Barre personnelle
* Google [https://www.google.com/ * Duck [https://duckduckgo.com/ * s [https://jumps.io/ * Gestionnaire de modules complémentaires [about:addons
ToDo
* Cyber Aces - System Administration | SANS Institute [https://www.sans.org/cyberaces/system-administration/ * CS50's Introduction to Computer Science | edX [https://www.edx.org/course/introduction-computer-science-harvardx-cs50x * All of the Best Links and Resources on Cyber Security. - s0cm0nkey's Security Reference Guide [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/ * ANSIBLE - 2. NOTIONS ET DEFINITIONS - YouTube [https://www.youtube.com/watch?v=tirjpYSMkkM&list=PLn6POgpklwWoCpLKOSw3mXCqbRocnhrh-&index=3 * xavki - YouTube [https://www.youtube.com/c/xavki-linux/playlists * Kali Linux LXC/LXD Images | Kali Linux Documentation [https://www.kali.org/docs/containers/kalilinux-lxc-images/ * Exercices de théorie de la musique | Musicca [https://www.musicca.com/fr/exercices * Python Programming Language - GeeksforGeeks [https://www.geeksforgeeks.org/python-programming-language/?ref=ghm * Logiciels PAM (Privileged Access Management) - Meilleurs logiciels et outils gratuits | GetApp France 2022 [https://www.getapp.fr/directory/1181/privileged-access-management/pricing/free/software * A strategy to land your first pentest job | by PentesterLab | PentesterLab [https://blog.pentesterlab.com/a-strategy-to-land-your-first-pentest-job-25209a351689 * Basics of Authentication [https://roadmap.sh/guides/basics-of-authentication * PYTHON - 1. INTRO ET LES STRINGS - YouTube [https://www.youtube.com/watch?v=4PcdtrBtHrM&list=PLn6POgpklwWr7m35ZLEul4lFJQfO4PfGQ&index=1 * futurecoder [https://fr.futurecoder.io/course/#IntroducingTheShell * Login | Skills for All with Cisco [https://auth.socialgoodplatform.com/auth/realms/skillsforall/protocol/openid-connect/auth?client_id=b2e-marketplace&redirect_uri=https%3A%2F%2Fskillsforall.com%2F%2Fdashboard&state=af914074-6ac7-49e3-80b0-ba1bfc12cfbc&response_mode=fragment&response_type=code&scope=openid&nonce=3b12f5fc-29f8-4485-ba81-ff75cbacee5e&ui_locales=en-US
EnCours
* Learn Python - Free Interactive Python Tutorial [https://www.learnpython.org/fr/ * trainingèview [https://fr.tradingview.com/chart/?symbol=OANDA%3AXAUUSD * Pick a Vulnerability to Learn About [https://www.hacksplaining.com/lessons * 58m:20s - FreeBitco.in - Win free bitcoins every hour! [https://freebitco.in/?op=home# * https://5.250.176.181/ JPG [https://5.250.176.181/ * Intezer for SentinelOne - Automate Your SOC Grunt Work [https://intezer.com/sentinelone-autonomous-soc-integration/ * Set Up Live Endpoint Scanner Script in Your EDR – Intezer Docs [https://support.intezer.com/hc/en-us/articles/5403622552860-Set-Up-Live-Endpoint-Scanner-Script-in-Your-EDR-#h_01H438XRZEZ0CH1FMXA558ZTVP * Create Active Directory Test Environment (Complete Guide) - Active Directory Pro [https://activedirectorypro.com/create-active-directory-test-environment/#requirments * Vue d’ensemble de la sécurisation de l’accès privilégié | Microsoft Learn [https://learn.microsoft.com/fr-fr/security/privileged-access-workstations/overview * Réaliser un Bastion de Tier 0 abordable – 1/5 – MSSEC [https://blog.mssec.fr/realiser-un-bastion-de-tier-0-abordable-1-5/ * Untitled :: Pwning OWASP Juice Shop [https://pwning.owasp-juice.shop/companion-guide/latest/ * Qu'est-ce que la gestion des identités et des accès (IAM)? - Keeper [https://www.keepersecurity.com/blog/fr/2022/07/03/the-complete-guide-to-identity-and-access-management-iam/ * #Useries - FortiWeb - Configuration en 5mn - YouTube [https://www.youtube.com/watch?v=jpJNIapcAC8&list=PLGp16Y0PcRNC29NBDOgFRry197Ys_sl9h * SASE: Qu’est-ce que le Secure Access Service Edge? | Cato Networks [https://www.catonetworks.com/fr/sase/ * WebSploit Labs - by Omar Santos [https://websploit.org/ * https://fortigate-vm.fortidemo.com/login?redir=%2Fng%2Flog%2Fview%2Fevent [https://fortigate-vm.fortidemo.com/login?redir=%2Fng%2Flog%2Fview%2Fevent * Guacamole : configurer l'authentification SAML avec Windows ADFS - 24/7 - IT [https://247-it.io/guacamole-configurer-lauthentification-saml-avec-windows-adfs/ * Sécurité des systèmes Linux : le patch management - Syloe [https://www.syloe.com/securite-systemes-linux-patch-management/ * GitHub - alebov/AD-lab: An active directory laboratory for penetration testing. [https://github.com/alebov/AD-lab * Creating a Red & Blue Team Homelab | hausec [https://hausec.com/2021/03/04/creating-a-red-blue-team-home-lab/ * 🖥 Building an Active Directory Lab 🔐 | by Robert Scocca | Medium [https://robertscocca.medium.com/building-an-active-directory-lab-82170dd73fb4#36d1 * Creating Active Directory Labs for Blue and Red Teams - SEC Consult [https://sec-consult.com/blog/detail/creating-active-directory-labs-for-blue-and-red-teams/ * Create Active Directory Test Environment (Complete Guide) - Active Directory Pro [https://activedirectorypro.com/create-active-directory-test-environment/ * Accueil - Harden Academy [https://hardenad.net/ * XDR Wars: Who Holds the Key? - by Shubham Goel [https://www.securityandmarkets.com/p/xdr-wars-who-holds-the-key * L'alphabet de la cybersécurité : AV, EPP, EDR, SIEM, et XDR à SOAR - Saycurit [https://www.saycurit.fr/lalphabet-de-la-cybersecurite-av-epp-edr-siem-et-xdr-a-soar/ * The 9 Best XDR Software Solutions and Tools in 2023 [Features, Pricing & Reviews] [https://heimdalsecurity.com/blog/best-xdr-software-solutions-tools/ * La méthode AGDLP : L’art de gérer ses permissions selon Microsoft – NEPTUNET.FR [https://neptunet.fr/agdlp/ * Open Source Tools for Identity and Access Management [https://www.innominds.com/blog/open-source-tools-for-identity-and-access-management * Open Identity Platform · Access management, identity management, user-managed access, directory services, and an identity gateway, designed and built as a single, unified platform. [https://www.openidentityplatform.org/ * Secrets engines | Vault | HashiCorp Developer [https://developer.hashicorp.com/vault/tutorials/getting-started/getting-started-secrets-engines * Vault | HashiCorp Developer [https://developer.hashicorp.com/vault * Best Practices - Active Directory Pro [https://activedirectorypro.com/category/best-practices/ * Welcome | authentik [https://goauthentik.io/ * Meilleures pratiques pour la sécurisation d'Active Directory | Microsoft Learn [https://learn.microsoft.com/fr-fr/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-securing-active-directory * Administration — Kasm 1.14.0 documentation [https://www.kasmweb.com/docs/latest/admin_guide.html * Index of /Video/ [http://s28.bitdl.ir/Video/ * Index of /Video/PluralSight.Hashicorp.Boundary-first.Look.Bookware-KNiSO/kniso-hashicorp.boundary-first.look/02. Understanding How Boundary Works/ [http://s28.bitdl.ir/Video/PluralSight.Hashicorp.Boundary-first.Look.Bookware-KNiSO/kniso-hashicorp.boundary-first.look/02.%20Understanding%20How%20Boundary%20Works/ * HashiCorp Vault - Secret management et protection des données [https://blog.wescale.fr/vault-cookbook * Cisco Skills For All - Etical Hacking Pentest [https://skillsforall.com/launch?id=80c156bc-84a4-47c9-a233-5eafe7bdde82&tab=curriculum&view=ca89ad0b-592a-514e-93a7-17f2f88abf68 * Web Security Academy: Free Online Training from PortSwigger [https://portswigger.net/web-security * Apprenez les bases du langage Python - OpenClassrooms [https://openclassrooms.com/fr/courses/7168871-apprenez-les-bases-du-langage-python * GitHub - smicallef/spiderfoot: SpiderFoot automates OSINT for threat intelligence and mapping your attack surface. [https://github.com/smicallef/spiderfoot * Les 3 000+ meilleures vidéos sur le thème Meditation · Téléchargement gratuit · Vidéos Pexels [https://www.pexels.com/fr-fr/chercher/videos/meditation/ * Protection de la messagerie par SPF et DKIM – IØ Expertises [https://www.io-expertises.fr/protection-de-la-messagerie-par-spf-et-dkim/ * Conduisez un test d'intrusion - OpenClassrooms [https://openclassrooms.com/fr/courses/1756296-conduisez-un-test-dintrusion * Centralisez et sécurisez votre annuaire Active Directory - OpenClassrooms [https://openclassrooms.com/fr/courses/2222496-centralisez-et-securisez-votre-annuaire-active-directory * Auditez la sécurité d'un système d'exploitation - OpenClassrooms [https://openclassrooms.com/fr/courses/2035746-auditez-la-securite-dun-systeme-dexploitation * 5 méthodes pour être plus productif - YouTube [https://www.youtube.com/watch?v=qYm9sz551aA&list=UUyhxxX9rvuoA_7EptWonUpA&index=3 * Enregistrez des données complexes avec des dictionnaires - Apprenez les bases du langage Python - OpenClassrooms [https://openclassrooms.com/fr/courses/7168871-apprenez-les-bases-du-langage-python/7290721-enregistrez-des-donnees-complexes-avec-des-dictionnaires * Setup [https://workshop.hackerops.dev/Setup-99e8bb20b6e3452f985547d79f52d34b * SIP et la sécurité - Protocole SIP [https://sip.goffinet.org/sip/securite-voip-sip/ * fail2web | Echo'System' [https://echosystem.fr/articles/monitoring/fail2web * The Next Platform - The Next Platform [https://www.nextplatform.com/ * Advanced Configuration - Keeper Connection Manager [https://docs.keeper.io/keeper-connection-manager/advanced-configuration * 🇬🇧 Guacamole - Advanced Administration and Tips 1 - Apps / Guacamole - EGroupware Help Forum [https://help.egroupware.org/t/uk-guacamole-advanced-administration-and-tips-1/74910 * Set up access to Apache Guacamole in Digital Access component - - Nexus Documentation [https://doc.nexusgroup.com/display/PUB/Set+up+access+to+Apache+Guacamole+in+Digital+Access+component * Create an HTML 5 RDP/SSH Frontend Using Guacamole on Ubuntu 16.04 LTS - Vultr.com [https://www.vultr.com/docs/create-an-html-5-rdp-ssh-frontend-using-guacamole-on-ubuntu-16-04-lts/ * Apache Guacamole + Nginx Proxy Manager = SyntaxError - Server Fault [https://serverfault.com/questions/1061650/apache-guacamole-nginx-proxy-manager-syntaxerror * Guacamole - Amahi Wiki [https://wiki.amahi.org/index.php/Guacamole * Part I. User's Guide [https://guacamole.apache.org/doc/0.9.13-incubating/gug/users-guide.html * Comment HLAI aide à détecter les fichiers exécutables PRISM. [https://www.harfanglab.io/articles-blog/comment-hlai-aide-a-detecter-les-fichiers-executables-prism * HarfangLab EDR | + simple, + vite, + intelligent. [https://www.harfanglab.io/solutions/edr-au-service-du-soc * Hurukai - Login [https://8ff0699b3b360b7f.hurukai.io:8443/login?next=%252Fdashboard * Active Directory Checklist - Attack & Defense Cheatsheet [https://cybersecuritynews.com/active-directory-checklist/ * Comment réaliser une attaque brute force RDP ? | IT-Connect [https://www.it-connect.fr/comment-realiser-une-attaque-brute-force-rdp/ * Wireshark Tutorial: Decrypting RDP Traffic [https://unit42.paloaltonetworks.com/wireshark-tutorial-decrypting-rdp-traffic/ * Apache Guacamole : Passerelle RDP, SSH, VNC, TELNET… – Tech2Tech | News, Astuces, Tutos, Vidéos autour de l'informatique [https://www.tech2tech.fr/apache-guacamole-passerelle-rdp-ssh-vnc-telnet/#Creer_une_connexion_RDP * Guacamole, contrôler vos équipements en SSH ou RDP via une interface Web [https://domopi.eu/guacamole-controler-vos-equipements-en-ssh-rdp-ou-vnc-via-une-interface-web/ * Securing Remote Desktop (RDP) for System Administrators | Information Security Office [https://security.berkeley.edu/education-awareness/securing-remote-desktop-rdp-system-administrators * What Is RDP & How Do You Secure (or Replace) It? | BeyondTrust [https://www.beyondtrust.com/blog/entry/what-is-rdp-how-do-you-secure-or-replace-it * Microsoft Operating Systems BlueKeep Vulnerability | CISA [https://www.cisa.gov/news-events/cybersecurity-advisories/aa19-168a * Are your Remote Access Tools FIPS 140-2 Validated?… | BeyondTrust [https://www.beyondtrust.com/blog/entry/are-your-remote-access-tools-fips-140-2-validated-heres-why-it-matters * Security Architecture - Keeper Connection Manager [https://docs.keeper.io/keeper-connection-manager/security * ZENETYS - Maîtrisez les accès distants à vos ressources avec Guacamole™ [https://www.zenetys.com/maitrisez-les-acces-distants-a-vos-ressources-avec-guacamole/ * FOP-159 Table header sometimes does not work. - ASF JIRA [https://issues.apache.org/jira/browse/FOP-159?filter=-5 * Keeper Security Blog - Cybersecurity 101 and Product Updates [https://www.keepersecurity.com/blog/ * Mentions légales - Cybi - Solutions innovantes de Cybersécurité basées sur de l'intelligence artificielle et de l'apprentissage automatique [https://www.cybi.fr/index.php/mentions-legales/ * SCUBA Dashboard [https://dashboard.scuba-cyber.fr/ * Network Documentation Software | DCIM, Network Documentation, OSP Software [https://graphicalnetworks.com/netterrain-logical-2/ * Home - Cybi - Solutions innovantes de Cybersécurité basées sur de l'intelligence artificielle et de l'apprentissage automatique [https://www.cybi.fr/ * Apache Guacamole™: 1.5.0 [https://guacamole.apache.org/releases/1.5.0/ * Open sourcing the Kubernetes security audit | Cloud Native Computing Foundation [https://www.cncf.io/blog/2019/08/06/open-sourcing-the-kubernetes-security-audit/ * Qu'est-ce que DevSecOps ? - France | IBM [https://www.ibm.com/fr-fr/cloud/learn/devsecops * Product Management - Shift Public [https://shift.inherent.fr/public/la-product-factory/organisation/product-management * MITRE ATT&CK Matrix for Kubernetes: Tactics & Techniques Part 3 [https://www.weave.works/blog/mitre-att-ck-matrix-for-kubernetes-tactics-techniques-explained-part-3 * BOUNDARY, OU L’ART DE GÉRER L’ACCÈS À VOS RESSOURCES PRIVÉES [https://blog.ippon.fr/2022/10/17/boundary/ * Guides & Tutorials | Teleport [https://goteleport.com/resources/guides/ * Catalogue de contenu SOAR Microsoft Azure Sentinel | Microsoft Learn [https://learn.microsoft.com/fr-fr/azure/sentinel/sentinel-soar-content * Activer l’analyse des vulnérabilités avec le scanneur Qualys intégré - Microsoft Defender for Cloud | Microsoft Learn [https://learn.microsoft.com/fr-fr/azure/defender-for-cloud/deploy-vulnerability-assessment-vm * Présentation de Microsoft Sentinel | Microsoft Learn [https://learn.microsoft.com/fr-fr/azure/sentinel/overview * Comment tirer parti d'une opération Red Team ? - RiskInsight [https://www.riskinsight-wavestone.com/2020/08/comment-tirer-parti-dune-operation-red-team/ * Red Team Tests dintrusion, audits de sécurité - Hub One [https://www.hubone.fr/oneblog/cybersecurite-quest-ce-quune-mission-red-team/ * L’approche Red Team : Evaluation globale de votre sécurité [https://www.alter-solutions.fr/blog/lapproche-red-team/ * Test d’intrusion, test red team - KPMG France [https://kpmg.com/fr/fr/blogs/home/posts/2021/1/test-intrusion-red-team-securite-risques.html * Anatomie d’un exercice « Red Team » - Silicon [https://www.silicon.fr/avis-expert/anatomie-dun-exercice-red-team * Red Teaming vs. Pen Testing – Quelle est la différence ? - Fusée [https://flare.io/fr/learn/resources/blog/red-teaming-vs-pen-testing/ * Les tests d'intrusion Red Team - évaluer la sécurité - SysDream [https://sysdream.com/intrusion/redteam/ * Red team, blue team & purple team : Quelles sont les différences ? [https://www.cyberuniversity.com/post/red-team-blue-team-purple-team-definition-et-roles-en-cybersecurite * authentik Alternatives: 25+ Identity Management Tools & Similar Apps | AlternativeTo [https://alternativeto.net/software/authentik/ * LAN MAN WAN PAN BAN CAN ETC. | n0tes.fr [https://n0tes.fr/2022/03/10/LAN-MAN-WAN-et-le-reste/ * The Pyramid of Pain in the SolarWinds Cyber Attack - Dynamite Analytics [https://dynamite.ai/pyramid-pain-solarwinds-cyber-attack/ * Wiz | Secure Everything You Build and Run in the Cloud [https://www.wiz.io/
_CTF_et_BugBounty
* All of the Best Links and Resources on Cyber Security. - s0cm0nkey's Security Reference Guide [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/ * Code-Breaking, Cipher and Logic Puzzle solving tools | Boxentriq [https://www.boxentriq.com/code-breaking * Secure Salted Password Hashing - How to do it Properly [https://crackstation.net/hashing-security.htm * CTFtime.org / Events calendar [https://ctftime.org/calendar/ * 0x0ff.info – Sécurité Informatique et Juridique – #InfoSec #Hacking #Luvz [https://www.0x0ff.info/ * Buffer Overflow & gdb – Part 1 – 0x0ff.info [https://www.0x0ff.info/2015/buffer-overflow-gdb-part1/ * Browserling – Online cross-browser testing [https://www.browserling.com/ * Getting Started with Exploit Development [https://dayzerosec.com/blog/2021/02/02/getting-started.html * whois prevoyance-agricole.fr - bash.ws [https://bash.ws/whois/prevoyance-agricole.fr * CheatLists | Ivan Glinkin [https://www.ivanglinkin.com/category/cheatlists/ * GitHub - dostoevskylabs/dostoevsky-pentest-notes: Notes for taking the OSCP in 2097. Read in book form on GitBook [https://github.com/dostoevskylabs/dostoevsky-pentest-notes * Devhints — TL;DR for developer documentation [https://devhints.io/ * outils [https://lehollandaisvolant.net/tout/tools/ * LetsDefend - Blue Team Training Platform [https://letsdefend.io/ * Transform YAML into JSON - Online YAML Tools [https://onlineyamltools.com/convert-yaml-to-json * Euro symbol ASCII Code [https://www.eurosymbol.eu/ascii-code * DVWA Ultimate Guide - First Steps and Walkthrough - Bug Hacking [https://bughacking.com/dvwa-ultimate-guide-first-steps-and-walkthrough/#CSRF * SQLMAP-Detecting and Exploiting SQL Injection- A Detailed Explanation [https://gbhackers.com/sqlmap-detecting-exploiting-sql-injection/ * Notes :: An0nud4y [https://an0nud4y.com/notes/ * Checklist - Local Windows Privilege Escalation - HackTricks [https://book.hacktricks.xyz/windows-hardening/checklist-windows-privilege-escalation
Tuto-CTF
* APPRENDRE PYTHON: FORMATION COMPLÈTE GRATUITE 2021 - YouTube [https://www.youtube.com/watch?v=LamjAFnybo0 * Buffer Overflow & gdb – Part 1 – 0x0ff.info [https://www.0x0ff.info/2015/buffer-overflow-gdb-part1/ * professional education - How to learn penetration testing at home? - Information Security Stack Exchange [https://security.stackexchange.com/questions/11444/how-to-learn-penetration-testing-at-home * Learn X in Y Minutes: Scenic Programming Language Tours [https://learnxinyminutes.com/ * CyberPunk: Open Source CyberSecurity [https://n0where.net/ * Application Security [https://www.idontplaydarts.com/ * YARA for pentesters | DiabloHorn [https://diablohorn.com/2017/12/25/yara-for-pentesters/ * Hand Guide To Local File Inclusion(LFI) [http://securityidiots.com/Web-Pentest/LFI * LFI to shell – exploiting Apache access log | Rogue Coder [https://roguecod3r.wordpress.com/2014/03/17/lfi-to-shell-exploiting-apache-access-log/ * Cyber Security Training Courses For Beginners and Advanced [https://www.concise-courses.com/training/ * The unofficial HackerOne disclosure Timeline [http://h1.nobbd.de/index.php * Hacker101 - Introduction - YouTube [https://www.youtube.com/watch?v=zPYfT9azdK8&list=PLxhvVyxYRviZd1oEA9nmnilY3PhVrt4nj * Getting Started | Hacker101 [https://www.hacker101.com/ * OWASP Testing Guide v4 Table of Contents - OWASP [https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents * CTF Challenges - Yeah Hub [https://www.yeahhub.com/ctf-challenges-writeups/ * 先知社区 [https://xz.aliyun.com/ * MinU: 1 Walkthrough [https://hackso.me/minu-1-walkthrough/ * tcpdump | GTFOBins [https://gtfobins.github.io/gtfobins/tcpdump/ * hacksome | my security journey [https://hackso.me/ * MyExperiments - Local Linux privilege escalation overview [https://myexperiments.io/linux-privilege-escalation.html#v-sudo * Linux elevation of privileges [https://guif.re/linuxeop * CTF Challenges - Hacking Articles [http://www.hackingarticles.in/ctf-challenges1/ * handy techniques to bypass environment restrictions - 0xsp SRD [https://0xsp.com/offensive/handy-techniques-to-bypass-environment-restrictions/ * xavki - YouTube [https://www.youtube.com/c/xavki-linux/playlists * My Learning | Cybrary [https://app.cybrary.it/my-learning * Website Username/Password brute-forcing with Hydra – EinStijn.com [https://www.einstijn.com/penetration-testing/website-username-password-brute-forcing-with-hydra/ * Test WordPress Logins With Hydra on Kali Linux - Linux Tutorials - Learn Linux Configuration [https://linuxconfig.org/test-wordpress-logins-with-hydra-on-kali-linux * Home | Cyber | Dr. Chaos [https://www.drchaos.com/home/search/wordpress * AttackSurfaceMapper: Attack Surface Expander | CYBERPUNK [https://www.cyberpunk.rs/attacksurfacemapper-attack-surface-expander * DorkSearch - Speed up your Google Dorking [https://www.dorksearch.com/ * TCPDump Capture HTTP GET/POST requests | Devops Junction [https://www.middlewareinventory.com/blog/tcpdump-capture-http-get-post-requests-apache-weblogic-websphere/
BugBounty
* InfoSec Write-ups [https://infosecwriteups.com/ * Video channel videos - PeerTube [https://peertube.sl-network.fr/video-channels/79b72c44-c395-4a52-a6f1-80fe5d8dd28e/videos * Bounty Report Generator [https://buer.haus/breport/ * University Archives | Bugcrowd [https://www.bugcrowd.com/hackers/bugcrowd-university/ * Corben Leo (Page 2) [https://corben.io/page/2/ * Dashboard | Defend the Web [https://defendtheweb.net/dashboard * Dashboard | Defend the Web [https://defendtheweb.net/dashboard * BREAKDOWN Realistic Pentest of a Schneider Electric Industrial Control System M221 PLC - YouTube [https://www.youtube.com/watch?v=1Ppm7dQ66-U * OWASP Security Knowledge Framework | OWASP Foundation [https://owasp.org/www-project-security-knowledge-framework/ * OpenVAS/GVM – scan de vulnérabilités – IØ Expertises [https://www.io-expertises.fr/openvas-audit-de-vulnerabilites/ * Scanner de vulnérabilités avec un Raspberry Pi et Greenbone [https://www.it-connect.fr/creer-un-scanner-de-vulnerabilites-avec-un-raspberry-pi-mais-pas-que/ * Web Application Security – InfoSec Write-ups – Medium [https://medium.com/bugbountywriteup/tagged/web-application-security * Bug Bounty – InfoSec Write-ups – Medium [https://medium.com/bugbountywriteup/tagged/bug-bounty * InfoSec Write-ups – Medium - TOP [https://medium.com/bugbountywriteup * BugBountyHunting.com - A community-curated Resource for Bug Bounty Hunting [https://www.bugbountyhunting.com/ * https://www.openbugbounty.org/ [https://www.openbugbounty.org/ * Become a bug bounty hunter - Learn about web application vulnerabilities and how to find them on bug bounty programs | BugBountyHunter.com [https://www.bugbountyhunter.com/ * Hacker Success Guide | HackerOne Platform Documentation [https://docs.hackerone.com/hackers/hacker-success-guide.html * Bug Bounty Programs | yeswehack.com [https://yeswehack.com/programs * List of bug bounty writeups · Pentester Land [https://pentester.land/list-of-bug-bounty-writeups.html#bug-bounty-writeups-published-in-2019 * File Transfer · OSCP - Useful Resources [https://backdoorshell.gitbooks.io/oscp-useful-links/content/file-transfer.html * Offensive Security’s PWK & OSCP Review - Jack Hacks [https://jhalon.github.io/OSCP-Review/ * HackinGeeK - YouTube [https://www.youtube.com/c/HackinGeeK/videos * Weakpass [https://weakpass.com/ * Hacktivity | HackerOne Platform Documentation [https://docs.hackerone.com/hackers/hacktivity.html * Hacker101 [https://www.hacker101.com/sessions/web_in_depth * So You Want To Be a Pentester? - Jack Hacks [https://jhalon.github.io/becoming-a-pentester/ * Pentester Land · Offensive Infosec [https://pentester.land/ * Penetration Testing Tools Cheat Sheet [https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/ * Guide 001 |Getting Started in Bug Bounty Hunting.. – Muhammad Khizer Javed [https://whoami.securitybreached.org/2019/06/03/guide-getting-started-in-bug-bounty-hunting/ * Pedro Henrique Cardoso – Medium [https://medium.com/@G4L1C * AS16347 ADISTA SAS - bgp.he.net [https://bgp.he.net/AS16347#_prefixes * Day 73: OSCP Notes from IPPSEC OSCP Style Videos - int0x33 - Medium [https://medium.com/@int0x33/day-73-oscp-notes-from-ippsec-oscp-style-videos-b6522a8d875a * Test d'intrusion - Pentest : Présentation et méthodologies - Information Security [https://www.information-security.fr/test-dintrusion-pentest-presentation-methodologies/ * Learn to hack, collaborate with security researchers and learn about bugbounties | BugBountyNotes.com [https://www.bugbountynotes.com/ * Live hacking on BugBountyNotes challenges with @zseano - YouTube [https://www.youtube.com/watch?v=8U6bWXDCUjU * bug bounty - free online courses/MOOC search results | Class Central [https://www.classcentral.com/search?q=bug+bounty&free=true&page=2 * The Bug Bounty Radar - The Latest Public Bug Bounty Programs [https://bbradar.io/ * Bug Bounty Forum - resources [https://bugbountyforum.com/resources/#cross-site-scripting-xss * Bug Hunter University Videos - Videos - Learn - Google Bug Hunters [https://bughunters.google.com/learn/videos/5956774821363712
writeup
* CTF Writeups – Medium [https://medium.com/ctf-writeups * Vault: Hack The Box Walkthrough [https://hackso.me/vault-htb-walkthrough/ * Tags | 0xdf hacks stuff [https://0xdf.gitlab.io/tags.html#hackthebox * 0xdf hacks stuff | CTF solutions, malware analysis, home lab development [https://0xdf.gitlab.io/ * ProHacktive – Medium [https://medium.com/prohacktive
Challenges
* Cylab Play - Vulnerable Apps | cylab.be [https://cylab.be/resources/cylab-play * Broken Crystals [http://brokencrystals.com/ * MegaCorp One - Nanotechnology Is the Future [https://www.megacorpone.com/ * Further Reading | 0xffsec Handbook [https://0xffsec.com/handbook/further-reading/ * NetSPI SQL Injection Wiki [https://sqlwiki.netspi.com/ * WeChall Sites de Challenges Participants [https://www.wechall.net/active_sites * WeChall Sites de Challenges Participants [https://www.wechall.net/active_sites/all/by/site_fun/DESC/page-1 * The Cryptopals Crypto Challenges [https://cryptopals.com/sets/1 * picoCTF - CMU Cybersecurity Competition [https://picoctf.org/
CheatSheets
* The Ultimate List of SANS Cheat Sheets | SANS Institute [https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/ * 0xsp | offensive cheatsheet [https://0xsp.com/offensive/offensive-cheatsheet * nbtscan Cheat Sheet [https://highon.coffee/blog/nbtscan-cheat-sheet/ * Reverse Shell Cheat Sheet [https://highon.coffee/blog/reverse-shell-cheat-sheet/ * Penetration Testing Tools Cheat Sheet [https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/ * LFI Cheat Sheet [https://highon.coffee/blog/lfi-cheat-sheet/ * Nmap Cheat Sheet and Pro Tips | HackerTarget.com [https://hackertarget.com/nmap-cheatsheet-a-quick-reference-guide/ * Volatility Usage · volatilityfoundation/volatility Wiki · GitHub [https://github.com/volatilityfoundation/volatility/wiki/Volatility-Usage * gitMemory[https://www.gitmemory.com/ * Hacking/OSCP cheatsheet :: Ceso Adventures [https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/ * Cheat Sheet : All Cheat Sheets in one page [http://www.cheat-sheets.org/ * GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF [https://github.com/swisskyrepo/PayloadsAllTheThings * GTFOBins [https://gtfobins.github.io/#+file%20upload * MSFU [https://www.offensive-security.com/metasploit-unleashed/ * Exploit-DB [https://www.exploit-db.com/ * GHDB [https://www.exploit-db.com/google-hacking-database * Ultimate Library of ICS Cyber Security Resources - SCADAhacker [https://scadahacker.com/library/index.html * Welcome to Security Idiots!! [http://www.securityidiots.com/ * Cheatsheet for HackTheBox · GitHub [https://gist.github.com/AvasDream/47f13a510e543009a50c8241276afc24 * https://pen-testing.sans.org/resources/downloads [https://pen-testing.sans.org/resources/downloads * https://github.com/coreb1t/awesome-pentest-cheat-sheets [https://github.com/coreb1t/awesome-pentest-cheat-sheets * https://github.com/mubix/post-exploitation/wiki/Linux-Post-Exploitation-Command-List [https://github.com/mubix/post-exploitation/wiki/Linux-Post-Exploitation-Command-List * https://github.com/rmusser01/Infosec_Reference [https://github.com/rmusser01/Infosec_Reference * https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/ [https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/ * https://www.stationx.net/nmap-cheat-sheet/ [https://www.stationx.net/nmap-cheat-sheet/ * https://pentestlab.blog/2012/08/17/nmap-cheat-sheet/ [https://pentestlab.blog/2012/08/17/nmap-cheat-sheet/ * https://highon.coffee/blog/cheat-sheet/ [https://highon.coffee/blog/cheat-sheet/ * https://github.com/adam-p/markdown-here/wiki/Markdown-Cheatsheet [https://github.com/adam-p/markdown-here/wiki/Markdown-Cheatsheet * GitHub - trimstray/awesome-ninja-admins: A collection of awesome lists, manuals, blogs, hacks, one-liners and tools for Awesome Ninja Admins. [https://github.com/trimstray/awesome-ninja-admins * Analyse your HTTP response headers [https://securityheaders.com/ * Cheat Sheets - by SII [https://groupe-sii.github.io/cheat-sheets/ * Bug Bounty Cheatsheet [https://m0chan.github.io/2019/12/17/Bug-Bounty-Cheetsheet.html * Could not open a raw socket Error permission denied(13) | Ubuntu Tutorials [https://www.ubuntututorials.org/could-not-open-raw-socket-error-permission-denied-13/ * Nmap Cheat Sheet 2023: All the Commands and More [https://www.geeksforgeeks.org/nmap-cheat-sheet/ * GitHub - Lifka/hacking-resources: Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals. [https://github.com/Lifka/hacking-resources/tree/main
IPinfo malware tools
* Recommended sites for gathering IP reputation : AskNetsec [https://www.reddit.com/r/AskNetsec/comments/7xqsiq/recommended_sites_for_gathering_ip_reputation/
HTTP_debugger
* Free HTTP Request Viewer [https://www.httpdebugger.com/tools/ViewHttpHeaders.aspx * Make Simple HTTP POST And GET Requests Online [https://www.codepunker.com/tools/http-requests * Online curl command line builder [https://curlbuilder.com/ * httpbin.org [https://httpbin.org/ * ApiRequest.io | Free Tools available for Debugging resful APIs [http://www.apirequest.io/debugging-tools * Send HTTP Requests Online [https://reqbin.com/
Messagerie_MAIL
* Live et Webinar Email Marketing Archives - Badsender [https://www.badsender.com/category/live-webinar-email-marketing/ * Authentification des emails : SPF, DKIM, DMARC... Tout ce qu'il faut savoir! [https://www.badsender.com/2014/01/13/authentification-des-emails/ * Installer et configurer Postfix avec SPF + DKIM + DMARC - malekal.com [https://www.malekal.com/installer-configurer-postfix-spf-dkim-dmarc * Qu'est-ce que la DMARC ? Enregistrement, DKIM, SPF | Proofpoint FR [https://www.proofpoint.com/fr/threat-reference/dmarc * Outbox Protection [https://fraudmarc.com/outbox-protection
HomeLabSecurity
* Building a Cybersecurity Homelab for Detection & Monitoring - Cyberwox Academy [https://cyberwoxacademy.com/building-a-cybersecurity-homelab-for-detection-monitoring/ * Building A Test Lab For Pentesting Guide | White Oak Security [https://www.whiteoaksecurity.com/blog/building-a-test-lab-for-pentesting/ * Resources - Cyberwox Academy [https://cyberwoxacademy.com/resources/ * Building A Test Lab For Pentesting Guide | White Oak Security [https://www.whiteoaksecurity.com/blog/building-a-test-lab-for-pentesting/ * Uncategorized | White Oak Security [https://www.whiteoaksecurity.com/blog/category/uncategorized/ * Building a Cybersecurity Homelab for Detection & Monitoring - Cyberwox Academy [https://cyberwoxacademy.com/building-a-cybersecurity-homelab-for-detection-monitoring/ * Nouvel onglet [about:newtab * Introduction :: DetectionLab [https://detectionlab.network/ * GitHub - hackertarget/DetectionLabUbuntuAddon: Add Ubuntu Server to DetectionLab Network with Vagrant [https://github.com/hackertarget/DetectionLabUbuntuAddon/ * PowerShell Module Browser - PowerShell | Microsoft Docs [https://docs.microsoft.com/en-us/powershell/module/?view=powershell-5.1 * Windows 11 Enterprise | Microsoft Evaluation Center [https://www.microsoft.com/en-us/evalcenter/download-windows-11-enterprise * Windows Server 2022 | Microsoft Evaluation Center [https://www.microsoft.com/en-us/evalcenter/download-windows-server-2022 * Windows 10 Enterprise | Microsoft Evaluation Center [https://www.microsoft.com/en-us/evalcenter/download-windows-10-enterprise * Introducing: Detection Lab. Detection Lab is a collection of Packer… | by Chris Long | Medium [https://medium.com/@clong/introducing-detection-lab-61db34bed6ae * Trying DetectionLab [https://taosecurity.blogspot.com/2019/01/trying-detectionlab.html * Extend DetectionLab with Linux Endpoints | HackerTarget.com [https://hackertarget.com/extend-detectionlab-linux/ * Build a Cyber Security Lab with DetectionLab | HackerTarget.com [https://hackertarget.com/cyber-security-detectionlab/ * Proxmox VE 7: Converting a Laptop into a Bare Metal Server [https://benheater.com/bare-metal-proxmox-laptop/ * Test and evaluate your WAF before hackers ☝️ [https://lab.wallarm.com/test-your-waf-before-hackers/
Hacking
* Introduction — Scapy 2.4.5. documentation [https://scapy.readthedocs.io/en/latest/introduction.html#quick-demo * Reverse Engineering 101 [https://malwareunicorn.org/workshops/re101.html#0 * scapy · PyPI [https://pypi.org/project/scapy/
CHIFFRER_SECU_TOOLS
* Instance Directory - Welcome! [https://privatebin.info/directory/ * CryptPad: Collaboration suite, encrypted and open-source [https://cryptpad.fr/what-is-cryptpad.html * SimpleLogin | Protéger votre vie privée avec les alias mail [https://simplelogin.io/fr/ * RSA Encryption | MuirlandOracle | Blog [https://muirlandoracle.co.uk/2020/01/29/rsa-encryption/ * Anonymous Proxy List - Free Proxy List [https://free-proxy-list.net/anonymous-proxy.html * Crypto CD-ROM – WARNING – written with 16-bit software, so requires Microsoft Virtual PC to run on Windows 7 or later Windows | Simon Singh [https://simonsingh.net/cryptography/crypto-cd-rom/
RedTeam_BlueTeam
* Explore Atomic Red Team [https://atomicredteam.io/ * Red team checklist | Red Team Development and Operations [https://redteam.guide/docs/checklists/red-team-checklist/ * Part 1 | Video Guide | What is Jasmin Ransomware | The RedTeam Tool - YouTube [https://www.youtube.com/watch?v=OMEARyiX8Dw * Rocket.Redteams [https://rocket.redteams.fr/home * Shell :: Just sharing... [https://redteams.fr/shell/ * Getting Started Testing with Atomic Tests | Atomic Red Team [https://atomicredteam.io/testing * Red Team Tips – for red teamers, by red teamers [https://redteamer.tips/ * Automating red team infrastructure with Ansible part 1 – Raw infrastructure – Red Team Tips [https://redteamer.tips/automating-red-team-infrastructure-with-ansible-part-1-raw-infrastructure/ * :: Just sharing... [https://redteams.fr/ * What is Red Teaming? | Red Team Development and Operations [https://redteam.guide/docs/Concepts/red-teaming * AlgoSecure | Outils offensifs (pentest / redteam) : exemple de mise en place d'une infrastructure [https://www.algosecure.fr/actualites/article/outils-offensifs-pentest-redteam-exemple-infrastructure * https://redteam.guide/docs/checklists/red-team-checklist/ [https://redteam.guide/docs/checklists/red-team-checklist/ * GitHub - yeyintminthuhtut/Awesome-Red-Teaming: List of Awesome Red Teaming Resources [https://github.com/yeyintminthuhtut/Awesome-Red-Teaming * GitHub - CyberSecurityUP/Awesome-Red-Team-Operations [https://github.com/CyberSecurityUP/Awesome-Red-Team-Operations * Introduction - Red Team Notes [https://dmcxblue.gitbook.io/red-team-notes/ * Red/Purple Teaming - s0cm0nkey's Security Reference Guide [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/red-offensive/red-purple-teaming * Free Red Teaming Tools & Simulation Toolkit - 2022 [https://cybersecuritynews.com/free-red-teaming-tools/ * Building a Red Team: How to Get Started [https://www.darkreading.com/attacks-breaches/building-a-red-team-how-to-get-started * ROE Template | Red Team Development and Operations [https://redteam.guide/docs/templates/roe_template/ * Free Training Resources for Cybersecurity and IT Students and Professionals [https://benheater.com/free-training-resources-cybersec-and-it/ * Red Team - Vincent Yiu [https://www.vincentyiu.com/ * HanseSecure | You will be hacked. Choose the intruder. [https://hansesecure.de/ * Automated Security Testing Tool | secureCodeBox [https://www.securecodebox.io/ * Getting Started - VECTR Documentation [https://docs.vectr.io/Installation/ * Features | VECTR [https://vectr.io/features/ * VECTR Tutorial - v5.5 Installation - YouTube [https://www.youtube.com/watch?v=vp_lILONZ8k * Qu’est-ce que le Red Teaming ? Méthodologie et outils | Varonis [https://www.varonis.com/fr/blog/red-teaming * What is ired.team? - Red Teaming Experiments [https://www.ired.team/ * GitHub - RistBS/Awesome-RedTeam-Cheatsheet: Red Team Cheatsheet in constant expansion. [https://github.com/RistBS/Awesome-RedTeam-Cheatsheet * Track 1 06 Quantify your hunt not your parents red teaming Devon Kerr - YouTube [https://www.youtube.com/watch?v=w_kByDwB6J0 * Red Teaming/Adversary Simulation Toolkit [https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/ * GitHub - tobor88/PowerShell-Red-Team: Collection of PowerShell functions a Red Teamer may use in an engagement [https://github.com/tobor88/PowerShell-Red-Team * GitHub - S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet: A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. [https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet * Atomic Red Team [https://0x1.gitlab.io/pentesting/Atomic-Red-Team/ * atomic-red-team/atomics at master · redcanaryco/atomic-red-team · GitHub [https://github.com/redcanaryco/atomic-red-team/tree/master/atomics * Red Team Testing Services | RedTeam Security [https://www.redteamsecure.com/advanced-penetration-testing/red-teaming * GitHub - A-poc/RedTeam-Tools: Tools and Techniques for Red Team / Penetration Testing [https://github.com/A-poc/RedTeam-Tools * Anatomie d'un exercice Red Team - Chapitre 1 - POST [https://www.post.lu/business/blog/articles/cybersecurite/technical-corner/exercice-red-team-chapitre-1 * GitHub - botherder/ntap: Transparent network tap [https://github.com/botherder/ntap * Cobalt Strike Training Resources | Cobalt Strike [https://www.cobaltstrike.com/training/ * SANS Offensive Operations - YouTube [https://www.youtube.com/@SANSOffensiveOperations/search?query=Red * CALDERA [https://caldera.mitre.org/ * A Beginner’s Guide to MITRE CALDERA™ User Training | by CALDERA | Medium [https://medium.com/@mitrecaldera/a-beginners-guide-to-mitre-caldera-user-training-6e4676c1c5c9 * Red Team Reconnaissance Techniques | Linode Docs [https://www.linode.com/docs/guides/red-team-reconnaissance-techniques/ * HackerSploit | Linode Docs [https://www.linode.com/docs/authors/hackersploit/ * Vulnerability Detection | Linode Docs [https://www.linode.com/docs/guides/security/vulnerabilities/ * Linode Guides & Tutorials | Linode Docs [https://www.linode.com/docs/guides/ * You’re Probably Not Red Teaming... And Usually I’m Not, Either [SANS ICS 2018] - YouTube [https://www.youtube.com/watch?v=mj2iSdBw4-0 * Émulation de l'adversaire de l'équipe rouge avec Caldera - YouTube [https://www.youtube.com/watch?v=EIHLXWnK1Dw * CALDERA – Medium [https://medium.com/@mitrecaldera * Simulation d'attaques et de groupes APT avec CALDERA de MITRE »InfoSec Dutchie [https://www-infosecdutchie-com.translate.goog/simulating-attacks-with-mitre-caldera/?_x_tr_sl=auto&_x_tr_tl=fr&_x_tr_hl=fr * Gigabit Ethernet Tap - Hacker Warehouse [https://hackerwarehouse.com/product/gigabit-ethernet-tap/ * Knowm Passive LAN Tap – Knowm.org [https://knowm.org/knowm-passive-lan-tap/ * caldera mitre tuto - YouTube [https://www.youtube.com/results?search_query=caldera+mitre+tuto * D3FEND Matrix | MITRE D3FEND™ [https://d3fend.mitre.org/ * GitHub - infosecn1nja/Red-Teaming-Toolkit: This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter. [https://github.com/infosecn1nja/Red-Teaming-Toolkit#lateral-movement * BHIS | Atomic Red Team: Hands-on Getting Started Guide | Carrie & Darin Roberts | 1-Hour - YouTube [https://www.youtube.com/watch?v=eHZEyEf_icE&t=1840s * Attack Emulation Tools: Atomic Red Team, CALDERA and More – Antisyphon Training [https://www.antisyphontraining.com/event/attack-emulation-tools-atomic-red-team-caldera-and-more/2023-05-09/ * Torturez votre EDR avec Atomic Red Team ! - Almond [https://almond.eu/cybersecurity-insights/torturez-votre-edr-avec-atomic-red-team/ * Qu’est‑ce que MITRE ATT&CK et quelle est son utilité? | WeLiveSecurity [https://www.welivesecurity.com/fr/2019/09/18/introduction-mitre-attack-utilite/ * Zero-Point Security [https://training.zeropointsecurity.co.uk/ * Atomic Red Team Training - Basics and Beyond - YouTube [https://www.youtube.com/watch?v=d_E-hfKQ5Hw * Atomic Red Team Tutorial Series - YouTube [https://www.youtube.com/playlist?list=PL92eUXSF717W9TCfZzLca6DmlFXFIu8p6 * Open Source Security Index [https://opensourcesecurityindex.io/ * How to Test Your Security Controls Using Atomic Red Team intro - YouTube [https://www.youtube.com/watch?v=M4SHpDX8GTo&list=PL92eUXSF717W9TCfZzLca6DmlFXFIu8p6&index=9 * Utilisation avancée de sqlmap | Connect - Editions Diamond [https://connect.ed-diamond.com/MISC/misc-062/utilisation-avancee-de-sqlmap * Red Team Village - Cybersecurity Training and Briefings [https://redteamvillage.io/ * GitHub - an4kein/awesome-red-teaming: List of red team resources [https://github.com/an4kein/awesome-red-teaming#-social-engineering * Équipe rouge — Wikipédia [https://fr.wikipedia.org/wiki/%C3%89quipe_rouge
Docker_K8S
* Panorama des outils de sécurité autour des conteneurs - OCTO Talks ! [https://blog.octo.com/panorama-des-outils-de-securite-autour-des-conteneurs/ * docker_fiche_technique.pdf [https://www.ssi.gouv.fr/uploads/2020/12/docker_fiche_technique.pdf * Utiliser img pour sécuriser son build Docker dans Kubernetes [https://www.padok.fr/blog/docker-kubernetes-img * Open Source Container Security with Syft & Grype • Anchore [https://anchore.com/opensource/ * Kubernetes: Why Use It, How It Works, Options & Alternatives [https://www.aquasec.com/cloud-native-academy/kubernetes-101/kubernetes-complete-guide/ * XCP-ng documentation | XCP-ng documentation [https://xcp-ng.org/docs/
linux
* Variables spéciales | Mon pense-bête [https://www.quennec.fr/trucs-astuces/syst%C3%A8mes/gnulinux/programmation-shell-sous-gnulinux/le-langage-de-programmation-awk/principe/variables-sp%C3%A9ciales * System and Service Manager [https://systemd.io/ * Potential bypass of Runas user restrictions | Sudo [https://www.sudo.ws/security/advisories/minus_1_uid/ * Akadias Publications [https://www.akadia.com/html/publications.html#Unix-Linux-Apache%20Publications * explainshell.com - match command-line arguments to their help text [https://explainshell.com/ * UE Introduction au Système d'exploitation - JP Gelas [https://perso.univ-lyon1.fr/jean-patrick.gelas/UE_Systeme/ * Q4OS - desktop operating system [https://q4os.org/ * blendOS — Beautiful. Efficient. Elegant. [https://blendos.co/ * 2DayGeek - Linux and Unix | Open Source | Linux Howtos [https://www.2daygeek.com/
Windows
* PPT_Share - Google Drive [https://drive.google.com/drive/folders/1vrWH5GCW1EG2QOBmrssN4-H98ReE0WZe * A Guide To Cloud - Free Cloud Certification Courses [https://www.aguidetocloud.com/ * Administrator Portals | Microsoft Portals [https://msportals.io/ * Cybersecurity Memo [https://blog.51sec.org/ * LazyWinAdmin [https://lazywinadmin.com/ * AZ-500 Real Exam Questions & Answers - PDF.pdf - Google Drive [https://drive.google.com/file/d/1wmxbdjLYgFYyLCcvUn6Kd1DdjclF5cOl/view * Microsoft AZ-500 Certification- Azure Security Technologies - Google Drive [https://drive.google.com/drive/folders/1hQpIp1zd05QoumcNgyL8caSc_GPfTHqM * live.sysinternals.com - / [https://live.sysinternals.com/ * Spiceworks Community - IT Best Practices, How-tos, Product Reviews, written by and for IT Pros [https://community.spiceworks.com/ * How to Use Slmgr to Change, Remove, or Extend Your Windows License [https://www.howtogeek.com/245445/how-to-use-slmgr-to-change-remove-or-extend-your-windows-license/ * Create Active Directory Test Environment (Complete Guide) - Active Directory Pro [https://activedirectorypro.com/create-active-directory-test-environment/ * Collecte d’informations sur les ordinateurs - PowerShell | Microsoft Learn [https://learn.microsoft.com/fr-fr/powershell/scripting/samples/collecting-information-about-computers?view=powershell-7.2 * Administrator Portals | Microsoft Portals [https://msportals.io/?search= * Using WSL to Build a Python Development Environment on Windows - Practical Business Python [https://pbpython.com/wsl-python.html * Documentation Microsoft 365 Defender | Microsoft Learn [https://learn.microsoft.com/fr-fr/microsoft-365/security/defender/?view=o365-worldwide * Documentations - Harden Academy [https://hardenad.net/les-standards/ * 24/7 - IT | Tutoriels informatique [https://247-it.io/ * - Centre d’administration Microsoft Entra [https://entra.microsoft.com/#view/Microsoft_AAD_IAM/TenantOverview.ReactView * Find your Microsoft Azure and Office 365 tenant ID - What is my tenant ID? [https://www.whatismytenantid.com/ * La liste des commandes PowerShell - malekal.com [https://www.malekal.com/liste-commandes-powershell/#Les_commandes_PowerShell_de_base_sur_les_comptes_utilisateurs * Gestion des identités et des accès : bonnes pratiques de sécurité Azure | Microsoft Learn [https://learn.microsoft.com/fr-fr/azure/security/fundamentals/identity-management-best-practices * Windows Subsystem for Linux September 2023 update - Windows Command Line [https://devblogs.microsoft.com/commandline/windows-subsystem-for-linux-september-2023-update/ * Run an attack simulation in a Microsoft Defender XDR pilot environment | Microsoft Learn [https://learn.microsoft.com/en-us/microsoft-365/security/defender/eval-defender-investigate-respond-simulate-attack?view=o365-worldwide * Exécuter une simulation d’attaque dans un environnement pilote Microsoft Defender XDR | Microsoft Learn [https://learn.microsoft.com/fr-fr/microsoft-365/security/defender/eval-defender-investigate-respond-simulate-attack?view=o365-worldwide * Commencer à utiliser la formation à la simulation d’attaque | Microsoft Learn [https://learn.microsoft.com/fr-fr/microsoft-365/security/office-365-security/attack-simulation-training-get-started?view=o365-worldwide
Bible
* The Cybersecurity career and job hunting guide. [https://www.cyberhuntingguide.net/ * malwareunicorn.org [https://malwareunicorn.org/#/workshops * Red Teaming/Adversary Simulation Toolkit [https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/#escalate-privileges * Wanna Be a Hacker ? - Hex Buddy Notes [https://h3xbuddy.gitbook.io/readme/ * PWK (OSCP) (PEN-200) - Hide01.ir [https://pwk.hide01.ir/#video-path=media/video/COPY_00_00.mp4&time-offset=0 * PWK (OSCP) (PEN-200) - Hide01.ir [https://pwk.hide01.ir/#video-path=media/video/GCKL_04_01.mp4&time-offset=65 * hide01.ir - Advanced Web Attacks and Exploitation (WEB-300) [https://awae.hide01.ir/#video-path=media/video/COPY_00_00.mp4&time-offset=0 * PEN-300 - OSEP - Hide01.ir [https://pen300.hide01.ir/#video-path=media/video/COPY_00_00.mp4&time-offset=0 * PWK (OSCP) (PEN-200) - Hide01.ir [https://pwk.hide01.ir/#video-path=media/video/CLF_01_01.mp4&time-offset=110 * PEN-300 - OSEP - Hide01.ir [https://pen300.hide01.ir/index.html#video-path=media/video/CSCEO_02_01.mp4&time-offset=470 * MEGA - Ethical Hacking Penetration Testing & Bug Bounty Hunting-V2 [https://mega.nz/folder/A2QUjJYR#Vv0xbGm30InMD5kG_tQSWw * MEGA - Vikas Chaudhary bug-bounty-hunting-offensive-approach-to-hunt-bugs [https://mega.nz/folder/Ro9zna5I#BwWk-iQnI8JjGTIahNQUpQ * Index of /Compresed/Packt/ [http://s28.bitdl.ir/Compresed/Packt/ * 05. Pentesting - start.me [https://start.me/p/7kj9g2/05-pentesting * Que devez-vous protéger? [https://securityinabox.org/fr/ * Expert led courses for front-end web developers. | egghead.io [https://egghead.io/
Learn_Site_pour_apprendre
* Udemy - Bug Bounty Web Hacking - Learning for Life [http://learningdl.com/udemy-bug-bounty-web-hacking/ * command line – UrFix's Blog [https://blog.urfix.com/tag/command-line/ * logiciel pfsense | www.osnet.eu [https://www.osnet.eu/fr/articles-by-category/logiciel-pfsense * Category:Attack - OWASP [https://www.owasp.org/index.php/Category:Attack * Introduction · pentestbook [https://chryzsh.gitbooks.io/pentestbook/ * Bug Bounty - Hacker Powered Security Testing | HackerOne [https://www.hackerone.com/ * SQLBolt - Learn SQL - Introduction to SQL [https://sqlbolt.com/ * Please help on "hackthebox" challenge - Support / Beginner Guides - 0x00sec - The Home of the Hacker [https://0x00sec.org/t/please-help-on-hackthebox-challenge/3370 * GitLab-Adsita [https://sources.ntic.fr/ * Expert led courses for front-end web developers. | egghead.io [https://egghead.io/
NOCODE
* Formation No Code : Guide pour se former au No Code en 2022 [https://nocodestation.com/formation-no-code/ * The best way to build web apps without code | Bubble [https://bubble.io/ * Le nocode Libre et Open Source pour apps mobile et web - Rédacteurs - Framacolibri [https://framacolibri.org/t/le-nocode-libre-et-open-source-pour-apps-mobile-et-web/13260 * Qu'est-ce que le No Code ? Le Guide Petit Hack [https://www.petithack.com/blog/no-code * Initiez-vous au no-code par la pratique | Initiation aux No-code Ops par Contournement [https://www.contournement.io/formations/initiation-no-code * Formation no code gratuite : Initiation à Bubble et Adalo | Ottho [https://www.ottho.co/sinitier-au-no-code?formation-categorie=e-learning-i#programme * Créer sa 1ère application sur Bubble - Partie 1 - YouTube [https://www.youtube.com/watch?v=m8B01KC1EJU
FAKE_MAIL
* The 7 Best Sites to Prank Your Friends With Fake Email Messages [https://www.makeuseof.com/tag/deadfake-send-fake-anonimous-email-messages/ * Emkei's Fake Mailer [https://emkei.cz/ * FakeUpdate.net - Windows Update Prank by fediaFedia [https://fakeupdate.net/
TOP_TOP_Liens
* Candidater |fr] Locali [https://www.locali.fr/candidature/ * vm [https://www.onworks.net/programs/vm-online * Voice Dictation - Online Speech Recognition [https://dictation.io/ * Remover [https://remover.zmo.ai/ * Resource Cards - Selected free resources for designers [https://resourcecards.com/ * unDraw - Open source illustrations for any idea [https://undraw.co/ * One Complete Solution to Manage Risk | Drata [https://drata.com/product/risk-management * Midjourney [https://midjourney.com/ * Tips for designing and delivery great PowerPoint presentations. — Garr Reynolds [https://www.garrreynolds.com/tips * L'outil de productivité le plus puissant : Notion - YouTube [https://www.youtube.com/watch?v=_HGQKRv-wQI&list=PLUULu5_LYAtue5_6y32aEbfzwm5SbAOo4 * / ViewPure [https://www.viewpure.com/cNc8fqIjyVA?start=0&end=0 * / ViewPure [https://www.viewpure.com/5MgBikgcWnY?start=0&end=0 * Scan Report Nmap 7.80 [https://htmlpreview.github.io/?https://github.com/honze-net/nmap-bootstrap-xsl/blob/master/scanme.html# * An0nud4y [https://an0nud4y.com/ * twitch.tv passwords - BugMeNot. [https://bugmenot.com/view/twitch.tv
UTUBE
* IppSec - YouTube [https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA * TechWorld with Nana - YouTube [https://www.youtube.com/channel/UCdngmbVKX1Tgre699-XLlUA * The Shadow Brokers - YouTube [https://www.youtube.com/channel/UCkpwPf2B4FphjqVcozDym0A * HackerSploit - YouTube [https://www.youtube.com/channel/UC0ZTPkdxlAKf-V33tqXwi3Q * LiveOverflow - YouTube [https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w * John Hammond - YouTube [https://www.youtube.com/user/RootOfTheNull * Penetration Testing in Linux - YouTube [https://www.youtube.com/channel/UC286ntgASMskhPIJQebJVvA * Null Byte - YouTube [https://www.youtube.com/channel/UCgTNupxATBfWmfehv21ym-g * webpwnized - YouTube [https://www.youtube.com/user/webpwnized * Grafikart.fr - YouTube [https://www.youtube.com/user/grafikarttv/videos * securityidiots.com - YouTube [https://www.youtube.com/channel/UCPPAYs04kwfXcHnerm_ueFw * ErrOr SquaD - YouTube [https://www.youtube.com/channel/UCou-7r8Mk4oQcBmazxp5uwg/videos * https://www.youtube.com/@reconless1983/videos [https://www.youtube.com/@reconless1983/videos * Harshil Darji - YouTube [https://www.youtube.com/user/darjiharshil2994/videos * Michael LaSalvia - YouTube [https://www.youtube.com/user/genxweb/videos * LiveOverflow - YouTube [https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/playlists * Greenred Productions - Relaxing Music - YouTube [https://www.youtube.com/channel/UC1bjWVLp2aaJmPcNbi9OOsw * Chaz Rough - YouTube [https://www.youtube.com/channel/UCXDrbX-ATVxWLhzVPuk2RGQ * mozart husayn - YouTube [https://www.youtube.com/channel/UCIPAqm9e_uem9TA9SgPxkGg/videos?shelf_id=0&sort=dd&view=0 * Derek Rook - YouTube [https://www.youtube.com/channel/UCMACXuWd2w6_IEGog744UaA * Bug Bounty: Complete Web Hacking Course | Earn by hacking legally - YouTube [https://www.youtube.com/watch?v=7USUiBJDm3M * HackerOne - YouTube [https://www.youtube.com/channel/UCsgzmECky2Q9lQMWzDwMhYw/featured * How To Shot Web - Jason Haddix's talk from DEFCON23 - YouTube [https://www.youtube.com/watch?v=VtFuAH19Qz0&feature=youtu.be * Bug Bounty Hunting Methodology v2 - Jason Haddix from Bugcrowd's LevelUp 2017 - YouTube [https://www.youtube.com/watch?v=C4ZHAdI8o1w&feature=youtu.be * DEF CON 25 - Jason Haddix - Introducing HUNT Data Driven Web Hacking & Manual Testing - YouTube [https://www.youtube.com/watch?v=0CU75vPfIS4&feature=youtu.be * Tales of a Bug Bounty Hunter - Arne Swinnen - YouTube [https://www.youtube.com/watch?v=Ehq6ofUbslI&feature=youtu.be * Programming / Coding / Hacking music - YouTube [https://www.youtube.com/playlist?list=PLUja9J5M1XReqoBal5IKog_PWz2Q_hZ7Y&disable_polymer=true * Programming / Coding / Hacking music vol.18 (ANONYMOUS HEADQUARTERS) - YouTube [https://www.youtube.com/watch?v=qoma-IpMdV8&list=RDqoma-IpMdV8&start_radio=1 * Learn English Conversation - English Today Beginner Level 1 - DVD 1 - YouTube [https://www.youtube.com/watch?v=7oOX48NOyTQ&list=PLjPWtACbY0xlKUBEFrZKfALxTS8hHwWEt * Bugcrowd University - Introduction to Burp Suite - YouTube [https://www.youtube.com/watch?v=h2duGBZLEek * Web App Penetration Testing - YouTube [https://www.youtube.com/playlist?list=PLBf0hzazHTGO3EpGAs718LvLsiMIv9dSC * GynvaelEN - YouTube [https://www.youtube.com/user/GynvaelEN * Blues & Rock Ballads Relaxing Music Vol.4 - YouTube [https://www.youtube.com/watch?v=tSSxFFy5Bak&list=RDtSSxFFy5Bak&start_radio=1&t=8 * Relaxing Blues Music | Vol 7 Mix Songs | Rock Music 2018 HiFi - YouTube [https://www.youtube.com/watch?v=5nd9GtfFTMk&list=RD5nd9GtfFTMk&start_radio=1&t=5 * Relaxing Blues Music 2017 | D Man Ain't Enough Whiskey | www.RelaxingBlues.Com - YouTube [https://www.youtube.com/watch?v=oCF15jPMfIA&list=PLa_JSgSQfk1nvwyACbe1uxbxLptU4UIob * Synology - YouTube [https://www.youtube.com/user/synologyinc * YouTube [https://www.youtube.com/watch?v=caRgbJZRHzw&feature=youtu.be * Learn English conversation - English Today Beginner Level - YouTube [https://www.youtube.com/playlist?list=PLjPWtACbY0xlKUBEFrZKfALxTS8hHwWEt * The Cyber Mentor - YouTube [https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw/videos * Zero to Hero Pentesting: Episode 1 - Course Introduction, Notekeeping, Introductory Linux, and AMA - YouTube [https://www.youtube.com/watch?v=qlK174d_uu8&list=PLLKT__MCUeiwBa7d7F_vN1GUwz_2TmVQj * ちとくちとく - YouTube [https://www.youtube.com/channel/UCofgQ7mDpWfHu2_i2pJoQRA * sam bowne web - YouTube [https://www.youtube.com/results?search_query=sam+bowne+web * Ludovic Guérin - Cours de SI - YouTube [https://www.youtube.com/channel/UCKePSV3VZrLFDexdTNh5PTw/videos * Full Ethical Hacking Course - Network Penetration Testing for Beginners (2019) - YouTube [https://www.youtube.com/watch?v=3Kq1MIfTWCE * SAVEVIDEO.ME: Télécharger Dailymotion vidéos, Vimeo, Facebook, Twitter et l'autres! [http://savevideo.me/fr/ * Recon, Scanning, And Being Stealthy | Yuki Chan - Automate Pentest - Sur Up-Tube.com [https://up-tube.com/upvideo/cm6-2tuuM8R * STÖK - YouTube [https://www.youtube.com/c/STOKfredrik/playlists * Guided Hacking - YouTube [https://www.youtube.com/channel/UCCMi6F5Ac3kQDfffWXQGZDw * InsiderPhD - YouTube [https://www.youtube.com/c/InsiderPhD/playlists * Mark Grimes - YouTube [https://www.youtube.com/channel/UCEZz_xKyZ-mhY5L5rluykvw/videos * Everlaab - YouTube [https://www.youtube.com/channel/UCyhxxX9rvuoA_7EptWonUpA * The Complete Open Source Intelligence (OSINT) Training Course - YouTube [https://www.youtube.com/watch?v=opLD4zFB5z0 * inCyber - YouTube [https://www.youtube.com/channel/UCqAUmpTXbid8sLp6c--xeHg * Vérifier l’information en ligne (techniques OSINT): atelier en ligne (gratuit) - YouTube [https://www.youtube.com/watch?v=eksCOUZhhT4 * TryHackMe Intro to Windows Official Walkthrough - YouTube [https://www.youtube.com/watch?v=87TSrJTxD54&list=PLsqUCyw0Jf9tAXTNPmDixY6ASkrOm_7tm&index=4 * Buffer Overflows Made Easy - YouTube [https://www.youtube.com/playlist?list=PLLKT__MCUeix3O0DPbmuaRuR_4Hxo4m3G * Centralisez et sécurisez votre annuaire Active Directory - OpenClassrooms [https://openclassrooms.com/fr/courses/2222496-centralisez-et-securisez-votre-annuaire-active-directory * Practical Mobile app attacks by Example Workshop - OWASP Czech Day - YouTube [https://www.youtube.com/watch?v=EmlJpYrrzj0 * zseano - YouTube [https://www.youtube.com/c/zseano * The Top Ten Reasons It’s GREAT to Be a Pen Tester - SANS Pen Test HackFest Summit 2018 - YouTube [https://www.youtube.com/watch?v=WTN7n7744B4 * SANS Offensive Operations - YouTube [https://www.youtube.com/c/SANSOffensiveOperations/videos * HACKERLOI.pdf - YouTube [https://www.youtube.com/watch?v=Zj_7Wunnu2w * Learn Cybersecurity: OpenVAS Scan, Ingreslock And Secure Shell Exploit - YouTube [https://www.youtube.com/watch?v=1YQG_xeXdWg&list=PL0-xwzAwzllx4w5OYdRoVTqlNvQ7xALNM * Loi Liang Yang - YouTube [https://www.youtube.com/c/LoiLiangYang * How Hackers Launch PDF Virus File And How We Can Protect Ourselves! (Cybersecurity) - YouTube [https://www.youtube.com/watch?v=3RSn9JwnWlQ * HTML + CSS + JavaScript introduction - web 0x00 - YouTube [https://www.youtube.com/watch?v=jmgsgjPn1vs&list=PLhixgUqwRTjx2BmNF5-GddyqZcizwLLGP * MIT App Inventor - YouTube [https://www.youtube.com/c/MITAppInventor123 * naitech - YouTube [https://www.youtube.com/@naitech-nsa/playlists * PenTest Workshop - YouTube [https://www.youtube.com/@PenTestWorkshop * 106 PowerShell Secrets and Tactics Ben0xA - YouTube [https://www.youtube.com/watch?v=mPPv6_adTyg * Vilebrequin - YouTube [https://www.youtube.com/@Vilebrequin * horizon-gull - YouTube [https://www.youtube.com/@horizongull * DEFCONConference - YouTube [https://www.youtube.com/@DEFCONConference * Sam Bowne - YouTube [https://www.youtube.com/@sambowne * Azarath - YouTube [https://www.youtube.com/channel/UCFGsKf-N3pk7xg-PUUgCDSA * Sandoz - YouTube [https://www.youtube.com/channel/UCnC8KCcp2-DYfPY4_bKIc0A * Monsieur Bidouille - YouTube [https://www.youtube.com/channel/UCSULDz1yaHLVQWHpm4g_GHA * GDG France - YouTube [https://www.youtube.com/channel/UCx83f-KzDd3o1QK2AdJIftg * Devoxx FR - YouTube [https://www.youtube.com/channel/UCsVPQfo5RZErDL41LoWvk0A/featured * Hak5 - YouTube [https://www.youtube.com/user/Hak5Darren * inCyber - YouTube [https://www.youtube.com/@inCyberMedia/videos * Samsa.fr - YouTube [https://www.youtube.com/@samsa_fr/videos * CodeAvecJonathan - YouTube [https://www.youtube.com/@CodeAvecJonathan * Susanth Sutheesh - YouTube [https://www.youtube.com/@SusanthSutheesh * zseano - YouTube [https://www.youtube.com/@zseano * Tutorials Point - YouTube [https://www.youtube.com/@TutorialsPoint_ * Motasem Hamdan - YouTube [https://www.youtube.com/@MotasemHamdan * freeCodeCamp.org - YouTube [https://www.youtube.com/@freecodecamp * Mantis - YouTube [https://www.youtube.com/@MantisSTS * Adrian Crenshaw - YouTube [https://www.youtube.com/@irongeek * STÖK - YouTube [https://www.youtube.com/@STOKfredrik * Bug Bounty 2022 Guide: Where to focus // How to make money // How to get started today - YouTube [https://www.youtube.com/watch?v=-2eVJRBNzY0 * Farah Hawa - YouTube [https://www.youtube.com/@FarahHawa/videos * John Hammond - YouTube [https://www.youtube.com/@_JohnHammond * Hack & Dev avec Rémi - YouTube [https://www.youtube.com/@remi-cybersec * securityguideme - YouTube [https://www.youtube.com/@securityguideme/videos * Black Hat - YouTube [https://www.youtube.com/@BlackHatOfficialYT * Hacker Vlog - YouTube [https://www.youtube.com/@HackerVlog * YesWeHack - YouTube [https://www.youtube.com/@yeswehack8608 * Black & White Security - YouTube [https://www.youtube.com/@cybersecurity-/videos * intigriti - YouTube [https://www.youtube.com/@intigriti * Bug Bounty Tutorials - YouTube [https://www.youtube.com/@BugBountyTutorials/videos * Cybr - YouTube [https://www.youtube.com/@Cybrcom * HackHappy - YouTube [https://www.youtube.com/@HackhappyOrg * Grafikart.fr - YouTube [https://www.youtube.com/@grafikart * CyberSecurityTV - YouTube [https://www.youtube.com/@CyberSecurityTV * Ethical Hacking Indonesia - YouTube [https://www.youtube.com/@benediktussava * Rana Khalil - YouTube [https://www.youtube.com/@RanaKhalil101 * Rana Khalil - YouTube [https://www.youtube.com/@RanaKhalil101 * zSecurity - YouTube [https://www.youtube.com/@zSecurity * thenewboston - YouTube [https://www.youtube.com/@thenewboston * S4WR42 - YouTube [https://www.youtube.com/@s4wr426 * Netsec Explained - YouTube [https://www.youtube.com/@NetsecExplained * Cyber Academy - YouTube [https://www.youtube.com/@CyberAcademyHindi * xavki - YouTube [https://www.youtube.com/@xavki * Rana Khalil - YouTube [https://www.youtube.com/@RanaKhalil101/playlists * CVE.report - Home [https://cve.report/ * TechWorld with Nana - YouTube [https://www.youtube.com/@TechWorldwithNana * BUG HUNTER UNIVERSITY - YouTube [https://www.youtube.com/playlist?list=PLY-vqlMAnJ9bGoI82H1BB8BE4A8H2OCA-&cbrd=1&themeRefresh=1 * Hackintux - YouTube [https://www.youtube.com/@hackintux5813 * processus thief - YouTube [https://www.youtube.com/results?search_query=processus+thief * PowerShell for Pentesters - YouTube [https://www.youtube.com/playlist?list=PLJQHPJLj_SQatUsJy3O4k-VQlllquDmDr * Screen sharing in Apache Gaucamole - YouTube [https://www.youtube.com/watch?v=MXywMfXD_8I * Guacamole Remote Desktop - Open Source, Self Hosted remote access to your machines in the browser! - YouTube [https://www.youtube.com/watch?v=DGw6P5Lkj-U * Black Hat USA 2013 - HOW CVSS is DOSsing YOUR PATCHING POLICY (and wasting your money) - YouTube [https://www.youtube.com/watch?v=_laE5mp1Nl8 * Victor de Martrin - YouTube [https://www.youtube.com/channel/UC995AyG92eh2LDaedXje8mQ * HackinGeeK - YouTube [https://www.youtube.com/c/HackinGeeK/videos * https://www.youtube.com/channel/UC8butISFwT-Wl7EV0hUK0BQ [https://www.youtube.com/channel/UC8butISFwT-Wl7EV0hUK0BQ * xavki - YouTube [https://www.youtube.com/channel/UCs_AZuYXi6NA9tkdbhjItHQ/playlists?view=50&sort=dd&shelf_id=12&view_as=subscriber * SentinelOne Management Console Tour - YouTube [https://www.youtube.com/embed/SHAcB9WzwTg * How To Make A Cluster Computer (Part 1) - YouTube [https://www.youtube.com/watch?v=1R0UgIgcb5g * SANS Offensive Operations - YouTube [https://www.youtube.com/@SANSOffensiveOperations * 🔴 Webinaire - Cobalt Strike : Découverte, Simulation, Détection et protection. - YouTube [https://www.youtube.com/watch?v=AhKtJWcsc94 * Red Team Ops with Cobalt Strike - Operations (1 of 9) - YouTube [https://www.youtube.com/watch?v=i6tsLWrCiGE&list=PLcjpg2ik7YT6H5l9Jx-1ooRYpfvznAInJ * Black Hills Information Security - YouTube [https://www.youtube.com/@BlackHillsInformationSecurity/videos * Pentester Academy TV - YouTube [https://www.youtube.com/channel/UChjC1q6Ami7W0E71TzPZELA * THEGREENBOW - YouTube [https://www.youtube.com/@thegreenbow1357 * Naveenkumar S - YouTube [https://www.youtube.com/@naveenkumars8244 * OffSec Live | Web Application Assessment Essentials: Web Attacker Methodology - YouTube [https://www.youtube.com/watch?v=_mUqA-lBLTc&list=PLJrSyRNlZ2Ecrihsz_H5mXYoCmWZDqXyI&index=16 * OffSec - YouTube [https://www.youtube.com/@OffSecTraining/videos * Dark Web Documentary 01 Getting Setup with Tails Linux - YouTube [https://www.youtube.com/watch?v=QTIzSz73yYU&list=PL1H1sBF1VAKU8aP5FC-makTTBknb1EWYC * Pour 1nf0 - la Cyber expliquée - YouTube [https://www.youtube.com/@Pour1nfo/videos * https://www.youtube.com/@Micmaths?cbrd=1&themeRefresh=1 [https://www.youtube.com/@Micmaths?cbrd=1&themeRefresh=1 * James Lyne: Everyday cybercrime -- and what you can do about it | TED Talk [https://www.ted.com/talks/james_lyne_everyday_cybercrime_and_what_you_can_do_about_it * Cyber Spider - YouTube [https://www.youtube.com/@technicalspider9812 * KBTrainings En Français - YouTube [https://www.youtube.com/@KBTrainings_fr/playlists * Configuration Du Pare-feu FortiGate 80D: VLAN, WAN, DHCP, Regles IPv4 | Vidéo#4: Réseau Domestique 🏠 - YouTube [https://www.youtube.com/watch?v=RB0DfizwroI
Veille
