From bd19e8e9732055e6492f38c82ff3560478597b40 Mon Sep 17 00:00:00 2001 From: Catherine Oborski Date: Thu, 19 Sep 2024 18:21:22 -0500 Subject: [PATCH] added Archive of my Own; Updated site menu --- conf.py | 3 + pages/AM3/the-book-of-secret-knowlage.md | 4465 +++++++++++++++++ public/2024/09/18/index.html | 3 + public/2024/09/19/index.html | 3 + public/2024/09/index.html | 3 + public/2024/index.html | 3 + public/archive.html | 3 + public/categories.html | 3 + public/galleries/demo/index.html | 3 + public/galleries/demo/rss.xml | 2 +- public/galleries/index.html | 3 + public/galleries/rss.xml | 2 +- public/index.html | 3 + public/links/index.html | 3 + public/listings/hello.py.html | 3 + public/listings/index.html | 3 + public/pages/AM3/index.html | 66 + .../the-book-of-secret-knowlage/index.html | 4022 +++++++++++++++ .../AM3/the-book-of-secret-knowlage/index.md | 4465 +++++++++++++++++ public/pages/about/index.html | 3 + public/pages/css-test-page/index.html | 3 + public/pages/guestbook/index.html | 3 + public/pages/index.html | 3 + public/pages/links/index.html | 3 + public/pages/under-construction/index.html | 3 + .../index.html | 3 + public/posts/state-of-the-apps/index.html | 3 + public/recommendations/index.html | 3 + public/sitemap.xml | 16 +- public/sitemapindex.xml | 6 +- public/tags.html | 3 + public/tags/about/index.html | 3 + public/tags/dev-news/index.html | 3 + public/tags/link/index.html | 3 + public/tags/news/index.html | 3 + public/tags/node-js/index.html | 3 + .../tags/software-recomendations/index.html | 3 + 37 files changed, 13122 insertions(+), 9 deletions(-) create mode 100644 pages/AM3/the-book-of-secret-knowlage.md create mode 100644 public/pages/AM3/index.html create mode 100644 public/pages/AM3/the-book-of-secret-knowlage/index.html create mode 100644 public/pages/AM3/the-book-of-secret-knowlage/index.md diff --git a/conf.py b/conf.py index 8cc3b23..a9bb224 100644 --- a/conf.py +++ b/conf.py @@ -150,6 +150,9 @@ ("/", "Home"), ("/pages/about/", "About"), ("https://coborski.bearblog.dev/blog/", "ʕ•ᴥ•ʔ blog"), + ("/pages/", "Pages"), + ("/posts/", "Posts"), + ("/pages/am3/", "Archive of My Own"), ("/pages/links/", "Links"), ("/pages/guestbook/", "Guestbook"), ("/categories", "Categories"), diff --git a/pages/AM3/the-book-of-secret-knowlage.md b/pages/AM3/the-book-of-secret-knowlage.md new file mode 100644 index 0000000..56abedb --- /dev/null +++ b/pages/AM3/the-book-of-secret-knowlage.md @@ -0,0 +1,4465 @@ +--- +category: 'Archive of My Own' +date: 2024-09-19 18:05:42 UTC-05:00 +description: 'A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools, and more.' +link: 'https://raw.githubusercontent.com/pwnllc/the-book-of-secret-knowledge/refs/heads/patch-1/README.md' +slug: the-book-of-secret-knowlage +tags: 'aw3, reference, archive, recommendations, cli, tools' +title: The Book of Secret Knowlage +type: text +--- +

+ + Master + +

+ +

"Knowledge is powerful, be careful how you use it!"

+ +

A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools, and more.

+ +
+ +

+ + Pull Requests + + + MIT License + +

+ +

+ + + +

+ +
+ Created by + trimstray and + contributors +
+ +
+ +**** + +## :notebook_with_decorative_cover:  What is it? + +This repository is a collection of various materials and tools that I use every day in my work. It contains a lot of useful information gathered in one piece. It is an invaluable source of knowledge for me that I often look back on. + +## :restroom:  For whom? + +For everyone, really. Here everyone can find their favourite tastes. But to be perfectly honest, it is aimed towards System and Network administrators, DevOps, Pentesters, and Security Researchers. + +## :information_source:  Contributing + +If you find something which doesn't make sense, or something doesn't seem right, please make a pull request and please add valid and well-reasoned explanations about your changes or comments. + +A few simple rules for this project: + +- inviting and clear +- not tiring +- useful + +These below rules may be better: + +- easy to contribute to (Markdown + HTML ...) +- easy to find (simple TOC, maybe it's worth extending them?) + +Url marked **\*** is temporary unavailable. Please don't delete it without confirming that it has permanently expired. + +Before adding a pull request, please see the **[contributing guidelines](.github/CONTRIBUTING.md)**. You should also remember about this: + +```diff ++ This repository is not meant to contain everything but only good quality stuff. +``` + +All **suggestions/PR** are welcome! + +### Code Contributors + +This project exists thanks to all the people who contribute. + + + +### Financial Contributors + +

+ + + + + + +

+ +## :newspaper:  RSS Feed & Updates + +GitHub exposes an [RSS/Atom](https://github.com/trimstray/the-book-of-secret-knowledge/commits.atom) feed of the commits, which may also be useful if you want to be kept informed about all changes. + +## :ballot_box_with_check:  ToDo + +- [ ] Add new stuff... +- [ ] Add useful shell functions +- [ ] Add one-liners for collection tools (eg. CLI Tools) +- [ ] Sort order in lists + +New items are also added on a regular basis. + +## :anger:  Table of Contents + +Only main chapters: + +- **[CLI Tools](#cli-tools-toc)** +- **[GUI Tools](#gui-tools-toc)** +- **[Web Tools](#web-tools-toc)** +- **[Systems/Services](#systemsservices-toc)** +- **[Networks](#networks-toc)** +- **[Containers/Orchestration](#containersorchestration-toc)** +- **[Manuals/Howtos/Tutorials](#manualshowtostutorials-toc)** +- **[Inspiring Lists](#inspiring-lists-toc)** +- **[Blogs/Podcasts/Videos](#blogspodcastsvideos-toc)** +- **[Hacking/Penetration Testing](#hackingpenetration-testing-toc)** +- **[Your daily knowledge and news](#your-daily-knowledge-and-news-toc)** +- **[Other Cheat Sheets](#other-cheat-sheets-toc)** +- **[Shell One-liners](#shell-one-liners-toc)** +- **[Shell Tricks](#shell-tricks-toc)** +- **[Shell Functions](#shell-functions-toc)** + +## :trident:  The Book of Secret Knowledge (Chapters) + +#### CLI Tools  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: Shells + +

+   GNU Bash - is an sh-compatible shell that incorporates useful features from the Korn shell and C shell.
+   Zsh - is a shell designed for interactive use, although it is also a powerful scripting language.
+   tclsh - is a very powerful cross-platform shell, suitable for a huge range of uses.
+   bash-it - is a framework for using, developing and maintaining shell scripts and custom commands.
+   Oh My ZSH! - is the best framework for managing your Zsh configuration.
+   Oh My Fish - the Fishshell framework.
+   Starship - the cross-shell prompt written in Rust.
+   powerlevel10k - is a fast reimplementation of Powerlevel9k ZSH theme.
+

+ +##### :black_small_square: Shell plugins + +

+   z - tracks the folder you use the most and allow you to jump, without having to type the whole path.
+   fzf - is a general-purpose command-line fuzzy finder.
+   zsh-autosuggestions - Fish-like autosuggestions for Zsh.
+   zsh-syntax-highlighting - Fish shell like syntax highlighting for Zsh.
+   Awesome ZSH Plugins - A list of frameworks, plugins, themes and tutorials for ZSH.
+

+ +##### :black_small_square: Managers + +

+   Midnight Commander - is a visual file manager, licensed under GNU General Public License.
+   ranger - is a VIM-inspired filemanager for the console.
+   nnn - is a tiny, lightning fast, feature-packed file manager.
+   screen - is a full-screen window manager that multiplexes a physical terminal.
+   tmux - is a terminal multiplexer, lets you switch easily between several programs in one terminal.
+   tmux-cssh - is a tool to set comfortable and easy to use functionality tmux-sessions.
+

+ +##### :black_small_square: Text editors + +

+   vi - is one of the most common text editors on Unix.
+   vim - is a highly configurable text editor.
+   emacs - is an extensible, customizable, free/libre text editor, and more.
+   micro - is a modern and intuitive terminal-based text editor.
+   neovim - is a free open source, powerful, extensible and usable code editor.
+   spacemacs - a community-driven Emacs distribution.
+   spacevim - a community-driven vim distribution.
+

+ +##### :black_small_square: Files and directories + +

+   fd - is a simple, fast and user-friendly alternative to find.
+   ncdu - is an easy to use, fast disk usage analyzer.
+

+ +##### :black_small_square: Network + +

+   PuTTY - is an SSH and telnet client, developed originally by Simon Tatham.
+   Mosh - is a SSH wrapper designed to keep a SSH session alive over a volatile connection.
+   Eternal Terminal - enables mouse-scrolling and tmux commands inside the SSH session.
+   nmap - is a free and open source (license) utility for network discovery and security auditing.
+   zmap - is a fast single packet network scanner designed for Internet-wide network surveys.
+   Rust Scan - to find all open ports faster than Nmap.
+   masscan - is the fastest Internet port scanner, spews SYN packets asynchronously.
+   pbscan - is a faster and more efficient stateless SYN scanner and banner grabber.
+   hping - is a command-line oriented TCP/IP packet assembler/analyzer.
+   mtr - is a tool that combines the functionality of the 'traceroute' and 'ping' programs in a single tool.
+   mylg - utility which combines the functions of the different network probes in one diagnostic tool.
+   netcat - utility which reads and writes data across network connections, using the TCP/IP protocol.
+   socat - utility which transfers data between two objects.
+   tcpdump - is a powerful command-line packet analyzer.
+   tshark - is a tool that allows us to dump and analyze network traffic (wireshark cli).
+   Termshark - is a simple terminal user-interface for tshark.
+   ngrep - is like GNU grep applied to the network layer.
+   netsniff-ng - is a Swiss army knife for your daily Linux network plumbing if you will.
+   sockdump - dump unix domain socket traffic.
+   stenographer - is a packet capture solution which aims to quickly spool all packets to disk.
+   tcpterm - visualize packets in TUI.
+   bmon - is a monitoring and debugging tool to capture networking related statistics and prepare them visually.
+   iptraf-ng - is a console-based network monitoring program for Linux that displays information about IP traffic.
+   vnstat - is a network traffic monitor for Linux and BSD.
+   iPerf3 - is a tool for active measurements of the maximum achievable bandwidth on IP networks.
+   ethr - is a Network Performance Measurement Tool for TCP, UDP & HTTP.
+   Etherate - is a Linux CLI based Ethernet and MPLS traffic testing tool.
+   echoip - is a IP address lookup service.
+   Nemesis - packet manipulation CLI tool; craft and inject packets of several protocols.
+   packetfu - a mid-level packet manipulation library for Ruby.
+   Scapy - packet manipulation library; forge, send, decode, capture packets of a wide number of protocols.
+   impacket - is a collection of Python classes for working with network protocols.
+   ssh-audit - is a tool for SSH server auditing.
+   aria2 - is a lightweight multi-protocol & multi-source command-line download utility.
+   iptables-tracer - observe the path of packets through the iptables chains.
+   inception - a highly configurable tool to check for whatever you like against any number of hosts.
+   mRemoteNG - a fork of mRemote, multi-tabbed PuTTy on steroids!
+

+ +##### :black_small_square: Network (DNS) + +

+   dnsdiag - is a DNS diagnostics and performance measurement tools.
+   fierce - is a DNS reconnaissance tool for locating non-contiguous IP space.
+   subfinder - is a subdomain discovery tool that discovers valid subdomains for websites.
+   sublist3r - is a fast subdomains enumeration tool for penetration testers.
+   amass - is tool that obtains subdomain names by scraping data sources, crawling web archives, and more.
+   namebench - provides personalized DNS server recommendations based on your browsing history.
+   massdns - is a high-performance DNS stub resolver for bulk lookups and reconnaissance.
+   knock - is a tool to enumerate subdomains on a target domain through a wordlist.
+   dnsperf - DNS performance testing tools.
+   dnscrypt-proxy 2 - a flexible DNS proxy, with support for encrypted DNS protocols.
+   dnsdbq - API client providing access to passive DNS database systems.
+   grimd - fast dns proxy, built to black-hole internet advertisements and malware servers.
+    dnstwist - detect typosquatters, phishing attacks, fraud, and brand impersonation.
+

+ +##### :black_small_square: Network (HTTP) + +

+   curl - is a command line tool and library for transferring data with URLs.
+   kurly - is an alternative to the widely popular curl program, written in Golang.
+   HTTPie - is an user-friendly HTTP client.
+   wuzz - is an interactive cli tool for HTTP inspection.
+   h2spec - is a conformance testing tool for HTTP/2 implementation.
+   h2t - is a simple tool to help sysadmins to hardening their websites.
+   htrace.sh - is a simple Swiss Army knife for http/https troubleshooting and profiling.
+   httpstat - is a tool that visualizes curl statistics in a way of beauty and clarity.
+   httplab - is an interactive web server.
+   Lynx - is a text browser for the World Wide Web.
+   Browsh - is a fully interactive, real-time, and modern text-based browser.
+   HeadlessBrowsers - a list of (almost) all headless web browsers in existence.
+   ab - is a single-threaded command line tool for measuring the performance of HTTP web servers.
+   siege - is an http load testing and benchmarking utility.
+   wrk - is a modern HTTP benchmarking tool capable of generating significant load.
+   wrk2 - is a constant throughput, correct latency recording variant of wrk.
+   vegeta - is a constant throughput, correct latency recording variant of wrk.
+   bombardier - is a fast cross-platform HTTP benchmarking tool written in Go.
+   gobench - http/https load testing and benchmarking tool.
+   hey - HTTP load generator, ApacheBench (ab) replacement, formerly known as rakyll/boom.
+   boom - is a script you can use to quickly smoke-test your web app deployment.
+   SlowHTTPTest - is a tool that simulates some Application Layer Denial of Service attacks by prolonging HTTP.
+   gobuster - is a free and open source directory/file & DNS busting tool written in Go.
+   ssllabs-scan - command-line reference-implementation client for SSL Labs APIs.
+   http-observatory - Mozilla HTTP Observatory cli version.
+   Hurl - is a command line tool to run and test HTTP requests with plain text.
+

+ +##### :black_small_square: SSL + +

+   openssl - is a robust, commercial-grade, and full-featured toolkit for the TLS and SSL protocols.
+   gnutls-cli - client program to set up a TLS connection to some other computer.
+   sslyze + - fast and powerful SSL/TLS server scanning library.
+   sslscan - tests SSL/TLS enabled services to discover supported cipher suites.
+   testssl.sh - testing TLS/SSL encryption anywhere on any port.
+   cipherscan - a very simple way to find out which SSL ciphersuites are supported by a target.
+   spiped - is a utility for creating symmetrically encrypted and authenticated pipes between socket addresses.
+   Certbot - is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server.
+   mkcert - simple zero-config tool to make locally trusted development certificates with any names you'd like.
+   certstrap - tools to bootstrap CAs, certificate requests, and signed certificates.
+   Sublert - is a security and reconnaissance tool to automatically monitor new subdomains.
+   mkchain - open source tool to help you build a valid SSL certificate chain.
+   ssl-cert-check - SSL Certification Expiration Checker.
+

+ +##### :black_small_square: Security + +

+   SELinux - provides a flexible Mandatory Access Control (MAC) system built into the Linux kernel.
+   AppArmor - proactively protects the operating system and applications from external or internal threats.
+   grapheneX - Automated System Hardening Framework.
+   DevSec Hardening Framework - Security + DevOps: Automatic Server Hardening.
+

+ +##### :black_small_square: Auditing Tools + +

+   ossec - actively monitoring all aspects of system activity with file integrity monitoring.
+   auditd - provides a way to track security-relevant information on your system.
+   Tiger - is a security tool that can be use both as a security audit and intrusion detection system.
+   Lynis - battle-tested security tool for systems running Linux, macOS, or Unix-based operating system.
+   LinEnum - scripted Local Linux Enumeration & Privilege Escalation Checks.
+   Rkhunter - scanner tool for Linux systems that scans backdoors, rootkits and local exploits on your systems.
+   PE-sieve - is a light-weight tool that helps to detect malware running on the system.
+   PEASS - privilege escalation tools for Windows and Linux/Unix and MacOS.
+

+ +##### :black_small_square: System Diagnostics/Debuggers + +

+   strace - diagnostic, debugging and instructional userspace utility for Linux.
+   DTrace - is a performance analysis and troubleshooting tool.
+   ltrace - is a library call tracer, used to trace calls made by programs to library functions.
+   ptrace-burrito - is a friendly wrapper around ptrace.
+   perf-tools - performance analysis tools based on Linux perf_events (aka perf) and ftrace.
+   bpftrace - high-level tracing language for Linux eBPF.
+   sysdig - system exploration and troubleshooting tool with first class support for containers.
+   Valgrind - is an instrumentation framework for building dynamic analysis tools.
+   gperftools - high-performance multi-threaded malloc() implementation, plus some performance analysis tools.
+   glances - cross-platform system monitoring tool written in Python.
+   htop - interactive text-mode process viewer for Unix systems. It aims to be a better 'top'.
+   bashtop - Linux resource monitor written in pure Bash.
+   nmon - a single executable for performance monitoring and data analysis.
+   atop - ASCII performance monitor. Includes statistics for CPU, memory, disk, swap, network, and processes.
+   lsof - displays in its output information about files that are opened by processes.
+   FlameGraph - stack trace visualizer.
+   lsofgraph - convert Unix lsof output to a graph showing FIFO and UNIX interprocess communication.
+   rr - is a lightweight tool for recording, replaying and debugging execution of applications.
+   Performance Co-Pilot - a system performance analysis toolkit.
+   hexyl - a command-line hex viewer.
+   Austin - Python frame stack sampler for CPython.
+

+ +##### :black_small_square: Log Analyzers + +

+   angle-grinder - slice and dice log files on the command line.
+   lnav - log file navigator with search and automatic refresh.
+   GoAccess - real-time web log analyzer and interactive viewer that runs in a terminal.
+   ngxtop - real-time metrics for nginx server.
+

+ +##### :black_small_square: Databases + +

+   usql - universal command-line interface for SQL databases.
+   pgcli - postgres CLI with autocompletion and syntax highlighting.
+   mycli - terminal client for MySQL with autocompletion and syntax highlighting.
+   litecli - SQLite CLI with autocompletion and syntax highlighting.
+    mssql-cli - SQL Server CLI with autocompletion and syntax highlighting.
+   OSQuery - is a SQL powered operating system instrumentation, monitoring, and analytics framework.
+   pgsync - sync data from one Postgres database to another.
+   iredis - a terminal client for redis with autocompletion and syntax highlighting.
+   SchemaCrawler - generates an E-R diagram of your database.
+

