101 private links
Everything curl is an extensive, detailed and totally free book, available in multiple formats.
Learn how to use curl. How to use libcurl. How to build them from source or perhaps how the curl project accepts contributions. There's something for everyone in this, from the casual first-time users to the experienced libcurl hackers.
Everything curl is written by Daniel Stenberg but is also itself an open project that accepts your contributions and help.
A simple HTTP Request & Response Service.
This utility can decode WebSphere encoded passwords.
If you have lost your password(s), use this utility to recover them
Inspired by a similar post by Ben Boyter this a list of useful command line tools that I use. It’s not a list of every tool I use. These are tools that are new or typically not part of a standard POSIX command line environment.
This post is a living document and will be updated over time. It should be obvious that I have a strong preference for fast tools without a large runtime dependency like Python or node.js. Most of these tools are portable to *BSD, Linux, macOS. Many also work on Windows. For OSes that ship up to date software many are available via the system package repository.
NMAP (Network Mapper) is the de facto open source network scanner used by almost all security professionals to enumerate open ports and find live hosts in a network (and much more really).
Nmap is the most known port scanner, written and maintained by Gordon Lyon (Fyodor).
It can be used for network discovery and for most security enumeration during the initial stages of penetration testing.
Nmap has a multitude of options and when you first start playing with this tool it can be a bit daunting, so today i want to propose a brief cheat-sheet.
There are around 300 operations in CyberChef allowing you to carry out simple and complex tasks easily. Here are some examples:
- Decode a Base64-encoded string
- Convert a date and time to a different time zone
- Parse a Teredo IPv6 address
- Convert data from a hexdump, then decompress
- Decrypt and disassemble shellcode
- Display multiple timestamps as full dates
- Carry out different operations on data of different types
- Use parts of the input as arguments to operations