* DorkSearch - Speed up your Google Dorking [https://www.dorksearch.com/ * Home - IT Security Guru [https://www.itsecurityguru.org/ * Uniqkey Features: Built for IT, Designed for Employees [https://www.uniqkey.eu/features * Hacking - IT Security Guru [https://www.itsecurityguru.org/category/hacking-news/ * The Cybersecurity Podcast Network - Security Weekly | SC Media | SC Media [https://www.scmagazine.com/security-weekly * BFT [https://mrfreetools.com/tools/?s=09 * How to Test Endpoint Security with Red Teaming | CrowdStrike [https://www.crowdstrike.com/blog/how-to-test-endpoint-security-with-red-teaming/ * BtoBradio.TV | Recherche pour RSSI [https://btobradio.tv/search * ComCyberGend et les entreprises [https://www.thegreenbow.com/fr/ressource/webtv/cybercriminalite-comment-le-comcybergend-combat-aux-cotes-des-entreprises/ * Cybersécurité Solutions [https://www.cybersecurite-solutions.com/ * Business Software and Services Reviews | G2 [https://www.g2.com/ * Actualités sur la sécurité informatique | IT-Connect [https://www.it-connect.fr/actualites/actu-securite/ * Sites web les plus visités - Top sites web classés pour février 2022 | Similarweb [https://www.similarweb.com/fr/top-websites/ * Dashboard - Pulsedive [https://pulsedive.com/dashboard/ * Data Security Breach – L'actualité cybersécurité pour PME/PMI/TPE [https://www.datasecuritybreach.fr/ * AttackIQ Academy [https://attackiq.com/ * RISKS-LIST: RISKS-FORUM Digest [https://catless.ncl.ac.uk/Risks/ * ZATAZ [https://www.zataz.com/ * Directory of ATT&CK Open Source Tools [https://www.attack-community.org/directory/ * Laique.eu – Informations sur les cyberattaques [https://laique.eu/ * Free Premium Exam Dumps - Real Exam Q&A | CertLibrary.com [https://www.certlibrary.com/ * https://tria.ge/reports/public [https://tria.ge/reports/public * Zero-Day Exploit Targeting Popular Java Library Log4j [https://www.govcert.ch/blog/zero-day-exploit-targeting-popular-java-library-log4j/ * Directory of ATT&CK Open Source Tools [https://www.attack-community.org/directory/ * Hack Today — The Home of Hackers! [https://www.hacktoday.io/ * ISO27k infosec management standards [https://www.iso27001security.com/ * InQuest Labs - InQuest.net [https://labs.inquest.net/ * infond: légalité du scan de port [http://www.infond.fr/2010/09/legalite-du-scan-de-port.html * La protection juridique du "pentester", prestataire de test d’intrusion informatique. Par Pablo Nicoli, Avocat. [https://www.village-justice.com/articles/protection-juridique-pentester-prestataire-test-intrusion-informatique,35615.html * Google Colab [https://colab.research.google.com/github/ * technique et droit du numérique = le blog tout en BD ! [https://technique-et-droit-du-numerique.fr/ * Video Archives – Horizon3.ai [https://www.horizon3.ai/category/videos/ * Researchers have developed CVE-2022-40684 PoC exploit code [https://securityonline.info/researchers-have-developed-cve-2022-40684-poc-exploit-code/ * RasPwn OS – Un OS vulnérable à mettre sur Raspberry Pi [https://korben.info/raspwn-os-raspberry-pi.html * How does AutoPWN Suite work? | PWN SPOT! [https://pwnspot.com/posts/AutoPWN/ * Experts show how to bypass Windows Hello feature to login on Windows 10 PCsSecurity Affairs [https://securityaffairs.co/wordpress/120278/hacking/windows-hello-bypass.html * https://www.cynet.com/blog/ [https://www.cynet.com/blog/ * https://www.globalsecuritymag.fr/ [https://www.globalsecuritymag.fr/ * https://www.anomali.com/blog [https://www.anomali.com/blog * https://inquest.net/blog [https://inquest.net/blog * https://exchange.xforce.ibmcloud.com/search/%23ransomware [https://exchange.xforce.ibmcloud.com/search/%23ransomware * https://observatoire-fic.com/ [https://observatoire-fic.com/ * https://www.globalsign.com/fr/blog [https://www.globalsign.com/fr/blog * https://cyberguerre.numerama.com/ [https://cyberguerre.numerama.com/ * https://cybergordon.com/ [https://cybergordon.com/ * https://www.informatiquenews.fr/news/securite [https://www.informatiquenews.fr/news/securite * https://www.arsouyes.org/ [https://www.arsouyes.org/ * https://us-cert.cisa.gov/ncas [https://us-cert.cisa.gov/ncas * https://infosecwriteups.com/ [https://infosecwriteups.com/ * https://www.auscert.org.au/resources/security-bulletins/ [https://www.auscert.org.au/resources/security-bulletins/ * https://www.scoop.it/topic/securite-informatique-by-dcit-conseil [https://www.scoop.it/topic/securite-informatique-by-dcit-conseil * https://www.esecurityplanet.com/ [https://www.esecurityplanet.com/ * http://cve.circl.lu/ [http://cve.circl.lu/ * https://www.opencti.net.br/ [https://www.opencti.net.br/ * https://pulsedive.com/ [https://pulsedive.com/ * https://www.journalduhacker.net/t/s%C3%A9curit%C3%A9/page/1 [https://www.journalduhacker.net/t/s%C3%A9curit%C3%A9/page/1 * https://www.kali-linux.fr/ [https://www.kali-linux.fr/ * https://news.torii-security.fr/ [https://news.torii-security.fr/ * https://lobste.rs/t/security [https://lobste.rs/t/security * https://www.geeek.org/chaines-youtube-geek/ [https://www.geeek.org/chaines-youtube-geek/ * https://www.undernews.fr/ [https://www.undernews.fr/ * https://www.usine-digitale.fr/cybersecurite/ [https://www.usine-digitale.fr/cybersecurite/ * https://siecledigital.fr/cybersecurite/ [https://siecledigital.fr/cybersecurite/ * https://malwaredevil.com/ [https://malwaredevil.com/ * http://morningstarsecurity.com/security-twitterverse [http://morningstarsecurity.com/security-twitterverse * https://attackerkb.com/ [https://attackerkb.com/ * https://linc.cnil.fr/ [https://linc.cnil.fr/ * https://malpedia.caad.fkie.fraunhofer.de/actor/fin8 [https://malpedia.caad.fkie.fraunhofer.de/actor/fin8 * https://s.tencent.com/research/bsafe/ [https://s.tencent.com/research/bsafe/ * https://www.opencve.io/cve [https://www.opencve.io/cve * https://www.auscert.org.au/resources/security-bulletins/ [https://www.auscert.org.au/resources/security-bulletins/ * https://cyber.gc.ca/en/alerts-advisories [https://cyber.gc.ca/en/alerts-advisories * https://www.hkcert.org/security-bulletin [https://www.hkcert.org/security-bulletin * https://portswigger.net/daily-swig [https://portswigger.net/daily-swig * https://cxsecurity.com/ [https://cxsecurity.com/ * https://www.pensezcybersecurite.gc.ca/fr/ressources [https://www.pensezcybersecurite.gc.ca/fr/ressources * https://news.torii-security.fr/t/Certfr [https://news.torii-security.fr/t/Certfr * https://veille-cyber.com/ [https://veille-cyber.com/ * https://www.anomali.com/ [https://www.anomali.com/ * https://www.cert-ist.com/public/fr/home [https://www.cert-ist.com/public/fr/home * Malware Trends Tracker | ANY.RUN [https://any.run/malware-trends/ * Weakpass [https://weakpass.com/download * Cyber Range Training | SANS Institute [https://www.sans.org/cyber-ranges/ * Tools - Intelligence X [https://intelx.io/tools?tab=general * Vumetric Cybersecurity Portal [https://cyber.vumetric.com/ * Information Security Stack Exchange [https://security.stackexchange.com/ * Phonebook.cz - Intelligence X [https://phonebook.cz/ * BleepingComputer.com - Technology news and support [https://www.bleepingcomputer.com/ * InfoSec Write-ups [https://infosecwriteups.com/?gi=a227bdd976ec * FireHOL IP Lists | IP Blacklists | IP Blocklists | IP Reputation [https://iplists.firehol.org/#aboutCollapseOne * Les Appels à Candidature [https://alternatif-art.com/index.php/les-appels-a-candidature * Dashboard - Pulsedive [https://pulsedive.com/dashboard/ * Hacking – Just For Fun [http://hacking.thewebcreation.fr/ * HTTPCS - Dernières actualités [https://www.httpcs.com/news * Offres d'emploi informatique et développeurs [http://emploi.developpez.com/ * ITIL® [http://wiki.octopus-itsm.com/fr/article-categories/itilr * sur InformatiqueNews.fr : toute l'actu et les tendances [https://www.informatiquenews.fr/news/securite/page/2 * TWikiSecurity [[ Codev [[ TWiki [https://twiki.org/cgi-bin/view/Codev/TWikiSecurity * IT Security News and Cybersecurity News - IT Security Guru [https://www.itsecurityguru.org/ * Infosecurity Magazine - Information Security & IT Security News and Resources [https://www.infosecurity-magazine.com/ * RiskInsight - Le blog des experts cybersécurité Wavestone [https://www.riskinsight-wavestone.com/ * Linux – My Server – Anthesia.NET [https://www.anthesia.net/linux-my-server/ * https://blog.httpcs.com/ [https://blog.httpcs.com/ * https://securite.developpez.com/ [https://securite.developpez.com/ * https://thehackernews.com/ [https://thehackernews.com/ * https://www.ethicalhacker.net/ [https://www.ethicalhacker.net/ * https://rmll.ubicast.tv/channels/#securite-entre-transparence-et-opacite_77315 [https://rmll.ubicast.tv/channels/#securite-entre-transparence-et-opacite_77315 * https://www.xmco.fr/actusecu/ [https://www.xmco.fr/actusecu/ * https://nakedsecurity.sophos.com/ [https://nakedsecurity.sophos.com/ * hackers - toute l'actualité [https://siecledigital.fr/tag/hackers/ * https://otx.alienvault.com/dashboard/new [https://otx.alienvault.com/dashboard/new * jetlib.sec [https://sec.jetlib.com/search.php * Security Strategy – phoenixNAP Blog [https://phoenixnap.com/blog/category/security-strategy * /root Archives - The Ethical Hacker Network [https://www.ethicalhacker.net/category/features/root/ * SHAttered - CloudBleed - NoLimitSecu [https://www.nolimitsecu.fr/shattered-cloudbleed/ * Ransomware attack leads to shutdown of major U.S. pipeline system - Malware Devil [https://malwaredevil.com/2021/05/08/ransomware-attack-leads-to-shutdown-of-major-u-s-pipeline-system/?utm_campaign=twitter&utm_medium=twitter&utm_source=twitter * Alertes | Accompagnement Cybersécurité des Structures de Santé [https://cyberveille-sante.gouv.fr/alertes * LINC [http://linc.cnil.fr/ * Hackers Repository | Latest Hacking Tools - Haxf4rall [https://haxf4rall.com/ * CyberScoop [https://www.cyberscoop.com/ * Open-source-tools-for-CTI/README.md at master · BushidoUK/Open-source-tools-for-CTI · GitHub [https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.md * GreenLock Advisory [https://greenlock.ghost.io/ * Actualités sécurité, piratage, hacking et cybercriminalité [https://www.01net.com/actualites/securite/ * HOTforSecurity – The blog on the sizzling world of computer security: steamy stories from the dynamic world of internet fraud, scams, malware – and gossip. Powered by Bitdefender. [https://hotforsecurity.bitdefender.com/ * Coronavirus | Futura Santé [https://www.futura-sciences.com/sante/medecine/coronavirus/ * Actualités et information IT [https://www.lemagit.fr/actualites * How to Protect Kubernetes Clusters from Cyberthreats | Hacker Noon [https://hackernoon.com/search?query=ansible * Tags | Geeek [https://www.geeek.org/tags/ * Exploit Development [https://www.reddit.com/r/ExploitDev/ * La cyber-sécurité - Faits et chiffres | Statista [https://fr.statista.com/themes/3680/la-cyber-securite/ * Home - Security Boulevard [https://securityboulevard.com/ * InQuest Labs - InQuest.net [https://labs.inquest.net/iocdb/search/FIN8#iocdb-search+ZXlKbUlqcDdJbUZ5ZEdsbVlXTjBYM1I1Y0dVaU9sc2llV0Z5WVhOcFoyNWhkSFZ5WlNJc0luVnliQ0pkZlN3aWJ5STZleUp6YjNKMFJtbGxiR1FpT201MWJHeDlMQ0p3SWpwN2ZYMD0= * Find Open Source By Searching, Browsing and Combining 7,000 Topics [https://awesomeopensource.com/ * La cybersécurité des entreprises - Prévenir et guérir : quels remèdes contre les cyber virus ? [https://www.senat.fr/rap/r20-678/r20-678_mono.html * ThreatMiner.org | Data Mining for Threat Intelligence [https://www.threatminer.org/ * About [https://blog.openthreatresearch.com/about/ * Comment créer un mot de passe sécurisé et simple à retenir ? | economie.gouv.fr [https://www.economie.gouv.fr/particuliers/creer-mot-passe-securise * Irongeek.com [https://www.irongeek.com/ * site:*.github.io intext:cheatsheet+offensive+pentesting wpscan - Recherche Google [https://www.google.com/search?q=site%3A*.github.io+intext%3Acheatsheet%2Boffensive%2Bpentesting+wpscan&sca_esv=570671288&ei=2XkdZauqHL2lkdUPg4iOkAY&ved=0ahUKEwjr-pmk0NyBAxW9UqQEHQOEA2IQ4dUDCA8&uact=5&oq=site%3A*.github.io+intext%3Acheatsheet%2Boffensive%2Bpentesting+wpscan&gs_lp=Egxnd3Mtd2l6LXNlcnAiPnNpdGU6Ki5naXRodWIuaW8gaW50ZXh0OmNoZWF0c2hlZXQrb2ZmZW5zaXZlK3BlbnRlc3Rpbmcgd3BzY2FuSMoUUO8BWIcScAF4AJABAJgBPaABhgOqAQE3uAEDyAEA-AEB4gMEGAEgQYgGAQ&sclient=gws-wiz-serp * 🌌 IP BlackHole [https://ip.blackhole.monster/ * Leo : le chatbot IA qui priorise la confidentialité [https://www.servicesmobiles.fr/leo-le-chatbot-ia-qui-priorise-la-confidentialite-92213
Info_BonnePratique
* Computer Emergency Response Team — Wikipédia [https://fr.wikipedia.org/wiki/Computer_Emergency_Response_Team * Bienvenue sur le site du CLUSIR Rhône-Alpes | Clusir Rhône Alpes [http://www.clusir-rha.fr/
ECOLE_FORMATION
* Hands-on cyber security training brought to life through real-world simulations | CyberStart [https://cyberstart.com/ * CyWARIA - Cympire [https://www.cympire.com/cywaria/
FRAMEWORK
* CAF - Principles and guidance - NCSC.GOV.UK [https://www.ncsc.gov.uk/collection/caf/caf-principles-and-guidance * Cybersecurity Framework | NIST [https://www.nist.gov/cyberframework * OWASP Foundation | Open Source Foundation for Application Security [https://owasp.org/ * OSSTMM 3 - OSSTMM.3.pdf [https://www.isecom.org/OSSTMM.3.pdf
Veille secu 2020
* Sécurité Archives - Cyberguerre [https://cyberguerre.numerama.com/tag/securite/ * CXSECURITY.COM Free Security List [https://cxsecurity.com/ * Catégories - Comparez les prix et les meilleurs outils - Capterra France - 2020 [https://www.capterra.fr/directory * Security [https://news.softpedia.com/cat/Security/ * Bulletins de sécurité | DGSSI [https://www.dgssi.gov.ma/fr/macert/bulletins-de-securite.html * Home - Security Boulevard [https://securityboulevard.com/ * Les Français, mauvais élèves européens de la protection de leurs données – Data Security Breach [https://www.datasecuritybreach.fr/france-donnees-personnelles/
OSSEC-OSSIM
* communities.alienvault.com - Recherche Google [https://www.google.fr/search?q=communities.alienvault.com * Que fait ce code PHP injecté? [https://security.stackovernet.com/fr/q/18693 * system compromise - How do I deal with a compromised server? - Information Security Stack Exchange [https://security.stackexchange.com/questions/39231/how-do-i-deal-with-a-compromised-server) * hacking - How do I deal with a compromised server? - Server Fault [https://serverfault.com/questions/218005/how-do-i-deal-with-a-compromised-server * User Rob Moir - Server Fault [https://serverfault.com/users/7783/rob-moir * @cc_on - JavaScript | MDN [https://developer.mozilla.org/en-US/docs/Web/JavaScript/Microsoft_Extensions/at-cc-on * Open Threat Exchange (OTX) | AlienVault [https://www.alienvault.com/open-threat-exchange * AlienVault - Open Threat Exchange [https://otx.alienvault.com/ * Configuring OSSEC Clients with OSSIM | Muhammad Attique's Blog [http://muhammadattique.com/2015/01/03/configuring-ossec-clients-with-ossim/
CVE
* CVE.report - Home [https://cve.report/ * CVE - Search CVE List [https://cve.mitre.org/cve/search_cve_list.html * Vulnerabilities (CVE) - OpenCVE [https://www.opencve.io/cve * Most recent entries - CVE-Search [http://cve.circl.lu/ * CVE-2021-34527 : PrintNightmare Vulnerability, Exploit and Remediation | ThreatIT - Cyber Security News, Articles & Tutorials [https://threatit.com/articles/cve-2021-34527-printnightmare-vulnerability-exploit-and-remediation/ * GitHub - stanfrbd/searchcve [https://github.com/stanfrbd/searchcve * http://cve.circl.lu/ [http://cve.circl.lu/ * https://www.opencve.io/cve [https://www.opencve.io/cve * CVE - CVE-2021-44228 [https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-44228 * Exploiting log4j (CVE-2021-44228) RCE - YouTube [https://www.youtube.com/watch?v=OJRqyCHheRE * GitHub - christophetd/log4shell-vulnerable-app: Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell. [https://github.com/christophetd/log4shell-vulnerable-app * vulnonym.org - An offensive and otherwise scary human readable name generator for CVEs. · Vulnonym.org [https://vulnonym.org/ * Our CVEs - SentinelOne [https://www.sentinelone.com/labs/our-cves/ * CVE STALKER -The most viral CVE(vulnerability) ranking chart- [https://cvestalker.com/weekly.php * Researchers have developed CVE-2022-40684 PoC exploit code [https://securityonline.info/researchers-have-developed-cve-2022-40684-poc-exploit-code/ * DailyCVE [https://www.reddit.com/r/DailyCVE/ * CVE security vulnerability database. Security vulnerabilities, exploits, references and more [https://www.cvedetails.com/ * CVE Trends - crowdsourced CVE intel [https://cvetrends.com/ * CVE Trends - crowdsourced CVE intel [https://cvetrends.com/
Veille_travail
* Welcome! [https://suip.biz/ * Teleport - YouTube [https://www.youtube.com/c/Gravitational/playlists * Apache Guacamole™ [https://guacamole.apache.org/ * Systancia : Editeur global et indépendant Logiciels de cybersécurité [https://www.systancia.com/ * Boundary by HashiCorp [https://www.boundaryproject.io/ * Implémentation et architecture — Manuel Apache Guacamole v1.4.0 [https://guacamole-apache-org.translate.goog/doc/gug/guacamole-architecture.html?_x_tr_sl=auto&_x_tr_tl=fr&_x_tr_hl=fr * Guacamole, contrôler vos équipements en SSH ou RDP via une interface Web [https://domopi.eu/guacamole-controler-vos-equipements-en-ssh-rdp-ou-vnc-via-une-interface-web/ * Offensive Security Cheatsheet [https://cheatsheet.haax.fr/ * 13 outils gratuits en ligne pour analyser les vulnérabilités et les logiciels malveillants de la sécurité des sites Web [https://geekflare.com/fr/online-scan-website-security-vulnerabilities/ * Spectre: Passwords, Privacy-first [https://spectre.app/ * https://blog.lesspass.com/2016-07-08/comment-ca-marche [https://blog.lesspass.com/2016-07-08/comment-ca-marche * Security Tools Benchmarking [https://sectooladdict.blogspot.com/ * Free Edition - SOCRadar® Cyber Intelligence Inc. [https://socradar.io/free-edition/ * Portail:Sécurité informatique — Wikipédia [https://fr.wikipedia.org/wiki/Portail:S%C3%A9curit%C3%A9_informatique * Top 10 des logiciels de prise en main à distance - Selectronic.fr [https://www.selectronic.fr/informatique/logiciels-de-prise-en-main-a-distance/ * 10 meilleurs logiciels de contrôle à distance pour PC - malekal.com [https://www.malekal.com/meilleurs-logiciels-controle-distance-pc/ * Logiciels de prise en main à distance : meilleurs outils - Capterra France 2022 [https://www.capterra.fr/directory/30928/remote-support/software * Logiciels de prise en main à distance - Meilleurs outils 2022 | GetApp France [https://www.getapp.fr/directory/563/remote-support/software * Attack Surface Intelligence | Recorded Future [https://www.recordedfuture.com/platform/attack-surface-intelligence * Intelligence-Driven Cybersecurity for the Enterprise - Anomali [https://www.anomali.com/ * Freeware – Essai – Démos – Licences – OpenOTP Security Suite – RCDevs Security [https://www.rcdevs.com/fr/try-and-buy/#tbfreewaresep#tbfreewaresep * YumiSign – Digital Signature Platform [https://www.yumisign.com/ * Torturez votre EDR avec Atomic Red Team ! - Rampar [https://www.rampar.com/news/torturez-votre-edr-avec-atomic-red-team/ * Virtual x86 [https://copy.sh/v86/ * OSV [https://osv.dev//#use-the-cli * Kaspersky IT Encyclopedia [https://encyclopedia.kaspersky.com/ * Attaques ciblées : le jeu [http://targetedattacks.trendmicro.com/cyoa/fra/# * Somfy – Ne faites pas entrer le hacker [https://jackstones.somfy.com/#episodes * Guacamole Bastion Host [http://netcubed-ami.s3-website-us-east-1.amazonaws.com/guaws/v2.3.1/
Hunting-Mal
* Malware Corpus Tracker - Download Sites - haas [https://tracker.h3x.eu/ * home [https://suip.biz/ * Welcome! [https://w-e-b.site/ * MalwareSamples (Mr. Malware) · GitHub [https://github.com/MalwareSamples * GitHub - MalwareSamples/Linux-Malware-Samples: Linux Malware Sample Archive including various types of malicious ELF binaries and viruses. Be careful! [https://github.com/MalwareSamples/Linux-Malware-Samples * Malware and Virus Samples | VirusSamples.com [https://www.virussamples.com/ * James Brine - Australian Cyber Threat Intelligence - jamesbrine.com.au [https://jamesbrine.com.au/ * CAPE Sandbox [https://www.capesandbox.com/analysis/ * Curated Intelligence [https://www.curatedintel.org/ * ThreatMiner.org | Data Mining for Threat Intelligence [https://www.threatminer.org/ * searchcode | source code search engine [https://searchcode.com/ * MetaDefender Cloud | Advanced threat prevention and detection [https://metadefender.opswat.com/ * All domains that include facebook - SecurityTrails [https://securitytrails.com/list/keyword/facebook * InQuest Labs - InQuest.net [https://labs.inquest.net/ * Dashboard - Pulsedive [https://pulsedive.com/dashboard/ * Weakpass [https://weakpass.com/download * GitHub - InQuest/malware-samples: A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net [https://github.com/InQuest/malware-samples * AV-ATLAS [https://portal.av-atlas.org/ * UnpacMe Results ebdebe69d2d1252847af7fd1a76f19cfe1d828463374a583829a5ac9d6ba1e8f [https://www.unpac.me/results/00e6c90e-2fac-494e-8371-4148ca36727a#/ * malwares.com [https://www.malwares.com/ * VMRAY [https://www.vmray.com/analyses/ebdebe69d2d1/report/behavior_grouped.html# * Threat Feed | Online Malware Sandbox | VMRay [https://threatfeed.vmray.com/ * 5-Minute Analysis of a Remote Access Trojan | by David French | Threat Punter | Medium [https://medium.com/threatpunter/5-minute-analysis-of-a-remote-access-trojan-c0d085e53d53 * IRIS-H Digital Forensics [https://iris-h.services/pages/dashboard * CyberGordon - Cyber Reputation Checks [https://cybergordon.com/ * Domains containing "fin8" | ThreatMiner.org [https://www.threatminer.org/domains.php?q=FIN8#gsc.tab=0&gsc.q=FIN8&gsc.page=1 * VX Vault [http://vxvault.net/ViriList.php * Hatching Triage | Sandbox for High-Volume Automated Malware Analysis [https://tria.ge/ * Free Automated Malware Analysis Service - powered by Falcon Sandbox - Search results [https://www.hybrid-analysis.com/search?query=c8427258f566f22f7117d3b86b16f806a6eeb9ae * HoneyDB [https://riskdiscovery.com/honeydb/ * Reverss [https://sandbox.anlyz.io/search/files/ * PacketTotal - Malware Archive [https://packettotal.com/malware-archive.html# * InQuest Labs - InQuest.net [https://labs.inquest.net/iocdb/search/FIN8#iocdb-search+ZXlKbUlqcDdJbUZ5ZEdsbVlXTjBYM1I1Y0dVaU9sc2llV0Z5WVhOcFoyNWhkSFZ5WlNJc0luVnliQ0pkZlN3aWJ5STZleUp6YjNKMFJtbGxiR1FpT201MWJHeDlMQ0p3SWpwN2ZYMD0= * ThreatMiner.org | Data Mining for Threat Intelligence [https://www.threatminer.org/ * Talos File Reputation || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence [https://talosintelligence.com/sha_searches * URLhaus | Malware URL exchange [https://urlhaus.abuse.ch/ * MalwareBazaar | Browse malware samples [https://bazaar.abuse.ch/browse.php?search=Softonic * You searched for Softonic | VMRay [https://www.vmray.com/?s=Softonic * Malware Reports - Online Malware Analysis Sandbox [https://app.any.run/submissions * ANY.RUN - Our Benefits For Your Work & Study [https://any.run/why-us/ * Free Automated Malware Analysis Service - powered by Falcon Sandbox [https://www.hybrid-analysis.com/ * VirusTotal [https://www.virustotal.com/gui/ * Automated Malware Analysis Report for https://www.ecomgroup.co/ - Generated by Joe Sandbox [https://www.joesandbox.com/analysis/377531/0/html * MalwareBazaar | Malware sample exchange [https://bazaar.abuse.ch/ * 63b8a0fc...a28c | VMRay Analyzer Report [https://www.vmray.com/analyses/63b8a0fc17f2/report/overview.html * Intezer Analyze [https://analyze.intezer.com/families/dd680674-8e2f-4495-a5cb-53fc7ac28fdc * Automated Malware Analysis Report for sourceinit.dat - Generated by Joe Sandbox [https://www.joesandbox.com/analysis/340839/0/html#overview * "dasmalwerk.eu" [https://dasmalwerk.eu/ * GitHub - NextronSystems/APTSimulator: A toolset to make a system look as if it was the victim of an APT attack [https://github.com/NextronSystems/APTSimulator * MalwareWorld - Checker [https://www.malwareworld.com/ * Free and Open Source Threat Intelligence Feeds - Threat Intelligence [https://www.threat-intel.xyz/ * PhishTank | Join the fight against phishing [https://data.phishtank.com/index.php * Malware Trends Tracker | ANY.RUN [https://any.run/malware-trends/ * Interactive Online Malware Analysis Sandbox - ANY.RUN [https://app.any.run/ * FileZilla_3.51.0_win64_sponsored-setup.exe - Le scanner anti-virus de Jotti [https://virusscan.jotti.org/fr-FR/search/hash/c8427258f566f22f7117d3b86b16f806a6eeb9ae * Cuckoo Sandbox [https://sandbox.pikker.ee/analysis/search/ * The No More Ransom Project [https://www.nomoreransom.org/en/decryption-tools.html * Automated Malware Analysis - Joe Sandbox Cloud Basic [https://www.joesandbox.com/#windows * VirusShare.com [https://virusshare.com/ * SOCIETE NINJA [https://societe.ninja/ * ThreatMiner.org | Data Mining for Threat Intelligence [https://www.threatminer.org/ * Intezer Analyze [https://analyze.intezer.com/analyses/da159b7a-ad91-4023-aa3e-0fc0720caefa * The Ultimate List of SANS Cheat Sheets | SANS Institute [https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/ * Malware Reports - Online Malware Analysis Sandbox [https://app.any.run/submissions/ * Advanced File Analysis System | Valkyrie [https://valkyrie.comodo.com/ * CAPEv2 Sandbox [https://www.capesandbox.com/analysis/search/ * Automated Malware Analysis - Joe Sandbox Cloud Basic [https://www.joesandbox.com/analysispaged/0 * FortiGuard [https://www.fortiguard.com/ * Argus Managed Defence | mnemonic [https://passivedns.mnemonic.no/ * 205.209.152.78 - urlscan.io [https://urlscan.io/result/dae8179f-2136-48b0-95ff-793c6b120cae/#transactions * Passive DNS Simplified Integration Guide - Argus API Documentation - docs.mnemonic.no [https://docs.mnemonic.no/display/public/API/Passive+DNS+Simplified+Integration+Guide * RiskIQ Community Edition [https://community.riskiq.com/home * VirusBay [https://beta.virusbay.io/ * OST Map [https://www.intezer.com/ost-map/# * Malpedia (Fraunhofer FKIE) [https://malpedia.caad.fkie.fraunhofer.de/ * GitHub - rshipp/awesome-malware-analysis: Defund the Police. [https://github.com/rshipp/awesome-malware-analysis * Reverss [https://sandbox.anlyz.io/dashboard * VirusShare.com [https://virusshare.com/ * https://vx-underground.org/samples.html [https://vx-underground.org/samples.html * InQuest Labs - InQuest.net [https://labs.inquest.net/ * MalShare [https://malshare.com/ * malwares.com [https://www.malwares.com/ * malwares.com [https://www.malwares.com/search/tag?tag=exploit * Malware Corpus Tracker - Download Sites - haas [http://tracker.h3x.eu/ * scumware.org - Just another free alternative for security and malware researchers. [https://www.scumware.org/index.php * CyberGordon - Cyber Reputation Checks [https://cybergordon.com/ * 6 Ways to Test if Your Antivirus and Antimalware is Working • Raymond.CC [https://www.raymond.cc/blog/test-the-effectiveness-of-your-antivirus-firewall-and-hips-software/ * Sophos Search [https://search.sophos.com/#q=DocDl...|fr] * Intezer Analyze [https://analyze.intezer.com/ * Synapsint [https://www.synapsint.com/report.php * ShinoSec [https://shinosec.com/ * IP Address Abuse and Blacklist Reporting Site | Live IP Map [https://www.liveipmap.com/ * CAPE Sandbox [https://www.capesandbox.com/analysis/ * FileScan.IO - Next-Gen Malware Analysis Platform [https://www.filescan.io/scan * UnpacMe Live Feed [https://www.unpac.me/feed#/ * Learning with ReversingLabs | How To Videos [https://www.reversinglabs.com/learning-with-reversinglabs/video/how-to * Learning with ReversingLabs | Definition Videos [https://www.reversinglabs.com/learning-with-reversinglabs/video/definition * OST Map [https://www.intezer.com/ost-map/ * URLhaus | Browse [https://urlhaus.abuse.ch/browse/ * GitHub - qnighy/ransomware-demo: A proof-of-concept for ransomware encryption [https://github.com/qnighy/ransomware-demo * MalwareTech - Everything Cyber Security [https://www.malwaretech.com/ * Winitor [https://www.winitor.com/ * Shota Shinogi (Sh1n0g1) | Sh1n0g1.github.io [https://sh1n0g1.github.io/ * Hasherezade's projects [https://hasherezade.github.io/ * Comment développer une sandbox d'analyse des malware à l'aide d'Elastic Security | Elastic Blog [https://www.elastic.co/fr/blog/how-to-build-a-malware-analysis-sandbox-with-elastic-security * Ransomware Simulators - Reality or a Bluff? - Palo Alto Networks Blog [https://www.paloaltonetworks.com/blog/security-operations/ransomware-simulators-reality-or-a-bluff/ * ThreatFox | Share Indicators Of Compromise (IOCs) [https://threatfox.abuse.ch/ * SOC Prime Blog [https://socprime.com/blog/ * group profiles [https://ransomwatch.telemetry.ltd/#/profiles?id=lockbit2 * Submit a file for malware analysis - Microsoft Security Intelligence [https://www.microsoft.com/en-us/wdsi/filesubmission * Decoding Malicious PowerShell Activity - A Case Study - Blog - Sophos Labs - Sophos Community [https://community.sophos.com/sophos-labs/b/blog/posts/decoding-malicious-powershell * 5 Minute Forensics: Decoding PowerShell Payloads Tevora [https://www.tevora.com/threat-blog/5-minute-forensics-decoding-powershell-payloads/ * Ransomware.live [https://www.ransomware.live/#/
MAP_ATTACK
* https://cybermap.kaspersky.com/ [https://cybermap.kaspersky.com/ * AV-ATLAS [https://portal.av-atlas.org/ * https://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=18763&view=map [https://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=18763&view=map * https://threatmap.bitdefender.com/ [https://threatmap.bitdefender.com/ * https://www.imperva.com/cyber-threat-index/ [https://www.imperva.com/cyber-threat-index/ * https://securitycenter.sonicwall.com/m/page/worldwide-attacks [https://securitycenter.sonicwall.com/m/page/worldwide-attacks * https://horizon.netscout.com/ [https://horizon.netscout.com/ * https://map.lookingglasscyber.com/ [https://map.lookingglasscyber.com/ * https://www.spamhaustech.com/threat-map/ [https://www.spamhaustech.com/threat-map/ * https://talosintelligence.com/fullpage_maps/pulse?cf_chl_jschl_tk=pmd_yP.SGTs7XqETcMYLi_zpl_S.gBDexADJM4ImX6l56aI-1630307729-0-gqNtZGzNAiWjcnBszQjl [https://talosintelligence.com/fullpage_maps/pulse?__cf_chl_jschl_tk__=pmd_yP.SGTs7XqETcMYLi_zpl_S.gBDexADJM4ImX6l56aI-1630307729-0-gqNtZGzNAiWjcnBszQjl * https://threatmap.checkpoint.com/ [https://threatmap.checkpoint.com/ * https://www.fireeye.com/cyber-map/threat-map.html [https://www.fireeye.com/cyber-map/threat-map.html * https://threatmap.fortiguard.com/ [https://threatmap.fortiguard.com/ * https://threatbutt.com/map/ [https://threatbutt.com/map/ * https://www.sophos.com/en-us/threat-center/threat-monitoring/threatdashboard.aspx#malware-threats [https://www.sophos.com/en-us/threat-center/threat-monitoring/threatdashboard.aspx#malware-threats * Enterprise Threat Monitor | Akamai [https://www.akamai.com/fr/visualizations/enterprise-threat-monitor * CloudTweaks | Top 10 Real Time Hacking Ransomware Tracking Maps [https://cloudtweaks.com/live-hacking-ransomware-tracking-maps-online/ * Live botnet threats worldwide | Spamhaus Technology [https://www.spamhaus.com/threat-map/ * Akamai Globe [https://globe.akamai.com/ * Live Threat Map | Radware [https://livethreatmap.radware.com/ * Cyber-malveillance en temps réel [https://secureidees.com/cyber-malveillance-en-temps-reel/ * Cyber-attack Map [https://map.httpcs.com/ * Sicherheitstacho - Start [https://www.sicherheitstacho.eu/start/main * Police Violence in the United States [https://blmprotests.forensic-architecture.org/ * Agency ← Forensic Architecture [https://forensic-architecture.org/about/agency * Civilian Harm in Ukraine [https://ukraine.bellingcat.com/ * Ukraine Interactive map - Ukraine Latest news on live map - liveuamap.com [https://liveuamap.com/ * France latest news in English on live map - France today - Paris now - france.liveuamap.com [https://france.liveuamap.com/en/2022/30-march-the-prefect-of-pasdecalais-has-been-found-guilty * Leaflet - a JavaScript library for interactive maps [https://leafletjs.com/ * Maps for your apps - Thunderforest [https://www.thunderforest.com/ * France latest news in English on live map - France today - Paris now - france.liveuamap.com [https://france.liveuamap.com/en/2022/22-march-corsica-yvan-colonna-died-the-anger-of-the-separatists * Interactive Online Malware Analysis Sandbox - ANY.RUN [https://app.any.run/ * Randonnée pédestre avec trace gps à télécharger gratuitement - hébergements - carte Ign© - topoguide [https://www.randogps.net/ * HE 3D Network Map [https://he.net/3d-map/ * Capture Labs [https://capturelabs.sonicwall.com/m/feature/security-center
Forensics
* Products - Nextron Systems [https://www.nextron-systems.com/products/ * Avant d'accéder à YouTube [https://consent.youtube.com/m?continue=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dl0ZCyfA75ZE&gl=FR&m=0&pc=yt&uxe=23983172&hl=fr&src=1 * Connexion - Dropbox [https://www.dropbox.com/login?cont=https%3A%2F%2Fwww.dropbox.com%2Fhome%2FAAA_CDI * HackTheBox - Silo writeup [https://v3ded.github.io/ctf/htb-silo * Useful Volatility Commands & Plugins – Cyber Security Blog [https://atalaysblog.wordpress.com/2019/07/13/useful-volatility-commands-plugins/ * Memory Forensics-TryHackMe. Perform memory forensics to find the… | by 0xsanz | Apr, 2021 | Medium [https://0xsanz.medium.com/memory-forensics-tryhackme-2178944d9468 * Investigating Windows TryHackMe | by m4rk0ns3cur1ty | Medium [https://markonsecurity.medium.com/investigating-windows-tryhackme-10e187badedb * volatility .vmdk to .raw at DuckDuckGo [https://duckduckgo.com/?t=ffab&q=volatility+.vmdk+to+.raw&ia=web * How to analyze a VMware memory image with Volatility | Andrea Fortuna [https://www.andreafortuna.org/2019/04/03/how-to-analyze-a-vmware-memory-image-with-volatility/ * virtual machine - Convert VMDK file to compressed RAW file - Stack Overflow [https://stackoverflow.com/questions/52419727/convert-vmdk-file-to-compressed-raw-file * mount .vmdk on linux at DuckDuckGo [https://duckduckgo.com/?t=ffab&q=mount+.vmdk+on+linux&ia=web * Mount a VMware virtual disk (.vmdk) file on a Linux box Using mount [https://www.commandlinefu.com/commands/view/13718/mount-a-vmware-virtual-disk-.vmdk-file-on-a-linux-box * forensics windows with kali cli at DuckDuckGo [https://duckduckgo.com/?q=forensics+windows+with+kali+cli&t=ffab&ia=web * Windows Forensics and Security - Forensic Focus [https://www.forensicfocus.com/articles/windows-forensics-and-security/ * Command Line for Windows Malware and Forensics - Infosec Resources [https://resources.infosecinstitute.com/topic/commandline-malware-and-forensics/ * binwalk pagefile.sys at DuckDuckGo [https://duckduckgo.com/?q=binwalk+pagefile.sys&t=ffab&ia=web * cli find for a spécial date at DuckDuckGo [https://duckduckgo.com/?t=ffab&q=cli+find+for+a+sp%C3%A9cial+date&ia=web * kali linux mount VMdk - Recherche Google [https://www.google.com/search?q=kali+linux+mount+VMdk&ei=6SGAYJXdAsPigwffr4SYAg&oq=kali+linux+mount+VMdk&gs_lcp=Cgdnd3Mtd2l6EAMyBggAEBYQHjoHCAAQRxCwAzoECAAQQzoFCAAQsQM6AggAOgQIABATUKKSBVi_uAVgj8EFaAFwAngAgAFuiAG9BpIBBDExLjGYAQCgAQGqAQdnd3Mtd2l6yAEIwAEB&sclient=gws-wiz&ved=0ahUKEwjV9birso_wAhVD8eAKHd8XASMQ4dUDCA0&uact=5 * mount - Mounting VMDK disk image - Stack Overflow [https://stackoverflow.com/questions/22327728/mounting-vmdk-disk-image * How to Extract Content from VMDK Files: A Step-By-Step Guide [https://www.nakivo.com/blog/extract-content-vmdk-files-step-step-guide/ * Kali Linux Top Forensic Tools (2020) – Linux Hint [https://linuxhint.com/kali_linux_top_forensic_tools/ * GitHub - volatilityfoundation/volatility: An advanced memory forensics framework [https://github.com/volatilityfoundation/volatility * How to prepare a VMWare memory image for Volatility analysis [https://dfirx.blogspot.com/2018/09/how-to-prepare-vmware-memory-image-for.html * Analysing a VMWare Memory image with volatility - Angry-Bender’s blog house [https://angry-bender.github.io/blog/vmware_snapshots_volatility/ * Open a VMWare Disk Image (VMDK) with Autopsy for forensics analisys | Andrea Fortuna [https://www.andreafortuna.org/2016/09/08/open-a-vmware-disk-image-vmdk-with-autopsy-for-forensics-analisys/ * How to perform a digital forensic analysis using only free tools | Andrea Fortuna [https://www.andreafortuna.org/2021/02/13/how-to-perform-a-digital-forensic-analysis-using-only-free-tools/ * How to detect Cobalt Strike Beacons using Volatility | Andrea Fortuna [https://www.andreafortuna.org/2021/01/06/how-to-detect-cobalt-strike-beacons-using-volatility/ * SIFT Workstation Download [https://digital-forensics.sans.org/community/downloads * Volatility Memory Analysis Cheat Sheet - Memory Analysis Cheat Sheet.current.pdf [https://computer.forensikblog.de/files/cheatsheet/Memory%20Analysis%20Cheat%20Sheet.current.pdf * Volatility Cheatsheet - Memory Forensics CTF [https://www.codersnoon.com/2021/01/volatility-cheatsheet-memory-forensics.html * An Easy Cheat Sheet for Understanding Market Volatility - Trade of the Day [https://mtatradeoftheday.com/an-easy-cheat-sheet-for-understanding-market-volatility/ * Volatility Strategies Cheat Sheet | fintrinity [https://www.fintrinity.com/research/volatility-strategies-cheat-sheet/ * Volatility, my own cheatsheet (Part 1): Image Identification | Andrea Fortuna [https://www.andreafortuna.org/2017/06/25/volatility-my-own-cheatsheet-part-1-image-identification/ * SHA2 - CyberChef [https://gchq.github.io/CyberChef/#recipe=SHA2('256',1,160)&input=NWU4ODQ4OThkYTI4MDQ3MTUxZDBlNTZmOGRjNjI5Mjc3MzYwM2QwZDZhYWJiZGQ2MmExMWVmNzIxZDE1NDJkOA * Linux forensic for compromission at DuckDuckGo [https://duckduckgo.com/?q=Linux+forensic+for+compromission&t=ffab&ia=web * Breach detection with Linux filesystem forensics | Opensource.com [https://opensource.com/article/18/4/linux-filesystem-forensics * SHA256 hash for "password" [https://sha256calc.com/hash/sha256/password * Decoding with CyberChef - TryHackMe! Advent of Cyber Day 22 - YouTube [https://www.youtube.com/watch?v=l0ZCyfA75ZE * Microsoft PowerPoint - Sec504HANDOUT_WinInDisCheat_3.0.pptx - download [https://www.sans.org/security-resources/posters/intrusion-discovery-cheat-sheet-windows/225/download * download [https://www.sans.org/security-resources/posters/intrusion-discovery-cheat-sheet-linux/230/download * SEC434_Cheat_Sheet.indd - 6 [https://www.sans.org/brochure/course/log-management-in-depth/6?msc=Cheat+Sheet+Blog * Cheatsheet_SEC301-401_R7.indd - Cheatsheet_SEC301-401_R7.pdf [https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltea7de5267932e94b/5eb08aafcf88d36e47cf0644/Cheatsheet_SEC301-401_R7.pdf * forensic windows tools at DuckDuckGo [https://duckduckgo.com/?t=ffab&q=forensic+windows+tools&ia=web * encase forensics at DuckDuckGo [https://duckduckgo.com/?q=encase+forensics&t=ffab&ia=web * Products and Services- Endpoint Security and Incident Response and eDiscovery [https://security.opentext.com/products-services?cmpid=nav_r * How to mount a vmdk file in Linux [https://jasonmurray.org/posts/2021/mountvmdk/ * Top 7 Open Source Forensic Tools That You Should Know About [https://appsierra.com/top-7-open-source-forensic-tools/ * OSForensics - Product Information, Download and Purchase [https://www.osforensics.com/products/index.php * Resources [https://www.forensicmethods.com/resources * SANS Digital Forensics and Incident Response Blog | Computer Forensics How-To: Microsoft Log Parser | SANS Institute [https://www.sans.org/blog/computer-forensics-how-to-microsoft-log-parser/ * Splunk Phantom Security Orchestration & Automation | Splunk [https://www.splunk.com/en_us/software/splunk-security-orchestration-and-automation.html * Windows Security Log Encyclopedia [https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/default.aspx * Endpoint Protection - Symantec Enterprise [https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=3fe87d70-07ad-4cee-811f-ce4f8b8429ae&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments * GitHub - cipher387/osint_stuff_tool_collection: A collection of several hundred online tools for OSINT [https://github.com/cipher387/osint_stuff_tool_collection#xbox * PALADIN : la suite médico-légale Linux la plus populaire au monde [https://sumuri.com/software/paladin/ * How to Use Windows Forensic Environment 10 [https://www.winfe.net/use * PPEE - Professional PE Explorer [https://www.mzrst.com/ * Investigations ← Forensic Architecture [https://forensic-architecture.org/ * I Learned Blog [https://blog.ilearned.eu/ * Kroll Artifact Parser And Extractor (KAPE) | Cyber Risk | Kroll [https://www.kroll.com/en/services/cyber-risk/incident-response-litigation-support/kroll-artifact-parser-extractor-kape * Eric Zimmerman's tools [https://ericzimmerman.github.io/#!index.md
Mitre Attack
* Using ATT&CK for CTI Training | MITRE ATT&CK® [https://attack.mitre.org/resources/training/cti/ * MITRE ATT&CK® [https://attack.mitre.org/# * MITRE ATT&CK™ [https://attack.mitre.org/ * ATT&CK® Navigator [https://mitre-attack.github.io/attack-navigator/ * ATT&CK® Navigator [https://mitre-attack.github.io/attack-navigator/ * GitHub - mitre/caldera: Automated Adversary Emulation Platform [https://github.com/mitre/caldera * https://tryhackme.com/room/mitre [https://tryhackme.com/room/mitre * How to Use the MITRE ATT&CK Framework | ChaosSearch [https://www.chaossearch.io/blog/how-to-use-mitre-attck-framework * MITRE ATT&CK® – Medium [https://medium.com/mitre-attack * Resilient Against Supply Chain Threats - supply_chain_attacks_and_resiliency_mitigations_-_mitre.pdf [https://www.nist.gov/system/files/documents/2018/12/06/supply_chain_attacks_and_resiliency_mitigations_-_mitre.pdf * Introduction to ATT&CK - CTI Workshop Full Slides.pdf [https://attack.mitre.org/docs/training-cti/CTI%20Workshop%20Full%20Slides.pdf * MITRE ATT&CK | MITRE [https://www.mitre.org/focus-areas/cybersecurity/mitre-attack
Blacklist
* https://store.delmarvagroup.com/knowledgebase.php?action=displayarticle&id=4192 [https://store.delmarvagroup.com/knowledgebase.php?action=displayarticle&id=4192 * https://otx.alienvault.com/indicator/ip/104.31.75.222?utm_medium=InProduct&utm_source=ThreatCrowd [https://otx.alienvault.com/indicator/ip/104.31.75.222?utm_medium=InProduct&utm_source=ThreatCrowd * http://www.cryptage.org/enigma.html [http://www.cryptage.org/enigma.html * IP Address Abuse and Blacklist Reporting Site [https://liveipmap.com/77.111.247.71 * https://udger.com/resources/ip-list/known_attack_source [https://udger.com/resources/ip-list/known_attack_source * http://www.webpagetest.org/result/171020_7B_49add930c54c68a0ffdefdc74336d18e/ [http://www.webpagetest.org/result/171020_7B_49add930c54c68a0ffdefdc74336d18e/ * https://pentestlab.blog/2017/09/25/suid-executables/ [https://pentestlab.blog/2017/09/25/suid-executables/ * https://feodotracker.abuse.ch/blocklist/ [https://feodotracker.abuse.ch/blocklist/ * https://ipinfo.io/23.66.166.151 [https://ipinfo.io/23.66.166.151 * https://zeltser.com/malicious-ip-blocklists/ [https://zeltser.com/malicious-ip-blocklists/ * http://geoiplookup.net/ip/185.102.219.50 [http://geoiplookup.net/ip/185.102.219.50 * 37.58.150.203 - ADISTA SAS - FR | Proxy Detection Lookup | IP Address Lookup [https://www.ipqualityscore.com/free-ip-lookup-proxy-vpn-test/lookup/37.58.150.203 * https://www.liveipmap.com/?ip=194.98.100.133 [https://www.liveipmap.com/?ip=194.98.100.133 * IP Neighbour : Find sites on the same IP address [https://www.ipneighbour.com/#/lookup/91.103.233.142 * http://www.binarydefense.com/banlist.txt [http://www.binarydefense.com/banlist.txt * http://danger.rulez.sk/projects/bruteforceblocker/blist.php [http://danger.rulez.sk/projects/bruteforceblocker/blist.php * http://www.cryptage.org/enigma.html [http://www.cryptage.org/enigma.html * https://store.delmarvagroup.com/knowledgebase.php?action=displayarticle&id=4192 [https://store.delmarvagroup.com/knowledgebase.php?action=displayarticle&id=4192 * http://www.binarydefense.com/banlist.txt [http://www.binarydefense.com/banlist.txt * http://danger.rulez.sk/projects/bruteforceblocker/blist.php [http://danger.rulez.sk/projects/bruteforceblocker/blist.php * https://pentestlab.blog/2017/09/25/suid-executables/ [https://pentestlab.blog/2017/09/25/suid-executables/ * https://otx.alienvault.com/indicator/ip/104.31.75.222?utm_medium=InProduct&utm_source=ThreatCrowd [https://otx.alienvault.com/indicator/ip/104.31.75.222?utm_medium=InProduct&utm_source=ThreatCrowd * https://www.threatcrowd.org/ip.php?ip=104.31.75.222 [https://www.threatcrowd.org/ip.php?ip=104.31.75.222 * https://zeltser.com/malicious-ip-blocklists/ [https://zeltser.com/malicious-ip-blocklists/ * https://feodotracker.abuse.ch/blocklist/ [https://feodotracker.abuse.ch/blocklist/ * https://udger.com/resources/ip-list/known_attack_source [https://udger.com/resources/ip-list/known_attack_source * http://iplists.firehol.org/?ipset=firehol_level1 [http://iplists.firehol.org/?ipset=firehol_level1 * http://www.webpagetest.org/result/171020_7B_49add930c54c68a0ffdefdc74336d18e/ [http://www.webpagetest.org/result/171020_7B_49add930c54c68a0ffdefdc74336d18e/ * https://github.com/mlsecproject/combine/wiki/Threat-Intelligence-Feeds-Gathered-by-Combine [https://github.com/mlsecproject/combine/wiki/Threat-Intelligence-Feeds-Gathered-by-Combine * https://tools.keycdn.com/performance?url=https://www.mutuelle2sante.com [https://tools.keycdn.com/performance?url=https://www.mutuelle2sante.com * https://www.liveipmap.com/?ip=194.98.100.133 [https://www.liveipmap.com/?ip=194.98.100.133 * IP Address Abuse and Blacklist Reporting Site [https://liveipmap.com/77.111.247.71 * https://myip.ms/#a [https://myip.ms/#a * IP Neighbour : Find sites on the same IP address [https://www.ipneighbour.com/#/lookup/91.103.233.142 * http://www.blocklist.de/en/index.html [http://www.blocklist.de/en/index.html * http://geoiplookup.net/ip/185.102.219.50 [http://geoiplookup.net/ip/185.102.219.50 * https://ipinfo.io/23.66.166.151 [https://ipinfo.io/23.66.166.151 * https://www.whatismyip.net/ [https://www.whatismyip.net/ * TOR status [https://check.torproject.org/torbulkexitlist * Blacklist Checker and Scanner | Unlock The Inbox [https://www.unlocktheinbox.com/blacklistchecker/bl/ * https://dnsdumpster.com/ [https://dnsdumpster.com/ * http://multirbl.valli.org/lookup/ [http://multirbl.valli.org/lookup/ * IP Address Blacklist Check, IP DNSBL Check | IPVoid [http://www.ipvoid.com/ip-blacklist-check/ * mda-spj.fr safe ? Check it with URLVoid [http://www.urlvoid.com/scan/mda-spj.fr/ * MultiRBL.valli.org - Results of the query 149.255.137.90 [http://multirbl.valli.org/lookup/149.255.137.90.html * Network Tools: DNS,IP,Email [https://mxtoolbox.com/SuperTool.aspx * tor list json [https://onionoo.torproject.org/details?fields=exit_addresses&flag=exit * AbuseIPDB - IP Address Blacklist [https://www.abuseipdb.com/ * Blacklist IP Addresses Live Database 2018. Blacklist Check [https://myip.ms/browse/blacklist * Per-IP rate limiting with iptables - Making Pusher [https://making.pusher.com/per-ip-rate-limiting-with-iptables/ * Building Public and Private IPtables Blacklists | CCNA HUB [https://www.ccnahub.com/linux/building-public-and-private-iptables-blacklists/ * BotReports.com - Updates on the bots and user-agents for the latest spiders, crawlers, scrapers and more [http://www.botreports.com/ * BLACKLISTALERT.ORG - Email Problem ? - Test if your IP or DOMAIN is blacklisted in a spamdatabase [http://www.blacklistalert.org/ * 5 Steps to Investigate and Report Abusive IP Address • Raymond.CC [https://www.raymond.cc/blog/reporting-hacked-rooted-servers-booters-datacenters/ * OPSWAT MetaDefender Cloud | IP Scan Results for 88.241.93.251 [https://metadefender.opswat.com/results#!/ip/ODguMjQxLjkzLjI1MQ==/overview * Domain Blacklist & Email Spam Check | UltraTools [https://www.ultratools.com/tools/spamDBLookupResult * GitHub - trick77/ipset-blacklist: A script to ban large numbers of IP addresses published in blacklists. [https://github.com/trick77/ipset-blacklist * Global DNS Propagation Checker - What's My DNS? [https://www.whatsmydns.net/#MX/ecai.fr * 37.58.150.203 - ADISTA SAS - FR | Proxy Detection Lookup | IP Address Lookup [https://www.ipqualityscore.com/free-ip-lookup-proxy-vpn-test/lookup/37.58.150.203 * Tracker | Ransomware Tracker [https://ransomwaretracker.abuse.ch/tracker/ * abuse.ch | Fighting malware and botnets [https://abuse.ch/ * AutoSploit = Shodan/Censys/Zoomeye + Metasploit - PenTestIT [http://pentestit.com/autosploit-shodan-censys-zoomeye-metasploit/ * https://github.com/jas3/getBlacklist/blob/master/README.md [https://github.com/jas3/getBlacklist/blob/master/README.md * http://cdn.miscreantpunchers.net/iprep.txt [http://cdn.miscreantpunchers.net/iprep.txt * https://www.htbridge.com/websec/?id=oqGcuqne [https://www.htbridge.com/websec/?id=oqGcuqne * https://access.watch/database [https://access.watch/database * https://access.watch/database/addresses/bad [https://access.watch/database/addresses/bad * https://www.audemail.com/scan.php?serverSMTP=149.255.137.90&x=6&y=2 [https://www.audemail.com/scan.php?serverSMTP=149.255.137.90&x=6&y=2 * Cisco Talos [https://talosintelligence.com/reputation_center * ReputationAuthority | WatchGuard Technologies [http://www.reputationauthority.org/ * 168.235.97.87 | IP Address and Robot Database | Access Watch: The Web Traffic Intelligence Engine [https://access.watch/database/addresses/168.235.97.87 * List of User-Agents (Spiders, Robots, Browser) [http://www.user-agents.org/ * https://www.threatcrowd.org/ip.php?ip=104.31.75.222 [https://www.threatcrowd.org/ip.php?ip=104.31.75.222 * https://github.com/mlsecproject/combine/wiki/Threat-Intelligence-Feeds-Gathered-by-Combine [https://github.com/mlsecproject/combine/wiki/Threat-Intelligence-Feeds-Gathered-by-Combine * http://iplists.firehol.org/?ipset=firehol_level1 [http://iplists.firehol.org/?ipset=firehol_level1 * https://myip.ms/#a [https://myip.ms/#a * https://tools.keycdn.com/performance?url=https://www.mutuelle2sante.com [https://tools.keycdn.com/performance?url=https://www.mutuelle2sante.com * Blacklist Checker and Scanner | Unlock The Inbox [https://www.unlocktheinbox.com/blacklistchecker/bl/ * http://www.blocklist.de/en/index.html [http://www.blocklist.de/en/index.html * https://www.whatismyip.net/ [https://www.whatismyip.net/ * https://dnsdumpster.com/ [https://dnsdumpster.com/ * http://multirbl.valli.org/lookup/ [http://multirbl.valli.org/lookup/ * MultiRBL.valli.org - Results of the query 149.255.137.90 [http://multirbl.valli.org/lookup/149.255.137.90.html * IP Address Blacklist Check, IP DNSBL Check | IPVoid [http://www.ipvoid.com/ip-blacklist-check/ * mda-spj.fr safe ? Check it with URLVoid [http://www.urlvoid.com/scan/mda-spj.fr/ * Network Tools: DNS,IP,Email [https://mxtoolbox.com/SuperTool.aspx * AbuseIPDB - IP Address Blacklist [https://www.abuseipdb.com/ * Blacklist IP Addresses Live Database 2018. Blacklist Check [https://myip.ms/browse/blacklist * Per-IP rate limiting with iptables - Making Pusher [https://making.pusher.com/per-ip-rate-limiting-with-iptables/ * Building Public and Private IPtables Blacklists | CCNA HUB [https://www.ccnahub.com/linux/building-public-and-private-iptables-blacklists/ * BotReports.com - Updates on the bots and user-agents for the latest spiders, crawlers, scrapers and more [http://www.botreports.com/ * BLACKLISTALERT.ORG - Email Problem ? - Test if your IP or DOMAIN is blacklisted in a spamdatabase [http://www.blacklistalert.org/ * 5 Steps to Investigate and Report Abusive IP Address • Raymond.CC [https://www.raymond.cc/blog/reporting-hacked-rooted-servers-booters-datacenters/ * OPSWAT MetaDefender Cloud | IP Scan Results for 88.241.93.251 [https://metadefender.opswat.com/results#!/ip/ODguMjQxLjkzLjI1MQ==/overview * Domain Blacklist & Email Spam Check | UltraTools [https://www.ultratools.com/tools/spamDBLookupResult * GitHub - trick77/ipset-blacklist: A script to ban large numbers of IP addresses published in blacklists. [https://github.com/trick77/ipset-blacklist * Global DNS Propagation Checker - What's My DNS? [https://www.whatsmydns.net/#MX/ecai.fr * Tracker | Ransomware Tracker [https://ransomwaretracker.abuse.ch/tracker/ * abuse.ch | Fighting malware and botnets [https://abuse.ch/ * AutoSploit = Shodan/Censys/Zoomeye + Metasploit - PenTestIT [http://pentestit.com/autosploit-shodan-censys-zoomeye-metasploit/ * http://cdn.miscreantpunchers.net/iprep.txt [http://cdn.miscreantpunchers.net/iprep.txt * https://access.watch/database [https://access.watch/database * https://access.watch/database/addresses/bad [https://access.watch/database/addresses/bad * https://www.audemail.com/scan.php?serverSMTP=149.255.137.90&x=6&y=2 [https://www.audemail.com/scan.php?serverSMTP=149.255.137.90&x=6&y=2 * Cisco Talos [https://talosintelligence.com/reputation_center * ReputationAuthority | WatchGuard Technologies [http://www.reputationauthority.org/ * TorStatus - Tor Network Status [https://torstatus.blutmagie.de/ * 168.235.97.87 | IP Address and Robot Database | Access Watch: The Web Traffic Intelligence Engine [https://access.watch/database/addresses/168.235.97.87 * www.blocklist.de -- Export all Attacker-IPs from the last 48 Hours. [https://www.blocklist.de/en/export.html * FireHOL IP Lists | IP Blacklists | IP Blocklists | IP Reputation [https://iplists.firehol.org/ * https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level1.netset [https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level1.netset * GitHub - Ultimate-Hosts-Blacklist/Ultimate.Hosts.Blacklist: The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware. [https://github.com/Ultimate-Hosts-Blacklist/Ultimate.Hosts.Blacklist * Red Flag Domains [https://red.flag.domains/
Risk
* Comment prioriser les vulnérabilités de son système d'information ? [https://cyberwatch.fr/veille/comment-prioriser-les-vulnerabilites-de-son-systeme-dinformation/ * Comment utiliser le MITRE ATT&CK pour analyser une menace informatique ? [https://cyberwatch.fr/veille/comment-utiliser-le-mitre-attack-pour-analyser-une-menace-informatique/
* Google Alertes : recevez des alertes lorsque du contenu susceptible de vous intéresser est publié sur le Web [https://www.google.com/alerts#1:32
ANSSI
* Recommandations de sécurité relatives au déploiement de conteneurs Docker | Agence nationale de la sécurité des systèmes d'information [https://www.ssi.gouv.fr/guide/recommandations-de-securite-relatives-au-deploiement-de-conteneurs-docker/ * Points de contrôle Active Directory [https://www.cert.ssi.gouv.fr/uploads/ad_checklist.html * GitHub - ANSSI-FR/ORADAD: Outil de récupération automatique des données de l'Active Directory / Automated tool for dumping Active Directory data [https://github.com/ANSSI-FR/ORADAD * DemainSpécialisteCyber [https://www.demainspecialistecyber.fr/
MATIN
* 🌍 Ransomware's attacks by country [https://www.ransomware.live/#/country/fr * Info²Sec [https://news.torii-security.fr/ * Veille #Cybersécurité #Manifone | Scoop.it [https://www.scoop.it/topic/securite-informatique-by-dcit-conseil * Veille #Infrastructure #DCIT-Conseil #Vannes | Scoop.it [https://www.scoop.it/topic/systemes-d-information-dcit * Time to Learn | Scoop.it [https://www.scoop.it/topic/formation-2-0 * Renseignements Stratégiques, Investigations & Intelligence Economique [http://veilles.arnaudpelletier.com/ * Evénements | Portail du CERT Santé [https://cyberveille-sante.gouv.fr/liste/evenements * Sécurité de l'information de santé et plus... | Scoop.it [https://www.scoop.it/topic/ssi-sante * CERT-FR [https://cyberowl.mousqueton.io/#/CERT-FR * The Hacker News | #1 Trusted Cybersecurity News Site [https://thehackernews.com/ * Capture Labs [https://capturelabs.sonicwall.com/m/feature/security-news * #software-development stories | HackerNoon [https://hackernoon.com/tagged/software-development * Blog Stéphane Bortzmeyer: Accueil [https://www.bortzmeyer.org/ * Electronvalley Magazine Innovations Tech IA AI [https://electronvalley.fr/ * Cyber Security News Today | Articles on Cyber Security, Malware Attack updates | Cyware [https://cyware.com/cyber-security-news-articles * BleepingComputer | Cybersecurity, Technology News and Support [https://www.bleepingcomputer.com/ * Cybersecurite sur Servicesmobiles.fr [https://www.servicesmobiles.fr/cybersecurite * Bons plans Cours & formations : promotions en ligne et en magasin » Dealabs [https://www.dealabs.com/groupe/cours-et-formations * Phoenix Security - FIX Vulnerability with context from appsec to cloud security [https://phoenix.security/ * Latest Vulnerabilities | Vumetric Cyber Portal [https://cyber.vumetric.com/vulns/ * Latest Publications - Check Point Research [https://research.checkpoint.com/latest-publications/ * 🌌 IP BlackHole [https://ip.blackhole.monster/ * Top 10 Cloud Access Security Broker (CASB) Solutions for 2023 [https://www.esecurityplanet.com/products/casb-security-vendors/ * Chroniques du positif | Obs du Positif [https://www.obsdupositif.org/blog * https://www.obsdupositif.org/blog [https://www.obsdupositif.org/blog * Tips & Tricks | CYBERPUNK [https://www.cyberpunk.rs/category/tips-tricks * Actualités sur la sécurité informatique | IT-Connect [https://www.it-connect.fr/actualites/actu-securite/ * infoDSI : Le quotidien des utilisateurs de l'informatique en entreprise [https://infodsi.com/ * Cyberattaques - Actualité, infos et vidéos en direct [https://www.francetvinfo.fr/internet/securite-sur-internet/ * Cyber Security News Today - Latest Updates & Research - Cybernews [https://cybernews.com/ * Infoguerre | Ecole de Guerre Economique [https://www.ege.fr/infoguerre * Cloudflare Radar [https://radar.cloudflare.com/?dateRange=1d * Federated timeline - DEF CON Social [https://defcon.social/public * Category: Web Security | Threatpost [https://threatpost.com/category/web-security/ * Latest Vulnerabilities | Vumetric Cyber Portal [https://cyber.vumetric.com/vulns/ * Explorer - Infosec Exchange [https://infosec.exchange/explore * Cyber Security News UK [https://cybersecuritynews.uk/ * NewsBrief [https://emm.newsbrief.eu/NewsBrief/clusteredition/fr/latest.html * Cyber criminalité Archives - InCyber [https://incyber.org/theme/cyber-criminalite/ * Risk Discovery [https://riskdiscovery.com/ * Technical Information Security Content & Discussion [https://www.reddit.com/r/netsec/ * All | Search powered by Algolia [https://hn.algolia.com/?dateRange=all&page=0&prefix=false&query=cybersecurity&sort=byDate&type=story * Vumetric Cybersecurity Portal [https://cyber.vumetric.com/ * Actualité : les news, dossiers et analyses informatiques | Silicon [https://www.silicon.fr/actualites/cybersecurite * HackRead | Latest Cyber Crime - InfoSec- Tech - Hacking News [https://www.hackread.com/ * Actualités Archives - Bellingcat [https://fr.bellingcat.com/category/actualites/ * Actualités et Dernières Infos en France| Arab News fr [https://www.arabnews.fr/france * POSITIVR : initiatives positives, causes, innovations et inspirations [https://positivr.fr/ * Nouvelles Positives - Des nouvelles positives tous les jours [https://nouvellespositives.com/ * TRT Français [https://www.trtfrancais.com/ * BizToc [https://biztoc.com/ * Riskintel Média | Actualités [https://www.riskintel.fr/actualit%C3%A9s * Upstract [https://upstract.com/ * APAR.TV - PRÉDICTIF [https://www.apar.tv/ * Open Source Security Index [https://opensourcesecurityindex.io/ * Similar Sites Like upstract.com - Competitors & Alternatives [https://www.similarsites.com/site/upstract.com * Upstract [https://upstract.com/ * Penetration Testing Bootcamp |fr] Penetration Testing Bootcamp - Information Gathering | Class Central Classroom [https://www.classcentral.com/classroom/youtube-penetration-testing-bootcamp-53185/6108cc9fd9b5a * HackTricks - HackTricks [https://book.hacktricks.xyz/welcome/readme * Cybersécurité Solutions [https://www.cybersecurite-solutions.com/ * Le Guide Du SecOps - Page 8 sur 21 - Blog 🇫🇷 publiant des articles de Cybersecurité (Off./Def.), SysAdmin et DevSecOps [https://le-guide-du-secops.fr/page/8/ * UNDERNEWS.FR - Actualité sécurité informatique & cybercrime [https://www.undernews.fr/ * cybersecurity [https://www.reddit.com/r/cybersecurity/ * PARIS 11/02/2023 • MANIFESTATION CONTRE LA RÉFORME DES RETRAITES – Taranis News [https://taranis.news/2023/02/paris-11-02-2023-manifestation-contre-la-reforme-des-retraites/ * Black bloc — Wikipédia [https://fr.wikipedia.org/wiki/Black_bloc * français - Global Security Mag Online [https://www.globalsecuritymag.com/-francais-.html * Threatpost | The first stop for security news [https://threatpost.com/ * À propos de l’ENISA - L’Agence de l'Union européenne pour la cybersécurité — ENISA [https://www.enisa.europa.eu/about-enisa/about/fr * Security | ZDNET [https://www.zdnet.com/topic/security/ * Hot Questions - Stack Exchange [https://stackexchange.com/ * Ecole de Guerre Economique - Formations Intelligence économique Cyber Sûreté [https://migration.ege.fr/ * Disclosures - JSOF [https://www.jsof-tech.com/disclosures/ * 7 free cybersecurity resources you need to bookmark - Help Net Security [https://www.helpnetsecurity.com/2022/11/28/7-free-cybersecurity-resources-you-need-to-bookmark/ * Cyber Security Review – News • Insights • Analysis [https://www.cybersecurity-review.com/ * La météo à Saint-Étienne, Auvergne-Rhône-Alpes, France | Tomorrow.io [https://www.tomorrow.io/weather/fr/ * Cybersecurity - TechGenix [https://techgenix.com/security/ * SANS Newsletters | SANS Institute [https://www.sans.org/newsletters/ * Toute l'information internationale en direct | Euronews [https://fr.euronews.com/ * All | Search powered by Algolia [https://hn.algolia.com/?dateRange=all&page=1&prefix=false&query=pentest&sort=byDate&type=story * Your Cybersecurity News Connection - Cyber News | CyberWire [https://thecyberwire.com/ * Direct TV | Toute l'actualité en live streaming gratuit | Euronews [https://fr.euronews.com/live * Info²Sec [https://news.torii-security.fr/ * Video channel videos - PeerTube [https://peertube.sl-network.fr/video-channels/79b72c44-c395-4a52-a6f1-80fe5d8dd28e/videos?a-state=42 * I Learned Blog [https://blog.ilearned.eu/most_read.html * Our CVEs - SentinelOne [https://www.sentinelone.com/labs/our-cves/ * 🚀 Pomodoro Timer — Do more in less time, stress-free [https://pomodorotimer.online/ * Actualité technologique et scientifique [https://www.techno-science.net/ * CERT-EU News Monitor [https://cert.europa.eu/cert/filteredition/en/CERT-LatestNews.html * KitPloit - PenTest & Hacking Tools [https://www.kitploit.com/ * Hacker Videos – Telegram [https://t.me/s/HackerVideos/ * Full Disclosure Mailing List [https://seclists.org/fulldisclosure/ * HackGit – Telegram [https://t.me/s/hackgit * CXSECURITY.COM Free Security List [https://cxsecurity.com/ * Pentester – Telegram [https://t.me/s/news4hack * Bug Bounty Channel – Telegram [https://t.me/s/bug_bounty_channel * OSINT – Telegram [https://t.me/s/osint_channel?before=131 * threatABLE Feed [https://www.threatable.io/ * Cybersécurité [https://www.conix.fr/blog/cybersecurite/ * The Next Platform - The Next Platform [https://www.nextplatform.com/ * News ≈ Packet Storm [https://packetstormsecurity.com/news/ * Similar Sites Like thehackernews.com - Competitors & Alternatives [https://www.similarsites.com/site/thehackernews.com * Similar Sites Like securityaffairs.co - Competitors & Alternatives [https://www.similarsites.com/site/securityaffairs.co * Hacker News [https://hn.algolia.com/?dateRange=pastMonth&page=0&prefix=false&query=cybersecurity&sort=byDate&type=story * Worldle [https://worldle.harari.ovh/ * Accueil - InCyber [https://incyber.fr/ * security - Netsec, appsec, and infosec | Lobsters [https://lobste.rs/t/security * InfoSec - Veille Sécurité collaborative [https://news.torii-security.fr/ * Journal du hacker [https://www.journalduhacker.net/ * Sécurité - LinuxFr.org [https://linuxfr.org/ * ZATAZ [https://www.zataz.com/ * Experts show how to bypass Windows Hello feature to login on Windows 10 PCsSecurity Affairs [https://securityaffairs.co/wordpress/ * oss-sec: by thread [https://seclists.org/oss-sec/2021/q4/index.html * Veille #Cybersécurité #Manifone | Scoop.it [https://www.scoop.it/topic/securite-informatique-by-dcit-conseil * Real-time cybersecurity readiness. - AttackIQ [https://attackiq.com/ * Hack OPS-SAT (CYSAT) : ouverture de l'appel à idées [https://incyber.fr/hack-ops-sat-cysat-ouverture-de-lappel-a-idees/ * Data Security Breach – L'actualité cybersécurité pour PME/PMI/TPE [https://www.datasecuritybreach.fr/ * Les 15 journaux britanniques et américains à lire pour progresser en anglais [https://generationvoyage.fr/journaux-anglais/ * https://www.govcert.ch/blog/ [https://www.govcert.ch/blog/zero-day-exploit-targeting-popular-java-library-log4j/# * Ressources - Avant de Cliquer, l'humain au coeur de la cybersécurité [https://avantdecliquer.com/ressources/ * Cybersécurité : Actualités, analyses et dossiers - L'Usine Digitale [https://www.usine-digitale.fr/cybersecurite/ * Cybermenaces : bilan 2021 et prévisions 2022 [https://www.solutions-numeriques.com/webinar/cybermenaces-bilan-2021-et-previsions-2022/ * The Daily Swig | Cybersecurity news and views [https://portswigger.net/daily-swig * Pétrolette [https://petrolette.space/ * SpeedGuide :: Broadband Tweaks, Wireless Networks, Security [https://www.speedguide.net/ * Homepage - The Record by Recorded Future [https://therecord.media/ * Hack Forums [https://hackforums.net/index.php * Equities / SHIFT Search [https://shiftsearch.com/ * 🥰마음이 따뜻해지는 포근한 느낌의 재즈피아노🎹 l 카페음악, 매장음악 l Relaxing Jazz Piano Music - YouTube [https://www.youtube.com/watch?v=roSRbK1vSA0 * Ressources - synacktiv - boite Lynon pentest [https://www.synacktiv.com/ressources%253Ffield_resources_tags_target_id%253D22.html * Cybermalveillance : anatomie d’un écosystème qui s’organise en chaîne de valeur - IT SOCIAL [https://itsocial.fr/partenaires/mega-international-partenaire/articles-mega/cybersecurite-anatomie-dun-ecosysteme-qui-sorganise-en-chaine-de-valeur/ * Vulnerability Archives • Penetration Testing [https://securityonline.info/category/news/vulnerability/ * Emplois Numériques [https://www.emplois-numeriques.com/ * Twitch [https://www.twitch.tv/offsecofficial * CVE Trends - crowdsourced CVE intel [https://cvetrends.com/ * L'une - Globb Security FR [http://globbsecurity.fr/ * CyberScoop | Breaking Cybersecurity News, Public Sector Threats [https://cyberscoop.com/ * Cybersécurité : Actualités, analyses et dossiers - L'Usine Digitale [https://www.usine-digitale.fr/cybersecurite/
HTB
* Penetration Testing Process [https://academy.hackthebox.com/module/90/section/1569 * https://www.hackthebox.com/hacker/pro-labs [https://www.hackthebox.com/hacker/pro-labs * Master Red Teaming With Pro Labs | Hack The Box [https://www.hackthebox.com/hacker/pro-labs * Hack The Box - Academy [https://academy.hackthebox.com/paths * Hack The Box: Buy Your Gift Card Today | The Ideal Cybersecurity Gift [https://www.hackthebox.com/giftcards * Hack The Box :: Log in [https://ctf.hackthebox.com/login * https://www.hackthebox.com/hacker/pro-labs [https://www.hackthebox.com/hacker/pro-labs * https://academy.hackthebox.com/login [https://academy.hackthebox.com/login * Web Requests [https://academy.hackthebox.com/module/details/35 * Hack The Box :: Forums [https://forum.hackthebox.com/ * Introduction to HTB Academy | Hack The Box Help Center [https://help.hackthebox.com/en/articles/5272936-introduction-to-htb-academy#h_6ac6f773e1 * Ultimate CPTS Guide [https://findingurpasswd.notion.site/findingurpasswd/Ultimate-CPTS-Guide-22b7d3d74d7843c3addf92b4f17a83c7 * Introduction to HTB Academy | Hack The Box Help Center [https://help.hackthebox.com/en/articles/5272936-introduction-to-htb-academy#h_6ac6f773e1 * Malware and Virus Samples | VirusSamples.com [https://www.virussamples.com/
Write-up