+ +##### :black_small_square: TOR + +

+   Nipe - script to make Tor Network your default gateway.
+   multitor - a tool that lets you create multiple TOR instances with a load-balancing.
+

+ +##### :black_small_square: Messengers/IRC Clients + +

+   Irssi - is a free open source terminal based IRC client.
+   WeeChat - is an extremely extensible and lightweight IRC client.
+

+ +##### :black_small_square: Productivity + +

+   taskwarrior - task management system, todo list
+

+ +##### :black_small_square: Other + +

+   sysadmin-util - tools for Linux/Unix sysadmins.
+   incron - is an inode-based filesystem notification technology.
+   lsyncd - synchronizes local directories with remote targets (Live Syncing Daemon).
+   GRV - is a terminal based interface for viewing Git repositories.
+   Tig - text-mode interface for Git.
+   tldr - simplified and community-driven man pages.
+   archiver - easily create and extract .zip, .tar, .tar.gz, .tar.bz2, .tar.xz, .tar.lz4, .tar.sz, and .rar.
+   commander.js - minimal CLI creator in JavaScript.
+   gron - make JSON greppable!
+   bed - binary editor written in Go.
+

+ +#### GUI Tools  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: Terminal emulators + +

+   Guake - is a dropdown terminal made for the GNOME desktop environment.
+   Terminator - is based on GNOME Terminal, useful features for sysadmins and other users.
+   Kitty - is a GPU based terminal emulator that supports smooth scrolling and images.
+   Alacritty - is a fast, cross-platform, OpenGL terminal emulator.
+

+ +##### :black_small_square: Network + +

+   Wireshark - is the world’s foremost and widely-used network protocol analyzer.
+   Ettercap - is a comprehensive network monitor tool.
+   EtherApe - is a graphical network monitoring solution.
+   Packet Sender - is a networking utility for packet generation and built-in UDP/TCP/SSL client and servers.
+   Ostinato - is a packet crafter and traffic generator.
+   JMeter™ - open source software to load test functional behavior and measure performance.
+   locust - scalable user load testing tool written in Python.
+

+ +##### :black_small_square: Browsers + +

+   TOR Browser - protect your privacy and defend yourself against network surveillance and traffic analysis.
+

+ +##### :black_small_square: Password Managers + +

+   KeePassXC - store your passwords safely and auto-type them into your everyday websites and apps.
+   Bitwarden - open source password manager with built-in sync.
+   Vaultwarden - unofficial Bitwarden compatible server written in Rust.
+

+ +##### :black_small_square: Messengers/IRC Clients + +

+   HexChat - is an IRC client based on XChat.
+   Pidgin - is an easy to use and free chat client used by millions.
+

+ +##### :black_small_square: Messengers (end-to-end encryption) + +

+   Signal - is an encrypted communications app.
+   Wire - secure messaging, file sharing, voice calls and video conferences.
+   TorChat - decentralized anonymous instant messenger on top of Tor Hidden Services.
+   Matrix - an open network for secure, decentralized, real-time communication.
+

+ +##### :black_small_square: Text editors + +

+   Sublime Text - is a lightweight, cross-platform code editor known for its speed, ease of use.
+   Visual Studio Code - an open-source and free source code editor developed by Microsoft.
+   Atom - a hackable text editor for the 21st Century.
+

+ +#### Web Tools  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: Browsers + +

+   SSL/TLS Capabilities of Your Browser - test your browser's SSL implementation.
+   Can I use - provides up-to-date browser support tables for support of front-end web technologies.
+   Panopticlick 3.0 - is your browser safe against tracking?
+   Privacy Analyzer - see what data is exposed from your browser.
+   Web Browser Security - it's all about Web Browser fingerprinting.
+   How's My SSL? - help a web server developer learn what real world TLS clients were capable of.
+   sslClientInfo - client test (incl TLSv1.3 information).
+

+ +##### :black_small_square: SSL/Security + +

+   SSLLabs Server Test - performs a deep analysis of the configuration of any SSL web server.
+   SSLLabs Server Test (DEV) - performs a deep analysis of the configuration of any SSL web server.
+   ImmuniWeb® SSLScan - test SSL/TLS (PCI DSS, HIPAA and NIST).
+   SSL Check - scan your website for non-secure content.
+   SSL Scanner - analyze website security.
+   CryptCheck - test your TLS server configuration (e.g. ciphers).
+   urlscan.io - service to scan and analyse websites.
+   Report URI - monitoring security policies like CSP and HPKP.
+   CSP Evaluator - allows developers and security experts to check if a Content Security Policy.
+   Useless CSP - public list about CSP in some big players (might make them care a bit more).
+   Why No HTTPS? - top 100 websites by Alexa rank not automatically redirecting insecure requests.
+   TLS Cipher Suite Search- cipher suite search engine.
+   cipherli.st - strong ciphers for Apache, Nginx, Lighttpd, and more.*
+   dhtool - public Diffie-Hellman parameter service/tool.
+   badssl.com - memorable site for testing clients against bad SSL configs.
+   tlsfun.de - registered for various tests regarding the TLS/SSL protocol.
+   CAA Record Helper - generate a CAA policy.
+   Common CA Database - repository of information about CAs, and their root and intermediate certificates.
+   CERTSTREAM - real-time certificate transparency log update stream.
+   crt.sh - discovers certificates by continually monitoring all of the publicly known CT.
+   Hardenize - deploy the security standards.
+   Cipher suite compatibility - test TLS cipher suite compatibility.
+   urlvoid - this service helps you detect potentially malicious websites.
+   security.txt - a proposed standard (generator) which allows websites to define security policies.
+   ssl-config-generator - help you follow the Mozilla Server Side TLS configuration guidelines.
+   TLScan - pure python, SSL/TLS protocol and cipher scanner/enumerator.
+

+ +##### :black_small_square: HTTP Headers & Web Linters + +

+   Security Headers - analyse the HTTP response headers (with rating system to the results).
+   Observatory by Mozilla - set of tools to analyze your website.
+   webhint - is a linting tool that will help you with your site's accessibility, speed, security, and more.
+

+ +##### :black_small_square: DNS + +

+   ViewDNS - one source for free DNS related tools and information.
+   DNSLookup - is an advanced DNS lookup tool.
+   DNSlytics - online DNS investigation tool.
+   DNS Spy - monitor, validate and verify your DNS configurations.
+   Zonemaster - helps you to control how your DNS works.
+   Leaf DNS - comprehensive DNS tester.
+   Find subdomains online - find subdomains for security assessment penetration test.
+   DNSdumpster - dns recon & research, find & lookup dns records.
+   DNS Table online - search for DNS records by domain, IP, CIDR, ISP.
+   intoDNS - DNS and mail server health checker.
+   DNS Bajaj - check the delegation of your domain.
+   BuddyDNS Delegation LAB - check, trace and visualize delegation of your domain.
+   dnssec-debugger - DS or DNSKEY records validator.
+   PTRarchive.com - this site is responsible for the safekeeping of historical reverse DNS records.
+   xip.io - wildcard DNS for everyone.
+   nip.io - dead simple wildcard DNS for any IP Address.
+   dnslookup (ceipam) - one of the best DNS propagation checker (and not only).
+   What's My DNS - DNS propagation checking tool.
+   DNSGrep - quickly searching large DNS datasets.
+

+ +##### :black_small_square: Mail + +

+   smtp-tls-checker - check an email domain for SMTP TLS support.
+   MX Toolbox - all of your MX record, DNS, blacklist and SMTP diagnostics in one integrated tool.
+   Secure Email - complete email test tools for email technicians.
+   blacklistalert - checks to see if your domain is on a Real Time Spam Blacklist.
+   MultiRBL - complete IP check for sending Mailservers.
+   DKIM SPF & Spam Assassin Validator - checks mail authentication and scores messages with Spam Assassin.
+

+ +##### :black_small_square: Encoders/Decoders and Regex testing + +

+   URL Encode/Decode - tool from above to either encode or decode a string of text.
+   Uncoder - the online translator for search queries on log data.
+   Regex101 - online regex tester and debugger: PHP, PCRE, Python, Golang and JavaScript.
+   RegExr - online tool to learn, build, & test Regular Expressions (RegEx / RegExp).
+   RegEx Testing - online regex testing tool.
+   RegEx Pal - online regex testing tool + other tools.
+   The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis.
+

+ +##### :black_small_square: Net-tools + +

+   Netcraft - detailed report about the site, helping you to make informed choices about their integrity.*
+   RIPE NCC Atlas - a global, open, distributed Internet measurement platform.
+   Robtex - uses various sources to gather public information about IP numbers, domain names, host names, etc.
+   Security Trails - APIs for Security Companies, Researchers and Teams.
+   Online Curl - curl test, analyze HTTP Response Headers.
+   Online Tools for Developers - HTTP API tools, testers, encoders, converters, formatters, and other tools.
+   Ping.eu - online Ping, Traceroute, DNS lookup, WHOIS and others.
+   Network-Tools - network tools for webmasters, IT technicians & geeks.
+   BGPview - search for any ASN, IP, Prefix or Resource name.
+   Is BGP safe yet? - check BGP (RPKI) security of ISPs and other major Internet players.
+   Riseup - provides online communication tools for people and groups working on liberatory social change.
+   VirusTotal - analyze suspicious files and URLs to detect types of malware.
+

+ +##### :black_small_square: Privacy + +

+   privacyguides.org - provides knowledge and tools to protect your privacy against global mass surveillance.
+   DNS Privacy Test Servers - DNS privacy recursive servers list (with a 'no logging' policy).
+

+ +##### :black_small_square: Code parsers/playgrounds + +

+   ShellCheck - finds bugs in your shell scripts.
+   explainshell - get interactive help texts for shell commands.
+   jsbin - live pastebin for HTML, CSS & JavaScript, and more.
+   CodeSandbox - online code editor for web application development.
+   PHP Sandbox - test your PHP code with this code tester.
+   Repl.it - an instant IDE to learn, build, collaborate, and host all in one place.
+   vclFiddle - is an online tool for experimenting with the Varnish Cache VCL.
+   Haskell Dockerfile Linter - a smarter Dockerfile linter that helps you build best practice Docker images.
+

+ +##### :black_small_square: Performance + +

+   GTmetrix - analyze your site’s speed and make it faster.
+   Sucuri loadtimetester - test here the +performance of any of your sites from across the globe.
+   Pingdom Tools - analyze your site’s speed around the world.
+   PingMe.io - run website latency tests across multiple geographic regions.
+   PageSpeed Insights - analyze your site’s speed and make it faster.
+   web.dev - helps developers like you learn and apply the web's modern capabilities to your own sites and apps.
+   Lighthouse - automated auditing, performance metrics, and best practices for the web.
+

+ +##### :black_small_square: Mass scanners (search engines) + +

+   Censys - platform that helps information security practitioners discover, monitor, and analyze devices.
+   Shodan - the world's first search engine for Internet-connected devices.
+   Shodan 2000 - this tool looks for randomly generated data from Shodan.
+   GreyNoise - mass scanner such as Shodan and Censys.
+   ZoomEye - search engine for cyberspace that lets the user find specific network components.
+   netograph - tools to monitor and understand deep structure of the web.
+   FOFA - is a cyberspace search engine.
+   onyphe - is a search engine for open-source and cyber threat intelligence data collected.
+   IntelligenceX - is a search engine and data archive.
+   binaryedge - it scan the entire internet space and create real-time threat intelligence streams and reports.
+   Spyse - Internet assets registry: networks, threats, web objects, etc.
+   wigle - is a submission-based catalog of wireless networks. All the networks. Found by Everyone.
+   PublicWWW - find any alphanumeric snippet, signature or keyword in the web pages HTML, JS and CSS code.
+   IntelTechniques - this repository contains hundreds of online search utilities.
+   hunter - lets you find email addresses in seconds and connect with the people that matter for your business.
+   GhostProject? - search by full email address or username.
+   databreaches - was my email affected by data breach?
+   We Leak Info - world's fastest and largest data breach search engine.
+   Pulsedive - scans of malicious URLs, IPs, and domains, including port scans and web requests.
+   Buckets by Grayhatwarfar - database with public search for Open Amazon S3 Buckets and their contents.
+   Vigilante.pw - the breached database directory.
+   builtwith - find out what websites are built with.
+   NerdyData - search the web's source code for technologies, across millions of sites.
+   zorexeye - search for sites, images, apps, softwares & more.
+   Mamont's open FTP Index - if a target has an open FTP site with accessible content it will be listed here.
+   OSINT Framework - focused on gathering information from free tools or resources.
+   maltiverse - is a service oriented to cybersecurity analysts.
+   Leaked Source - is a collaboration of data found online in the form of a lookup.
+   We Leak Info - to help everyday individuals secure their online life, avoiding getting hacked.
+   pipl - is the place to find the person behind the email address, social username or phone number.
+   abuse.ch - is operated by a random swiss guy fighting malware for non-profit.
+   malc0de - malware search engine.
+   Cybercrime Tracker - monitors and tracks various malware families that are used to perpetrate cyber crimes.
+   shhgit - find GitHub secrets in real time.
+   searchcode - helping you find real world examples of functions, API's and libraries.
+   Insecam - the world biggest directory of online surveillance security cameras.
+   index-of - contains great stuff like: security, hacking, reverse engineering, cryptography, programming etc.
+   Rapid7 Labs Open Data - is a great resources of datasets from Project Sonar.
+   Common Response Headers - the largest database of HTTP response headers.
+   InQuest Labs - InQuest Labs is an open, interactive, and API driven data portal for security researchers.
+

+ +##### :black_small_square: Generators + +

+   thispersondoesnotexist - generate fake faces in one click - endless possibilities.
+   AI Generated Photos - 100.000 AI generated faces.
+   fakenamegenerator - your randomly generated identity.
+   Intigriti Redirector - open redirect/SSRF payload generator.
+

+ +##### :black_small_square: Passwords + +

+   have i been pwned? - check if you have an account that has been compromised in a data breach.
+   dehashed - is a hacked database search engine.
+   Leaked Source - is a collaboration of data found online in the form of a lookup.
+

+ +##### :black_small_square: CVE/Exploits databases + +

+   CVE Mitre - list of publicly known cybersecurity vulnerabilities.
+   CVE Details - CVE security vulnerability advanced database.
+   Exploit DB - CVE compliant archive of public exploits and corresponding vulnerable software.
+   0day.today - exploits market provides you the possibility to buy/sell zero-day exploits.
+   sploitus - the exploit and tools database.
+   cxsecurity - free vulnerability database.
+   Vulncode-DB - is a database for vulnerabilities and their corresponding source code if available.
+   cveapi - free API for CVE data.
+

+ +##### :black_small_square: Mobile apps scanners + +

+   ImmuniWeb® Mobile App Scanner - test security and privacy of mobile apps (iOS & Android).
+   Quixxi - free Mobile App Vulnerability Scanner for Android & iOS.
+   Ostorlab - analyzes mobile application to identify vulnerabilities and potential weaknesses.
+

+ +##### :black_small_square: Private Search Engines + +

+   Startpage - the world's most private search engine.
+   searX - a privacy-respecting, hackable metasearch engine.
+   darksearch - the 1st real Dark Web search engine.
+   Qwant - the search engine that respects your privacy.
+   DuckDuckGo - the search engine that doesn't track you.
+   Swisscows - privacy safe web search
+   Disconnect - the search engine that anonymizes your searches.
+   MetaGer - the search engine that uses anonymous proxy and hidden Tor branches.
+

+ +##### :black_small_square: Secure Webmail Providers + +

+   CounterMail - online email service, designed to provide maximum security and privacy.
+   Mail2Tor - is a Tor Hidden Service that allows anyone to send and receive emails anonymously.
+   Tutanota - is the world's most secure email service and amazingly easy to use.
+   Protonmail - is the world's largest secure email service, developed by CERN and MIT scientists.
+   Startmail - private & encrypted email made easy.
+

+ +##### :black_small_square: Crypto + +

+   Keybase - it's open source and powered by public-key cryptography.
+

+ +##### :black_small_square: PGP Keyservers + +

+   SKS OpenPGP Key server - services for the SKS keyservers used by OpenPGP.
+

+ +#### Systems/Services  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: Operating Systems + +

+   Slackware - the most "Unix-like" Linux distribution.
+   OpenBSD - multi-platform 4.4BSD-based UNIX-like operating system.
+   HardenedBSD - HardenedBSD aims to implement innovative exploit mitigation and security solutions.
+   Kali Linux - Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.
+   Parrot Security OS - cyber security GNU/Linux environment.
+   Backbox Linux - penetration test and security assessment oriented Ubuntu-based Linux distribution.
+   BlackArch - is an Arch Linux-based penetration testing distribution for penetration testers.
+   Pentoo - is a security-focused livecd based on Gentoo.
+   Security Onion - Linux distro for intrusion detection, enterprise security monitoring, and log management.
+   Tails - is a live system that aims to preserve your privacy and anonymity.
+   vedetta - OpenBSD router boilerplate.
+   Qubes OS - is a security-oriented OS that uses Xen-based virtualization.
+

+ +##### :black_small_square: HTTP(s) Services + +

+   Varnish Cache - HTTP accelerator designed for content-heavy dynamic web sites.
+   Nginx - open source web and reverse proxy server that is similar to Apache, but very light weight.
+   OpenResty - is a dynamic web platform based on NGINX and LuaJIT.
+   Tengine - a distribution of Nginx with some advanced features.
+   Caddy Server - is an open source, HTTP/2-enabled web server with HTTPS by default.
+   HAProxy - the reliable, high performance TCP/HTTP load balancer.
+

+ +##### :black_small_square: DNS Services + +

+   Unbound - validating, recursive, and caching DNS resolver (with TLS).
+   Knot Resolver - caching full resolver implementation, including both a resolver library and a daemon.
+   PowerDNS - is an open source authoritative DNS server, written in C++ and licensed under the GPL.
+

+ +##### :black_small_square: Other Services + +

+   3proxy - tiny free proxy server.
+

+ +##### :black_small_square: Security/hardening + +

+   Emerald Onion - is a 501(c)(3) nonprofit organization and transit internet service provider (ISP).
+   pi-hole - the Pi-hole® is a DNS sinkhole that protects your devices from unwanted content.
+   maltrail - malicious traffic detection system.
+   security_monkey - monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.
+   firecracker - secure and fast microVMs for serverless computing.
+   streisand - sets up a new server running your choice of WireGuard, OpenSSH, OpenVPN, and more.
+

+ +#### Networks  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: Tools + +

