forked from AnasAboreeda/Penetration-Testing-Study-Notes
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathbookmarks.txt
135 lines (135 loc) · 6.46 KB
/
bookmarks.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
http://0daysecurity.com/penetration-testing/enumeration.html
http://bright-shadows.net
http://ch3rn0byl.com/down-with-oscp-yea-you-know-me/
http://counterhack.net/Counter_Hack/Challenges.html
http://ctflearn.com
http://exploit-exercises.com
http://h.ackack.net/cheat-sheets/netcat
http://hackertest.net
http://hackingandsecurity.blogspot.com/2016/04/oscp-related-notes.html
http://hax.tor.hu
http://hellboundhackers.org
http://intruded.net
http://it-ovid.blogspot.com/2012/02/windows-privilege-escalation.html
http://mod-x.co.uk/main.php
http://net-force.nl
http://overthewire.org/wargames
http://pentestmonkey.net/blog/post-exploitation-without-a-tty
http://pentestmonkey.net/category/cheat-sheet/shell
http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats
http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
http://pentestmonkey.net/tools/audit/unix-privesc-check
http://pentestmonkey.net/tools/windows-privesc-check
http://pwnable.kr
http://reversing.kr
http://ringzer0team.com
http://rmccurdy.com/scripts/Metasploit
http://roothack.org
https://10.70.70.70/oscpanel/labcpanel.php?md=37cef9a07d3b830f8da29f5d8be375fe
https://assets-cdn.github.com/favicon.ico
https://backdoor.sdslabs.co
https://backdoorshell.gitbooks.io/oscp-useful-links/content/
http://sbdtools.googlecode.com/files/hping3
http://sbdtools.googlecode.com/files/hping3_cheatsheet_v1.0-ENG.pdf
http://sbdtools.googlecode.com/files/Nmap5
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
https://blog.netspi.com/15-ways-to-download-a-file/
http://scanme.nmap.org
https://crackstation.net/
https://exploit-exercises.com/
https://forums.offensive-security.com/
https://forums.offensive-security.com/favicon.ico
https://forums.offensive-security.com/showthread.php?t=4689
https://geekviews.tech/kali-linux-commands-complete-list/
https://github.com/adam-p/markdown-here/wiki/Markdown-Cheatsheet
https://github.com/codingo/Windows-Privesc/blob/master/windows
https://github.com/ctfs
https://github.com/danielmiessler/SecLists
https://github.com/frizb
https://github.com/frizb/OSCP-Survival-Guide
https://github.com/GDSSecurity/Windows-Exploit-Suggester
https://github.com/kurobeats/pentest-bookmarks/blob/master/BookmarksList.md
https://github.com/PenturaLabs/Linux_Exploit_Suggester
https://github.com/rapid7/ssh-badkeys
https://github.com/rebootuser/LinEnum
https://github.com/slyth11907/Cheatsheets
https://hackmag.com/security/elevating-privileges-to-administrative-and-further/
https://highon.coffee/blog/linux-commands-cheat-sheet/
https://highon.coffee/blog/lord-of-the-root-walkthrough/
https://highon.coffee/blog/nbtscan-cheat-sheet/
https://highon.coffee/blog/nmap-cheat-sheet/
https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/
https://highon.coffee/blog/reverse-shell-cheat-sheet/
https://highon.coffee/blog/security-harden-centos-7/
https://highon.coffee/blog/sickos-1-walkthrough/
https://highon.coffee/blog/tr0ll-1-walkthrough/
https://io.netgarage.org
https://leonjza.github.io/blog/2014/08/15/taming-the-troll/
https://leonjza.github.io/blog/2014/10/10/another-troll-tamed-solving-troll-2/
http://smashthestack.org/wargames.html
https://microcorruption.com/login
https://monkeysm8.gitbooks.io/pentesting-methodology/
https://monkeysm8.gitbooks.io/pentesting-methodology/common_portsservices_and_how_to_use_them/port_135_-_msrpc.html
https://monkeysm8.gitbooks.io/pentesting-methodology/gitbook/images/favicon.ico
https://nmap.org/nsedoc/
https://null-byte.wonderhowto.com/how-to/use-nmap-7-discover-vulnerabilities-launch-dos-attacks-and-more-0168788/
https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/
https://picoctf.com
https://pwn0.com
https://remram44.github.io/regex-cheatsheet/regex.html
https://root-me.org
https://scadahacker.com/library/Documents/Cheat
https://scadahacker.com/library/Documents/Cheat_Sheets/Hacking
https://scriptkidd1e.wordpress.com/oscp-journey/
https://speakerdeck.com/symbiansymoh/web-application-security-on-fire-php-developers-cheat-sheet-version
https://support.offensive-security.com/
https://support.offensive-security.com/favicon.png
https://technet.microsoft.com/en-us/sysinternals/bb664922
https://tldr.ostera.io/
https://vulnhub.com
https://w3challs.com
https://www.exploit-db.com/
https://www.exploit-db.com/google-hacking-database/
https://www.exploit-db.com/wp-content/uploads/2016/10/searchsploit.png
https://www.hackthebox.eu/
https://www.mozilla.org/en-US/about/
https://www.mozilla.org/en-US/contribute/
https://www.mozilla.org/en-US/firefox/customize/
https://www.mozilla.org/en-US/firefox/help/
https://www.offensive-security.com/favicon.ico
https://www.offensive-security.com/metasploit-unleashed
https://www.offensive-security.com/metasploit-unleashed/
https://www.offensive-security.com/offsec-irc-guide/
https://www.root-me.org/
https://www.sans.org/security-resources/sec560/misc
https://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf
https://www.vulnhub.com/
https://www.vulnhub.com/entry/tr0ll-1
https://www.vulnhub.com/entry/tr0ll-2
https://www.vulnhub.com/series/
https://www.vulnhub.com/series/lord-of-the-root
https://www.vulnhub.com/series/sickos
https://xapax.gitbooks.io/security/content/gitbook/images/favicon.ico
https://xapax.gitbooks.io/security/content/privilege_escalation_windows.html
http://vulnhub.com
http://www.0daysecurity.com/penetration-testing/enumeration.html
http://www.cvedetails.com/product/585/Openbsd-Openssh.html?vendor_id=97
http://www.fuzzysecurity.com/images/favicon/favicon.ico
http://www.fuzzysecurity.com/tutorials/16.html
http://www.mozilla.org/2005/made-up-favicon/1-1508869838651
http://www.mozilla.org/2005/made-up-favicon/2-1508869838653
http://www.mozilla.org/2005/made-up-favicon/3-1508869838655
http://www.mozilla.org/2005/made-up-favicon/4-1508869838657
http://www.offensive-security.com/metasploit-unleashed/Main_Page
http://www.primalsecurity.net/0x0-exploit-tutorial-buffer-overflow-vanilla-eip-overwrite-2/
http://www.sans.org/security-resources/sec560/misc
http://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf
http://www.sans.org/security-resources/sec560/netcat
http://www.sans.org/security-resources/sec560/netcat_cheat_sheet_v1.pdf
http://www.secguru.com/files/cheatsheet/nessusNMAPcheatSheet.pdf
http://www.securityfocus.com/
http://www.securitysift.com/offsec-pwb-oscp/
http://www.securitytube.net/
http://www.securitytube.net/groups?operation=view
http://www.techexams.net/forums/security-certifications/110760-oscp-jollyfrogs-tale.html