Usuario: Contraseña:
Este sitio utiliza cookies propias y de terceros. Si continúa navegando consideramos que acepta el uso de cookies. OK Más Información.

Autor Tema: Pentest bookmarks.Open Penetration Testing Bookmarks Collection  (Leído 6751 veces)

0 Usuarios y 1 Visitante están viendo este tema.

Desconectado dvdr

  • Moderador
  • Trade Count: (0)
  • ****
  • Mensajes: 784
  • Colaboraciones +47/-0
  • Sexo: Masculino
  • Loco por el Wifi
Pentest bookmarks.Open Penetration Testing Bookmarks Collection
« en: 24 de Abril de 2012, 08:25:14 am »
Código: [Seleccionar]
[center][size=36pt]Pentest bookmarks.Open Penetration Testing Bookmarks Collection[/size]
[/center]Hacker Media<blockquote>Blogs Worth It: What the title says. There are a LOT of pentesting blogs, these are the ones i monitor constantly and value in the actual day to day testing work. </blockquote>[list]
[li][url=http://carnal0wnage.blogspot.com/]http://carnal0wnage.blogspot.com/[/url] [/li]
[li][url=http://www.mcgrewsecurity.com/]http://www.mcgrewsecurity.com/[/url] [/li]
[li][url=http://www.gnucitizen.org/blog/]http://www.gnucitizen.org/blog/[/url] [/li]
[li][url=http://www.darknet.org.uk/]http://www.darknet.org.uk/[/url] [/li]
[li][url=http://spylogic.net/]http://spylogic.net/[/url] [/li]
[li][url=http://taosecurity.blogspot.com/]http://taosecurity.blogspot.com/[/url] [/li]
[li][url=http://www.room362.com/]http://www.room362.com/[/url] [/li]
[li][url=http://blog.sipvicious.org/]http://blog.sipvicious.org/[/url] [/li]
[li][url=http://blog.portswigger.net/]http://blog.portswigger.net/[/url] [/li]
[li][url=http://pentestmonkey.net/blog/]http://pentestmonkey.net/blog/[/url] [/li]
[li][url=http://jeremiahgrossman.blogspot.com/]http://jeremiahgrossman.blogspot.com/[/url] [/li]
[li][url=http://i8jesus.com/]http://i8jesus.com/[/url] [/li]
[li][url=http://blog.c22.cc/]http://blog.c22.cc/[/url] [/li]
[li][url=http://www.skullsecurity.org/blog/]http://www.skullsecurity.org/blog/[/url] [/li]
[li][url=http://blog.metasploit.com/]http://blog.metasploit.com/[/url] [/li]
[li][url=http://www.darkoperator.com/]http://www.darkoperator.com/[/url] [/li]
[li][url=http://blog.skeptikal.org/]http://blog.skeptikal.org/[/url] [/li]
[li][url=http://preachsecurity.blogspot.com/]http://preachsecurity.blogspot.com/[/url] [/li]
[li][url=http://www.tssci-security.com/]http://www.tssci-security.com/[/url] [/li]
[li][url=http://www.gdssecurity.com/l/b/]http://www.gdssecurity.com/l/b/[/url] [/li]
[li][url=http://websec.wordpress.com/]http://websec.wordpress.com/[/url] [/li]
[li][url=http://bernardodamele.blogspot.com/]http://bernardodamele.blogspot.com/[/url] [/li]
[li][url=http://laramies.blogspot.com/]http://laramies.blogspot.com/[/url] [/li]
[li][url=http://www.spylogic.net/]http://www.spylogic.net/[/url] [/li]
[li][url=http://blog.andlabs.org/]http://blog.andlabs.org/[/url] [/li]
[li][url=http://xs-sniper.com/blog/]http://xs-sniper.com/blog/[/url] [/li]
[li][url=http://www.commonexploits.com/]http://www.commonexploits.com/[/url] [/li]
[li][url=http://www.sensepost.com/blog/]http://www.sensepost.com/blog/[/url] [/li]
[li][url=http://wepma.blogspot.com/]http://wepma.blogspot.com/[/url] [/li]
[li][url=http://exploit.co.il/]http://exploit.co.il/[/url] [/li]
[li][url=http://securityreliks.wordpress.com/]http://securityreliks.wordpress.com/[/url] [/li]
[li][url=http://www.madirish.net/index.html]http://www.madirish.net/index.html[/url] [/li]
[li][url=http://sirdarckcat.blogspot.com/]http://sirdarckcat.blogspot.com/[/url] [/li]
[li][url=http://reusablesec.blogspot.com/]http://reusablesec.blogspot.com/[/url] [/li]