+   CapAnalysis - web visual tool to analyze large amounts of captured network traffic (PCAP analyzer).
+   netbox - IP address management (IPAM) and data center infrastructure management (DCIM) tool.
+

+ +##### :black_small_square: Labs + +

+   NRE Labs - learn automation by doing it. Right now, right here, in your browser.
+

+ +##### :black_small_square: Other + +

+   LBNL's Network Research Group - home page of the Network Research Group (NRG).
+

+ +#### Containers/Orchestration  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: CLI Tools + +

+   gvisor - container runtime sandbox.
+   ctop - top-like interface for container metrics.
+

+ +##### :black_small_square: Web Tools + +

+   Moby - a collaborative project for the container ecosystem to assemble container-based system.
+   Traefik - open source reverse proxy/load balancer provides easier integration with Docker and Let's encrypt.
+   kong - The Cloud-Native API Gateway.
+   rancher - complete container management platform.
+   portainer - making Docker management easy.
+   nginx-proxy - automated nginx proxy for Docker containers using docker-gen.
+   bunkerized-nginx - nginx docker image "secure by default".
+

+ +##### :black_small_square: Security + +

+   docker-bench-security - checks for dozens of common best-practices around deploying Docker.
+   trivy - vulnerability scanner for containers, suitable for CI.
+   Harbor - cloud native registry project that stores, signs, and scans content.
+   Houdini - hundreds of offensive and useful docker images for network intrusion.
+

+ +##### :black_small_square: Manuals/Tutorials/Best Practices + +

+   docker-cheat-sheet - a quick reference cheat sheet on Docker.
+   awesome-docker - a curated list of Docker resources and projects.
+   docker_practice - learn and understand Docker technologies, with real DevOps practice!
+   labs + - is a collection of tutorials for learning how to use Docker with various tools.
+   dockerfiles - various Dockerfiles I use on the desktop and on servers.
+   kubernetes-the-hard-way - bootstrap Kubernetes the hard way on Google Cloud Platform. No scripts.
+   kubernetes-the-easy-way - bootstrap Kubernetes the easy way on Google Cloud Platform. No scripts.
+   cheatsheet-kubernetes-A4 - Kubernetes CheatSheets in A4.
+   k8s-security - kubernetes security notes and best practices.
+   kubernetes-production-best-practices - checklists with best-practices for production-ready Kubernetes.
+   kubernetes-production-best-practices - kubernetes security - best practice guide.
+   kubernetes-failure-stories - is a compilation of public failure/horror stories related to Kubernetes.
+

+ +#### Manuals/Howtos/Tutorials  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: Shell/Command line + +

+   pure-bash-bible - is a collection of pure bash alternatives to external processes.
+   pure-sh-bible - is a collection of pure POSIX sh alternatives to external processes.
+   bash-guide - is a guide to learn bash.
+   bash-handbook - for those who wanna learn Bash.
+   The Bash Hackers Wiki - hold documentation of any kind about GNU Bash.
+   Shell & Utilities - describes the commands offered to application programs by POSIX-conformant systems.
+   the-art-of-command-line - master the command line, in one page.
+   Shell Style Guide - a shell style guide for Google-originated open-source projects.
+

+ +##### :black_small_square: Text Editors + +

+   Vim Cheat Sheet - great multi language vim guide.
+

+ +##### :black_small_square: Python + +

+   Awesome Python - a curated list of awesome Python frameworks, libraries, software and resources.
+   python-cheatsheet - comprehensive Python cheatsheet.
+   pythoncheatsheet.org - basic reference for beginner and advanced developers.
+

+ +##### :black_small_square: Sed & Awk & Other + +

+   F’Awk Yeah! - advanced sed and awk usage (Parsing for Pentesters 3).
+

+ +##### :black_small_square: \*nix & Network + +

+   nixCraft - linux and unix tutorials for new and seasoned sysadmin.
+   TecMint - the ideal Linux blog for Sysadmins & Geeks.
+   Omnisecu - free Networking, System Administration and Security tutorials.
+   linux-cheat - Linux tutorials and cheatsheets. Minimal examples. Mostly user-land CLI utilities.
+   linuxupskillchallenge - learn the skills required to sysadmin.
+   Unix Toolbox - Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users.
+   Linux Kernel Teaching - is a collection of lectures and labs Linux kernel topics.
+   htop explained - explanation of everything you can see in htop/top on Linux.
+   Linux Guide and Hints - tutorials on system administration in Fedora and CentOS.
+   strace-little-book - a little book which introduces strace.
+   linux-tracing-workshop - examples and hands-on labs for Linux tracing tools workshops.
+   http2-explained - a detailed document explaining and documenting HTTP/2.
+   http3-explained - a document describing the HTTP/3 and QUIC protocols.
+   HTTP/2 in Action - an excellent introduction to the new HTTP/2 standard.
+   Let's code a TCP/IP stack - great stuff to learn network and system programming at a deeper level.
+   Nginx Admin's Handbook - how to improve NGINX performance, security and other important things.
+   nginxconfig.io - NGINX config generator on steroids.
+   openssh guideline - is to help operational teams with the configuration of OpenSSH server and client.
+   SSH Handshake Explained - is a relatively brief description of the SSH handshake.
+   ISC's Knowledgebase - you'll find some general information about BIND 9, ISC DHCP, and Kea DHCP.
+   PacketLife.net - a place to record notes while studying for Cisco's CCNP certification.
+

+ +##### :black_small_square: Microsoft + +

+   AD-Attack-Defense - attack and defend active directory using modern post exploitation activity.
+

+ +##### :black_small_square: Large-scale systems + +

+   The System Design Primer - learn how to design large-scale systems.
+   Awesome Scalability - best practices in building High Scalability, High Availability, High Stability, and more.
+   Web Architecture 101 - the basic architecture concepts.
+

+ +##### :black_small_square: System hardening + +

+   CIS Benchmarks - secure configuration settings for over 100 technologies, available as a free PDF.
+   Security Harden CentOS 7 - this walks you through the steps required to security harden CentOS.
+   CentOS 7 Server Hardening Guide - great guide for hardening CentOS; familiar with OpenSCAP.
+   awesome-security-hardening - is a collection of security hardening guides, tools and other resources.
+   The Practical Linux Hardening Guide - provides a high-level overview of hardening GNU/Linux systems.
+   Linux Hardening Guide - how to harden Linux as much as possible for security and privacy.
+

+ +##### :black_small_square: Security & Privacy + +

+   Hacking Articles - LRaj Chandel's Security & Hacking Blog.
+   AWS security tools - make your AWS cloud environment more secure.
+   Rawsec's CyberSecurity Inventory - an inventory of tools and resources about CyberSecurity.
+   The Illustrated TLS Connection - every byte of a TLS connection explained and reproduced.
+   SSL Research - SSL and TLS Deployment Best Practices by SSL Labs.
+   SELinux Game - learn SELinux by doing. Solve Puzzles, show skillz.
+   Certificates and PKI - everything you should know about certificates and PKI but are too afraid to ask.
+   The Art of Subdomain Enumeration - a reference for subdomain enumeration techniques.
+   Quitting Google - the comprehensive guide to quitting Google.
+

+ +##### :black_small_square: Web Apps + +

+   OWASP - worldwide not-for-profit charitable organization focused on improving the security of software.
+   OWASP ASVS 3.0.1 - OWASP Application Security Verification Standard Project.
+   OWASP ASVS 3.0.1 Web App - simple web app that helps developers understand the ASVS requirements.
+   OWASP ASVS 4.0 - is a list of application security requirements or tests.
+   OWASP Testing Guide v4 - includes a "best practice" penetration testing framework.
+   OWASP Dev Guide - this is the development version of the OWASP Developer Guide.
+   OWASP WSTG - is a comprehensive open source guide to testing the security of web apps.
+   OWASP API Security Project - focuses specifically on the top ten vulnerabilities in API security.
+   Mozilla Web Security - help operational teams with creating secure web applications.
+   security-bulletins - security bulletins that relate to Netflix Open Source.
+   API-Security-Checklist - security countermeasures when designing, testing, and releasing your API.
+   Enable CORS - enable cross-origin resource sharing.
+   Application Security Wiki - is an initiative to provide all application security related resources at one place.
+   Weird Proxies - reverse proxy related attacks; it is a result of analysis of various proxies.
+   Webshells - great series about malicious payloads.
+   Practical Web Cache Poisoning - show you how to compromise websites by using esoteric web features.
+   Hidden directories and files - as a source of sensitive information about web application.
+   Explosive blog - great blog about cybersec and pentests.
+   Security Cookies - this paper will take a close look at cookie security.
+   APISecurityBestPractices - help you keep secrets (API keys, db credentials, certificates) out of source code.
+

+ +##### :black_small_square: All-in-one + +

+   LZone Cheat Sheets - all cheat sheets.
+   Dan’s Cheat Sheets’s - massive cheat sheets documentation.
+   Rico's cheatsheets - this is a modest collection of cheatsheets.
+   DevDocs API - combines multiple API documentations in a fast, organized, and searchable interface.
+   cheat.sh - the only cheat sheet you need.
+   gnulinux.guru - collection of cheat sheets about bash, vim and networking.
+   Web Skills - visual overview of useful skills to learn as a web developer.
+

+ +##### :black_small_square: Ebooks + +

+   free-programming-books - list of free learning resources in many languages.
+

+ +##### :black_small_square: Other + +

+   CTF Series : Vulnerable Machines - the steps below could be followed to find vulnerabilities and exploits.
+   50M_CTF_Writeup - $50 million CTF from Hackerone - writeup.
+   ctf-tasks - an archive of low-level CTF challenges developed over the years.
+   How to start RE/malware analysis? - collection of some hints and useful links for the beginners.
+   The C10K problem - it's time for web servers to handle ten thousand clients simultaneously, don't you think?
+   How 1500 bytes became the MTU of the internet - great story about the Maximum Transmission Unit.
+   poor man's profiler - like dtrace's don't really provide methods to see what programs are blocking on.
+   HTTPS on Stack Overflow - this is the story of a long journey regarding the implementation of SSL.
+   Julia's Drawings - some drawings about programming and unix world, zines about systems & debugging tools.
+   Hash collisions - this great repository is focused on hash collisions exploitation.
+   sha256-animation - animation of the SHA-256 hash function in your terminal.
+   sha256algorithm - sha256 algorithm explained online step by step visually.
+   BGP Meets Cat - after 3072 hours of manipulating BGP, Job Snijders has succeeded in drawing a Nyancat.
+   bgp-battleships - playing battleships over BGP.
+   What happens when... - you type google.com into your browser and press enter?
+   how-web-works - based on the 'What happens when...' repository.
+   HTTPS in the real world - great tutorial explain how HTTPS works in the real world.
+   Gitlab and NFS bug - how we spent two weeks hunting an NFS bug in the Linux kernel.
+   Gitlab melts down - postmortem on the database outage of January 31 2017 with the lessons we learned.
+   How To Become A Hacker - if you want to be a hacker, keep reading.
+   Operation Costs in CPU - should help to estimate costs of certain operations in CPU clocks.
+   Let's Build a Simple Database - writing a sqlite clone from scratch in C.
+   simple-computer - great resource to understand how computers work under the hood.
+   The story of "Have I been pwned?" - working with 154 million records on Azure Table Storage.
+   TOP500 Supercomputers - shows the 500 most powerful commercially available computer systems.
+   How to build a 8 GPU password cracker - hours of frustration like desktop components do.
+   CERN Data Centre - 3D visualizations of the CERN computing environments (and more).
+   How fucked is my database - evaluate how fucked your database is with this handy website.
+   Linux Troubleshooting 101 , 2016 Edition - everything is a DNS Problem...
+   Five Whys - you know what the problem is, but you cannot solve it?
+   Maersk, me & notPetya - how did ransomware successfully hijack hundreds of domain controllers?
+   howhttps.works - how HTTPS works ...in a comic!
+   howdns.works - a fun and colorful explanation of how DNS works.
+   POSTGRESQLCO.NF - your postgresql.conf documentation and recommendations.
+

+ +#### Inspiring Lists  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: SysOps/DevOps + +

+   Awesome Sysadmin - amazingly awesome open source sysadmin resources.
+   Awesome Shell - awesome command-line frameworks, toolkits, guides and gizmos.
+   Command-line-text-processing - finding text to search and replace, sorting to beautifying, and more.
+   Awesome Pcaptools - collection of tools developed by other researchers to process network traces.
+   awesome-ebpf - a curated list of awesome projects related to eBPF.
+   Linux Network Performance - where some of the network sysctl variables fit into the Linux/Kernel network flow.
+   Awesome Postgres - list of awesome PostgreSQL software, libraries, tools and resources.
+   quick-SQL-cheatsheet - a quick reminder of all SQL queries and examples on how to use them.
+   Awesome-Selfhosted - list of Free Software network services and web applications which can be hosted locally.
+   List of applications - huge list of apps sorted by category, as a reference for those looking for packages.
+   CS-Interview-Knowledge-Map - build the best interview map.
+   DevOps-Guide - DevOps Guide from basic to advanced with Interview Questions and Notes.
+   FreeBSD Journal - it is a great list of periodical magazines about FreeBSD and other important things.
+   devops-interview-questions - contains interview questions on various DevOps and SRE related topics.

+ +##### :black_small_square: Developers + +

+   Web Developer Roadmap - roadmaps, articles and resources to help you choose your path, learn and improve.
+   Front-End-Checklist - the perfect Front-End Checklist for modern websites and meticulous developers.
+   Front-End-Performance-Checklist - Front-End Performance Checklist that runs faster than the others.
+   Python's Magic Methods - what are magic methods? They're everything in object-oriented Python.
+   wtfpython - a collection of surprising Python snippets and lesser-known features.
+   js-dev-reads - a list of books and articles for the discerning web developer to read.
+   Commit messages guide - a guide to understand the importance of commit messages.
+

+ +##### :black_small_square: Security/Pentesting + +

+   Awesome Web Security - a curated list of Web Security materials and resources.
+   awesome-cyber-skills - a curated list of hacking environments where you can train your cyber skills.
+   awesome-devsecops - an authoritative list of awesome devsecops tools.
+   awesome-osint - is a curated list of amazingly awesome OSINT.
+   HolyTips - tips and tutorials on Bug Bounty Hunting and Web App Security.
+   awesome-threat-intelligence - a curated list of Awesome Threat Intelligence resources.
+   Red-Teaming-Toolkit - a collection of open source and commercial tools that aid in red team operations.
+   awesome-burp-extensions - a curated list of amazingly awesome Burp Extensions.
+   Free Security eBooks - list of a Free Security and Hacking eBooks.
+   Hacking-Security-Ebooks - top 100 Hacking & Security E-Books.
+   privacy-respecting - curated list of privacy respecting services and software.
+   reverse-engineering - list of awesome reverse engineering resources.
+   linux-re-101 - a collection of resources for linux reverse engineering.
+   reverseengineering-reading-list - a list of Reverse Engineering articles, books, and papers.
+   Awesome-WAF - a curated list of awesome web-app firewall (WAF) stuff.
+   awesome-shodan-queries - interesting, funny, and depressing search queries to plug into shodan.io.
+   RobotsDisallowed - a curated list of the most common and most interesting robots.txt disallowed directories.
+   HackingNeuralNetworks - is a small course on exploiting and defending neural networks.
+   wildcard-certificates - why you probably shouldn't use a wildcard certificate.
+   Don't use VPN services - which is what every third-party "VPN provider" does.
+   awesome-yara - a curated list of awesome YARA rules, tools, and people.
+   macOS-Security-and-Privacy-Guide - guide to securing and improving privacy on macOS.
+   macos_security - macOS Security Compliance Project.
+   awesome-sec-talks - is a collected list of awesome security talks.
+   Movies for Hackers - list of movies every hacker & cyberpunk must watch.
+   Cryptography_1 - materials used whilst taking Prof. Dan Boneh Stanford Crypto course.
+   Crypton - library to learn and practice Offensive and Defensive Cryptography.
+

+ +##### :black_small_square: Other + +

+   Cheatography - over 3,000 free cheat sheets, revision aids and quick references.
+   awesome-static-analysis - static analysis tools for all programming languages.
+   computer-science - path to a free self-taught education in Computer Science.
+   post-mortems - is a collection of postmortems (config errors, hardware failures, and more).
+   build-your-own-x - build your own (insert technology here).
+   Project-Based-Tutorials-in-C - is a curated list of project-based tutorials in C.
+   The-Documentation-Compendium - various README templates & tips on writing high-quality documentation.
+   awesome-python-applications - free software that works great, and also happens to be open-source Python.
+   awesome-public-datasets - a topic-centric list of HQ open datasets.
+   machine-learning-algorithms - a curated list of all machine learning algorithms and concepts.
+

+ +#### Blogs/Podcasts/Videos  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: SysOps/DevOps + +

+   Varnish for PHP developers - very interesting presentation of Varnish by Mattias Geniar.
+   A Netflix Guide to Microservices - talks about the chaotic and vibrant world of microservices at Netflix.
+

+ +##### :black_small_square: Developers + +

+   Comparing C to machine lang - compare a simple C app with the compiled machine code of that program.
+

+ +##### :black_small_square: Geeky Persons + +

+   Brendan Gregg's Blog - is an industry expert in computing performance and cloud computing.
+   Gynvael "GynDream" Coldwind - is a IT security engineer at Google.
+   Michał "lcamtuf" Zalewski - white hat hacker, computer security expert.
+   Mattias Geniar - developer, sysadmin, blogger, podcaster and public speaker.
+   Nick Craver - software developer and systems administrator for Stack Exchange.
+   Scott Helme - security researcher, speaker and founder of securityheaders.com and report-uri.com.
+   Brian Krebs - The Washington Post and now an Independent investigative journalist.
+   Bruce Schneier - is an internationally renowned security technologist, called a "security guru".
+   Chrissy Morgan - advocate of practical learning, Chrissy also takes part in bug bounty programs.
+   Andy Gill - is a hacker at heart who works as a senior penetration tester.
+   Daniel Miessler - cybersecurity expert and writer.
+   Samy Kamkar - is an American privacy and security researcher, computer hacker.
+   Javvad Malik - is a security advocate at AlienVault, a blogger event speaker and industry commentator.
+   Graham Cluley - public speaker and independent computer security analyst.
+   Kacper Szurek - detection engineer at ESET.
+   Troy Hunt - web security expert known for public education and outreach on security topics.
+   raymii.org - sysadmin specializing in building high availability cloud environments.
+   Robert Penz - IT security expert.
+

+ +##### :black_small_square: Geeky Blogs + +

+   Linux Audit - the Linux security blog about auditing, hardening and compliance by Michael Boelen.
+   +Linux Security Expert - trainings, howtos, checklists, security tools, and more.
+   The Grymoire - collection of useful incantations for wizards, be you computer wizards, magicians, or whatever.
+   Secjuice - is the only non-profit, independent and volunteer led publication in the information security space.
+   Decipher - security news that informs and inspires.
+

