key_viewer.html
-
DDRescue. https://launchpad.net/ddrescue-gui
-
Rescuezilla: https://rescuezilla.com/
-
PolarProxy: https://www.netresec.com/?page=PolarProxy
-
MRC: https://www.magnetforensics.com/resources/magnet-ram-capture/
-
Media acquisition (disk to image): https://guymager.sourceforge.io/
-
Rapidly Search and Hunt through Windows Event Logs: https://github.com/countercept/chainsaw
-
AccessData FTK Imager
-
EnCase
-
EaseUS Data Recovery Wizard
-
MFT_Browser: https://github.com/kacos2000/MFT_Browser
-
Powershell Decoder: https://github.com/R3MRUM/PSDecode, https://github.com/JohnLaTwC/PyPowerShellXray and analysis info: https://darungrim.com/research/2019-10-01-analyzing-powershell-threats-using-powershell-debugging.html
-
PDF analyzer: https://github.com/zbetcheckin/PDF_analysis, https://github.com/DidierStevens/DidierStevensSuite/blob/master/pdfid.py, https://github.com/DidierStevens/DidierStevensSuite/blob/master/pdf-parser.py y https://eternal-todo.com/tools/peepdf-pdf-analysis-tool.
-
Office analyzer: https://github.com/DissectMalware/XLMMacroDeobfuscator, https://github.com/unixfreak0037/officeparser, https://github.com/decalage2/oletools, https://github.com/bontchev/pcodedmp, https://github.com/decalage2/ViperMonkey && https://blog.didierstevens.com/programs/oledump-py/.
-
Extract Unicode-encoded content from a file: https://github.com/DidierStevens/DidierStevensSuite/blob/master/base64dump.py
-
DTMF telephone frecuency: https://unframework.github.io/dtmf-detect/
-
To decrypt WPA keys: pyrit -r "capctura.pcap" analyze
-
Diskeditor: https://www.disk-editor.org/index.html
-
Passware encryption analyzer: https://www.passware.com/encryption-analyzer/
-
Windows Registry Recovery: https://www.softpedia.com/get/Tweak/Registry-Tweak/Windows-Registry-Recovery.shtml
-
xxd command
-
Blue Team Cheat sheet: https://itblogr.com/wp-content/uploads/2020/04/The-Concise-Blue-Team-cheat-Sheets.pdf
-
DFIR cheat sheet: https://www.jaiminton.com/cheatsheet/DFIR/#
-
Parse a user agent: https://developers.whatismybrowser.com/useragents/parse/
-
Grep cheat sheet: https://javiermartinalonso.github.io/linux/2018/01/15/linux-grep-patrones-debug.html
-
Blog: https://www.osintme.com/
-
Regular expressions for grep -Po " " https://www.autoregex.xyz/ && https://regex101.com/ . Cheat sheet: https://cheatography.com/davechild/cheat-sheets/regular-expressions/
-
DFIR Cheatsheet: https://dfircheatsheet.github.io/
https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/
https://blog.didierstevens.com/programs/xorsearch/
Forensics RECOPILATION: https://start.me/p/JDRmPO/recursos-forenses && https://start.me/p/q6mw4Q/forensics
-
Binwalk
-
Dotpeek (.NET)
-
Angr(deobfuscated code): https://angr.io/ && https://napongizero.github.io/blog/Defeating-Code-Obfuscation-with-Angr
-
GameBoy debugger: https://bgb.bircd.org/
-
IDA pro. Cheat Sheet: https://www.dragonjar.org/cheat-sheet-ida-pro-interactive-disassembler.xhtml
-
Ollydbg. Cheat Sheet: http://www.ollydbg.de/quickst.htm
-
GDB: https://gist.github.com/rkubik/b96c23bd8ed58333de37f2b8cd052c30
-
Radare2. Cheat Sheet: https://gist.github.com/williballenthin/6857590dab3e2a6559d7
-
Ghidra. Cheat Sheet: https://hackersfun.com/wp-content/uploads/2019/03/Ghidra-Cheat-Sheet.pdf
-
Immunity Debugger: https://www.immunityinc.com/products/debugger/
-
x64dbg
-