* HTB_Academy Attacking Web Applications with Ffuf | Hacking Blog [https://r4fik1.github.io/htb-academy/HTBAcademy_Attacking-Web-Applications-with-Ffuf/ * HTB_Academy/HTB_attacking_web_applications_with_ffuf/README.md at main · r4fik1/HTB_Academy · GitHub [https://github.com/r4fik1/HTB_Academy/blob/main/HTB_attacking_web_applications_with_ffuf/README.md * FootPrinting DNS Enumeration HACKTHEBOX | Pentest Path - YouTube [https://www.youtube.com/watch?v=eudA-HRlc2Y * External - Web - HTB Academy (CPTS) [https://nukercharlie.gitbook.io/htb-academy-cpts/ * Footprinting - HTB Academy (CPTS) [https://nukercharlie.gitbook.io/htb-academy-cpts/internal-network-and-ad/footprinting * FOOTPRINTING POP3/IMAP HTB - YouTube [https://www.youtube.com/watch?v=OX8472WTZgw * HTB: Pilgrimage | 0xdf hacks stuff [https://0xdf.gitlab.io/2023/11/25/htb-pilgrimage.html?s=09 * HTB Academy Labs - Footprinting (Medium) [https://www.natussec.com/blog/htb-academy-labs-footprinting-medium * cpts-quick-references/assessments/Footprinting Lab - Medium.md at main · bbhunter/cpts-quick-references · GitHub [https://github.com/bbhunter/cpts-quick-references/blob/main/assessments/Footprinting%20Lab%20-%20Medium.md * HTB: Pilgrimage | 0xdf hacks stuff [https://0xdf.gitlab.io/2023/11/25/htb-pilgrimage.html?s=09
WriteUp-Quality
* https://youtu.be/OepTsVrfIHs SQL injection [https://youtu.be/OepTsVrfIHs * https://bravotwoable.com/category/courses/tryhackme/ [https://bravotwoable.com/category/courses/tryhackme/ * https://beta.hackndo.com/archives/ [https://beta.hackndo.com/archives/ * https://www.0x0ff.info/2015/buffer-overflow-gdb-part1/ [https://www.0x0ff.info/2015/buffer-overflow-gdb-part1/ * https://electronicsreference.com/thm/ [https://electronicsreference.com/thm/ * https://www.hackingarticles.in/a-beginners-guide-to-buffer-overflow/ [https://www.hackingarticles.in/a-beginners-guide-to-buffer-overflow/ * https://www.kali-linux.fr/hacking/overflows-passons-a-la-pratique [https://www.kali-linux.fr/hacking/overflows-passons-a-la-pratique * https://www.youtube.com/channel/UC9WYWHLdu9TK-0Hu3wcHJ9g [https://www.youtube.com/channel/UC9WYWHLdu9TK-0Hu3wcHJ9g * https://www.youtube.com/watch?v=jzuxNG13Xj4 [https://www.youtube.com/watch?v=jzuxNG13Xj4 * https://www.youtube.com/watch?v=eLIRjcI5eYU [https://www.youtube.com/watch?v=eLIRjcI5eYU * https://www.youtube.com/watch?v=V7Gdc32XRhA [https://www.youtube.com/watch?v=V7Gdc32XRhA * https://www.youtube.com/watch?v=u-OZQkv2ebw [https://www.youtube.com/watch?v=u-OZQkv2ebw * https://www.thedutchhacker.com/owasp-top-10-on-tryhackme/ [https://www.thedutchhacker.com/owasp-top-10-on-tryhackme/ * https://jinshiranai.hashnode.dev/tryhackme-owasp-top-10-write-up [https://jinshiranai.hashnode.dev/tryhackme-owasp-top-10-write-up * https://raphaelrichard-sec.fr/learning-notes [https://raphaelrichard-sec.fr/learning-notes * https://github.com/rng70/Hacking-Resources/blob/master/Bug%20Bounty/The%20Tangled%20Web.pdf [https://github.com/rng70/Hacking-Resources/blob/master/Bug%20Bounty/The%20Tangled%20Web.pdf * https://www.infosecarticles.com/tryhackme-the-marketplace-walkthrough/ [https://www.infosecarticles.com/tryhackme-the-marketplace-walkthrough/ * https://www.csnp.org/post/tryhackme-pyramid-of-pain-room [https://www.csnp.org/post/tryhackme-pyramid-of-pain-room * https://nananan.github.io/ [https://nananan.github.io/ * https://youtu.be/OepTsVrfIHs [https://youtu.be/OepTsVrfIHs * https://duckduckgo.com/?q=tryhackme+Red+Team+Capstone+Challenge&t=brave&iax=videos&ia=videos&iai=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dxrh3g5VjY6Y [https://duckduckgo.com/?q=tryhackme+Red+Team+Capstone+Challenge&t=brave&iax=videos&ia=videos&iai=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dxrh3g5VjY6Y * https://khalid-emad.gitbook.io/tryhackme-sql-injection-lab/ [https://khalid-emad.gitbook.io/tryhackme-sql-injection-lab/ * https://infosecwriteups.com/sql-injection-lab-tryhackme-writeup-fcf30f846e82 [https://infosecwriteups.com/sql-injection-lab-tryhackme-writeup-fcf30f846e82 * https://www.youtube.com/watch?v=M9JDQtR16Ls [https://www.youtube.com/watch?v=M9JDQtR16Ls * https://theinfosecblog.com/red-team-fundamentals-tryhackme-walkthrough/ [https://theinfosecblog.com/red-team-fundamentals-tryhackme-walkthrough/ * https://www.youtube.com/watch?v=FFjZYrZE_lo [https://www.youtube.com/watch?v=FFjZYrZE_lo * https://www.youtube.com/watch?v=ksMi3p-vvEk [https://www.youtube.com/watch?v=ksMi3p-vvEk * https://benheater.com/tag/tryhackme/ [https://benheater.com/tag/tryhackme/ * https://benheater.com/tryhackme-persisting-active-directory/ [https://benheater.com/tryhackme-persisting-active-directory/ * https://salarbakhtiari.medium.com/extracting-credentials-from-memory-with-lsa-protection-proctected-process-light-enabled-2064af4258bd [https://salarbakhtiari.medium.com/extracting-credentials-from-memory-with-lsa-protection-proctected-process-light-enabled-2064af4258bd * https://raphaelrichard-sec.fr/learning-notes/living-off-the-land [https://raphaelrichard-sec.fr/learning-notes/living-off-the-land * https://raphaelrichard-sec.fr/portswigger [https://raphaelrichard-sec.fr/portswigger * https://benheater.com/tryhackme-exploiting-active-directory/ [https://benheater.com/tryhackme-exploiting-active-directory/ * https://benheater.com/tryhackme-persisting-active-directory/ [https://benheater.com/tryhackme-persisting-active-directory/ * https://www.cyb3rm3.com/bypa551nguac [https://www.cyb3rm3.com/bypa551nguac * https://benheater.com/tryhackme-enumerating-active-directory/ [https://benheater.com/tryhackme-enumerating-active-directory/ * https://www.youtube.com/watch?v=9U0OdYQ7MCg [https://www.youtube.com/watch?v=9U0OdYQ7MCg * https://www.youtube.com/watch?v=k_99-dXtdpc [https://www.youtube.com/watch?v=k_99-dXtdpc * https://www.youtube.com/watch?v=0pcWviZcFVU&list=PLqM63j87R5p6BXQK3VCL-9ZLVyyXs_Au1 [https://www.youtube.com/watch?v=0pcWviZcFVU&list=PLqM63j87R5p6BXQK3VCL-9ZLVyyXs_Au1 * https://www.youtube.com/watch?v=dXgVrnPetKs&list=PLrY_AbzZGqt_-sHuHORntt-ybcrTBUMae&index=3 [https://www.youtube.com/watch?v=dXgVrnPetKs&list=PLrY_AbzZGqt_-sHuHORntt-ybcrTBUMae&index=3 * https://www.youtube.com/playlist?list=PLrY_AbzZGqt_-sHuHORntt-ybcrTBUMae [https://www.youtube.com/playlist?list=PLrY_AbzZGqt_-sHuHORntt-ybcrTBUMae * https://motasem-notes.net/updated-the-complete-windows-privilege-escalation-tryhackme-windows-privesc/ [https://motasem-notes.net/updated-the-complete-windows-privilege-escalation-tryhackme-windows-privesc/ * https://blog.dareboost.com/fr/2017/03/target-blank-rel-noopener-securite-performance/ [https://blog.dareboost.com/fr/2017/03/target-blank-rel-noopener-securite-performance/ * https://blog.mzfr.me/posts/2020-02-1-linux-priv-esc/ [https://blog.mzfr.me/posts/2020-02-1-linux-priv-esc/ * https://mathiasbynens.github.io/rel-noopener/ [https://mathiasbynens.github.io/rel-noopener/ * https://blog.dareboost.com/fr/2017/03/target-blank-rel-noopener-securite-performance/ [https://blog.dareboost.com/fr/2017/03/target-blank-rel-noopener-securite-performance/ * https://www.jitbit.com/alexblog/256-targetblank-the-most-underestimated-vulnerability-ever/ [[https://www.jitbit.com/alexblog/256-targetblank-the-most-underestimated-vulnerability-ever/|fr] * https://www.youtube.com/watch?v=WxbfkN-u8d8 [https://www.youtube.com/watch?v=WxbfkN-u8d8 * https://readysetexploit.wordpress.com/2021/12/21/try-hack-me-napping/ [https://readysetexploit.wordpress.com/2021/12/21/try-hack-me-napping/ * https://infosecwriteups.com/wireshark-101-walkthrough-tryhackme-4d9f7d4264b0 [https://infosecwriteups.com/wireshark-101-walkthrough-tryhackme-4d9f7d4264b0 * https://infosecwriteups.com/ [https://infosecwriteups.com/ * https://bravotwoable.com/category/courses/tryhackme/ [https://bravotwoable.com/category/courses/tryhackme/ * https://beta.hackndo.com/archives/ [https://beta.hackndo.com/archives/ * https://electronicsreference.com/thm/ [https://electronicsreference.com/thm/ * https://www.hackingarticles.in/a-beginners-guide-to-buffer-overflow/ [https://www.hackingarticles.in/a-beginners-guide-to-buffer-overflow/ * https://www.kali-linux.fr/hacking/overflows-passons-a-la-pratique [https://www.kali-linux.fr/hacking/overflows-passons-a-la-pratique * https://www.youtube.com/channel/UC9WYWHLdu9TK-0Hu3wcHJ9g [https://www.youtube.com/channel/UC9WYWHLdu9TK-0Hu3wcHJ9g * https://www.youtube.com/watch?v=jzuxNG13Xj4 [https://www.youtube.com/watch?v=jzuxNG13Xj4 * https://www.youtube.com/watch?v=V7Gdc32XRhA [https://www.youtube.com/watch?v=V7Gdc32XRhA * https://www.youtube.com/watch?v=u-OZQkv2ebw [https://www.youtube.com/watch?v=u-OZQkv2ebw * https://www.thedutchhacker.com/owasp-top-10-on-tryhackme/ [https://www.thedutchhacker.com/owasp-top-10-on-tryhackme/ * https://jinshiranai.hashnode.dev/tryhackme-owasp-top-10-write-up [https://jinshiranai.hashnode.dev/tryhackme-owasp-top-10-write-up * https://medium.com/@4n0m4l1/tryhackme-owasp-top-10-f84353a1963 [https://medium.com/@4n0m4l1/tryhackme-owasp-top-10-f84353a1963 * https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b [https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b * https://0x00sec.org/ [https://0x00sec.org/ * https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst [https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst * https://www.youtube.com/watch?v=eLIRjcI5eYU [https://www.youtube.com/watch?v=eLIRjcI5eYU * https://shamsher-khan-404.medium.com/buffer-overflows-tryhackme-writeup-348aec9c1dfe [https://shamsher-khan-404.medium.com/buffer-overflows-tryhackme-writeup-348aec9c1dfe * https://www.0x0ff.info/2015/buffer-overflow-gdb-part1/ [https://www.0x0ff.info/2015/buffer-overflow-gdb-part1/ * https://shinris3n.github.io/writeups/resources/2021/06/13/TryHackMe-BOF-Prep.html [https://shinris3n.github.io/writeups/resources/2021/06/13/TryHackMe-BOF-Prep.html * https://steflan-security.com/tryhackme-buffer-overflow-prep/ [https://steflan-security.com/tryhackme-buffer-overflow-prep/ * https://faizanwrites.medium.com/buffer-overflow-prep-walkthrough-2375f7ef6a14 [https://faizanwrites.medium.com/buffer-overflow-prep-walkthrough-2375f7ef6a14 * https://noxious.tech/posts/Brainstorm/ [https://noxious.tech/posts/Brainstorm/ * https://erev0s.com/blog/gobuster-directory-dns-and-virtual-hosts-bruteforcing/ [https://erev0s.com/blog/gobuster-directory-dns-and-virtual-hosts-bruteforcing/ * https://www.cyb3rm3.com/wr1t35up [https://www.cyb3rm3.com/wr1t35up * https://marcorei7.wordpress.com/2021/05/04/129-gatekeeper/ [https://marcorei7.wordpress.com/2021/05/04/129-gatekeeper/ * https://www.youtube.com/playlist?list=PLLKTMCUeix3O0DPbmuaRuR_4Hxo4m3G [[https://www.youtube.com/playlist?list=PLLKTMCUeix3O0DPbmuaRuR_4Hxo4m3G|fr] * https://github.com/hamza07-w/gatekeeper-tryHackme-writeup/blob/main/README.md [https://github.com/hamza07-w/gatekeeper-tryHackme-writeup/blob/main/README.md * https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/ [https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/ * https://ludovic-cyber-sec.netlify.app/attacking-kerberos-tryhackme [https://ludovic-cyber-sec.netlify.app/attacking-kerberos-tryhackme * https://bdure.medium.com/attacktive-directory-fr-b10e18002fae [https://bdure.medium.com/attacktive-directory-fr-b10e18002fae * https://snowscan.io/# [https://snowscan.io/# * https://www.cyb3rm3.com/wr1t35up [https://www.cyb3rm3.com/wr1t35up * https://stacklima.com/comment-installer-kali-docker-image-sur-linux/ [https://stacklima.com/comment-installer-kali-docker-image-sur-linux/ * https://sky9262.tistory.com/entry/RG8geW91IGtub3csIHdobyBhbSBJPw [https://sky9262.tistory.com/entry/RG8geW91IGtub3csIHdobyBhbSBJPw * https://intelx.io/integrations [https://intelx.io/integrations * https://medium.com/@4n0m4l1/tryhackme-owasp-top-10-f84353a1963 [https://medium.com/@4n0m4l1/tryhackme-owasp-top-10-f84353a1963 * https://bravotwoable.com/category/courses/tryhackme/ [https://bravotwoable.com/category/courses/tryhackme/ * https://beta.hackndo.com/archives/ [https://beta.hackndo.com/archives/ * https://electronicsreference.com/thm/ [https://electronicsreference.com/thm/ * https://www.hackingarticles.in/a-beginners-guide-to-buffer-overflow/ [https://www.hackingarticles.in/a-beginners-guide-to-buffer-overflow/ * https://www.kali-linux.fr/hacking/overflows-passons-a-la-pratique [https://www.kali-linux.fr/hacking/overflows-passons-a-la-pratique * https://www.youtube.com/channel/UC9WYWHLdu9TK-0Hu3wcHJ9g [https://www.youtube.com/channel/UC9WYWHLdu9TK-0Hu3wcHJ9g * https://www.youtube.com/watch?v=jzuxNG13Xj4 [https://www.youtube.com/watch?v=jzuxNG13Xj4 * https://www.youtube.com/watch?v=V7Gdc32XRhA [https://www.youtube.com/watch?v=V7Gdc32XRhA * https://www.youtube.com/watch?v=u-OZQkv2ebw [https://www.youtube.com/watch?v=u-OZQkv2ebw * https://www.thedutchhacker.com/owasp-top-10-on-tryhackme/ [https://www.thedutchhacker.com/owasp-top-10-on-tryhackme/ * https://jinshiranai.hashnode.dev/tryhackme-owasp-top-10-write-up [https://jinshiranai.hashnode.dev/tryhackme-owasp-top-10-write-up * https://medium.com/@4n0m4l1/tryhackme-owasp-top-10-f84353a1963 [https://medium.com/@4n0m4l1/tryhackme-owasp-top-10-f84353a1963 * https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b [https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b * https://0x00sec.org/ [https://0x00sec.org/ * https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst [https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst * https://www.youtube.com/watch?v=eLIRjcI5eYU [https://www.youtube.com/watch?v=eLIRjcI5eYU * https://shamsher-khan-404.medium.com/buffer-overflows-tryhackme-writeup-348aec9c1dfe [https://shamsher-khan-404.medium.com/buffer-overflows-tryhackme-writeup-348aec9c1dfe * https://www.0x0ff.info/2015/buffer-overflow-gdb-part1/ [https://www.0x0ff.info/2015/buffer-overflow-gdb-part1/ * https://shinris3n.github.io/writeups/resources/2021/06/13/TryHackMe-BOF-Prep.html [https://shinris3n.github.io/writeups/resources/2021/06/13/TryHackMe-BOF-Prep.html * https://steflan-security.com/tryhackme-buffer-overflow-prep/ [https://steflan-security.com/tryhackme-buffer-overflow-prep/ * https://faizanwrites.medium.com/buffer-overflow-prep-walkthrough-2375f7ef6a14 [https://faizanwrites.medium.com/buffer-overflow-prep-walkthrough-2375f7ef6a14 * https://noxious.tech/posts/Brainstorm/ [https://noxious.tech/posts/Brainstorm/ * https://erev0s.com/blog/gobuster-directory-dns-and-virtual-hosts-bruteforcing/ [https://erev0s.com/blog/gobuster-directory-dns-and-virtual-hosts-bruteforcing/ * https://www.cyb3rm3.com/wr1t35up [https://www.cyb3rm3.com/wr1t35up * https://marcorei7.wordpress.com/2021/05/04/129-gatekeeper/ [https://marcorei7.wordpress.com/2021/05/04/129-gatekeeper/ * https://www.youtube.com/playlist?list=PLLKTMCUeix3O0DPbmuaRuR_4Hxo4m3G [[https://www.youtube.com/playlist?list=PLLKTMCUeix3O0DPbmuaRuR_4Hxo4m3G|fr] * https://github.com/hamza07-w/gatekeeper-tryHackme-writeup/blob/main/README.md [https://github.com/hamza07-w/gatekeeper-tryHackme-writeup/blob/main/README.md * https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/ [https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/ * https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b [https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b * https://0x00sec.org/ [https://0x00sec.org/ * https://shamsher-khan-404.medium.com/buffer-overflows-tryhackme-writeup-348aec9c1dfe [https://shamsher-khan-404.medium.com/buffer-overflows-tryhackme-writeup-348aec9c1dfe * Sourcing.Games [https://sourcing.games/ * Hack Today — The Home of Hackers! [https://www.hacktoday.io/ * hacksome | my security journey [https://hackso.me/ * InfoSec Write-ups [https://infosecwriteups.com/ * Steflan's Security Blog [https://steflan-security.com/ * Tag: thm | Rawsec [https://blog.raw.pm/tags/thm/ * CTF Challenges - Hacking Articles [https://www.hackingarticles.in/ctf-challenges-walkthrough/ * CTF Challenges - Hacking Articles [https://www.hackingarticles.in/ctf-challenges-walkthrough/ * https://the-finn.net/ [https://the-finn.net/ * /dev/random: Sleepy Walkthrough CTF [https://highon.coffee/blog/sleepy-ctf-walkthrough/ * Blog [https://epi052.gitlab.io/notes-to-self/blog/ * g0blin Research TOP TOP [https://g0blin.co.uk/ * GTFOBins [https://gtfobins.github.io/#+file%20upload * jhalon.github.io/_posts at master · jhalon/jhalon.github.io [https://github.com/jhalon/jhalon.github.io/tree/master/_posts * Tenten HackTheBox | CTF Machine Walkthrough | Toogles [http://toogl.es/#/view/KXmyFGJZE4g * Tags | 0xdf hacks stuff [https://0xdf.gitlab.io/tags.html#hackthebox * Hacking Articles - Raj Chandel's Blog [https://www.hackingarticles.in/ * Categories - Jack Hacks [https://jhalon.github.io/categories.html * ninja hatori – Medium [https://medium.com/@hninja049 * Tenten HackTheBox | CTF Machine Walkthrough | Toogles [http://toogl.es/#/view/KXmyFGJZE4g * /dev/random: Sleepy Walkthrough CTF [https://highon.coffee/blog/sleepy-ctf-walkthrough/ * Pivoting and Port Forwarding [https://g10s.io/pivoting-and-port-forwarding/ * TryHackMe : Basic Pentesting - Notamax [https://notamax.be/tryhackme-basic-pentesting/ * Intro - Rowbot's PenTest Notes [https://guide.offsecnewbie.com/ * Rowbot's Reverse Shell Generator [https://offsecnewbie.com/reverse_shell.php * Write-Ups | Cyber TryHard [https://juliette1012.github.io/categories/write-ups/ * Tryhackme - Page 2 of 5 - The Dutch Hacker [https://www.thedutchhacker.com/category/write-ups/tryhackme/page/2/ * Categories | qhum7 [https://qhum7.github.io/tabs/categories/ * DarkSec - YouTube [https://www.youtube.com/c/DarkSec/playlists * * [https://www.tashastaples.com/ * Ethical hacking and penetration testing - InfoSec, IT, Kali Linux, BlackArch [https://miloserdov.org/ * TryHackMe Raw Notes - Try Hack Me Writeups [https://harshitruwali.github.io/TryHackMe/index.md/ * HackTricks - HackTricks [https://book.hacktricks.xyz/welcome/readme * hackplayers [https://www.hackplayers.com/
ToolZ
* https://github.com/OlivierLaflamme/Cheatsheet-God [https://github.com/OlivierLaflamme/Cheatsheet-God * https://wiki.wireshark.org/CaptureFilters [https://wiki.wireshark.org/CaptureFilters * https://www.wireshark.org/docs/ [https://www.wireshark.org/docs/ * https://github.com/WindowsExploits/Exploits/tree/master/CVE-2017-0213 [https://github.com/WindowsExploits/Exploits/tree/master/CVE-2017-0213 * https://www.mankier.com/1/xfreerdp [https://www.mankier.com/1/xfreerdp * https://github.com/vavkamil/awesome-bugbounty-tools [https://github.com/vavkamil/awesome-bugbounty-tools * https://miloserdov.org/?p=4726 [https://miloserdov.org/?p=4726 * https://email1.io/?aid=e3ajsfOrhy&from=temp-mail.com [https://email1.io/?aid=e3ajsfOrhy&from=temp-mail.com * https://netsec.ws/?p=337 [https://netsec.ws/?p=337 * https://redteam.guide/docs/checklists/red-team-checklist/ [https://redteam.guide/docs/checklists/red-team-checklist/ * https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/list-of-videos.htm [https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/list-of-videos.htm * https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/list-of-videos.htm [https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/list-of-videos.htm * https://contest-2010.korelogic.com/rules.txt [https://contest-2010.korelogic.com/rules.txt * https://miloserdov.org/?p=3338 [https://miloserdov.org/?p=3338 * https://miloserdov.org/?p=3338 [https://miloserdov.org/?p=3338 * https://w-e-b.site/ [https://w-e-b.site/ * https://hackersinterview.com/ [https://hackersinterview.com/ * https://onlineyamltools.com/convert-yaml-to-json [https://onlineyamltools.com/convert-yaml-to-json * https://github.com/simsong/bulk_extractor [https://github.com/simsong/bulk_extractor * https://redteam.guide/docs/checklists/red-team-checklist [https://redteam.guide/docs/checklists/red-team-checklist * https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/ [https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/ * https://malwareunicorn.org/workshops/re101.html#0 [https://malwareunicorn.org/workshops/re101.html#0 * https://shinolocker.com/ [https://shinolocker.com/ * https://shinosec.com/ [https://shinosec.com/ * https://sh1n0g1.github.io/ [https://sh1n0g1.github.io/ * https://email1.io/?aid=e3ajsfOrhy&from=temp-mail.com [https://email1.io/?aid=e3ajsfOrhy&from=temp-mail.com * https://netsec.ws/?p=337 [https://netsec.ws/?p=337 * https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/list-of-videos.htm [https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/list-of-videos.htm * https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/list-of-videos.htm [https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/list-of-videos.htm * Shadowsocks | A fast tunnel proxy that helps you bypass firewalls. [https://shadowsocks.org/ * Welcome! [https://suip.biz/ * Comment trouver les vulnérabilités d'attaque par injection SQL? [https://geekflare.com/fr/find-sql-injection/ * Toolbox [https://geekflare.com/tools/toolbox * DorkSearch - Speed up your Google Dorking [https://www.dorksearch.com/
Maison
* https://www.loupausa.fr/ [https://www.loupausa.fr/ * Films | Rob Hope [https://robhopefilms.com/films/ * purify video – watch purified youtube videos with no ads [https://purify-video.github.io/?v=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DaicEwUe0JCk * purify video – watch purified youtube videos with no ads [https://purify-video.github.io/?v=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DXsVtSPgaRzI * Shockers, poings électriques et tasers de poche [https://www.armurerie-lavaux.com/Materiel-de-defense/Shockers-Poings-electriques-Taser-de-poche/ * Spurious Correlations [https://tylervigen.com/spurious-correlations * GL.iNet Admin Panel [http://192.168.8.1/#/login * Usbek & Rica - Recherche [https://usbeketrica.com/fr/search/content?q=cyber&sortBy=score * GreenGo | L’alternative à Airbnb. Française et Responsable. [https://www.greengo.voyage/ * CryptPad [https://cryptpad.fr/ * - MassifduPilat.com [https://massifdupilat.com/pilat/randonnee/randonnee-vtt-velo-pilat/ * Commande - Les Jardins de Victorien [https://www.lesjardinsdevictorien.fr/commande/ * Jean-Martin Fortier - Agriculteur et Auteur [https://www.jeanmartinfortier.com/#projects * Guide pour réaliser son jardin alimentaire sur le toit | Agriculture urbaine - Agri-Réseau | Documents [https://www.agrireseau.net/agriculture-urbaine/documents/95947/guide-pour-realiser-son-jardin-alimentaire-sur-le-toit?a=1&r=petit+jardin * 8 sites d'actualités positives et solidaires à suivre ! [https://www.davidcouturier.fr/8-sites-actualites-positives/ * POSITIVR : initiatives positives, causes, innovations et inspirations [https://positivr.fr/ * SynoMyFamily - Synology DiskStation [https://10.0.0.80:5001/#/signin * CS253 - Web Security [https://web.stanford.edu/class/cs253/ * Syno [http://myfamilyariokio.quickconnect.to/https_first/ * SSH Local, Remote and Dynamic Port Forwarding - Explain it like I am five! | - erev0s.com [https://erev0s.com/blog/ssh-local-remote-and-dynamic-port-forwarding-explain-it-i-am-five/ * Syno [http://myfamilyariokio.quickconnect.to/https_first/ * Rockbalancing | Earth Art – Google My Maps [https://www.google.com/maps/d/viewer?mid=1vVvIxeHCE-oBSwHljKKxudiEEvI&msa=0&ie=UTF8&t=m&ll=45.42031066038717%2C4.442260977871677&spn=109.636453%2C316.40625&z=14&source=embed * La gestion des conflits [https://modules-iae.univ-lille.fr/M30/cours/co/002_module_30_Beaucourt_Conflits_web.html * Cloudron - App Store [https://www.cloudron.io/store/index.html# * Le Mot - Wordle en français [https://wordle.louan.me/ * Productivité [https://everlaab.com/ressources/ * Freebox OS [http://mafreebox.freebox.fr/ * Interprétation des 64 hexagrammes Yi King | Yi King interprétation hexagrammes [http://yi-king-gratuit.com/yi-king-interpretation-64-hexagrammes.html * Paraphraz.it | Reformulateur pour réécrire, reformuler, et paraphraser un texte [https://paraphraz.it/fr/ * Welcome to ntopng [http://192.168.1.5:3000/lua/hosts_stats.lua * Maltrail (2021-05-24) [http://192.168.1.5:8338/ * How to install Blackarch Repositories on Arch Linux | FOSS Linux [https://www.fosslinux.com/17105/how-to-install-blackarch-repositories-on-arch-linux.htm * Meditation Timer [https://www.meditation-timer.com/ * InsightTimer FR [https://insighttimer.com/fr/ * Generative.fm - Play [https://play.generative.fm/browse * Generative.fm – Endless ambient music generators [https://generative.fm/ * Free Zen Meditation Timer - Timers for Silent Meditation [https://www.the-guided-meditation-site.com/zen-meditation-timer.html * Zazen Meditation Timer [https://noeldemartin.github.io/zazen-meditation-timer/ * GitHub - legrk/awesome-meditation: meditation and mindfulness online resources [https://github.com/legrk/awesome-meditation * A Soft Murmur [https://asoftmurmur.com/ * Ringtones [https://www.chimes.com/pages/ringtones * Metasploit Unleashed - Free Online Ethical Hacking Course [https://www.offensive-security.com/metasploit-unleashed/ * Hack The Box Universities CTF 2021 | A Hacking Competition For Universities [https://www.hackthebox.eu/event/university-ctf-2021?utm_source=platform&utm_medium=banner&utm_campaign=uni-ctf-2021 * CTFtime.org / Events calendar [https://ctftime.org/calendar/ * Tirez un maximum de ce cours - Apprenez les bases du langage Python - OpenClassrooms [https://openclassrooms.com/fr/courses/7168871-apprenez-les-bases-du-langage-python/7289381-tirez-un-maximum-de-ce-cours * Resoomer | Résumeur pour faire un résumé de texte automatique en ligne [https://resoomer.com/ * SafeCycle - Itinéraire pour vélo, centré sur la sécurité, gratuit et open source [https://safecycle.atelier-des-communs.fr/?profile=route&vae=true&sort=safe&start=45.439459%2C4.447880&end=45.458860%2C4.395939# * AttackIQ Academy [https://academy.attackiq.com/ * SuperCook - Zero Waste Recipe Generator [https://www.supercook.com/#/ * Pentest – Tests d’intrusion et audits de sécurité | Vaadata [https://www.vaadata.com/fr/ * UFONet - Denial of Service Toolkit [https://ufonet.03c8.net/ * Avanset VCE Exam Simulator 3.0 Crack Torrent + License Key 2022 Latest [https://licensedcrack.com/avanset-vce-exam-simulator-crack-key/ * Autoprotection Digitale Contre la Surveillance | Astuces, Outils et Guides Pratiques pour des Communications En Ligne Plus Sécurisées [https://ssd.eff.org/fr * Sketchfab - The best 3D viewer on the web [https://sketchfab.com/ * Granite stone pink 03 - Download Free 3D model by 3dhdscan (@3dhdscan) 1f1710c [https://sketchfab.com/3d-models/granite-stone-pink-03-1f1710c6f8be4419a2ef02012b2308fd * accueil La Doc [https://ladoc.cemea.org/accueil * Master 2 OPSIE : Organisation et Protection des Systèmes d’Information dans les Entreprises | Agence nationale de la sécurité des systèmes d'information [https://www.ssi.gouv.fr/particulier/formations/secnumedu/formations-labellisees-secnumedu/master-2-opsie-organisation-et-protection-des-systemes-dinformation-dans-les-entreprises/ * Rockbalancing | Earth Art – Google My Maps [https://www.google.com/maps/d/viewer?mid=1vVvIxeHCE-oBSwHljKKxudiEEvI&fbclid=IwAR2VKhLS4ODSGVNY4gGxAr8VGcRjNvE9L5HI134Bdea3lMQyiEmZ2yYp-lU&ll=4.25701657132063%2C-90.65504695000004&z=2 * The 16 Best Sites to Watch TV on Your Computer Over the Internet [https://www.makeuseof.com/tag/best-streaming-tv-services/ * 12 Video Sites That Are Better Than YouTube [https://www.makeuseof.com/tag/top-12-sites-watch-videos-youtube/ * Online Pranks 😈😂 | Just Pranx, Bro! [https://pranx.com/ * ActivityWatch - Open-source time tracker [https://activitywatch.net/ * Dépôt du dossier et traitement demande MDPH | Mon Parcours Handicap [https://www.monparcourshandicap.gouv.fr/aides/le-depot-du-dossier-et-le-traitement-de-la-demande-par-la-maison-departementale-des-personnes * La Maison Loire Autonomie - Handicap (MDPH) - Département de la Loire [https://www.loire.fr/jcms/lw_1326999/fr/la-maison-loire-autonomie-handicap-mdph * Emploi et handicap : la reconnaissance de la qualité de travailleur handicapé (RQTH) - Ministère du Travail, du Plein emploi et de l'Insertion [https://travail-emploi.gouv.fr/emploi-et-insertion/emploi-et-handicap/rqth * pipotron - altavista Yahoo Search Results [https://us.yhs4.search.yahoo.com/yhs/search;_ylt=A0oG7pwWSMtOMVgAqg2stLcF?ei=UTF-8&p=pipotron&fr=altavista * Pipotron [http://www.pipotron.free.fr/ * Accueil - Les Économistes Atterrés [https://www.atterres.org/ * Une analyse du projet de réforme des retraites tel que le présente le gouvernement. - Les Économistes Atterrés [https://www.atterres.org/une-analyse-du-projet-de-reforme-des-retraites-tel-que-le-presente-le-gouvernement/ * Webcams autour de Saint-Étienne - meteoblue [https://www.meteoblue.com/fr/meteo/webcams/saint-%C3%89tienne_france_2980291 * Webcams DIR Centre Est [http://www.webcams-dir.centre-est.developpement-durable.gouv.fr/ * EarthCam - Webcam Network [https://www.earthcam.com/mapsearch/ * Live cameras: France [http://insecam.org/en/bycountry/FR/?page=4 * EarthCam - Hall of Fame [https://www.earthcam.com/halloffame/ * Accueil [https://www.mesdroitssociaux.gouv.fr/accueil/ * Vente aux enchères de biens d'occasion et biens immobiliers des collectivités et entreprises - Agorastore [https://www.agorastore.fr/ * Vente du 01/04/2023 au 07/04/2023 | encheres-domaine [https://encheres-domaine.gouv.fr/hermes/ventes/vente-en-ligne/vente-du-01042023/505086 * L'Enatronic, générateur de discours façon ENA [http://chrisferon.free.fr/technologies-langage/pipotron-discours-ena.php * L'argent Dette (2010) Paul Grignon - YouTube [https://www.youtube.com/watch?v=kgA2-bWXSN4 * Achat pièces d'or et d'argent en ligne sur AuCOFFRE.com [https://www.aucoffre.com/ * Cartes météo | Radar météo & satellite en temps réel - meteoblue [https://www.meteoblue.com/fr/meteo/cartes/saint-%c3%89tienne_france_2980291#coords=4/45.43/4.39&map=temperature~daily-max~auto~2%20m%20above%20gnd~none * Play Unblocked Games - UBG365 [https://ubg365.github.io/ * Bored Panda - The Only Magazine For Pandas [https://www.boredpanda.com/ * How to Meditate - Mindful [https://www.mindful.org/how-to-meditate/ * Cryptoast - Démocratisons la crypto-monnaie ! [https://cryptoast.fr/ * Forfait Mobile : Voici les meilleures offres en juillet 2023 [https://www.frandroid.com/comparateur-forfaits * Le chemin sauvage - accueil [https://www.lecheminsauvage.com/ * Boutique - Chemin Sauvage [https://www.lecheminsauvage.com/la-boutique/ * Itinéraires vélo en France : trouver et calculer votre parcours [https://www.francevelotourisme.com/itineraire * Service Addresses & Features | Quad9 [https://quad9.net/service/service-addresses-and-features/#ip * Plan Maison 3D - Logiciel gratuit pour dessiner ses plans 3D [https://www.kozikaza.com/kazaplan/new * La communauté et les outils pour la maison | Kozikaza [https://www.kozikaza.com/?s=09 * Sweet Home 3D : Guide d'utilisation [https://www.sweethome3d.com/fr/userGuide.jsp * Free Accounts Archives » Tricky Wire [https://www.trickywire.com/category/free-accounts/ * Téléchargement et utilisation de l’image de récupération du système d’exploitation Dell | Dell France [https://www.dell.com/support/kbdoc/fr-fr/000123667/telechargement-et-utilisation-de-l-image-de-recuperation-du-systeme-d-exploitation-dell-dans-microsoft-windows * How to Enable Developer Mode on Your Chromebook [https://www.howtogeek.com/210817/how-to-enable-developer-mode-on-your-chromebook/ * GitHub - dnschneid/crouton: Chromium OS Universal Chroot Environment [https://github.com/dnschneid/crouton * How to Restore Your Chromebook's Original BIOS and Software If You've Erased It [https://www.howtogeek.com/279308/how-to-restore-your-chromebooks-original-bios-and-software/ * Android App Testing on Chromebooks - Professionally Evil Insights [https://www.secureideas.com/blog/2019/02/android-app-testing-on-chromebooks.html * 21 Crosh Terminal Commands All Chromebook Users Should Know [https://www.makeuseof.com/tag/terminal-commands-chromebook/ * Comment restaurer un Chromebook après un crash système . [https://mychromebook.fr/comment-restaurer-un-chromebook-apres-un-crash-systeme/ * Skilleos | Cours pour Professionnels en ligne | Skilleos [https://www.skilleos.com/pro?orderBy=ranking * Humoresques - Bienvenue sur le site Humoresques [http://www.humoresques.fr/ * Offres d'emploi ⋅ Saint-Étienne ⋅ CDI - jobs_that_makesense [https://jobs.makesense.org/fr/s/jobs/Saint-%C3%89tienne--France/all/cdi * Capture Labs [https://capturelabs.sonicwall.com/m/feature/security-center * Pricing - Read more [https://skiff.com/pricing * Uniqkey Features: Built for IT, Designed for Employees [https://www.uniqkey.eu/features
Meditate
* Le massif du Pilat : l’air le plus pur du monde !* – Esprit Jeûne · Respir n'Ice [https://www.jeune-rando-yoga.fr/massif-du-pilat/ * 30 Day Meditation Challenge - YouTube [https://www.youtube.com/playlist?list=PL2CsBiOXfpeLEAgwfGrfcz7TygFim9vX0 * 30 Day Meditation Challenge for Beginners - One Mind Dharma [https://oneminddharma.com/30-day-meditation-challenge/ * ChatGPT - L'univers est-il infini? [https://chat.openai.com/chat * Playground - OpenAI API ChatGPT [https://beta.openai.com/playground * Meditate [https://meditation-timer.netlify.app/ * PHOTOCALL.TV - Televisión y radio online [https://photocall.tv/ * Plus de 1 000 vidéos gratuites de Drone et de Nature en résolution HD et 4K - Pixabay [https://pixabay.com/fr/videos/search/drone/ * carte rockbalance - Rockbalancing | Earth Art – Google My Maps [https://www.google.com/maps/d/viewer?mid=1vVvIxeHCE-oBSwHljKKxudiEEvI&fbclid=IwAR2VKhLS4ODSGVNY4gGxAr8VGcRjNvE9L5HI134Bdea3lMQyiEmZ2yYp-lU&ll=4.25701657132063%2C-90.65504695000004&z=2 * THE DEEPEST OM 108 Times Peaceful OM Mantra Meditation | THE DEEPEST OM 108 Times Peaceful OM Mantra Meditation | By Sounds of Meditation | Facebook [https://www.facebook.com/soundsofmeditation/videos/858209811032477 * The Tools by Phil Stutz and Barry Michels - TuningJohn [https://tuningjohn.com/book/tools/ * Articles et conseils - Le RIME - Réseau International du Mieux-Être [https://le-rime.com/articles-et-conseils/ * A Soft Murmur [https://asoftmurmur.com/ * Noisli - Improve Focus and Boost Productivity with Background Sounds [https://www.noisli.com/ * Pluto TV Extrême sur Pluto TV [https://pluto.tv/fr/live-tv/pluto-tv-extreme-fr * Pluto TV Voyage sur Pluto TV [https://pluto.tv/fr/live-tv/pluto-tv-voyage-fr * Pluto TV Yoga sur Pluto TV [https://pluto.tv/fr/live-tv/pluto-tv-yoga-fr * Voir Films et Series Streaming Gratuitement HD - Lebonstream [https://www.lebonstream.xyz/ * Coflix [https://coflix.tv/browse * Bflix Alone Australia (2023) Online Free on bflix [https://bflixmovies.me/series/alone-australia-2023-full-tv-show-free-bflix-watch-online-free-7931.html * Bflix [https://bflix.io/ * Watch Movies Online Free [https://bflix.to/movies * widrav widrav.com [https://widrav.com/ * Flokta - John Wick : Chapitre 4 (2023) [https://flokta.com/1qsl2p45h3/b/flokta/3253012350 * Imago TV - Tous les documentaires [https://www.imagotv.fr/documentaires * Le Dhammapada: les dits du Bouddha [http://www.dhammadelaforet.org/sommaire/dhp/dhp_sommaire.html * Plateforme de streaming films nature & documentaires animaliers - SVOD - Salamandre [https://www.salamandre.tv/ * HumanDilemma | Kick [https://kick.com/humandilemma * Contenus d'une chaîne de vidéos - PeerTube [https://peertube.su/c/hacker_sploit/videos * HuniTV - stream sport [https://fdabe9.myshopify.com/ * Stream2watch- Best Sports Stream Sites [https://thestream2watch.net/
Share_File
* Gofile - Free file sharing and storage platform [https://gofile.io/welcome
Jardin
* Box de graines - Box de graines - Légumes faciles | Association Kokopelli [https://kokopelli-semences.fr/fr/p/KK0002-Box-de-graines-Legumes-faciles * Semences bio, graines potagères variétés anciennes [https://www.lepotagerdesante.com/ * Entretien du potager : Conseils, astuces et infos pour jardiniers [https://jardinerfacile.fr/potager/ * Spurious Correlations [https://tylervigen.com/spurious-correlations * Le potager d'Olivier - YouTube [https://www.youtube.com/channel/UC3-gwlrYQi5Q3t00Tyr2tmQ/videos * permaculture agroécologie etc... - YouTube [https://www.youtube.com/@permacultureetc
Correction_aide_FR
* SCRIBENS [https://www.scribens.fr/ * CORDIAL [https://www.cordial.fr/enligne.php/ * Correction de texte en ligne [https://www.correctiononline.fr/ * Reverso [http://www.reverso.net/orthographe/correcteur-francais/ * BonPatron [https://bonpatron.com/ * Larousse.fr [https://www.larousse.fr/ * LanguageTool [https://languagetool.org/fr/ * SpellBoy [https://www.spellboy.com/verification_orthographique/ * Connecteurs logiques [https://sites.uclouvain.be/infosphere_boreal/fichiers_communs/module7/connecteurs.html * Reverso | Traduction gratuite, Dictionnaire, Grammaire [http://www.reverso.net/text_translation.aspx?lang=FR * Trucs et astuces orthographique, synthaxique et grammaire [http://www.ladictee.fr/grammaire/truc_astuce_orthographe_grammaire_conjugaison_vocabulaire_syntaxe.htm * CCDMD - Exercices interactifs - Exercices interactifs [https://www.ccdmd.qc.ca/fr/exercices_interactifs/ * Le détecteur de fautes [https://detecteur.ccdmd.qc.ca/#/exercices * CCDMD - Stratégies d'écriture - Stratégies d'écriture dans la formation spécifique [https://www.ccdmd.qc.ca/fr/strategies_ecriture/ * Threat Reference : répertoire des cybermenaces et attaques internet | Proofpoint FR [https://www.proofpoint.com/fr/threat-reference * Paraphraz.it | Reformulateur pour réécrire, reformuler, et paraphraser un texte [https://paraphraz.it/fr/ * Réécrire, reformuler ou reformuler du texte | changeur de mots gratuit [https://smodin.io/fr/reformuler-automatiquement-le-texte-en-francais-gratuitement * MerciApp • Correcteur d'orthographe et de grammaire [https://www.merci-app.com/ * Orthographe [https://www.francaisfacile.com/cgi2/myexam/liaison.php?liaison=_orthographe_ * Figures de style : le guide complet | La langue française [https://www.lalanguefrancaise.com/linguistique/figures-de-style-guide-complet
PNL-eneagramme-MBIST
* Test Ennéagramme (gratuit) | Commencer le Test (2022) [https://enneagram.bz/fr * Type de personnalité ISTP | The Myers-Briggs Company [https://eu.themyersbriggs.com/fr-FR/tools/MBTI/MBTI-personality-Types/ISTP
Japon
* le site du Japon - le site du Japon [https://lesitedujapon.com/ * Les pierres et le Japon - le site du Japon [https://lesitedujapon.com/les-pierres-et-le-japon/ * Auberge de jeunesse au Japon, réservez votre hostel idéal sur Hostelworld. [https://www.french.hostelworld.com/st/auberges-de-jeunesse/asie/japon/?source=affiliate-PHG-1101l3Ic4&affiliate=PHG&ref_id=1011lwvnEyLe * Japon intime - Au fil du Japon [https://www.voyagejapon.com/circuit/japon-intime * Cours de japonais n1 débutant - le site du Japon [https://lesitedujapon.com/cours-de-japonais-n1/
Bushcraft
* Make A Crossbow From Scratch Video | Survival Life [https://survivallife.com/diy-survival-make-a-crossbow-from-scratch/
SPORTS
* DAREBEE [https://darebee.com/ * 8 habitudes alimentaires pour garder la ligne et être en bonne santé [http://www.litobox.com/guide-nutrition * 30 Days Combat HIIT - YouTube [https://www.youtube.com/playlist?list=PLQSMS0J6JbrKcGgbOwIknlYcFv0vrHcI3 * 4 Elliptical Workouts for MAXIMUM Weight Loss [http://www.nowloss.com/elip/ * Entrainement sportif - Programmes de sport tous niveaux [https://entrainement-sportif.fr/#gsc.tab=0 * Gainage - 15 exercices pour renforcer la sangle abdominale [https://entrainement-sportif.fr/perdre-ventre-gainage-ceinture-abdominale.htm#programme-gainage * MuscleWiki - Exercises - Abdominals [https://musclewiki.com/exercises/male/abdominals
Android
* Info about Samsung Galaxy S5 Neo - s5neolte [https://doc.e.foundation/devices/s5neolte * Open Source Mobile OS Alternatives To Android [https://itsfoss.com/open-source-alternatives-android/ * Install LineageOS on klte | LineageOS Wiki [https://wiki.lineageos.org/devices/klte/install * Info about klte | LineageOS Wiki [https://wiki.lineageos.org/devices/klte/
GPS_Cartographie
* Randonnée pédestre avec trace gps à télécharger gratuitement - hébergements - carte Ign© - topoguide [https://www.randogps.net/ * OpenTopoMap - Topographische Karten aus OpenStreetMap [https://opentopomap.org/#map=15/45.37796/4.53761 * CyclOSM: OpenStreetMap-based bicycle map [https://www.cyclosm.org/#map=13/45.3708/4.4416/cyclosm * BBBike extracts OpenStreetMap [https://garmin3.bbbike.org/
Best_Off
* Mr. Free Tools - The Best Free Tools & Resources [https://mrfreetools.com/
Ziq
* Freesound - sound search [https://freesound.org/search/?q=nature&f=tag%3A%22forest%22&w=&s=Duration+%28long+first%29&advanced=0&g=1 * La BOITE à MUSIQUES | RADIO DIO [https://radiodio.org/pres_emission/chat-sonne/ * Ane Brun playlist top [https://www.youtube.com/watch?v=nOubjLM9Cbc&index=30&list=RDGNSBctmMI3k * RADIO DIO [http://radiodio.axperia.net/ * Listen to Ambient Sounds and Music With Timer - Deepfocus.io [https://deepfocus.io/ * TuneIn [https://tunein.com/radio/Music-c424724/?attributes=filter%3Dl98 * Qobuz Web Player [https://play.qobuz.com/artist/21621 * FIP autour de l'electro | Free Internet Radio | TuneIn [https://tunein.com/radio/FIP-autour-de-lelectro-s293089/ * Laura Marling - What He Wrote - YouTube [https://www.youtube.com/watch?v=g3BXL3QvQD8&list=RDg3BXL3QvQD8&start_radio=1 * Wanderlust 🌲 - An Indie/Folk/Pop Playlist - YouTube [https://www.youtube.com/watch?v=KCCqqPqDqSY * Wanderlust 🌲 - An Indie/Folk/Pop Playlist - YouTube [https://www.youtube.com/watch?v=KCCqqPqDqSY&list=RDKCCqqPqDqSY&start_radio=1 * TSUGI RADIO - TSUGI [https://www.tsugi.fr/tsugi-radio/ * DownTown | Jazzy HipHop - YouTube [https://www.youtube.com/watch?v=GGBm9gTY2NU&list=RDGGBm9gTY2NU&start_radio=1&t=28 * Liquid Drum and Bass Mix #60 - YouTube [https://www.youtube.com/watch?v=aJoo79OwZEI&list=RDaJoo79OwZEI&start_radio=1&t=0 * The Cinematic Orchestra - To Build a Home - YouTube [https://www.youtube.com/watch?v=QB0ordd2nOI&list=RDEMne13xUS4wJ54s16t5fVBDg&start_radio=1 * The Ultimate Indie-Folk Playlist | Vol. 2 - YouTube [https://www.youtube.com/watch?v=HYsN3drpUms&start_radio=1&list=RDHYsN3drpUms&t=2 * Discographie officielle de Tricky à écouter et regarder gratuitement [http://www.allformusic.fr/tricky/discographie * Programming / Coding / Hacking music vol.20 (UNDER THE DEEP) - YouTube [https://www.youtube.com/watch?v=rr0gvSS1OzE&index=7&list=PLUja9J5M1XReqoBal5IKog_PWz2Q_hZ7Y * TSUGI - toute la musique d’aujourd’hui… et de demain. [https://www.tsugi.fr/ * Background Noises • Ambient Sounds • Relaxing Music | myNoise ® [https://mynoise.net/noiseMachines.php * Japanese Garden • Relaxing Ambience Player [https://mynoise.net/NoiseMachines/japaneseGardenSoundscapeGenerator.php * Chillout-Radio.com - Chillout Lounge Music Radio [https://chillout-radio.com/ * Hipstersound - coffee shop sounds for creative stimulation. [https://hipstersound.com/ambient.html * Rainyscope weather simulator: the beauty of the changing seasons. [https://rainyscope.com/#slide-3 * Listen to Smooth Jazz and Rain Sounds - JazzAndRain.com [http://www.jazzandrain.com/ * 8tracks [https://8tracks.com/explore/blues_rock/popular/5 * peaky blinders - download free mp3 - Mp3-PM [http://mp3pn.info/search/s/f/neil+young/ * peaky blinders - download free mp3 - Mp3-PM [http://mp3-pm.org/s/f/peaky+blinders/ * WebOas.is - Radio [https://weboas.is/radio/ * Download Free Music for YouTube videos | Bensound [https://www.bensound.com/free-music-for-youtube-videos * MyPianoPop - Cours de Piano Pop n°1 en France et en Europe [https://www.mypianopop.com/ * Cours de guitare Blues Débutant Gratuit - Les Bases [https://www.myguitare.com/cours/cours-guitare-blues-debutant-gratuit * csmultimedios.servehttp.com - /Discografias A-Q/ [http://csmultimedios.servehttp.com/Discografias%20A-Q/ * csmultimedios.servehttp.com - /Discografias R-Z/ [http://csmultimedios.servehttp.com/Discografias%20R-Z/ * Index of /ongaku [http://meoac.com/ongaku/ * Télécharger de la musique libre et gratuite [https://www.auboutdufil.com/ * Don's Tunes on Spotify [https://open.spotify.com/user/dondraperstunes?si=UxKfg7zBQg6_cc5rQrQywg&nd=1&dlsi=8c04ecd047f245df * purify video – watch purified youtube videos with no ads [https://purify-video.github.io/?v=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D1IATcDK8AOE
DEMO_secu
* hakanonymos / June 2021 [https://github.com/hakanonymos?tab=overview&from=2021-06-01&to=2021-06-30 * Shoppy - Profile of hakanonymos [https://shoppy.gg/@hakanonymos * Learn to Hack [https://www.hacksplaining.com/
Prez
* derouler_atelier_mrrobot.sh · master · BigData / Demo-Security · GitLab [https://gitlab.adista.intra/BigData/Demo-Security/blob/master/derouler_atelier_mrrobot.sh * Cast & Info | Mr. Robot | USA Network [http://www.usanetwork.com/mrrobot/cast * My Photoblog - last picture [http://www.fstsh.com/ * http://www.whoismrrobot.com/ [http://www.whoismrrobot.com/ * who is Mr Robot USA Network casting - Recherche Google [https://www.google.fr/search?q=who+is+Mr+Robot+USA+Network+casting&ie=utf-8&oe=utf-8&client=firefox-b-ab&gfe_rd=cr&dcr=0&ei=fZqBWtfPNOfBXsmJu4gM * ASafety » Reverse-shell one-liner Cheat Sheet [https://www.asafety.fr/reverse-shell-one-liner-cheat-sheet/
Utils
* breachdirectory [https://breachdirectory.org/?__cf_chl_rt_tk=VPJZtMdhi.bdw_XO_sqTpJLIDeJ0uxqpDZL_bh7xRy0-1705049575-0-gaNycGzNDSU * Online SHA1 Encryption and Decryption [https://md5decrypt.net/en/Sha1/ * Speedtest unyc [http://speedtest.unyc.io/ * Skiff - mail - drive-calendar [https://app.skiff.com/signin?s=referer-header&c=https%3A%2F%2Fwww.clubic.com%2F&pt=2.0%3A+Privacy-first%2C+end-to-end+encrypted+email+%28with+color%29.&agid=undefined&aid=undefined * All DNS record types [https://www.nslookup.io/ * https://api.ipify.org/ [https://api.ipify.org/ * Find email addresses in seconds • Hunter (Email Hunter) [https://hunter.io/ * Subdomain Finder scan of adista.fr - C99.nl [https://subdomainfinder.c99.nl/scans/2023-12-04/adista.fr * Tools - Intelligence X [https://intelx.io/tools * explorateur de données data.gouv.fr [https://explore.data.gouv.fr/ * Subdomain Finder scan of unyc.io - C99.nl [https://subdomainfinder.c99.nl/scans/2023-12-28/unyc.io * file.io - Super simple file sharing [https://www.file.io/ * purify video – watch purified youtube videos with no ads [https://purify-video.github.io/ * We Transfer Gratuit. Envoi sécurisé de gros fichiers. [https://www.swisstransfer.com/fr-fr * Code Beautify and Code Formatter For Developers - to Beautify, Validate, Minify, JSON, XML, JavaScript, CSS, HTML, Excel and more [https://codebeautify.org/ * Mail1.io [https://email1.io/?aid=dB0sZKEUx1&from=temp-mail.com * Check if a Website is Malicious/Scam or Safe/Legit | URLVoid [https://www.urlvoid.com/ * Domain Reputation Check Tool | IPVoid [https://www.ipvoid.com/domain-reputation-check/ * Find your mail server IP - Blacklistmaster [https://www.blacklistmaster.com/find-your-mailserver-ip * IPCisco | Cisco Networking Academy | Network Certification | Learn [https://ipcisco.com/ * CRDF Threat Center: List of malware samples detected by CRDF Labs [https://threatcenter.crdf.fr/samples.html * Translate [https://libretranslate.com/?source=auto&target=fr&q=Translate%2520Shell%2520is%2520a%2520command-line%2520translator%2520powered%2520by%2520Google%2520Translate%2520%28default%29%2C%2520Bing%2520Translator%2C%2520Yandex%2520Translate%2C%2520and%2520Apertium.%2520It * NsTools.fr : 5.153.183.164 - Analyse, trouver et whois mon adresse IP 5.153.183.164 [https://nstools.fr/5.153.183.164 * DeepL Traduction – DeepL Translate : le meilleur traducteur au monde [https://www.deepl.com/fr/translator * Liste des adresses IP: 45.67.229.* (45.67.229.0 - 45.67.229.254) | Adresse IP (Français) 🔍 [https://fr.ipshu.com/ip_d_list/45.67.229 * 45.67.230.45 | Dictionary Attacker | IP Address Inspector | Project Honey Pot [https://www.projecthoneypot.org/ip_45.67.230.45 * FireHOL IP Lists | IP Blacklists | IP Blocklists | IP Reputation [https://iplists.firehol.org/ * 216.244.66.202 | Wowrack.com | AbuseIPDB [https://www.abuseipdb.com/check/216.244.66.202 * 216.244.66.202 IP Reputation Lookup | IP Address Reputation Check [https://www.ipqualityscore.com/ip-reputation-check * URLhaus | Browse [https://urlhaus.abuse.ch/browse.php?search=https%3A%2F%2Fcoppellhomedecor.com%2Ftip.js * Search - urlscan.io [https://urlscan.io/search/#* * tutanota : Créez un compte de courriel gratuit aujourd'hui [https://tutanota.com/fr/pricing * Blacklist Check - IP Checker [https://iptoolbox.org/blacklist-check.php * BGP.Tools [https://bgp.tools/ * Whois Lookup, Domain Availability & IP Search - DomainTools [https://whois.domaintools.com/ * MAC 84:A9:3E | MAC Address Lookup [https://maclookup.app/search/result?mac=84:a9:3e:4b:1d:8a * Whois planet-work.com [https://www.whois.com/whois/planet-work.com * request catcher [https://okio.requestcatcher.com/ * Similar Site for Request Catcher â record HTTP requests, webhooks, API calls [https://similarsite.org/show-page/requestcatcher.com * Server Uptime - Free 1 min monitoring, 100 monitors, 12 locations. [https://server-uptime.com/ * POST Requests Online [https://reqbin.com/post-online * Beeceptor - Rest/SOAP API Mocking, HTTP Debugger & Proxy - API Mock Server [https://beeceptor.com/ * IoT Detection Service | FortiGuard [https://www.fortiguard.com/services/dds * IP Reputation/Blacklist Check, Online IP Reputation Lookup | APIVoid [https://www.apivoid.com/tools/ip-reputation-check/ * Palo Alto Networks URL filtering - Test A Site [https://urlfiltering.paloaltonetworks.com/query/ * MetaDefender Cloud | Results [https://metadefender.opswat.com/results/file/6CA3D50D18E1517D557B56DA9E4BB897142E026949DC5E74A504887B2F44064D/hash/overview * LOLBAS [https://lolbas-project.github.io/# * GTFOBins [https://gtfobins.github.io/ * https://www.zone-h.org/archive?hz=1 [https://www.zone-h.org/archive?hz=1 * Hash text - IT Tools [https://it-tools.tech/hash-text * Ophcrack [https://ophcrack.sourceforge.io/ * Logiciel d'emailing & marketing par e-mail - YMLP [https://www.ymlp.com/fr/ * Clavier Virtuel [http://claviervirtuel.fr/ * ACCOUNTKILLER.COM - [https://www.accountkiller.com/en/
GENERAL
* ENI training [https://www.eni-training.com/portal/client/home * Python Tutorial | Learn Python Programming [https://www.geeksforgeeks.org/python-programming-language/?ref=shm * Automated application deployment with GitHub Actions and Pages | GitHub Resources - GitHub Resources [https://resources.github.com/learn/pathways/automation/essentials/automated-application-deployment-with-github-actions-and-pages/ * Web Penetration Testing - Hacking Articles [https://www.hackingarticles.in/web-penetration-testing/ * Blog ⋆ IpCisco [https://ipcisco.com/ipcisco-blog/ * Search About python - Mind Luster [https://www.mindluster.com/?search_for=Python+ * Network – Ringtail Security [https://ringtail.ch/collections/network * Programmer en Python en 1h30 avec Anaconda (GRATUIT - 2023) | Udemy [https://www.udemy.com/course/programmer-python/learn/lecture/24560522#content * Penetration Testing Bootcamp |fr] Penetration Testing Bootcamp - Information Gathering | Class Central Classroom [https://www.classcentral.com/classroom/youtube-penetration-testing-bootcamp-53185/6108cc9fd9b5a * GitHub - devanshbatham/Awesome-Bugbounty-Writeups: A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference [https://github.com/devanshbatham/Awesome-Bugbounty-Writeups * Cisco Skills For All Ethical Hacking [https://skillsforall.com/ * Resource Hub: Get Packet Tracer, Virtual Machines, and More [https://skillsforall.com/resources/lab-downloads?courseLang=en-US * Cisco Skills For All English 1 [https://skillsforall.com/fr/launch?id=1c91fa6b-3459-45ab-ab8d-e2ed5213e35a&tab=curriculum&view=20b578a1-0aae-57f4-8949-bfc4786ccf6f * UTM | Virtual machines for Mac [https://mac.getutm.app/ * Home – Siren Security [https://sirensecurity.io/blog/home/ * futurecoder [https://fr.futurecoder.io/course/#IntroducingTheShell * Meterpreter. – Siren Security [https://sirensecurity.io/blog/home/ * Connectez-vous et commencez à apprendre | Udemy [https://www.udemy.com/join/login-popup/?next=/course/programmer-python/learn/lecture/24560522%3Fstart%3D225#overview * Veille Archives - Cyberwatch [https://cyberwatch.fr/veille/ * Comment prioriser les vulnérabilités de son système d'information ? [https://cyberwatch.fr/veille/comment-prioriser-les-vulnerabilites-de-son-systeme-dinformation/ * Comment utiliser le MITRE ATT&CK pour analyser une menace informatique ? [https://cyberwatch.fr/veille/comment-utiliser-le-mitre-attack-pour-analyser-une-menace-informatique/ * Linode Guides & Tutorials | Linode Docs [https://www.linode.com/docs/guides/ * Vulnerability Detection | Linode Docs [https://www.linode.com/docs/guides/security/vulnerabilities/ * VirtualBox: How To Fix Failure In Starting VM (On Manjaro Linux) - DEV Community [https://dev.to/nabbisen/virtualbox-how-to-solve-a-problem-about-failure-in-starting-vm-on-manjaro-linux-49fg * ATA Learning - High quality, in-depth, no-fluff how-to articles on IT, sysadmin, cloud and DevOps. [https://adamtheautomator.com/ * Information Security [https://adamtheautomator.com/category/infosec/ * I Learned [https://ilearned.eu/ * Supports [https://www.cyberedu.fr/pages/supports/ * Liens intéressants – Stanislas.io [https://stanislas.io/quelques-lectures-interessantes/ * How to Install and Use the Linux Bash Shell on Windows 10 [http://www.howtogeek.com/249966/how-to-install-and-use-the-linux-bash-shell-on-windows-10/ * Mitesh Shah [https://miteshshah.github.io/ * Automated application deployment with GitHub Actions and Pages | GitHub Resources - GitHub Resources [https://resources.github.com/learn/pathways/automation/essentials/automated-application-deployment-with-github-actions-and-pages/ * Formation DevOps | Stéphane ROBERT [https://blog.stephane-robert.info/docs/ * Digital Forensics & Incident Response Blog Geared Toward Beginners [https://dfirdiva.com/ * Learn REST APIs [https://rapidapi.com/learn/rest#what-is-an-api
vuln_exploit_vuln_veille
* GitHub - rapid7/hackazon: A modern vulnerable web app [https://github.com/rapid7/hackazon * Vulnerability Database 🛡 [https://vuldb.com/fr/ * Vulnérabilités – IØ Expertises [https://www.io-expertises.fr/category/vulnerabilites/ * Malvuln - Malware security vulnerabilty research and exploits targeting malware, worms and viruses. Malvuln is a unique source for malware exploit threat intel." [https://malvuln.com/ * Technical Advisory: Zero-day critical vulnerability in Log4j2 exploited in the wild [https://businessinsights.bitdefender.com/technical-advisory-zero-day-critical-vulnerability-in-log4j2-exploited-in-the-wild * Pick a Vulnerability to Learn About [https://www.hacksplaining.com/lessons * https://nvd.nist.gov/vuln [https://nvd.nist.gov/vuln * http://www.morningstarsecurity.com/news#vulnerabilities [http://www.morningstarsecurity.com/news#vulnerabilities * https://vulners.com/search?query=!bulletinFamily:ioc%20order:published [https://vulners.com/search?query=!bulletinFamily:ioc%20order:published * https://blog.vulners.com/ [https://blog.vulners.com/ * Vulnerability Database 🛡 [https://vuldb.com/ * Vulnerability DB | Snyk [https://snyk.io/vuln/search?q=elasticsearch&type=any * https://vulners.com/search?query=!bulletinFamily:ioc%20order:published [https://vulners.com/search?query=!bulletinFamily:ioc%20order:published * contao cms vulnerabilities - Recherche Google [https://www.google.com/search?source=hp&ei=fqEaX-WpFaSJlwSU64jYBw&q=contao+cms+vulnerabilities&oq=contao+vuln&gs_lcp=CgZwc3ktYWIQAxgBMgYIABAWEB4yBggAEBYQHjIGCAAQFhAeOggIABCxAxCDAToFCAAQsQM6AggAOgIILjoECAAQCjoECAAQHlCnC1i1N2CWSmgBcAB4AYABrgKIAbQJkgEIMTAuMS4wLjGYAQCgAQGqAQdnd3Mtd2l6&sclient=psy-ab * Security Bulletin | HKCERT [https://www.hkcert.org/security-bulletin * Vulners - Vulnerability Data Base [https://vulners.com/search?query=bulletinFamily * Vulnerability DB | Snyk [https://snyk.io/vuln * Vulnerability Trends - Vulmon [https://vulmon.com/trends * https://community.qualys.com/vulnerability-detection-pipeline/ [https://community.qualys.com/vulnerability-detection-pipeline/ * Risk-Based Vulnerability Management Automation | Hackuity [https://www.hackuity.io/ * http://www.vulnweb.com/ [http://www.vulnweb.com/ * https://wpscan.com/howto-find-wordpress-plugin-vulnerabilities-wpscan-ebook.pdf [https://wpscan.com/howto-find-wordpress-plugin-vulnerabilities-wpscan-ebook.pdf * http://www.vulnweb.com/ [http://www.vulnweb.com/ * Too many vulnerabilities on one Tuesday from 2 vendors, not to mention zero-days – Vulners Blog [https://blog.vulners.com/2021/05/17/vulners-weekly-digest-48/ * GitHub - skavngr/rapidscan: The Multi-Tool Web Vulnerability Scanner. [https://github.com/skavngr/rapidscan * GitHub - Moham3dRiahi/XAttacker: X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter [https://github.com/Moham3dRiahi/XAttacker * adon90/pentest_compilation: Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios [https://github.com/adon90/pentest_compilation * GitHub - vulnersCom/getsploit: Command line utility for searching and downloading exploits [https://github.com/vulnersCom/getsploit * GitHub - jbarone/xxelab: A simple web app with a XXE vulnerability. [https://github.com/jbarone/xxelab * GitHub - DiogoMRSilva/websitesVulnerableToSSTI: Simple websites vulnerable to Server Side Template Injections(SSTI) [https://github.com/DiogoMRSilva/websitesVulnerableToSSTI * GitHub - AonCyberLabs/Windows-Exploit-Suggester: This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins. [https://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylist * GitHub - DefectDojo/django-DefectDojo: DefectDojo is an open-source application vulnerability correlation and security orchestration tool. [https://github.com/DefectDojo/django-DefectDojo * GitHub - Yavuzlar/VulnLab [https://github.com/Yavuzlar/VulnLab * GitHub - kaiiyer/awesome-vulnerable: A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB. [https://github.com/kaiiyer/awesome-vulnerable * GitHub - OWASP/Vulnerable-Web-Application: OWASP Vulnerable Web Application Project https://github.com/hummingbirdscyber [https://github.com/OWASP/Vulnerable-Web-Application * GitHub - sec4you/VulnLabs: docker-compose bringing up multiple vulnerable applications inside containers. [https://github.com/sec4you/VulnLabs * GitHub - webpwnized/mutillidae: OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security training. Mutillidae can be installed on Linux and Windows using LAMP, WAMP, and XAMMP. It is pre-installed on SamuraiWTF and OWASP BWA. The existing version can be updated on these platforms. With dozens of vulnerabilities and hints to help the user; this is an easy-to-use web hacking environment designed for labs, security enthusiast, classrooms, CTF, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, corporate web sec training courses, and as an "assess the assessor" target for vulnerability assessment software. A containerized version of the application is available as a companion project. [https://github.com/webpwnized/mutillidae * Common Vulnerability Scoring System Version 3.1 Calculator [https://www.first.org/cvss/calculator/3.1 * Seattle v0.3 Walkthrough on Vulnhub by Graceful Security – Cyber Boot Camp [http://cbcamp.com/seattle-v0-3-walkthrough-on-vulnhub-by/ * Categories | Root Network Security [https://www.rootnetsec.com/categories/#vulnhub * What do you need to know about the log4j (Log4Shell) vulnerability? - YouTube [https://www.youtube.com/watch?v=oC2PZB5D3Ys * GitHub - christophetd/log4shell-vulnerable-app: Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell. [https://github.com/christophetd/log4shell-vulnerable-app * I Learned - Log4j, une vulnérabilité d'une ampleur inédite [https://ilearned.eu/log4j.html * Online Vulnerability Scanners and Network Intelligence | HackerTarget.com [https://hackertarget.com/ * ZTH - Obscure Web Vulns - The Dutch Hacker [https://www.thedutchhacker.com/zth-obscure-web-vulns/ * CVE security vulnerability database. Security vulnerabilities, exploits, references and more [https://www.cvedetails.com/ * SecurityFocus [https://www.securityfocus.com/vulnerabilities * NVD - Results [https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&query=openssl+0.9.8c-1&search_type=all * Vulners - Vulnerability Data Base [https://vulners.com/search?query=openssl%200.9.8c-1 * Vulners - Vulnerability Data Base [https://vulners.com/ * Vulnerabilities (CVE) - OpenCVE [https://www.opencve.io/cve * Vulnerability DB | Snyk [https://snyk.io/vuln * vulnonym.org - An offensive and otherwise scary human readable name generator for CVEs. · Vulnonym.org [https://vulnonym.org/ * Vulnerability Intelligence by CyberSecurity Help s.r.o. [https://www.cybersecurity-help.cz/ * Auditing Webapps · CTF Field Guide [https://trailofbits.github.io/ctf/web/vulnerabilities.html * Vulnerable Pages [https://games.samsclass.info/ * Hackable - Secret Hacker | Vulnerable Web Application Server ~ Secret Hacker Official ® [https://secrethackersite.blogspot.com/2019/10/hackable-secret-hacker-vulnerable-web.html * GitHub - future-architect/vuls: Vulnerability scanner for Linux/FreeBSD, agentless, written in Go [https://github.com/future-architect/vuls * OPSWAT MetaDefender Cloud | Vulnerability, CDR and Antivirus APIs [https://metadefender.opswat.com/#!/ * OPSWAT MetaDefender Cloud | Vulnerability, CDR and Antivirus APIs [https://metadefender.opswat.com/#!/ * Advanced Threats - Security Intelligence [http://securityintelligence.com/topics/vulnerabilities-threats/threats/ * Not So Spooky: Linux "Ghost" Vulnerability [http://blog.trendmicro.com/trendlabs-security-intelligence/not-so-spooky-linux-ghost-vulnerability/ * The Prices vs. Features of Web Application Vulnerability Scanners [http://www.sectoolmarket.com/price-and-feature-comparison-of-web-application-scanners-unified-list.html * Vigil@nce vulnérabilités - veille, base, alerte et gestion [http://vigilance.fr/ * TrendLabs Security Intelligence BlogVulnerabilities Archives - TrendLabs Security Intelligence Blog [http://blog.trendmicro.com/trendlabs-security-intelligence/category/vulnerabilities/ * OPSWAT MetaDefender Cloud | Vulnerability, CDR and Antivirus APIs [https://metadefender.opswat.com/#!/ * Hacktivity: Latest Security Vulnerabilities Found, Rewarded, or Disclosed [https://hackerone.com/hacktivity?sort_type=popular&filter=type%3Aall&querystring=&page=1 * CVSS v2 Calculator [https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?calculator&version=2 * NVD - Search and Statistics [https://nvd.nist.gov/vuln/search * Vulners - Vulnerability Data Base [https://vulners.com/products * vulners search exploit [https://vulners.com/packetstorm/PACKETSTORM:153372 * NVD - CVSS v3 Calculator [https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?calculator&version=3&vector=(CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C) * MassVulScan.sh, identifiez rapidement les ports ouverts sur votre réseau et les hosts vulnérables – H2K [https://hack2know.how/2019/02/massvulscan-sh-identifiez-rapidement-les-ports-ouverts-sur-votre-reseau-et-les-hosts-vulnerables/ * CTF Series : Vulnerable Machines — tech.bitvijays.com [https://bitvijays.github.io/LFC-VulnerableMachines.html * abatchy's blog | OSCP-like Vulnhub VMs [https://www.abatchy.com/2017/02/oscp-like-vulnhub-vms * PwnLab: init - VulnHub Walkthrough - YouTube [https://www.youtube.com/watch?v=NrbuqqeuurA * CORS - Lab #1 CORS vulnerability with basic origin reflection | Short Video - YouTube [https://www.youtube.com/watch?v=XTFDst3TjMM&list=PLuyTk2_mYISJpyzYl947x48JABj0AVVUF&index=4 * How to Use NMAP 7 to Discover Vulnerabilities, Launch DoS Attacks and More - Hackzzon: Pentesting and Security [http://hackzzon.blogspot.fr/2016/02/how-to-use-nmap-7-to-discover.html * (no title) [http://null-byte.wonderhowto.com/how-to/art-0-day-vulnerabilities-part3-command-injection-and-csrf-vulnerabilities-0166321/ * Damn Vulnerable Linux: DVL: WebGoat SQL Injection [http://www.computersecuritystudent.com/SECURITY_TOOLS/SQL_INJECTION/lesson2/ * Resources ~ VulnHub [https://www.vulnhub.com/resources/ * vulnhub boot2root challenges - Cyberry [http://www.cyberry.co.uk/vulnhub/ * Acunetix Web Vulnerability Scanner 9.5 Cracked by 0x22 [https://leakforums.net/thread-323233 * Vulnerability Trends - Vulmon [https://vulmon.com/trends * GitHub - rapid7/metasploit-vulnerability-emulator: Created by Jin Qian via the GitHub Connector [https://github.com/rapid7/metasploit-vulnerability-emulator * Vulners Database - viewCount:50 TO * order:viewCount last 7 days [https://vulners.com/search?query=v...%20order:viewCount%20last%207%20days|fr] * CVE STALKER -The most viral CVE(vulnerability) ranking chart- [https://cvestalker.com/weekly.php * Vulnerabilities - Acunetix [https://www.acunetix.com/vulnerabilities/web/ * Vulnerability feed [https://inthewild.io/feed * Vulnerability Database - OSV [https://osv.dev/list * GitHub - 0xtavian/awesome-attack-surface-monitoring: Curated list of open-source & paid Attack Surface Monitoring (ASM) tools. [https://github.com/0xtavian/awesome-attack-surface-monitoring * shell-storm | Shellcodes Database [http://shell-storm.org/shellcode/ * 💀 Sploitus | Exploit & Hacktool Search Engine [https://sploitus.com/ * 💀 Sploitus | Exploit & Hacktool Search Engine [https://sploitus.com/?query=NoCMS#exploits * Vumetric Cybersecurity Portal [https://cyber.vumetric.com/ * Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers [https://www.exploit-db.com/ * Search files: openssl 0.9.8c-1 ≈ Packet Storm [https://packetstormsecurity.com/search/?q=openssl+0.9.8c-1 * GreyNoise Visualizer [https://viz.greynoise.io/ * CXBugtraq Site 1 - cxsecurity.com [https://cxsecurity.com/wlb/ * GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF [https://github.com/swisskyrepo/PayloadsAllTheThings * GitHub - anhtu97/PayloadAllEverything [https://github.com/anhtu97/PayloadAllEverything * CXSECURITY.COM Free Security List [https://cxsecurity.com/ * Security Bulletins | Cybersecurity Services Australia | AusCERT [https://www.auscert.org.au/resources/security-bulletins/ * 💀 Sploitus | Exploit & Hacktool Search Engine [https://sploitus.com/ * Security Bulletins | Cybersecurity Services Australia | AusCERT [https://www.auscert.org.au/resources/security-bulletins/ * CXSECURITY.COM Free Security List [https://cxsecurity.com/ * Most recent entries - CVE-Search [http://cve.circl.lu/ * malwares.com [https://www.malwares.com/search/tag?tag=exploit * Black Hills Information Security, a Penetration Testing Company - Projects [https://www.blackhillsinfosec.com/projects/ * Search files: bind ≈ Packet Storm [https://packetstormsecurity.com/search/?q=bind * Vulcan Remedy Cloud [https://vulcan.io/remedy-cloud * Get your own instance of Vulcan Free - Vulcan Cyber [https://vulcan.io/lp/vulcan-free/ * DailyCVE [https://www.reddit.com/r/DailyCVE/ * Vulcan [https://mitremapper.voyager18.io/ * Current Activity | CISA [https://www.cisa.gov/uscert/ncas/current-activity * / ViewPure [http://www.viewpure.com/ZWMo3VJpQrQ?start=0&end=0 * GitHub - microsoft/AttackSurfaceAnalyzer: Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation. [https://github.com/microsoft/AttackSurfaceAnalyzer * Open Source Tooling for Threat Analysis and Attack Surface Management - YouTube [https://www.youtube.com/watch?v=ZWMo3VJpQrQ * NCP - National Checklist Program Checklist Repository [https://ncp.nist.gov/repository?product=Google+Android+7.x&sortBy=modifiedDate%7Cdesc * 0day.today Exploit Database : vulnerability : 0day : new exploits : shellcode by 0day.today Team [https://fr.0day.today/ * EPSS : qu'est-ce que l'Exploit Prediction Scoring System ? [https://cyberwatch.fr/veille/epss-quest-ce-que-lexploit-prediction-scoring-system/ * Vulnerability & Exploit Database [https://pentest-tools.com/vulnerabilities-exploits * Vulcan [https://mitremapper.voyager18.io/# * Recent vulnerabilities and exploits [https://vulmon.com/searchpage?q=*&sortby=bydate * Latest Solarwinds Serv U File Server 7.1.0.2 Security Vulnerabilities | Vumetric Cyber Portal [https://cyber.vumetric.com/vulns/solarwinds/serv-u-file-server/7-1-0-2/ * Comprendre les CVE et leur score CVSS | Knock-Knock [https://www.knock-knock.fr/blog/comprendre-les-cve-et-leur-score-cvss/ * Vulnerabilities · Attack statistics · The Shadowserver Foundation [https://dashboard.shadowserver.org/statistics/honeypot/monitoring/vulnerability/?category=monitoring&statistic=unique_ips&limit=100 * TurnKey GNU/Linux | 100+ free ready-to-use system images for virtual machines, the cloud and bare metal [https://www.turnkeylinux.org/ * Base de données des vulnérabilités (CVE, CAPEC, CWE, Exploit-db) [https://kb.prohacktive.io/fr/index.php * CVE Trends - crowdsourced CVE intel [https://cvetrends.com/ * Cloud Vulnerabilities and Security Issues Database [https://www.cloudvulndb.org/ * Search - urlquery [https://urlquery.net/search?q=malware+.fr * Fortinet : Products and vulnerabilities [https://www.cvedetails.com/vendor/3080/Fortinet.html * Attaques cybersécurité auprès d'organismes publics - uMap [https://umap.openstreetmap.fr/fr/map/attaques-cybersecurite-aupres-dorganismes-publics_821557?ref=julien.io#7/46.773/4.537 * Evénements | Portail du CERT Santé [https://cyberveille-sante.gouv.fr/liste/evenements
