You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

README.md 447 KiB

5 years ago
6 years ago
6 years ago
5 years ago
5 years ago
5 years ago
3 years ago
3 years ago
3 years ago
5 years ago
3 years ago
4 years ago
4 years ago
5 years ago
5 years ago
5 years ago
5 years ago
3 years ago
4 years ago
5 years ago
5 years ago
5 years ago
4 years ago
4 years ago
4 years ago
4 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
3 years ago
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921392239233924392539263927392839293930393139323933393439353936393739383939394039413942394339443945394639473948394939503951395239533954395539563957395839593960396139623963396439653966396739683969397039713972397339743975397639773978397939803981398239833984398539863987398839893990399139923993399439953996399739983999400040014002400340044005400640074008400940104011401240134014401540164017401840194020402140224023402440254026402740284029403040314032403340344035403640374038403940404041404240434044404540464047404840494050405140524053405440554056405740584059406040614062406340644065406640674068406940704071407240734074407540764077407840794080408140824083408440854086408740884089409040914092409340944095409640974098409941004101410241034104410541064107410841094110411141124113411441154116411741184119412041214122412341244125412641274128412941304131413241334134413541364137413841394140414141424143414441454146414741484149415041514152415341544155415641574158415941604161416241634164416541664167416841694170417141724173417441754176417741784179418041814182418341844185418641874188418941904191419241934194419541964197419841994200420142024203420442054206420742084209421042114212421342144215421642174218421942204221422242234224422542264227422842294230423142324233423442354236423742384239424042414242424342444245424642474248424942504251425242534254425542564257425842594260426142624263426442654266426742684269427042714272427342744275427642774278427942804281428242834284428542864287428842894290429142924293429442954296429742984299430043014302430343044305430643074308430943104311431243134314431543164317431843194320432143224323432443254326432743284329433043314332433343344335433643374338433943404341434243434344434543464347434843494350435143524353435443554356435743584359436043614362436343644365436643674368436943704371437243734374437543764377437843794380438143824383438443854386438743884389439043914392439343944395439643974398439944004401440244034404440544064407440844094410441144124413441444154416441744184419442044214422442344244425442644274428442944304431443244334434443544364437443844394440444144424443444444454446444744484449445044514452445344544455445644574458445944604461446244634464446544664467446844694470447144724473447444754476447744784479448044814482448344844485448644874488448944904491449244934494449544964497449844994500450145024503450445054506450745084509451045114512451345144515451645174518451945204521452245234524452545264527452845294530453145324533453445354536453745384539454045414542454345444545454645474548454945504551455245534554455545564557455845594560456145624563456445654566456745684569457045714572457345744575457645774578457945804581458245834584458545864587458845894590459145924593459445954596459745984599460046014602460346044605460646074608460946104611461246134614461546164617461846194620462146224623462446254626462746284629463046314632463346344635463646374638463946404641464246434644464546464647464846494650465146524653465446554656465746584659466046614662466346644665466646674668466946704671467246734674467546764677467846794680468146824683468446854686468746884689469046914692469346944695469646974698469947004701470247034704470547064707470847094710471147124713471447154716471747184719472047214722472347244725472647274728472947304731473247334734473547364737473847394740474147424743474447454746474747484749475047514752475347544755475647574758475947604761476247634764476547664767476847694770477147724773477447754776477747784779478047814782478347844785478647874788478947904791479247934794479547964797479847994800480148024803480448054806480748084809481048114812481348144815481648174818481948204821482248234824482548264827482848294830483148324833483448354836483748384839484048414842484348444845484648474848484948504851485248534854485548564857485848594860486148624863486448654866486748684869487048714872487348744875487648774878487948804881488248834884488548864887488848894890489148924893489448954896489748984899490049014902490349044905490649074908490949104911491249134914491549164917491849194920492149224923492449254926492749284929493049314932493349344935493649374938493949404941494249434944494549464947494849494950495149524953495449554956495749584959496049614962496349644965496649674968496949704971497249734974497549764977497849794980498149824983498449854986498749884989499049914992499349944995499649974998499950005001500250035004500550065007500850095010501150125013501450155016501750185019502050215022502350245025502650275028502950305031503250335034503550365037503850395040504150425043504450455046504750485049505050515052505350545055505650575058505950605061506250635064506550665067506850695070507150725073507450755076507750785079508050815082508350845085508650875088508950905091509250935094509550965097509850995100510151025103510451055106510751085109511051115112511351145115511651175118511951205121512251235124512551265127512851295130513151325133513451355136513751385139514051415142514351445145514651475148514951505151515251535154515551565157515851595160516151625163516451655166516751685169517051715172517351745175517651775178517951805181518251835184518551865187518851895190519151925193519451955196519751985199520052015202520352045205520652075208520952105211521252135214521552165217521852195220522152225223522452255226522752285229523052315232523352345235523652375238523952405241524252435244524552465247524852495250525152525253525452555256525752585259526052615262526352645265526652675268526952705271527252735274527552765277527852795280528152825283528452855286528752885289529052915292529352945295529652975298529953005301530253035304530553065307530853095310531153125313531453155316531753185319532053215322532353245325532653275328532953305331533253335334533553365337533853395340534153425343534453455346534753485349535053515352535353545355535653575358535953605361536253635364536553665367536853695370537153725373537453755376537753785379538053815382538353845385538653875388538953905391539253935394539553965397539853995400540154025403540454055406540754085409541054115412541354145415541654175418541954205421542254235424542554265427542854295430543154325433543454355436543754385439544054415442544354445445544654475448544954505451545254535454545554565457545854595460546154625463546454655466546754685469547054715472547354745475547654775478547954805481548254835484548554865487548854895490549154925493549454955496549754985499550055015502550355045505550655075508550955105511551255135514551555165517551855195520552155225523552455255526552755285529553055315532553355345535553655375538553955405541554255435544554555465547554855495550555155525553555455555556555755585559556055615562556355645565556655675568556955705571557255735574557555765577557855795580558155825583558455855586558755885589559055915592559355945595559655975598559956005601560256035604560556065607560856095610561156125613561456155616561756185619562056215622562356245625562656275628562956305631563256335634563556365637563856395640564156425643564456455646564756485649565056515652565356545655565656575658565956605661566256635664566556665667566856695670567156725673567456755676567756785679568056815682568356845685568656875688568956905691569256935694569556965697569856995700570157025703570457055706570757085709571057115712571357145715571657175718571957205721572257235724572557265727572857295730573157325733573457355736573757385739574057415742574357445745574657475748574957505751575257535754575557565757575857595760576157625763576457655766576757685769577057715772577357745775577657775778577957805781578257835784578557865787578857895790579157925793579457955796579757985799580058015802580358045805580658075808580958105811581258135814581558165817581858195820582158225823582458255826582758285829583058315832583358345835583658375838583958405841584258435844584558465847584858495850585158525853585458555856585758585859586058615862586358645865586658675868586958705871587258735874587558765877587858795880588158825883588458855886588758885889589058915892589358945895589658975898589959005901590259035904590559065907590859095910591159125913591459155916591759185919592059215922592359245925592659275928592959305931593259335934593559365937593859395940594159425943594459455946594759485949595059515952595359545955595659575958595959605961596259635964596559665967596859695970597159725973597459755976597759785979598059815982598359845985598659875988598959905991599259935994599559965997599859996000600160026003600460056006600760086009601060116012601360146015601660176018601960206021602260236024602560266027602860296030603160326033603460356036603760386039604060416042604360446045604660476048604960506051605260536054605560566057605860596060606160626063606460656066606760686069607060716072607360746075607660776078607960806081608260836084608560866087608860896090609160926093609460956096609760986099610061016102610361046105610661076108610961106111611261136114611561166117611861196120612161226123612461256126612761286129613061316132613361346135613661376138613961406141614261436144614561466147614861496150615161526153615461556156615761586159616061616162616361646165616661676168616961706171617261736174617561766177617861796180618161826183618461856186618761886189619061916192619361946195619661976198619962006201620262036204620562066207620862096210621162126213621462156216621762186219622062216222622362246225622662276228622962306231623262336234623562366237623862396240624162426243624462456246624762486249625062516252625362546255625662576258625962606261626262636264626562666267626862696270627162726273627462756276627762786279628062816282628362846285628662876288628962906291629262936294629562966297629862996300630163026303630463056306630763086309631063116312631363146315631663176318631963206321632263236324632563266327632863296330633163326333633463356336633763386339634063416342634363446345634663476348634963506351635263536354635563566357635863596360636163626363636463656366636763686369637063716372637363746375637663776378637963806381638263836384638563866387638863896390639163926393639463956396639763986399640064016402640364046405640664076408640964106411641264136414641564166417641864196420642164226423642464256426642764286429643064316432643364346435643664376438643964406441644264436444644564466447644864496450645164526453645464556456645764586459646064616462646364646465646664676468646964706471647264736474647564766477647864796480648164826483648464856486648764886489649064916492649364946495649664976498649965006501650265036504650565066507650865096510651165126513651465156516651765186519652065216522652365246525652665276528652965306531653265336534653565366537653865396540654165426543654465456546654765486549655065516552655365546555655665576558655965606561656265636564656565666567656865696570657165726573657465756576657765786579658065816582658365846585658665876588658965906591659265936594659565966597659865996600660166026603660466056606660766086609661066116612661366146615661666176618661966206621662266236624662566266627662866296630663166326633663466356636663766386639664066416642664366446645664666476648664966506651665266536654665566566657665866596660666166626663666466656666666766686669667066716672667366746675667666776678667966806681668266836684668566866687668866896690669166926693669466956696669766986699670067016702670367046705670667076708670967106711671267136714671567166717671867196720672167226723672467256726672767286729673067316732673367346735673667376738673967406741674267436744674567466747674867496750675167526753675467556756675767586759676067616762676367646765676667676768676967706771677267736774677567766777677867796780678167826783678467856786678767886789679067916792679367946795679667976798679968006801680268036804680568066807680868096810681168126813681468156816681768186819682068216822682368246825682668276828682968306831683268336834683568366837683868396840684168426843684468456846684768486849685068516852685368546855685668576858685968606861686268636864686568666867686868696870687168726873687468756876687768786879688068816882688368846885688668876888688968906891689268936894689568966897689868996900690169026903690469056906690769086909691069116912691369146915691669176918691969206921692269236924692569266927692869296930693169326933693469356936693769386939694069416942694369446945694669476948694969506951695269536954695569566957695869596960696169626963696469656966696769686969697069716972697369746975697669776978697969806981698269836984698569866987698869896990699169926993699469956996699769986999700070017002700370047005700670077008700970107011701270137014701570167017701870197020702170227023702470257026702770287029703070317032703370347035703670377038703970407041704270437044704570467047704870497050705170527053705470557056705770587059706070617062706370647065706670677068706970707071707270737074707570767077707870797080708170827083708470857086708770887089709070917092709370947095709670977098709971007101710271037104710571067107710871097110711171127113711471157116711771187119712071217122712371247125712671277128712971307131713271337134713571367137713871397140714171427143714471457146714771487149715071517152715371547155715671577158715971607161716271637164716571667167716871697170717171727173717471757176717771787179718071817182718371847185718671877188718971907191719271937194719571967197719871997200720172027203720472057206720772087209721072117212721372147215721672177218721972207221722272237224722572267227722872297230723172327233723472357236723772387239724072417242724372447245724672477248724972507251725272537254725572567257725872597260726172627263726472657266726772687269727072717272727372747275727672777278727972807281728272837284728572867287728872897290729172927293729472957296729772987299730073017302730373047305730673077308730973107311731273137314731573167317731873197320732173227323732473257326732773287329733073317332733373347335733673377338733973407341734273437344734573467347734873497350735173527353735473557356735773587359736073617362736373647365736673677368736973707371737273737374737573767377737873797380738173827383738473857386738773887389739073917392739373947395739673977398739974007401740274037404740574067407740874097410741174127413741474157416741774187419742074217422742374247425742674277428742974307431743274337434743574367437743874397440744174427443744474457446744774487449745074517452745374547455745674577458745974607461746274637464746574667467746874697470747174727473747474757476747774787479748074817482748374847485748674877488748974907491749274937494749574967497749874997500750175027503750475057506750775087509751075117512751375147515751675177518751975207521752275237524752575267527752875297530753175327533753475357536753775387539754075417542754375447545754675477548754975507551755275537554755575567557755875597560756175627563756475657566756775687569757075717572757375747575757675777578757975807581758275837584758575867587758875897590759175927593759475957596759775987599760076017602760376047605760676077608760976107611761276137614761576167617761876197620762176227623762476257626762776287629763076317632763376347635763676377638763976407641764276437644764576467647764876497650765176527653765476557656765776587659766076617662766376647665766676677668766976707671767276737674767576767677767876797680768176827683768476857686768776887689769076917692769376947695769676977698769977007701770277037704770577067707770877097710771177127713771477157716771777187719772077217722772377247725772677277728772977307731773277337734773577367737773877397740774177427743774477457746774777487749775077517752775377547755775677577758775977607761776277637764776577667767776877697770777177727773777477757776777777787779778077817782778377847785778677877788778977907791779277937794779577967797779877997800780178027803780478057806780778087809781078117812781378147815781678177818781978207821782278237824782578267827782878297830783178327833783478357836783778387839784078417842784378447845784678477848784978507851785278537854785578567857785878597860786178627863786478657866786778687869787078717872787378747875787678777878787978807881788278837884788578867887788878897890789178927893789478957896789778987899790079017902790379047905790679077908790979107911791279137914791579167917791879197920792179227923792479257926792779287929793079317932793379347935793679377938793979407941794279437944794579467947794879497950795179527953795479557956795779587959796079617962796379647965796679677968796979707971797279737974797579767977797879797980798179827983798479857986798779887989799079917992799379947995799679977998799980008001800280038004800580068007800880098010801180128013801480158016801780188019802080218022802380248025802680278028802980308031803280338034803580368037803880398040804180428043804480458046804780488049805080518052805380548055805680578058805980608061806280638064806580668067806880698070807180728073807480758076807780788079808080818082808380848085808680878088808980908091809280938094809580968097809880998100810181028103810481058106810781088109811081118112811381148115811681178118811981208121812281238124812581268127812881298130813181328133813481358136813781388139814081418142814381448145814681478148814981508151815281538154815581568157815881598160816181628163816481658166816781688169817081718172817381748175817681778178817981808181818281838184818581868187818881898190819181928193819481958196819781988199820082018202820382048205820682078208820982108211821282138214821582168217821882198220822182228223822482258226822782288229823082318232823382348235823682378238823982408241824282438244824582468247824882498250825182528253825482558256825782588259826082618262826382648265826682678268826982708271827282738274827582768277827882798280828182828283828482858286828782888289829082918292829382948295829682978298829983008301830283038304830583068307830883098310831183128313831483158316831783188319832083218322832383248325832683278328832983308331833283338334833583368337833883398340834183428343834483458346834783488349835083518352835383548355835683578358835983608361836283638364836583668367836883698370837183728373837483758376837783788379838083818382838383848385838683878388838983908391839283938394839583968397839883998400840184028403840484058406840784088409841084118412841384148415841684178418841984208421842284238424842584268427842884298430843184328433843484358436843784388439844084418442844384448445844684478448844984508451845284538454845584568457845884598460846184628463846484658466846784688469847084718472847384748475847684778478847984808481848284838484848584868487848884898490849184928493849484958496849784988499850085018502850385048505850685078508850985108511851285138514851585168517851885198520852185228523852485258526852785288529853085318532853385348535853685378538853985408541854285438544854585468547854885498550855185528553855485558556855785588559856085618562856385648565856685678568856985708571857285738574857585768577857885798580858185828583858485858586858785888589859085918592859385948595859685978598859986008601860286038604860586068607860886098610861186128613861486158616861786188619862086218622862386248625862686278628862986308631863286338634863586368637863886398640864186428643864486458646864786488649865086518652865386548655865686578658865986608661866286638664866586668667866886698670867186728673867486758676867786788679868086818682868386848685868686878688868986908691869286938694869586968697869886998700870187028703870487058706870787088709871087118712871387148715871687178718871987208721872287238724872587268727872887298730873187328733873487358736873787388739874087418742874387448745874687478748874987508751875287538754875587568757875887598760876187628763876487658766876787688769877087718772877387748775877687778778877987808781878287838784878587868787878887898790879187928793879487958796879787988799880088018802880388048805880688078808880988108811881288138814881588168817
  1. <p align="center">
  2. <a href="https://github.com/trimstray/the-book-of-secret-knowledge">
  3. <img src="https://github.com/trimstray/the-book-of-secret-knowledge/blob/master/static/img/the-book-of-secret-knowledge-preview.png" alt="Master">
  4. </a>
  5. </p>
  6. <p align="center">"<i>Knowledge is powerful, be careful how you use it!</i>"</p>
  7. <h4 align="center">A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools, and more.</h4>
  8. <br>
  9. <p align="center">
  10. <a href="https://github.com/trimstray/the-book-of-secret-knowledge/pulls">
  11. <img src="https://img.shields.io/badge/PRs-welcome-brightgreen.svg?longCache=true" alt="Pull Requests">
  12. </a>
  13. <a href="LICENSE.md">
  14. <img src="https://img.shields.io/badge/License-MIT-lightgrey.svg?longCache=true" alt="MIT License">
  15. </a>
  16. </p>
  17. <p align="center">
  18. <a href="https://twitter.com/trimstray" target="_blank">
  19. <img src="https://img.shields.io/twitter/follow/trimstray.svg?logo=twitter">
  20. </a>
  21. </p>
  22. <div align="center">
  23. <sub>Created by
  24. <a href="https://twitter.com/trimstray">trimstray</a> and
  25. <a href="https://github.com/trimstray/the-book-of-secret-knowledge/graphs/contributors">contributors</a>
  26. </div>
  27. <br>
  28. ****
  29. ## :notebook_with_decorative_cover: &nbsp;What is it?
  30. This repository is a collection of various materials and tools that I use every day in my work. It contains a lot of useful information gathered in one piece. It is an invaluable source of knowledge for me that I often look back on.
  31. ## :restroom: &nbsp;For whom?
  32. For everyone, really. Here everyone can find their favourite tastes. But to be perfectly honest, it is aimed towards System and Network administrators, DevOps, Pentesters, and Security Researchers.
  33. ## :information_source: &nbsp;Contributing
  34. If you find something which doesn't make sense, or something doesn't seem right, please make a pull request and please add valid and well-reasoned explanations about your changes or comments.
  35. A few simple rules for this project:
  36. - inviting and clear
  37. - not tiring
  38. - useful
  39. These below rules may be better:
  40. - easy to contribute to (Markdown + HTML ...)
  41. - easy to find (simple TOC, maybe it's worth extending them?)
  42. Url marked **\*** is temporary unavailable. Please don't delete it without confirming that it has permanently expired.
  43. Before adding a pull request, please see the **[contributing guidelines](.github/CONTRIBUTING.md)**. You should also remember about this:
  44. ```diff
  45. + This repository is not meant to contain everything but only good quality stuff.
  46. ```
  47. All **suggestions/PR** are welcome!
  48. ### Code Contributors
  49. This project exists thanks to all the people who contribute.
  50. <a href="https://github.com/trimstray/the-book-of-secret-knowledge/graphs/contributors"><img src="https://opencollective.com/the-book-of-secret-knowledge/contributors.svg?width=890&button=false"></a>
  51. ### Financial Contributors
  52. <p align="left">
  53. <a href="https://opencollective.com/the-book-of-secret-knowledge" alt="Financial Contributors on Open Collective">
  54. <img src="https://img.shields.io/opencollective/backers/the-book-of-secret-knowledge?style=for-the-badge&color=FF4500&labelColor=A9A9A9"></a>
  55. </a>
  56. <a href="https://opencollective.com/the-book-of-secret-knowledge" alt="Financial Contributors on Open Collective">
  57. <img src="https://img.shields.io/opencollective/sponsors/the-book-of-secret-knowledge?style=for-the-badge&color=FF4500&labelColor=A9A9A9"></a>
  58. </a>
  59. </p>
  60. ## :newspaper: &nbsp;RSS Feed & Updates
  61. GitHub exposes an [RSS/Atom](https://github.com/trimstray/the-book-of-secret-knowledge/commits.atom) feed of the commits, which may also be useful if you want to be kept informed about all changes.
  62. ## :ballot_box_with_check: &nbsp;ToDo
  63. - [ ] Add new stuff...
  64. - [ ] Add useful shell functions
  65. - [ ] Add one-liners for collection tools (eg. CLI Tools)
  66. - [ ] Sort order in lists
  67. New items are also added on a regular basis.
  68. ## :anger: &nbsp;Table of Contents
  69. Only main chapters:
  70. - **[CLI Tools](#cli-tools-toc)**
  71. - **[GUI Tools](#gui-tools-toc)**
  72. - **[Web Tools](#web-tools-toc)**
  73. - **[Systems/Services](#systemsservices-toc)**
  74. - **[Networks](#networks-toc)**
  75. - **[Containers/Orchestration](#containersorchestration-toc)**
  76. - **[Manuals/Howtos/Tutorials](#manualshowtostutorials-toc)**
  77. - **[Inspiring Lists](#inspiring-lists-toc)**
  78. - **[Blogs/Podcasts/Videos](#blogspodcastsvideos-toc)**
  79. - **[Hacking/Penetration Testing](#hackingpenetration-testing-toc)**
  80. - **[Your daily knowledge and news](#your-daily-knowledge-and-news-toc)**
  81. - **[Other Cheat Sheets](#other-cheat-sheets-toc)**
  82. - **[One-liners](#one-liners-toc)**
  83. - **[Shell functions](#shell-functions-toc)**
  84. ## :trident: &nbsp;The Book of Secret Knowledge (Chapters)
  85. #### CLI Tools &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  86. ##### :black_small_square: Shells
  87. <p>
  88. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.gnu.org/software/bash/"><b>GNU Bash</b></a> - is an sh-compatible shell that incorporates useful features from the Korn shell and C shell.<br>
  89. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.zsh.org/"><b>Zsh</b></a> - is a shell designed for interactive use, although it is also a powerful scripting language.<br>
  90. &nbsp;&nbsp;:small_orange_diamond: <a href="https://tcl-lang.org/"><b>tclsh</b></a> - is a very powerful cross-platform shell, suitable for a huge range of uses.<br>
  91. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Bash-it/bash-it"><b>bash-it</b></a> - is a framework for using, developing and maintaining shell scripts and custom commands.<br>
  92. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ohmyz.sh/"><b>Oh My ZSH!</b></a> - is the best framework for managing your Zsh configuration.<br>
  93. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/oh-my-fish/oh-my-fish"><b>Oh My Fish</b></a> - the Fishshell framework.<br>
  94. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/starship/starship"><b>Starship</b></a> - the cross-shell prompt written in Rust.<br>
  95. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/romkatv/powerlevel10k"><b>powerlevel10k</b></a> - is a fast reimplementation of Powerlevel9k ZSH theme.<br>
  96. </p>
  97. ##### :black_small_square: Shell plugins
  98. <p>
  99. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rupa/z"><b>z</b></a> - tracks the folder you use the most and allow you to jump, without having to type the whole path.<br>
  100. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/junegunn/fzf"><b>fzf</b></a> - is a general-purpose command-line fuzzy finder.<br>
  101. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/zsh-users/zsh-autosuggestions"><b>zsh-autosuggestions</b></a> - Fish-like autosuggestions for Zsh.<br>
  102. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/zsh-users/zsh-syntax-highlighting"><b>zsh-syntax-highlighting</b></a> - Fish shell like syntax highlighting for Zsh.<br>
  103. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/unixorn/awesome-zsh-plugins"><b>Awesome ZSH Plugins</b></a> - A list of frameworks, plugins, themes and tutorials for ZSH.<br>
  104. </p>
  105. ##### :black_small_square: Managers
  106. <p>
  107. &nbsp;&nbsp;:small_orange_diamond: <a href="https://midnight-commander.org/"><b>Midnight Commander</b></a> - is a visual file manager, licensed under GNU General Public License.<br>
  108. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/ranger/ranger"><b>ranger</b></a> - is a VIM-inspired filemanager for the console.<br>
  109. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jarun/nnn"><b>nnn</b></a> - is a tiny, lightning fast, feature-packed file manager.<br>
  110. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.gnu.org/software/screen/"><b>screen</b></a> - is a full-screen window manager that multiplexes a physical terminal.<br>
  111. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/tmux/tmux/wiki"><b>tmux</b></a> - is a terminal multiplexer, lets you switch easily between several programs in one terminal.<br>
  112. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/peikk0/tmux-cssh"><b>tmux-cssh</b></a> - is a tool to set comfortable and easy to use functionality, clustering and synchronizing tmux-sessions.<br>
  113. </p>
  114. ##### :black_small_square: Text editors
  115. <p>
  116. &nbsp;&nbsp;:small_orange_diamond: <a href="http://ex-vi.sourceforge.net/"><b>vi</b></a> - is one of the most common text editors on Unix.<br>
  117. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.vim.org/"><b>vim</b></a> - is a highly configurable text editor.<br>
  118. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.gnu.org/software/emacs/"><b>emacs</b></a> - is an extensible, customizable, free/libre text editor, and more.<br>
  119. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/zyedidia/micro"><b>micro</b></a> - is a modern and intuitive terminal-based text editor.<br>
  120. &nbsp;&nbsp;:small_orange_diamond: <a href="https://neovim.io/"><b>neovim</b></a> - is a free open source, powerful, extensible and usable code editor.<br>
  121. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.spacemacs.org/"><b>spacemacs</b></a> - a community-driven Emacs distribution.<br>
  122. &nbsp;&nbsp;:small_orange_diamond: <a href="https://spacevim.org/"><b>spacevim</b></a> - a community-driven vim distribution.<br>
  123. </p>
  124. ##### :black_small_square: Files and directories
  125. <p>
  126. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/sharkdp/fd"><b>fd</b></a> - is a simple, fast and user-friendly alternative to find.<br>
  127. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dev.yorhel.nl/ncdu"><b>ncdu</b></a> - is an easy to use, fast disk usage analyzer.<br>
  128. </p>
  129. ##### :black_small_square: Network
  130. <p>
  131. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.putty.org/"><b>PuTTY</b></a> - is an SSH and telnet client, developed originally by Simon Tatham.<br>
  132. &nbsp;&nbsp;:small_orange_diamond: <a href="https://mosh.org/"><b>Mosh</b></a> - is a SSH wrapper designed to keep a SSH session alive over a volatile connection.<br>
  133. &nbsp;&nbsp;:small_orange_diamond: <a href="https://eternalterminal.dev/"><b>Eternal Terminal</b></a> - enables mouse-scrolling and tmux commands inside the SSH session.<br>
  134. &nbsp;&nbsp;:small_orange_diamond: <a href="https://nmap.org/"><b>nmap</b></a> - is a free and open source (license) utility for network discovery and security auditing.<br>
  135. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/zmap/zmap"><b>zmap</b></a> - is a fast single packet network scanner designed for Internet-wide network surveys.<br>
  136. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/RustScan/RustScan"><b>Rust Scan</b></a> - to find all open ports faster than Nmap.<br>
  137. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/robertdavidgraham/masscan"><b>masscan</b></a> - is the fastest Internet port scanner, spews SYN packets asynchronously.<br>
  138. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/gvb84/pbscan"><b>pbscan</b></a> - is a faster and more efficient stateless SYN scanner and banner grabber.<br>
  139. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.hping.org/"><b>hping</b></a> - is a command-line oriented TCP/IP packet assembler/analyzer.<br>
  140. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/traviscross/mtr"><b>mtr</b></a> - is a tool that combines the functionality of the 'traceroute' and 'ping' programs in a single tool.<br>
  141. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mehrdadrad/mylg"><b>mylg</b></a> - utility which combines the functions of the different network probes in one diagnostic tool.<br>
  142. &nbsp;&nbsp;:small_orange_diamond: <a href="http://netcat.sourceforge.net/"><b>netcat</b></a> - utility which reads and writes data across network connections, using the TCP/IP protocol.<br>
  143. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.dest-unreach.org/socat/"><b>socat</b></a> - utility which transfers data between two objects.<br>
  144. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.tcpdump.org/"><b>tcpdump</b></a> - is a powerful command-line packet analyzer.<br>
  145. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.wireshark.org/docs/man-pages/tshark.html"><b>tshark</b></a> - is a tool that allows us to dump and analyze network traffic (wireshark cli).<br>
  146. &nbsp;&nbsp;:small_orange_diamond: <a href="https://termshark.io/"><b>Termshark</b></a> - is a simple terminal user-interface for tshark.<br>
  147. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jpr5/ngrep"><b>ngrep</b></a> - is like GNU grep applied to the network layer.<br>
  148. &nbsp;&nbsp;:small_orange_diamond: <a href="http://netsniff-ng.org/"><b>netsniff-ng</b></a> - is a Swiss army knife for your daily Linux network plumbing if you will.<br>
  149. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mechpen/sockdump"><b>sockdump</b></a> - dump unix domain socket traffic.<br>
  150. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/google/stenographer"><b>stenographer</b></a> - is a packet capture solution which aims to quickly spool all packets to disk.<br>
  151. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/sachaos/tcpterm"><b>tcpterm</b></a> - visualize packets in TUI.<br>
  152. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/tgraf/bmon"><b>bmon</b></a> - is a monitoring and debugging tool to capture networking related statistics and prepare them visually.<br>
  153. &nbsp;&nbsp;:small_orange_diamond: <a href="http://iptraf.seul.org/2.6/manual.html#installation"><b>iptraf-ng</b></a> - is a console-based network monitoring program for Linux that displays information about IP traffic.<br>
  154. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/vergoh/vnstat"><b>vnstat</b></a> - is a network traffic monitor for Linux and BSD.<br>
  155. &nbsp;&nbsp;:small_orange_diamond: <a href="https://iperf.fr/"><b>iPerf3</b></a> - is a tool for active measurements of the maximum achievable bandwidth on IP networks.<br>
  156. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Microsoft/Ethr"><b>ethr</b></a> - is a Network Performance Measurement Tool for TCP, UDP & HTTP.<br>
  157. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jwbensley/Etherate"><b>Etherate</b></a> - is a Linux CLI based Ethernet and MPLS traffic testing tool.<br>
  158. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mpolden/echoip"><b>echoip</b></a> - is a IP address lookup service.<br>
  159. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/troglobit/nemesis"><b>Nemesis</b></a> - packet manipulation CLI tool; craft and inject packets of several protocols.<br>
  160. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/packetfu/packetfu"><b>packetfu</b></a> - a mid-level packet manipulation library for Ruby.<br>
  161. &nbsp;&nbsp;:small_orange_diamond: <a href="https://scapy.net/"><b>Scapy</b></a> - packet manipulation library; forge, send, decode, capture packets of a wide number of protocols.<br>
  162. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/SecureAuthCorp/impacket"><b>impacket</b></a> - is a collection of Python classes for working with network protocols.<br>
  163. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/arthepsy/ssh-audit"><b>ssh-audit</b></a> - is a tool for SSH server auditing.<br>
  164. &nbsp;&nbsp;:small_orange_diamond: <a href="https://aria2.github.io/"><b>aria2</b></a> - is a lightweight multi-protocol & multi-source command-line download utility.<br>
  165. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/x-way/iptables-tracer"><b>iptables-tracer</b></a> - observe the path of packets through the iptables chains.<br>
  166. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/proabiral/inception"><b>inception</b></a> - a highly configurable tool to check for whatever you like against any number of hosts.<br>
  167. </p>
  168. ##### :black_small_square: Network (DNS)
  169. <p>
  170. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/farrokhi/dnsdiag"><b>dnsdiag</b></a> - is a DNS diagnostics and performance measurement tools.<br>
  171. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mschwager/fierce"><b>fierce</b></a> - is a DNS reconnaissance tool for locating non-contiguous IP space.<br>
  172. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/subfinder/subfinder"><b>subfinder</b></a> - is a subdomain discovery tool that discovers valid subdomains for websites.<br>
  173. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/aboul3la/Sublist3r"><b>sublist3r</b></a> - is a fast subdomains enumeration tool for penetration testers.<br>
  174. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/OWASP/Amass"><b>amass</b></a> - is tool that obtains subdomain names by scraping data sources, crawling web archives, and more.<br>
  175. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/google/namebench"><b>namebench</b></a> - provides personalized DNS server recommendations based on your browsing history.<br>
  176. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/blechschmidt/massdns"><b>massdns</b></a> - is a high-performance DNS stub resolver for bulk lookups and reconnaissance.<br>
  177. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/guelfoweb/knock"><b>knock</b></a> - is a tool to enumerate subdomains on a target domain through a wordlist.<br>
  178. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/DNS-OARC/dnsperf"><b>dnsperf</b></a> - DNS performance testing tools.<br>
  179. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jedisct1/dnscrypt-proxy"><b>dnscrypt-proxy 2</b></a> - a flexible DNS proxy, with support for encrypted DNS protocols.<br>
  180. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dnsdb/dnsdbq"><b>dnsdbq</b></a> - API client providing access to passive DNS database systems.<br>
  181. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/looterz/grimd"><b>grimd</b></a> - fast dns proxy, built to black-hole internet advertisements and malware servers.<br>
  182. </p>
  183. ##### :black_small_square: Network (HTTP)
  184. <p>
  185. &nbsp;&nbsp;:small_orange_diamond: <a href="https://curl.haxx.se/"><b>curl</b></a> - is a command line tool and library for transferring data with URLs.<br>
  186. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gitlab.com/davidjpeacock/kurly"><b>kurly</b></a> - is an alternative to the widely popular curl program, written in Golang.<br>
  187. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jakubroztocil/httpie"><b>HTTPie</b></a> - is an user-friendly HTTP client.<br>
  188. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/asciimoo/wuzz"><b>wuzz</b></a> - is an interactive cli tool for HTTP inspection.<br>
  189. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/summerwind/h2spec"><b>h2spec</b></a> - is a conformance testing tool for HTTP/2 implementation.<br>
  190. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/gildasio/h2t"><b>h2t</b></a> - is a simple tool to help sysadmins to hardening their websites.<br>
  191. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/trimstray/htrace.sh"><b>htrace.sh</b></a> - is a simple Swiss Army knife for http/https troubleshooting and profiling.<br>
  192. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/reorx/httpstat"><b>httpstat</b></a> - is a tool that visualizes curl statistics in a way of beauty and clarity.<br>
  193. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/gchaincl/httplab"><b>httplab</b></a> - is an interactive web server.<br>
  194. &nbsp;&nbsp;:small_orange_diamond: <a href="https://lynx.browser.org/"><b>Lynx</b></a> - is a text browser for the World Wide Web.<br>
  195. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/browsh-org/browsh/"><b>Browsh</b></a> - is a fully interactive, real-time, and modern text-based browser.<br>
  196. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dhamaniasad/HeadlessBrowsers"><b>HeadlessBrowsers</b></a> - a list of (almost) all headless web browsers in existence.<br>
  197. &nbsp;&nbsp;:small_orange_diamond: <a href="https://httpd.apache.org/docs/2.4/programs/ab.html"><b>ab</b></a> - is a single-threaded command line tool for measuring the performance of HTTP web servers.<br>
  198. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.joedog.org/siege-home/"><b>siege</b></a> - is an http load testing and benchmarking utility.<br>
  199. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/wg/wrk"><b>wrk</b></a> - is a modern HTTP benchmarking tool capable of generating significant load.<br>
  200. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/giltene/wrk2"><b>wrk2</b></a> - is a constant throughput, correct latency recording variant of wrk.<br>
  201. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/tsenart/vegeta"><b>vegeta</b></a> - is a constant throughput, correct latency recording variant of wrk.<br>
  202. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/codesenberg/bombardier"><b>bombardier</b></a> - is a fast cross-platform HTTP benchmarking tool written in Go.<br>
  203. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/cmpxchg16/gobench"><b>gobench</b></a> - http/https load testing and benchmarking tool.<br>
  204. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rakyll/hey"><b>hey</b></a> - HTTP load generator, ApacheBench (ab) replacement, formerly known as rakyll/boom.<br>
  205. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/tarekziade/boom"><b>boom</b></a> - is a script you can use to quickly smoke-test your web app deployment.<br>
  206. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/shekyan/slowhttptest"><b>SlowHTTPTest</b></a> - is a tool that simulates some Application Layer Denial of Service attacks by prolonging HTTP.<br>
  207. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/OJ/gobuster"><b>gobuster</b></a> - is a free and open source directory/file & DNS busting tool written in Go.<br>
  208. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/ssllabs/ssllabs-scan"><b>ssllabs-scan</b></a> - command-line reference-implementation client for SSL Labs APIs.<br>
  209. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mozilla/http-observatory"><b>http-observatory</b></a> - Mozilla HTTP Observatory cli version.<br>
  210. </p>
  211. ##### :black_small_square: SSL
  212. <p>
  213. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.openssl.org/"><b>openssl</b></a> - is a robust, commercial-grade, and full-featured toolkit for the TLS and SSL protocols.<br>
  214. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gnutls.org/manual/html_node/gnutls_002dcli-Invocation.html"><b>gnutls-cli</b></a> - client program to set up a TLS connection to some other computer.<br>
  215. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/nabla-c0d3/sslyze"><b>sslyze
  216. </b></a> - fast and powerful SSL/TLS server scanning library.<br>
  217. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rbsec/sslscan"><b>sslscan</b></a> - tests SSL/TLS enabled services to discover supported cipher suites.<br>
  218. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/drwetter/testssl.sh"><b>testssl.sh</b></a> - testing TLS/SSL encryption anywhere on any port.<br>
  219. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mozilla/cipherscan"><b>cipherscan</b></a> - a very simple way to find out which SSL ciphersuites are supported by a target.<br>
  220. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.tarsnap.com/spiped.html"><b>spiped</b></a> - is a utility for creating symmetrically encrypted and authenticated pipes between socket addresses.<br>
  221. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/certbot/certbot"><b>Certbot</b></a> - is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server.<br>
  222. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/FiloSottile/mkcert"><b>mkcert</b></a> - simple zero-config tool to make locally trusted development certificates with any names you'd like.<br>
  223. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/square/certstrap"><b>certstrap</b></a> - tools to bootstrap CAs, certificate requests, and signed certificates.<br>
  224. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/yassineaboukir/sublert"><b>Sublert</b></a> - is a security and reconnaissance tool to automatically monitor new subdomains.<br>
  225. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/trimstray/mkchain"><b>mkchain</b></a> - open source tool to help you build a valid SSL certificate chain.<br>
  226. </p>
  227. ##### :black_small_square: Security
  228. <p>
  229. &nbsp;&nbsp;:small_orange_diamond: <a href="https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/5/html/deployment_guide/ch-selinux"><b>SELinux</b></a> - provides a flexible Mandatory Access Control (MAC) system built into the Linux kernel.<br>
  230. &nbsp;&nbsp;:small_orange_diamond: <a href="https://wiki.ubuntu.com/AppArmor"><b>AppArmor</b></a> - proactively protects the operating system and applications from external or internal threats.<br>
  231. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/grapheneX/grapheneX"><b>grapheneX</b></a> - Automated System Hardening Framework.<br>
  232. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dev-sec/"><b>DevSec Hardening Framework</b></a> - Security + DevOps: Automatic Server Hardening.<br>
  233. </p>
  234. ##### :black_small_square: Auditing Tools
  235. <p>
  236. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.ossec.net/"><b>ossec</b></a> - actively monitoring all aspects of system activity with file integrity monitoring.<br>
  237. &nbsp;&nbsp;:small_orange_diamond: <a href="https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/chap-system_auditing"><b>auditd</b></a> - provides a way to track security-relevant information on your system.<br>
  238. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.nongnu.org/tiger/"><b>Tiger</b></a> - is a security tool that can be use both as a security audit and intrusion detection system.<br>
  239. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cisofy.com/lynis/"><b>Lynis</b></a> - battle-tested security tool for systems running Linux, macOS, or Unix-based operating system.<br>
  240. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rebootuser/LinEnum"><b>LinEnum</b></a> - scripted Local Linux Enumeration & Privilege Escalation Checks.<br>
  241. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/installation/rkhunter"><b>Rkhunter</b></a> - scanner tool for Linux systems that scans backdoors, rootkits and local exploits on your systems.<br>
  242. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/hasherezade/pe-sieve"><b>PE-sieve</b></a> - is a light-weight tool that helps to detect malware running on the system.<br>
  243. </p>
  244. ##### :black_small_square: System Diagnostics/Debuggers
  245. <p>
  246. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/strace/strace"><b>strace</b></a> - diagnostic, debugging and instructional userspace utility for Linux.<br>
  247. &nbsp;&nbsp;:small_orange_diamond: <a href="http://dtrace.org/blogs/about/"><b>DTrace</b></a> - is a performance analysis and troubleshooting tool.<br>
  248. &nbsp;&nbsp;:small_orange_diamond: <a href="https://en.wikipedia.org/wiki/Ltrace"><b>ltrace</b></a> - is a library call tracer, used to trace calls made by programs to library functions.<br>
  249. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/brainsmoke/ptrace-burrito"><b>ptrace-burrito</b></a> - is a friendly wrapper around ptrace.<br>
  250. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/brendangregg/perf-tools"><b>perf-tools</b></a> - performance analysis tools based on Linux perf_events (aka perf) and ftrace.<br>
  251. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/iovisor/bpftrace"><b>bpftrace</b></a> - high-level tracing language for Linux eBPF.<br>
  252. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/draios/sysdig"><b>sysdig</b></a> - system exploration and troubleshooting tool with first class support for containers.<br>
  253. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.valgrind.org/"><b>Valgrind</b></a> - is an instrumentation framework for building dynamic analysis tools.<br>
  254. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/gperftools/gperftools"><b>gperftools</b></a> - high-performance multi-threaded malloc() implementation, plus some performance analysis tools.<br>
  255. &nbsp;&nbsp;:small_orange_diamond: <a href="https://nicolargo.github.io/glances/"><b>glances</b></a> - cross-platform system monitoring tool written in Python.<br>
  256. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/hishamhm/htop"><b>htop</b></a> - interactive text-mode process viewer for Unix systems. It aims to be a better 'top'.<br>
  257. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/aristocratos/bashtop"><b>bashtop</b></a> - Linux resource monitor written in pure Bash.<br>
  258. &nbsp;&nbsp;:small_orange_diamond: <a href="http://nmon.sourceforge.net/pmwiki.php"><b>nmon</b></a> - a single executable for performance monitoring and data analysis.<br>
  259. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.atoptool.nl/"><b>atop</b></a> - ASCII performance monitor. Includes statistics for CPU, memory, disk, swap, network, and processes.<br>
  260. &nbsp;&nbsp;:small_orange_diamond: <a href="https://en.wikipedia.org/wiki/Lsof"><b>lsof</b></a> - displays in its output information about files that are opened by processes.<br>
  261. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.brendangregg.com/flamegraphs.html"><b>FlameGraph</b></a> - stack trace visualizer.<br>
  262. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/zevv/lsofgraph"><b>lsofgraph</b></a> - convert Unix lsof output to a graph showing FIFO and UNIX interprocess communication.<br>
  263. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mozilla/rr"><b>rr</b></a> - is a lightweight tool for recording, replaying and debugging execution of applications.<br>
  264. &nbsp;&nbsp;:small_orange_diamond: <a href="https://pcp.io/index.html"><b>Performance Co-Pilot</b></a> - a system performance analysis toolkit.<br>
  265. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/sharkdp/hexyl"><b>hexyl</b></a> - a command-line hex viewer.<br>
  266. </p>
  267. ##### :black_small_square: Log Analyzers
  268. <p>
  269. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rcoh/angle-grinder"><b>angle-grinder</b></a> - slice and dice log files on the command line.<br>
  270. &nbsp;&nbsp;:small_orange_diamond: <a href="https://lnav.org"><b>lnav</b></a> - log file navigator with search and automatic refresh.<br>
  271. &nbsp;&nbsp;:small_orange_diamond: <a href="https://goaccess.io/"><b>GoAccess</b></a> - real-time web log analyzer and interactive viewer that runs in a terminal.<br>
  272. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/lebinh/ngxtop"><b>ngxtop</b></a> - real-time metrics for nginx server.<br>
  273. </p>
  274. ##### :black_small_square: Databases
  275. <p>
  276. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/xo/usql"><b>usql</b></a> - universal command-line interface for SQL databases.<br>
  277. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dbcli/pgcli"><b>pgcli</b></a> - postgres CLI with autocompletion and syntax highlighting.<br>
  278. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dbcli/mycli"><b>mycli</b></a> - terminal client for MySQL with autocompletion and syntax highlighting.<br>
  279. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dbcli/litecli"><b>litecli</b></a> - SQLite CLI with autocompletion and syntax highlighting.<br>
  280. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dbcli/mssql-cli"><b>mssql-cli</b></a> - SQL Server CLI with autocompletion and syntax highlighting.<br>
  281. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/osquery/osquery"><b>OSQuery</b></a> - is a SQL powered operating system instrumentation, monitoring, and analytics framework.<br>
  282. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/ankane/pgsync"><b>pgsync</b></a> - sync data from one Postgres database to another.<br>
  283. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/laixintao/iredis"><b>iredis</b></a> - a terminal client for redis with autocompletion and syntax highlighting.<br>
  284. </p>
  285. ##### :black_small_square: TOR
  286. <p>
  287. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/GouveaHeitor/nipe"><b>Nipe</b></a> - script to make Tor Network your default gateway.<br>
  288. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/trimstray/multitor"><b>multitor</b></a> - a tool that lets you create multiple TOR instances with a load-balancing.<br>
  289. </p>
  290. ##### :black_small_square: Messengers/IRC Clients
  291. <p>
  292. &nbsp;&nbsp;:small_orange_diamond: <a href="https://irssi.org"><b>Irssi</b></a> - is a free open source terminal based IRC client.<br>
  293. &nbsp;&nbsp;:small_orange_diamond: <a href="https://weechat.org/"><b>WeeChat</b></a> - is an extremely extensible and lightweight IRC client.<br>
  294. </p>
  295. ##### :black_small_square: Productivity
  296. <p>
  297. &nbsp;&nbsp;:small_orange_diamond: <a href="https://taskwarrior.org"><b>taskwarrior</b></a> - task management system, todo list <br>
  298. </p>
  299. ##### :black_small_square: Other
  300. <p>
  301. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/skx/sysadmin-util"><b>sysadmin-util</b></a> - tools for Linux/Unix sysadmins.<br>
  302. &nbsp;&nbsp;:small_orange_diamond: <a href="http://inotify.aiken.cz/"><b>incron</b></a> - is an inode-based filesystem notification technology.<br>
  303. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/axkibe/lsyncd"><b>lsyncd</b></a> - synchronizes local directories with remote targets (Live Syncing Daemon).<br>
  304. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rgburke/grv"><b>GRV</b></a> - is a terminal based interface for viewing Git repositories.<br>
  305. &nbsp;&nbsp;:small_orange_diamond: <a href="https://jonas.github.io/tig/"><b>Tig</b></a> - text-mode interface for Git.<br>
  306. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/tldr-pages/tldr"><b>tldr</b></a> - simplified and community-driven man pages.<br>
  307. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mholt/archiver"><b>archiver</b></a> - easily create and extract .zip, .tar, .tar.gz, .tar.bz2, .tar.xz, .tar.lz4, .tar.sz, and .rar.<br>
  308. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/tj/commander.js"><b>commander.js</b></a> - minimal CLI creator in JavaScript.<br>
  309. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/tomnomnom/gron"><b>gron</b></a> - make JSON greppable!<br>
  310. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/itchyny/bed"><b>bed</b></a> - binary editor written in Go.<br>
  311. </p>
  312. #### GUI Tools &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  313. ##### :black_small_square: Terminal emulators
  314. <p>
  315. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Guake/guake"><b>Guake</b></a> - is a dropdown terminal made for the GNOME desktop environment.<br>
  316. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gnometerminator.blogspot.com/p/introduction.html"><b>Terminator</b></a> - is based on GNOME Terminal, useful features for sysadmins and other users.<br>
  317. &nbsp;&nbsp;:small_orange_diamond: <a href="https://sw.kovidgoyal.net/kitty/"><b>Kitty</b></a> - is a GPU based terminal emulator that supports smooth scrolling and images.<br>
  318. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/alacritty/alacritty"><b>Alacritty</b></a> - is a fast, cross-platform, OpenGL terminal emulator.<br>
  319. </p>
  320. ##### :black_small_square: Network
  321. <p>
  322. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.wireshark.org/"><b>Wireshark</b></a> - is the world’s foremost and widely-used network protocol analyzer.<br>
  323. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.ettercap-project.org/"><b>Ettercap</b></a> - is a comprehensive network monitor tool.<br>
  324. &nbsp;&nbsp;:small_orange_diamond: <a href="https://etherape.sourceforge.io/"><b>EtherApe</b></a> - is a graphical network monitoring solution.<br>
  325. &nbsp;&nbsp;:small_orange_diamond: <a href="https://packetsender.com/"><b>Packet Sender</b></a> - is a networking utility for packet generation and built-in UDP/TCP/SSL client and servers.<br>
  326. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ostinato.org/"><b>Ostinato</b></a> - is a packet crafter and traffic generator.<br>
  327. &nbsp;&nbsp;:small_orange_diamond: <a href="https://jmeter.apache.org/"><b>JMeter™</b></a> - open source software to load test functional behavior and measure performance.<br>
  328. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/locustio/locust"><b>locust</b></a> - scalable user load testing tool written in Python.<br>
  329. </p>
  330. ##### :black_small_square: Browsers
  331. <p>
  332. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.torproject.org/"><b>TOR Browser</b></a> - protect your privacy and defend yourself against network surveillance and traffic analysis.<br>
  333. </p>
  334. ##### :black_small_square: Password Managers
  335. <p>
  336. &nbsp;&nbsp;:small_orange_diamond: <a href="https://keepassxc.org/"><b>KeePassXC</b></a> - store your passwords safely and auto-type them into your everyday websites and apps.<br>
  337. &nbsp;&nbsp;:small_orange_diamond: <a href="https://bitwarden.com/"><b>Bitwarden</b></a> - open source password manager with built-in sync.<br>
  338. </p>
  339. ##### :black_small_square: Messengers/IRC Clients
  340. <p>
  341. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hexchat.github.io/index.html"><b>HexChat</b></a> - is an IRC client based on XChat.<br>
  342. &nbsp;&nbsp;:small_orange_diamond: <a href="https://pidgin.im/"><b>Pidgin</b></a> - is an easy to use and free chat client used by millions.<br>
  343. </p>
  344. ##### :black_small_square: Messengers (end-to-end encryption)
  345. <p>
  346. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.signal.org/"><b>Signal</b></a> - is an encrypted communications app.<br>
  347. &nbsp;&nbsp;:small_orange_diamond: <a href="https://wire.com/en/"><b>Wire</b></a> - secure messaging, file sharing, voice calls and video conferences. All protected with end-to-end encryption.<br>
  348. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/prof7bit/TorChat"><b>TorChat</b></a> - decentralized anonymous instant messenger on top of Tor Hidden Services.<br>
  349. &nbsp;&nbsp;:small_orange_diamond: <a href="https://matrix.org/"><b>Matrix</b></a> - an open network for secure, decentralized, real-time communication.<br>
  350. </p>
  351. ##### :black_small_square: Text editors
  352. <p>
  353. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.sublimetext.com/3"><b>Sublime Text</b></a> - is a lightweight, cross-platform code editor known for its speed, ease of use.<br>
  354. &nbsp;&nbsp;:small_orange_diamond: <a href="https://code.visualstudio.com/"><b>Visual Studio Code</b></a> - an open-source and free source code editor developed by Microsoft.<br>
  355. &nbsp;&nbsp;:small_orange_diamond: <a href="https://atom.io/"><b>Atom</b></a> - a hackable text editor for the 21st Century.<br>
  356. </p>
  357. #### Web Tools &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  358. ##### :black_small_square: Browsers
  359. <p>
  360. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.ssllabs.com/ssltest/viewMyClient.html"><b>SSL/TLS Capabilities of Your Browser</b></a> - test your browser's SSL implementation.<br>
  361. &nbsp;&nbsp;:small_orange_diamond: <a href="https://caniuse.com/"><b>Can I use</b></a> - provides up-to-date browser support tables for support of front-end web technologies.<br>
  362. &nbsp;&nbsp;:small_orange_diamond: <a href="https://panopticlick.eff.org/"><b>Panopticlick 3.0</b></a> - is your browser safe against tracking?<br>
  363. &nbsp;&nbsp;:small_orange_diamond: <a href="https://privacy.net/analyzer/"><b>Privacy Analyzer</b></a> - see what data is exposed from your browser.<br>
  364. &nbsp;&nbsp;:small_orange_diamond: <a href="https://browserleaks.com/"><b>Web Browser Security</b></a> - it's all about Web Browser fingerprinting.<br>
  365. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.howsmyssl.com/"><b>How's My SSL?</b></a> - help a web server developer learn what real world TLS clients were capable of.<br>
  366. &nbsp;&nbsp;:small_orange_diamond: <a href="https://suche.org/sslClientInfo"><b>sslClientInfo</b></a> - client test (incl TLSv1.3 information).<br>
  367. </p>
  368. ##### :black_small_square: SSL/Security
  369. <p>
  370. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.ssllabs.com/ssltest/"><b>SSLLabs Server Test</b></a> - performs a deep analysis of the configuration of any SSL web server.<br>
  371. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dev.ssllabs.com/ssltest/"><b>SSLLabs Server Test (DEV)</b></a> - performs a deep analysis of the configuration of any SSL web server.<br>
  372. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.immuniweb.com/ssl/"><b>ImmuniWeb® SSLScan</b></a> - test SSL/TLS (PCI DSS, HIPAA and NIST).<br>
  373. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.jitbit.com/sslcheck/"><b>SSL Check</b></a> - scan your website for non-secure content.<br>
  374. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.ssltools.com"><b>SSL Scanner</b></a> - analyze website security.<br>
  375. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cryptcheck.fr/"><b>CryptCheck</b></a> - test your TLS server configuration (e.g. ciphers).<br>
  376. &nbsp;&nbsp;:small_orange_diamond: <a href="https://urlscan.io/"><b>urlscan.io</b></a> - service to scan and analyse websites.<br>
  377. &nbsp;&nbsp;:small_orange_diamond: <a href="https://report-uri.com/home/tools"><b>Report URI</b></a> - monitoring security policies like CSP and HPKP.<br>
  378. &nbsp;&nbsp;:small_orange_diamond: <a href="https://csp-evaluator.withgoogle.com/"><b>CSP Evaluator</b></a> - allows developers and security experts to check if a Content Security Policy.<br>
  379. &nbsp;&nbsp;:small_orange_diamond: <a href="https://uselesscsp.com/"><b>Useless CSP</b></a> - public list about CSP in some big players (might make them care a bit more).<br>
  380. &nbsp;&nbsp;:small_orange_diamond: <a href="https://whynohttps.com/"><b>Why No HTTPS?</b></a> - top 100 websites by Alexa rank not automatically redirecting insecure requests.<br>
  381. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ciphersuite.info/"><b>TLS Cipher Suite Search</b></a>- cipher suite search engine.<br>
  382. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/RaymiiOrg/cipherli.st"><b>cipherli.st</b></a> - strong ciphers for Apache, Nginx, Lighttpd, and more.<b>*</b><br>
  383. &nbsp;&nbsp;:small_orange_diamond: <a href="https://2ton.com.au/dhtool/"><b>dhtool</b></a> - public Diffie-Hellman parameter service/tool.<br>
  384. &nbsp;&nbsp;:small_orange_diamond: <a href="https://badssl.com/"><b>badssl.com</b></a> - memorable site for testing clients against bad SSL configs.<br>
  385. &nbsp;&nbsp;:small_orange_diamond: <a href="https://tlsfun.de/"><b>tlsfun.de</b></a> - registered for various tests regarding the TLS/SSL protocol.<br>
  386. &nbsp;&nbsp;:small_orange_diamond: <a href="https://sslmate.com/caa/"><b>CAA Record Helper</b></a> - generate a CAA policy.<br>
  387. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ccadb.org/resources"><b>Common CA Database</b></a> - repository of information about CAs, and their root and intermediate certificates.<br>
  388. &nbsp;&nbsp;:small_orange_diamond: <a href="https://certstream.calidog.io/"><b>CERTSTREAM</b></a> - real-time certificate transparency log update stream.<br>
  389. &nbsp;&nbsp;:small_orange_diamond: <a href="https://crt.sh/"><b>crt.sh</b></a> - discovers certificates by continually monitoring all of the publicly known CT.<br>
  390. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hardenize.com/"><b>Hardenize</b></a> - deploy the security standards.<br>
  391. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cryptcheck.fr/suite/"><b>Cipher suite compatibility</b></a> - test TLS cipher suite compatibility.<br>
  392. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.urlvoid.com/"><b>urlvoid</b></a> - this service helps you detect potentially malicious websites.<br>
  393. &nbsp;&nbsp;:small_orange_diamond: <a href="https://securitytxt.org/"><b>security.txt</b></a> - a proposed standard (generator) which allows websites to define security policies.<br>
  394. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mozilla/ssl-config-generator"><b>ssl-config-generator</b></a> - help you follow the Mozilla Server Side TLS configuration guidelines.<br>
  395. </p>
  396. ##### :black_small_square: HTTP Headers & Web Linters
  397. <p>
  398. &nbsp;&nbsp;:small_orange_diamond: <a href="https://securityheaders.com/"><b>Security Headers</b></a> - analyse the HTTP response headers (with rating system to the results).<br>
  399. &nbsp;&nbsp;:small_orange_diamond: <a href="https://observatory.mozilla.org/"><b>Observatory by Mozilla</b></a> - set of tools to analyze your website.<br>
  400. &nbsp;&nbsp;:small_orange_diamond: <a href="https://webhint.io/"><b>webhint</b></a> - is a linting tool that will help you with your site's accessibility, speed, security, and more.<br>
  401. </p>
  402. ##### :black_small_square: DNS
  403. <p>
  404. &nbsp;&nbsp;:small_orange_diamond: <a href="http://viewdns.info/"><b>ViewDNS</b></a> - one source for free DNS related tools and information.<br>
  405. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dnslookup.org/"><b>DNSLookup</b></a> - is an advanced DNS lookup tool.<br>
  406. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dnslytics.com/"><b>DNSlytics</b></a> - online DNS investigation tool.<br>
  407. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dnsspy.io/"><b>DNS Spy</b></a> - monitor, validate and verify your DNS configurations.<br>
  408. &nbsp;&nbsp;:small_orange_diamond: <a href="https://zonemaster.iis.se/en/"><b>Zonemaster</b></a> - helps you to control how your DNS works.<br>
  409. &nbsp;&nbsp;:small_orange_diamond: <a href="http://leafdns.com/"><b>Leaf DNS</b></a> - comprehensive DNS tester.<br>
  410. &nbsp;&nbsp;:small_orange_diamond: <a href="https://findsubdomains.com/"><b>Find subdomains online</b></a> - find subdomains for security assessment penetration test.<br>
  411. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dnsdumpster.com/"><b>DNSdumpster</b></a> - dns recon & research, find & lookup dns records.<br>
