Skip to content

👾Useful for CTFs, wargames, pentesting. For fun or profit. 👾

License

Notifications You must be signed in to change notification settings

frankxayachack/Gray-Hacker-Resources

Repository files navigation

My-Gray-Hacker-Resources

All in one big bag. For fun, profits, or CTFs.

* CTFs and WARGAMES

* CRYPTOGRAPHY

* FORENSICS

* LINUX HACKING

* MEMORY EXPLOITS

* NETWORK and 802.11

* REVERSE ENGINEERING

* RUBBER DUCK

* STEGANOGRAPHY

* WEB EXPLOITS

* OTHER HACKINGS


Useful

Searching

grep word f1
 
sort | uniq -c
 
diff f1 f2
 
find -size f1

Compressed Files

zcat f1 > f2
 
gzip -d file
 
bzip2 -d f1
 
tar -xvf file

Connecting to a Server/Port

echo 4wcYUJFw0k0XLShlDzztnTBHiqxU3b3e | nc localhost 30000
 
openssl s_client -connect localhost:30001 -quiet
 
nmap -p 31000-32000 localhost
 
telnet localhost 3000

Decoders

Base64

ASCII Conversion Table

Convert All

  • In Python:

  • Decimal to binary

>>> bin(124234)
'0b11110010101001010'
  • Decimal to hex:
>>> s =hex(secret)
  • Hexadecimal to binary:
SECRET.decode('hex')
'==QcCtmMml1ViV3b'
$ python -c 'print "2f722f6e6574736563".decode("hex")'
  • Hex to ascii:
$ xxd -r -p <<< 2f722f6e6574736563
  • Base64 decode:
>>> SECRET.decode('base64')
'oubWYf2kBq'


About

👾Useful for CTFs, wargames, pentesting. For fun or profit. 👾

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages

  • C 59.5%
  • Python 11.1%
  • C++ 9.3%
  • Makefile 9.0%
  • HTML 5.8%
  • PHP 1.2%
  • Other 4.1%