TOOLS_et_TUTO
* CryptPad [https://cryptpad.fr/ * Transform YAML into JSON - Online YAML Tools [https://onlineyamltools.com/convert-yaml-to-json * Video Library [https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/list-of-videos.htm * Marco Pontello's Home - Software - TrIDNet [https://www.mark0.net/soft-tridnet-e.html * Canarytokens [https://canarytokens.org/generate * JSON Web Tokens - jwt.io [https://jwt.io/#debugger-io * CyberChef [https://gchq.github.io/CyberChef/ * Home - Active Countermeasures [https://www.activecountermeasures.com/ * Online Tools - RingZer0 CTF [https://ringzer0team.com/tool * intoDNS: adista.fr - check DNS server and mail server health [https://intodns.com/adista.fr * SSL Certificates - ZeroSSL [https://zerossl.com/features/certificates/ * home [https://suip.biz/ * Welcome! [https://w-e-b.site/ * The 13 Most Helpful Pentesting Resources [https://www.checkmarx.com/2016/07/26/13-helpful-pentesting-resources/ * OSINT Framework [https://osintframework.com/ * Carte des directs Facebook [https://www.facebook.com/livemap#@42.602615482,-8.071217689000008,3.204700083z * Markdown, Please! [http://markdownplease.com/ * Newsletters Archive - Toddington [https://www.toddington.com/newsletter/ * Fuck Yeah Markdown [http://fuckyeahmarkdown.com/?u=http%3A%2F%2Fbrettterpstra.com%2F2014%2F05%2F04%2Ffolderize-sync-nvalt-notes-to-nested-folders%2F&read=1 * DNS Leak Tests [http://dnsleak.com/ * Information Sur Mon Adresse Ip [http://www.mon-ip.com/info-adresse-ip.php * Linuxize [https://linuxize.com/ * Test de vitesse Internet | Fast.com [https://fast.com/fr/ * EPP et EDR: le futur de la cybersécurité endpoint [https://secureidees.com/epp-et-edr-le-futur-de-la-cybersecurite-endpoint/ * Zonemaster [https://zonemaster.fr/domain_check * adista.fr | DNSViz [https://dnsviz.net/d/adista.fr/analyze/ * DNSdumpster.com - dns recon and research, find and lookup dns records [https://dnsdumpster.com/ * All domains that include facebook - SecurityTrails [https://securitytrails.com/list/keyword/facebook * Tools - Intelligence X [https://intelx.io/tools?tab=general * Free Online Tools for Looking up Potentially Malicious Websites [https://zeltser.com/lookup-malicious-websites/ * Skip Tracing Framework [https://makensi.es/stf/ * Run Curl Commands Online [https://reqbin.com/curl * Bienvenue dans Colaboratory - Colaboratory [https://colab.research.google.com/notebooks/intro.ipynb#scrollTo=-Rh3-Vt9Nev9 * Aide sociale [https://www.aide-sociale.fr/ameli-contact/ * Generate a list of random words [http://listofrandomwords.com/moretools/ * DanvOps | DanvOps [https://danvops.fr/ * TweetDeck [https://tweetdeck.twitter.com/ * JDH [https://www.journalduhacker.net/t/s%C3%A9curit%C3%A9/page/3 * Ulysse | Votre billet d'avion à la vitesse d'un héros [https://ulysse.travel/ * Imago [https://www.imagotv.fr/podcasts * Sécurité [https://security.stackovernet.com/ * Developpez.com, le club des développeurs et IT Pro [https://www.developpez.com/ * Tmux Cheat Sheet & Quick Reference [https://tmuxcheatsheet.com/ * MyMemory - Machine translation meets human translation [https://mymemory.translated.net/ * TryHackMe | Learn Cybersecurity [https://tryhackme.com/ * SynoMyFamily - Synology DiskStation [https://myfamilyariokio.fr4.quickconnect.to/ * OpenTopoMap - Topographische Karten aus OpenStreetMap [https://opentopomap.org/#map=15/45.37796/4.53761 * morss.it – Get more out of RSS feeds, for free [https://morss.it/ * MultiRBL.valli.org - Results of the query enedis.fr [http://multirbl.valli.org/lookup/enedis.fr.html * Email temporaire – Email à usage unique - Email anonyme [https://temp-mail.org/fr/#:~:text=Email%20jetable%20-%20est%20un%20service%20qui%20permet,comme%3A%20tempmail%2C%2010minutemail%2C%20e-mail%20jetable%2C%20faux-mail%20ou%20trash-mail. * Release the Kraken: Starting Your Password Cracking Journey [https://threat.tevora.com/release-the-kraken/ * Comment installer WSL 2 sous Windows 10 ? – Korben [https://korben.info/installer-wsl2-windows-linux.html * Introduction - OWASP Cheat Sheet Series [https://cheatsheetseries.owasp.org/ * Cours de Pen Testing | Coursera [https://fr.coursera.org/search?query=pen%20testing&index=prod_all_products_term_optimization&allLanguages=French * Overview DevSec Baselines – DevSec Hardening Framework [https://dev-sec.io/baselines/ * Online investigation tool - Reverse IP, NS, MX, WHOIS and Search Tools [https://dnslytics.com/?utm_source=addon&utm_medium=logo&utm_campaign=ipdomaininfo * Adista - bgp.he.net [https://bgp.he.net/search?search%5Bsearch%5D=Adista&commit=Search * How to Create Fake Online Identity | The Droid Guy [https://thedroidguy.com/create-fake-online-identity-1119783 * Bishop Fox Labs [https://labs.bishopfox.com/home * DNSdumpster.com - dns recon and research, find and lookup dns records [https://dnsdumpster.com/ * Network Tools by YouGetSignal.com [http://www.yougetsignal.com/ * Virtual Machine (VM), Windows Virtual PC & BrowserStack : Microsoft Edge Dev [https://dev.windows.com/en-us/microsoft-edge/tools/vms/windows/ * t411.me passwords - BugMeNot [http://bugmenot.com/view/t411.me * I-BlockList | Lists [https://www.iblocklist.com/lists.php * Pocket [https://getpocket.com/login?ep=3 * error · Issue #19 · v3n0m-Scanner/V3n0M-Scanner · GitHub [https://github.com/v3n0m-Scanner/V3n0M-Scanner/issues/19 * Check My Torrent IP | Proxy & VPN Verification | TorGuard [https://torguard.net/checkmytorrentipaddress.php?hash=c63eb2f6dafe6ab1352092e87a18a77e826fa428 * DNS leak test [https://www.dnsleaktest.com/ * Toogles: Awesome Goggles for YouTube [http://toogl.es/#/search/HackThebox%20walkthrough * Hack.me · The house of rising sandbox [https://hack.me/ * Resources - Toddington [https://www.toddington.com/resources/ * Cheat Sheets - Toddington [https://www.toddington.com/resources/cheat-sheets/ * IntelTechniques.com | OSINT & Privacy Services by Michael Bazzell | Open Source Intelligence [https://inteltechniques.com/ * Halcyon IDE [https://halcyon-ide.org/ * Ettercap Home Page [http://www.ettercap-project.org/ettercap/ * My IP Address - BrowserLeaks.com [https://browserleaks.com/ip * Email temporaire – Email à usage unique - Email anonyme [https://temp-mail.org/fr/?__cf_chl_jschl_tk__=2501852d9e619493581e854dc826d80ab30a0205-1600153595-0-AfboQCYBbE6R6V1_ysb5OLTGp_qJ17nc-XvzzGQCIChNjdkKD5gkag3GkuKR2G7wYcG7osz8b9OSIsYpZAVS6WLIrLxqKtC7d1mzUkwtEugiUTSDySXrTbuloR0K1VtdODkLzL1ojcK160hGjwtUypOXI27fM3uCyzFTml4upQLjHt6bMbpizivu6RgN21uzQTw2DYP4sISuJIhJjXFxZi3hhAlefoUUyDVjd7LkqEibpqWzwuSviBcTYDBQ8g-LxdzMA42G5G6gO1AqdblE1iU * Résultat du Test de Spam [https://www.mail-tester.com/test-oxs1kv41d&reloaded=2 * Scan results for https://www.cabinet-logic.fr/ [https://securityheaders.com/?q=https%3A%2F%2Fwww.cabinet-logic.fr%2F&followRedirects=on * Tous les cours - Pierre Giraud [https://www.pierre-giraud.com/cours/ * Zenk - Security - Repository [https://repo.zenk-security.com/?dir=. * Background Noises • Ambient Sounds • Relaxing Music | myNoise ® [https://mynoise.net/noiseMachines.php * 88 Keys • Relaxing Piano Soundscape [https://mynoise.net/NoiseMachines/acousticPianoSoundscapeGenerator.php * Focus at Work • Relax at Home • Sleep at Night | myNoise ® [https://mynoise.net/howToUseSoundMachines.php * Manuel PHP - max_input_time - La référence en Cours et Manuels PHP / MYSQL / HTML en francais [http://www.manuelphp.com/php/ini.max-input-time.php * Lexique de Termes et Acronymes Reseaux & Telecom - 201304_lexique_de_termes_reseaux.pdf [https://lafibre.info/images/doc/201304_lexique_de_termes_reseaux.pdf * GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF [https://github.com/swisskyrepo/PayloadsAllTheThings * Online PHP Javascript Script Decoder | Quttera [https://malwaredecoder.com/ * UnPHP - The Online PHP Decoder [https://www.unphp.net/ * Qualys SSL Labs [https://www.ssllabs.com/ * Global DNS Propagation Checker - What's My DNS? [https://www.whatsmydns.net/ * Hurricane Electric BGP Toolkit [https://bgp.he.net/ * RIPE Network Coordination Centre [https://www.ripe.net/ * 0fa207940ea53e2b54a2b769d8ab033a6b2c5e08c78bf4d7dade79849960b54d | ANY.RUN - Free Malware Sandbox Online [https://any.run/report/0fa207940ea53e2b54a2b769d8ab033a6b2c5e08c78bf4d7dade79849960b54d/7b7a6442-1479-4a4b-9b05-424588efad3a * Malware Search | Decalage [http://decalage.info/fr/mwsearch#gsc.tab=0 * www.dan.me.uk [https://www.dan.me.uk/ * Bash online commands: whois, nslookup, dig, ping - bash.ws [https://bash.ws/ * ID Ransomware [https://id-ransomware.malwarehunterteam.com/ * ANY.RUN - Interactive Online Malware Sandbox [https://any.run/ * RequestBin — Collect, inspect and debug HTTP requests and webhooks [http://requestbin.net/ * azerty!& - decrypted download - decryptpassword.com [https://decryptpassword.com/encrypt/ * DNS leak test [https://www.dnsleaktest.com/what-is-transparent-dns-proxy.html * BASH Programming – Linux Hint [https://linuxhint.com/category/bash-programming/ * Toolbox | DNSstuff [https://tools.dnsstuff.com/ * 💀 Sploitus | Exploit & Hacktool Search Engine [https://sploitus.com/?query=webmin%201.910#exploits * Le Proxy gratuit le plus rapide | hide.me [https://hide.me/fr/proxy * Fonctionnalités Piwigo - Logiciel photothèque & Digital Asset Management [https://fr.piwigo.com/produit * Pulsedive [https://pulsedive.com/ * bash - How can I execute local script on remote machine and include arguments? - Unix & Linux Stack Exchange [https://unix.stackexchange.com/questions/87405/how-can-i-execute-local-script-on-remote-machine-and-include-arguments * PHP-FPM: Multiple Resource Pools | Servers for Hackers [https://serversforhackers.com/c/php-fpm-multiple-resource-pools * Pastebin dump collection [https://psbdmp.ws// * Mesnoeuds - Noeud de cabestan [http://mesnoeuds.free.fr/knot.php?knotId=71&search=cabestan * IP Addresses 37.58.245.0 - 37.58.245.255 | Geo IP Lookup [http://geoiplookup.net/ip-addresses/37.58.245.0-37.58.245.255 * Recommended sites for gathering IP reputation : AskNetsec [https://www.reddit.com/r/AskNetsec/comments/7xqsiq/recommended_sites_for_gathering_ip_reputation/ * Générer un nom aléatoire - Homme, Français, France - Fake Name Generator [https://fr.fakenamegenerator.com/gen-male-fr-fr.php * Freenom - Un nom pour chacun [https://www.freenom.com/fr/index.html?lang=fr * All Events - Digital Forensics Training and Conferences [https://www.dfir.training/allevents * MailDev [http://10.23.255.216:1080/#/ * DNS leak test [https://www.dnsleaktest.com/results.html * 10 Minute Mail - Temporary E-Mail [https://10minutemail.com/10MinuteMail/index.html?dswid=267 * ctf-tools & HackingTools: Exhaustive list of hacking tools [https://securityonline.info/2017/04/21/ctf-tools-hackingtools-exhaustive-list-of-hacking-tools/ * Guides - Torrent VPN Guide [http://www.best-bittorrent-vpn.com/guides.html * Trenta : agence de communication globale, digitale et indépendante [https://nl.hideproxy.me/go.php?u=Q1K3T1CmMjxOolPILJnT0rlQ&b=5 * https://pastebin.com/raw/0SNSvyjJ [https://pastebin.com/raw/0SNSvyjJ * Free Automated Malware Analysis Service - powered by Falcon Sandbox [http://w.hybrid-analysis.com/ * Catégorie:gestion de projet - Le Jargon Français 4.1 - dictionnaire d'informatique [http://jargonf.org/wiki/Cat%C3%A9gorie:gestion_de_projet * Abusix Intelligence | Abusix [https://www.abusix.ai/ * Webhook.site - Test, process and transform emails and HTTP requests [https://webhook.site/#!/7ba8e96e-6f30-4271-b281-65de1c753550 * GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF [https://github.com/swisskyrepo/PayloadsAllTheThings * Search Exploits - HackTricks [https://book.hacktricks.xyz/ * Downloadable Results [https://ytb.rip/ * Nothink! [http://www.nothink.org/ * Security tools - Linux Security Expert [https://linuxsecurity.expert/security-tools/#top10 * Analyse your HTTP response headers [https://securityheaders.com/ * Exploit Tools Web Based [https://exploits.my.id/index.html * Data Removal: Darik's Boot and Nuke - DBAN [https://dban.org/ * Introducing BusKill: A Kill Cord for your Laptop - Michael Altfield's Tech Blog [https://tech.michaelaltfield.net/2020/01/02/buskill-laptop-kill-cord-dead-man-switch/ * Compiler Explorer [https://godbolt.org/ * FileFormat.Info · The Digital Rosetta Stone [https://www.fileformat.info/ * What is my IP address? — ifconfig.co [https://ifconfig.co/ * https://epi052.github.io/feroxbuster-docs/ [https://epi052.github.io/feroxbuster-docs/ * OWASP ZAP [https://www.zaproxy.org/docs/desktop/ui/ * Installing Burp Suite Professional / Community Edition - PortSwigger [https://portswigger.net/burp/documentation/desktop/getting-started * Modes opératoires Réseau & Systèmes [https://www.smnet.fr/accueil.html * Hack Today — The Home of Hackers! [https://www.hacktoday.io/ * 10 Great Free Online Courses in Cybersecurity [https://www.onlinecoursereport.com/free/cybersecurity/ * OWASP ZAP User Group - Google Groupes [https://groups.google.com/g/zaproxy-users * Awesome Search [https://awesomelists.top/ * Archives des astuces – Kali-linux.fr [https://www.kali-linux.fr/category/astuces * Á propos - HackinGeeK [https://hackingeek.com/a-propos/ * HackinGeeK - Contrôlez le futur monde juste avec un clavier. [https://hackingeek.com/ * All learning materials | Web Security Academy [https://portswigger.net/web-security/all-materials * All learning materials - detailed | Web Security Academy [https://portswigger.net/web-security/all-materials/detailed * Cracker un mot de passe | Zythom [https://zythom.fr/2020/11/cracker-un-mot-de-passe/ * JSON pour les débutants [https://la-cascade.io/json-pour-les-debutants/ * penetration testing - Learn Anything [https://learn-anything.xyz/security/penetration-testing * ansible - Learn Anything [https://learn-anything.xyz/ * Known Supported Devices · brandonlw/Psychson Wiki · GitHub [https://github.com/brandonlw/Psychson/wiki/Known-Supported-Devices * DuckToolKit [https://www.ducktoolkit.com/ * GitHub - kevthehermit/DuckToolkit: Encoding Tools for Rubber Ducky [https://github.com/kevthehermit/DuckToolkit * Catégories - Comparez les prix et les meilleurs outils - Capterra France - 2020 [https://www.capterra.fr/directory * Splunk® Enterprise - Splunk Documentation [https://docs.splunk.com/Documentation/Splunk * Education-Training-Certification | Splunk [https://www.splunk.com/en_us/training.html * Cartes mémo et listes à propos de OSCP | Quizlet [https://quizlet.com/subject/OSCP/?price=free&type=sets&creator=all * PY4E - Python for Everybody [https://www.py4e.com/lessons * Learn X in Y Minutes: Scenic Programming Language Tours [https://learnxinyminutes.com/docs/ansible/ * Introduction à vagrant [https://blog.stephane-robert.info/post/introduction-vagrant/ * Top 10 web hacking techniques of 2020 - nominations open | PortSwigger Research [https://portswigger.net/research/top-10-web-hacking-techniques-of-2020-nominations-open * Attacking MS Exchange Web Interfaces – PT SWARM [https://swarm.ptsecurity.com/attacking-ms-exchange-web-interfaces/ * freeCodeCamp.org [https://www.freecodecamp.org/news/ * How to install Blackarch Repositories on Arch Linux | FOSS Linux [https://www.fosslinux.com/17105/how-to-install-blackarch-repositories-on-arch-linux.htm * Top 7 Open Source Forensic Tools That You Should Know About [https://appsierra.com/top-7-open-source-forensic-tools/ * OSForensics - Product Information, Download and Purchase [https://www.osforensics.com/products/index.php * Open Computer Forensics Architecture [http://ocfa.sourceforge.net/ * Resources [https://www.forensicmethods.com/resources * Technical — ENISA [https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/technical-operational * DDecode - PHP Decoder (eval, base64_encode, gzinglate, etc). [http://ddecode.com/phpdecoder/ * DDecode - PHP Decoder (eval, base64_encode, gzinglate, etc). [http://ddecode.com/phpdecoder/?home * Projectdiscovery.io [https://projectdiscovery.io/#/ * ngrok - secure introspectable tunnels to localhost [https://ngrok.com/pricing * 🤞 Doigts Croisés Emoji [https://emojiterra.com/fr/doigts-croises/ * whois prevoyance-agricole.fr - bash.ws [https://bash.ws/whois/prevoyance-agricole.fr * GTFOBins [https://gtfobins.github.io/ * Assessment Results - KubeAcademy [https://kube.academy/assessments/fcf7be3b-dce7-4fd0-9cd2-ec79836df199 * Liens utiles [https://domopi.eu/liens-utiles/ * KubeAcademy - Unlock your full potential with Kubernetes courses designed by experts - KubeAcademy [https://kube.academy/ * Cyber Security Blog | White Oak Security [https://www.whiteoaksecurity.com/blog/ * BUG HUNTING METHODOLOGY FOR BEGINNERS | by Mahendra Purbia (Mah3Sec_) | InfoSec Write-ups [https://infosecwriteups.com/bug-hunting-methodology-for-beginners-20b56f5e7d19 * A penetration tester’s guide to subdomain enumeration | by Bharath | Appsecco [https://blog.appsecco.com/a-penetration-testers-guide-to-sub-domain-enumeration-7d842d5570f6 * How do I send an HTTP POST request? [https://reqbin.com/req/zvtstmpb/post-request-example * Red - Offensive Operations - s0cm0nkey's Security Reference Guide [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/red-offensive * Ssh2john how to | VK9 Security [https://vk9-sec.com/ssh2john-how-to/ * Debuggex: Online visual regex tester. JavaScript, Python, and PCRE. [https://www.debuggex.com/ * Scrum Certification, Agile Certification | Scrum, Agile Training [https://www.scrumstudy.com/ * Le Manifeste Agile est-il toujours d'actualité ? [https://www.atlassian.com/fr/agile/manifesto * Pricing · Tailscale [https://tailscale.com/pricing/ * Scale out your Raspberry Pi Nomad cluster to the cloud [https://johansiebens.dev/posts/2020/09/scale-out-your-raspberry-pi-nomad-cluster-to-the-cloud/ * Building a Nomad cluster on Raspberry Pi running Ubuntu server [https://johansiebens.dev/posts/2020/08/building-a-nomad-cluster-on-raspberry-pi-running-ubuntu-server/ * Un cluster de Raspberry Pi avec Kubernetes - Framboise 314, le Raspberry Pi à la sauce française.... [https://www.framboise314.fr/un-cluster-de-raspberry-pi-avec-kubernetes/ * https://auth0.openai.com/u/signup/identifier?state=hKFo2SBCRk9TdWNkdG5rZFNMakUxbzE5VnVIVjROY0xOSU5QU6Fur3VuaXZlcnNhbC1sb2dpbqN0aWTZIFB0T25ObEk3cy1lNlU0WVNTTG8xMXB4T2tXNmlWZ3BYo2NpZNkgVGRKSWNiZTE2V29USHROOTVueXl3aDVFNHlPbzZJdEc [https://auth0.openai.com/u/signup/identifier?state=hKFo2SBCRk9TdWNkdG5rZFNMakUxbzE5VnVIVjROY0xOSU5QU6Fur3VuaXZlcnNhbC1sb2dpbqN0aWTZIFB0T25ObEk3cy1lNlU0WVNTTG8xMXB4T2tXNmlWZ3BYo2NpZNkgVGRKSWNiZTE2V29USHROOTVueXl3aDVFNHlPbzZJdEc * Assetnote Wordlists [https://wordlists.assetnote.io/ * Medicat USB [https://medicatusb.com/docs/ * mkjwk - JSON Web Key Generator [https://mkjwk.org/ * Grayhatwarfare [https://grayhatwarfare.com/ * Index of /Video/Linkedin.Learning.Penetration.Testing.Active.Directory-XQZT/ [http://s28.bitdl.ir/Video/Linkedin.Learning.Penetration.Testing.Active.Directory-XQZT/ * CryptoHack – Introduction to CryptoHack - [https://cryptohack.org/courses/intro/course_details/ * dnscheck.tools - test your dns resolvers [https://dnscheck.tools/#results * Subdomain Finder - C99.nl [https://subdomainfinder.c99.nl/ * regex101: build, test, and debug regex [https://regex101.com/ * Class Central • Find the best courses, wherever they exist. [https://www.classcentral.com/ * Bug Bounty For Beginners In Tamil |fr] Bug Bounty Course in Tamil | Step To Learn Hacking | Introduction | Learn Bug Bounty | bug hunter | Class Central Classroom [https://www.classcentral.com/classroom/youtube-bug-bounty-for-beginners-in-tamil-61625 * Bug Bounty For Beginners In Tamil |fr] TLS Without Sequre Flag Set In Website | SSL and TLS | Browser Overview | Class Central Classroom [https://www.classcentral.com/classroom/youtube-bug-bounty-for-beginners-in-tamil-61625/61eaadec08933 * Bug Bounty For Beginners In Tamil |fr] learn how to find bugs in websites in tamil | bug bounty | ethical hacking | live proof hack | Class Central Classroom [https://www.classcentral.com/classroom/youtube-bug-bounty-for-beginners-in-tamil-61625/61eaadec08949 * bug bounty - free online courses/MOOC search results | Class Central [https://www.classcentral.com/search?q=bug+bounty&free=true * Best MD5 SHA1 Decrypt | Encrypt | Crack | Decode | Hash Toolkit [https://hashtoolkit.com/ * Encrypto: Secure your files before sending them out [https://macpaw.com/encrypto * Free Cybersecurity Services and Tools | CISA [https://www.cisa.gov/resources-tools/resources/free-cybersecurity-services-and-tools * Cybersecurity History Podcast | Malicious Life [https://malicious.life/ * Free Tools - Active Countermeasures [https://www.activecountermeasures.com/free-tools/ * IronSocket - Pricing - VPN Service, Smart DNS Proxy, SOCKS5 Proxy [https://ironsocket.com/pricing * Open Source Shodan Alternatives | AlternativeTo [https://alternativeto.net/software/shodan/?license=opensource * Automated Penetration Testing Platform - Pentera [https://pentera.io/platform/ * Use Cases - Pentera Cybersecurity [https://pentera.io/use-cases/#red-teaming * Pentera Labs Research - Pentera [https://pentera.io/pentera-labs/ * Merlin Command and Control framework — Merlin BETA documentation [https://merlin-c2.readthedocs.io/en/latest/index.html * Formation Certification OSCP™ (PEN-200) – Ambient IT [https://www.ambient-it.net/formation/oscp/ * JumioRequestBin — Collect, inspect and debug HTTP requests and webhooks [https://requestbin.jumio.com/ * Ultimate Library of ICS Cyber Security Resources - SCADAhacker [https://scadahacker.com/library/index.html#ebooks * IT infrastructure | TurnKey GNU/Linux [https://www.turnkeylinux.org/it-infrastructure * VMware Images [https://www.osboxes.org/vmware-images/ * dnstwist | phishing domain scanner [https://dnstwist.it/ * OffSec | Library [https://portal.offsec.com/library/all * Search About pentsting - Mind Luster [https://www.mindluster.com/?search_for=pentsting * Learn Cyber Security Full Course Learn Cyber Security In 8 Hours | Cyber Security Training |Simplilearn - Mind Luster [https://www.mindluster.com/lesson/110081 * Free Python Course by Cisco: No Prior Experience Necessary! [https://skillsforall.com/fr/course/python-essentials-1?courseLang=en-US * English for IT 1 - Skills for All [https://skillsforall.com/fr/course/english-for-it1?courseLang=en-US * Learning Catalog: Free online courses in Cybersecurity, etc. [https://skillsforall.com/fr/catalog?category=course * Network – Ringtail Security [https://ringtail.ch/collections/network * midBit Technologies, LLC [https://midbittech.com/index.html * Browserleaks - Check your browser for privacy leaks [https://browserleaks.com/ * ZimaBoard Official Shop | ZimaBoard Official Store [https://shop.zimaboard.com/ * ADCS + PetitPotam NTLM Relay: Obtaining krbtgt Hash with Domain Controller Machine Certificate - Red Team Notes [https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/adcs-+-petitpotam-ntlm-relay-obtaining-krbtgt-hash-with-domain-controller-machine-certificate * Welcome [https://opensecuritytraining.info/Welcome.html * ZimaBoard Docs [https://docs.zimaboard.com/ * batocera.linux [https://batocera.org/ * batocera.linux [https://batocera.org/compatibility.php * Security & Attacks | Cloudflare Radar [https://radar.cloudflare.com/security-and-attacks/fr * Free Automated Malware Analysis Sandboxes and Services [https://zeltser.com/automated-malware-analysis/ * Cheap ([[$40) Network Tap with OpenWRT - Spotlight Cybersecurity [https://spotlightcybersecurity.com/cheap-network-tap-with-openwrt.html * Tap 'n' Sniff - Cureblog [https://curesec.com/blog/article/blog/Tap-039n039-Sniff-185.html * Infosec Skills // Courses [https://app.infosecinstitute.com/portal/search?template=courses&sort=relevance&q=&filters%5Btype%5D%5B0%5D=Course * GitHub - ricardojoserf/Portswigger-Labs: All Apprentice and Practitioner-level Portswigger labs [https://github.com/ricardojoserf/Portswigger-Labs * XSS game [https://xss-game.appspot.com/ * site:https://www.kitploit.com hack how to bypass MFA 2023 at DuckDuckGo [https://duckduckgo.com/?q=site%3Ahttps%3A%2F%2Fwww.kitploit.com+hack+how+to+bypass+MFA+2023&t=ffab&atb=v340-1&ia=web * Community Edition | Kasm Workspaces [https://www.kasmweb.com/community-edition * Community Edition | Kasm Workspaces [https://www.kasmweb.com/community-edition#demo * Information Tech. and Cyber Security [https://def24.com/ * SOCRadar LABS - IOC Radar Results [https://socradar.io/labs/ioc-radar/45.119.81.249 * Privnote - Send notes that will self-destruct after being read [https://privnote.com/# * Le socle interministériel de logiciels libres est un ensemble de logiciels libres préconisés par l'État français depuis 2013. [https://code.gouv.fr/sill/list?category=Security%20%26%20Privacy * KitPloit - PenTest Tools! [http://idiopathic24.rssing.com/chan-13017459/all_p50.html * GTmetrix | Website Performance Testing and Monitoring [https://gtmetrix.com/ * Téléchargement WATT et WATT_GO [http://explorateurdelalune.free.fr/Telechargement/Telecharger_WATT.html * Le potager d'Olivier - YouTube [https://www.youtube.com/channel/UC3-gwlrYQi5Q3t00Tyr2tmQ/videos?themeRefresh=1 * Sending RTP stream with packETH | packETH [https://packeth.wordpress.com/2014/09/04/sending-rtp-stream-with-packeth/ * GitHub - BlackHoleMonster/IP-BlackHole: IP.blackhole.monster is an IP blacklist that uses multiple sensors to identify network attacks (e.g. SSH brute force) and spam incidents. All reports are evaluated and in case of too many incidents the responsible IP holder is informed to solve the problem. [https://github.com/BlackHoleMonster/IP-BlackHole/tree/main * How to Maintain Blacklist for IPTables Atomatically - Ed Chen Logic [https://logic.edchen.org/how-to-maintain-blacklist-for-iptables-atomatically/ * How to Block Blacklist in IPTables - Ed Chen Logic [https://logic.edchen.org/how-to-block-blacklist-in-iptables/ * How to block an IP address with ufw on Ubuntu Linux server - nixCraft [https://www.cyberciti.biz/faq/how-to-block-an-ip-address-with-ufw-on-ubuntu-linux-server/ * Map Enterprise ASN Infrastructure [https://sator-sdk.github.io/posts/asn-mapping/ * Privilege Escalation - AJ Dumanhug - infosec stuff [https://atom.hackstreetboys.ph/tag/privilege-escalation/ * Red Team Capstone Challenge! - TryHackMe -- Part 1 - YouTube [https://www.youtube.com/watch?v=xrh3g5VjY6Y&list=PLMoaZm9nyKaOrmj6SQH2b8lP6VN7Z4OD- * Tevora Threat Blog | Latest Blog Posts [https://www.tevora.com/threat-blog/page/2/ * curl - Tutorial [https://curl.se/docs/tutorial.html * How to produce test hashes for various formats [Openwall Community Wiki] [https://openwall.info/wiki/john/Generating-test-hashes * OS fingerprinting [https://www.cgsecurity.org/Articles/fingerprinting.html * JWT.one - Online JSON Web Token Encoder / Decoder [https://jwt.one/ * JSON Web Tokens - jwt.io [https://jwt.io/ * Pwnagotchi - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning. :: Installation [https://pwnagotchi.ai/installation/ * Releases · aluminum-ice/pwnagotchi [https://github.com/aluminum-ice/pwnagotchi/releases/ * Kasm Workspaces | The Container Streaming Platform [https://www.kasmweb.com/
KaliToolz
* nipper-ng | Kali Linux Tools [https://www.kali.org/tools/nipper-ng/
HTTP_server
* Serveo: expose local servers to the internet using SSH [https://serveo.net/ * ngrok - Online in One Line [https://ngrok.com/ * Localtunnel ~ Expose yourself to the world [https://theboroer.github.io/localtunnel-www/ * Openport - Easy and secure reverse SSH [https://openport.io/ * Pagekite - The fast, reliable localhost tunneling solution [https://pagekite.net/ * LocalXpose | Bye bye localhost, hello world [https://localxpose.io/
ToolZ
* home [https://suip.biz/ * Welcome! [https://w-e-b.site/ * FREE and ONLINE SQL injection Scanner with sqlmap [https://suip.biz/?act=sqlmap * Best SQL Injection (SQLi) Detection Tools 2022 | ServerWatch [https://www.serverwatch.com/reviews/sql-injection-detection-tools/ * GitHub - sqlmapproject/sqlmap: Automatic SQL injection and database takeover tool [https://github.com/sqlmapproject/sqlmap * GitHub - ron190/jsql-injection: jSQL Injection is a Java application for automatic SQL database injection. [https://github.com/ron190/jsql-injection * Havij Download – Advanced Automated SQL Injection Tool [https://kalilinuxtutorials.com/havij-download-sql-injection/ * GitHub - CiscoCXSecurity/bbqsql: SQL Injection Exploitation Tool [https://github.com/CiscoCXSecurity/bbqsql * GitHub - JohnTroony/Blisqy: Version 0.2 - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB). [https://github.com/JohnTroony/Blisqy * Standard Transforms for Maltego - Maltego [https://www.maltego.com/transform-hub/standard-transforms/ * Transform [https://transform.tools/ * Punycode converter (IDN converter), Punycode to Unicode 🔧 [https://www.punycoder.com/ * Anonymizer [https://2ip.io/anonim/ * GitHub - docker/docker-bench-security: The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production. [https://github.com/docker/docker-bench-security * GitHub - JonGood/vulhub-lab: Automate building a home lab with vulnerable docker containers. [https://github.com/JonGood/vulhub-lab * GitHub - We5ter/Scanners-Box: A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑 [https://github.com/We5ter/Scanners-Box * Les meilleurs systèmes d'exploitation anonymisants [https://desgeeksetdeslettres.com/meilleurs-systemes-exploitation-anonymisants/ * OWASP SamuraiWTF [https://www.samurai-wtf.org/ * Wohin soll die Reise gehen? - Gnoppix 22.12 - #SonntagsOS - 71 - YouTube [https://www.youtube.com/watch?v=mYbhe4QqjTI * Medicat USB [https://medicatusb.com/ * Nipper - Firewall & Network Configuration Audit Tool | Titania - Titania [https://www.titania.com/products/nipper/ * Cockpit Project — Cockpit Project [https://cockpit-project.org/ * Cisco Packet Tracer - Networking Simulation Tool [https://www.netacad.com/fr/courses/packet-tracer * 0481640086 – numéro inconnu, téléphone [https://www.numeroinconnu.fr/numero/0481640086 * Google hacking Dork|谷歌黑客之寻找包含密码的文件 - 🔰雨苁ℒ🔰 [https://www.ddosi.org/google-hacking-1/ * open.dns0.eu [https://www.dns0.eu/fr/open * How to Use The Netcat (nc) Command: An In-Depth Tutorial - NoobLinux [https://nooblinux.com/how-to-use-netcat/ * Générer un nom aléatoire - Aléatoire, Français, France - Fake Name Generator [https://fr.fakenamegenerator.com/gen-random-fr-fr.php * Malcat - hexadecimal editor and disassembler for malware analysis [https://malcat.fr/?s=09 * How to Find SQL Injection Attack Vulnerabilities? [https://geekflare.com/find-sql-injection/ * How to Find Vulnerable Webcams Across the Globe Using Shodan « Null Byte :: WonderHowTo [https://null-byte.wonderhowto.com/how-to/find-vulnerable-webcams-across-globe-using-shodan-0154830/ * The Zeek Network Security Monitor [https://zeek.org/ * Ethical Hacking - start.me [https://start.me/p/1kgAyY/ethical-hacking?locale=fr * OSINT-GLOBAL (Non-US) - start.me [https://start.me/p/jj2XEr/osint-global-non-us * WiGLE: Wireless Network Mapping [https://wigle.net/map?maplat=45.43809832390882&maplon=4.448097508334977&mapzoom=17&coloring=density * What do you need to protect? [https://securityinabox.org/en/ * Privacy Tools Guide: Website for Encrypted Software & Apps [https://www.privacytools.io/ * Page d'acceuil d'Autodéfense contre la surveillance [https://ssd.eff.org/fr/ * TheHackerStuff - Learn Vulnerability Assessment & Penetration Testing [https://thehackerstuff.com/ * Origines et évolutions de NMAP | Blog Pr0ph3cy [https://www.pr0ph3cy.com/blog/nmap-origines-et-evolutions * Get Started: DCIM, Network Documentation, OSP | DCIM, Network Documentation, OSP Software [https://graphicalnetworks.com/demo-form/ * Home - Cybi - Solutions innovantes de Cybersécurité basées sur de l'intelligence artificielle et de l'apprentissage automatique [https://www.cybi.fr/ * How to Detect CVEs Using Nmap Vulnerability Scan Scripts [https://securitytrails.com/blog/nmap-vulnerability-scan * The Ultimate Manual For Nmap Vulnerability Scanning [https://nira.com/nmap-vulnerability-scanning/ * vulns NSE Library — Nmap Scripting Engine documentation [https://nmap.org/nsedoc/lib/vulns.html * Détecter facilement les CVE avec des scripts Nmap – Oksecu.fr [https://oksecu.home.blog/2019/07/11/detecter-facilement-les-cve-avec-les-scripts-nmap/ * GitHub - vulnersCom/nmap-vulners: NSE script based on Vulners.com API [https://github.com/vulnersCom/nmap-vulners * Apache Guacamole™: 1.5.0 [https://guacamole.apache.org/releases/1.5.0/ * 12 outils pour tester la délivrabilité de vos emails [https://blog.busybiz.com/11-outils-pour-tester-la-d%C3%A9livrabilit%C3%A9-de-vos-emails * OpenTunnel - Free WireGuard VPN Servers [https://opentunnel.net/wireguard/ * Fake Information Generator - Fakeinfo.net [https://fakeinfo.net/ * Tabby - a terminal for a more modern age [https://tabby.sh/ * Beginners Guide to TShark (Part 1) - Hacking Articles [https://www.hackingarticles.in/beginners-guide-to-tshark-part-1/ * Title Case - Text To Password Convertor [https://www.titlecase.com/password-generator * Password Strength Checker [http://www.passwordmeter.com/ * Logiciel SaaS pour site internet et réseau [https://www.crawl-tools.com/fr/ * Nmap for Pentester: Output Format Scan - Hacking Articles [https://www.hackingarticles.in/nmap-for-pentester-output-format-scan/ * Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses - LHN offers the latest hacking news, penetration testing tools and cyber security courses for ethical hackers, penetration testers, IT security experts and essentially anyone interested in the cyber security world [https://latesthackingnews.com/ * SRI Hash Generator [https://www.srihash.org/ * USBKill | USB Kill devices for pentesting & law-enforcement [https://usbkill.com/ * Comment échanger une clé SSH pour une authentification sans mot de passe entre des serveurs Linux? [https://geekflare.com/fr/linux-ssh-key-exchange/ * Proxmox Archives - Virtualization Howto [https://www.virtualizationhowto.com/category/proxmox/ * Killercoda Interactive Environments [https://killercoda.com/ * Cloudron - Complete solution for self-hosting web apps [https://www.cloudron.io/ * Cloudron - App Store [https://www.cloudron.io/store/index.html * Public pentest reports | Pentest reports [https://pentestreports.com/reports/ * Réaliser un TAP réseau Ethernet passif [https://tutoduino.fr/tutoriels/tap-reseau-ethernet-passif/ * Raspberry Pi Network TAP Appliance – Dualcomm [https://www.dualcomm.com/products/raspberry-pi-network-appliance * Building a Raspberry Pi Network Tap/Bridge | hyprblog [https://blog.coffinsec.com/howto/2017/03/30/Building-RaspberryPi-Network-Tap.html * Flask Session Cookie Decoder [https://www.kirsle.net/wizards/flask-session.cgi * sqlmap-Cheat-Sheet.webp (Image WEBP, 1581 × 1261 pixels) [https://cdn.comparitech.com/wp-content/uploads/2021/07/sqlmap-Cheat-Sheet.webp * Sqlmap Cheat Sheet: Commands, Options, and Advanced Features [https://www.stationx.net/sqlmap-cheat-sheet/
Hardenning
* Guide to the Secure Configuration of Red Hat Enterprise Linux 7 | OpenSCAP Security Guide [https://static.open-scap.org/ssg-guides/ssg-rhel7-guide-C2S.html * Complete 8500 Control List [https://www.stigviewer.com/controls/800-53 * GitHub - trimstray/the-practical-linux-hardening-guide: This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG). [https://github.com/trimstray/the-practical-linux-hardening-guide * About Project | The Practical Linux Hardening Guide [https://trimstray.github.io/the-practical-linux-hardening-guide/ * Complete STIG List [https://www.stigviewer.com/stigs * Linux hardening steps for starters - Linux Audit [https://linux-audit.com/linux-server-hardening-most-important-steps-to-secure-systems/ * Automatic Security Updates with DNF - Linux Audit [https://linux-audit.com/automatic-security-updates-with-dnf/ * Static OpenSCAP [https://static.open-scap.org/ * GitHub - ComplianceAsCode/content: Security automation content in SCAP, Bash, Ansible, and other formats [https://github.com/ComplianceAsCode/content * SCAP Workbench | OpenSCAP portal [https://www.open-scap.org/tools/scap-workbench/ * OpenSCAP User Manual [https://static.open-scap.org/openscap-1.3/oscap_user_manual.html * Center for Internet Security (CIS) compliance in Red Hat Enterprise Linux using OpenSCAP [https://www.redhat.com/en/blog/center-internet-security-cis-compliance-red-hat-enterprise-linux-using-openscap * NCP - National Checklist Program Checklist Repository [https://ncp.nist.gov/repository?typeId=1&sortBy=modifiedDate%7Cdesc * CIS-CAT Lite [https://learn.cisecurity.org/cis-cat-lite
En_Cours
* Penetration Testing Bootcamp |fr] Penetration Testing Bootcamp - Information Gathering | Class Central Classroom [https://www.classcentral.com/classroom/youtube-penetration-testing-bootcamp-53185/6108cc9fd9b5a * Cisco Skills For All Ethical Hacking [https://skillsforall.com/fr/launch?id=80c156bc-84a4-47c9-a233-5eafe7bdde82&tab=curriculum&view=4b9a9e78-8312-5c08-b4fb-831ec7d5f43a * Cisco Skills For All English 1 [https://skillsforall.com/fr/launch?id=1c91fa6b-3459-45ab-ab8d-e2ed5213e35a&tab=curriculum&view=20b578a1-0aae-57f4-8949-bfc4786ccf6f
Utilitaire-Documentation
* Wiki Evolix - Howto HAProxy [https://wiki.evolix.org/HowtoHaproxy * start LinuxPedia [http://www.linuxpedia.fr/doku.php/start * HAProxy version 1.5.19 - Configuration Manual [http://cbonte.github.io/haproxy-dconv/1.5/configuration.html * ShellHacks - Linux Hacks and Guides [https://www.shellhacks.com/ * umask Calculator - WintelGuy.com [https://wintelguy.com/umask-calc.pl * ByteByteGo Newsletter | Alex Xu | Substack [https://blog.bytebytego.com/ * Vidéo catégorie - Ressources - TheGreenBow [https://www.thegreenbow.com/fr/ressources/webtv/ * Index of /9/items/armchaircommando/ [https://ia800802.us.archive.org/9/items/armchaircommando/ * Netflix Codes : trouvez les catégories cachées sur Netflix (liste complète) [https://www.netflix-codes.com/fr * Learn anything [https://www.tutorai.me/
Log4j_Log4Shell
* Zero-Day Exploit Targeting Popular Java Library Log4j [https://www.govcert.ch/blog/zero-day-exploit-targeting-popular-java-library-log4j/ * CVE - CVE-2021-44228 [https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-44228 * Exploiting log4j (CVE-2021-44228) RCE - YouTube [https://www.youtube.com/watch?v=OJRqyCHheRE * GitHub - curated-intel/Log4Shell-IOCs [https://github.com/curated-intel/Log4Shell-IOCs * GitHub - SentineLabs/log4j_response [https://github.com/SentineLabs/log4j_response * Zero-Day Exploit Targeting Popular Java Library Log4j [https://www.govcert.ch/blog/zero-day-exploit-targeting-popular-java-library-log4j/
Code
* Le tutoriel Python — Documentation Python 3.12.0 [https://docs.python.org/fr/3/tutorial/ * Tutoriel gratuit de Python : Programmer en Python en 1h30 avec Anaconda (GRATUIT - 2023) | Udemy [https://www.udemy.com/course/programmer-python/ * Learn Python Online - A Guide | Codementor [https://www.codementor.io/learn-python-online * http://inventwithpython.com/ [http://inventwithpython.com/ * Learn X in Y Minutes: Scenic Programming Language Tours [https://learnxinyminutes.com/ * Django - Full Stack Python [https://www.fullstackpython.com/django.html * Lecture Slides and Code | Introduction to Computer Science and Programming in Python | Electrical Engineering and Computer Science | MIT OpenCourseWare [https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-0001-introduction-to-computer-science-and-programming-in-python-fall-2016/lecture-slides-code/ * Introduction to Computer Science and Programming in Python | Electrical Engineering and Computer Science | MIT OpenCourseWare [https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-0001-introduction-to-computer-science-and-programming-in-python-fall-2016/ * Find Courses by Topic | MIT OpenCourseWare | Free Online Course Materials [https://ocw.mit.edu/courses/find-by-topic/#cat=engineering&subcat=computerscience&spec=programminglanguages * Lecture Videos | Introduction to Computer Science and Programming in Python | Electrical Engineering and Computer Science | MIT OpenCourseWare [https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-0001-introduction-to-computer-science-and-programming-in-python-fall-2016/lecture-videos/index.htm * Le Guide Ultime pour Apprendre Python | Comment Coder [https://www.commentcoder.com/apprendre-python/ * Apprenez à coder pour atteindre vos objectifs | Comment Coder [https://www.commentcoder.com/ * Akadias Publications [https://www.akadia.com/html/publications.html#Unix-Linux-Apache%20Publications * Learn to Code — For Free — Coding Courses for Busy People [https://www.freecodecamp.org/ * Think Python [https://greenteapress.com/thinkpython/html/index.html * Online Python Interpreter - online editor [https://www.onlinegdb.com/online_python_interpreter * Python Online Compiler & Interpreter - Replit [https://replit.com/languages/python3 * Welcome to Python.org [https://www.python.org/shell/ * Fonctions natives — Documentation Python 3.10.6 [https://docs.python.org/fr/3/library/functions.html * List of Keywords in Python Programming [https://www.programiz.com/python-programming/keyword-list * Introduction à Python - Pierre Giraud [https://www.pierre-giraud.com/python-apprendre-programmer-cours/introduction/ * Python Essentials 1 [https://pythoninstitute.org/python-essentials-1 * OpenEDG – Improving your learning experience [https://openedg.org/ * Learn Python Programming [https://www.programiz.com/python-programming * zeitkraut – Exploring HTTP Headers with [codenetcat[/code [https://www.zeitkraut.com/posts/2013-11-05-exploring-http-headers.html * Code. Simply. Clearly. Calmly. [https://calmcode.io/ * Code With Mu [https://codewith.mu/en/ * La meilleure façon d'apprendre Python 2023 (tutoriels Python gratuits et payants) [https://kinsta.com/fr/blog/facon-d-apprendre-python/ * Best Place to Learn Python: Recommended Websites to learn Programming [https://www.bitdegree.org/tutorials/best-place-to-learn-python/ * 7 Best Coding Apps to Learn Python on the Go [https://geekflare.com/coding-apps-to-learn-python/ * Générer de vraies applications avec Python - Training | Microsoft Learn [https://learn.microsoft.com/fr-fr/training/paths/python-language/ * Node-RED [https://nodered.org/ * Programmer en Python en 1h30 avec Anaconda (GRATUIT - 2023) | Udemy [https://www.udemy.com/course/programmer-python/learn/lecture/24560522?start=225#overview * Free Online Course: An Introduction to Interactive Programming in Python (Part 1) from Coursera | Class Central [https://www.classcentral.com/course/interactivepython1-408 * Cours intensif sur Python | Coursera [https://www.coursera.org/learn/python-crash-course?irclickid=UTj36z2DVxyPT1IyXUS9p1tJUkFz7IRhnQ9SWw0&irgwc=1#reviews * Comment installer la distribution Anaconda pour Python sur Ubuntu 20.04 | DigitalOcean [https://www.digitalocean.com/community/tutorials/how-to-install-the-anaconda-python-distribution-on-ubuntu-20-04-fr * Ethical Hacking Tutorials - Python Code [https://www.thepythoncode.com/topic/ethical-hacking * 12 ressources pour apprendre Python pour les débutants [https://geekflare.com/fr/python-learning-resources/ * py.CheckiO - Python coding challenges and exercises with solutions for beginners and advanced [https://py.checkio.org/ * Screeps - MMO strategy sandbox game for programmers [https://screeps.com/ * Coding Games and Programming Challenges to Code Better [https://www.codingame.com/start/fr/ * GitFluence - Find the Git Command You Need Now! [https://gitfluence.com/?s=09 * Future Engineer | Register [https://app.futureengineer.fr/register?mtm_campaign=AFE%20website * Toxicode - Laboratoire du web communautaire [https://www.toxicode.fr/learn * HedgeDoc - Ideas grow better together [https://demo.hedgedoc.org/ * https://www.loupausa.fr/ [https://www.loupausa.fr/ * 17 jeux de programmation pour apprendre à coder [https://www.blogduwebdesign.com/blog/developpement/apprendre-la-programmation-en-jouant.html * CheckiO - coding games and programming challenges for beginner and advanced [https://checkio.org/ * Codewars - Achieve mastery through coding practice and developer mentorship [https://www.codewars.com/ * The SQL Murder Mystery [https://mystery.knightlab.com/ * Apprenez aujourd'hui, construisez un avenir meilleur. | Code.org [https://code.org/ * Introduction à Python - Training | Microsoft Learn [https://learn.microsoft.com/fr-fr/training/modules/intro-to-python/ * Learn Python - Free Interactive Python Tutorial [https://www.learnpython.org/fr/ * Python pour jeunes débutants de 7 à 97 ans [http://pythonpourenfants.free.fr/ * Golden Quest [https://app.codingpark.io/goldenquest * Python | Files | Codecademy [https://www.codecademy.com/resources/docs/python/files * Apprendre Python efficacement : apprendre Python en 8 étapes [https://fr.bitdegree.org/tutos/apprendre-python/ * La référence du langage Python — Documentation Python 3.8.17 [https://docs.python.org/fr/3.8/reference/index.html * 3.12.1 Documentation [https://docs.python.org/fr/3/index.html * purify video – watch purified youtube videos with no ads [https://purify-video.github.io/?v=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DnLRL_NcnK-4 * Learn Intro to Programming | Kaggle [https://www.kaggle.com/learn/intro-to-programming * Python Learning Paths – Real Python [https://realpython.com/learning-paths/ * Learn Python – Free Python Courses for Beginners [https://www.freecodecamp.org/news/learn-python-free-python-courses-for-beginners/ * Python Basics with Sam - YouTube [https://www.youtube.com/playlist?list=PLWKjhJtqVAbkmRvnFmOd4KhDdlK1oIq23 * Python-Object-Oriented Programming | Free Online Course | Alison [https://alison.com/fr/sujet/apprendre/100102/programmation-orientee-objet#course-plan * Learn anything [https://www.tutorai.me/?ref=taaft * https://coding-guru-liart.vercel.app/?ref=taaft [https://coding-guru-liart.vercel.app/?ref=taaft * 1. Introduction - Cours de Python [https://python.sdv.univ-paris-diderot.fr/01_introduction/ * Laravel [https://php-the-readability-way.fr/?s=09 * Git [https://git-scm.com/ * Rapid API Learn [https://rapidapi.com/learn * Node-RED [https://nodered.org/
CERTIFICATION
* https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2PjDI [https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2PjDI * https://docs.microsoft.com/fr-fr/learn/ [https://docs.microsoft.com/fr-fr/learn/ * https://docs.microsoft.com/fr-fr/learn/certifications/exams/ms-500?wt.mc_id=learningredirect_certs-web-wwl [https://docs.microsoft.com/fr-fr/learn/certifications/exams/ms-500?wt.mc_id=learningredirect_certs-web-wwl * https://www.examtopics.com/exams/microsoft/ms-500/view/ [https://www.examtopics.com/exams/microsoft/ms-500/view/ * https://www.examtopics.com/exams/microsoft/az-500/ [https://www.examtopics.com/exams/microsoft/az-500/ * https://www.youtube.com/watch?v=YKlGL66EpRg [https://www.youtube.com/watch?v=YKlGL66EpRg * https://docs.microsoft.com/fr-fr/learn/certifications/exams/ms-500 [https://docs.microsoft.com/fr-fr/learn/certifications/exams/ms-500 * https://www.youtube.com/watch?v=XidoIFSXPa8&list=PLhLKc18P9YOAEO9F15YFe7WCIrW1VzJjD [https://www.youtube.com/watch?v=XidoIFSXPa8&list=PLhLKc18P9YOAEO9F15YFe7WCIrW1VzJjD * https://www.youtube.com/watch?v=cG00gMyvwfo [https://www.youtube.com/watch?v=cG00gMyvwfo * https://www.youtube.com/watch?v=aFORgNDZRu0&list=PLhLKc18P9YOAEO9F15YFe7WCIrW1VzJjD&index=2 [https://www.youtube.com/watch?v=aFORgNDZRu0&list=PLhLKc18P9YOAEO9F15YFe7WCIrW1VzJjD&index=2 * Examen AZ-500 : technologies de sécurité Microsoft Azure - Learn | Microsoft Docs [https://docs.microsoft.com/fr-fr/learn/certifications/exams/az-500
OSCP-like
* Passing OSCP - scund00r [https://scund00r.com/all/oscp/2018/02/25/passing-oscp.html * Hacking Web Applications: — GracefulSecurity [https://www.gracefulsecurity.com/hacking-web-applications/ * Offensive Security’s PWK & OSCP Review - Jack Hacks [https://jhalon.github.io/OSCP-Review/ * Pinky's Blog [https://pinkysplanet.net/ * Prep Guide for Offsec's PWK/OSCP - Cybrary [https://www.cybrary.it/0p3n/prep-guide-offsecs-pwkoscp/ * Resource for people preparing for Offensive security Certified Penetration Tester [https://www.reddit.com/r/oscp/ * Path2OSCP [https://localhost.exposed/path-to-oscp/ * x89k [https://x89k.cf/infosec/2018/11/03/oscpsurvivalguide.html * GitHub - RustyShackleford221/OSCP-Prep: A comprehensive guide/material for anyone looking to get into infosec or take the OSCP exam [https://github.com/RustyShackleford221/OSCP-Prep * OlivierLaflamme/Cheatsheet-God: Penetration Testing / OSCP Biggest Reference Bank / Cheatsheet [https://github.com/OlivierLaflamme/Cheatsheet-God * Hacking/OSCP cheatsheet :: Ceso Adventures [https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/ * OSCP- One Page Repository - OSCP [https://oscp.infosecsanyam.in/one-page-methodology
streaming
* pentesting | Toogles [http://toogl.es/#/search/pentesting * Grab online videos for free from YouTube, Dailymotion, Vimeo etc. [https://www.videograbber.net/ * Enstream — Film Streaming HD Gratuit [https://www.enstream.co/ * http://streamcomplet.com/page/2/ [http://streamcomplet.com/page/2/ * http://filmstreaming.cc/ [http://filmstreaming.cc/ * http://www.filmstreamings.biz/ [http://www.filmstreamings.biz/ * http://www.voirfilms.org/the-revenant-2015.htm [http://www.voirfilms.org/the-revenant-2015.htm * http://film-en-stream.net/ [http://film-en-stream.net/ * SERIE STREAMING [http://streamingserie.tv/
HACK
* PentesterLab Our exercises [https://pentesterlab.com/exercises/ * The Ultimate Installation Guide for Kali Linux | . . TheSecurityBlogger . . . [http://www.thesecurityblogger.com/the-ultimate-installation-guide-for-kali-linux/ * YGN Ethical Hacker Group (YEHG) :: The Web Security Division [http://www.yehg.net/lab/#training.attacking * Free Penetration Testing and Ethical Hacking Training Course - Cybrary [https://www.cybrary.it/course/ethical-hacking/ * OWASP WebGoat Web Hacking Simulation Series © YGN Ethical Hacker Group (YEHG), Yangon, Myanmar - http://yehg.net [http://webappsecmovies.sourceforge.net/webgoat/ * security - Hacking training simulator - Stack Overflow [http://stackoverflow.com/questions/5588067/hacking-training-simulator * g0tmi1k - Have you... g0tmi1k [https://blog.g0tmi1k.com/ * Backdooring program with Shellter & Bypass A.V - YouTube [https://www.youtube.com/watch?v=fMNsf1Fwdp4 * Basic ShellCode Injection | Shellter VI 6.0 [https://www.shellterproject.com/basic-shellcode-injection/ * How To Crack Cobalt Strike And Increase The Trial - YouTube [https://www.youtube.com/watch?v=LCCjZYsZyPM * Category:Web exploitation - NetSec [https://nets.ec/Web_Exploitation * Flow [http://opensecuritytraining.info/Flow.html * Dr. Chaos [http://www.drchaos.com/ * GitHub - enaqx/awesome-pentest: A collection of awesome penetration testing resources, tools and other shiny things [https://github.com/enaqx/awesome-pentest * shell-storm | Shellcodes Database [http://shell-storm.org/shellcode/ * Exploit Pack #6 - Reverse shell - YouTube [https://www.youtube.com/watch?v=QcfFMWLE8vA * SPARTA | Network Infrastructure Penetration Testing Tool [http://sparta.secforce.com/#Download * How To Configure Syringe Script - YouTube [https://www.youtube.com/watch?v=8UHLTrFzx7k&list=PL8AF2hTqPD0saJm8VXoCrcQBPufqRA4Mz * Encripto AS - YouTube [https://www.youtube.com/channel/UCQ4p-2PukXtJXYSxQ29o8RA * LabxNow | Research & Development Environment! [https://www.labxnow.org/labxweb/ * Hack Like a Pro: How to Find Exploits Using the Exploit Database in Kali « Null Byte [http://null-byte.wonderhowto.com/how-to/hack-like-pro-find-exploits-using-exploit-database-kali-0156399/ * How to Easily Find an Exploit in Exploit DB and Get It Compiled All from Your Terminal. « Null Byte [http://null-byte.wonderhowto.com/how-to/easily-find-exploit-exploit-db-and-get-compiled-all-from-your-terminal-0163760/ * jetlib.sec [http://sec.jetlib.com/Exploit-DB/2016/05/ * Irongeek.com [http://www.irongeek.com/ * Présentation et installation de Maltrail - System-Linux [http://www.system-linux.eu/index.php?post/2016/03/08/Maltrail * http://www.rssing.com/index.php [http://www.rssing.com/index.php * Демонстрация незащищенности корпоративной сети - YouTube [https://www.youtube.com/watch?v=QAqJ0ubUO0Y * Pentestit - YouTube [https://www.youtube.com/channel/UC9ToC-EU5TzX-B_LjS06oSQ * Posts Related to Web-Pentest [https://securityidiots.com/Web-Pentest * OpenNIC Public Servers [https://servers.opennicproject.org/ * Tor Buddy Script Demo Tor + Proxychains + Anonymous DNS - YouTube [https://www.youtube.com/watch?v=AedFlLSmJf8 * How to Auto Install All Kali Linux Tools Using "Katoolin" on Debian/Ubuntu [http://www.tecmint.com/install-kali-linux-tools-using-katoolin-on-ubuntu-debian/ * KitPloit - PenTest Tools! [http://idiopathic24.rssing.com/chan-13017459/all_p50.html * Pentester Academy - Web Application Pentesting - Learning for Life [http://learningdl.com/pentester-academy-web-application-pentesting/ * ZANYAR MATRIX - YouTube [https://www.youtube.com/channel/UCayM6dPtLLG1_OmgvKOQBUw * Sameh Attia: How to run commands on Linux Container (LXD) instance at provision launch time [http://sattia.blogspot.md/2017/03/how-to-run-commands-on-linux-container.html * How To Perform External Black-box Penetration Testing in Organization [https://gbhackers.com/external-black-box-penetration-testing/ * GitHub - SifoHamlaoui/Pentest-Bookmarkz: Some useful links for Pentesters [https://github.com/SifoHamlaoui/Pentest-Bookmarkz * http://www.amanhardikar.com/mindmaps/Practice.html [http://www.amanhardikar.com/mindmaps/Practice.html * 40 Best Penetration Testing (Pen Testing) Tools in 2018 [https://www.guru99.com/top-5-penetration-testing-tools.html * How to hack a Wordpress Website - Ceos3c [https://www.ceos3c.com/hacking/how-to-hack-a-wordpress-website/ * Cheat Sheets [https://highon.coffee/blog/cheat-sheet/ * SQLi To Shell - SQLMAP | RWB Network Security [http://www.rwbnetsec.com/sqli-to-shell-sqlmap/ * HackTheBox | Toogles [http://toogl.es/#/search/HackTheBox * YGN Ethical Hacker Group (YEHG) :: The Web Security Division [http://yehg.net/lab/#home * Hack Like the Bad Guys – Using Tor for Firewall Evasion and Anonymous Remote Access [https://foxglovesecurity.com/2015/11/02/hack-like-the-bad-guys-using-tor-for-firewall-evasion-and-anonymous-remote-access/ * Web Application Penetration Testing Cheat Sheet | JDow.io [https://jdow.io/blog/2018/03/18/web-application-penetration-testing-methodology/ * TorStatus - Tor Network Status [http://torstatus.blutmagie.de/
CHESS
* Teacher Chess Club Resources for High School | [https://www.viewpure.com/pages/teacher-resources-high-school-chess-club/
Proxy
* 1 minute ago checked proxy servers - Free proxy list service since 2004 year! Almost 10 years of proxy service [http://proxy-list.org/english/index.php * Free Proxy Lists - HTTP Proxy Servers (IP Address, Port) [http://freeproxylists.net/ * 4everproxy: Free Secure Web Proxy | Anonymous Proxy [https://www.4everproxy.com/ * Free Proxy List - Page 1 of 7 [http://www.proxy4free.com/list/webproxy1.html
MITTRE
* ATT&CK® Evaluations [https://attackevals.mitre-engenuity.org/methodology-overview/ * ATT&CK® Evaluations [https://attackevals.mitre-engenuity.org/trials-deceptions/participants/sentinelone-deceptions?view=overview * ATT&CK® Evaluations [https://attackevals.mitre-engenuity.org/using-attack-evaluations/ * ATT&CK Training and Certification - MITRE ATT&CK Defender (MAD) [https://mitre-engenuity.org/cybersecurity/mad/ * Training & Certification Curriculum - MITRE ATT&CK Defender (MAD) [https://mitre-engenuity.org/cybersecurity/mad/mad-curriculum/ * Dissecting a Detection: An Analysis of ATT&CK Evaluations Data (Sources) Part 1 of 2 | by Jamie Williams | MITRE ATT&CK® | Medium [https://medium.com/mitre-attack/dissecting-a-detection-part-1-19fd8f00266c * ATT&CK® Evaluations [https://attackevals.mitre-engenuity.org/enterprise * ATT&CK® Evaluations [https://attackevals.mitre-engenuity.org/about/ * Adversary Emulation Library - MITRE Engenuity [https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/adversary-emulation-library/
WIFI
* WiGLE: Wireless Network Mapping [https://wigle.net/map?maplat=37.76559999999937&maplon=-122.42459999999792&mapzoom=13&coloring=density * Torrent Search Engine | 1337x.to [https://www.1337x.to/ * c - MegaSearch.co [http://megasearch.co/?q=fr&h=0&c=0&s=1&a=&m1=&m2= * Hulbee [https://hulbee.com/?query=&uiLanguage=browser®ion=en-US * Search Results | IT-eBooks.directory [http://it-ebooks.directory/search.html?query=forensics&in=title&page=1
SANS
* GIAC - Home [https://exams.giac.org/Home * SANS Login [https://idp.sans.org/simplesaml/module.php/core/loginuserpass.php?AuthState=_4f7edb2566c68790d8ace051c87ffc836770afb86d%3Ahttps%3A%2F%2Fidp.sans.org%2Fsimplesaml%2Fsaml2%2Fidp%2FSSOService.php%3Fspentityid%3Dhttps%253A%252F%252Fwww.sans.org%252Fsimplesaml%252Fmodule.php%252Fsaml%252Fsp%252Fmetadata.php%252Fsans-live-sp%26RelayState%3Dhttps%253A%252F%252Fwww.sans.org%252Faccount%252Floginsso%26cookieTime%3D1669030581 * Workbook - AUD507 Lab Wiki [https://lab-g.aud507.com/ * AUD507 Lab Wiki [https://lab-g.aud507.com/ * aud507.pdf [https://raw.githubusercontent.com/dhondta/tex-course-index-template/master/examples/sans/aud507.pdf * AUD507: SANS OnDemand [https://ondemand-player.sans.org/12075#init * AUD507 Public Wiki [https://www.aud507.com/ * Cheat Sheets - AUD507 Public Wiki [https://www.aud507.com/cs/ * Web References - AUD507 Public Wiki [https://www.aud507.com/ref/ * Cyber Range Training | SANS Institute [https://www.sans.org/cyber-ranges/ * Cyber Security Skills Roadmap | SANS Institute: Cyber Security Skills Roadmap [https://www.sans.org/cyber-security-skills-roadmap/?msc=main-nav%3Futm_medium%3DDisplay&utm_source=Global%20Security%20Magazine&utm_content=EMEA%20roadmap%20FR%202021&utm_campaign=Skills%20Roadmap * Auditing & Monitoring Networks and Systems | SANS AUD507 [https://www.sans.org/cyber-security-courses/auditing-networks-perimeters-systems/ * FFIEC IT Examination Handbook InfoBase - IT Booklets [https://ithandbook.ffiec.gov/it-booklets.aspx * AUD507 Auditing & Monitoring Networks, Perimeters & Systems Cartes | Quizlet [https://quizlet.com/417638132/aud507-auditing-monitoring-networks-perimeters-systems-flash-cards/ * How To Pass SANS GIAC Certification Exams - ericooi.com [https://www.ericooi.com/how-to-pass-sans-giac-certification-exams/ * Better GIAC Testing with Pancakes – tisiphone.net [https://tisiphone.net/2015/08/18/giac-testing/ * Auditing & Monitoring Networks and Systems | SANS AUD507 [https://www.sans.org/cyber-security-courses/auditing-networks-perimeters-systems/ * SANS Institute [https://www.sans.org/account/course-materials/access/s/1267130 * Back to Basics: Understanding PowerShell Objects [https://adamtheautomator.com/powershell-objects/ * Apprendre Powershell en 2 heures ! (L'essentiel en 2022) - YouTube [https://www.youtube.com/watch?v=cNc8fqIjyVA * / ViewPure apprendre PowerShell en deux heures [https://www.viewpure.com/cNc8fqIjyVA?start=0&end=0 * PowerShell Tools I Use for Audit and Compliance Measurement | Clay Risenhoover | SANS Institute [https://www.sans.org/blog/powershell-tools-i-use-audit-and-compliance-measurement/ * / ViewPure [https://www.viewpure.com/fiULc5XjuDc?start=0&end=0 * PowerShell for Audit, Compliance, and Security Automation & Visualization: Part 1 - YouTube [https://www.youtube.com/watch?v=fiULc5XjuDc * PowerShell: Part 2: Audit and Compliance Data Acquisition with PowerShell - YouTube [https://www.youtube.com/watch?v=RoSl1_6fAc8 * VisualizationDemo [https://video.sec557.com/Bonus-Visualizations/Bonus-Visualizations.html * PowerShell: Part 3: Beyond CSVs - Visualization using PowerShell, Excel, and Grafana - YouTube [https://www.youtube.com/watch?v=wR7J2XS7f80 * PowerShell 2022: State of the Art / Hack / Infection - YouTube [https://www.youtube.com/watch?v=hDbqXWGifls * Cloud Security Alliance - Chapitre Français •◄▷• [https://cloudsecurityalliance.fr/ * Docker CIS Benchmark: Best Practices in Brief | Aqua [https://www.aquasec.com/cloud-native-academy/docker-container/docker-cis-benchmark/ * What is a Docker Container? - Aqua Security [https://www.aquasec.com/cloud-native-academy/docker-container/ * CIS Downloads [https://downloads.cisecurity.org/#/ * The Illustrated Children's Guide to Kubernetes - YouTube [https://www.youtube.com/watch?v=4ht22ReBjno * Illustrated-Childrens-Guide-to-Kubernetes.pdf [https://shortcdn.com/chrisshort/pdf/Illustrated-Childrens-Guide-to-Kubernetes.pdf * GitHub - docker/docker-bench-security: The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production. [https://github.com/docker/docker-bench-security * Qu'est-ce que le tag DMARC pct (pourcentage) dans un enregistrement DMARC ? [https://powerdmarc.com/fr/what-is-the-dmarc-pct-tag/ * Documentation/Réseaux/Application : Faiblesse des serveurs DNS par transfert de zone. [Root Me : plateforme d'apprentissage dédiée au Hacking et à la Sécurité de l'Information] [https://www.root-me.org/fr/Documentation/Reseaux/Application/Faiblesse-des-serveurs-DNS-par-transfert-de-zone * Cours complet sur les zones DNS - COURSNET [http://www.coursnet.com/2014/12/cours-complet-sur-les-zones-dns.html * SMTP Enumeration Technique. Hi Medium! Here we are again with a new… | by M'hirsi Hamza | Medium [https://hamzamhirsi.medium.com/smtp-enumeration-technique-20c7aab1887a * SMTP User Enumeration – Penetration Testing Lab [https://pentestlab.blog/2012/11/20/smtp-user-enumeration/
Juridique_NTIC_SI
* L'affaire « Bluetouff » : condamné pour vol de données librement accessibles - Le petit juriste [https://www.lepetitjuriste.fr/laffaire-bluetouff-condamne-pour-vol-de-donnees-librement-accessibles/ * Droit des NTIC Archives - Page 2 sur 2 - Le petit juriste [https://www.lepetitjuriste.fr/category/droit-des-ntic/page/2/ * Offres d'emploi (CDI, CDD), apprentissages et stages | Welcome to the Jungle [https://www.welcometothejungle.com/fr/jobs?refinementList%5Boffices.country_code%5D%5B%5D=FR&refinementList%5Boffices.state%5D%5B%5D=Auvergne-Rhone-Alpes&aroundQuery=Auvergne-Rh%C3%B4ne-Alpes%2C%20France&page=1&query=architecte%20cybersecurite * Remote Cybersecurity Jobs in France with great benefits and pay [https://remoteok.com/remote-cybersecurity-jobs?location=FR
SSL
* Les certificats TLS - Blog de Aymeric Lagier [https://aymericlagier.com/2021/04/07/les-certificats-tls/ * Tout comprendre des certificats SSL - Fotozik [https://www.fotozik.fr/tout-comprendre-des-certificats-ssl
DIY
* Robots & Drones on Tindie [https://www.tindie.com/browse/robots-drones/ * Tutorials | Hackaday.io [https://hackaday.io/list/159729-tutorials
FREE_COURSES
* Home page | EC-Council Learning [https://codered.eccouncil.org/?logged=false * Global Leader of Cybersecurity Solutions and Services | Fortinet [https://www.fortinet.com/ * Free Cyber Security Training & Resources | SANS Institute [https://www.sans.org/cyberaces/ * Coursera | Degrees, Certificates, & Free Online Courses [https://www.coursera.org/ * Build new skills. Advance your career. | edX [https://www.edx.org/ * GitHub - sujayadkesar/cybersecurity-resources: Cybersecurity Resources [https://github.com/sujayadkesar/cybersecurity-resources?s=09 * Command Challenge! [https://cmdchallenge.com/ * CryptoHack – A fun, free platform for learning cryptography [https://cryptohack.org/ * Hacker101 CTF [https://ctf.hacker101.com/ * Hacking-Lab [https://hacking-lab.com/services/ * OverTheWire: Wargames [https://overthewire.org/wargames/ * Hackaflag - Academy [https://hackaflag.com.br/academy.html
CYBERSECU_glossaire