  412. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dnstable.com/"><b>DNS Table online</b></a> - search for DNS records by domain, IP, CIDR, ISP.<br>
  413. &nbsp;&nbsp;:small_orange_diamond: <a href="https://intodns.com/"><b>intoDNS</b></a> - DNS and mail server health checker.<br>
  414. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.zonecut.net/dns/"><b>DNS Bajaj</b></a> - check the delegation of your domain.<br>
  415. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.buddyns.com/delegation-lab/"><b>BuddyDNS Delegation LAB</b></a> - check, trace and visualize delegation of your domain.<br>
  416. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dnssec-debugger.verisignlabs.com/"><b>dnssec-debugger</b></a> - DS or DNSKEY records validator.<br>
  417. &nbsp;&nbsp;:small_orange_diamond: <a href="http://ptrarchive.com/"><b>PTRarchive.com</b></a> - this site is responsible for the safekeeping of historical reverse DNS records.<br>
  418. &nbsp;&nbsp;:small_orange_diamond: <a href="http://xip.io/"><b>xip.io</b></a> - wildcard DNS for everyone.<br>
  419. &nbsp;&nbsp;:small_orange_diamond: <a href="https://nip.io/"><b>nip.io</b></a> - dead simple wildcard DNS for any IP Address.<br>
  420. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ceipam.eu/en/dnslookup.php"><b>dnslookup (ceipam)</b></a> - one of the best DNS propagation checker (and not only).<br>
  421. &nbsp;&nbsp;:small_orange_diamond: <a href="https://whatsmydns.com"><b>What's My DNS</b></a> - DNS propagation checking tool.<br>
  422. &nbsp;&nbsp;:small_orange_diamond: <a href="https://blog.erbbysam.com/index.php/2019/02/09/dnsgrep/"><b>DNSGrep</b></a> - quickly searching large DNS datasets.<br>
  423. </p>
  424. ##### :black_small_square: Mail
  425. <p>
  426. &nbsp;&nbsp;:small_orange_diamond: <a href="https://luxsci.com/smtp-tls-checker"><b>smtp-tls-checker</b></a> - check an email domain for SMTP TLS support.<br>
  427. &nbsp;&nbsp;:small_orange_diamond: <a href="https://mxtoolbox.com/SuperTool.aspx"><b>MX Toolbox</b></a> - all of your MX record, DNS, blacklist and SMTP diagnostics in one integrated tool.<br>
  428. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.checktls.com/index.html"><b>Secure Email</b></a> - complete email test tools for email technicians.<br>
  429. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.blacklistalert.org/"><b>blacklistalert</b></a> - checks to see if your domain is on a Real Time Spam Blacklist.<br>
  430. &nbsp;&nbsp;:small_orange_diamond: <a href="http://multirbl.valli.org/"><b>MultiRBL</b></a> - complete IP check for sending Mailservers.<br>
  431. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dkimvalidator.com/"><b>DKIM SPF & Spam Assassin Validator</b></a> - checks mail authentication and scores messages with Spam Assassin.<br>
  432. </p>
  433. ##### :black_small_square: Encoders/Decoders and Regex testing
  434. <p>
  435. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.url-encode-decode.com/"><b>URL Encode/Decode</b></a> - tool from above to either encode or decode a string of text.<br>
  436. &nbsp;&nbsp;:small_orange_diamond: <a href="https://uncoder.io/"><b>Uncoder</b></a> - the online translator for search queries on log data.<br>
  437. &nbsp;&nbsp;:small_orange_diamond: <a href="https://regex101.com/"><b>Regex101</b></a> - online regex tester and debugger: PHP, PCRE, Python, Golang and JavaScript.<br>
  438. &nbsp;&nbsp;:small_orange_diamond: <a href="https://regexr.com/"><b>RegExr</b></a> - online tool to learn, build, & test Regular Expressions (RegEx / RegExp).<br>
  439. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.regextester.com/"><b>RegEx Testing</b></a> - online regex testing tool.<br>
  440. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.regexpal.com/"><b>RegEx Pal</b></a> - online regex testing tool + other tools.<br>
  441. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gchq.github.io/CyberChef/"><b>The Cyber Swiss Army Knife</b></a> - a web app for encryption, encoding, compression and data analysis.<br>
  442. </p>
  443. ##### :black_small_square: Net-tools
  444. <p>
  445. &nbsp;&nbsp;:small_orange_diamond: <a href="https://toolbar.netcraft.com/site_report"><b>Netcraft</b></a> - detailed report about the site, helping you to make informed choices about their integrity.<b>*</b><br>
  446. &nbsp;&nbsp;:small_orange_diamond: <a href="https://atlas.ripe.net/"><b>RIPE NCC Atlas</b></a> - a global, open, distributed Internet measurement platform.<br>
  447. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.robtex.com/"><b>Robtex</b></a> - uses various sources to gather public information about IP numbers, domain names, host names, etc.<br>
  448. &nbsp;&nbsp;:small_orange_diamond: <a href="https://securitytrails.com/"><b>Security Trails</b></a> - APIs for Security Companies, Researchers and Teams.<br>
  449. &nbsp;&nbsp;:small_orange_diamond: <a href="https://tools.keycdn.com/curl"><b>Online Curl</b></a> - curl test, analyze HTTP Response Headers.<br>
  450. &nbsp;&nbsp;:small_orange_diamond: <a href="https://extendsclass.com/"><b>Online Tools for Developers</b></a> - HTTP API tools, testers, encoders, converters, formatters, and other tools.<br>
  451. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ping.eu/"><b>Ping.eu</b></a> - online Ping, Traceroute, DNS lookup, WHOIS and others.<br>
  452. &nbsp;&nbsp;:small_orange_diamond: <a href="https://network-tools.com/"><b>Network-Tools</b></a> - network tools for webmasters, IT technicians & geeks.<br>
  453. &nbsp;&nbsp;:small_orange_diamond: <a href="https://bgpview.io/"><b>BGPview</b></a> - search for any ASN, IP, Prefix or Resource name.<br>
  454. &nbsp;&nbsp;:small_orange_diamond: <a href="https://isbgpsafeyet.com/"><b>Is BGP safe yet?</b></a> - check BGP (RPKI) security of ISPs and other major Internet players.<br>
  455. &nbsp;&nbsp;:small_orange_diamond: <a href="https://riseup.net/"><b>Riseup</b></a> - provides online communication tools for people and groups working on liberatory social change.<br>
  456. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.virustotal.com/gui/home/upload"><b>VirusTotal</b></a> - analyze suspicious files and URLs to detect types of malware.<br>
  457. </p>
  458. ##### :black_small_square: Privacy
  459. <p>
  460. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.privacytools.io/"><b>privacytools.io</b></a> - provides knowledge and tools to protect your privacy against global mass surveillance.<br>
  461. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Test+Servers"><b>DNS Privacy Test Servers</b></a> - DNS privacy recursive servers list (with a 'no logging' policy).<br>
  462. </p>
  463. ##### :black_small_square: Code parsers/playgrounds
  464. <p>
  465. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.shellcheck.net/"><b>ShellCheck</b></a> - finds bugs in your shell scripts.<br>
  466. &nbsp;&nbsp;:small_orange_diamond: <a href="https://explainshell.com/"><b>explainshell</b></a> - get interactive help texts for shell commands.<br>
  467. &nbsp;&nbsp;:small_orange_diamond: <a href="https://jsbin.com/?html,output"><b>jsbin</b></a> - live pastebin for HTML, CSS & JavaScript, and more.<br>
  468. &nbsp;&nbsp;:small_orange_diamond: <a href="https://codesandbox.io/"><b>CodeSandbox</b></a> - online code editor for web application development.<br>
  469. &nbsp;&nbsp;:small_orange_diamond: <a href="http://sandbox.onlinephpfunctions.com/"><b>PHP Sandbox</b></a> - test your PHP code with this code tester.<br>
  470. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.repl.it/"><b>Repl.it</b></a> - an instant IDE to learn, build, collaborate, and host all in one place.<br>
  471. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.vclfiddle.net/"><b>vclFiddle</b></a> - is an online tool for experimenting with the Varnish Cache VCL.<br>
  472. </p>
  473. ##### :black_small_square: Performance
  474. <p>
  475. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gtmetrix.com/"><b>GTmetrix</b></a> - analyze your site’s speed and make it faster.<br>
  476. &nbsp;&nbsp;:small_orange_diamond: <a href="https://performance.sucuri.net/"><b>Sucuri loadtimetester</b></a> - test here the
  477. performance of any of your sites from across the globe.<br>
  478. &nbsp;&nbsp;:small_orange_diamond: <a href="https://tools.pingdom.com/"><b>Pingdom Tools</b></a> - analyze your site’s speed around the world.<br>
  479. &nbsp;&nbsp;:small_orange_diamond: <a href="https://pingme.io/"><b>PingMe.io</b></a> - run website latency tests across multiple geographic regions.<br>
  480. &nbsp;&nbsp;:small_orange_diamond: <a href="https://developers.google.com/speed/pagespeed/insights/"><b>PageSpeed Insights</b></a> - analyze your site’s speed and make it faster.<br>
  481. &nbsp;&nbsp;:small_orange_diamond: <a href="https://web.dev/"><b>web.dev</b></a> - helps developers like you learn and apply the web's modern capabilities to your own sites and apps.<br>
  482. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/GoogleChrome/lighthouse"><b>Lighthouse</b></a> - automated auditing, performance metrics, and best practices for the web.<br>
  483. </p>
  484. ##### :black_small_square: Mass scanners (search engines)
  485. <p>
  486. &nbsp;&nbsp;:small_orange_diamond: <a href="https://censys.io/"><b>Censys</b></a> - platform that helps information security practitioners discover, monitor, and analyze devices.<br>
  487. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.shodan.io/"><b>Shodan</b></a> - the world's first search engine for Internet-connected devices.<br>
  488. &nbsp;&nbsp;:small_orange_diamond: <a href="https://2000.shodan.io/#/"><b>Shodan 2000</b></a> - this tool looks for randomly generated data from Shodan.<br>
  489. &nbsp;&nbsp;:small_orange_diamond: <a href="https://viz.greynoise.io/table"><b>GreyNoise</b></a> - mass scanner such as Shodan and Censys.<br>
  490. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.zoomeye.org/"><b>ZoomEye</b></a> - search engine for cyberspace that lets the user find specific network components.<br>
  491. &nbsp;&nbsp;:small_orange_diamond: <a href="https://netograph.io/"><b>netograph</b></a> - tools to monitor and understand deep structure of the web.<br>
  492. &nbsp;&nbsp;:small_orange_diamond: <a href="https://fofa.so/"><b>FOFA</b></a> - is a cyberspace search engine.<br>
  493. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.onyphe.io/"><b>onyphe</b></a> - is a search engine for open-source and cyber threat intelligence data collected.<br>
  494. &nbsp;&nbsp;:small_orange_diamond: <a href="https://intelx.io/"><b>IntelligenceX</b></a> - is a search engine and data archive.<br>
  495. &nbsp;&nbsp;:small_orange_diamond: <a href="https://app.binaryedge.io/"><b>binaryedge</b></a> - it scan the entire internet space and create real-time threat intelligence streams and reports.<br>
  496. &nbsp;&nbsp;:small_orange_diamond: <a href="https://spyse.com/"><b>Spyse</b></a> - Internet assets registry: networks, threats, web objects, etc.<br>
  497. &nbsp;&nbsp;:small_orange_diamond: <a href="https://wigle.net/"><b>wigle</b></a> - is a submission-based catalog of wireless networks. All the networks. Found by Everyone.<br>
  498. &nbsp;&nbsp;:small_orange_diamond: <a href="https://publicwww.com/"><b>PublicWWW</b></a> - find any alphanumeric snippet, signature or keyword in the web pages HTML, JS and CSS code.<br>
  499. &nbsp;&nbsp;:small_orange_diamond: <a href="https://inteltechniques.com/index.html"><b>IntelTechniques</b></a> - this repository contains hundreds of online search utilities.<br>
  500. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hunter.io/"><b>hunter</b></a> - lets you find email addresses in seconds and connect with the people that matter for your business.<br>
  501. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ghostproject.fr/"><b>GhostProject?</b></a> - search by full email address or username.<br>
  502. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.databreaches.live/"><b>databreaches</b></a> - was my email affected by data breach?<br>
  503. &nbsp;&nbsp;:small_orange_diamond: <a href="https://weleakinfo.com"><b>We Leak Info</b></a> - world's fastest and largest data breach search engine.<br>
  504. &nbsp;&nbsp;:small_orange_diamond: <a href="https://pulsedive.com/"><b>Pulsedive</b></a> - scans of malicious URLs, IPs, and domains, including port scans and web requests.<br>
  505. &nbsp;&nbsp;:small_orange_diamond: <a href="https://buckets.grayhatwarfare.com/"><b>Buckets by Grayhatwarfar</b></a> - database with public search for Open Amazon S3 Buckets and their contents.<br>
  506. &nbsp;&nbsp;:small_orange_diamond: <a href="https://vigilante.pw/"><b>Vigilante.pw</b></a> - the breached database directory.<br>
  507. &nbsp;&nbsp;:small_orange_diamond: <a href="https://builtwith.com/"><b>builtwith</b></a> - find out what websites are built with.<br>
  508. &nbsp;&nbsp;:small_orange_diamond: <a href="https://nerdydata.com/"><b>NerdyData</b></a> - search the web's source code for technologies, across millions of sites.<br>
  509. &nbsp;&nbsp;:small_orange_diamond: <a href="http://zorexeye.com/"><b>zorexeye</b></a> - search for sites, images, apps, softwares & more.<br>
  510. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.mmnt.net/"><b>Mamont's open FTP Index</b></a> - if a target has an open FTP site with accessible content it will be listed here.<br>
  511. &nbsp;&nbsp;:small_orange_diamond: <a href="https://osintframework.com/"><b>OSINT Framework</b></a> - focused on gathering information from free tools or resources.<br>
  512. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.maltiverse.com/search"><b>maltiverse</b></a> - is a service oriented to cybersecurity analysts for the advanced analysis of indicators of compromise.<br>
  513. &nbsp;&nbsp;:small_orange_diamond: <a href="https://leakedsource.ru/main/"><b>Leaked Source</b></a> - is a collaboration of data found online in the form of a lookup.<br>
  514. &nbsp;&nbsp;:small_orange_diamond: <a href="https://search.weleakinfo.com/"><b>We Leak Info</b></a> - to help everyday individuals secure their online life, avoiding getting hacked.<br>
  515. &nbsp;&nbsp;:small_orange_diamond: <a href="https://pipl.com/"><b>pipl</b></a> - is the place to find the person behind the email address, social username or phone number.<br>
  516. &nbsp;&nbsp;:small_orange_diamond: <a href="https://abuse.ch/"><b>abuse.ch</b></a> - is operated by a random swiss guy fighting malware for non-profit.<br>
  517. &nbsp;&nbsp;:small_orange_diamond: <a href="http://malc0de.com/database/"><b>malc0de</b></a> - malware search engine.<br>
  518. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cybercrime-tracker.net/index.php"><b>Cybercrime Tracker</b></a> - monitors and tracks various malware families that are used to perpetrate cyber crimes.<br>
  519. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/eth0izzle/shhgit/"><b>shhgit</b></a> - find GitHub secrets in real time.<br>
  520. &nbsp;&nbsp;:small_orange_diamond: <a href="https://searchcode.com/"><b>searchcode</b></a> - helping you find real world examples of functions, API's and libraries.<br>
  521. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.insecam.org/"><b>Insecam</b></a> - the world biggest directory of online surveillance security cameras.<br>
  522. &nbsp;&nbsp;:small_orange_diamond: <a href="http://index-of.es/"><b>index-of</b></a> - contains great stuff like: security, hacking, reverse engineering, cryptography, programming etc.<br>
  523. &nbsp;&nbsp;:small_orange_diamond: <a href="https://opendata.rapid7.com/"><b>Rapid7 Labs Open Data</b></a> - is a great resources of datasets from Project Sonar.<br>
  524. &nbsp;&nbsp;:small_orange_diamond: <a href="https://webtechsurvey.com/common-response-headers"><b>Common Response Headers</b></a> - the largest database of HTTP response headers.<br>
  525. </p>
  526. ##### :black_small_square: Generators
  527. <p>
  528. &nbsp;&nbsp;:small_orange_diamond: <a href="https://thispersondoesnotexist.com/"><b>thispersondoesnotexist</b></a> - generate fake faces in one click - endless possibilities.<br>
  529. &nbsp;&nbsp;:small_orange_diamond: <a href="https://generated.photos"><b>AI Generated Photos</b></a> - 100.000 AI generated faces.<br>
  530. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.fakenamegenerator.com/"><b>fakenamegenerator</b></a> - your randomly generated identity.<br>
  531. &nbsp;&nbsp;:small_orange_diamond: <a href="https://tools.intigriti.io/redirector/"><b>Intigriti Redirector</b></a> - open redirect/SSRF payload generator.<br>
  532. </p>
  533. ##### :black_small_square: Passwords
  534. <p>
  535. &nbsp;&nbsp;:small_orange_diamond: <a href="https://haveibeenpwned.com/"><b>have i been pwned?</b></a> - check if you have an account that has been compromised in a data breach.<br>
  536. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.dehashed.com/"><b>dehashed</b></a> - is a hacked database search engine.<br>
  537. &nbsp;&nbsp;:small_orange_diamond: <a href="https://leakedsource.ru/"><b>Leaked Source</b></a> - is a collaboration of data found online in the form of a lookup.<br>
  538. </p>
  539. ##### :black_small_square: CVE/Exploits databases
  540. <p>
  541. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cve.mitre.org/"><b>CVE Mitre</b></a> - list of publicly known cybersecurity vulnerabilities.<br>
  542. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.cvedetails.com/"><b>CVE Details</b></a> - CVE security vulnerability advanced database.<br>
  543. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.exploit-db.com/"><b>Exploit DB</b></a> - CVE compliant archive of public exploits and corresponding vulnerable software.<br>
  544. &nbsp;&nbsp;:small_orange_diamond: <a href="https://0day.today/"><b>0day.today</b></a> - exploits market provides you the possibility to buy/sell zero-day exploits.<br>
  545. &nbsp;&nbsp;:small_orange_diamond: <a href="https://sploitus.com/"><b>sploitus</b></a> - the exploit and tools database.<br>
  546. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cxsecurity.com/exploit/"><b>cxsecurity</b></a> - free vulnerability database.<br>
  547. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.vulncode-db.com/"><b>Vulncode-DB</b></a> - is a database for vulnerabilities and their corresponding source code if available.<br>
  548. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cveapi.com/"><b>cveapi</b></a> - free API for CVE data.<br>
  549. </p>
  550. ##### :black_small_square: Mobile apps scanners
  551. <p>
  552. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.immuniweb.com/mobile/"><b>ImmuniWeb® Mobile App Scanner</b></a> - test security and privacy of mobile apps (iOS & Android).<br>
  553. &nbsp;&nbsp;:small_orange_diamond: <a href="https://vulnerabilitytest.quixxi.com/"><b>Quixxi</b></a> - free Mobile App Vulnerability Scanner for Android & iOS.<br>
  554. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.ostorlab.co/scan/mobile/"><b>Ostorlab</b></a> - analyzes mobile application to identify vulnerabilities and potential weaknesses.<br>
  555. </p>
  556. ##### :black_small_square: Private Search Engines
  557. <p>
  558. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.startpage.com/"><b>Startpage</b></a> - the world's most private search engine.<br>
  559. &nbsp;&nbsp;:small_orange_diamond: <a href="https://searx.me/"><b>searX</b></a> - a privacy-respecting, hackable metasearch engine.<br>
  560. &nbsp;&nbsp;:small_orange_diamond: <a href="https://darksearch.io/"><b>darksearch</b></a> - the 1st real Dark Web search engine.<br>
  561. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.qwant.com/"><b>Qwant</b></a> - the search engine that respects your privacy.<br>
  562. &nbsp;&nbsp;:small_orange_diamond: <a href="https://duckduckgo.com/"><b>DuckDuckGo</b></a> - the search engine that doesn't track you.<br>
  563. &nbsp;&nbsp;:small_orange_diamond: <a href="https://swisscows.com/"><b>Swisscows</b></a> - privacy safe web search<br>
  564. &nbsp;&nbsp;:small_orange_diamond: <a href="https://search.disconnect.me/"><b>Disconnect</b></a> - the search engine that anonymizes your searches.<br>
  565. &nbsp;&nbsp;:small_orange_diamond: <a href="https://metager.org/"><b>MetaGer</b></a> - the search engine that uses anonymous proxy and hidden Tor branches.<br>
  566. </p>
  567. ##### :black_small_square: Secure Webmail Providers
  568. <p>
  569. &nbsp;&nbsp;:small_orange_diamond: <a href="https://countermail.com/"><b>CounterMail</b></a> - online email service, designed to provide maximum security and privacy.<br>
  570. &nbsp;&nbsp;:small_orange_diamond: <a href="http://mail2tor.com/"><b>Mail2Tor</b></a> - is a Tor Hidden Service that allows anyone to send and receive emails anonymously.<br>
  571. &nbsp;&nbsp;:small_orange_diamond: <a href="https://tutanota.com/"><b>Tutanota</b></a> - is the world's most secure email service and amazingly easy to use.<br>
  572. &nbsp;&nbsp;:small_orange_diamond: <a href="https://protonmail.com/"><b>Protonmail</b></a> - is the world's largest secure email service, developed by CERN and MIT scientists.<br>
  573. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.startmail.com/en/"><b>Startmail</b></a> - private & encrypted email made easy.<br>
  574. </p>
  575. ##### :black_small_square: Crypto
  576. <p>
  577. &nbsp;&nbsp;:small_orange_diamond: <a href="https://keybase.io/"><b>Keybase</b></a> - it's open source and powered by public-key cryptography.<br>
  578. </p>
  579. ##### :black_small_square: PGP Keyservers
  580. <p>
  581. &nbsp;&nbsp;:small_orange_diamond: <a href="https://keyserver.ubuntu.com/"><b>SKS OpenPGP Key server</b></a> - services for the SKS keyservers used by OpenPGP.<br>
  582. </p>
  583. #### Systems/Services &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  584. ##### :black_small_square: Operating Systems
  585. <p>
  586. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.slackware.com/"><b>Slackware</b></a> - the most "Unix-like" Linux distribution.<br>
  587. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.openbsd.org/"><b>OpenBSD</b></a> - multi-platform 4.4BSD-based UNIX-like operating system.<br>
  588. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hardenedbsd.org/"><b>HardenedBSD</b></a> - HardenedBSD aims to implement innovative exploit mitigation and security solutions.<br>
  589. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.kali.org/"><b>Kali Linux</b></a> - Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.<br>
  590. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.parrotsec.org/"><b>Parrot Security OS</b></a> - cyber security GNU/Linux environment.<br>
  591. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.backbox.org/"><b>Backbox Linux</b></a> - penetration test and security assessment oriented Ubuntu-based Linux distribution.<br>
  592. &nbsp;&nbsp;:small_orange_diamond: <a href="https://blackarch.org/"><b>BlackArch</b></a> - is an Arch Linux-based penetration testing distribution for penetration testers.<br>
  593. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.pentoo.ch/"><b>Pentoo</b></a> - is a security-focused livecd based on Gentoo.<br>
  594. &nbsp;&nbsp;:small_orange_diamond: <a href="https://securityonion.net/"><b>Security Onion</b></a> - Linux distro for intrusion detection, enterprise security monitoring, and log management.<br>
  595. &nbsp;&nbsp;:small_orange_diamond: <a href="https://tails.boum.org/"><b>Tails</b></a> - is a live system that aims to preserve your privacy and anonymity.<br>
  596. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/vedetta-com/vedetta"><b>vedetta</b></a> - OpenBSD router boilerplate.<br>
  597. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.qubes-os.org"><b>Qubes OS</b></a> - is a security-oriented OS that uses Xen-based virtualization.<br>
  598. </p>
  599. ##### :black_small_square: HTTP(s) Services
  600. <p>
  601. &nbsp;&nbsp;:small_orange_diamond: <a href="https://varnish-cache.org/"><b>Varnish Cache</b></a> - HTTP accelerator designed for content-heavy dynamic web sites.<br>
  602. &nbsp;&nbsp;:small_orange_diamond: <a href="https://nginx.org/"><b>Nginx</b></a> - open source web and reverse proxy server that is similar to Apache, but very light weight.<br>
  603. &nbsp;&nbsp;:small_orange_diamond: <a href="https://openresty.org/en/"><b>OpenResty</b></a> - is a dynamic web platform based on NGINX and LuaJIT.<br>
  604. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/alibaba/tengine"><b>Tengine</b></a> - a distribution of Nginx with some advanced features.<br>
  605. &nbsp;&nbsp;:small_orange_diamond: <a href="https://caddyserver.com/"><b>Caddy Server</b></a> - is an open source, HTTP/2-enabled web server with HTTPS by default.<br>
  606. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.haproxy.org/"><b>HAProxy</b></a> - the reliable, high performance TCP/HTTP load balancer.<br>
  607. </p>
  608. ##### :black_small_square: DNS Services
  609. <p>
  610. &nbsp;&nbsp;:small_orange_diamond: <a href="https://nlnetlabs.nl/projects/unbound/about/"><b>Unbound</b></a> - validating, recursive, and caching DNS resolver (with TLS).<br>
  611. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.knot-resolver.cz/"><b>Knot Resolver</b></a> - caching full resolver implementation, including both a resolver library and a daemon.<br>
  612. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.powerdns.com/"><b>PowerDNS</b></a> - is an open source authoritative DNS server, written in C++ and licensed under the GPL.<br>
  613. </p>
  614. ##### :black_small_square: Other Services
  615. <p>
  616. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/z3APA3A/3proxy"><b>3proxy</b></a> - tiny free proxy server.<br>
  617. </p>
  618. ##### :black_small_square: Security/hardening
  619. <p>
  620. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/EmeraldOnion"><b>Emerald Onion</b></a> - is a 501(c)(3) nonprofit organization and transit internet service provider (ISP).<br>
  621. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/pi-hole/pi-hole"><b>pi-hole</b></a> - the Pi-hole® is a DNS sinkhole that protects your devices from unwanted content.<br>
  622. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/stamparm/maltrail"><b>maltrail</b></a> - malicious traffic detection system.<br>
  623. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Netflix/security_monkey"><b>security_monkey</b></a> - monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.<br>
  624. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/firecracker-microvm/firecracker"><b>firecracker</b></a> - secure and fast microVMs for serverless computing.<br>
  625. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/StreisandEffect/streisand"><b>streisand</b></a> - sets up a new server running your choice of WireGuard, OpenSSH, OpenVPN, and more.<br>
  626. </p>
  627. #### Networks &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  628. ##### :black_small_square: Tools
  629. <p>
  630. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.capanalysis.net/ca/"><b>CapAnalysis</b></a> - web visual tool to analyze large amounts of captured network traffic (PCAP analyzer).<br>
  631. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/digitalocean/netbox"><b>netbox</b></a> - IP address management (IPAM) and data center infrastructure management (DCIM) tool.<br>
  632. </p>
  633. ##### :black_small_square: Labs
  634. <p>
  635. &nbsp;&nbsp;:small_orange_diamond: <a href="https://labs.networkreliability.engineering/"><b>NRE Labs</b></a> - learn automation by doing it. Right now, right here, in your browser.<br>
  636. </p>
  637. ##### :black_small_square: Other
  638. <p>
  639. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ee.lbl.gov/"><b>LBNL's Network Research Group</b></a> - home page of the Network Research Group (NRG).<br>
  640. </p>
  641. #### Containers/Orchestration &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  642. ##### :black_small_square: CLI Tools
  643. <p>
  644. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/google/gvisor"><b>gvisor</b></a> - container runtime sandbox.<br>
  645. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/bcicen/ctop"><b>ctop</b></a> - top-like interface for container metrics.<br>
  646. </p>
  647. ##### :black_small_square: Web Tools
  648. <p>
  649. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/moby/moby"><b>Moby</b></a> - a collaborative project for the container ecosystem to assemble container-based system.<br>
  650. &nbsp;&nbsp;:small_orange_diamond: <a href="https://traefik.io/"><b>Traefik</b></a> - open source reverse proxy/load balancer provides easier integration with Docker and Let's encrypt.<br>
  651. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Kong/kong"><b>kong</b></a> - The Cloud-Native API Gateway.<br>
  652. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rancher/rancher"><b>rancher</b></a> - complete container management platform.<br>
  653. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/portainer/portainer"><b>portainer</b></a> - making Docker management easy.<br>
  654. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jwilder/nginx-proxy"><b>nginx-proxy</b></a> - automated nginx proxy for Docker containers using docker-gen.<br>
  655. </p>
  656. ##### :black_small_square: Security
  657. <p>
  658. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/docker/docker-bench-security"><b>docker-bench-security</b></a> - checks for dozens of common best-practices around deploying Docker.<br>
  659. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/aquasecurity/trivy"><b>trivy</b></a> - vulnerability scanner for containers, suitable for CI.<br>
  660. &nbsp;&nbsp;:small_orange_diamond: <a href="https://goharbor.io/"><b>Harbor</b></a> - cloud native registry project that stores, signs, and scans content.<br>
  661. </p>
  662. ##### :black_small_square: Manuals/Tutorials/Best Practices
  663. <p>
  664. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/wsargent/docker-cheat-sheet"><b>docker-cheat-sheet</b></a> - a quick reference cheat sheet on Docker.<br>
  665. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/veggiemonk/awesome-docker"><b>awesome-docker</b></a> - a curated list of Docker resources and projects.<br>
  666. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/yeasy/docker_practice"><b>docker_practice</b></a> - learn and understand Docker technologies, with real DevOps practice!<br>
  667. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/docker/labs"><b>labs
  668. </b></a> - is a collection of tutorials for learning how to use Docker with various tools.<br>
  669. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jessfraz/dockerfiles"><b>dockerfiles</b></a> - various Dockerfiles I use on the desktop and on servers.<br>
  670. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/kelseyhightower/kubernetes-the-hard-way"><b>kubernetes-the-hard-way</b></a> - bootstrap Kubernetes the hard way on Google Cloud Platform. No scripts.<br>
  671. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jamesward/kubernetes-the-easy-way"><b>kubernetes-the-easy-way</b></a> - bootstrap Kubernetes the easy way on Google Cloud Platform. No scripts.<br>
  672. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dennyzhang/cheatsheet-kubernetes-A4"><b>cheatsheet-kubernetes-A4</b></a> - Kubernetes CheatSheets in A4.<br>
  673. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/kabachook/k8s-security"><b>k8s-security</b></a> - kubernetes security notes and best practices.<br>
  674. &nbsp;&nbsp;:small_orange_diamond: <a href="https://learnk8s.io/production-best-practices/"><b>kubernetes-production-best-practices</b></a> - checklists with best-practices for production-ready Kubernetes.<br>
  675. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/freach/kubernetes-security-best-practice"><b>kubernetes-production-best-practices</b></a> - kubernetes security - best practice guide.<br>
  676. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/hjacobs/kubernetes-failure-stories"><b>kubernetes-failure-stories</b></a> - is a compilation of public failure/horror stories related to Kubernetes.<br>
  677. </p>
  678. #### Manuals/Howtos/Tutorials &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  679. ##### :black_small_square: Shell/Command line
  680. <p>
  681. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dylanaraps/pure-bash-bible"><b>pure-bash-bible</b></a> - is a collection of pure bash alternatives to external processes.<br>
  682. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dylanaraps/pure-sh-bible"><b>pure-sh-bible</b></a> - is a collection of pure POSIX sh alternatives to external processes.<br>
  683. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Idnan/bash-guide"><b>bash-guide</b></a> - is a guide to learn bash.<br>
  684. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/denysdovhan/bash-handbook"><b>bash-handbook</b></a> - for those who wanna learn Bash.<br>
  685. &nbsp;&nbsp;:small_orange_diamond: <a href="https://wiki.bash-hackers.org/start"><b>The Bash Hackers Wiki</b></a> - hold documentation of any kind about GNU Bash.<br>
  686. &nbsp;&nbsp;:small_orange_diamond: <a href="http://pubs.opengroup.org/onlinepubs/9699919799/utilities/contents.html"><b>Shell & Utilities</b></a> - describes the commands offered to application programs by POSIX-conformant systems.<br>
  687. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jlevy/the-art-of-command-line"><b>the-art-of-command-line</b></a> - master the command line, in one page.<br>
  688. &nbsp;&nbsp;:small_orange_diamond: <a href="https://google.github.io/styleguide/shellguide.html"><b>Shell Style Guide</b></a> - a shell style guide for Google-originated open-source projects.<br>
  689. </p>
  690. ##### :black_small_square: Text Editors
  691. <p>
  692. &nbsp;&nbsp;:small_orange_diamond: <a href="https://vim.rtorr.com/"><b>Vim Cheat Sheet</b></a> - great multi language vim guide.<br>
  693. </p>
  694. ##### :black_small_square: Python
  695. <p>
  696. &nbsp;&nbsp;:small_orange_diamond: <a href="https://awesome-python.com/"><b>Awesome Python</b></a> - a curated list of awesome Python frameworks, libraries, software and resources.<br>
  697. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/gto76/python-cheatsheet"><b>python-cheatsheet</b></a> - comprehensive Python cheatsheet.<br>
  698. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.pythoncheatsheet.org/"><b>pythoncheatsheet.org</b></a> - basic reference for beginner and advanced developers.<br>
  699. </p>
  700. ##### :black_small_square: Sed & Awk & Other
  701. <p>
  702. &nbsp;&nbsp;:small_orange_diamond: <a href="https://posts.specterops.io/fawk-yeah-advanced-sed-and-awk-usage-parsing-for-pentesters-3-e5727e11a8ad?gi=c8f9506b26b6"><b>F’Awk Yeah!</b></a> - advanced sed and awk usage (Parsing for Pentesters 3).<br>
  703. </p>
  704. ##### :black_small_square: \*nix & Network
  705. <p>
  706. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.cyberciti.biz/"><b>nixCraft</b></a> - linux and unix tutorials for new and seasoned sysadmin.<br>
  707. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.tecmint.com/"><b>TecMint</b></a> - the ideal Linux blog for Sysadmins & Geeks.<br>
  708. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.omnisecu.com/index.php"><b>Omnisecu</b></a> - free Networking, System Administration and Security tutorials.<br>
  709. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/cirosantilli/linux-cheat"><b>linux-cheat</b></a> - Linux tutorials and cheatsheets. Minimal examples. Mostly user-land CLI utilities.<br>
  710. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/snori74/linuxupskillchallenge"><b>linuxupskillchallenge</b></a> - learn the skills required to sysadmin.<br>
  711. &nbsp;&nbsp;:small_orange_diamond: <a href="http://cb.vu/unixtoolbox.xhtml"><b>Unix Toolbox</b></a> - Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users.<br>
  712. &nbsp;&nbsp;:small_orange_diamond: <a href="https://linux-kernel-labs.github.io/refs/heads/master/index.html"><b>Linux Kernel Teaching</b></a> - is a collection of lectures and labs Linux kernel topics.<br>
  713. &nbsp;&nbsp;:small_orange_diamond: <a href="https://peteris.rocks/blog/htop/"><b>htop explained</b></a> - explanation of everything you can see in htop/top on Linux.<br>
  714. &nbsp;&nbsp;:small_orange_diamond: <a href="https://linuxguideandhints.com/"><b>Linux Guide and Hints</b></a> - tutorials on system administration in Fedora and CentOS.<br>
  715. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/NanXiao/strace-little-book"><b>strace-little-book</b></a> - a little book which introduces strace.<br>
  716. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/goldshtn/linux-tracing-workshop"><b>linux-tracing-workshop</b></a> - examples and hands-on labs for Linux tracing tools workshops.<br>
  717. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/bagder/http2-explained"><b>http2-explained</b></a> - a detailed document explaining and documenting HTTP/2.<br>
  718. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/bagder/http3-explained"><b>http3-explained</b></a> - a document describing the HTTP/3 and QUIC protocols.<br>
  719. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.manning.com/books/http2-in-action"><b>HTTP/2 in Action</b></a> - an excellent introduction to the new HTTP/2 standard.<br>
  720. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.saminiir.com/lets-code-tcp-ip-stack-1-ethernet-arp/"><b>Let's code a TCP/IP stack</b></a> - great stuff to learn network and system programming at a deeper level.<br>
  721. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/trimstray/nginx-admins-handbook"><b>Nginx Admin's Handbook</b></a> - how to improve NGINX performance, security and other important things.<br>
  722. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/digitalocean/nginxconfig.io"><b>nginxconfig.io</b></a> - NGINX config generator on steroids.<br>
  723. &nbsp;&nbsp;:small_orange_diamond: <a href="https://infosec.mozilla.org/guidelines/openssh"><b>openssh guideline</b></a> - is to help operational teams with the configuration of OpenSSH server and client.<br>
  724. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gravitational.com/blog/ssh-handshake-explained/"><b>SSH Handshake Explained</b></a> - is a relatively brief description of the SSH handshake.<br>
  725. &nbsp;&nbsp;:small_orange_diamond: <a href="https://kb.isc.org/docs/using-this-knowledgebase"><b>ISC's Knowledgebase</b></a> - you'll find some general information about BIND 9, ISC DHCP, and Kea DHCP.<br>
  726. &nbsp;&nbsp;:small_orange_diamond: <a href="https://packetlife.net/"><b>PacketLife.net</b></a> - a place to record notes while studying for Cisco's CCNP certification.<br>
  727. </p>
  728. ##### :black_small_square: Microsoft
  729. <p>
  730. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/infosecn1nja/AD-Attack-Defense"><b>AD-Attack-Defense</b></a> - attack and defend active directory using modern post exploitation activity.<br>
  731. </p>
  732. ##### :black_small_square: Large-scale systems
  733. <p>
  734. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/donnemartin/system-design-primer"><b>The System Design Primer</b></a> - learn how to design large-scale systems.<br>
  735. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/binhnguyennus/awesome-scalability"><b>Awesome Scalability</b></a> - best practices in building High Scalability, High Availability, High Stability, and more.<br>
  736. &nbsp;&nbsp;:small_orange_diamond: <a href="https://engineering.videoblocks.com/web-architecture-101-a3224e126947?gi=a896808d22a"><b>Web Architecture 101</b></a> - the basic architecture concepts.<br>
  737. </p>
  738. ##### :black_small_square: System hardening
  739. <p>
  740. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.cisecurity.org/cis-benchmarks/"><b>CIS Benchmarks</b></a> - secure configuration settings for over 100 technologies, available as a free PDF.<br>
  741. &nbsp;&nbsp;:small_orange_diamond: <a href="https://highon.coffee/blog/security-harden-centos-7/"><b>Security Harden CentOS 7</b></a> - this walks you through the steps required to security harden CentOS.<br>
  742. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.lisenet.com/2017/centos-7-server-hardening-guide/"><b>CentOS 7 Server Hardening Guide</b></a> - great guide for hardening CentOS; familiar with OpenSCAP.<br>
  743. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/decalage2/awesome-security-hardening"><b>awesome-security-hardening</b></a> - is a collection of security hardening guides, tools and other resources.<br>
  744. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/trimstray/the-practical-linux-hardening-guide"><b>The Practical Linux Hardening Guide</b></a> - provides a high-level overview of hardening GNU/Linux systems.<br>
  745. &nbsp;&nbsp;:small_orange_diamond: <a href="https://madaidans-insecurities.github.io/guides/linux-hardening.html"><b>Linux Hardening Guide</b></a> - how to harden Linux as much as possible for security and privacy.<br>
  746. </p>
  747. ##### :black_small_square: Security & Privacy
  748. <p>
  749. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hackingarticles.in/"><b>Hacking Articles</b></a> - LRaj Chandel's Security & Hacking Blog.<br>
  750. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/toniblyx/my-arsenal-of-aws-security-tools"><b>AWS security tools</b></a> - make your AWS cloud environment more secure.<br>
  751. &nbsp;&nbsp;:small_orange_diamond: <a href="https://inventory.rawsec.ml/index.html"><b>Rawsec's CyberSecurity Inventory</b></a> - an inventory of tools and resources about CyberSecurity.<br>
  752. &nbsp;&nbsp;:small_orange_diamond: <a href="https://tls.ulfheim.net/"><b>The Illustrated TLS Connection</b></a> - every byte of a TLS connection explained and reproduced.<br>
  753. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/ssllabs/research/wiki/SSL-and-TLS-Deployment-Best-Practices"><b>SSL Research</b></a> - SSL and TLS Deployment Best Practices by SSL Labs.<br>
  754. &nbsp;&nbsp;:small_orange_diamond: <a href="http://selinuxgame.org/index.html"><b>SELinux Game</b></a> - learn SELinux by doing. Solve Puzzles, show skillz.<br>
  755. &nbsp;&nbsp;:small_orange_diamond: <a href="https://smallstep.com/blog/everything-pki.html"><b>Certificates and PKI</b></a> - everything you should know about certificates and PKI but are too afraid to ask.<br>
  756. &nbsp;&nbsp;:small_orange_diamond: <a href="https://appsecco.com/books/subdomain-enumeration/"><b>The Art of Subdomain Enumeration</b></a> - a reference for subdomain enumeration techniques.<br>
  757. &nbsp;&nbsp;:small_orange_diamond: <a href="https://lifehacker.com/the-comprehensive-guide-to-quitting-google-1830001964"><b>Quitting Google</b></a> - the comprehensive guide to quitting Google.<br>
  758. </p>
  759. ##### :black_small_square: Web Apps
  760. <p>
  761. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.owasp.org/index.php/Main_Page"><b>OWASP</b></a> - worldwide not-for-profit charitable organization focused on improving the security of software.<br>
  762. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project"><b>OWASP ASVS 3.0.1</b></a> - OWASP Application Security Verification Standard Project.<br>
  763. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Santandersecurityresearch/asvs"><b>OWASP ASVS 3.0.1 Web App</b></a> - simple web app that helps developers understand the ASVS requirements.<br>
  764. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/OWASP/ASVS/tree/master/4.0"><b>OWASP ASVS 4.0</b></a> - is a list of application security requirements or tests.<br>
  765. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.owasp.org/index.php/OWASP_Testing_Project"><b>OWASP Testing Guide v4</b></a> - includes a "best practice" penetration testing framework.<br>
  766. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/OWASP/DevGuide"><b>OWASP Dev Guide</b></a> - this is the development version of the OWASP Developer Guide.<br>
  767. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/OWASP/wstg"><b>OWASP WSTG</b></a> - is a comprehensive open source guide to testing the security of web apps.<br>
  768. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.owasp.org/index.php/OWASP_API_Security_Project"><b>OWASP API Security Project</b></a> - focuses specifically on the top ten vulnerabilities in API security.<br>
  769. &nbsp;&nbsp;:small_orange_diamond: <a href="https://infosec.mozilla.org/guidelines/web_security.html"><b>Mozilla Web Security</b></a> - help operational teams with creating secure web applications.<br>
  770. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Netflix/security-bulletins"><b>security-bulletins</b></a> - security bulletins that relate to Netflix Open Source.<br>
  771. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/shieldfy/API-Security-Checklist"><b>API-Security-Checklist</b></a> - security countermeasures when designing, testing, and releasing your API.<br>
  772. &nbsp;&nbsp;:small_orange_diamond: <a href="https://enable-cors.org/index.html"><b>Enable CORS</b></a> - enable cross-origin resource sharing.<br>
  773. &nbsp;&nbsp;:small_orange_diamond: <a href="https://appsecwiki.com/#/"><b>Application Security Wiki</b></a> - is an initiative to provide all application security related resources at one place.<br>
  774. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/GrrrDog/weird_proxies/wiki"><b>Weird Proxies</b></a> - reverse proxy related attacks; it is a result of analysis of various proxies.<br>
  775. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dfir.it/blog/2015/08/12/webshell-every-time-the-same-purpose/"><b>Webshells</b></a> - great series about malicious payloads.<br>
  776. &nbsp;&nbsp;:small_orange_diamond: <a href="https://portswigger.net/blog/practical-web-cache-poisoning"><b>Practical Web Cache Poisoning</b></a> - show you how to compromise websites by using esoteric web features.<br>
  777. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/bl4de/research/tree/master/hidden_directories_leaks"><b>Hidden directories and files</b></a> - as a source of sensitive information about web application.<br>
  778. &nbsp;&nbsp;:small_orange_diamond: <a href="https://bo0om.ru/en/"><b>Explosive blog</b></a> - great blog about cybersec and pentests.<br>
  779. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.netsparker.com/security-cookies-whitepaper/"><b>Security Cookies</b></a> - this paper will take a close look at cookie security.<br>
  780. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/GitGuardian/APISecurityBestPractices"><b>APISecurityBestPractices</b></a> - help you keep secrets (API keys, db credentials, certificates) out of source code.<br>
  781. </p>
  782. ##### :black_small_square: All-in-one
  783. <p>
  784. &nbsp;&nbsp;:small_orange_diamond: <a href="https://lzone.de/cheat-sheet/"><b>LZone Cheat Sheets</b></a> - all cheat sheets.<br>
  785. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rstacruz/cheatsheets"><b>Dan’s Cheat Sheets’s</b></a> - massive cheat sheets documentation.<br>
  786. &nbsp;&nbsp;:small_orange_diamond: <a href="https://devhints.io/"><b>Rico's cheatsheets</b></a> - this is a modest collection of cheatsheets.<br>
  787. &nbsp;&nbsp;:small_orange_diamond: <a href="https://devdocs.io/"><b>DevDocs API</b></a> - combines multiple API documentations in a fast, organized, and searchable interface.<br>
  788. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cheat.sh/"><b>cheat.sh</b></a> - the only cheat sheet you need.<br>
  789. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gnulinux.guru/"><b>gnulinux.guru</b></a> - collection of cheat sheets about bash, vim and networking.<br>
  790. </p>
  791. ##### :black_small_square: Ebooks
  792. <p>
  793. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/EbookFoundation/free-programming-books"><b>free-programming-books</b></a> - list of free learning resources in many languages.<br>
  794. </p>
  795. ##### :black_small_square: Other
  796. <p>
  797. &nbsp;&nbsp;:small_orange_diamond: <a href="https://bitvijays.github.io/LFC-VulnerableMachines.html"><b>CTF Series : Vulnerable Machines</b></a> - the steps below could be followed to find vulnerabilities and exploits.<br>
  798. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/manoelt/50M_CTF_Writeup"><b>50M_CTF_Writeup</b></a> - $50 million CTF from Hackerone - writeup.<br>
  799. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/j00ru/ctf-tasks"><b>ctf-tasks</b></a> - an archive of low-level CTF challenges developed over the years.<br>
  800. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hshrzd.wordpress.com/how-to-start/"><b>How to start RE/malware analysis?</b></a> - collection of some hints and useful links for the beginners.<br>
  801. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.kegel.com/c10k.html"><b>The C10K problem</b></a> - it's time for web servers to handle ten thousand clients simultaneously, don't you think?<br>
  802. &nbsp;&nbsp;:small_orange_diamond: <a href="https://blog.benjojo.co.uk/post/why-is-ethernet-mtu-1500"><b>How 1500 bytes became the MTU of the internet</b></a> - great story about the Maximum Transmission Unit.<br>
  803. &nbsp;&nbsp;:small_orange_diamond: <a href="http://poormansprofiler.org/"><b>poor man's profiler</b></a> - like dtrace's don't really provide methods to see what programs are blocking on.<br>
  804. &nbsp;&nbsp;:small_orange_diamond: <a href="https://nickcraver.com/blog/2017/05/22/https-on-stack-overflow/"><b>HTTPS on Stack Overflow</b></a> - this is the story of a long journey regarding the implementation of SSL.<br>
  805. &nbsp;&nbsp;:small_orange_diamond: <a href="https://drawings.jvns.ca/"><b>Julia's Drawings</b></a> - some drawings about programming and unix world, zines about systems & debugging tools.<br>
  806. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/corkami/collisions"><b>Hash collisions</b></a> - this great repository is focused on hash collisions exploitation.<br>
  807. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/in3rsha/sha256-animation"><b>sha256-animation</b></a> - animation of the SHA-256 hash function in your terminal.<br>
  808. &nbsp;&nbsp;:small_orange_diamond: <a href="https://labs.ripe.net/Members/cteusche/bgp-meets-cat"><b>BGP Meets Cat</b></a> - after 3072 hours of manipulating BGP, Job Snijders has succeeded in drawing a Nyancat.<br>
  809. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/benjojo/bgp-battleships"><b>bgp-battleships</b></a> - playing battleships over BGP.<br>
  810. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/alex/what-happens-when"><b>What happens when...</b></a> - you type google.com into your browser and press enter?<br>
  811. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/vasanthk/how-web-works"><b>how-web-works</b></a> - based on the 'What happens when...' repository.<br>
  812. &nbsp;&nbsp;:small_orange_diamond: <a href="https://robertheaton.com/2018/11/28/https-in-the-real-world/"><b>HTTPS in the real world</b></a> - great tutorial explain how HTTPS works in the real world.<br>
  813. &nbsp;&nbsp;:small_orange_diamond: <a href="https://about.gitlab.com/2018/11/14/how-we-spent-two-weeks-hunting-an-nfs-bug/"><b>Gitlab and NFS bug</b></a> - how we spent two weeks hunting an NFS bug in the Linux kernel.<br>
  814. &nbsp;&nbsp;:small_orange_diamond: <a href="https://about.gitlab.com/2017/02/10/postmortem-of-database-outage-of-january-31/"><b>Gitlab melts down</b></a> - postmortem on the database outage of January 31 2017 with the lessons we learned.<br>
  815. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.catb.org/esr/faqs/hacker-howto.html"><b>How To Become A Hacker</b></a> - if you want to be a hacker, keep reading.<br>
  816. &nbsp;&nbsp;:small_orange_diamond: <a href="http://ithare.com/infographics-operation-costs-in-cpu-clock-cycles/"><b>Operation Costs in CPU</b></a> - should help to estimate costs of certain operations in CPU clocks.<br>
  817. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cstack.github.io/db_tutorial/"><b>Let's Build a Simple Database</b></a> - writing a sqlite clone from scratch in C.<br>
  818. &nbsp;&nbsp;:small_orange_diamond: <a href="https://djhworld.github.io/post/2019/05/21/i-dont-know-how-cpus-work-so-i-simulated-one-in-code/"><b>simple-computer</b></a> - great resource to understand how computers work under the hood.<br>
  819. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.troyhunt.com/working-with-154-million-records-on/"><b>The story of "Have I been pwned?"</b></a> - working with 154 million records on Azure Table Storage.<br>
  820. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.top500.org/"><b>TOP500 Supercomputers</b></a> - shows the 500 most powerful commercially available computer systems known to us.<br>
  821. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.shellntel.com/blog/2017/2/8/how-to-build-a-8-gpu-password-cracker"><b>How to build a 8 GPU password cracker</b></a> - any "black magic" or hours of frustration like desktop components do.<br>
  822. &nbsp;&nbsp;:small_orange_diamond: <a href="https://home.cern/science/computing"><b>CERN Data Centre</b></a> - 3D visualizations of the CERN computing environments (and more).<br>
  823. &nbsp;&nbsp;:small_orange_diamond: <a href="http://howfuckedismydatabase.com/"><b>How fucked is my database</b></a> - evaluate how fucked your database is with this handy website.<br>
  824. &nbsp;&nbsp;:small_orange_diamond: <a href="https://krisbuytaert.be/blog/linux-troubleshooting-101-2016-edition/index.html"><b>Linux Troubleshooting 101 , 2016 Edition</b></a> - everything is a DNS Problem...<br>
  825. &nbsp;&nbsp;:small_orange_diamond: <a href="https://open.buffer.com/5-whys-process/"><b>Five Whys</b></a> - you know what the problem is, but you cannot solve it?<br>
  826. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gvnshtn.com/maersk-me-notpetya/"><b>Maersk, me & notPetya</b></a> - how did ransomware successfully hijack hundreds of domain controllers?<br>
  827. &nbsp;&nbsp;:small_orange_diamond: <a href="https://howhttps.works/"><b>howhttps.works</b></a> - how HTTPS works ...in a comic!<br>
  828. &nbsp;&nbsp;:small_orange_diamond: <a href="https://howdns.works/"><b>howdns.works</b></a> - a fun and colorful explanation of how DNS works.<br>
  829. &nbsp;&nbsp;:small_orange_diamond: <a href="https://postgresqlco.nf/en/doc/param/"><b>POSTGRESQLCO.NF</b></a> - your postgresql.conf documentation and recommendations.<br>
  830. </p>
  831. #### Inspiring Lists &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  832. ##### :black_small_square: SysOps/DevOps
  833. <p>
  834. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/kahun/awesome-sysadmin"><b>Awesome Sysadmin</b></a> - amazingly awesome open source sysadmin resources.<br>
  835. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/alebcay/awesome-shell"><b>Awesome Shell</b></a> - awesome command-line frameworks, toolkits, guides and gizmos.<br>
  836. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/learnbyexample/Command-line-text-processing"><b>Command-line-text-processing</b></a> - finding text to search and replace, sorting to beautifying, and more.<br>
  837. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/caesar0301/awesome-pcaptools"><b>Awesome Pcaptools</b></a> - collection of tools developed by other researchers to process network traces.<br>
  838. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/zoidbergwill/awesome-ebpf"><b>awesome-ebpf</b></a> - a curated list of awesome projects related to eBPF.<br>
  839. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/leandromoreira/linux-network-performance-parameters"><b>Linux Network Performance</b></a> - where some of the network sysctl variables fit into the Linux/Kernel network flow.<br>
  840. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dhamaniasad/awesome-postgres"><b>Awesome Postgres</b></a> - list of awesome PostgreSQL software, libraries, tools and resources.<br>
  841. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/enochtangg/quick-SQL-cheatsheet"><b>quick-SQL-cheatsheet</b></a> - a quick reminder of all SQL queries and examples on how to use them.<br>
  842. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Kickball/awesome-selfhosted"><b>Awesome-Selfhosted</b></a> - list of Free Software network services and web applications which can be hosted locally.<br>
  843. &nbsp;&nbsp;:small_orange_diamond: <a href="https://wiki.archlinux.org/index.php/List_of_applications"><b>List of applications</b></a> - huge list of apps sorted by category, as a reference for those looking for packages.<br>
  844. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/InterviewMap/CS-Interview-Knowledge-Map"><b>CS-Interview-Knowledge-Map</b></a> - build the best interview map.<br>
  845. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Tikam02/DevOps-Guide"><b>DevOps-Guide</b></a> - DevOps Guide from basic to advanced with Interview Questions and Notes.<br>
  846. &nbsp;&nbsp;:small_orange_diamond: <a href="https://issue.freebsdfoundation.org/publication/?m=33057&l=1&view=issuelistBrowser"><b>FreeBSD Journal</b></a> - it is a great list of periodical magazines about FreeBSD and other important things.<br>
  847. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/bregman-arie/devops-interview-questions"><b>devops-interview-questions</b></a> - contains interview questions on various DevOps and SRE related topics.<br></p>
  848. ##### :black_small_square: Developers
  849. <p>
  850. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/kamranahmedse/developer-roadmap"><b>Web Developer Roadmap</b></a> - roadmaps, articles and resources to help you choose your path, learn and improve.<br>
  851. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/thedaviddias/Front-End-Checklist"><b>Front-End-Checklist</b></a> - the perfect Front-End Checklist for modern websites and meticulous developers.<br>
  852. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/thedaviddias/Front-End-Performance-Checklist"><b>Front-End-Performance-Checklist</b></a> - Front-End Performance Checklist that runs faster than the others.<br>
  853. &nbsp;&nbsp;:small_orange_diamond: <a href="https://rszalski.github.io/magicmethods/"><b>Python's Magic Methods</b></a> - what are magic methods? They're everything in object-oriented Python.<br>
  854. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/satwikkansal/wtfpython"><b>wtfpython</b></a> - a collection of surprising Python snippets and lesser-known features.<br>
  855. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/twhite96/js-dev-reads"><b>js-dev-reads</b></a> - a list of books and articles for the discerning web developer to read.<br>
  856. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/RomuloOliveira/commit-messages-guide"><b>Commit messages guide</b></a> - a guide to understand the importance of commit messages.<br>
  857. </p>
  858. ##### :black_small_square: Security/Pentesting
  859. <p>
  860. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/qazbnm456/awesome-web-security"><b>Awesome Web Security</b></a> - a curated list of Web Security materials and resources.<br>
  861. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/joe-shenouda/awesome-cyber-skills"><b>awesome-cyber-skills</b></a> - a curated list of hacking environments where you can train your cyber skills.<br>
  862. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/devsecops/awesome-devsecops"><b>awesome-devsecops</b></a> - an authoritative list of awesome devsecops tools.<br>
  863. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jivoi/awesome-osint"><b>awesome-osint</b></a> - is a curated list of amazingly awesome OSINT.<br>
  864. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/HolyBugx/HolyTips"><b>HolyTips</b></a> - tips and tutorials on Bug Bounty Hunting and Web App Security.<br>
  865. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/hslatman/awesome-threat-intelligence"><b>awesome-threat-intelligence</b></a> - a curated list of Awesome Threat Intelligence resources.<br>
  866. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/infosecn1nja/Red-Teaming-Toolkit"><b>Red-Teaming-Toolkit</b></a> - a collection of open source and commercial tools that aid in red team operations.<br>
  867. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/snoopysecurity/awesome-burp-extensions"><b>awesome-burp-extensions</b></a> - a curated list of amazingly awesome Burp Extensions.<br>
  868. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Hack-with-Github/Free-Security-eBooks"><b>Free Security eBooks</b></a> - list of a Free Security and Hacking eBooks.<br>
  869. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/yeahhub/Hacking-Security-Ebooks"><b>Hacking-Security-Ebooks</b></a> - top 100 Hacking & Security E-Books.<br>
  870. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/nikitavoloboev/privacy-respecting"><b>privacy-respecting</b></a> - curated list of privacy respecting services and software.<br>
  871. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/wtsxDev/reverse-engineering"><b>reverse-engineering</b></a> - list of awesome reverse engineering resources.<br>
  872. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/michalmalik/linux-re-101"><b>linux-re-101</b></a> - a collection of resources for linux reverse engineering.<br>
  873. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/onethawt/reverseengineering-reading-list"><b>reverseengineering-reading-list</b></a> - a list of Reverse Engineering articles, books, and papers.<br>
  874. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/0xInfection/Awesome-WAF"><b>Awesome-WAF</b></a> - a curated list of awesome web-app firewall (WAF) stuff.<br>
  875. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jakejarvis/awesome-shodan-queries"><b>awesome-shodan-queries</b></a> - interesting, funny, and depressing search queries to plug into shodan.io.<br>
  876. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/danielmiessler/RobotsDisallowed"><b>RobotsDisallowed</b></a> - a curated list of the most common and most interesting robots.txt disallowed directories.<br>
  877. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Kayzaks/HackingNeuralNetworks"><b>HackingNeuralNetworks</b></a> - is a small course on exploiting and defending neural networks.<br>
  878. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gist.github.com/joepie91/7e5cad8c0726fd6a5e90360a754fc568"><b>wildcard-certificates</b></a> - why you probably shouldn't use a wildcard certificate.<br>
  879. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gist.github.com/joepie91/5a9909939e6ce7d09e29"><b>Don't use VPN services</b></a> - which is what every third-party "VPN provider" does.<br>
  880. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/InQuest/awesome-yara"><b>awesome-yara</b></a> - a curated list of awesome YARA rules, tools, and people.<br>
  881. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/drduh/macOS-Security-and-Privacy-Guide"><b>macOS-Security-and-Privacy-Guide</b></a> - guide to securing and improving privacy on macOS.<br>
  882. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/usnistgov/macos_security"><b>macos_security</b></a> - macOS Security Compliance Project.<br>
  883. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/PaulSec/awesome-sec-talks"><b>awesome-sec-talks</b></a> - is a collected list of awesome security talks.<br>
  884. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/k4m4/movies-for-hackers"><b>Movies for Hackers</b></a> - list of movies every hacker & cyberpunk must watch.<br>
  885. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/danieldizzy/Cryptography_1"><b>Cryptography_1</b></a> - materials used whilst taking Prof. Dan Boneh Stanford Crypto course.<br>
  886. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/ashutosh1206/Crypton"><b>Crypton</b></a> - library to learn and practice Offensive and Defensive Cryptography.<br>
  887. </p>
  888. ##### :black_small_square: Other
  889. <p>
  890. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.cheatography.com/"><b>Cheatography</b></a> - over 3,000 free cheat sheets, revision aids and quick references.<br>
  891. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mre/awesome-static-analysis"><b>awesome-static-analysis</b></a> - static analysis tools for all programming languages.<br>
  892. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/ossu/computer-science"><b>computer-science</b></a> - path to a free self-taught education in Computer Science.<br>
  893. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/danluu/post-mortems"><b>post-mortems</b></a> - is a collection of postmortems (config errors, hardware failures, and more).<br>
  894. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/danistefanovic/build-your-own-x"><b>build-your-own-x</b></a> - build your own (insert technology here).<br>
  895. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rby90/Project-Based-Tutorials-in-C"><b>Project-Based-Tutorials-in-C</b></a> - is a curated list of project-based tutorials in C.<br>
  896. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/kylelobo/The-Documentation-Compendium"><b>The-Documentation-Compendium</b></a> - various README templates & tips on writing high-quality documentation.<br>
  897. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mahmoud/awesome-python-applications"><b>awesome-python-applications</b></a> - free software that works great, and also happens to be open-source Python.<br>
  898. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/awesomedata/awesome-public-datasets"><b>awesome-public-datasets</b></a> - a topic-centric list of HQ open datasets.<br>
  899. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Sahith02/machine-learning-algorithms"><b>machine-learning-algorithms</b></a> - a curated list of all machine learning algorithms and concepts.<br>
  900. </p>
  901. #### Blogs/Podcasts/Videos &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  902. ##### :black_small_square: SysOps/DevOps
  903. <p>
  904. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.youtube.com/watch?v=nAFpkV5-vuI"><b>Varnish for PHP developers</b></a> - very interesting presentation of Varnish by Mattias Geniar.<br>
  905. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.youtube.com/watch?v=CZ3wIuvmHeM"><b>A Netflix Guide to Microservices</b></a> - talks about the chaotic and vibrant world of microservices at Netflix.<br>
  906. </p>
  907. ##### :black_small_square: Developers
  908. <p>
  909. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.youtube.com/watch?v=yOyaJXpAYZQ"><b>Comparing C to machine lang</b></a> - compare a simple C app with the compiled machine code of that program.<br>