+ +##### :black_small_square: Geeky Vendor Blogs + +

+   Tenable Podcast - conversations and interviews related to Cyber Exposure, and more.
+   Sophos - threat news room, giving you news, opinion, advice and research on computer security issues.
+   Tripwire State of Security - blog featuring the latest news, trends and insights on current security issues.
+   Malwarebytes Labs Blog - security blog aims to provide insider news about cybersecurity.
+   TrustedSec - latest news, and trends about cybersecurity.
+   PortSwigger Web Security Blog - about web app security vulns and top tips from our team of web security.
+   AT&T Cybersecurity blog - news on emerging threats and practical advice to simplify threat detection.
+   Thycotic - where CISOs and IT Admins come to learn about industry trends, IT security, and more.
+

+ +##### :black_small_square: Geeky Cybersecurity Podcasts + +

+   Risky Business - is a weekly information security podcast featuring news and in-depth interviews.
+   Cyber, by Motherboard - stories, and focus on the ideas about cybersecurity.
+   Tenable Podcast - conversations and interviews related to Cyber Exposure, and more.
+   +Cybercrime Investigations - podcast by Geoff White about cybercrimes.
+   The many hats club - featuring stories from a wide range of Infosec people (Whitehat, Greyhat and Blackhat).
+   Darknet Diaries - true stories from the dark side of the Internet.
+   OSINTCurious Webcasts - is the investigative curiosity that helps people be successful in OSINT.
+   Security Weekly - the latest information security and hacking news.
+

+ +##### :black_small_square: Geeky Cybersecurity Video Blogs + +

+   rev3rse security - offensive, binary exploitation, web app security, hardening, red team, blue team.
+   LiveOverflow - a lot more advanced topics than what is typically offered in paid online courses - but for free.
+   J4vv4D - the important information regarding our internet security.
+   +CyberTalks - talks, interviews, and article about cybersecurity.
+

+ +##### :black_small_square: Best Personal Twitter Accounts + +

+   @blackroomsec - a white-hat hacker/pentester. Intergalactic Minesweeper Champion 1990.
+   @MarcoCiappelli - Co-Founder @ITSPmagazine, at the intersection of IT security and society.
+   @binitamshah - Linux Evangelist. Malwares. Kernel Dev. Security Enthusiast.
+   @joe_carson - an InfoSec Professional and Tech Geek.
+   @mikko - CRO at F-Secure, Reverse Engineer, TED Speaker, Supervillain.
+   @esrtweet - often referred to as ESR, is an American software developer, and open-source software advocate.
+   @gynvael - security researcher/programmer, @DragonSectorCTF founder/player, technical streamer.
+   @x0rz - Security Researcher & Cyber Observer.
+   @hasherezade - programmer, malware analyst. Author of PEbear, PEsieve, libPeConv.
+   @TinkerSec - tinkerer, cypherpunk, hacker.
+   @alisaesage - independent hacker and researcher.
+   @SwiftOnSecurity - systems security, industrial safety, sysadmin, author of decentsecurity.com.
+   @dakami - is one of just seven people with the authority to restore the DNS root keys.
+   @samykamkar - is a famous "grey hat" hacker, security researcher, creator of the MySpace "Samy" worm.
+   @securityweekly - founder & CTO of Security Weekly podcast network.
+   @jack_daniel - @SecurityBSides co-founder.
+   @thegrugq - Security Researcher.
+   @matthew_d_green - a cryptographer and professor at Johns Hopkins University.
+

+ +##### :black_small_square: Best Commercial Twitter Accounts + +

+   @haveibeenpwned - check if you have an account that has been compromised in a data breach.
+   @bugcrowd - trusted by more of the Fortune 500 than any other crowdsourced security platform.
+   @Malwarebytes - most trusted security company. Unmatched threat visibility.
+   @sansforensics - the world's leading Digital Forensics and Incident Response provider.
+   @attcyber - AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, and more.
+   @TheManyHatsClub - an information security focused podcast and group of individuals from all walks of life.
+   @hedgehogsec - Hedgehog Cyber. Gibraltar and Manchester's top boutique information security firm.
+   @NCSC - the National Cyber Security Centre. Helping to make the UK the safest place to live and work online.
+   @Synacktiv - IT security experts.
+

+ +##### :black_small_square: A piece of history + +

+   How to Do Things at ARL - how to configure modems, scan images, record CD-ROMs, and other.*
+

+ +##### :black_small_square: Other + +

+   Diffie-Hellman Key Exchange (short version) - how Diffie-Hellman Key Exchange worked.
+

+ +#### Hacking/Penetration Testing  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: Pentesters arsenal tools + +

+   Sandcat Browser - a penetration-oriented browser with plenty of advanced functionality already built in.
+   Metasploit - tool and framework for pentesting system, web and many more.
+   Burp Suite - tool for testing web app security, intercepting proxy to replay, inject, scan and fuzz.
+   OWASP Zed Attack Proxy - intercepting proxy to replay, inject, scan and fuzz HTTP requests.
+   w3af - is a Web Application Attack and Audit Framework.
+   mitmproxy - an interactive TLS-capable intercepting HTTP proxy for penetration testers.
+   Nikto2 - web server scanner which performs comprehensive tests against web servers for multiple items.
+   sqlmap - tool that automates the process of detecting and exploiting SQL injection flaws.
+   Recon-ng - is a full-featured Web Reconnaissance framework written in Python.
+   AutoRecon - is a network reconnaissance tool which performs automated enumeration of services.
+   Faraday - an Integrated Multiuser Pentest Environment.
+   Photon - incredibly fast crawler designed for OSINT.
+   XSStrike - most advanced XSS detection suite.
+   Sn1per - automated pentest framework for offensive security experts.
+   vuls - is an agent-less vulnerability scanner for Linux, FreeBSD, and other.
+   tsunami - is a general purpose network security scanner with an extensible plugin system.
+   aquatone - a tool for domain flyovers.
+   BillCipher - information gathering tool for a website or IP address.
+   WhatWaf - detect and bypass web application firewalls and protection systems.
+   Corsy - CORS misconfiguration scanner.
+   Raccoon - is a high performance offensive security tool for reconnaissance and vulnerability scanning.
+   dirhunt - find web directories without bruteforce.
+   John The Ripper - is a fast password cracker, currently available for many flavors of Unix, Windows, and other.
+   hashcat - world's fastest and most advanced password recovery utility.
+   p0f - is a tool to identify the players behind any incidental TCP/IP communications.
+   ssh_scan - a prototype SSH configuration and policy scanner.
+   LeakLooker - find open databases - powered by Binaryedge.io
+   exploitdb - searchable archive from The Exploit Database.
+   getsploit - is a command line utility for searching and downloading exploits.
+   ctf-tools - some setup scripts for security research tools.
+   pwntools - CTF framework and exploit development library.
+   security-tools - collection of small security tools created mostly in Python. CTFs, pentests and so on.
+   pentestpackage - is a package of Pentest scripts.
+   python-pentest-tools - python tools for penetration testers.
+   fuzzdb - dictionary of attack patterns and primitives for black-box application fault injection.
+   AFL - is a free software fuzzer maintained by Google.
+   AFL++ - is AFL with community patches.
+   syzkaller - is an unsupervised, coverage-guided kernel fuzzer.
+   pwndbg - exploit development and reverse engineering with GDB made easy.
+   GDB PEDA - Python Exploit Development Assistance for GDB.
+   IDA - multi-processor disassembler and debugger useful for reverse engineering malware.
+   radare2 - framework for reverse-engineering and analyzing binaries.
+   routersploit - exploitation framework for embedded devices.
+   Ghidra - is a software reverse engineering (SRE) framework.
+   Cutter - is an SRE platform integrating Ghidra's decompiler.
+   Vulnreport - open-source pentesting management and automation platform by Salesforce Product Security.
+   Mentalist - is a graphical tool for custom wordlist generation.
+   archerysec - vulnerability assessment and management helps to perform scans and manage vulnerabilities.
+   Osmedeus - fully automated offensive security tool for reconnaissance and vulnerability scanning.
+   beef - the browser exploitation framework project.
+   AutoSploit - automated mass exploiter.
+   SUDO_KILLER - is a tool to identify and exploit sudo rules' misconfigurations and vulnerabilities.
+   yara - the pattern matching swiss knife.
+   mimikatz - a little tool to play with Windows security.
+   sherlock - hunt down social media accounts by username across social networks.
+   OWASP Threat Dragon - is a tool used to create threat model diagrams and to record possible threats.
+

+ +##### :black_small_square: Pentests bookmarks collection + +

+   PTES - the penetration testing execution standard.
+   Pentests MindMap - amazing mind map with vulnerable apps and systems.
+   WebApps Security Tests MindMap - incredible mind map for WebApps security tests.
+   Brute XSS - master the art of Cross Site Scripting.
+   XSS cheat sheet - contains many vectors that can help you bypass WAFs and filters.
+   Offensive Security Bookmarks - security bookmarks collection, all things that author need to pass OSCP.
+   Awesome Pentest Cheat Sheets - collection of the cheat sheets useful for pentesting.
+   Awesome Hacking by HackWithGithub - awesome lists for hackers, pentesters and security researchers.
+   Awesome Hacking by carpedm20 - a curated list of awesome hacking tutorials, tools and resources.
+   Awesome Hacking Resources - collection of hacking/penetration testing resources to make you better.
+   Awesome Pentest - collection of awesome penetration testing resources, tools and other shiny things.
+   Awesome-Hacking-Tools - is a curated list of awesome Hacking Tools.
+   Hacking Cheat Sheet - author hacking and pentesting notes.
+   blackhat-arsenal-tools - official Black Hat arsenal security tools repository.
+   Penetration Testing and WebApp Cheat Sheets - the complete list of Infosec related cheat sheets.
+   Cyber Security Resources - includes thousands of cybersecurity-related references and resources.
+   Pentest Bookmarks - there are a LOT of pentesting blogs.
+   Cheatsheet-God - Penetration Testing Reference Bank - OSCP/PTP & PTX Cheatsheet.
+   ThreatHunter-Playbook - to aid the development of techniques and hypothesis for hunting campaigns.
+   Beginner-Network-Pentesting - notes for beginner network pentesting course.
+   OSCPRepo - is a list of resources that author have been gathering in preparation for the OSCP.
+   PayloadsAllTheThings - a list of useful payloads and bypass for Web Application Security and Pentest/CTF.
+   payloads - git all the Payloads! A collection of web attack payloads.
+   command-injection-payload-list - command injection payload list.
+   Awesome Shodan Search Queries - great search queries to plug into Shodan.
+   AwesomeXSS - is a collection of Awesome XSS resources.
+   php-webshells - common php webshells.
+   Pentesting Tools Cheat Sheet - a quick reference high level overview for typical penetration testing.
+   OWASP Cheat Sheet Series - is a collection of high value information on specific application security topics.
+   OWASP dependency-check - is an open source solution the OWASP Top 10 2013 entry.
+   OWASP ProActive Controls - OWASP Top 10 Proactive Controls 2018.
+   PENTESTING-BIBLE - hacking & penetration testing & red team & cyber security resources.
+   pentest-wiki - is a free online security knowledge library for pentesters/researchers.
+   DEF CON Media Server - great stuff from DEFCON.
+   Awesome Malware Analysis - a curated list of awesome malware analysis tools and resources.
+   SQL Injection Cheat Sheet - detailed technical stuff about the many different variants of the SQL Injection.
+   Entersoft Knowledge Base - great and detailed reference about vulnerabilities.
+   HTML5 Security Cheatsheet - a collection of HTML5 related XSS attack vectors.
+   XSS String Encoder - for generating XSS code to check your input validation filters against XSS.
+   GTFOBins - list of Unix binaries that can be exploited by an attacker to bypass local security restrictions.
+   Guifre Ruiz Notes - collection of security, system, network and pentest cheatsheets.
+   SSRF Tips - a collection of SSRF Tips.
+   shell-storm repo CTF - great archive of CTFs.
+   ctf - CTF (Capture The Flag) writeups, code snippets, notes, scripts.
+   My-CTF-Web-Challenges - collection of CTF Web challenges.
+   MSTG - The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security testing.
+   Internal-Pentest-Playbook - notes on the most common things for an Internal Network Penetration Test.
+   KeyHacks - shows quick ways in which API keys leaked by a bug bounty program can be checked.
+   securitum/research - various Proof of Concepts of security research performed by Securitum.
+   public-pentesting-reports - is a list of public pentest reports released by several consulting security groups.
+   awesome-bug-bounty - is a comprehensive curated list of available Bug Bounty.
+   bug-bounty-reference - is a list of bug bounty write-ups.
+   Awesome-Bugbounty-Writeups - is a curated list of bugbounty writeups.
+   Bug bounty writeups - list of bug bounty writeups (2012-2020).
+   hackso.me - a great journey into security.
+

+ +##### :black_small_square: Backdoors/exploits + +

+   PHP-backdoors - a collection of PHP backdoors. For educational or testing purposes only.
+

+ +##### :black_small_square: Wordlists and Weak passwords + +

+   Weakpass - for any kind of bruteforce find wordlists or unleash the power of them all at once!
+   Hashes.org - is a free online hash resolving service incorporating many unparalleled techniques.
+   SecLists - collection of multiple types of lists used during security assessments, collected in one place.
+   Probable-Wordlists - sorted by probability originally created for password generation and testing.
+   skullsecurity passwords - password dictionaries and leaked passwords repository.
+   Polish PREMIUM Dictionary - official dictionary created by the team on the forum bezpieka.org.* 1
+  
statistically-likely-usernames - wordlists for creating statistically likely username lists.
+

+ +##### :black_small_square: Bounty platforms + +

+   YesWeHack - bug bounty platform with infosec jobs.
+   Openbugbounty - allows any security researcher reporting a vulnerability on any website.
+   hackerone - global hacker community to surface the most relevant security issues.
+   bugcrowd - crowdsourced cybersecurity for the enterprise.
+   Crowdshield - crowdsourced security & bug bounty management.
+   Synack - crowdsourced security & bug bounty programs, crowd security intelligence platform, and more.
+   Hacktrophy - bug bounty platform.
+

+ +##### :black_small_square: Web Training Apps (local installation) + +

+   OWASP-VWAD - comprehensive and well maintained registry of all known vulnerable web applications.
+   DVWA - PHP/MySQL web application that is damn vulnerable.
+   metasploitable2 - vulnerable web application amongst security researchers.
+   metasploitable3 - is a VM that is built from the ground up with a large amount of security vulnerabilities.
+   DSVW - is a deliberately vulnerable web application written in under 100 lines of code.
+   OWASP Mutillidae II - free, open source, deliberately vulnerable web-application.
+   OWASP Juice Shop Project - the most bug-free vulnerable application in existence.
+   OWASP Node js Goat Project - OWASP Top 10 security risks apply to web apps developed using Node.js.
+   juicy-ctf - run Capture the Flags and Security Trainings with OWASP Juice Shop.
+   SecurityShepherd - web and mobile application security training platform.
+   Security Ninjas - open source application security training program.
+   hackazon - a modern vulnerable web app.
+   dvna - damn vulnerable NodeJS application.
+   django-DefectDojo - is an open-source application vulnerability correlation and security orchestration tool.
+   Google Gruyere - web application exploits and defenses.
+   Bodhi - is a playground focused on learning the exploitation of client-side web vulnerabilities.
+   Websploit - single vm lab with the purpose of combining several vulnerable appliations in one environment.
+   vulhub - pre-built Vulnerable Environments based on docker-compose.
+   CloudGoat 2 - the new & improved "Vulnerable by Design" +AWS deployment tool.
+   secDevLabs - is a laboratory for learning secure web development in a practical manner.
+   CORS-vulnerable-Lab - sample vulnerable code and its exploit code.
+   RootTheBox - a Game of Hackers (CTF Scoreboard & Game Manager).
+   KONTRA - application security training (OWASP Top Web & Api).
+

+ +##### :black_small_square: Labs (ethical hacking platforms/trainings/CTFs) + +

+   Offensive Security - true performance-based penetration testing training for over a decade.
+   pwn.guide - online cybersecurity learning platform allowing you to learn radio, web hacking, forensics and more...
+   Hack The Box - online platform allowing you to test your penetration testing skills.
+   Hacking-Lab - online ethical hacking, computer network and security challenge platform.
+   pwnable.kr - non-commercial wargame site which provides various pwn challenges.
+   Pwnable.tw - is a wargame site for hackers to test and expand their binary exploiting skills.
+   picoCTF - is a free computer security game targeted at middle and high school students.
+   CTFlearn - is an online platform built to help ethical hackers learn and practice their cybersecurity knowledge.
+   ctftime - CTF archive and a place, where you can get some another CTF-related info.
+   Silesia Security Lab - high quality security testing services.
+   Practical Pentest Labs - pentest lab, take your Hacking skills to the next level.
+   Root Me - the fast, easy, and affordable way to train your hacking skills.
+   rozwal.to - a great platform to train your pentesting skills.
+   TryHackMe - learning Cyber Security made easy.
+   hackxor - is a realistic web application hacking game, designed to help players of all abilities develop their skills.
+   Hack Yourself First - it's full of nasty app sec holes.
+   OverTheWire - can help you to learn and practice security concepts in the form of fun-filled games.
+   Wizard Labs - is an online Penetration Testing Lab.
+   PentesterLab - provides vulnerable systems that can be used to test and understand vulnerabilities.
+   RingZer0 - tons of challenges designed to test and improve your hacking skills.
+   try2hack - several security-oriented challenges for your entertainment.
+   Ubeeri - preconfigured lab environments.
+   Pentestit - emulate IT infrastructures of real companies for legal pen testing and improving pentest skills.
+   Microcorruption - reversal challenges done in the web interface.
+   Crackmes - download crackmes to help improve your reverse engineering skills.
+   DomGoat - DOM XSS security learning and practicing platform.
+   Stereotyped Challenges - upgrade your web hacking techniques today!
+   Vulnhub - allows anyone to gain practical 'hands-on' experience in digital security.
+   W3Challs - is a penetration testing training platform, which offers various computer challenges.
+   RingZer0 CTF - offers you tons of challenges designed to test and improve your hacking skills.
+   Hack.me - a platform where you can build, host and share vulnerable web apps for educational purposes.
+   HackThis! - discover how hacks, dumps and defacements are performed and secure your website.
+   Enigma Group WebApp Training - these challenges cover the exploits listed in the OWASP Top 10 Project.
+   Reverse Engineering Challenges - challenges, exercises, problems and tasks - by level, by type, and more.
+   0x00sec - the home of the Hacker - Malware, Reverse Engineering, and Computer Science.
+   We Chall - there are exist a lots of different challenge types.
+   Hacker Gateway - is the go-to place for hackers who want to test their skills.
+   Hacker101 - is a free class for web security.
+   contained.af - a stupid game for learning about containers, capabilities, and syscalls.
+   flAWS challenge! - a series of levels you'll learn about common mistakes and gotchas when using AWS.
+   CyberSec WTF - provides web hacking challenges derived from bounty write-ups.
+   CTF Challenge - CTF Web App challenges.
+   gCTF - most of the challenges used in the Google CTF 2017.
+   Hack This Site - is a free, safe and legal training ground for hackers.
+   Attack & Defense - is a browser-based cloud labs.
+   Cryptohack - a fun platform for learning modern cryptography.
+   Cryptopals - the cryptopals crypto challenges.
+