Binary Ninja: https://binary.ninja/
-
Beginner reversing tool: https://exeinfo-pe.en.uptodown.com/windows
-
Regshot: https://sourceforge.net/projects/regshot/ (before and after running a binary)
-
CFF explorer: https://download.cnet.com/CFF-Explorer/3000-2383_4-10431156.html
-
Online Disassembler: https://onlinedisassembler.com/static/home/index.html
-
Online Decompiler Explorer: https://dogbolt.org/
-
Online Compiler Explorer: https://godbolt.org/
-
Online .JAR and .Class to Java decompiler: http://www.javadecompilers.com/
-
Hex editor, disk editor, and memory editor: https://mh-nexus.de/en/downloads.php?product=HxD20
-
Android Decompiler: https://ibotpeaches.github.io/Apktool/
-
Decompile Android files: https://github.com/skylot/jadx
-
Hopper disassembler: https://www.hopperapp.com/
-
List Dynamic Dependencies: Ldd file
-
Unpacking some binaries: Upx -d file
-
Identifying packers: https://github.com/horsicq/Detect-It-Easy
-
Intel® 64 and IA-32 Architectures Software Developer’s Manual: https://www.intel.com/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-instruction-set-reference-manual-325383.pdf
-
Tips: https://blog.whtaguy.com/2020/04/guys-30-reverse-engineering-tips-tricks.html
- Ej1: python -c "print 'A'*150" >>> Then ./binario 150 A
python -c "print ('A' * 5100)"
- Ej2: (echo -e "\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x89\xc1\x89\xc2\xb0\x0b\xcd\x80\x31\xc0\x40\xcd\x80"; cat-) | ./binario (Shellcode for x86 32 linux)
Common ports cheatsheet: https://packetlife.net/media/library/23/common_ports.pdf
Enumeration cheatsheet: https://pentestwiki.org/enumeration-cheat-sheet/
-
Nmap. Cheatsheet: https://highon.coffee/blog/nmap-cheat-sheet/ && https://scadahacker.com/library/Documents/Cheat_Sheets/Hacking%20-%20NMap%20Quick%20Reference%20Guide.pdf
-
S.O recon: "version of a service https://launchpad.net/"
-
GUI-DNSRecon: https://www.kitploit.com/2023/02/dnsrecon-gui-dnsrecon-tool-with-gui-for.html
-
enum4linux - https://highon.coffee/blog/enum4linux-cheat-sheet/
Dig: https://cheatography.com/tme520/cheat-sheets/dig/
wget -nd -r -P /save/location -A jpeg,jpg,bmp,gif,png http://www.somedomain.com
Recursive file download bypassing robots.txt: wget -e robots=off -drc -l5 domain
-
Scanning with third parties: https://hackertarget.com/nmap-online-port-scanner/, https://www.ipfingerprints.com/, https://spiderip.com/online-port-scan.php, https://portscanner.standingtech.com/ && https://www.yougetsignal.com/tools/open-ports/
-
Scanless project: https://github.com/vesche/scanless
-
List emails from a domain: https://maildump.co/domain-search
-
List domains of a company: Curl https://sonar.omnisint.io/tlds/
-
SPF,DKIM,DMARC: https://github.com/MattKeeley/Spoofy & https://www.kitploit.com/2023/02/email-vulnerablity-checker-find-email.html & https://github.com/magichk/magicspoofing && https://toolbox.googleapps.com/apps/checkmx/
-
Company hashes & passwords: https://www.dehashed.com/
-
dnsrecon -d dte.local -n IP - https://pentestlab.blog/2012/11/13/dns-reconnaissance-dnsrecon/
-
Biggest DNS historical data: https://securitytrails.com/
-
DNS Host Records: https://hackertarget.com/find-dns-host-records/
-
HTTP Header Analysis Vulnerability Tool: https://dnsdumpster.com/
-
ReconFTW: https://github.com/six2dez/reconftw
-
Autorecon: https://github.com/Tib3rius/AutoRecon
-
