Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/seeu-inspace/easyg

Here I gather all the resources about hacking that I find interesting
https://github.com/seeu-inspace/easyg

automation bughunting penetration-testing red-teaming

Last synced: 21 days ago
JSON representation

Here I gather all the resources about hacking that I find interesting

Awesome Lists containing this project

README

        

```ruby
███████╗ █████╗ ███████╗██╗ ██╗ ██████╗
██╔════╝██╔══██╗██╔════╝╚██╗ ██╔╝██╔════╝
█████╗ ███████║███████╗ ╚████╔╝ ██║ ███╗
██╔══╝ ██╔══██║╚════██║ ╚██╔╝ ██║ ██║
███████╗██║ ██║███████║ ██║ ╚██████╔╝
╚══════╝╚═╝ ╚═╝╚══════╝ ╚═╝ ╚═════╝
Made with <3 by Riccardo Malatesta (@seeu)
```
[![License](https://img.shields.io/github/license/seeu-inspace/easyg)](LICENSE)
[![Open Source Love](https://badges.frapsoft.com/os/v1/open-source.svg?v=103)](https://github.com/ellerbrock/open-source-badges/)

EasyG started out as a script that I use to automate some information gathering tasks for my hacking process, [click here to discover what it does](tools/#easyg). Now it's more than that. Here I gather all the resources about hacking that I find interesting: notes, payloads, tools and more.

I try as much as possible to link to the various sources or inspiration for these notes. A large part of these notes are from: [PTS v4](https://blog.elearnsecurity.com/introducing-the-ptsv4-training-course.html), [PortSwigger Web Security Academy](https://portswigger.net/web-security), [PEN-200](https://www.offsec.com/courses/pen-200/), [Proving Grounds](https://www.offsec.com/labs/individual/), ["Attacking and Defending Active Directory Lab (CRTP)" by Altered Security](https://www.alteredsecurity.com/adlab), [Patrick Collins](https://twitter.com/PatrickAlphaC) and [Updraft](https://updraft.cyfrin.io/), [TryHackMe](https://tryhackme.com/), [Hack The Box](https://hackthebox.com/), [PentesterLab](https://pentesterlab.com/), [HackTricks](https://book.hacktricks.xyz/), [Jhaddix](https://twitter.com/Jhaddix), [The Cyber Mentor](https://www.thecybermentor.com/), [Mantas Sabeckis](https://ott3rly.com/), [NahamSec](https://www.youtube.com/@NahamSec) (and [NahamCon](https://www.nahamcon.com/)), InfoSec Twitter and many other amazing people.

## Table of Contents

- [Resources](resources/#resources)
- [Useful tips](useful-tips/#useful-tips)
- [Check-lists](check-lists/#check-lists)
- [Linux](linux/#linux)
- [Tools](tools/#tools)
- [EasyG](tools/#easyg)
- [Passive Information Gathering (OSINT)](passive-information-gathering-osint/#passive-information-gathering-osint)
- [Active Information Gathering](active-information-gathering/#active-information-gathering)
- [Content Discovery](content-discovery/#content-discovery)
- [Networking](networking/#networking)
- [Source code review](source-code-review/#source-code-review)
- [Vulnerability Scanning](vulnerability-scanning/#vulnerability-scanning)
- [Web vulnerabilities](web-vulnerabilities/#web-vulnerabilities)
- [Client-Side Attacks](client-side-attacks/#client-side-attacks)
- [Server-side Attacks](server-side-attacks/#server-side-attacks)
- [Thick client vulnerabilities](thick-client-vulnerabilities/#thick-client-vulnerabilities)
- [System Attacks](system-attacks/#system-attacks)
- [Port Redirection and Tunneling](system-attacks/#port-redirection-and-tunneling)
- [Linux Privilege Escalation](system-attacks/#linux-privilege-escalation)
- [Windows Privilege Escalation](system-attacks/#windows-privilege-escalation)
- [Active Directory](active-directory/#active-directory)
- [Mobile](mobile/#mobile)
- [Cloud hacking](cloud-hacking/#cloud-hacking)
- [AI / LLM vulnerabilities](ai-llm-vulnerabilities/#ai--llm-vulnerabilities)
- [Web3](web3/#web3)