[li][url=http://myne-us.blogspot.com/]http://myne-us.blogspot.com/[/url] [/li]
[li][url=http://www.notsosecure.com/]http://www.notsosecure.com/[/url] [/li]
[li][url=http://blog.spiderlabs.com/]http://blog.spiderlabs.com/[/url] [/li]
[li][url=http://www.corelan.be/]http://www.corelan.be/[/url] [/li]
[li][url=http://www.digininja.org/]http://www.digininja.org/[/url] [/li]
[li][url=http://www.pauldotcom.com/]http://www.pauldotcom.com/[/url] [/li]
[li][url=http://www.attackvector.org/]http://www.attackvector.org/[/url] [/li]
[li][url=http://deviating.net/]http://deviating.net/[/url] [/li]
[li][url=http://www.alphaonelabs.com/]http://www.alphaonelabs.com/[/url] [/li]
[li][url=http://www.smashingpasswords.com/]http://www.smashingpasswords.com/[/url] [/li]
[li][url=http://wirewatcher.wordpress.com/]http://wirewatcher.wordpress.com/[/url] [/li]
[li][url=http://gynvael.coldwind.pl/]http://gynvael.coldwind.pl/[/url] [/li]
[li][url=http://www.nullthreat.net/]http://www.nullthreat.net/[/url] [/li]
[li][url=http://www.question-defense.com/]http://www.question-defense.com/[/url] [/li]
[li][url=http://archangelamael.blogspot.com/]http://archangelamael.blogspot.com/[/url] [/li]
[li][url=http://memset.wordpress.com/]http://memset.wordpress.com/[/url] [/li]
[li][url=http://sickness.tor.hu/]http://sickness.tor.hu/[/url] [/li]
[li][url=http://punter-infosec.com/]http://punter-infosec.com/[/url] [/li]
[li][url=http://www.securityninja.co.uk/]http://www.securityninja.co.uk/[/url] [/li]
[li][url=http://securityandrisk.blogspot.com/]http://securityandrisk.blogspot.com/[/url] [/li]
[li][url=http://esploit.blogspot.com/]http://esploit.blogspot.com/[/url] [/li]
[li][url=http://www.pentestit.com/]http://www.pentestit.com/[/url] [/li]
[/list]<blockquote>Forums: </blockquote><blockquote>Created for forums that will help in both tool usage, syntax, attack techniques, and collection of scripts and tools. Needs some help. I don't really frequent too many underground forums but i actually find nice one-off scripts and info i can roll into my own code in these places. Would like to add more. </blockquote>[list]
[li][url=http://sla.ckers.org/forum/index.php]http://sla.ckers.org/forum/index.php[/url] [/li]
[li][url=http://www.ethicalhacker.net/]http://www.ethicalhacker.net/[/url] [/li]
[li][url=http://www.backtrack-linux.org/forums/]http://www.backtrack-linux.org/forums/[/url] [/li]
[li][url=http://www.elitehackers.info/forums/]http://www.elitehackers.info/forums/[/url] [/li]
[li][url=http://www.hackthissite.org/forums/index.php]http://www.hackthissite.org/forums/index.php[/url] [/li]
[li][url=http://securityoverride.com/forum/index.php]http://securityoverride.com/forum/index.php[/url] [/li]
[li][url=http://www.iexploit.org/]http://www.iexploit.org/[/url] [/li]
[li][url=http://bright-shadows.net/]http://bright-shadows.net/[/url] [/li]
[li][url=http://www.governmentsecurity.org/forum/]http://www.governmentsecurity.org/forum/[/url] [/li]
[li][url=http://forum.intern0t.net/]http://forum.intern0t.net/[/url] [/li]
[/list]<blockquote>Magazines: </blockquote>[list]
[li][url=http://www.net-security.org/insecuremag.php]http://www.net-security.org/insecuremag.php[/url] [/li]
[li][url=http://hakin9.org/]http://hakin9.org/[/url] [/li]
[/list]<blockquote>Video: </blockquote>[list]
[li][url=http://www.hackernews.com/]http://www.hackernews.com/[/url] [/li]
[li][url=http://www.securitytube.net/]http://www.securitytube.net/[/url] [/li]
[li][url=http://www.irongeek.com/i.php?page=videos/aide-winter-2011]http://www.irongeek.com/i.php?page=videos/aide-winter-2011[/url] [/li]