OSINT gathering tool: https://github.com/s0md3v/Photon
-
OSINT gathering tool: https://github.com/laramies/theHarvester
-
DNS resolver: https://github.com/d3mondev/puredns
-
Sublist3r: https://github.com/aboul3la/Sublist3r
-
Expired domains: https://www.expireddomains.net/
-
Wappalyzer
-
whatweb -v -a 3 scanme.nmap.org
-
nmap -p 80 --script=http-*
-
HTTP Header Analysis Vulnerability Tool: https://github.com/Aetsu/gethead/blob/gh-pages/gethead.py
-
Feroxbuster
-
Gobuster. Cheat Sheet: https://redteamtutorials.com/2018/11/19/gobuster-cheatsheet/
-
Burpsuite
-
OWASP ZAP, OpenVas, Sparta & Nikto. Cheat Sheet: https://cdn.comparitech.com/wp-content/uploads/2019/07/NIkto-Cheat-Sheet.webp
-
Hydra. Cheat Sheet: hydra -l admin -P /usr/share/wordlists/rockyou.txt IP http-post-form “__csrf_magic=sid%3Ae40fd9611063464c3ff346ffa53b7a28b3cd5971%2C1638348501&usernamefld=admin&passwordfld=^PASS^&login=Sign+In" || patator http_fuzz url=http://IP/ method=POST &usernamefld=admin&passwordfld=FILE0&login=Sign+In' 0=/usr/share/wordlists/rockyou.txt follow=1 accept_cookie=1 -x ignore:fgrep='Username or Password incorrect'
-
hydra -s 22 -l user -P /usr/share/wordlists/rockyou.txt IP -t 4 ssh
-
wfuzz. Cheat Sheet: https://book.hacktricks.xyz/pentesting-web/web-tool-wfuzz
-
2FA Bypass: https://www.xmind.net/m/8Hkymg/
-
Linkfinder: https://github.com/GerbenJavado/LinkFinder
-
Dirsearch: https://github.com/maurosoria/dirsearch
-
Automated All-in-One OS command injection and exploitation tool: https://github.com/commixproject/commix
-
Automated XSS tool: https://xsser.03c8.net/
-
Automated XSS tool: https://github.com/ssl/ezXSS
-
RECOX: https://github.com/samhaxr/recox/blob/master/recox.sh
-
SQL payload examples: https://github.com/payloadbox/sql-injection-payload-list
-
Command injection: https://github.com/payloadbox/command-injection-payload-list
-
XSS in 2021: https://netsec.expert/posts/xss-in-2021/
-
SSRF Cheatsheet: https://highon.coffee/blog/ssrf-cheat-sheet/#curl-ssrf-wrappers--url-schema
-
WPscan
-
XSS firefox extension searcher: https://addons.mozilla.org/es/firefox/addon/knoxss-community-edition/
-
Inspect HTTP headers: https://requestbin.net/ && https://webhook.site/#!/75039a57-2015-4f74-9612-b762f4353b9b && https://securityheaders.com/?q=aguasdelsorbe.es&followRedirects=on
https://pentest-tools.com/home
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE
https://jorgectf.gitbook.io/awae-oswe-preparation-resources/
-
CVE Search: https://github.com/Anonimo501/cve_search
-
SearchSploit. Cheat sheet: https://blog.ehcgroup.io/2018/11/27/01/00/39/4198/como-usar-searchsploit-para-encontrar-exploits/hacking/ehacking/
docker run -v /:/mnt --rm -it imagen chroot /mnt sh
- Default credentials: https://github.com/ihebski/DefaultCreds-cheat-sheet/blob/main/DefaultCreds-Cheat-Sheet.csv
-
Online reverse shell generator: https://www.revshells.com/
-
Reverse shell cheatsheet: https://reconshell.com/reverse-shell-cheat-sheet/ && Cheatsheet: https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md
-
Webshells: https://github.com/BlackArch/webshells
-
Popshells: https://github.com/0x00-0x00/ShellPop
-
Upgrading Simple Shells to Fully Interactive TTYs: https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/
-
crackmapexec - https://cheatsheet.haax.fr/windows-systems/exploitation/crackmapexec/
-
