-
Notifications
You must be signed in to change notification settings - Fork 59
/
Some_important_links
65 lines (39 loc) · 1.6 KB
/
Some_important_links
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
#OSCP
Oscp vs htb
https://www.reddit.com/r/oscp/comments/a2jfc9/compare_oscp_with_htb/
https://blackwintersecurity.com/
https://forum.hackthebox.eu/discussion/612/oscp-practice
https://www.reddit.com/r/oscp/comments/a9e2yv/from_0_to_oscp_in_90days/
Oscp like htb
https://i.imgur.com/XwyVmA3.jpg
Guide:-
https://medium.com/@parthdeshani/how-to-pass-oscp-like-boss-b269f2ea99d
Tools
https://github.com/codingo/Reconnoitre
Upgrading shells
https://netsec.ws/?p=337
Other
Andriod hack
https://www.youtube.com/watch?v=waTGCAgKIM0
https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/
https://netsec.ws/?p=337
https://www.hackingarticles.in/linux-privilege-escalation-using-suid-binaries/
JSON token
https://medium.com/dev-bits/a-guide-for-adding-jwt-token-based-authentication-to-your-single-page-nodejs-applications-c403f7cf04f4
oscp:-
https://www.exploit-db.com/exploits/638
https://recipeforroot.com/
https://pbs.twimg.com/media/DAZsE2VUQAA_bpZ.jpg:large
https://zayotic.com/posts/oscp-reference/
Window privesc:-
http://www.fuzzysecurity.com/tutorials/16.html
https://github.com/abatchy17/WindowsExploits
https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_windows.html
https://github.com/PowerShellMafia/PowerSploit/tree/master/Privesc
https://www.roguesecurity.in/2018/12/02/a-guide-for-windows-penetration-testing/
https://xapax.gitbooks.io/security/content/privilege_escalation_windows.html
IMPORTANT****
snapd
https://github.com/initstring/dirty_sock
Breaking restrected shells
https://speakerdeck.com/knaps/escape-from-shellcatraz-breaking-out-of-restricted-unix-shells