  910. </p>
  911. ##### :black_small_square: Geeky Persons
  912. <p>
  913. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.brendangregg.com/"><b>Brendan Gregg's Blog</b></a> - is an industry expert in computing performance and cloud computing.<br>
  914. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gynvael.coldwind.pl/"><b>Gynvael "GynDream" Coldwind</b></a> - is a IT security engineer at Google.<br>
  915. &nbsp;&nbsp;:small_orange_diamond: <a href="http://lcamtuf.coredump.cx/"><b>Michał "lcamtuf" Zalewski</b></a> - white hat hacker, computer security expert.<br>
  916. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ma.ttias.be/"><b>Mattias Geniar</b></a> - developer, sysadmin, blogger, podcaster and public speaker.<br>
  917. &nbsp;&nbsp;:small_orange_diamond: <a href="https://nickcraver.com/"><b>Nick Craver</b></a> - software developer and systems administrator for Stack Exchange.<br>
  918. &nbsp;&nbsp;:small_orange_diamond: <a href="https://scotthelme.co.uk/"><b>Scott Helme</b></a> - security researcher, speaker and founder of securityheaders.com and report-uri.com.<br>
  919. &nbsp;&nbsp;:small_orange_diamond: <a href="https://krebsonsecurity.com/"><b>Brian Krebs</b></a> - The Washington Post and now an Independent investigative journalist.<br>
  920. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.schneier.com/"><b>Bruce Schneier</b></a> - is an internationally renowned security technologist, called a "security guru".<br>
  921. &nbsp;&nbsp;:small_orange_diamond: <a href="https://chrissymorgan.co.uk/"><b>Chrissy Morgan</b></a> - advocate of practical learning, Chrissy also takes part in bug bounty programs.<br>
  922. &nbsp;&nbsp;:small_orange_diamond: <a href="https://blog.zsec.uk/"><b>Andy Gill</b></a> - is a hacker at heart who works as a senior penetration tester.<br>
  923. &nbsp;&nbsp;:small_orange_diamond: <a href="https://danielmiessler.com/"><b>Daniel Miessler</b></a> - cybersecurity expert and writer.<br>
  924. &nbsp;&nbsp;:small_orange_diamond: <a href="https://samy.pl/"><b>Samy Kamkar</b></a> - is an American privacy and security researcher, computer hacker.<br>
  925. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.j4vv4d.com/"><b>Javvad Malik</b></a> - is a security advocate at AlienVault, a blogger event speaker and industry commentator.<br>
  926. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.grahamcluley.com/"><b>Graham Cluley</b></a> - public speaker and independent computer security analyst.<br>
  927. &nbsp;&nbsp;:small_orange_diamond: <a href="https://security.szurek.pl/"><b>Kacper Szurek</b></a> - detection engineer at ESET.<br>
  928. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.troyhunt.com/"><b>Troy Hunt</b></a> - web security expert known for public education and outreach on security topics.<br>
  929. &nbsp;&nbsp;:small_orange_diamond: <a href="https://raymii.org/s/index.html"><b>raymii.org</b></a> - sysadmin specializing in building high availability cloud environments.<br>
  930. &nbsp;&nbsp;:small_orange_diamond: <a href="https://robert.penz.name/"><b>Robert Penz</b></a> - IT security expert.<br>
  931. </p>
  932. &nbsp;&nbsp;:small_orange_diamond: <a href="https://magda-on-cyber.com"><b>Magda Chelly</b></a> - security professional, author, keynote speaker and entrepreneur.<br>
  933. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.k3r3n3.com"><b>Keren Elazari</b></a> - security researcher, speaker and TED speaker.<br>
  934. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.blackhat.com/asia-18/speakers/Lidia-Giuliano.html"><b>Lidia Giuliano</b></a> - security professional and member of Black Hat executive commity.<br>
  935. &nbsp;&nbsp;:small_orange_diamond: <a href="https://shehackspurple.ca"><b>Tanya Janca</b></a> - security researcher, author, speaker and founder of #WeHackPurple academy.<br>
  936. ##### :black_small_square: Geeky Blogs
  937. <p>
  938. &nbsp;&nbsp;:small_orange_diamond: <a href="https://linux-audit.com/"><b>Linux Audit</b></a> - the Linux security blog about auditing, hardening and compliance by Michael Boelen.<br>
  939. &nbsp;&nbsp;:small_orange_diamond: <a href="https://linuxsecurity.expert/"><b>
  940. Linux Security Expert</b></a> - trainings, howtos, checklists, security tools, and more.<br>
  941. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.grymoire.com/"><b>The Grymoire</b></a> - collection of useful incantations for wizards, be you computer wizards, magicians, or whatever.<br>
  942. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.secjuice.com"><b>Secjuice</b></a> - is the only non-profit, independent and volunteer led publication in the information security space.<br>
  943. &nbsp;&nbsp;:small_orange_diamond: <a href="https://duo.com/decipher"><b>Decipher</b></a> - security news that informs and inspires.<br>
  944. </p>
  945. &nbsp;&nbsp;:small_orange_diamond: <a href="https://blog.magda-on-cyber.com"><b>Magda Chelly; Cybsersecurtiy Blog</b></a> - cyber risk quantification, hacking, and much more.<br>
  946. </p>
  947. ##### :black_small_square: Geeky Vendor Blogs
  948. <p>
  949. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.tenable.com/podcast"><b>Tenable Podcast</b></a> - conversations and interviews related to Cyber Exposure, and more.<br>
  950. &nbsp;&nbsp;:small_orange_diamond: <a href="https://nakedsecurity.sophos.com/"><b>Sophos</b></a> - threat news room, giving you news, opinion, advice and research on computer security issues.<br>
  951. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.tripwire.com/state-of-security/"><b>Tripwire State of Security</b></a> - blog featuring the latest news, trends and insights on current security issues.<br>
  952. &nbsp;&nbsp;:small_orange_diamond: <a href="https://blog.malwarebytes.com/"><b>Malwarebytes Labs Blog</b></a> - security blog aims to provide insider news about cybersecurity.<br>
  953. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.trustedsec.com/category/articles/"><b>TrustedSec</b></a> - latest news, and trends about cybersecurity.<br>
  954. &nbsp;&nbsp;:small_orange_diamond: <a href="https://portswigger.net/blog"><b>PortSwigger Web Security Blog</b></a> - about web app security vulns and top tips from our team of web security.<br>
  955. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.alienvault.com/blogs"><b>AT&T Cybersecurity blog</b></a> - news on emerging threats and practical advice to simplify threat detection.<br>
  956. &nbsp;&nbsp;:small_orange_diamond: <a href="https://thycotic.com/company/blog/"><b>Thycotic</b></a> - where CISOs and IT Admins come to learn about industry trends, IT security, and more.<br>
  957. </p>
  958. ##### :black_small_square: Geeky Cybersecurity Podcasts
  959. <p>
  960. &nbsp;&nbsp;:small_orange_diamond: <a href="https://risky.biz/netcasts/risky-business/"><b>Risky Business</b></a> - is a weekly information security podcast featuring news and in-depth interviews.<br>
  961. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.vice.com/en_us/topic/cyber"><b>Cyber, by Motherboard</b></a> - stories, and focus on the ideas about cybersecurity.<br>
  962. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.tenable.com/podcast"><b>Tenable Podcast</b></a> - conversations and interviews related to Cyber Exposure, and more.<br>
  963. &nbsp;&nbsp;:small_orange_diamond: <a href="https://podcasts.apple.com/gb/podcast/cybercrime-investigations/id1428801405"><b>
  964. Cybercrime Investigations</b></a> - podcast by Geoff White about cybercrimes.<br>
  965. &nbsp;&nbsp;:small_orange_diamond: <a href="https://themanyhats.club/tag/episodes/"><b>The many hats club</b></a> - featuring stories from a wide range of Infosec people (Whitehat, Greyhat and Blackhat).<br>
  966. &nbsp;&nbsp;:small_orange_diamond: <a href="https://darknetdiaries.com/"><b>Darknet Diaries</b></a> - true stories from the dark side of the Internet.<br>
  967. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.youtube.com/playlist?list=PL423I_gHbWUXah3dmt_q_XNp0NlGAKjis"><b>OSINTCurious Webcasts</b></a> - is the investigative curiosity that helps people be successful in OSINT.<br>
  968. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.youtube.com/user/SecurityWeeklyTV"><b>Security Weekly</b></a> - the latest information security and hacking news.<br>
  969. </p>
  970. ##### :black_small_square: Geeky Cybersecurity Video Blogs
  971. <p>
  972. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.youtube.com/channel/UCzvJStjySZVvOBsPl-Vgj0g"><b>rev3rse security</b></a> - offensive, binary exploitation, web app security, hardening, red team, blue team.<br>
  973. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w"><b>LiveOverflow</b></a> - a lot more advanced topics than what is typically offered in paid online courses - but for free.<br>
  974. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.youtube.com/infoseccynic"><b>J4vv4D</b></a> - the important information regarding our internet security.<br>
  975. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cybertalks.co.uk/"><b>
  976. CyberTalks</b></a> - talks, interviews, and article about cybersecurity.<br>
  977. </p>
  978. ##### :black_small_square: Best Personal Twitter Accounts
  979. <p>
  980. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/blackroomsec"><b>@blackroomsec</b></a> - a white-hat hacker/pentester. Intergalactic Minesweeper Champion 1990.<br>
  981. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/MarcoCiappelli"><b>@MarcoCiappelli</b></a> - Co-Founder @ITSPmagazine, at the intersection of IT security and society.<br>
  982. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/binitamshah"><b>@binitamshah</b></a> - Linux Evangelist. Malwares. Kernel Dev. Security Enthusiast.<br>
  983. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/joe_carson"><b>@joe_carson</b></a> - an InfoSec Professional and Tech Geek.<br>
  984. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/mikko"><b>@mikko</b></a> - CRO at F-Secure, Reverse Engineer, TED Speaker, Supervillain.<br>
  985. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/esrtweet"><b>@esrtweet</b></a> - often referred to as ESR, is an American software developer, and open-source software advocate.<br>
  986. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/gynvael"><b>@gynvael</b></a> - security researcher/programmer, @DragonSectorCTF founder/player, technical streamer.<br>
  987. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/x0rz"><b>@x0rz</b></a> - Security Researcher & Cyber Observer.<br>
  988. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/hasherezade"><b>@hasherezade</b></a> - programmer, malware analyst. Author of PEbear, PEsieve, libPeConv.<br>
  989. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/TinkerSec"><b>@TinkerSec</b></a> - tinkerer, cypherpunk, hacker.<br>
  990. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/alisaesage"><b>@alisaesage</b></a> - independent hacker and researcher.<br>
  991. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/SwiftOnSecurity"><b>@SwiftOnSecurity</b></a> - systems security, industrial safety, sysadmin, author of decentsecurity.com.<br>
  992. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/dakami"><b>@dakami</b></a> - is one of just seven people with the authority to restore the DNS root keys.<br>
  993. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/samykamkar"><b>@samykamkar</b></a> - is a famous "grey hat" hacker, security researcher, creator of the MySpace "Samy" worm.<br>
  994. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/securityweekly"><b>@securityweekly</b></a> - founder & CTO of Security Weekly podcast network.<br>
  995. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/jack_daniel"><b>@jack_daniel</b></a> - @SecurityBSides co-founder.<br>
  996. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/thegrugq"><b>@thegrugq</b></a> - Security Researcher.<br>
  997. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/matthew_d_green"><b>@matthew_d_green</b></a> - a cryptographer and professor at Johns Hopkins University.<br>
  998. </p>
  999. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/m49D4ch3lly"><b>@m49D4ch3lly</b></a> - a cybersecurity entertainer.<br>
  1000. </p>
  1001. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/shehackspurple"><b>@shehackspurple</b></a> - a cybersecurity professional.<br>
  1002. </p>
  1003. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/k3r3n3"><b>@k3r3n3</b></a> - a cybersecurity professional, researcher and hacker.<br>
  1004. </p>
  1005. ##### :black_small_square: Best Commercial Twitter Accounts
  1006. <p>
  1007. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/haveibeenpwned"><b>@haveibeenpwned</b></a> - check if you have an account that has been compromised in a data breach.<br>
  1008. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/bugcrowd"><b>@bugcrowd</b></a> - trusted by more of the Fortune 500 than any other crowdsourced security platform.<br>
  1009. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/Malwarebytes"><b>@Malwarebytes</b></a> - most trusted security company. Unmatched threat visibility.<br>
  1010. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/sansforensics"><b>@sansforensics</b></a> - the world's leading Digital Forensics and Incident Response provider.<br>
  1011. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/attcyber"><b>@attcyber</b></a> - AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, and more.<br>
  1012. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/TheManyHatsClub"><b>@TheManyHatsClub</b></a> - an information security focused podcast and group of individuals from all walks of life.<br>
  1013. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/hedgehogsec"><b>@hedgehogsec</b></a> - Hedgehog Cyber. Gibraltar and Manchester's top boutique information security firm.<br>
  1014. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/NCSC"><b>@NCSC</b></a> - the National Cyber Security Centre. Helping to make the UK the safest place to live and work online.<br>
  1015. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/Synacktiv"><b>@Synacktiv</b></a> - IT security experts.<br>
  1016. </p>
  1017. ##### :black_small_square: A piece of history
  1018. <p>
  1019. &nbsp;&nbsp;:small_orange_diamond: <a href="http://ftp.arl.army.mil/~mike/howto/"><b>How to Do Things at ARL</b></a> - how to configure modems, scan images, record CD-ROMs, and other.<b>*</b><br>
  1020. </p>
  1021. ##### :black_small_square: Other
  1022. <p>
  1023. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.youtube.com/watch?v=3QnD2c4Xovk"><b>Diffie-Hellman Key Exchange (short version)</b></a> - how Diffie-Hellman Key Exchange worked.<br>
  1024. </p>
  1025. #### Hacking/Penetration Testing &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  1026. ##### :black_small_square: Pentesters arsenal tools
  1027. <p>
  1028. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.syhunt.com/sandcat/"><b>Sandcat Browser</b></a> - a penetration-oriented browser with plenty of advanced functionality already built in.<br>
  1029. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.metasploit.com/"><b>Metasploit</b></a> - tool and framework for pentesting system, web and many more, contains a lot a ready to use exploit.<br>
  1030. &nbsp;&nbsp;:small_orange_diamond: <a href="https://portswigger.net/burp"><b>Burp Suite</b></a> - tool for testing web app security, intercepting proxy to replay, inject, scan and fuzz.<br>
  1031. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project"><b>OWASP Zed Attack Proxy</b></a> - intercepting proxy to replay, inject, scan and fuzz HTTP requests.<br>
  1032. &nbsp;&nbsp;:small_orange_diamond: <a href="http://w3af.org/"><b>w3af</b></a> - is a Web Application Attack and Audit Framework.<br>
  1033. &nbsp;&nbsp;:small_orange_diamond: <a href="https://mitmproxy.org/"><b>mitmproxy</b></a> - an interactive TLS-capable intercepting HTTP proxy for penetration testers.<br>
  1034. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cirt.net/Nikto2"><b>Nikto2</b></a> - web server scanner which performs comprehensive tests against web servers for multiple items.<br>
  1035. &nbsp;&nbsp;:small_orange_diamond: <a href="http://sqlmap.org/"><b>sqlmap</b></a> - tool that automates the process of detecting and exploiting SQL injection flaws.<br>
  1036. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/lanmaster53/recon-ng"><b>Recon-ng</b></a> - is a full-featured Web Reconnaissance framework written in Python.<br>
  1037. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Tib3rius/AutoRecon"><b>AutoRecon</b></a> - is a network reconnaissance tool which performs automated enumeration of services.<br>
  1038. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.faradaysec.com/"><b>Faraday</b></a> - an Integrated Multiuser Pentest Environment.<br>
  1039. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/s0md3v/Photon"><b>Photon</b></a> - incredibly fast crawler designed for OSINT.<br>
  1040. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/s0md3v/XSStrike"><b>XSStrike</b></a> - most advanced XSS detection suite.<br>
  1041. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/1N3/Sn1per"><b>Sn1per</b></a> - automated pentest framework for offensive security experts.<br>
  1042. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/future-architect/vuls"><b>vuls</b></a> - is an agent-less vulnerability scanner for Linux, FreeBSD, and other.<br>
  1043. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/google/tsunami-security-scanner"><b>tsunami</b></a> - is a general purpose network security scanner with an extensible plugin system.<br>
  1044. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/michenriksen/aquatone"><b>aquatone</b></a> - a tool for domain flyovers.<br>
  1045. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/GitHackTools/BillCipher"><b>BillCipher</b></a> - information gathering tool for a website or IP address.<br>
  1046. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Ekultek/WhatWaf"><b>WhatWaf</b></a> - detect and bypass web application firewalls and protection systems.<br>
  1047. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/s0md3v/Corsy"><b>Corsy</b></a> - CORS misconfiguration scanner.<br>
  1048. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/evyatarmeged/Raccoon"><b>Raccoon</b></a> - is a high performance offensive security tool for reconnaissance and vulnerability scanning.<br>
  1049. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Nekmo/dirhunt"><b>dirhunt</b></a> - find web directories without bruteforce.<br>
  1050. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.openwall.com/john/"><b>John The Ripper</b></a> - is a fast password cracker, currently available for many flavors of Unix, Windows, and other.<br>
  1051. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hashcat.net/hashcat/"><b>hashcat</b></a> - world's fastest and most advanced password recovery utility.<br>
  1052. &nbsp;&nbsp;:small_orange_diamond: <a href="http://lcamtuf.coredump.cx/p0f3/"><b>p0f</b></a> - is a tool to identify the players behind any incidental TCP/IP communications.<br>
  1053. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mozilla/ssh_scan"><b>ssh_scan</b></a> - a prototype SSH configuration and policy scanner.<br>
  1054. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/woj-ciech/LeakLooker"><b>LeakLooker</b></a> - find open databases - powered by Binaryedge.io<br>
  1055. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/offensive-security/exploitdb"><b>exploitdb</b></a> - searchable archive from The Exploit Database.<br>
  1056. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/vulnersCom/getsploit"><b>getsploit</b></a> - is a command line utility for searching and downloading exploits.<br>
  1057. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/zardus/ctf-tools"><b>ctf-tools</b></a> - some setup scripts for security research tools.<br>
  1058. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Gallopsled/pwntools"><b>pwntools</b></a> - CTF framework and exploit development library.<br>
  1059. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/bl4de/security-tools"><b>security-tools</b></a> - collection of small security tools created mostly in Python. CTFs, pentests and so on.<br>
  1060. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/leonteale/pentestpackage"><b>pentestpackage</b></a> - is a package of Pentest scripts.<br>
  1061. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dloss/python-pentest-tools"><b>python-pentest-tools</b></a> - python tools for penetration testers.<br>
  1062. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/fuzzdb-project/fuzzdb"><b>fuzzdb</b></a> - dictionary of attack patterns and primitives for black-box application fault injection.<br>
  1063. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/google/AFL"><b>AFL</b></a> - is a free software fuzzer maintained by Google.<br>
  1064. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/AFLplusplus/AFLplusplus"><b>AFL++</b></a> - is AFL with community patches.<br>
  1065. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/google/syzkaller"><b>syzkaller</b></a> - is an unsupervised, coverage-guided kernel fuzzer.<br>
  1066. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/pwndbg/pwndbg"><b>pwndbg</b></a> - exploit development and reverse engineering with GDB made easy.<br>
  1067. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/longld/peda"><b>GDB PEDA</b></a> - Python Exploit Development Assistance for GDB.<br>
  1068. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hex-rays.com/products/ida/index.shtml"><b>IDA</b></a> - multi-processor disassembler and debugger useful for reverse engineering malware.<br>
  1069. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/radare/radare2"><b>radare2</b></a> - framework for reverse-engineering and analyzing binaries.<br>
  1070. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/threat9/routersploit"><b>routersploit</b></a> - exploitation framework for embedded devices.<br>
  1071. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/NationalSecurityAgency/ghidra"><b>Ghidra</b></a> - is a software reverse engineering (SRE) framework.<br>
  1072. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cutter.re/"><b>Cutter</b></a> - is an SRE platform integrating Ghidra's decompiler.<br>
  1073. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/salesforce/vulnreport"><b>Vulnreport</b></a> - open-source pentesting management and automation platform by Salesforce Product Security.<br>
  1074. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/sc0tfree/mentalist"><b>Mentalist</b></a> - is a graphical tool for custom wordlist generation.<br>
  1075. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/archerysec/archerysec"><b>archerysec</b></a> - vulnerability assessment and management helps to perform scans and manage vulnerabilities.<br>
  1076. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/j3ssie/Osmedeus"><b>Osmedeus</b></a> - fully automated offensive security tool for reconnaissance and vulnerability scanning.<br>
  1077. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/beefproject/beef"><b>beef</b></a> - the browser exploitation framework project.<br>
  1078. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/NullArray/AutoSploit"><b>AutoSploit</b></a> - automated mass exploiter.<br>
  1079. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/TH3xACE/SUDO_KILLER"><b>SUDO_KILLER</b></a> - is a tool to identify and exploit sudo rules' misconfigurations and vulnerabilities.<br>
  1080. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/VirusTotal/yara"><b>yara</b></a> - the pattern matching swiss knife.<br>
  1081. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/gentilkiwi/mimikatz"><b>mimikatz</b></a> - a little tool to play with Windows security.<br>
  1082. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/sherlock-project/sherlock"><b>sherlock</b></a> - hunt down social media accounts by username across social networks.<br>
  1083. &nbsp;&nbsp;:small_orange_diamond: <a href="https://owasp.org/www-project-threat-dragon/"><b>OWASP Threat Dragon</b></a> - is a tool used to create threat model diagrams and to record possible threats.<br>
  1084. </p>
  1085. ##### :black_small_square: Pentests bookmarks collection
  1086. <p>
  1087. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.pentest-standard.org/index.php/Main_Page"><b>PTES</b></a> - the penetration testing execution standard.<br>
  1088. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.amanhardikar.com/mindmaps/Practice.html"><b>Pentests MindMap</b></a> - amazing mind map with vulnerable apps and systems.<br>
  1089. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.amanhardikar.com/mindmaps/webapptest.html"><b>WebApps Security Tests MindMap</b></a> - incredible mind map for WebApps security tests.<br>
  1090. &nbsp;&nbsp;:small_orange_diamond: <a href="https://brutelogic.com.br/blog/"><b>Brute XSS</b></a> - master the art of Cross Site Scripting.<br>
  1091. &nbsp;&nbsp;:small_orange_diamond: <a href="https://portswigger.net/web-security/cross-site-scripting/cheat-sheet"><b>XSS cheat sheet</b></a> - contains many vectors that can help you bypass WAFs and filters.<br>
  1092. &nbsp;&nbsp;:small_orange_diamond: <a href="https://jivoi.github.io/2015/07/03/offensive-security-bookmarks/"><b>Offensive Security Bookmarks</b></a> - security bookmarks collection, all things that author need to pass OSCP.<br>
  1093. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/coreb1t/awesome-pentest-cheat-sheets"><b>Awesome Pentest Cheat Sheets</b></a> - collection of the cheat sheets useful for pentesting.<br>
  1094. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Hack-with-Github/Awesome-Hacking"><b>Awesome Hacking by HackWithGithub</b></a> - awesome lists for hackers, pentesters and security researchers.<br>
  1095. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/carpedm20/awesome-hacking"><b>Awesome Hacking by carpedm20</b></a> - a curated list of awesome hacking tutorials, tools and resources.<br>
  1096. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/vitalysim/Awesome-Hacking-Resources"><b>Awesome Hacking Resources</b></a> - collection of hacking/penetration testing resources to make you better.<br>
  1097. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/enaqx/awesome-pentest"><b>Awesome Pentest</b></a> - collection of awesome penetration testing resources, tools and other shiny things.<br>
  1098. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/m4ll0k/Awesome-Hacking-Tools"><b>Awesome-Hacking-Tools</b></a> - is a curated list of awesome Hacking Tools.<br>
  1099. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/ksanchezcld/Hacking_Cheat_Sheet"><b>Hacking Cheat Sheet</b></a> - author hacking and pentesting notes.<br>
  1100. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/toolswatch/blackhat-arsenal-tools"><b>blackhat-arsenal-tools</b></a> - official Black Hat arsenal security tools repository.<br>
  1101. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.peerlyst.com/posts/the-complete-list-of-infosec-related-cheat-sheets-claus-cramon"><b>Penetration Testing and WebApp Cheat Sheets</b></a> - the complete list of Infosec related cheat sheets.<br>
  1102. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/The-Art-of-Hacking/h4cker"><b>Cyber Security Resources</b></a> - includes thousands of cybersecurity-related references and resources.<br>
  1103. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jhaddix/pentest-bookmarks"><b>Pentest Bookmarks</b></a> - there are a LOT of pentesting blogs.<br>
  1104. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/OlivierLaflamme/Cheatsheet-God"><b>Cheatsheet-God</b></a> - Penetration Testing Reference Bank - OSCP/PTP & PTX Cheatsheet.<br>
  1105. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Cyb3rWard0g/ThreatHunter-Playbook"><b>ThreatHunter-Playbook</b></a> - to aid the development of techniques and hypothesis for hunting campaigns.<br>
  1106. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/hmaverickadams/Beginner-Network-Pentesting"><b>Beginner-Network-Pentesting</b></a> - notes for beginner network pentesting course.<br>
  1107. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rewardone/OSCPRepo"><b>OSCPRepo</b></a> - is a list of resources that author have been gathering in preparation for the OSCP.<br>
  1108. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/swisskyrepo/PayloadsAllTheThings"><b>PayloadsAllTheThings</b></a> - a list of useful payloads and bypass for Web Application Security and Pentest/CTF.<br>
  1109. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/foospidy/payloads"><b>payloads</b></a> - git all the Payloads! A collection of web attack payloads.<br>
  1110. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/payloadbox/command-injection-payload-list"><b>command-injection-payload-list</b></a> - command injection payload list.<br>
  1111. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jakejarvis/awesome-shodan-queries"><b>Awesome Shodan Search Queries</b></a> - great search queries to plug into Shodan.<br>
  1112. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/s0md3v/AwesomeXSS"><b>AwesomeXSS</b></a> - is a collection of Awesome XSS resources.<br>
  1113. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/JohnTroony/php-webshells"><b>php-webshells</b></a> - common php webshells.<br>
  1114. &nbsp;&nbsp;:small_orange_diamond: <a href="https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/"><b>Pentesting Tools Cheat Sheet</b></a> - a quick reference high level overview for typical penetration testing.<br>
  1115. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cheatsheetseries.owasp.org/"><b>OWASP Cheat Sheet Series</b></a> - is a collection of high value information on specific application security topics.<br>
  1116. &nbsp;&nbsp;:small_orange_diamond: <a href="https://jeremylong.github.io/DependencyCheck/index.html"><b>OWASP dependency-check</b></a> - is an open source solution the OWASP Top 10 2013 entry.<br>
  1117. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.owasp.org/index.php/OWASP_Proactive_Controls"><b>OWASP ProActive Controls</b></a> - OWASP Top 10 Proactive Controls 2018.<br>
  1118. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE"><b>PENTESTING-BIBLE</b></a> - hacking & penetration testing & red team & cyber security resources.<br>
  1119. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/nixawk/pentest-wiki"><b>pentest-wiki</b></a> - is a free online security knowledge library for pentesters/researchers.<br>
  1120. &nbsp;&nbsp;:small_orange_diamond: <a href="https://media.defcon.org/"><b>DEF CON Media Server</b></a> - great stuff from DEFCON.<br>
  1121. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rshipp/awesome-malware-analysis"><b>Awesome Malware Analysis</b></a> - a curated list of awesome malware analysis tools and resources.<br>
  1122. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/"><b>SQL Injection Cheat Sheet</b></a> - detailed technical stuff about the many different variants of the SQL Injection.<br>
  1123. &nbsp;&nbsp;:small_orange_diamond: <a href="http://kb.entersoft.co.in/"><b>Entersoft Knowledge Base</b></a> - great and detailed reference about vulnerabilities.<br>
  1124. &nbsp;&nbsp;:small_orange_diamond: <a href="http://html5sec.org/"><b>HTML5 Security Cheatsheet</b></a> - a collection of HTML5 related XSS attack vectors.<br>
  1125. &nbsp;&nbsp;:small_orange_diamond: <a href="http://evuln.com/tools/xss-encoder/"><b>XSS String Encoder</b></a> - for generating XSS code to check your input validation filters against XSS.<br>
  1126. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gtfobins.github.io/"><b>GTFOBins</b></a> - list of Unix binaries that can be exploited by an attacker to bypass local security restrictions.<br>
  1127. &nbsp;&nbsp;:small_orange_diamond: <a href="https://guif.re/"><b>Guifre Ruiz Notes</b></a> - collection of security, system, network and pentest cheatsheets.<br>
  1128. &nbsp;&nbsp;:small_orange_diamond: <a href="http://blog.safebuff.com/2016/07/03/SSRF-Tips/index.html"><b>SSRF Tips</b></a> - a collection of SSRF Tips.<br>
  1129. &nbsp;&nbsp;:small_orange_diamond: <a href="http://shell-storm.org/repo/CTF/"><b>shell-storm repo CTF</b></a> - great archive of CTFs.<br>
  1130. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/bl4de/ctf"><b>ctf</b></a> - CTF (Capture The Flag) writeups, code snippets, notes, scripts.<br>
  1131. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/orangetw/My-CTF-Web-Challenges"><b>My-CTF-Web-Challenges</b></a> - collection of CTF Web challenges.<br>
  1132. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/OWASP/owasp-mstg"><b>MSTG</b></a> - The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security testing.<br>
  1133. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/sdcampbell/Internal-Pentest-Playbook"><b>Internal-Pentest-Playbook</b></a> - notes on the most common things for an Internal Network Penetration Test.<br>
  1134. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/streaak/keyhacks"><b>KeyHacks</b></a> - shows quick ways in which API keys leaked by a bug bounty program can be checked.<br>
  1135. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/securitum/research"><b>securitum/research</b></a> - various Proof of Concepts of security research performed by Securitum.<br>
  1136. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/juliocesarfort/public-pentesting-reports"><b>public-pentesting-reports</b></a> - is a list of public pentest reports released by several consulting security groups.<br>
  1137. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/djadmin/awesome-bug-bounty"><b>awesome-bug-bounty</b></a> - is a comprehensive curated list of available Bug Bounty.<br>
  1138. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/ngalongc/bug-bounty-reference"><b>bug-bounty-reference</b></a> - is a list of bug bounty write-ups.<br>
  1139. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/devanshbatham/Awesome-Bugbounty-Writeups"><b>Awesome-Bugbounty-Writeups</b></a> - is a curated list of bugbounty writeups.<br>
  1140. &nbsp;&nbsp;:small_orange_diamond: <a href="https://pentester.land/list-of-bug-bounty-writeups.html"><b>Bug bounty writeups</b></a> - list of bug bounty writeups (2012-2020).<br>
  1141. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hackso.me/"><b>hackso.me</b></a> - a great journey into security.<br>
  1142. </p>
  1143. ##### :black_small_square: Backdoors/exploits
  1144. <p>
  1145. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/bartblaze/PHP-backdoors"><b>PHP-backdoors</b></a> - a collection of PHP backdoors. For educational or testing purposes only.<br>
  1146. </p>
  1147. ##### :black_small_square: Wordlists and Weak passwords
  1148. <p>
  1149. &nbsp;&nbsp;:small_orange_diamond: <a href="https://weakpass.com/"><b>Weakpass</b></a> - for any kind of bruteforce find wordlists or unleash the power of them all at once!<br>
  1150. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hashes.org/"><b>Hashes.org</b></a> - is a free online hash resolving service incorporating many unparalleled techniques.<br>
  1151. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/danielmiessler/SecLists"><b>SecLists</b></a> - collection of multiple types of lists used during security assessments, collected in one place.<br>
  1152. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/berzerk0/Probable-Wordlists"><b>Probable-Wordlists</b></a> - sorted by probability originally created for password generation and testing.<br>
  1153. &nbsp;&nbsp;:small_orange_diamond: <a href="https://wiki.skullsecurity.org/index.php?title=Passwords"><b>skullsecurity passwords</b></a> - password dictionaries and leaked passwords repository.<br>
  1154. &nbsp;&nbsp;:small_orange_diamond: <a href="https://bezpieka.org/polski-slownik-premium-polish-wordlist"><b>Polish PREMIUM Dictionary</b></a> - official dictionary created by the team on the forum bezpieka.org.<b>*</b> <sup><a href="https://sourceforge.net/projects/kali-linux/files/Wordlist/">1</sup><br>
  1155. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/insidetrust/statistically-likely-usernames"><b>statistically-likely-usernames</b></a> - wordlists for creating statistically likely username lists.<br>
  1156. </p>
  1157. ##### :black_small_square: Bounty platforms
  1158. <p>
  1159. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.yeswehack.com/"><b>YesWeHack</b></a> - bug bounty platform with infosec jobs.<br>
  1160. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.openbugbounty.org/"><b>Openbugbounty</b></a> - allows any security researcher reporting a vulnerability on any website.<br>
  1161. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hackerone.com/"><b>hackerone</b></a> - global hacker community to surface the most relevant security issues.<br>
  1162. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.bugcrowd.com/"><b>bugcrowd</b></a> - crowdsourced cybersecurity for the enterprise.<br>
  1163. &nbsp;&nbsp;:small_orange_diamond: <a href="https://crowdshield.com/"><b>Crowdshield</b></a> - crowdsourced security & bug bounty management.<br>
  1164. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.synack.com/"><b>Synack</b></a> - crowdsourced security & bug bounty programs, crowd security intelligence platform, and more.<br>
  1165. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hacktrophy.com/en/"><b>Hacktrophy</b></a> - bug bounty platform.<br>
  1166. </p>
  1167. ##### :black_small_square: Web Training Apps (local installation)
  1168. <p>
  1169. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project"><b>OWASP-VWAD</b></a> - comprehensive and well maintained registry of all known vulnerable web applications.<br>
  1170. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.dvwa.co.uk/"><b>DVWA</b></a> - PHP/MySQL web application that is damn vulnerable.<br>
  1171. &nbsp;&nbsp;:small_orange_diamond: <a href="https://metasploit.help.rapid7.com/docs/metasploitable-2"><b>metasploitable2</b></a> - vulnerable web application amongst security researchers.<br>
  1172. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rapid7/metasploitable3"><b>metasploitable3</b></a> - is a VM that is built from the ground up with a large amount of security vulnerabilities.<br>
  1173. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/stamparm/DSVW"><b>DSVW</b></a> - is a deliberately vulnerable web application written in under 100 lines of code.<br>
  1174. &nbsp;&nbsp;:small_orange_diamond: <a href="https://sourceforge.net/projects/mutillidae/"><b>OWASP Mutillidae II</b></a> - free, open source, deliberately vulnerable web-application.<br>
  1175. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.owasp.org/index.php/OWASP_Juice_Shop_Project"><b>OWASP Juice Shop Project</b></a> - the most bug-free vulnerable application in existence.<br>
  1176. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.owasp.org/index.php/Projects/OWASP_Node_js_Goat_Project"><b>OWASP Node js Goat Project</b></a> - OWASP Top 10 security risks apply to web apps developed using Node.js.<br>
  1177. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/iteratec/juicy-ctf"><b>juicy-ctf</b></a> - run Capture the Flags and Security Trainings with OWASP Juice Shop.<br>
  1178. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/OWASP/SecurityShepherd"><b>SecurityShepherd</b></a> - web and mobile application security training platform.<br>
  1179. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/opendns/Security_Ninjas_AppSec_Training"><b>Security Ninjas</b></a> - open source application security training program.<br>
  1180. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rapid7/hackazon"><b>hackazon</b></a> - a modern vulnerable web app.<br>
  1181. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/appsecco/dvna"><b>dvna</b></a> - damn vulnerable NodeJS application.<br>
  1182. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/DefectDojo/django-DefectDojo"><b>django-DefectDojo</b></a> - is an open-source application vulnerability correlation and security orchestration tool.<br>
  1183. &nbsp;&nbsp;:small_orange_diamond: <a href="https://google-gruyere.appspot.com/"><b>Google Gruyere</b></a> - web application exploits and defenses.<br>
  1184. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/amolnaik4/bodhi"><b>Bodhi</b></a> - is a playground focused on learning the exploitation of client-side web vulnerabilities.<br>
  1185. &nbsp;&nbsp;:small_orange_diamond: <a href="https://websploit.h4cker.org/"><b>Websploit</b></a> - single vm lab with the purpose of combining several vulnerable appliations in one environment.<br>
  1186. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/vulhub/vulhub"><b>vulhub</b></a> - pre-built Vulnerable Environments based on docker-compose.<br>
  1187. &nbsp;&nbsp;:small_orange_diamond: <a href="https://rhinosecuritylabs.com/aws/introducing-cloudgoat-2/"><b>CloudGoat 2</b></a> - the new & improved "Vulnerable by Design"
  1188. AWS deployment tool.<br>
  1189. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/globocom/secDevLabs"><b>secDevLabs</b></a> - is a laboratory for learning secure web development in a practical manner.<br>
  1190. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/incredibleindishell/CORS-vulnerable-Lab"><b>CORS-vulnerable-Lab</b></a> - sample vulnerable code and its exploit code.<br>
  1191. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/moloch--/RootTheBox"><b>RootTheBox</b></a> - a Game of Hackers (CTF Scoreboard & Game Manager).<br>
  1192. &nbsp;&nbsp;:small_orange_diamond: <a href="https://application.security/"><b>KONTRA</b></a> - application security training (OWASP Top Web & Api).<br>
  1193. </p>
  1194. ##### :black_small_square: Labs (ethical hacking platforms/trainings/CTFs)
  1195. <p>
  1196. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.offensive-security.com/"><b>Offensive Security</b></a> - true performance-based penetration testing training for over a decade.<br>
  1197. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hackthebox.eu/"><b>Hack The Box</b></a> - online platform allowing you to test your penetration testing skills.<br>
  1198. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hacking-lab.com/index.html"><b>Hacking-Lab</b></a> - online ethical hacking, computer network and security challenge platform.<br>
  1199. &nbsp;&nbsp;:small_orange_diamond: <a href="http://pwnable.kr/index.php"><b>pwnable.kr</b></a> - non-commercial wargame site which provides various pwn challenges.<br>
  1200. &nbsp;&nbsp;:small_orange_diamond: <a href="https://pwnable.tw/"><b>Pwnable.tw</b></a> - is a wargame site for hackers to test and expand their binary exploiting skills.<br>
  1201. &nbsp;&nbsp;:small_orange_diamond: <a href="https://picoctf.com/"><b>picoCTF</b></a> - is a free computer security game targeted at middle and high school students.<br>
  1202. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ctflearn.com/"><b>CTFlearn</b></a> - is an online platform built to help ethical hackers learn and practice their cybersecurity knowledge.<br>
  1203. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ctftime.org/"><b>ctftime</b></a> - CTF archive and a place, where you can get some another CTF-related info.<br>
  1204. &nbsp;&nbsp;:small_orange_diamond: <a href="https://silesiasecuritylab.com/"><b>Silesia Security Lab</b></a> - high quality security testing services.<br>
  1205. &nbsp;&nbsp;:small_orange_diamond: <a href="https://practicalpentestlabs.com/"><b>Practical Pentest Labs</b></a> - pentest lab, take your Hacking skills to the next level.<br>
  1206. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.root-me.org/?lang=en"><b>Root Me</b></a> - the fast, easy, and affordable way to train your hacking skills.<br>
  1207. &nbsp;&nbsp;:small_orange_diamond: <a href="https://rozwal.to/login"><b>rozwal.to</b></a> - a great platform to train your pentesting skills.<br>
  1208. &nbsp;&nbsp;:small_orange_diamond: <a href="https://tryhackme.com/"><b>TryHackMe</b></a> - learning Cyber Security made easy.<br>
  1209. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hackxor.net/"><b>hackxor</b></a> - is a realistic web application hacking game, designed to help players of all abilities develop their skills.<br>
  1210. &nbsp;&nbsp;:small_orange_diamond: <a href="http://hack-yourself-first.com/"><b>Hack Yourself First</b></a> - it's full of nasty app sec holes.<br>
  1211. &nbsp;&nbsp;:small_orange_diamond: <a href="http://overthewire.org/wargames/"><b>OverTheWire</b></a> - can help you to learn and practice security concepts in the form of fun-filled games.<br>
  1212. &nbsp;&nbsp;:small_orange_diamond: <a href="https://labs.wizard-security.net/"><b>Wizard Labs</b></a> - is an online Penetration Testing Lab.<br>
  1213. &nbsp;&nbsp;:small_orange_diamond: <a href="https://pentesterlab.com/"><b>PentesterLab</b></a> - provides vulnerable systems that can be used to test and understand vulnerabilities.<br>
  1214. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ringzer0ctf.com/"><b>RingZer0</b></a> - tons of challenges designed to test and improve your hacking skills.<br>
  1215. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.try2hack.nl/"><b>try2hack</b></a> - several security-oriented challenges for your entertainment.<br>
  1216. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.ubeeri.com/preconfig-labs"><b>Ubeeri</b></a> - preconfigured lab environments.<br>
  1217. &nbsp;&nbsp;:small_orange_diamond: <a href="https://lab.pentestit.ru/"><b>Pentestit</b></a> - emulate IT infrastructures of real companies for legal pen testing and improving pentest skills.<br>
  1218. &nbsp;&nbsp;:small_orange_diamond: <a href="https://microcorruption.com/login"><b>Microcorruption</b></a> - reversal challenges done in the web interface.<br>
  1219. &nbsp;&nbsp;:small_orange_diamond: <a href="https://crackmes.one/"><b>Crackmes</b></a> - download crackmes to help improve your reverse engineering skills.<br>
  1220. &nbsp;&nbsp;:small_orange_diamond: <a href="https://domgo.at/cxss/intro"><b>DomGoat</b></a> - DOM XSS security learning and practicing platform.<br>
  1221. &nbsp;&nbsp;:small_orange_diamond: <a href="https://chall.stypr.com"><b>Stereotyped Challenges</b></a> - upgrade your web hacking techniques today!<br>
  1222. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.vulnhub.com/"><b>Vulnhub</b></a> - allows anyone to gain practical 'hands-on' experience in digital security.<br>
  1223. &nbsp;&nbsp;:small_orange_diamond: <a href="https://w3challs.com/"><b>W3Challs</b></a> - is a penetration testing training platform, which offers various computer challenges.<br>
  1224. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ringzer0ctf.com/challenges"><b>RingZer0 CTF</b></a> - offers you tons of challenges designed to test and improve your hacking skills.<br>
  1225. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hack.me/"><b>Hack.me</b></a> - a platform where you can build, host and share vulnerable web apps for educational purposes.<br>
  1226. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hackthis.co.uk/levels/"><b>HackThis!</b></a> - discover how hacks, dumps and defacements are performed and secure your website.<br>
  1227. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.enigmagroup.org/#"><b>Enigma Group WebApp Training</b></a> - these challenges cover the exploits listed in the OWASP Top 10 Project.<br>
  1228. &nbsp;&nbsp;:small_orange_diamond: <a href="https://challenges.re/"><b>Reverse Engineering Challenges</b></a> - challenges, exercises, problems and tasks - by level, by type, and more.<br>
  1229. &nbsp;&nbsp;:small_orange_diamond: <a href="https://0x00sec.org/"><b>0x00sec</b></a> - the home of the Hacker - Malware, Reverse Engineering, and Computer Science.<br>
  1230. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.wechall.net/challs"><b>We Chall</b></a> - there are exist a lots of different challenge types.<br>
  1231. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hackergateway.com/"><b>Hacker Gateway</b></a> - is the go-to place for hackers who want to test their skills.<br>
  1232. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hacker101.com/"><b>Hacker101</b></a> - is a free class for web security.<br>
  1233. &nbsp;&nbsp;:small_orange_diamond: <a href="https://contained.af/"><b>contained.af</b></a> - a stupid game for learning about containers, capabilities, and syscalls.<br>
  1234. &nbsp;&nbsp;:small_orange_diamond: <a href="http://flaws.cloud/"><b>flAWS challenge!</b></a> - a series of levels you'll learn about common mistakes and gotchas when using AWS.<br>
  1235. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cybersecurity.wtf"><b>CyberSec WTF</b></a> - provides web hacking challenges derived from bounty write-ups.<br>
  1236. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ctfchallenge.co.uk/login"><b>CTF Challenge</b></a> - CTF Web App challenges.<br>
  1237. &nbsp;&nbsp;:small_orange_diamond: <a href="https://capturetheflag.withgoogle.com"><b>gCTF</b></a> - most of the challenges used in the Google CTF 2017.<br>
  1238. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hackthissite.org/pages/index/index.php"><b>Hack This Site</b></a> - is a free, safe and legal training ground for hackers.<br>
  1239. &nbsp;&nbsp;:small_orange_diamond: <a href="https://attackdefense.com"><b>Attack & Defense</b></a> - is a browser-based cloud labs.<br>
  1240. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cryptohack.org/"><b>Cryptohack</b></a> - a fun platform for learning modern cryptography.<br>
  1241. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cryptopals.com/"><b>Cryptopals</b></a> - the cryptopals crypto challenges.<br>
  1242. </p>
  1243. ##### :black_small_square: CTF platforms
  1244. <p>
  1245. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/facebook/fbctf"><b>fbctf</b></a> - platform to host Capture the Flag competitions.<br>
  1246. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/google/ctfscoreboard"><b>ctfscoreboard</b></a> - scoreboard for Capture The Flag competitions.<br>
  1247. </p>
  1248. ##### :black_small_square: Other resources
  1249. <p>
  1250. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/bugcrowd/bugcrowd_university"><b>Bugcrowd University</b></a> - open source education content for the researcher community.<br>
  1251. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rewardone/OSCPRepo"><b>OSCPRepo</b></a> - a list of resources and scripts that I have been gathering in preparation for the OSCP.<br>
  1252. &nbsp;&nbsp;:small_orange_diamond: <a href="https://medium.com/@cxosmo/owasp-top-10-real-world-examples-part-1-a540c4ea2df5"><b>OWASP Top 10: Real-World Examples</b></a> - test your web apps with real-world examples (two-part series).<br>
  1253. &nbsp;&nbsp;:small_orange_diamond: <a href="http://phrack.org/index.html"><b>phrack.org</b></a> - an awesome collection of articles from several respected hackers and other thinkers.<br>
  1254. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Gr1mmie/Practical-Ethical-Hacking-Resources"><b>Practical-Ethical-Hacking-Resources</b></a> - compilation of resources from TCM's Udemy Course.<br>
  1255. </p>
  1256. #### Your daily knowledge and news &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  1257. ##### :black_small_square: RSS Readers
  1258. <p>
  1259. &nbsp;&nbsp;:small_orange_diamond: <a href="https://feedly.com/"><b>Feedly</b></a> - organize, read and share what matters to you.<br>
  1260. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.inoreader.com/"><b>Inoreader</b></a> - similar to feedly with a support for filtering what you fetch from rss.<br>
  1261. </p>
  1262. ##### :black_small_square: IRC Channels
  1263. <p>
  1264. &nbsp;&nbsp;:small_orange_diamond: <a href="https://wiki.hackerspaces.org/IRC_Channel"><b>#hackerspaces</b></a> - hackerspace IRC channels.<br>
  1265. </p>
  1266. ##### :black_small_square: Security
  1267. <p>
  1268. &nbsp;&nbsp;:small_orange_diamond: <a href="https://thehackernews.com/"><b>The Hacker News</b></a> - leading news source dedicated to promoting awareness for security experts and hackers.<br>
  1269. &nbsp;&nbsp;:small_orange_diamond: <a href="https://latesthackingnews.com/"><b>Latest Hacking News</b></a> - provides the latest hacking news, exploits and vulnerabilities for ethical hackers.<br>
  1270. &nbsp;&nbsp;:small_orange_diamond: <a href="https://securitynewsletter.co/"><b>Security Newsletter</b></a> - security news as a weekly digest (email notifications).<br>
  1271. &nbsp;&nbsp;:small_orange_diamond: <a href="https://security.googleblog.com/"><b>Google Online Security Blog</b></a> - the latest news and insights from Google on security and safety on the Internet.<br>
  1272. &nbsp;&nbsp;:small_orange_diamond: <a href="https://blog.qualys.com/"><b>Qualys Blog</b></a> - expert network security guidance and news.<br>
  1273. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.darkreading.com/"><b>DARKReading</b></a> - connecting the Information Security Community.<br>
  1274. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.darknet.org.uk/"><b>Darknet</b></a> - latest hacking tools, hacker news, cybersecurity best practices, ethical hacking & pen-testing.<br>
  1275. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/disclosedh1"><b>publiclyDisclosed</b></a> - public disclosure watcher who keeps you up to date about the recently disclosed bugs.<br>
  1276. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.reddit.com/r/hacking/"><b>Reddit - Hacking</b></a> - a subreddit dedicated to hacking and hackers.<br>
  1277. &nbsp;&nbsp;:small_orange_diamond: <a href="https://packetstormsecurity.com/"><b>Packet Storm</b></a> - information security services, news, files, tools, exploits, advisories and whitepapers.<br>
  1278. &nbsp;&nbsp;:small_orange_diamond: <a href="https://sekurak.pl/"><b>Sekurak</b></a> - about security, penetration tests, vulnerabilities and many others (PL/EN).<br>
  1279. &nbsp;&nbsp;:small_orange_diamond: <a href="https://nfsec.pl/"><b>nf.sec</b></a> - basic aspects and mechanisms of Linux operating system security (PL).<br>
  1280. </p>
  1281. ##### :black_small_square: Other/All-in-one
  1282. <p>
  1283. &nbsp;&nbsp;:small_orange_diamond: <a href="https://changelog.com/"><b>Changelog</b></a> - is a community of hackers; news & podcasts for developers and hackers.<br>
  1284. </p>
  1285. #### Other Cheat Sheets &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  1286. ###### Build your own DNS Servers
  1287. <p>
  1288. &nbsp;&nbsp;:small_orange_diamond: <a href="https://calomel.org/unbound_dns.html"><b>Unbound DNS Tutorial</b></a> - a validating, recursive, and caching DNS server.<br>
  1289. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.ctrl.blog/entry/knot-dns-resolver-tutorial.html"><b>Knot Resolver on Fedora</b></a> - how to get faster and more secure DNS resolution with Knot Resolver on Fedora.<br>
  1290. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.aaflalo.me/2018/10/tutorial-setup-dns-over-https-server/"><b>DNS-over-HTTPS</b></a> - tutorial to setup your own DNS-over-HTTPS (DoH) server.<br>
  1291. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/"><b>dns-over-https</b></a> - a cartoon intro to DNS over HTTPS.<br>
  1292. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.aaflalo.me/2019/03/dns-over-tls/"><b>DNS-over-TLS</b></a> - following to your DoH server, setup your DNS-over-TLS (DoT) server.<br>
  1293. &nbsp;&nbsp;:small_orange_diamond: <a href="https://zwischenzugs.com/2018/01/26/how-and-why-i-run-my-own-dns-servers/"><b>DNS Servers</b></a> - how (and why) i run my own DNS Servers.<br>
  1294. </p>
  1295. ###### Build your own Certificate Authority
  1296. <p>
  1297. &nbsp;&nbsp;:small_orange_diamond: <a href="https://jamielinux.com/docs/openssl-certificate-authority/"><b>OpenSSL Certificate Authority</b></a> - build your own certificate authority (CA) using the OpenSSL tools.<br>
  1298. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/smallstep/certificates"><b>step-ca Certificate Authority</b></a> - build your own certificate authority (CA) using open source step-ca.<br>
  1299. </p>
  1300. ###### Build your own System/Virtual Machine
  1301. <p>
  1302. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/cfenollosa/os-tutorial"><b>os-tutorial</b></a> - how to create an OS from scratch.<br>
  1303. &nbsp;&nbsp;:small_orange_diamond: <a href="https://justinmeiners.github.io/lc3-vm/"><b>Write your Own Virtual Machine</b></a> - how to write your own virtual machine (VM).<br>
  1304. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/cirosantilli/x86-bare-metal-examples"><b>x86 Bare Metal Examples</b></a> - dozens of minimal operating systems to learn x86 system programming.<br>
  1305. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/djhworld/simple-computer"><b>simple-computer</b></a> - the scott CPU from "But How Do It Know?" by J. Clark Scott.<br>
  1306. &nbsp;&nbsp;:small_orange_diamond: <a href="https://littleosbook.github.io/"><b>littleosbook</b></a> - the little book about OS development.<br>
  1307. </p>
  1308. ###### DNS Servers list (privacy)
  1309. | <b><u>IP</u></b> | <b><u>URL</u></b> |
  1310. | :--- | :--- |
  1311. | **`84.200.69.80`** | [dns.watch](https://dns.watch/) |
  1312. | **`94.247.43.254`** | [opennic.org](https://www.opennic.org/) |
  1313. | **`64.6.64.6`** | [verisign.com](https://www.verisign.com/en_US/security-services/public-dns/index.xhtml) |
  1314. | **`89.233.43.71`** | [censurfridns.dk](https://blog.uncensoreddns.org/) |
  1315. | **`1.1.1.1`** | [cloudflare.com](https://1.1.1.1/) |
  1316. | **`94.130.110.185`** | [dnsprivacy.at](https://dnsprivacy.at/) |
  1317. ###### TOP Browser extensions
  1318. | <b><u>Extension name</u></b> | <b><u>Description</u></b> |
  1319. | :--- | :--- |
  1320. | **`IPvFoo`** | Display the server IP address and HTTPS information across all page elements. |
  1321. | **`FoxyProxy`** | Simplifies configuring browsers to access proxy-servers. |
  1322. | **`HTTPS Everywhere`** | Automatically use HTTPS security on many sites. |
  1323. | **`uMatrix`** | Point & click to forbid/allow any class of requests made by your browser. |
  1324. | **`uBlock Origin`** | An efficient blocker: easy on memory and CPU footprint. |
  1325. | **`Session Buddy`** | Manage browser tabs and bookmarks with ease. |
  1326. | **`SuperSorter`** | Sort bookmarks recursively, delete duplicates, merge folders, and more. |
  1327. | **`Clear Cache`** | Clear your cache and browsing data. |
  1328. | **`d3coder`** | Encoding/Decoding plugin for various types of encoding. |
  1329. | **`Web Developer`** | Adds a toolbar button with various web developer tools. |
  1330. | **`ThreatPinch Lookup`** | Add threat intelligence hover tool tips. |
  1331. ###### TOP Burp extensions
  1332. | <b><u>Extension name</u></b> | <b><u>Description</u></b> |
  1333. | :--- | :--- |
  1334. | **`Active Scan++`** | Extends Burp's active and passive scanning capabilities. |
  1335. | **`Autorize`** | Automatically detects authorization enforcement. |
  1336. | **`AuthMatrix`** | A simple matrix grid to define the desired levels of access privilege. |
  1337. | **`Logger++`** | Logs requests and responses for all Burp tools in a sortable table. |
  1338. | **`Bypass WAF`** | Adds headers useful for bypassing some WAF devices. |
  1339. | **`JSON Beautifier`** | Beautifies JSON content in the HTTP message viewer. |
  1340. | **`JSON Web Tokens`** | Enables Burp to decode and manipulate JSON web tokens. |
  1341. | **`CSP Auditor`** | Displays CSP headers for responses, and passively reports CSP weaknesses. |
  1342. | **`CSP-Bypass`** | Passively scans for CSP headers that contain known bypasses. |
  1343. | **`Hackvertor`** | Converts data using a tag-based configuration to apply various encoding. |
  1344. | **`HTML5 Auditor`** | Scans for usage of risky HTML5 features. |
  1345. | **`Software Vulnerability Scanner`** | Vulnerability scanner based on vulners.com audit API. |
  1346. | **`Turbo Intruder`** | Is a powerful bruteforcing tool. |
  1347. | **`Upload Scanner`** | Upload a number of different file types, laced with different forms of payload. |
  1348. ###### Hack Mozilla Firefox address bar
  1349. In Firefox's address bar, you can limit results by typing special characters before or after your term:
  1350. - `^` - for matches in your browsing history
  1351. - `*` - for matches in your bookmarks.
  1352. - `%` - for matches in your currently open tabs.
  1353. - `#` - for matches in page titles.
  1354. - `@` - for matches in web addresses.
  1355. ###### Chrome hidden commands
  1356. - `chrome://chrome-urls` - list of all commands
  1357. - `chrome://flags` - enable experiments and development features
  1358. - `chrome://interstitials` - errors and warnings
  1359. - `chrome://net-internals` - network internals (events, dns, cache)
  1360. - `chrome://network-errors` - network errors
  1361. - `chrome://net-export` - start logging future network activity to a file
  1362. - `chrome://safe-browsing` - safe browsing options
  1363. - `chrome://user-actions` - record all user actions
  1364. - `chrome://restart` - restart chrome
  1365. - `chrome://dino` - ERR_INTERNET_DISCONNECTED...
  1366. - `cache:<website-address>` - view the cached version of the web page
  1367. ###### Bypass WAFs by Shortening IP Address (by [0xInfection](https://twitter.com/0xInfection))
  1368. IP addresses can be shortened by dropping the zeroes:
  1369. ```
  1370. http://1.0.0.1 → http://1.1
  1371. http://127.0.0.1 → http://127.1
  1372. http://192.168.0.1 → http://192.168.1
  1373. http://0xC0A80001 or http://3232235521 → 192.168.0.1
  1374. http://192.168.257 → 192.168.1.1
  1375. http://192.168.516 → 192.168.2.4
  1376. ```
  1377. > This bypasses WAF filters for SSRF, open-redirect, etc where any IP as input gets blacklisted.
  1378. For more information please see [How to Obscure Any URL](http://www.pc-help.org/obscure.htm) and [Magic IP Address Shortcuts](https://stuff-things.net/2014/09/25/magic-ip-address-shortcuts/).
  1379. ###### Hashing, encryption and encoding (by [Michal Špaček](https://twitter.com/spazef0rze))
  1380. _Hashing_
  1381. plaintext :arrow_right: hash<br>
  1382. hash :no_entry: plaintext
  1383. _Symmetric encryption_
  1384. plaintext :arrow_right: :key: :arrow_right: ciphertext<br>
  1385. plaintext :arrow_left: :key: :arrow_left: ciphertext<br>
  1386. (:key: shared key)
  1387. _Asymmetric encryption_
  1388. plaintext :arrow_right: :key: :arrow_right: ciphertext<br>
  1389. plaintext :arrow_left: :part_alternation_mark: :arrow_left: ciphertext<br>
  1390. (:key: public key, :part_alternation_mark: private key)<br>
  1391. _Encoding_
  1392. text :arrow_right: encoded<br>
  1393. text :arrow_left: encoded
  1394. #### One-liners &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  1395. ##### Table of Contents
  1396. * [terminal](#tool-terminal)
  1397. * [busybox](#tool-busybox)
  1398. * [mount](#tool-mount)
  1399. * [fuser](#tool-fuser)
  1400. * [lsof](#tool-lsof)
  1401. * [ps](#tool-ps)
  1402. * [top](#tool-top)
  1403. * [vmstat](#tool-vmstat)
  1404. * [iostat](#tool-iostat)
  1405. * [strace](#tool-strace)
  1406. * [kill](#tool-kill)
  1407. * [find](#tool-find)
  1408. * [diff](#tool-diff)
  1409. * [vimdiff](#tool-vimdiff)
  1410. * [tail](#tool-tail)
  1411. * [cpulimit](#tool-cpulimit)
  1412. * [pwdx](#tool-pwdx)
  1413. * [tr](#tool-tr)
  1414. * [chmod](#tool-chmod)
  1415. * [who](#tool-who)
  1416. * [last](#tool-last)
  1417. * [screen](#tool-screen)
  1418. * [script](#tool-script)
  1419. * [du](#tool-du)
  1420. * [inotifywait](#tool-inotifywait)
  1421. * [openssl](#tool-openssl)
  1422. * [secure-delete](#tool-secure-delete)
  1423. * [dd](#tool-dd)
  1424. * [gpg](#tool-gpg)
  1425. * [system-other](#tool-system-other)
  1426. * [curl](#tool-curl)
  1427. * [httpie](#tool-httpie)
  1428. * [ssh](#tool-ssh)
  1429. * [linux-dev](#tool-linux-dev)
  1430. * [tcpdump](#tool-tcpdump)
  1431. * [tcpick](#tool-tcpick)
  1432. * [ngrep](#tool-ngrep)
  1433. * [hping3](#tool-hping3)
  1434. * [nmap](#tool-nmap)
  1435. * [netcat](#tool-netcat)
  1436. * [socat](#tool-socat)
  1437. * [p0f](#tool-p0f)
  1438. * [gnutls-cli](#tool-gnutls-cli)
  1439. * [netstat](#tool-netstat)
  1440. * [rsync](#tool-rsync)
  1441. * [host](#tool-host)
  1442. * [dig](#tool-dig)
  1443. * [certbot](#tool-certbot)
  1444. * [network-other](#tool-network-other)
  1445. * [git](#tool-git)
  1446. * [awk](#tool-awk)
  1447. * [sed](#tool-sed)
  1448. * [grep](#tool-grep)
  1449. * [perl](#tool-perl)
  1450. ##### Tool: [terminal](https://en.wikipedia.org/wiki/Linux_console)
  1451. ###### Reload shell without exit
  1452. ```bash
  1453. exec $SHELL -l
  1454. ```
  1455. ###### Close shell keeping all subprocess running
  1456. ```bash
  1457. disown -a && exit
  1458. ```
  1459. ###### Exit without saving shell history
  1460. ```bash
  1461. kill -9 $$
  1462. unset HISTFILE && exit
  1463. ```
  1464. ###### Perform a branching conditional
  1465. ```bash
  1466. true && echo success
  1467. false || echo failed
  1468. ```
  1469. ###### Pipe stdout and stderr to separate commands
  1470. ```bash
  1471. some_command > >(/bin/cmd_for_stdout) 2> >(/bin/cmd_for_stderr)
  1472. ```
  1473. ###### Redirect stdout and stderr each to separate files and print both to the screen
  1474. ```bash
  1475. (some_command 2>&1 1>&3 | tee errorlog ) 3>&1 1>&2 | tee stdoutlog
  1476. ```
  1477. ###### List of commands you use most often
  1478. ```bash
  1479. history | \
  1480. awk '{CMD[$2]++;count++;}END { for (a in CMD)print CMD[a] " " CMD[a]/count*100 "% " a;}' | \
  1481. grep -v "./" | \
  1482. column -c3 -s " " -t | \
  1483. sort -nr | nl | head -n 20
  1484. ```
  1485. ###### Sterilize bash history
  1486. ```bash
  1487. function sterile() {
  1488. history | awk '$2 != "history" { $1=""; print $0 }' | egrep -vi "\
  1489. curl\b+.*(-E|--cert)\b+.*\b*|\
  1490. curl\b+.*--pass\b+.*\b*|\
  1491. curl\b+.*(-U|--proxy-user).*:.*\b*|\
  1492. curl\b+.*(-u|--user).*:.*\b*
  1493. .*(-H|--header).*(token|auth.*)\b+.*|\
  1494. wget\b+.*--.*password\b+.*\b*|\
  1495. http.?://.+:.+@.*\
  1496. " > $HOME/histbuff; history -r $HOME/histbuff;
  1497. }
  1498. export PROMPT_COMMAND="sterile"
  1499. ```
  1500. > Look also: [A naive utility to censor credentials in command history](https://github.com/lbonanomi/go/blob/master/revisionist.go).
