An open API service indexing awesome lists of open source software.

https://github.com/rbourgeat/h4ck3r


https://github.com/rbourgeat/h4ck3r

Last synced: 6 months ago
JSON representation

Awesome Lists containing this project

README

          

# h4ck3r

## Scan Tools

### nmap

Options:

- `-sV`: Service Version Detection

- `-sC`: Script Scan

- `-sS`: TCP SYN Scan

```bash
# common ports:
nmap

# all ports:
nmap -p-
```

### massscan

```bash
masscan -p1-65535,U:1-65535 --rate=1000 -e tun0
```

### gobuster

```bash
gobuster dir -u -w /usr/share/dirbuster/wordlists/ -x <.ext>
```

### dirsearch

```bash
dirsearch -u
```

## Exploit Tools

### Metasploit

```bash
msfconsole
```

## Passwords Tools

### hashcat

```bash
hashcat -a 0 -m 3200 hash.txt /usr/share/wordlists/rockyou.txt.gz
```

## Network Tools

### [chisel](https://github.com/jpillora/chisel)

```bash
# Server:
./chisel server -p 1234 --reverse
# Client:
./chisel client :1234 R::127.0.0.1:
```

## Scripts

- [linpeas.sh](https://github.com/carlospolop/PEASS-ng/tree/master/linPEAS): Linux Privilege Escalation Awesome Script

- [FullPowers](https://github.com/itm4n/FullPowers): Windows - Recover the default privilege set of a LOCAL/NETWORK SERVICE account

- [GodPotato](https://github.com/BeichenDream/GodPotato): Windows - Potato privilege escalation

- [bloodyAD](https://github.com/CravateRouge/bloodyAD): Windows - Active Directory Privilege Escalation Framework

- [pspy](https://github.com/DominicBreuker/pspy): Linux - Monitor processes without root permissions

- [PassTheCert](https://github.com/AlmondOffSec/PassTheCert): Windows - LDAP certificate authentication

## Websites

- [OWASP](https://owasp.org)

- [HackTricks](https://book.hacktricks.xyz)

- [Crowd Strike](https://www.crowdstrike.com/blog/)

## Tools

- [Burp Suite](https://portswigger.net/burp/communitydownload): Web penetration testing

- [wappalyzer](https://www.wappalyzer.com/apps/): Web site analysis

- [Hex Rays IDA](https://hex-rays.com/ida-free): Reverse engineer tool