[li][url=http://avondale.good.net/dl/bd/]http://avondale.good.net/dl/bd/[/url] [/li]
[li][url=http://achtbaan.nikhef.nl/27c3-stream/releases/mkv/]http://achtbaan.nikhef.nl/27c3-stream/releases/mkv/[/url] [/li]
[li][url=http://www.youtube.com/user/ChRiStIaAn008]http://www.youtube.com/user/ChRiStIaAn008[/url] [/li]
[li][url=http://www.youtube.com/user/HackingCons]http://www.youtube.com/user/HackingCons[/url] [/li]
[/list]
[hr]
Methodologies:[list]
[li][url=http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html]http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html[/url] [/li]
[li][url=http://www.pentest-standard.org/index.php/Main_Page]http://www.pentest-standard.org/index.php/Main_Page[/url] [/li]
[li][url=http://projects.webappsec.org/w/page/13246978/Threat-Classification]http://projects.webappsec.org/w/page/13246978/Threat-Classification[/url] [/li]
[li][url=http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project]http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project[/url] [/li]
[li][url=http://www.social-engineer.org/]http://www.social-engineer.org/[/url] [/li]
[/list]
[hr]
OSINT<blockquote>Presentations: </blockquote>[list]
[li][url=http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-part-1-social-networks/]http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-part-1-social-networks/[/url] [/li]
[li][url=http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-%E2%80%93-part-2-blogs-message-boards-and-metadata/]http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-%E2%80%93-part-2-blogs-message-boards-and-metadata/[/url] [/li]
[li][url=http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-part-3-monitoring/]http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-part-3-monitoring/[/url] [/li]
[li][url=http://www.slideshare.net/Laramies/tactical-information-gathering]http://www.slideshare.net/Laramies/tactical-information-gathering[/url] [/li]
[li][url=http://www.sans.org/reading_room/whitepapers/privacy/document_metadata_the_silent_killer__32974]http://www.sans.org/reading_room/whitepapers/privacy/document_metadata_the_silent_killer__32974[/url] [/li]
[li][url=http://infond.blogspot.com/2010/05/toturial-footprinting.html]http://infond.blogspot.com/2010/05/toturial-footprinting.html[/url] [/li]
[/list]<blockquote>People and Organizational: </blockquote>[list]
[li][url=http://www.spokeo.com/]http://www.spokeo.com/[/url] [/li]
[li][url=http://www.123people.com/]http://www.123people.com/[/url] [/li]
[li][url=http://www.xing.com/]http://www.xing.com/[/url] [/li]
[li][url=http://www.zoominfo.com/search]http://www.zoominfo.com/search[/url] [/li]
[li][url=http://pipl.com/]http://pipl.com/[/url] [/li]
[li][url=http://www.zabasearch.com/]http://www.zabasearch.com/[/url] [/li]
[li][url=http://www.searchbug.com/default.aspx]http://www.searchbug.com/default.aspx[/url] [/li]
[li][url=http://theultimates.com/]http://theultimates.com/[/url] [/li]
[li][url=http://skipease.com/]http://skipease.com/[/url] [/li]
[li][url=http://addictomatic.com/]http://addictomatic.com/[/url] [/li]
[li][url=http://socialmention.com/]http://socialmention.com/[/url] [/li]
[li][url=http://entitycube.research.microsoft.com/]http://entitycube.research.microsoft.com/[/url] [/li]
[li][url=http://www.yasni.com/]http://www.yasni.com/[/url] [/li]
[li][url=http://tweepz.com/]http://tweepz.com/[/url] [/li]
[li][url=http://tweepsearch.com/]http://tweepsearch.com/[/url] [/li]
[li][url=http://www.glassdoor.com/index.htm]http://www.glassdoor.com/index.htm[/url] [/li]
[li][url=http://www.jigsaw.com/]http://www.jigsaw.com/[/url] [/li]