  1501. ###### Quickly backup a file
  1502. ```bash
  1503. cp filename{,.orig}
  1504. ```
  1505. ###### Empty a file (truncate to 0 size)
  1506. ```bash
  1507. >filename
  1508. ```
  1509. ###### Delete all files in a folder that don't match a certain file extension
  1510. ```bash
  1511. rm !(*.foo|*.bar|*.baz)
  1512. ```
  1513. ###### Pass multi-line string to a file
  1514. ```bash
  1515. # cat >filename ... - overwrite the file
  1516. # cat >>filename ... - append to a file
  1517. cat > filename << __EOF__
  1518. data data data
  1519. __EOF__
  1520. ```
  1521. ###### Edit a file on a remote host using vim
  1522. ```bash
  1523. vim scp://user@host//etc/fstab
  1524. ```
  1525. ###### Create a directory and change into it at the same time
  1526. ```bash
  1527. mkd() { mkdir -p "$@" && cd "$@"; }
  1528. ```
  1529. ###### Convert uppercase files to lowercase files
  1530. ```bash
  1531. rename 'y/A-Z/a-z/' *
  1532. ```
  1533. ###### Print a row of characters across the terminal
  1534. ```bash
  1535. printf "%`tput cols`s" | tr ' ' '#'
  1536. ```
  1537. ###### Show shell history without line numbers
  1538. ```bash
  1539. history | cut -c 8-
  1540. fc -l -n 1 | sed 's/^\s*//'
  1541. ```
  1542. ###### Run command(s) after exit session
  1543. ```bash
  1544. cat > /etc/profile << __EOF__
  1545. _after_logout() {
  1546. username=$(whoami)
  1547. for _pid in $(ps afx | grep sshd | grep "$username" | awk '{print $1}') ; do
  1548. kill -9 $_pid
  1549. done
  1550. }
  1551. trap _after_logout EXIT
  1552. __EOF__
  1553. ```
  1554. ###### Generate a sequence of numbers
  1555. ```bash
  1556. for ((i=1; i<=10; i+=2)) ; do echo $i ; done
  1557. # alternative: seq 1 2 10
  1558. for ((i=5; i<=10; ++i)) ; do printf '%02d\n' $i ; done
  1559. # alternative: seq -w 5 10
  1560. for i in {1..10} ; do echo $i ; done
  1561. ```
  1562. ###### Simple Bash filewatching
  1563. ```bash
  1564. unset MAIL; export MAILCHECK=1; export MAILPATH='$FILE_TO_WATCH?$MESSAGE'
  1565. ```
  1566. ---
  1567. ##### Tool: [busybox](https://www.busybox.net/)
  1568. ###### Static HTTP web server
  1569. ```bash
  1570. busybox httpd -p $PORT -h $HOME [-c httpd.conf]
  1571. ```
  1572. ___
  1573. ##### Tool: [mount](https://en.wikipedia.org/wiki/Mount_(Unix))
  1574. ###### Mount a temporary ram partition
  1575. ```bash
  1576. mount -t tmpfs tmpfs /mnt -o size=64M
  1577. ```
  1578. * `-t` - filesystem type
  1579. * `-o` - mount options
  1580. ###### Remount a filesystem as read/write
  1581. ```bash
  1582. mount -o remount,rw /
  1583. ```
  1584. ___
  1585. ##### Tool: [fuser](https://en.wikipedia.org/wiki/Fuser_(Unix))
  1586. ###### Show which processes use the files/directories
  1587. ```bash
  1588. fuser /var/log/daemon.log
  1589. fuser -v /home/supervisor
  1590. ```
  1591. ###### Kills a process that is locking a file
  1592. ```bash
  1593. fuser -ki filename
  1594. ```
  1595. * `-i` - interactive option
  1596. ###### Kills a process that is locking a file with specific signal
  1597. ```bash
  1598. fuser -k -HUP filename
  1599. ```
  1600. * `--list-signals` - list available signal names
  1601. ###### Show what PID is listening on specific port
  1602. ```bash
  1603. fuser -v 53/udp
  1604. ```
  1605. ###### Show all processes using the named filesystems or block device
  1606. ```bash
  1607. fuser -mv /var/www
  1608. ```
  1609. ___
  1610. ##### Tool: [lsof](https://en.wikipedia.org/wiki/Lsof)
  1611. ###### Show process that use internet connection at the moment
  1612. ```bash
  1613. lsof -P -i -n
  1614. ```
  1615. ###### Show process that use specific port number
  1616. ```bash
  1617. lsof -i tcp:443
  1618. ```
  1619. ###### Lists all listening ports together with the PID of the associated process
  1620. ```bash
  1621. lsof -Pan -i tcp -i udp
  1622. ```
  1623. ###### List all open ports and their owning executables
  1624. ```bash
  1625. lsof -i -P | grep -i "listen"
  1626. ```
  1627. ###### Show all open ports
  1628. ```bash
  1629. lsof -Pnl -i
  1630. ```
  1631. ###### Show open ports (LISTEN)
  1632. ```bash
  1633. lsof -Pni4 | grep LISTEN | column -t
  1634. ```
  1635. ###### List all files opened by a particular command
  1636. ```bash
  1637. lsof -c "process"
  1638. ```
  1639. ###### View user activity per directory
  1640. ```bash
  1641. lsof -u username -a +D /etc
  1642. ```
  1643. ###### Show 10 largest open files
  1644. ```bash
  1645. lsof / | \
  1646. awk '{ if($7 > 1048576) print $7/1048576 "MB" " " $9 " " $1 }' | \
  1647. sort -n -u | tail | column -t
  1648. ```
  1649. ###### Show current working directory of a process
  1650. ```bash
  1651. lsof -p <PID> | grep cwd
  1652. ```
  1653. ___
  1654. ##### Tool: [ps](https://en.wikipedia.org/wiki/Ps_(Unix))
  1655. ###### Show a 4-way scrollable process tree with full details
  1656. ```bash
  1657. ps awwfux | less -S
  1658. ```
  1659. ###### Processes per user counter
  1660. ```bash
  1661. ps hax -o user | sort | uniq -c | sort -r
  1662. ```
  1663. ###### Show all processes by name with main header
  1664. ```bash
  1665. ps -lfC nginx
  1666. ```
  1667. ___
  1668. ##### Tool: [find](https://en.wikipedia.org/wiki/Find_(Unix))
  1669. ###### Find files that have been modified on your system in the past 60 minutes
  1670. ```bash
  1671. find / -mmin 60 -type f
  1672. ```
  1673. ###### Find all files larger than 20M
  1674. ```bash
  1675. find / -type f -size +20M
  1676. ```
  1677. ###### Find duplicate files (based on MD5 hash)
  1678. ```bash
  1679. find -type f -exec md5sum '{}' ';' | sort | uniq --all-repeated=separate -w 33
  1680. ```
  1681. ###### Change permission only for files
  1682. ```bash
  1683. cd /var/www/site && find . -type f -exec chmod 766 {} \;
  1684. cd /var/www/site && find . -type f -exec chmod 664 {} +
  1685. ```
  1686. ###### Change permission only for directories
  1687. ```bash
  1688. cd /var/www/site && find . -type d -exec chmod g+x {} \;
  1689. cd /var/www/site && find . -type d -exec chmod g+rwx {} +
  1690. ```
  1691. ###### Find files and directories for specific user/group
  1692. ```bash
  1693. # User:
  1694. find . -user <username> -print
  1695. find /etc -type f -user <username> -name "*.conf"
  1696. # Group:
  1697. find /opt -group <group>
  1698. find /etc -type f -group <group> -iname "*.conf"
  1699. ```
  1700. ###### Find files and directories for all without specific user/group
  1701. ```bash
  1702. # User:
  1703. find . \! -user <username> -print
  1704. # Group:
  1705. find . \! -group <group>
  1706. ```
  1707. ###### Looking for files/directories that only have certain permission
  1708. ```bash
  1709. # User
  1710. find . -user <username> -perm -u+rw # -rw-r--r--
  1711. find /home -user $(whoami) -perm 777 # -rwxrwxrwx
  1712. # Group:
  1713. find /home -type d -group <group> -perm 755 # -rwxr-xr-x
  1714. ```
  1715. ###### Delete older files than 60 days
  1716. ```bash
  1717. find . -type f -mtime +60 -delete
  1718. ```
  1719. ###### Recursively remove all empty sub-directories from a directory
  1720. ```bash
  1721. find . -depth -type d -empty -exec rmdir {} \;
  1722. ```
  1723. ###### How to find all hard links to a file
  1724. ```bash
  1725. find </path/to/dir> -xdev -samefile filename
  1726. ```
  1727. ###### Recursively find the latest modified files
  1728. ```bash
  1729. find . -type f -exec stat --format '%Y :%y %n' "{}" \; | sort -nr | cut -d: -f2- | head
  1730. ```
  1731. ###### Recursively find/replace of a string with sed
  1732. ```bash
  1733. find . -not -path '*/\.git*' -type f -print0 | xargs -0 sed -i 's/foo/bar/g'
  1734. ```
  1735. ###### Recursively find/replace of a string in directories and file names
  1736. ```bash
  1737. find . -depth -name '*test*' -execdir bash -c 'mv -v "$1" "${1//foo/bar}"' _ {} \;
  1738. ```
  1739. ###### Recursively find suid executables
  1740. ```bash
  1741. find / \( -perm -4000 -o -perm -2000 \) -type f -exec ls -la {} \;
  1742. ```
  1743. ___
  1744. ##### Tool: [top](https://en.wikipedia.org/wiki/Top_(software))
  1745. ###### Use top to monitor only all processes with the specific string
  1746. ```bash
  1747. top -p $(pgrep -d , <str>)
  1748. ```
  1749. * `<str>` - process containing string (eg. nginx, worker)
  1750. ___
  1751. ##### Tool: [vmstat](https://en.wikipedia.org/wiki/Vmstat)
  1752. ###### Show current system utilization (fields in kilobytes)
  1753. ```bash
  1754. vmstat 2 20 -t -w
  1755. ```
  1756. * `2` - number of times with a defined time interval (delay)
  1757. * `20` - each execution of the command (count)
  1758. * `-t` - show timestamp
  1759. * `-w` - wide output
  1760. * `-S M` - output of the fields in megabytes instead of kilobytes
  1761. ###### Show current system utilization will get refreshed every 5 seconds
  1762. ```bash
  1763. vmstat 5 -w
  1764. ```
  1765. ###### Display report a summary of disk operations
  1766. ```bash
  1767. vmstat -D
  1768. ```
  1769. ###### Display report of event counters and memory stats
  1770. ```bash
  1771. vmstat -s
  1772. ```
  1773. ###### Display report about kernel objects stored in slab layer cache
  1774. ```bash
  1775. vmstat -m
  1776. ```
  1777. ##### Tool: [iostat](https://en.wikipedia.org/wiki/Iostat)
  1778. ###### Show information about the CPU usage, and I/O statistics about all the partitions
  1779. ```bash
  1780. iostat 2 10 -t -m
  1781. ```
  1782. * `2` - number of times with a defined time interval (delay)
  1783. * `10` - each execution of the command (count)
  1784. * `-t` - show timestamp
  1785. * `-m` - fields in megabytes (`-k` - in kilobytes, default)
  1786. ###### Show information only about the CPU utilization
  1787. ```bash
  1788. iostat 2 10 -t -m -c
  1789. ```
  1790. ###### Show information only about the disk utilization
  1791. ```bash
  1792. iostat 2 10 -t -m -d
  1793. ```
  1794. ###### Show information only about the LVM utilization
  1795. ```bash
  1796. iostat -N
  1797. ```
  1798. ___
  1799. ##### Tool: [strace](https://en.wikipedia.org/wiki/Strace)
  1800. ###### Track with child processes
  1801. ```bash
  1802. # 1)
  1803. strace -f -p $(pidof glusterfsd)
  1804. # 2)
  1805. strace -f $(pidof php-fpm | sed 's/\([0-9]*\)/\-p \1/g')
  1806. ```
  1807. ###### Track process with 30 seconds limit
  1808. ```bash
  1809. timeout 30 strace $(< /var/run/zabbix/zabbix_agentd.pid)
  1810. ```
  1811. ###### Track processes and redirect output to a file
  1812. ```bash
  1813. ps auxw | grep '[a]pache' | awk '{print " -p " $2}' | \
  1814. xargs strace -o /tmp/strace-apache-proc.out
  1815. ```
  1816. ###### Track with print time spent in each syscall and limit length of print strings
  1817. ```bash
  1818. ps auxw | grep '[i]init_policy' | awk '{print " -p " $2}' | \
  1819. xargs strace -f -e trace=network -T -s 10000
  1820. ```
  1821. ###### Track the open request of a network port
  1822. ```bash
  1823. strace -f -e trace=bind nc -l 80
  1824. ```
  1825. ###### Track the open request of a network port (show TCP/UDP)
  1826. ```bash
  1827. strace -f -e trace=network nc -lu 80
  1828. ```
  1829. ___
  1830. ##### Tool: [kill](https://en.wikipedia.org/wiki/Kill_(command))
  1831. ###### Kill a process running on port
  1832. ```bash
  1833. kill -9 $(lsof -i :<port> | awk '{l=$2} END {print l}')
  1834. ```
  1835. ___
  1836. ##### Tool: [diff](https://en.wikipedia.org/wiki/Diff)
  1837. ###### Compare two directory trees
  1838. ```bash
  1839. diff <(cd directory1 && find | sort) <(cd directory2 && find | sort)
  1840. ```
  1841. ###### Compare output of two commands
  1842. ```bash
  1843. diff <(cat /etc/passwd) <(cut -f2 /etc/passwd)
  1844. ```
  1845. ___
  1846. ##### Tool: [vimdiff](http://vimdoc.sourceforge.net/htmldoc/diff.html)
  1847. ###### Highlight the exact differences, based on characters and words
  1848. ```bash
  1849. vimdiff file1 file2
  1850. ```
  1851. ###### Compare two JSON files
  1852. ```bash
  1853. vimdiff <(jq -S . A.json) <(jq -S . B.json)
  1854. ```
  1855. ###### Compare Hex dump
  1856. ```bash
  1857. d(){ vimdiff <(f $1) <(f $2);};f(){ hexdump -C $1|cut -d' ' -f3-|tr -s ' ';}; d ~/bin1 ~/bin2
  1858. ```
  1859. ###### diffchar
  1860. Save [diffchar](https://raw.githubusercontent.com/vim-scripts/diffchar.vim/master/plugin/diffchar.vim) @ `~/.vim/plugins`
  1861. Click `F7` to switch between diff modes
  1862. Usefull `vimdiff` commands:
  1863. * `qa` to exit all windows
  1864. * `:vertical resize 70` to resize window
  1865. * set window width `Ctrl+W [N columns]+(Shift+)<\>`
  1866. ___
  1867. ##### Tool: [tail](https://en.wikipedia.org/wiki/Tail_(Unix))
  1868. ###### Annotate tail -f with timestamps
  1869. ```bash
  1870. tail -f file | while read ; do echo "$(date +%T.%N) $REPLY" ; done
  1871. ```
  1872. ###### Analyse an Apache access log for the most common IP addresses
  1873. ```bash
  1874. tail -10000 access_log | awk '{print $1}' | sort | uniq -c | sort -n | tail
  1875. ```
  1876. ###### Analyse web server log and show only 5xx http codes
  1877. ```bash
  1878. tail -n 100 -f /path/to/logfile | grep "HTTP/[1-2].[0-1]\" [5]"
  1879. ```
  1880. ___
  1881. ##### Tool: [tar](https://en.wikipedia.org/wiki/Tar_(computing))
  1882. ###### System backup with exclude specific directories
  1883. ```bash
  1884. cd /
  1885. tar -czvpf /mnt/system$(date +%d%m%Y%s).tgz --directory=/ \
  1886. --exclude=proc/* --exclude=sys/* --exclude=dev/* --exclude=mnt/* .
  1887. ```
  1888. ###### System backup with exclude specific directories (pigz)
  1889. ```bash
  1890. cd /
  1891. tar cvpf /backup/snapshot-$(date +%d%m%Y%s).tgz --directory=/ \
  1892. --exclude=proc/* --exclude=sys/* --exclude=dev/* \
  1893. --exclude=mnt/* --exclude=tmp/* --use-compress-program=pigz .
  1894. ```
  1895. ___
  1896. ##### Tool: [dump](https://en.wikipedia.org/wiki/Dump_(program))
  1897. ###### System backup to file
  1898. ```bash
  1899. dump -y -u -f /backup/system$(date +%d%m%Y%s).lzo /
  1900. ```
  1901. ###### Restore system from lzo file
  1902. ```bash
  1903. cd /
  1904. restore -rf /backup/system$(date +%d%m%Y%s).lzo
  1905. ```
  1906. ___
  1907. ##### Tool: [cpulimit](http://cpulimit.sourceforge.net/)
  1908. ###### Limit the cpu usage of a process
  1909. ```bash
  1910. cpulimit -p pid -l 50
  1911. ```
  1912. ___
  1913. ##### Tool: [pwdx](https://www.cyberciti.biz/faq/unix-linux-pwdx-command-examples-usage-syntax/)
  1914. ###### Show current working directory of a process
  1915. ```bash
  1916. pwdx <pid>
  1917. ```
  1918. ___
  1919. ##### Tool: [taskset](https://www.cyberciti.biz/faq/taskset-cpu-affinity-command/)
  1920. ###### Start a command on only one CPU core
  1921. ```bash
  1922. taskset -c 0 <command>
  1923. ```
  1924. ___
  1925. ##### Tool: [tr](https://en.wikipedia.org/wiki/Tr_(Unix))
  1926. ###### Show directories in the PATH, one per line
  1927. ```bash
  1928. tr : '\n' <<<$PATH
  1929. ```
  1930. ___
  1931. ##### Tool: [chmod](https://en.wikipedia.org/wiki/Chmod)
  1932. ###### Remove executable bit from all files in the current directory
  1933. ```bash
  1934. chmod -R -x+X *
  1935. ```
  1936. ###### Restore permission for /bin/chmod
  1937. ```bash
  1938. # 1:
  1939. cp /bin/ls chmod.01
  1940. cp /bin/chmod chmod.01
  1941. ./chmod.01 700 file
  1942. # 2:
  1943. /bin/busybox chmod 0700 /bin/chmod
  1944. # 3:
  1945. setfacl --set u::rwx,g::---,o::--- /bin/chmod
  1946. ```
  1947. ___
  1948. ##### Tool: [who](https://en.wikipedia.org/wiki/Who_(Unix))
  1949. ###### Find last reboot time
  1950. ```bash
  1951. who -b
  1952. ```
  1953. ###### Detect a user sudo-su'd into the current shell
  1954. ```bash
  1955. [[ $(who -m | awk '{ print $1 }') == $(whoami) ]] || echo "You are su-ed to $(whoami)"
  1956. ```
  1957. ___
  1958. ##### Tool: [last](https://www.howtoforge.com/linux-last-command/)
  1959. ###### Was the last reboot a panic?
  1960. ```bash
  1961. (last -x -f $(ls -1t /var/log/wtmp* | head -2 | tail -1); last -x -f /var/log/wtmp) | \
  1962. grep -A1 reboot | head -2 | grep -q shutdown && echo "Expected reboot" || echo "Panic reboot"
  1963. ```
  1964. ___
  1965. ##### Tool: [screen](https://en.wikipedia.org/wiki/GNU_Screen)
  1966. ###### Start screen in detached mode
  1967. ```bash
  1968. screen -d -m <command>
  1969. ```
  1970. ###### Attach to an existing screen session
  1971. ```bash
  1972. screen -r -d <pid>
  1973. ```
  1974. ___
  1975. ##### Tool: [script](https://en.wikipedia.org/wiki/Script_(Unix))
  1976. ###### Record and replay terminal session
  1977. ```bash
  1978. ### Record session
  1979. # 1)
  1980. script -t 2>~/session.time -a ~/session.log
  1981. # 2)
  1982. script --timing=session.time session.log
  1983. ### Replay session
  1984. scriptreplay --timing=session.time session.log
  1985. ```
  1986. ___
  1987. ##### Tool: [du](https://en.wikipedia.org/wiki/GNU_Screen)
  1988. ###### Show 20 biggest directories with 'K M G'
  1989. ```bash
  1990. du | \
  1991. sort -r -n | \
  1992. awk '{split("K M G",v); s=1; while($1>1024){$1/=1024; s++} print int($1)" "v[s]"\t"$2}' | \
  1993. head -n 20
  1994. ```
  1995. ___
  1996. ##### Tool: [inotifywait](https://en.wikipedia.org/wiki/GNU_Screen)
  1997. ###### Init tool everytime a file in a directory is modified
  1998. ```bash
  1999. while true ; do inotifywait -r -e MODIFY dir/ && ls dir/ ; done;
  2000. ```
  2001. ___
  2002. ##### Tool: [openssl](https://www.openssl.org/)
  2003. ###### Testing connection to the remote host
  2004. ```bash
  2005. echo | openssl s_client -connect google.com:443 -showcerts
  2006. ```
  2007. ###### Testing connection to the remote host (debug mode)
  2008. ```bash
  2009. echo | openssl s_client -connect google.com:443 -showcerts -tlsextdebug -status
  2010. ```
  2011. ###### Testing connection to the remote host (with SNI support)
  2012. ```bash
  2013. echo | openssl s_client -showcerts -servername google.com -connect google.com:443
  2014. ```
  2015. ###### Testing connection to the remote host with specific ssl version
  2016. ```bash
  2017. openssl s_client -tls1_2 -connect google.com:443
  2018. ```
  2019. ###### Testing connection to the remote host with specific ssl cipher
  2020. ```bash
  2021. openssl s_client -cipher 'AES128-SHA' -connect google.com:443
  2022. ```
  2023. ###### Verify 0-RTT
  2024. ```bash
  2025. _host="example.com"
  2026. cat > req.in << __EOF__
  2027. HEAD / HTTP/1.1
  2028. Host: $_host
  2029. Connection: close
  2030. __EOF__
  2031. openssl s_client -connect ${_host}:443 -tls1_3 -sess_out session.pem -ign_eof < req.in
  2032. openssl s_client -connect ${_host}:443 -tls1_3 -sess_in session.pem -early_data req.in
  2033. ```
  2034. ###### Generate private key without passphrase
  2035. ```bash
  2036. # _len: 2048, 4096
  2037. ( _fd="private.key" ; _len="2048" ; \
  2038. openssl genrsa -out ${_fd} ${_len} )
  2039. ```
  2040. ###### Generate private key with passphrase
  2041. ```bash
  2042. # _ciph: des3, aes128, aes256
  2043. # _len: 2048, 4096
  2044. ( _ciph="aes128" ; _fd="private.key" ; _len="2048" ; \
  2045. openssl genrsa -${_ciph} -out ${_fd} ${_len} )
  2046. ```
  2047. ###### Remove passphrase from private key
  2048. ```bash
  2049. ( _fd="private.key" ; _fd_unp="private_unp.key" ; \
  2050. openssl rsa -in ${_fd} -out ${_fd_unp} )
  2051. ```
  2052. ###### Encrypt existing private key with a passphrase
  2053. ```bash
  2054. # _ciph: des3, aes128, aes256
  2055. ( _ciph="aes128" ; _fd="private.key" ; _fd_pass="private_pass.key" ; \
  2056. openssl rsa -${_ciph} -in ${_fd} -out ${_fd_pass}
  2057. ```
  2058. ###### Check private key
  2059. ```bash
  2060. ( _fd="private.key" ; \
  2061. openssl rsa -check -in ${_fd} )
  2062. ```
  2063. ###### Get public key from private key
  2064. ```bash
  2065. ( _fd="private.key" ; _fd_pub="public.key" ; \
  2066. openssl rsa -pubout -in ${_fd} -out ${_fd_pub} )
  2067. ```
  2068. ###### Generate private key and CSR
  2069. ```bash
  2070. ( _fd="private.key" ; _fd_csr="request.csr" ; _len="2048" ; \
  2071. openssl req -out ${_fd_csr} -new -newkey rsa:${_len} -nodes -keyout ${_fd} )
  2072. ```
  2073. ###### Generate CSR
  2074. ```bash
  2075. ( _fd="private.key" ; _fd_csr="request.csr" ; \
  2076. openssl req -out ${_fd_csr} -new -key ${_fd} )
  2077. ```
  2078. ###### Generate CSR (metadata from existing certificate)
  2079. > Where `private.key` is the existing private key. As you can see you do not generate this CSR from your certificate (public key). Also you do not generate the "same" CSR, just a new one to request a new certificate.
  2080. ```bash
  2081. ( _fd="private.key" ; _fd_csr="request.csr" ; _fd_crt="cert.crt" ; \
  2082. openssl x509 -x509toreq -in ${_fd_crt} -out ${_fd_csr} -signkey ${_fd} )
  2083. ```
  2084. ###### Generate CSR with -config param
  2085. ```bash
  2086. ( _fd="private.key" ; _fd_csr="request.csr" ; \
  2087. openssl req -new -sha256 -key ${_fd} -out ${_fd_csr} \
  2088. -config <(
  2089. cat << __EOF__
  2090. [req]
  2091. default_bits = 2048
  2092. default_md = sha256
  2093. prompt = no
  2094. distinguished_name = dn
  2095. req_extensions = req_ext
  2096. [ dn ]
  2097. C = "<two-letter ISO abbreviation for your country>"
  2098. ST = "<state or province where your organisation is legally located>"
  2099. L = "<city where your organisation is legally located>"
  2100. O = "<legal name of your organisation>"
  2101. OU = "<section of the organisation>"
  2102. CN = "<fully qualified domain name>"
  2103. [ req_ext ]
  2104. subjectAltName = @alt_names
  2105. [ alt_names ]
  2106. DNS.1 = <fully qualified domain name>
  2107. DNS.2 = <next domain>
  2108. DNS.3 = <next domain>
  2109. __EOF__
  2110. ))
  2111. ```
  2112. Other values in `[ dn ]`:
  2113. ```
  2114. countryName = "DE" # C=
  2115. stateOrProvinceName = "Hessen" # ST=
  2116. localityName = "Keller" # L=
  2117. postalCode = "424242" # L/postalcode=
  2118. postalAddress = "Keller" # L/postaladdress=
  2119. streetAddress = "Crater 1621" # L/street=
  2120. organizationName = "apfelboymschule" # O=
  2121. organizationalUnitName = "IT Department" # OU=
  2122. commonName = "example.com" # CN=
  2123. emailAddress = "webmaster@example.com" # CN/emailAddress=
  2124. ```
  2125. Example of `oids` (you'll probably also have to make OpenSSL know about the new fields required for EV by adding the following under `[new_oids]`):
  2126. ```
  2127. [req]
  2128. ...
  2129. oid_section = new_oids
  2130. [ new_oids ]
  2131. postalCode = 2.5.4.17
  2132. streetAddress = 2.5.4.9
  2133. ```
  2134. Full example:
  2135. ```bash
  2136. ( _fd="private.key" ; _fd_csr="request.csr" ; \
  2137. openssl req -new -sha256 -key ${_fd} -out ${_fd_csr} \
  2138. -config <(
  2139. cat << __EOF__
  2140. [req]
  2141. default_bits = 2048
  2142. default_md = sha256
  2143. prompt = no
  2144. distinguished_name = dn
  2145. req_extensions = req_ext
  2146. oid_section = new_oids
  2147. [ new_oids ]
  2148. serialNumber = 2.5.4.5
  2149. streetAddress = 2.5.4.9
  2150. postalCode = 2.5.4.17
  2151. businessCategory = 2.5.4.15
  2152. [ dn ]
  2153. serialNumber=00001111
  2154. businessCategory=Private Organization
  2155. jurisdictionC=DE
  2156. C=DE
  2157. ST=Hessen
  2158. L=Keller
  2159. postalCode=424242
  2160. streetAddress=Crater 1621
  2161. O=AV Company
  2162. OU=IT
  2163. CN=example.com
  2164. [ req_ext ]
  2165. subjectAltName = @alt_names
  2166. [ alt_names ]
  2167. DNS.1 = example.com
  2168. __EOF__
  2169. ))
  2170. ```
  2171. For more information please look at these great explanations:
  2172. - [RFC 5280](https://tools.ietf.org/html/rfc5280)
  2173. - [How to create multidomain certificates using config files](https://apfelboymchen.net/gnu/notes/openssl%20multidomain%20with%20config%20files.html)
  2174. - [Generate a multi domains certificate using config files](https://gist.github.com/romainnorberg/464758a6620228b977212a3cf20c3e08)
  2175. - [Your OpenSSL CSR command is out of date](https://expeditedsecurity.com/blog/openssl-csr-command/)
  2176. - [OpenSSL example configuration file](https://www.tbs-certificats.com/openssl-dem-server-cert.cnf)
  2177. - [Object Identifiers (OIDs)](https://www.alvestrand.no/objectid/)
  2178. - [openssl objects.txt](https://github.com/openssl/openssl/blob/master/crypto/objects/objects.txt)
  2179. ###### List available EC curves
  2180. ```bash
  2181. openssl ecparam -list_curves
  2182. ```
  2183. ###### Print ECDSA private and public keys
  2184. ```bash
  2185. ( _fd="private.key" ; \
  2186. openssl ec -in ${_fd} -noout -text )
  2187. # For x25519 only extracting public key
  2188. ( _fd="private.key" ; _fd_pub="public.key" ; \
  2189. openssl pkey -in ${_fd} -pubout -out ${_fd_pub} )
  2190. ```
  2191. ###### Generate ECDSA private key
  2192. ```bash
  2193. # _curve: prime256v1, secp521r1, secp384r1
  2194. ( _fd="private.key" ; _curve="prime256v1" ; \
  2195. openssl ecparam -out ${_fd} -name ${_curve} -genkey )
  2196. # _curve: X25519
  2197. ( _fd="private.key" ; _curve="x25519" ; \
  2198. openssl genpkey -algorithm ${_curve} -out ${_fd} )
  2199. ```
  2200. ###### Generate private key and CSR (ECC)
  2201. ```bash
  2202. # _curve: prime256v1, secp521r1, secp384r1
  2203. ( _fd="domain.com.key" ; _fd_csr="domain.com.csr" ; _curve="prime256v1" ; \
  2204. openssl ecparam -out ${_fd} -name ${_curve} -genkey ; \
  2205. openssl req -new -key ${_fd} -out ${_fd_csr} -sha256 )
  2206. ```
  2207. ###### Generate self-signed certificate
  2208. ```bash
  2209. # _len: 2048, 4096
  2210. ( _fd="domain.key" ; _fd_out="domain.crt" ; _len="2048" ; _days="365" ; \
  2211. openssl req -newkey rsa:${_len} -nodes \
  2212. -keyout ${_fd} -x509 -days ${_days} -out ${_fd_out} )
  2213. ```
  2214. ###### Generate self-signed certificate from existing private key
  2215. ```bash
  2216. # _len: 2048, 4096
  2217. ( _fd="domain.key" ; _fd_out="domain.crt" ; _days="365" ; \
  2218. openssl req -key ${_fd} -nodes \
  2219. -x509 -days ${_days} -out ${_fd_out} )
  2220. ```
  2221. ###### Generate self-signed certificate from existing private key and csr
  2222. ```bash
  2223. # _len: 2048, 4096
  2224. ( _fd="domain.key" ; _fd_csr="domain.csr" ; _fd_out="domain.crt" ; _days="365" ; \
  2225. openssl x509 -signkey ${_fd} -nodes \
  2226. -in ${_fd_csr} -req -days ${_days} -out ${_fd_out} )
  2227. ```
  2228. ###### Generate DH public parameters
  2229. ```bash
  2230. ( _dh_size="2048" ; \
  2231. openssl dhparam -out /etc/nginx/ssl/dhparam_${_dh_size}.pem "$_dh_size" )
  2232. ```
  2233. ###### Display DH public parameters
  2234. ```bash
  2235. openssl pkeyparam -in dhparam.pem -text
  2236. ```
  2237. ###### Extract private key from pfx
  2238. ```bash
  2239. ( _fd_pfx="cert.pfx" ; _fd_key="key.pem" ; \
  2240. openssl pkcs12 -in ${_fd_pfx} -nocerts -nodes -out ${_fd_key} )
  2241. ```
  2242. ###### Extract private key and certs from pfx
  2243. ```bash
  2244. ( _fd_pfx="cert.pfx" ; _fd_pem="key_certs.pem" ; \
  2245. openssl pkcs12 -in ${_fd_pfx} -nodes -out ${_fd_pem} )
  2246. ```
  2247. ###### Extract certs from p7b
  2248. ```bash
  2249. # PKCS#7 file doesn't include private keys.
  2250. ( _fd_p7b="cert.p7b" ; _fd_pem="cert.pem" ; \
  2251. openssl pkcs7 -inform DER -outform PEM -in ${_fd_p7b} -print_certs > ${_fd_pem})
  2252. # or:
  2253. openssl pkcs7 -print_certs -in -in ${_fd_p7b} -out ${_fd_pem})
  2254. ```
  2255. ###### Convert DER to PEM
  2256. ```bash
  2257. ( _fd_der="cert.crt" ; _fd_pem="cert.pem" ; \
  2258. openssl x509 -in ${_fd_der} -inform der -outform pem -out ${_fd_pem} )
  2259. ```
  2260. ###### Convert PEM to DER
  2261. ```bash
  2262. ( _fd_der="cert.crt" ; _fd_pem="cert.pem" ; \
  2263. openssl x509 -in ${_fd_pem} -outform der -out ${_fd_der} )
  2264. ```
  2265. ###### Verification of the private key
  2266. ```bash
  2267. ( _fd="private.key" ; \
  2268. openssl rsa -noout -text -in ${_fd} )
  2269. ```
  2270. ###### Verification of the public key
  2271. ```bash
  2272. # 1)
  2273. ( _fd="public.key" ; \
  2274. openssl pkey -noout -text -pubin -in ${_fd} )
  2275. # 2)
  2276. ( _fd="private.key" ; \
  2277. openssl rsa -inform PEM -noout -in ${_fd} &> /dev/null ; \
  2278. if [ $? = 0 ] ; then echo -en "OK\n" ; fi )
  2279. ```
  2280. ###### Verification of the certificate
  2281. ```bash
  2282. ( _fd="certificate.crt" ; # format: pem, cer, crt \
  2283. openssl x509 -noout -text -in ${_fd} )
  2284. ```
  2285. ###### Verification of the CSR
  2286. ```bash
  2287. ( _fd_csr="request.csr" ; \
  2288. openssl req -text -noout -in ${_fd_csr} )
  2289. ```
  2290. ###### Check the private key and the certificate are match
  2291. ```bash
  2292. (openssl rsa -noout -modulus -in private.key | openssl md5 ; \
  2293. openssl x509 -noout -modulus -in certificate.crt | openssl md5) | uniq
  2294. ```
  2295. ###### Check the private key and the CSR are match
  2296. ```bash
  2297. (openssl rsa -noout -modulus -in private.key | openssl md5 ; \
  2298. openssl req -noout -modulus -in request.csr | openssl md5) | uniq
  2299. ```
  2300. ___
  2301. ##### Tool: [secure-delete](https://wiki.archlinux.org/index.php/Securely_wipe_disk)
  2302. ###### Secure delete with shred
  2303. ```bash
  2304. shred -vfuz -n 10 file
  2305. shred --verbose --random-source=/dev/urandom -n 1 /dev/sda
  2306. ```
  2307. ###### Secure delete with scrub
  2308. ```bash
  2309. scrub -p dod /dev/sda
  2310. scrub -p dod -r file
  2311. ```
  2312. ###### Secure delete with badblocks
  2313. ```bash
  2314. badblocks -s -w -t random -v /dev/sda
  2315. badblocks -c 10240 -s -w -t random -v /dev/sda
  2316. ```
  2317. ###### Secure delete with secure-delete
  2318. ```bash
  2319. srm -vz /tmp/file
  2320. sfill -vz /local
  2321. sdmem -v
  2322. swapoff /dev/sda5 && sswap -vz /dev/sda5
  2323. ```
  2324. ___
  2325. ##### Tool: [dd](https://en.wikipedia.org/wiki/Dd_(Unix))
  2326. ###### Show dd status every so often
  2327. ```bash
  2328. dd <dd_params> status=progress
  2329. watch --interval 5 killall -USR1 dd
  2330. ```
  2331. ###### Redirect output to a file with dd
  2332. ```bash
  2333. echo "string" | dd of=filename
  2334. ```
  2335. ___
  2336. ##### Tool: [gpg](https://www.gnupg.org/)
  2337. ###### Export public key
  2338. ```bash
  2339. gpg --export --armor "<username>" > username.pkey
  2340. ```
  2341. * `--export` - export all keys from all keyrings or specific key
  2342. * `-a|--armor` - create ASCII armored output
  2343. ###### Encrypt file
  2344. ```bash
  2345. gpg -e -r "<username>" dump.sql
  2346. ```
  2347. * `-e|--encrypt` - encrypt data
  2348. * `-r|--recipient` - encrypt for specific <username>
  2349. ###### Decrypt file
  2350. ```bash
  2351. gpg -o dump.sql -d dump.sql.gpg
  2352. ```
  2353. * `-o|--output` - use as output file
  2354. * `-d|--decrypt` - decrypt data (default)
  2355. ###### Search recipient
  2356. ```bash
  2357. gpg --keyserver hkp://keyserver.ubuntu.com --search-keys "<username>"
  2358. ```
  2359. * `--keyserver` - set specific key server
  2360. * `--search-keys` - search for keys on a key server
  2361. ###### List all of the packets in an encrypted file
  2362. ```bash
  2363. gpg --batch --list-packets archive.gpg
  2364. gpg2 --batch --list-packets archive.gpg
  2365. ```
  2366. ___
  2367. ##### Tool: [system-other](https://github.com/trimstray/the-book-of-secret-knowledge#tool-system-other)
  2368. ###### Reboot system from init
  2369. ```bash
  2370. exec /sbin/init 6
  2371. ```
  2372. ###### Init system from single user mode
  2373. ```bash
  2374. exec /sbin/init
  2375. ```
  2376. ###### Show current working directory of a process
  2377. ```bash
  2378. readlink -f /proc/<PID>/cwd
  2379. ```
  2380. ###### Show actual pathname of the executed command
  2381. ```bash
  2382. readlink -f /proc/<PID>/exe
  2383. ```
  2384. ##### Tool: [curl](https://curl.haxx.se)
  2385. ```bash
  2386. curl -Iks https://www.google.com
  2387. ```
  2388. * `-I` - show response headers only
  2389. * `-k` - insecure connection when using ssl
  2390. * `-s` - silent mode (not display body)
  2391. ```bash
  2392. curl -Iks --location -X GET -A "x-agent" https://www.google.com
  2393. ```
  2394. * `--location` - follow redirects
  2395. * `-X` - set method
  2396. * `-A` - set user-agent
  2397. ```bash
  2398. curl -Iks --location -X GET -A "x-agent" --proxy http://127.0.0.1:16379 https://www.google.com
  2399. ```
  2400. * `--proxy [socks5://|http://]` - set proxy server
  2401. ```bash
  2402. curl -o file.pdf -C - https://example.com/Aiju2goo0Ja2.pdf
  2403. ```
  2404. * `-o` - write output to file
  2405. * `-C` - resume the transfer
  2406. ###### Find your external IP address (external services)
  2407. ```bash
  2408. curl ipinfo.io
  2409. curl ipinfo.io/ip
  2410. curl icanhazip.com
  2411. curl ifconfig.me/ip ; echo
  2412. ```
  2413. ###### Repeat URL request
  2414. ```bash
  2415. # URL sequence substitution with a dummy query string:
  2416. curl -ks https://example.com/?[1-20]
  2417. # With shell 'for' loop:
  2418. for i in {1..20} ; do curl -ks https://example.com/ ; done
  2419. ```
  2420. ###### Check DNS and HTTP trace with headers for specific domains
  2421. ```bash
  2422. ### Set domains and external dns servers.
  2423. _domain_list=(google.com) ; _dns_list=("8.8.8.8" "1.1.1.1")
  2424. for _domain in "${_domain_list[@]}" ; do
  2425. printf '=%.0s' {1..48}
  2426. echo
  2427. printf "[\\e[1;32m+\\e[m] resolve: %s\\n" "$_domain"
  2428. for _dns in "${_dns_list[@]}" ; do
  2429. # Resolve domain.
  2430. host "${_domain}" "${_dns}"
  2431. echo
  2432. done
  2433. for _proto in http https ; do
  2434. printf "[\\e[1;32m+\\e[m] trace + headers: %s://%s\\n" "$_proto" "$_domain"
  2435. # Get trace and http headers.
  2436. curl -Iks -A "x-agent" --location "${_proto}://${_domain}"
  2437. echo
  2438. done
  2439. done
  2440. unset _domain_list _dns_list
  2441. ```
  2442. ___
  2443. ##### Tool: [httpie](https://httpie.org/)
  2444. ```bash
  2445. http -p Hh https://www.google.com
  2446. ```
  2447. * `-p` - print request and response headers
  2448. * `H` - request headers
  2449. * `B` - request body
  2450. * `h` - response headers
  2451. * `b` - response body
  2452. ```bash
  2453. http -p Hh https://www.google.com --follow --verify no
  2454. ```
  2455. * `-F, --follow` - follow redirects
  2456. * `--verify no` - skip SSL verification
  2457. ```bash
  2458. http -p Hh https://www.google.com --follow --verify no \
  2459. --proxy http:http://127.0.0.1:16379
  2460. ```
  2461. * `--proxy [http:]` - set proxy server
  2462. ##### Tool: [ssh](https://www.openssh.com/)
  2463. ###### Escape Sequence
  2464. ```
  2465. # Supported escape sequences:
  2466. ~. - terminate connection (and any multiplexed sessions)
  2467. ~B - send a BREAK to the remote system
  2468. ~C - open a command line
  2469. ~R - Request rekey (SSH protocol 2 only)
  2470. ~^Z - suspend ssh
  2471. ~# - list forwarded connections
  2472. ~& - background ssh (when waiting for connections to terminate)
  2473. ~? - this message
  2474. ~~ - send the escape character by typing it twice
  2475. ```
  2476. ###### Compare a remote file with a local file
  2477. ```bash
  2478. ssh user@host cat /path/to/remotefile | diff /path/to/localfile -
  2479. ```
  2480. ###### SSH connection through host in the middle
  2481. ```bash
  2482. ssh -t reachable_host ssh unreachable_host
  2483. ```
  2484. ###### Run command over SSH on remote host
  2485. ```bash
  2486. cat > cmd.txt << __EOF__
  2487. cat /etc/hosts
  2488. __EOF__
  2489. ssh host -l user $(<cmd.txt)
  2490. ```
  2491. ###### Get public key from private key
  2492. ```bash
  2493. ssh-keygen -y -f ~/.ssh/id_rsa
  2494. ```
  2495. ###### Get all fingerprints
  2496. ```bash
  2497. ssh-keygen -l -f .ssh/known_hosts
  2498. ```
  2499. ###### SSH authentication with user password
  2500. ```bash
  2501. ssh -o PreferredAuthentications=password -o PubkeyAuthentication=no user@remote_host
  2502. ```
  2503. ###### SSH authentication with publickey
  2504. ```bash
  2505. ssh -o PreferredAuthentications=publickey -o PubkeyAuthentication=yes -i id_rsa user@remote_host
  2506. ```
  2507. ###### Simple recording SSH session
  2508. ```bash
  2509. function _ssh_sesslog() {
  2510. _sesdir="<path/to/session/logs>"
  2511. mkdir -p "${_sesdir}" && \
  2512. ssh $@ 2>&1 | tee -a "${_sesdir}/$(date +%Y%m%d).log"
  2513. }
  2514. # Alias:
  2515. alias ssh='_ssh_sesslog'
  2516. ```
  2517. ###### Using Keychain for SSH logins
  2518. ```bash
  2519. ### Delete all of ssh-agent's keys.
  2520. function _scl() {
  2521. /usr/bin/keychain --clear
  2522. }
  2523. ### Add key to keychain.
  2524. function _scg() {
  2525. /usr/bin/keychain /path/to/private-key
  2526. source "$HOME/.keychain/$HOSTNAME-sh"
  2527. }
  2528. ```
  2529. ###### SSH login without processing any login scripts
  2530. ```bash
  2531. ssh -tt user@host bash
  2532. ```
  2533. ###### SSH local port forwarding
  2534. Example 1:
  2535. ```bash
  2536. # Forwarding our local 2250 port to nmap.org:443 from localhost through localhost
  2537. host1> ssh -L 2250:nmap.org:443 localhost
  2538. # Connect to the service:
  2539. host1> curl -Iks --location -X GET https://localhost:2250
  2540. ```
  2541. Example 2:
  2542. ```bash
  2543. # Forwarding our local 9051 port to db.d.x:5432 from localhost through node.d.y
  2544. host1> ssh -nNT -L 9051:db.d.x:5432 node.d.y
  2545. # Connect to the service:
  2546. host1> psql -U db_user -d db_dev -p 9051 -h localhost
  2547. ```
  2548. * `-n` - redirects stdin from `/dev/null`
  2549. * `-N` - do not execute a remote command
  2550. * `-T` - disable pseudo-terminal allocation
  2551. ###### SSH remote port forwarding
  2552. ```bash
  2553. # Forwarding our local 9051 port to db.d.x:5432 from host2 through node.d.y
  2554. host1> ssh -nNT -R 9051:db.d.x:5432 node.d.y
  2555. # Connect to the service:
  2556. host2> psql -U postgres -d postgres -p 8000 -h localhost
  2557. ```
  2558. ___
  2559. ##### Tool: [linux-dev](https://www.tldp.org/LDP/abs/html/devref1.html)
  2560. ###### Testing remote connection to port
  2561. ```bash
  2562. timeout 1 bash -c "</dev/<proto>/<host>/<port>" >/dev/null 2>&1 ; echo $?
  2563. ```
  2564. * `<proto` - set protocol (tcp/udp)
  2565. * `<host>` - set remote host
  2566. * `<port>` - set destination port
  2567. ###### Read and write to TCP or UDP sockets with common bash tools
  2568. ```bash
  2569. exec 5<>/dev/tcp/<host>/<port>; cat <&5 & cat >&5; exec 5>&-
  2570. ```
  2571. ___
  2572. ##### Tool: [tcpdump](http://www.tcpdump.org/)
  2573. ###### Filter incoming (on interface) traffic (specific <ip:port>)
  2574. ```bash
  2575. tcpdump -ne -i eth0 -Q in host 192.168.252.1 and port 443
  2576. ```
  2577. * `-n` - don't convert addresses (`-nn` will not resolve hostnames or ports)
  2578. * `-e` - print the link-level headers
  2579. * `-i [iface|any]` - set interface
  2580. * `-Q|-D [in|out|inout]` - choose send/receive direction (`-D` - for old tcpdump versions)
  2581. * `host [ip|hostname]` - set host, also `[host not]`
  2582. * `[and|or]` - set logic
  2583. * `port [1-65535]` - set port number, also `[port not]`
  2584. ###### Filter incoming (on interface) traffic (specific <ip:port>) and write to a file
  2585. ```bash
  2586. tcpdump -ne -i eth0 -Q in host 192.168.252.1 and port 443 -c 5 -w tcpdump.pcap
  2587. ```
  2588. * `-c [num]` - capture only num number of packets
  2589. * `-w [filename]` - write packets to file, `-r [filename]` - reading from file
  2590. ###### Capture all ICMP packets
  2591. ```bash
  2592. tcpdump -nei eth0 icmp
  2593. ```
  2594. ###### Check protocol used (TCP or UDP) for service
  2595. ```bash
  2596. tcpdump -nei eth0 tcp port 22 -vv -X | egrep "TCP|UDP"
  2597. ```
  2598. ###### Display ASCII text (to parse the output using grep or other)
  2599. ```bash
  2600. tcpdump -i eth0 -A -s0 port 443
  2601. ```
  2602. ###### Grab everything between two keywords
  2603. ```bash
  2604. tcpdump -i eth0 port 80 -X | sed -n -e '/username/,/=ldap/ p'
  2605. ```
  2606. ###### Grab user and pass ever plain http
  2607. ```bash
  2608. tcpdump -i eth0 port http -l -A | egrep -i \
  2609. 'pass=|pwd=|log=|login=|user=|username=|pw=|passw=|passwd=|password=|pass:|user:|username:|password:|login:|pass |user ' \
  2610. --color=auto --line-buffered -B20
  2611. ```
  2612. ###### Extract HTTP User Agent from HTTP request header
  2613. ```bash
  2614. tcpdump -ei eth0 -nn -A -s1500 -l | grep "User-Agent:"
  2615. ```
  2616. ###### Capture only HTTP GET and POST packets
  2617. ```bash
  2618. tcpdump -ei eth0 -s 0 -A -vv \
  2619. 'tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x47455420' or 'tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x504f5354'
  2620. ```
  2621. or simply:
  2622. ```bash
  2623. tcpdump -ei eth0 -s 0 -v -n -l | egrep -i "POST /|GET /|Host:"
  2624. ```
  2625. ###### Rotate capture files
  2626. ```bash
  2627. tcpdump -ei eth0 -w /tmp/capture-%H.pcap -G 3600 -C 200
  2628. ```
  2629. * `-G <num>` - pcap will be created every `<num>` seconds
  2630. * `-C <size>` - close the current pcap and open a new one if is larger than `<size>`
  2631. ###### Top hosts by packets
  2632. ```bash
  2633. tcpdump -ei enp0s25 -nnn -t -c 200 | cut -f 1,2,3,4 -d '.' | sort | uniq -c | sort -nr | head -n 20
  2634. ```
  2635. ###### Excludes any RFC 1918 private address
  2636. ```bash
  2637. tcpdump -nei eth0 'not (src net (10 or 172.16/12 or 192.168/16) and dst net (10 or 172.16/12 or 192.168/16))'
  2638. ```
  2639. ___
  2640. ##### Tool: [tcpick](http://tcpick.sourceforge.net/)
  2641. ###### Analyse packets in real-time
  2642. ```bash
  2643. while true ; do tcpick -a -C -r dump.pcap ; sleep 2 ; clear ; done
  2644. ```
  2645. ___
  2646. ##### Tool: [ngrep](http://ngrep.sourceforge.net/usage.html)
  2647. ```bash
  2648. ngrep -d eth0 "www.domain.com" port 443
  2649. ```
  2650. * `-d [iface|any]` - set interface
  2651. * `[domain]` - set hostname
  2652. * `port [1-65535]` - set port number
  2653. ```bash
  2654. ngrep -d eth0 "www.domain.com" src host 10.240.20.2 and port 443
  2655. ```
  2656. * `(host [ip|hostname])` - filter by ip or hostname
  2657. * `(port [1-65535])` - filter by port number
  2658. ```bash
  2659. ngrep -d eth0 -qt -O ngrep.pcap "www.domain.com" port 443
  2660. ```
  2661. * `-q` - quiet mode (only payloads)
  2662. * `-t` - added timestamps
  2663. * `-O [filename]` - save output to file, `-I [filename]` - reading from file
  2664. ```bash
  2665. ngrep -d eth0 -qt 'HTTP' 'tcp'
  2666. ```
  2667. * `HTTP` - show http headers
  2668. * `tcp|udp` - set protocol
  2669. * `[src|dst] host [ip|hostname]` - set direction for specific node
  2670. ```bash
  2671. ngrep -l -q -d eth0 -i "User-Agent: curl*"
  2672. ```
  2673. * `-l` - stdout line buffered
  2674. * `-i` - case-insensitive search
  2675. ___
  2676. ##### Tool: [hping3](http://www.hping.org/)
  2677. ```bash
  2678. hping3 -V -p 80 -s 5050 <scan_type> www.google.com
  2679. ```
  2680. * `-V|--verbose` - verbose mode
  2681. * `-p|--destport` - set destination port
  2682. * `-s|--baseport` - set source port
  2683. * `<scan_type>` - set scan type
  2684. * `-F|--fin` - set FIN flag, port open if no reply
  2685. * `-S|--syn` - set SYN flag
  2686. * `-P|--push` - set PUSH flag
  2687. * `-A|--ack` - set ACK flag (use when ping is blocked, RST response back if the port is open)
  2688. * `-U|--urg` - set URG flag
  2689. * `-Y|--ymas` - set Y unused flag (0x80 - nullscan), port open if no reply
  2690. * `-M 0 -UPF` - set TCP sequence number and scan type (URG+PUSH+FIN), port open if no reply
  2691. ```bash
  2692. hping3 -V -c 1 -1 -C 8 www.google.com
  2693. ```
  2694. * `-c [num]` - packet count
  2695. * `-1` - set ICMP mode
  2696. * `-C|--icmptype [icmp-num]` - set icmp type (default icmp-echo = 8)
  2697. ```bash
  2698. hping3 -V -c 1000000 -d 120 -S -w 64 -p 80 --flood --rand-source <remote_host>
  2699. ```
  2700. * `--flood` - sent packets as fast as possible (don't show replies)
  2701. * `--rand-source` - random source address mode
  2702. * `-d --data` - data size
  2703. * `-w|--win` - winsize (default 64)
  2704. ___
  2705. ##### Tool: [nmap](https://nmap.org/)
  2706. ###### Ping scans the network
  2707. ```bash
  2708. nmap -sP 192.168.0.0/24
  2709. ```
  2710. ###### Show only open ports
  2711. ```bash
  2712. nmap -F --open 192.168.0.0/24
  2713. ```
  2714. ###### Full TCP port scan using with service version detection
  2715. ```bash
  2716. nmap -p 1-65535 -sV -sS -T4 192.168.0.0/24
  2717. ```
  2718. ###### Nmap scan and pass output to Nikto
  2719. ```bash
  2720. nmap -p80,443 192.168.0.0/24 -oG - | nikto.pl -h -
  2721. ```
  2722. ###### Recon specific ip:service with Nmap NSE scripts stack
  2723. ```bash
  2724. # Set variables:
  2725. _hosts="192.168.250.10"
  2726. _ports="80,443"
  2727. # Set Nmap NSE scripts stack:
  2728. _nmap_nse_scripts="+dns-brute,\
  2729. +http-auth-finder,\
  2730. +http-chrono,\
  2731. +http-cookie-flags,\
  2732. +http-cors,\
  2733. +http-cross-domain-policy,\
  2734. +http-csrf,\
  2735. +http-dombased-xss,\
  2736. +http-enum,\
  2737. +http-errors,\
  2738. +http-git,\
  2739. +http-grep,\
  2740. +http-internal-ip-disclosure,\
  2741. +http-jsonp-detection,\
  2742. +http-malware-host,\
  2743. +http-methods,\
  2744. +http-passwd,\
  2745. +http-phpself-xss,\
  2746. +http-php-version,\
  2747. +http-robots.txt,\
  2748. +http-sitemap-generator,\
  2749. +http-shellshock,\
  2750. +http-stored-xss,\
  2751. +http-title,\
  2752. +http-unsafe-output-escaping,\
  2753. +http-useragent-tester,\
  2754. +http-vhosts,\
  2755. +http-waf-detect,\
  2756. +http-waf-fingerprint,\
  2757. +http-xssed,\
  2758. +traceroute-geolocation.nse,\
  2759. +ssl-enum-ciphers,\
  2760. +whois-domain,\
  2761. +whois-ip"
  2762. # Set Nmap NSE script params:
  2763. _nmap_nse_scripts_args="dns-brute.domain=${_hosts},http-cross-domain-policy.domain-lookup=true,"
  2764. _nmap_nse_scripts_args+="http-waf-detect.aggro,http-waf-detect.detectBodyChanges,"
  2765. _nmap_nse_scripts_args+="http-waf-fingerprint.intensive=1"
  2766. # Perform scan:
  2767. nmap --script="$_nmap_nse_scripts" --script-args="$_nmap_nse_scripts_args" -p "$_ports" "$_hosts"
  2768. ```
  2769. ___
  2770. ##### Tool: [netcat](http://netcat.sourceforge.net/)
  2771. ```bash
  2772. nc -kl 5000
  2773. ```
  2774. * `-l` - listen for an incoming connection
  2775. * `-k` - listening after client has disconnected
  2776. * `>filename.out` - save receive data to file (optional)
  2777. ```bash
  2778. nc 192.168.0.1 5051 < filename.in
  2779. ```
  2780. * `< filename.in` - send data to remote host
  2781. ```bash
  2782. nc -vz 10.240.30.3 5000
  2783. ```
  2784. * `-v` - verbose output
  2785. * `-z` - scan for listening daemons
  2786. ```bash
  2787. nc -vzu 10.240.30.3 1-65535
  2788. ```
  2789. * `-u` - scan only udp ports
  2790. ###### Transfer data file (archive)
  2791. ```bash
  2792. server> nc -l 5000 | tar xzvfp -
  2793. client> tar czvfp - /path/to/dir | nc 10.240.30.3 5000
  2794. ```
  2795. ###### Launch remote shell
  2796. ```bash
  2797. # 1)
  2798. server> nc -l 5000 -e /bin/bash
  2799. client> nc 10.240.30.3 5000
  2800. # 2)
  2801. server> rm -f /tmp/f; mkfifo /tmp/f
  2802. server> cat /tmp/f | /bin/bash -i 2>&1 | nc -l 127.0.0.1 5000 > /tmp/f
  2803. client> nc 10.240.30.3 5000
  2804. ```
  2805. ###### Simple file server
  2806. ```bash
  2807. while true ; do nc -l 5000 | tar -xvf - ; done
  2808. ```
  2809. ###### Simple minimal HTTP Server
  2810. ```bash
  2811. while true ; do nc -l -p 1500 -c 'echo -e "HTTP/1.1 200 OK\n\n $(date)"' ; done
  2812. ```
  2813. ###### Simple HTTP Server
  2814. > Restarts web server after each request - remove `while` condition for only single connection.
  2815. ```bash
  2816. cat > index.html << __EOF__
  2817. <!doctype html>
  2818. <head>
  2819. <meta charset="utf-8">
  2820. <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
  2821. <title></title>
  2822. <meta name="description" content="">
  2823. <meta name="viewport" content="width=device-width, initial-scale=1">
  2824. </head>
  2825. <body>
  2826. <p>
  2827. Hello! It's a site.
  2828. </p>
  2829. </body>
  2830. </html>
  2831. __EOF__
  2832. ```
  2833. ```bash
  2834. server> while : ; do \
  2835. (echo -ne "HTTP/1.1 200 OK\r\nContent-Length: $(wc -c <index.html)\r\n\r\n" ; cat index.html;) | \
  2836. nc -l -p 5000 \
  2837. ; done
  2838. ```
  2839. * `-p` - port number
  2840. ###### Simple HTTP Proxy (single connection)
  2841. ```bash
  2842. #!/usr/bin/env bash
  2843. if [[ $# != 2 ]] ; then
  2844. printf "%s\\n" \
  2845. "usage: ./nc-proxy listen-port bk_host:bk_port"
  2846. fi
  2847. _listen_port="$1"
  2848. _bk_host=$(echo "$2" | cut -d ":" -f1)
  2849. _bk_port=$(echo "$2" | cut -d ":" -f2)
  2850. printf " lport: %s\\nbk_host: %s\\nbk_port: %s\\n\\n" \
  2851. "$_listen_port" "$_bk_host" "$_bk_port"
  2852. _tmp=$(mktemp -d)
  2853. _back="$_tmp/pipe.back"
  2854. _sent="$_tmp/pipe.sent"
  2855. _recv="$_tmp/pipe.recv"
  2856. trap 'rm -rf "$_tmp"' EXIT
  2857. mkfifo -m 0600 "$_back" "$_sent" "$_recv"
  2858. sed "s/^/=> /" <"$_sent" &
  2859. sed "s/^/<= /" <"$_recv" &
  2860. nc -l -p "$_listen_port" <"$_back" | \
  2861. tee "$_sent" | \
  2862. nc "$_bk_host" "$_bk_port" | \
  2863. tee "$_recv" >"$_back"
  2864. ```
  2865. ```bash
  2866. server> chmod +x nc-proxy && ./nc-proxy 8080 192.168.252.10:8000
  2867. lport: 8080
  2868. bk_host: 192.168.252.10
  2869. bk_port: 8000
  2870. client> http -p h 10.240.30.3:8080
  2871. HTTP/1.1 200 OK
  2872. Accept-Ranges: bytes
  2873. Cache-Control: max-age=31536000
  2874. Content-Length: 2748
  2875. Content-Type: text/html; charset=utf-8
  2876. Date: Sun, 01 Jul 2018 20:12:08 GMT
  2877. Last-Modified: Sun, 01 Apr 2018 21:53:37 GMT
  2878. ```
  2879. ###### Create a single-use TCP or UDP proxy
  2880. ```bash
  2881. ### TCP -> TCP
  2882. nc -l -p 2000 -c "nc [ip|hostname] 3000"
  2883. ### TCP -> UDP
  2884. nc -l -p 2000 -c "nc -u [ip|hostname] 3000"
  2885. ### UDP -> UDP
  2886. nc -l -u -p 2000 -c "nc -u [ip|hostname] 3000"
  2887. ### UDP -> TCP
  2888. nc -l -u -p 2000 -c "nc [ip|hostname] 3000"
  2889. ```
  2890. ___
  2891. ##### Tool: [gnutls-cli](https://gnutls.org/manual/html_node/gnutls_002dcli-Invocation.html)
  2892. ###### Testing connection to remote host (with SNI support)
  2893. ```bash
  2894. gnutls-cli -p 443 google.com
  2895. ```
  2896. ###### Testing connection to remote host (without SNI support)
  2897. ```bash
  2898. gnutls-cli --disable-sni -p 443 google.com
  2899. ```
  2900. ___
  2901. ##### Tool: [socat](http://www.dest-unreach.org/socat/doc/socat.html)
  2902. ###### Testing remote connection to port
  2903. ```bash
  2904. socat - TCP4:10.240.30.3:22
  2905. ```
  2906. * `-` - standard input (STDIO)
  2907. * `TCP4:<params>` - set tcp4 connection with specific params
  2908. * `[hostname|ip]` - set hostname/ip
  2909. * `[1-65535]` - set port number
  2910. ###### Redirecting TCP-traffic to a UNIX domain socket under Linux
  2911. ```bash
  2912. socat TCP-LISTEN:1234,bind=127.0.0.1,reuseaddr,fork,su=nobody,range=127.0.0.0/8 UNIX-CLIENT:/tmp/foo
  2913. ```
  2914. * `TCP-LISTEN:<params>` - set tcp listen with specific params
  2915. * `[1-65535]` - set port number
  2916. * `bind=[hostname|ip]` - set bind hostname/ip
  2917. * `reuseaddr` - allows other sockets to bind to an address
  2918. * `fork` - keeps the parent process attempting to produce more connections
  2919. * `su=nobody` - set user
  2920. * `range=[ip-range]` - ip range
  2921. * `UNIX-CLIENT:<params>` - communicates with the specified peer socket
  2922. * `filename` - define socket
  2923. ___
  2924. ##### Tool: [p0f](http://lcamtuf.coredump.cx/p0f3/)
  2925. ###### Set iface in promiscuous mode and dump traffic to the log file
  2926. ```bash
  2927. p0f -i enp0s25 -p -d -o /dump/enp0s25.log
  2928. ```
  2929. * `-i` - listen on the specified interface
  2930. * `-p` - set interface in promiscuous mode
  2931. * `-d` - fork into background
  2932. * `-o` - output file
  2933. ___
  2934. ##### Tool: [netstat](https://en.wikipedia.org/wiki/Netstat)
  2935. ###### Graph # of connections for each hosts
  2936. ```bash
  2937. netstat -an | awk '/ESTABLISHED/ { split($5,ip,":"); if (ip[1] !~ /^$/) print ip[1] }' | \
  2938. sort | uniq -c | awk '{ printf("%s\t%s\t",$2,$1) ; for (i = 0; i < $1; i++) {printf("*")}; print "" }'
  2939. ```
  2940. ###### Monitor open connections for specific port including listen, count and sort it per IP
  2941. ```bash
  2942. watch "netstat -plan | grep :443 | awk {'print \$5'} | cut -d: -f 1 | sort | uniq -c | sort -nk 1"
  2943. ```
  2944. ###### Grab banners from local IPv4 listening ports
  2945. ```bash
  2946. netstat -nlt | grep 'tcp ' | grep -Eo "[1-9][0-9]*" | xargs -I {} sh -c "echo "" | nc -v -n -w1 127.0.0.1 {}"
  2947. ```
  2948. ___
  2949. ##### Tool: [rsync](https://en.wikipedia.org/wiki/Rsync)
  2950. ###### Rsync remote data as root using sudo
  2951. ```bash
  2952. rsync --rsync-path 'sudo rsync' username@hostname:/path/to/dir/ /local/
  2953. ```
  2954. ___
  2955. ##### Tool: [host](https://en.wikipedia.org/wiki/Host_(Unix))
  2956. ###### Resolves the domain name (using external dns server)
  2957. ```bash
  2958. host google.com 9.9.9.9
  2959. ```
  2960. ###### Checks the domain administrator (SOA record)
  2961. ```bash
  2962. host -t soa google.com 9.9.9.9
  2963. ```
  2964. ___
  2965. ##### Tool: [dig](https://en.wikipedia.org/wiki/Dig_(command))
  2966. ###### Resolves the domain name (short output)
  2967. ```bash
  2968. dig google.com +short
  2969. ```
  2970. ###### Lookup NS record for specific domain
  2971. ```bash
  2972. dig @9.9.9.9 google.com NS
  2973. ```
  2974. ###### Query only answer section
  2975. ```bash
  2976. dig google.com +nocomments +noquestion +noauthority +noadditional +nostats
  2977. ```
  2978. ###### Query ALL DNS Records
  2979. ```bash
  2980. dig google.com ANY +noall +answer
  2981. ```
  2982. ###### DNS Reverse Look-up
  2983. ```bash
  2984. dig -x 172.217.16.14 +short
  2985. ```
  2986. ___
  2987. ##### Tool: [certbot](https://certbot.eff.org/)
  2988. ###### Generate multidomain certificate
  2989. ```bash
  2990. certbot certonly -d example.com -d www.example.com
  2991. ```
  2992. ###### Generate wildcard certificate
  2993. ```bash
  2994. certbot certonly --manual --preferred-challenges=dns -d example.com -d *.example.com
  2995. ```
  2996. ###### Generate certificate with 4096 bit private key
  2997. ```bash
  2998. certbot certonly -d example.com -d www.example.com --rsa-key-size 4096
  2999. ```
  3000. ___
  3001. ##### Tool: [network-other](https://github.com/trimstray/the-book-of-secret-knowledge#tool-network-other)
  3002. ###### Get all subnets for specific AS (Autonomous system)
  3003. ```bash
  3004. AS="AS32934"
  3005. whois -h whois.radb.net -- "-i origin ${AS}" | \
  3006. grep "^route:" | \
  3007. cut -d ":" -f2 | \
  3008. sed -e 's/^[ \t]//' | \
  3009. sort -n -t . -k 1,1 -k 2,2 -k 3,3 -k 4,4 | \
  3010. cut -d ":" -f2 | \
  3011. sed -e 's/^[ \t]/allow /' | \
  3012. sed 's/$/;/' | \
  3013. sed 's/allow */subnet -> /g'
  3014. ```
  3015. ###### Resolves domain name from dns.google.com with curl and jq
  3016. ```bash
  3017. _dname="google.com" ; curl -s "https://dns.google.com/resolve?name=${_dname}&type=A" | jq .