+ +##### :black_small_square: CTF platforms + +

+   fbctf - platform to host Capture the Flag competitions.
+   ctfscoreboard - scoreboard for Capture The Flag competitions.
+

+ +##### :black_small_square: Other resources + +

+   Bugcrowd University - open source education content for the researcher community.
+   OSCPRepo - a list of resources and scripts that I have been gathering in preparation for the OSCP.
+   OWASP Top 10: Real-World Examples - test your web apps with real-world examples (two-part series).
+   phrack.org - an awesome collection of articles from several respected hackers and other thinkers.
+   Practical-Ethical-Hacking-Resources - compilation of resources from TCM's Udemy Course.
+

+ +#### Your daily knowledge and news  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: RSS Readers + +

+   Feedly - organize, read and share what matters to you.
+   Inoreader - similar to feedly with a support for filtering what you fetch from rss.
+

+ +##### :black_small_square: IRC Channels + +

+   #hackerspaces - hackerspace IRC channels.
+

+ +##### :black_small_square: Security + +

+   The Hacker News - leading news source dedicated to promoting awareness for security experts and hackers.
+   Latest Hacking News - provides the latest hacking news, exploits and vulnerabilities for ethical hackers.
+   Security Newsletter - security news as a weekly digest (email notifications).
+   Google Online Security Blog - the latest news and insights from Google on security and safety on the Internet.
+   Qualys Blog - expert network security guidance and news.
+   DARKReading - connecting the Information Security Community.
+   Darknet - latest hacking tools, hacker news, cybersecurity best practices, ethical hacking & pen-testing.
+   publiclyDisclosed - public disclosure watcher who keeps you up to date about the recently disclosed bugs.
+   Reddit - Hacking - a subreddit dedicated to hacking and hackers.
+   Packet Storm - information security services, news, files, tools, exploits, advisories and whitepapers.
+   Sekurak - about security, penetration tests, vulnerabilities and many others (PL/EN).
+   nf.sec - basic aspects and mechanisms of Linux operating system security (PL).
+

+ +##### :black_small_square: Other/All-in-one + +

+   Changelog - is a community of hackers; news & podcasts for developers and hackers.
+

+ +#### Other Cheat Sheets  [[TOC]](#anger-table-of-contents) + +###### Build your own DNS Servers + +

+   Unbound DNS Tutorial - a validating, recursive, and caching DNS server.
+   Knot Resolver on Fedora - how to get faster and more secure DNS resolution with Knot Resolver on Fedora.
+   DNS-over-HTTPS - tutorial to setup your own DNS-over-HTTPS (DoH) server.
+   dns-over-https - a cartoon intro to DNS over HTTPS.
+   DNS-over-TLS - following to your DoH server, setup your DNS-over-TLS (DoT) server.
+   DNS Servers - how (and why) i run my own DNS Servers.
+

+ +###### Build your own Certificate Authority + +

+   OpenSSL Certificate Authority - build your own certificate authority (CA) using the OpenSSL tools.
+   step-ca Certificate Authority - build your own certificate authority (CA) using open source step-ca.
+

+ +###### Build your own System/Virtual Machine + +

+   os-tutorial - how to create an OS from scratch.
+   Write your Own Virtual Machine - how to write your own virtual machine (VM).
+   x86 Bare Metal Examples - dozens of minimal operating systems to learn x86 system programming.
+   simple-computer - the scott CPU from "But How Do It Know?" by J. Clark Scott.
+   littleosbook - the little book about OS development.
+

