Skip to content

🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️

Notifications You must be signed in to change notification settings

cndotaez/Pentesting_Toolkit

Repository files navigation

My-Gray-Hacker-Resources

All in one big bag. For fun, profits, or CTFs.

* CTFs and WARGAMES

* CRYPTOGRAPHY

* FORENSICS

* LINUX HACKING

* MEMORY EXPLOITS

* NETWORK and 802.11

* REVERSE ENGINEERING

* RUBBER DUCK

* STEGANOGRAPHY

* WEB EXPLOITS

* OTHER HACKINGS


Useful

Searching

grep word f1
 
sort | uniq -c
 
diff f1 f2
 
find -size f1

Compressed Files

zcat f1 > f2
 
gzip -d file
 
bzip2 -d f1
 
tar -xvf file

Connecting to a Server/Port

echo 4wcYUJFw0k0XLShlDzztnTBHiqxU3b3e | nc localhost 30000
 
openssl s_client -connect localhost:30001 -quiet
 
nmap -p 31000-32000 localhost
 
telnet localhost 3000

Decoders

Base64

ASCII Conversion Table

Convert All

  • In Python:

  • Decimal to binary

>>> bin(124234)
'0b11110010101001010'
  • Decimal to hex:
>>> s =hex(secret)
  • Hexadecimal to binary:
SECRET.decode('hex')
'==QcCtmMml1ViV3b'
$ python -c 'print "2f722f6e6574736563".decode("hex")'
  • Hex to ascii:
$ xxd -r -p <<< 2f722f6e6574736563
  • Base64 decode:
>>> SECRET.decode('base64')
'oubWYf2kBq'

Recon

Searching the Internets

The recon problems usually give you someone/something's name and a task or a hint to find some specific information about it. So the first thing is of course google it.

Google anything using keywords such as filetype:cgi inurl:cgi-bin

In addition we can look at:

  • Facebook, Twitter, Linkedin, Google+, reddit, /r/netsec.
  • IRC: with **/whois **.
  • namechk
  • Github: check in the commit history.

Finding pictures:


About

🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 58.8%
  • Python 11.1%
  • C++ 9.3%
  • Makefile 9.0%
  • HTML 5.8%
  • PHP 1.2%
  • Other 4.8%