* Archives des Définition – FRENCHWEB.FR [https://www.frenchweb.fr/rubrique/guides/definition-guides
OSINT
* osint.link - the best [https://osint.link/ * ThreatMiner.org | Data Mining for Threat Intelligence [https://www.threatminer.org/ * Free Tools | OSINT Combine [https://www.osintcombine.com/tools * Creepy by ilektrojohn [https://www.geocreepy.com/ * https://directory.email-verifier.io/ [https://directory.email-verifier.io/ * Buscador OSINT VM [https://inteltechniques.com/buscador/index.html * WiGLE: Wireless Network Mapping [https://wigle.net/ * OSINT-FR | Les outils pour débuter en OSINT [https://osintfr.com/fr/outils/ * Trace Labs | Search Party [https://www.tracelabs.org/initiatives/search-party# * GreyNoise Visualizer [https://viz.greynoise.io/ * OSINT Framework [https://osintframework.com/ * List of Operating Systems for OSINT (Open-Source Intelligence) | PenTestIT [https://pentestit.com/operating-systems-open-source-intelligence-osint-list/ * GitHub - smicallef/spiderfoot: SpiderFoot automates OSINT collection so that you can focus on analysis. [https://github.com/smicallef/spiderfoot * GitHub - famavott/osint-scraper: Social Recon [https://github.com/famavott/osint-scraper * osint – WebBreacher.com [https://webbreacher.com/category/osint/ * Links for Doxing, Personal OSInt, Profiling, Footprinting, Cyberstalking [http://www.irongeek.com/i.php?page=security/doxing-footprinting-cyberstalking * OSINT Tools - Recommendations List | Subliminal HackingSubliminal Hacking [http://www.subliminalhacking.net/2012/12/27/osint-tools-recommendations-list/ * @BushidoToken cybersecurity [https://blog.bushidotoken.net/2021/05/osint-blog-watch-skies.html * Threat Intelligence - Pulsedive [https://pulsedive.com/ * URL and website scanner - urlscan.io [https://urlscan.io/ * Introduction to Linux from a Forensic Perspective - Tsurugi [https://academy.cyber5w.com/courses/intro-to-linux-using-tsurugi * Week in OSINT – Medium [https://medium.com/week-in-osint * Offensive Security Cheatsheet [https://cheatsheet.haax.fr/ * Welcome! [https://w-e-b.site/ * Méthodologie d’OSINT orientée réseaux sociaux | SYNETIS [https://www.synetis.com/methodologie-dosint-orientee-reseaux-sociaux/ * Threat Intelligence 101 — Splendeurs et misères de la Kill Chain | by SEKOIA | Cyber Threat Intelligence par SEKOIA | Medium [https://medium.com/cyberthreatintel/threat-intelligence-101-splendeurs-et-mis%C3%A8res-de-la-kill-chain-67869d5995e6 * Offensive Security Cheatsheet [https://cheatsheet.haax.fr/open-source-intelligence-osint/tools-and-methodology/methodology/ * OSINT Tools - Practical OSINT Tools - free of charge - Aware Online [https://www.aware-online.com/en/osint-tools/ * LetsDefend - Blue Team Training Platform [https://letsdefend.io/ * We are OSINTCurio.us – Helping the OSINT community stay curious [https://osintcurio.us/ * Social Exploits - Passion, Persistence, Perception [https://socialexploits.com/ * Welcome | OSINT Combine Academy [https://academy.osintcombine.com/ * OSINT Bookmarks | OSINT Combine [https://www.osintcombine.com/osint-bookmarks * Spokeo Social Search | Find Emails & Usernames [https://www.spokeo.com/social/profile?q=Julien+BOULHAUT&loaded=1 * Open Threat Research Blog [https://blog.openthreatresearch.com/ * OSINT: How to find information on anyone - The First Digit - Medium [about:reader?url=https%3A%2F%2Fmedium.com%2Fthe-first-digit%2Fosint-how-to-find-information-on-anyone-5029a3c7fd56 * Lullar Com - Search People Profile by Email or Username [https://lullar-com-3.appspot.com/en * This Person Does Not Exist [https://thispersondoesnotexist.com/ * ZATAZ » OSINT : se fabriquer une fausse identité en deux clics de souris [https://www.zataz.com/osint-se-fabriquer-une-fausse-identite-en-deux-clics-de-souris/ * CSI Linux [https://csilinux.com/ * osint.link [https://osint.link/ * PeekYou [https://www.peekyou.com/ * eTools.ch - Metasearch [https://www.etools.ch/search.do * Namechk plugin - search results - Namechk [https://namechk.com/namechk-plugin-search-results/?n=Julien%20BOULHAUT&g-recaptcha-response=03AFcWeA6li_IgbM1ONZz8sXqnf3u5mkQlbO_g8BSuIH_0lb4oUB7l-9Qnq3_baWgGp2zvOR06q30F-T5hunvhWeqa9rqAfGBTjz2lq9Q1JApww4uZu8xZPK1JxSdMM1BYlY02NLLuPOBl1Q8cRsaqU1pXc8-LVG5pxobYXivphqZCy_JmmhRZ5NOT2QP1mAfOKmMGvtEBUCe8P35LBY4j6uIc4Ifr5iv6kQz9oVtt-3s9cTLgbWRcQC87_Aqez7APw-2hsDjFZBjJtq1IeXA3xSbaH2a_mDGksUVXHRKA9MT67yDnh5uDicOkDXQv65IA7p91ffTmP87YgFhSwBtKQy9xAmtLLaHmTgzEO4oHyiVVk5GvATXq_Ju5ZUudO8u8ofczLNmMYio-pKs22j2jzNsdK7zEQBhcb411egh6EP48bcL7epizBJfzcndM9SALalGk3BPZ7a_1DKi4AEc_cypj11xMjyeYTTS81GfmlolBBEK1eGkhHHhC5yP8XwX5gK2g1qOuxeh5mbwPY2oFOnAuSioSA_3WLA8aW7dZXq7gsXtAnYdy_4w_wptnZl183nJpCWKE4_KMowA5eytnA0_HEhQBkDYAvxX4Jb6wsuRPRh1kDh0BuLE * namecheckr | Social and Domain Name Availability Search For Brand Professionals [https://www.namecheckr.com/ * Shodan Cheat Sheet: Keep IoT In Your Pocket | The Dark Source [https://thedarksource.com/shodan-cheat-sheet/ * GTD Search Results [https://www.start.umd.edu/gtd/search/Results.aspx?search= * Webmii [https://webmii.com/ * Le monde entier est un qactus | OpenFacto [https://openfacto.fr/2022/06/27/le-monde-entier-est-un-qactus/ * 🔓 TopOSINT.com - start.me [https://start.me/p/vjqXe1/toposint-com * Epieos, the ultimate OSINT tool [https://epieos.com/ * bit_of_hex [https://bitofhex.com/ * bit_of_hex [https://bitofhex.com/page/3/ * PimEyes: Face Recognition Search Engine and Reverse Image Search [https://pimeyes.com/en * 9 Open Source Intelligence (OSINT) Tools for Penetration Testing [https://geekflare.com/osint-tools/ * @BushidoToken Threat Intel [https://blog.bushidotoken.net/ * BushidoUK (BushidoUK) / Repositories · GitHub [https://github.com/BushidoUK?tab=repositories * Cyber Detective🇺🇦 sur Twitter : "CCTV cameras in #OSINT - how to search for cameras (including vulnerable cameras) - how to save streams from cameras - how to analyze video 🧵🧵🧵(1/15) https://t.co/LSugBbrFYZ" / Twitter [https://twitter.com/cyb_detective/status/1547702631849635841 * Google Custom Search Engine for search 10 worldwide webcams catalogs [https://cipher387.github.io/webcamcse/ * Webcams on World Map - World Cams [https://worldcams.tv/map/ * Webcamtaxi Search Engine of Live World Webcams [https://www.webcamtaxi.com/en/search.html?searchword=Paris&searchphrase=all * Windy: Webcams [https://www.windy.com/fr/-Webcams/webcams?48.858,2.339,5 * Windy: Webcams [https://www.windy.com/fr/-Webcams/webcams?45.337,3.933,9 * GitHub - cipher387/Dorks-collections-list: List of Github repositories and articles with list of dorks for different search engines [https://github.com/cipher387/Dorks-collections-list#cctv-dorks * Offensive OSINT [https://www.offensiveosint.io/ * AML Toolbox - start.me [https://start.me/p/rxeRqr/aml-toolbox * Username search tool - Use these useful OSINT tools in your investigation on usernames [https://www.aware-online.com/en/osint-tools/username-search-tool/ * Bellingcat's Online Investigation Toolkit bit.ly/bcattools - Google Sheets [https://docs.google.com/spreadsheets/d/18rtqh8EG2q1xBo2cLNyhIDuK9jrPGwYr9DI2UncoqJQ/edit#gid=1130825724 * https://osint.link/ [https://osint.link/ * OSINT.SH - All in one Information Gathering Tools [https://osint.sh/ * PassMark OSForensics - Digital investigation [https://www.osforensics.com/ * Les tutos de Processus [https://processus.site/index.html * OZINT - FAQ [https://ozint.eu/faq/ * link information [https://iplogger.org/logger/m0y34H9Re0fU/ * context:global @adista.fr - Sourcegraph [https://sourcegraph.com/search?q=context%3Aglobal+%40adista.fr&patternType=standard&sm=1&groupBy=repo * 13.67.50.129 - IP Scoring: Inbound Moderate, Outbound Moderate, Singapore, | Criminal IP [https://www.criminalip.io/en/asset/report/13.67.50.129 * Biznar: Deep Web Business Results [https://biznar.com/biznar/desktop/en/results.html * GitHub - mattnotmax/cyberchef-recipes: A list of cyber-chef recipes and curated links [https://github.com/mattnotmax/cyberchef-recipes * Submarine Cable Map [https://www.submarinecablemap.com/ * Search Colocation, Fiber Network & Hybrid Cloud | Inflect [https://inflect.com/search * Cloud Infrastructure Map [https://www.cloudinfrastructuremap.com/#/service/cloud-regions * OSINT Framework [https://osintframework.com/ * OSINT-FR | Les outils pour débuter en OSINT [https://osintfr.com/fr/outils/ * CFReDS - Data Leakage Case [https://www.cfreds.nist.gov/data_leakage_case/data-leakage-case.html * Phonebook.cz - Intelligence X [https://phonebook.cz/ * Intelligence X [https://intelx.io/ * Browserling - Live interactive cross-browser testing [https://www.browserling.com/browse/win/7/chrome/92/http%3A%2F%2Fwww.exploit-db.com * Set it on 🔥child -OSINT for Finding People - Google Sheets [https://docs.google.com/spreadsheets/d/1JxBbMt4JvGr--G0Pkl3jP9VDTBunR2uD3_faZXDvhxc/edit#gid=603724104 * UK-OSINT [https://www.uk-osint.net/ * Platform Downloads | OmniSci [https://www.omnisci.com/platform/downloads * OpenCorporates :: The Open Database Of The Corporate World [https://opencorporates.com/ * IP Address Lookup | Geolocation [https://www.iplocation.net/ip-lookup * Geolocate the Location of an IP Address | Geolocation [https://www.geolocation.com/?ip=88.126.142.18#ipresult * IP Location Finder - IP Lookup With Detailed Geolocation Data | KeyCDN Tools [https://tools.keycdn.com/geo?host=88.126.142.18 * Free Tools | OSINT Combine [https://www.osintcombine.com/tools * France - Webcams [https://worldcam.eu/webcams/europe/france * Host: 86.207.79.161 [https://app.netlas.io/host/adista.fr/ * GitHub - jivoi/awesome-osint: :scream: A curated list of amazingly awesome OSINT [https://github.com/jivoi/awesome-osint#-general-search * FaceCheck - Reverse Image Search - Face Recognition Search Engine [https://facecheck.id/ * FilePursuit- Discover Everything!, Search the web for files, videos, audios, eBooks and much more. [https://filepursuit.com/ * Artemis – A Radio Signals Recognition Manual – AresValley [https://www.aresvalley.com/artemis/ * Artemis 3 Released: Offline Signal Identification Database [https://www.rtl-sdr.com/artemis-3-released-offline-signal-identification-database/ * bellingcat - the home of online investigations [https://www.bellingcat.com/ * GitHub - epsylon/ufonet: UFONet - Denial of Service Toolkit [https://github.com/epsylon/ufonet * Avoid The Hack: 8 Best DNS Providers for Privacy (and adblocking) | Avoid the Hack (avoidthehack!) [https://avoidthehack.com/best-dns-privacy * Quad9 | A public and free DNS service for a better security and privacy [https://quad9.net/ * Adresses du service & fonctionnalités | Quad9 [https://quad9.net/fr/service/service-addresses-and-features * Sentinel Online - ESA - Sentinel Online [https://sentinels.copernicus.eu/web/sentinel/home * OZINT - La plateforme communautaire dédiée à l'OSINT [https://ozint.eu/ * OSINT Dojo [https://www.osintdojo.com/ * Predicta Lab [https://predictalab.fr/ * Predicta Lab [https://predictalab.fr/#0 * OSINT Dojo [https://www.osintdojo.com/resources/ * CyberSoc | Cyber Detective CTF [https://ctf.cybersoc.wales/ * Ransomwhere [https://ransomwhe.re/#browse * Course Catalog [https://www.nw3c.org/UI/CourseCatalog.html * OSINT Dojo - YouTube [https://www.youtube.com/@OSINTDojo/videos * Live cameras: France [http://insecam.org/en/bycountry/FR/?page=1 * FaceCheck - Reverse Image Search - Face Recognition Search Engine [https://facecheck.id/ * Instant Username Search [https://instantusername.com/#/ * Check files for metadata info [https://www.metadata2go.com/ * MetaOSINT | Jumpstart Your OSINT Investigation | Home [https://metaosint.github.io/?s=09 * OSINT Tutorials - Tutorials for safe and effective OSINT investigations [https://www.aware-online.com/en/osint-tutorials/ * LeakIX - Graph [https://leakix.net/graph * Webcams | OSINT Essentials [https://www.osintessentials.com/webcams * Epieos, the ultimate OSINT tool [https://epieos.com/?q=fabperso%40hotmail.com&t=email * OSINT Industries [https://osint.industries/ * BreachDirectory - Check If Your Email or Username was Compromised [https://www.breachdirectory.org/ * Decrypt MD5, SHA1, MySQL, NTLM, SHA256, MD5 Email, SHA256 Email, SHA512, Wordpress, Bcrypt hashes for free online [https://hashes.com/en/decrypt/hash * sha1 hash decoder and calculator [https://md5hashing.net/hash/sha1 * Base64 Decode and Encode - Online Tool [https://www.base64decode.net/ * CrackStation - Online Password Hash Cracking - MD5, SHA1, Linux, Rainbow Tables, etc. [https://crackstation.net/ * BreachDirectory - Check If Your Email or Username was Compromised [https://www.breachdirectory.org/index.html * Leak - Lookup | Data Breach Search Engine [https://leak-lookup.com/ * Leak - Lookup | Login [https://leak-lookup.com/account/login * BreachDirectory - Check If Your Email or Username was Compromised [https://breachdirectory.org/index.html * Generate a Random Name - Fake Name Generator [https://www.fakenamegenerator.com/ * DeHashed — #FreeThePassword [https://www.dehashed.com/ * The Official Social Engineering Hub - Security Through Education [https://www.social-engineer.org/ * Photo Location & Online EXIF Data Viewer - Pic 2 Map [https://www.pic2map.com/ * what3words /// The simplest way to talk about location [https://what3words.com/gardon.hangar.enserrer * L'investigation Open Source avec Maltego - Club OSINT & Veille - AEGE - YouTube [https://www.youtube.com/watch?v=7Sgg5UqV4D0&t=5121s * pictriev, moteur de recherche du visage [http://www.pictriev.com/?lang=fr# * Reconnaissance Faciale : applications et avantages [https://www.electronicid.eu/fr/blog/post/reconnaissance-faciale/fr * Clearview AI | Facial Recognition [https://www.clearview.ai/ * FaceCheck - Reverse Image Search - Face Recognition Search Engine [https://facecheck.id/ * 215 TinEye search results [https://tineye.com/search/9da93423d519511da4dfc6b1a110f75bf4d7da44?sort=score&order=desc&page=1 * What Happened on October 1, 1965 - On This Day [https://www.onthisday.com/date/1965/october/1 * 9 meilleurs moteurs de recherche à reconnaissance faciale pour rechercher par visage et non par nom [https://geekflare.com/fr/face-recognition-search-engines/ * TinEye Reverse Image Search [https://tineye.com/ * ENQUÊTE - Avec les Sherlock Holmes du net - Journal de 20 heures | TF1 [https://www.tf1.fr/tf1/jt-20h/videos/enquete-avec-les-sherlock-holmes-du-net-08240458.html * AI-Generated Faces: Diverse & Customizable | Generated.Photos [https://generated.photos/faces * Authentic Natural AI-Generated Faces | Generated.Photos [https://generated.photos/faces/natural# * AI Face Generator, AI Portrait Generator - NightCafe Creator [https://creator.nightcafe.studio/ai-face-generator * This Person Does Not Exist - Random Face Generator [https://this-person-does-not-exist.com/en * ꓘamerka by Offensive OSINT [https://kamerka.io/ * OSINT Blog | The Latest News and Insights on Open Source Intelligence - ESPY [https://espysys.com/osint-blog/ * quipqiup - cryptoquip and cryptogram solver [https://www.quipqiup.com/ * Exposed adista.fr Search Result | Criminal IP [https://www.criminalip.io/asset/search?query=adista.fr * Comment trouver les sous-domaines d'un domaine en quelques minutes ? [https://geekflare.com/fr/find-subdomains/ * L'annuaire Numéros SVA [https://www.infosva.org/?tel=0188899962&date=30-10-2023 * tinfoleak | Free dossier of a twitter user [https://tinfoleak.com/ * Micah Hoffman's Personal Blog [https://webbreacher.com/ * Suivre n'importe qui avec juste un numéro de téléphone | Enquête OSINT [https://ichi.pro/fr/suivre-n-importe-qui-avec-juste-un-numero-de-telephone-enquete-osint-184670966736397 * Truecaller - Principale application mondiale d'identification de l'appelant et de blocage des appels [https://www.truecaller.com/fr-fr * de🔸digger find public files in Google Drive [https://www.dedigger.com/#gsc.tab=0 * ACHAT CARTE SIM TELEPHONIQUE ANONYME ! - Simslife [https://simslife.fr/ * Origin Error [http://deadfake.com/ * CamHacker.com | Search Webcam Search Engine [https://www.camhacker.com/ * Agente Espião: Câmeras de Vigilâncias [http://cinemauniversaldownloads.blogspot.com/p/blog-page_16.html * Social Searcher - Free Social Media Search Engine [https://www.social-searcher.com/ * NameCheckup - Find Available Username [https://namecheckup.com/ * FotoForensics [https://fotoforensics.com/ * Alain Riccobene email address & phone number | Adista Expert IT contact information - RocketReach [https://rocketreach.co/alain-riccobene-email_52402058
BlueTeam
* SANS Blue Team Operations [https://wiki.sans.blue/#!index.md * SANS Blue Team Operations [https://wiki.sans.blue/#!index.md
Info_Outil
* TweetDeck [https://tweetdeck.twitter.com/ * URL/IP Lookup | Webroot BrightCloud [http://www.brightcloud.com/tools/url-ip-lookup.php * Airbus D&S CyberSecurity blog [http://blog.airbuscybersecurity.com/ * Digital Attack Map [http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=2&time=16873&view=map * KitPloit - PenTest Tools for your Security Arsenal! [http://www.kitploit.com/ * FireEye Cyber Threat Map [https://www.fireeye.com/cyber-map/threat-map.html * ikks.com safe ? Check it with URLVoid [http://www.urlvoid.com/scan/ikks.com/ * Email Hunter - Find email addresses in seconds [https://emailhunter.co/ * Les outils de la veille – Page 2 – L'actualité et les nouveaux outils de la veille et du community management par Fidel Navamuel [http://outilsveille.com/page/2/ * DNS leak test [https://dnsleaktest.com/ * IP/DNS Detect - What is your IP, what is your DNS, what informations you send to websites. [https://ipleak.net/ * Intelligence X [https://intelx.io/ * PunkSPIDER [https://www.punkspider.org/ * 8map.de - Live Attack-Map [http://8map.de/maps/ * Arbor Networks | ATLAS Dashboard: Global [https://atlas.arbor.net/ * ATLAS Summary Report: Global Attacks [https://atlas.arbor.net/summary/attacks#summary * Domain/SiteScan | 8ack.de [https://8ack.de/scan/ * DONT PANIC First Aid Kit | 8ack.de [https://8ack.de/firstaidkit/ * Interactive Cyber Attack Map | CTF365 Blog [https://blog.ctf365.com/interactive-cyber-attack-map/
Info_graphie
* (3) Infographics | Cybercriminality & IT Security sur Pinterest | Ordinateurs, Infographie et Infographie [https://fr.pinterest.com/returnpath/infographics-cybercriminality-it-security/ * INFOGRAPHIE: Genèse des menaces [http://www.trendmicro.fr/infographies/genese-des-menaces/index.html * APT Index • APT Index / Default View • Kumu [https://embed.kumu.io/0b023bf1a971ba32510e86e8f1a38c38#apt-index
Info_Secu
* Journal du hacker [https://www.journalduhacker.net/t/s%C3%A9curit%C3%A9 * Le Reddit des Sysadmins Francophones [https://www.reddit.com/r/Sysadmin_Fr/ * Best Practices SI [https://www.bestpractices-si.fr/ * Les 10 sites à suivre pour une veille #InfoSec | Le blog de la cybersécurité [http://www.cyber-securite.fr/2010/12/28/les-10-sites-a-suivre-pour-une-veille-infosec/ * Le Rôle du RSSI | securite information [http://www.ysosecure.com/securite-information/role-rssi.html * Information Security and IT Security News - Infosecurity Magazine [http://www.infosecurity-magazine.com/news/ * ZATAZ Sécurité informatique, protection et anonymat numériques - ZATAZ [http://www.zataz.com/#axzz470PHsrqK * 1-15 May 2015 Cyber Attacks Timeline | HACKMAGEDDON [http://www.hackmageddon.com/2015/05/19/1-15-may-2015-cyber-attacks-timeline/ * 5 étapes pour Débuter en Programmation – Le Blog du Hacker [http://www.leblogduhacker.fr/5-etapes-pour-debuter-en-programmation/ * Zone-H.org - Unrestricted information [http://zone-h.org/?zh=1 * Actualités sécurité, piratage, hacking et cybercriminalité [http://www.01net.com/rub/actualites/10005/actualites/securite/ * Blocklists of Suspected Malicious IPs and URLs [https://zeltser.com/malicious-ip-blocklists/ * Channelnews.fr - l'actualité du business de l'informatique et des télécoms [http://www.channelnews.fr/ * computer security [https://news.google.com/news/section?hl=en&pz=1&ned=us&q=computer+security * Criminalités numériques | Cybercriminalité, analyse criminalistique des systèmes numériques [http://blog.crimenumerique.fr/ * Data Security Breach | Cyber Défense pour entreprises & particuliers [http://www.datasecuritybreach.fr/ * FireBounty | The Ultimate Bug Bounty Aggregator! [https://firebounty.com/ * FireEye Cyber Threat Map [https://www.fireeye.com/cyber-map/threat-map.html * Mag-Securs |fr] Accueil [http://www.mag-securs.com/ * FortiGuard.com | Home [https://fortiguard.com/ * Hack Like a Pro « Null Byte How-Tos [http://null-byte.wonderhowto.com/how-to/hack-like-a-pro/ * hacking [https://news.google.com/news/section?hl=en&pz=1&ned=us&q=hacking * HACKMAGEDDON | I know with what weapons World War III will be fought… [http://www.hackmageddon.com/ * Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it [http://www.scoop.it/t/it-systems-networks-security * Information Security Stack Exchange [http://security.stackexchange.com/ * June 2015 Cyber Attacks Statistics | HACKMAGEDDON [http://www.hackmageddon.com/2015/07/13/june-2015-cyber-attacks-statistics/?utm_content=bufferdfdef&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer * Kaspersky Cyberthreat real-time map [https://cybermap.kaspersky.com/ * Latest Hacking News - Google+ [https://plus.google.com/+Latesthackingnewscom/posts * Latest Threat Information [http://tools.cisco.com/security/center/navigation.x?i=118 * Mad Irish :: Home [http://www.madirish.net/ * Microsoft Safety Scanner - Outil en ligne gratuit pour la sécurité et l'intégrité des ordinateurs [https://www.microsoft.com/security/scanner/fr-fr/default.aspx * New [https://news.ycombinator.com/newest * News ≈ Packet Storm [http://packetstormsecurity.com/news/ * Norse Attack Map [http://map.norsecorp.com/#/ * Online Penetration Testing Tools | Ethical Hacking Tools [https://pentest-tools.com/ * Outils de sécurité Détection Évaluation Logiciels malveillants Protection Mise à jour Gestion [https://technet.microsoft.com/fr-fr/security/cc297183#E2D * Packet Storm [http://packetstormsecurity.com/ * Securelist - Information about Viruses, Hackers and Spam [https://securelist.com/ * Sécurité informatique [http://cs76.free.fr/securite.php * Sécurité informatique : Toute l'actualité sur Le Monde.fr. [http://www.lemonde.fr/securite-informatique/ * sécurité informatique et réseaux sociaux infographie - Recherche Google [https://www.google.fr/search?q=s%C3%A9curit%C3%A9+informatique+et+r%C3%A9seaux+sociaux+infographie&espv=2&biw=1280&bih=939&site=webhp&tbm=isch&tbo=u&source=univ&sa=X&ved=0CCcQsARqFQoTCJGLhfzV6ccCFcfrGgodyFIOWg * Sécurité informatique, protégez vos réseaux sociaux - CNET France [http://www.cnetfrance.fr/internet-securite/ * Security News [http://www.morningstarsecurity.com/news * Sicherheitstacho.eu [http://www.sicherheitstacho.eu/ * Silicon [http://www.silicon.fr/categorie/security * Toute l'Actualité Sécurité Informatique du Monde Informatique [http://www.lemondeinformatique.fr/securite-informatique-3.html * TheBlacksheep at www.bright-shadows.net: Internet Security Challenges, Network security, Computer security - Community [http://bright-shadows.net/ * Une vision d'un centre opérationnel de sécurité (COS / SOC) - Le blog sécurité de Philippe Vialle / Phil Vialle's blog [http://www.ph-v.net/article-une-vision-d-un-centre-operationnel-de-securite-cos-cos-112457277.html * Useful Computer Security Resources - Select Real Security [http://www.selectrealsecurity.com/useful-security-resources * WIRED [http://www.wired.com/ * www.zataz.com/news/ [http://www.zataz.com/news/ * XMCO - ActuSécu [http://www.xmco.fr/actusecu.html * XMCO - Experts en sécurité informatique [http://www.xmco.fr/index.html * ZATAZ Sécurité informatique, protection et anonymat numériques - ZATAZ [http://www.zataz.com/ * GitHub - kahun/awesome-sysadmin: A curated list of amazingly awesome open source sysadmin resources inspired by Awesome PHP. [https://github.com/kahun/awesome-sysadmin * SecuriTeam Blogs [https://blogs.securiteam.com/ * Les outils de la veille [http://outilsveille.com/ * Security-Feeds.com - Actualités [http://www.security-feeds.com/index.php/fr/Actualites/ * 72 hours of Security News [http://netsecu.org/ * Accueil [http://www.security-feeds.com/ * FeedBucket - Web RSS Reader [http://www.feedbucket.com/?src=https%3A%2F%2Fctftime.org%2Fwriteups%2Frss%2F * Interactive Cyber Attack Map | CTF365 Blog [https://blog.ctf365.com/interactive-cyber-attack-map/ * Lexsi Security Hub [https://www.lexsi.com/securityhub/ * Pentest [http://esec-pentest.sogeti.com/ * Result for 'ip:87.255.133.212' - ZoomEye [chrome-extension://klbibkeccnjlkjkiokjodocebajanakg/suspended.html#uri=https://www.zoomeye.org/search?q=ip%3A87.255.133.212 * Sécurité informatique de A à Z | geekz0ne.fr [http://geekz0ne.fr/blog/2010/03/13/securite-informatique-de-a-a-z/ * Security News [chrome-extension://klbibkeccnjlkjkiokjodocebajanakg/suspended.html#uri=http://www.morningstarsecurity.com/news * Malware-Traffic-Analysis.net [http://www.malware-traffic-analysis.net/index.html * Jordan Wright [http://jordan-wright.com/ * Médecine connectée : un diagnostic | Securelist [https://securelist.fr/connected-medicine-and-its-diagnosis/66614/ * Weakpass [https://weakpass.com/download
Graph
* Gephi - The Open Graph Viz Platform [https://gephi.org/
Start.me
* OSINT & Cybersecurity - Page Gallery - start.me [https://start.me/pages/int/osint * 05. Pentesting - start.me [https://start.me/p/7kj9g2/05-pentesting?locale=fr * Technical Sources - start.me [https://start.me/p/ELY5By/technical-sources * Technical Sources - start.me [https://start.me/p/ELY5By/technical-sources * Page d'accueil - start.me [https://start.me/start/fr/page-d-accueil * The Ultimate OSINT Collection - start.me [https://start.me/p/DPYPMz/the-ultimate-osint-collection * Technical Sources - start.me [https://start.me/p/ELY5By/technical-sources * Verification Toolset - start.me [https://start.me/p/ZGAzN7/verification-toolset * start.me [https://start.me/p/ZGAzN7/verification-toolset * Page d'accueil - start.me [https://start.me/start/fr/page-d-accueil * Technical Sources - start.me [https://start.me/p/ELY5By/technical-sources * Verification Toolset - start.me [https://start.me/p/ZGAzN7/verification-toolset * The Ultimate OSINT Collection - start.me [https://start.me/p/DPYPMz/the-ultimate-osint-collection * Hacking/CTF - start.me [https://start.me/p/jjBklr/hacking-ctf * OSINT - start.me [https://start.me/p/ZME8nR/osint * Top Hacking & Security websites - start.me [https://start.me/sites/int/tech/hacking-security * FAROS OSINT Resources - start.me [https://start.me/p/1kvvxN/faros-osint-resources * Ethical Hacking - start.me [https://start.me/p/1kgAyY/ethical-hacking * Forensics - start.me [https://start.me/p/q6mw4Q/forensics * Cybersecurity - start.me [https://start.me/p/vjBeQ6/cybersecurity * OSINT-Russie (IEC-IES) - start.me [https://start.me/p/0PeKwy/osint-russie-iec-ies * - start.me [https://start.me/p/rx6Qj8/nixintel-s-osint-resource-list * Meilleurs Hacking & Sécurité de sites web - start.me [https://start.me/sites/int/tech/hacking-security * Verification Toolset - start.me [https://start.me/p/ZGAzN7/verification-toolset * Pen Testing / Red Team - start.me [https://start.me/p/8yQwY0/pen-testing-red-team * SANS Pen Test HackFest 2021 - start.me [https://start.me/p/9EPkKR/sans-pen-test-hackfest-2021 * Startpage Résultats de la Recherche [https://www.startpage.com/sp/search * 05. Pentesting - start.me [https://start.me/p/7kj9g2/05-pentesting * Hacking/CTF - start.me [https://start.me/p/jjBklr/hacking-ctf * OSINT & Cybersecurity - Page Gallery - start.me [https://start.me/pages/int/osint * Technical Sources - start.me [https://start.me/p/ELY5By/technical-sources * Top Hacking & Security websites - start.me [https://start.me/sites/int/tech/hacking-security * Top Hacking & Security websites - start.me [https://start.me/sites/int/tech/hacking-security
Blog-a-lire
* Cybersécurité | Arsouyes.org [https://www.arsouyes.org/categories/cybersecurite * James Kettle Research Overview [https://skeletonscribe.net/ * https://the-finn.net/ [https://the-finn.net/ * Marco Ramilli's Blog [https://marcoramilli.blogspot.com/ * SSL [http://www.iletaitunefoisinternet.fr/categories/ssl/ * HighOn.Coffee • Security Research • Penetration Testing Blog [https://highon.coffee/ * Top Sites in France - Alexa [https://www.alexa.com/topsites/countries/FR * Security Research & Penetration Testing Blog - Aptive [https://www.aptive.co.uk/blog/ * Kali tools – Page 4 – All things in moderation [https://hydrasky.com/category/network-security/kali-tools/page/4/ * DFIR Cheat sheets and Infographics [https://www.dfir.training/resources/downloads/cheatsheets-infographics * Rapport État des lieux d'Internet | Akamai [https://www.akamai.com/fr/fr/about/our-thinking/state-of-the-internet-report/ * Developing a PoC Step by Step - The Akamai Blog [https://blogs.akamai.com/2015/12/developing-a-poc-step-by-step.html * http://www.amanhardikar.com/mindmaps/PracticeUrls.html [http://www.amanhardikar.com/mindmaps/PracticeUrls.html * 先知社区 [https://xz.aliyun.com/ * Re4son’s Blog | Re4son [https://whitedome.com.au/re4son/topics/re4son/ * illmob – make shit, break shit, do shit. [http://www.illmob.org/ * Web | WebFu Staging [https://web-central.appspot.com/web/ * Pentester Land · Offensive Infosec [https://pentester.land/ * Articles de blog GlobalSign [https://www.globalsign.com/fr/blog * OWASP Top 10 Tools and Tactics [https://resources.infosecinstitute.com/owasp-top-10-tools-and-tactics/ * ~$ Linux - K_LFA.INFO Sysadmin Quotes [https://k-lfa.info/tag/linux/ * Guide 001 |Getting Started in Bug Bounty Hunting.. – Muhammad Khizer Javed [https://whoami.securitybreached.org/2019/06/03/guide-getting-started-in-bug-bounty-hunting/ * Spawning a TTY Shell [https://netsec.ws/?p=337 * PortSwigger - Burp - All learning materials - detailed [https://portswigger.net/web-security/all-materials/detailed * Researcher Resources - Getting Started - Security Research - Bugcrowd Forum [https://forum.bugcrowd.com/t/researcher-resources-getting-started/115 * Ignitetechnologies (Hacking Articles ) · GitHub [https://github.com/Ignitetechnologies * Using Burp to Test for the OWASP Top Ten | Burp Suite Support Center [https://support.portswigger.net/customer/portal/articles/1969845-using-burp-to-test-for-the-owasp-top-ten * WPSec - Online WordPress Security Scanner [https://blog.wpsec.com/ * Top FREE Network Monitoring Tools in 2019 - DNSstuff [https://www.dnsstuff.com/free-network-monitoring-software * Upgrading shells to fully interactive TTYs [https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/ * Introduction · pentestbook [https://chryzsh.gitbooks.io/pentestbook/ * Johackim - Hacker indépendant [https://johackim.com/ * Getting Started in Bug Bounties - Jack Cable - Medium [https://medium.com/@cablej/getting-started-in-bug-bounties-9990fae0e8e8 * Archive [https://hackso.me/archive/ * Cybersecurity Training | The Cyber Mentor [https://www.thecybermentor.com/ * GitHub - xwiki-labs/alternative-internet: A collection of interesting new networks and tech aiming at decentralisation (in some form). [https://github.com/xwiki-labs/alternative-internet * Basics | Grav Documentation [https://learn.getgrav.org/16 * GitHub - ngalongc/bug-bounty-reference: Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature [https://github.com/ngalongc/bug-bounty-reference * CAIDA: Center for Applied Internet Data Analysis [http://www.caida.org/home/ * Hacker House Demo [https://demos.hacker.house/ * Auto-hébergement Raspberry Pi [http://cpalui.free.fr/ * Stanislas.io – Blog de Stanislas Quastana [https://stanislas.io/ * Joemccray's Pastebin - Pastebin.com [https://pastebin.com/u/joemccray * GitHub - manala/ansible-roles: Manala ansible roles [https://github.com/manala/ansible-roles * PTF : The penetration tester framework | crowd42's blog [https://crowd42.github.io/blog/ptf/ * Pentest Blog - Self-Improvement to Ethical Hacking [https://www.pentest.com.tr/exploits/ * Penetration Testing Active Directory, Part I – root@Hausec [https://hausec.com/2019/03/05/penetration-testing-active-directory-part-i/ * Open Source Patch Management: Options for DIYers [https://www.esecurityplanet.com/applications/open-source-patch-management.html * Hack The Box – WriteUp – FriendZone – Arnotic [https://www.arnotic.com/2019/07/14/hack-the-box-writeup-friendzone/ * HACK Alternative à NetCat | Dyrk [https://dyrk.org/2016/05/16/hack-alternative-a-netcat/ * jetlib.sec [https://sec.jetlib.com/ * Pilat Rando [https://pilat-rando.fr/informations/mentions-legales/ * All learning materials [https://portswigger.net/web-security/all-materials * 0x00sec - The Home of the Hacker [https://0x00sec.org/ * The Magic of Learning — tech.bitvijays.com [https://bitvijays.github.io/content.html * hackNos - Rahul Gehlaut [https://www.hacknos.com/ * Blog XMCO | We deliver security expertise [https://blog.xmco.fr/ * 22 SSH Examples, Practical Tips & Tunnels | HackerTarget.com [https://hackertarget.com/ssh-examples-tunnels/ * The UNIX and Linux Forums - Free Linux and Unix Tech Support [https://www.unix.com/ * Advanced English lessons [https://www.englishpage.com/index.html * Securing your Synology NAS, Part 2 - Mike Tabor [https://miketabor.com/securing-synology-nas/ * GitHub - rastating/shiva: An Ansible playbook to provision a host for penetration testing and CTF challenges [https://github.com/rastating/shiva * A system administrator's guide to getting started with Ansible - FAST! [https://www.redhat.com/en/blog/system-administrators-guide-getting-started-ansible-fast * Security Alerts / safecomputing.umich.edu [https://www.safecomputing.umich.edu/security-alerts/ * Bulk-Adding IPTables Rules | KrazyWorks [https://www.krazyworks.com/bulk-adding-iptables-rules/ * The Penetration Testing Execution Standard [http://www.pentest-standard.org/index.php/Main_Page * Web Server Malware Investigating – Laskowski-Tech [https://laskowski-tech.com/resources/web-server-malware-investigating/ * Top 10 web hacking techniques of 2020 - nominations open | PortSwigger Research [https://portswigger.net/research/top-10-web-hacking-techniques-of-2020-nominations-open * Recherche pour "OWASP" - Le blog de Clever Age [https://blog.clever-age.com/fr/?s=OWASP * Researcher Resources - How to become a Bug Bounty Hunter - Security Research - Bugcrowd Forum [https://forum.bugcrowd.com/t/researcher-resources-how-to-become-a-bug-bounty-hunter/1102 * The SQL Injection Knowledge Base [https://www.websec.ca/kb/sql_injection * IntelTechniques.com | OSINT & Privacy Services by Michael Bazzell | Open Source Intelligence [https://inteltechniques.com/links.html * Web Security Blog - PortSwigger [https://portswigger.net/blog * Security Archives - DNSstuff [https://www.dnsstuff.com/security * NetPublic » Sécurité sur Internet [http://www.netpublic.fr/liste/ressources-netpublic/formation-numerique/securite-sur-internet/ * Investigations of Compromised Linux Web Servers – Laskowski-Tech [https://laskowski-tech.com/2017/09/25/investigations-of-compromised-linux-web-servers/ * HTB: Bastion | 0xdf hacks stuff [https://0xdf.gitlab.io/2019/09/07/htb-bastion.html * GitHub - EdOverflow/bugbounty-cheatsheet: A list of interesting payloads, tips and tricks for bug bounty hunters. [https://github.com/edoverflow/bugbounty-cheatsheet * GitHub - bugbountyforum/BBF-university: The official BBF university. [https://github.com/bugbountyforum/BBF-university * Bug Bounty Forum [https://bugbountyforum.com/ * Getting Started | Hacker101 [https://www.hacker101.com/ * Hacker101 | HackerOne Platform Documentation [https://docs.hackerone.com/hackers/hacker101.html * Profile Settings [https://hackerone.com/settings/profile/edit * Cybersécurité : tous les articles sur siecledigital.fr [https://siecledigital.fr/technologie/cybersecurite/ * All commands [https://www.commandlinefu.com/commands/browse * SQLBolt - Learn SQL - Introduction to SQL [https://sqlbolt.com/ * Bugcrowd University | Bugcrowd [https://www.bugcrowd.com/university/ * Podcast Episode 112: what it takes to be a top bug hunter | [https://securityledger.com/2018/09/podcast-episode-112-what-it-takes-to-be-a-top-bug-hunter/ * Web penetration testing [https://guif.re/webpentest * Outils | Hackers Republic [https://www.hackersrepublic.org/outils * Hackers Republic | Accueil [https://www.hackersrepublic.org/ * Secjuice.com [https://www.secjuice.com/ * Introduction to Kali Linux Revealed [https://kali.training/lessons/introduction/ * Kali-Linux-Revealed-1st-edition.pdf [https://kali.training/downloads/Kali-Linux-Revealed-1st-edition.pdf * Resource for people preparing for Offensive security Certified Penetration Tester [https://www.reddit.com/r/oscp/ * CVE - Search CVE List [https://cve.mitre.org/cve/search_cve_list.html * OSSTMM 3 - OSSTMM.3.pdf [http://www.isecom.org/mirror/OSSTMM.3.pdf * Passing OSCP - scund00r [https://scund00r.com/all/oscp/2018/02/25/passing-oscp.html * Introduction · OSCP - Useful Resources [https://backdoorshell.gitbooks.io/oscp-useful-links/content/ * Penetration Testing • Security Training Share [https://securityonline.info/ * Managing Containers with LXD: A Brief Introduction - Selectel Blog [https://blog.selectel.com/managing-containers-lxd-brief-introduction/ * bashoneliners.com | Bash One-Liners [http://www.bashoneliners.com/ * Universal Leet (L337, L33T, 1337) Converter [http://www.robertecker.com/hp/research/leet-converter.php?lang=en * Sign in to freeCodeCamp | freeCodeCamp [https://auth.freecodecamp.org/login?state=g6Fo2SAyWHJ6M1BCZ1RGTXF6bnVKZ1FTVDlHWHByNFZMdGJzRaN0aWTZIHpMMTJPblFTVE1XSVpaei1uQjRzLW1TX3E4dThqSXc4o2NpZNkgYVVEdjlqVnFUZnhCUkUxbDYwTkE1QWY3eVRDR0U0Y3k&client=aUDv9jVqTfxBRE1l60NA5Af7yTCGE4cy&protocol=oauth2&response_type=code&redirect_uri=http%3A%2F%2Fwww.freecodecamp.org%2Fauth%2Fauth0%2Fcallback&scope=openid%20profile%20email * HackinGeeK - ethical hacking dojo [https://hackingeek.com/ * GTFOBins [https://gtfobins.github.io/#+sudo * MyExperiments - Local Linux privilege escalation overview [https://myexperiments.io/linux-privilege-escalation.html * Liste de Proxy Public Premium (https ssl, socks 4/5) | Hidester [https://hidester.com/fr/listeproxy/ * Actualités Archives - ADACIS [https://www.adacis.net/category/actu/ * CECyF – L'association de coopération pour l'éducation, la formation et la recherche contre la cybercriminalité [https://www.cecyf.fr/ * List of Operating Systems for OSINT (Open-Source Intelligence) - PenTestIT [http://pentestit.com/operating-systems-open-source-intelligence-osint-list/ * AD-Attack-Defense/README.md at master · infosecn1nja/AD-Attack-Defense · GitHub [https://github.com/infosecn1nja/AD-Attack-Defense/blob/master/README.md * Protect Against Malicious POST Requests | Perishable Press [https://perishablepress.com/protect-post-requests/ * OSINT Framework [https://osintframework.com/ * Flare-On 2019 - CTF [https://tuanlinh.gitbook.io/ctf/flare-on-2019 * How I Hacked 40 Websites in 7 minutes | Hacker Noon [https://hackernoon.com/how-i-hacked-40-websites-in-7-minutes-5b4c28bc8824 * https://www.amanhardikar.com/mindmaps/Practice.html [https://www.amanhardikar.com/mindmaps/Practice.html * GitHub - ManhNho/AWAE-OSWE [https://github.com/ManhNho/AWAE-OSWE * Protégez-vous efficacement contre les failles web - OpenClassrooms [https://openclassrooms.com/fr/courses/2091901-protegez-vous-efficacement-contre-les-failles-web?status=published * Learn to hack, collaborate with security researchers and learn about bugbounties | BugBountyNotes.com [https://www.bugbountynotes.com/ * Attack-Defense Online Lab [https://attackdefense.com/ * Cyb3rsick – Laughing @ ya [https://cyb3rsick.com/ * Attaques Archives - Information Security [https://www.information-security.fr/comprendre-infosec/attaques/ * Categories [https://hackso.me/categories/ * Blog Archive - Core dump overflow [http://chousensha.github.io/blog/archives/ * where to start - Core dump overflow [http://chousensha.github.io/where-to-start/ * http://www.vapidlabs.com/index.php [http://www.vapidlabs.com/index.php * x89k [https://x89k.cf/infosec/2018/11/03/oscpsurvivalguide.html * CTF Challenges - Hacking Articles [https://www.hackingarticles.in/ctf-challenges1/ * The Conversation : des analyses de l’actualité par des universitaires et chercheurs [https://theconversation.com/fr * Net Admin Archives - Comparitech [https://www.comparitech.com/net-admin/ * Blog | Blog pour hackers [https://www.securiteinfo.com/blog-pour-hackers/blog * PwnDefend – Modern Cyber Defence [https://www.pwndefend.com/ * Labtainers - Center for Cybersecurity and Cyber Operations - Naval Postgraduate School [https://nps.edu/web/c3o/labtainers * Labtainer Lab Summary - Center for Cybersecurity and Cyber Operations - Naval Postgraduate School [https://nps.edu/web/c3o/labtainer-lab-summary1 * Docker: Creating a Pivoting Lab and Exploiting it | by Kiranghimire | InfoSec Write-ups [https://infosecwriteups.com/docker-creating-a-pivoting-lab-and-exploiting-it-a66646dc2cf3 * Authentification Tout savoir sur Authentification | Techniques de l'Ingénieur [https://www.techniques-ingenieur.fr/search.html?advancedSearch=true&query=authentification&dm=40a4&sc=3f&types=7208df * Le Guide Du SecOps - Blog 🇫🇷 publiant des articles de Cybersecurité (Off./Def.), SysAdmin et DevSecOps [https://le-guide-du-secops.fr/ * Episode 1 | Malicious Life [https://malicious.life/episode/episode-1/ * « Cinéma du réel » : treize films à voir sur Mediapart | Mediapart [https://www.mediapart.fr/studio/documentaires/culture-et-idees/cinema-du-reel-treize-films-voir-sur-mediapart?fbclid=PAAabRamK93F5Ja8gt_cZtY6nSuJfvjgVHtN9xNydbX9i7FmW3MtP5HAt_Sz4 * Identifier des signaux faibles via Twitter sur les services de Cybersécurité | DATA VISUALIZATION & SOCIAL NETWORK ANALYSIS [https://cartorezo.wordpress.com/2019/09/02/identifier-des-signaux-faibles-via-twitter-sur-les-services-de-cybersecurite/ * L’art de la cyberguerre : Sun Tzu et la cybersécurité [https://www.cybersecurite-solutions.com/lart-de-la-cyberguerre-sun-tzu-et-la-cybersecurite/ * b [https://www.post.lu/business/blog/articles/cybersecurite/technical-corner * Accueil - MiniMachines.net [https://www.minimachines.net/ * MisterMatos : Les bons plans en temps réel de Minimachines [https://www.minimachines.net/mistermatos * Patrik Hudak [https://0xpatrik.com/ * https://johnhammond.org/ [https://johnhammond.org/ * 0x20 - @BitK_ & @sakiirsecurity | Objectif top10 CtfTime, faire un bon ctf, les voyages, une anecdote croustillante par Hack'n Speak [https://podcasters.spotify.com/pod/show/hacknspeak/episodes/0x20---BitK_--sakiirsecurity--Objectif-top10-CtfTime--faire-un-bon-ctf--les-voyages--une-anecdote-croustillante-e27irq0 * Federated timeline - DEF CON Social [https://defcon.social/public * Blog | Sam Curry [https://samcurry.net/blog/ * Signalements réguliers d’incidents liés au rançongiciel Qakbot - Mise à jour 2 - Centre canadien pour la cybersécurité [https://www.cyber.gc.ca/fr/alertes-avis/signalements-reguliers-dincidents-lies-au-rancongiciel-qakbot * Who’s Attacking Whom? Realtime Attack Trackers – Krebs on Security [https://krebsonsecurity.com/2015/01/whos-attacking-whom-realtime-attack-trackers/ * Infosec Resources - IT Security Training & Resources by Infosec [https://resources.infosecinstitute.com/ * Inf0Sec - Blog de sécurité informatique [https://inf0sec.fr/ * ethicalhackingguru.com [https://ethicalhackingguru.com/ * Sébastien Koubar | Investisseur, Youtubeur [https://www.sebastienkoubar.com/ * Portefeuille Portefeuille Dividendes de Sébastien Koubar • Moning 🚀 [https://moning.co/fr/sebastien-kou...=very_safe&filtertype=dividend_safety|fr] * Secrets de Sébastien Koubar : ETF, actions, dividendes, ... [https://sinvestir.fr/sebastien-koubar-interview/ * Formation Matthieu Louvet - La Bourse Démocratisée [https://sinvestir.fr/formation-matthieu-louvet/?lk=bannarti&el=pdv_apres_ebook * Malware Sources | PenTestIT [https://pentestit.com/malware-sources/ * Evilginx : le phishing passe à la vitesse supérieure [https://blog.easi.net/fr/solutions/security/evilginx-bringing-phishing-to-a-whole-new-level-0 * Usbek & Rica - Pourquoi n’avoir « rien à cacher » n'est pas une raison pour accepter la surveillance de masse [https://usbeketrica.com/fr/article/pourquoi-n-avoir-rien-a-cacher-n-est-pas-une-raison-pour-accepter-la-surveillance-de-masse * Usbek & Rica [https://usbeketrica.com/fr * Top 10 Twitter Accounts to Follow for Threat Intelligence - SOCRadar® Cyber Intelligence Inc. [https://socradar.io/top-10-twitter-accounts-to-follow-for-threat-intelligence/ * security [https://pberba.github.io/security/ * code.gouv.fr - Nouveaux logiciels libres au SILL [https://spote.developpement-durable.gouv.fr/spip.php?page=sill * Fiverr / résultats de recherche pour « pentesting » [https://fr.fiverr.com/search/gigs?query=pentesting&source=top-bar&ref_ctx_id=321582e43870b7d369d89c3a03e3ae1e&search_in=everywhere&search-autocomplete-original-term=pentesting * 283c4427b276a3ca8a13e145ed4d56c4cec0e3e3199c077b94893a0a3bcce4ef_1.jpg (Image JPEG, 1080 × 1441 pixels) [https://img.ifunny.co/images/283c4427b276a3ca8a13e145ed4d56c4cec0e3e3199c077b94893a0a3bcce4ef_1.jpg * CV MORANGE Cécile [https://cecilemorange.fr/ * 5 Powerful Tools to Check IP and URL Reputation - The Sec Master [https://thesecmaster.com/5-powerful-tools-to-check-ip-and-url-reputation/ * Blog ⋆ IpCisco [https://ipcisco.com/ipcisco-blog/ * SELinux | n0tes.fr [https://n0tes.fr/2023/10/16/SELinux/ * Awesome Cyber Security University | awesome-cyber-security-university [https://brootware.github.io/awesome-cyber-security-university/ * [[img width="50" height="50" alt="front-page port 80-shoopyu" src="https://www.thebigredgroup.com/wp-content/uploads/2021/06/top-six.jpg"|fr] Cybersecurity Resources 💻🛡️ | 𝔩𝔬𝔠𝔞𝔩 𝔥𝔬𝔰𝔱 [https://thelocalhost.blog/posts/cybersec-resources/ * MSSEC – Le Blog [https://blog.mssec.fr/ * Blog | Predatech [https://predatech.co.uk/blog/ * Information & Cyber Security Policy Templates [https://purplesec.us/resources/cyber-security-policy-templates/
THM_HTB
* Raphaël Richard - Notes [https://raphaelrichard-sec.fr/learning-notes * hack_smarter - Twitch [https://www.twitch.tv/hack_smarter * OffSecOfficial - Twitch [https://www.twitch.tv/offsecofficial * GitHub - rng70/TryHackMe-Roadmap: a list of 350+ Free TryHackMe rooms to start learning cybersecurity with THM [https://github.com/rng70/tryhackme-roadmap * Le meilleur Hacking Articles [https://www.hackingarticles.in/red-teaming/ * DarkSec - YouTube [https://www.youtube.com/c/DarkSec/playlists * RequestBin.com — A modern request bin to collect, inspect and debug HTTP requests and webhooks [https://requestbin.com/ * Apprenez les bases du langage Python - OpenClassrooms [https://openclassrooms.com/fr/courses/7168871-apprenez-les-bases-du-langage-python * Global Community CTF: Bootup Event [https://ranges.io/event/9d7eeea2-2837-11ec-90a8-313035303735/challenge/677e0556-2cea-11ec-9d84-396437373036 * 0xsp | offensive cheatsheet [https://0xsp.com/offensive/offensive-cheatsheet * Kali In The Browser (Guacamole) | Kali Linux Documentation [https://www.kali.org/docs/general-use/guacamole-kali-in-browser/ * CTF Challenge - Web App Security Challenges [https://ctfchallenge.com/ * Offensive Security Cheatsheet [https://cheatsheet.haax.fr/ * Welcome! [https://suip.biz/ * https://tryhackme.com/room/encryptioncrypto101 [https://tryhackme.com/room/encryptioncrypto101
THM
* TryHackMe | Hip Flask [https://tryhackme.com/room/hipflask * Awesome Cyber Security University | awesome-cyber-security-university [https://brootware.github.io/awesome-cyber-security-university/ * https://tryhackme.com/room/lazyadmin [https://tryhackme.com/room/lazyadmin * https://tryhackme.com/room/passwordattacks [https://tryhackme.com/room/passwordattacks * https://tryhackme.com/module/privilege-escalation [https://tryhackme.com/module/privilege-escalation * https://tryhackme.com/room/introtoisac [https://tryhackme.com/room/introtoisac * https://tryhackme.com/room/mitre [https://tryhackme.com/room/mitre * https://tryhackme.com/room/ctfcollectionvol1 [https://tryhackme.com/room/ctfcollectionvol1 * https://tryhackme.com/room/lfibasics [https://tryhackme.com/room/lfibasics * https://tryhackme.com/room/localpotato [https://tryhackme.com/room/localpotato * https://www.reddit.com/r/tryhackme/?rdt=33600 [https://www.reddit.com/r/tryhackme/?rdt=33600 * https://www.revshells.com/ [https://www.revshells.com/ * https://github.com/Wh1teDrvg0n/safeVPN-THM [https://github.com/Wh1teDrvg0n/safeVPN-THM * https://github.com/Orange-Cyberdefense/arsenal [https://github.com/Orange-Cyberdefense/arsenal * https://www.youtube.com/watch?v=2qUWfrqAwdI [https://www.youtube.com/watch?v=2qUWfrqAwdI * https://tryhackme.com/login [https://tryhackme.com/login * https://tryhackme.com/room/kali [https://tryhackme.com/room/kali * https://tryhackme.com/room/dvwa [https://tryhackme.com/room/dvwa * https://tryhackme.com/room/pyramidofpainax [https://tryhackme.com/room/pyramidofpainax * https://github.com/rng70/tryhackme-roadmap [https://github.com/rng70/tryhackme-roadmap * https://github.com/rng70/Hacking-Resources [https://github.com/rng70/Hacking-Resources * https://tryhackme.com/room/breachingad [https://tryhackme.com/room/breachingad * https://tryhackme.com/module/recent-threats [https://tryhackme.com/module/recent-threats * https://tryhackme.com/room/atomicredteam [https://tryhackme.com/room/atomicredteam * https://tryhackme.com/room/sqlilab [https://tryhackme.com/room/sqlilab * https://tryhackme.com/my-machine/ [https://tryhackme.com/my-machine/ * https://tryhackme.com/room/kali [https://tryhackme.com/room/kali * https://tryhackme.com/path/outline/redteaming [https://tryhackme.com/path/outline/redteaming * https://tryhackme.com/module/network-security-evasion [https://tryhackme.com/module/network-security-evasion * https://tryhackme.com/path/outline/blueteam [https://tryhackme.com/path/outline/blueteam * https://tryhackme.com/module/red-team-initial-access [https://tryhackme.com/module/red-team-initial-access * https://tryhackme.com/room/lazyadmin [https://tryhackme.com/room/lazyadmin * https://tryhackme.com/room/passwordattacks [https://tryhackme.com/room/passwordattacks * https://tryhackme.com/module/privilege-escalation [https://tryhackme.com/module/privilege-escalation * https://tryhackme.com/module/red-team-fundamentals [https://tryhackme.com/module/red-team-fundamentals * https://tryhackme.com/room/pythonforcybersecurity [https://tryhackme.com/room/pythonforcybersecurity * https://tryhackme.com/room/introtoisac [https://tryhackme.com/room/introtoisac * https://tryhackme.com/room/mitre [https://tryhackme.com/room/mitre * https://tryhackme.com/room/agentsudoctf [https://tryhackme.com/room/agentsudoctf * https://tryhackme.com/room/bpsplunk [https://tryhackme.com/room/bpsplunk * https://tryhackme.com/room/ctfcollectionvol1 [https://tryhackme.com/room/ctfcollectionvol1 * https://tryhackme.com/room/sqlilab [https://tryhackme.com/room/sqlilab * https://tryhackme.com/room/lfibasics [https://tryhackme.com/room/lfibasics * https://tryhackme.com/room/blog [https://tryhackme.com/room/blog * https://tryhackme.com/room/investigatingwindows3 [https://tryhackme.com/room/investigatingwindows3 * https://tryhackme.com/room/webenumerationv2 [https://tryhackme.com/room/webenumerationv2 * https://tryhackme.com/room/bufferoverflowprep [https://tryhackme.com/room/bufferoverflowprep * https://tryhackme.com/room/owasptop10 [https://tryhackme.com/room/owasptop10 * https://tryhackme.com/module/cyber-security-awareness [https://tryhackme.com/module/cyber-security-awareness * https://tryhackme.com/room/bof1 [https://tryhackme.com/room/bof1 * https://tryhackme.com/room/introtox8664 [https://tryhackme.com/room/introtox8664 * https://tryhackme.com/paths [https://tryhackme.com/paths * https://tryhackme.com/forum/ [https://tryhackme.com/forum/ * https://help.tryhackme.com/using-tryhackme [https://help.tryhackme.com/using-tryhackme * https://tryhackme.com/p/7nKe [https://tryhackme.com/p/7nKe * https://tryhackme.com/room/ccpentesting [https://tryhackme.com/room/ccpentesting * https://tryhackme.com/room/adventofcyber3 [https://tryhackme.com/room/adventofcyber3 * https://tryhackme.com/room/wreath [https://tryhackme.com/room/wreath * https://tryhackme.com/room/hololive [https://tryhackme.com/room/hololive * https://tryhackme.com/resources/blog [https://tryhackme.com/resources/blog * https://docs.tryhackme.com/ [https://docs.tryhackme.com/ * https://tryhackme.com/path/outline/pentesting [https://tryhackme.com/path/outline/pentesting * https://discord.com/channels/521382216299839518/546650767495397376 [https://discord.com/channels/521382216299839518/546650767495397376 * https://static-labs.tryhackme.cloud/sites/careers-quiz/?role=sa [https://static-labs.tryhackme.cloud/sites/careers-quiz/?role=sa * https://tryhackme.com/room/cowboyhacker [https://tryhackme.com/room/cowboyhacker * https://tryhackme.com/room/easyctf [https://tryhackme.com/room/easyctf * https://tryhackme.com/room/easypeasyctf [https://tryhackme.com/room/easypeasyctf * https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b [https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b * https://tryhackme.com/room/encryptioncrypto101 [https://tryhackme.com/room/encryptioncrypto101 * https://tryhackme.com/paths [https://tryhackme.com/paths * https://tryhackme.com/room/introdigitalforensics [https://tryhackme.com/room/introdigitalforensics * https://tryhackme.com/room/operatingsystemsecurity [https://tryhackme.com/room/operatingsystemsecurity * https://tryhackme.com/room/snortchallenges2 [https://tryhackme.com/room/snortchallenges2 * https://tryhackme.com/room/runtimedetectionevasion [https://tryhackme.com/room/runtimedetectionevasion * https://tryhackme.com/room/dirtypipe [https://tryhackme.com/room/dirtypipe * https://tryhackme.com/room/intro2windows [https://tryhackme.com/room/intro2windows * https://tryhackme.com/room/securityawarenessintro [https://tryhackme.com/room/securityawarenessintro * https://tryhackme.com/p/JohnHammond [https://tryhackme.com/p/JohnHammond * https://tryhackme.com/room/winadbasics [https://tryhackme.com/room/winadbasics * https://www.reddit.com/r/tryhackme/?rdt=33600 [https://www.reddit.com/r/tryhackme/?rdt=33600 * https://tryhackme.com/room/investigatingwindows3 [https://tryhackme.com/room/investigatingwindows3 * https://tryhackme.com/room/webenumerationv2 [https://tryhackme.com/room/webenumerationv2 * https://tryhackme.com/room/bufferoverflowprep [https://tryhackme.com/room/bufferoverflowprep * https://tryhackme.com/room/owasptop10 [https://tryhackme.com/room/owasptop10 * https://tryhackme.com/module/cyber-security-awareness [https://tryhackme.com/module/cyber-security-awareness * https://tryhackme.com/room/introtox8664 [https://tryhackme.com/room/introtox8664 * https://tryhackme.com/dashboard [https://tryhackme.com/dashboard * https://tryhackme.com/forum/ [https://tryhackme.com/forum/ * https://help.tryhackme.com/using-tryhackme [https://help.tryhackme.com/using-tryhackme * https://tryhackme.com/room/ccpentesting [https://tryhackme.com/room/ccpentesting * https://docs.tryhackme.com/ [https://docs.tryhackme.com/ * https://discord.com/channels/521382216299839518/546650767495397376 [https://discord.com/channels/521382216299839518/546650767495397376 * https://static-labs.tryhackme.cloud/sites/careers-quiz/?role=sa [https://static-labs.tryhackme.cloud/sites/careers-quiz/?role=sa * https://tryhackme.com/room/cowboyhacker [https://tryhackme.com/room/cowboyhacker * https://tryhackme.com/room/easyctf [https://tryhackme.com/room/easyctf * https://tryhackme.com/room/easypeasyctf [https://tryhackme.com/room/easypeasyctf * https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b [https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b * https://tryhackme.com/room/introdigitalforensics [https://tryhackme.com/room/introdigitalforensics * https://tryhackme.com/room/operatingsystemsecurity [https://tryhackme.com/room/operatingsystemsecurity * https://tryhackme.com/room/snortchallenges2 [https://tryhackme.com/room/snortchallenges2 * https://tryhackme.com/room/runtimedetectionevasion [https://tryhackme.com/room/runtimedetectionevasion * https://tryhackme.com/room/dirtypipe [https://tryhackme.com/room/dirtypipe * https://tryhackme.com/room/securityawarenessintro [https://tryhackme.com/room/securityawarenessintro * TryHackMe | Login [https://tryhackme.com/login * TryHackMe | Forum [https://tryhackme.com/forum/ * TryHackMe | Cyber Security Training [https://tryhackme.com/ * What rooms should you do? A free guide for beginners [https://blog.tryhackme.com/free_path/ * Using TryHackMe - TryHackMe [https://help.tryhackme.com/using-tryhackme * TryHackMe | Throwback Network [https://tryhackme.com/network/throwback * RequestBin.com — A modern request bin to collect, inspect and debug HTTP requests and webhooks [https://requestbin.com/ * DarkSec - YouTube [https://www.youtube.com/c/DarkSec/playlists * TryHackMe | HackPark [https://tryhackme.com/room/hackpark * darksec [https://darkstar7471.com/resources.html * TryHackMe Documentation | TryHackMe Documentation [https://docs.tryhackme.com/ * https://tryhackme.com/dashboard [https://tryhackme.com/dashboard * https://tryhackme.com/room/pyramidofpainax [https://tryhackme.com/room/pyramidofpainax * https://tryhackme.com/room/breachingad [https://tryhackme.com/room/breachingad * https://tryhackme.com/module/recent-threats [https://tryhackme.com/module/recent-threats * https://tryhackme.com/room/atomicredteam [https://tryhackme.com/room/atomicredteam * https://tryhackme.com/my-machine/ [https://tryhackme.com/my-machine/ * https://tryhackme.com/room/kali [https://tryhackme.com/room/kali * https://tryhackme.com/path/outline/redteaming [https://tryhackme.com/path/outline/redteaming * https://tryhackme.com/module/network-security-evasion [https://tryhackme.com/module/network-security-evasion * https://tryhackme.com/path/outline/blueteam [https://tryhackme.com/path/outline/blueteam * https://tryhackme.com/module/red-team-initial-access [https://tryhackme.com/module/red-team-initial-access * https://tryhackme.com/module/red-team-fundamentals [https://tryhackme.com/module/red-team-fundamentals * https://tryhackme.com/room/pythonforcybersecurity [https://tryhackme.com/room/pythonforcybersecurity * https://tryhackme.com/room/agentsudoctf [https://tryhackme.com/room/agentsudoctf * https://tryhackme.com/room/bpsplunk [https://tryhackme.com/room/bpsplunk * https://tryhackme.com/room/sqlilab [https://tryhackme.com/room/sqlilab * https://tryhackme.com/room/lfibasics [https://tryhackme.com/room/lfibasics * https://tryhackme.com/module/cyber-security-awareness [https://tryhackme.com/module/cyber-security-awareness * https://tryhackme.com/room/bof1 [https://tryhackme.com/room/bof1 * https://tryhackme.com/forum/ [https://tryhackme.com/forum/ * https://help.tryhackme.com/using-tryhackme [https://help.tryhackme.com/using-tryhackme * https://tryhackme.com/p/7nKe [https://tryhackme.com/p/7nKe * https://tryhackme.com/room/ccpentesting [https://tryhackme.com/room/ccpentesting * https://tryhackme.com/room/adventofcyber3 [https://tryhackme.com/room/adventofcyber3 * https://tryhackme.com/room/wreath [https://tryhackme.com/room/wreath * https://tryhackme.com/resources/blog [https://tryhackme.com/resources/blog * https://docs.tryhackme.com/ [https://docs.tryhackme.com/ * https://tryhackme.com/path/outline/pentesting [https://tryhackme.com/path/outline/pentesting * https://discord.com/channels/521382216299839518/546650767495397376 [https://discord.com/channels/521382216299839518/546650767495397376 * https://static-labs.tryhackme.cloud/sites/careers-quiz/?role=sa [https://static-labs.tryhackme.cloud/sites/careers-quiz/?role=sa * https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b [https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b * https://tryhackme.com/paths [https://tryhackme.com/paths * https://tryhackme.com/room/intro2windows [https://tryhackme.com/room/intro2windows * https://tryhackme.com/room/securityawarenessintro [https://tryhackme.com/room/securityawarenessintro * https://tryhackme.com/p/JohnHammond [https://tryhackme.com/p/JohnHammond * https://tryhackme.com/room/winadbasics [https://tryhackme.com/room/winadbasics * TryHackMe | Holo [https://tryhackme.com/room/hololive * https://tryhackme.com/module/red-team-initial-access [https://tryhackme.com/module/red-team-initial-access * https://tryhackme.com/module/red-team-fundamentals [https://tryhackme.com/module/red-team-fundamentals * https://tryhackme.com/room/agentsudoctf [https://tryhackme.com/room/agentsudoctf * https://tryhackme.com/room/bpsplunk [https://tryhackme.com/room/bpsplunk * https://tryhackme.com/room/sqlilab [https://tryhackme.com/room/sqlilab * https://tryhackme.com/room/blog [https://tryhackme.com/room/blog * https://tryhackme.com/room/bof1 [https://tryhackme.com/room/bof1 * https://tryhackme.com/paths [https://tryhackme.com/paths * https://tryhackme.com/my-machine/ [https://tryhackme.com/my-machine/ * https://tryhackme.com/p/7nKe [https://tryhackme.com/p/7nKe * https://tryhackme.com/room/adventofcyber3 [https://tryhackme.com/room/adventofcyber3 * https://tryhackme.com/room/wreath [https://tryhackme.com/room/wreath * https://tryhackme.com/room/hololive [https://tryhackme.com/room/hololive * https://tryhackme.com/resources/blog [https://tryhackme.com/resources/blog * https://tryhackme.com/path/outline/pentesting [https://tryhackme.com/path/outline/pentesting * https://tryhackme.com/paths [https://tryhackme.com/paths * https://tryhackme.com/room/intro2windows [https://tryhackme.com/room/intro2windows * TryHackMe | 7nKe [https://tryhackme.com/p/7nKe * TryHackMe | My Machine [https://tryhackme.com/my-machine/ * TryHackMe | 7nKe profile [https://tryhackme.com/p/7nKe * TryHackMe | CC: Pen Testing [https://tryhackme.com/room/ccpentesting * TryHackMe | Advent of Cyber 3 (2021) [https://tryhackme.com/room/adventofcyber3 * TryHackMe | Wreath [https://tryhackme.com/room/wreath
Liens_SEC_GitHubSec
