Mastering the Skills of Bug Bounty
https://medium.com/swlh/mastering-the-skills-of-bug-bounty-2201eb6a9f4
From Recon to Optimizing RCE Results
https://medium.com/bugbountywriteup/from-recon-to-optimizing-rce-results-simple-story-with-one-of-the-biggest-ict-company-in-the-ea710bca487a
Exploiting WebSocket
https://medium.com/@osamaavvan/exploiting-websocket-application-wide-xss-csrf-66e9e2ac8dfa
Top 10 Operating Systems for Ethical Hackers
https://medium.com/the-lotus-fruit/top-10-operating-systems-for-ethical-hackers-and-penetration-testers-2020-list-b523b611cdbb
#BugBounty
https://medium.com/swlh/mastering-the-skills-of-bug-bounty-2201eb6a9f4
From Recon to Optimizing RCE Results
https://medium.com/bugbountywriteup/from-recon-to-optimizing-rce-results-simple-story-with-one-of-the-biggest-ict-company-in-the-ea710bca487a
Exploiting WebSocket
https://medium.com/@osamaavvan/exploiting-websocket-application-wide-xss-csrf-66e9e2ac8dfa
Top 10 Operating Systems for Ethical Hackers
https://medium.com/the-lotus-fruit/top-10-operating-systems-for-ethical-hackers-and-penetration-testers-2020-list-b523b611cdbb
#BugBounty
Medium
Mastering the Skills of Bug Bounty
Your syllabus for going from newbie to top hacker
#PentestTools
Osmedeus
https://github.com/j3ssie/Osmedeus
lscript
https://github.com/arismelachroinos/lscript
Raccoon
https://github.com/evyatarmeged/Raccoon
xssor2
https://github.com/evilcos/xssor2
SSRF-Testing
https://github.com/cujanovic/SSRF-Testing
EggShell
https://github.com/neoneggplant/EggShell
dirmap
https://github.com/H4ckForJob/dirmap
#bugbounty,#CyberSecurity
Osmedeus
https://github.com/j3ssie/Osmedeus
lscript
https://github.com/arismelachroinos/lscript
Raccoon
https://github.com/evyatarmeged/Raccoon
xssor2
https://github.com/evilcos/xssor2
SSRF-Testing
https://github.com/cujanovic/SSRF-Testing
EggShell
https://github.com/neoneggplant/EggShell
dirmap
https://github.com/H4ckForJob/dirmap
#bugbounty,#CyberSecurity
GitHub
GitHub - j3ssie/osmedeus: A Workflow Engine for Offensive Security
A Workflow Engine for Offensive Security. Contribute to j3ssie/osmedeus development by creating an account on GitHub.
For pentesting, Add this to your .bashrc file:
PS1='[
test "$(ps -ocommand= -p $PPID | awk '{print $1}')" == 'script' || (script -f $HOME/logs/$(date +"%d-%b-%y_%H-%M-%S")_shell.log)
Now you can have a log of everything you did and when you did it.
PS1='[
date +"%d-%b-%y %T"
] > ' test "$(ps -ocommand= -p $PPID | awk '{print $1}')" == 'script' || (script -f $HOME/logs/$(date +"%d-%b-%y_%H-%M-%S")_shell.log)
Now you can have a log of everything you did and when you did it.
A step-by-step Linux Kernel exploitation (4 part series)
https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part1.html
https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part2.html
https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part3.html
https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part4.html
https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part1.html
https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part2.html
https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part3.html
https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part4.html
Hacking SQL Server Stored Procedures
1: (un)Trustworthy Databases
https://blog.netspi.com/hacking-sql-server-stored-procedures-part-1-untrustworthy-databases/
2: User Impersonation
https://blog.netspi.com/hacking-sql-server-stored-procedures-part-2-user-impersonation/
3: SQL Injection
https://blog.netspi.com/hacking-sql-server-stored-procedures-part-3-sqli-and-user-impersonation/
4: Enumerating Domain Accounts
https://blog.netspi.com/hacking-sql-server-procedures-part-4-enumerating-domain-accounts/
#infosec #pentest #redteam
1: (un)Trustworthy Databases
https://blog.netspi.com/hacking-sql-server-stored-procedures-part-1-untrustworthy-databases/
2: User Impersonation
https://blog.netspi.com/hacking-sql-server-stored-procedures-part-2-user-impersonation/
3: SQL Injection
https://blog.netspi.com/hacking-sql-server-stored-procedures-part-3-sqli-and-user-impersonation/
4: Enumerating Domain Accounts
https://blog.netspi.com/hacking-sql-server-procedures-part-4-enumerating-domain-accounts/
#infosec #pentest #redteam
NetSPI
Hacking SQL Server Stored Procedures – Part 1: (un)Trustworthy Databases
In this blog I’ll show how database users commonly created for web applications can be used to escalate privileges in SQL Server when database ownership is poorly configured.
CSV Injection: http://ghostlulz.com/csv-injection/
ClickJacking: http://ghostlulz.com/clickjacking/
Exposed Firebase DB: http://ghostlulz.com/google-exposed-firebase-database/
Config Files: http://ghostlulz.com/exposed-log-and-configuration-files/
Kubernetes API : http://ghostlulz.com/exposed-kubernetes-api/
#bugbounty #bugbountytips #bugbountytip #redteam #pentest #infosec #xss
ClickJacking: http://ghostlulz.com/clickjacking/
Exposed Firebase DB: http://ghostlulz.com/google-exposed-firebase-database/
Config Files: http://ghostlulz.com/exposed-log-and-configuration-files/
Kubernetes API : http://ghostlulz.com/exposed-kubernetes-api/
#bugbounty #bugbountytips #bugbountytip #redteam #pentest #infosec #xss
Ghostlulz
CSV Injection - Ghostlulz
How to use CSV injection AKA Formula injection to embed a malicous payload into to spread sheet.
#PostExploitation
Pentesting_Toolkit
https://github.com/bt3gl/Pentesting_Toolkit
pupy
https://github.com/n1nj4sec/pupy
fsociety
https://github.com/Manisso/fsociety
hacker-roadmap
https://github.com/sundowndev/hacker-roadmap
mimipenguin
https://github.com/huntergregal/mimipenguin
merlin
https://github.com/Ne0nd0g/merlin
EvilOSX
https://github.com/Marten4n6/EvilOSX
#bugbountytips
Pentesting_Toolkit
https://github.com/bt3gl/Pentesting_Toolkit
pupy
https://github.com/n1nj4sec/pupy
fsociety
https://github.com/Manisso/fsociety
hacker-roadmap
https://github.com/sundowndev/hacker-roadmap
mimipenguin
https://github.com/huntergregal/mimipenguin
merlin
https://github.com/Ne0nd0g/merlin
EvilOSX
https://github.com/Marten4n6/EvilOSX
#bugbountytips
GitHub
GitHub - bt3gl-labs/Pentesting-Toolkit: 🏴☠️ Tools for pentesting, CTFs & wargames. - 𝚋𝚢 𝚋𝚝𝟹𝚐𝚕
🏴☠️ Tools for pentesting, CTFs & wargames. - 𝚋𝚢 𝚋𝚝𝟹𝚐𝚕 - GitHub - bt3gl-labs/Pentesting-Toolkit: 🏴☠️ Tools for pentesting, CTFs & wargames. - 𝚋𝚢 𝚋𝚝𝟹𝚐𝚕