  3018. ```
  3019. ##### Tool: [git](https://git-scm.com/)
  3020. ###### Log alias for a decent view of your repo
  3021. ```bash
  3022. # 1)
  3023. git log --oneline --decorate --graph --all
  3024. # 2)
  3025. git log --graph \
  3026. --pretty=format:'%Cred%h%Creset -%C(yellow)%d%Creset %s %Cgreen(%cr) %C(bold blue)<%an>%Creset' \
  3027. --abbrev-commit
  3028. ```
  3029. ___
  3030. ##### Tool: [python](https://www.python.org/)
  3031. ###### Static HTTP web server
  3032. ```bash
  3033. # Python 3.x
  3034. python3 -m http.server 8000 --bind 127.0.0.1
  3035. # Python 2.x
  3036. python -m SimpleHTTPServer 8000
  3037. ```
  3038. ###### Static HTTP web server with SSL support
  3039. ```bash
  3040. # Python 3.x
  3041. from http.server import HTTPServer, BaseHTTPRequestHandler
  3042. import ssl
  3043. httpd = HTTPServer(('localhost', 4443), BaseHTTPRequestHandler)
  3044. httpd.socket = ssl.wrap_socket (httpd.socket,
  3045. keyfile="path/to/key.pem",
  3046. certfile='path/to/cert.pem', server_side=True)
  3047. httpd.serve_forever()
  3048. # Python 2.x
  3049. import BaseHTTPServer, SimpleHTTPServer
  3050. import ssl
  3051. httpd = BaseHTTPServer.HTTPServer(('localhost', 4443),
  3052. SimpleHTTPServer.SimpleHTTPRequestHandler)
  3053. httpd.socket = ssl.wrap_socket (httpd.socket,
  3054. keyfile="path/tp/key.pem",
  3055. certfile='path/to/cert.pem', server_side=True)
  3056. httpd.serve_forever()
  3057. ```
  3058. ###### Encode base64
  3059. ```bash
  3060. python -m base64 -e <<< "sample string"
  3061. ```
  3062. ###### Decode base64
  3063. ```bash
  3064. python -m base64 -d <<< "dGhpcyBpcyBlbmNvZGVkCg=="
  3065. ```
  3066. ##### Tool: [awk](http://www.grymoire.com/Unix/Awk.html)
  3067. ###### Search for matching lines
  3068. ```bash
  3069. # egrep foo
  3070. awk '/foo/' filename
  3071. ```
  3072. ###### Search non matching lines
  3073. ```bash
  3074. # egrep -v foo
  3075. awk '!/foo/' filename
  3076. ```
  3077. ###### Print matching lines with numbers
  3078. ```bash
  3079. # egrep -n foo
  3080. awk '/foo/{print FNR,$0}' filename
  3081. ```
  3082. ###### Print the last column
  3083. ```bash
  3084. awk '{print $NF}' filename
  3085. ```
  3086. ###### Find all the lines longer than 80 characters
  3087. ```bash
  3088. awk 'length($0)>80{print FNR,$0}' filename
  3089. ```
  3090. ###### Print only lines of less than 80 characters
  3091. ```bash
  3092. awk 'length < 80' filename
  3093. ```
  3094. ###### Print double new lines a file
  3095. ```bash
  3096. awk '1; { print "" }' filename
  3097. ```
  3098. ###### Print line numbers
  3099. ```bash
  3100. awk '{ print FNR "\t" $0 }' filename
  3101. awk '{ printf("%5d : %s\n", NR, $0) }' filename # in a fancy manner
  3102. ```
  3103. ###### Print line numbers for only non-blank lines
  3104. ```bash
  3105. awk 'NF { $0=++a " :" $0 }; { print }' filename
  3106. ```
  3107. ###### Print the line and the next two (i=5) lines after the line matching regexp
  3108. ```bash
  3109. awk '/foo/{i=5+1;}{if(i){i--; print;}}' filename
  3110. ```
  3111. ###### Print the lines starting at the line matching 'server {' until the line matching '}'
  3112. ```bash
  3113. awk '/server {/,/}/' filename
  3114. ```
  3115. ###### Print multiple columns with separators
  3116. ```bash
  3117. awk -F' ' '{print "ip:\t" $2 "\n port:\t" $3' filename
  3118. ```
  3119. ###### Remove empty lines
  3120. ```bash
  3121. awk 'NF > 0' filename
  3122. # alternative:
  3123. awk NF filename
  3124. ```
  3125. ###### Delete trailing white space (spaces, tabs)
  3126. ```bash
  3127. awk '{sub(/[ \t]*$/, "");print}' filename
  3128. ```
  3129. ###### Delete leading white space
  3130. ```bash
  3131. awk '{sub(/^[ \t]+/, ""); print}' filename
  3132. ```
  3133. ###### Remove duplicate consecutive lines
  3134. ```bash
  3135. # uniq
  3136. awk 'a !~ $0{print}; {a=$0}' filename
  3137. ```
  3138. ###### Remove duplicate entries in a file without sorting
  3139. ```bash
  3140. awk '!x[$0]++' filename
  3141. ```
  3142. ###### Exclude multiple columns
  3143. ```bash
  3144. awk '{$1=$3=""}1' filename
  3145. ```
  3146. ###### Substitute foo for bar on lines matching regexp
  3147. ```bash
  3148. awk '/regexp/{gsub(/foo/, "bar")};{print}' filename
  3149. ```
  3150. ###### Add some characters at the beginning of matching lines
  3151. ```bash
  3152. awk '/regexp/{sub(/^/, "++++"); print;next;}{print}' filename
  3153. ```
  3154. ###### Get the last hour of Apache logs
  3155. ```bash
  3156. awk '/'$(date -d "1 hours ago" "+%d\\/%b\\/%Y:%H:%M")'/,/'$(date "+%d\\/%b\\/%Y:%H:%M")'/ { print $0 }' \
  3157. /var/log/httpd/access_log
  3158. ```
  3159. ___
  3160. ##### Tool: [sed](http://www.grymoire.com/Unix/Sed.html)
  3161. ###### Print a specific line from a file
  3162. ```bash
  3163. sed -n 10p /path/to/file
  3164. ```
  3165. ###### Remove a specific line from a file
  3166. ```bash
  3167. sed -i 10d /path/to/file
  3168. # alternative (BSD): sed -i'' 10d /path/to/file
  3169. ```
  3170. ###### Remove a range of lines from a file
  3171. ```bash
  3172. sed -i <file> -re '<start>,<end>d'
  3173. ```
  3174. ###### Replace newline(s) with a space
  3175. ```bash
  3176. sed ':a;N;$!ba;s/\n/ /g' /path/to/file
  3177. # cross-platform compatible syntax:
  3178. sed -e ':a' -e 'N' -e '$!ba' -e 's/\n/ /g' /path/to/file
  3179. ```
  3180. - `:a` create a label `a`
  3181. - `N` append the next line to the pattern space
  3182. - `$!` if not the last line, ba branch (go to) label `a`
  3183. - `s` substitute, `/\n/` regex for new line, `/ /` by a space, `/g` global match (as many times as it can)
  3184. Alternatives:
  3185. ```bash
  3186. # perl version (sed-like speed):
  3187. perl -p -e 's/\n/ /' /path/to/file
  3188. # bash version (slow):
  3189. while read line ; do printf "%s" "$line " ; done < file
  3190. ```
  3191. ###### Delete string +N next lines
  3192. ```bash
  3193. sed '/start/,+4d' /path/to/file
  3194. ```
  3195. ___
  3196. ##### Tool: [grep](http://www.grymoire.com/Unix/Grep.html)
  3197. ###### Search for a "pattern" inside all files in the current directory
  3198. ```bash
  3199. grep -rn "pattern"
  3200. grep -RnisI "pattern" *
  3201. fgrep "pattern" * -R
  3202. ```
  3203. ###### Show only for multiple patterns
  3204. ```bash
  3205. grep 'INFO*'\''WARN' filename
  3206. grep 'INFO\|WARN' filename
  3207. grep -e INFO -e WARN filename
  3208. grep -E '(INFO|WARN)' filename
  3209. egrep "INFO|WARN" filename
  3210. ```
  3211. ###### Except multiple patterns
  3212. ```bash
  3213. grep -vE '(error|critical|warning)' filename
  3214. ```
  3215. ###### Show data from file without comments
  3216. ```bash
  3217. grep -v ^[[:space:]]*# filename
  3218. ```
  3219. ###### Show data from file without comments and new lines
  3220. ```bash
  3221. egrep -v '#|^$' filename
  3222. ```
  3223. ###### Show strings with a dash/hyphen
  3224. ```bash
  3225. grep -e -- filename
  3226. grep -- -- filename
  3227. grep "\-\-" filename
  3228. ```
  3229. ###### Remove blank lines from a file and save output to new file
  3230. ```bash
  3231. grep . filename > newfilename
  3232. ```
  3233. ##### Tool: [perl](https://www.perl.org/)
  3234. ###### Search and replace (in place)
  3235. ```bash
  3236. perl -i -pe's/SEARCH/REPLACE/' filename
  3237. ```
  3238. ###### Edit of `*.conf` files changing all foo to bar (and backup original)
  3239. ```bash
  3240. perl -p -i.orig -e 's/\bfoo\b/bar/g' *.conf
  3241. ```
  3242. ###### Prints the first 20 lines from `*.conf` files
  3243. ```bash
  3244. perl -pe 'exit if $. > 20' *.conf
  3245. ```
  3246. ###### Search lines 10 to 20
  3247. ```bash
  3248. perl -ne 'print if 10 .. 20' filename
  3249. ```
  3250. ###### Delete first 10 lines (and backup original)
  3251. ```bash
  3252. perl -i.orig -ne 'print unless 1 .. 10' filename
  3253. ```
  3254. ###### Delete all but lines between foo and bar (and backup original)
  3255. ```bash
  3256. perl -i.orig -ne 'print unless /^foo$/ .. /^bar$/' filename
  3257. ```
  3258. ###### Reduce multiple blank lines to a single line
  3259. ```bash
  3260. perl -p -i -00pe0 filename
  3261. ```
  3262. ###### Convert tabs to spaces (1t = 2sp)
  3263. ```bash
  3264. perl -p -i -e 's/\t/ /g' filename
  3265. ```
  3266. ###### Read input from a file and report number of lines and characters
  3267. ```bash
  3268. perl -lne '$i++; $in += length($_); END { print "$i lines, $in characters"; }' filename
  3269. ```
  3270. #### Shell functions &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  3271. ##### Table of Contents
  3272. - [Domain resolve](#domain-resolve)
  3273. - [Get ASN](#get-asn)
  3274. ###### Domain resolve
  3275. ```bash
  3276. # Dependencies:
  3277. # - curl
  3278. # - jq
  3279. function DomainResolve() {
  3280. local _host="$1"
  3281. local _curl_base="curl --request GET"
  3282. local _timeout="15"
  3283. _host_ip=$($_curl_base -ks -m "$_timeout" "https://dns.google.com/resolve?name=${_host}&type=A" | \
  3284. jq '.Answer[0].data' | tr -d "\"" 2>/dev/null)
  3285. if [[ -z "$_host_ip" ]] || [[ "$_host_ip" == "null" ]] ; then
  3286. echo -en "Unsuccessful domain name resolution.\\n"
  3287. else
  3288. echo -en "$_host > $_host_ip\\n"
  3289. fi
  3290. }
  3291. ```
  3292. Example:
  3293. ```bash
  3294. shell> DomainResolve nmap.org
  3295. nmap.org > 45.33.49.119
  3296. shell> DomainResolve nmap.org
  3297. Unsuccessful domain name resolution.
  3298. ```
  3299. ###### Get ASN
  3300. ```bash
  3301. # Dependencies:
  3302. # - curl
  3303. function GetASN() {
  3304. local _ip="$1"
  3305. local _curl_base="curl --request GET"
  3306. local _timeout="15"
  3307. _asn=$($_curl_base -ks -m "$_timeout" "http://ip-api.com/line/${_ip}?fields=as")
  3308. _state=$(echo $?)
  3309. if [[ -z "$_ip" ]] || [[ "$_ip" == "null" ]] || [[ "$_state" -ne 0 ]]; then
  3310. echo -en "Unsuccessful ASN gathering.\\n"
  3311. else
  3312. echo -en "$_ip > $_asn\\n"
  3313. fi
  3314. }
  3315. ```
  3316. Example:
  3317. ```bash
  3318. shell> GetASN 1.1.1.1
  3319. 1.1.1.1 > AS13335 Cloudflare, Inc.
  3320. shell> GetASN 0.0.0.0
  3321. Unsuccessful ASN gathering.
  3322. ```
  3323. If you find something which doesn't make sense, or something doesn't seem right, please make a pull request and please add valid and well-reasoned explanations about your changes or comments.
  3324. A few simple rules for this project:
  3325. - inviting and clear
  3326. - not tiring
  3327. - useful
  3328. These below rules may be better:
  3329. - easy to contribute to (Markdown + HTML ...)
  3330. - easy to find (simple TOC, maybe it's worth extending them?)
  3331. Url marked **\*** is temporary unavailable. Please don't delete it without confirming that it has permanently expired.
  3332. Before adding a pull request, please see the **[contributing guidelines](.github/CONTRIBUTING.md)**. You should also remember about this:
  3333. ```diff
  3334. + This repository is not meant to contain everything but only good quality stuff.
  3335. ```
  3336. All **suggestions/PR** are welcome!
  3337. ### Code Contributors
  3338. This project exists thanks to all the people who contribute.
  3339. <a href="https://github.com/trimstray/the-book-of-secret-knowledge/graphs/contributors"><img src="https://opencollective.com/the-book-of-secret-knowledge/contributors.svg?width=890&button=false"></a>
  3340. ### Financial Contributors
  3341. <p align="left">
  3342. <a href="https://opencollective.com/the-book-of-secret-knowledge" alt="Financial Contributors on Open Collective">
  3343. <img src="https://img.shields.io/opencollective/backers/the-book-of-secret-knowledge?style=for-the-badge&color=FF4500&labelColor=A9A9A9"></a>
  3344. </a>
  3345. <a href="https://opencollective.com/the-book-of-secret-knowledge" alt="Financial Contributors on Open Collective">
  3346. <img src="https://img.shields.io/opencollective/sponsors/the-book-of-secret-knowledge?style=for-the-badge&color=FF4500&labelColor=A9A9A9"></a>
  3347. </a>
  3348. </p>
  3349. ## :newspaper: &nbsp;RSS Feed & Updates
  3350. GitHub exposes an [RSS/Atom](https://github.com/trimstray/the-book-of-secret-knowledge/commits.atom) feed of the commits, which may also be useful if you want to be kept informed about all changes.
  3351. ## :ballot_box_with_check: &nbsp;ToDo
  3352. - [ ] Add new stuff...
  3353. - [ ] Add useful shell functions
  3354. - [ ] Add one-liners for collection tools (eg. CLI Tools)
  3355. - [ ] Sort order in lists
  3356. New items are also added on a regular basis.
  3357. ## :anger: &nbsp;Table of Contents
  3358. Only main chapters:
  3359. - **[CLI Tools](#cli-tools-toc)**
  3360. - **[GUI Tools](#gui-tools-toc)**
  3361. - **[Web Tools](#web-tools-toc)**
  3362. - **[Systems/Services](#systemsservices-toc)**
  3363. - **[Networks](#networks-toc)**
  3364. - **[Containers/Orchestration](#containersorchestration-toc)**
  3365. - **[Manuals/Howtos/Tutorials](#manualshowtostutorials-toc)**
  3366. - **[Inspiring Lists](#inspiring-lists-toc)**
  3367. - **[Blogs/Podcasts/Videos](#blogspodcastsvideos-toc)**
  3368. - **[Hacking/Penetration Testing](#hackingpenetration-testing-toc)**
  3369. - **[Your daily knowledge and news](#your-daily-knowledge-and-news-toc)**
  3370. - **[Other Cheat Sheets](#other-cheat-sheets-toc)**
  3371. - **[One-liners](#one-liners-toc)**
  3372. - **[Shell functions](#shell-functions-toc)**
  3373. ## :trident: &nbsp;The Book of Secret Knowledge (Chapters)
  3374. #### CLI Tools &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  3375. ##### :black_small_square: Shells
  3376. <p>
  3377. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.gnu.org/software/bash/"><b>GNU Bash</b></a> - is an sh-compatible shell that incorporates useful features from the Korn shell and C shell.<br>
  3378. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.zsh.org/"><b>Zsh</b></a> - is a shell designed for interactive use, although it is also a powerful scripting language.<br>
  3379. &nbsp;&nbsp;:small_orange_diamond: <a href="https://tcl-lang.org/"><b>tclsh</b></a> - is a very powerful cross-platform shell, suitable for a huge range of uses.<br>
  3380. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Bash-it/bash-it"><b>bash-it</b></a> - is a framework for using, developing and maintaining shell scripts and custom commands.<br>
  3381. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ohmyz.sh/"><b>Oh My ZSH!</b></a> - is the best framework for managing your Zsh configuration.<br>
  3382. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/oh-my-fish/oh-my-fish"><b>Oh My Fish</b></a> - the Fishshell framework.<br>
  3383. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/starship/starship"><b>Starship</b></a> - the cross-shell prompt written in Rust.<br>
  3384. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/romkatv/powerlevel10k"><b>powerlevel10k</b></a> - is a fast reimplementation of Powerlevel9k ZSH theme.<br>
  3385. </p>
  3386. ##### :black_small_square: Shell plugins
  3387. <p>
  3388. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rupa/z"><b>z</b></a> - tracks the folder you use the most and allow you to jump, without having to type the whole path.<br>
  3389. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/junegunn/fzf"><b>fzf</b></a> - is a general-purpose command-line fuzzy finder.<br>
  3390. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/zsh-users/zsh-autosuggestions"><b>zsh-autosuggestions</b></a> - Fish-like autosuggestions for Zsh.<br>
  3391. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/zsh-users/zsh-syntax-highlighting"><b>zsh-syntax-highlighting</b></a> - Fish shell like syntax highlighting for Zsh.<br>
  3392. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/unixorn/awesome-zsh-plugins"><b>Awesome ZSH Plugins</b></a> - A list of frameworks, plugins, themes and tutorials for ZSH.<br>
  3393. </p>
  3394. ##### :black_small_square: Managers
  3395. <p>
  3396. &nbsp;&nbsp;:small_orange_diamond: <a href="https://midnight-commander.org/"><b>Midnight Commander</b></a> - is a visual file manager, licensed under GNU General Public License.<br>
  3397. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/ranger/ranger"><b>ranger</b></a> - is a VIM-inspired filemanager for the console.<br>
  3398. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jarun/nnn"><b>nnn</b></a> - is a tiny, lightning fast, feature-packed file manager.<br>
  3399. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.gnu.org/software/screen/"><b>screen</b></a> - is a full-screen window manager that multiplexes a physical terminal.<br>
  3400. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/tmux/tmux/wiki"><b>tmux</b></a> - is a terminal multiplexer, lets you switch easily between several programs in one terminal.<br>
  3401. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/peikk0/tmux-cssh"><b>tmux-cssh</b></a> - is a tool to set comfortable and easy to use functionality, clustering and synchronizing tmux-sessions.<br>
  3402. </p>
  3403. ##### :black_small_square: Text editors
  3404. <p>
  3405. &nbsp;&nbsp;:small_orange_diamond: <a href="http://ex-vi.sourceforge.net/"><b>vi</b></a> - is one of the most common text editors on Unix.<br>
  3406. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.vim.org/"><b>vim</b></a> - is a highly configurable text editor.<br>
  3407. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.gnu.org/software/emacs/"><b>emacs</b></a> - is an extensible, customizable, free/libre text editor, and more.<br>
  3408. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/zyedidia/micro"><b>micro</b></a> - is a modern and intuitive terminal-based text editor.<br>
  3409. &nbsp;&nbsp;:small_orange_diamond: <a href="https://neovim.io/"><b>neovim</b></a> - is a free open source, powerful, extensible and usable code editor.<br>
  3410. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.spacemacs.org/"><b>spacemacs</b></a> - a community-driven Emacs distribution.<br>
  3411. &nbsp;&nbsp;:small_orange_diamond: <a href="https://spacevim.org/"><b>spacevim</b></a> - a community-driven vim distribution.<br>
  3412. </p>
  3413. ##### :black_small_square: Files and directories
  3414. <p>
  3415. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/sharkdp/fd"><b>fd</b></a> - is a simple, fast and user-friendly alternative to find.<br>
  3416. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dev.yorhel.nl/ncdu"><b>ncdu</b></a> - is an easy to use, fast disk usage analyzer.<br>
  3417. </p>
  3418. ##### :black_small_square: Network
  3419. <p>
  3420. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.putty.org/"><b>PuTTY</b></a> - is an SSH and telnet client, developed originally by Simon Tatham.<br>
  3421. &nbsp;&nbsp;:small_orange_diamond: <a href="https://mosh.org/"><b>Mosh</b></a> - is a SSH wrapper designed to keep a SSH session alive over a volatile connection.<br>
  3422. &nbsp;&nbsp;:small_orange_diamond: <a href="https://eternalterminal.dev/"><b>Eternal Terminal</b></a> - enables mouse-scrolling and tmux commands inside the SSH session.<br>
  3423. &nbsp;&nbsp;:small_orange_diamond: <a href="https://nmap.org/"><b>nmap</b></a> - is a free and open source (license) utility for network discovery and security auditing.<br>
  3424. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/zmap/zmap"><b>zmap</b></a> - is a fast single packet network scanner designed for Internet-wide network surveys.<br>
  3425. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/RustScan/RustScan"><b>Rust Scan</b></a> - to find all open ports faster than Nmap.<br>
  3426. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/robertdavidgraham/masscan"><b>masscan</b></a> - is the fastest Internet port scanner, spews SYN packets asynchronously.<br>
  3427. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/gvb84/pbscan"><b>pbscan</b></a> - is a faster and more efficient stateless SYN scanner and banner grabber.<br>
  3428. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.hping.org/"><b>hping</b></a> - is a command-line oriented TCP/IP packet assembler/analyzer.<br>
  3429. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/traviscross/mtr"><b>mtr</b></a> - is a tool that combines the functionality of the 'traceroute' and 'ping' programs in a single tool.<br>
  3430. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mehrdadrad/mylg"><b>mylg</b></a> - utility which combines the functions of the different network probes in one diagnostic tool.<br>
  3431. &nbsp;&nbsp;:small_orange_diamond: <a href="http://netcat.sourceforge.net/"><b>netcat</b></a> - utility which reads and writes data across network connections, using the TCP/IP protocol.<br>
  3432. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.dest-unreach.org/socat/"><b>socat</b></a> - utility which transfers data between two objects.<br>
  3433. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.tcpdump.org/"><b>tcpdump</b></a> - is a powerful command-line packet analyzer.<br>
  3434. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.wireshark.org/docs/man-pages/tshark.html"><b>tshark</b></a> - is a tool that allows us to dump and analyze network traffic (wireshark cli).<br>
  3435. &nbsp;&nbsp;:small_orange_diamond: <a href="https://termshark.io/"><b>Termshark</b></a> - is a simple terminal user-interface for tshark.<br>
  3436. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jpr5/ngrep"><b>ngrep</b></a> - is like GNU grep applied to the network layer.<br>
  3437. &nbsp;&nbsp;:small_orange_diamond: <a href="http://netsniff-ng.org/"><b>netsniff-ng</b></a> - is a Swiss army knife for your daily Linux network plumbing if you will.<br>
  3438. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mechpen/sockdump"><b>sockdump</b></a> - dump unix domain socket traffic.<br>
  3439. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/google/stenographer"><b>stenographer</b></a> - is a packet capture solution which aims to quickly spool all packets to disk.<br>
  3440. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/sachaos/tcpterm"><b>tcpterm</b></a> - visualize packets in TUI.<br>
  3441. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/tgraf/bmon"><b>bmon</b></a> - is a monitoring and debugging tool to capture networking related statistics and prepare them visually.<br>
  3442. &nbsp;&nbsp;:small_orange_diamond: <a href="http://iptraf.seul.org/2.6/manual.html#installation"><b>iptraf-ng</b></a> - is a console-based network monitoring program for Linux that displays information about IP traffic.<br>
  3443. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/vergoh/vnstat"><b>vnstat</b></a> - is a network traffic monitor for Linux and BSD.<br>
  3444. &nbsp;&nbsp;:small_orange_diamond: <a href="https://iperf.fr/"><b>iPerf3</b></a> - is a tool for active measurements of the maximum achievable bandwidth on IP networks.<br>
  3445. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Microsoft/Ethr"><b>ethr</b></a> - is a Network Performance Measurement Tool for TCP, UDP & HTTP.<br>
  3446. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jwbensley/Etherate"><b>Etherate</b></a> - is a Linux CLI based Ethernet and MPLS traffic testing tool.<br>
  3447. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mpolden/echoip"><b>echoip</b></a> - is a IP address lookup service.<br>
  3448. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/troglobit/nemesis"><b>Nemesis</b></a> - packet manipulation CLI tool; craft and inject packets of several protocols.<br>
  3449. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/packetfu/packetfu"><b>packetfu</b></a> - a mid-level packet manipulation library for Ruby.<br>
  3450. &nbsp;&nbsp;:small_orange_diamond: <a href="https://scapy.net/"><b>Scapy</b></a> - packet manipulation library; forge, send, decode, capture packets of a wide number of protocols.<br>
  3451. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/SecureAuthCorp/impacket"><b>impacket</b></a> - is a collection of Python classes for working with network protocols.<br>
  3452. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/arthepsy/ssh-audit"><b>ssh-audit</b></a> - is a tool for SSH server auditing.<br>
  3453. &nbsp;&nbsp;:small_orange_diamond: <a href="https://aria2.github.io/"><b>aria2</b></a> - is a lightweight multi-protocol & multi-source command-line download utility.<br>
  3454. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/x-way/iptables-tracer"><b>iptables-tracer</b></a> - observe the path of packets through the iptables chains.<br>
  3455. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/proabiral/inception"><b>inception</b></a> - a highly configurable tool to check for whatever you like against any number of hosts.<br>
  3456. </p>
  3457. ##### :black_small_square: Network (DNS)
  3458. <p>
  3459. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/farrokhi/dnsdiag"><b>dnsdiag</b></a> - is a DNS diagnostics and performance measurement tools.<br>
  3460. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mschwager/fierce"><b>fierce</b></a> - is a DNS reconnaissance tool for locating non-contiguous IP space.<br>
  3461. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/subfinder/subfinder"><b>subfinder</b></a> - is a subdomain discovery tool that discovers valid subdomains for websites.<br>
  3462. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/aboul3la/Sublist3r"><b>sublist3r</b></a> - is a fast subdomains enumeration tool for penetration testers.<br>
  3463. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/OWASP/Amass"><b>amass</b></a> - is tool that obtains subdomain names by scraping data sources, crawling web archives, and more.<br>
  3464. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/google/namebench"><b>namebench</b></a> - provides personalized DNS server recommendations based on your browsing history.<br>
  3465. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/blechschmidt/massdns"><b>massdns</b></a> - is a high-performance DNS stub resolver for bulk lookups and reconnaissance.<br>
  3466. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/guelfoweb/knock"><b>knock</b></a> - is a tool to enumerate subdomains on a target domain through a wordlist.<br>
  3467. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/DNS-OARC/dnsperf"><b>dnsperf</b></a> - DNS performance testing tools.<br>
  3468. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jedisct1/dnscrypt-proxy"><b>dnscrypt-proxy 2</b></a> - a flexible DNS proxy, with support for encrypted DNS protocols.<br>
  3469. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dnsdb/dnsdbq"><b>dnsdbq</b></a> - API client providing access to passive DNS database systems.<br>
  3470. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/looterz/grimd"><b>grimd</b></a> - fast dns proxy, built to black-hole internet advertisements and malware servers.<br>
  3471. </p>
  3472. ##### :black_small_square: Network (HTTP)
  3473. <p>
  3474. &nbsp;&nbsp;:small_orange_diamond: <a href="https://curl.haxx.se/"><b>curl</b></a> - is a command line tool and library for transferring data with URLs.<br>
  3475. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gitlab.com/davidjpeacock/kurly"><b>kurly</b></a> - is an alternative to the widely popular curl program, written in Golang.<br>
  3476. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jakubroztocil/httpie"><b>HTTPie</b></a> - is an user-friendly HTTP client.<br>
  3477. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/asciimoo/wuzz"><b>wuzz</b></a> - is an interactive cli tool for HTTP inspection.<br>
  3478. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/summerwind/h2spec"><b>h2spec</b></a> - is a conformance testing tool for HTTP/2 implementation.<br>
  3479. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/gildasio/h2t"><b>h2t</b></a> - is a simple tool to help sysadmins to hardening their websites.<br>
  3480. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/trimstray/htrace.sh"><b>htrace.sh</b></a> - is a simple Swiss Army knife for http/https troubleshooting and profiling.<br>
  3481. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/reorx/httpstat"><b>httpstat</b></a> - is a tool that visualizes curl statistics in a way of beauty and clarity.<br>
  3482. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/gchaincl/httplab"><b>httplab</b></a> - is an interactive web server.<br>
  3483. &nbsp;&nbsp;:small_orange_diamond: <a href="https://lynx.browser.org/"><b>Lynx</b></a> - is a text browser for the World Wide Web.<br>
  3484. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/browsh-org/browsh/"><b>Browsh</b></a> - is a fully interactive, real-time, and modern text-based browser.<br>
  3485. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dhamaniasad/HeadlessBrowsers"><b>HeadlessBrowsers</b></a> - a list of (almost) all headless web browsers in existence.<br>
  3486. &nbsp;&nbsp;:small_orange_diamond: <a href="https://httpd.apache.org/docs/2.4/programs/ab.html"><b>ab</b></a> - is a single-threaded command line tool for measuring the performance of HTTP web servers.<br>
  3487. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.joedog.org/siege-home/"><b>siege</b></a> - is an http load testing and benchmarking utility.<br>
  3488. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/wg/wrk"><b>wrk</b></a> - is a modern HTTP benchmarking tool capable of generating significant load.<br>
  3489. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/giltene/wrk2"><b>wrk2</b></a> - is a constant throughput, correct latency recording variant of wrk.<br>
  3490. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/tsenart/vegeta"><b>vegeta</b></a> - is a constant throughput, correct latency recording variant of wrk.<br>
  3491. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/codesenberg/bombardier"><b>bombardier</b></a> - is a fast cross-platform HTTP benchmarking tool written in Go.<br>
  3492. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/cmpxchg16/gobench"><b>gobench</b></a> - http/https load testing and benchmarking tool.<br>
  3493. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rakyll/hey"><b>hey</b></a> - HTTP load generator, ApacheBench (ab) replacement, formerly known as rakyll/boom.<br>
  3494. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/tarekziade/boom"><b>boom</b></a> - is a script you can use to quickly smoke-test your web app deployment.<br>
  3495. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/shekyan/slowhttptest"><b>SlowHTTPTest</b></a> - is a tool that simulates some Application Layer Denial of Service attacks by prolonging HTTP.<br>
  3496. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/OJ/gobuster"><b>gobuster</b></a> - is a free and open source directory/file & DNS busting tool written in Go.<br>
  3497. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/ssllabs/ssllabs-scan"><b>ssllabs-scan</b></a> - command-line reference-implementation client for SSL Labs APIs.<br>
  3498. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mozilla/http-observatory"><b>http-observatory</b></a> - Mozilla HTTP Observatory cli version.<br>
  3499. </p>
  3500. ##### :black_small_square: SSL
  3501. <p>
  3502. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.openssl.org/"><b>openssl</b></a> - is a robust, commercial-grade, and full-featured toolkit for the TLS and SSL protocols.<br>
  3503. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gnutls.org/manual/html_node/gnutls_002dcli-Invocation.html"><b>gnutls-cli</b></a> - client program to set up a TLS connection to some other computer.<br>
  3504. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/nabla-c0d3/sslyze"><b>sslyze
  3505. </b></a> - fast and powerful SSL/TLS server scanning library.<br>
  3506. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rbsec/sslscan"><b>sslscan</b></a> - tests SSL/TLS enabled services to discover supported cipher suites.<br>
  3507. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/drwetter/testssl.sh"><b>testssl.sh</b></a> - testing TLS/SSL encryption anywhere on any port.<br>
  3508. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mozilla/cipherscan"><b>cipherscan</b></a> - a very simple way to find out which SSL ciphersuites are supported by a target.<br>
  3509. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.tarsnap.com/spiped.html"><b>spiped</b></a> - is a utility for creating symmetrically encrypted and authenticated pipes between socket addresses.<br>
  3510. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/certbot/certbot"><b>Certbot</b></a> - is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server.<br>
  3511. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/FiloSottile/mkcert"><b>mkcert</b></a> - simple zero-config tool to make locally trusted development certificates with any names you'd like.<br>
  3512. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/square/certstrap"><b>certstrap</b></a> - tools to bootstrap CAs, certificate requests, and signed certificates.<br>
  3513. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/yassineaboukir/sublert"><b>Sublert</b></a> - is a security and reconnaissance tool to automatically monitor new subdomains.<br>
  3514. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/trimstray/mkchain"><b>mkchain</b></a> - open source tool to help you build a valid SSL certificate chain.<br>
  3515. </p>
  3516. ##### :black_small_square: Security
  3517. <p>
  3518. &nbsp;&nbsp;:small_orange_diamond: <a href="https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/5/html/deployment_guide/ch-selinux"><b>SELinux</b></a> - provides a flexible Mandatory Access Control (MAC) system built into the Linux kernel.<br>
  3519. &nbsp;&nbsp;:small_orange_diamond: <a href="https://wiki.ubuntu.com/AppArmor"><b>AppArmor</b></a> - proactively protects the operating system and applications from external or internal threats.<br>
  3520. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/grapheneX/grapheneX"><b>grapheneX</b></a> - Automated System Hardening Framework.<br>
  3521. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dev-sec/"><b>DevSec Hardening Framework</b></a> - Security + DevOps: Automatic Server Hardening.<br>
  3522. </p>
  3523. ##### :black_small_square: Auditing Tools
  3524. <p>
  3525. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.ossec.net/"><b>ossec</b></a> - actively monitoring all aspects of system activity with file integrity monitoring.<br>
  3526. &nbsp;&nbsp;:small_orange_diamond: <a href="https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/chap-system_auditing"><b>auditd</b></a> - provides a way to track security-relevant information on your system.<br>
  3527. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.nongnu.org/tiger/"><b>Tiger</b></a> - is a security tool that can be use both as a security audit and intrusion detection system.<br>
  3528. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cisofy.com/lynis/"><b>Lynis</b></a> - battle-tested security tool for systems running Linux, macOS, or Unix-based operating system.<br>
  3529. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rebootuser/LinEnum"><b>LinEnum</b></a> - scripted Local Linux Enumeration & Privilege Escalation Checks.<br>
  3530. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/installation/rkhunter"><b>Rkhunter</b></a> - scanner tool for Linux systems that scans backdoors, rootkits and local exploits on your systems.<br>
  3531. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/hasherezade/pe-sieve"><b>PE-sieve</b></a> - is a light-weight tool that helps to detect malware running on the system.<br>
  3532. </p>
  3533. ##### :black_small_square: System Diagnostics/Debuggers
  3534. <p>
  3535. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/strace/strace"><b>strace</b></a> - diagnostic, debugging and instructional userspace utility for Linux.<br>
  3536. &nbsp;&nbsp;:small_orange_diamond: <a href="http://dtrace.org/blogs/about/"><b>DTrace</b></a> - is a performance analysis and troubleshooting tool.<br>
  3537. &nbsp;&nbsp;:small_orange_diamond: <a href="https://en.wikipedia.org/wiki/Ltrace"><b>ltrace</b></a> - is a library call tracer, used to trace calls made by programs to library functions.<br>
  3538. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/brainsmoke/ptrace-burrito"><b>ptrace-burrito</b></a> - is a friendly wrapper around ptrace.<br>
  3539. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/brendangregg/perf-tools"><b>perf-tools</b></a> - performance analysis tools based on Linux perf_events (aka perf) and ftrace.<br>
  3540. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/iovisor/bpftrace"><b>bpftrace</b></a> - high-level tracing language for Linux eBPF.<br>
  3541. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/draios/sysdig"><b>sysdig</b></a> - system exploration and troubleshooting tool with first class support for containers.<br>
  3542. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.valgrind.org/"><b>Valgrind</b></a> - is an instrumentation framework for building dynamic analysis tools.<br>
  3543. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/gperftools/gperftools"><b>gperftools</b></a> - high-performance multi-threaded malloc() implementation, plus some performance analysis tools.<br>
  3544. &nbsp;&nbsp;:small_orange_diamond: <a href="https://nicolargo.github.io/glances/"><b>glances</b></a> - cross-platform system monitoring tool written in Python.<br>
  3545. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/hishamhm/htop"><b>htop</b></a> - interactive text-mode process viewer for Unix systems. It aims to be a better 'top'.<br>
  3546. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/aristocratos/bashtop"><b>bashtop</b></a> - Linux resource monitor written in pure Bash.<br>
  3547. &nbsp;&nbsp;:small_orange_diamond: <a href="http://nmon.sourceforge.net/pmwiki.php"><b>nmon</b></a> - a single executable for performance monitoring and data analysis.<br>
  3548. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.atoptool.nl/"><b>atop</b></a> - ASCII performance monitor. Includes statistics for CPU, memory, disk, swap, network, and processes.<br>
  3549. &nbsp;&nbsp;:small_orange_diamond: <a href="https://en.wikipedia.org/wiki/Lsof"><b>lsof</b></a> - displays in its output information about files that are opened by processes.<br>
  3550. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.brendangregg.com/flamegraphs.html"><b>FlameGraph</b></a> - stack trace visualizer.<br>
  3551. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/zevv/lsofgraph"><b>lsofgraph</b></a> - convert Unix lsof output to a graph showing FIFO and UNIX interprocess communication.<br>
  3552. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mozilla/rr"><b>rr</b></a> - is a lightweight tool for recording, replaying and debugging execution of applications.<br>
  3553. &nbsp;&nbsp;:small_orange_diamond: <a href="https://pcp.io/index.html"><b>Performance Co-Pilot</b></a> - a system performance analysis toolkit.<br>
  3554. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/sharkdp/hexyl"><b>hexyl</b></a> - a command-line hex viewer.<br>
  3555. </p>
  3556. ##### :black_small_square: Log Analyzers
  3557. <p>
  3558. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rcoh/angle-grinder"><b>angle-grinder</b></a> - slice and dice log files on the command line.<br>
  3559. &nbsp;&nbsp;:small_orange_diamond: <a href="https://lnav.org"><b>lnav</b></a> - log file navigator with search and automatic refresh.<br>
  3560. &nbsp;&nbsp;:small_orange_diamond: <a href="https://goaccess.io/"><b>GoAccess</b></a> - real-time web log analyzer and interactive viewer that runs in a terminal.<br>
  3561. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/lebinh/ngxtop"><b>ngxtop</b></a> - real-time metrics for nginx server.<br>
  3562. </p>
  3563. ##### :black_small_square: Databases
  3564. <p>
  3565. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/xo/usql"><b>usql</b></a> - universal command-line interface for SQL databases.<br>
  3566. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dbcli/pgcli"><b>pgcli</b></a> - postgres CLI with autocompletion and syntax highlighting.<br>
  3567. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dbcli/mycli"><b>mycli</b></a> - terminal client for MySQL with autocompletion and syntax highlighting.<br>
  3568. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dbcli/litecli"><b>litecli</b></a> - SQLite CLI with autocompletion and syntax highlighting.<br>
  3569. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dbcli/mssql-cli"><b>mssql-cli</b></a> - SQL Server CLI with autocompletion and syntax highlighting.<br>
  3570. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/osquery/osquery"><b>OSQuery</b></a> - is a SQL powered operating system instrumentation, monitoring, and analytics framework.<br>
  3571. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/ankane/pgsync"><b>pgsync</b></a> - sync data from one Postgres database to another.<br>
  3572. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/laixintao/iredis"><b>iredis</b></a> - a terminal client for redis with autocompletion and syntax highlighting.<br>
  3573. </p>
  3574. ##### :black_small_square: TOR
  3575. <p>
  3576. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/GouveaHeitor/nipe"><b>Nipe</b></a> - script to make Tor Network your default gateway.<br>
  3577. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/trimstray/multitor"><b>multitor</b></a> - a tool that lets you create multiple TOR instances with a load-balancing.<br>
  3578. </p>
  3579. ##### :black_small_square: Messengers/IRC Clients
  3580. <p>
  3581. &nbsp;&nbsp;:small_orange_diamond: <a href="https://irssi.org"><b>Irssi</b></a> - is a free open source terminal based IRC client.<br>
  3582. &nbsp;&nbsp;:small_orange_diamond: <a href="https://weechat.org/"><b>WeeChat</b></a> - is an extremely extensible and lightweight IRC client.<br>
  3583. </p>
  3584. ##### :black_small_square: Productivity
  3585. <p>
  3586. &nbsp;&nbsp;:small_orange_diamond: <a href="https://taskwarrior.org"><b>taskwarrior</b></a> - task management system, todo list <br>
  3587. </p>
  3588. ##### :black_small_square: Other
  3589. <p>
  3590. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/skx/sysadmin-util"><b>sysadmin-util</b></a> - tools for Linux/Unix sysadmins.<br>
  3591. &nbsp;&nbsp;:small_orange_diamond: <a href="http://inotify.aiken.cz/"><b>incron</b></a> - is an inode-based filesystem notification technology.<br>
  3592. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/axkibe/lsyncd"><b>lsyncd</b></a> - synchronizes local directories with remote targets (Live Syncing Daemon).<br>
  3593. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rgburke/grv"><b>GRV</b></a> - is a terminal based interface for viewing Git repositories.<br>
  3594. &nbsp;&nbsp;:small_orange_diamond: <a href="https://jonas.github.io/tig/"><b>Tig</b></a> - text-mode interface for Git.<br>
  3595. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/tldr-pages/tldr"><b>tldr</b></a> - simplified and community-driven man pages.<br>
  3596. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mholt/archiver"><b>archiver</b></a> - easily create and extract .zip, .tar, .tar.gz, .tar.bz2, .tar.xz, .tar.lz4, .tar.sz, and .rar.<br>
  3597. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/tj/commander.js"><b>commander.js</b></a> - minimal CLI creator in JavaScript.<br>
  3598. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/tomnomnom/gron"><b>gron</b></a> - make JSON greppable!<br>
  3599. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/itchyny/bed"><b>bed</b></a> - binary editor written in Go.<br>
  3600. </p>
  3601. #### GUI Tools &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  3602. ##### :black_small_square: Terminal emulators
  3603. <p>
  3604. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Guake/guake"><b>Guake</b></a> - is a dropdown terminal made for the GNOME desktop environment.<br>
  3605. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gnometerminator.blogspot.com/p/introduction.html"><b>Terminator</b></a> - is based on GNOME Terminal, useful features for sysadmins and other users.<br>
  3606. &nbsp;&nbsp;:small_orange_diamond: <a href="https://sw.kovidgoyal.net/kitty/"><b>Kitty</b></a> - is a GPU based terminal emulator that supports smooth scrolling and images.<br>
  3607. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/alacritty/alacritty"><b>Alacritty</b></a> - is a fast, cross-platform, OpenGL terminal emulator.<br>
  3608. </p>
  3609. ##### :black_small_square: Network
  3610. <p>
  3611. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.wireshark.org/"><b>Wireshark</b></a> - is the world’s foremost and widely-used network protocol analyzer.<br>
  3612. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.ettercap-project.org/"><b>Ettercap</b></a> - is a comprehensive network monitor tool.<br>
  3613. &nbsp;&nbsp;:small_orange_diamond: <a href="https://etherape.sourceforge.io/"><b>EtherApe</b></a> - is a graphical network monitoring solution.<br>
  3614. &nbsp;&nbsp;:small_orange_diamond: <a href="https://packetsender.com/"><b>Packet Sender</b></a> - is a networking utility for packet generation and built-in UDP/TCP/SSL client and servers.<br>
  3615. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ostinato.org/"><b>Ostinato</b></a> - is a packet crafter and traffic generator.<br>
  3616. &nbsp;&nbsp;:small_orange_diamond: <a href="https://jmeter.apache.org/"><b>JMeter™</b></a> - open source software to load test functional behavior and measure performance.<br>
  3617. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/locustio/locust"><b>locust</b></a> - scalable user load testing tool written in Python.<br>
  3618. </p>
  3619. ##### :black_small_square: Browsers
  3620. <p>
  3621. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.torproject.org/"><b>TOR Browser</b></a> - protect your privacy and defend yourself against network surveillance and traffic analysis.<br>
  3622. </p>
  3623. ##### :black_small_square: Password Managers
  3624. <p>
  3625. &nbsp;&nbsp;:small_orange_diamond: <a href="https://keepassxc.org/"><b>KeePassXC</b></a> - store your passwords safely and auto-type them into your everyday websites and apps.<br>
  3626. &nbsp;&nbsp;:small_orange_diamond: <a href="https://bitwarden.com/"><b>Bitwarden</b></a> - open source password manager with built-in sync.<br>
  3627. </p>
  3628. ##### :black_small_square: Messengers/IRC Clients
  3629. <p>
  3630. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hexchat.github.io/index.html"><b>HexChat</b></a> - is an IRC client based on XChat.<br>
  3631. &nbsp;&nbsp;:small_orange_diamond: <a href="https://pidgin.im/"><b>Pidgin</b></a> - is an easy to use and free chat client used by millions.<br>
  3632. </p>
  3633. ##### :black_small_square: Messengers (end-to-end encryption)
  3634. <p>
  3635. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.signal.org/"><b>Signal</b></a> - is an encrypted communications app.<br>
  3636. &nbsp;&nbsp;:small_orange_diamond: <a href="https://wire.com/en/"><b>Wire</b></a> - secure messaging, file sharing, voice calls and video conferences. All protected with end-to-end encryption.<br>
  3637. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/prof7bit/TorChat"><b>TorChat</b></a> - decentralized anonymous instant messenger on top of Tor Hidden Services.<br>
  3638. &nbsp;&nbsp;:small_orange_diamond: <a href="https://matrix.org/"><b>Matrix</b></a> - an open network for secure, decentralized, real-time communication.<br>
  3639. </p>
  3640. ##### :black_small_square: Text editors
  3641. <p>
  3642. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.sublimetext.com/3"><b>Sublime Text</b></a> - is a lightweight, cross-platform code editor known for its speed, ease of use.<br>
  3643. &nbsp;&nbsp;:small_orange_diamond: <a href="https://code.visualstudio.com/"><b>Visual Studio Code</b></a> - an open-source and free source code editor developed by Microsoft.<br>
  3644. &nbsp;&nbsp;:small_orange_diamond: <a href="https://atom.io/"><b>Atom</b></a> - a hackable text editor for the 21st Century.<br>
  3645. </p>
  3646. #### Web Tools &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  3647. ##### :black_small_square: Browsers
  3648. <p>
  3649. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.ssllabs.com/ssltest/viewMyClient.html"><b>SSL/TLS Capabilities of Your Browser</b></a> - test your browser's SSL implementation.<br>
  3650. &nbsp;&nbsp;:small_orange_diamond: <a href="https://caniuse.com/"><b>Can I use</b></a> - provides up-to-date browser support tables for support of front-end web technologies.<br>
  3651. &nbsp;&nbsp;:small_orange_diamond: <a href="https://panopticlick.eff.org/"><b>Panopticlick 3.0</b></a> - is your browser safe against tracking?<br>
  3652. &nbsp;&nbsp;:small_orange_diamond: <a href="https://privacy.net/analyzer/"><b>Privacy Analyzer</b></a> - see what data is exposed from your browser.<br>
  3653. &nbsp;&nbsp;:small_orange_diamond: <a href="https://browserleaks.com/"><b>Web Browser Security</b></a> - it's all about Web Browser fingerprinting.<br>
  3654. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.howsmyssl.com/"><b>How's My SSL?</b></a> - help a web server developer learn what real world TLS clients were capable of.<br>
  3655. &nbsp;&nbsp;:small_orange_diamond: <a href="https://suche.org/sslClientInfo"><b>sslClientInfo</b></a> - client test (incl TLSv1.3 information).<br>
  3656. </p>
  3657. ##### :black_small_square: SSL/Security
  3658. <p>
  3659. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.ssllabs.com/ssltest/"><b>SSLLabs Server Test</b></a> - performs a deep analysis of the configuration of any SSL web server.<br>
  3660. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dev.ssllabs.com/ssltest/"><b>SSLLabs Server Test (DEV)</b></a> - performs a deep analysis of the configuration of any SSL web server.<br>
  3661. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.immuniweb.com/ssl/"><b>ImmuniWeb® SSLScan</b></a> - test SSL/TLS (PCI DSS, HIPAA and NIST).<br>
  3662. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.jitbit.com/sslcheck/"><b>SSL Check</b></a> - scan your website for non-secure content.<br>
  3663. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.ssltools.com"><b>SSL Scanner</b></a> - analyze website security.<br>
  3664. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cryptcheck.fr/"><b>CryptCheck</b></a> - test your TLS server configuration (e.g. ciphers).<br>
  3665. &nbsp;&nbsp;:small_orange_diamond: <a href="https://urlscan.io/"><b>urlscan.io</b></a> - service to scan and analyse websites.<br>
  3666. &nbsp;&nbsp;:small_orange_diamond: <a href="https://report-uri.com/home/tools"><b>Report URI</b></a> - monitoring security policies like CSP and HPKP.<br>
  3667. &nbsp;&nbsp;:small_orange_diamond: <a href="https://csp-evaluator.withgoogle.com/"><b>CSP Evaluator</b></a> - allows developers and security experts to check if a Content Security Policy.<br>
  3668. &nbsp;&nbsp;:small_orange_diamond: <a href="https://uselesscsp.com/"><b>Useless CSP</b></a> - public list about CSP in some big players (might make them care a bit more).<br>
  3669. &nbsp;&nbsp;:small_orange_diamond: <a href="https://whynohttps.com/"><b>Why No HTTPS?</b></a> - top 100 websites by Alexa rank not automatically redirecting insecure requests.<br>
  3670. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ciphersuite.info/"><b>TLS Cipher Suite Search</b></a>- cipher suite search engine.<br>
  3671. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/RaymiiOrg/cipherli.st"><b>cipherli.st</b></a> - strong ciphers for Apache, Nginx, Lighttpd, and more.<b>*</b><br>
  3672. &nbsp;&nbsp;:small_orange_diamond: <a href="https://2ton.com.au/dhtool/"><b>dhtool</b></a> - public Diffie-Hellman parameter service/tool.<br>
  3673. &nbsp;&nbsp;:small_orange_diamond: <a href="https://badssl.com/"><b>badssl.com</b></a> - memorable site for testing clients against bad SSL configs.<br>
  3674. &nbsp;&nbsp;:small_orange_diamond: <a href="https://tlsfun.de/"><b>tlsfun.de</b></a> - registered for various tests regarding the TLS/SSL protocol.<br>
  3675. &nbsp;&nbsp;:small_orange_diamond: <a href="https://sslmate.com/caa/"><b>CAA Record Helper</b></a> - generate a CAA policy.<br>
  3676. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ccadb.org/resources"><b>Common CA Database</b></a> - repository of information about CAs, and their root and intermediate certificates.<br>
  3677. &nbsp;&nbsp;:small_orange_diamond: <a href="https://certstream.calidog.io/"><b>CERTSTREAM</b></a> - real-time certificate transparency log update stream.<br>
  3678. &nbsp;&nbsp;:small_orange_diamond: <a href="https://crt.sh/"><b>crt.sh</b></a> - discovers certificates by continually monitoring all of the publicly known CT.<br>
  3679. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hardenize.com/"><b>Hardenize</b></a> - deploy the security standards.<br>
  3680. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cryptcheck.fr/suite/"><b>Cipher suite compatibility</b></a> - test TLS cipher suite compatibility.<br>
  3681. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.urlvoid.com/"><b>urlvoid</b></a> - this service helps you detect potentially malicious websites.<br>
  3682. &nbsp;&nbsp;:small_orange_diamond: <a href="https://securitytxt.org/"><b>security.txt</b></a> - a proposed standard (generator) which allows websites to define security policies.<br>
  3683. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mozilla/ssl-config-generator"><b>ssl-config-generator</b></a> - help you follow the Mozilla Server Side TLS configuration guidelines.<br>
  3684. </p>
  3685. ##### :black_small_square: HTTP Headers & Web Linters
  3686. <p>
  3687. &nbsp;&nbsp;:small_orange_diamond: <a href="https://securityheaders.com/"><b>Security Headers</b></a> - analyse the HTTP response headers (with rating system to the results).<br>
  3688. &nbsp;&nbsp;:small_orange_diamond: <a href="https://observatory.mozilla.org/"><b>Observatory by Mozilla</b></a> - set of tools to analyze your website.<br>
  3689. &nbsp;&nbsp;:small_orange_diamond: <a href="https://webhint.io/"><b>webhint</b></a> - is a linting tool that will help you with your site's accessibility, speed, security, and more.<br>
  3690. </p>
  3691. ##### :black_small_square: DNS
  3692. <p>
  3693. &nbsp;&nbsp;:small_orange_diamond: <a href="http://viewdns.info/"><b>ViewDNS</b></a> - one source for free DNS related tools and information.<br>
  3694. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dnslookup.org/"><b>DNSLookup</b></a> - is an advanced DNS lookup tool.<br>
  3695. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dnslytics.com/"><b>DNSlytics</b></a> - online DNS investigation tool.<br>
  3696. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dnsspy.io/"><b>DNS Spy</b></a> - monitor, validate and verify your DNS configurations.<br>
  3697. &nbsp;&nbsp;:small_orange_diamond: <a href="https://zonemaster.iis.se/en/"><b>Zonemaster</b></a> - helps you to control how your DNS works.<br>
  3698. &nbsp;&nbsp;:small_orange_diamond: <a href="http://leafdns.com/"><b>Leaf DNS</b></a> - comprehensive DNS tester.<br>
  3699. &nbsp;&nbsp;:small_orange_diamond: <a href="https://findsubdomains.com/"><b>Find subdomains online</b></a> - find subdomains for security assessment penetration test.<br>
  3700. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dnsdumpster.com/"><b>DNSdumpster</b></a> - dns recon & research, find & lookup dns records.<br>
  3701. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dnstable.com/"><b>DNS Table online</b></a> - search for DNS records by domain, IP, CIDR, ISP.<br>
  3702. &nbsp;&nbsp;:small_orange_diamond: <a href="https://intodns.com/"><b>intoDNS</b></a> - DNS and mail server health checker.<br>
  3703. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.zonecut.net/dns/"><b>DNS Bajaj</b></a> - check the delegation of your domain.<br>
  3704. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.buddyns.com/delegation-lab/"><b>BuddyDNS Delegation LAB</b></a> - check, trace and visualize delegation of your domain.<br>
  3705. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dnssec-debugger.verisignlabs.com/"><b>dnssec-debugger</b></a> - DS or DNSKEY records validator.<br>
  3706. &nbsp;&nbsp;:small_orange_diamond: <a href="http://ptrarchive.com/"><b>PTRarchive.com</b></a> - this site is responsible for the safekeeping of historical reverse DNS records.<br>
  3707. &nbsp;&nbsp;:small_orange_diamond: <a href="http://xip.io/"><b>xip.io</b></a> - wildcard DNS for everyone.<br>
  3708. &nbsp;&nbsp;:small_orange_diamond: <a href="https://nip.io/"><b>nip.io</b></a> - dead simple wildcard DNS for any IP Address.<br>
  3709. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ceipam.eu/en/dnslookup.php"><b>dnslookup (ceipam)</b></a> - one of the best DNS propagation checker (and not only).<br>
  3710. &nbsp;&nbsp;:small_orange_diamond: <a href="https://whatsmydns.com"><b>What's My DNS</b></a> - DNS propagation checking tool.<br>
  3711. &nbsp;&nbsp;:small_orange_diamond: <a href="https://blog.erbbysam.com/index.php/2019/02/09/dnsgrep/"><b>DNSGrep</b></a> - quickly searching large DNS datasets.<br>
  3712. </p>
  3713. ##### :black_small_square: Mail
  3714. <p>
  3715. &nbsp;&nbsp;:small_orange_diamond: <a href="https://luxsci.com/smtp-tls-checker"><b>smtp-tls-checker</b></a> - check an email domain for SMTP TLS support.<br>
  3716. &nbsp;&nbsp;:small_orange_diamond: <a href="https://mxtoolbox.com/SuperTool.aspx"><b>MX Toolbox</b></a> - all of your MX record, DNS, blacklist and SMTP diagnostics in one integrated tool.<br>
  3717. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.checktls.com/index.html"><b>Secure Email</b></a> - complete email test tools for email technicians.<br>
  3718. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.blacklistalert.org/"><b>blacklistalert</b></a> - checks to see if your domain is on a Real Time Spam Blacklist.<br>
  3719. &nbsp;&nbsp;:small_orange_diamond: <a href="http://multirbl.valli.org/"><b>MultiRBL</b></a> - complete IP check for sending Mailservers.<br>
  3720. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dkimvalidator.com/"><b>DKIM SPF & Spam Assassin Validator</b></a> - checks mail authentication and scores messages with Spam Assassin.<br>
  3721. </p>
  3722. ##### :black_small_square: Encoders/Decoders and Regex testing
  3723. <p>
  3724. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.url-encode-decode.com/"><b>URL Encode/Decode</b></a> - tool from above to either encode or decode a string of text.<br>
  3725. &nbsp;&nbsp;:small_orange_diamond: <a href="https://uncoder.io/"><b>Uncoder</b></a> - the online translator for search queries on log data.<br>
  3726. &nbsp;&nbsp;:small_orange_diamond: <a href="https://regex101.com/"><b>Regex101</b></a> - online regex tester and debugger: PHP, PCRE, Python, Golang and JavaScript.<br>
  3727. &nbsp;&nbsp;:small_orange_diamond: <a href="https://regexr.com/"><b>RegExr</b></a> - online tool to learn, build, & test Regular Expressions (RegEx / RegExp).<br>
  3728. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.regextester.com/"><b>RegEx Testing</b></a> - online regex testing tool.<br>
  3729. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.regexpal.com/"><b>RegEx Pal</b></a> - online regex testing tool + other tools.<br>
  3730. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gchq.github.io/CyberChef/"><b>The Cyber Swiss Army Knife</b></a> - a web app for encryption, encoding, compression and data analysis.<br>
  3731. </p>
  3732. ##### :black_small_square: Net-tools
  3733. <p>
  3734. &nbsp;&nbsp;:small_orange_diamond: <a href="https://toolbar.netcraft.com/site_report"><b>Netcraft</b></a> - detailed report about the site, helping you to make informed choices about their integrity.<b>*</b><br>
  3735. &nbsp;&nbsp;:small_orange_diamond: <a href="https://atlas.ripe.net/"><b>RIPE NCC Atlas</b></a> - a global, open, distributed Internet measurement platform.<br>
  3736. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.robtex.com/"><b>Robtex</b></a> - uses various sources to gather public information about IP numbers, domain names, host names, etc.<br>
  3737. &nbsp;&nbsp;:small_orange_diamond: <a href="https://securitytrails.com/"><b>Security Trails</b></a> - APIs for Security Companies, Researchers and Teams.<br>
  3738. &nbsp;&nbsp;:small_orange_diamond: <a href="https://tools.keycdn.com/curl"><b>Online Curl</b></a> - curl test, analyze HTTP Response Headers.<br>
  3739. &nbsp;&nbsp;:small_orange_diamond: <a href="https://extendsclass.com/"><b>Online Tools for Developers</b></a> - HTTP API tools, testers, encoders, converters, formatters, and other tools.<br>
  3740. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ping.eu/"><b>Ping.eu</b></a> - online Ping, Traceroute, DNS lookup, WHOIS and others.<br>
  3741. &nbsp;&nbsp;:small_orange_diamond: <a href="https://network-tools.com/"><b>Network-Tools</b></a> - network tools for webmasters, IT technicians & geeks.<br>
  3742. &nbsp;&nbsp;:small_orange_diamond: <a href="https://bgpview.io/"><b>BGPview</b></a> - search for any ASN, IP, Prefix or Resource name.<br>
  3743. &nbsp;&nbsp;:small_orange_diamond: <a href="https://isbgpsafeyet.com/"><b>Is BGP safe yet?</b></a> - check BGP (RPKI) security of ISPs and other major Internet players.<br>
  3744. &nbsp;&nbsp;:small_orange_diamond: <a href="https://riseup.net/"><b>Riseup</b></a> - provides online communication tools for people and groups working on liberatory social change.<br>
  3745. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.virustotal.com/gui/home/upload"><b>VirusTotal</b></a> - analyze suspicious files and URLs to detect types of malware.<br>
  3746. </p>
  3747. ##### :black_small_square: Privacy
  3748. <p>
  3749. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.privacytools.io/"><b>privacytools.io</b></a> - provides knowledge and tools to protect your privacy against global mass surveillance.<br>
  3750. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Test+Servers"><b>DNS Privacy Test Servers</b></a> - DNS privacy recursive servers list (with a 'no logging' policy).<br>
  3751. </p>
  3752. ##### :black_small_square: Code parsers/playgrounds
  3753. <p>
  3754. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.shellcheck.net/"><b>ShellCheck</b></a> - finds bugs in your shell scripts.<br>
  3755. &nbsp;&nbsp;:small_orange_diamond: <a href="https://explainshell.com/"><b>explainshell</b></a> - get interactive help texts for shell commands.<br>
  3756. &nbsp;&nbsp;:small_orange_diamond: <a href="https://jsbin.com/?html,output"><b>jsbin</b></a> - live pastebin for HTML, CSS & JavaScript, and more.<br>
  3757. &nbsp;&nbsp;:small_orange_diamond: <a href="https://codesandbox.io/"><b>CodeSandbox</b></a> - online code editor for web application development.<br>
  3758. &nbsp;&nbsp;:small_orange_diamond: <a href="http://sandbox.onlinephpfunctions.com/"><b>PHP Sandbox</b></a> - test your PHP code with this code tester.<br>
  3759. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.repl.it/"><b>Repl.it</b></a> - an instant IDE to learn, build, collaborate, and host all in one place.<br>
  3760. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.vclfiddle.net/"><b>vclFiddle</b></a> - is an online tool for experimenting with the Varnish Cache VCL.<br>
  3761. </p>
  3762. ##### :black_small_square: Performance
  3763. <p>
  3764. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gtmetrix.com/"><b>GTmetrix</b></a> - analyze your site’s speed and make it faster.<br>
  3765. &nbsp;&nbsp;:small_orange_diamond: <a href="https://performance.sucuri.net/"><b>Sucuri loadtimetester</b></a> - test here the
  3766. performance of any of your sites from across the globe.<br>
  3767. &nbsp;&nbsp;:small_orange_diamond: <a href="https://tools.pingdom.com/"><b>Pingdom Tools</b></a> - analyze your site’s speed around the world.<br>
  3768. &nbsp;&nbsp;:small_orange_diamond: <a href="https://pingme.io/"><b>PingMe.io</b></a> - run website latency tests across multiple geographic regions.<br>
  3769. &nbsp;&nbsp;:small_orange_diamond: <a href="https://developers.google.com/speed/pagespeed/insights/"><b>PageSpeed Insights</b></a> - analyze your site’s speed and make it faster.<br>
  3770. &nbsp;&nbsp;:small_orange_diamond: <a href="https://web.dev/"><b>web.dev</b></a> - helps developers like you learn and apply the web's modern capabilities to your own sites and apps.<br>
  3771. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/GoogleChrome/lighthouse"><b>Lighthouse</b></a> - automated auditing, performance metrics, and best practices for the web.<br>
  3772. </p>
  3773. ##### :black_small_square: Mass scanners (search engines)
  3774. <p>
  3775. &nbsp;&nbsp;:small_orange_diamond: <a href="https://censys.io/"><b>Censys</b></a> - platform that helps information security practitioners discover, monitor, and analyze devices.<br>
  3776. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.shodan.io/"><b>Shodan</b></a> - the world's first search engine for Internet-connected devices.<br>
  3777. &nbsp;&nbsp;:small_orange_diamond: <a href="https://2000.shodan.io/#/"><b>Shodan 2000</b></a> - this tool looks for randomly generated data from Shodan.<br>
  3778. &nbsp;&nbsp;:small_orange_diamond: <a href="https://viz.greynoise.io/table"><b>GreyNoise</b></a> - mass scanner such as Shodan and Censys.<br>
  3779. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.zoomeye.org/"><b>ZoomEye</b></a> - search engine for cyberspace that lets the user find specific network components.<br>
  3780. &nbsp;&nbsp;:small_orange_diamond: <a href="https://netograph.io/"><b>netograph</b></a> - tools to monitor and understand deep structure of the web.<br>
  3781. &nbsp;&nbsp;:small_orange_diamond: <a href="https://fofa.so/"><b>FOFA</b></a> - is a cyberspace search engine.<br>
  3782. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.onyphe.io/"><b>onyphe</b></a> - is a search engine for open-source and cyber threat intelligence data collected.<br>
  3783. &nbsp;&nbsp;:small_orange_diamond: <a href="https://intelx.io/"><b>IntelligenceX</b></a> - is a search engine and data archive.<br>
  3784. &nbsp;&nbsp;:small_orange_diamond: <a href="https://app.binaryedge.io/"><b>binaryedge</b></a> - it scan the entire internet space and create real-time threat intelligence streams and reports.<br>
  3785. &nbsp;&nbsp;:small_orange_diamond: <a href="https://spyse.com/"><b>Spyse</b></a> - Internet assets registry: networks, threats, web objects, etc.<br>
  3786. &nbsp;&nbsp;:small_orange_diamond: <a href="https://wigle.net/"><b>wigle</b></a> - is a submission-based catalog of wireless networks. All the networks. Found by Everyone.<br>
  3787. &nbsp;&nbsp;:small_orange_diamond: <a href="https://publicwww.com/"><b>PublicWWW</b></a> - find any alphanumeric snippet, signature or keyword in the web pages HTML, JS and CSS code.<br>
  3788. &nbsp;&nbsp;:small_orange_diamond: <a href="https://inteltechniques.com/index.html"><b>IntelTechniques</b></a> - this repository contains hundreds of online search utilities.<br>