[li][url=http://searchwww.sec.gov/EDGARFSClient/jsp/EDGAR_MainAccess.jsp]http://searchwww.sec.gov/EDGARFSClient/jsp/EDGAR_MainAccess.jsp[/url] [/li]
[li][url=http://www.tineye.com/]http://www.tineye.com/[/url] [/li]
[li][url=http://www.peekyou.com/]http://www.peekyou.com/[/url] [/li]
[li][url=http://picfog.com/]http://picfog.com/[/url] [/li]
[li][url=http://twapperkeeper.com/index.php]http://twapperkeeper.com/index.php[/url] [/li]
[/list]<blockquote>Infrastructure: </blockquote>[list]
[li][url=http://uptime.netcraft.com/]http://uptime.netcraft.com/[/url] [/li]
[li][url=http://www.serversniff.net/]http://www.serversniff.net/[/url] [/li]
[li][url=http://www.domaintools.com/]http://www.domaintools.com/[/url] [/li]
[li][url=http://centralops.net/co/]http://centralops.net/co/[/url] [/li]
[li][url=http://hackerfantastic.com/]http://hackerfantastic.com/[/url] [/li]
[li][url=http://whois.webhosting.info/]http://whois.webhosting.info/[/url] [/li]
[li][url=https://www.ssllabs.com/ssldb/analyze.html]https://www.ssllabs.com/ssldb/analyze.html[/url] [/li]
[li][url=http://www.clez.net/]http://www.clez.net/[/url] [/li]
[li][url=http://www.my-ip-neighbors.com/]http://www.my-ip-neighbors.com/[/url] [/li]
[li][url=http://www.shodanhq.com/]http://www.shodanhq.com/[/url] [/li]
[li][url=http://www.exploit-db.com/google-dorks/]http://www.exploit-db.com/google-dorks/[/url] [/li]
[li][url=http://www.hackersforcharity.org/ghdb/]http://www.hackersforcharity.org/ghdb/[/url] [/li]
[/list]
« Última modificación: 24 de Octubre de 2014, 11:16:58 pm por papones »
BLOG <object width="425" height="350" classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://fpdownload.macromedia.com/pub/ shockwave/cabs/flash/swflash.cab#version=8,0,0,0"> <param name="movie" value="http://www.milinkito.com/swf/america.swf"/> <embed src="http://www.milinkito.com/swf/america.swf" width="425" height="350" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/go/getflashplayer"/> </object>

Desconectado papones

  • Administrador
  • Trade Count: (0)
  • *****
  • Mensajes: 8513
  • Colaboraciones +195/-5
  • Sexo: Masculino
  • La paciencia la madre de la ciencia
    • Locos Por El Wifi
Re:Pentest-bookmarks-Medios Hacker-herramientas blog distribuciones
« Respuesta #1 en: 25 de Abril de 2012, 09:57:07 pm »
Código: [Seleccionar]
[left]Exploits and Advisories:[list]
[li][url=http://www.exploit-db.com/]http://www.exploit-db.com/[/url] [/li]
[li][url=http://www.cvedetails.com/]http://www.cvedetails.com/[/url] [/li]
[li][url=http://www.milw0rm.com/]http://www.milw0rm.com/[/url]  (Down permanently) [/li]
[li][url=http://www.packetstormsecurity.org/]http://www.packetstormsecurity.org/[/url] [/li]
[li][url=http://www.securityforest.com/wiki/index.php/Main_Page]http://www.securityforest.com/wiki/index.php/Main_Page[/url] [/li]
[li][url=http://www.securityfocus.com/bid]http://www.securityfocus.com/bid[/url] [/li]
[li][url=http://nvd.nist.gov/]http://nvd.nist.gov/[/url] [/li]
[li][url=http://osvdb.org/]http://osvdb.org/[/url] [/li]
[li][url=http://www.nullbyte.org.il/Index.html]http://www.nullbyte.org.il/Index.html[/url] [/li]
[li][url=http://secdocs.lonerunners.net/]http://secdocs.lonerunners.net/[/url] [/li]
[li][url=http://www.phenoelit-us.org/whatSAP/index.html]http://www.phenoelit-us.org/whatSAP/index.html[/url] [/li]
[li][url=http://secunia.com/]http://secunia.com/[/url] [/li]
[li][url=http://cve.mitre.org/]http://cve.mitre.org/[/url] [/li]
[/list]
[hr]
Cheatsheets and Syntax:[list]
[li][url=http://cirt.net/ports_dl.php?export=services]http://cirt.net/ports_dl.php?export=services[/url] [/li]
