Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/fazledyn/30-days-of-pentest
https://github.com/fazledyn/30-days-of-pentest
Last synced: 9 days ago
JSON representation
- Host: GitHub
- URL: https://github.com/fazledyn/30-days-of-pentest
- Owner: fazledyn
- Created: 2023-05-04T15:02:56.000Z (over 1 year ago)
- Default Branch: master
- Last Pushed: 2023-05-04T15:09:05.000Z (over 1 year ago)
- Last Synced: 2024-11-12T09:26:39.843Z (2 months ago)
- Size: 0 Bytes
- Stars: 1
- Watchers: 1
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# 30 Days of Pentest
Day 1) Try Hack Me Room Owasp top 10
https://tryhackme.com/room/owasptop10
Day 2) Try Hack Me Room Owasp Juice Shop
https://tryhackme.com/room/owaspjuiceshop
Day 3) Try Hack Me Room Windows Fundamentals
https://tryhackme.com/room/windowsfundamentals1xbx
https://tryhackme.com/room/winadbasicsDay 4) Information Disclosure Portswigger Academy
https://portswigger.net/web-security/information-disclosure/exploiting/lab-infoleak-in-error-messages
https://portswigger.net/web-security/information-disclosure/exploiting/lab-infoleak-in-version-control-history
https://portswigger.net/web-security/information-disclosure/exploiting/lab-infoleak-authentication-bypassDay 5) XSS Portswigger Academy
https://portswigger.net/web-security/cross-site-scripting/reflected/lab-html-context-nothing-encoded
https://portswigger.net/web-security/cross-site-scripting/stored/lab-html-context-nothing-encoded
https://portswigger.net/web-security/cross-site-scripting/dom-based/lab-document-write-sink
https://portswigger.net/web-security/cross-site-scripting/dom-based/lab-jquery-href-attribute-sinkDay 6) Mr r3b0t Vulnhub
https://www.vulnhub.com/entry/bizarre-adventure-mrr3b0t,561/
Day 7) Try Hack Me Room Active Directory Attack
https://tryhackme.com/room/breachingad
Day 8) XXE Portswigger Academy
https://portswigger.net/web-security/xxe/lab-exploiting-xxe-to-retrieve-files
https://portswigger.net/web-security/xxe/lab-exploiting-xxe-to-perform-ssrf
https://portswigger.net/web-security/xxe/lab-xxe-via-file-uploadDay 9) SSRF Portswigger Academy
https://portswigger.net/web-security/ssrf/lab-basic-ssrf-against-backend-system
https://portswigger.net/web-security/ssrf/lab-basic-ssrf-against-localhost
https://portswigger.net/web-security/ssrf/lab-ssrf-filter-bypass-via-open-redirectionDay 10) Rickdiculouslyeasy Vulnhub
https://www.vulnhub.com/entry/rickdiculouslyeasy-1,207/
Day 11) Stickyfingers Vulnhub
https://www.vulnhub.com/entry/bizarre-adventure-sticky-fingers,560/
Day 12) Kioptrix Level 1.3 Vulnhub
https://www.vulnhub.com/entry/kioptrix-level-13-4,25/
Day 13) Bellatrix Vulnhub
https://www.vulnhub.com/entry/hogwarts-bellatrix,609/
Day 14) Try Hack Me Room Buffer Overflow Prep
https://tryhackme.com/room/bufferoverflowprep
Day 15) OS Command Injection Portswigger Academy
https://portswigger.net/web-security/server-side-template-injection/exploiting/lab-server-sidetemplate-injection-basic
https://portswigger.net/web-security/os-command-injection/lab-simple
https://portswigger.net/web-security/os-command-injection/lab-blind-time-delaysDay 16) File Upload Vulnerabilities Portswigger Academy
https://portswigger.net/web-security/file-upload/lab-file-upload-remote-code-execution-via-web-shell-upload
https://portswigger.net/web-security/file-upload/lab-file-upload-web-shell-upload-via-content-type-restriction-bypass
https://portswigger.net/web-security/file-upload/lab-file-upload-web-shell-upload-via-race-conditionDay 17) Busqueda Hack The Box
https://app.hackthebox.com/machines/Busqueda
Day 18) JWT Portswigger Academy
https://portswigger.net/web-security/jwt/lab-jwt-authentication-bypass-via-unverified-signature
https://portswigger.net/web-security/jwt/lab-jwt-authentication-bypass-via-flawed-signature-verification
https://portswigger.net/web-security/jwt/lab-jwt-authentication-bypass-via-weak-signing-key
https://portswigger.net/web-security/jwt/lab-jwt-authentication-bypass-via-jwk-header-injection
https://portswigger.net/web-security/jwt/lab-jwt-authentication-bypass-via-jku-header-injection
https://portswigger.net/web-security/jwt/lab-jwt-authentication-bypass-via-kid-header-path-traversal
https://portswigger.net/web-security/jwt/algorithm-confusion/lab-jwt-authentication-bypass-via-algorithm-confusionDay 19) Cat Mobile Hack The Box
https://app.hackthebox.com/challenges/cat
Day 20) SuperMarket Hack The Box
https://app.hackthebox.com/challenges/supermarket
Day 21) Joker Hack The Box
https://app.hackthebox.com/challenges/joker
Day 22) Seattle Lab Buffer Overflow
https://ys2k-iwnl.medium.com/buffer-overflow-exploiting-seattle-lab-mail-slmail-61b1f659c8dc
https://github.com/CyberSecurityUP/Buffer-Overflow-LabsDay 23) OnlyforYou Hack The Box
https://app.hackthebox.com/machines/OnlyForYou
Day 24) Escape Hack The Box
https://app.hackthebox.com/machines/Escape
Day 25) Insecure Deserialization Portswigger Academy
https://portswigger.net/web-security/deserialization/exploiting/lab-deserialization-modifying-serialized-data-types
https://portswigger.net/web-security/deserialization/exploiting/lab-deserialization-using-application-functionality-to-exploit-insecure-deserialization
https://portswigger.net/web-security/deserialization/exploiting/lab-deserialization-arbitrary-object-injection-in-php
https://portswigger.net/web-security/deserialization/exploiting/lab-deserialization-developing-a-custom-gadget-chain-for-java-deserializationDay 26) Djinn3 Proving Ground Lab
https://portal.offsec.com/
Day 27) InsanityHosting Proving Ground Lab
https://portal.offsec.com/
Day 28) Flight Hack The Box
https://app.hackthebox.com/machines/Flight
Day 29) Absolute Hack The Box
https://app.hackthebox.com/machines/Absolute
Day 30) Joestar Vulnhub
https://www.vulnhub.com/entry/bizarre-adventure-joestar,590/
```
"Sometimes I draw some things or play some vouchers, sometimes it's to help, sometimes it's for me to feel good and useful with myself"
My LinkedIn: https://www.linkedin.com/in/joas-antonio-dos-santos
```