Rundll32 commands examples: https://www.jesusninoc.com/04/12/rundll32-commands-for-windows/
-
rdesktop IP, proxychains IP
-
sqlmap - https://www.security-sleuth.com/sleuth-blog/2017/1/3/sqlmap-cheat-sheet
-
Reverse shell payload generator - Hoaxshell: https://github.com/t3l3machus/hoaxshell
-
Running commands on an Microsoft Exchange: https://github.com/WithSecureLabs/peas
-
Powerglot: https://github.com/mindcrypt/powerglot
-
Network Scanner: https://www.softperfect.com/products/networkscanner/
-
linWinPwn: https://github.com/lefayjey/linWinPwn
-
Mimikatz: https://book.hacktricks.xyz/windows-hardening/stealing-credentials/credentials-mimikatz
-
Crackmapexec: https://cheatsheet.haax.fr/windows-systems/exploitation/crackmapexec/
-
LDAP enumeration: https://pentestwiki.org/enumeration-cheat-sheet/#h-ldap-enumeration
-
Seatbelt check: https://github.com/GhostPack/Seatbelt
-
Bloodhound: https://bloodhound.readthedocs.io/en/latest/index.html
-
Adalanche: https://www.kitploit.com/2021/08/adalanche-active-directory-acl.html
sudo apt install peass
-
WinPEAS: https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS
-
Juicy potato: https://github.com/ohpe/juicy-potato
-
PowerUp: https://github.com/PowerShellMafia/PowerSploit/blob/dev/Privesc/PowerUp.ps1
-
LinPEAS: https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS
-
LinEnum: https://github.com/rebootuser/LinEnum/blob/master/LinEnum.sh
-
BeRoot: https://github.com/AlessandroZ/BeRoot/tree/master/Linux
-
Lolbas from Windows: https://lolbas-project.github.io/
-
GTFOBins from Unix Systems: https://gtfobins.github.io/
-
Bypass Windows defender with binaries: https://github.com/Bl4ckM1rror/FUD-UUID-Shellcode
-
Shikata ga nai: https://github.com/EgeBalci/sgn
-
AV'S evasion: https://github.com/Veil-Framework/Veil-Evasion
-
Shellter: https://www.kali.org/tools/shellter/
-
Metasploit. Cheatsheet: https://github.com/k1000o23/cheat_sheets/blob/master/metasploit_cheat_sheet.pdf
-
Fsociety framework: https://github.com/Manisso/fsociety
-
Empire. Cheatsheet: https://github.com/HarmJ0y/CheatSheets/blob/master/Empire.pdf
-
Mobile Pentest Cheatsheet: https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet && https://github.com/randorisec/MobileHackingCheatSheet
-
Automated Mobile tools: https://github.com/MobSF/Mobile-Security-Framework-MobSF, https://github.com/SUPERAndroidAnalyzer/super
-
List of Vulnerable Android Applications: https://github.com/netbiosX/Pentest-Bookmarks/blob/master/Training-Labs/Mobile-Testing/Android-Applications.mdown
-
PcapDroid: https://play.google.com/store/apps/details?id=com.emanuelef.remote_capture&hl=es_419&gl=US
-
Fing application: https://www.fing.com/
-
Wifi analyzer: https://play.google.com/store/apps/details?id=com.farproc.wifi.analyzer&hl=es&gl=US&pli=1
-
Auditing Wifi: https://github.com/v1s1t0r1sh3r3/airgeddon
-
Wifi Crack: https://github.com/s4vitar/wifiCrack
-
EvilTrust: https://github.com/s4vitar/evilTrust
-
RomBuster: https://github.com/EntySec/RomBuster
Yersinia
Bettercap
Wifi Pineapple
https://linuxhint.com/how_to_aircrack_ng/
- PCAP capture crack: https://www.onlinehashcrack.com/
-
mount -t cifs IP/SharedResource /mnt/smbmounted -o vers=2.1 && * smbclient -U "" -N //IP/SharedResource
-
dpkg -l to list all the installed programs in a virtual machine. Pipe the output in order to search what you want.