  3789. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hunter.io/"><b>hunter</b></a> - lets you find email addresses in seconds and connect with the people that matter for your business.<br>
  3790. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ghostproject.fr/"><b>GhostProject?</b></a> - search by full email address or username.<br>
  3791. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.databreaches.live/"><b>databreaches</b></a> - was my email affected by data breach?<br>
  3792. &nbsp;&nbsp;:small_orange_diamond: <a href="https://weleakinfo.com"><b>We Leak Info</b></a> - world's fastest and largest data breach search engine.<br>
  3793. &nbsp;&nbsp;:small_orange_diamond: <a href="https://pulsedive.com/"><b>Pulsedive</b></a> - scans of malicious URLs, IPs, and domains, including port scans and web requests.<br>
  3794. &nbsp;&nbsp;:small_orange_diamond: <a href="https://buckets.grayhatwarfare.com/"><b>Buckets by Grayhatwarfar</b></a> - database with public search for Open Amazon S3 Buckets and their contents.<br>
  3795. &nbsp;&nbsp;:small_orange_diamond: <a href="https://vigilante.pw/"><b>Vigilante.pw</b></a> - the breached database directory.<br>
  3796. &nbsp;&nbsp;:small_orange_diamond: <a href="https://builtwith.com/"><b>builtwith</b></a> - find out what websites are built with.<br>
  3797. &nbsp;&nbsp;:small_orange_diamond: <a href="https://nerdydata.com/"><b>NerdyData</b></a> - search the web's source code for technologies, across millions of sites.<br>
  3798. &nbsp;&nbsp;:small_orange_diamond: <a href="http://zorexeye.com/"><b>zorexeye</b></a> - search for sites, images, apps, softwares & more.<br>
  3799. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.mmnt.net/"><b>Mamont's open FTP Index</b></a> - if a target has an open FTP site with accessible content it will be listed here.<br>
  3800. &nbsp;&nbsp;:small_orange_diamond: <a href="https://osintframework.com/"><b>OSINT Framework</b></a> - focused on gathering information from free tools or resources.<br>
  3801. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.maltiverse.com/search"><b>maltiverse</b></a> - is a service oriented to cybersecurity analysts for the advanced analysis of indicators of compromise.<br>
  3802. &nbsp;&nbsp;:small_orange_diamond: <a href="https://leakedsource.ru/main/"><b>Leaked Source</b></a> - is a collaboration of data found online in the form of a lookup.<br>
  3803. &nbsp;&nbsp;:small_orange_diamond: <a href="https://search.weleakinfo.com/"><b>We Leak Info</b></a> - to help everyday individuals secure their online life, avoiding getting hacked.<br>
  3804. &nbsp;&nbsp;:small_orange_diamond: <a href="https://pipl.com/"><b>pipl</b></a> - is the place to find the person behind the email address, social username or phone number.<br>
  3805. &nbsp;&nbsp;:small_orange_diamond: <a href="https://abuse.ch/"><b>abuse.ch</b></a> - is operated by a random swiss guy fighting malware for non-profit.<br>
  3806. &nbsp;&nbsp;:small_orange_diamond: <a href="http://malc0de.com/database/"><b>malc0de</b></a> - malware search engine.<br>
  3807. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cybercrime-tracker.net/index.php"><b>Cybercrime Tracker</b></a> - monitors and tracks various malware families that are used to perpetrate cyber crimes.<br>
  3808. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/eth0izzle/shhgit/"><b>shhgit</b></a> - find GitHub secrets in real time.<br>
  3809. &nbsp;&nbsp;:small_orange_diamond: <a href="https://searchcode.com/"><b>searchcode</b></a> - helping you find real world examples of functions, API's and libraries.<br>
  3810. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.insecam.org/"><b>Insecam</b></a> - the world biggest directory of online surveillance security cameras.<br>
  3811. &nbsp;&nbsp;:small_orange_diamond: <a href="http://index-of.es/"><b>index-of</b></a> - contains great stuff like: security, hacking, reverse engineering, cryptography, programming etc.<br>
  3812. &nbsp;&nbsp;:small_orange_diamond: <a href="https://opendata.rapid7.com/"><b>Rapid7 Labs Open Data</b></a> - is a great resources of datasets from Project Sonar.<br>
  3813. &nbsp;&nbsp;:small_orange_diamond: <a href="https://webtechsurvey.com/common-response-headers"><b>Common Response Headers</b></a> - the largest database of HTTP response headers.<br>
  3814. </p>
  3815. ##### :black_small_square: Generators
  3816. <p>
  3817. &nbsp;&nbsp;:small_orange_diamond: <a href="https://thispersondoesnotexist.com/"><b>thispersondoesnotexist</b></a> - generate fake faces in one click - endless possibilities.<br>
  3818. &nbsp;&nbsp;:small_orange_diamond: <a href="https://generated.photos"><b>AI Generated Photos</b></a> - 100.000 AI generated faces.<br>
  3819. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.fakenamegenerator.com/"><b>fakenamegenerator</b></a> - your randomly generated identity.<br>
  3820. &nbsp;&nbsp;:small_orange_diamond: <a href="https://tools.intigriti.io/redirector/"><b>Intigriti Redirector</b></a> - open redirect/SSRF payload generator.<br>
  3821. </p>
  3822. ##### :black_small_square: Passwords
  3823. <p>
  3824. &nbsp;&nbsp;:small_orange_diamond: <a href="https://haveibeenpwned.com/"><b>have i been pwned?</b></a> - check if you have an account that has been compromised in a data breach.<br>
  3825. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.dehashed.com/"><b>dehashed</b></a> - is a hacked database search engine.<br>
  3826. &nbsp;&nbsp;:small_orange_diamond: <a href="https://leakedsource.ru/"><b>Leaked Source</b></a> - is a collaboration of data found online in the form of a lookup.<br>
  3827. </p>
  3828. ##### :black_small_square: CVE/Exploits databases
  3829. <p>
  3830. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cve.mitre.org/"><b>CVE Mitre</b></a> - list of publicly known cybersecurity vulnerabilities.<br>
  3831. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.cvedetails.com/"><b>CVE Details</b></a> - CVE security vulnerability advanced database.<br>
  3832. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.exploit-db.com/"><b>Exploit DB</b></a> - CVE compliant archive of public exploits and corresponding vulnerable software.<br>
  3833. &nbsp;&nbsp;:small_orange_diamond: <a href="https://0day.today/"><b>0day.today</b></a> - exploits market provides you the possibility to buy/sell zero-day exploits.<br>
  3834. &nbsp;&nbsp;:small_orange_diamond: <a href="https://sploitus.com/"><b>sploitus</b></a> - the exploit and tools database.<br>
  3835. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cxsecurity.com/exploit/"><b>cxsecurity</b></a> - free vulnerability database.<br>
  3836. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.vulncode-db.com/"><b>Vulncode-DB</b></a> - is a database for vulnerabilities and their corresponding source code if available.<br>
  3837. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cveapi.com/"><b>cveapi</b></a> - free API for CVE data.<br>
  3838. </p>
  3839. ##### :black_small_square: Mobile apps scanners
  3840. <p>
  3841. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.immuniweb.com/mobile/"><b>ImmuniWeb® Mobile App Scanner</b></a> - test security and privacy of mobile apps (iOS & Android).<br>
  3842. &nbsp;&nbsp;:small_orange_diamond: <a href="https://vulnerabilitytest.quixxi.com/"><b>Quixxi</b></a> - free Mobile App Vulnerability Scanner for Android & iOS.<br>
  3843. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.ostorlab.co/scan/mobile/"><b>Ostorlab</b></a> - analyzes mobile application to identify vulnerabilities and potential weaknesses.<br>
  3844. </p>
  3845. ##### :black_small_square: Private Search Engines
  3846. <p>
  3847. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.startpage.com/"><b>Startpage</b></a> - the world's most private search engine.<br>
  3848. &nbsp;&nbsp;:small_orange_diamond: <a href="https://searx.me/"><b>searX</b></a> - a privacy-respecting, hackable metasearch engine.<br>
  3849. &nbsp;&nbsp;:small_orange_diamond: <a href="https://darksearch.io/"><b>darksearch</b></a> - the 1st real Dark Web search engine.<br>
  3850. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.qwant.com/"><b>Qwant</b></a> - the search engine that respects your privacy.<br>
  3851. &nbsp;&nbsp;:small_orange_diamond: <a href="https://duckduckgo.com/"><b>DuckDuckGo</b></a> - the search engine that doesn't track you.<br>
  3852. &nbsp;&nbsp;:small_orange_diamond: <a href="https://swisscows.com/"><b>Swisscows</b></a> - privacy safe web search<br>
  3853. &nbsp;&nbsp;:small_orange_diamond: <a href="https://search.disconnect.me/"><b>Disconnect</b></a> - the search engine that anonymizes your searches.<br>
  3854. &nbsp;&nbsp;:small_orange_diamond: <a href="https://metager.org/"><b>MetaGer</b></a> - the search engine that uses anonymous proxy and hidden Tor branches.<br>
  3855. </p>
  3856. ##### :black_small_square: Secure Webmail Providers
  3857. <p>
  3858. &nbsp;&nbsp;:small_orange_diamond: <a href="https://countermail.com/"><b>CounterMail</b></a> - online email service, designed to provide maximum security and privacy.<br>
  3859. &nbsp;&nbsp;:small_orange_diamond: <a href="http://mail2tor.com/"><b>Mail2Tor</b></a> - is a Tor Hidden Service that allows anyone to send and receive emails anonymously.<br>
  3860. &nbsp;&nbsp;:small_orange_diamond: <a href="https://tutanota.com/"><b>Tutanota</b></a> - is the world's most secure email service and amazingly easy to use.<br>
  3861. &nbsp;&nbsp;:small_orange_diamond: <a href="https://protonmail.com/"><b>Protonmail</b></a> - is the world's largest secure email service, developed by CERN and MIT scientists.<br>
  3862. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.startmail.com/en/"><b>Startmail</b></a> - private & encrypted email made easy.<br>
  3863. </p>
  3864. ##### :black_small_square: Crypto
  3865. <p>
  3866. &nbsp;&nbsp;:small_orange_diamond: <a href="https://keybase.io/"><b>Keybase</b></a> - it's open source and powered by public-key cryptography.<br>
  3867. </p>
  3868. ##### :black_small_square: PGP Keyservers
  3869. <p>
  3870. &nbsp;&nbsp;:small_orange_diamond: <a href="https://keyserver.ubuntu.com/"><b>SKS OpenPGP Key server</b></a> - services for the SKS keyservers used by OpenPGP.<br>
  3871. </p>
  3872. #### Systems/Services &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  3873. ##### :black_small_square: Operating Systems
  3874. <p>
  3875. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.slackware.com/"><b>Slackware</b></a> - the most "Unix-like" Linux distribution.<br>
  3876. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.openbsd.org/"><b>OpenBSD</b></a> - multi-platform 4.4BSD-based UNIX-like operating system.<br>
  3877. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hardenedbsd.org/"><b>HardenedBSD</b></a> - HardenedBSD aims to implement innovative exploit mitigation and security solutions.<br>
  3878. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.kali.org/"><b>Kali Linux</b></a> - Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.<br>
  3879. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.parrotsec.org/"><b>Parrot Security OS</b></a> - cyber security GNU/Linux environment.<br>
  3880. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.backbox.org/"><b>Backbox Linux</b></a> - penetration test and security assessment oriented Ubuntu-based Linux distribution.<br>
  3881. &nbsp;&nbsp;:small_orange_diamond: <a href="https://blackarch.org/"><b>BlackArch</b></a> - is an Arch Linux-based penetration testing distribution for penetration testers.<br>
  3882. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.pentoo.ch/"><b>Pentoo</b></a> - is a security-focused livecd based on Gentoo.<br>
  3883. &nbsp;&nbsp;:small_orange_diamond: <a href="https://securityonion.net/"><b>Security Onion</b></a> - Linux distro for intrusion detection, enterprise security monitoring, and log management.<br>
  3884. &nbsp;&nbsp;:small_orange_diamond: <a href="https://tails.boum.org/"><b>Tails</b></a> - is a live system that aims to preserve your privacy and anonymity.<br>
  3885. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/vedetta-com/vedetta"><b>vedetta</b></a> - OpenBSD router boilerplate.<br>
  3886. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.qubes-os.org"><b>Qubes OS</b></a> - is a security-oriented OS that uses Xen-based virtualization.<br>
  3887. </p>
  3888. ##### :black_small_square: HTTP(s) Services
  3889. <p>
  3890. &nbsp;&nbsp;:small_orange_diamond: <a href="https://varnish-cache.org/"><b>Varnish Cache</b></a> - HTTP accelerator designed for content-heavy dynamic web sites.<br>
  3891. &nbsp;&nbsp;:small_orange_diamond: <a href="https://nginx.org/"><b>Nginx</b></a> - open source web and reverse proxy server that is similar to Apache, but very light weight.<br>
  3892. &nbsp;&nbsp;:small_orange_diamond: <a href="https://openresty.org/en/"><b>OpenResty</b></a> - is a dynamic web platform based on NGINX and LuaJIT.<br>
  3893. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/alibaba/tengine"><b>Tengine</b></a> - a distribution of Nginx with some advanced features.<br>
  3894. &nbsp;&nbsp;:small_orange_diamond: <a href="https://caddyserver.com/"><b>Caddy Server</b></a> - is an open source, HTTP/2-enabled web server with HTTPS by default.<br>
  3895. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.haproxy.org/"><b>HAProxy</b></a> - the reliable, high performance TCP/HTTP load balancer.<br>
  3896. </p>
  3897. ##### :black_small_square: DNS Services
  3898. <p>
  3899. &nbsp;&nbsp;:small_orange_diamond: <a href="https://nlnetlabs.nl/projects/unbound/about/"><b>Unbound</b></a> - validating, recursive, and caching DNS resolver (with TLS).<br>
  3900. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.knot-resolver.cz/"><b>Knot Resolver</b></a> - caching full resolver implementation, including both a resolver library and a daemon.<br>
  3901. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.powerdns.com/"><b>PowerDNS</b></a> - is an open source authoritative DNS server, written in C++ and licensed under the GPL.<br>
  3902. </p>
  3903. ##### :black_small_square: Other Services
  3904. <p>
  3905. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/z3APA3A/3proxy"><b>3proxy</b></a> - tiny free proxy server.<br>
  3906. </p>
  3907. ##### :black_small_square: Security/hardening
  3908. <p>
  3909. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/EmeraldOnion"><b>Emerald Onion</b></a> - is a 501(c)(3) nonprofit organization and transit internet service provider (ISP).<br>
  3910. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/pi-hole/pi-hole"><b>pi-hole</b></a> - the Pi-hole® is a DNS sinkhole that protects your devices from unwanted content.<br>
  3911. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/stamparm/maltrail"><b>maltrail</b></a> - malicious traffic detection system.<br>
  3912. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Netflix/security_monkey"><b>security_monkey</b></a> - monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.<br>
  3913. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/firecracker-microvm/firecracker"><b>firecracker</b></a> - secure and fast microVMs for serverless computing.<br>
  3914. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/StreisandEffect/streisand"><b>streisand</b></a> - sets up a new server running your choice of WireGuard, OpenSSH, OpenVPN, and more.<br>
  3915. </p>
  3916. #### Networks &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  3917. ##### :black_small_square: Tools
  3918. <p>
  3919. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.capanalysis.net/ca/"><b>CapAnalysis</b></a> - web visual tool to analyze large amounts of captured network traffic (PCAP analyzer).<br>
  3920. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/digitalocean/netbox"><b>netbox</b></a> - IP address management (IPAM) and data center infrastructure management (DCIM) tool.<br>
  3921. </p>
  3922. ##### :black_small_square: Labs
  3923. <p>
  3924. &nbsp;&nbsp;:small_orange_diamond: <a href="https://labs.networkreliability.engineering/"><b>NRE Labs</b></a> - learn automation by doing it. Right now, right here, in your browser.<br>
  3925. </p>
  3926. ##### :black_small_square: Other
  3927. <p>
  3928. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ee.lbl.gov/"><b>LBNL's Network Research Group</b></a> - home page of the Network Research Group (NRG).<br>
  3929. </p>
  3930. #### Containers/Orchestration &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  3931. ##### :black_small_square: CLI Tools
  3932. <p>
  3933. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/google/gvisor"><b>gvisor</b></a> - container runtime sandbox.<br>
  3934. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/bcicen/ctop"><b>ctop</b></a> - top-like interface for container metrics.<br>
  3935. </p>
  3936. ##### :black_small_square: Web Tools
  3937. <p>
  3938. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/moby/moby"><b>Moby</b></a> - a collaborative project for the container ecosystem to assemble container-based system.<br>
  3939. &nbsp;&nbsp;:small_orange_diamond: <a href="https://traefik.io/"><b>Traefik</b></a> - open source reverse proxy/load balancer provides easier integration with Docker and Let's encrypt.<br>
  3940. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Kong/kong"><b>kong</b></a> - The Cloud-Native API Gateway.<br>
  3941. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rancher/rancher"><b>rancher</b></a> - complete container management platform.<br>
  3942. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/portainer/portainer"><b>portainer</b></a> - making Docker management easy.<br>
  3943. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jwilder/nginx-proxy"><b>nginx-proxy</b></a> - automated nginx proxy for Docker containers using docker-gen.<br>
  3944. </p>
  3945. ##### :black_small_square: Security
  3946. <p>
  3947. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/docker/docker-bench-security"><b>docker-bench-security</b></a> - checks for dozens of common best-practices around deploying Docker.<br>
  3948. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/aquasecurity/trivy"><b>trivy</b></a> - vulnerability scanner for containers, suitable for CI.<br>
  3949. &nbsp;&nbsp;:small_orange_diamond: <a href="https://goharbor.io/"><b>Harbor</b></a> - cloud native registry project that stores, signs, and scans content.<br>
  3950. </p>
  3951. ##### :black_small_square: Manuals/Tutorials/Best Practices
  3952. <p>
  3953. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/wsargent/docker-cheat-sheet"><b>docker-cheat-sheet</b></a> - a quick reference cheat sheet on Docker.<br>
  3954. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/veggiemonk/awesome-docker"><b>awesome-docker</b></a> - a curated list of Docker resources and projects.<br>
  3955. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/yeasy/docker_practice"><b>docker_practice</b></a> - learn and understand Docker technologies, with real DevOps practice!<br>
  3956. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/docker/labs"><b>labs
  3957. </b></a> - is a collection of tutorials for learning how to use Docker with various tools.<br>
  3958. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jessfraz/dockerfiles"><b>dockerfiles</b></a> - various Dockerfiles I use on the desktop and on servers.<br>
  3959. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/kelseyhightower/kubernetes-the-hard-way"><b>kubernetes-the-hard-way</b></a> - bootstrap Kubernetes the hard way on Google Cloud Platform. No scripts.<br>
  3960. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jamesward/kubernetes-the-easy-way"><b>kubernetes-the-easy-way</b></a> - bootstrap Kubernetes the easy way on Google Cloud Platform. No scripts.<br>
  3961. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dennyzhang/cheatsheet-kubernetes-A4"><b>cheatsheet-kubernetes-A4</b></a> - Kubernetes CheatSheets in A4.<br>
  3962. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/kabachook/k8s-security"><b>k8s-security</b></a> - kubernetes security notes and best practices.<br>
  3963. &nbsp;&nbsp;:small_orange_diamond: <a href="https://learnk8s.io/production-best-practices/"><b>kubernetes-production-best-practices</b></a> - checklists with best-practices for production-ready Kubernetes.<br>
  3964. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/freach/kubernetes-security-best-practice"><b>kubernetes-production-best-practices</b></a> - kubernetes security - best practice guide.<br>
  3965. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/hjacobs/kubernetes-failure-stories"><b>kubernetes-failure-stories</b></a> - is a compilation of public failure/horror stories related to Kubernetes.<br>
  3966. </p>
  3967. #### Manuals/Howtos/Tutorials &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  3968. ##### :black_small_square: Shell/Command line
  3969. <p>
  3970. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dylanaraps/pure-bash-bible"><b>pure-bash-bible</b></a> - is a collection of pure bash alternatives to external processes.<br>
  3971. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dylanaraps/pure-sh-bible"><b>pure-sh-bible</b></a> - is a collection of pure POSIX sh alternatives to external processes.<br>
  3972. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Idnan/bash-guide"><b>bash-guide</b></a> - is a guide to learn bash.<br>
  3973. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/denysdovhan/bash-handbook"><b>bash-handbook</b></a> - for those who wanna learn Bash.<br>
  3974. &nbsp;&nbsp;:small_orange_diamond: <a href="https://wiki.bash-hackers.org/start"><b>The Bash Hackers Wiki</b></a> - hold documentation of any kind about GNU Bash.<br>
  3975. &nbsp;&nbsp;:small_orange_diamond: <a href="http://pubs.opengroup.org/onlinepubs/9699919799/utilities/contents.html"><b>Shell & Utilities</b></a> - describes the commands offered to application programs by POSIX-conformant systems.<br>
  3976. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jlevy/the-art-of-command-line"><b>the-art-of-command-line</b></a> - master the command line, in one page.<br>
  3977. &nbsp;&nbsp;:small_orange_diamond: <a href="https://google.github.io/styleguide/shellguide.html"><b>Shell Style Guide</b></a> - a shell style guide for Google-originated open-source projects.<br>
  3978. </p>
  3979. ##### :black_small_square: Text Editors
  3980. <p>
  3981. &nbsp;&nbsp;:small_orange_diamond: <a href="https://vim.rtorr.com/"><b>Vim Cheat Sheet</b></a> - great multi language vim guide.<br>
  3982. </p>
  3983. ##### :black_small_square: Python
  3984. <p>
  3985. &nbsp;&nbsp;:small_orange_diamond: <a href="https://awesome-python.com/"><b>Awesome Python</b></a> - a curated list of awesome Python frameworks, libraries, software and resources.<br>
  3986. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/gto76/python-cheatsheet"><b>python-cheatsheet</b></a> - comprehensive Python cheatsheet.<br>
  3987. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.pythoncheatsheet.org/"><b>pythoncheatsheet.org</b></a> - basic reference for beginner and advanced developers.<br>
  3988. </p>
  3989. ##### :black_small_square: Sed & Awk & Other
  3990. <p>
  3991. &nbsp;&nbsp;:small_orange_diamond: <a href="https://posts.specterops.io/fawk-yeah-advanced-sed-and-awk-usage-parsing-for-pentesters-3-e5727e11a8ad?gi=c8f9506b26b6"><b>F’Awk Yeah!</b></a> - advanced sed and awk usage (Parsing for Pentesters 3).<br>
  3992. </p>
  3993. ##### :black_small_square: \*nix & Network
  3994. <p>
  3995. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.cyberciti.biz/"><b>nixCraft</b></a> - linux and unix tutorials for new and seasoned sysadmin.<br>
  3996. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.tecmint.com/"><b>TecMint</b></a> - the ideal Linux blog for Sysadmins & Geeks.<br>
  3997. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.omnisecu.com/index.php"><b>Omnisecu</b></a> - free Networking, System Administration and Security tutorials.<br>
  3998. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/cirosantilli/linux-cheat"><b>linux-cheat</b></a> - Linux tutorials and cheatsheets. Minimal examples. Mostly user-land CLI utilities.<br>
  3999. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/snori74/linuxupskillchallenge"><b>linuxupskillchallenge</b></a> - learn the skills required to sysadmin.<br>
  4000. &nbsp;&nbsp;:small_orange_diamond: <a href="http://cb.vu/unixtoolbox.xhtml"><b>Unix Toolbox</b></a> - Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users.<br>
  4001. &nbsp;&nbsp;:small_orange_diamond: <a href="https://linux-kernel-labs.github.io/refs/heads/master/index.html"><b>Linux Kernel Teaching</b></a> - is a collection of lectures and labs Linux kernel topics.<br>
  4002. &nbsp;&nbsp;:small_orange_diamond: <a href="https://peteris.rocks/blog/htop/"><b>htop explained</b></a> - explanation of everything you can see in htop/top on Linux.<br>
  4003. &nbsp;&nbsp;:small_orange_diamond: <a href="https://linuxguideandhints.com/"><b>Linux Guide and Hints</b></a> - tutorials on system administration in Fedora and CentOS.<br>
  4004. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/NanXiao/strace-little-book"><b>strace-little-book</b></a> - a little book which introduces strace.<br>
  4005. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/goldshtn/linux-tracing-workshop"><b>linux-tracing-workshop</b></a> - examples and hands-on labs for Linux tracing tools workshops.<br>
  4006. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/bagder/http2-explained"><b>http2-explained</b></a> - a detailed document explaining and documenting HTTP/2.<br>
  4007. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/bagder/http3-explained"><b>http3-explained</b></a> - a document describing the HTTP/3 and QUIC protocols.<br>
  4008. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.manning.com/books/http2-in-action"><b>HTTP/2 in Action</b></a> - an excellent introduction to the new HTTP/2 standard.<br>
  4009. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.saminiir.com/lets-code-tcp-ip-stack-1-ethernet-arp/"><b>Let's code a TCP/IP stack</b></a> - great stuff to learn network and system programming at a deeper level.<br>
  4010. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/trimstray/nginx-admins-handbook"><b>Nginx Admin's Handbook</b></a> - how to improve NGINX performance, security and other important things.<br>
  4011. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/digitalocean/nginxconfig.io"><b>nginxconfig.io</b></a> - NGINX config generator on steroids.<br>
  4012. &nbsp;&nbsp;:small_orange_diamond: <a href="https://infosec.mozilla.org/guidelines/openssh"><b>openssh guideline</b></a> - is to help operational teams with the configuration of OpenSSH server and client.<br>
  4013. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gravitational.com/blog/ssh-handshake-explained/"><b>SSH Handshake Explained</b></a> - is a relatively brief description of the SSH handshake.<br>
  4014. &nbsp;&nbsp;:small_orange_diamond: <a href="https://kb.isc.org/docs/using-this-knowledgebase"><b>ISC's Knowledgebase</b></a> - you'll find some general information about BIND 9, ISC DHCP, and Kea DHCP.<br>
  4015. &nbsp;&nbsp;:small_orange_diamond: <a href="https://packetlife.net/"><b>PacketLife.net</b></a> - a place to record notes while studying for Cisco's CCNP certification.<br>
  4016. </p>
  4017. ##### :black_small_square: Microsoft
  4018. <p>
  4019. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/infosecn1nja/AD-Attack-Defense"><b>AD-Attack-Defense</b></a> - attack and defend active directory using modern post exploitation activity.<br>
  4020. </p>
  4021. ##### :black_small_square: Large-scale systems
  4022. <p>
  4023. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/donnemartin/system-design-primer"><b>The System Design Primer</b></a> - learn how to design large-scale systems.<br>
  4024. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/binhnguyennus/awesome-scalability"><b>Awesome Scalability</b></a> - best practices in building High Scalability, High Availability, High Stability, and more.<br>
  4025. &nbsp;&nbsp;:small_orange_diamond: <a href="https://engineering.videoblocks.com/web-architecture-101-a3224e126947?gi=a896808d22a"><b>Web Architecture 101</b></a> - the basic architecture concepts.<br>
  4026. </p>
  4027. ##### :black_small_square: System hardening
  4028. <p>
  4029. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.cisecurity.org/cis-benchmarks/"><b>CIS Benchmarks</b></a> - secure configuration settings for over 100 technologies, available as a free PDF.<br>
  4030. &nbsp;&nbsp;:small_orange_diamond: <a href="https://highon.coffee/blog/security-harden-centos-7/"><b>Security Harden CentOS 7</b></a> - this walks you through the steps required to security harden CentOS.<br>
  4031. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.lisenet.com/2017/centos-7-server-hardening-guide/"><b>CentOS 7 Server Hardening Guide</b></a> - great guide for hardening CentOS; familiar with OpenSCAP.<br>
  4032. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/decalage2/awesome-security-hardening"><b>awesome-security-hardening</b></a> - is a collection of security hardening guides, tools and other resources.<br>
  4033. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/trimstray/the-practical-linux-hardening-guide"><b>The Practical Linux Hardening Guide</b></a> - provides a high-level overview of hardening GNU/Linux systems.<br>
  4034. &nbsp;&nbsp;:small_orange_diamond: <a href="https://madaidans-insecurities.github.io/guides/linux-hardening.html"><b>Linux Hardening Guide</b></a> - how to harden Linux as much as possible for security and privacy.<br>
  4035. </p>
  4036. ##### :black_small_square: Security & Privacy
  4037. <p>
  4038. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hackingarticles.in/"><b>Hacking Articles</b></a> - LRaj Chandel's Security & Hacking Blog.<br>
  4039. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/toniblyx/my-arsenal-of-aws-security-tools"><b>AWS security tools</b></a> - make your AWS cloud environment more secure.<br>
  4040. &nbsp;&nbsp;:small_orange_diamond: <a href="https://inventory.rawsec.ml/index.html"><b>Rawsec's CyberSecurity Inventory</b></a> - an inventory of tools and resources about CyberSecurity.<br>
  4041. &nbsp;&nbsp;:small_orange_diamond: <a href="https://tls.ulfheim.net/"><b>The Illustrated TLS Connection</b></a> - every byte of a TLS connection explained and reproduced.<br>
  4042. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/ssllabs/research/wiki/SSL-and-TLS-Deployment-Best-Practices"><b>SSL Research</b></a> - SSL and TLS Deployment Best Practices by SSL Labs.<br>
  4043. &nbsp;&nbsp;:small_orange_diamond: <a href="http://selinuxgame.org/index.html"><b>SELinux Game</b></a> - learn SELinux by doing. Solve Puzzles, show skillz.<br>
  4044. &nbsp;&nbsp;:small_orange_diamond: <a href="https://smallstep.com/blog/everything-pki.html"><b>Certificates and PKI</b></a> - everything you should know about certificates and PKI but are too afraid to ask.<br>
  4045. &nbsp;&nbsp;:small_orange_diamond: <a href="https://appsecco.com/books/subdomain-enumeration/"><b>The Art of Subdomain Enumeration</b></a> - a reference for subdomain enumeration techniques.<br>
  4046. &nbsp;&nbsp;:small_orange_diamond: <a href="https://lifehacker.com/the-comprehensive-guide-to-quitting-google-1830001964"><b>Quitting Google</b></a> - the comprehensive guide to quitting Google.<br>
  4047. </p>
  4048. ##### :black_small_square: Web Apps
  4049. <p>
  4050. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.owasp.org/index.php/Main_Page"><b>OWASP</b></a> - worldwide not-for-profit charitable organization focused on improving the security of software.<br>
  4051. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project"><b>OWASP ASVS 3.0.1</b></a> - OWASP Application Security Verification Standard Project.<br>
  4052. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Santandersecurityresearch/asvs"><b>OWASP ASVS 3.0.1 Web App</b></a> - simple web app that helps developers understand the ASVS requirements.<br>
  4053. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/OWASP/ASVS/tree/master/4.0"><b>OWASP ASVS 4.0</b></a> - is a list of application security requirements or tests.<br>
  4054. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.owasp.org/index.php/OWASP_Testing_Project"><b>OWASP Testing Guide v4</b></a> - includes a "best practice" penetration testing framework.<br>
  4055. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/OWASP/DevGuide"><b>OWASP Dev Guide</b></a> - this is the development version of the OWASP Developer Guide.<br>
  4056. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/OWASP/wstg"><b>OWASP WSTG</b></a> - is a comprehensive open source guide to testing the security of web apps.<br>
  4057. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.owasp.org/index.php/OWASP_API_Security_Project"><b>OWASP API Security Project</b></a> - focuses specifically on the top ten vulnerabilities in API security.<br>
  4058. &nbsp;&nbsp;:small_orange_diamond: <a href="https://infosec.mozilla.org/guidelines/web_security.html"><b>Mozilla Web Security</b></a> - help operational teams with creating secure web applications.<br>
  4059. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Netflix/security-bulletins"><b>security-bulletins</b></a> - security bulletins that relate to Netflix Open Source.<br>
  4060. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/shieldfy/API-Security-Checklist"><b>API-Security-Checklist</b></a> - security countermeasures when designing, testing, and releasing your API.<br>
  4061. &nbsp;&nbsp;:small_orange_diamond: <a href="https://enable-cors.org/index.html"><b>Enable CORS</b></a> - enable cross-origin resource sharing.<br>
  4062. &nbsp;&nbsp;:small_orange_diamond: <a href="https://appsecwiki.com/#/"><b>Application Security Wiki</b></a> - is an initiative to provide all application security related resources at one place.<br>
  4063. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/GrrrDog/weird_proxies/wiki"><b>Weird Proxies</b></a> - reverse proxy related attacks; it is a result of analysis of various proxies.<br>
  4064. &nbsp;&nbsp;:small_orange_diamond: <a href="https://dfir.it/blog/2015/08/12/webshell-every-time-the-same-purpose/"><b>Webshells</b></a> - great series about malicious payloads.<br>
  4065. &nbsp;&nbsp;:small_orange_diamond: <a href="https://portswigger.net/blog/practical-web-cache-poisoning"><b>Practical Web Cache Poisoning</b></a> - show you how to compromise websites by using esoteric web features.<br>
  4066. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/bl4de/research/tree/master/hidden_directories_leaks"><b>Hidden directories and files</b></a> - as a source of sensitive information about web application.<br>
  4067. &nbsp;&nbsp;:small_orange_diamond: <a href="https://bo0om.ru/en/"><b>Explosive blog</b></a> - great blog about cybersec and pentests.<br>
  4068. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.netsparker.com/security-cookies-whitepaper/"><b>Security Cookies</b></a> - this paper will take a close look at cookie security.<br>
  4069. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/GitGuardian/APISecurityBestPractices"><b>APISecurityBestPractices</b></a> - help you keep secrets (API keys, db credentials, certificates) out of source code.<br>
  4070. </p>
  4071. ##### :black_small_square: All-in-one
  4072. <p>
  4073. &nbsp;&nbsp;:small_orange_diamond: <a href="https://lzone.de/cheat-sheet/"><b>LZone Cheat Sheets</b></a> - all cheat sheets.<br>
  4074. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rstacruz/cheatsheets"><b>Dan’s Cheat Sheets’s</b></a> - massive cheat sheets documentation.<br>
  4075. &nbsp;&nbsp;:small_orange_diamond: <a href="https://devhints.io/"><b>Rico's cheatsheets</b></a> - this is a modest collection of cheatsheets.<br>
  4076. &nbsp;&nbsp;:small_orange_diamond: <a href="https://devdocs.io/"><b>DevDocs API</b></a> - combines multiple API documentations in a fast, organized, and searchable interface.<br>
  4077. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cheat.sh/"><b>cheat.sh</b></a> - the only cheat sheet you need.<br>
  4078. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gnulinux.guru/"><b>gnulinux.guru</b></a> - collection of cheat sheets about bash, vim and networking.<br>
  4079. </p>
  4080. ##### :black_small_square: Ebooks
  4081. <p>
  4082. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/EbookFoundation/free-programming-books"><b>free-programming-books</b></a> - list of free learning resources in many languages.<br>
  4083. </p>
  4084. ##### :black_small_square: Other
  4085. <p>
  4086. &nbsp;&nbsp;:small_orange_diamond: <a href="https://bitvijays.github.io/LFC-VulnerableMachines.html"><b>CTF Series : Vulnerable Machines</b></a> - the steps below could be followed to find vulnerabilities and exploits.<br>
  4087. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/manoelt/50M_CTF_Writeup"><b>50M_CTF_Writeup</b></a> - $50 million CTF from Hackerone - writeup.<br>
  4088. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/j00ru/ctf-tasks"><b>ctf-tasks</b></a> - an archive of low-level CTF challenges developed over the years.<br>
  4089. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hshrzd.wordpress.com/how-to-start/"><b>How to start RE/malware analysis?</b></a> - collection of some hints and useful links for the beginners.<br>
  4090. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.kegel.com/c10k.html"><b>The C10K problem</b></a> - it's time for web servers to handle ten thousand clients simultaneously, don't you think?<br>
  4091. &nbsp;&nbsp;:small_orange_diamond: <a href="https://blog.benjojo.co.uk/post/why-is-ethernet-mtu-1500"><b>How 1500 bytes became the MTU of the internet</b></a> - great story about the Maximum Transmission Unit.<br>
  4092. &nbsp;&nbsp;:small_orange_diamond: <a href="http://poormansprofiler.org/"><b>poor man's profiler</b></a> - like dtrace's don't really provide methods to see what programs are blocking on.<br>
  4093. &nbsp;&nbsp;:small_orange_diamond: <a href="https://nickcraver.com/blog/2017/05/22/https-on-stack-overflow/"><b>HTTPS on Stack Overflow</b></a> - this is the story of a long journey regarding the implementation of SSL.<br>
  4094. &nbsp;&nbsp;:small_orange_diamond: <a href="https://drawings.jvns.ca/"><b>Julia's Drawings</b></a> - some drawings about programming and unix world, zines about systems & debugging tools.<br>
  4095. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/corkami/collisions"><b>Hash collisions</b></a> - this great repository is focused on hash collisions exploitation.<br>
  4096. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/in3rsha/sha256-animation"><b>sha256-animation</b></a> - animation of the SHA-256 hash function in your terminal.<br>
  4097. &nbsp;&nbsp;:small_orange_diamond: <a href="https://labs.ripe.net/Members/cteusche/bgp-meets-cat"><b>BGP Meets Cat</b></a> - after 3072 hours of manipulating BGP, Job Snijders has succeeded in drawing a Nyancat.<br>
  4098. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/benjojo/bgp-battleships"><b>bgp-battleships</b></a> - playing battleships over BGP.<br>
  4099. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/alex/what-happens-when"><b>What happens when...</b></a> - you type google.com into your browser and press enter?<br>
  4100. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/vasanthk/how-web-works"><b>how-web-works</b></a> - based on the 'What happens when...' repository.<br>
  4101. &nbsp;&nbsp;:small_orange_diamond: <a href="https://robertheaton.com/2018/11/28/https-in-the-real-world/"><b>HTTPS in the real world</b></a> - great tutorial explain how HTTPS works in the real world.<br>
  4102. &nbsp;&nbsp;:small_orange_diamond: <a href="https://about.gitlab.com/2018/11/14/how-we-spent-two-weeks-hunting-an-nfs-bug/"><b>Gitlab and NFS bug</b></a> - how we spent two weeks hunting an NFS bug in the Linux kernel.<br>
  4103. &nbsp;&nbsp;:small_orange_diamond: <a href="https://about.gitlab.com/2017/02/10/postmortem-of-database-outage-of-january-31/"><b>Gitlab melts down</b></a> - postmortem on the database outage of January 31 2017 with the lessons we learned.<br>
  4104. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.catb.org/esr/faqs/hacker-howto.html"><b>How To Become A Hacker</b></a> - if you want to be a hacker, keep reading.<br>
  4105. &nbsp;&nbsp;:small_orange_diamond: <a href="http://ithare.com/infographics-operation-costs-in-cpu-clock-cycles/"><b>Operation Costs in CPU</b></a> - should help to estimate costs of certain operations in CPU clocks.<br>
  4106. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cstack.github.io/db_tutorial/"><b>Let's Build a Simple Database</b></a> - writing a sqlite clone from scratch in C.<br>
  4107. &nbsp;&nbsp;:small_orange_diamond: <a href="https://djhworld.github.io/post/2019/05/21/i-dont-know-how-cpus-work-so-i-simulated-one-in-code/"><b>simple-computer</b></a> - great resource to understand how computers work under the hood.<br>
  4108. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.troyhunt.com/working-with-154-million-records-on/"><b>The story of "Have I been pwned?"</b></a> - working with 154 million records on Azure Table Storage.<br>
  4109. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.top500.org/"><b>TOP500 Supercomputers</b></a> - shows the 500 most powerful commercially available computer systems known to us.<br>
  4110. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.shellntel.com/blog/2017/2/8/how-to-build-a-8-gpu-password-cracker"><b>How to build a 8 GPU password cracker</b></a> - any "black magic" or hours of frustration like desktop components do.<br>
  4111. &nbsp;&nbsp;:small_orange_diamond: <a href="https://home.cern/science/computing"><b>CERN Data Centre</b></a> - 3D visualizations of the CERN computing environments (and more).<br>
  4112. &nbsp;&nbsp;:small_orange_diamond: <a href="http://howfuckedismydatabase.com/"><b>How fucked is my database</b></a> - evaluate how fucked your database is with this handy website.<br>
  4113. &nbsp;&nbsp;:small_orange_diamond: <a href="https://krisbuytaert.be/blog/linux-troubleshooting-101-2016-edition/index.html"><b>Linux Troubleshooting 101 , 2016 Edition</b></a> - everything is a DNS Problem...<br>
  4114. &nbsp;&nbsp;:small_orange_diamond: <a href="https://open.buffer.com/5-whys-process/"><b>Five Whys</b></a> - you know what the problem is, but you cannot solve it?<br>
  4115. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gvnshtn.com/maersk-me-notpetya/"><b>Maersk, me & notPetya</b></a> - how did ransomware successfully hijack hundreds of domain controllers?<br>
  4116. &nbsp;&nbsp;:small_orange_diamond: <a href="https://howhttps.works/"><b>howhttps.works</b></a> - how HTTPS works ...in a comic!<br>
  4117. &nbsp;&nbsp;:small_orange_diamond: <a href="https://howdns.works/"><b>howdns.works</b></a> - a fun and colorful explanation of how DNS works.<br>
  4118. &nbsp;&nbsp;:small_orange_diamond: <a href="https://postgresqlco.nf/en/doc/param/"><b>POSTGRESQLCO.NF</b></a> - your postgresql.conf documentation and recommendations.<br>
  4119. </p>
  4120. #### Inspiring Lists &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  4121. ##### :black_small_square: SysOps/DevOps
  4122. <p>
  4123. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/kahun/awesome-sysadmin"><b>Awesome Sysadmin</b></a> - amazingly awesome open source sysadmin resources.<br>
  4124. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/alebcay/awesome-shell"><b>Awesome Shell</b></a> - awesome command-line frameworks, toolkits, guides and gizmos.<br>
  4125. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/learnbyexample/Command-line-text-processing"><b>Command-line-text-processing</b></a> - finding text to search and replace, sorting to beautifying, and more.<br>
  4126. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/caesar0301/awesome-pcaptools"><b>Awesome Pcaptools</b></a> - collection of tools developed by other researchers to process network traces.<br>
  4127. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/zoidbergwill/awesome-ebpf"><b>awesome-ebpf</b></a> - a curated list of awesome projects related to eBPF.<br>
  4128. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/leandromoreira/linux-network-performance-parameters"><b>Linux Network Performance</b></a> - where some of the network sysctl variables fit into the Linux/Kernel network flow.<br>
  4129. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dhamaniasad/awesome-postgres"><b>Awesome Postgres</b></a> - list of awesome PostgreSQL software, libraries, tools and resources.<br>
  4130. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/enochtangg/quick-SQL-cheatsheet"><b>quick-SQL-cheatsheet</b></a> - a quick reminder of all SQL queries and examples on how to use them.<br>
  4131. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Kickball/awesome-selfhosted"><b>Awesome-Selfhosted</b></a> - list of Free Software network services and web applications which can be hosted locally.<br>
  4132. &nbsp;&nbsp;:small_orange_diamond: <a href="https://wiki.archlinux.org/index.php/List_of_applications"><b>List of applications</b></a> - huge list of apps sorted by category, as a reference for those looking for packages.<br>
  4133. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/InterviewMap/CS-Interview-Knowledge-Map"><b>CS-Interview-Knowledge-Map</b></a> - build the best interview map.<br>
  4134. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Tikam02/DevOps-Guide"><b>DevOps-Guide</b></a> - DevOps Guide from basic to advanced with Interview Questions and Notes.<br>
  4135. &nbsp;&nbsp;:small_orange_diamond: <a href="https://issue.freebsdfoundation.org/publication/?m=33057&l=1&view=issuelistBrowser"><b>FreeBSD Journal</b></a> - it is a great list of periodical magazines about FreeBSD and other important things.<br>
  4136. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/bregman-arie/devops-interview-questions"><b>devops-interview-questions</b></a> - contains interview questions on various DevOps and SRE related topics.<br></p>
  4137. ##### :black_small_square: Developers
  4138. <p>
  4139. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/kamranahmedse/developer-roadmap"><b>Web Developer Roadmap</b></a> - roadmaps, articles and resources to help you choose your path, learn and improve.<br>
  4140. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/thedaviddias/Front-End-Checklist"><b>Front-End-Checklist</b></a> - the perfect Front-End Checklist for modern websites and meticulous developers.<br>
  4141. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/thedaviddias/Front-End-Performance-Checklist"><b>Front-End-Performance-Checklist</b></a> - Front-End Performance Checklist that runs faster than the others.<br>
  4142. &nbsp;&nbsp;:small_orange_diamond: <a href="https://rszalski.github.io/magicmethods/"><b>Python's Magic Methods</b></a> - what are magic methods? They're everything in object-oriented Python.<br>
  4143. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/satwikkansal/wtfpython"><b>wtfpython</b></a> - a collection of surprising Python snippets and lesser-known features.<br>
  4144. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/twhite96/js-dev-reads"><b>js-dev-reads</b></a> - a list of books and articles for the discerning web developer to read.<br>
  4145. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/RomuloOliveira/commit-messages-guide"><b>Commit messages guide</b></a> - a guide to understand the importance of commit messages.<br>
  4146. </p>
  4147. ##### :black_small_square: Security/Pentesting
  4148. <p>
  4149. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/qazbnm456/awesome-web-security"><b>Awesome Web Security</b></a> - a curated list of Web Security materials and resources.<br>
  4150. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/joe-shenouda/awesome-cyber-skills"><b>awesome-cyber-skills</b></a> - a curated list of hacking environments where you can train your cyber skills.<br>
  4151. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/devsecops/awesome-devsecops"><b>awesome-devsecops</b></a> - an authoritative list of awesome devsecops tools.<br>
  4152. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jivoi/awesome-osint"><b>awesome-osint</b></a> - is a curated list of amazingly awesome OSINT.<br>
  4153. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/HolyBugx/HolyTips"><b>HolyTips</b></a> - tips and tutorials on Bug Bounty Hunting and Web App Security.<br>
  4154. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/hslatman/awesome-threat-intelligence"><b>awesome-threat-intelligence</b></a> - a curated list of Awesome Threat Intelligence resources.<br>
  4155. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/infosecn1nja/Red-Teaming-Toolkit"><b>Red-Teaming-Toolkit</b></a> - a collection of open source and commercial tools that aid in red team operations.<br>
  4156. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/snoopysecurity/awesome-burp-extensions"><b>awesome-burp-extensions</b></a> - a curated list of amazingly awesome Burp Extensions.<br>
  4157. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Hack-with-Github/Free-Security-eBooks"><b>Free Security eBooks</b></a> - list of a Free Security and Hacking eBooks.<br>
  4158. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/yeahhub/Hacking-Security-Ebooks"><b>Hacking-Security-Ebooks</b></a> - top 100 Hacking & Security E-Books.<br>
  4159. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/nikitavoloboev/privacy-respecting"><b>privacy-respecting</b></a> - curated list of privacy respecting services and software.<br>
  4160. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/wtsxDev/reverse-engineering"><b>reverse-engineering</b></a> - list of awesome reverse engineering resources.<br>
  4161. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/michalmalik/linux-re-101"><b>linux-re-101</b></a> - a collection of resources for linux reverse engineering.<br>
  4162. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/onethawt/reverseengineering-reading-list"><b>reverseengineering-reading-list</b></a> - a list of Reverse Engineering articles, books, and papers.<br>
  4163. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/0xInfection/Awesome-WAF"><b>Awesome-WAF</b></a> - a curated list of awesome web-app firewall (WAF) stuff.<br>
  4164. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jakejarvis/awesome-shodan-queries"><b>awesome-shodan-queries</b></a> - interesting, funny, and depressing search queries to plug into shodan.io.<br>
  4165. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/danielmiessler/RobotsDisallowed"><b>RobotsDisallowed</b></a> - a curated list of the most common and most interesting robots.txt disallowed directories.<br>
  4166. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Kayzaks/HackingNeuralNetworks"><b>HackingNeuralNetworks</b></a> - is a small course on exploiting and defending neural networks.<br>
  4167. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gist.github.com/joepie91/7e5cad8c0726fd6a5e90360a754fc568"><b>wildcard-certificates</b></a> - why you probably shouldn't use a wildcard certificate.<br>
  4168. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gist.github.com/joepie91/5a9909939e6ce7d09e29"><b>Don't use VPN services</b></a> - which is what every third-party "VPN provider" does.<br>
  4169. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/InQuest/awesome-yara"><b>awesome-yara</b></a> - a curated list of awesome YARA rules, tools, and people.<br>
  4170. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/drduh/macOS-Security-and-Privacy-Guide"><b>macOS-Security-and-Privacy-Guide</b></a> - guide to securing and improving privacy on macOS.<br>
  4171. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/usnistgov/macos_security"><b>macos_security</b></a> - macOS Security Compliance Project.<br>
  4172. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/PaulSec/awesome-sec-talks"><b>awesome-sec-talks</b></a> - is a collected list of awesome security talks.<br>
  4173. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/k4m4/movies-for-hackers"><b>Movies for Hackers</b></a> - list of movies every hacker & cyberpunk must watch.<br>
  4174. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/danieldizzy/Cryptography_1"><b>Cryptography_1</b></a> - materials used whilst taking Prof. Dan Boneh Stanford Crypto course.<br>
  4175. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/ashutosh1206/Crypton"><b>Crypton</b></a> - library to learn and practice Offensive and Defensive Cryptography.<br>
  4176. </p>
  4177. ##### :black_small_square: Other
  4178. <p>
  4179. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.cheatography.com/"><b>Cheatography</b></a> - over 3,000 free cheat sheets, revision aids and quick references.<br>
  4180. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mre/awesome-static-analysis"><b>awesome-static-analysis</b></a> - static analysis tools for all programming languages.<br>
  4181. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/ossu/computer-science"><b>computer-science</b></a> - path to a free self-taught education in Computer Science.<br>
  4182. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/danluu/post-mortems"><b>post-mortems</b></a> - is a collection of postmortems (config errors, hardware failures, and more).<br>
  4183. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/danistefanovic/build-your-own-x"><b>build-your-own-x</b></a> - build your own (insert technology here).<br>
  4184. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rby90/Project-Based-Tutorials-in-C"><b>Project-Based-Tutorials-in-C</b></a> - is a curated list of project-based tutorials in C.<br>
  4185. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/kylelobo/The-Documentation-Compendium"><b>The-Documentation-Compendium</b></a> - various README templates & tips on writing high-quality documentation.<br>
  4186. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mahmoud/awesome-python-applications"><b>awesome-python-applications</b></a> - free software that works great, and also happens to be open-source Python.<br>
  4187. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/awesomedata/awesome-public-datasets"><b>awesome-public-datasets</b></a> - a topic-centric list of HQ open datasets.<br>
  4188. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Sahith02/machine-learning-algorithms"><b>machine-learning-algorithms</b></a> - a curated list of all machine learning algorithms and concepts.<br>
  4189. </p>
  4190. #### Blogs/Podcasts/Videos &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  4191. ##### :black_small_square: SysOps/DevOps
  4192. <p>
  4193. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.youtube.com/watch?v=nAFpkV5-vuI"><b>Varnish for PHP developers</b></a> - very interesting presentation of Varnish by Mattias Geniar.<br>
  4194. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.youtube.com/watch?v=CZ3wIuvmHeM"><b>A Netflix Guide to Microservices</b></a> - talks about the chaotic and vibrant world of microservices at Netflix.<br>
  4195. </p>
  4196. ##### :black_small_square: Developers
  4197. <p>
  4198. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.youtube.com/watch?v=yOyaJXpAYZQ"><b>Comparing C to machine lang</b></a> - compare a simple C app with the compiled machine code of that program.<br>
  4199. </p>
  4200. ##### :black_small_square: Geeky Persons
  4201. <p>
  4202. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.brendangregg.com/"><b>Brendan Gregg's Blog</b></a> - is an industry expert in computing performance and cloud computing.<br>
  4203. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gynvael.coldwind.pl/"><b>Gynvael "GynDream" Coldwind</b></a> - is a IT security engineer at Google.<br>
  4204. &nbsp;&nbsp;:small_orange_diamond: <a href="http://lcamtuf.coredump.cx/"><b>Michał "lcamtuf" Zalewski</b></a> - white hat hacker, computer security expert.<br>
  4205. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ma.ttias.be/"><b>Mattias Geniar</b></a> - developer, sysadmin, blogger, podcaster and public speaker.<br>
  4206. &nbsp;&nbsp;:small_orange_diamond: <a href="https://nickcraver.com/"><b>Nick Craver</b></a> - software developer and systems administrator for Stack Exchange.<br>
  4207. &nbsp;&nbsp;:small_orange_diamond: <a href="https://scotthelme.co.uk/"><b>Scott Helme</b></a> - security researcher, speaker and founder of securityheaders.com and report-uri.com.<br>
  4208. &nbsp;&nbsp;:small_orange_diamond: <a href="https://krebsonsecurity.com/"><b>Brian Krebs</b></a> - The Washington Post and now an Independent investigative journalist.<br>
  4209. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.schneier.com/"><b>Bruce Schneier</b></a> - is an internationally renowned security technologist, called a "security guru".<br>
  4210. &nbsp;&nbsp;:small_orange_diamond: <a href="https://chrissymorgan.co.uk/"><b>Chrissy Morgan</b></a> - advocate of practical learning, Chrissy also takes part in bug bounty programs.<br>
  4211. &nbsp;&nbsp;:small_orange_diamond: <a href="https://blog.zsec.uk/"><b>Andy Gill</b></a> - is a hacker at heart who works as a senior penetration tester.<br>
  4212. &nbsp;&nbsp;:small_orange_diamond: <a href="https://danielmiessler.com/"><b>Daniel Miessler</b></a> - cybersecurity expert and writer.<br>
  4213. &nbsp;&nbsp;:small_orange_diamond: <a href="https://samy.pl/"><b>Samy Kamkar</b></a> - is an American privacy and security researcher, computer hacker.<br>
  4214. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.j4vv4d.com/"><b>Javvad Malik</b></a> - is a security advocate at AlienVault, a blogger event speaker and industry commentator.<br>
  4215. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.grahamcluley.com/"><b>Graham Cluley</b></a> - public speaker and independent computer security analyst.<br>
  4216. &nbsp;&nbsp;:small_orange_diamond: <a href="https://security.szurek.pl/"><b>Kacper Szurek</b></a> - detection engineer at ESET.<br>
  4217. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.troyhunt.com/"><b>Troy Hunt</b></a> - web security expert known for public education and outreach on security topics.<br>
  4218. &nbsp;&nbsp;:small_orange_diamond: <a href="https://raymii.org/s/index.html"><b>raymii.org</b></a> - sysadmin specializing in building high availability cloud environments.<br>
  4219. &nbsp;&nbsp;:small_orange_diamond: <a href="https://robert.penz.name/"><b>Robert Penz</b></a> - IT security expert.<br>
  4220. </p>
  4221. ##### :black_small_square: Geeky Blogs
  4222. <p>
  4223. &nbsp;&nbsp;:small_orange_diamond: <a href="https://linux-audit.com/"><b>Linux Audit</b></a> - the Linux security blog about auditing, hardening and compliance by Michael Boelen.<br>
  4224. &nbsp;&nbsp;:small_orange_diamond: <a href="https://linuxsecurity.expert/"><b>
  4225. Linux Security Expert</b></a> - trainings, howtos, checklists, security tools, and more.<br>
  4226. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.grymoire.com/"><b>The Grymoire</b></a> - collection of useful incantations for wizards, be you computer wizards, magicians, or whatever.<br>
  4227. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.secjuice.com"><b>Secjuice</b></a> - is the only non-profit, independent and volunteer led publication in the information security space.<br>
  4228. &nbsp;&nbsp;:small_orange_diamond: <a href="https://duo.com/decipher"><b>Decipher</b></a> - security news that informs and inspires.<br>
  4229. </p>
  4230. ##### :black_small_square: Geeky Vendor Blogs
  4231. <p>
  4232. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.tenable.com/podcast"><b>Tenable Podcast</b></a> - conversations and interviews related to Cyber Exposure, and more.<br>
  4233. &nbsp;&nbsp;:small_orange_diamond: <a href="https://nakedsecurity.sophos.com/"><b>Sophos</b></a> - threat news room, giving you news, opinion, advice and research on computer security issues.<br>
  4234. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.tripwire.com/state-of-security/"><b>Tripwire State of Security</b></a> - blog featuring the latest news, trends and insights on current security issues.<br>
  4235. &nbsp;&nbsp;:small_orange_diamond: <a href="https://blog.malwarebytes.com/"><b>Malwarebytes Labs Blog</b></a> - security blog aims to provide insider news about cybersecurity.<br>
  4236. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.trustedsec.com/category/articles/"><b>TrustedSec</b></a> - latest news, and trends about cybersecurity.<br>
  4237. &nbsp;&nbsp;:small_orange_diamond: <a href="https://portswigger.net/blog"><b>PortSwigger Web Security Blog</b></a> - about web app security vulns and top tips from our team of web security.<br>
  4238. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.alienvault.com/blogs"><b>AT&T Cybersecurity blog</b></a> - news on emerging threats and practical advice to simplify threat detection.<br>
  4239. &nbsp;&nbsp;:small_orange_diamond: <a href="https://thycotic.com/company/blog/"><b>Thycotic</b></a> - where CISOs and IT Admins come to learn about industry trends, IT security, and more.<br>
  4240. </p>
  4241. ##### :black_small_square: Geeky Cybersecurity Podcasts
  4242. <p>
  4243. &nbsp;&nbsp;:small_orange_diamond: <a href="https://risky.biz/netcasts/risky-business/"><b>Risky Business</b></a> - is a weekly information security podcast featuring news and in-depth interviews.<br>
  4244. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.vice.com/en_us/topic/cyber"><b>Cyber, by Motherboard</b></a> - stories, and focus on the ideas about cybersecurity.<br>
  4245. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.tenable.com/podcast"><b>Tenable Podcast</b></a> - conversations and interviews related to Cyber Exposure, and more.<br>
  4246. &nbsp;&nbsp;:small_orange_diamond: <a href="https://podcasts.apple.com/gb/podcast/cybercrime-investigations/id1428801405"><b>
  4247. Cybercrime Investigations</b></a> - podcast by Geoff White about cybercrimes.<br>
  4248. &nbsp;&nbsp;:small_orange_diamond: <a href="https://themanyhats.club/tag/episodes/"><b>The many hats club</b></a> - featuring stories from a wide range of Infosec people (Whitehat, Greyhat and Blackhat).<br>
  4249. &nbsp;&nbsp;:small_orange_diamond: <a href="https://darknetdiaries.com/"><b>Darknet Diaries</b></a> - true stories from the dark side of the Internet.<br>
  4250. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.youtube.com/playlist?list=PL423I_gHbWUXah3dmt_q_XNp0NlGAKjis"><b>OSINTCurious Webcasts</b></a> - is the investigative curiosity that helps people be successful in OSINT.<br>
  4251. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.youtube.com/user/SecurityWeeklyTV"><b>Security Weekly</b></a> - the latest information security and hacking news.<br>
  4252. </p>
  4253. ##### :black_small_square: Geeky Cybersecurity Video Blogs
  4254. <p>
  4255. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.youtube.com/channel/UCzvJStjySZVvOBsPl-Vgj0g"><b>rev3rse security</b></a> - offensive, binary exploitation, web app security, hardening, red team, blue team.<br>
  4256. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w"><b>LiveOverflow</b></a> - a lot more advanced topics than what is typically offered in paid online courses - but for free.<br>
  4257. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.youtube.com/infoseccynic"><b>J4vv4D</b></a> - the important information regarding our internet security.<br>
  4258. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cybertalks.co.uk/"><b>
  4259. CyberTalks</b></a> - talks, interviews, and article about cybersecurity.<br>
  4260. </p>
  4261. ##### :black_small_square: Best Personal Twitter Accounts
  4262. <p>
  4263. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/blackroomsec"><b>@blackroomsec</b></a> - a white-hat hacker/pentester. Intergalactic Minesweeper Champion 1990.<br>
  4264. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/MarcoCiappelli"><b>@MarcoCiappelli</b></a> - Co-Founder @ITSPmagazine, at the intersection of IT security and society.<br>
  4265. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/binitamshah"><b>@binitamshah</b></a> - Linux Evangelist. Malwares. Kernel Dev. Security Enthusiast.<br>
  4266. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/joe_carson"><b>@joe_carson</b></a> - an InfoSec Professional and Tech Geek.<br>
  4267. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/mikko"><b>@mikko</b></a> - CRO at F-Secure, Reverse Engineer, TED Speaker, Supervillain.<br>
  4268. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/esrtweet"><b>@esrtweet</b></a> - often referred to as ESR, is an American software developer, and open-source software advocate.<br>
  4269. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/gynvael"><b>@gynvael</b></a> - security researcher/programmer, @DragonSectorCTF founder/player, technical streamer.<br>
  4270. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/x0rz"><b>@x0rz</b></a> - Security Researcher & Cyber Observer.<br>
  4271. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/hasherezade"><b>@hasherezade</b></a> - programmer, malware analyst. Author of PEbear, PEsieve, libPeConv.<br>
  4272. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/TinkerSec"><b>@TinkerSec</b></a> - tinkerer, cypherpunk, hacker.<br>
  4273. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/alisaesage"><b>@alisaesage</b></a> - independent hacker and researcher.<br>
  4274. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/SwiftOnSecurity"><b>@SwiftOnSecurity</b></a> - systems security, industrial safety, sysadmin, author of decentsecurity.com.<br>
  4275. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/dakami"><b>@dakami</b></a> - is one of just seven people with the authority to restore the DNS root keys.<br>
  4276. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/samykamkar"><b>@samykamkar</b></a> - is a famous "grey hat" hacker, security researcher, creator of the MySpace "Samy" worm.<br>
  4277. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/securityweekly"><b>@securityweekly</b></a> - founder & CTO of Security Weekly podcast network.<br>
  4278. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/jack_daniel"><b>@jack_daniel</b></a> - @SecurityBSides co-founder.<br>
  4279. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/thegrugq"><b>@thegrugq</b></a> - Security Researcher.<br>
  4280. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/matthew_d_green"><b>@matthew_d_green</b></a> - a cryptographer and professor at Johns Hopkins University.<br>
  4281. </p>
  4282. ##### :black_small_square: Best Commercial Twitter Accounts
  4283. <p>
  4284. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/haveibeenpwned"><b>@haveibeenpwned</b></a> - check if you have an account that has been compromised in a data breach.<br>
  4285. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/bugcrowd"><b>@bugcrowd</b></a> - trusted by more of the Fortune 500 than any other crowdsourced security platform.<br>