* https://github.com/Wh1teDrvg0n/safeVPN-THM [https://github.com/Wh1teDrvg0n/safeVPN-THM * https://wh1tedrvg0n.com/htb-lame/ [https://wh1tedrvg0n.com/htb-lame/ * https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s [https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s * https://github.com/infosecn1nja/Red-Teaming-Toolkit [https://github.com/infosecn1nja/Red-Teaming-Toolkit * https://0xdf.gitlab.io/tags.html [https://0xdf.gitlab.io/tags.html * https://beta.hackndo.com/archives/ [https://beta.hackndo.com/archives/ * https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/Darknet.md [https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/Darknet.md * https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md * https://github.com/qazbnm456/awesome-web-security [https://github.com/qazbnm456/awesome-web-security * https://github.com/Hack-with-Github/Awesome-Hacking [https://github.com/Hack-with-Github/Awesome-Hacking * https://github.com/swisskyrepo/PayloadsAllTheThings [https://github.com/swisskyrepo/PayloadsAllTheThings * https://github.com/carlospolop/PEASS-ng [https://github.com/carlospolop/PEASS-ng * https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md * https://github.com/The-Art-of-Hacking/h4cker/tree/master/vulnerable_servers [https://github.com/The-Art-of-Hacking/h4cker/tree/master/vulnerable_servers * https://github.com/rng70/Hacking-Resources/blob/195e3bcee00383a05dd6c8ed97d5cfcd2a14b7c6/Bug%20Bounty/Bug%20bounty%20Hunting.pdf [https://github.com/rng70/Hacking-Resources/blob/195e3bcee00383a05dd6c8ed97d5cfcd2a14b7c6/Bug%20Bounty/Bug%20bounty%20Hunting.pdf * https://github.com/rng70/Hacking-Resources/blob/master/Burp%20Suite/Burp%20Suite%20Cookbook.pdf [https://github.com/rng70/Hacking-Resources/blob/master/Burp%20Suite/Burp%20Suite%20Cookbook.pdf * https://github.com/The-Art-of-Hacking/h4cker/tree/master/bug-bounties [https://github.com/The-Art-of-Hacking/h4cker/tree/master/bug-bounties * https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets [https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets * https://cheatsheet.haax.fr/web-pentest/tools/ffuf/ [https://cheatsheet.haax.fr/web-pentest/tools/ffuf/ * https://github.com/AfvanMoopen/tryhackme- [https://github.com/AfvanMoopen/tryhackme- * https://manpages.ubuntu.com/manpages/bionic/fr/man8/hping3.8.html [https://manpages.ubuntu.com/manpages/bionic/fr/man8/hping3.8.html * https://auto.pwnspot.com/ [https://auto.pwnspot.com/ * https://github.com/vavkamil/awesome-bugbounty-tools [https://github.com/vavkamil/awesome-bugbounty-tools * https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/red-offensive/offensive-toolbox/recon-frameworks [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/red-offensive/offensive-toolbox/recon-frameworks * https://hackersploit.org/ [https://hackersploit.org/ * https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/#escalate-privileges [https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/#escalate-privileges * https://github.com/GoVanguard/Getting-into-InfoSec-and-Cybersecurity [https://github.com/GoVanguard/Getting-into-InfoSec-and-Cybersecurity * https://github.com/sansinstitute/slingshot [https://github.com/sansinstitute/slingshot * https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc/edit#gid=0 [https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc/edit#gid=0 * https://github.com/denisidoro/navi [https://github.com/denisidoro/navi * https://github.com/Orange-Cyberdefense/GOAD [https://github.com/Orange-Cyberdefense/GOAD * https://vk9-sec.com/category/red-team/anonymity/anonymity-anonymity/ [https://vk9-sec.com/category/red-team/anonymity/anonymity-anonymity/ * https://github.com/rkhal101/Web-Security-Academy-Series [https://github.com/rkhal101/Web-Security-Academy-Series * https://github.com/OlivierLaflamme/Cheatsheet-God [https://github.com/OlivierLaflamme/Cheatsheet-God * https://www.youtube.com/watch?v=ZK-h5xei07k [https://www.youtube.com/watch?v=ZK-h5xei07k * https://github.com/rkhal101/Web-Security-Academy-Series [https://github.com/rkhal101/Web-Security-Academy-Series * https://github.com/danielthatcher?tab=repositories [https://github.com/danielthatcher?tab=repositories * https://www.yolospacehacker.com/fr/toolbox.php?cat=Webshell [https://www.yolospacehacker.com/fr/toolbox.php?cat=Webshell * https://github.com/Orange-Cyberdefense/GOAD [https://github.com/Orange-Cyberdefense/GOAD * https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html [https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html * https://www.bugbountyhunter.com/vulnerability/?type=xss [https://www.bugbountyhunter.com/vulnerability/?type=xss * https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/ [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/ * https://0ut3r.space/2020/07/25/shodan-dorks/ [https://0ut3r.space/2020/07/25/shodan-dorks/ * https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/ [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/ * https://www.sans.org/cyberaces/system-administration/ [https://www.sans.org/cyberaces/system-administration/ * https://ethicalhackersacademy.com/ [https://ethicalhackersacademy.com/ * https://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388 [https://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388 * https://cheatsheet.haax.fr/ [https://cheatsheet.haax.fr/ * https://gchq.github.io/CyberChef/ [https://gchq.github.io/CyberChef/ * https://www.puckiestyle.nl/pass-the-hash/ [https://www.puckiestyle.nl/pass-the-hash/ * https://github.com/Wh1teDrvg0n/safeVPN-THM [https://github.com/Wh1teDrvg0n/safeVPN-THM * https://www.kali.org/docs/general-use/guacamole-kali-in-browser/ [https://www.kali.org/docs/general-use/guacamole-kali-in-browser/ * https://wh1tedrvg0n.com/htb-lame/ [https://wh1tedrvg0n.com/htb-lame/ * https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s [https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s * https://github.com/infosecn1nja/Red-Teaming-Toolkit [https://github.com/infosecn1nja/Red-Teaming-Toolkit * https://0xdf.gitlab.io/tags.html [https://0xdf.gitlab.io/tags.html * https://beta.hackndo.com/archives/ [https://beta.hackndo.com/archives/ * https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/Darknet.md [https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/Darknet.md * https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md * https://github.com/qazbnm456/awesome-web-security [https://github.com/qazbnm456/awesome-web-security * https://github.com/Hack-with-Github/Awesome-Hacking [https://github.com/Hack-with-Github/Awesome-Hacking * https://github.com/swisskyrepo/PayloadsAllTheThings [https://github.com/swisskyrepo/PayloadsAllTheThings * https://github.com/carlospolop/PEASS-ng [https://github.com/carlospolop/PEASS-ng * https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md * https://www.hackingarticles.in/web-penetration-testing/ [https://www.hackingarticles.in/web-penetration-testing/ * https://github.com/enaqx/awesome-pentest [https://github.com/enaqx/awesome-pentest * https://github.com/S3cur3Th1sSh1t/Pentest-Tools [https://github.com/S3cur3Th1sSh1t/Pentest-Tools * https://github.com/Tib3rius/Pentest-Cheatsheets [https://github.com/Tib3rius/Pentest-Cheatsheets * https://github.com/superkojiman?tab=repositories [https://github.com/superkojiman?tab=repositories * https://book.hacktricks.xyz/ [https://book.hacktricks.xyz/ * https://github.com/superkojiman/hacktricks [https://github.com/superkojiman/hacktricks * https://github.com/superkojiman/hacktricks [https://github.com/superkojiman/hacktricks * https://book.hacktricks.xyz/pentesting/pentesting-network#discovering-hosts-from-the-outside [https://book.hacktricks.xyz/pentesting/pentesting-network#discovering-hosts-from-the-outside * https://gtfobins.github.io/ [https://gtfobins.github.io/ * https://lolbas-project.github.io/ [https://lolbas-project.github.io/ * https://github.com/0dayCTF [https://github.com/0dayCTF * https://thedarksource.com/msfvenom-cheat-sheet-create-metasploit-payloads/ [https://thedarksource.com/msfvenom-cheat-sheet-create-metasploit-payloads/ * https://github.com/infosecn1nja/Red-Teaming-Toolkit#Payload%20Development [https://github.com/infosecn1nja/Red-Teaming-Toolkit#Payload%20Development * https://www.hackingarticles.in/netcat-for-pentester/ [https://www.hackingarticles.in/netcat-for-pentester/ * http://www.vulnweb.com/ [http://www.vulnweb.com/ * https://www.revshells.com/ [https://www.revshells.com/ * https://www.hackingarticles.in/msfvenom-cheatsheet-windows-exploitation/ [https://www.hackingarticles.in/msfvenom-cheatsheet-windows-exploitation/ * https://www.youtube.com/watch?v=h0MqCRYH1mk [https://www.youtube.com/watch?v=h0MqCRYH1mk * https://github.com/0dayCTF/awesome-shodan-queries [https://github.com/0dayCTF/awesome-shodan-queries * https://tzusec.com/category/guides/kali-linux/password-attacks/ [https://tzusec.com/category/guides/kali-linux/password-attacks/ * https://github.com/GTFOBins/GTFOBins.github.io [https://github.com/GTFOBins/GTFOBins.github.io * https://github.com/LOLBAS-Project/LOLBAS [https://github.com/LOLBAS-Project/LOLBAS * https://0xdf.gitlab.io/ [https://0xdf.gitlab.io/ * https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS [https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS * https://www.trenchesofit.com/resources/ [https://www.trenchesofit.com/resources/ * https://www.trenchesofit.com/2020/09/12/oscp-buffer-overflow-write-up/ [https://www.trenchesofit.com/2020/09/12/oscp-buffer-overflow-write-up/ * https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe [https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe * https://github.com/n3tsky/Pentest-Tools [https://github.com/n3tsky/Pentest-Tools * https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe [https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe * https://github.com/hum4nG0D/OSCP_Bufferovrflw_Prep [https://github.com/hum4nG0D/OSCP_Bufferovrflw_Prep * https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst [https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst * https://rderik.com/blog/using-radare2-to-patch-a-binary/ [https://rderik.com/blog/using-radare2-to-patch-a-binary/ * https://gef.readthedocs.io/en/master/commands/ropper/ [https://gef.readthedocs.io/en/master/commands/ropper/ * https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s [https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s * https://gef.readthedocs.io/en/master/ [https://gef.readthedocs.io/en/master/ * https://beta.hackndo.com/assembly-basics/ [https://beta.hackndo.com/assembly-basics/ * https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/ [https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/ * https://md5hashing.net/ [https://md5hashing.net/ * https://hashcat.net/wiki/doku.php?id=example_hashes [https://hashcat.net/wiki/doku.php?id=example_hashes * https://github.com/openwall/john/blob/bleeding-jumbo/run/ssh2john.py [https://github.com/openwall/john/blob/bleeding-jumbo/run/ssh2john.py * https://defendtheweb.net/article/buffer-overflow-to-run-root-shell-full-tutorial [https://defendtheweb.net/article/buffer-overflow-to-run-root-shell-full-tutorial * https://github.com/OJ/gobuster#vhost-mode-options [https://github.com/OJ/gobuster#vhost-mode-options * https://erev0s.com/tools/web-application-assessment-check-list/ [https://erev0s.com/tools/web-application-assessment-check-list/ * https://wpscan.com/howto-find-wordpress-plugin-vulnerabilities-wpscan-ebook.pdf [https://wpscan.com/howto-find-wordpress-plugin-vulnerabilities-wpscan-ebook.pdf * https://reconshell.com/web-attack-cheat-sheet/ [https://reconshell.com/web-attack-cheat-sheet/ * https://oscp.infosecsanyam.in/brute-force [https://oscp.infosecsanyam.in/brute-force * https://md5hashing.net/hash/md5 [https://md5hashing.net/hash/md5 * https://github.com/Hack-with-Github/Free-Security-eBooks [https://github.com/Hack-with-Github/Free-Security-eBooks * https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerry [https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerryguy311/Free_CyberSecurity_Professional_Development_Resourceshttps://github.com/payloadbox/command-injection-payload-listhttps://github.com/jagregory/abrash-zen-of-asmhttps://github.com/Cyb3rWard0ghttps://github.com/dievus/threader3000https://github.com/dievus/printspooferhttps://github.com/kgretzky/evilginx2https://github.com/muraenateam/muraenahttps://github.com/drk1wi/Modlishkahttps://github.com/AlgoSecure/Pollenisatorhttps://github.com/fluentpython/example-code-2ehttps://github.com/dostoevskylabs/dostoevsky-pentest-noteshttps://github.com/NoorQureshi/kali-linux-cheatsheethttps://snowscan.io/https://github.com/Yavuzlar/VulnLabhttps://blog.void.yt/HTB/index.htmlhttps://github.com/0dayCTF/awesome-shodan-querieshttps://github.com/skelsec/pypykatzhttps://github.com/sc0tfree/updoghttps://github.com/NetSPI/PowerUpSQLhttps://github.com/GTFOBins/GTFOBins.github.iohttps://github.com/LOLBAS-Project/LOLBAShttps://github.com/pry0cc/axiomhttps://github.com/jivoi/pentesthttps://github.com/Ignitetechnologies/BurpSuite-For-Pentesterhttps://github.com/curated-intel/Ukraine-Cyber-Operationshttps://github.com/Kirtar22/Presentationshttps://github.com/Kirtar22/Litmus_Testhttps://github.com/Z4nzu/hackingtoolhttps://github.com/kaiiyer/awesome-vulnerablehttps://github.com/OWASP/Vulnerable-Web-Applicationhttps://github.com/sec4you/VulnLabshttps://github.com/webpwnized/mutillidaehttps://thehackerish.com/how-to-install-owasp-juice-shop/https://github.com/juliocesarfort/public-pentesting-reportshttps://github.com/PowerDNS-Admin/PowerDNS-Adminhttps://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388https://github.com/tdubs/bgp-recon * https://gist.github.com/HarmJ0y/184f9822b195c52dd50c379ed3117993 [https://gist.github.com/HarmJ0y/184f9822b195c52dd50c379ed3117993 * https://github.com/SecureAuthCorp/impacket [https://github.com/SecureAuthCorp/impacket * https://wtfbins.wtf/ [https://wtfbins.wtf/ * https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerry [https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerryguy311/Free_CyberSecurity_Professional_Development_Resourceshttps://github.com/payloadbox/command-injection-payload-listhttps://github.com/jagregory/abrash-zen-of-asmhttps://github.com/Cyb3rWard0ghttps://github.com/dievus/threader3000https://github.com/dievus/printspooferhttps://github.com/kgretzky/evilginx2https://github.com/muraenateam/muraenahttps://github.com/drk1wi/Modlishkahttps://github.com/AlgoSecure/Pollenisatorhttps://github.com/fluentpython/example-code-2ehttps://github.com/dostoevskylabs/dostoevsky-pentest-noteshttps://github.com/NoorQureshi/kali-linux-cheatsheethttps://snowscan.io/https://github.com/Yavuzlar/VulnLabhttps://blog.void.yt/HTB/index.htmlhttps://github.com/0dayCTF/awesome-shodan-querieshttps://github.com/skelsec/pypykatzhttps://github.com/sc0tfree/updoghttps://github.com/NetSPI/PowerUpSQLhttps://github.com/GTFOBins/GTFOBins.github.iohttps://github.com/LOLBAS-Project/LOLBAShttps://github.com/pry0cc/axiomhttps://github.com/jivoi/pentesthttps://github.com/Ignitetechnologies/BurpSuite-For-Pentesterhttps://github.com/curated-intel/Ukraine-Cyber-Operationshttps://github.com/Kirtar22/Presentationshttps://github.com/Kirtar22/Litmus_Testhttps://github.com/Z4nzu/hackingtoolhttps://github.com/kaiiyer/awesome-vulnerablehttps://github.com/OWASP/Vulnerable-Web-Applicationhttps://github.com/sec4you/VulnLabshttps://github.com/webpwnized/mutillidaehttps://thehackerish.com/how-to-install-owasp-juice-shop/https://github.com/juliocesarfort/public-pentesting-reportshttps://github.com/PowerDNS-Admin/PowerDNS-Adminhttps://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388https://github.com/tdubs/bgp-recon * https://github.com/Hack-with-Github/Free-Security-eBooks [https://github.com/Hack-with-Github/Free-Security-eBooks * https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerry [https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerryguy311/Free_CyberSecurity_Professional_Development_Resourceshttps://github.com/payloadbox/command-injection-payload-listhttps://github.com/jagregory/abrash-zen-of-asmhttps://github.com/Cyb3rWard0ghttps://github.com/dievus/threader3000https://github.com/dievus/printspooferhttps://github.com/kgretzky/evilginx2https://github.com/muraenateam/muraenahttps://github.com/drk1wi/Modlishkahttps://github.com/AlgoSecure/Pollenisatorhttps://github.com/fluentpython/example-code-2ehttps://github.com/dostoevskylabs/dostoevsky-pentest-noteshttps://github.com/NoorQureshi/kali-linux-cheatsheethttps://snowscan.io/https://github.com/Yavuzlar/VulnLabhttps://blog.void.yt/HTB/index.htmlhttps://github.com/0dayCTF/awesome-shodan-querieshttps://github.com/skelsec/pypykatzhttps://github.com/sc0tfree/updoghttps://github.com/NetSPI/PowerUpSQLhttps://github.com/GTFOBins/GTFOBins.github.iohttps://github.com/LOLBAS-Project/LOLBAShttps://github.com/pry0cc/axiomhttps://github.com/jivoi/pentesthttps://github.com/Ignitetechnologies/BurpSuite-For-Pentesterhttps://github.com/curated-intel/Ukraine-Cyber-Operationshttps://github.com/Kirtar22/Presentationshttps://github.com/Kirtar22/Litmus_Testhttps://github.com/Z4nzu/hackingtoolhttps://github.com/kaiiyer/awesome-vulnerablehttps://github.com/OWASP/Vulnerable-Web-Applicationhttps://github.com/sec4you/VulnLabshttps://github.com/webpwnized/mutillidaehttps://thehackerish.com/how-to-install-owasp-juice-shop/https://github.com/juliocesarfort/public-pentesting-reportshttps://github.com/PowerDNS-Admin/PowerDNS-Adminhttps://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388https://github.com/tdubs/bgp-recon * https://www.threatable.io/ [https://www.threatable.io/ * https://t.me/s/HackerVideos/ [https://t.me/s/HackerVideos/ * https://osintframework.com/ [https://osintframework.com/ * https://github.com/blindfuzzy/LHF [https://github.com/blindfuzzy/LHF * https://haax.fr/fr/ [https://haax.fr/fr/ * https://github.com/Ignitetechnologies/BurpSuite-For-Pentester?utm_source=pocket_mylist [https://github.com/Ignitetechnologies/BurpSuite-For-Pentester?utm_source=pocket_mylist * https://github.com/andrew-d/static-binaries [https://github.com/andrew-d/static-binaries * https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys [https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys * https://github.com/OWASP/CheatSheetSeries/tree/master/cheatsheets [https://github.com/OWASP/CheatSheetSeries/tree/master/cheatsheets * https://vk9-sec.com/ssh2john-how-to/ [https://vk9-sec.com/ssh2john-how-to/ * https://github.com/vavkamil/awesome-bugbounty-tools [https://github.com/vavkamil/awesome-bugbounty-tools * https://github.com/Ciphey/Ciphey/blob/master/translations/fr/README.md [https://github.com/Ciphey/Ciphey/blob/master/translations/fr/README.md * https://github.com/clong/DetectionLab [https://github.com/clong/DetectionLab * https://github.com/hposton/python-for-cybersecurity [https://github.com/hposton/python-for-cybersecurity * https://github.com/Orange-Cyberdefense/arsenal [https://github.com/Orange-Cyberdefense/arsenal * https://www.bugbountyhunter.com/ [https://www.bugbountyhunter.com/ * https://www.kitploit.com/ [https://www.kitploit.com/ * https://github.com/CyberSecurityUP/Awesome-PenTest-Practice [https://github.com/CyberSecurityUP/Awesome-PenTest-Practice * https://github.com/yarrick/iodine [https://github.com/yarrick/iodine * https://gitlab.com/An0nUD4Y/hiddeneye [https://gitlab.com/An0nUD4Y/hiddeneye * https://pequalsnp-team.github.io/cheatsheet/steganography-101 [https://pequalsnp-team.github.io/cheatsheet/steganography-101 * https://github.com/Orange-Cyberdefense/arsenal [https://github.com/Orange-Cyberdefense/arsenal * https://www.hackingarticles.in/web-penetration-testing/ [https://www.hackingarticles.in/web-penetration-testing/ * https://github.com/enaqx/awesome-pentest [https://github.com/enaqx/awesome-pentest * https://github.com/S3cur3Th1sSh1t/Pentest-Tools [https://github.com/S3cur3Th1sSh1t/Pentest-Tools * https://github.com/Tib3rius/Pentest-Cheatsheets [https://github.com/Tib3rius/Pentest-Cheatsheets * https://github.com/superkojiman?tab=repositories [https://github.com/superkojiman?tab=repositories * https://gchq.github.io/CyberChef/ [https://gchq.github.io/CyberChef/ * https://github.com/Wh1teDrvg0n/safeVPN-THM [https://github.com/Wh1teDrvg0n/safeVPN-THM * https://www.kali.org/docs/general-use/guacamole-kali-in-browser/ [https://www.kali.org/docs/general-use/guacamole-kali-in-browser/ * https://wh1tedrvg0n.com/htb-lame/ [https://wh1tedrvg0n.com/htb-lame/ * https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s [https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s * https://github.com/infosecn1nja/Red-Teaming-Toolkit [https://github.com/infosecn1nja/Red-Teaming-Toolkit * https://0xdf.gitlab.io/tags.html [https://0xdf.gitlab.io/tags.html * https://beta.hackndo.com/archives/ [https://beta.hackndo.com/archives/ * https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/Darknet.md [https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/Darknet.md * https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md * https://github.com/qazbnm456/awesome-web-security [https://github.com/qazbnm456/awesome-web-security * https://github.com/Hack-with-Github/Awesome-Hacking [https://github.com/Hack-with-Github/Awesome-Hacking * https://github.com/swisskyrepo/PayloadsAllTheThings [https://github.com/swisskyrepo/PayloadsAllTheThings * https://github.com/carlospolop/PEASS-ng [https://github.com/carlospolop/PEASS-ng * https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md * https://www.hackingarticles.in/web-penetration-testing/ [https://www.hackingarticles.in/web-penetration-testing/ * https://github.com/enaqx/awesome-pentest [https://github.com/enaqx/awesome-pentest * https://github.com/S3cur3Th1sSh1t/Pentest-Tools [https://github.com/S3cur3Th1sSh1t/Pentest-Tools * https://github.com/Tib3rius/Pentest-Cheatsheets [https://github.com/Tib3rius/Pentest-Cheatsheets * https://github.com/superkojiman?tab=repositories [https://github.com/superkojiman?tab=repositories * https://book.hacktricks.xyz/ [https://book.hacktricks.xyz/ * https://github.com/superkojiman/hacktricks [https://github.com/superkojiman/hacktricks * https://github.com/superkojiman/hacktricks [https://github.com/superkojiman/hacktricks * https://book.hacktricks.xyz/pentesting/pentesting-network#discovering-hosts-from-the-outside [https://book.hacktricks.xyz/pentesting/pentesting-network#discovering-hosts-from-the-outside * https://gtfobins.github.io/ [https://gtfobins.github.io/ * https://lolbas-project.github.io/ [https://lolbas-project.github.io/ * https://github.com/0dayCTF [https://github.com/0dayCTF * https://thedarksource.com/msfvenom-cheat-sheet-create-metasploit-payloads/ [https://thedarksource.com/msfvenom-cheat-sheet-create-metasploit-payloads/ * https://github.com/infosecn1nja/Red-Teaming-Toolkit#Payload%20Development [https://github.com/infosecn1nja/Red-Teaming-Toolkit#Payload%20Development * https://www.hackingarticles.in/netcat-for-pentester/ [https://www.hackingarticles.in/netcat-for-pentester/ * https://www.revshells.com/ [https://www.revshells.com/ * https://www.hackingarticles.in/msfvenom-cheatsheet-windows-exploitation/ [https://www.hackingarticles.in/msfvenom-cheatsheet-windows-exploitation/ * https://www.youtube.com/watch?v=h0MqCRYH1mk [https://www.youtube.com/watch?v=h0MqCRYH1mk * https://github.com/0dayCTF/awesome-shodan-queries [https://github.com/0dayCTF/awesome-shodan-queries * https://tzusec.com/category/guides/kali-linux/password-attacks/ [https://tzusec.com/category/guides/kali-linux/password-attacks/ * https://github.com/GTFOBins/GTFOBins.github.io [https://github.com/GTFOBins/GTFOBins.github.io * https://github.com/LOLBAS-Project/LOLBAS [https://github.com/LOLBAS-Project/LOLBAS * https://0xdf.gitlab.io/ [https://0xdf.gitlab.io/ * https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS [https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS * https://www.trenchesofit.com/resources/ [https://www.trenchesofit.com/resources/ * https://www.trenchesofit.com/2020/09/12/oscp-buffer-overflow-write-up/ [https://www.trenchesofit.com/2020/09/12/oscp-buffer-overflow-write-up/ * https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe [https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe * https://github.com/n3tsky/Pentest-Tools [https://github.com/n3tsky/Pentest-Tools * https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe [https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe * https://github.com/hum4nG0D/OSCP_Bufferovrflw_Prep [https://github.com/hum4nG0D/OSCP_Bufferovrflw_Prep * https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst [https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst * https://rderik.com/blog/using-radare2-to-patch-a-binary/ [https://rderik.com/blog/using-radare2-to-patch-a-binary/ * https://gef.readthedocs.io/en/master/commands/ropper/ [https://gef.readthedocs.io/en/master/commands/ropper/ * https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s [https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s * https://gef.readthedocs.io/en/master/ [https://gef.readthedocs.io/en/master/ * https://beta.hackndo.com/assembly-basics/ [https://beta.hackndo.com/assembly-basics/ * https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/ [https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/ * https://md5hashing.net/ [https://md5hashing.net/ * https://hashcat.net/wiki/doku.php?id=example_hashes [https://hashcat.net/wiki/doku.php?id=example_hashes * https://github.com/openwall/john/blob/bleeding-jumbo/run/ssh2john.py [https://github.com/openwall/john/blob/bleeding-jumbo/run/ssh2john.py * https://github.com/OJ/gobuster#vhost-mode-options [https://github.com/OJ/gobuster#vhost-mode-options * https://erev0s.com/tools/web-application-assessment-check-list/ [https://erev0s.com/tools/web-application-assessment-check-list/ * https://reconshell.com/web-attack-cheat-sheet/ [https://reconshell.com/web-attack-cheat-sheet/ * https://oscp.infosecsanyam.in/brute-force [https://oscp.infosecsanyam.in/brute-force * https://md5hashing.net/hash/md5 [https://md5hashing.net/hash/md5 * https://github.com/superkojiman?tab=repositories [https://github.com/superkojiman?tab=repositories * https://book.hacktricks.xyz/ [https://book.hacktricks.xyz/ * https://github.com/superkojiman/hacktricks [https://github.com/superkojiman/hacktricks * https://github.com/superkojiman/hacktricks [https://github.com/superkojiman/hacktricks * https://book.hacktricks.xyz/pentesting/pentesting-network#discovering-hosts-from-the-outside [https://book.hacktricks.xyz/pentesting/pentesting-network#discovering-hosts-from-the-outside * https://gtfobins.github.io/ [https://gtfobins.github.io/ * https://lolbas-project.github.io/ [https://lolbas-project.github.io/ * https://github.com/0dayCTF [https://github.com/0dayCTF * https://thedarksource.com/msfvenom-cheat-sheet-create-metasploit-payloads/ [https://thedarksource.com/msfvenom-cheat-sheet-create-metasploit-payloads/ * https://github.com/infosecn1nja/Red-Teaming-Toolkit#Payload%20Development [https://github.com/infosecn1nja/Red-Teaming-Toolkit#Payload%20Development * https://www.hackingarticles.in/netcat-for-pentester/ [https://www.hackingarticles.in/netcat-for-pentester/ * https://www.revshells.com/ [https://www.revshells.com/ * https://www.hackingarticles.in/msfvenom-cheatsheet-windows-exploitation/ [https://www.hackingarticles.in/msfvenom-cheatsheet-windows-exploitation/ * https://www.youtube.com/watch?v=h0MqCRYH1mk [https://www.youtube.com/watch?v=h0MqCRYH1mk * https://github.com/0dayCTF/awesome-shodan-queries [https://github.com/0dayCTF/awesome-shodan-queries * https://tzusec.com/category/guides/kali-linux/password-attacks/ [https://tzusec.com/category/guides/kali-linux/password-attacks/ * https://github.com/GTFOBins/GTFOBins.github.io [https://github.com/GTFOBins/GTFOBins.github.io * https://github.com/LOLBAS-Project/LOLBAS [https://github.com/LOLBAS-Project/LOLBAS * https://0xdf.gitlab.io/ [https://0xdf.gitlab.io/ * https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS [https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS * https://www.trenchesofit.com/resources/ [https://www.trenchesofit.com/resources/ * https://www.trenchesofit.com/2020/09/12/oscp-buffer-overflow-write-up/ [https://www.trenchesofit.com/2020/09/12/oscp-buffer-overflow-write-up/ * https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe [https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe * https://github.com/n3tsky/Pentest-Tools [https://github.com/n3tsky/Pentest-Tools * https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe [https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe * https://github.com/hum4nG0D/OSCP_Bufferovrflw_Prep [https://github.com/hum4nG0D/OSCP_Bufferovrflw_Prep * https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst [https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst * https://rderik.com/blog/using-radare2-to-patch-a-binary/ [https://rderik.com/blog/using-radare2-to-patch-a-binary/ * https://gef.readthedocs.io/en/master/commands/ropper/ [https://gef.readthedocs.io/en/master/commands/ropper/ * https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s [https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s * https://gef.readthedocs.io/en/master/ [https://gef.readthedocs.io/en/master/ * https://beta.hackndo.com/assembly-basics/ [https://beta.hackndo.com/assembly-basics/ * https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/ [https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/ * https://md5hashing.net/ [https://md5hashing.net/ * https://hashcat.net/wiki/doku.php?id=example_hashes [https://hashcat.net/wiki/doku.php?id=example_hashes * Open-source-tools-for-CTI/Darknet.md at master · BushidoUK/Open-source-tools-for-CTI · GitHub [https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/Darknet.md * PayloadsAllTheThings/Reverse Shell Cheatsheet.md at master · swisskyrepo/PayloadsAllTheThings · GitHub [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md * GitHub - qazbnm456/awesome-web-security: 🐶 A curated list of Web Security materials and resources. [https://github.com/qazbnm456/awesome-web-security * GitHub - Hack-with-Github/Awesome-Hacking: A collection of various awesome lists for hackers, pentesters and security researchers [https://github.com/Hack-with-Github/Awesome-Hacking * GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF [https://github.com/swisskyrepo/PayloadsAllTheThings * GitHub - carlospolop/PEASS-ng: PEASS - Privilege Escalation Awesome Scripts SUITE (with colors) [https://github.com/carlospolop/PEASS-ng * All Sites - Stack Exchange [https://stackexchange.com/sites * 0x00sec - The Home of the Hacker [https://0x00sec.org/ * 500+ latest Verified Deep Web Links | DARK WEB Links [https://darkweblink.com/deep-web-links/ * How To Search Popular Hacker Forums On The Dark Web | DWL [https://darkweblink.com/search-hacker-forums-dark-web/ * PowerSploit/PowerUp.ps1 at master · PowerShellMafia/PowerSploit · GitHub [https://github.com/PowerShellMafia/PowerSploit/blob/master/Privesc/PowerUp.ps1 * About [https://blog.openthreatresearch.com/about/
muscu
* Abdominals - MuscleWiki [https://musclewiki.com/Bodyweight/Male/Abdominals
VTT
* Client web BRouter [https://brouter.de/brouter-web/#map=12/45.3812/4.5422/cyclosm&profile=trekking-ignore-cr * CyclOSM: OpenStreetMap-based bicycle map [https://www.cyclosm.org/#map=13/45.3708/4.4416/cyclosm * - Carte des randonnées et promenades - SityTrail [https://www.sitytrail.com/fr/map/trails/?f_depart=within_4.452209472656251%2C45.39495432805337%2C4.627990722656251%2C45.472530908551526&f_rel_activity=202 * Aide en ligne de l'application mobile - Wiki - SityTrail [https://www.sitytrail.com/fr/wiki/70b2c778-634f-4516-a434-55e2d7769e59/ * Bras Pivotant Van-Swing Spécial Jumpy / Expert / ProAce / Vivaro avec Ouverture à Gauche - Attelage-Accessoire-Auto [https://attelage-accessoire-auto.com/peugeot-expert/7436-bras-pivotant-van-swing-special-jumpy-expert-proace-vivaro-avec-ouverture-a-gauche.html * Client web BRouter [https://brouter.de/brouter-web/#map=13/45.3709/4.4416/cyclosm&lonlats=4.378052,45.358506;4.515896,45.370334&profile=trekking-ignore-cr * Nos Circuits - www.boisnoirs.fr [https://www.boisnoirs.fr/espace-vtt-ffc/nos-circuits/ * Parcours vtt - 8 Balcon de la Drôme - Saillans [https://www.cirkwi.com/fr/circuit/238269-8-balcon-de-la-drome * Recherche de randos VTT avec traces GPS [https://www.utagawavtt.com/search?...&q=1,2,3&k=0&l=all&u=1&ak=11974&aa=50|fr] * France [https://www.freizeitkarte-osm.de/garmin/en/france.html * BBBike extracts OpenStreetMap [https://garmin3.bbbike.org/ * Recherche de randos VTT avec traces GPS [https://www.utagawavtt.com/search?...&q=1,2,3&k=0&l=all&u=1&ak=11974&aa=50|fr] * Stage de pilotage VTT dans la vallée de l'Eyrieux - Perfectionnez-vous pour plus de plaisir à VTT! - Ardèche [https://www.pmpv-ardeche.com/fr/sejours-pmpv-ardeche/stage-de-pilotage-vtt-dans-la-vallee-de-l-eyrieux/29-perfectionnez-vous-pour-plus-de-plaisir-a-vtt.htm * Stage enduro VTT niveau 3 & 4 - ORIENTATION VÉLO [https://www.orientation-velo.com/stage-vtt-niveau-3-enduro/ * VTTAE.fr - Le Magazine du VTT à assistance électrique [https://vttae.fr/ * Les caractéristiques des pneus VTT - [https://www.cycletyres.fr/blog/les-caracteristiques-des-pneus-vtt.html * Pilotage VTT - 5 exercices pour progresser facilement et rapidement ! - YouTube [https://www.youtube.com/watch?v=opvVK9t7ahw * PILOTAGE VTT : Apprendre à faire le bunny-up / bunny hop en 1 jour - YouTube [https://www.youtube.com/watch?v=uVPbyXWCNeg * MTB Hopper Balance [https://mohawkscycles.fr/fr/accueil/1100328-mtb-hopper-balance-4779047700162.html * Pilotage VTT - Comment faire un Manual ? - YouTube [https://www.youtube.com/watch?v=CBPpwdRCeqI&list=PL009Lcswci7HFGK4ZVCsZCA-mPhn-9JCh * POUR MON GPS GARMIN – QUELLE CARTOGRAPHIE ? - www.actuduvttgps.fr [https://www.actuduvttgps.fr/2018/02/17/pour-mon-gps-garmin-quelle-cartographies/
TV_Film_video
* Netflix Codes : trouvez les catégories cachées sur Netflix (liste complète) [https://www.netflix-codes.com/fr * PHOTOCALL.TV - Televisión y radio online [https://photocall.tv/
COUPONS
* 50% Off Hack The Box EU COUPON CODE: (5 ACTIVE) Oct 2023 [https://www.wethrift.com/hack-the-box-eu
A_TRIER
* Protection de la messagerie par SPF et DKIM – IØ Expertises [https://www.io-expertises.fr/protection-de-la-messagerie-par-spf-et-dkim/ * Black Hills Information Security, a Penetration Testing Company - Projects [https://www.blackhillsinfosec.com/projects/ * Antionline Forums - Maximum Security for a Connected World [https://www.antionline.com/forums.php?s=d3d6fe6e34f4dc1bda42e6f3fd789545 * 0x0ff.info – Sécurité Informatique et Juridique – #InfoSec #Hacking #Luvz [https://www.0x0ff.info/ * Nothink! [http://www.nothink.org/ * Ventoy : Booter Plusieurs Images Sur Une Seule Clé USB [https://holory.fr/ventoy-booter-plusieurs-iso/ * Page 6 of 28 for Blog Eleven Labs | Blog Eleven Labs [https://blog.eleven-labs.com/page/6/ * GDPR Solutions | Black Hat Ethical Hacking [https://www.blackhatethicalhacking.com/guest/gdpr-solutions/ * Transférer des données hors de l'UE | CNIL [https://www.cnil.fr/fr/transferer-des-donnees-hors-de-lue * Platform Downloads | OmniSci [https://www.omnisci.com/platform/downloads * 👍 Pouce Vers Le Haut Emoji [https://emojiterra.com/fr/pouce-leve/ * logiciel pfsense | www.osnet.eu [https://www.osnet.eu/fr/articles-by-category/logiciel-pfsense * Ansible TLDR [https://blog.karolak.fr/2020/09/23/ansible-tldr/ * JeffProd | Le hachage perceptuel (perceptual hashing) [https://fr.jeffprod.com/blog/2018/le-hachage-perceptuel/ * APPRENDRE PYTHON: FORMATION COMPLÈTE GRATUITE 2021 - YouTube [https://www.youtube.com/watch?v=LamjAFnybo0 * Shell Ransomware [https://mediashare.fr/post/shell-ransomware * Building a Custom Malware Analysis Lab Environment - SentinelLabs [https://labs.sentinelone.com/building-a-custom-malware-analysis-lab-environment/ * GitHub - rshipp/awesome-malware-analysis: Defund the Police. [https://github.com/rshipp/awesome-malware-analysis#deobfuscation * Qu’est-ce que le modèle OSI ? | Cloudflare [https://www.cloudflare.com/fr-fr/learning/ddos/glossary/open-systems-interconnection-model-osi/ * Documentation technique | Microsoft Docs [https://docs.microsoft.com/fr-fr/documentation/ * I-BlockList | Lists [https://www.iblocklist.com/lists?category=country * Veyon | Contrôle d'ordinateur et gestion de classe multiplateforme [https://veyon.io/fr/#screenshots * Seeing Red: The Fun Stuff - ericooi.com [https://www.ericooi.com/seeing-red-the-fun-stuff/ * Télécharger une machine virtuelle Windows - Développement d’applications Windows | Microsoft Developer [https://developer.microsoft.com/fr-fr/windows/downloads/virtual-machines/ * Python | Opensource.com [https://opensource.com/tags/python * Chess.com [https://www.chess.com/lessons/opening-principles/control-the-center * The Julia Programming Language [https://julialang.org/ * lichess.org [https://lichess.org/jvk3tpXw * Take It Easy [https://mynoise.net/NoiseMachines/paulNagleSequenceGenerator.php * Virtualbox : le dossier COMPLET - malekal.com [https://www.malekal.com/virtualbox-le-dossier-complet/ * OCTO Vault [https://blog.octo.com/gardez-les-cles-de-votre-infrastructure-a-labri-avec-vault/ * Speaking7 - online chat [https://speaking7.com/#/chat * SQLBolt - Learn SQL - SQL Lesson 1: SELECT queries 101 [https://sqlbolt.com/lesson/select_queries_introduction * Les ressources d'un web entrepreneur indépendant [https://ston3o.me/ressources/ * Not All Password Managers Are Created Equal: Which is the Best? | Hacker Noon [https://hackernoon.com/not-all-password-managers-are-created-equal-which-is-the-best-891v346e * GitHub - sindresorhus/awesome: 😎 Awesome lists about all kinds of interesting topics [https://github.com/sindresorhus/awesome * GitHub - stamparm/maltrail: Malicious traffic detection system [https://github.com/stamparm/maltrail#demo-pages * Security Symposium - August 22, 2019 - BrightTALK [https://www.brighttalk.com/summit/4551-security-symposium/ * Homputer Security - Blog d'information sur la sécurité informatique [https://homputersecurity.com/ * Welcome to Ptest Method’s documentation! — Ptest Method 1 documentation [https://ptestmethod.readthedocs.io/en/latest/index.html * Firefox Send [https://send.firefox.com/ * File / Disk Size Converter - WintelGuy.com [https://wintelguy.com/filesizeconv.pl/?un1=8&un2=208 * Mises à jour automatiques sous CentOS 7 avec yum-cron – Microlinux [https://www.microlinux.fr/yum-cron-centos-7/ * Search Results for httpd in Arch Linux [https://pkgs.org/download/httpd * hide.me [https://nl.hideproxy.me/index.php * IP [http://www.myipconfig.com/ * SSL Server Test: mon.switchy.pro (Powered by Qualys SSL Labs) [https://www.ssllabs.com/ssltest/analyze.html?d=mon.switchy.pro&latest * IP Neighbour : Find sites on the same IP address [https://www.ipneighbour.com/#/lookup/37.58.160.78 * SenderBase [http://www.senderbase.org/ * SSL Checker - SSL Certificate Verify [https://www.sslshopper.com/ssl-checker.html * Achat nom de domaine Particulier Entreprise Revendeur - Namebay [https://www.namebay.com/ * KPROXY - Free Anonymous Web Proxy - Anonymous Proxy [http://server5.kproxy.com/ * Errata Security [https://blog.erratasec.com/ * Scan results for www.pierre-ricaud.com [https://securityheaders.com/?q=www.pierre-ricaud.com&followRedirects=on * BASH | Admin Linux [https://www.admin-linux.fr/category/bash/ * Cheatssheets [https://devhints.io/ * Présentation du statut | Downdetector [https://downdetector.fr/ * Global DNS Propagation Checker - What's My DNS? [https://www.whatsmydns.net/#A/handilor.fr * | Getting started | British Council [https://learnenglish.britishcouncil.org/getting-started?promo_id=fr01&promo_name=free-resources&promo_creative=cards&promo_position=homepage * DJ4E - Django for Everybody [https://www.dj4e.com/lessons * WA4E - Web Applications for Everybody [https://www.wa4e.com/lessons * Yandex [https://yandex.com/ * Ipio [https://ipinfo.io/ * Pocket Explore [https://getpocket.com/explore/ * kexp [https://kexp.org/listen/ * Packages Search - pkgs.org [https://pkgs.org/ * Sport | Sikana [https://www.sikana.tv/fr/sport * Écouter FIP en direct et gratuit [http://www.radio-en-ligne.fr/fip * Ecosia – Le moteur de recherche qui plante des arbres [https://www.ecosia.org/?ref=icon-search&addon=firefox&addonversion=4.0.4 * Téléchargement Youtube Mp4 | Youtube Mp4 [https://youtube-mp4.download/fr/free-converter * English-Video.net [https://www.english-video.net/p/fr/1 * Essai | L'exposition expliquée par Canon [http://www.canonoutsideofauto.ca/play/ * Email temporaire – Email à usage unique - Email anonyme [https://temp-mail.org/fr/ * 01 Day - French - Discourses - Vipassana Meditation - YouTube [https://www.youtube.com/watch?v=asQh1BpDhJo&list=PLAETbiXQpqZV5_n1ssOO2ivXP8VarBl7j * DC Challenges [http://www.five86.com/ * Programming / Coding / Hacking music vol.8 (CONNECTING) - YouTube [https://www.youtube.com/watch?v=x2RTQCn0N5Q&list=PLUja9J5M1XReqoBal5IKog_PWz2Q_hZ7Y&index=6 * 5 Kali Linux tricks that you may not know · Pentester Land [https://pentester.land/tips-n-tricks/2018/11/09/5-kali-linux-tricks-that-you-may-not-know.html * HL 2.0 [https://academy.hacking-lab.com/ * Shop HL [https://shop.hacking-lab.com/ * Compass Security [https://www.compass-security.com/en/ * Kali Linux [https://www.kali.org/ * Kali Training [https://kali.training/ * Kali Tools [https://tools.kali.org/ * Kali Docs [https://www.kali.org/docs/ * Kali Forums [https://forums.kali.org/ * NetHunter [https://www.kali.org/kali-linux-nethunter/ * Offensive Security [https://www.offensive-security.com/ * Recon - Rowbot's PenTest Notes [https://guide.offsecnewbie.com/recon * G [https://encrypted.google.com/ * Ecosia [https://www.ecosia.org/ * Reverso [https://www.reverso.net/translationresults.aspx?lang=FR&direction=francais-anglais * Pocket [https://app.getpocket.com/?src=navbar * Santé.fr - Centres de vaccination covid-19 [https://www.sante.fr/cf/centres-vaccination-covid.html#dep-42 * Débuter avec Firefox [https://www.mozilla.org/fr/firefox/central/ * Getting Started [https://www.mozilla.org/en-US/firefox/central/ * Pen Magazine International [https://pen-online.com/fr/ * Ansible quickstart cheatsheet [https://devhints.io/ansible-guide * MDN [https://developer.mozilla.org/fr/ * Online Markdown Editor - Dillinger, the Last Markdown Editor ever. [https://dillinger.io/ * LesFuretsCTF | La Sécurité Informatique est notre passion. [https://lesfuretsctf.wordpress.com/ * Ansible : les bases (1/6) – d3vpasha [https://d3vpasha.wordpress.com/2017/04/01/ansible/ * RDM - The Devolutions Blog [https://blog.devolutions.net/category/tipstricks * Resources - Visualising Data [https://www.visualisingdata.com/resources/ * Knowledge Base | Liquid Web [https://www.liquidweb.com/kb/ * Infosec Reactions — when windows 10 installer says its the most secure... [https://securityreactions.tumblr.com/post/168478724214/when-windows-10-installer-says-its-the-most-secure * Documentation SecuriteInfo.com [https://www.securiteinfo.com/divers/documentation_securite_informatique.shtml * https://www.the-webcam-network.com/ [https://www.the-webcam-network.com/ * Ventoy : Booter Plusieurs Images Sur Une Seule Clé USB [https://holory.fr/ventoy-booter-plusieurs-iso/ * Ethical hacking and penetration testing - InfoSec, IT, Kali Linux, BlackArch [https://miloserdov.org/ * Getting Started with Exploit Development [https://dayzerosec.com/blog/2021/02/02/getting-started.html * BREAKDEV [https://breakdev.org/ * Ultimate OSINT with Shodan: 100+ great Shodan queries – osintme.com [https://www.osintme.com/index.php/2021/01/16/ultimate-osint-with-shodan-100-great-shodan-queries/ * technique et droit du numérique = le blog tout en BD ! [https://technique-et-droit-du-numerique.fr/ * Comment s'inscrire sur Mastodon, l'alternative à Twitter ? - Numerama [https://www.numerama.com/tech/936461-comment-sinscrire-sur-mastodon-lalternative-a-twitter.html * Installation automatique – WordPress en Français [https://fr.wordpress.org/support/article/automated-installation/#aps-plesk * Vidéos humoristes et comiques français : vidéos sketchs comiques [http://youhumourpro.com/ * ChannelStream | Les directs sportif en streaming [https://channelstream.es/chaine-tv.php * Free WiFi map - search for free WiFi hotspots: list of public places with free WiFi - Wi-Fi Space [https://wifispc.com/ * GeoFS - Free Online Flight Simulator [https://www.geo-fs.com/ * Catalog of Courses | Harvard University [https://pll.harvard.edu/catalog * DigitalDefynd - Find the Best + Free Courses Online [https://digitaldefynd.com/ * Livres audio gratuits les plus aimés | Litterature audio.com [https://www.litteratureaudio.com/classement-de-nos-livres-audio-gratuits-les-plus-apprecies * Creating a pocket pentest platform with P4wnP1: Part 1 :: Gideon Wolfe [https://gideonwolfe.com/posts/security/p4wnp1/ * juice-shop-ctf-cli - npm [https://www.npmjs.com/package/juice-shop-ctf-cli * Keren Elazari | Speaker | TED [https://www.ted.com/speakers/keren_elezari * Guide retraite I La retraite en clair [https://www.la-retraite-en-clair.fr/preparer-administrativement-retraite/depart-retraite-demarches-entreprendre/guide-retraite * Top 77 Similar websites like vulnweb.com and alternatives [https://www.sitelike.org/similar/vulnweb.com/ * Malicious VBA Macro's: Trials and Tribulations :: John Woodman's Security Blog [https://john-woodman.com/research/malicious-vba-macros-trials-tribulations/ * Sync passwords with KeePass to OneDrive, Google Drive, and Dropbox – 4sysops [https://4sysops.com/archives/sync-passwords-with-keepass-to-onedrive-google-drive-and-dropbox/ * Welcome! [https://suip.biz/ * Getting Started [https://www.mozilla.org/en-US/firefox/central/ * Homepage [https://manjaro.org/ * Forum [http://forum.manjaro.org/ * Wiki [http://wiki.manjaro.org/index.php/Main_Page * Manjaro Discover Software [https://discover.manjaro.org/ * Mozilla News [http://blog.mozilla.com/ * GL.iNet Admin Panel [http://192.168.8.1/#/login * 20130808150808772272449.pdf [https://www.trxtraining.fi/files/20130808150808772272449.pdf * Kali Linux [https://www.kali.org/ * Kali Tools [https://www.kali.org/tools/ * Kali Docs [https://www.kali.org/docs/ * Kali Forums [https://forums.kali.org/ * Cyber Security news - Latest Security News | Security Magazine [https://gbhackers.com/ * Kali NetHunter [https://www.kali.org/kali-nethunter/ * Exploit-DB [https://www.exploit-db.com/ * Google Hacking DB [https://www.exploit-db.com/google-hacking-database * OffSec [https://www.offensive-security.com/ * xavki - YouTube [https://www.youtube.com/channel/UCs_AZuYXi6NA9tkdbhjItHQ * Introduction and string - #Python 01 - YouTube [https://www.youtube.com/watch?v=4PcdtrBtHrM&list=PLn6POgpklwWr7m35ZLEul4lFJQfO4PfGQ * 12 Secure File Sharing Services to Send Data Privately - Geekflare [https://geekflare.com/secure-file-sharing/ * La méthode OSIRIS [https://www.actionco.fr/Thematique/methodologie-1246/fiche-outils-10181/La-methode-OSIRIS-324155.htm
RECHERCHE_AI_IA
* OpenAI Platform [https://platform.openai.com/apps * Andi - Search for the next generation [https://andisearch.com/ * Certificat.fr | leader dans les solutions de cybersécurité | Certificat [https://www.certificat.fr/fr * sousreddits [https://www.reddit.com/subreddits/ * Presearch [https://presearch.com/ * Titi [https://beta.sayhello.so/ * searx [https://searx.thegpm.org/ * ATI [https://www.alltheinternet.com/ * Bing [https://www.bing.com/?FORM=Z9FD1 * AIO [https://all-io.net/ * Startpage [https://www.startpage.com/?sc=U1UF8TURdrdn20&t=default * Mojeek [https://www.mojeek.com/ * Open Directories [https://www.reddit.com/r/opendirectories/ * Programmable Search Engine [https://cse.google.com/cse?cx=c46414ccb6a943e39 * Hurricane Electric BGP Toolkit [https://bgp.he.net/ * Biznar: Deep Web Business Search [https://biznar.com/biznar/desktop/en/search.html * BASE (Bielefeld Academic Search Engine): Recherche avancée [https://www.base-search.net/Search/Advanced * What is OSINT? 15 top open source intelligence tools | CSO Online [https://www.csoonline.com/article/3445357/what-is-osint-top-open-source-intelligence-tools.html?page=2 * Reverse IP Lookup - ViewDNS.info [http://viewdns.info/reverseip/?host=www.easyback-auto.com&t=1 * RequestBin — Collect, inspect and debug HTTP requests and webhooks [https://requestb.in/ * Top 100 Bad Addresses | IP Address and Robot Database | Access Watch: The Web Traffic Intelligence Engine [https://access.watch/database/addresses/bad * DNSdumpster.com - dns recon and research, find and lookup dns records [https://dnsdumpster.com/ * G Suite [https://toolbox.googleapps.com/apps/main/ * Port Check Tool [https://www.yougetsignal.com/tools/open-ports/ * DNSstuff [http://www.dnsstuff.com/ * View HTTP Request and Response Header [http://web-sniffer.net/ * Access Watch: Open Source Web Traffic Processor [https://access.watch/ * What Is My IP | Whats My IP | IP Location [https://www.whatismyip.net/ * Programming Buddy Club - Premium Udemy Courses for Free [http://www.programmingbuddy.club/search?updated-max=2017-09-15T07%3A19%3A00-07%3A00&max-results=8#PageNo=3 * Phonebook.cz - Intelligence X [https://phonebook.cz/ * bastion - RefSeek [https://www.refseek.com/search?q=bastion * WorldCat.org : le plus grand catalogue de bibliothèques au monde [https://www.worldcat.org/ * Home - Springer [https://link.springer.com/ * Social Buzz – Free Social Mentions Search and Monitoring [https://www.social-searcher.com/social-buzz/?wblng=&ntw=&psttyp=&searchid=&period=&value=&fbpage=&q5=adista.fr * EXFiLTRATED [https://www.exfiltrated.com/querystart.php * YOU [https://you.com/ * Welcome! [https://w-e-b.site/ * Grayhatwarfare [https://grayhatwarfare.com/ * PHOTOCALL.TV - Televisión y radio online [https://photocall.tv/ * Toolbox | DNSstuff | DNSreport Results for togetherinbahrain.com [http://www.dnsstuff.com/tools#dnsReport
PDCAD
* Startpage Résultats de la Recherche [https://www.startpage.com/sp/search * 10 meilleurs logiciels de contrôle à distance pour PC - malekal.com [https://www.malekal.com/meilleurs-logiciels-controle-distance-pc/#RustDesck_open_source_et_gratuit * Quels sont les meilleurs logiciels de contrôle à distance ? Notre comparatif 2022 [https://www.clubic.com/telecharger/actus-logiciels/best-pick-371301-comparatif-des-meilleurs-logiciels-de-controle-a-distance-2021-.html * Les 12 meilleurs logiciels de prise en main à distance [https://digitiz.fr/blog/logiciels-prise-en-main-a-distance/ * Comment désinstaller Iperius Remote [https://www.iperiusremote.com/18463/comment-desinstaller-iperius-remote * Accès à distance | Connexion à distance | Zoho Assist [https://www.zoho.com/fr/assist/ * TeamViewer – Le logiciel de connectivité à distance [https://www.teamviewer.com/fr/ * Solution web tout-en-un d'assistance et d'accès à distance - IT remote [https://itremote.com/ * Caracteristiques | Supremo [https://www.supremocontrol.com/fr/caracteristiques/ * ConnectWise Access Management (CAM) [https://control.connectwise.com/access-management * Logiciel de bureau à distance intuitif d'AnyDesk [https://anydesk.com/fr/solutions/remote-desktop * Installation :: Documentation for RustDesk [https://rustdesk.com/docs/en/self-host/install/ * Startpage Résultats de la Recherche [https://www.startpage.com/do/dsearch?query=dameware&cat=web&pl=ext-ff&language=francais&extVersion=1.3.0 * Logiciel de contrôle à distance - Outil de bureau à distance | Dameware [https://www.dameware.com/fr/dameware-mini-remote-control
Hashicorp_VAULT
* Tutorials | Vault | HashiCorp Developer [https://developer.hashicorp.com/vault/tutorials?ajs_aid=c86cf749-bb48-41b6-967a-4ab4c759c7b4&product_intent=vault
XSS
* pfSense : obtention d’un reverse-shell root à partir d’une XSS | Connect - Editions Diamond [https://connect.ed-diamond.com/MISC/misc-094/pfsense-obtention-d-un-reverse-shell-root-a-partir-d-une-xss * XSS 101 - Brute XSS [https://brutelogic.com.br/blog/xss101/ * HackinGeeK L'art subtil d'exploiter la vulnérabilité XSS [https://hackingeek.com/xss-exploitation/ * 5 Practical Scenarios for XSS Attacks | Pentest-Tools.com Blog [https://pentest-tools.com/blog/xss-attacks-practical-scenarios/ * Excess XSS: A comprehensive tutorial on cross-site scripting [https://excess-xss.com/ * XSS - NetSec [https://nets.ec/XSS * La faille XSS - Protégez-vous efficacement contre les failles web - OpenClassrooms [https://openclassrooms.com/fr/courses/2091901-protegez-vous-efficacement-contre-les-failles-web/2680167-la-faille-xss * BugBountyHunting.com - A community-curated Resource for Bug Bounty Hunting [https://www.bugbountyhunting.com/?q=xss * SQL Injection | pentestmonkey [https://pentestmonkey.net/category/cheat-sheet/sql-injection * Cross-Site Scripting (XSS) Cheat Sheet - 2021 Edition | Web Security Academy [https://portswigger.net/web-security/cross-site-scripting/cheat-sheet * Cheatsheet: XSS that works in 2021 – Sam's Hacking Wonderland [https://netsec.expert/posts/xss-in-2021/ * Cheatsheet: XSS that works in 2021 – Sam's Hacking Wonderland [https://netsec.expert/posts/xss-in-2021/#javascript-event-based-xss * Free online XSS scanner [https://www.xss-scanner.com/ * https://www.bugbountyhunter.com/vulnerability/?type=xss [https://www.bugbountyhunter.com/vulnerability/?type=xss * Sboxr | Scanner for DOM XSS and Client-side Security [https://sboxr.com/ * From XSS to RCE: The loca1gh0st exercise [https://loca1gh0s7.github.io/MFH-from-XSS-to-RCE-loca1gh0st-exercise/ * Cross Site Scripting (XSS) Attack Tutorial with Examples, Types & Prevention [https://www.softwaretestinghelp.com/cross-site-scripting-xss-attack-test/#1_Reflected_XSS * SQL injection cheat sheet | Web Security Academy [https://portswigger.net/web-security/sql-injection/cheat-sheet * XSS game: Level 1 [https://xss-game.appspot.com/level1 * From XSS CSRF + Command Injection To Reverse Shell – Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis [https://rioasmara.com/2020/09/21/from-xss-csrf-command-injection-to-reverse-shell/ * XSS Reverse Shell · GitHub [https://gist.github.com/ivanvza/08d75112ee41dec3e92d0ff59505c678 * GitHub - s0md3v/AwesomeXSS: Awesome XSS stuff [https://github.com/s0md3v/AwesomeXSS * GitHub - payloadbox/xss-payload-list: 🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List [https://github.com/payloadbox/xss-payload-list * JSshell - A JavaScript Reverse Shell!Kalilinuxtutorials [https://kalilinuxtutorials.com/jsshell/ * xss-payload-list/Intruder/xss-payload-list.txt at master · payloadbox/xss-payload-list · GitHub [https://github.com/payloadbox/xss-payload-list/blob/master/Intruder/xss-payload-list.txt
Revshell
* PayloadsAllTheThings/Methodology and Resources/Reverse Shell Cheatsheet.md at master · swisskyrepo/PayloadsAllTheThings · GitHub [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md#powershell
Search_Surface_exposée_dork_vuln
* Cyber Defense Search Engine | ONYPHE [https://www.onyphe.io/ * site:*.github.io intext:cheatsheet+offensive+pentesting wpscan - Recherche Google [https://www.google.com/search?q=site%3A*.github.io+intext%3Acheatsheet%2Boffensive%2Bpentesting+wpscan&sca_esv=570671288&ei=2XkdZauqHL2lkdUPg4iOkAY&ved=0ahUKEwjr-pmk0NyBAxW9UqQEHQOEA2IQ4dUDCA8&uact=5&oq=site%3A*.github.io+intext%3Acheatsheet%2Boffensive%2Bpentesting+wpscan&gs_lp=Egxnd3Mtd2l6LXNlcnAiPnNpdGU6Ki5naXRodWIuaW8gaW50ZXh0OmNoZWF0c2hlZXQrb2ZmZW5zaXZlK3BlbnRlc3Rpbmcgd3BzY2FuSMoUUO8BWIcScAF4AJABAJgBPaABhgOqAQE3uAEDyAEA-AEB4gMEGAEgQYgGAQ&sclient=gws-wiz-serp * DorkSearch - Speed up your Google Dorking [https://www.dorksearch.com/ * Hosts Search - Censys [https://search.censys.io/search?resource=hosts&sort=RELEVANCE&per_page=25&virtual_hosts=EXCLUDE&q=unyc.io * AutoSploit = Shodan/Censys/Zoomeye + Metasploit - PenTestIT [http://pentestit.com/autosploit-shodan-censys-zoomeye-metasploit/ * Shodan Hacks [https://0ut3r.space/2020/07/25/shodan-dorks/ * crt.sh | Certificate Search [https://crt.sh/ * Censys [https://censys.io/
Reverse
* PE-bear | hasherezade's 1001 nights [https://hshrzd.wordpress.com/pe-bear/ * PE Bear - looking inside [https://institute.sektor7.net/view/courses/red-team-operator-malware-development-essentials/214144-portable-executable/624071-pe-bear-looking-inside * How to start RE/malware analysis? | hasherezade's 1001 nights [https://hshrzd.wordpress.com/how-to-start/ * Introduction to Reverse Engineering with Ghidra | Hackaday.io [https://hackaday.io/course/172292-introduction-to-reverse-engineering-with-ghidra
CERT
* Alertes et Vulnérabilités | Portail du CERT Santé [https://cyberveille-sante.gouv.fr/alertes-et-vulnerabilites * CERT-EU News Monitor [https://cert.europa.eu/cert/filteredition/en/CERT-LatestNews.html * Submission list :: Infosec - CERT-PA [https://infosec.cert-pa.it/analyze/submission.html * Points de contrôle Active Directory – CERT-FR [https://www.cert.ssi.gouv.fr/dur/CERTFR-2020-DUR-001/ * CERT-FR [https://cyberowl.mousqueton.io/#/CERT-FR
PENTEST
* Pentest – Tests d’intrusion et audits de sécurité | Vaadata [https://www.vaadata.com/fr/ * BurpSuite - Intercepter toutes les requêtes HTTP - Le guide [https://docs.bluekeys.org/guide/cyber-securite/outils/burpsuite-introduction * Exploit Education :: Andrew Griffiths' Exploit Education [https://exploit.education/ * Spyse — Internet Assets Search Engine [https://spyse.com/ * OSINT Framework [https://osintframework.com/ * 0x0ff.info – Sécurité Informatique et Juridique – #InfoSec #Hacking #Luvz [https://www.0x0ff.info/ * ViewDNS.info - Your one source for DNS related tools! [https://viewdns.info/ * HackTricks - HackTricks [https://book.hacktricks.xyz/ * Wikipedia:10,000 most common passwords - Wikipedia [https://en.wikipedia.org/wiki/Wikipedia:10,000_most_common_passwords * 0x00sec - The Home of the Hacker [https://0x00sec.org/ * Hack Today — The Home of Hackers! [https://www.hacktoday.io/ * hacking_tools_cheat_sheet_v1.0.pdf [https://blog.compass-security.com/wp-content/uploads/2019/10/hacking_tools_cheat_sheet_v1.0.pdf * NaviSec Delta [https://delta.navisec.io/ * GTFOBins [https://gtfobins.github.io/ * Browserling – Online cross-browser testing [https://www.browserling.com/ * Nothink! [http://www.nothink.org/ * Web | WebFu Staging [https://web-central.appspot.com/web/ * PentesterLab Bootcamp [https://pentesterlab.com/bootcamp * BHaFSec Pentesting Notes Wiki [http://www.bhafsec.com/wiki/index.php/Main_Page * GreyNoise Visualizer [https://viz.greynoise.io/ * Hacking/OSCP cheatsheet :: Ceso Adventures [https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/ * OffSecNewbie.com – My Offensive Security Journey [https://offsecnewbie.com/ * Kali - Packages · GitLab [https://gitlab.com/kalilinux/packages * PenTest [https://guide.offsecnewbie.com/ * Pentest Practice [https://www.pentestpractice.com/challenges * TryHackMe [https://tryhackme.com/ * JoeMCRAY- Pentest+ 2020 - Pastebin.com [https://pastebin.com/b1hepFjq * Offensive Security Cheatsheet [https://cheatsheet.haax.fr/ * IppSec - Search [https://ippsec.rocks/ * What rooms should you do? A free guide for beginners [https://blog.tryhackme.com/free_path/ * Hackplayers · GitHub [https://github.com/Hackplayers * Tags | 0xdf hacks stuff [https://0xdf.gitlab.io/tags.html * Hack The Box :: Penetration Testing Labs [https://www.hackthebox.eu/ * WarGames – Pentesting Fun Stuff [https://n0w4n.nl/category/wargames/ * What is CTF and how to get Started - Complete Guide for Beginners to Advanced - Haxf4rall [https://haxf4rall.com/2019/06/29/ctf-guide/ * OSINT Framework [https://osintframework.com/ * GitHub - uppusaikiran/awesome-ctf-cheatsheet: CTF Cheatsheet [https://github.com/uppusaikiran/awesome-ctf-cheatsheet * Canarytokens [https://canarytokens.org/generate * OWASP ZAP – ADDO Authentication Workshop [https://www.zaproxy.org/addo-auth-workshop/ * OWASP ZAP – ZAP in Ten [https://www.zaproxy.org/zap-in-ten/ * Online - Reverse Shell Generator [https://www.revshells.com/ * NaviSec Delta [https://delta.navisec.io/ * Comprehensive Guide to John the Ripper. Part 1: Introducing and Installing John the Ripper - Ethical hacking and penetration testing [https://miloserdov.org/?p=4961 * Code-Breaking, Cipher and Logic Puzzle solving tools | Boxentriq [https://www.boxentriq.com/code-breaking * Analyse your HTTP response headers [https://securityheaders.com/ * Browserling – Online cross-browser testing [https://www.browserling.com/ * Using Mutillidae II - YouTube [https://www.youtube.com/playlist?list=PLZOToVAK85MrsyNmNp0yyUTBXqKRTh623 * Credential & Data Theft Attack Catalog [https://www.netwrix.com/attack.html * Mimikatz – Active Directory Security [https://adsecurity.org/?page_id=1821 * OWASP Top 10 training - YouTube [https://www.youtube.com/playlist?list=PLvmvp9IEWvXy3IKim5ri667Y8oTjC3e2E * Offensive Security Cheatsheet [https://cheatsheet.haax.fr/open-source-intelligence-osint/ * Offensive Security Cheatsheet [https://cheatsheet.haax.fr/ * DuckToolKit [https://ducktoolkit.com/userscripts# * Ethical Hacking (Part 13): Office Macro Attacks | by Michael Whittle | Level Up Coding [https://levelup.gitconnected.com/ethical-hacking-part-13-office-macro-attacks-3a8a0cad14b7 * Powershell reverse shell with Social-Engineering-Toolkit | by David Artykov | Purple Team | Medium [https://medium.com/purple-team/powershell-reverse-shell-with-social-engineering-toolkit-90506e891269 * VBA-Macro-Projects/Reverse-Shell.vba at main · JohnWoodman/VBA-Macro-Projects · GitHub [https://github.com/JohnWoodman/VBA-Macro-Projects/blob/main/Reverse-Shell.vba * PowerLessShell + MaliciousMacroMSBuild = Shells [https://www.doyler.net/security-not-included/powerlessshell-maliciousmacromsbuild * Ethical Hacking (Part 7): Metasploit Penetration Testing Framework | by Michael Whittle | Level Up Coding [https://levelup.gitconnected.com/ethical-hacking-part-7-metasploit-penetration-testing-framework-b768dac407a * adhdproject.github.io/Powercat.md at master · adhdproject/adhdproject.github.io · GitHub [https://github.com/adhdproject/adhdproject.github.io/blob/master/Windows/Powercat.md * cmd.exe, Windows: Run a Windows (“DOS”) batch cmd script minimized · GitHub [https://gist.github.com/jbutko/7857977 * Free and Instant API Penetration Testing | No-Code [https://www.ethicalcheck.dev/index.html * A strategy to land your first pentest job | by PentesterLab | PentesterLab [https://blog.pentesterlab.com/a-strategy-to-land-your-first-pentest-job-25209a351689 * Cure53 – Fine penetration tests for fine websites [https://cure53.de/ * Windows elevation of privileges [https://guif.re/windowseop * Privilege Escalation - Operator Up [https://obscuritylabs.github.io/operator-up/windows/priv_esc/ * The Ultimate List of SANS Cheat Sheets | SANS Institute [https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/?utm_medium=Social&utm_source=Twitter&utm_content=NA%20Central%20Cheat%20Sheets%20Blog%2005%202020&utm_campaign=SANS%20Blog * Exploiting PrivExchange - c:\rusher blog [https://chryzsh.github.io/exploiting-privexchange/ * Offensive Security Cheatsheet [https://cheatsheet.haax.fr/web-pentest/tools/burpsuite/ * Index - Nuclei - Community Powered Vulnerability Scanner [https://nuclei.projectdiscovery.io/nuclei/get-started/ * Outils de test d’intrusion - System & Network security [https://www.benatich.fr/?p=148 * WebApp PenTest Archives • Penetration Testing [https://securityonline.info/category/penetration-testing/webapp-pentest/ * AutoPWN Suite | AutoPWN Suite Wiki [https://auto.pwnspot.com/ * Top 20 Google Hacking Techniques - Best Google Dorks and Hacks [https://securitytrails.com/blog/google-hacking-techniques * ZAPCon [https://zapcon.io/ * Infinite Logins [https://infinitelogins.com/ * HOME | Trimarc Security [https://www.trimarcsecurity.com/ * About – Active Directory Security [https://adsecurity.org/?page_id=8 * Presentations | Trimarc Content Hub [https://www.hub.trimarcsecurity.com/presentations * Pentest : Comment réaliser des tests d’intrusion sur une application mobile Android ? | by Linkvalue | Sep, 2022 | Blog Linkvalue — société de conseil IT [https://blog.link-value.fr/tests-dintrusion-sur-une-application-mobile-android-d99d4401d9d4 * Projects | OWASP Foundation [https://owasp.org/projects/#tab=Features * Security Knowledge Framework [https://secureby.design/labs/view * Ethical hacking and penetration testing - Page 6 - InfoSec, IT, Kali Linux, BlackArch [https://miloserdov.org/?paged=6 * Site Tree - Ethical hacking and penetration testing [https://miloserdov.org/?page_id=2 * QR code generator for text [https://suip.biz/?act=qr-text * Montre connectée hybride avec électrocardiogramme, fréquence cardiaque et oxymètre - ScanWatch | Withings [https://www.withings.com/fr/fr/scanwatch * 💬1 - Top 5 Penetration Testing Methodology and Standards | Astra Security [https://www.getastra.com/blog/security-audit/penetration-testing-methodology/ * Online Nmap scanner - nmap.online [https://nmap.online/ * Features [https://www.hacksplaining.com/features * Compliance standards templates and samples - Dradis Academy [https://dradisframework.com/academy/industry/compliance/ * FAQ - The Penetration Testing Execution Standard [http://www.pentest-standard.org/index.php/FAQ * Pentesting Cheatsheets - Red Teaming Experiments [https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets * Write-up Factory [https://writeup.raw.pm/ * uploadserver · PyPI [https://pypi.org/project/uploadserver/ * Offensive Security Cheatsheet [https://cheatsheet.haax.fr/windows-systems/exploitation/remote_execution_techniques/ * Pentest Tips and Tricks – EK [https://jivoi.github.io/2015/07/01/pentest-tips-and-tricks/ * adista.fr | FullHunt [https://fullhunt.io/search?query=adista.fr * grep.app | code search [https://grep.app/ * Netlas: adista.fr [https://app.netlas.io/responses/?q=adista.fr&page=1&indices= * 30 Search Engines for Cybersecurity Researchers (Part 2 of 3) | by Secpy Community | Sep, 2022 | InfoSec Write-ups [https://infosecwriteups.com/30-search-engines-for-cybersecurity-researchers-part-2-of-3-3412d6a35118 * DorkSearch - Speed up your Dorking [https://dorksearch.com/ * 30 Search Engines for Cybersecurity Researchers (Part 1 of 3) | by Secpy Community | Sep, 2022 | InfoSec Write-ups [https://infosecwriteups.com/30-search-engines-for-cybersecurity-researchers-part-1-of-3-faf68bfc6be8 * 💀 Sploitus | Exploit & Hacktool Search Engine [https://sploitus.com/ * Scrapoxy [http://scrapoxy.io/ * Kali Tools | Kali Linux Tools [https://www.kali.org/tools/ * Sign Up for Proving Grounds | Offensive Security [https://portal.offensive-security.com/sign-up/pg * 0xBEN - Notes & Cheat Sheets [https://notes.benheater.com/ * Pure PowerShell Infosec Cheatsheet - InfosecMatter [https://www.infosecmatter.com/pure-powershell-infosec-cheatsheet/ * Bug Bounty Tips #1 - InfosecMatter [https://www.infosecmatter.com/bug-bounty-tips-1/ * Virtual x86 [http://copy.sh/v86/ * Send a report | Zerodisclo [https://zerodisclo.com/p/Send-a-report * All of the Best Links and Resources on Cyber Security. - s0cm0nkey's Security Reference Guide [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/ * A few subjects [https://asecuritysite.com/subjects * Red - Web App Hacking - s0cm0nkey's Security Reference Guide [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/web-app-hacking * Jok3r v3 - Network & Web Pentest Automation Framework [https://www.jok3r-framework.com/ * Public info gathering - Pentest Book [https://pentestbook.six2dez.com/recon/public-info-gathering * /home/six2dez/.pentest-book - Pentest Book [https://pentestbook.six2dez.com/ * 19 Hacking Cheat Sheets - Cheatography.com: Cheat Sheets For Every Occasion [https://cheatography.com/tag/hacking/ * Wiki / Cheat-Sheet de pentesting | “Hacking Wiki” [https://ruuand.github.io/ * PwnWiki.io [http://pwnwiki.io/#!scripting/powershell.md * Docker && Kubernetes - Pentest Book [https://pentestbook.six2dez.com/enumeration/cloud/docker-and-and-kubernetes * Rana Khalil - YouTube [https://www.youtube.com/@RanaKhalil101 * Intigriti - Bug Bounty & Agile Pentesting Platform [https://app.intigriti.com/researcher/dashboard * Silent Signal Techblog [https://blog.silentsignal.eu/ * CS253 - Web Security [https://web.stanford.edu/class/cs253/ * NoobLinux - Linux Tutorials Aimed at Beginners [https://nooblinux.com/ * sqlmap Cheat Sheet: Commands for SQL Injection Attacks + PDF & JPG [https://www.comparitech.com/net-admin/sqlmap-cheat-sheet/ * Advanced Google Dorking Commands | Cybrary [https://www.cybrary.it/blog/0p3n/advanced-google-dorking-commands/ * Offensive Security Cheatsheet [https://cheatsheet.haax.fr/web-pentest/tools/ffuf/ * Injecter du code malveillant dans un script (Netcat reverse shell) - Le Guide Du SecOps [https://le-guide-du-secops.fr/2021/10/25/injecter-un-code-malveillant-dans-un-script-shell-pour-prendre-le-controle-dun-serveur-linux-netcat-reverse-shell/ * Blog | hackers-arise [https://www.hackers-arise.com/ * Penetration Testing Bootcamp |fr] Penetration Testing Bootcamp - Introduction | Class Central Classroom [https://www.classcentral.com/classroom/youtube-penetration-testing-bootcamp-53185 * Penetration Testing Bootcamp - YouTube [https://www.youtube.com/playlist?list=PLBf0hzazHTGOepimcP15eS6Y-aR4m6ql3 * Red Team Guide - Red Team Notes 2.0 [https://dmcxblue.gitbook.io/red-team-notes-2-0/files/red-team-guide * Offensive Security Cheatsheet [https://cheatsheet.haax.fr/web-pentest/ * Checklist - Local Windows Privilege Escalation - HackTricks [https://book.hacktricks.xyz/windows-hardening/checklist-windows-privilege-escalation * GitHub - PYMaster-ft/BurpSuite-Cheatsheet [https://github.com/PYMaster-ft/BurpSuite-Cheatsheet * Scan Web Applications for Common Vulnerabilities Using Metasploit’s WMAP – Spyboy blog [https://spyboy.blog/2020/11/15/scan-web-applications-for-common-vulnerabilities-using-metasploits-wmap/ * Scan Web Applications for Common Vulnerabilities Using Metasploit’s WMAP – Spyboy blog [about:reader?url=https%3A%2F%2Fspyboy.blog%2F2020%2F11%2F15%2Fscan-web-applications-for-common-vulnerabilities-using-metasploits-wmap%2F * WMAP Web Scanner - Metasploit Unleashed [https://www.offsec.com/metasploit-unleashed/wmap-web-scanner/ * Home - SecWiki [https://wiki.zacheller.dev/ * Full TTYs - HackTricks [https://book.hacktricks.xyz/generic-methodologies-and-resources/shells/full-ttys * Assets Discovery | 0xffsec Handbook [https://0xffsec.com/handbook/information-gathering/assets-discovery/ * Linux Privilege Escalation – Resources – Siren Security [https://sirensecurity.io/blog/linux-privilege-escalation-resources/ * Intro - my_offsec_notes [https://p1yushsecurity.gitbook.io/offsec/ * Welcome to Ptest Method’s documentation! — Ptest Method 1 documentation [https://ptestmethod.readthedocs.io/en/latest/ * LeakIX [https://leakix.net/ * Exploit Notes [https://exploit-notes.hdks.org/ * Mind Maps [https://www.amanhardikar.com/mindmaps.html * Products – HotWAN [https://hotwan.com/products/ * Pentest | Notes [https://natsec.github.io/notes/pentest.html#ressources * Notes | Here be my notes 😉 [https://natsec.github.io/notes/ * Introduction - The Hacker Recipes [https://www.thehacker.recipes/ * Active directory pentesting: cheatsheet and beginner guide [https://www.hackthebox.com/blog/active-directory-penetration-testing-cheatsheet-and-guide * evilsocket [https://www.evilsocket.net/ * Top Five Ways I Got Domain Admin on Your Internal Network before Lunch (2018 Edition) | by Adam Toscher | Medium [https://adam-toscher.medium.com/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa * Red Teaming – Resources – Siren Security [https://sirensecurity.io/blog/red-teaming-resources/ * Azure Penetration Testing Articles | hausec [https://hausec.com/azure/ * LOLBAS [https://lolbas-project.github.io/# * Lessons from Penetration Testing: 7 Real-World Findings [https://www.mitnicksecurity.com/blog/lessons-from-penetration-testing * purify video – watch purified youtube videos with no ads [https://purify-video.github.io/?v=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DUZ-5S-mFDCY * Comment auditer l’Active Directory ? Avec Ping Castle [https://rm3a.fr/comment-auditer-lactive-directory/ * Extraire des hachages de mots de passe du fichier ntds.dit [https://blog.netwrix.fr/2023/01/11/extraire-des-hachages-de-mots-de-passe-du-fichier-ntds-dit/ * How to Backup Active Directory Domain Controller? | Windows OS Hub [https://woshub.com/backup-active-directory-domain-controller/ * Tutoriel pour la bonté NTDS (VSSADMIN, WMIS, NTDS.dit, SYSTEME) [https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/tutorial-for-ntds-goodness-vssadmin-wmis-ntds.dit-system/ * Extracting Hashes and Domain Info From ntds.dit - ropnop blog [https://blog.ropnop.com/extracting-hashes-and-domain-info-from-ntds-dit/ * ropnop blog - ropnop blog [https://blog.ropnop.com/
