An open API service indexing awesome lists of open source software.

https://github.com/hackthacker/scriptings

Whether it's Python's versatility, Rust's efficiency, Bash's automation power, or JavaScript's dynamic web development, we offers the learning and resources you need to advance your coding skills to a professional level. Learn build
https://github.com/hackthacker/scriptings

Last synced: 6 months ago
JSON representation

Whether it's Python's versatility, Rust's efficiency, Bash's automation power, or JavaScript's dynamic web development, we offers the learning and resources you need to advance your coding skills to a professional level. Learn build

Awesome Lists containing this project

README

          

# Advancing Cybersecurity and Penetration Testing Learning Repository

## Overview

This repository is intended for cybersecurity professionals, penetration testers, and others who want to learn advanced concepts and practical abilities in a variety of programming languages and technologies. It examines Python, Regular Expressions, Bash, Go, PHP, and Rust, offering insights into their use in penetration testing, security automation, exploitation, and incident response.

**Note**: Keep up with the newest security trends, vulnerabilities, and patches by following reputable [Cybersecurity Blog](https://hackthacker.blogspot.com), [GitHub repositories](https://github.com/hackthacker), and security advisories.

## Topics Covered:
1. **[Python for Cybersecurity](#python-for-cybersecurity)**
- [Learn Python](https://github.com/hackThacker/scriptings/blob/main/Python%20basic/Python.md)

2. **[Bash for Security Automation](#bash-for-security-automation)**
- [Learn Bash](https://github.com/hackThacker/scriptings/blob/main/bash%20basic/bash.md)

3. **[Regular Expressions in Security](#regular-expressions-in-security)**
- [Learn Regular Expressions](https://github.com/hackThacker/scriptings/blob/main/Regular%20Expressions/RegularExpressions.md)

4. **[Go for Security](#go-for-secure-applications)**
- [Learn Golang](https://github.com/hackThacker/scriptings/blob/main/golang%20basic/golang.md)

5. **[Javascript for Security](#go-for-secure-applications)**
- [Learn Javascripts](https://github.com/hackThacker/scriptings/blob/main/javascript%20basic/Javascript.md)
---

## Python for Cybersecurity

### Key Topics:
- **Scripting and Automation**: Automate penetration testing, exploit development, and incident response procedures.
- **Web Application Testing**: Scraping and testing websites with Python libraries such as`requests`,`BeautifulSoup`, and`Selenium`.
- **Exploitation**: Use Python to construct custom exploits and payloads for web and network vulnerabilities.

- **Cryptography**: Learn encryption techniques using Python libraries like `PyCrypto` and `cryptography`.
- **Network security**: Libraries like`socket`,`scapy`, and `asyncio` are useful for network scanning, fuzzing, and packet manipulation.

## Practical Applications: Use `nmap` and `os-fingerprint` to automate network scans.
- Creating custom Python-based reverse shells and exploits.
- Creating bespoke vulnerability scanners.

[Python Basics To Advance](https://github.com/hackThacker/scriptings/blob/main/Python%20basic/Python.md)

---

## Bash for Security Automation

### Key Topics:
- **System Administration & Penetration Testing**: Automate daily security checks and penetration tests.
- **File System Security**: Automated file integrity checks, secure file transfer, and permission management.
- **Shell Scripting for Attack**: Create Bash scripts for exploits such as command injection, privilege escalation, and persistence.
- **Network Tools in Bash**: Use Bash tools such as `netcat`, `nc`, `tcpdump`, and `nmap` to execute network security testing.

## Practical Applications: - Create Bash scripts for automated exploitation in CTF or real-world settings.
- Creating a persistent  backdoor with Bash.
- Create payloads for reverse shells.

[Bash basic to Advance](https://github.com/hackThacker/scriptings/blob/main/bash%20basic/bash.md)

---

## Regular Expressions in Security

### Key Topics:
- **Pattern Matching in Security**: The use of regular expressions to detect patterns in logs, network traffic, and user input.
- **Data Exfiltration**: Detecting suspicious data exfiltration or malicious command patterns with regex.
- **Log Analysis**: Using regular expressions to analyze logs for attack vectors such as SQL injection, XSS, and RCE.
- **Regex in Web Application Security**: Validating input to protect against injection threats and cross-site scripting.

### Practical Applications: - Detecting dangerous URLs in logs.
- Finding and exploiting regex weaknesses in programs.
- Using regex to find personally identifiable information (PII) in text.

[Advance Regular Expressions](https://github.com/hackThacker/scriptings/blob/main/Regular%20Expressions/RegularExpressions.md)

---
## Go for Secure Applications

### Key Topics:
- **Go for Secure Coding**: Secure application development and code auditing using Go.
- **Concurrency and Parallelism**: Understanding Go`s concurrency mechanism (goroutines) to create high-performance security tools.
- **Network Security**: Developing bespoke network utilities for penetration testing, such as port scanners and packet sniffers.