  4286. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/Malwarebytes"><b>@Malwarebytes</b></a> - most trusted security company. Unmatched threat visibility.<br>
  4287. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/sansforensics"><b>@sansforensics</b></a> - the world's leading Digital Forensics and Incident Response provider.<br>
  4288. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/attcyber"><b>@attcyber</b></a> - AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, and more.<br>
  4289. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/TheManyHatsClub"><b>@TheManyHatsClub</b></a> - an information security focused podcast and group of individuals from all walks of life.<br>
  4290. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/hedgehogsec"><b>@hedgehogsec</b></a> - Hedgehog Cyber. Gibraltar and Manchester's top boutique information security firm.<br>
  4291. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/NCSC"><b>@NCSC</b></a> - the National Cyber Security Centre. Helping to make the UK the safest place to live and work online.<br>
  4292. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/Synacktiv"><b>@Synacktiv</b></a> - IT security experts.<br>
  4293. </p>
  4294. ##### :black_small_square: A piece of history
  4295. <p>
  4296. &nbsp;&nbsp;:small_orange_diamond: <a href="http://ftp.arl.army.mil/~mike/howto/"><b>How to Do Things at ARL</b></a> - how to configure modems, scan images, record CD-ROMs, and other.<b>*</b><br>
  4297. </p>
  4298. ##### :black_small_square: Other
  4299. <p>
  4300. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.youtube.com/watch?v=3QnD2c4Xovk"><b>Diffie-Hellman Key Exchange (short version)</b></a> - how Diffie-Hellman Key Exchange worked.<br>
  4301. </p>
  4302. #### Hacking/Penetration Testing &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  4303. ##### :black_small_square: Pentesters arsenal tools
  4304. <p>
  4305. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.syhunt.com/sandcat/"><b>Sandcat Browser</b></a> - a penetration-oriented browser with plenty of advanced functionality already built in.<br>
  4306. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.metasploit.com/"><b>Metasploit</b></a> - tool and framework for pentesting system, web and many more, contains a lot a ready to use exploit.<br>
  4307. &nbsp;&nbsp;:small_orange_diamond: <a href="https://portswigger.net/burp"><b>Burp Suite</b></a> - tool for testing web app security, intercepting proxy to replay, inject, scan and fuzz.<br>
  4308. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project"><b>OWASP Zed Attack Proxy</b></a> - intercepting proxy to replay, inject, scan and fuzz HTTP requests.<br>
  4309. &nbsp;&nbsp;:small_orange_diamond: <a href="http://w3af.org/"><b>w3af</b></a> - is a Web Application Attack and Audit Framework.<br>
  4310. &nbsp;&nbsp;:small_orange_diamond: <a href="https://mitmproxy.org/"><b>mitmproxy</b></a> - an interactive TLS-capable intercepting HTTP proxy for penetration testers.<br>
  4311. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cirt.net/Nikto2"><b>Nikto2</b></a> - web server scanner which performs comprehensive tests against web servers for multiple items.<br>
  4312. &nbsp;&nbsp;:small_orange_diamond: <a href="http://sqlmap.org/"><b>sqlmap</b></a> - tool that automates the process of detecting and exploiting SQL injection flaws.<br>
  4313. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/lanmaster53/recon-ng"><b>Recon-ng</b></a> - is a full-featured Web Reconnaissance framework written in Python.<br>
  4314. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Tib3rius/AutoRecon"><b>AutoRecon</b></a> - is a network reconnaissance tool which performs automated enumeration of services.<br>
  4315. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.faradaysec.com/"><b>Faraday</b></a> - an Integrated Multiuser Pentest Environment.<br>
  4316. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/s0md3v/Photon"><b>Photon</b></a> - incredibly fast crawler designed for OSINT.<br>
  4317. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/s0md3v/XSStrike"><b>XSStrike</b></a> - most advanced XSS detection suite.<br>
  4318. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/1N3/Sn1per"><b>Sn1per</b></a> - automated pentest framework for offensive security experts.<br>
  4319. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/future-architect/vuls"><b>vuls</b></a> - is an agent-less vulnerability scanner for Linux, FreeBSD, and other.<br>
  4320. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/google/tsunami-security-scanner"><b>tsunami</b></a> - is a general purpose network security scanner with an extensible plugin system.<br>
  4321. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/michenriksen/aquatone"><b>aquatone</b></a> - a tool for domain flyovers.<br>
  4322. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/GitHackTools/BillCipher"><b>BillCipher</b></a> - information gathering tool for a website or IP address.<br>
  4323. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Ekultek/WhatWaf"><b>WhatWaf</b></a> - detect and bypass web application firewalls and protection systems.<br>
  4324. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/s0md3v/Corsy"><b>Corsy</b></a> - CORS misconfiguration scanner.<br>
  4325. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/evyatarmeged/Raccoon"><b>Raccoon</b></a> - is a high performance offensive security tool for reconnaissance and vulnerability scanning.<br>
  4326. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Nekmo/dirhunt"><b>dirhunt</b></a> - find web directories without bruteforce.<br>
  4327. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.openwall.com/john/"><b>John The Ripper</b></a> - is a fast password cracker, currently available for many flavors of Unix, Windows, and other.<br>
  4328. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hashcat.net/hashcat/"><b>hashcat</b></a> - world's fastest and most advanced password recovery utility.<br>
  4329. &nbsp;&nbsp;:small_orange_diamond: <a href="http://lcamtuf.coredump.cx/p0f3/"><b>p0f</b></a> - is a tool to identify the players behind any incidental TCP/IP communications.<br>
  4330. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/mozilla/ssh_scan"><b>ssh_scan</b></a> - a prototype SSH configuration and policy scanner.<br>
  4331. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/woj-ciech/LeakLooker"><b>LeakLooker</b></a> - find open databases - powered by Binaryedge.io<br>
  4332. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/offensive-security/exploitdb"><b>exploitdb</b></a> - searchable archive from The Exploit Database.<br>
  4333. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/vulnersCom/getsploit"><b>getsploit</b></a> - is a command line utility for searching and downloading exploits.<br>
  4334. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/zardus/ctf-tools"><b>ctf-tools</b></a> - some setup scripts for security research tools.<br>
  4335. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Gallopsled/pwntools"><b>pwntools</b></a> - CTF framework and exploit development library.<br>
  4336. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/bl4de/security-tools"><b>security-tools</b></a> - collection of small security tools created mostly in Python. CTFs, pentests and so on.<br>
  4337. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/leonteale/pentestpackage"><b>pentestpackage</b></a> - is a package of Pentest scripts.<br>
  4338. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/dloss/python-pentest-tools"><b>python-pentest-tools</b></a> - python tools for penetration testers.<br>
  4339. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/fuzzdb-project/fuzzdb"><b>fuzzdb</b></a> - dictionary of attack patterns and primitives for black-box application fault injection.<br>
  4340. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/google/AFL"><b>AFL</b></a> - is a free software fuzzer maintained by Google.<br>
  4341. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/AFLplusplus/AFLplusplus"><b>AFL++</b></a> - is AFL with community patches.<br>
  4342. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/google/syzkaller"><b>syzkaller</b></a> - is an unsupervised, coverage-guided kernel fuzzer.<br>
  4343. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/pwndbg/pwndbg"><b>pwndbg</b></a> - exploit development and reverse engineering with GDB made easy.<br>
  4344. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/longld/peda"><b>GDB PEDA</b></a> - Python Exploit Development Assistance for GDB.<br>
  4345. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hex-rays.com/products/ida/index.shtml"><b>IDA</b></a> - multi-processor disassembler and debugger useful for reverse engineering malware.<br>
  4346. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/radare/radare2"><b>radare2</b></a> - framework for reverse-engineering and analyzing binaries.<br>
  4347. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/threat9/routersploit"><b>routersploit</b></a> - exploitation framework for embedded devices.<br>
  4348. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/NationalSecurityAgency/ghidra"><b>Ghidra</b></a> - is a software reverse engineering (SRE) framework.<br>
  4349. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cutter.re/"><b>Cutter</b></a> - is an SRE platform integrating Ghidra's decompiler.<br>
  4350. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/salesforce/vulnreport"><b>Vulnreport</b></a> - open-source pentesting management and automation platform by Salesforce Product Security.<br>
  4351. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/sc0tfree/mentalist"><b>Mentalist</b></a> - is a graphical tool for custom wordlist generation.<br>
  4352. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/archerysec/archerysec"><b>archerysec</b></a> - vulnerability assessment and management helps to perform scans and manage vulnerabilities.<br>
  4353. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/j3ssie/Osmedeus"><b>Osmedeus</b></a> - fully automated offensive security tool for reconnaissance and vulnerability scanning.<br>
  4354. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/beefproject/beef"><b>beef</b></a> - the browser exploitation framework project.<br>
  4355. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/NullArray/AutoSploit"><b>AutoSploit</b></a> - automated mass exploiter.<br>
  4356. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/TH3xACE/SUDO_KILLER"><b>SUDO_KILLER</b></a> - is a tool to identify and exploit sudo rules' misconfigurations and vulnerabilities.<br>
  4357. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/VirusTotal/yara"><b>yara</b></a> - the pattern matching swiss knife.<br>
  4358. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/gentilkiwi/mimikatz"><b>mimikatz</b></a> - a little tool to play with Windows security.<br>
  4359. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/sherlock-project/sherlock"><b>sherlock</b></a> - hunt down social media accounts by username across social networks.<br>
  4360. &nbsp;&nbsp;:small_orange_diamond: <a href="https://owasp.org/www-project-threat-dragon/"><b>OWASP Threat Dragon</b></a> - is a tool used to create threat model diagrams and to record possible threats.<br>
  4361. </p>
  4362. ##### :black_small_square: Pentests bookmarks collection
  4363. <p>
  4364. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.pentest-standard.org/index.php/Main_Page"><b>PTES</b></a> - the penetration testing execution standard.<br>
  4365. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.amanhardikar.com/mindmaps/Practice.html"><b>Pentests MindMap</b></a> - amazing mind map with vulnerable apps and systems.<br>
  4366. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.amanhardikar.com/mindmaps/webapptest.html"><b>WebApps Security Tests MindMap</b></a> - incredible mind map for WebApps security tests.<br>
  4367. &nbsp;&nbsp;:small_orange_diamond: <a href="https://brutelogic.com.br/blog/"><b>Brute XSS</b></a> - master the art of Cross Site Scripting.<br>
  4368. &nbsp;&nbsp;:small_orange_diamond: <a href="https://portswigger.net/web-security/cross-site-scripting/cheat-sheet"><b>XSS cheat sheet</b></a> - contains many vectors that can help you bypass WAFs and filters.<br>
  4369. &nbsp;&nbsp;:small_orange_diamond: <a href="https://jivoi.github.io/2015/07/03/offensive-security-bookmarks/"><b>Offensive Security Bookmarks</b></a> - security bookmarks collection, all things that author need to pass OSCP.<br>
  4370. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/coreb1t/awesome-pentest-cheat-sheets"><b>Awesome Pentest Cheat Sheets</b></a> - collection of the cheat sheets useful for pentesting.<br>
  4371. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Hack-with-Github/Awesome-Hacking"><b>Awesome Hacking by HackWithGithub</b></a> - awesome lists for hackers, pentesters and security researchers.<br>
  4372. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/carpedm20/awesome-hacking"><b>Awesome Hacking by carpedm20</b></a> - a curated list of awesome hacking tutorials, tools and resources.<br>
  4373. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/vitalysim/Awesome-Hacking-Resources"><b>Awesome Hacking Resources</b></a> - collection of hacking/penetration testing resources to make you better.<br>
  4374. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/enaqx/awesome-pentest"><b>Awesome Pentest</b></a> - collection of awesome penetration testing resources, tools and other shiny things.<br>
  4375. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/m4ll0k/Awesome-Hacking-Tools"><b>Awesome-Hacking-Tools</b></a> - is a curated list of awesome Hacking Tools.<br>
  4376. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/ksanchezcld/Hacking_Cheat_Sheet"><b>Hacking Cheat Sheet</b></a> - author hacking and pentesting notes.<br>
  4377. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/toolswatch/blackhat-arsenal-tools"><b>blackhat-arsenal-tools</b></a> - official Black Hat arsenal security tools repository.<br>
  4378. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.peerlyst.com/posts/the-complete-list-of-infosec-related-cheat-sheets-claus-cramon"><b>Penetration Testing and WebApp Cheat Sheets</b></a> - the complete list of Infosec related cheat sheets.<br>
  4379. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/The-Art-of-Hacking/h4cker"><b>Cyber Security Resources</b></a> - includes thousands of cybersecurity-related references and resources.<br>
  4380. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jhaddix/pentest-bookmarks"><b>Pentest Bookmarks</b></a> - there are a LOT of pentesting blogs.<br>
  4381. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/OlivierLaflamme/Cheatsheet-God"><b>Cheatsheet-God</b></a> - Penetration Testing Reference Bank - OSCP/PTP & PTX Cheatsheet.<br>
  4382. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Cyb3rWard0g/ThreatHunter-Playbook"><b>ThreatHunter-Playbook</b></a> - to aid the development of techniques and hypothesis for hunting campaigns.<br>
  4383. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/hmaverickadams/Beginner-Network-Pentesting"><b>Beginner-Network-Pentesting</b></a> - notes for beginner network pentesting course.<br>
  4384. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rewardone/OSCPRepo"><b>OSCPRepo</b></a> - is a list of resources that author have been gathering in preparation for the OSCP.<br>
  4385. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/swisskyrepo/PayloadsAllTheThings"><b>PayloadsAllTheThings</b></a> - a list of useful payloads and bypass for Web Application Security and Pentest/CTF.<br>
  4386. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/foospidy/payloads"><b>payloads</b></a> - git all the Payloads! A collection of web attack payloads.<br>
  4387. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/payloadbox/command-injection-payload-list"><b>command-injection-payload-list</b></a> - command injection payload list.<br>
  4388. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/jakejarvis/awesome-shodan-queries"><b>Awesome Shodan Search Queries</b></a> - great search queries to plug into Shodan.<br>
  4389. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/s0md3v/AwesomeXSS"><b>AwesomeXSS</b></a> - is a collection of Awesome XSS resources.<br>
  4390. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/JohnTroony/php-webshells"><b>php-webshells</b></a> - common php webshells.<br>
  4391. &nbsp;&nbsp;:small_orange_diamond: <a href="https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/"><b>Pentesting Tools Cheat Sheet</b></a> - a quick reference high level overview for typical penetration testing.<br>
  4392. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cheatsheetseries.owasp.org/"><b>OWASP Cheat Sheet Series</b></a> - is a collection of high value information on specific application security topics.<br>
  4393. &nbsp;&nbsp;:small_orange_diamond: <a href="https://jeremylong.github.io/DependencyCheck/index.html"><b>OWASP dependency-check</b></a> - is an open source solution the OWASP Top 10 2013 entry.<br>
  4394. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.owasp.org/index.php/OWASP_Proactive_Controls"><b>OWASP ProActive Controls</b></a> - OWASP Top 10 Proactive Controls 2018.<br>
  4395. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE"><b>PENTESTING-BIBLE</b></a> - hacking & penetration testing & red team & cyber security resources.<br>
  4396. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/nixawk/pentest-wiki"><b>pentest-wiki</b></a> - is a free online security knowledge library for pentesters/researchers.<br>
  4397. &nbsp;&nbsp;:small_orange_diamond: <a href="https://media.defcon.org/"><b>DEF CON Media Server</b></a> - great stuff from DEFCON.<br>
  4398. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rshipp/awesome-malware-analysis"><b>Awesome Malware Analysis</b></a> - a curated list of awesome malware analysis tools and resources.<br>
  4399. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/"><b>SQL Injection Cheat Sheet</b></a> - detailed technical stuff about the many different variants of the SQL Injection.<br>
  4400. &nbsp;&nbsp;:small_orange_diamond: <a href="http://kb.entersoft.co.in/"><b>Entersoft Knowledge Base</b></a> - great and detailed reference about vulnerabilities.<br>
  4401. &nbsp;&nbsp;:small_orange_diamond: <a href="http://html5sec.org/"><b>HTML5 Security Cheatsheet</b></a> - a collection of HTML5 related XSS attack vectors.<br>
  4402. &nbsp;&nbsp;:small_orange_diamond: <a href="http://evuln.com/tools/xss-encoder/"><b>XSS String Encoder</b></a> - for generating XSS code to check your input validation filters against XSS.<br>
  4403. &nbsp;&nbsp;:small_orange_diamond: <a href="https://gtfobins.github.io/"><b>GTFOBins</b></a> - list of Unix binaries that can be exploited by an attacker to bypass local security restrictions.<br>
  4404. &nbsp;&nbsp;:small_orange_diamond: <a href="https://guif.re/"><b>Guifre Ruiz Notes</b></a> - collection of security, system, network and pentest cheatsheets.<br>
  4405. &nbsp;&nbsp;:small_orange_diamond: <a href="http://blog.safebuff.com/2016/07/03/SSRF-Tips/index.html"><b>SSRF Tips</b></a> - a collection of SSRF Tips.<br>
  4406. &nbsp;&nbsp;:small_orange_diamond: <a href="http://shell-storm.org/repo/CTF/"><b>shell-storm repo CTF</b></a> - great archive of CTFs.<br>
  4407. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/bl4de/ctf"><b>ctf</b></a> - CTF (Capture The Flag) writeups, code snippets, notes, scripts.<br>
  4408. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/orangetw/My-CTF-Web-Challenges"><b>My-CTF-Web-Challenges</b></a> - collection of CTF Web challenges.<br>
  4409. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/OWASP/owasp-mstg"><b>MSTG</b></a> - The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security testing.<br>
  4410. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/sdcampbell/Internal-Pentest-Playbook"><b>Internal-Pentest-Playbook</b></a> - notes on the most common things for an Internal Network Penetration Test.<br>
  4411. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/streaak/keyhacks"><b>KeyHacks</b></a> - shows quick ways in which API keys leaked by a bug bounty program can be checked.<br>
  4412. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/securitum/research"><b>securitum/research</b></a> - various Proof of Concepts of security research performed by Securitum.<br>
  4413. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/juliocesarfort/public-pentesting-reports"><b>public-pentesting-reports</b></a> - is a list of public pentest reports released by several consulting security groups.<br>
  4414. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/djadmin/awesome-bug-bounty"><b>awesome-bug-bounty</b></a> - is a comprehensive curated list of available Bug Bounty.<br>
  4415. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/ngalongc/bug-bounty-reference"><b>bug-bounty-reference</b></a> - is a list of bug bounty write-ups.<br>
  4416. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/devanshbatham/Awesome-Bugbounty-Writeups"><b>Awesome-Bugbounty-Writeups</b></a> - is a curated list of bugbounty writeups.<br>
  4417. &nbsp;&nbsp;:small_orange_diamond: <a href="https://pentester.land/list-of-bug-bounty-writeups.html"><b>Bug bounty writeups</b></a> - list of bug bounty writeups (2012-2020).<br>
  4418. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hackso.me/"><b>hackso.me</b></a> - a great journey into security.<br>
  4419. </p>
  4420. ##### :black_small_square: Backdoors/exploits
  4421. <p>
  4422. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/bartblaze/PHP-backdoors"><b>PHP-backdoors</b></a> - a collection of PHP backdoors. For educational or testing purposes only.<br>
  4423. </p>
  4424. ##### :black_small_square: Wordlists and Weak passwords
  4425. <p>
  4426. &nbsp;&nbsp;:small_orange_diamond: <a href="https://weakpass.com/"><b>Weakpass</b></a> - for any kind of bruteforce find wordlists or unleash the power of them all at once!<br>
  4427. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hashes.org/"><b>Hashes.org</b></a> - is a free online hash resolving service incorporating many unparalleled techniques.<br>
  4428. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/danielmiessler/SecLists"><b>SecLists</b></a> - collection of multiple types of lists used during security assessments, collected in one place.<br>
  4429. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/berzerk0/Probable-Wordlists"><b>Probable-Wordlists</b></a> - sorted by probability originally created for password generation and testing.<br>
  4430. &nbsp;&nbsp;:small_orange_diamond: <a href="https://wiki.skullsecurity.org/index.php?title=Passwords"><b>skullsecurity passwords</b></a> - password dictionaries and leaked passwords repository.<br>
  4431. &nbsp;&nbsp;:small_orange_diamond: <a href="https://bezpieka.org/polski-slownik-premium-polish-wordlist"><b>Polish PREMIUM Dictionary</b></a> - official dictionary created by the team on the forum bezpieka.org.<b>*</b> <sup><a href="https://sourceforge.net/projects/kali-linux/files/Wordlist/">1</sup><br>
  4432. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/insidetrust/statistically-likely-usernames"><b>statistically-likely-usernames</b></a> - wordlists for creating statistically likely username lists.<br>
  4433. </p>
  4434. ##### :black_small_square: Bounty platforms
  4435. <p>
  4436. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.yeswehack.com/"><b>YesWeHack</b></a> - bug bounty platform with infosec jobs.<br>
  4437. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.openbugbounty.org/"><b>Openbugbounty</b></a> - allows any security researcher reporting a vulnerability on any website.<br>
  4438. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hackerone.com/"><b>hackerone</b></a> - global hacker community to surface the most relevant security issues.<br>
  4439. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.bugcrowd.com/"><b>bugcrowd</b></a> - crowdsourced cybersecurity for the enterprise.<br>
  4440. &nbsp;&nbsp;:small_orange_diamond: <a href="https://crowdshield.com/"><b>Crowdshield</b></a> - crowdsourced security & bug bounty management.<br>
  4441. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.synack.com/"><b>Synack</b></a> - crowdsourced security & bug bounty programs, crowd security intelligence platform, and more.<br>
  4442. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hacktrophy.com/en/"><b>Hacktrophy</b></a> - bug bounty platform.<br>
  4443. </p>
  4444. ##### :black_small_square: Web Training Apps (local installation)
  4445. <p>
  4446. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project"><b>OWASP-VWAD</b></a> - comprehensive and well maintained registry of all known vulnerable web applications.<br>
  4447. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.dvwa.co.uk/"><b>DVWA</b></a> - PHP/MySQL web application that is damn vulnerable.<br>
  4448. &nbsp;&nbsp;:small_orange_diamond: <a href="https://metasploit.help.rapid7.com/docs/metasploitable-2"><b>metasploitable2</b></a> - vulnerable web application amongst security researchers.<br>
  4449. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rapid7/metasploitable3"><b>metasploitable3</b></a> - is a VM that is built from the ground up with a large amount of security vulnerabilities.<br>
  4450. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/stamparm/DSVW"><b>DSVW</b></a> - is a deliberately vulnerable web application written in under 100 lines of code.<br>
  4451. &nbsp;&nbsp;:small_orange_diamond: <a href="https://sourceforge.net/projects/mutillidae/"><b>OWASP Mutillidae II</b></a> - free, open source, deliberately vulnerable web-application.<br>
  4452. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.owasp.org/index.php/OWASP_Juice_Shop_Project"><b>OWASP Juice Shop Project</b></a> - the most bug-free vulnerable application in existence.<br>
  4453. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.owasp.org/index.php/Projects/OWASP_Node_js_Goat_Project"><b>OWASP Node js Goat Project</b></a> - OWASP Top 10 security risks apply to web apps developed using Node.js.<br>
  4454. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/iteratec/juicy-ctf"><b>juicy-ctf</b></a> - run Capture the Flags and Security Trainings with OWASP Juice Shop.<br>
  4455. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/OWASP/SecurityShepherd"><b>SecurityShepherd</b></a> - web and mobile application security training platform.<br>
  4456. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/opendns/Security_Ninjas_AppSec_Training"><b>Security Ninjas</b></a> - open source application security training program.<br>
  4457. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rapid7/hackazon"><b>hackazon</b></a> - a modern vulnerable web app.<br>
  4458. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/appsecco/dvna"><b>dvna</b></a> - damn vulnerable NodeJS application.<br>
  4459. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/DefectDojo/django-DefectDojo"><b>django-DefectDojo</b></a> - is an open-source application vulnerability correlation and security orchestration tool.<br>
  4460. &nbsp;&nbsp;:small_orange_diamond: <a href="https://google-gruyere.appspot.com/"><b>Google Gruyere</b></a> - web application exploits and defenses.<br>
  4461. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/amolnaik4/bodhi"><b>Bodhi</b></a> - is a playground focused on learning the exploitation of client-side web vulnerabilities.<br>
  4462. &nbsp;&nbsp;:small_orange_diamond: <a href="https://websploit.h4cker.org/"><b>Websploit</b></a> - single vm lab with the purpose of combining several vulnerable appliations in one environment.<br>
  4463. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/vulhub/vulhub"><b>vulhub</b></a> - pre-built Vulnerable Environments based on docker-compose.<br>
  4464. &nbsp;&nbsp;:small_orange_diamond: <a href="https://rhinosecuritylabs.com/aws/introducing-cloudgoat-2/"><b>CloudGoat 2</b></a> - the new & improved "Vulnerable by Design"
  4465. AWS deployment tool.<br>
  4466. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/globocom/secDevLabs"><b>secDevLabs</b></a> - is a laboratory for learning secure web development in a practical manner.<br>
  4467. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/incredibleindishell/CORS-vulnerable-Lab"><b>CORS-vulnerable-Lab</b></a> - sample vulnerable code and its exploit code.<br>
  4468. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/moloch--/RootTheBox"><b>RootTheBox</b></a> - a Game of Hackers (CTF Scoreboard & Game Manager).<br>
  4469. &nbsp;&nbsp;:small_orange_diamond: <a href="https://application.security/"><b>KONTRA</b></a> - application security training (OWASP Top Web & Api).<br>
  4470. </p>
  4471. ##### :black_small_square: Labs (ethical hacking platforms/trainings/CTFs)
  4472. <p>
  4473. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.offensive-security.com/"><b>Offensive Security</b></a> - true performance-based penetration testing training for over a decade.<br>
  4474. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hackthebox.eu/"><b>Hack The Box</b></a> - online platform allowing you to test your penetration testing skills.<br>
  4475. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hacking-lab.com/index.html"><b>Hacking-Lab</b></a> - online ethical hacking, computer network and security challenge platform.<br>
  4476. &nbsp;&nbsp;:small_orange_diamond: <a href="http://pwnable.kr/index.php"><b>pwnable.kr</b></a> - non-commercial wargame site which provides various pwn challenges.<br>
  4477. &nbsp;&nbsp;:small_orange_diamond: <a href="https://pwnable.tw/"><b>Pwnable.tw</b></a> - is a wargame site for hackers to test and expand their binary exploiting skills.<br>
  4478. &nbsp;&nbsp;:small_orange_diamond: <a href="https://picoctf.com/"><b>picoCTF</b></a> - is a free computer security game targeted at middle and high school students.<br>
  4479. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ctflearn.com/"><b>CTFlearn</b></a> - is an online platform built to help ethical hackers learn and practice their cybersecurity knowledge.<br>
  4480. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ctftime.org/"><b>ctftime</b></a> - CTF archive and a place, where you can get some another CTF-related info.<br>
  4481. &nbsp;&nbsp;:small_orange_diamond: <a href="https://silesiasecuritylab.com/"><b>Silesia Security Lab</b></a> - high quality security testing services.<br>
  4482. &nbsp;&nbsp;:small_orange_diamond: <a href="https://practicalpentestlabs.com/"><b>Practical Pentest Labs</b></a> - pentest lab, take your Hacking skills to the next level.<br>
  4483. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.root-me.org/?lang=en"><b>Root Me</b></a> - the fast, easy, and affordable way to train your hacking skills.<br>
  4484. &nbsp;&nbsp;:small_orange_diamond: <a href="https://rozwal.to/login"><b>rozwal.to</b></a> - a great platform to train your pentesting skills.<br>
  4485. &nbsp;&nbsp;:small_orange_diamond: <a href="https://tryhackme.com/"><b>TryHackMe</b></a> - learning Cyber Security made easy.<br>
  4486. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hackxor.net/"><b>hackxor</b></a> - is a realistic web application hacking game, designed to help players of all abilities develop their skills.<br>
  4487. &nbsp;&nbsp;:small_orange_diamond: <a href="http://hack-yourself-first.com/"><b>Hack Yourself First</b></a> - it's full of nasty app sec holes.<br>
  4488. &nbsp;&nbsp;:small_orange_diamond: <a href="http://overthewire.org/wargames/"><b>OverTheWire</b></a> - can help you to learn and practice security concepts in the form of fun-filled games.<br>
  4489. &nbsp;&nbsp;:small_orange_diamond: <a href="https://labs.wizard-security.net/"><b>Wizard Labs</b></a> - is an online Penetration Testing Lab.<br>
  4490. &nbsp;&nbsp;:small_orange_diamond: <a href="https://pentesterlab.com/"><b>PentesterLab</b></a> - provides vulnerable systems that can be used to test and understand vulnerabilities.<br>
  4491. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ringzer0ctf.com/"><b>RingZer0</b></a> - tons of challenges designed to test and improve your hacking skills.<br>
  4492. &nbsp;&nbsp;:small_orange_diamond: <a href="http://www.try2hack.nl/"><b>try2hack</b></a> - several security-oriented challenges for your entertainment.<br>
  4493. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.ubeeri.com/preconfig-labs"><b>Ubeeri</b></a> - preconfigured lab environments.<br>
  4494. &nbsp;&nbsp;:small_orange_diamond: <a href="https://lab.pentestit.ru/"><b>Pentestit</b></a> - emulate IT infrastructures of real companies for legal pen testing and improving pentest skills.<br>
  4495. &nbsp;&nbsp;:small_orange_diamond: <a href="https://microcorruption.com/login"><b>Microcorruption</b></a> - reversal challenges done in the web interface.<br>
  4496. &nbsp;&nbsp;:small_orange_diamond: <a href="https://crackmes.one/"><b>Crackmes</b></a> - download crackmes to help improve your reverse engineering skills.<br>
  4497. &nbsp;&nbsp;:small_orange_diamond: <a href="https://domgo.at/cxss/intro"><b>DomGoat</b></a> - DOM XSS security learning and practicing platform.<br>
  4498. &nbsp;&nbsp;:small_orange_diamond: <a href="https://chall.stypr.com"><b>Stereotyped Challenges</b></a> - upgrade your web hacking techniques today!<br>
  4499. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.vulnhub.com/"><b>Vulnhub</b></a> - allows anyone to gain practical 'hands-on' experience in digital security.<br>
  4500. &nbsp;&nbsp;:small_orange_diamond: <a href="https://w3challs.com/"><b>W3Challs</b></a> - is a penetration testing training platform, which offers various computer challenges.<br>
  4501. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ringzer0ctf.com/challenges"><b>RingZer0 CTF</b></a> - offers you tons of challenges designed to test and improve your hacking skills.<br>
  4502. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hack.me/"><b>Hack.me</b></a> - a platform where you can build, host and share vulnerable web apps for educational purposes.<br>
  4503. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hackthis.co.uk/levels/"><b>HackThis!</b></a> - discover how hacks, dumps and defacements are performed and secure your website.<br>
  4504. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.enigmagroup.org/#"><b>Enigma Group WebApp Training</b></a> - these challenges cover the exploits listed in the OWASP Top 10 Project.<br>
  4505. &nbsp;&nbsp;:small_orange_diamond: <a href="https://challenges.re/"><b>Reverse Engineering Challenges</b></a> - challenges, exercises, problems and tasks - by level, by type, and more.<br>
  4506. &nbsp;&nbsp;:small_orange_diamond: <a href="https://0x00sec.org/"><b>0x00sec</b></a> - the home of the Hacker - Malware, Reverse Engineering, and Computer Science.<br>
  4507. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.wechall.net/challs"><b>We Chall</b></a> - there are exist a lots of different challenge types.<br>
  4508. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hackergateway.com/"><b>Hacker Gateway</b></a> - is the go-to place for hackers who want to test their skills.<br>
  4509. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hacker101.com/"><b>Hacker101</b></a> - is a free class for web security.<br>
  4510. &nbsp;&nbsp;:small_orange_diamond: <a href="https://contained.af/"><b>contained.af</b></a> - a stupid game for learning about containers, capabilities, and syscalls.<br>
  4511. &nbsp;&nbsp;:small_orange_diamond: <a href="http://flaws.cloud/"><b>flAWS challenge!</b></a> - a series of levels you'll learn about common mistakes and gotchas when using AWS.<br>
  4512. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cybersecurity.wtf"><b>CyberSec WTF</b></a> - provides web hacking challenges derived from bounty write-ups.<br>
  4513. &nbsp;&nbsp;:small_orange_diamond: <a href="https://ctfchallenge.co.uk/login"><b>CTF Challenge</b></a> - CTF Web App challenges.<br>
  4514. &nbsp;&nbsp;:small_orange_diamond: <a href="https://capturetheflag.withgoogle.com"><b>gCTF</b></a> - most of the challenges used in the Google CTF 2017.<br>
  4515. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.hackthissite.org/pages/index/index.php"><b>Hack This Site</b></a> - is a free, safe and legal training ground for hackers.<br>
  4516. &nbsp;&nbsp;:small_orange_diamond: <a href="https://attackdefense.com"><b>Attack & Defense</b></a> - is a browser-based cloud labs.<br>
  4517. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cryptohack.org/"><b>Cryptohack</b></a> - a fun platform for learning modern cryptography.<br>
  4518. &nbsp;&nbsp;:small_orange_diamond: <a href="https://cryptopals.com/"><b>Cryptopals</b></a> - the cryptopals crypto challenges.<br>
  4519. </p>
  4520. ##### :black_small_square: CTF platforms
  4521. <p>
  4522. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/facebook/fbctf"><b>fbctf</b></a> - platform to host Capture the Flag competitions.<br>
  4523. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/google/ctfscoreboard"><b>ctfscoreboard</b></a> - scoreboard for Capture The Flag competitions.<br>
  4524. </p>
  4525. ##### :black_small_square: Other resources
  4526. <p>
  4527. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/bugcrowd/bugcrowd_university"><b>Bugcrowd University</b></a> - open source education content for the researcher community.<br>
  4528. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/rewardone/OSCPRepo"><b>OSCPRepo</b></a> - a list of resources and scripts that I have been gathering in preparation for the OSCP.<br>
  4529. &nbsp;&nbsp;:small_orange_diamond: <a href="https://medium.com/@cxosmo/owasp-top-10-real-world-examples-part-1-a540c4ea2df5"><b>OWASP Top 10: Real-World Examples</b></a> - test your web apps with real-world examples (two-part series).<br>
  4530. &nbsp;&nbsp;:small_orange_diamond: <a href="http://phrack.org/index.html"><b>phrack.org</b></a> - an awesome collection of articles from several respected hackers and other thinkers.<br>
  4531. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/Gr1mmie/Practical-Ethical-Hacking-Resources"><b>Practical-Ethical-Hacking-Resources</b></a> - compilation of resources from TCM's Udemy Course.<br>
  4532. </p>
  4533. #### Your daily knowledge and news &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  4534. ##### :black_small_square: RSS Readers
  4535. <p>
  4536. &nbsp;&nbsp;:small_orange_diamond: <a href="https://feedly.com/"><b>Feedly</b></a> - organize, read and share what matters to you.<br>
  4537. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.inoreader.com/"><b>Inoreader</b></a> - similar to feedly with a support for filtering what you fetch from rss.<br>
  4538. </p>
  4539. ##### :black_small_square: IRC Channels
  4540. <p>
  4541. &nbsp;&nbsp;:small_orange_diamond: <a href="https://wiki.hackerspaces.org/IRC_Channel"><b>#hackerspaces</b></a> - hackerspace IRC channels.<br>
  4542. </p>
  4543. ##### :black_small_square: Security
  4544. <p>
  4545. &nbsp;&nbsp;:small_orange_diamond: <a href="https://thehackernews.com/"><b>The Hacker News</b></a> - leading news source dedicated to promoting awareness for security experts and hackers.<br>
  4546. &nbsp;&nbsp;:small_orange_diamond: <a href="https://latesthackingnews.com/"><b>Latest Hacking News</b></a> - provides the latest hacking news, exploits and vulnerabilities for ethical hackers.<br>
  4547. &nbsp;&nbsp;:small_orange_diamond: <a href="https://securitynewsletter.co/"><b>Security Newsletter</b></a> - security news as a weekly digest (email notifications).<br>
  4548. &nbsp;&nbsp;:small_orange_diamond: <a href="https://security.googleblog.com/"><b>Google Online Security Blog</b></a> - the latest news and insights from Google on security and safety on the Internet.<br>
  4549. &nbsp;&nbsp;:small_orange_diamond: <a href="https://blog.qualys.com/"><b>Qualys Blog</b></a> - expert network security guidance and news.<br>
  4550. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.darkreading.com/"><b>DARKReading</b></a> - connecting the Information Security Community.<br>
  4551. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.darknet.org.uk/"><b>Darknet</b></a> - latest hacking tools, hacker news, cybersecurity best practices, ethical hacking & pen-testing.<br>
  4552. &nbsp;&nbsp;:small_orange_diamond: <a href="https://twitter.com/disclosedh1"><b>publiclyDisclosed</b></a> - public disclosure watcher who keeps you up to date about the recently disclosed bugs.<br>
  4553. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.reddit.com/r/hacking/"><b>Reddit - Hacking</b></a> - a subreddit dedicated to hacking and hackers.<br>
  4554. &nbsp;&nbsp;:small_orange_diamond: <a href="https://packetstormsecurity.com/"><b>Packet Storm</b></a> - information security services, news, files, tools, exploits, advisories and whitepapers.<br>
  4555. &nbsp;&nbsp;:small_orange_diamond: <a href="https://sekurak.pl/"><b>Sekurak</b></a> - about security, penetration tests, vulnerabilities and many others (PL/EN).<br>
  4556. &nbsp;&nbsp;:small_orange_diamond: <a href="https://nfsec.pl/"><b>nf.sec</b></a> - basic aspects and mechanisms of Linux operating system security (PL).<br>
  4557. </p>
  4558. ##### :black_small_square: Other/All-in-one
  4559. <p>
  4560. &nbsp;&nbsp;:small_orange_diamond: <a href="https://changelog.com/"><b>Changelog</b></a> - is a community of hackers; news & podcasts for developers and hackers.<br>
  4561. </p>
  4562. #### Other Cheat Sheets &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  4563. ###### Build your own DNS Servers
  4564. <p>
  4565. &nbsp;&nbsp;:small_orange_diamond: <a href="https://calomel.org/unbound_dns.html"><b>Unbound DNS Tutorial</b></a> - a validating, recursive, and caching DNS server.<br>
  4566. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.ctrl.blog/entry/knot-dns-resolver-tutorial.html"><b>Knot Resolver on Fedora</b></a> - how to get faster and more secure DNS resolution with Knot Resolver on Fedora.<br>
  4567. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.aaflalo.me/2018/10/tutorial-setup-dns-over-https-server/"><b>DNS-over-HTTPS</b></a> - tutorial to setup your own DNS-over-HTTPS (DoH) server.<br>
  4568. &nbsp;&nbsp;:small_orange_diamond: <a href="https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/"><b>dns-over-https</b></a> - a cartoon intro to DNS over HTTPS.<br>
  4569. &nbsp;&nbsp;:small_orange_diamond: <a href="https://www.aaflalo.me/2019/03/dns-over-tls/"><b>DNS-over-TLS</b></a> - following to your DoH server, setup your DNS-over-TLS (DoT) server.<br>
  4570. &nbsp;&nbsp;:small_orange_diamond: <a href="https://zwischenzugs.com/2018/01/26/how-and-why-i-run-my-own-dns-servers/"><b>DNS Servers</b></a> - how (and why) i run my own DNS Servers.<br>
  4571. </p>
  4572. ###### Build your own Certificate Authority
  4573. <p>
  4574. &nbsp;&nbsp;:small_orange_diamond: <a href="https://jamielinux.com/docs/openssl-certificate-authority/"><b>OpenSSL Certificate Authority</b></a> - build your own certificate authority (CA) using the OpenSSL tools.<br>
  4575. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/smallstep/certificates"><b>step-ca Certificate Authority</b></a> - build your own certificate authority (CA) using open source step-ca.<br>
  4576. </p>
  4577. ###### Build your own System/Virtual Machine
  4578. <p>
  4579. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/cfenollosa/os-tutorial"><b>os-tutorial</b></a> - how to create an OS from scratch.<br>
  4580. &nbsp;&nbsp;:small_orange_diamond: <a href="https://justinmeiners.github.io/lc3-vm/"><b>Write your Own Virtual Machine</b></a> - how to write your own virtual machine (VM).<br>
  4581. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/cirosantilli/x86-bare-metal-examples"><b>x86 Bare Metal Examples</b></a> - dozens of minimal operating systems to learn x86 system programming.<br>
  4582. &nbsp;&nbsp;:small_orange_diamond: <a href="https://github.com/djhworld/simple-computer"><b>simple-computer</b></a> - the scott CPU from "But How Do It Know?" by J. Clark Scott.<br>
  4583. &nbsp;&nbsp;:small_orange_diamond: <a href="https://littleosbook.github.io/"><b>littleosbook</b></a> - the little book about OS development.<br>
  4584. </p>
  4585. ###### DNS Servers list (privacy)
  4586. | <b><u>IP</u></b> | <b><u>URL</u></b> |
  4587. | :--- | :--- |
  4588. | **`84.200.69.80`** | [dns.watch](https://dns.watch/) |
  4589. | **`94.247.43.254`** | [opennic.org](https://www.opennic.org/) |
  4590. | **`64.6.64.6`** | [verisign.com](https://www.verisign.com/en_US/security-services/public-dns/index.xhtml) |
  4591. | **`89.233.43.71`** | [censurfridns.dk](https://blog.uncensoreddns.org/) |
  4592. | **`1.1.1.1`** | [cloudflare.com](https://1.1.1.1/) |
  4593. | **`94.130.110.185`** | [dnsprivacy.at](https://dnsprivacy.at/) |
  4594. ###### TOP Browser extensions
  4595. | <b><u>Extension name</u></b> | <b><u>Description</u></b> |
  4596. | :--- | :--- |
  4597. | **`IPvFoo`** | Display the server IP address and HTTPS information across all page elements. |
  4598. | **`FoxyProxy`** | Simplifies configuring browsers to access proxy-servers. |
  4599. | **`HTTPS Everywhere`** | Automatically use HTTPS security on many sites. |
  4600. | **`uMatrix`** | Point & click to forbid/allow any class of requests made by your browser. |
  4601. | **`uBlock Origin`** | An efficient blocker: easy on memory and CPU footprint. |
  4602. | **`Session Buddy`** | Manage browser tabs and bookmarks with ease. |
  4603. | **`SuperSorter`** | Sort bookmarks recursively, delete duplicates, merge folders, and more. |
  4604. | **`Clear Cache`** | Clear your cache and browsing data. |
  4605. | **`d3coder`** | Encoding/Decoding plugin for various types of encoding. |
  4606. | **`Web Developer`** | Adds a toolbar button with various web developer tools. |
  4607. | **`ThreatPinch Lookup`** | Add threat intelligence hover tool tips. |
  4608. ###### TOP Burp extensions
  4609. | <b><u>Extension name</u></b> | <b><u>Description</u></b> |
  4610. | :--- | :--- |
  4611. | **`Active Scan++`** | Extends Burp's active and passive scanning capabilities. |
  4612. | **`Autorize`** | Automatically detects authorization enforcement. |
  4613. | **`AuthMatrix`** | A simple matrix grid to define the desired levels of access privilege. |
  4614. | **`Logger++`** | Logs requests and responses for all Burp tools in a sortable table. |
  4615. | **`Bypass WAF`** | Adds headers useful for bypassing some WAF devices. |
  4616. | **`JSON Beautifier`** | Beautifies JSON content in the HTTP message viewer. |
  4617. | **`JSON Web Tokens`** | Enables Burp to decode and manipulate JSON web tokens. |
  4618. | **`CSP Auditor`** | Displays CSP headers for responses, and passively reports CSP weaknesses. |
  4619. | **`CSP-Bypass`** | Passively scans for CSP headers that contain known bypasses. |
  4620. | **`Hackvertor`** | Converts data using a tag-based configuration to apply various encoding. |
  4621. | **`HTML5 Auditor`** | Scans for usage of risky HTML5 features. |
  4622. | **`Software Vulnerability Scanner`** | Vulnerability scanner based on vulners.com audit API. |
  4623. | **`Turbo Intruder`** | Is a powerful bruteforcing tool. |
  4624. | **`Upload Scanner`** | Upload a number of different file types, laced with different forms of payload. |
  4625. ###### Hack Mozilla Firefox address bar
  4626. In Firefox's address bar, you can limit results by typing special characters before or after your term:
  4627. - `^` - for matches in your browsing history
  4628. - `*` - for matches in your bookmarks.
  4629. - `%` - for matches in your currently open tabs.
  4630. - `#` - for matches in page titles.
  4631. - `@` - for matches in web addresses.
  4632. ###### Chrome hidden commands
  4633. - `chrome://chrome-urls` - list of all commands
  4634. - `chrome://flags` - enable experiments and development features
  4635. - `chrome://interstitials` - errors and warnings
  4636. - `chrome://net-internals` - network internals (events, dns, cache)
  4637. - `chrome://network-errors` - network errors
  4638. - `chrome://net-export` - start logging future network activity to a file
  4639. - `chrome://safe-browsing` - safe browsing options
  4640. - `chrome://user-actions` - record all user actions
  4641. - `chrome://restart` - restart chrome
  4642. - `chrome://dino` - ERR_INTERNET_DISCONNECTED...
  4643. - `cache:<website-address>` - view the cached version of the web page
  4644. ###### Bypass WAFs by Shortening IP Address (by [0xInfection](https://twitter.com/0xInfection))
  4645. IP addresses can be shortened by dropping the zeroes:
  4646. ```
  4647. http://1.0.0.1 → http://1.1
  4648. http://127.0.0.1 → http://127.1
  4649. http://192.168.0.1 → http://192.168.1
  4650. http://0xC0A80001 or http://3232235521 → 192.168.0.1
  4651. http://192.168.257 → 192.168.1.1
  4652. http://192.168.516 → 192.168.2.4
  4653. ```
  4654. > This bypasses WAF filters for SSRF, open-redirect, etc where any IP as input gets blacklisted.
  4655. For more information please see [How to Obscure Any URL](http://www.pc-help.org/obscure.htm) and [Magic IP Address Shortcuts](https://stuff-things.net/2014/09/25/magic-ip-address-shortcuts/).
  4656. ###### Hashing, encryption and encoding (by [Michal Špaček](https://twitter.com/spazef0rze))
  4657. _Hashing_
  4658. plaintext :arrow_right: hash<br>
  4659. hash :no_entry: plaintext
  4660. _Symmetric encryption_
  4661. plaintext :arrow_right: :key: :arrow_right: ciphertext<br>
  4662. plaintext :arrow_left: :key: :arrow_left: ciphertext<br>
  4663. (:key: shared key)
  4664. _Asymmetric encryption_
  4665. plaintext :arrow_right: :key: :arrow_right: ciphertext<br>
  4666. plaintext :arrow_left: :part_alternation_mark: :arrow_left: ciphertext<br>
  4667. (:key: public key, :part_alternation_mark: private key)<br>
  4668. _Encoding_
  4669. text :arrow_right: encoded<br>
  4670. text :arrow_left: encoded
  4671. #### One-liners &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  4672. ##### Table of Contents
  4673. * [terminal](#tool-terminal)
  4674. * [busybox](#tool-busybox)
  4675. * [mount](#tool-mount)
  4676. * [fuser](#tool-fuser)
  4677. * [lsof](#tool-lsof)
  4678. * [ps](#tool-ps)
  4679. * [top](#tool-top)
  4680. * [vmstat](#tool-vmstat)
  4681. * [iostat](#tool-iostat)
  4682. * [strace](#tool-strace)
  4683. * [kill](#tool-kill)
  4684. * [find](#tool-find)
  4685. * [diff](#tool-diff)
  4686. * [vimdiff](#tool-vimdiff)
  4687. * [tail](#tool-tail)
  4688. * [cpulimit](#tool-cpulimit)
  4689. * [pwdx](#tool-pwdx)
  4690. * [tr](#tool-tr)
  4691. * [chmod](#tool-chmod)
  4692. * [who](#tool-who)
  4693. * [last](#tool-last)
  4694. * [screen](#tool-screen)
  4695. * [script](#tool-script)
  4696. * [du](#tool-du)
  4697. * [inotifywait](#tool-inotifywait)
  4698. * [openssl](#tool-openssl)
  4699. * [secure-delete](#tool-secure-delete)
  4700. * [dd](#tool-dd)
  4701. * [gpg](#tool-gpg)
  4702. * [system-other](#tool-system-other)
  4703. * [curl](#tool-curl)
  4704. * [httpie](#tool-httpie)
  4705. * [ssh](#tool-ssh)
  4706. * [linux-dev](#tool-linux-dev)
  4707. * [tcpdump](#tool-tcpdump)
  4708. * [tcpick](#tool-tcpick)
  4709. * [ngrep](#tool-ngrep)
  4710. * [hping3](#tool-hping3)
  4711. * [nmap](#tool-nmap)
  4712. * [netcat](#tool-netcat)
  4713. * [socat](#tool-socat)
  4714. * [p0f](#tool-p0f)
  4715. * [gnutls-cli](#tool-gnutls-cli)
  4716. * [netstat](#tool-netstat)
  4717. * [rsync](#tool-rsync)
  4718. * [host](#tool-host)
  4719. * [dig](#tool-dig)
  4720. * [certbot](#tool-certbot)
  4721. * [network-other](#tool-network-other)
  4722. * [git](#tool-git)
  4723. * [awk](#tool-awk)
  4724. * [sed](#tool-sed)
  4725. * [grep](#tool-grep)
  4726. * [perl](#tool-perl)
  4727. ##### Tool: [terminal](https://en.wikipedia.org/wiki/Linux_console)
  4728. ###### Reload shell without exit
  4729. ```bash
  4730. exec $SHELL -l
  4731. ```
  4732. ###### Close shell keeping all subprocess running
  4733. ```bash
  4734. disown -a && exit
  4735. ```
  4736. ###### Exit without saving shell history
  4737. ```bash
  4738. kill -9 $$
  4739. unset HISTFILE && exit
  4740. ```
  4741. ###### Perform a branching conditional
  4742. ```bash
  4743. true && echo success
  4744. false || echo failed
  4745. ```
  4746. ###### Pipe stdout and stderr to separate commands
  4747. ```bash
  4748. some_command > >(/bin/cmd_for_stdout) 2> >(/bin/cmd_for_stderr)
  4749. ```
  4750. ###### Redirect stdout and stderr each to separate files and print both to the screen
  4751. ```bash
  4752. (some_command 2>&1 1>&3 | tee errorlog ) 3>&1 1>&2 | tee stdoutlog
  4753. ```
  4754. ###### List of commands you use most often
  4755. ```bash
  4756. history | \
  4757. awk '{CMD[$2]++;count++;}END { for (a in CMD)print CMD[a] " " CMD[a]/count*100 "% " a;}' | \
  4758. grep -v "./" | \
  4759. column -c3 -s " " -t | \
  4760. sort -nr | nl | head -n 20
  4761. ```
  4762. ###### Sterilize bash history
  4763. ```bash
  4764. function sterile() {
  4765. history | awk '$2 != "history" { $1=""; print $0 }' | egrep -vi "\
  4766. curl\b+.*(-E|--cert)\b+.*\b*|\
  4767. curl\b+.*--pass\b+.*\b*|\
  4768. curl\b+.*(-U|--proxy-user).*:.*\b*|\
  4769. curl\b+.*(-u|--user).*:.*\b*
  4770. .*(-H|--header).*(token|auth.*)\b+.*|\
  4771. wget\b+.*--.*password\b+.*\b*|\
  4772. http.?://.+:.+@.*\
  4773. " > $HOME/histbuff; history -r $HOME/histbuff;
  4774. }
  4775. export PROMPT_COMMAND="sterile"
  4776. ```
  4777. > Look also: [A naive utility to censor credentials in command history](https://github.com/lbonanomi/go/blob/master/revisionist.go).
  4778. ###### Quickly backup a file
  4779. ```bash
  4780. cp filename{,.orig}
  4781. ```
  4782. ###### Empty a file (truncate to 0 size)
  4783. ```bash
  4784. >filename
  4785. ```
  4786. ###### Delete all files in a folder that don't match a certain file extension
  4787. ```bash
  4788. rm !(*.foo|*.bar|*.baz)
  4789. ```
  4790. ###### Pass multi-line string to a file
  4791. ```bash
  4792. # cat >filename ... - overwrite the file
  4793. # cat >>filename ... - append to a file
  4794. cat > filename << __EOF__
  4795. data data data
  4796. __EOF__
  4797. ```
  4798. ###### Edit a file on a remote host using vim
  4799. ```bash
  4800. vim scp://user@host//etc/fstab
  4801. ```
  4802. ###### Create a directory and change into it at the same time
  4803. ```bash
  4804. mkd() { mkdir -p "$@" && cd "$@"; }
  4805. ```
  4806. ###### Convert uppercase files to lowercase files
  4807. ```bash
  4808. rename 'y/A-Z/a-z/' *
  4809. ```
  4810. ###### Print a row of characters across the terminal
  4811. ```bash
  4812. printf "%`tput cols`s" | tr ' ' '#'
  4813. ```
  4814. ###### Show shell history without line numbers
  4815. ```bash
  4816. history | cut -c 8-
  4817. fc -l -n 1 | sed 's/^\s*//'
  4818. ```
  4819. ###### Run command(s) after exit session
  4820. ```bash
  4821. cat > /etc/profile << __EOF__
  4822. _after_logout() {
  4823. username=$(whoami)
  4824. for _pid in $(ps afx | grep sshd | grep "$username" | awk '{print $1}') ; do
  4825. kill -9 $_pid
  4826. done
  4827. }
  4828. trap _after_logout EXIT
  4829. __EOF__
  4830. ```
  4831. ###### Generate a sequence of numbers
  4832. ```bash
  4833. for ((i=1; i<=10; i+=2)) ; do echo $i ; done
  4834. # alternative: seq 1 2 10
  4835. for ((i=5; i<=10; ++i)) ; do printf '%02d\n' $i ; done
  4836. # alternative: seq -w 5 10
  4837. for i in {1..10} ; do echo $i ; done
  4838. ```
  4839. ###### Simple Bash filewatching
  4840. ```bash
  4841. unset MAIL; export MAILCHECK=1; export MAILPATH='$FILE_TO_WATCH?$MESSAGE'
  4842. ```
  4843. ---
  4844. ##### Tool: [busybox](https://www.busybox.net/)
  4845. ###### Static HTTP web server
  4846. ```bash
  4847. busybox httpd -p $PORT -h $HOME [-c httpd.conf]
  4848. ```
  4849. ___
  4850. ##### Tool: [mount](https://en.wikipedia.org/wiki/Mount_(Unix))
  4851. ###### Mount a temporary ram partition
  4852. ```bash
  4853. mount -t tmpfs tmpfs /mnt -o size=64M
  4854. ```
  4855. * `-t` - filesystem type
  4856. * `-o` - mount options
  4857. ###### Remount a filesystem as read/write
  4858. ```bash
  4859. mount -o remount,rw /
  4860. ```
  4861. ___
  4862. ##### Tool: [fuser](https://en.wikipedia.org/wiki/Fuser_(Unix))
  4863. ###### Show which processes use the files/directories
  4864. ```bash
  4865. fuser /var/log/daemon.log
  4866. fuser -v /home/supervisor
  4867. ```
  4868. ###### Kills a process that is locking a file
  4869. ```bash
  4870. fuser -ki filename
  4871. ```
  4872. * `-i` - interactive option
  4873. ###### Kills a process that is locking a file with specific signal
  4874. ```bash
  4875. fuser -k -HUP filename
  4876. ```
  4877. * `--list-signals` - list available signal names
  4878. ###### Show what PID is listening on specific port
  4879. ```bash
  4880. fuser -v 53/udp
  4881. ```
  4882. ###### Show all processes using the named filesystems or block device
  4883. ```bash
  4884. fuser -mv /var/www
  4885. ```
  4886. ___
  4887. ##### Tool: [lsof](https://en.wikipedia.org/wiki/Lsof)
  4888. ###### Show process that use internet connection at the moment
  4889. ```bash
  4890. lsof -P -i -n
  4891. ```
  4892. ###### Show process that use specific port number
  4893. ```bash
  4894. lsof -i tcp:443
  4895. ```
  4896. ###### Lists all listening ports together with the PID of the associated process
  4897. ```bash
  4898. lsof -Pan -i tcp -i udp
  4899. ```
  4900. ###### List all open ports and their owning executables
  4901. ```bash
  4902. lsof -i -P | grep -i "listen"
  4903. ```
  4904. ###### Show all open ports
  4905. ```bash
  4906. lsof -Pnl -i
  4907. ```
  4908. ###### Show open ports (LISTEN)
  4909. ```bash
  4910. lsof -Pni4 | grep LISTEN | column -t
  4911. ```
  4912. ###### List all files opened by a particular command
  4913. ```bash
  4914. lsof -c "process"
  4915. ```
  4916. ###### View user activity per directory
  4917. ```bash
  4918. lsof -u username -a +D /etc
  4919. ```
  4920. ###### Show 10 largest open files
  4921. ```bash
  4922. lsof / | \
  4923. awk '{ if($7 > 1048576) print $7/1048576 "MB" " " $9 " " $1 }' | \
  4924. sort -n -u | tail | column -t
  4925. ```
  4926. ###### Show current working directory of a process
  4927. ```bash
  4928. lsof -p <PID> | grep cwd
  4929. ```
  4930. ___
  4931. ##### Tool: [ps](https://en.wikipedia.org/wiki/Ps_(Unix))
  4932. ###### Show a 4-way scrollable process tree with full details
  4933. ```bash
  4934. ps awwfux | less -S
  4935. ```
  4936. ###### Processes per user counter
  4937. ```bash
  4938. ps hax -o user | sort | uniq -c | sort -r
  4939. ```
  4940. ###### Show all processes by name with main header
  4941. ```bash
  4942. ps -lfC nginx
  4943. ```
  4944. ___
  4945. ##### Tool: [find](https://en.wikipedia.org/wiki/Find_(Unix))
  4946. ###### Find files that have been modified on your system in the past 60 minutes
  4947. ```bash
  4948. find / -mmin 60 -type f
  4949. ```
  4950. ###### Find all files larger than 20M
  4951. ```bash
  4952. find / -type f -size +20M
  4953. ```
  4954. ###### Find duplicate files (based on MD5 hash)
  4955. ```bash
  4956. find -type f -exec md5sum '{}' ';' | sort | uniq --all-repeated=separate -w 33
  4957. ```
  4958. ###### Change permission only for files
  4959. ```bash
  4960. cd /var/www/site && find . -type f -exec chmod 766 {} \;
  4961. cd /var/www/site && find . -type f -exec chmod 664 {} +
  4962. ```
  4963. ###### Change permission only for directories
  4964. ```bash
  4965. cd /var/www/site && find . -type d -exec chmod g+x {} \;
  4966. cd /var/www/site && find . -type d -exec chmod g+rwx {} +
  4967. ```
  4968. ###### Find files and directories for specific user/group
  4969. ```bash
  4970. # User:
  4971. find . -user <username> -print
  4972. find /etc -type f -user <username> -name "*.conf"
  4973. # Group:
  4974. find /opt -group <group>
  4975. find /etc -type f -group <group> -iname "*.conf"
  4976. ```
  4977. ###### Find files and directories for all without specific user/group
  4978. ```bash
  4979. # User:
  4980. find . \! -user <username> -print
  4981. # Group:
  4982. find . \! -group <group>
  4983. ```
  4984. ###### Looking for files/directories that only have certain permission
  4985. ```bash
  4986. # User
  4987. find . -user <username> -perm -u+rw # -rw-r--r--
  4988. find /home -user $(whoami) -perm 777 # -rwxrwxrwx
  4989. # Group:
  4990. find /home -type d -group <group> -perm 755 # -rwxr-xr-x
  4991. ```
  4992. ###### Delete older files than 60 days
  4993. ```bash
  4994. find . -type f -mtime +60 -delete
  4995. ```
  4996. ###### Recursively remove all empty sub-directories from a directory
  4997. ```bash
  4998. find . -depth -type d -empty -exec rmdir {} \;
  4999. ```
  5000. ###### How to find all hard links to a file
  5001. ```bash
  5002. find </path/to/dir> -xdev -samefile filename
  5003. ```
  5004. ###### Recursively find the latest modified files
  5005. ```bash
  5006. find . -type f -exec stat --format '%Y :%y %n' "{}" \; | sort -nr | cut -d: -f2- | head
  5007. ```
  5008. ###### Recursively find/replace of a string with sed
  5009. ```bash
  5010. find . -not -path '*/\.git*' -type f -print0 | xargs -0 sed -i 's/foo/bar/g'
  5011. ```
  5012. ###### Recursively find/replace of a string in directories and file names
  5013. ```bash
  5014. find . -depth -name '*test*' -execdir bash -c 'mv -v "$1" "${1//foo/bar}"' _ {} \;
  5015. ```
  5016. ###### Recursively find suid executables
  5017. ```bash
  5018. find / \( -perm -4000 -o -perm -2000 \) -type f -exec ls -la {} \;
  5019. ```
  5020. ___
  5021. ##### Tool: [top](https://en.wikipedia.org/wiki/Top_(software))
  5022. ###### Use top to monitor only all processes with the specific string
  5023. ```bash
  5024. top -p $(pgrep -d , <str>)
  5025. ```
  5026. * `<str>` - process containing string (eg. nginx, worker)
  5027. ___
  5028. ##### Tool: [vmstat](https://en.wikipedia.org/wiki/Vmstat)
  5029. ###### Show current system utilization (fields in kilobytes)
  5030. ```bash
  5031. vmstat 2 20 -t -w
  5032. ```
  5033. * `2` - number of times with a defined time interval (delay)
  5034. * `20` - each execution of the command (count)
  5035. * `-t` - show timestamp
  5036. * `-w` - wide output
  5037. * `-S M` - output of the fields in megabytes instead of kilobytes
  5038. ###### Show current system utilization will get refreshed every 5 seconds
  5039. ```bash
  5040. vmstat 5 -w
  5041. ```
  5042. ###### Display report a summary of disk operations
  5043. ```bash
  5044. vmstat -D
  5045. ```
  5046. ###### Display report of event counters and memory stats
  5047. ```bash
  5048. vmstat -s
  5049. ```
  5050. ###### Display report about kernel objects stored in slab layer cache
  5051. ```bash
  5052. vmstat -m
  5053. ```
  5054. ##### Tool: [iostat](https://en.wikipedia.org/wiki/Iostat)
  5055. ###### Show information about the CPU usage, and I/O statistics about all the partitions
  5056. ```bash
  5057. iostat 2 10 -t -m
  5058. ```
  5059. * `2` - number of times with a defined time interval (delay)
  5060. * `10` - each execution of the command (count)
  5061. * `-t` - show timestamp
  5062. * `-m` - fields in megabytes (`-k` - in kilobytes, default)
  5063. ###### Show information only about the CPU utilization
  5064. ```bash
  5065. iostat 2 10 -t -m -c
  5066. ```
  5067. ###### Show information only about the disk utilization
  5068. ```bash
  5069. iostat 2 10 -t -m -d
  5070. ```
  5071. ###### Show information only about the LVM utilization
  5072. ```bash
  5073. iostat -N
  5074. ```
  5075. ___
  5076. ##### Tool: [strace](https://en.wikipedia.org/wiki/Strace)
  5077. ###### Track with child processes
  5078. ```bash
  5079. # 1)
  5080. strace -f -p $(pidof glusterfsd)
  5081. # 2)
  5082. strace -f $(pidof php-fpm | sed 's/\([0-9]*\)/\-p \1/g')
  5083. ```
  5084. ###### Track process with 30 seconds limit
  5085. ```bash
  5086. timeout 30 strace $(< /var/run/zabbix/zabbix_agentd.pid)
  5087. ```
  5088. ###### Track processes and redirect output to a file
  5089. ```bash
  5090. ps auxw | grep '[a]pache' | awk '{print " -p " $2}' | \
  5091. xargs strace -o /tmp/strace-apache-proc.out
  5092. ```
  5093. ###### Track with print time spent in each syscall and limit length of print strings
  5094. ```bash
  5095. ps auxw | grep '[i]init_policy' | awk '{print " -p " $2}' | \
  5096. xargs strace -f -e trace=network -T -s 10000
  5097. ```
  5098. ###### Track the open request of a network port
  5099. ```bash
  5100. strace -f -e trace=bind nc -l 80
  5101. ```
  5102. ###### Track the open request of a network port (show TCP/UDP)
  5103. ```bash
  5104. strace -f -e trace=network nc -lu 80
  5105. ```
  5106. ___
  5107. ##### Tool: [kill](https://en.wikipedia.org/wiki/Kill_(command))
  5108. ###### Kill a process running on port
  5109. ```bash
  5110. kill -9 $(lsof -i :<port> | awk '{l=$2} END {print l}')
  5111. ```
  5112. ___
  5113. ##### Tool: [diff](https://en.wikipedia.org/wiki/Diff)
  5114. ###### Compare two directory trees
  5115. ```bash
  5116. diff <(cd directory1 && find | sort) <(cd directory2 && find | sort)
  5117. ```
  5118. ###### Compare output of two commands
  5119. ```bash
  5120. diff <(cat /etc/passwd) <(cut -f2 /etc/passwd)
  5121. ```
  5122. ___
  5123. ##### Tool: [vimdiff](http://vimdoc.sourceforge.net/htmldoc/diff.html)
  5124. ###### Highlight the exact differences, based on characters and words
  5125. ```bash
  5126. vimdiff file1 file2
  5127. ```
  5128. ###### Compare two JSON files
  5129. ```bash
  5130. vimdiff <(jq -S . A.json) <(jq -S . B.json)
  5131. ```
  5132. ###### Compare Hex dump
  5133. ```bash
  5134. d(){ vimdiff <(f $1) <(f $2);};f(){ hexdump -C $1|cut -d' ' -f3-|tr -s ' ';}; d ~/bin1 ~/bin2
  5135. ```
  5136. ###### diffchar
  5137. Save [diffchar](https://raw.githubusercontent.com/vim-scripts/diffchar.vim/master/plugin/diffchar.vim) @ `~/.vim/plugins`
  5138. Click `F7` to switch between diff modes
  5139. Usefull `vimdiff` commands:
  5140. * `qa` to exit all windows
  5141. * `:vertical resize 70` to resize window
  5142. * set window width `Ctrl+W [N columns]+(Shift+)<\>`
  5143. ___
  5144. ##### Tool: [tail](https://en.wikipedia.org/wiki/Tail_(Unix))
  5145. ###### Annotate tail -f with timestamps
  5146. ```bash
  5147. tail -f file | while read ; do echo "$(date +%T.%N) $REPLY" ; done
  5148. ```
  5149. ###### Analyse an Apache access log for the most common IP addresses
  5150. ```bash
  5151. tail -10000 access_log | awk '{print $1}' | sort | uniq -c | sort -n | tail
  5152. ```
  5153. ###### Analyse web server log and show only 5xx http codes
  5154. ```bash
  5155. tail -n 100 -f /path/to/logfile | grep "HTTP/[1-2].[0-1]\" [5]"
  5156. ```
  5157. ___
  5158. ##### Tool: [tar](https://en.wikipedia.org/wiki/Tar_(computing))
  5159. ###### System backup with exclude specific directories
  5160. ```bash
  5161. cd /
  5162. tar -czvpf /mnt/system$(date +%d%m%Y%s).tgz --directory=/ \
  5163. --exclude=proc/* --exclude=sys/* --exclude=dev/* --exclude=mnt/* .