+ +###### DNS Servers list (privacy) + +| IP | URL | +| :--- | :--- | +| **`84.200.69.80`** | [dns.watch](https://dns.watch/) | +| **`94.247.43.254`** | [opennic.org](https://www.opennic.org/) | +| **`64.6.64.6`** | [verisign.com](https://www.verisign.com/en_US/security-services/public-dns/index.xhtml) | +| **`89.233.43.71`** | [censurfridns.dk](https://blog.uncensoreddns.org/) | +| **`1.1.1.1`** | [cloudflare.com](https://1.1.1.1/) | +| **`94.130.110.185`** | [dnsprivacy.at](https://dnsprivacy.at/) | + +###### TOP Browser extensions + +| Extension name | Description | +| :--- | :--- | +| **`IPvFoo`** | Display the server IP address and HTTPS information across all page elements. | +| **`FoxyProxy`** | Simplifies configuring browsers to access proxy-servers. | +| **`HTTPS Everywhere`** | Automatically use HTTPS security on many sites. | +| **`uMatrix`** | Point & click to forbid/allow any class of requests made by your browser. | +| **`uBlock Origin`** | An efficient blocker: easy on memory and CPU footprint. | +| **`Session Buddy`** | Manage browser tabs and bookmarks with ease. | +| **`SuperSorter`** | Sort bookmarks recursively, delete duplicates, merge folders, and more. | +| **`Clear Cache`** | Clear your cache and browsing data. | +| **`d3coder`** | Encoding/Decoding plugin for various types of encoding. | +| **`Web Developer`** | Adds a toolbar button with various web developer tools. | +| **`ThreatPinch Lookup`** | Add threat intelligence hover tool tips. | + +###### TOP Burp extensions + +| Extension name | Description | +| :--- | :--- | +| **`Active Scan++`** | Extends Burp's active and passive scanning capabilities. | +| **`Autorize`** | Automatically detects authorization enforcement. | +| **`AuthMatrix`** | A simple matrix grid to define the desired levels of access privilege. | +| **`Logger++`** | Logs requests and responses for all Burp tools in a sortable table. | +| **`Bypass WAF`** | Adds headers useful for bypassing some WAF devices. | +| **`JSON Beautifier`** | Beautifies JSON content in the HTTP message viewer. | +| **`JSON Web Tokens`** | Enables Burp to decode and manipulate JSON web tokens. | +| **`CSP Auditor`** | Displays CSP headers for responses, and passively reports CSP weaknesses. | +| **`CSP-Bypass`** | Passively scans for CSP headers that contain known bypasses. | +| **`Hackvertor`** | Converts data using a tag-based configuration to apply various encoding. | +| **`HTML5 Auditor`** | Scans for usage of risky HTML5 features. | +| **`Software Vulnerability Scanner`** | Vulnerability scanner based on vulners.com audit API. | +| **`Turbo Intruder`** | Is a powerful bruteforcing tool. | +| **`Upload Scanner`** | Upload a number of different file types, laced with different forms of payload. | + +###### Hack Mozilla Firefox address bar + +In Firefox's address bar, you can limit results by typing special characters before or after your term: + +- `^` - for matches in your browsing history +- `*` - for matches in your bookmarks. +- `%` - for matches in your currently open tabs. +- `#` - for matches in page titles. +- `@` - for matches in web addresses. + +###### Chrome hidden commands + +- `chrome://chrome-urls` - list of all commands +- `chrome://flags` - enable experiments and development features +- `chrome://interstitials` - errors and warnings +- `chrome://net-internals` - network internals (events, dns, cache) +- `chrome://network-errors` - network errors +- `chrome://net-export` - start logging future network activity to a file +- `chrome://safe-browsing` - safe browsing options +- `chrome://user-actions` - record all user actions +- `chrome://restart` - restart chrome +- `chrome://dino` - ERR_INTERNET_DISCONNECTED... +- `cache:` - view the cached version of the web page + +###### Bypass WAFs by Shortening IP Address (by [0xInfection](https://twitter.com/0xInfection)) + +IP addresses can be shortened by dropping the zeroes: + +``` +http://1.0.0.1 → http://1.1 +http://127.0.0.1 → http://127.1 +http://192.168.0.1 → http://192.168.1 + +http://0xC0A80001 or http://3232235521 → 192.168.0.1 +http://192.168.257 → 192.168.1.1 +http://192.168.516 → 192.168.2.4 +``` + + > This bypasses WAF filters for SSRF, open-redirect, etc where any IP as input gets blacklisted. + +For more information please see [How to Obscure Any URL](http://www.pc-help.org/obscure.htm) and [Magic IP Address Shortcuts](https://stuff-things.net/2014/09/25/magic-ip-address-shortcuts/). + +###### Hashing, encryption and encoding (by [Michal Špaček](https://twitter.com/spazef0rze)) + +_Hashing_ + +plaintext :arrow_right: hash
+hash :no_entry: plaintext + +_Symmetric encryption_ + +plaintext :arrow_right: :key: :arrow_right: ciphertext
+plaintext :arrow_left: :key: :arrow_left: ciphertext
+(:key: shared key) + +_Asymmetric encryption_ + +plaintext :arrow_right: :key: :arrow_right: ciphertext
+plaintext :arrow_left: :part_alternation_mark: :arrow_left: ciphertext
+(:key: public key, :part_alternation_mark: private key)
+ +_Encoding_ + +text :arrow_right: encoded
+text :arrow_left: encoded + +#### Shell One-liners  [[TOC]](#anger-table-of-contents) + +##### Table of Contents + + * [terminal](#tool-terminal) + * [busybox](#tool-busybox) + * [mount](#tool-mount) + * [fuser](#tool-fuser) + * [lsof](#tool-lsof) + * [ps](#tool-ps) + * [top](#tool-top) + * [vmstat](#tool-vmstat) + * [iostat](#tool-iostat) + * [strace](#tool-strace) + * [kill](#tool-kill) + * [find](#tool-find) + * [diff](#tool-diff) + * [vimdiff](#tool-vimdiff) + * [tail](#tool-tail) + * [cpulimit](#tool-cpulimit) + * [pwdx](#tool-pwdx) + * [tr](#tool-tr) + * [chmod](#tool-chmod) + * [who](#tool-who) + * [last](#tool-last) + * [screen](#tool-screen) + * [script](#tool-script) + * [du](#tool-du) + * [inotifywait](#tool-inotifywait) + * [openssl](#tool-openssl) + * [secure-delete](#tool-secure-delete) + * [dd](#tool-dd) + * [gpg](#tool-gpg) + * [system-other](#tool-system-other) + * [curl](#tool-curl) + * [httpie](#tool-httpie) + * [ssh](#tool-ssh) + * [linux-dev](#tool-linux-dev) + * [tcpdump](#tool-tcpdump) + * [tcpick](#tool-tcpick) + * [ngrep](#tool-ngrep) + * [hping3](#tool-hping3) + * [nmap](#tool-nmap) + * [netcat](#tool-netcat) + * [socat](#tool-socat) + * [p0f](#tool-p0f) + * [gnutls-cli](#tool-gnutls-cli) + * [netstat](#tool-netstat) + * [rsync](#tool-rsync) + * [host](#tool-host) + * [dig](#tool-dig) + * [certbot](#tool-certbot) + * [network-other](#tool-network-other) + * [git](#tool-git) + * [awk](#tool-awk) + * [sed](#tool-sed) + * [grep](#tool-grep) + * [perl](#tool-perl) + +##### Tool: [terminal](https://en.wikipedia.org/wiki/Linux_console) + +###### Reload shell without exit + +```bash +exec $SHELL -l +``` + +###### Close shell keeping all subprocess running + +```bash +disown -a && exit +``` + +###### Exit without saving shell history + +```bash +kill -9 $$ +unset HISTFILE && exit +``` + +###### Perform a branching conditional + +```bash +true && echo success +false || echo failed +``` + +###### Pipe stdout and stderr to separate commands + +```bash +some_command > >(/bin/cmd_for_stdout) 2> >(/bin/cmd_for_stderr) +``` + +###### Redirect stdout and stderr each to separate files and print both to the screen + +```bash +(some_command 2>&1 1>&3 | tee errorlog ) 3>&1 1>&2 | tee stdoutlog +``` + +###### List of commands you use most often + +```bash +history | \ +awk '{CMD[$2]++;count++;}END { for (a in CMD)print CMD[a] " " CMD[a]/count*100 "% " a;}' | \ +grep -v "./" | \ +column -c3 -s " " -t | \ +sort -nr | nl | head -n 20 +``` + +###### Sterilize bash history + +```bash +function sterile() { + + history | awk '$2 != "history" { $1=""; print $0 }' | egrep -vi "\ +curl\b+.*(-E|--cert)\b+.*\b*|\ +curl\b+.*--pass\b+.*\b*|\ +curl\b+.*(-U|--proxy-user).*:.*\b*|\ +curl\b+.*(-u|--user).*:.*\b* +.*(-H|--header).*(token|auth.*)\b+.*|\ +wget\b+.*--.*password\b+.*\b*|\ +http.?://.+:.+@.*\ +" > $HOME/histbuff; history -r $HOME/histbuff; + +} + +export PROMPT_COMMAND="sterile" +``` + + > Look also: [A naive utility to censor credentials in command history](https://github.com/lbonanomi/go/blob/master/revisionist.go). + +###### Quickly backup a file + +```bash +cp filename{,.orig} +``` + +###### Empty a file (truncate to 0 size) + +```bash +>filename +``` + +###### Delete all files in a folder that don't match a certain file extension + +```bash +rm !(*.foo|*.bar|*.baz) +``` + +###### Pass multi-line string to a file + +```bash +# cat >filename ... - overwrite the file +# cat >>filename ... - append to a file +cat > filename << __EOF__ +data data data +__EOF__ +``` + +###### Edit a file on a remote host using vim + +```bash +vim scp://user@host//etc/fstab +``` + +###### Create a directory and change into it at the same time + +```bash +mkd() { mkdir -p "$@" && cd "$@"; } +``` + +###### Convert uppercase files to lowercase files + +```bash +rename 'y/A-Z/a-z/' * +``` + +###### Print a row of characters across the terminal + +```bash +printf "%`tput cols`s" | tr ' ' '#' +``` + +###### Show shell history without line numbers + +```bash +history | cut -c 8- +fc -l -n 1 | sed 's/^\s*//' +``` + +###### Run command(s) after exit session + +```bash +cat > /etc/profile << __EOF__ +_after_logout() { + + username=$(whoami) + + for _pid in $(ps afx | grep sshd | grep "$username" | awk '{print $1}') ; do + + kill -9 $_pid + + done + +} +trap _after_logout EXIT +__EOF__ +``` + +###### Generate a sequence of numbers + +```bash +for ((i=1; i<=10; i+=2)) ; do echo $i ; done +# alternative: seq 1 2 10 + +for ((i=5; i<=10; ++i)) ; do printf '%02d\n' $i ; done +# alternative: seq -w 5 10 + +for i in {1..10} ; do echo $i ; done +``` + +###### Simple Bash filewatching + +```bash +unset MAIL; export MAILCHECK=1; export MAILPATH='$FILE_TO_WATCH?$MESSAGE' +``` + +--- + +##### Tool: [busybox](https://www.busybox.net/) + +###### Static HTTP web server + +```bash +busybox httpd -p $PORT -h $HOME [-c httpd.conf] +``` + +___ + +##### Tool: [mount](https://en.wikipedia.org/wiki/Mount_(Unix)) + +###### Mount a temporary ram partition + +```bash +mount -t tmpfs tmpfs /mnt -o size=64M +``` + + * `-t` - filesystem type + * `-o` - mount options + +###### Remount a filesystem as read/write + +```bash +mount -o remount,rw / +``` + +___ + +##### Tool: [fuser](https://en.wikipedia.org/wiki/Fuser_(Unix)) + +###### Show which processes use the files/directories + +```bash +fuser /var/log/daemon.log +fuser -v /home/supervisor +``` + +###### Kills a process that is locking a file + +```bash +fuser -ki filename +``` + + * `-i` - interactive option + +###### Kills a process that is locking a file with specific signal + +```bash +fuser -k -HUP filename +``` + + * `--list-signals` - list available signal names + +###### Show what PID is listening on specific port + +```bash +fuser -v 53/udp +``` + +###### Show all processes using the named filesystems or block device + +```bash +fuser -mv /var/www +``` + +___ + +##### Tool: [lsof](https://en.wikipedia.org/wiki/Lsof) + +###### Show process that use internet connection at the moment + +```bash +lsof -P -i -n +``` + +###### Show process that use specific port number + +```bash +lsof -i tcp:443 +``` + +###### Lists all listening ports together with the PID of the associated process + +```bash +lsof -Pan -i tcp -i udp +``` + +###### List all open ports and their owning executables + +```bash +lsof -i -P | grep -i "listen" +``` + +###### Show all open ports + +```bash +lsof -Pnl -i +``` + +###### Show open ports (LISTEN) + +```bash +lsof -Pni4 | grep LISTEN | column -t +``` + +###### List all files opened by a particular command + +```bash +lsof -c "process" +``` + +###### View user activity per directory + +```bash +lsof -u username -a +D /etc +``` + +###### Show 10 largest open files + +```bash +lsof / | \ +awk '{ if($7 > 1048576) print $7/1048576 "MB" " " $9 " " $1 }' | \ +sort -n -u | tail | column -t +``` + +###### Show current working directory of a process + +```bash +lsof -p | grep cwd +``` + +___ + +##### Tool: [ps](https://en.wikipedia.org/wiki/Ps_(Unix)) + +###### Show a 4-way scrollable process tree with full details + +```bash +ps awwfux | less -S +``` + +###### Processes per user counter + +```bash +ps hax -o user | sort | uniq -c | sort -r +``` + +###### Show all processes by name with main header + +```bash +ps -lfC nginx +``` + +___ + +##### Tool: [find](https://en.wikipedia.org/wiki/Find_(Unix)) + +###### Find files that have been modified on your system in the past 60 minutes + +```bash +find / -mmin 60 -type f +``` + +###### Find all files larger than 20M + +```bash +find / -type f -size +20M +``` + +###### Find duplicate files (based on MD5 hash) + +```bash +find -type f -exec md5sum '{}' ';' | sort | uniq --all-repeated=separate -w 33 +``` + +###### Change permission only for files + +```bash +cd /var/www/site && find . -type f -exec chmod 766 {} \; +cd /var/www/site && find . -type f -exec chmod 664 {} + +``` + +###### Change permission only for directories + +```bash +cd /var/www/site && find . -type d -exec chmod g+x {} \; +cd /var/www/site && find . -type d -exec chmod g+rwx {} + +``` + +###### Find files and directories for specific user/group + +```bash +# User: +find . -user -print +find /etc -type f -user -name "*.conf" + +# Group: +find /opt -group +find /etc -type f -group -iname "*.conf" +``` + +###### Find files and directories for all without specific user/group + +```bash +# User: +find . \! -user -print + +# Group: +find . \! -group +``` + +###### Looking for files/directories that only have certain permission + +```bash +# User +find . -user -perm -u+rw # -rw-r--r-- +find /home -user $(whoami) -perm 777 # -rwxrwxrwx + +# Group: +find /home -type d -group -perm 755 # -rwxr-xr-x +``` + +###### Delete older files than 60 days + +```bash +find . -type f -mtime +60 -delete +``` + +###### Recursively remove all empty sub-directories from a directory + +```bash +find . -depth -type d -empty -exec rmdir {} \; +``` + +###### How to find all hard links to a file + +```bash +find -xdev -samefile filename +``` + +###### Recursively find the latest modified files + +```bash +find . -type f -exec stat --format '%Y :%y %n' "{}" \; | sort -nr | cut -d: -f2- | head +``` + +###### Recursively find/replace of a string with sed + +```bash +find . -not -path '*/\.git*' -type f -print0 | xargs -0 sed -i 's/foo/bar/g' +``` + +###### Recursively find/replace of a string in directories and file names + +```bash +find . -depth -name '*test*' -execdir bash -c 'mv -v "$1" "${1//foo/bar}"' _ {} \; +``` + +###### Recursively find suid executables + +```bash +find / \( -perm -4000 -o -perm -2000 \) -type f -exec ls -la {} \; +``` + +___ + +##### Tool: [top](https://en.wikipedia.org/wiki/Top_(software)) + +###### Use top to monitor only all processes with the specific string + +```bash +top -p $(pgrep -d , ) +``` + + * `` - process containing string (eg. nginx, worker) + +___ + +##### Tool: [vmstat](https://en.wikipedia.org/wiki/Vmstat) + +###### Show current system utilization (fields in kilobytes) + +```bash +vmstat 2 20 -t -w +``` + + * `2` - number of times with a defined time interval (delay) + * `20` - each execution of the command (count) + * `-t` - show timestamp + * `-w` - wide output + * `-S M` - output of the fields in megabytes instead of kilobytes + +###### Show current system utilization will get refreshed every 5 seconds + +```bash +vmstat 5 -w +``` + +###### Display report a summary of disk operations + +```bash +vmstat -D +``` + +###### Display report of event counters and memory stats + +```bash +vmstat -s +``` + +###### Display report about kernel objects stored in slab layer cache + +```bash +vmstat -m +``` + +##### Tool: [iostat](https://en.wikipedia.org/wiki/Iostat) + +###### Show information about the CPU usage, and I/O statistics about all the partitions + +```bash +iostat 2 10 -t -m +``` + + * `2` - number of times with a defined time interval (delay) + * `10` - each execution of the command (count) + * `-t` - show timestamp + * `-m` - fields in megabytes (`-k` - in kilobytes, default) + +###### Show information only about the CPU utilization + +```bash +iostat 2 10 -t -m -c +``` + +###### Show information only about the disk utilization + +```bash +iostat 2 10 -t -m -d +``` + +###### Show information only about the LVM utilization + +```bash +iostat -N +``` + +___ + +##### Tool: [strace](https://en.wikipedia.org/wiki/Strace) + +###### Track with child processes + +```bash +# 1) +strace -f -p $(pidof glusterfsd) + +# 2) +strace -f $(pidof php-fpm | sed 's/\([0-9]*\)/\-p \1/g') +``` + +###### Track process with 30 seconds limit + +```bash +timeout 30 strace $(< /var/run/zabbix/zabbix_agentd.pid) +``` + +###### Track processes and redirect output to a file + +```bash +ps auxw | grep '[a]pache' | awk '{print " -p " $2}' | \ +xargs strace -o /tmp/strace-apache-proc.out +``` + +###### Track with print time spent in each syscall and limit length of print strings + +```bash +ps auxw | grep '[i]init_policy' | awk '{print " -p " $2}' | \ +xargs strace -f -e trace=network -T -s 10000 +``` + +###### Track the open request of a network port + +```bash +strace -f -e trace=bind nc -l 80 +``` + +###### Track the open request of a network port (show TCP/UDP) + +```bash +strace -f -e trace=network nc -lu 80 +``` + +___ + +##### Tool: [kill](https://en.wikipedia.org/wiki/Kill_(command)) + +###### Kill a process running on port + +```bash +kill -9 $(lsof -i : | awk '{l=$2} END {print l}') +``` + +___ + +##### Tool: [diff](https://en.wikipedia.org/wiki/Diff) + +###### Compare two directory trees + +```bash +diff <(cd directory1 && find | sort) <(cd directory2 && find | sort) +``` + +###### Compare output of two commands + +```bash +diff <(cat /etc/passwd) <(cut -f2 /etc/passwd) +``` + +___ + +##### Tool: [vimdiff](http://vimdoc.sourceforge.net/htmldoc/diff.html) + +###### Highlight the exact differences, based on characters and words + +```bash +vimdiff file1 file2 +``` + +###### Compare two JSON files + +```bash +vimdiff <(jq -S . A.json) <(jq -S . B.json) +``` + +###### Compare Hex dump + +```bash +d(){ vimdiff <(f $1) <(f $2);};f(){ hexdump -C $1 | cut -d' ' -f3- | tr -s ' ';}; d ~/bin1 ~/bin2 +``` + +###### diffchar + +Save [diffchar](https://raw.githubusercontent.com/vim-scripts/diffchar.vim/master/plugin/diffchar.vim) @ `~/.vim/plugins` + +Click `F7` to switch between diff modes + +Usefull `vimdiff` commands: + +* `qa` to exit all windows +* `:vertical resize 70` to resize window +* set window width `Ctrl+W [N columns]+(Shift+)<\>` + +___ + +##### Tool: [tail](https://en.wikipedia.org/wiki/Tail_(Unix)) + +###### Annotate tail -f with timestamps + +```bash +tail -f file | while read ; do echo "$(date +%T.%N) $REPLY" ; done +``` + +###### Analyse an Apache access log for the most common IP addresses + +```bash +tail -10000 access_log | awk '{print $1}' | sort | uniq -c | sort -n | tail +``` + +###### Analyse web server log and show only 5xx http codes + +```bash +tail -n 100 -f /path/to/logfile | grep "HTTP/[1-2].[0-1]\" [5]" +``` + +___ + +##### Tool: [tar](https://en.wikipedia.org/wiki/Tar_(computing)) + +###### System backup with exclude specific directories + +```bash +cd / +tar -czvpf /mnt/system$(date +%d%m%Y%s).tgz --directory=/ \ +--exclude=proc/* --exclude=sys/* --exclude=dev/* --exclude=mnt/* . +``` + +###### System backup with exclude specific directories (pigz) + +```bash +cd / +tar cvpf /backup/snapshot-$(date +%d%m%Y%s).tgz --directory=/ \ +--exclude=proc/* --exclude=sys/* --exclude=dev/* \ +--exclude=mnt/* --exclude=tmp/* --use-compress-program=pigz . +``` + +___ + +##### Tool: [dump](https://en.wikipedia.org/wiki/Dump_(program)) + +###### System backup to file + +```bash +dump -y -u -f /backup/system$(date +%d%m%Y%s).lzo / +``` + +###### Restore system from lzo file + +```bash +cd / +restore -rf /backup/system$(date +%d%m%Y%s).lzo +``` + +___ + +##### Tool: [cpulimit](http://cpulimit.sourceforge.net/) + +###### Limit the cpu usage of a process + +```bash +cpulimit -p pid -l 50 +``` + +___ + +##### Tool: [pwdx](https://www.cyberciti.biz/faq/unix-linux-pwdx-command-examples-usage-syntax/) + +###### Show current working directory of a process + +```bash +pwdx +``` + +___ + +##### Tool: [taskset](https://www.cyberciti.biz/faq/taskset-cpu-affinity-command/) + +###### Start a command on only one CPU core + +```bash +taskset -c 0 +``` + +___ + +##### Tool: [tr](https://en.wikipedia.org/wiki/Tr_(Unix)) + +###### Show directories in the PATH, one per line + +```bash +tr : '\n' <<<$PATH +``` + +___ + +##### Tool: [chmod](https://en.wikipedia.org/wiki/Chmod) + +###### Remove executable bit from all files in the current directory + +```bash +chmod -R -x+X * +``` + +###### Restore permission for /bin/chmod + +```bash +# 1: +cp /bin/ls chmod.01 +cp /bin/chmod chmod.01 +./chmod.01 700 file + +# 2: +/bin/busybox chmod 0700 /bin/chmod + +# 3: +setfacl --set u::rwx,g::---,o::--- /bin/chmod +``` + +___ + +##### Tool: [who](https://en.wikipedia.org/wiki/Who_(Unix)) + +###### Find last reboot time + +```bash +who -b +``` + +###### Detect a user sudo-su'd into the current shell + +```bash +[[ $(who -m | awk '{ print $1 }') == $(whoami) ]] || echo "You are su-ed to $(whoami)" +``` + +___ + +##### Tool: [last](https://www.howtoforge.com/linux-last-command/) + +###### Was the last reboot a panic? + +```bash +(last -x -f $(ls -1t /var/log/wtmp* | head -2 | tail -1); last -x -f /var/log/wtmp) | \ +grep -A1 reboot | head -2 | grep -q shutdown && echo "Expected reboot" || echo "Panic reboot" +``` + +___ + +##### Tool: [screen](https://en.wikipedia.org/wiki/GNU_Screen) + +###### Start screen in detached mode + +```bash +screen -d -m +``` + +###### Attach to an existing screen session + +```bash +screen -r -d +``` + +___ + +##### Tool: [script](https://en.wikipedia.org/wiki/Script_(Unix)) + +###### Record and replay terminal session + +```bash +### Record session +# 1) +script -t 2>~/session.time -a ~/session.log + +# 2) +script --timing=session.time session.log + +### Replay session +scriptreplay --timing=session.time session.log +``` + +___ + +##### Tool: [du](https://en.wikipedia.org/wiki/GNU_Screen) + +###### Show 20 biggest directories with 'K M G' + +```bash +du | \ +sort -r -n | \ +awk '{split("K M G",v); s=1; while($1>1024){$1/=1024; s++} print int($1)" "v[s]"\t"$2}' | \ +head -n 20 +``` + +___ + +##### Tool: [inotifywait](https://en.wikipedia.org/wiki/GNU_Screen) + +###### Init tool everytime a file in a directory is modified + +```bash +while true ; do inotifywait -r -e MODIFY dir/ && ls dir/ ; done; +``` + +___ + +##### Tool: [openssl](https://www.openssl.org/) + +###### Testing connection to the remote host + +```bash +echo | openssl s_client -connect google.com:443 -showcerts +``` + +###### Testing connection to the remote host (debug mode) + +```bash +echo | openssl s_client -connect google.com:443 -showcerts -tlsextdebug -status +``` + +###### Testing connection to the remote host (with SNI support) + +```bash +echo | openssl s_client -showcerts -servername google.com -connect google.com:443 +``` + +###### Testing connection to the remote host with specific ssl version + +```bash +openssl s_client -tls1_2 -connect google.com:443 +``` + +###### Testing connection to the remote host with specific ssl cipher + +```bash +openssl s_client -cipher 'AES128-SHA' -connect google.com:443 +``` + +###### Verify 0-RTT + +```bash +_host="example.com" + +cat > req.in << __EOF__ +HEAD / HTTP/1.1 +Host: $_host +Connection: close +__EOF__ + +openssl s_client -connect ${_host}:443 -tls1_3 -sess_out session.pem -ign_eof < req.in +openssl s_client -connect ${_host}:443 -tls1_3 -sess_in session.pem -early_data req.in +``` + +###### Generate private key without passphrase + +```bash +# _len: 2048, 4096 +( _fd="private.key" ; _len="2048" ; \ +openssl genrsa -out ${_fd} ${_len} ) +``` + +###### Generate private key with passphrase + +```bash +# _ciph: aes128, aes256 +# _len: 2048, 4096 +( _ciph="aes128" ; _fd="private.key" ; _len="2048" ; \ +openssl genrsa -${_ciph} -out ${_fd} ${_len} ) +``` + +###### Remove passphrase from private key + +```bash +( _fd="private.key" ; _fd_unp="private_unp.key" ; \ +openssl rsa -in ${_fd} -out ${_fd_unp} ) +``` + +###### Encrypt existing private key with a passphrase + +```bash +# _ciph: aes128, aes256 +( _ciph="aes128" ; _fd="private.key" ; _fd_pass="private_pass.key" ; \ +openssl rsa -${_ciph} -in ${_fd} -out ${_fd_pass} +``` + +###### Check private key + +```bash +( _fd="private.key" ; \ +openssl rsa -check -in ${_fd} ) +``` + +###### Get public key from private key + +```bash +( _fd="private.key" ; _fd_pub="public.key" ; \ +openssl rsa -pubout -in ${_fd} -out ${_fd_pub} ) +``` + +###### Generate private key and CSR + +```bash +( _fd="private.key" ; _fd_csr="request.csr" ; _len="2048" ; \ +openssl req -out ${_fd_csr} -new -newkey rsa:${_len} -nodes -keyout ${_fd} ) +``` + +###### Generate CSR + +```bash +( _fd="private.key" ; _fd_csr="request.csr" ; \ +openssl req -out ${_fd_csr} -new -key ${_fd} ) +``` + +###### Generate CSR (metadata from existing certificate) + + > Where `private.key` is the existing private key. As you can see you do not generate this CSR from your certificate (public key). Also you do not generate the "same" CSR, just a new one to request a new certificate. + +```bash +( _fd="private.key" ; _fd_csr="request.csr" ; _fd_crt="cert.crt" ; \ +openssl x509 -x509toreq -in ${_fd_crt} -out ${_fd_csr} -signkey ${_fd} ) +``` + +###### Generate CSR with -config param + +```bash +( _fd="private.key" ; _fd_csr="request.csr" ; \ +openssl req -new -sha256 -key ${_fd} -out ${_fd_csr} \ +-config <( +cat << __EOF__ +[req] +default_bits = 2048 +default_md = sha256 +prompt = no +distinguished_name = dn +req_extensions = req_ext + +[ dn ] +C = "" +ST = "" +L = "" +O = "" +OU = "
