Learn to hack: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
No edit summary
Line 30: Line 30:
* https://github.com/swisskyrepo/PayloadsAllTheThings
* https://github.com/swisskyrepo/PayloadsAllTheThings
* https://github.com/S3cur3Th1sSh1t/Pentest-Tools
* https://github.com/S3cur3Th1sSh1t/Pentest-Tools
* https://github.com/offensive-security/exploitdb


== Active Directory ==
== Active Directory ==
Line 138: Line 139:
* https://delta.navisec.io/a-pentesters-guide-part-4-grabbing-hashes-and-forging-external-footholds/
* https://delta.navisec.io/a-pentesters-guide-part-4-grabbing-hashes-and-forging-external-footholds/
* https://www.rootshellsecurity.net/ntlm_theft-a-tool-for-file-based-forced-ntlm-hash-disclosure/
* https://www.rootshellsecurity.net/ntlm_theft-a-tool-for-file-based-forced-ntlm-hash-disclosure/
* https://getgophish.com/
* https://getgophish.com/ Be sure to [https://www.sprocketsecurity.com/blog/never-had-a-bad-day-phishing-how-to-set-up-gophish-to-evade-security-controls remove the identifying headers gophish adds]
* https://github.com/curtbraz/PhishAPI
* https://github.com/curtbraz/PhishAPI


Line 159: Line 160:
* https://search.censys.io/
* https://search.censys.io/
* https://github.com/lanmaster53/recon-ng
* https://github.com/lanmaster53/recon-ng
* https://github.com/offensive-security/exploitdb


== Opsec ==
== Opsec ==
Line 169: Line 169:
* https://veracrypt.fr/
* https://veracrypt.fr/
* https://www.torproject.org/
* https://www.torproject.org/
* https://geti2p.net/
* https://i2pd.website/


== Secure Messaging ==
== Secure Messaging ==
Best practise is for your connections to go over Tor and for your messages to be end-to-end encrypted. For Jabber/XMPP make sure to enable OMEMO. For file sharing use onionshare.
Best practise is for your connections to go over Tor and for your messages to be end-to-end encrypted. For Jabber/XMPP make sure to enable OTR or OMEMO encryption. For email use PGP for encryption. For file sharing use onionshare.
* https://dino.im/
* [https://tails.boum.org/ Tails] comes with onionshare for file sharing, pidgin with OTR for encrypted chat, and thunderbird with GPG for encrypted email
* https://gajim.org/
* Probably the most mature jabber client with a focus on security and privacy is [https://coy.im/ CoyIM]
* https://cwtch.im/
* https://cwtch.im/
* https://www.thunderbird.net/ & https://www.enigmail.net/index.php/
* https://www.thunderbird.net/ A email client with built-in support for [https://support.mozilla.org/en-US/kb/openpgp-thunderbird-howto-and-faq PGP encryption]
* https://www.gnupg.org/related_software/gpa/index.html
* https://onionshare.org/
* https://onionshare.org/
* https://tox.chat/
* See [https://www.whonix.org/wiki/Chat the whonix wiki] for a more detailed comparison of secure messaging software

Revision as of 16:52, 29 April 2022

This page aims to compile high quality resources for hackers. All books listed on this page can be found on Library Genesis and Z-Library

General Resources

Resources that assume little to no background knowledge:

Resources that assume minimal tech background:

Resources that assume a tech or hacking background:

Practice labs:

General references:

Active Directory

Tools

Office 365 & Azure

Tools

GSuite

https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite

C2 Frameworks

Antivirus & EDR Evasion

VMware

RocketChat

Microsoft Exchange

ProxyLogon is dead. It's mitigated by Defender. ProxyShell is not. AMSI catches unmodified public exploits.

Initial Access

Phishing

Password spraying

Buying Access

https://genesis.market/

Scanning and Recon

Opsec

Secure Messaging

Best practise is for your connections to go over Tor and for your messages to be end-to-end encrypted. For Jabber/XMPP make sure to enable OTR or OMEMO encryption. For email use PGP for encryption. For file sharing use onionshare.