mirror of
https://github.com/vitalysim/Awesome-Hacking-Resources.git
synced 2024-12-18 10:56:12 +00:00
50 lines
2.7 KiB
Markdown
50 lines
2.7 KiB
Markdown
# Awesome-Hacking-Resources
|
|
A collection of hacking / penetration testing resources to make you better!
|
|
|
|
You are welcome to fork and contribute
|
|
|
|
Train your skills
|
|
--
|
|
* [OWASP Security Shepherd](https://security-shepherd.ctf365.com/login.jsp)
|
|
* [Hacksplaining](https://www.hacksplaining.com/)
|
|
* [The cryptopals crypto challenges](http://cryptopals.com/)
|
|
* [The enigma group](https://www.enigmagroup.org/)
|
|
* [Ringzer0 Team](https://ringzer0team.com/challenges)
|
|
* [Hack The Box](https://www.hackthebox.gr/en/login)
|
|
* [Over the wire](http://overthewire.org/wargames/)
|
|
* [Backdoor](https://backdoor.sdslabs.co)
|
|
* [Vulnhub](https://www.vulnhub.com/)
|
|
* [Hack.me](https://hack.me/)
|
|
* [Exploit exercises](https://exploit-exercises.com/)
|
|
* [PentesterLab](https://pentesterlab.com/)
|
|
* [SmashTheStack](http://smashthestack.org/wargames.html)
|
|
* [Root-Me](https://www.root-me.org/)
|
|
* [PicoCTF](https://2017game.picoctf.com/)
|
|
|
|
Reverse Engineering and Buffer overflow
|
|
--
|
|
* [Shell storm](http://shell-storm.org/)
|
|
* [Buffer Overflow Exploitation Megaprimer for Linux](http://www.securitytube.net/groups?operation=view&groupId=4)
|
|
* [Malware Unicorn](https://securedorg.github.io/RE101/)
|
|
* [Modern Binary Exploitation - CSCI 4968](https://github.com/RPISEC/MBE)
|
|
* [Introductory Intel x86](http://www.opensecuritytraining.info/IntroX86.html)
|
|
* [Binary hacking](http://liveoverflow.com/binary_hacking/index.html)
|
|
* [Shellcode Injection](https://dhavalkapil.com/blogs/Shellcode-Injection/)
|
|
|
|
Privileged escalation
|
|
--
|
|
* [Reach the root](https://hackmag.com/security/reach-the-root/)
|
|
* [Basic linux privilege escalation](https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/)
|
|
* [Windows Privilege Escalation](http://www.bhafsec.com/wiki/index.php/Windows_Privilege_Escalation)
|
|
* [Privilege escalation for Windows and Linux](https://github.com/AusJock/Privilege-Escalation)
|
|
* [Windows Privilege Escalation Fundamentals](http://www.fuzzysecurity.com/tutorials/16.html)
|
|
* [RootHelper](https://github.com/NullArray/RootHelper)
|
|
* [Windows exploits, mostly precompiled.](https://github.com/abatchy17/WindowsExploits)
|
|
* [Unix privesc checker](http://pentestmonkey.net/tools/audit/unix-privesc-check)
|
|
* [Privilege escalation linux with live example](http://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/)
|
|
* [Windows privilege escalation checker](https://github.com/netbiosX/Checklists/blob/master/Windows-Privilege-Escalation.md)
|
|
* [Linux Privilege Escalation Scripts](http://netsec.ws/?p=309#more-309)
|
|
* [AutoLocalPrivilegeEscalation](https://github.com/ngalongc/AutoLocalPrivilegeEscalation)
|
|
* [Linux Privilege Escalation Check Script](https://github.com/sleventyeleven/linuxprivchecker)
|
|
* [Local Linux Enumeration & Privilege Escalation Cheatsheet](https://www.rebootuser.com/?p=1623)
|