Skip to content

Latest commit

 

History

History
117 lines (117 loc) · 5.53 KB

README.md

File metadata and controls

117 lines (117 loc) · 5.53 KB


http://project-rainbowcrack.com
https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard
https://addons.mozilla.org/en-US/firefox/addon/user-agent-string-switcher
https://addons.mozilla.org/en-US/firefox/addon/wappalyzer
https://ahrefs.com/blog/google-advanced-search-operators
https://attack.mitre.org
https://attack.mitre.org/techniques/T1574/001
https://blog.netwrix.com/2022/01/11/understanding-lsa-protection
https://book.hacktricks.xyz
https://cheatsheetseries.owasp.org
https://crackstation.net
https://crt.sh
https://cryptohack.org
https://cryptoji.com
https://cve.mitre.org
https://cwe.mitre.org
https://danielmiessler.com/study/tcpdump
https://delinea.com/blog/windows-privilege-escalation
https://dirtycow.ninja
https://dnsdumpster.com
https://dnsleaktest.com
https://duckduckgo.com/?q=DuckDuckGo&ia=chat
https://electricalacademia.com/computer/windows-networking-basics
https://en.hackndo.com
https://en.wikipedia.org/wiki/Birthday_attack
https://en.wikipedia.org/wiki/Captive_portal
https://en.wikipedia.org/wiki/Category:Computer_security_exploits
https://en.wikipedia.org/wiki/Comparison_of_command_shells
https://en.wikipedia.org/wiki/Computer_hardware
https://en.wikipedia.org/wiki/Credential_stuffing
https://en.wikipedia.org/wiki/Cyber_threat_intelligence
https://en.wikipedia.org/wiki/DICT
https://en.wikipedia.org/wiki/Debian
https://en.wikipedia.org/wiki/Dictionary_attack
https://en.wikipedia.org/wiki/Endpoint_detection_and_response
https://en.wikipedia.org/wiki/File_URI_scheme
https://en.wikipedia.org/wiki/GNU_Compiler_Collection
https://en.wikipedia.org/wiki/Google_hacking
https://en.wikipedia.org/wiki/IDN_homograph_attack
https://en.wikipedia.org/wiki/IPv4_address_exhaustion
https://en.wikipedia.org/wiki/Lightweight_Directory_Access_Protocol
https://en.wikipedia.org/wiki/List_of_DNS_record_types
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
https://en.wikipedia.org/wiki/List_of_file_formats
https://en.wikipedia.org/wiki/List_of_file_signatures
https://en.wikipedia.org/wiki/List_of_hash_functions
https://en.wikipedia.org/wiki/Logic_gate
https://en.wikipedia.org/wiki/MD5
https://en.wikipedia.org/wiki/Monitor_mode
https://en.wikipedia.org/wiki/NetBIOS
https://en.wikipedia.org/wiki/Netwide_assembly
https://en.wikipedia.org/wiki/Pass_the_hash
https://en.wikipedia.org/wiki/Password_cracking
https://en.wikipedia.org/wiki/Public-key_cryptography
https://en.wikipedia.org/wiki/Rainbow_table
https://en.wikipedia.org/wiki/Security_Account_Manager
https://en.wikipedia.org/wiki/Setuid
https://en.wikipedia.org/wiki/Single_point_of_failure
https://en.wikipedia.org/wiki/Standard_streams
https://en.wikipedia.org/wiki/Stuxnet
https://en.wikipedia.org/wiki/Windows_Registry
https://en.wikipedia.org/wiki/X86_instruction_listings
https://exegol.readthedocs.io
https://exploit-notes.hdks.org
https://fr.wikipedia.org/wiki/Active_Directory
https://gchq.github.io/CyberChef
https://gtfobins.github.io
https://haveibeenpwned.com
https://help.shodan.io
https://highon.coffee/blog/penetration-testing-tools-cheat-sheet
https://infinitelogins.com/2021/02/24/linux-privilege-escalation-weak-file-permissions-writable-etc-passwd
https://infosniper.net
https://learn.microsoft.com/en-us/training/modules/network-fundamentals
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
https://nvd.nist.gov/vuln/full-listing
https://orange-cyberdefense.github.io/ocd-mindmaps
https://osintframework.com
https://owasp.org/Top10
https://pentestmonkey.net
https://portswigger.net/burp/documentation
https://quickref.me/nc
https://search.censys.io
https://shop.hak5.org
https://start.me/p/wMdQMQ/tools
https://steflan-security.com/windows-privilege-escalation-alwaysinstallelevated-policy
https://talosintelligence.com
https://thinkadnet.com/2021/03/edr-vs-antivirus-whats-the-difference
https://tryhackme.com/glossary
https://ui.ctsearch.entrust.com/ui/ctsearchui
https://urlhaus.abuse.ch
https://web.archive.org/web/20200901140719/http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
https://wiki.owasp.org/index.php/OWASP_favicon_database
https://www.abuseipdb.com
https://www.blackbox.ai
https://www.cve.org
https://www.dcode.fr
https://www.ettercap-project.org
https://www.exploit-db.com
https://www.hybrid-analysis.com
https://www.ired.team
https://www.joesandbox.com
https://www.kali.org
https://www.linuxkernelcves.com/cves
https://www.mandiant.com/resources/blog/commando-vm-windows-offensive-distribution
https://www.nirsoft.net/password_recovery_tools.html
https://www.offsec.com/metasploit-unleashed/msfvenom
https://www.practicallynetworked.com/networking-commands
https://www.rapid7.com/db
https://www.royhills.co.uk/wiki/index.php/Arp-scan_Documentation
https://www.shodan.io
https://www.srihash.org
https://www.tenable.com/cve/newest
https://www.tenable.com/downloads/nessus
https://www.thehacker.recipes
https://www.virustotal.com/gui/home/upload
https://www.vulnhub.com
https://www.wireguard.com