-
Msfvenom: https://www.offensive-security.com/metasploit-unleashed/msfvenom/ & https://www.offensive-security.com/metasploit-unleashed/binary-payloads/
-
Are u block?: https://ippsec.rocks/?#
-
OSCP-style: https://gist.github.com/s4vitar/b88fefd5d9fbbdcc5f30729f7e06826e
-
Pentest-book: https://pentestbook.six2dez.com/ && https://book.hacktricks.xyz/pentesting-methodology
-
Virustotal: https://www.virustotal.com/gui/home/search
-
Online Cuckoo Sandbox: https://sandbox.pikker.ee/
-
APK's: https://mobsf.live/ && https://koodous.com/
-
Joesandbox: https://www.joesandbox.com/#windows
-
Kaspersky: https://opentip.kaspersky.com/
-
Intezer: https://analyze.intezer.com/scan
-
Hybrid Analysis: https://www.hybrid-analysis.com/?lang=es
-
Database of counterfeit-related webs: https://desenmascara.me/
-
ANY.RUN https://any.run/
- Polyswarm: https://polyswarm.network
https://metadefender.opswat.com/?lang=en
-
Linux Distro to investigate malware: https://docs.remnux.org/
-
Windows Distro to investigate malware: https://github.com/mandiant/flare-vm
-
https://github.com/LaurieWired/linux_malware_analysis_container
-
Sysinternals: https://docs.microsoft.com/en-us/sysinternals/
-
Systeminformer: https://systeminformer.sourceforge.io/
-
Detect it easy(packer detector): https://en.kali.tools/?p=1644
-
Sysinspector: https://support.eset.com/es/que-es-eset-sysinspector
-
Dependency walker from an executable file: https://www.dependencywalker.com/
-
Autoruns: https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns
-
RAM capturer: https://belkasoft.com/ram-capturer
-
Recopilation: https://github.com/rshipp/awesome-malware-analysis
-
Reverse Engineer's Toolkit: https://github.com/mentebinaria/retoolkit
-
PEstudio: https://www.winitor.com/
-
Malzilla: https://malzilla.org/
-
PROCMON+PCAP: https://www.procdot.com/
-
Analyze APK's: https://github.com/quark-engine/quark-engine && https://github.com/mvt-project/mvt && https://github.com/pjlantz/droidbox
-
XORSearch: https://blog.didierstevens.com/programs/xorsearch/
-
RAT Decoder: https://github.com/kevthehermit/RATDecoders
-
Malwoverview: https://github.com/alexandreborges/malwoverview
-
Binary strings defuser: https://github.com/fireeye/flare-floss
-
Network analysis of malware (emulate HTTP server): https://github.com/felixweyne/imaginaryC2
-
This tool allows you to intercept and redirect all or specific network traffic while simulating legitimate network services: https://github.com/mandiant/flare-fakenet-ng
-
DragonFly: https://dragonfly.certego.net/register
-
Offline Sandbox: https://sandboxie-plus.com/downloads/
-
Ransomware decryption tools: http://files-download.avg.com/util/avgrem/avg_decryptor_Legion.exe, https://success.trendmicro.com/solution/1114221-downloading-and-using-the-trend-micro-ransomware-file-decryptor, https://www.nomoreransom.org/es/decryption-tools.htmlm, https://www.avast.com/es-es/ransomware-decryption-tools , https://noransom.kaspersky.com/ , https://www.mcafee.com/enterprise/es-es/downloads/free-tools/ransomware-decryption.html, https://www.mcafee.com/enterprise/en-us/downloads/free-tools.html, https://www.emsisoft.com/ransomware-decryption-tools/, https://decoded.avast.io/threatresearch/decrypted-bianlian-ransomware/.