- **Go Exploit Development**: Create Go-based exploits, payloads, and reverse shells.

### Useful Applications:
- Developing a bespoke port scanner with Go.
- Creating a Go-based listener to handle reverse shells.
- Creating secure Go apps by leveraging Go`s memory safety mechanisms.

[Expert into Golang](https://github.com/hackThacker/scriptings/blob/main/golang%20basic/golang.md)

---

## JavaScript for Cybersecurity

### Key Topics:
- **Scripting and Automation**: Automate penetration testing, exploit development, and incident response procedures using JavaScript.
- **Web Application Testing**: Scraping and testing websites with JavaScript libraries such as `axios`, `cheerio`, and `puppeteer`.
- **Exploitation**: Use JavaScript to construct custom exploits and payloads for web and network vulnerabilities.

- **Cryptography**: Learn encryption techniques using JavaScript libraries like `crypto-js` and `node-forge`.
- **Network security**: Libraries like `net`, `dgram`, and `ws` are useful for network scanning, fuzzing, and packet manipulation.

## Practical Applications: Use `revershell` to automate network scans.
- Creating custom JavaScript-based reverse shells and exploits.
- Creating bespoke vulnerability scanners.

[javascript for cybersecurity](https://github.com/hackThacker/scriptings/blob/main/javascript%20basic/Javascript.md)

---

## Tools and Resources

- **Python**:

- [Scapy](https://scapy.readthedocs.io/en/latest/) – Powerful packet manipulation and analysis tool.
- [Requests](https://requests.readthedocs.io/en/latest/) – Simplifies HTTP requests for testing and exploitation.
- [PyCrypto](https://www.dlitz.net/software/pycrypto/) – Toolkit for encryption and cryptography.
- [Impacket](https://github.com/SecureAuthCorp/impacket) – Essential library for working with network protocols like SMB, LDAP, and RDP.
- [Pwntools](https://docs.pwntools.com/en/stable/) – Framework for CTF challenges and vulnerability exploitation.
- [Volatility](https://www.volatilityfoundation.org/) – Memory forensics framework for analyzing system images.
- [OpenCV](https://opencv.org/) – Useful for image-based analysis in forensic and cybersecurity research.
- [Cryptography](https://cryptography.io/en/latest/) – Robust cryptographic recipes and primitives.
- [Socket](https://docs.python.org/3/library/socket.html) – Built-in library for low-level networking interfaces.
- [Pandas](https://pandas.pydata.org/) – Data analysis library, useful for handling structured network logs.

- **Bash**:
- [Wireshark](https://www.wireshark.org/) – Network protocol analyzer for troubleshooting.
- [Tcpdump](https://www.tcpdump.org/) – Command-line packet analyzer for capturing network traffic.
- [Traceroute](https://man7.org/linux/man-pages/man8/traceroute.8.html) – Utility for tracing network paths.
- [Hping](http://www.hping.org/) – Packet crafting tool for security testing.
- [Iptables](https://linux.die.net/man/8/iptables) – Firewall and packet filtering tool.

- **Go**:
- [Zap](https://github.com/uber-go/zap) – High-performance logging library for Go.
- [httprouter](https://github.com/julienschmidt/httprouter) – Lightweight HTTP request router and dispatcher.
- [GoPing](https://github.com/go-ping/ping) – Go library for ICMP pinging.
- [GoPacket](https://pkg.go.dev/github.com/google/gopacket) – Packet processing library.
- [TLSScan](https://github.com/RayWangQvQ/TLSScan) – Library for scanning TLS configurations.

- **javascript**:
- [JSFuck](https://www.jsfuck.com/) - This obfuscates JavaScript code, making it harder to reverse-engineer and protect against specific assaults.
- [JSHint](https://jshint.com/) - The static analysis tool detects faults and security weaknesses in JavaScript, such as unused variables and exploitable patterns.

- [Snyk](https://snyk.io/) - The static analysis tool detects faults and security weaknesses in JavaScript, such as unused variables and exploitable patterns.

- [Retire.js](https://retirejs.github.io/) - Retire.js is a tool for detecting the use of vulnerable JavaScript libraries in a web application. It analyzes dependencies and alerts developers about any security vulnerabilities with third-party libraries.

- [Helmet.js](https://helmetjs.github.io/) - Helmet.js is a Node.js middleware that protects Express programs by configuring HTTP headers to avoid vulnerabilities.
## Conclusion:

This repository provides a complete guide to mastering cybersecurity abilities utilizing a variety of programming languages and tools, with a focus on advanced penetration testing, secure coding, and system exploitation techniques. Whether you are automating testing with Python, creating safe applications in Go, or exploiting vulnerabilities in PHP, the tools given will help you improve your skills as a security professional.

---