  5164. ```
  5165. ###### System backup with exclude specific directories (pigz)
  5166. ```bash
  5167. cd /
  5168. tar cvpf /backup/snapshot-$(date +%d%m%Y%s).tgz --directory=/ \
  5169. --exclude=proc/* --exclude=sys/* --exclude=dev/* \
  5170. --exclude=mnt/* --exclude=tmp/* --use-compress-program=pigz .
  5171. ```
  5172. ___
  5173. ##### Tool: [dump](https://en.wikipedia.org/wiki/Dump_(program))
  5174. ###### System backup to file
  5175. ```bash
  5176. dump -y -u -f /backup/system$(date +%d%m%Y%s).lzo /
  5177. ```
  5178. ###### Restore system from lzo file
  5179. ```bash
  5180. cd /
  5181. restore -rf /backup/system$(date +%d%m%Y%s).lzo
  5182. ```
  5183. ___
  5184. ##### Tool: [cpulimit](http://cpulimit.sourceforge.net/)
  5185. ###### Limit the cpu usage of a process
  5186. ```bash
  5187. cpulimit -p pid -l 50
  5188. ```
  5189. ___
  5190. ##### Tool: [pwdx](https://www.cyberciti.biz/faq/unix-linux-pwdx-command-examples-usage-syntax/)
  5191. ###### Show current working directory of a process
  5192. ```bash
  5193. pwdx <pid>
  5194. ```
  5195. ___
  5196. ##### Tool: [taskset](https://www.cyberciti.biz/faq/taskset-cpu-affinity-command/)
  5197. ###### Start a command on only one CPU core
  5198. ```bash
  5199. taskset -c 0 <command>
  5200. ```
  5201. ___
  5202. ##### Tool: [tr](https://en.wikipedia.org/wiki/Tr_(Unix))
  5203. ###### Show directories in the PATH, one per line
  5204. ```bash
  5205. tr : '\n' <<<$PATH
  5206. ```
  5207. ___
  5208. ##### Tool: [chmod](https://en.wikipedia.org/wiki/Chmod)
  5209. ###### Remove executable bit from all files in the current directory
  5210. ```bash
  5211. chmod -R -x+X *
  5212. ```
  5213. ###### Restore permission for /bin/chmod
  5214. ```bash
  5215. # 1:
  5216. cp /bin/ls chmod.01
  5217. cp /bin/chmod chmod.01
  5218. ./chmod.01 700 file
  5219. # 2:
  5220. /bin/busybox chmod 0700 /bin/chmod
  5221. # 3:
  5222. setfacl --set u::rwx,g::---,o::--- /bin/chmod
  5223. ```
  5224. ___
  5225. ##### Tool: [who](https://en.wikipedia.org/wiki/Who_(Unix))
  5226. ###### Find last reboot time
  5227. ```bash
  5228. who -b
  5229. ```
  5230. ###### Detect a user sudo-su'd into the current shell
  5231. ```bash
  5232. [[ $(who -m | awk '{ print $1 }') == $(whoami) ]] || echo "You are su-ed to $(whoami)"
  5233. ```
  5234. ___
  5235. ##### Tool: [last](https://www.howtoforge.com/linux-last-command/)
  5236. ###### Was the last reboot a panic?
  5237. ```bash
  5238. (last -x -f $(ls -1t /var/log/wtmp* | head -2 | tail -1); last -x -f /var/log/wtmp) | \
  5239. grep -A1 reboot | head -2 | grep -q shutdown && echo "Expected reboot" || echo "Panic reboot"
  5240. ```
  5241. ___
  5242. ##### Tool: [screen](https://en.wikipedia.org/wiki/GNU_Screen)
  5243. ###### Start screen in detached mode
  5244. ```bash
  5245. screen -d -m <command>
  5246. ```
  5247. ###### Attach to an existing screen session
  5248. ```bash
  5249. screen -r -d <pid>
  5250. ```
  5251. ___
  5252. ##### Tool: [script](https://en.wikipedia.org/wiki/Script_(Unix))
  5253. ###### Record and replay terminal session
  5254. ```bash
  5255. ### Record session
  5256. # 1)
  5257. script -t 2>~/session.time -a ~/session.log
  5258. # 2)
  5259. script --timing=session.time session.log
  5260. ### Replay session
  5261. scriptreplay --timing=session.time session.log
  5262. ```
  5263. ___
  5264. ##### Tool: [du](https://en.wikipedia.org/wiki/GNU_Screen)
  5265. ###### Show 20 biggest directories with 'K M G'
  5266. ```bash
  5267. du | \
  5268. sort -r -n | \
  5269. awk '{split("K M G",v); s=1; while($1>1024){$1/=1024; s++} print int($1)" "v[s]"\t"$2}' | \
  5270. head -n 20
  5271. ```
  5272. ___
  5273. ##### Tool: [inotifywait](https://en.wikipedia.org/wiki/GNU_Screen)
  5274. ###### Init tool everytime a file in a directory is modified
  5275. ```bash
  5276. while true ; do inotifywait -r -e MODIFY dir/ && ls dir/ ; done;
  5277. ```
  5278. ___
  5279. ##### Tool: [openssl](https://www.openssl.org/)
  5280. ###### Testing connection to the remote host
  5281. ```bash
  5282. echo | openssl s_client -connect google.com:443 -showcerts
  5283. ```
  5284. ###### Testing connection to the remote host (debug mode)
  5285. ```bash
  5286. echo | openssl s_client -connect google.com:443 -showcerts -tlsextdebug -status
  5287. ```
  5288. ###### Testing connection to the remote host (with SNI support)
  5289. ```bash
  5290. echo | openssl s_client -showcerts -servername google.com -connect google.com:443
  5291. ```
  5292. ###### Testing connection to the remote host with specific ssl version
  5293. ```bash
  5294. openssl s_client -tls1_2 -connect google.com:443
  5295. ```
  5296. ###### Testing connection to the remote host with specific ssl cipher
  5297. ```bash
  5298. openssl s_client -cipher 'AES128-SHA' -connect google.com:443
  5299. ```
  5300. ###### Verify 0-RTT
  5301. ```bash
  5302. _host="example.com"
  5303. cat > req.in << __EOF__
  5304. HEAD / HTTP/1.1
  5305. Host: $_host
  5306. Connection: close
  5307. __EOF__
  5308. openssl s_client -connect ${_host}:443 -tls1_3 -sess_out session.pem -ign_eof < req.in
  5309. openssl s_client -connect ${_host}:443 -tls1_3 -sess_in session.pem -early_data req.in
  5310. ```
  5311. ###### Generate private key without passphrase
  5312. ```bash
  5313. # _len: 2048, 4096
  5314. ( _fd="private.key" ; _len="2048" ; \
  5315. openssl genrsa -out ${_fd} ${_len} )
  5316. ```
  5317. ###### Generate private key with passphrase
  5318. ```bash
  5319. # _ciph: des3, aes128, aes256
  5320. # _len: 2048, 4096
  5321. ( _ciph="aes128" ; _fd="private.key" ; _len="2048" ; \
  5322. openssl genrsa -${_ciph} -out ${_fd} ${_len} )
  5323. ```
  5324. ###### Remove passphrase from private key
  5325. ```bash
  5326. ( _fd="private.key" ; _fd_unp="private_unp.key" ; \
  5327. openssl rsa -in ${_fd} -out ${_fd_unp} )
  5328. ```
  5329. ###### Encrypt existing private key with a passphrase
  5330. ```bash
  5331. # _ciph: des3, aes128, aes256
  5332. ( _ciph="aes128" ; _fd="private.key" ; _fd_pass="private_pass.key" ; \
  5333. openssl rsa -${_ciph} -in ${_fd} -out ${_fd_pass}
  5334. ```
  5335. ###### Check private key
  5336. ```bash
  5337. ( _fd="private.key" ; \
  5338. openssl rsa -check -in ${_fd} )
  5339. ```
  5340. ###### Get public key from private key
  5341. ```bash
  5342. ( _fd="private.key" ; _fd_pub="public.key" ; \
  5343. openssl rsa -pubout -in ${_fd} -out ${_fd_pub} )
  5344. ```
  5345. ###### Generate private key and CSR
  5346. ```bash
  5347. ( _fd="private.key" ; _fd_csr="request.csr" ; _len="2048" ; \
  5348. openssl req -out ${_fd_csr} -new -newkey rsa:${_len} -nodes -keyout ${_fd} )
  5349. ```
  5350. ###### Generate CSR
  5351. ```bash
  5352. ( _fd="private.key" ; _fd_csr="request.csr" ; \
  5353. openssl req -out ${_fd_csr} -new -key ${_fd} )
  5354. ```
  5355. ###### Generate CSR (metadata from existing certificate)
  5356. > Where `private.key` is the existing private key. As you can see you do not generate this CSR from your certificate (public key). Also you do not generate the "same" CSR, just a new one to request a new certificate.
  5357. ```bash
  5358. ( _fd="private.key" ; _fd_csr="request.csr" ; _fd_crt="cert.crt" ; \
  5359. openssl x509 -x509toreq -in ${_fd_crt} -out ${_fd_csr} -signkey ${_fd} )
  5360. ```
  5361. ###### Generate CSR with -config param
  5362. ```bash
  5363. ( _fd="private.key" ; _fd_csr="request.csr" ; \
  5364. openssl req -new -sha256 -key ${_fd} -out ${_fd_csr} \
  5365. -config <(
  5366. cat << __EOF__
  5367. [req]
  5368. default_bits = 2048
  5369. default_md = sha256
  5370. prompt = no
  5371. distinguished_name = dn
  5372. req_extensions = req_ext
  5373. [ dn ]
  5374. C = "<two-letter ISO abbreviation for your country>"
  5375. ST = "<state or province where your organisation is legally located>"
  5376. L = "<city where your organisation is legally located>"
  5377. O = "<legal name of your organisation>"
  5378. OU = "<section of the organisation>"
  5379. CN = "<fully qualified domain name>"
  5380. [ req_ext ]
  5381. subjectAltName = @alt_names
  5382. [ alt_names ]
  5383. DNS.1 = <fully qualified domain name>
  5384. DNS.2 = <next domain>
  5385. DNS.3 = <next domain>
  5386. __EOF__
  5387. ))
  5388. ```
  5389. Other values in `[ dn ]`:
  5390. ```
  5391. countryName = "DE" # C=
  5392. stateOrProvinceName = "Hessen" # ST=
  5393. localityName = "Keller" # L=
  5394. postalCode = "424242" # L/postalcode=
  5395. postalAddress = "Keller" # L/postaladdress=
  5396. streetAddress = "Crater 1621" # L/street=
  5397. organizationName = "apfelboymschule" # O=
  5398. organizationalUnitName = "IT Department" # OU=
  5399. commonName = "example.com" # CN=
  5400. emailAddress = "webmaster@example.com" # CN/emailAddress=
  5401. ```
  5402. Example of `oids` (you'll probably also have to make OpenSSL know about the new fields required for EV by adding the following under `[new_oids]`):
  5403. ```
  5404. [req]
  5405. ...
  5406. oid_section = new_oids
  5407. [ new_oids ]
  5408. postalCode = 2.5.4.17
  5409. streetAddress = 2.5.4.9
  5410. ```
  5411. Full example:
  5412. ```bash
  5413. ( _fd="private.key" ; _fd_csr="request.csr" ; \
  5414. openssl req -new -sha256 -key ${_fd} -out ${_fd_csr} \
  5415. -config <(
  5416. cat << __EOF__
  5417. [req]
  5418. default_bits = 2048
  5419. default_md = sha256
  5420. prompt = no
  5421. distinguished_name = dn
  5422. req_extensions = req_ext
  5423. oid_section = new_oids
  5424. [ new_oids ]
  5425. serialNumber = 2.5.4.5
  5426. streetAddress = 2.5.4.9
  5427. postalCode = 2.5.4.17
  5428. businessCategory = 2.5.4.15
  5429. [ dn ]
  5430. serialNumber=00001111
  5431. businessCategory=Private Organization
  5432. jurisdictionC=DE
  5433. C=DE
  5434. ST=Hessen
  5435. L=Keller
  5436. postalCode=424242
  5437. streetAddress=Crater 1621
  5438. O=AV Company
  5439. OU=IT
  5440. CN=example.com
  5441. [ req_ext ]
  5442. subjectAltName = @alt_names
  5443. [ alt_names ]
  5444. DNS.1 = example.com
  5445. __EOF__
  5446. ))
  5447. ```
  5448. For more information please look at these great explanations:
  5449. - [RFC 5280](https://tools.ietf.org/html/rfc5280)
  5450. - [How to create multidomain certificates using config files](https://apfelboymchen.net/gnu/notes/openssl%20multidomain%20with%20config%20files.html)
  5451. - [Generate a multi domains certificate using config files](https://gist.github.com/romainnorberg/464758a6620228b977212a3cf20c3e08)
  5452. - [Your OpenSSL CSR command is out of date](https://expeditedsecurity.com/blog/openssl-csr-command/)
  5453. - [OpenSSL example configuration file](https://www.tbs-certificats.com/openssl-dem-server-cert.cnf)
  5454. - [Object Identifiers (OIDs)](https://www.alvestrand.no/objectid/)
  5455. - [openssl objects.txt](https://github.com/openssl/openssl/blob/master/crypto/objects/objects.txt)
  5456. ###### List available EC curves
  5457. ```bash
  5458. openssl ecparam -list_curves
  5459. ```
  5460. ###### Print ECDSA private and public keys
  5461. ```bash
  5462. ( _fd="private.key" ; \
  5463. openssl ec -in ${_fd} -noout -text )
  5464. # For x25519 only extracting public key
  5465. ( _fd="private.key" ; _fd_pub="public.key" ; \
  5466. openssl pkey -in ${_fd} -pubout -out ${_fd_pub} )
  5467. ```
  5468. ###### Generate ECDSA private key
  5469. ```bash
  5470. # _curve: prime256v1, secp521r1, secp384r1
  5471. ( _fd="private.key" ; _curve="prime256v1" ; \
  5472. openssl ecparam -out ${_fd} -name ${_curve} -genkey )
  5473. # _curve: X25519
  5474. ( _fd="private.key" ; _curve="x25519" ; \
  5475. openssl genpkey -algorithm ${_curve} -out ${_fd} )
  5476. ```
  5477. ###### Generate private key and CSR (ECC)
  5478. ```bash
  5479. # _curve: prime256v1, secp521r1, secp384r1
  5480. ( _fd="domain.com.key" ; _fd_csr="domain.com.csr" ; _curve="prime256v1" ; \
  5481. openssl ecparam -out ${_fd} -name ${_curve} -genkey ; \
  5482. openssl req -new -key ${_fd} -out ${_fd_csr} -sha256 )
  5483. ```
  5484. ###### Generate self-signed certificate
  5485. ```bash
  5486. # _len: 2048, 4096
  5487. ( _fd="domain.key" ; _fd_out="domain.crt" ; _len="2048" ; _days="365" ; \
  5488. openssl req -newkey rsa:${_len} -nodes \
  5489. -keyout ${_fd} -x509 -days ${_days} -out ${_fd_out} )
  5490. ```
  5491. ###### Generate self-signed certificate from existing private key
  5492. ```bash
  5493. # _len: 2048, 4096
  5494. ( _fd="domain.key" ; _fd_out="domain.crt" ; _days="365" ; \
  5495. openssl req -key ${_fd} -nodes \
  5496. -x509 -days ${_days} -out ${_fd_out} )
  5497. ```
  5498. ###### Generate self-signed certificate from existing private key and csr
  5499. ```bash
  5500. # _len: 2048, 4096
  5501. ( _fd="domain.key" ; _fd_csr="domain.csr" ; _fd_out="domain.crt" ; _days="365" ; \
  5502. openssl x509 -signkey ${_fd} -nodes \
  5503. -in ${_fd_csr} -req -days ${_days} -out ${_fd_out} )
  5504. ```
  5505. ###### Generate DH public parameters
  5506. ```bash
  5507. ( _dh_size="2048" ; \
  5508. openssl dhparam -out /etc/nginx/ssl/dhparam_${_dh_size}.pem "$_dh_size" )
  5509. ```
  5510. ###### Display DH public parameters
  5511. ```bash
  5512. openssl pkeyparam -in dhparam.pem -text
  5513. ```
  5514. ###### Extract private key from pfx
  5515. ```bash
  5516. ( _fd_pfx="cert.pfx" ; _fd_key="key.pem" ; \
  5517. openssl pkcs12 -in ${_fd_pfx} -nocerts -nodes -out ${_fd_key} )
  5518. ```
  5519. ###### Extract private key and certs from pfx
  5520. ```bash
  5521. ( _fd_pfx="cert.pfx" ; _fd_pem="key_certs.pem" ; \
  5522. openssl pkcs12 -in ${_fd_pfx} -nodes -out ${_fd_pem} )
  5523. ```
  5524. ###### Extract certs from p7b
  5525. ```bash
  5526. # PKCS#7 file doesn't include private keys.
  5527. ( _fd_p7b="cert.p7b" ; _fd_pem="cert.pem" ; \
  5528. openssl pkcs7 -inform DER -outform PEM -in ${_fd_p7b} -print_certs > ${_fd_pem})
  5529. # or:
  5530. openssl pkcs7 -print_certs -in -in ${_fd_p7b} -out ${_fd_pem})
  5531. ```
  5532. ###### Convert DER to PEM
  5533. ```bash
  5534. ( _fd_der="cert.crt" ; _fd_pem="cert.pem" ; \
  5535. openssl x509 -in ${_fd_der} -inform der -outform pem -out ${_fd_pem} )
  5536. ```
  5537. ###### Convert PEM to DER
  5538. ```bash
  5539. ( _fd_der="cert.crt" ; _fd_pem="cert.pem" ; \
  5540. openssl x509 -in ${_fd_pem} -outform der -out ${_fd_der} )
  5541. ```
  5542. ###### Verification of the private key
  5543. ```bash
  5544. ( _fd="private.key" ; \
  5545. openssl rsa -noout -text -in ${_fd} )
  5546. ```
  5547. ###### Verification of the public key
  5548. ```bash
  5549. # 1)
  5550. ( _fd="public.key" ; \
  5551. openssl pkey -noout -text -pubin -in ${_fd} )
  5552. # 2)
  5553. ( _fd="private.key" ; \
  5554. openssl rsa -inform PEM -noout -in ${_fd} &> /dev/null ; \
  5555. if [ $? = 0 ] ; then echo -en "OK\n" ; fi )
  5556. ```
  5557. ###### Verification of the certificate
  5558. ```bash
  5559. ( _fd="certificate.crt" ; # format: pem, cer, crt \
  5560. openssl x509 -noout -text -in ${_fd} )
  5561. ```
  5562. ###### Verification of the CSR
  5563. ```bash
  5564. ( _fd_csr="request.csr" ; \
  5565. openssl req -text -noout -in ${_fd_csr} )
  5566. ```
  5567. ###### Check the private key and the certificate are match
  5568. ```bash
  5569. (openssl rsa -noout -modulus -in private.key | openssl md5 ; \
  5570. openssl x509 -noout -modulus -in certificate.crt | openssl md5) | uniq
  5571. ```
  5572. ###### Check the private key and the CSR are match
  5573. ```bash
  5574. (openssl rsa -noout -modulus -in private.key | openssl md5 ; \
  5575. openssl req -noout -modulus -in request.csr | openssl md5) | uniq
  5576. ```
  5577. ___
  5578. ##### Tool: [secure-delete](https://wiki.archlinux.org/index.php/Securely_wipe_disk)
  5579. ###### Secure delete with shred
  5580. ```bash
  5581. shred -vfuz -n 10 file
  5582. shred --verbose --random-source=/dev/urandom -n 1 /dev/sda
  5583. ```
  5584. ###### Secure delete with scrub
  5585. ```bash
  5586. scrub -p dod /dev/sda
  5587. scrub -p dod -r file
  5588. ```
  5589. ###### Secure delete with badblocks
  5590. ```bash
  5591. badblocks -s -w -t random -v /dev/sda
  5592. badblocks -c 10240 -s -w -t random -v /dev/sda
  5593. ```
  5594. ###### Secure delete with secure-delete
  5595. ```bash
  5596. srm -vz /tmp/file
  5597. sfill -vz /local
  5598. sdmem -v
  5599. swapoff /dev/sda5 && sswap -vz /dev/sda5
  5600. ```
  5601. ___
  5602. ##### Tool: [dd](https://en.wikipedia.org/wiki/Dd_(Unix))
  5603. ###### Show dd status every so often
  5604. ```bash
  5605. dd <dd_params> status=progress
  5606. watch --interval 5 killall -USR1 dd
  5607. ```
  5608. ###### Redirect output to a file with dd
  5609. ```bash
  5610. echo "string" | dd of=filename
  5611. ```
  5612. ___
  5613. ##### Tool: [gpg](https://www.gnupg.org/)
  5614. ###### Export public key
  5615. ```bash
  5616. gpg --export --armor "<username>" > username.pkey
  5617. ```
  5618. * `--export` - export all keys from all keyrings or specific key
  5619. * `-a|--armor` - create ASCII armored output
  5620. ###### Encrypt file
  5621. ```bash
  5622. gpg -e -r "<username>" dump.sql
  5623. ```
  5624. * `-e|--encrypt` - encrypt data
  5625. * `-r|--recipient` - encrypt for specific <username>
  5626. ###### Decrypt file
  5627. ```bash
  5628. gpg -o dump.sql -d dump.sql.gpg
  5629. ```
  5630. * `-o|--output` - use as output file
  5631. * `-d|--decrypt` - decrypt data (default)
  5632. ###### Search recipient
  5633. ```bash
  5634. gpg --keyserver hkp://keyserver.ubuntu.com --search-keys "<username>"
  5635. ```
  5636. * `--keyserver` - set specific key server
  5637. * `--search-keys` - search for keys on a key server
  5638. ###### List all of the packets in an encrypted file
  5639. ```bash
  5640. gpg --batch --list-packets archive.gpg
  5641. gpg2 --batch --list-packets archive.gpg
  5642. ```
  5643. ___
  5644. ##### Tool: [system-other](https://github.com/trimstray/the-book-of-secret-knowledge#tool-system-other)
  5645. ###### Reboot system from init
  5646. ```bash
  5647. exec /sbin/init 6
  5648. ```
  5649. ###### Init system from single user mode
  5650. ```bash
  5651. exec /sbin/init
  5652. ```
  5653. ###### Show current working directory of a process
  5654. ```bash
  5655. readlink -f /proc/<PID>/cwd
  5656. ```
  5657. ###### Show actual pathname of the executed command
  5658. ```bash
  5659. readlink -f /proc/<PID>/exe
  5660. ```
  5661. ##### Tool: [curl](https://curl.haxx.se)
  5662. ```bash
  5663. curl -Iks https://www.google.com
  5664. ```
  5665. * `-I` - show response headers only
  5666. * `-k` - insecure connection when using ssl
  5667. * `-s` - silent mode (not display body)
  5668. ```bash
  5669. curl -Iks --location -X GET -A "x-agent" https://www.google.com
  5670. ```
  5671. * `--location` - follow redirects
  5672. * `-X` - set method
  5673. * `-A` - set user-agent
  5674. ```bash
  5675. curl -Iks --location -X GET -A "x-agent" --proxy http://127.0.0.1:16379 https://www.google.com
  5676. ```
  5677. * `--proxy [socks5://|http://]` - set proxy server
  5678. ```bash
  5679. curl -o file.pdf -C - https://example.com/Aiju2goo0Ja2.pdf
  5680. ```
  5681. * `-o` - write output to file
  5682. * `-C` - resume the transfer
  5683. ###### Find your external IP address (external services)
  5684. ```bash
  5685. curl ipinfo.io
  5686. curl ipinfo.io/ip
  5687. curl icanhazip.com
  5688. curl ifconfig.me/ip ; echo
  5689. ```
  5690. ###### Repeat URL request
  5691. ```bash
  5692. # URL sequence substitution with a dummy query string:
  5693. curl -ks https://example.com/?[1-20]
  5694. # With shell 'for' loop:
  5695. for i in {1..20} ; do curl -ks https://example.com/ ; done
  5696. ```
  5697. ###### Check DNS and HTTP trace with headers for specific domains
  5698. ```bash
  5699. ### Set domains and external dns servers.
  5700. _domain_list=(google.com) ; _dns_list=("8.8.8.8" "1.1.1.1")
  5701. for _domain in "${_domain_list[@]}" ; do
  5702. printf '=%.0s' {1..48}
  5703. echo
  5704. printf "[\\e[1;32m+\\e[m] resolve: %s\\n" "$_domain"
  5705. for _dns in "${_dns_list[@]}" ; do
  5706. # Resolve domain.
  5707. host "${_domain}" "${_dns}"
  5708. echo
  5709. done
  5710. for _proto in http https ; do
  5711. printf "[\\e[1;32m+\\e[m] trace + headers: %s://%s\\n" "$_proto" "$_domain"
  5712. # Get trace and http headers.
  5713. curl -Iks -A "x-agent" --location "${_proto}://${_domain}"
  5714. echo
  5715. done
  5716. done
  5717. unset _domain_list _dns_list
  5718. ```
  5719. ___
  5720. ##### Tool: [httpie](https://httpie.org/)
  5721. ```bash
  5722. http -p Hh https://www.google.com
  5723. ```
  5724. * `-p` - print request and response headers
  5725. * `H` - request headers
  5726. * `B` - request body
  5727. * `h` - response headers
  5728. * `b` - response body
  5729. ```bash
  5730. http -p Hh https://www.google.com --follow --verify no
  5731. ```
  5732. * `-F, --follow` - follow redirects
  5733. * `--verify no` - skip SSL verification
  5734. ```bash
  5735. http -p Hh https://www.google.com --follow --verify no \
  5736. --proxy http:http://127.0.0.1:16379
  5737. ```
  5738. * `--proxy [http:]` - set proxy server
  5739. ##### Tool: [ssh](https://www.openssh.com/)
  5740. ###### Escape Sequence
  5741. ```
  5742. # Supported escape sequences:
  5743. ~. - terminate connection (and any multiplexed sessions)
  5744. ~B - send a BREAK to the remote system
  5745. ~C - open a command line
  5746. ~R - Request rekey (SSH protocol 2 only)
  5747. ~^Z - suspend ssh
  5748. ~# - list forwarded connections
  5749. ~& - background ssh (when waiting for connections to terminate)
  5750. ~? - this message
  5751. ~~ - send the escape character by typing it twice
  5752. ```
  5753. ###### Compare a remote file with a local file
  5754. ```bash
  5755. ssh user@host cat /path/to/remotefile | diff /path/to/localfile -
  5756. ```
  5757. ###### SSH connection through host in the middle
  5758. ```bash
  5759. ssh -t reachable_host ssh unreachable_host
  5760. ```
  5761. ###### Run command over SSH on remote host
  5762. ```bash
  5763. cat > cmd.txt << __EOF__
  5764. cat /etc/hosts
  5765. __EOF__
  5766. ssh host -l user $(<cmd.txt)
  5767. ```
  5768. ###### Get public key from private key
  5769. ```bash
  5770. ssh-keygen -y -f ~/.ssh/id_rsa
  5771. ```
  5772. ###### Get all fingerprints
  5773. ```bash
  5774. ssh-keygen -l -f .ssh/known_hosts
  5775. ```
  5776. ###### SSH authentication with user password
  5777. ```bash
  5778. ssh -o PreferredAuthentications=password -o PubkeyAuthentication=no user@remote_host
  5779. ```
  5780. ###### SSH authentication with publickey
  5781. ```bash
  5782. ssh -o PreferredAuthentications=publickey -o PubkeyAuthentication=yes -i id_rsa user@remote_host
  5783. ```
  5784. ###### Simple recording SSH session
  5785. ```bash
  5786. function _ssh_sesslog() {
  5787. _sesdir="<path/to/session/logs>"
  5788. mkdir -p "${_sesdir}" && \
  5789. ssh $@ 2>&1 | tee -a "${_sesdir}/$(date +%Y%m%d).log"
  5790. }
  5791. # Alias:
  5792. alias ssh='_ssh_sesslog'
  5793. ```
  5794. ###### Using Keychain for SSH logins
  5795. ```bash
  5796. ### Delete all of ssh-agent's keys.
  5797. function _scl() {
  5798. /usr/bin/keychain --clear
  5799. }
  5800. ### Add key to keychain.
  5801. function _scg() {
  5802. /usr/bin/keychain /path/to/private-key
  5803. source "$HOME/.keychain/$HOSTNAME-sh"
  5804. }
  5805. ```
  5806. ###### SSH login without processing any login scripts
  5807. ```bash
  5808. ssh -tt user@host bash
  5809. ```
  5810. ###### SSH local port forwarding
  5811. Example 1:
  5812. ```bash
  5813. # Forwarding our local 2250 port to nmap.org:443 from localhost through localhost
  5814. host1> ssh -L 2250:nmap.org:443 localhost
  5815. # Connect to the service:
  5816. host1> curl -Iks --location -X GET https://localhost:2250
  5817. ```
  5818. Example 2:
  5819. ```bash
  5820. # Forwarding our local 9051 port to db.d.x:5432 from localhost through node.d.y
  5821. host1> ssh -nNT -L 9051:db.d.x:5432 node.d.y
  5822. # Connect to the service:
  5823. host1> psql -U db_user -d db_dev -p 9051 -h localhost
  5824. ```
  5825. * `-n` - redirects stdin from `/dev/null`
  5826. * `-N` - do not execute a remote command
  5827. * `-T` - disable pseudo-terminal allocation
  5828. ###### SSH remote port forwarding
  5829. ```bash
  5830. # Forwarding our local 9051 port to db.d.x:5432 from host2 through node.d.y
  5831. host1> ssh -nNT -R 9051:db.d.x:5432 node.d.y
  5832. # Connect to the service:
  5833. host2> psql -U postgres -d postgres -p 8000 -h localhost
  5834. ```
  5835. ___
  5836. ##### Tool: [linux-dev](https://www.tldp.org/LDP/abs/html/devref1.html)
  5837. ###### Testing remote connection to port
  5838. ```bash
  5839. timeout 1 bash -c "</dev/<proto>/<host>/<port>" >/dev/null 2>&1 ; echo $?
  5840. ```
  5841. * `<proto` - set protocol (tcp/udp)
  5842. * `<host>` - set remote host
  5843. * `<port>` - set destination port
  5844. ###### Read and write to TCP or UDP sockets with common bash tools
  5845. ```bash
  5846. exec 5<>/dev/tcp/<host>/<port>; cat <&5 & cat >&5; exec 5>&-
  5847. ```
  5848. ___
  5849. ##### Tool: [tcpdump](http://www.tcpdump.org/)
  5850. ###### Filter incoming (on interface) traffic (specific <ip:port>)
  5851. ```bash
  5852. tcpdump -ne -i eth0 -Q in host 192.168.252.1 and port 443
  5853. ```
  5854. * `-n` - don't convert addresses (`-nn` will not resolve hostnames or ports)
  5855. * `-e` - print the link-level headers
  5856. * `-i [iface|any]` - set interface
  5857. * `-Q|-D [in|out|inout]` - choose send/receive direction (`-D` - for old tcpdump versions)
  5858. * `host [ip|hostname]` - set host, also `[host not]`
  5859. * `[and|or]` - set logic
  5860. * `port [1-65535]` - set port number, also `[port not]`
  5861. ###### Filter incoming (on interface) traffic (specific <ip:port>) and write to a file
  5862. ```bash
  5863. tcpdump -ne -i eth0 -Q in host 192.168.252.1 and port 443 -c 5 -w tcpdump.pcap
  5864. ```
  5865. * `-c [num]` - capture only num number of packets
  5866. * `-w [filename]` - write packets to file, `-r [filename]` - reading from file
  5867. ###### Capture all ICMP packets
  5868. ```bash
  5869. tcpdump -nei eth0 icmp
  5870. ```
  5871. ###### Check protocol used (TCP or UDP) for service
  5872. ```bash
  5873. tcpdump -nei eth0 tcp port 22 -vv -X | egrep "TCP|UDP"
  5874. ```
  5875. ###### Display ASCII text (to parse the output using grep or other)
  5876. ```bash
  5877. tcpdump -i eth0 -A -s0 port 443
  5878. ```
  5879. ###### Grab everything between two keywords
  5880. ```bash
  5881. tcpdump -i eth0 port 80 -X | sed -n -e '/username/,/=ldap/ p'
  5882. ```
  5883. ###### Grab user and pass ever plain http
  5884. ```bash
  5885. tcpdump -i eth0 port http -l -A | egrep -i \
  5886. 'pass=|pwd=|log=|login=|user=|username=|pw=|passw=|passwd=|password=|pass:|user:|username:|password:|login:|pass |user ' \
  5887. --color=auto --line-buffered -B20
  5888. ```
  5889. ###### Extract HTTP User Agent from HTTP request header
  5890. ```bash
  5891. tcpdump -ei eth0 -nn -A -s1500 -l | grep "User-Agent:"
  5892. ```
  5893. ###### Capture only HTTP GET and POST packets
  5894. ```bash
  5895. tcpdump -ei eth0 -s 0 -A -vv \
  5896. 'tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x47455420' or 'tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x504f5354'
  5897. ```
  5898. or simply:
  5899. ```bash
  5900. tcpdump -ei eth0 -s 0 -v -n -l | egrep -i "POST /|GET /|Host:"
  5901. ```
  5902. ###### Rotate capture files
  5903. ```bash
  5904. tcpdump -ei eth0 -w /tmp/capture-%H.pcap -G 3600 -C 200
  5905. ```
  5906. * `-G <num>` - pcap will be created every `<num>` seconds
  5907. * `-C <size>` - close the current pcap and open a new one if is larger than `<size>`
  5908. ###### Top hosts by packets
  5909. ```bash
  5910. tcpdump -ei enp0s25 -nnn -t -c 200 | cut -f 1,2,3,4 -d '.' | sort | uniq -c | sort -nr | head -n 20
  5911. ```
  5912. ###### Excludes any RFC 1918 private address
  5913. ```bash
  5914. tcpdump -nei eth0 'not (src net (10 or 172.16/12 or 192.168/16) and dst net (10 or 172.16/12 or 192.168/16))'
  5915. ```
  5916. ___
  5917. ##### Tool: [tcpick](http://tcpick.sourceforge.net/)
  5918. ###### Analyse packets in real-time
  5919. ```bash
  5920. while true ; do tcpick -a -C -r dump.pcap ; sleep 2 ; clear ; done
  5921. ```
  5922. ___
  5923. ##### Tool: [ngrep](http://ngrep.sourceforge.net/usage.html)
  5924. ```bash
  5925. ngrep -d eth0 "www.domain.com" port 443
  5926. ```
  5927. * `-d [iface|any]` - set interface
  5928. * `[domain]` - set hostname
  5929. * `port [1-65535]` - set port number
  5930. ```bash
  5931. ngrep -d eth0 "www.domain.com" src host 10.240.20.2 and port 443
  5932. ```
  5933. * `(host [ip|hostname])` - filter by ip or hostname
  5934. * `(port [1-65535])` - filter by port number
  5935. ```bash
  5936. ngrep -d eth0 -qt -O ngrep.pcap "www.domain.com" port 443
  5937. ```
  5938. * `-q` - quiet mode (only payloads)
  5939. * `-t` - added timestamps
  5940. * `-O [filename]` - save output to file, `-I [filename]` - reading from file
  5941. ```bash
  5942. ngrep -d eth0 -qt 'HTTP' 'tcp'
  5943. ```
  5944. * `HTTP` - show http headers
  5945. * `tcp|udp` - set protocol
  5946. * `[src|dst] host [ip|hostname]` - set direction for specific node
  5947. ```bash
  5948. ngrep -l -q -d eth0 -i "User-Agent: curl*"
  5949. ```
  5950. * `-l` - stdout line buffered
  5951. * `-i` - case-insensitive search
  5952. ___
  5953. ##### Tool: [hping3](http://www.hping.org/)
  5954. ```bash
  5955. hping3 -V -p 80 -s 5050 <scan_type> www.google.com
  5956. ```
  5957. * `-V|--verbose` - verbose mode
  5958. * `-p|--destport` - set destination port
  5959. * `-s|--baseport` - set source port
  5960. * `<scan_type>` - set scan type
  5961. * `-F|--fin` - set FIN flag, port open if no reply
  5962. * `-S|--syn` - set SYN flag
  5963. * `-P|--push` - set PUSH flag
  5964. * `-A|--ack` - set ACK flag (use when ping is blocked, RST response back if the port is open)
  5965. * `-U|--urg` - set URG flag
  5966. * `-Y|--ymas` - set Y unused flag (0x80 - nullscan), port open if no reply
  5967. * `-M 0 -UPF` - set TCP sequence number and scan type (URG+PUSH+FIN), port open if no reply
  5968. ```bash
  5969. hping3 -V -c 1 -1 -C 8 www.google.com
  5970. ```
  5971. * `-c [num]` - packet count
  5972. * `-1` - set ICMP mode
  5973. * `-C|--icmptype [icmp-num]` - set icmp type (default icmp-echo = 8)
  5974. ```bash
  5975. hping3 -V -c 1000000 -d 120 -S -w 64 -p 80 --flood --rand-source <remote_host>
  5976. ```
  5977. * `--flood` - sent packets as fast as possible (don't show replies)
  5978. * `--rand-source` - random source address mode
  5979. * `-d --data` - data size
  5980. * `-w|--win` - winsize (default 64)
  5981. ___
  5982. ##### Tool: [nmap](https://nmap.org/)
  5983. ###### Ping scans the network
  5984. ```bash
  5985. nmap -sP 192.168.0.0/24
  5986. ```
  5987. ###### Show only open ports
  5988. ```bash
  5989. nmap -F --open 192.168.0.0/24
  5990. ```
  5991. ###### Full TCP port scan using with service version detection
  5992. ```bash
  5993. nmap -p 1-65535 -sV -sS -T4 192.168.0.0/24
  5994. ```
  5995. ###### Nmap scan and pass output to Nikto
  5996. ```bash
  5997. nmap -p80,443 192.168.0.0/24 -oG - | nikto.pl -h -
  5998. ```
  5999. ###### Recon specific ip:service with Nmap NSE scripts stack
  6000. ```bash
  6001. # Set variables:
  6002. _hosts="192.168.250.10"
  6003. _ports="80,443"
  6004. # Set Nmap NSE scripts stack:
  6005. _nmap_nse_scripts="+dns-brute,\
  6006. +http-auth-finder,\
  6007. +http-chrono,\
  6008. +http-cookie-flags,\
  6009. +http-cors,\
  6010. +http-cross-domain-policy,\
  6011. +http-csrf,\
  6012. +http-dombased-xss,\
  6013. +http-enum,\
  6014. +http-errors,\
  6015. +http-git,\
  6016. +http-grep,\
  6017. +http-internal-ip-disclosure,\
  6018. +http-jsonp-detection,\
  6019. +http-malware-host,\
  6020. +http-methods,\
  6021. +http-passwd,\
  6022. +http-phpself-xss,\
  6023. +http-php-version,\
  6024. +http-robots.txt,\
  6025. +http-sitemap-generator,\
  6026. +http-shellshock,\
  6027. +http-stored-xss,\
  6028. +http-title,\
  6029. +http-unsafe-output-escaping,\
  6030. +http-useragent-tester,\
  6031. +http-vhosts,\
  6032. +http-waf-detect,\
  6033. +http-waf-fingerprint,\
  6034. +http-xssed,\
  6035. +traceroute-geolocation.nse,\
  6036. +ssl-enum-ciphers,\
  6037. +whois-domain,\
  6038. +whois-ip"
  6039. # Set Nmap NSE script params:
  6040. _nmap_nse_scripts_args="dns-brute.domain=${_hosts},http-cross-domain-policy.domain-lookup=true,"
  6041. _nmap_nse_scripts_args+="http-waf-detect.aggro,http-waf-detect.detectBodyChanges,"
  6042. _nmap_nse_scripts_args+="http-waf-fingerprint.intensive=1"
  6043. # Perform scan:
  6044. nmap --script="$_nmap_nse_scripts" --script-args="$_nmap_nse_scripts_args" -p "$_ports" "$_hosts"
  6045. ```
  6046. ___
  6047. ##### Tool: [netcat](http://netcat.sourceforge.net/)
  6048. ```bash
  6049. nc -kl 5000
  6050. ```
  6051. * `-l` - listen for an incoming connection
  6052. * `-k` - listening after client has disconnected
  6053. * `>filename.out` - save receive data to file (optional)
  6054. ```bash
  6055. nc 192.168.0.1 5051 < filename.in
  6056. ```
  6057. * `< filename.in` - send data to remote host
  6058. ```bash
  6059. nc -vz 10.240.30.3 5000
  6060. ```
  6061. * `-v` - verbose output
  6062. * `-z` - scan for listening daemons
  6063. ```bash
  6064. nc -vzu 10.240.30.3 1-65535
  6065. ```
  6066. * `-u` - scan only udp ports
  6067. ###### Transfer data file (archive)
  6068. ```bash
  6069. server> nc -l 5000 | tar xzvfp -
  6070. client> tar czvfp - /path/to/dir | nc 10.240.30.3 5000
  6071. ```
  6072. ###### Launch remote shell
  6073. ```bash
  6074. # 1)
  6075. server> nc -l 5000 -e /bin/bash
  6076. client> nc 10.240.30.3 5000
  6077. # 2)
  6078. server> rm -f /tmp/f; mkfifo /tmp/f
  6079. server> cat /tmp/f | /bin/bash -i 2>&1 | nc -l 127.0.0.1 5000 > /tmp/f
  6080. client> nc 10.240.30.3 5000
  6081. ```
  6082. ###### Simple file server
  6083. ```bash
  6084. while true ; do nc -l 5000 | tar -xvf - ; done
  6085. ```
  6086. ###### Simple minimal HTTP Server
  6087. ```bash
  6088. while true ; do nc -l -p 1500 -c 'echo -e "HTTP/1.1 200 OK\n\n $(date)"' ; done
  6089. ```
  6090. ###### Simple HTTP Server
  6091. > Restarts web server after each request - remove `while` condition for only single connection.
  6092. ```bash
  6093. cat > index.html << __EOF__
  6094. <!doctype html>
  6095. <head>
  6096. <meta charset="utf-8">
  6097. <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
  6098. <title></title>
  6099. <meta name="description" content="">
  6100. <meta name="viewport" content="width=device-width, initial-scale=1">
  6101. </head>
  6102. <body>
  6103. <p>
  6104. Hello! It's a site.
  6105. </p>
  6106. </body>
  6107. </html>
  6108. __EOF__
  6109. ```
  6110. ```bash
  6111. server> while : ; do \
  6112. (echo -ne "HTTP/1.1 200 OK\r\nContent-Length: $(wc -c <index.html)\r\n\r\n" ; cat index.html;) | \
  6113. nc -l -p 5000 \
  6114. ; done
  6115. ```
  6116. * `-p` - port number
  6117. ###### Simple HTTP Proxy (single connection)
  6118. ```bash
  6119. #!/usr/bin/env bash
  6120. if [[ $# != 2 ]] ; then
  6121. printf "%s\\n" \
  6122. "usage: ./nc-proxy listen-port bk_host:bk_port"
  6123. fi
  6124. _listen_port="$1"
  6125. _bk_host=$(echo "$2" | cut -d ":" -f1)
  6126. _bk_port=$(echo "$2" | cut -d ":" -f2)
  6127. printf " lport: %s\\nbk_host: %s\\nbk_port: %s\\n\\n" \
  6128. "$_listen_port" "$_bk_host" "$_bk_port"
  6129. _tmp=$(mktemp -d)
  6130. _back="$_tmp/pipe.back"
  6131. _sent="$_tmp/pipe.sent"
  6132. _recv="$_tmp/pipe.recv"
  6133. trap 'rm -rf "$_tmp"' EXIT
  6134. mkfifo -m 0600 "$_back" "$_sent" "$_recv"
  6135. sed "s/^/=> /" <"$_sent" &
  6136. sed "s/^/<= /" <"$_recv" &
  6137. nc -l -p "$_listen_port" <"$_back" | \
  6138. tee "$_sent" | \
  6139. nc "$_bk_host" "$_bk_port" | \
  6140. tee "$_recv" >"$_back"
  6141. ```
  6142. ```bash
  6143. server> chmod +x nc-proxy && ./nc-proxy 8080 192.168.252.10:8000
  6144. lport: 8080
  6145. bk_host: 192.168.252.10
  6146. bk_port: 8000
  6147. client> http -p h 10.240.30.3:8080
  6148. HTTP/1.1 200 OK
  6149. Accept-Ranges: bytes
  6150. Cache-Control: max-age=31536000
  6151. Content-Length: 2748
  6152. Content-Type: text/html; charset=utf-8
  6153. Date: Sun, 01 Jul 2018 20:12:08 GMT
  6154. Last-Modified: Sun, 01 Apr 2018 21:53:37 GMT
  6155. ```
  6156. ###### Create a single-use TCP or UDP proxy
  6157. ```bash
  6158. ### TCP -> TCP
  6159. nc -l -p 2000 -c "nc [ip|hostname] 3000"
  6160. ### TCP -> UDP
  6161. nc -l -p 2000 -c "nc -u [ip|hostname] 3000"
  6162. ### UDP -> UDP
  6163. nc -l -u -p 2000 -c "nc -u [ip|hostname] 3000"
  6164. ### UDP -> TCP
  6165. nc -l -u -p 2000 -c "nc [ip|hostname] 3000"
  6166. ```
  6167. ___
  6168. ##### Tool: [gnutls-cli](https://gnutls.org/manual/html_node/gnutls_002dcli-Invocation.html)
  6169. ###### Testing connection to remote host (with SNI support)
  6170. ```bash
  6171. gnutls-cli -p 443 google.com
  6172. ```
  6173. ###### Testing connection to remote host (without SNI support)
  6174. ```bash
  6175. gnutls-cli --disable-sni -p 443 google.com
  6176. ```
  6177. ___
  6178. ##### Tool: [socat](http://www.dest-unreach.org/socat/doc/socat.html)
  6179. ###### Testing remote connection to port
  6180. ```bash
  6181. socat - TCP4:10.240.30.3:22
  6182. ```
  6183. * `-` - standard input (STDIO)
  6184. * `TCP4:<params>` - set tcp4 connection with specific params
  6185. * `[hostname|ip]` - set hostname/ip
  6186. * `[1-65535]` - set port number
  6187. ###### Redirecting TCP-traffic to a UNIX domain socket under Linux
  6188. ```bash
  6189. socat TCP-LISTEN:1234,bind=127.0.0.1,reuseaddr,fork,su=nobody,range=127.0.0.0/8 UNIX-CLIENT:/tmp/foo
  6190. ```
  6191. * `TCP-LISTEN:<params>` - set tcp listen with specific params
  6192. * `[1-65535]` - set port number
  6193. * `bind=[hostname|ip]` - set bind hostname/ip
  6194. * `reuseaddr` - allows other sockets to bind to an address
  6195. * `fork` - keeps the parent process attempting to produce more connections
  6196. * `su=nobody` - set user
  6197. * `range=[ip-range]` - ip range
  6198. * `UNIX-CLIENT:<params>` - communicates with the specified peer socket
  6199. * `filename` - define socket
  6200. ___
  6201. ##### Tool: [p0f](http://lcamtuf.coredump.cx/p0f3/)
  6202. ###### Set iface in promiscuous mode and dump traffic to the log file
  6203. ```bash
  6204. p0f -i enp0s25 -p -d -o /dump/enp0s25.log
  6205. ```
  6206. * `-i` - listen on the specified interface
  6207. * `-p` - set interface in promiscuous mode
  6208. * `-d` - fork into background
  6209. * `-o` - output file
  6210. ___
  6211. ##### Tool: [netstat](https://en.wikipedia.org/wiki/Netstat)
  6212. ###### Graph # of connections for each hosts
  6213. ```bash
  6214. netstat -an | awk '/ESTABLISHED/ { split($5,ip,":"); if (ip[1] !~ /^$/) print ip[1] }' | \
  6215. sort | uniq -c | awk '{ printf("%s\t%s\t",$2,$1) ; for (i = 0; i < $1; i++) {printf("*")}; print "" }'
  6216. ```
  6217. ###### Monitor open connections for specific port including listen, count and sort it per IP
  6218. ```bash
  6219. watch "netstat -plan | grep :443 | awk {'print \$5'} | cut -d: -f 1 | sort | uniq -c | sort -nk 1"
  6220. ```
  6221. ###### Grab banners from local IPv4 listening ports
  6222. ```bash
  6223. netstat -nlt | grep 'tcp ' | grep -Eo "[1-9][0-9]*" | xargs -I {} sh -c "echo "" | nc -v -n -w1 127.0.0.1 {}"
  6224. ```
  6225. ___
  6226. ##### Tool: [rsync](https://en.wikipedia.org/wiki/Rsync)
  6227. ###### Rsync remote data as root using sudo
  6228. ```bash
  6229. rsync --rsync-path 'sudo rsync' username@hostname:/path/to/dir/ /local/
  6230. ```
  6231. ___
  6232. ##### Tool: [host](https://en.wikipedia.org/wiki/Host_(Unix))
  6233. ###### Resolves the domain name (using external dns server)
  6234. ```bash
  6235. host google.com 9.9.9.9
  6236. ```
  6237. ###### Checks the domain administrator (SOA record)
  6238. ```bash
  6239. host -t soa google.com 9.9.9.9
  6240. ```
  6241. ___
  6242. ##### Tool: [dig](https://en.wikipedia.org/wiki/Dig_(command))
  6243. ###### Resolves the domain name (short output)
  6244. ```bash
  6245. dig google.com +short
  6246. ```
  6247. ###### Lookup NS record for specific domain
  6248. ```bash
  6249. dig @9.9.9.9 google.com NS
  6250. ```
  6251. ###### Query only answer section
  6252. ```bash
  6253. dig google.com +nocomments +noquestion +noauthority +noadditional +nostats
  6254. ```
  6255. ###### Query ALL DNS Records
  6256. ```bash
  6257. dig google.com ANY +noall +answer
  6258. ```
  6259. ###### DNS Reverse Look-up
  6260. ```bash
  6261. dig -x 172.217.16.14 +short
  6262. ```
  6263. ___
  6264. ##### Tool: [certbot](https://certbot.eff.org/)
  6265. ###### Generate multidomain certificate
  6266. ```bash
  6267. certbot certonly -d example.com -d www.example.com
  6268. ```
  6269. ###### Generate wildcard certificate
  6270. ```bash
  6271. certbot certonly --manual --preferred-challenges=dns -d example.com -d *.example.com
  6272. ```
  6273. ###### Generate certificate with 4096 bit private key
  6274. ```bash
  6275. certbot certonly -d example.com -d www.example.com --rsa-key-size 4096
  6276. ```
  6277. ___
  6278. ##### Tool: [network-other](https://github.com/trimstray/the-book-of-secret-knowledge#tool-network-other)
  6279. ###### Get all subnets for specific AS (Autonomous system)
  6280. ```bash
  6281. AS="AS32934"
  6282. whois -h whois.radb.net -- "-i origin ${AS}" | \
  6283. grep "^route:" | \
  6284. cut -d ":" -f2 | \
  6285. sed -e 's/^[ \t]//' | \
  6286. sort -n -t . -k 1,1 -k 2,2 -k 3,3 -k 4,4 | \
  6287. cut -d ":" -f2 | \
  6288. sed -e 's/^[ \t]/allow /' | \
  6289. sed 's/$/;/' | \
  6290. sed 's/allow */subnet -> /g'
  6291. ```
  6292. ###### Resolves domain name from dns.google.com with curl and jq
  6293. ```bash
  6294. _dname="google.com" ; curl -s "https://dns.google.com/resolve?name=${_dname}&type=A" | jq .
  6295. ```
  6296. ##### Tool: [git](https://git-scm.com/)
  6297. ###### Log alias for a decent view of your repo
  6298. ```bash
  6299. # 1)
  6300. git log --oneline --decorate --graph --all
  6301. # 2)
  6302. git log --graph \
  6303. --pretty=format:'%Cred%h%Creset -%C(yellow)%d%Creset %s %Cgreen(%cr) %C(bold blue)<%an>%Creset' \
  6304. --abbrev-commit
  6305. ```
  6306. ___
  6307. ##### Tool: [python](https://www.python.org/)
  6308. ###### Static HTTP web server
  6309. ```bash
  6310. # Python 3.x
  6311. python3 -m http.server 8000 --bind 127.0.0.1
  6312. # Python 2.x
  6313. python -m SimpleHTTPServer 8000
  6314. ```
  6315. ###### Static HTTP web server with SSL support
  6316. ```bash
  6317. # Python 3.x
  6318. from http.server import HTTPServer, BaseHTTPRequestHandler
  6319. import ssl
  6320. httpd = HTTPServer(('localhost', 4443), BaseHTTPRequestHandler)
  6321. httpd.socket = ssl.wrap_socket (httpd.socket,
  6322. keyfile="path/to/key.pem",
  6323. certfile='path/to/cert.pem', server_side=True)
  6324. httpd.serve_forever()
  6325. # Python 2.x
  6326. import BaseHTTPServer, SimpleHTTPServer
  6327. import ssl
  6328. httpd = BaseHTTPServer.HTTPServer(('localhost', 4443),
  6329. SimpleHTTPServer.SimpleHTTPRequestHandler)
  6330. httpd.socket = ssl.wrap_socket (httpd.socket,
  6331. keyfile="path/tp/key.pem",
  6332. certfile='path/to/cert.pem', server_side=True)
  6333. httpd.serve_forever()
  6334. ```
  6335. ###### Encode base64
  6336. ```bash
  6337. python -m base64 -e <<< "sample string"
  6338. ```
  6339. ###### Decode base64
  6340. ```bash
  6341. python -m base64 -d <<< "dGhpcyBpcyBlbmNvZGVkCg=="
  6342. ```
  6343. ##### Tool: [awk](http://www.grymoire.com/Unix/Awk.html)
  6344. ###### Search for matching lines
  6345. ```bash
  6346. # egrep foo
  6347. awk '/foo/' filename
  6348. ```
  6349. ###### Search non matching lines
  6350. ```bash
  6351. # egrep -v foo
  6352. awk '!/foo/' filename
  6353. ```
  6354. ###### Print matching lines with numbers
  6355. ```bash
  6356. # egrep -n foo
  6357. awk '/foo/{print FNR,$0}' filename
  6358. ```
  6359. ###### Print the last column
  6360. ```bash
  6361. awk '{print $NF}' filename
  6362. ```
  6363. ###### Find all the lines longer than 80 characters
  6364. ```bash
  6365. awk 'length($0)>80{print FNR,$0}' filename
  6366. ```
  6367. ###### Print only lines of less than 80 characters
  6368. ```bash
  6369. awk 'length < 80' filename
  6370. ```
  6371. ###### Print double new lines a file
  6372. ```bash
  6373. awk '1; { print "" }' filename
  6374. ```
  6375. ###### Print line numbers
  6376. ```bash
  6377. awk '{ print FNR "\t" $0 }' filename
  6378. awk '{ printf("%5d : %s\n", NR, $0) }' filename # in a fancy manner
  6379. ```
  6380. ###### Print line numbers for only non-blank lines
  6381. ```bash
  6382. awk 'NF { $0=++a " :" $0 }; { print }' filename
  6383. ```
  6384. ###### Print the line and the next two (i=5) lines after the line matching regexp
  6385. ```bash
  6386. awk '/foo/{i=5+1;}{if(i){i--; print;}}' filename
  6387. ```
  6388. ###### Print the lines starting at the line matching 'server {' until the line matching '}'
  6389. ```bash
  6390. awk '/server {/,/}/' filename
  6391. ```
  6392. ###### Print multiple columns with separators
  6393. ```bash
  6394. awk -F' ' '{print "ip:\t" $2 "\n port:\t" $3' filename
  6395. ```
  6396. ###### Remove empty lines
  6397. ```bash
  6398. awk 'NF > 0' filename
  6399. # alternative:
  6400. awk NF filename
  6401. ```
  6402. ###### Delete trailing white space (spaces, tabs)
  6403. ```bash
  6404. awk '{sub(/[ \t]*$/, "");print}' filename
  6405. ```
  6406. ###### Delete leading white space
  6407. ```bash
  6408. awk '{sub(/^[ \t]+/, ""); print}' filename
  6409. ```
  6410. ###### Remove duplicate consecutive lines
  6411. ```bash
  6412. # uniq
  6413. awk 'a !~ $0{print}; {a=$0}' filename
  6414. ```
  6415. ###### Remove duplicate entries in a file without sorting
  6416. ```bash
  6417. awk '!x[$0]++' filename
  6418. ```
  6419. ###### Exclude multiple columns
  6420. ```bash
  6421. awk '{$1=$3=""}1' filename
  6422. ```
  6423. ###### Substitute foo for bar on lines matching regexp
  6424. ```bash
  6425. awk '/regexp/{gsub(/foo/, "bar")};{print}' filename
  6426. ```
  6427. ###### Add some characters at the beginning of matching lines
  6428. ```bash
  6429. awk '/regexp/{sub(/^/, "++++"); print;next;}{print}' filename
  6430. ```
  6431. ###### Get the last hour of Apache logs
  6432. ```bash
  6433. awk '/'$(date -d "1 hours ago" "+%d\\/%b\\/%Y:%H:%M")'/,/'$(date "+%d\\/%b\\/%Y:%H:%M")'/ { print $0 }' \
  6434. /var/log/httpd/access_log
  6435. ```
  6436. ___
  6437. ##### Tool: [sed](http://www.grymoire.com/Unix/Sed.html)
  6438. ###### Print a specific line from a file
  6439. ```bash
  6440. sed -n 10p /path/to/file
  6441. ```
  6442. ###### Remove a specific line from a file
  6443. ```bash
  6444. sed -i 10d /path/to/file
  6445. # alternative (BSD): sed -i'' 10d /path/to/file
  6446. ```
  6447. ###### Remove a range of lines from a file
  6448. ```bash
  6449. sed -i <file> -re '<start>,<end>d'
  6450. ```
  6451. ###### Replace newline(s) with a space
  6452. ```bash
  6453. sed ':a;N;$!ba;s/\n/ /g' /path/to/file
  6454. # cross-platform compatible syntax:
  6455. sed -e ':a' -e 'N' -e '$!ba' -e 's/\n/ /g' /path/to/file
  6456. ```
  6457. - `:a` create a label `a`
  6458. - `N` append the next line to the pattern space
  6459. - `$!` if not the last line, ba branch (go to) label `a`
  6460. - `s` substitute, `/\n/` regex for new line, `/ /` by a space, `/g` global match (as many times as it can)
  6461. Alternatives:
  6462. ```bash
  6463. # perl version (sed-like speed):
  6464. perl -p -e 's/\n/ /' /path/to/file
  6465. # bash version (slow):
  6466. while read line ; do printf "%s" "$line " ; done < file
  6467. ```
  6468. ###### Delete string +N next lines
  6469. ```bash
  6470. sed '/start/,+4d' /path/to/file
  6471. ```
  6472. ___
  6473. ##### Tool: [grep](http://www.grymoire.com/Unix/Grep.html)
  6474. ###### Search for a "pattern" inside all files in the current directory
  6475. ```bash
  6476. grep -rn "pattern"
  6477. grep -RnisI "pattern" *
  6478. fgrep "pattern" * -R
  6479. ```
  6480. ###### Show only for multiple patterns
  6481. ```bash
  6482. grep 'INFO*'\''WARN' filename
  6483. grep 'INFO\|WARN' filename
  6484. grep -e INFO -e WARN filename
  6485. grep -E '(INFO|WARN)' filename
  6486. egrep "INFO|WARN" filename
  6487. ```
  6488. ###### Except multiple patterns
  6489. ```bash
  6490. grep -vE '(error|critical|warning)' filename
  6491. ```
  6492. ###### Show data from file without comments
  6493. ```bash
  6494. grep -v ^[[:space:]]*# filename
  6495. ```
  6496. ###### Show data from file without comments and new lines
  6497. ```bash
  6498. egrep -v '#|^$' filename
  6499. ```
  6500. ###### Show strings with a dash/hyphen
  6501. ```bash
  6502. grep -e -- filename
  6503. grep -- -- filename
  6504. grep "\-\-" filename
  6505. ```
  6506. ###### Remove blank lines from a file and save output to new file
  6507. ```bash
  6508. grep . filename > newfilename
  6509. ```
  6510. ##### Tool: [perl](https://www.perl.org/)
  6511. ###### Search and replace (in place)
  6512. ```bash
  6513. perl -i -pe's/SEARCH/REPLACE/' filename
  6514. ```
  6515. ###### Edit of `*.conf` files changing all foo to bar (and backup original)
  6516. ```bash
  6517. perl -p -i.orig -e 's/\bfoo\b/bar/g' *.conf
  6518. ```
  6519. ###### Prints the first 20 lines from `*.conf` files
  6520. ```bash
  6521. perl -pe 'exit if $. > 20' *.conf
  6522. ```
  6523. ###### Search lines 10 to 20
  6524. ```bash
  6525. perl -ne 'print if 10 .. 20' filename
  6526. ```
  6527. ###### Delete first 10 lines (and backup original)
  6528. ```bash
  6529. perl -i.orig -ne 'print unless 1 .. 10' filename
  6530. ```
  6531. ###### Delete all but lines between foo and bar (and backup original)
  6532. ```bash
  6533. perl -i.orig -ne 'print unless /^foo$/ .. /^bar$/' filename
  6534. ```
  6535. ###### Reduce multiple blank lines to a single line
  6536. ```bash
  6537. perl -p -i -00pe0 filename
  6538. ```
  6539. ###### Convert tabs to spaces (1t = 2sp)
  6540. ```bash
  6541. perl -p -i -e 's/\t/ /g' filename
  6542. ```
  6543. ###### Read input from a file and report number of lines and characters
  6544. ```bash
  6545. perl -lne '$i++; $in += length($_); END { print "$i lines, $in characters"; }' filename
  6546. ```
  6547. #### Shell functions &nbsp;[<sup>[TOC]</sup>](#anger-table-of-contents)
  6548. ##### Table of Contents
  6549. - [Domain resolve](#domain-resolve)
  6550. - [Get ASN](#get-asn)
  6551. ###### Domain resolve
  6552. ```bash
  6553. # Dependencies:
  6554. # - curl
  6555. # - jq
  6556. function DomainResolve() {
  6557. local _host="$1"
  6558. local _curl_base="curl --request GET"
  6559. local _timeout="15"
  6560. _host_ip=$($_curl_base -ks -m "$_timeout" "https://dns.google.com/resolve?name=${_host}&type=A" | \
  6561. jq '.Answer[0].data' | tr -d "\"" 2>/dev/null)
  6562. if [[ -z "$_host_ip" ]] || [[ "$_host_ip" == "null" ]] ; then
  6563. echo -en "Unsuccessful domain name resolution.\\n"
  6564. else
  6565. echo -en "$_host > $_host_ip\\n"
  6566. fi
  6567. }
  6568. ```
  6569. Example:
  6570. ```bash
  6571. shell> DomainResolve nmap.org
  6572. nmap.org > 45.33.49.119
  6573. shell> DomainResolve nmap.org
  6574. Unsuccessful domain name resolution.
  6575. ```
  6576. ###### Get ASN
  6577. ```bash
  6578. # Dependencies:
  6579. # - curl
  6580. function GetASN() {
  6581. local _ip="$1"
  6582. local _curl_base="curl --request GET"
  6583. local _timeout="15"
  6584. _asn=$($_curl_base -ks -m "$_timeout" "http://ip-api.com/line/${_ip}?fields=as")
  6585. _state=$(echo $?)
  6586. if [[ -z "$_ip" ]] || [[ "$_ip" == "null" ]] || [[ "$_state" -ne 0 ]]; then
  6587. echo -en "Unsuccessful ASN gathering.\\n"
  6588. else
  6589. echo -en "$_ip > $_asn\\n"
  6590. fi
  6591. }
  6592. ```
  6593. Example:
  6594. ```bash
  6595. shell> GetASN 1.1.1.1
  6596. 1.1.1.1 > AS13335 Cloudflare, Inc.
  6597. shell> GetASN 0.0.0.0
  6598. Unsuccessful ASN gathering.
  6599. ```