-
General Overview: https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml#
-
Ransomware groups: http://edteebo2w2bvwewbjb5wgwxksuwqutbg3lk34ln7jpf3obhy4cvkbuqd.onion/
- Intelligence: https://docs.google.com/spreadsheets/d/1H9_xaxQHpWaa4O_Son4Gx0YOIzlcBWMsdvePFX68EKU/pubhtml# && https://github.com/StrangerealIntel/EternalLiberty/blob/main/EternalLiberty.csv && https://xorl.wordpress.com/
Are you an APT target? -> https://lab52.io/
- APT Simulator: https://github.com/NextronSystems/APTSimulator
-
Macros: https://blog.didierstevens.com/2021/01/19/video-maldoc-analysis-with-cyberchef/ && https://blog.nviso.eu/2022/04/06/analyzing-a-multilayer-maldoc-a-beginners-guide/
-
Malware examples/binaries: https://bazaar.abuse.ch/, https://github.com/ytisf/theZoo & https://malshare.com/
-
To bypass some filtered ports: nmap -sSV ...
-
zip2john backup.zip secret.hash
-
john --show secret.hash
-
Hexeditor
-
nc -nlvp URL port
-
Grep
-
rgrep (Recursive grep)
-
awk
-
perl
-
tail / head
-
curl -Llv domain | curl -b "protected=d41d8cd98f00b204e9800998ecf8427e"(cookie) "domain"
-
Identify -verbose
-
Hash-identifier
-
cat 'file' | md5sum, sha1sum,sha256sum...
-
echo "string" | base64 -d
-
Strings
-
File
-
Cewl. Cheat sheet: https://null-byte.wonderhowto.com/how-to/hack-like-pro-crack-passwords-part-5-creating-custom-wordlist-with-cewl-0158855/
-
Password Recovery Online : https://www.lostmypass.com/try/
-
Passwords stored in a computer: https://github.com/AlessandroZ/LaZagne
-
Disk Image: https://www.datanumen.com/disk-image-download-thanks/
-
crackzip: https://github.com/Xpykerz/CrackZip
-
zip2john: https://github.com/openwall/john/blob/bleeding-jumbo/src/zip2john.c
-
Common User Passwords Profiler: https://github.com/Mebus/cupp y https://github.com/r3nt0n/bopscrk.
-
wget -nd -r -P /save/location -A jpeg,jpg,bmp,gif,png http://www.somedomain.com
-
Recursive file download bypassing robots.txt: wget -e robots=off -drc -l5 domain
-
[ICMP exfiltration] tshark -r 1pcap_test_1c.pcapng -Y "icmp" -Tjson | grep data.data | awk {'print $2'} | cut -c 2-3 | uniq | xxd -r -p
-
Oneliners: https://linuxcommandlibrary.com/basic/oneliners.html
https://github.com/JohnHammond/ctf-katana
https://github.com/OpenToAllCTF/Tips
Reversing tutorial: https://github.com/mytechnotalent/Reverse-Engineering-Tutorial
https://apsdehal.in/awesome-ctf/
https://github.com/0e85dc6eaf/CTF-Writeups
https://github.com/RazviOverflow/ctfs
https://github.com/DEKRA-CTF/CTFs/tree/main/2020
https://medium.com/bugbountywriteup/tryhackme-reversing-elf-writeup-6fd006704148
https://github.com/W3rni0/ctf_writeups_archive/tree/master/castorsCTF_2020