" +CN = "" + +[ req_ext ] +subjectAltName = @alt_names + +[ alt_names ] +DNS.1 = +DNS.2 = +DNS.3 = +__EOF__ +)) +``` + +Other values in `[ dn ]`: + +``` +countryName = "DE" # C= +stateOrProvinceName = "Hessen" # ST= +localityName = "Keller" # L= +postalCode = "424242" # L/postalcode= +postalAddress = "Keller" # L/postaladdress= +streetAddress = "Crater 1621" # L/street= +organizationName = "apfelboymschule" # O= +organizationalUnitName = "IT Department" # OU= +commonName = "example.com" # CN= +emailAddress = "webmaster@example.com" # CN/emailAddress= +``` + +Example of `oids` (you'll probably also have to make OpenSSL know about the new fields required for EV by adding the following under `[new_oids]`): + +``` +[req] +... +oid_section = new_oids + +[ new_oids ] +postalCode = 2.5.4.17 +streetAddress = 2.5.4.9 +``` + +Full example: + +```bash +( _fd="private.key" ; _fd_csr="request.csr" ; \ +openssl req -new -sha256 -key ${_fd} -out ${_fd_csr} \ +-config <( +cat << __EOF__ +[req] +default_bits = 2048 +default_md = sha256 +prompt = no +distinguished_name = dn +req_extensions = req_ext +oid_section = new_oids + +[ new_oids ] +serialNumber = 2.5.4.5 +streetAddress = 2.5.4.9 +postalCode = 2.5.4.17 +businessCategory = 2.5.4.15 + +[ dn ] +serialNumber=00001111 +businessCategory=Private Organization +jurisdictionC=DE +C=DE +ST=Hessen +L=Keller +postalCode=424242 +streetAddress=Crater 1621 +O=AV Company +OU=IT +CN=example.com + +[ req_ext ] +subjectAltName = @alt_names + +[ alt_names ] +DNS.1 = example.com +__EOF__ +)) +``` + +For more information please look at these great explanations: + +- [RFC 5280](https://tools.ietf.org/html/rfc5280) +- [How to create multidomain certificates using config files](https://apfelboymchen.net/gnu/notes/openssl%20multidomain%20with%20config%20files.html) +- [Generate a multi domains certificate using config files](https://gist.github.com/romainnorberg/464758a6620228b977212a3cf20c3e08) +- [Your OpenSSL CSR command is out of date](https://expeditedsecurity.com/blog/openssl-csr-command/) +- [OpenSSL example configuration file](https://www.tbs-certificats.com/openssl-dem-server-cert.cnf) +- [Object Identifiers (OIDs)](https://www.alvestrand.no/objectid/) +- [openssl objects.txt](https://github.com/openssl/openssl/blob/master/crypto/objects/objects.txt) + +###### List available EC curves + +```bash +openssl ecparam -list_curves +``` + +###### Print ECDSA private and public keys + +```bash +( _fd="private.key" ; \ +openssl ec -in ${_fd} -noout -text ) + +# For x25519 only extracting public key +( _fd="private.key" ; _fd_pub="public.key" ; \ +openssl pkey -in ${_fd} -pubout -out ${_fd_pub} ) +``` + +###### Generate ECDSA private key + +```bash +# _curve: prime256v1, secp521r1, secp384r1 +( _fd="private.key" ; _curve="prime256v1" ; \ +openssl ecparam -out ${_fd} -name ${_curve} -genkey ) + +# _curve: X25519 +( _fd="private.key" ; _curve="x25519" ; \ +openssl genpkey -algorithm ${_curve} -out ${_fd} ) +``` + +###### Generate private key and CSR (ECC) + +```bash +# _curve: prime256v1, secp521r1, secp384r1 +( _fd="domain.com.key" ; _fd_csr="domain.com.csr" ; _curve="prime256v1" ; \ +openssl ecparam -out ${_fd} -name ${_curve} -genkey ; \ +openssl req -new -key ${_fd} -out ${_fd_csr} -sha256 ) +``` + +###### Generate self-signed certificate + +```bash +# _len: 2048, 4096 +( _fd="domain.key" ; _fd_out="domain.crt" ; _len="2048" ; _days="365" ; \ +openssl req -newkey rsa:${_len} -nodes \ +-keyout ${_fd} -x509 -days ${_days} -out ${_fd_out} ) +``` + +###### Generate self-signed certificate from existing private key + +```bash +# _len: 2048, 4096 +( _fd="domain.key" ; _fd_out="domain.crt" ; _days="365" ; \ +openssl req -key ${_fd} -nodes \ +-x509 -days ${_days} -out ${_fd_out} ) +``` + +###### Generate self-signed certificate from existing private key and csr + +```bash +# _len: 2048, 4096 +( _fd="domain.key" ; _fd_csr="domain.csr" ; _fd_out="domain.crt" ; _days="365" ; \ +openssl x509 -signkey ${_fd} -nodes \ +-in ${_fd_csr} -req -days ${_days} -out ${_fd_out} ) +``` + +###### Generate DH public parameters + +```bash +( _dh_size="2048" ; \ +openssl dhparam -out /etc/nginx/ssl/dhparam_${_dh_size}.pem "$_dh_size" ) +``` + +###### Display DH public parameters + +```bash +openssl pkeyparam -in dhparam.pem -text +``` + +###### Extract private key from pfx + +```bash +( _fd_pfx="cert.pfx" ; _fd_key="key.pem" ; \ +openssl pkcs12 -in ${_fd_pfx} -nocerts -nodes -out ${_fd_key} ) +``` + +###### Extract private key and certs from pfx + +```bash +( _fd_pfx="cert.pfx" ; _fd_pem="key_certs.pem" ; \ +openssl pkcs12 -in ${_fd_pfx} -nodes -out ${_fd_pem} ) +``` + +###### Extract certs from p7b + +```bash +# PKCS#7 file doesn't include private keys. +( _fd_p7b="cert.p7b" ; _fd_pem="cert.pem" ; \ +openssl pkcs7 -inform DER -outform PEM -in ${_fd_p7b} -print_certs > ${_fd_pem}) +# or: +openssl pkcs7 -print_certs -in -in ${_fd_p7b} -out ${_fd_pem}) +``` + +###### Convert DER to PEM + +```bash +( _fd_der="cert.crt" ; _fd_pem="cert.pem" ; \ +openssl x509 -in ${_fd_der} -inform der -outform pem -out ${_fd_pem} ) +``` + +###### Convert PEM to DER + +```bash +( _fd_der="cert.crt" ; _fd_pem="cert.pem" ; \ +openssl x509 -in ${_fd_pem} -outform der -out ${_fd_der} ) +``` + +###### Verification of the private key + +```bash +( _fd="private.key" ; \ +openssl rsa -noout -text -in ${_fd} ) +``` + +###### Verification of the public key + +```bash +# 1) +( _fd="public.key" ; \ +openssl pkey -noout -text -pubin -in ${_fd} ) + +# 2) +( _fd="private.key" ; \ +openssl rsa -inform PEM -noout -in ${_fd} &> /dev/null ; \ +if [ $? = 0 ] ; then echo -en "OK\n" ; fi ) +``` + +###### Verification of the certificate + +```bash +( _fd="certificate.crt" ; # format: pem, cer, crt \ +openssl x509 -noout -text -in ${_fd} ) +``` + +###### Verification of the CSR + +```bash +( _fd_csr="request.csr" ; \ +openssl req -text -noout -in ${_fd_csr} ) +``` + +###### Check the private key and the certificate are match + +```bash +(openssl rsa -noout -modulus -in private.key | openssl md5 ; \ +openssl x509 -noout -modulus -in certificate.crt | openssl md5) | uniq +``` + +###### Check the private key and the CSR are match + +```bash +(openssl rsa -noout -modulus -in private.key | openssl md5 ; \ +openssl req -noout -modulus -in request.csr | openssl md5) | uniq +``` + +___ + +##### Tool: [secure-delete](https://wiki.archlinux.org/index.php/Securely_wipe_disk) + +###### Secure delete with shred + +```bash +shred -vfuz -n 10 file +shred --verbose --random-source=/dev/urandom -n 1 /dev/sda +``` + +###### Secure delete with scrub + +```bash +scrub -p dod /dev/sda +scrub -p dod -r file +``` + +###### Secure delete with badblocks + +```bash +badblocks -s -w -t random -v /dev/sda +badblocks -c 10240 -s -w -t random -v /dev/sda +``` + +###### Secure delete with secure-delete + +```bash +srm -vz /tmp/file +sfill -vz /local +sdmem -v +swapoff /dev/sda5 && sswap -vz /dev/sda5 +``` + +___ + +##### Tool: [dd](https://en.wikipedia.org/wiki/Dd_(Unix)) + +###### Show dd status every so often + +```bash +dd status=progress +watch --interval 5 killall -USR1 dd +``` + +###### Redirect output to a file with dd + +```bash +echo "string" | dd of=filename +``` + +___ + +##### Tool: [gpg](https://www.gnupg.org/) + +###### Export public key + +```bash +gpg --export --armor "" > username.pkey +``` + + * `--export` - export all keys from all keyrings or specific key + * `-a|--armor` - create ASCII armored output + +###### Encrypt file + +```bash +gpg -e -r "" dump.sql +``` + + * `-e|--encrypt` - encrypt data + * `-r|--recipient` - encrypt for specific + +###### Decrypt file + +```bash +gpg -o dump.sql -d dump.sql.gpg +``` + + * `-o|--output` - use as output file + * `-d|--decrypt` - decrypt data (default) + +###### Search recipient + +```bash +gpg --keyserver hkp://keyserver.ubuntu.com --search-keys "" +``` + + * `--keyserver` - set specific key server + * `--search-keys` - search for keys on a key server + +###### List all of the packets in an encrypted file + +```bash +gpg --batch --list-packets archive.gpg +gpg2 --batch --list-packets archive.gpg +``` + +___ + +##### Tool: [system-other](https://github.com/trimstray/the-book-of-secret-knowledge#tool-system-other) + +###### Reboot system from init + +```bash +exec /sbin/init 6 +``` + +###### Init system from single user mode + +```bash +exec /sbin/init +``` + +###### Show current working directory of a process + +```bash +readlink -f /proc//cwd +``` + +###### Show actual pathname of the executed command + +```bash +readlink -f /proc//exe +``` + +##### Tool: [curl](https://curl.haxx.se) + +```bash +curl -Iks https://www.google.com +``` + + * `-I` - show response headers only + * `-k` - insecure connection when using ssl + * `-s` - silent mode (not display body) + +```bash +curl -Iks --location -X GET -A "x-agent" https://www.google.com +``` + + * `--location` - follow redirects + * `-X` - set method + * `-A` - set user-agent + +```bash +curl -Iks --location -X GET -A "x-agent" --proxy http://127.0.0.1:16379 https://www.google.com +``` + + * `--proxy [socks5://|http://]` - set proxy server + +```bash +curl -o file.pdf -C - https://example.com/Aiju2goo0Ja2.pdf +``` + + * `-o` - write output to file + * `-C` - resume the transfer + +###### Find your external IP address (external services) + +```bash +curl ipinfo.io +curl ipinfo.io/ip +curl icanhazip.com +curl ifconfig.me/ip ; echo +``` + +###### Repeat URL request + +```bash +# URL sequence substitution with a dummy query string: +curl -ks https://example.com/?[1-20] + +# With shell 'for' loop: +for i in {1..20} ; do curl -ks https://example.com/ ; done +``` + +###### Check DNS and HTTP trace with headers for specific domains + +```bash +### Set domains and external dns servers. +_domain_list=(google.com) ; _dns_list=("8.8.8.8" "1.1.1.1") + +for _domain in "${_domain_list[@]}" ; do + + printf '=%.0s' {1..48} + + echo + + printf "[\\e[1;32m+\\e[m] resolve: %s\\n" "$_domain" + + for _dns in "${_dns_list[@]}" ; do + + # Resolve domain. + host "${_domain}" "${_dns}" + + echo + + done + + for _proto in http https ; do + + printf "[\\e[1;32m+\\e[m] trace + headers: %s://%s\\n" "$_proto" "$_domain" + + # Get trace and http headers. + curl -Iks -A "x-agent" --location "${_proto}://${_domain}" + + echo + + done + +done + +unset _domain_list _dns_list +``` + +___ + +##### Tool: [httpie](https://httpie.org/) + +```bash +http -p Hh https://www.google.com +``` + + * `-p` - print request and response headers + * `H` - request headers + * `B` - request body + * `h` - response headers + * `b` - response body + +```bash +http -p Hh https://www.google.com --follow --verify no +``` + + * `-F, --follow` - follow redirects + * `--verify no` - skip SSL verification + +```bash +http -p Hh https://www.google.com --follow --verify no \ +--proxy http:http://127.0.0.1:16379 +``` + + * `--proxy [http:]` - set proxy server + +##### Tool: [ssh](https://www.openssh.com/) + +###### Escape Sequence + +``` +# Supported escape sequences: +~. - terminate connection (and any multiplexed sessions) +~B - send a BREAK to the remote system +~C - open a command line +~R - Request rekey (SSH protocol 2 only) +~^Z - suspend ssh +~# - list forwarded connections +~& - background ssh (when waiting for connections to terminate) +~? - this message +~~ - send the escape character by typing it twice +``` + +###### Compare a remote file with a local file + +```bash +ssh user@host cat /path/to/remotefile | diff /path/to/localfile - +``` + +###### SSH connection through host in the middle + +```bash +ssh -t reachable_host ssh unreachable_host +``` + +###### Run command over SSH on remote host + +```bash +cat > cmd.txt << __EOF__ +cat /etc/hosts +__EOF__ + +ssh host -l user $(&1 | tee -a "${_sesdir}/$(date +%Y%m%d).log" + +} + +# Alias: +alias ssh='_ssh_sesslog' +``` + +###### Using Keychain for SSH logins + +```bash +### Delete all of ssh-agent's keys. +function _scl() { + + /usr/bin/keychain --clear + +} + +### Add key to keychain. +function _scg() { + + /usr/bin/keychain /path/to/private-key + source "$HOME/.keychain/$HOSTNAME-sh" + +} +``` + +###### SSH login without processing any login scripts + +```bash +ssh -tt user@host bash +``` + +###### SSH local port forwarding + +Example 1: + +```bash +# Forwarding our local 2250 port to nmap.org:443 from localhost through localhost +host1> ssh -L 2250:nmap.org:443 localhost + +# Connect to the service: +host1> curl -Iks --location -X GET https://localhost:2250 +``` + +Example 2: + +```bash +# Forwarding our local 9051 port to db.d.x:5432 from localhost through node.d.y +host1> ssh -nNT -L 9051:db.d.x:5432 node.d.y + +# Connect to the service: +host1> psql -U db_user -d db_dev -p 9051 -h localhost +``` + + * `-n` - redirects stdin from `/dev/null` + * `-N` - do not execute a remote command + * `-T` - disable pseudo-terminal allocation + +###### SSH remote port forwarding + +```bash +# Forwarding our local 9051 port to db.d.x:5432 from host2 through node.d.y +host1> ssh -nNT -R 9051:db.d.x:5432 node.d.y + +# Connect to the service: +host2> psql -U postgres -d postgres -p 8000 -h localhost +``` + +___ + +##### Tool: [linux-dev](https://www.tldp.org/LDP/abs/html/devref1.html) + +###### Testing remote connection to port + +```bash +timeout 1 bash -c "//" >/dev/null 2>&1 ; echo $? +``` + + * `` - set remote host + * `` - set destination port + +###### Read and write to TCP or UDP sockets with common bash tools + +```bash +exec 5<>/dev/tcp//; cat <&5 & cat >&5; exec 5>&- +``` + +___ + +##### Tool: [tcpdump](http://www.tcpdump.org/) + +###### Filter incoming (on interface) traffic (specific ) + +```bash +tcpdump -ne -i eth0 -Q in host 192.168.252.1 and port 443 +``` + + * `-n` - don't convert addresses (`-nn` will not resolve hostnames or ports) + * `-e` - print the link-level headers + * `-i [iface|any]` - set interface + * `-Q|-D [in|out|inout]` - choose send/receive direction (`-D` - for old tcpdump versions) + * `host [ip|hostname]` - set host, also `[host not]` + * `[and|or]` - set logic + * `port [1-65535]` - set port number, also `[port not]` + +###### Filter incoming (on interface) traffic (specific ) and write to a file + +```bash +tcpdump -ne -i eth0 -Q in host 192.168.252.1 and port 443 -c 5 -w tcpdump.pcap +``` + + * `-c [num]` - capture only num number of packets + * `-w [filename]` - write packets to file, `-r [filename]` - reading from file + +###### Capture all ICMP packets + +```bash +tcpdump -nei eth0 icmp +``` + +###### Check protocol used (TCP or UDP) for service + +```bash +tcpdump -nei eth0 tcp port 22 -vv -X | egrep "TCP|UDP" +``` + +###### Display ASCII text (to parse the output using grep or other) + +```bash +tcpdump -i eth0 -A -s0 port 443 +``` + +###### Grab everything between two keywords + +```bash +tcpdump -i eth0 port 80 -X | sed -n -e '/username/,/=ldap/ p' +``` + +###### Grab user and pass ever plain http + +```bash +tcpdump -i eth0 port http -l -A | egrep -i \ +'pass=|pwd=|log=|login=|user=|username=|pw=|passw=|passwd=|password=|pass:|user:|username:|password:|login:|pass |user ' \ +--color=auto --line-buffered -B20 +``` + +###### Extract HTTP User Agent from HTTP request header + +```bash +tcpdump -ei eth0 -nn -A -s1500 -l | grep "User-Agent:" +``` + +###### Capture only HTTP GET and POST packets + +```bash +tcpdump -ei eth0 -s 0 -A -vv \ +'tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x47455420' or 'tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x504f5354' +``` + +or simply: + +```bash +tcpdump -ei eth0 -s 0 -v -n -l | egrep -i "POST /|GET /|Host:" +``` + +###### Rotate capture files + +```bash +tcpdump -ei eth0 -w /tmp/capture-%H.pcap -G 3600 -C 200 +``` + + * `-G ` - pcap will be created every `` seconds + * `-C ` - close the current pcap and open a new one if is larger than `` + +###### Top hosts by packets + +```bash +tcpdump -ei enp0s25 -nnn -t -c 200 | cut -f 1,2,3,4 -d '.' | sort | uniq -c | sort -nr | head -n 20 +``` + +###### Excludes any RFC 1918 private address + +```bash +tcpdump -nei eth0 'not (src net (10 or 172.16/12 or 192.168/16) and dst net (10 or 172.16/12 or 192.168/16))' +``` + +___ + +##### Tool: [tcpick](http://tcpick.sourceforge.net/) + +###### Analyse packets in real-time + +```bash +while true ; do tcpick -a -C -r dump.pcap ; sleep 2 ; clear ; done +``` + +___ + +##### Tool: [ngrep](http://ngrep.sourceforge.net/usage.html) + +```bash +ngrep -d eth0 "www.domain.com" port 443 +``` + + * `-d [iface|any]` - set interface + * `[domain]` - set hostname + * `port [1-65535]` - set port number + +```bash +ngrep -d eth0 "www.domain.com" src host 10.240.20.2 and port 443 +``` + + * `(host [ip|hostname])` - filter by ip or hostname + * `(port [1-65535])` - filter by port number + +```bash +ngrep -d eth0 -qt -O ngrep.pcap "www.domain.com" port 443 +``` + + * `-q` - quiet mode (only payloads) + * `-t` - added timestamps + * `-O [filename]` - save output to file, `-I [filename]` - reading from file + +```bash +ngrep -d eth0 -qt 'HTTP' 'tcp' +``` + + * `HTTP` - show http headers + * `tcp|udp` - set protocol + * `[src|dst] host [ip|hostname]` - set direction for specific node + +```bash +ngrep -l -q -d eth0 -i "User-Agent: curl*" +``` + + * `-l` - stdout line buffered + * `-i` - case-insensitive search + +___ + +##### Tool: [hping3](http://www.hping.org/) + +```bash +hping3 -V -p 80 -s 5050 www.google.com +``` + + * `-V|--verbose` - verbose mode + * `-p|--destport` - set destination port + * `-s|--baseport` - set source port + * `` - set scan type + * `-F|--fin` - set FIN flag, port open if no reply + * `-S|--syn` - set SYN flag + * `-P|--push` - set PUSH flag + * `-A|--ack` - set ACK flag (use when ping is blocked, RST response back if the port is open) + * `-U|--urg` - set URG flag + * `-Y|--ymas` - set Y unused flag (0x80 - nullscan), port open if no reply + * `-M 0 -UPF` - set TCP sequence number and scan type (URG+PUSH+FIN), port open if no reply + +```bash +hping3 -V -c 1 -1 -C 8 www.google.com +``` + + * `-c [num]` - packet count + * `-1` - set ICMP mode + * `-C|--icmptype [icmp-num]` - set icmp type (default icmp-echo = 8) + +```bash +hping3 -V -c 1000000 -d 120 -S -w 64 -p 80 --flood --rand-source +``` + + * `--flood` - sent packets as fast as possible (don't show replies) + * `--rand-source` - random source address mode + * `-d --data` - data size + * `-w|--win` - winsize (default 64) + +___ + +##### Tool: [nmap](https://nmap.org/) + +###### Ping scans the network + +```bash +nmap -sP 192.168.0.0/24 +``` + +###### Show only open ports + +```bash +nmap -F --open 192.168.0.0/24 +``` + +###### Full TCP port scan using with service version detection + +```bash +nmap -p 1-65535 -sV -sS -T4 192.168.0.0/24 +``` + +###### Nmap scan and pass output to Nikto + +```bash +nmap -p80,443 192.168.0.0/24 -oG - | nikto.pl -h - +``` + +###### Recon specific ip:service with Nmap NSE scripts stack + +```bash +# Set variables: +_hosts="192.168.250.10" +_ports="80,443" + +# Set Nmap NSE scripts stack: +_nmap_nse_scripts="+dns-brute,\ + +http-auth-finder,\ + +http-chrono,\ + +http-cookie-flags,\ + +http-cors,\ + +http-cross-domain-policy,\ + +http-csrf,\ + +http-dombased-xss,\ + +http-enum,\ + +http-errors,\ + +http-git,\ + +http-grep,\ + +http-internal-ip-disclosure,\ + +http-jsonp-detection,\ + +http-malware-host,\ + +http-methods,\ + +http-passwd,\ + +http-phpself-xss,\ + +http-php-version,\ + +http-robots.txt,\ + +http-sitemap-generator,\ + +http-shellshock,\ + +http-stored-xss,\ + +http-title,\ + +http-unsafe-output-escaping,\ + +http-useragent-tester,\ + +http-vhosts,\ + +http-waf-detect,\ + +http-waf-fingerprint,\ + +http-xssed,\ + +traceroute-geolocation.nse,\ + +ssl-enum-ciphers,\ + +whois-domain,\ + +whois-ip" + +# Set Nmap NSE script params: +_nmap_nse_scripts_args="dns-brute.domain=${_hosts},http-cross-domain-policy.domain-lookup=true," +_nmap_nse_scripts_args+="http-waf-detect.aggro,http-waf-detect.detectBodyChanges," +_nmap_nse_scripts_args+="http-waf-fingerprint.intensive=1" + +# Perform scan: +nmap --script="$_nmap_nse_scripts" --script-args="$_nmap_nse_scripts_args" -p "$_ports" "$_hosts" +``` + +___ + +##### Tool: [netcat](http://netcat.sourceforge.net/) + +```bash +nc -kl 5000 +``` + + * `-l` - listen for an incoming connection + * `-k` - listening after client has disconnected + * `>filename.out` - save receive data to file (optional) + +```bash +nc 192.168.0.1 5051 < filename.in +``` + + * `< filename.in` - send data to remote host + +```bash +nc -vz 10.240.30.3 5000 +``` + + * `-v` - verbose output + * `-z` - scan for listening daemons + +```bash +nc -vzu 10.240.30.3 1-65535 +``` + + * `-u` - scan only udp ports + +###### Transfer data file (archive) + +```bash +server> nc -l 5000 | tar xzvfp - +client> tar czvfp - /path/to/dir | nc 10.240.30.3 5000 +``` + +###### Launch remote shell + +```bash +# 1) +server> nc -l 5000 -e /bin/bash +client> nc 10.240.30.3 5000 + +# 2) +server> rm -f /tmp/f; mkfifo /tmp/f +server> cat /tmp/f | /bin/bash -i 2>&1 | nc -l 127.0.0.1 5000 > /tmp/f +client> nc 10.240.30.3 5000 +``` + +###### Simple file server + +```bash +while true ; do nc -l 5000 | tar -xvf - ; done +``` + +###### Simple minimal HTTP Server + +```bash +while true ; do nc -l -p 1500 -c 'echo -e "HTTP/1.1 200 OK\n\n $(date)"' ; done +``` + +###### Simple HTTP Server + + > Restarts web server after each request - remove `while` condition for only single connection. + +```bash +cat > index.html << __EOF__ + + + + + + + + + + +

