101 private links
These are notes about all things focusing on, but not limited to, red teaming and offensive security.
This is a GitBook of mine whose purpose is keeping my pentest notes on hand. It's far from being perfect in terms of organization (that's why I call it "promiscuous") and, basically, I'm logging it for myself, but it turned out that hosting it online makes it most convenient to access. So, if you find it handy too, feel free to use it... responsibly, of course!
Linux Troubleshooting Interview DevOps SRE
A collection of files for adding and leveraging custom properties in BloodHound. - GitHub - porterhau5/BloodHound-Owned: A collection of files for adding and leveraging custom properties in BloodHound.
At Cloudflare, we're committed to building a better Internet. We want to make it possible to troubleshoot with HAR files without the threat of a stolen session. The HAR File Sanitzer will remove sensitive data using “clientside” logic.
In 2023, I discovered a significant vulnerability in an application that was using outdated version of the FreeMarker template engine. The version was vulnerable to Server-Side Template Injection…
Semantic HTML5 converter (backend) for Asciidoctor - GitHub - jirutka/asciidoctor-html5s: Semantic HTML5 converter (backend) for Asciidoctor
Description
Terminal-based presentations using Pandoc. Contribute to jaspervdj/patat development by creating an account on GitHub.
A reference post of Vim's lists and tips on using them effectively.
This site contains cyber security articles.
For more info on the project, click on the logo.
If you want to contribute, check out our contribution guide. Our criteria list sets out what we define as a LOLBin/Script/Lib. More information on programmatically accesssing this project can be found on the API page.
MITRE ATT&CK® and ATT&CK® are registered trademarks of The MITRE Corporation. You can see the current ATT&CK® mapping of this project on the ATT&CK® Navigator.
If you are looking for UNIX binaries, please visit gtfobins.github.io.
If you are looking for drivers, please visit loldrivers.io.
My experiments in weaponizing Nim (https://nim-lang.org/) - GitHub - byt3bl33d3r/OffensiveNim: My experiments in weaponizing Nim (https://nim-lang.org/)
Original PoC for CVE-2023-32784. Contribute to vdohney/keepass-password-dumper development by creating an account on GitHub.
Helps you create requests faster, saving precious time on development.
A free and instant collaborative diagramming tool.