Tuto
* Premiers pas avec Vagrant [https://computerz.solutions/first-step-vagrant/ * Vagrant – Welcome to /dev/null [http://www.morot.fr/vagrant/ * Apprendre à utiliser Git et GitHub | Cours Complet (2020) - Pierre Giraud [https://www.pierre-giraud.com/git-github-apprendre-cours/ * ansible [https://blog.stephane-robert.info/tags/ansible/ * Kali Linux: Tutorial, What is, How to install - javatpoint [https://www.javatpoint.com/kali-linux * GitHub - M507/AWAE-Preparation: This repository will contain all trainings and tutorials I have done/read to prepare for OSWE / AWAE. [https://github.com/M507/AWAE-Preparation * Tutoriel : Renvoyer un mot de passe par e-mail : la méthode Vernam [http://sdz.tdct.org/sdz/renvoyer-un-mot-de-passe-par-e-mail-la-methode-vernam.html * Make Tech Easier - Computer Tutorials, Tips and Tricks [https://www.maketecheasier.com/ * HTTP Parameters [https://www.tutorialspoint.com/http/http_parameters.htm * How to Learn Penetration Testing: A Beginners Tutorial - This tutorial will cover all the basics of getting into pentesting, starting from 0. [https://www.codemopolitan.com/learn-penetration-testing/ * RIP Tutorial (Stack Overflow Documentation) [https://riptutorial.com/ * KUBERNETES - FORMATIONS POUR DEBUTER | TUTOS FR #0 - YouTube [https://www.youtube.com/watch?v=37VLg7mlHu8&list=PLn6POgpklwWqfzaosSgX2XEKpse5VY2v5 * Unix Tutorial [https://www.unixtutorial.org/ * Ansible – tutoriaux français | Xavki [https://xavki.blog/ansible-tutoriaux-francais/ * Hacking with Netcat part 2: Bind and reverse shells - Hacking Tutorials [https://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/ * Cyber-Sec-Resources/How-To Tutorials at master · scspcommunity/Cyber-Sec-Resources · GitHub [https://github.com/scspcommunity/Cyber-Sec-Resources/tree/master/How-To%20Tutorials * Meet Guru99 - Free Training Tutorials & Video for IT Courses [https://www.guru99.com/ * RIP Tutorial [https://riptutorial.com/fr/home * How to install Malware Detect ( maldetect or LMD ) in Debian 8 - Syslint.com [https://syslint.com/blog/tutorial/how-to-install-malware-detect-maldetect-or-lmd-in-debian-8/ * Learn HTML5, CSS3, Javascript - video style tutorials [http://thecodeplayer.com/ * Free Ethical Hacking Tutorials: Course for Beginners [https://www.guru99.com/ethical-hacking-tutorials.html * Meet Guru99 - Free Training Tutorials & Video for IT Courses [https://www.guru99.com/ * FuzzySecurity | Tutorials [http://www.fuzzysecurity.com/tutorials.html * Ansible installation with pipenv — Ansible tutorial 0.1.0 documentation [https://gdevops.gitlab.io/tuto_ansible/installation/installation.html# * leucos/ansible-tuto: Ansible tutorial [https://github.com/leucos/ansible-tuto * RIP Tutorial (Stack Overflow Documentation) [https://riptutorial.com/ * Liste d'articles, tutoriels et projets Devops, Cloud [https://devopssec.fr/tags/ansible?page=2 * MySQL DROP DATABASE - How to Delete a Database in MySQL Server [http://www.mysqltutorial.org/mysql-drop-database/ * Network Admin Tools - Software Reviews, Tutorials, Guides for IT Pro's [https://www.netadmintools.com/ * instinct-de-survie [https://instinct-de-survie.forumgratuit.org/f57-tutoriels-videos * Tutoriel bivouac par la légion étrangère en guyane [https://instinct-de-survie.forumgratuit.org/t12599-tutoriel-bivouac-par-la-legion-etrangere-en-guyane * Ansible Tutorial [https://www.codereviewvideos.com/course/ansible-tutorial * The Python Tutorial — Python 3.7.1 documentation [https://docs.python.org/fr/3/tutorial/appetite.html * An Introduction to Networking Terminology, Interfaces, and Protocols | DigitalOcean [https://www.digitalocean.com/community/tutorials/an-introduction-to-networking-terminology-interfaces-and-protocols * Meet Guru99 - Free Training Tutorials & Video for IT Courses [https://www.guru99.com/ * SQL Injection Tutorial: Learn with Example [https://www.guru99.com/learn-sql-injection-with-practical-example.html * Free Ethical Hacking Tutorials: Course for Beginners [https://www.guru99.com/ethical-hacking-tutorials.html * SSTec Tutorials - YouTube [https://www.youtube.com/channel/UCHvUTfxL_9bNQgqzekPWHtg/videos * Calculs et variables avec pyton - Python Programmation Cours Tutoriel Informatique Apprendre [http://apprendre-python.com/page-apprendre-variables-debutant-python * Functions - Learn Python - Free Interactive Python Tutorial [https://www.learnpython.org/en/Functions * Kali linux pentesting tutorials [https://www.facebook.com/kali.linux.pentesting.tutorials * All Security Tutorials | Hackertron [https://hackertron.com/all-security-tutorials/ * GitHub - leucos/ansible-tuto: Ansible tutorial [https://github.com/leucos/ansible-tuto * Ansible tutorials — Ansible tutorial 0.1.0 documentation [https://gdevops.gitlab.io/tuto_ansible/tutorials/tutorials.html * Ansible tutorial for absolute beginners & experienced | GoLinuxCloud [https://www.golinuxcloud.com/ansible-tutorial/ * Streaming Tutorials | Cyber Aces | Free online cybersecurity courses [https://tutorials.cyberaces.org/tutorials.html * cyberchef tuto at DuckDuckGo [https://duckduckgo.com/?t=ffab&q=cyberchef+tuto&ia=web * Haproxy – tutoriaux français | Xavki top top top [https://xavki.blog/haproxy-tutoriaux-francais/ * Tutorials | DigitalOcean [https://www.digitalocean.com/community/tutorials * GitHub - cirosantilli/linux-cheat: Linux tutorials and cheatsheets. Minimal examples. Mostly user-land CLI utilities. Linux kernel at: https://github.com/cirosantilli/linux-kernel-module-cheat [https://github.com/cirosantilli/linux-cheat * Tutorials Archives | Liquid Web [https://www.liquidweb.com/kb/category/tutorials/ * Tutorials - Intellipaat Blog [https://intellipaat.com/blog/tutorials/ * Learn Python - Free Interactive Python Tutorial [https://www.learnpython.org/ * OSForensics video demonstrations [https://www.osforensics.com/faqs-and-tutorials/video_demonstrations.html * OSForensics video demonstrations [https://www.osforensics.com/faqs-and-tutorials/video_demonstrations.html * BugBounty Writeups, Tutorials and Disclosed Issues | BugBountyNotes.com [https://www.bugbountynotes.com/writeups * Penetration Testing Archives - Page 2 of 3 - k4linux - Linux Tutorials [https://k4linux.com/category/hacking/penetration-testing/page/2 * Présentation des rôles Ansible [https://hackademy.io/tutoriel-videos/roles-ansible * Kali Linux Tutorials - YouTube [https://www.youtube.com/user/kalinuxx * CVE-2021-34527 : PrintNightmare Vulnerability, Exploit and Remediation | ThreatIT - Cyber Security News, Articles & Tutorials [https://threatit.com/articles/cve-2021-34527-printnightmare-vulnerability-exploit-and-remediation/ * CTF Cheat sheet | Les tutos de Processus [https://lestutosdeprocessus.fr/ctf-cheat-sheet/ * Video tutorials - PortSwigger [https://portswigger.net/burp/documentation/desktop/tutorials?utm_source=burp_suite_community&utm_medium=learn_tab&utm_campaign=tutorials * Créer un serveur d'e-mails sous Windows Server - Windows Server - Tutoriels - InformatiWeb Pro [https://www.informatiweb-pro.net/admin-systeme/win-server/windows-server-creer-un-serveur-d-e-mails.html * Tutoriels – Kali-linux.fr [https://www.kali-linux.fr/tutoriels * A step-by-step on the computer buffer overflow vulnerability tutorials on Intel x86 processor and C standard function call [https://www.tenouk.com/Bufferoverflowc/Bufferoverflow4.html * Devops Tutorials - Xavki [https://xavki.blog/devops-tutos/ * Sécurité : Actualités, cours, tutoriels, FAQ, forum... [https://securite.developpez.com/ * Video Tutorials - Burp Suite Professional - PortSwigger [https://portswigger.net/burp/pro/video-tutorials * Kali Linux Burp Suite Tutorial - Linux Tutorials - Learn Linux Configuration [https://linuxconfig.org/kali-linux-burp-suite-tutorial * Free Tutorials Books - PDF Drive [https://www.pdfdrive.com/category/65 * APPRENDRE PYTHON TUTO PROGRAMMATION COMPLET DÉBUTAN... - YouTube [https://www.youtube.com/watch?v=oUJolR5bX6g * Archives des Trucs et astuces - Easytutoriel [https://www.easytutoriel.com/category/trucs-astuces * Buffer Overflow to Run Root Shell - Full Tutorial | Defend the Web [https://defendtheweb.net/article/buffer-overflow-to-run-root-shell-full-tutorial * Python Tutorial for Beginners: Learn Programming Basics PDF [https://www.guru99.com/python-tutorials.html * https://defendtheweb.net/article/buffer-overflow-to-run-root-shell-full-tutorial [https://defendtheweb.net/article/buffer-overflow-to-run-root-shell-full-tutorial * https://riptutorial.com/python/awesome-learning/tutorial [https://riptutorial.com/python/awesome-learning/tutorial * https://riptutorial.com/ebook/python [https://riptutorial.com/ebook/python * IT-Connect | Tutoriels - Cours informatique - Tests - Vidéos [https://www.it-connect.fr/ * 20 Best Python Certificate Courses 2022 AUGUST UPDATED [https://digitaldefynd.com/best-python-tutorial-class-certification-course-training-online/ * Apprendre à programmer avec Python 3 • Tutoriels • Zeste de Savoir [https://zestedesavoir.com/tutoriels/799/apprendre-a-programmer-avec-python-3/ * Top 10 meilleurs VPN gratuits pour PC 2021 [https://www.tutomiel.com/meilleurs-vpn-gratuits-8380.htm * How to install VMware Workstation on Ubuntu 22.04 Jammy Jellyfish Linux - Linux Tutorials - Learn Linux Configuration [https://linuxconfig.org/vmware-server-2-0-2-ubuntu-10-04-installation * TUTORIEL BUBBLE - Comment bien démarrer ? - YouTube [https://www.youtube.com/watch?v=n61Dxwm_ekQ * GitHub - mytechnotalent/Reverse-Engineering: A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures. [https://github.com/mytechnotalent/Reverse-Engineering * How To Write Your First Python 3 Program | DigitalOcean [https://www.digitalocean.com/community/tutorials/how-to-write-your-first-python-3-program * CraxTube - Tutorials & Guides | Crack, Spam, Card & Hack [https://crax.tube/ * CraxTube - Tutorials & Guides | Crack, Spam, Card & Hack [https://crax.tube/ * CraxTube - Tutorials & Guides | Crack, Spam, Card & Hack [https://crax.tube/ * Red Team Server - Penetration Testing Tools, ML and Linux Tutorials [https://reconshell.com/red-team-server/ * Windows Red Team Cheat Sheet - Penetration Testing Tools, ML and Linux Tutorials [https://reconshell.com/windows-red-team-cheat-sheet/ * Bug Bounty Tools - Penetration Testing Tools, ML and Linux Tutorials [https://reconshell.com/bug-bounty-tools/ * FREE Reverse Engineering Tutorial - Penetration Testing Tools, ML and Linux Tutorials [https://reconshell.com/free-reverse-engineering-tutorial/ * List of Free Python Resources - Penetration Testing Tools, ML and Linux Tutorials [https://reconshell.com/list-of-free-python-resources/ * Awesome CyberSec Resources - Penetration Testing Tools, ML and Linux Tutorials [https://reconshell.com/awesome-cybersec-resources/ * Tutoriels sur les pneus vélo : montage, réparation et compatibilités [https://www.cycletyres.fr/blog/tutoriels-pneu-velo * Tuto Wheeling /manual : comment réussir facilement à cabrer son vélo - YouTube [https://www.youtube.com/watch?v=AE3Dpf75T50 * Reconshell - Penetration Testing Tools, ML and Linux Tutorials [https://reconshell.com/ * Didacticiel de création de scripts Windows Powershell [https://blog.netwrix.fr/2018/09/26/tutoriel-de-windows-powershell-scripting-pour-debutants/ * Grafana Dashboard Tutorial - SEC557 Public Wiki [https://sec557.com/grafana/ * Python Introduction [https://codingpointer.com/python-tutorial/python-intro * Index of /Video/ [http://s28.bitdl.ir/Video/ * Index of /Video/Linkedin.Learning.Python.for.Non-Programmers-XQZT/ [http://s28.bitdl.ir/Video/Linkedin.Learning.Python.for.Non-Programmers-XQZT/ * Index of /Video/Linkedin.Learning.Penetration.Testing.with.Metasploit-XQZT/ [http://s28.bitdl.ir/Video/Linkedin.Learning.Penetration.Testing.with.Metasploit-XQZT/ * Proxy d'attaque OWASP Zed - Un Aperçu - YouTube [https://www.youtube.com/watch?v=bf2YuqgaeWo&list=PLH8n_ayg-60J9i3nsLybper-DR3zJw6Z5
CyberLab
* Cylab Play - Vulnerable Apps | cylab.be [https://cylab.be/resources/cylab-play?accept-cookies=1
VMware
* Install VMware Workstation Player on Ubuntu 22.04 LTS - Linux Shout [https://linux.how2shout.com/install-vmware-workstation-player-on-ubuntu-22-04-lts/ * XCP-ng documentation | XCP-ng Documentation [https://docs.xcp-ng.org/
lab
* Create Active Directory Test Environment (Complete Guide) - Active Directory Pro [https://activedirectorypro.com/create-active-directory-test-environment/ * WebSploit Labs - by Omar Santos [https://websploit.org/ * Attacking Active Directory: 0 to 0.9 | zer1t0 [https://zer1t0.gitlab.io/posts/attacking_ad/?s=09 * Penetration Testing Bootcamp |fr] Penetration Testing Bootcamp - Setting Up A Pentesting Lab | Class Central Classroom [https://www.classcentral.com/classroom/youtube-penetration-testing-bootcamp-53185/6108cc9fd9b54 * GitHub - WazeHell/vulnerable-AD: Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab [https://github.com/WazeHell/vulnerable-AD * Creating a Windows AD Lab Environment at Home – // Chox Security Blog [https://chox.ca/2022/02/17/creating-a-windows-ad-lab-environment-at-home/ * GitHub - KevOtt/AD-Lab-Generator: Tool for populating an Active Directory Lab with a randomized set of users and groups. [https://github.com/KevOtt/AD-Lab-Generator * Docker: Creating a Pivoting Lab and Exploiting it | by Kiranghimire | InfoSec Write-ups [https://infosecwriteups.com/docker-creating-a-pivoting-lab-and-exploiting-it-a66646dc2cf3 * GitHub - Cimihan123/VulnLab [https://github.com/Cimihan123/VulnLab * Creating a Windows AD Lab Environment at Home – // Chox Security Blog [https://chox.ca/2022/02/17/creating-a-windows-ad-lab-environment-at-home/ * MegaCorp One - Nanotechnology Is the Future [https://www.megacorpone.com/ * Labtainers - Center for Cybersecurity and Cyber Operations - Naval Postgraduate School [https://nps.edu/web/c3o/labtainers * build a HACKING lab with DOCKER containers (become a hacker) |fr] Jon Good [https://jongood.com/build-a-hacking-lab-with-docker-containers-become-a-hacker/ * Trying DetectionLab [https://taosecurity.blogspot.com/2019/01/trying-detectionlab.html * Building a Cybersecurity Homelab for Detection & Monitoring - Cyberwox Academy [https://cyberwoxacademy.com/building-a-cybersecurity-homelab-for-detection-monitoring/ * Building A Test Lab For Pentesting Guide | White Oak Security [https://www.whiteoaksecurity.com/blog/building-a-test-lab-for-pentesting/ * Ethical Hacking Bootcamp by Omar Santos - Pen Testing [https://bootcamp.h4cker.org/ * Home | BustaKube [https://www.bustakube.com/ * Supercar Showdown - Supercar Showdown [https://hack-yourself-first.com/ * XSS Challenges (by yamagata21) - Stage #1 [https://xss-quiz.int21h.jp/ * Solutions to the wargame XSS Challenges at xss-quiz.int21h.jp | Daniel 'MaTachi' Jonsson [https://matachi.github.io/blog/2013/11/28/solutions-to-the-wargame-xss-challenges-at-xss-quiz-int21h-jp/ * Technical - Omar Santos - Building Web Application Labs with WebSploit - YouTube [https://www.youtube.com/watch?v=417J_65sNck * Omar@VetSecCon [https://h4cker.org/vetseccon/ * Station 3 - DEF CON Red Team Village [https://redteamvillage.io/station3.html * h4cker/vulnerable_servers at master · The-Art-of-Hacking/h4cker · GitHub [https://github.com/The-Art-of-Hacking/h4cker/tree/master/vulnerable_servers * Acunetix Web Vulnerability Scanner - Test websites [http://www.vulnweb.com/ * GOAD Lab Setup :: Greg Scharf — Development & Security [https://blog.gregscharf.com/2023/04/14/goad-setup/ * Mayfly [https://mayfly277.github.io/ * GOAD - part 1 - reconnaissance and scan | Mayfly [https://mayfly277.github.io/posts/GOADv2-pwning_part1/ * WPScan Usage Example Enumeration + Exploit | CYBERPUNK [https://www.cyberpunk.rs/wpscan-usage-example * How to Create a Virtual Hacking Lab: The Ultimate Hacker Setup [https://www.stationx.net/how-to-create-a-virtual-hacking-lab/ * Create Active Directory Test Environment (Complete Guide) - Active Directory Pro [https://activedirectorypro.com/create-active-directory-test-environment/#requirments * Untitled :: Pwning OWASP Juice Shop [https://pwning.owasp-juice.shop/companion-guide/latest/ * Sign in - Immersive Labs [https://immersivelabs.online/signin * BadBlood : remplir un Active Directory vulnérable rapidement [https://www.it-connect.fr/populer-un-active-directory-vulnerable-rapidement-avec-badblood/
Graph
* Cytoscape: An Open Source Platform for Complex Network Analysis and Visualization [https://cytoscape.org/index.html
DevOps
* Apprendre et Maitriser Terraform l'outil d'Infrastructure As Code [https://blog.stephane-robert.info/post/introduction-terraform/ * Blog gratuit pour apprendre le DevOps et le Cloud [https://devopssec.fr/ * priximmo/sommaire-xavki-devops-fr [https://github.com/priximmo/sommaire-xavki-devops-fr * GitHub - trimstray/the-book-of-secret-knowledge: A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrators, DevOps, Pentesters or Security Researchers. [https://github.com/trimstray/the-book-of-secret-knowledge * d3vpasha – DevOps [https://d3vpasha.wordpress.com/ * Tous les cours et examens [https://www.redhat.com/fr/services/training/all-courses-exams?f%5B0%5D=taxonomy_training%3ACours&f%5B1%5D=taxonomy_courses_by_curriculum%3ADevOps * DEVOPS - La Grotte du Barbu [https://www.grottedubarbu.fr/tag/devops/ * First 5 Minutes on Setup Linux Server Security – Mitesh Shah [https://miteshshah.github.io/devops/lemp/first-5-minutes-on-setup-linux-server-security/ * ZAP in Ten [https://www.alldaydevops.com/zap-in-ten * All Day DevOps | The World's Largest DevOps Conference [https://www.alldaydevops.com/ * devops_4_hackers/Lab1/completed at master · jivoi/devops_4_hackers · GitHub [https://github.com/jivoi/devops_4_hackers/tree/master/Lab1/completed * DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop) [https://workshop.hackerops.dev/ * DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop) [https://workshop.hackerops.dev/ * DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop) - YouTube [https://www.youtube.com/watch?v=hK8N1QUpeM8 * Parcours de formation Devops - Xavki [https://xavki.blog/ * Déployer simplement une VM sur Azure avec Terraform | Arcanexus [https://www.arcanexus.com/blog/terraform-azure-vm * Liste des cours complets Devops, Cloud [https://devopssec.fr/categories * Votre première VM dans Azure… déployée avec Ansible bien sûr ! [https://blog.zwindler.fr/2018/08/07/premiere-vm-dans-azure-avec-ansible-bien-sur/ * GitHub - stephrobert/awesome-french-devops: Une liste de liens permettant de se former aux outils utilisés dans le domaine du Devops [https://github.com/stephrobert/awesome-french-devops/ * Cours complet gratuit pour comprendre le DevOps [https://devopssec.fr/category/comprendre-le-devops * Terraform - Xavki [https://xavki.blog/terraform-formation-francais/ * Xavier / SOMMAIRE XAVKI · GitLab [https://gitlab.com/xavki/sommaire-xavki-tutos-fr * How to Connect to Kubernetes Clusters Using Boundary [https://www.hashicorp.com/blog/how-to-connect-to-kubernetes-clusters-using-boundary * Boundary authentification & keycloak & OIDC (Partie 2) - YouTube [https://www.youtube.com/watch?v=boW8Ed1ZzG0&list=PLtBjphVrKuHW-djkHyLaedCsg7VHXzV3e&index=8 * HashiCorp - Boundary - YouTube [https://www.youtube.com/playlist?list=PLtBjphVrKuHW-djkHyLaedCsg7VHXzV3e * The Cloud Native Wiki | Aqua [https://www.aquasec.com/cloud-native-academy/ * Kubernetes Deployment Tutorial - yaml explained + Demo - YouTube [https://www.youtube.com/watch?v=y_vy9NVeCzo&list=PL5aURjJ6mdUedh8rPBXJ5w_ogdD9PM0D7 * Play with Kubernetes [https://labs.play-with-k8s.com/ * Play with Kubernetes [https://labs.play-with-k8s.com/ * Kubernetes Tutorial: Learn the Basics and Get Started | Scalyr [https://www.sentinelone.com/blog/kubernetes-tutorial-learn-basics/?utm_campaignid=19179764064 * https://2021-09-enix.container.training/ [https://2021-09-enix.container.training/ * Avant d'accéder à YouTube [https://consent.youtube.com/m?continue=https%3A%2F%2Fwww.youtube.com%2Fplaylist%3Flist%3DPLBAFXs0YjviJwCoxSUkUPhsSxDJzpZbJd%26cbrd%3D1&gl=FR&m=0&pc=yt&hl=fr&src=1 * https://www.youtube.com/playlist?list=PLBAFXs0YjviJwCoxSUkUPhsSxDJzpZbJd&cbrd=1 [https://www.youtube.com/playlist?list=PLBAFXs0YjviJwCoxSUkUPhsSxDJzpZbJd&cbrd=1 * 2019.03 Kubernetes workshop at QCON London - YouTube [https://www.youtube.com/playlist?list=PLBAFXs0YjviJwCoxSUkUPhsSxDJzpZbJd * Table of Contents - The Docker Handbook [https://docker-handbook.farhan.dev/table-of-contents * GitHub - controlplaneio/simulator: Kubernetes Security Training Platform - focusing on security mitigation [https://github.com/controlplaneio/simulator * Provisioning Kubernetes clusters on GCP with Terraform and GKE [https://learnk8s.io/terraform-gke * Xavier / Tutoriels kubernetes · GitLab [https://gitlab.com/xavki/presentations-kubernetes * Cours tutoriel complet pour apprendre l'orchestrateur Kubernetes (k8s) [https://devopssec.fr/article/cours-complet-apprendre-orchestrateur-kubernetes-k8s * Tuto Docker - Comprendre Docker (Partie1) - Wanadev [https://www.wanadev.fr/23-tuto-docker-comprendre-docker-partie1/ * Overview | Docker Documentation [https://docs.docker.com/get-started/ * TUTOS.EU : Docker : introduction et prise en main [https://www.tutos.eu/3448#divParagraphe1 * Docker - tutoriaux français - Xavki [https://xavki.blog/docker-tutoriaux-francais/ * Docker Documentation: How to Build, Share, and Run | Docker Documentation [https://docs.docker.com/ * A Docker Tutorial for Beginners [https://docker-curriculum.com/ * GitHub - prakhar1989/docker-curriculum: A comprehensive tutorial on getting started with Docker! [https://github.com/prakhar1989/docker-curriculum * Docker Crash Course for Absolute Beginners NEW - YouTube [https://www.youtube.com/watch?v=pg19Z8LL06w * / ViewPure [https://www.viewpure.com/pg19Z8LL06w?ref=bkmk * 1ère séance : Loi de financement rectificative de la sécurité sociale pour 2023 (suite) - Jeudi 16 février 2023 - Vidéos de l'Assemblée nationale [https://videos.assemblee-nationale.fr/video.12937977_63eddf0ced133 * build a HACKING lab with DOCKER containers (become a hacker) |fr] Jon Good [https://jongood.com/build-a-hacking-lab-with-docker-containers-become-a-hacker/ * 🏗️ Getting Started with Docker | dockerlabs [https://dockerlabs.collabnix.com/ * Xavier / Docker V2 · GitLab [https://gitlab.com/xavki/docker-v2/-/tree/main/ * How To Dockerize Your Pen-testing Lab feat. Kali Linux | HackerNoon [https://hackernoon.com/automating-your-pentest-lab-with-docker-2j9e33wa * Docker : manipuler les conteneurs - YouTube [https://www.youtube.com/watch?v=IdMp7RhFVdA&list=PLn6POgpklwWq0iz59-px2z-qjDdZKEvWd&index=4 * The Ultimate Docker Cheat Sheet | dockerlabs [https://dockerlabs.collabnix.com/docker/cheatsheet/ * Docker Cheat Sheet: Complete Guide (2023) - InterviewBit [https://www.interviewbit.com/docker-cheat-sheet/#networking * Amazon EKS Workshop :: Amazon EKS Workshop [https://www.eksworkshop.com/ * Introduction à hashicorp Vault [https://blog.stephane-robert.info/post/introduction-vault/ * DevOps Tutorial [https://www.geeksforgeeks.org/devops-tutorial/ * SaltStack - formation et tutoriels gratuits - Xavki [https://xavki.blog/saltstack-formation-et-tutoriels-gratuits/ * Débuter avec Salt (Saltstack) - JN Community [https://community.jaguar-network.com/debuter-avec-salt-saltstack/ * Le Site d'un Consultant DevOps | Stéphane ROBERT [https://blog.stephane-robert.info/
Infographie
* 6 000+ Cybersecurity banque d'images et photos libres de droit · Téléchargement gratuit · Photos Pexels [https://www.pexels.com/fr-fr/chercher/cybersecurity/
Microsoft
* Formation Microsoft 365 [https://support.microsoft.com/fr-fr/training * How to install the PowerShell Active Directory module – 4sysops [https://4sysops.com/wiki/how-to-install-the-powershell-active-directory-module/#windows-11 * Enable PowerShell remoting – 4sysops [https://4sysops.com/wiki/enable-powershell-remoting/ * Vérifier que les mots de passe de votre AD ne sont pas compromis (gratuitement !) – MSSEC [https://blog.mssec.fr/verifier-que-les-mots-de-passe-de-votre-ad-ne-sont-pas-compromis-gratuitement/ * Windows Server 2019 | Microsoft Evaluation Center [https://www.microsoft.com/en-us/evalcenter/evaluate-windows-server-2019 * Windows 10 Enterprise | Microsoft Evaluation Center [https://www.microsoft.com/en-us/evalcenter/evaluate-windows-10-enterprise * Déploiement des services AD DS dans une nouvelle organisation | Microsoft Learn [https://learn.microsoft.com/fr-fr/windows-server/identity/ad-ds/plan/deploying-ad-ds-in-a-new-organization?source=recommendations * Présentation des services de domaine Active Directory | Microsoft Learn [https://learn.microsoft.com/fr-fr/windows-server/identity/ad-ds/get-started/virtual-dc/active-directory-domain-services-overview * Comment Mettre En Place Active Directory Et Un Domaine • Informerick [https://informerick.com/tutoriels-informatique/installer-active-directory/
AI-IA
* Education – Google AI [https://ai.google/education/ * Google AI [https://ai.google/ * New chat [https://chat.openai.com/chat * Tournesol [https://tournesol.app/ * AgentGPT [https://agentgpt.reworkd.ai/fr * Albus, AI App, explore any topic - powered by ChatGPT [https://albus.org/ * ElevenLabs - Prime AI Text to Speech | Voice Cloning [https://beta.elevenlabs.io/ * LegiGPT [https://legigpt.fr/ * Tome - AI-powered storytelling [https://tome.app/ * Otter.ai - Voice Meeting Notes & Real-time Transcription [https://otter.ai/ * AllThingsAI - The Complete Resource of AI tools & Services [https://www.allthingsai.com/ * GetChatGPT - AI Tool Reviews, Pricing and Alternatives 2023 | Futurepedia [https://www.futurepedia.io/tool/getchatgpt * All Ai Websites [https://www.allaiwebsites.com/ * FilePursuit- Discover Everything!, Search the web for files, videos, audios, eBooks and much more. [https://filepursuit.com/ * Learn anything [https://www.tutorai.me/ * Quizify | Create amazing quizzes 20X faster with AI [https://quizify.com/courses/1650 * Assistant d'éducation - Les meilleures IA par Chatgpt.fr [https://chatgpt.fr/ia/assistant-deducation/ * Perplexity AI [https://www.perplexity.ai/ * Consensus - Evidence-Based Answers, Faster [https://consensus.app/ * Andi - Search for the next generation [https://andisearch.com/ * GitHub - sunner/ChatALL: Concurrently chat with ChatGPT, Bing Chat, Bard, Alpaca, Vicuna, Claude, ChatGLM, MOSS, 讯飞星火, 文心一言 and more, discover the best answers [https://github.com/sunner/ChatALL * Essayez Bard, une expérience d'IA conversationnelle par Google [https://bard.google.com/ * Pi, your personal AI [https://pi.ai/talk * Future Tools - Find The Exact AI Tool For Your Needs [https://www.futuretools.io/ * HeyGen - AI Spokesperson Video Creator [https://app.heygen.com/guest/labs * FAQ | Codeium · Free AI Code Completion & Chat [https://codeium.com/faq * AnonChatGPT [https://anonchatgpt.com/ * Phind: AI search engine [https://www.phind.com/ * Paraphrasing Tool - QuillBot AI [https://quillbot.com/ * Mapping Ideas That Change the World [https://www.mymap.ai/signup * AI Human Generator – Generate and Modify People Online [https://generated.photos/human-generator * Chromox-Transforming Ideas into Visual Stories [https://chromox.alkaidvision.com/ * Copilot for Microsoft 365 – Microsoft Adoption [https://adoption.microsoft.com/en-us/copilot/ * Build Web Apps with No-Code | Momen [https://momen.app/ * Copilot for Microsoft 365 – Microsoft Adoption [https://adoption.microsoft.com/fr-fr/copilot/ * AI In Cybersecurity | Using AI In Cybersecurity | How AI Can Be Used in Cyber Security | Simplilearn - YouTube [https://www.youtube.com/watch?v=GqVGS-y8YnY * 🔥 AI Specialist Course 2023 | AI Specialist Training For 2023 | AI Basics In 9 Hours | Simplilearn - YouTube [https://www.youtube.com/watch?v=XMeWuc_ycPQ * AI Course With Python | Learn Artificial Intelligence With Python In 10 Hours | Simplilearn - YouTube [https://www.youtube.com/watch?v=26U2PChW2_s * Artificial Intelligence Full Course 2024 | AI Full Course | AI And ML Full Course | Intellipaat - YouTube [https://www.youtube.com/watch?v=tzzz8w53FV4 * Artificial Intelligence Tutorial | Artificial Intelligence Course | Intellipaat - YouTube [https://www.youtube.com/watch?v=UkZzM-jxLv4 * Introduction à l’intelligence artificielle - 1 - Décider - YouTube [https://www.youtube.com/watch?v=skxUjKIFGXQ&list=PLDyuailkzLlp5JTH8N-Oj3ATkCfmhdBqQ * VulnerabilityGPT: Cybersecurity in the Age of LLM and AI - YouTube [https://www.youtube.com/watch?v=IV9BasOlcZ4 * Cours IA-3SIQ- Introduction Partie 1 - Les Fondements de L'intelligence Artificielle - YouTube [https://www.youtube.com/watch?v=TktDkyL217w&list=PLa40Uw4EW9hxI2OYTEKiDyIggoLOCa0U_ * ChatGPT : La Formation Ultime | Tutoriel Ultra Complet pour Débutants - YouTube [https://www.youtube.com/watch?v=8i25HfT6EB8 * Intelligence Artificielle 1.1 : Agents intelligents - motivation - YouTube [https://www.youtube.com/watch?v=stuU2TK3t0Q&list=PL6Xpj9I5qXYGhsvMWM53ZLfwUInzvYWsm * Pricing | Fireflies.ai [https://fireflies.ai/pricing * AI Chat [https://deepai.org/chat * Your Personal English Coach | Elsaspeak [https://elsaspeak.com/en/product * 10 meilleurs outils d'IA pour l'éducation (2023) - Unite.AI [https://www.unite.ai/fr/10-meilleurs-outils-d%27IA-pour-l%27%C3%A9ducation/ * Voice Notepad - Speech to Text with Google Speech Recognition [https://dictation.io/speech * About [https://faceless.video/about * There's An AI For That (TAAFT) - The #1 AI Aggregator [https://theresanaiforthat.com/ * LegiGPT [https://legigpt.fr/?s=09 * Scrape and Monitor Data from Any Website with No Code [https://www.browse.ai/ * Unblocked [https://getunblocked.com/?ref=taaft * Social Media Marketing made easy with AI | Predis.ai [https://predis.ai/
TipsAndCheats
* Passing OSCP - scund00r [https://scund00r.com/all/oscp/2018/02/25/passing-oscp.html * Cheat Sheets - Toddington [https://www.toddington.com/resources/cheat-sheets/ * Resources - Toddington [https://www.toddington.com/resources/ * Nmap Cheat Sheet [https://highon.coffee/blog/nmap-cheat-sheet/ * ASafety » Reverse-shell one-liner Cheat Sheet [https://www.asafety.fr/reverse-shell-one-liner-cheat-sheet/ * Wfuzz bruteforcing web applications – All things in moderation [https://hydrasky.com/network-security/wfuzz-bruteforcing-web-applications/ * Browserling – Online cross-browser testing [https://www.browserling.com/
Ebook
* Free Learning - Free Programming eBooks from Packt [https://www.packtpub.com/packt/offers/free-learning * Teen/Young adult - Download Audiobooks & eBooks for iPhone, Android, Kindle and more! [http://www.loyalbooks.com/genre/Teen_Young_adult * Web Penetration Testing With Kali Linux - Second Edition - Web Penetration Testing With Kali Linux - Second Edition - Juned Ahmed Ansari.pdf [http://mirror.thelifeofkenneth.com/sites/qt.vidyagam.es/library/Kali%20Linux/Web%20Penetration%20Testing%20With%20Kali%20Linux%20-%20Second%20Edition/Web%20Penetration%20Testing%20With%20Kali%20Linux%20-%20Second%20Edition%20-%20Juned%20Ahmed%20Ansari.pdf * Telecharger Ebook Bien-être en PDF, EPUB - 1001Ebooks [https://epub.1001ebooks.com/livres/bien-etre/page/3/ * Index of Ebooks [https://prakash-khadka.com.np/ebooks/ * Download ebooks as you want · GitHub [https://gist.github.com/baiwfg2/af827b8b75eebf8ab29f5531a0d265ce * Télécharger des ebooks gratuitement [https://ww4.bookys-ebooks.com/ * Plus de 8000 livres audio gratuits ! | Litterature audio.com [https://www.litteratureaudio.com/ * Médiathèque Numérique Loire - MNL - Autoformation [https://mediatheque-numerique.loire.fr/Default/autoformation.aspx * Free Learning | Daily Programming eBook from Packt [https://www.packtpub.com/free-learning * Bouquineux.com [http://www.bouquineux.com/ * OnRead.com - instant free e-book download. Read books online via this free e-book library. Become a literary critic and write your own review to any book. [https://www.onread.com/ * Un instant… [https://www.wowebook.com/ * Les meilleurs auteurs de romans "Feel good" [https://toplivre.fr/feel-good/
Anonymity
* Web Hacker's Favorites HackerFox :: Collections :: Modules pour Firefox [https://addons.mozilla.org/fr/firefox/collections/yehgdotnet/webhacker/ * Web Application Security Penetration Testing :: Collections :: Add-ons for Firefox [https://addons.mozilla.org/en-gb/firefox/collections/adammuntner/webappsec/ * Web Hacker's Favorites HackerFox :: Collections :: Add-ons for Firefox [https://addons.mozilla.org/en-gb/firefox/collections/yehgdotnet/webhacker/?page=2 * Initiation à I2P « [http://korben.info/comment-installer-i2p.html * Installer un serveur OpenVPN « Admin6 [http://www.admin6.fr/2011/01/installer-un-serveur-openvpn/ * Browserling – Online cross-browser testing [https://www.browserling.com/
download
* INE - OSCP Security Technology Course » downTURK - Download Fresh Hidden Object Games [https://www.downturk.net/2613961-ine-oscp-security-technology-course.html * Humble Bundle | game bundles, book bundles, software bundles, and more [https://www.humblebundle.com/
Statistique
* Worldometer - real time world statistics [https://www.worldometers.info/
Splunk
* Login | Splunk CORPO [https://splunk.rmidom.intra/splunk/sh/fr-FR/account/login?return_to=%2Fsplunk%2Fsh%2Ffr-FR%2F * Recherche | Splunk 7.1.2 [https://splunk.rmidom.intra/splunk/sh/fr-FR/app/search/search?q=search%20index%3Dadista_perfmon&display.page.search.mode=fast&dispatch.sample_ratio=1&earliest=-30d%40d&latest=now&sid=1559061781.134084 * Login | Splunk - STE [http://91.103.232.104:8000/fr-FR/account/login?return_to=%2Ffr-FR%2Fapp%2Fsearch%2Fsearch * Splunk 7.x Fundamentals Part 1 (eLearning) [https://education.splunk.com/user/consume/course_pathway/485b7741-6009-37ae-9260-46112541ecbf/103/0c7b5e68-a8f5-3708-90cd-15ae9de711fd?complete=0&tab=overview * Registration Request Received [https://inter.viewcentral.com/events/cust/register_action.aspx * Splunk Fundamentals 1 [https://www.splunk.com/en_us/training/courses/splunk-fundamentals-1.html
RaspBerry
* Votre lab de hacking sur Raspberry Pi III - Part 2 – Kali-linux.fr [https://www.kali-linux.fr/installation/lab-hacking-raspberry-pi-3-kali-linux-installation * STICKY FINGER’S KALI-PI – Pre-installed | Re4son [https://whitedome.com.au/re4son/sticky-fingers-kali-pi-pre-installed-image/ * How to Turn a Raspberry Pi into a Low-Power Network Storage Device [http://www.howtogeek.com/139433/how-to-turn-a-raspberry-pi-into-a-low-power-network-storage-device/ * Make Your Own Raspberry Pi NAS - SmallNetBuilder [http://www.smallnetbuilder.com/nas/nas-howto/32053-make-your-own-raspberry-pi-nas * R-Pi NAS - eLinux.org [http://elinux.org/R-Pi_NAS * How to build a Raspberry Pi cluster - Raspberry Pi [https://www.raspberrypi.com/tutorials/cluster-raspberry-pi-tutorial/ * Raspberry Pi tutorials - Raspberry Pi [https://www.raspberrypi.com/tutorials/ * Raspberry Pi Projects | Cybercademy [https://cybercademy.org/raspberry-pi-projects/ * 8 Ways a Raspberry Pi Can Help You Learn Online Security Skills [https://www.makeuseof.com/tag/raspberry-pi-learn-online-security/#poisontap-the-evil-pi-zero * Détection d’intrusion (IDS) avec Suricata sur Raspberry Pi - Framboise 314, le Raspberry Pi à la sauce française.... [https://www.framboise314.fr/detection-dintrusion-ids-avec-suricata-sur-raspberry-pi/ * How to Build a Beginner Hacking Kit with the Raspberry Pi 3 Model B+ « Null Byte :: WonderHowTo [https://null-byte.wonderhowto.com/how-to/build-beginner-hacking-kit-with-raspberry-pi-3-model-b-0184144/ * Home Assistant [https://www.home-assistant.io/ * DShield Honeypot - SANS Internet Storm Center [https://isc.sans.edu/honeypot.html * Raspberry Pi OS – Raspberry Pi [https://www.raspberrypi.com/software/ * Les 50 meilleurs projets Raspberry Pi – Hiver 2022 | All3DP [https://all3dp.com/fr/1/meilleur-projet-raspberry-pi/ * A portable WiFI router/NAS/Docker using RaspAP on Raspberry Pi 4 with USB/SSD boot device | by David Herron | ITNEXT [https://itnext.io/a-portable-wifi-router-nas-docker-using-raspap-on-raspberry-pi-4-with-usb-ssd-boot-device-a64cd4a68d6f * Using a Raspberry Pi as a Bluetooth speaker with PipeWire [https://www.collabora.com/news-and-blog/blog/2022/09/02/using-a-raspberry-pi-as-a-bluetooth-speaker-with-pipewire-wireplumber/ * Recalbox Home | recalbox.com [https://www.recalbox.com/fr/ * Tuto Installation Debian Jessie sur Chromebook Asus C300 / Installation de Debian / Debian-facile [https://debian-facile.org/viewtopic.php?id=14052 * How to Setup a Raspberry Pi Network Scanner - Pi My Life Up [https://pimylifeup.com/raspberry-pi-network-scanner/ * RPi Network Vulnerability Scanner - Pensive Security Blog [https://pensivesecurity.io/blog/2020/11/16/RPi-Network-Vulnerability-Scanner/ * GitHub - lukewegryn/rpi-vuln-scan: OpenVAS docker container with custom automation script. [https://github.com/lukewegryn/rpi-vuln-scan * Build a Raspberry Pi Scanner that Tracks the Devices Connected to Your Local Network - Make: [https://makezine.com/projects/build-raspberry-pi-network-scanner/ * Raspberry Pi Network Scanner Project Overview | Cybercademy [https://cybercademy.org/raspberry-pi-network-scanner-project-overview/ * Comment transformez un Raspberry Pi en serveur VPN avec PiVPN [https://www.clubic.com/raspberry-pi/dossier-365094-transformez-un-raspberry-pi-en-serveur-vpn-avec-pivpn.html * Free Dynamic DNS - Managed DNS - Managed Email - Domain Registration - No-IP [https://www.noip.com/ * OpenVPN : Installer un Serveur VPN sur Raspberry Pi (en 5 min) – RaspberryTips [https://raspberrytips.fr/installer-serveur-vpn-raspberry-pi/ * How to install a Wazuh server on a Raspberry Pi 4B - Jacob Riggs | Blog [https://jacobriggs.io/blog/posts/how-to-install-a-wazuh-siem-server-on-a-raspberry-pi-4b-26.html * Pwnagotchi Tutorial #piday #raspberrypi « Adafruit Industries – Makers, hackers, artists, designers and engineers! [https://blog.adafruit.com/2023/07/21/pwnagotchi-tutorial-piday-raspberrypi/ * Pwnagotchi on a Raspberry Pi 3 with Adafruit 3.5 LCD | Matt Gibson [https://mattgibson.ca/installing-pwnagotchi-on-a-raspberry-pi-3-with-adafruit-3.5-lcd/ * Installation et configuration Pi Hole sur Raspberry Pi – My blog [https://oleks.ca/2021/06/24/installation-et-configuration-pi-hole-sur-raspberry-pi/ * CIRCL » CIRCLean - USB key sanitizer [https://www.circl.lu/projects/CIRCLean/
Util
* JSON Web Tokens - jwt.io [https://jwt.io/#debugger-io * PentesterLab Bootcamp [https://pentesterlab.com/bootcamp * GitHub - manala/manalize: Provides ready-to-use environments for various projects through manala ansible roles [https://github.com/manala/manalize * World's Fastest VPN and Privacy Protection | hide.me [https://hide.me/en/ * samsclass.info: Sam Bowne Class Information [https://samsclass.info/ * CFP Time [https://www.cfptime.org/home * Zero-Day [https://zero-day.io/
GitHub
* https://cheatsheet.haax.fr/web-pentest/tools/ffuf/ [https://cheatsheet.haax.fr/web-pentest/tools/ffuf/ * https://github.com/AfvanMoopen/tryhackme- [https://github.com/AfvanMoopen/tryhackme- * https://manpages.ubuntu.com/manpages/bionic/fr/man8/hping3.8.html [https://manpages.ubuntu.com/manpages/bionic/fr/man8/hping3.8.html * https://auto.pwnspot.com/ [https://auto.pwnspot.com/ * https://github.com/vavkamil/awesome-bugbounty-tools [https://github.com/vavkamil/awesome-bugbounty-tools * https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/red-offensive/offensive-toolbox/recon-frameworks [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/red-offensive/offensive-toolbox/recon-frameworks * https://hackersploit.org/ [https://hackersploit.org/ * https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/#escalate-privileges [https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/#escalate-privileges * https://github.com/GoVanguard/Getting-into-InfoSec-and-Cybersecurity [https://github.com/GoVanguard/Getting-into-InfoSec-and-Cybersecurity * https://github.com/sansinstitute/slingshot [https://github.com/sansinstitute/slingshot * https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc/edit#gid=0 [https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc/edit#gid=0 * https://github.com/denisidoro/navi [https://github.com/denisidoro/navi * https://github.com/Orange-Cyberdefense/GOAD [https://github.com/Orange-Cyberdefense/GOAD * https://vk9-sec.com/category/red-team/anonymity/anonymity-anonymity/ [https://vk9-sec.com/category/red-team/anonymity/anonymity-anonymity/ * https://github.com/rkhal101/Web-Security-Academy-Series [https://github.com/rkhal101/Web-Security-Academy-Series * https://github.com/OlivierLaflamme/Cheatsheet-God [https://github.com/OlivierLaflamme/Cheatsheet-God * https://www.youtube.com/watch?v=ZK-h5xei07k [https://www.youtube.com/watch?v=ZK-h5xei07k * https://github.com/rkhal101/Web-Security-Academy-Series [https://github.com/rkhal101/Web-Security-Academy-Series * https://github.com/danielthatcher?tab=repositories [https://github.com/danielthatcher?tab=repositories * https://www.yolospacehacker.com/fr/toolbox.php?cat=Webshell [https://www.yolospacehacker.com/fr/toolbox.php?cat=Webshell * https://github.com/Orange-Cyberdefense/GOAD [https://github.com/Orange-Cyberdefense/GOAD * https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html [https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html * https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/ [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/ * https://0ut3r.space/2020/07/25/shodan-dorks/ [https://0ut3r.space/2020/07/25/shodan-dorks/ * https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/ [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/ * https://www.sans.org/cyberaces/system-administration/ [https://www.sans.org/cyberaces/system-administration/ * https://ethicalhackersacademy.com/ [https://ethicalhackersacademy.com/ * https://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388 [https://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388 * https://cheatsheet.haax.fr/ [https://cheatsheet.haax.fr/ * https://gchq.github.io/CyberChef/ [https://gchq.github.io/CyberChef/ * https://www.puckiestyle.nl/pass-the-hash/ [https://www.puckiestyle.nl/pass-the-hash/ * https://github.com/Wh1teDrvg0n/safeVPN-THM [https://github.com/Wh1teDrvg0n/safeVPN-THM * https://www.kali.org/docs/general-use/guacamole-kali-in-browser/ [https://www.kali.org/docs/general-use/guacamole-kali-in-browser/ * https://wh1tedrvg0n.com/htb-lame/ [https://wh1tedrvg0n.com/htb-lame/ * https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s [https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s * https://github.com/infosecn1nja/Red-Teaming-Toolkit [https://github.com/infosecn1nja/Red-Teaming-Toolkit * https://0xdf.gitlab.io/tags.html [https://0xdf.gitlab.io/tags.html * https://beta.hackndo.com/archives/ [https://beta.hackndo.com/archives/ * https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/Darknet.md [https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/Darknet.md * https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md * https://github.com/qazbnm456/awesome-web-security [https://github.com/qazbnm456/awesome-web-security * https://github.com/Hack-with-Github/Awesome-Hacking [https://github.com/Hack-with-Github/Awesome-Hacking * https://github.com/swisskyrepo/PayloadsAllTheThings [https://github.com/swisskyrepo/PayloadsAllTheThings * https://github.com/carlospolop/PEASS-ng [https://github.com/carlospolop/PEASS-ng * https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md * https://www.hackingarticles.in/web-penetration-testing/ [https://www.hackingarticles.in/web-penetration-testing/ * https://github.com/enaqx/awesome-pentest [https://github.com/enaqx/awesome-pentest * https://github.com/S3cur3Th1sSh1t/Pentest-Tools [https://github.com/S3cur3Th1sSh1t/Pentest-Tools * https://github.com/Tib3rius/Pentest-Cheatsheets [https://github.com/Tib3rius/Pentest-Cheatsheets * https://github.com/superkojiman?tab=repositories [https://github.com/superkojiman?tab=repositories * https://book.hacktricks.xyz/ [https://book.hacktricks.xyz/ * https://github.com/superkojiman/hacktricks [https://github.com/superkojiman/hacktricks * https://github.com/superkojiman/hacktricks [https://github.com/superkojiman/hacktricks * https://book.hacktricks.xyz/pentesting/pentesting-network#discovering-hosts-from-the-outside [https://book.hacktricks.xyz/pentesting/pentesting-network#discovering-hosts-from-the-outside * https://gtfobins.github.io/ [https://gtfobins.github.io/ * https://lolbas-project.github.io/ [https://lolbas-project.github.io/ * https://github.com/0dayCTF [https://github.com/0dayCTF * https://thedarksource.com/msfvenom-cheat-sheet-create-metasploit-payloads/ [https://thedarksource.com/msfvenom-cheat-sheet-create-metasploit-payloads/ * https://github.com/infosecn1nja/Red-Teaming-Toolkit#Payload%20Development [https://github.com/infosecn1nja/Red-Teaming-Toolkit#Payload%20Development * https://www.hackingarticles.in/netcat-for-pentester/ [https://www.hackingarticles.in/netcat-for-pentester/ * http://www.vulnweb.com/ [http://www.vulnweb.com/ * https://www.revshells.com/ [https://www.revshells.com/ * https://www.hackingarticles.in/msfvenom-cheatsheet-windows-exploitation/ [https://www.hackingarticles.in/msfvenom-cheatsheet-windows-exploitation/ * https://www.youtube.com/watch?v=h0MqCRYH1mk [https://www.youtube.com/watch?v=h0MqCRYH1mk * https://github.com/0dayCTF/awesome-shodan-queries [https://github.com/0dayCTF/awesome-shodan-queries * https://tzusec.com/category/guides/kali-linux/password-attacks/ [https://tzusec.com/category/guides/kali-linux/password-attacks/ * https://github.com/GTFOBins/GTFOBins.github.io [https://github.com/GTFOBins/GTFOBins.github.io * https://github.com/LOLBAS-Project/LOLBAS [https://github.com/LOLBAS-Project/LOLBAS * https://0xdf.gitlab.io/ [https://0xdf.gitlab.io/ * https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS [https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS * https://www.trenchesofit.com/resources/ [https://www.trenchesofit.com/resources/ * https://www.trenchesofit.com/2020/09/12/oscp-buffer-overflow-write-up/ [https://www.trenchesofit.com/2020/09/12/oscp-buffer-overflow-write-up/ * https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe [https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe * https://github.com/n3tsky/Pentest-Tools [https://github.com/n3tsky/Pentest-Tools * https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe [https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe * https://github.com/hum4nG0D/OSCP_Bufferovrflw_Prep [https://github.com/hum4nG0D/OSCP_Bufferovrflw_Prep * https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst [https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst * https://rderik.com/blog/using-radare2-to-patch-a-binary/ [https://rderik.com/blog/using-radare2-to-patch-a-binary/ * https://gef.readthedocs.io/en/master/commands/ropper/ [https://gef.readthedocs.io/en/master/commands/ropper/ * https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s [https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s * https://gef.readthedocs.io/en/master/ [https://gef.readthedocs.io/en/master/ * https://beta.hackndo.com/assembly-basics/ [https://beta.hackndo.com/assembly-basics/ * https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/ [https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/ * https://md5hashing.net/ [https://md5hashing.net/ * https://hashcat.net/wiki/doku.php?id=example_hashes [https://hashcat.net/wiki/doku.php?id=example_hashes * https://github.com/openwall/john/blob/bleeding-jumbo/run/ssh2john.py [https://github.com/openwall/john/blob/bleeding-jumbo/run/ssh2john.py * https://defendtheweb.net/article/buffer-overflow-to-run-root-shell-full-tutorial [https://defendtheweb.net/article/buffer-overflow-to-run-root-shell-full-tutorial * https://github.com/OJ/gobuster#vhost-mode-options [https://github.com/OJ/gobuster#vhost-mode-options * https://erev0s.com/tools/web-application-assessment-check-list/ [https://erev0s.com/tools/web-application-assessment-check-list/ * https://wpscan.com/howto-find-wordpress-plugin-vulnerabilities-wpscan-ebook.pdf [https://wpscan.com/howto-find-wordpress-plugin-vulnerabilities-wpscan-ebook.pdf * https://reconshell.com/web-attack-cheat-sheet/ [https://reconshell.com/web-attack-cheat-sheet/ * https://oscp.infosecsanyam.in/brute-force [https://oscp.infosecsanyam.in/brute-force * https://md5hashing.net/hash/md5 [https://md5hashing.net/hash/md5 * https://github.com/Hack-with-Github/Free-Security-eBooks [https://github.com/Hack-with-Github/Free-Security-eBooks * https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerry [https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerryguy311/Free_CyberSecurity_Professional_Development_Resourceshttps://github.com/payloadbox/command-injection-payload-listhttps://github.com/jagregory/abrash-zen-of-asmhttps://github.com/Cyb3rWard0ghttps://github.com/dievus/threader3000https://github.com/dievus/printspooferhttps://github.com/kgretzky/evilginx2https://github.com/muraenateam/muraenahttps://github.com/drk1wi/Modlishkahttps://github.com/AlgoSecure/Pollenisatorhttps://github.com/fluentpython/example-code-2ehttps://github.com/dostoevskylabs/dostoevsky-pentest-noteshttps://github.com/NoorQureshi/kali-linux-cheatsheethttps://snowscan.io/https://github.com/Yavuzlar/VulnLabhttps://blog.void.yt/HTB/index.htmlhttps://github.com/0dayCTF/awesome-shodan-querieshttps://github.com/skelsec/pypykatzhttps://github.com/sc0tfree/updoghttps://github.com/NetSPI/PowerUpSQLhttps://github.com/GTFOBins/GTFOBins.github.iohttps://github.com/LOLBAS-Project/LOLBAShttps://github.com/pry0cc/axiomhttps://github.com/jivoi/pentesthttps://github.com/Ignitetechnologies/BurpSuite-For-Pentesterhttps://github.com/curated-intel/Ukraine-Cyber-Operationshttps://github.com/Kirtar22/Presentationshttps://github.com/Kirtar22/Litmus_Testhttps://github.com/Z4nzu/hackingtoolhttps://github.com/kaiiyer/awesome-vulnerablehttps://github.com/OWASP/Vulnerable-Web-Applicationhttps://github.com/sec4you/VulnLabshttps://github.com/webpwnized/mutillidaehttps://thehackerish.com/how-to-install-owasp-juice-shop/https://github.com/juliocesarfort/public-pentesting-reportshttps://github.com/PowerDNS-Admin/PowerDNS-Adminhttps://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388https://github.com/tdubs/bgp-recon * https://gist.github.com/HarmJ0y/184f9822b195c52dd50c379ed3117993 [https://gist.github.com/HarmJ0y/184f9822b195c52dd50c379ed3117993 * https://github.com/SecureAuthCorp/impacket [https://github.com/SecureAuthCorp/impacket * https://wtfbins.wtf/ [https://wtfbins.wtf/ * https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerry [https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerryguy311/Free_CyberSecurity_Professional_Development_Resourceshttps://github.com/payloadbox/command-injection-payload-listhttps://github.com/jagregory/abrash-zen-of-asmhttps://github.com/Cyb3rWard0ghttps://github.com/dievus/threader3000https://github.com/dievus/printspooferhttps://github.com/kgretzky/evilginx2https://github.com/muraenateam/muraenahttps://github.com/drk1wi/Modlishkahttps://github.com/AlgoSecure/Pollenisatorhttps://github.com/fluentpython/example-code-2ehttps://github.com/dostoevskylabs/dostoevsky-pentest-noteshttps://github.com/NoorQureshi/kali-linux-cheatsheethttps://snowscan.io/https://github.com/Yavuzlar/VulnLabhttps://blog.void.yt/HTB/index.htmlhttps://github.com/0dayCTF/awesome-shodan-querieshttps://github.com/skelsec/pypykatzhttps://github.com/sc0tfree/updoghttps://github.com/NetSPI/PowerUpSQLhttps://github.com/GTFOBins/GTFOBins.github.iohttps://github.com/LOLBAS-Project/LOLBAShttps://github.com/pry0cc/axiomhttps://github.com/jivoi/pentesthttps://github.com/Ignitetechnologies/BurpSuite-For-Pentesterhttps://github.com/curated-intel/Ukraine-Cyber-Operationshttps://github.com/Kirtar22/Presentationshttps://github.com/Kirtar22/Litmus_Testhttps://github.com/Z4nzu/hackingtoolhttps://github.com/kaiiyer/awesome-vulnerablehttps://github.com/OWASP/Vulnerable-Web-Applicationhttps://github.com/sec4you/VulnLabshttps://github.com/webpwnized/mutillidaehttps://thehackerish.com/how-to-install-owasp-juice-shop/https://github.com/juliocesarfort/public-pentesting-reportshttps://github.com/PowerDNS-Admin/PowerDNS-Adminhttps://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388https://github.com/tdubs/bgp-recon * https://github.com/Hack-with-Github/Free-Security-eBooks [https://github.com/Hack-with-Github/Free-Security-eBooks * https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerry [https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerryguy311/Free_CyberSecurity_Professional_Development_Resourceshttps://github.com/payloadbox/command-injection-payload-listhttps://github.com/jagregory/abrash-zen-of-asmhttps://github.com/Cyb3rWard0ghttps://github.com/dievus/threader3000https://github.com/dievus/printspooferhttps://github.com/kgretzky/evilginx2https://github.com/muraenateam/muraenahttps://github.com/drk1wi/Modlishkahttps://github.com/AlgoSecure/Pollenisatorhttps://github.com/fluentpython/example-code-2ehttps://github.com/dostoevskylabs/dostoevsky-pentest-noteshttps://github.com/NoorQureshi/kali-linux-cheatsheethttps://snowscan.io/https://github.com/Yavuzlar/VulnLabhttps://blog.void.yt/HTB/index.htmlhttps://github.com/0dayCTF/awesome-shodan-querieshttps://github.com/skelsec/pypykatzhttps://github.com/sc0tfree/updoghttps://github.com/NetSPI/PowerUpSQLhttps://github.com/GTFOBins/GTFOBins.github.iohttps://github.com/LOLBAS-Project/LOLBAShttps://github.com/pry0cc/axiomhttps://github.com/jivoi/pentesthttps://github.com/Ignitetechnologies/BurpSuite-For-Pentesterhttps://github.com/curated-intel/Ukraine-Cyber-Operationshttps://github.com/Kirtar22/Presentationshttps://github.com/Kirtar22/Litmus_Testhttps://github.com/Z4nzu/hackingtoolhttps://github.com/kaiiyer/awesome-vulnerablehttps://github.com/OWASP/Vulnerable-Web-Applicationhttps://github.com/sec4you/VulnLabshttps://github.com/webpwnized/mutillidaehttps://thehackerish.com/how-to-install-owasp-juice-shop/https://github.com/juliocesarfort/public-pentesting-reportshttps://github.com/PowerDNS-Admin/PowerDNS-Adminhttps://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388https://github.com/tdubs/bgp-recon * https://www.threatable.io/ [https://www.threatable.io/ * https://t.me/s/HackerVideos/ [https://t.me/s/HackerVideos/ * https://osintframework.com/ [https://osintframework.com/ * https://github.com/blindfuzzy/LHF [https://github.com/blindfuzzy/LHF * https://haax.fr/fr/ [https://haax.fr/fr/ * https://github.com/Ignitetechnologies/BurpSuite-For-Pentester?utm_source=pocket_mylist [https://github.com/Ignitetechnologies/BurpSuite-For-Pentester?utm_source=pocket_mylist * https://github.com/andrew-d/static-binaries [https://github.com/andrew-d/static-binaries * https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys [https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys * https://github.com/OWASP/CheatSheetSeries/tree/master/cheatsheets [https://github.com/OWASP/CheatSheetSeries/tree/master/cheatsheets * https://vk9-sec.com/ssh2john-how-to/ [https://vk9-sec.com/ssh2john-how-to/ * https://github.com/vavkamil/awesome-bugbounty-tools [https://github.com/vavkamil/awesome-bugbounty-tools * https://github.com/Ciphey/Ciphey/blob/master/translations/fr/README.md [https://github.com/Ciphey/Ciphey/blob/master/translations/fr/README.md * https://github.com/clong/DetectionLab [https://github.com/clong/DetectionLab * https://github.com/hposton/python-for-cybersecurity [https://github.com/hposton/python-for-cybersecurity * https://github.com/Orange-Cyberdefense/arsenal [https://github.com/Orange-Cyberdefense/arsenal * https://www.bugbountyhunter.com/ [https://www.bugbountyhunter.com/ * https://www.kitploit.com/ [https://www.kitploit.com/ * https://github.com/CyberSecurityUP/Awesome-PenTest-Practice [https://github.com/CyberSecurityUP/Awesome-PenTest-Practice * https://github.com/yarrick/iodine [https://github.com/yarrick/iodine * https://gitlab.com/An0nUD4Y/hiddeneye [https://gitlab.com/An0nUD4Y/hiddeneye * GitHub - Hack-with-Github/Free-Security-eBooks: Free Security and Hacking eBooks [https://github.com/Hack-with-Github/Free-Security-eBooks * GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF [https://github.com/swisskyrepo/PayloadsAllTheThings * GitHub - Moham3dRiahi/Th3inspector: Th3Inspector 🕵️ Best Tool For Information Gathering 🔎 [https://github.com/Moham3dRiahi/Th3inspector * drwetter/Penetration-Testing: List of awesome penetration testing resources, tools and other shiny things [https://github.com/drwetter/Penetration-Testing * Sharpforce [https://github.com/Sharpforce * infosecn1nja/Red-Teaming-Toolkit: A collection of open source and commercial tools that aid in red team operations. [https://github.com/infosecn1nja/Red-Teaming-Toolkit * m4ll0k/Awesome-Hacking-Tools: Awesome Hacking Tools [https://github.com/m4ll0k/Awesome-Hacking-Tools * Und3rf10w/kali-anonsurf: A port of ParrotSec's stealth and anonsurf modules to Kali Linux [https://github.com/Und3rf10w/kali-anonsurf * ariokio/cheat: cheat allows you to create and view interactive cheatsheets on the command-line. It was designed to help remind *nix system administrators of options for commands that they use frequently, but not frequently enough to remember. [https://github.com/ariokio/cheat * Privilege escalation: Linux - Hacker's Grimoire [https://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linux * Meterpreter Paranoid Mode · rapid7/metasploit-framework Wiki [https://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Mode * GitHub - guifre/Elevator: Automates elevation of privileges in Linux like systems [https://github.com/guifre/Elevator * tomnomnom (Tom Hudson) / Repositories · GitHub [https://github.com/tomnomnom?tab=repositories * sindresorhus/awesome: Curated list of awesome lists [https://github.com/sindresorhus/awesome#security * GitHub - blindfuzzy/LHF: A modular recon tool for pentesting [https://github.com/blindfuzzy/LHF * OSINT Framework [https://osintframework.com/ * danielmiessler/SecLists: SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. [https://github.com/danielmiessler/SecLists * g0tmi1k/mpc: MSFvenom Payload Creator (MSFPC) [https://github.com/g0tmi1k/mpc * DataSploit/datasploit: An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the raw data, and give data in multiple formats. [https://github.com/DataSploit/datasploit * famavott/osint-scraper: Social Recon [https://github.com/famavott/osint-scraper * GitHub - lcashdol/wppluginxss: Scripts I used to automate XSS discovery in wordpress plugins. [https://github.com/lcashdol/wppluginxss * wp-login-logger/wp-admin.php at master · lcashdol/wp-login-logger · GitHub [https://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.php * GitHub - jrespeto/maltrieve: A tool to retrieve malware directly from the source for security researchers. [https://github.com/jrespeto/maltrieve * GitHub - entropy1337/infernal-twin: wireless hacking - This is automated wireless hacking tool [https://github.com/entropy1337/infernal-twin * GitHub - s4n7h0/xvwa: XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security. [https://github.com/s4n7h0/xvwa * GitHub - entropy1337/MobileApp-Pentest-Cheatsheet: The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics. [https://github.com/entropy1337/MobileApp-Pentest-Cheatsheet * GitHub - entropy1337/awesome-web-hacking: A list of web application security [https://github.com/entropy1337/awesome-web-hacking * nahamsec/bbht: A script to set up a quick Ubuntu 17.10 x64 box with tools I use. [https://github.com/nahamsec/bbht * mitmproxy - an interactive HTTPS proxy [https://mitmproxy.org/ * Wh1t3Rh1n0/deb2kali: A Script to Convert Debian Linux into Kali Linux [https://github.com/Wh1t3Rh1n0/deb2kali * OlivierLaflamme/Cheatsheet-God: Penetration Testing / OSCP Biggest Reference Bank / Cheatsheet [https://github.com/OlivierLaflamme/Cheatsheet-God * GTFOBins [https://gtfobins.github.io/#+file%20upload * michalmalik/linux-re-101: A collection of resources for linux reverse engineering [https://github.com/michalmalik/linux-re-101 * GitHub - Re4son/mix-recon: Reconnaissance scripts for penetration testing [https://github.com/Re4son/mix-recon/ * GitHub - swagger-api/swagger-codegen: swagger-codegen contains a template-driven engine to generate documentation, API clients and server stubs in different languages by parsing your OpenAPI / Swagger definition. [https://github.com/swagger-api/swagger-codegen * the-book-of-secret-knowledge/README.md at master · trimstray/the-book-of-secret-knowledge [https://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md * GitHub - blindfuzzy/LHF: A modular recon tool for pentesting [https://github.com/blindfuzzy/LHF * OSINT Framework [https://osintframework.com/ * the-book-of-secret-knowledge/README.md at master · trimstray/the-book-of-secret-knowledge [https://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-toc * GitHub - Cillian-Collins/dirscraper: OSINT scanning tool which discovers and maps directories found in javascript files hosted on a website. [https://github.com/Cillian-Collins/dirscraper * GitHub - xillwillx/Sherlock [https://github.com/xillwillx/Sherlock * GitHub - codingo/VHostScan: A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages. [https://github.com/codingo/VHostScan * GitHub - rastating/shiva: An Ansible playbook to provision a host for penetration testing and CTF challenges [https://github.com/rastating/shiva * GitHub - blaCCkHatHacEEkr/PENTESTING-BIBLE: This repository was created and developed by Ammar Amer @cry__pto Only. Updates to this repository will continue to arrive until the number of links reaches 2000 links at any time soon.Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources. [https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE * GitHub - ngalongc/bug-bounty-reference: Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature [https://github.com/ngalongc/bug-bounty-reference * GitHub - OWASP/Amass: In-depth Attack Surface Mapping and Asset Discovery [https://github.com/OWASP/Amass * rowbot1 / Repositories · GitHub [https://github.com/rowbot1?tab=repositories * Instalar 4nonimizer Kali Linux - YouTube [https://www.youtube.com/watch?v=FQRuRmMkcDg * GitHub - swisskyrepo/ESIEA_SECURE_EDITION_2016: Write-up of the ESE CTF (FR) [https://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016 * GitHub - m4ll0k/WAScan: WAScan - Web Application Scanner [https://github.com/m4ll0k/WAScan * WebMap - Nmap Web Dashboard And Reporting - MORETIP [https://moretip.com/webmap-nmap-web-dashboard-and-reporting/ * security/privilege_escalation_-_linux.md at master · xapax/security · GitHub [https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.md * nahamsec/CMSFuzz [https://github.com/nahamsec/CMSFuzz * Memory Samples · volatilityfoundation/volatility Wiki · GitHub [https://github.com/volatilityfoundation/volatility/wiki/Memory-Samples * GitHub - RustyShackleford221/OSCP-Prep: A comprehensive guide/material for anyone looking to get into infosec or take the OSCP exam [https://github.com/RustyShackleford221/OSCP-Prep * Open-source-tools-for-CTI/README.md at master · BushidoUK/Open-source-tools-for-CTI · GitHub [https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.md * GitHub - jakejarvis/awesome-shodan-queries: 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻 [https://github.com/jakejarvis/awesome-shodan-queries * GitHub - rewardone/OSCPRepo: A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and reading material in 'BookmarkList' CherryTree. Reconscan Py2 and Py3. Custom ISO building. [https://github.com/rewardone/OSCPRepo * GitHub - rshipp/awesome-malware-analysis: Defund the Police. [https://github.com/rshipp/awesome-malware-analysis * GitHub - JusticeRage/Manalyze: A static analyzer for PE executables. [https://github.com/JusticeRage/Manalyze * GitHub - epinna/tplmap: Server-Side Template Injection and Code Injection Detection and Exploitation Tool [https://github.com/epinna/tplmap * GitHub - Sjord/jwtdemo: Practice hacking JWT tokens [https://github.com/Sjord/jwtdemo/ * GitHub - lmammino/jwt-cracker: Simple HS256 JWT token brute force cracker [https://github.com/lmammino/jwt-cracker * GitHub - LordNoteworthy/al-khaser: Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection. [https://github.com/LordNoteworthy/al-khaser * Open-source-tools-for-CTI/README.md at master · BushidoUK/Open-source-tools-for-CTI · GitHub [https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.md * GitHub - philhagen/sof-elk: Configuration files for the SOF-ELK VM, used in SANS FOR572 [https://github.com/philhagen/sof-elk * sof-elk/VM_README.md at main · philhagen/sof-elk · GitHub [https://github.com/philhagen/sof-elk/blob/main/VM_README.md * Bash-Oneliner | A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance. [https://onceupon.github.io/Bash-Oneliner/#awk * | Curated list of awesome lists | Project-Awesome.org [https://project-awesome.org/fabacab/awesome-cybersecurity-blueteam * GitHub - eteran/edb-debugger: edb is a cross-platform AArch32/x86/x86-64 debugger. [https://github.com/eteran/edb-debugger * GitHub - IvanVoronov/Scanners-Box: A powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑 [https://github.com/IvanVoronov/Scanners-Box * GitHub - Frissi0n/GTFONow: Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries [https://github.com/Frissi0n/GTFONow * GitHub - ehmatthes/pcc_2e: Online resources for Python Crash Course (Second Edition), from No Starch Press [https://github.com/ehmatthes/pcc_2e * GitHub - stanfrbd/searchcve [https://github.com/stanfrbd/searchcve * GitHub - PAPAMICA/scripts: Mes différents scripts [https://github.com/PAPAMICA/scripts * GitHub - samratashok/nishang: Nishang - Offensive PowerShell for red team, penetration testing and offensive security. [https://github.com/samratashok/nishang * GitHub - CompassSecurity/Hacking_Tools_Cheat_Sheet [https://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheet * GitHub - ffuf/ffuf: Fast web fuzzer written in Go [https://github.com/ffuf/ffuf * GitHub - carlospolop/PEASS-ng: PEASS - Privilege Escalation Awesome Scripts SUITE (with colors) [https://github.com/carlospolop/PEASS-ng * GitHub - x90skysn3k/brutespray: Brute-Forcing from Nmap output - Automatically attempts default creds on found services. [https://github.com/x90skysn3k/brutespray * ExploitEducation (Exploit Education) · GitHub [https://github.com/ExploitEducation * jivoi (EK_) / Repositories · GitHub [https://github.com/jivoi?tab=repositories * GitHub - payloadbox/command-injection-payload-list: 🎯 Command Injection Payload List [https://github.com/payloadbox/command-injection-payload-list * GitHub - gerryguy311/Free_CyberSecurity_Professional_Development_Resources: An awesome list of FREE resources for training, conferences, speaking, labs, reading, etc that are free. Originally built during COVID-19 for cybersecurity professionals with downtime can take advantage of to improve their skills and marketability to come out on the other side ready to rock. Now its taken on a life of its own and will persist, COVID be damned. [https://github.com/gerryguy311/Free_CyberSecurity_Professional_Development_Resources * GitHub - jagregory/abrash-zen-of-asm: Markdown source for Michael Abrash's Zen of Assembly Language (1990) [https://github.com/jagregory/abrash-zen-of-asm * Cyb3rWard0g (Roberto Rodriguez) [https://github.com/Cyb3rWard0g * GitHub - dievus/threader3000: Multi-threaded Python Port Scanner with Nmap Integration [https://github.com/dievus/threader3000 * GitHub - dievus/printspoofer [https://github.com/dievus/printspoofer * GitHub - kgretzky/evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication [https://github.com/kgretzky/evilginx2 * GitHub - muraenateam/muraena: Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities. [https://github.com/muraenateam/muraena * GitHub - drk1wi/Modlishka: Modlishka. Reverse Proxy. [https://github.com/drk1wi/Modlishka * GitHub - AlgoSecure/Pollenisator: Collaborative pentest tool with highly customizable tools [https://github.com/AlgoSecure/Pollenisator * GitHub - fluentpython/example-code-2e: Example code for Fluent Python, 2nd edition (O'Reilly, 2021) [https://github.com/fluentpython/example-code-2e * GitHub - dostoevskylabs/dostoevsky-pentest-notes: Notes for taking the OSCP in 2097. Read in book form on GitBook [https://github.com/dostoevskylabs/dostoevsky-pentest-notes * GitHub - NoorQureshi/kali-linux-cheatsheet: Kali Linux Cheat Sheet for Penetration Testers [https://github.com/NoorQureshi/kali-linux-cheatsheet * snowscan.io [https://snowscan.io/ * Ech0 - Hack The Box [https://blog.void.yt/HTB/index.html * GitHub - 0dayCTF/awesome-shodan-queries: 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻 [https://github.com/0dayCTF/awesome-shodan-queries * GitHub - skelsec/pypykatz: Mimikatz implementation in pure Python [https://github.com/skelsec/pypykatz * GitHub - sc0tfree/updog: Updog is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S, can set ad hoc SSL certificates and use http basic auth. [https://github.com/sc0tfree/updog * GitHub - NetSPI/PowerUpSQL: PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server [https://github.com/NetSPI/PowerUpSQL * GitHub - GTFOBins/GTFOBins.github.io: GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems [https://github.com/GTFOBins/GTFOBins.github.io * GitHub - pry0cc/axiom: The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more! [https://github.com/pry0cc/axiom * GitHub - LOLBAS-Project/LOLBAS: Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts) [https://github.com/LOLBAS-Project/LOLBAS * GitHub - jivoi/pentest: offsec batteries included [https://github.com/jivoi/pentest * GitHub - Ignitetechnologies/BurpSuite-For-Pentester [https://github.com/Ignitetechnologies/BurpSuite-For-Pentester * GitHub - curated-intel/Ukraine-Cyber-Operations: Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine. [https://github.com/curated-intel/Ukraine-Cyber-Operations * GitHub - Kirtar22/Presentations: Presentations [https://github.com/Kirtar22/Presentations * GitHub - Kirtar22/Litmus_Test: Detecting ATT&CK techniques & tactics for Linux [https://github.com/Kirtar22/Litmus_Test * GitHub - Z4nzu/hackingtool: ALL IN ONE Hacking Tool For Hackers [https://github.com/Z4nzu/hackingtool * How to install OWASP Juice Shop - OWASP Top 10 training - thehackerish [https://thehackerish.com/how-to-install-owasp-juice-shop/ * GitHub - juliocesarfort/public-pentesting-reports: Curated list of public penetration test reports released by several consulting firms and academic security groups [https://github.com/juliocesarfort/public-pentesting-reports * GitHub - PowerDNS-Admin/PowerDNS-Admin: A PowerDNS web interface with advanced features [https://github.com/PowerDNS-Admin/PowerDNS-Admin * Resources-For-Bug-Bounty [https://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388 * GitHub - h0ek/ransim: Ransomware simulator [https://github.com/h0ek/ransim * GitHub - tdubs/bgp-recon: Perform live BGP reconnaissance against telnet based Looking Glass servers - scripts and parsers [https://github.com/tdubs/bgp-recon * bugcrowd-levelup-subdomain-enumeration/README.md at master · appsecco/bugcrowd-levelup-subdomain-enumeration · GitHub [https://github.com/appsecco/bugcrowd-levelup-subdomain-enumeration/blob/master/README.md * GitHub - OWASP/CheatSheetSeries: The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics. [https://github.com/OWASP/CheatSheetSeries * CheatSheetSeries/cheatsheets at master · OWASP/CheatSheetSeries · GitHub [https://github.com/OWASP/CheatSheetSeries/tree/master/cheatsheets * GitHub - Clutchisback1/GIT_THEM: Just a quick and dirty little script import all the github goodies I like to play with. [https://github.com/Clutchisback1/GIT_THEM * Beefhooks! :: H4cklife!! — No-life it [https://h4cklife.org/beefhook/ * GitHub - ANSSI-FR/AD-control-paths: Active Directory Control Paths auditing and graphing tools [https://github.com/ANSSI-FR/AD-control-paths * Ciphey/README.md at master · Ciphey/Ciphey · GitHub [https://github.com/Ciphey/Ciphey/blob/master/translations/fr/README.md * GitHub - Orange-Cyberdefense/GOAD: game of active directory [https://github.com/Orange-Cyberdefense/GOAD * Game Of Active Directory v2 | Mayfly [https://mayfly277.github.io/posts/GOADv2/ * Active Directory Mindmap Upgrade | Mayfly [https://mayfly277.github.io/posts/Upgrade-Active-Directory-mindmap/ * GitHub - ageitgey/face_recognition: The world's simplest facial recognition api for Python and the command line [https://github.com/ageitgey/face_recognition * GitHub - JoelGMSec/PSRansom: PowerShell Ransomware Simulator with C2 Server [https://github.com/JoelGMSec/PSRansom * GitHub - codesiddhant/Jasmin-Ransomware: Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks. [https://github.com/codesiddhant/Jasmin-Ransomware * GitHub - lawndoc/RanSim: Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in a controlled setting. [https://github.com/lawndoc/RanSim * GitHub - leeberg/CashCatRansomwareSimulator: A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing various monitoring tools [https://github.com/leeberg/CashCatRansomwareSimulator * GitHub - sevagas/macro_pack: macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to final document generation. It also provides a lot of helpful features useful for redteam or security research. [https://github.com/sevagas/macro_pack * GitHub - redeye-framework/Redeye [https://github.com/redeye-framework/Redeye * GitHub - lobuhi/byp4xx: Pyhton script for HTTP 40X responses bypassing. Features: Verb tampering, headers, #bugbountytips, User-Agents, extensions, default credentials and fuzzing. [https://github.com/lobuhi/byp4xx * GitHub - D3Ext/AORT: All in One Recon Tool for Bug Bounty [https://github.com/D3Ext/AORT * D3Ext (D3Ext) · GitHub [https://github.com/D3Ext * nishang/Invoke-PowerShellTcpOneLine.ps1 at master · samratashok/nishang · GitHub [https://github.com/samratashok/nishang/blob/master/Shells/Invoke-PowerShellTcpOneLine.ps1 * GitHub - Processus-Thief/HEKATOMB: Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all DPAPI blob of all users from all computers and uses Domain backup keys to decrypt them. [https://github.com/Processus-Thief/HEKATOMB * GitHub - JohnHammond/notes: An Obsidian vault to Github Pages workflow to hopefully make me take notes [https://github.com/JohnHammond/notes * GitHub - jobindjohn/obsidian-publish-mkdocs: A Template to Publish Obsidian/Foam Notes on Github Pages (uses MkDocs) [https://github.com/jobindjohn/obsidian-publish-mkdocs * GitHub - trevorbryant/hacktop-popos: Ansible playbooks to install various utility and security tools to localhost [https://github.com/trevorbryant/hacktop-popos * GitHub - lfaoro/trailblaze: TrailBlaze 🔥 SSH Pentest & Audit [https://github.com/lfaoro/trailblaze * GitHub - RoganDawes/P4wnP1: P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W. [https://github.com/RoganDawes/P4wnP1 * GitHub - screetsec/TheFatRat: Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection . [https://github.com/screetsec/TheFatRat * GitHub - g0tmi1k/msfpc: MSFvenom Payload Creator (MSFPC) [https://github.com/g0tmi1k/msfpc * GitHub - scriptchildie/MaliciousVBA: Reverse shell macro using Word VBA [https://github.com/scriptchildie/MaliciousVBA * nishang/Shells at master · samratashok/nishang · GitHub [https://github.com/samratashok/nishang/tree/master/Shells * GitHub - tobor88/ReversePowerShell: Functions that can be used to gain Reverse Shells with PowerShell [https://github.com/tobor88/ReversePowerShell#ways-to-install-or-import-the-module * GitHub - 0xPoly/Centry: Panic button for protection against cold boot attacks [https://github.com/0xPoly/Centry * GitHub - justcallmekoko/Tinyduck: The super tiny USB Rubber Ducky [https://github.com/justcallmekoko/Tinyduck * GitHub - toolswatch/blackhat-arsenal-tools: Official Black Hat Arsenal Security Tools Repository [https://github.com/toolswatch/blackhat-arsenal-tools * OWASP OWTF [https://owtf.github.io/#download * GitHub - owtf/owtf: Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.org https://twitter.com/owtfp [https://github.com/owtf/owtf * GitHub - fabienvauchelles/scrapoxy: Scrapoxy hides your scraper behind a cloud. It starts a pool of proxies to send your requests. Now, you can crawl without thinking about blacklisting! [https://github.com/fabienvauchelles/scrapoxy * GitHub - yarrick/iodine: Official git repo for iodine dns tunnel [https://github.com/yarrick/iodine * GitHub - alebov/AD-lab: An active directory laboratory for penetration testing. [https://github.com/alebov/AD-lab * GitHub - lazywinadmin/PowerShell: PowerShell functions and scripts (Azure, Active Directory, SCCM, SCSM, Exchange, O365, ...) [https://github.com/lazywinadmin/PowerShell * Certstream [https://certstream.calidog.io/ * Reverse shells - The Portal of Knowledge [https://alamot.github.io/reverse_shells/ * https://github.com/mkaring/ConfuserEx/releases/tag/v1.6.0 [https://github.com/mkaring/ConfuserEx/releases/tag/v1.6.0 * GitHub - mkaring/ConfuserEx: An open-source, free protector for .NET applications [https://github.com/mkaring/ConfuserEx * GitHub - MysticRyuujin/guac-install: Script for installing Guacamole on Ubuntu [https://github.com/MysticRyuujin/guac-install * noVNC [https://novnc.com/info.html * GitHub - epi052/feroxbuster: A fast, simple, recursive content discovery tool written in Rust. [https://github.com/epi052/feroxbuster * WADComs [https://wadcoms.github.io/ * GitHub - WADComs/WADComs.github.io: WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments. [https://github.com/WADComs/WADComs.github.io * GitHub - rclone/rclone: "rsync for cloud storage" - Google Drive, S3, Dropbox, Backblaze B2, One Drive, Swift, Hubic, Wasabi, Google Cloud Storage, Yandex Files [https://github.com/rclone/rclone * GitHub - D1rkMtr/FilelessRemotePE: Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique [https://github.com/D1rkMtr/FilelessRemotePE * GitHub - hktalent/scan4all: Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)... [https://github.com/hktalent/scan4all * A script that prepares Kali by collecting many useful tools of trade in /root/tools directory, installing requirements, seting them up, preparing .bashrc etc. · GitHub [https://gist.github.com/mgeeky/39d1681e44804f089d1553cc7597e628 * NSSM - the Non-Sucking Service Manager [https://nssm.cc/ * Red Teaming Toolkit Collection - 0xsp SRD [https://0xsp.com/offensive/red-teaming-toolkit-collection/ * GitHub - cisagov/ScubaGear: Automation to assess the state of your M365 tenant against CISA's baselines [https://github.com/cisagov/ScubaGear * GitHub - tmenochet/PowerScan: Script collection for reconnaissance, post-exploitation & hunting on Windows networks [https://github.com/tmenochet/PowerScan * GitHub - Jon-Murray/PasswordStats: A tool to gather more thorough password statistics from password dumps. [https://github.com/Jon-Murray/PasswordStats * GitHub - iphelix/pack: PACK (Password Analysis and Cracking Kit) [https://github.com/iphelix/pack * The Web Application Hacker's Handbook - Task Checklist - Github-Flavored Markdown · GitHub [https://gist.github.com/jhaddix/6b777fb004768b388fefadf9175982ab * InfosecMatter (InfosecMatter) · GitHub [https://github.com/InfosecMatter * GitHub - choupit0/MassVulScan: Bash script which quickly identifies open network ports and any associated vulnerabilities / Script Bash qui permet d'identifier rapidement les ports réseaux ouverts et les éventuelles vulnérabilités associées. [https://github.com/choupit0/MassVulScan * GitHub - marcan/takeover.sh: Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to. [https://github.com/marcan/takeover.sh * Red Canary · GitHub [https://github.com/redcanaryco/ * GitHub - dionach/NtdsAudit: An Active Directory audit utility [https://github.com/dionach/NtdsAudit * GitHub - bambish/ScanQLi: SQLi scanner to detect SQL vulns [https://github.com/bambish/ScanQLi * ScanQLi — SQLi Scanner to Detect SQL Vulnerabilites | by Ismail Tasdelen | Medium [https://ismailtasdelen.medium.com/scanqli-sqli-scanner-to-detect-sql-vulnerabilites-ce23257d7a99 * fuzzdb/attack/sql-injection at master · fuzzdb-project/fuzzdb · GitHub [https://github.com/fuzzdb-project/fuzzdb/tree/master/attack/sql-injection * GitHub - utkusen/leviathan: wide range mass audit toolkit [https://github.com/utkusen/leviathan * GitHub - stamparm/DSSS: Damn Small SQLi Scanner [https://github.com/stamparm/DSSS * GitHub - awnumar/blind-sql-bitshifting: A blind SQL injection module that uses bitshfting to calculate characters. [https://github.com/awnumar/blind-sql-bitshifting * GitHub - codingo/NoSQLMap: Automated NoSQL database enumeration and web application exploitation tool. [https://github.com/codingo/NoSQLMap * GitHub - koutto/jok3r: Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework [https://github.com/koutto/jok3r * koutto (koutto) / Repositories · GitHub [https://github.com/koutto?tab=repositories * GitHub - FaVorith/recursive-virustotal: Recursively calculates the hash of all files in a given path and checks them against the Virustotal threat database [https://github.com/FaVorith/recursive-virustotal * GitHub - thehackingsage/kali-nethunter: Kali Nethunter for OnePlus 3T & MI9T [https://github.com/thehackingsage/kali-nethunter * GitHub - vs4vijay/MultiScanner: Security Tool which scans a target using OpenVAS, Zap, and Nexpose. And consolidates the scan result. [https://github.com/vs4vijay/MultiScanner * GitHub - vxunderground/MalwareSourceCode: Collection of malware source code for a variety of platforms in an array of different programming languages. [https://github.com/vxunderground/MalwareSourceCode * Scripts/Security at 7f22a727073ba1185e06b9ef42475f33279c645e · znb/Scripts · GitHub [https://github.com/znb/Scripts/tree/7f22a727073ba1185e06b9ef42475f33279c645e/Security * GitHub - docker/docker-bench-security: The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production. [https://github.com/docker/docker-bench-security * GitHub - finalduty/cis-benchmarks-audit: Simple command line tool to check for compliance against CIS Benchmarks [https://github.com/finalduty/cis-benchmarks-audit * GitHub - vulhub/vulhub: Pre-Built Vulnerable Environments Based on Docker-Compose [https://github.com/vulhub/vulhub * GitHub - JonGood/vulhub-lab: Automate building a home lab with vulnerable docker containers. [https://github.com/JonGood/vulhub-lab * GitHub - oliverwiegers/pentest_lab: Local penetration testing lab using docker-compose. [https://github.com/oliverwiegers/pentest_lab * GitHub - We5ter/Scanners-Box: A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑 [https://github.com/We5ter/Scanners-Box * GitHub - security-cheatsheet/wireshark-cheatsheet: Wireshark Cheat Sheet [https://github.com/security-cheatsheet/wireshark-cheatsheet * GitHub - Prashant-Bhapkar/Awesome-Security-Resources: Vulnerability Assessment and Penetration Testing Tools (Information Security / Cyber security) [https://github.com/Prashant-Bhapkar/Awesome-Security-Resources * GitHub - six2dez/reconftw: reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities [https://github.com/six2dez/reconftw * GitHub - six2dez/pentest-book [https://github.com/six2dez/pentest-book * six2dez (six2dez) · GitHub [https://github.com/six2dez * OSCP-Human-Guide/oscp_human_guide.md at master · six2dez/OSCP-Human-Guide · GitHub [https://github.com/six2dez/OSCP-Human-Guide/blob/master/oscp_human_guide.md * GitHub - AonCyberLabs/Windows-Exploit-Suggester: This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins. [https://github.com/AonCyberLabs/Windows-Exploit-Suggester * GitHub - six2dez/OneListForAll: Rockyou for web fuzzing [https://github.com/six2dez/OneListForAll * GitHub - six2dez/WebHackersWeapons: ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting [https://github.com/six2dez/WebHackersWeapons * GitHub - cytopia/pwncat: pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE) [https://github.com/cytopia/pwncat * GitHub - BishopFox/sliver: Adversary Emulation Framework [https://github.com/BishopFox/sliver * 0xor0ne (0xor0ne) · GitHub [https://github.com/0xor0ne * GitHub - 0xor0ne/awesome-list: My personal awesome list [https://github.com/0xor0ne/awesome-list * GitHub - anchore/grype: A vulnerability scanner for container images and filesystems [https://github.com/anchore/grype * GitHub - tanprathan/MobileApp-Pentest-Cheatsheet: The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics. [https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet * GitHub - asciimoo/wuzz: Interactive cli tool for HTTP inspection [https://github.com/asciimoo/wuzz * GitHub - aaaguirrep/offensive-docker: Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets. [https://github.com/aaaguirrep/offensive-docker?s=09 * GitHub - 0xJs/RedTeaming_CheatSheet: Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date. [https://github.com/0xJs/RedTeaming_CheatSheet?s=09 * GitHub - FortyNorthSecurity/Egress-Assess: Egress-Assess is a tool used to test egress data detection capabilities [https://github.com/FortyNorthSecurity/Egress-Assess * GitHub - c4s73r/NetworkNightmare: Network Pentesting Mindmap by Caster [https://github.com/c4s73r/NetworkNightmare * GitHub - sensepost/JBaah: HTTP Brute Forcer (Java replacement for SP's CrowBar). [https://github.com/sensepost/JBaah * GitHub - knassar702/scant3r: ScanT3r - Module based Bug Bounty Automation Tool [https://github.com/knassar702/scant3r * AllVideoPocsFromHackerOne/weakness at main · zeroc00I/AllVideoPocsFromHackerOne · GitHub [https://github.com/zeroc00I/AllVideoPocsFromHackerOne/tree/main/weakness?s=09 * GitHub - woj-ciech/Kamerka-GUI: Ultimate Internet of Things/Industrial Control Systems reconnaissance tool. [https://github.com/woj-ciech/Kamerka-GUI * GitHub - cipher387/osint_stuff_tool_collection: A collection of several hundred online tools for OSINT [https://github.com/cipher387/osint_stuff_tool_collection * GitHub - khast3x/Redcloud: Automated Red Team Infrastructure deployement using Docker [https://github.com/khast3x/Redcloud * Build Your Own Cybersecurity Lab and Cyber Range - Omar Santos [https://h4cker.org/labs/ * GitHub - The-Art-of-Hacking/h4cker: This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more. [https://github.com/The-Art-of-Hacking/h4cker * Mindmap/Mitre Attack at main · Ignitetechnologies/Mindmap · GitHub [https://github.com/Ignitetechnologies/Mindmap/tree/main/Mitre%20Attack?s=09 * GitHub - dievus/Active-Directory-Exploitation-Cheat-Sheet: A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. [https://github.com/dievus/Active-Directory-Exploitation-Cheat-Sheet * GitHub - dievus/PowerShellForPentesters: Course repository for PowerShell for Pentesters Course [https://github.com/dievus/PowerShellForPentesters * GitHub - Integration-IT/Active-Directory-Exploitation-Cheat-Sheet: A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. [https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet * vmware-host-modules/INSTALL at master · mkubecek/vmware-host-modules · GitHub [https://github.com/mkubecek/vmware-host-modules/blob/master/INSTALL * GitHub - vitaly-kamluk/bitscout: Remote forensics meta tool [https://github.com/vitaly-kamluk/bitscout * GitHub - meirwah/awesome-incident-response: A curated list of tools for incident response [https://github.com/meirwah/awesome-incident-response#disk-image-creation-tools * GitHub - vulnersCom/nmap-vulners: NSE script based on Vulners.com API [https://github.com/vulnersCom/nmap-vulners?rel=nofollow,noopener,noreferrer&target=_blank * GitHub - AfvanMoopen/tryhackme-: All Solutions [https://github.com/AfvanMoopen/tryhackme- * GitHub - Cimihan123/VulnLab [https://github.com/Cimihan123/VulnLab * GitHub - veggiemonk/awesome-docker: A curated list of Docker resources and projects [https://github.com/veggiemonk/awesome-docker * GitHub - Orange-Cyberdefense/GOAD: game of active directory [https://github.com/Orange-Cyberdefense/GOAD?s=09 * Game Of Active Directory v2 | Mayfly [https://mayfly277.github.io/posts/GOADv2/?s=09 * Offensive Security Cheatsheet [https://cheatsheet.haax.fr/web-pentest/tools/ffuf/ * nishang/Get-WebCredentials.ps1 at master · samratashok/nishang · GitHub [https://github.com/samratashok/nishang/blob/master/Gather/Get-WebCredentials.ps1 * GitHub - mdiplo/Medias_francais: Qui possède quoi ? [https://github.com/mdiplo/Medias_francais * GitHub - deepfence/ThreatMapper: Open source cloud native security observability platform. Linux, K8s, AWS Fargate and more. [https://github.com/deepfence/ThreatMapper * GitHub - d3mondev/puredns: Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries. [https://github.com/d3mondev/puredns * Trickest · GitHub [https://github.com/trickest * GitHub - trimstray/sandmap: Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles. [https://github.com/trimstray/sandmap * GitHub - KevOtt/AD-Lab-Generator: Tool for populating an Active Directory Lab with a randomized set of users and groups. [https://github.com/KevOtt/AD-Lab-Generator * GitHub - superkojiman/onetwopunch: Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans. [https://github.com/superkojiman/onetwopunch * GitHub - infosecn1nja/Red-Teaming-Toolkit: This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter. [https://github.com/infosecn1nja/Red-Teaming-Toolkit?s=09 * GitHub - infosecn1nja/Red-Teaming-Toolkit: This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter. [https://github.com/infosecn1nja/Red-Teaming-Toolkit?s=09#Reconnaissance * GitHub - AutomatedLab/AutomatedLab: AutomatedLab is a provisioning solution and framework that lets you deploy complex labs on HyperV and Azure with simple PowerShell scripts. It supports all Windows operating systems from 2008 R2 to 2022, some Linux distributions and various products like AD, Exchange, PKI, IIS, etc. [https://github.com/AutomatedLab/AutomatedLab * GitHub - WazeHell/vulnerable-AD: Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab [https://github.com/WazeHell/vulnerable-AD * GitHub - chvancooten/CloudLabsAD: Terraform + Ansible deployment scripts for an Active Directory lab environment. [https://github.com/chvancooten/CloudLabsAD * GitHub - dievus/PowerShellForPentesters: Course repository for PowerShell for Pentesters Course [https://github.com/dievus/PowerShellForPentesters/ * GitHub - gephi/gephi: Gephi - The Open Graph Viz Platform [https://github.com/gephi/gephi * AnonUD4Y / HiddenEye · GitLab [https://gitlab.com/An0nUD4Y/hiddeneye * GitHub - owasp-amass/amass: In-depth attack surface mapping and asset discovery [https://github.com/owasp-amass/amass * Releases · owasp-amass/amass [https://github.com/owasp-amass/amass/releases * GitHub - s0md3v/be-a-hacker: roadmap for a self-taught hacker [https://github.com/s0md3v/be-a-hacker * GitHub - Zeyad-Azima/Offensive-Resources: A Huge Learning Resources with Labs For Offensive Security Players [https://github.com/Zeyad-Azima/Offensive-Resources?s=09 * GitHub - m3n0sd0n4ld/GooFuzz: GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking). [https://github.com/m3n0sd0n4ld/GooFuzz * GitHub - s0md3v/JShell: JShell - Get a JavaScript shell with XSS. [https://github.com/s0md3v/JShell * GitHub - i3visio/osrframework: OSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accurate online researches. [https://github.com/i3visio/osrframework * Pentest Everything - Pentest Everything [https://viperone.gitbook.io/pentest-everything/ * GitHub - x4nth055/ethical-hacking-tools-python: Python programs & tools built in the Ethical Hacking with Python EBook [https://github.com/x4nth055/ethical-hacking-tools-python * GitHub - google/tsunami-security-scanner: Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence. [https://github.com/google/tsunami-security-scanner * GitHub - activecm/passer: Passive service locator, a python sniffer that identifies servers, clients, names and much more [https://github.com/activecm/passer * GitHub - activecm/threat-tools: Tools for simulating threats [https://github.com/activecm/threat-tools * GitHub - cisagov/cset: Cybersecurity Evaluation Tool [https://github.com/cisagov/cset * GitHub - Ne0nd0g/merlin: Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang. [https://github.com/Ne0nd0g/merlin * GitHub - OWASP/Nettacker: Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management [https://github.com/OWASP/Nettacker * pentesting-tools · GitHub Topics · GitHub [https://github.com/topics/pentesting-tools * GitHub - 0xffsec/webdojo: A learning and testing environment for web application hacking and pentesting. [https://github.com/0xffsec/webdojo * GitHub - Porchetta-Industries/CrackMapExec: A swiss army knife for pentesting networks [https://github.com/Porchetta-Industries/CrackMapExec * GitHub - mpgn/CrackMapExec: A swiss army knife for pentesting networks [https://github.com/mpgn/CrackMapExec * snovvcrash’s gists · GitHub [https://gist.github.com/snovvcrash/ * README - Pentester's Promiscuous Notebook [https://ppn.snovvcrash.rocks/ * GitHub - aas-n/spraykatz: Credentials gathering tool automating remote procdump and parse of lsass process. [https://github.com/aas-n/spraykatz * Invuls / Pentest projects / Pentest-Collaboration-Framework · GitLab [https://gitlab.com/invuls/pentest-projects/pcf * GitHub - adamcorvin/homeserver [https://github.com/adamcorvin/homeserver * h4cker/bug-bounties at master · The-Art-of-Hacking/h4cker · GitHub [https://github.com/The-Art-of-Hacking/h4cker/tree/master/bug-bounties * topotam (topotam) / Repositories · GitHub [https://github.com/topotam?tab=repositories * h4cker/web_application_testing at master · The-Art-of-Hacking/h4cker · GitHub [https://github.com/The-Art-of-Hacking/h4cker/tree/master/web_application_testing * GitHub - INIT6Source/Hacker_Hiring_Discords: List of Hacker/Infosec/CyberSec Discord servers with Hiring/Jobs/Career channels [https://github.com/INIT6Source/Hacker_Hiring_Discords * GitHub - HowToFind-bot/osint-tools: OSINT open-source tools catalog [https://github.com/HowToFind-bot/osint-tools * GitHub - wuseman/EMAGNET: Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password together from recent uploads from https://pastebin.com. Bruteforce support for spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts [https://github.com/wuseman/EMAGNET * GitHub - rng70/TryHackMe-Roadmap: a list of 350+ Free TryHackMe rooms to start learning cybersecurity with THM [https://github.com/rng70/tryhackme-roadmap * Hacking-Resources/Burp Suite/Burp Suite Cookbook.pdf at master · rng70/Hacking-Resources · GitHub [https://github.com/rng70/Hacking-Resources/blob/master/Burp%20Suite/Burp%20Suite%20Cookbook.pdf * GitHub - rng70/Hacking-Resources: This repository contains some resources for ethical hackers penetration tester 😊 This may contain some files, tools, books, and links that need to be used for good purposes only. Do not do any illegal work using these sources. [https://github.com/rng70/Hacking-Resources#book-list * Hacking-Resources/Bug Bounty/Bug bounty Hunting.pdf at master · rng70/Hacking-Resources · GitHub [https://github.com/rng70/Hacking-Resources/blob/master/Bug%20Bounty/Bug%20bounty%20Hunting.pdf * GitHub - hideckies/aut0rec0n: An automatic reconnaissance command-line tool. [https://github.com/hideckies/aut0rec0n * GitHub - hideckies/fuzzagotchi: Automatic web fuzzer. [https://github.com/hideckies/fuzzagotchi * GitHub - LittleJake/ip-blacklist: Plaintext blacklist IP, update 4 hourly. [https://github.com/LittleJake/ip-blacklist * Offensive Security Cheatsheet [https://cheatsheet.haax.fr/open-source-intelligence-osint/platforms-hunting/tinder/ * GitHub - gpakosz/.tmux: 🇫🇷 Oh my tmux! My self-contained, pretty & versatile tmux configuration made with ❤️ [https://github.com/gpakosz/.tmux/tree/master * GitHub - foobarto/redteam-notebook: Collection of commands, tips and tricks and references I found useful during preparation for OSCP exam. [https://github.com/foobarto/redteam-notebook * redteam-notebook/ at master · foobarto/redteam-notebook · GitHub [https://github.com/foobarto/redteam-notebook?search=1 * OWASP OWTF [https://owtf.github.io/ * OWASP OWTF · GitHub [https://github.com/owtf/ * GitHub - fin3ss3g0d/evilgophish: evilginx3 + gophish [https://github.com/fin3ss3g0d/evilgophish * AVIator - Antivirus Evasion Project [https://www.kitploit.com/2023/01/aviator-antivirus-evasion-project.html * Tableaunoir [https://tableaunoir.github.io/ * GitHub - decoder-it/LocalPotato [https://github.com/decoder-it/LocalPotato * GitHub - GhostPack/SharpRoast: DEPRECATED SharpRoast is a C# port of various PowerView's Kerberoasting functionality. [https://github.com/GhostPack/SharpRoast * GitHub - threatexpress/random_c2_profile: Cobalt Strike random C2 Profile generator [https://github.com/threatexpress/random_c2_profile * https://www.localpotato.com/localpotato_html/LocalPotato.html [https://www.localpotato.com/localpotato_html/LocalPotato.html * GitHub - swisskyrepo/Wordpresscan: WPScan rewritten in Python + some WPSeku ideas [https://github.com/swisskyrepo/Wordpresscan * GitHub - outflanknl/RedELK: Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations. [https://github.com/outflanknl/RedELK * GitHub - IppSec/forward-shell [https://github.com/IppSec/forward-shell/tree/master * Parrot Security [https://parrotlinux.org/download/ * Home [https://netbox.dev/ * GitHub - HuntDownProject/HEDnsExtractor: raw html extractor from Hurricane Electric portal [https://github.com/HuntDownProject/HEDnsExtractor * GitHub - sator-sdk/DNS-Enumeration: DNS enumeration techniques and commands [https://github.com/sator-sdk/DNS-Enumeration * ddos-attack-tools · GitHub Topics · GitHub [https://github.com/topics/ddos-attack-tools?o=desc&s=updated * GitHub - wazuh/wazuh: Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads. [https://github.com/wazuh/wazuh * GitHub - BankSecurity/Red_Team: Some scripts useful for red team activities [https://github.com/BankSecurity/Red_Team * GitHub - shr3ddersec/Shr3dKit: Red Team Tool Kit [https://github.com/shr3ddersec/Shr3dKit * GitHub - DataDog/stratus-red-team: :cloud: Granular, Actionable Adversary Emulation for the Cloud [https://github.com/DataDog/stratus-red-team * GitHub - RedTeamOperations/RedCloud-OS: RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers (CSPs) [https://github.com/RedTeamOperations/RedCloud-OS * GitHub - mohamedhossam07/SimpleRedTeamTechniques: Simple implementation of cybersecurity offensive tools [https://github.com/mohamedhossam07/SimpleRedTeamTechniques * hakanonymos (hakanonymos) · GitHub [https://github.com/hakanonymos * GitHub - brootware/awesome-cyber-security-university: 🎓 Because Education should be free. Contributions welcome! 🕵️ [https://github.com/brootware/awesome-cyber-security-university * evilsocket (evilsocket) / Repositories · GitHub [https://github.com/evilsocket?tab=repositories * GitHub - decalage2/awesome-security-hardening: A collection of awesome security hardening guides, tools and other resources [https://github.com/decalage2/awesome-security-hardening * GitHub - Harden365/Harden365: Protect your data in minutes ! [https://github.com/Harden365/Harden365 * pentest · GitHub Topics · GitHub [https://github.com/topics/pentest * GitHub - A-poc/RedTeam-Tools: Tools and Techniques for Red Team / Penetration Testing [https://github.com/A-poc/RedTeam-Tools#evilgophish * GitHub - teamghsoftware/security-cheatsheets: CHEAT SHEET DE SEGURIDAD PARA ETHICAL HACKING & PENETRATION TESTING [https://github.com/teamghsoftware/security-cheatsheets * Create Active Directory Test Environment (Complete Guide) - Active Directory Pro [https://activedirectorypro.com/create-active-directory-test-environment/#lesson-3 * External - Web - HTB Academy (CPTS) [https://nukercharlie.gitbook.io/htb-academy-cpts/ * jakescheetz (jakescheetz) / Repositories · GitHub [https://github.com/jakescheetz?tab=repositories * GitHub - jakescheetz/OSCP: High level cheatsheet that was designed to make checks on the OSCP more manageable. This repository however could also be used for your own studying or for evaluating test systems like on HackTheBox or TryHackMe. DM me via Twitter (@FindingUrPasswd) to request any specific additions to the content that you think would also be helpful! [https://github.com/jakescheetz/OSCP * GitHub - rackerlabs/scantron: A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API client for automation workflows. [https://github.com/rackerlabs/scantron * GitHub - rackerlabs/scantron: A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API client for automation workflows. [https://github.com/rackerlabs/scantron/tree/master * GitHub - sysdream/ligolo: Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/ [https://github.com/sysdream/ligolo * GitHub - anderspitman/awesome-tunneling: List of ngrok alternatives and other ngrok-like tunneling software and services. Focus on self-hosting. [https://github.com/anderspitman/awesome-tunneling * GitHub - xli1996/Simple_ransomware: Simple ransomware that is used to study better defense ways [https://github.com/xli1996/Simple_ransomware * GitHub - deadbits/vigil-llm: ⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs [https://github.com/deadbits/vigil-llm * GitHub - AlteredSecurity/365-Stealer: 365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack. [https://github.com/AlteredSecurity/365-Stealer * GitHub - wifiphisher/wifiphisher: The Rogue Access Point Framework [https://github.com/wifiphisher/wifiphisher * GitHub - htr-tech/zphisher: An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit ! [https://github.com/htr-tech/zphisher * Powershell Script to keep the mouse moving · GitHub [https://gist.github.com/MatthewSteeples/ce7114b4d3488fc49b6a#file-mousemove-ps1 * GitHub - MalwareSamples/Linux-Malware-Samples: Linux Malware Sample Archive including various types of malicious ELF binaries and viruses. Be careful! [https://github.com/MalwareSamples/Linux-Malware-Samples * Flangvik (Flangvik) / Repositories · GitHub [https://github.com/Flangvik?tab=repositories * GitHub - djadmin/awesome-bug-bounty: A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups. [https://github.com/djadmin/awesome-bug-bounty * GitHub - detectify/cs-challenge: Detectify Crowdsource Challenge [https://github.com/detectify/cs-challenge * GitHub - davidprowe/BadBlood: BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time. [https://github.com/davidprowe/BadBlood * GitHub - its-a-feature/Mythic: A collaborative, multi-platform, red teaming framework [https://github.com/its-a-feature/Mythic * GitHub - bats3c/darkarmour: Windows AV Evasion [https://github.com/bats3c/darkarmour * GitHub - fortra/impacket: Impacket is a collection of Python classes for working with network protocols. [https://github.com/fortra/impacket * GitHub - berylliumsec/nebula: AI-Powered Ethical Hacking Assistant [https://github.com/berylliumsec/nebula#compatibility * GitHub - berylliumsec/nebula: AI-Powered Ethical Hacking Assistant [https://github.com/berylliumsec/nebula * GitHub - Casualtek/Cyberwatch: Building a consolidated RSS feed for articles about cyberattacks [https://github.com/Casualtek/Cyberwatch * Casualtek (Casualtek) / Repositories · GitHub [https://github.com/Casualtek?tab=repositories * GitHub - JMousqueton/Badware: Ransomware for demonstration [https://github.com/jmousqueton/badware * GitHub - JMousqueton/CTI-MSTeams-Bot: 🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴☠️ [https://github.com/JMousqueton/CTI-MSTeams-Bot * nebula: AI-Powered Ethical Hacking Assistant [https://securityonline.info/nebula-ai-powered-ethical-hacking-assistant/ * GitHub - Hackstur/JokerShell: PowerShell pranks pack for trolling coworkers [https://github.com/Hackstur/JokerShell/tree/master * GitHub - MalwareSamples/Malware-Feed: Bringing you the best of the worst files on the Internet. [https://github.com/MalwareSamples/Malware-Feed/tree/master * GitHub - enaqx/awesome-pentest: A collection of awesome penetration testing resources, tools and other shiny things [https://github.com/enaqx/awesome-pentest#web-exploitation * GitHub - Velocidex/velociraptor: Digging Deeper.... [https://github.com/Velocidex/velociraptor
Python
* https://www.geeksforgeeks.org/python-programming-language/?ref=lbp [https://www.geeksforgeeks.org/python-programming-language/?ref=lbp * https://www.py4e.com/ [https://www.py4e.com/ * https://www.geeksforgeeks.org/python-3-basics/ [https://www.geeksforgeeks.org/python-3-basics/ * https://www.pierre-giraud.com/python-apprendre-programmer-cours/ [https://www.pierre-giraud.com/python-apprendre-programmer-cours/ * https://www.pierre-giraud.com/python-apprendre-programmer-cours/ [https://www.pierre-giraud.com/python-apprendre-programmer-cours/ * https://riptutorial.com/python/awesome-learning/tutorial [https://riptutorial.com/python/awesome-learning/tutorial * https://www.programiz.com/python-programming/online-compiler/ [https://www.programiz.com/python-programming/online-compiler/ * https://riptutorial.com/ebook/python [https://riptutorial.com/ebook/python * https://www.sololearn.com/ [https://www.sololearn.com/ * https://www.youtube.com/watch?v=oUJolR5bX6g [https://www.youtube.com/watch?v=oUJolR5bX6g * https://www.youtube.com/watch?v=LamjAFnybo0 [https://www.youtube.com/watch?v=LamjAFnybo0 * https://www.docstring.fr/formations/parcours/la-formation-complete-python [https://www.docstring.fr/formations/parcours/la-formation-complete-python * https://www.w3schools.com/python/ [https://www.w3schools.com/python/ * https://www.guru99.com/python-tutorials.html [https://www.guru99.com/python-tutorials.html * https://developers.google.com/edu/python/ [https://developers.google.com/edu/python/ * https://pymbook.readthedocs.io/en/latest/index.html [https://pymbook.readthedocs.io/en/latest/index.html * https://www.sans.org/cyberaces/system-administration/ [https://www.sans.org/cyberaces/system-administration/ * https://openclassrooms.com/fr/paths/556-developpeur-web [https://openclassrooms.com/fr/paths/556-developpeur-web * https://github.com/ageitgey/face_recognition [https://github.com/ageitgey/face_recognition * https://zestedesavoir.com/tutoriels/2514/un-zeste-de-python/ [https://zestedesavoir.com/tutoriels/2514/un-zeste-de-python/ * https://www.dr-chuck.com/ [https://www.dr-chuck.com/ * https://www.youtube.com/watch?v=UjeNA_JtXME&list=PLlRFEj9H3Oj7Bp8-DfGpfAfDBiblRfl5p [https://www.youtube.com/watch?v=UjeNA_JtXME&list=PLlRFEj9H3Oj7Bp8-DfGpfAfDBiblRfl5p * https://www.programiz.com/python-programming/online-compiler/ [https://www.programiz.com/python-programming/online-compiler/ * https://www.sololearn.com/ [https://www.sololearn.com/ * PY4E - Python for Everybody [https://www.py4e.com/lessons/memory * Python for Everybody - Full University Python Course - YouTube [https://www.youtube.com/watch?v=8DvywoWv6fI&list=RDLV8DvywoWv6fI&start_radio=1&rv=8DvywoWv6fI&t=526 * Lesson 1 - Python Programming (Automate the Boring Stuff with Python) - YouTube [https://www.youtube.com/watch?v=1F_OgqRuSdI&list=PL0-84-yl1fUnRuXGFe_F7qSH1LEnn9LkW * Lesson 2 - Python Programming (Automate the Boring Stuff with Python) - YouTube [https://www.youtube.com/watch?v=7qHMXu99d88&list=PL0-84-yl1fUnRuXGFe_F7qSH1LEnn9LkW&index=2 * 01 Character Input [https://www.practicepython.org/exercise/2014/01/29/01-character-input.html * Learn How to Code | Codecademy [https://www.codecademy.com/learn/learn-how-to-code * futurecoder : Le code du futur, c'est vous ! [https://fr.futurecoder.io/ * Python on Exercism [https://exercism.org/users/sign_in * Python programming language Tutorial - Mind Luster [https://www.mindluster.com/certificate/40 * Python Code - Python Programming Tutorials and Recipes [https://thepythoncode.com/ * Ethical Hacking Tutorials - Python Code [https://thepythoncode.com/topic/ethical-hacking * Ouverture et lecture des fichiers en Python – Très Facile [https://www.tresfacile.net/ouverture-et-lecture-des-fichiers-en-python/ * Cours Python – Très Facile [https://www.tresfacile.net/cours-python/ * Developer Roadmaps - roadmap.sh [https://roadmap.sh/ * Course Outline | Zero To Mastery Academy [https://academy.zerotomastery.io/courses/694968/lectures/12410323 * Un bref guide de Python dans la cybersécurité [https://geekflare.com/fr/python-in-cybersecurity/
APPRENDRE
* Skilleos | Cours pour Professionnels en ligne | Skilleos [https://www.skilleos.com/pro?orderBy=ranking * Neurosciences : les méandres du cerveau - Replay [https://replay.bpi.fr/captations/neurosciences-les-meandres-du-cerveau/ * Tyler Vigen (@TylerVigen) / X [https://twitter.com/TylerVigen * https://www.serious-games.simulang.com/en/games [https://www.serious-games.simulang.com/en/games * À la Une du Replay - Replay [https://replay.bpi.fr/ * Exposition Illusions, vous n'allez pas y croire ! [https://www.illusions-expo.be/ressources/ * Nuage d'étiquettes - jeunessejecoute.ca [https://jeunessejecoute.ca/nuage-detiquettes/?etiquettes=outils-de-pleine-conscience * Biais Cognitifs | Codex des Biais Cognitifs [https://inertian.wixsite.com/codexbiais
ANGLAIS
* engine - pronunciation of engine by Macmillan Dictionary [https://www.macmillandictionary.com/pronunciation/british/engine * NBC News NOW | NBC News [https://www.nbcnews.com/now?icid=now_hp_header * CBS News Live -CBS News [https://www.cbsnews.com/live/#x * ABC News Live - ABC News [https://abcnews.go.com/Live * Voice of America - Learn American English with VOA Learning English [https://learningenglish.voanews.com/ * LanguageTool - Online Grammar, Style & Spell Checker [https://languagetool.org/#plugins * https://langonaute.com/ [https://langonaute.com/ * Top 2000 English Vocabulary Words used in Speaking [https://www.talkenglish.com/vocabulary/top-2000-vocabulary.aspx * Reverso | Traduction gratuite, Dictionnaire, Grammaire [https://www.reverso.net/text_translation.aspx?lang=FR * RhinoSpike : English Recordings [https://rhinospike.com/language/eng/recordings/ * Learn English with EnglishClass101.com - YouTube [https://www.youtube.com/user/ENGLISHCLASS101/videos * Apprendre des Langues Gratuitement avec de la Musique! [https://fr.lyricstraining.com/ * International Crises and Verb Forms [https://learningenglish.voanews.com/a/international-crises-and-verb-forms/6464983.html * ESL English Listening & Adult Literacy - News - Audiobooks - Songs - Radio Dramas [https://esl-bits.net/ESL.English.Listening.Short.Stories/ESL.Listening.Short.Stories.html * English Exercises ESL [https://agendaweb.org/ * Apprendre l'anglais | Cambridge English [https://www.cambridgeenglish.org/ch/fr/learning-english/ * HowStuffWorks - Learn How Everything Works! [https://www.howstuffworks.com/ * SC Media | How EDR was supposed to help with alert overload [https://www.scmagazine.com/video/endpoint-security/how-edr-was-supposed-to-help-with-alert-overload * Online English Language Practice Events | Pep Talk Radio [https://www.peptalkradio.com/english-language-club/ * Beginner to pre-intermediate | LearnEnglish [https://learnenglish.britishcouncil.org/grammar/beginner-to-pre-intermediate * Pre-Intermediate Grammar | Past Simple or Past Continuous Exercise | esl-lounge Student [https://www.esl-lounge.com/student/grammar/2g50-past-simple-or-past-continuous-worksheet.php * BBC Radio - 6 Minute English - Downloads [https://www.bbc.co.uk/programmes/p02pc9tn/episodes/downloads * Speak Better English with Harry | Podcast on Spotify [https://open.spotify.com/show/4NHIIVB3DkjH70yhE3pbcd * Simple Past and Past Continuous Exercise | ENGLISH PAGE [https://www.englishpage.com/verbpage/verbs3.htm * Past Simple and Past Continuous Exercise 2 [https://www.perfect-english-grammar.com/past-simple-past-continuous-exercise-2.html * English for Schools - Kids - l'univers dédié aux enfants [https://kids.englishforschools.fr/ * Matt Cutts: Try something new for 30 days | TED Talk [https://www.ted.com/talks/matt_cutts_try_something_new_for_30_days?language=en&subtitle=fr * Speak & Improve [https://app.speakandimprove.com/ * HelloTalk | Free Language Exchange | Language Partners [https://www.hellotalk.com/?lang=fr * Border Crossings [https://www.voanews.com/live/audio/60 * 3 Steps to Quiet Confidence in Business English (Podcast) [https://www.allearsenglish.com/aee-1815-3-step-formula-to-convey-quiet-confidence-in-english/ * Speak English Now Podcast with Georgiana's mini-stories [https://speakenglishpodcast.com/types-of-humor-in-english/ * Podcast - Speak English Now Podcast with Georgiana's mini-stories - Speak English Podcast with Online English teacher Georgiana [https://speakenglishpodcast.com/podcast/ * Créer un compte gratuit - Memrise [https://app.memrise.com/bienvenue#1 * HelloTalk | Free Language Exchange | Language Partners [https://www.hellotalk.com/ * Langotalk: Learn Languages 6x Faster with AI [https://www.langotalk.org/onboarding/OnboardingAccount * Lessons Worth Sharing | TED-Ed [https://ed.ted.com/lessons?direction=desc&sort=featured-position * Beginner & elementary exercises (A1 – A2 level) page 1 – Speakspeak [https://speakspeak.com/english-grammar-exercises/elementary * Apprendre des Langues Gratuitement avec de la Musique! [https://fr.lyricstraining.com/#nr * Speak English with Gliglish 🇺🇸 [https://gliglish.com/convo/93aff4e5-9944-403e-9403-c0adce833fff * 30 Day Meditation Challenge for Beginners - One Mind Dharma [https://oneminddharma.com/30-day-meditation-challenge/ * Index of /Ebook/ [https://ielts-house.net/Ebook/ * Index of /books/ [https://www.ircambridge.com/books/ * a | Search Online Etymology Dictionary [https://www.etymonline.com/search?q=a
Podcast
* Coalcast :: H4cklife!! — No-life it [https://h4cklife.org/coalcast/ * LINC [http://linc.cnil.fr/ * SHAttered - CloudBleed - NoLimitSecu [https://www.nolimitsecu.fr/shattered-cloudbleed/ * Alertes | Accompagnement Cybersécurité des Structures de Santé [https://cyberveille-sante.gouv.fr/alertes * Security Strategy – phoenixNAP Blog [https://phoenixnap.com/blog/category/security-strategy * Learning English Broadcast [https://learningenglish.voanews.com/a/4789244.html?withmediaplayer=1 * Podcast [https://learningenglish.voanews.com/podcasts * Podcasts : Technology : NPR [https://www.npr.org/podcasts/2061/technology * English Speaking Video Lessons [https://www.talkenglish.com/video/english-speaking-video.aspx * securitycast [http://headshot.ambersail.net/securitycast * Liste des Podcasts sur la Cyber et la Sécurité - Space & Cybersecurity Info [https://www.spacesecurity.info/liste-des-podcast-secu/ * NoLimitSecu - Podcast dédié à la cyber sécurité [https://www.nolimitsecu.fr/ * Le Comptoir Sécu : Le Comptoir Sécu [https://www.comptoirsecu.fr/ * Hackstock | Podcast [https://hackstock.net/podcasts * Des podcasts Tech à écouter en français - Human Coders Blog [https://blog.humancoders.com/podcast-tech-francais-2649/ * La French Connection - Episodes [https://securite.fm/ * BtoBradio.TV | Cyber Radio.TV - L'invité [https://btobradio.tv/radios/cyber-radio-tv/linvite-10 * BtoBradio.TV | Accueil [https://btobradio.tv/ * NoLimitSecu - Page 2 sur 45 - Podcast dédié à la cyber sécurité [https://www.nolimitsecu.fr/page/2/ * Podcast francophone de sensibilisation & vulgarisation de la cybersécurité [https://www.cybersecuriteallday.fr/ * Objectif CYBER - Capgemini France [https://www.capgemini.com/fr-fr/perspectives/publications/objectif-cyber/ * La cybersécurité expliquée à ma grand-mère | Ausha [https://podcast.ausha.co/la-cyber-securite-expliquee-a-ma-grand-mere * Distorsion - Des histoires étranges de l'ère numérique - Podcast Québécois [https://www.distorsionpodcast.com/ * 0x20 - @BitK_ & @sakiirsecurity | Objectif top10 CtfTime, faire un bon ctf, les voyages, une anecdote croustillante par Hack'n Speak [https://podcasters.spotify.com/pod/show/hacknspeak/ * Riskintel Média | Nos émissions [https://www.riskintel.fr/nos-rediffusions * Les podcasts sur la cybersécurité - Guardia Cybersecurity School [https://guardia.school/boite-a-outils/les-podcasts-sur-la-cybersecurite.html
Léon
* Les 10 applications utiles pour voyager en camping-car [https://generationvoyage.fr/applications-camping-car/#4-maps-me * Porte-vélos SD260 [https://www.european-trading-company.fr/PBSCProduct.asp?ItmID=38446530 * Porte-vélos 2 vélos - Spécial monospace et utilitaire- [https://attelage-accessoire-auto.com/porte-velos-pour-2-velos/5223-porte-velos-strada-2-velos-inclinable.html * SD260 PORTE-VELO POUR CAMPING-CAR & UTILITAIRE - YouTube [https://www.youtube.com/watch?v=W5VhxFS-d6I * European Trading Company - Télécharger nos catalogues [https://www.european-trading-company.fr/PBCPPlayer.asp?ID=1961541 * Porte-velos LAS SD260 - pour 2 velos installation sur la rotule dattelage capacite de chargement: 60 kgchez Rameder [https://www.rameder.fr/porte-velos-las-sd260-194880.html#description * Au fil de l'eau…vergnat Les cascades en Auvergne [https://www.eauvergnat.fr/les-cascades-en-auvergne * Les cascades en Auvergne – Google My Maps [https://www.google.com/maps/d/viewer?mid=1jWRKgMhH9Y86alnuuQl7RMiMSd4&ll=45.455396336560625%2C3.4486185400752856&z=9 * Que visiter en Haute-Loire ? Mon guide complet ! - [https://www.votretourdumonde.com/que-visiter-en-haute-loire/ * Les cascades en Auvergne – Google My Maps [https://www.google.com/maps/d/viewer?mid=1jWRKgMhH9Y86alnuuQl7RMiMSd4&ll=45.5827795575992%2C3.936368309385476&z=10 * Les 10 plus belles cascades de France (la 3e est incroyable !) | Détours en France [https://www.detoursenfrance.fr/patrimoine/patrimoine-naturel/tour-de-france-des-cascades-extraordinaires-3538 * Les plus belles cascades de France : nos coups de cœur [https://www.routard.com/contenu-dossier/cid139815-les-plus-belles-cascades-de-france-nos-coups-de-coeur.html * Randonnées : A pied - Explore la Vanoise [https://rando.vanoise.com/search?practices=4 * La randonnée pédestre | Parc national de la Vanoise [https://www.vanoise-parcnational.fr/fr/des-decouvertes/decouvrir-le-parc/la-randonnee-pedestre * 33 idées de randonnées itinérantes - FFRandonnée Auvergne-Rhône-Alpes [https://auvergne-rhone-alpes.ffrandonnee.fr/html/4599/33-suggestions-de-randonnees-itinerantes * Portail des parcs nationaux de France [https://parcsnationaux.fr/fr * Publications et documents | Portail des parcs nationaux de France [https://parcsnationaux.fr/fr/publications-et-documents * QuelleRandonneePourMoiCetteAnnee_2019 - OneDrive [https://ffrandonnee-my.sharepoint.com/personal/aura_ffrandonnee_fr/_layouts/15/onedrive.aspx?id=%2Fpersonal%2Faura%5Fffrandonnee%5Ffr%2FDocuments%2FCatalogues%20Itin%C3%A9rance%20AURA%2FQuelleRandonneePourMoiCetteAnnee%5F2019%2FCatalogue%20itin%C3%A9rance%20AURA%5F33suggestions%2Epdf&parent=%2Fpersonal%2Faura%5Fffrandonnee%5Ffr%2FDocuments%2FCatalogues%20Itin%C3%A9rance%20AURA%2FQuelleRandonneePourMoiCetteAnnee%5F2019&ga=1 * Roadtrip sur la Route des Grandes Alpes : les étapes incontournables [https://generationvoyage.fr/visiter-route-des-grandes-alpes/ * Tourisme en France : guide voyage pour partir en France [https://generationvoyage.fr/visiter/france/ * Tourisme en Auvergne-Rhône-Alpes : guide voyage pour partir en Auvergne-Rhône-Alpes [https://generationvoyage.fr/visiter/france/auvergne-rhone-alpes/ * Stickers Van Life Deco | MPA Déco [https://www.mpadeco.com/stickers-van-life * Toits alternatifs - À la découverte d'autres modes de vies [https://toitsalternatifs.fr/ * Bring Your Van Design Ideas To Life [https://get.vanspace3d.com/ * Google Flights [https://www.google.com/travel/flights/ * 134 Cool and Unusual Things to Do in Rome - Atlas Obscura [https://www.atlasobscura.com/things-to-do/rome-italy * Distances, directions, consommation et prix de carburant, les péages, limites de vitesse, France et l'Europe [https://ladistance.fr/ * Le chemin vers Saint-Jacques-de-Compostelle d'Aubrac à Conques en Aveyron [https://www.st-jacques-aveyron.com/ * Les villages traversés - Chemin de Saint-Jacques en Aveyron [https://www.st-jacques-aveyron.com/fr/decouvrez/villages-traverses.php * Stage de Survie près de Saint-Étienne au Parc Naturel Régional du Pilat - Loire 42 [https://www.adrenactive.com/stage-de-survie-saint-etienne-6357.htm * Journée Stage de Survie dans la Nature du Parc du Pilat près de Saint-Etienne [https://www.sport-decouverte.com/stage-survie-proche-saint-etienne.html * Stage de survie à Lyon - Au parc du pilât [https://www.babasport.fr/activites/3231-stage-de-survie-jours-nuit-saint-etienne * Stage de survie dans le Parc du Pilat proche de Lyon [https://www.funbooker.com/fr/annonce/stage-de-survie-dans-le-parc-du-pilat-proche-saint-etienne/voir * Alpha survie - Stages de survie - bushcraft - famille [https://alphasurvie.net/
Trade_Crypto
* Heures de trading et événements de marché d'eToro [https://www.etoro.com/fr/trading/market-hours-and-events/ * En savoir plus sur eToro et découvrez des informations utiles [https://www.etoro.com/learn-more * Investir sur les marchés financiers les plus tradés sur eToro [https://www.etoro.com/discover * Votre voyage commence maintenant | Binance Academy [https://academy.binance.com/fr/start-here * sébastien Koubar at DuckDuckGo [https://duckduckgo.com/?q=s%C3%A9bastien+Koubar&t=ffab&atb=v340-1&ia=web
Blog_A_Lire
* Fondation Jean-Jaurès - Accueil [https://www.jean-jaures.org/ * The Conversation : des analyses de l’actualité par des universitaires et chercheurs [https://theconversation.com/fr * Secure access using HashiCorp Boundary & inlets PRO Better Together [https://johansiebens.dev/posts/2020/10/secure-access-using-hashicorp-boundary-inlets-pro-better-together/ * On veut vous faire croire que vous n'avez rien à cacher | François Charlet [https://francoischarlet.ch/2016/rien-a-cacher/ * 40 Best Open-Source Privacy Tools - [https://paulponraj.com/40-best-open-source-privacy-tools/ * ALPHV ransomware gang analysis - [https://www.intrinsec.com/alphv-ransomware-gang-analysis/ * Montage d'un serveur de mail complet (postfix, postgrey, amavisd-new, clamav, spamassassin etc) - Le blog de Michauko [https://michauko.org/blog/montage-dun-serveur-de-mail-complet-postfix-postgrey-amavisd-new-clamav-spamassassin-etc-590/ * 7 Minute Security [https://7ms.us/ * Avec un VPN, le FAI a-t-il accès à vos échanges ? [https://desgeeksetdeslettres.com/avec-un-vpn-le-fai-a-t-il-acces-a-vos-echanges/ * Home - riseup.net [https://riseup.net/en * Accueil - riseup.net [https://riseup.net/ * Comment être anonyme sur internet [https://desgeeksetdeslettres.com/logiciels-pour-surfer-anonymement-sur-internet/ * Learn Ethical Hacking Course Online [https://ethicalhackersacademy.com/ * Ethical Hackers Academy [https://ethicalhackersacademy.com/blogs/ethical-hackers-academy * Les nouveaux pirates - Saison 0 [https://redteamdefense.org/saison-0/les-nouveaux-pirates * Guide d’Autodéfense Numérique [https://guide.boum.org/ * BUG HUNTER UNIVERSITY - YouTube [https://www.youtube.com/playlist?list=PLY-vqlMAnJ9bGoI82H1BB8BE4A8H2OCA- * Gilbert Gosseyn - AgoraVox le média citoyen [https://www.agoravox.fr/auteur/gilbert-gosseyn * 10 Médias Alternatifs Libres & Indépendants à Suivre [https://www.jeremybackpacker.com/liste-medias-independants/ * Quand nos bulletins de salaire témoignent d’un siècle d’histoire et de conquêtes sociales - Basta! [https://basta.media/retraites-greve-nos-bulletins-de-salaire-temoignent-d-un-siecle-et-demi-d-histoire-de-conquetes-sociales * LES PRÉDICTIONS DE NOSTRADAMUS, les prophéties de Nostradamus [https://predictions-nostradamus.com/ * PuppyPi - Google Drive [https://drive.google.com/drive/folders/1sgG2CQcXimtivb-J_ILMTr9niWKPPdqN * Quantfury | Trading Honnête pour Tous [https://quantfury.com/french/ * 💻 Besoin d'un dépannage informatique ? Assistance informatique [https://yoojo.fr/informatique * Get Started Now - Talent Desire [https://www.talentdesire.com/get-started-now/ * Référentiels d’exigences | Agence nationale de la sécurité des systèmes d'information [https://www.ssi.gouv.fr/administration/qualifications/prestataires-de-services-de-confiance-qualifies/referentiels-exigences/ * How to Test Endpoint Security with Red Teaming | CrowdStrike [https://www.crowdstrike.com/blog/how-to-test-endpoint-security-with-red-teaming/ * Detectify Labs - Writeups, ethical hacker insights, security guidance [https://labs.detectify.com/ * Detectify Crowdsource | Hack the planet [https://cs.detectify.com/apply * Build optimized websites quickly, focus on your content | Docusaurus [https://docusaurus.io/ * OgmaSec / NJ8 [https://www.mickaeldorigny.com/ * Julien Mousqueton [https://julien.io/
Crypto_trading_investissement
* 🧩 Voici le meilleur portefeuille d'investissement [https://www.beatmarket.fr/p/voici-le-meilleur-portefeuille-dinvestissement * Formation Christopher Wangen - Réussir en Crypto [https://formations.christopher-wangen.fr/reussir-en-crypto * 10 meilleurs sites pour acheter du Bitcoin par carte bancaire ou virement [https://cryptonaute.fr/comment-acheter-bitcoin/ * GitHub - sobolevn/awesome-cryptography: A curated list of cryptography resources and links. [https://github.com/sobolevn/awesome-cryptography/ * Comment gagner des cryptos gratuitement ? 14 méthodes fiables [https://cryptonaute.fr/guide-crypto/gagner-bitcoin-gratuit/ * En savoir plus sur la blockchain et les cryptomonnaies | Binance Academy [https://academy.binance.com/fr * Générateur de porte-monnaie papier universel pour Bitcoin et autres monnaies cryptographiques [https://walletgenerator.net/ * Prix des cryptomonnaies, graphiques et capitalisations boursières | CoinMarketCap [https://coinmarketcap.com/fr/ * Nexo: Buy, Exchange, and Store Bitcoin & Crypto [https://nexo.com/ * The crypto wallet for Defi, Web3 Dapps and NFTs | MetaMask [https://metamask.io/ * Thibaut Crypto [https://www.thibautcrypto.com/thibaut-crypto?fbclid=PAAaafcydyZa44yFQbmwB-Pt6_DRtrVLGhVo6f9AfGqC3s-S1EWLozEMcRuWc * Les meilleurs bots de trading pour la crypto-monnaie - Cryptonaute [https://cryptonaute.fr/meilleurs-robot-trading-crypto-bitcoin/ * petite annonce paiement en bitcoin at DuckDuckGo [https://duckduckgo.com/?q=petite+annonce+paiement+en+bitcoin&t=ffab&ia=web * Acheter des Bitcoins avec Paypal ou Carte Bancaire - comparatif et frais 2018 | Bitcoin Cours | Cours du Bitcoin euro/dollar temps réel/historique/bourse [http://www.bitcoincours.com/p/acheter-bitcoin.html * VirWoX // Acheter et vendre des Linden Dollar, Avination C$ ou OMC, pour des Euros, US$, des Francs Suisses ou des GBP. [https://www.virwox.com/index.php?language=fr * LocalBitcoins.com : Le moyen le plus rapide et le plus simple pour vendre et acheter des bitcoins [https://localbitcoins.com/fr/ * Analyse technique - Comment lire les graphiques boursiers ? [https://www.abcbourse.com/apprendre/11_comment_lire_un_graphique.html * Gagner des bitcoin facilement sans investir | Bitcoin Cours | Cours graphique du Bitcoin BTC et BCH [https://www.bitcoincours.com/p/gagner-des-bitcoins-facilement.html * 11 Best Bitcoin Mining Software 2018 (Mac, Windows, Linux) [https://www.buybitcoinworldwide.com/mining/software/ * 38m:30s - FreeBitco.in - Win free bitcoins every hour! [https://freebitco.in/?op=home# * Acheter des bitcoins Cash près de Lyon, France [https://localbitcoins.com/buy-bitcoins-with-cash/1051126418/lyon-france/ * Goliaths Aide [https://support.goliaths.io/fr * Highest Paying Bitcoin Faucet 2018 | BITCOIN SITES [http://www.bit-sites.com/2017/09/highest-paying-bitcoin-faucet-2018.html * Address: 1H3exgCJ65j3inUUDKPkGAJgrb2pLGR4u4 | Blockchain Explorer [https://www.blockchain.com/btc/address/1H3exgCJ65j3inUUDKPkGAJgrb2pLGR4u4 * Welcome | bitinvestllc [https://bitinvestllc.com/ * Acheter et vendre des bitcoins instantanément | Paxful [https://paxful.com/fr * Home - Bitcoin Private Keys [https://allprivatekeys.net/ * Investissez en communauté dès 2€ - Goliaths [https://www.goliaths.io/old-home-3 * CASINO GUICHARD PERRACHON Cours Action CO, Cotation Bourse Euronext Paris - Boursorama [https://www.boursorama.com/cours/1rPCO/ * Netinvestissement | Conseil en gestion de patrimoine : défiscalisation et placements [https://www.net-investissement.fr/ * All Bitcoin private keys and Altcoin private keys. [https://allprivatekeys.com/ * Profitabilité de minage | Kryptex [https://www.kryptex.com/fr/mining-profitability * Awesome Miner - Manage and monitor mining operations [https://www.awesomeminer.com/ * Earn Free Bitcoins - bitprivatekeys [https://allprivatekeys.net/earn-free-btc/ * Centre d’aide | Quantfury - Le trading honnête de tous [https://trading.quantfury.com/help_center * 10 Meilleurs Sites pour Acheter Bitcoin en 2023 - En toute sécurité [https://cryptoast.fr/classement-top-10-meilleurs-sites-pour-acheter-bitcoin-2021/ * Académie eToro : Les connaissances pour investir [https://www.etoro.com/fr/academy/ * Débuter dans les cryptomonnaies : Guides & Astuces | Cointribune [https://www.cointribune.com/guides-crypto/bien-debuter/ * Débuter en crypto monnaie | Guide et tutoriel pour les débutants [https://cryptonaute.fr/guide-crypto/debuter-en-crypto-monnaie/#projet * Débuter en crypto monnaie | Guide et tutoriel pour les débutants [https://cryptonaute.fr/guide-crypto/debuter-en-crypto-monnaie/#plateformes * Débuter en crypto monnaie | Guide et tutoriel pour les débutants [https://cryptonaute.fr/guide-crypto/debuter-en-crypto-monnaie/ * Guide cryptomonnaies, tutoriels, info et actualités des cryptomonnaies [https://cryptomonnaie.guide/ * Fire Faucet - The Best Auto Faucet [https://firefaucet.win/#! * Avis firefaucet.win, meilleur faucet 2022 - Cryptomonnaie guide [https://cryptomonnaie.guide/avis-firefaucet-win-meilleur-faucet-2022/ * Sondages Rémunérés: Le TOP des sites qui payent vraiment [https://www.leclubargent.com/sondages-remuneres/ * TradeGPT 360 Evix - Evex Trading Automatique Site Officiel | TradesGPT 3.0 [https://tradegpt360ai.com/lang_fr/? * Cryptocurrency Prices, Charts And Market Capitalizations | CoinMarketCap [https://coinmarketcap.com/ * Investopedia [https://www.investopedia.com/ * XAUUSD 2034.570 ▼ −0.54% [https://fr.tradingview.com/chart/?symbol=OANDA%3AXAUUSD * Apprendre Le TRADING de A à Z Pour les DÉBUTANTS en 2024 (Formation Gratuite) - YouTube [https://www.youtube.com/watch?v=M-KMPhYlsW4 * Benjamin Deleuze - Trading - YouTube [https://www.youtube.com/@BenjaminDeleuzeTrading * Hasheur - YouTube [https://www.youtube.com/@Hasheur * Guide du débutant Binance | Binance Support [https://www.binance.com/fr/support/faq/guide-du-d%C3%A9butant-binance-c780097f75dd450a82d17f1e84153276
Title: url: Modify Cancel