+ + Hello! It's a site. + +

+ + + +__EOF__ +``` + +```bash +server> while : ; do \ +(echo -ne "HTTP/1.1 200 OK\r\nContent-Length: $(wc -c /" <"$_sent" & +sed "s/^/<= /" <"$_recv" & + +nc -l -p "$_listen_port" <"$_back" | \ +tee "$_sent" | \ +nc "$_bk_host" "$_bk_port" | \ +tee "$_recv" >"$_back" +``` + +```bash +server> chmod +x nc-proxy && ./nc-proxy 8080 192.168.252.10:8000 + lport: 8080 +bk_host: 192.168.252.10 +bk_port: 8000 + +client> http -p h 10.240.30.3:8080 +HTTP/1.1 200 OK +Accept-Ranges: bytes +Cache-Control: max-age=31536000 +Content-Length: 2748 +Content-Type: text/html; charset=utf-8 +Date: Sun, 01 Jul 2018 20:12:08 GMT +Last-Modified: Sun, 01 Apr 2018 21:53:37 GMT +``` + +###### Create a single-use TCP or UDP proxy + +```bash +### TCP -> TCP +nc -l -p 2000 -c "nc [ip|hostname] 3000" + +### TCP -> UDP +nc -l -p 2000 -c "nc -u [ip|hostname] 3000" + +### UDP -> UDP +nc -l -u -p 2000 -c "nc -u [ip|hostname] 3000" + +### UDP -> TCP +nc -l -u -p 2000 -c "nc [ip|hostname] 3000" +``` + +___ + +##### Tool: [gnutls-cli](https://gnutls.org/manual/html_node/gnutls_002dcli-Invocation.html) + +###### Testing connection to remote host (with SNI support) + +```bash +gnutls-cli -p 443 google.com +``` + +###### Testing connection to remote host (without SNI support) + +```bash +gnutls-cli --disable-sni -p 443 google.com +``` + +___ + +##### Tool: [socat](http://www.dest-unreach.org/socat/doc/socat.html) + +###### Testing remote connection to port + +```bash +socat - TCP4:10.240.30.3:22 +``` + + * `-` - standard input (STDIO) + * `TCP4:` - set tcp4 connection with specific params + * `[hostname|ip]` - set hostname/ip + * `[1-65535]` - set port number + +###### Redirecting TCP-traffic to a UNIX domain socket under Linux + +```bash +socat TCP-LISTEN:1234,bind=127.0.0.1,reuseaddr,fork,su=nobody,range=127.0.0.0/8 UNIX-CLIENT:/tmp/foo +``` + + * `TCP-LISTEN:` - set tcp listen with specific params + * `[1-65535]` - set port number + * `bind=[hostname|ip]` - set bind hostname/ip + * `reuseaddr` - allows other sockets to bind to an address + * `fork` - keeps the parent process attempting to produce more connections + * `su=nobody` - set user + * `range=[ip-range]` - ip range + * `UNIX-CLIENT:` - communicates with the specified peer socket + * `filename` - define socket + +___ + +##### Tool: [p0f](http://lcamtuf.coredump.cx/p0f3/) + +###### Set iface in promiscuous mode and dump traffic to the log file + +```bash +p0f -i enp0s25 -p -d -o /dump/enp0s25.log +``` + + * `-i` - listen on the specified interface + * `-p` - set interface in promiscuous mode + * `-d` - fork into background + * `-o` - output file + +___ + +##### Tool: [netstat](https://en.wikipedia.org/wiki/Netstat) + +###### Graph # of connections for each hosts + +```bash +netstat -an | awk '/ESTABLISHED/ { split($5,ip,":"); if (ip[1] !~ /^$/) print ip[1] }' | \ +sort | uniq -c | awk '{ printf("%s\t%s\t",$2,$1) ; for (i = 0; i < $1; i++) {printf("*")}; print "" }' +``` + +###### Monitor open connections for specific port including listen, count and sort it per IP + +```bash +watch "netstat -plan | grep :443 | awk {'print \$5'} | cut -d: -f 1 | sort | uniq -c | sort -nk 1" +``` + +###### Grab banners from local IPv4 listening ports + +```bash +netstat -nlt | grep 'tcp ' | grep -Eo "[1-9][0-9]*" | xargs -I {} sh -c "echo "" | nc -v -n -w1 127.0.0.1 {}" +``` + +___ + +##### Tool: [rsync](https://en.wikipedia.org/wiki/Rsync) + +###### Rsync remote data as root using sudo + +```bash +rsync --rsync-path 'sudo rsync' username@hostname:/path/to/dir/ /local/ +``` + +___ + +##### Tool: [host](https://en.wikipedia.org/wiki/Host_(Unix)) + +###### Resolves the domain name (using external dns server) + +```bash +host google.com 9.9.9.9 +``` + +###### Checks the domain administrator (SOA record) + +```bash +host -t soa google.com 9.9.9.9 +``` + +___ + +##### Tool: [dig](https://en.wikipedia.org/wiki/Dig_(command)) + +###### Resolves the domain name (short output) + +```bash +dig google.com +short +``` + +###### Lookup NS record for specific domain + +```bash +dig @9.9.9.9 google.com NS +``` + +###### Query only answer section + +```bash +dig google.com +nocomments +noquestion +noauthority +noadditional +nostats +``` + +###### Query ALL DNS Records + +```bash +dig google.com ANY +noall +answer +``` + +###### DNS Reverse Look-up + +```bash +dig -x 172.217.16.14 +short +``` + +___ + +##### Tool: [certbot](https://certbot.eff.org/) + +###### Generate multidomain certificate + +```bash +certbot certonly -d example.com -d www.example.com +``` + +###### Generate wildcard certificate + +```bash +certbot certonly --manual --preferred-challenges=dns -d example.com -d *.example.com +``` + +###### Generate certificate with 4096 bit private key + +```bash +certbot certonly -d example.com -d www.example.com --rsa-key-size 4096 +``` + +___ + +##### Tool: [network-other](https://github.com/trimstray/the-book-of-secret-knowledge#tool-network-other) + +###### Get all subnets for specific AS (Autonomous system) + +```bash +AS="AS32934" +whois -h whois.radb.net -- "-i origin ${AS}" | \ +grep "^route:" | \ +cut -d ":" -f2 | \ +sed -e 's/^[ \t]//' | \ +sort -n -t . -k 1,1 -k 2,2 -k 3,3 -k 4,4 | \ +cut -d ":" -f2 | \ +sed -e 's/^[ \t]/allow /' | \ +sed 's/$/;/' | \ +sed 's/allow */subnet -> /g' +``` + +###### Resolves domain name from dns.google.com with curl and jq + +```bash +_dname="google.com" ; curl -s "https://dns.google.com/resolve?name=${_dname}&type=A" | jq . +``` + +##### Tool: [git](https://git-scm.com/) + +###### Log alias for a decent view of your repo + +```bash +# 1) +git log --oneline --decorate --graph --all + +# 2) +git log --graph \ +--pretty=format:'%Cred%h%Creset -%C(yellow)%d%Creset %s %Cgreen(%cr) %C(bold blue)<%an>%Creset' \ +--abbrev-commit +``` + +___ + +##### Tool: [python](https://www.python.org/) + +###### Static HTTP web server + +```bash +# Python 3.x +python3 -m http.server 8000 --bind 127.0.0.1 + +# Python 2.x +python -m SimpleHTTPServer 8000 +``` + +###### Static HTTP web server with SSL support + +```bash +# Python 3.x +from http.server import HTTPServer, BaseHTTPRequestHandler +import ssl + +httpd = HTTPServer(('localhost', 4443), BaseHTTPRequestHandler) + +httpd.socket = ssl.wrap_socket (httpd.socket, + keyfile="path/to/key.pem", + certfile='path/to/cert.pem', server_side=True) + +httpd.serve_forever() + +# Python 2.x +import BaseHTTPServer, SimpleHTTPServer +import ssl + +httpd = BaseHTTPServer.HTTPServer(('localhost', 4443), + SimpleHTTPServer.SimpleHTTPRequestHandler) + +httpd.socket = ssl.wrap_socket (httpd.socket, + keyfile="path/tp/key.pem", + certfile='path/to/cert.pem', server_side=True) + +httpd.serve_forever() +``` + +###### Encode base64 + +```bash +python -m base64 -e <<< "sample string" +``` + +###### Decode base64 + +```bash +python -m base64 -d <<< "dGhpcyBpcyBlbmNvZGVkCg==" +``` + +##### Tool: [awk](http://www.grymoire.com/Unix/Awk.html) + +###### Search for matching lines + +```bash +# egrep foo +awk '/foo/' filename +``` + +###### Search non matching lines + +```bash +# egrep -v foo +awk '!/foo/' filename +``` + +###### Print matching lines with numbers + +```bash +# egrep -n foo +awk '/foo/{print FNR,$0}' filename +``` + +###### Print the last column + +```bash +awk '{print $NF}' filename +``` + +###### Find all the lines longer than 80 characters + +```bash +awk 'length($0)>80{print FNR,$0}' filename +``` + +###### Print only lines of less than 80 characters + +```bash +awk 'length < 80' filename +``` + +###### Print double new lines a file + +```bash +awk '1; { print "" }' filename +``` + +###### Print line numbers + +```bash +awk '{ print FNR "\t" $0 }' filename +awk '{ printf("%5d : %s\n", NR, $0) }' filename # in a fancy manner +``` + +###### Print line numbers for only non-blank lines + +```bash +awk 'NF { $0=++a " :" $0 }; { print }' filename +``` + +###### Print the line and the next two (i=5) lines after the line matching regexp + +```bash +awk '/foo/{i=5+1;}{if(i){i--; print;}}' filename +``` + +###### Print the lines starting at the line matching 'server {' until the line matching '}' + +```bash +awk '/server {/,/}/' filename +``` + +###### Print multiple columns with separators + +```bash +awk -F' ' '{print "ip:\t" $2 "\n port:\t" $3' filename +``` + +###### Remove empty lines + +```bash +awk 'NF > 0' filename + +# alternative: +awk NF filename +``` + +###### Delete trailing white space (spaces, tabs) + +```bash +awk '{sub(/[ \t]*$/, "");print}' filename +``` + +###### Delete leading white space + +```bash +awk '{sub(/^[ \t]+/, ""); print}' filename +``` + +###### Remove duplicate consecutive lines + +```bash +# uniq +awk 'a !~ $0{print}; {a=$0}' filename +``` + +###### Remove duplicate entries in a file without sorting + +```bash +awk '!x[$0]++' filename +``` + +###### Exclude multiple columns + +```bash +awk '{$1=$3=""}1' filename +``` + +###### Substitute foo for bar on lines matching regexp + +```bash +awk '/regexp/{gsub(/foo/, "bar")};{print}' filename +``` + +###### Add some characters at the beginning of matching lines + +```bash +awk '/regexp/{sub(/^/, "++++"); print;next;}{print}' filename +``` + +###### Get the last hour of Apache logs + +```bash +awk '/'$(date -d "1 hours ago" "+%d\\/%b\\/%Y:%H:%M")'/,/'$(date "+%d\\/%b\\/%Y:%H:%M")'/ { print $0 }' \ +/var/log/httpd/access_log +``` + +___ + +##### Tool: [sed](http://www.grymoire.com/Unix/Sed.html) + +###### Print a specific line from a file + +```bash +sed -n 10p /path/to/file +``` + +###### Remove a specific line from a file + +```bash +sed -i 10d /path/to/file +# alternative (BSD): sed -i'' 10d /path/to/file +``` + +###### Remove a range of lines from a file + +```bash +sed -i -re ',d' +``` + +###### Replace newline(s) with a space + +```bash +sed ':a;N;$!ba;s/\n/ /g' /path/to/file + +# cross-platform compatible syntax: +sed -e ':a' -e 'N' -e '$!ba' -e 's/\n/ /g' /path/to/file +``` + +- `:a` create a label `a` +- `N` append the next line to the pattern space +- `$!` if not the last line, ba branch (go to) label `a` +- `s` substitute, `/\n/` regex for new line, `/ /` by a space, `/g` global match (as many times as it can) + +Alternatives: + +```bash +# perl version (sed-like speed): +perl -p -e 's/\n/ /' /path/to/file + +# bash version (slow): +while read line ; do printf "%s" "$line " ; done < file +``` + +###### Delete string +N next lines + +```bash +sed '/start/,+4d' /path/to/file +``` + +___ + +##### Tool: [grep](http://www.grymoire.com/Unix/Grep.html) + +###### Search for a "pattern" inside all files in the current directory + +```bash +grep -rn "pattern" +grep -RnisI "pattern" * +fgrep "pattern" * -R +``` + +###### Show only for multiple patterns + +```bash +grep 'INFO*'\''WARN' filename +grep 'INFO\|WARN' filename +grep -e INFO -e WARN filename +grep -E '(INFO|WARN)' filename +egrep "INFO|WARN" filename +``` + +###### Except multiple patterns + +```bash +grep -vE '(error|critical|warning)' filename +``` + +###### Show data from file without comments + +```bash +grep -v ^[[:space:]]*# filename +``` + +###### Show data from file without comments and new lines + +```bash +egrep -v '#|^$' filename +``` + +###### Show strings with a dash/hyphen + +```bash +grep -e -- filename +grep -- -- filename +grep "\-\-" filename +``` + +###### Remove blank lines from a file and save output to new file + +```bash +grep . filename > newfilename +``` + +##### Tool: [perl](https://www.perl.org/) + +###### Search and replace (in place) + +```bash +perl -i -pe's/SEARCH/REPLACE/' filename +``` + +###### Edit of `*.conf` files changing all foo to bar (and backup original) + +```bash +perl -p -i.orig -e 's/\bfoo\b/bar/g' *.conf +``` + +###### Prints the first 20 lines from `*.conf` files + +```bash +perl -pe 'exit if $. > 20' *.conf +``` + +###### Search lines 10 to 20 + +```bash +perl -ne 'print if 10 .. 20' filename +``` + +###### Delete first 10 lines (and backup original) + +```bash +perl -i.orig -ne 'print unless 1 .. 10' filename +``` + +###### Delete all but lines between foo and bar (and backup original) + +```bash +perl -i.orig -ne 'print unless /^foo$/ .. /^bar$/' filename +``` + +###### Reduce multiple blank lines to a single line + +```bash +perl -p -i -00pe0 filename +``` + +###### Convert tabs to spaces (1t = 2sp) + +```bash +perl -p -i -e 's/\t/ /g' filename +``` + +###### Read input from a file and report number of lines and characters + +```bash +perl -lne '$i++; $in += length($_); END { print "$i lines, $in characters"; }' filename +``` + +#### Shell Tricks  [[TOC]](#anger-table-of-contents) + +When you get a shell, it is generally not very clean, but after following these steps, you will have a fairly clean and comfortable shell to work with. + +1) `script /dev/null -c bash` +2) Ctrl-Z (to send it to background) +3) `stty raw -echo; fg` (returns the shell to foreground) +4) `reset` (to reset terminal) +5) `xterm` (when asked for terminal type) +6) `export TERM=xterm; export SHELL=bash` + +#### Shell functions  [[TOC]](#anger-table-of-contents) + +##### Table of Contents + +- [Domain resolve](#domain-resolve) +- [Get ASN](#get-asn) + +###### Domain resolve + +```bash +# Dependencies: +# - curl +# - jq + +function DomainResolve() { + + local _host="$1" + + local _curl_base="curl --request GET" + local _timeout="15" + + _host_ip=$($_curl_base -ks -m "$_timeout" "https://dns.google.com/resolve?name=${_host}&type=A" | \ + jq '.Answer[0].data' | tr -d "\"" 2>/dev/null) + + if [[ -z "$_host_ip" ]] || [[ "$_host_ip" == "null" ]] ; then + + echo -en "Unsuccessful domain name resolution.\\n" + + else + + echo -en "$_host > $_host_ip\\n" + + fi + +} +``` + +Example: + +```bash +shell> DomainResolve nmap.org +nmap.org > 45.33.49.119 + +shell> DomainResolve nmap.org +Unsuccessful domain name resolution. +``` + +###### Get ASN + +```bash +# Dependencies: +# - curl + +function GetASN() { + + local _ip="$1" + + local _curl_base="curl --request GET" + local _timeout="15" + + _asn=$($_curl_base -ks -m "$_timeout" "http://ip-api.com/line/${_ip}?fields=as") + + _state=$(echo $?) + + if [[ -z "$_ip" ]] || [[ "$_ip" == "null" ]] || [[ "$_state" -ne 0 ]]; then + + echo -en "Unsuccessful ASN gathering.\\n" + + else + + echo -en "$_ip > $_asn\\n" + + fi + +} +``` + +Example: + +```bash +shell> GetASN 1.1.1.1 +1.1.1.1 > AS13335 Cloudflare, Inc. + +shell> GetASN 0.0.0.0 +Unsuccessful ASN gathering. +``` diff --git a/public/2024/09/18/index.html b/public/2024/09/18/index.html index f82bbe8..bda21cc 100644 --- a/public/2024/09/18/index.html +++ b/public/2024/09/18/index.html @@ -34,6 +34,9 @@