[li][url=http://www.cheat-sheets.org/]http://www.cheat-sheets.org/[/url] [/li]
[li][url=http://blog.securitymonks.com/2009/08/15/whats-in-your-folder-security-cheat-sheets/]http://blog.securitymonks.com/2009/08/15/whats-in-your-folder-security-cheat-sheets/[/url] [/li]
[/list]<blockquote>Agile Hacking: </blockquote>[list]
[li][url=http://www.gnucitizen.org/blog/agile-hacking-a-homegrown-telnet-based-portscanner/]http://www.gnucitizen.org/blog/agile-hacking-a-homegrown-telnet-based-portscanner/[/url] [/li]
[li][url=http://blog.commandlinekungfu.com/]http://blog.commandlinekungfu.com/[/url] [/li]
[li][url=http://www.securityaegis.com/simple-yet-effective-directory-bruteforcing/]http://www.securityaegis.com/simple-yet-effective-directory-bruteforcing/[/url] [/li]
[li][url=http://isc.sans.edu/diary.html?storyid=2376]http://isc.sans.edu/diary.html?storyid=2376[/url] [/li]
[li][url=http://isc.sans.edu/diary.html?storyid=1229]http://isc.sans.edu/diary.html?storyid=1229[/url] [/li]
[li][url=http://ss64.com/nt/]http://ss64.com/nt/[/url] [/li]
[li][url=http://pauldotcom.com/2010/02/running-a-command-on-every-mac.html]http://pauldotcom.com/2010/02/running-a-command-on-every-mac.html[/url] [/li]
[li][url=http://synjunkie.blogspot.com/2008/03/command-line-ninjitsu.html]http://synjunkie.blogspot.com/2008/03/command-line-ninjitsu.html[/url] [/li]
[li][url=http://www.zonbi.org/2010/06/09/wmic-the-other-other-white-meat/]http://www.zonbi.org/2010/06/09/wmic-the-other-other-white-meat/[/url] [/li]
[li][url=http://rstcenter.com/forum/22324-hacking-without-tools-windows.rst]http://rstcenter.com/forum/22324-hacking-without-tools-windows.rst[/url] [/li]
[li][url=http://www.coresecurity.com/files/attachments/Core_Define_and_Win_Cmd_Line.pdf]http://www.coresecurity.com/files/attachments/Core_Define_and_Win_Cmd_Line.pdf[/url] [/li]
[li][url=http://www.scribd.com/Penetration-Testing-Ninjitsu2-Infrastructure-and-Netcat-without-Netcat/d/3064507]http://www.scribd.com/Penetration-Testing-Ninjitsu2-Infrastructure-and-Netcat-without-Netcat/d/3064507[/url] [/li]
[li][url=http://www.pentesterscripting.com/]http://www.pentesterscripting.com/[/url] [/li]
[li][url=http://www.sans.org/reading_room/whitepapers/hackers/windows-script-host-hack-windows_33583]http://www.sans.org/reading_room/whitepapers/hackers/windows-script-host-hack-windows_33583[/url] [/li]
[li][url=http://www.blackhat.com/presentations/bh-dc-10/Bannedit/BlackHat-DC-2010-Bannedit-Advanced-Command-Injection-Exploitation-1-wp.pdf]http://www.blackhat.com/presentations/bh-dc-10/Bannedit/BlackHat-DC-2010-Bannedit-Advanced-Command-Injection-Exploitation-1-wp.pdf[/url] [/li]
[/list]<blockquote>OS and Scripts: </blockquote>[list]
[li][url=http://en.wikipedia.org/wiki/IPv4_subnetting_reference]http://en.wikipedia.org/wiki/IPv4_subnetting_reference[/url] [/li]
[li][url=http://www.nixtutor.com/linux/all-the-best-linux-cheat-sheets/]http://www.nixtutor.com/linux/all-the-best-linux-cheat-sheets/[/url] [/li]
[li][url=http://shelldorado.com/shelltips/beginner.html]http://shelldorado.com/shelltips/beginner.html[/url] [/li]
[li][url=http://www.linuxsurvival.com/]http://www.linuxsurvival.com/[/url] [/li]
[li][url=http://mywiki.wooledge.org/BashPitfalls]http://mywiki.wooledge.org/BashPitfalls[/url] [/li]
[li][url=http://rubular.com/]http://rubular.com/[/url] [/li]
[li][url=http://www.iana.org/assignments/port-numbers]http://www.iana.org/assignments/port-numbers[/url] [/li]
[li][url=http://www.robvanderwoude.com/ntadmincommands.php]http://www.robvanderwoude.com/ntadmincommands.php[/url] [/li]
[li][url=http://www.nixtutor.com/linux/all-the-best-linux-cheat-sheets/]http://www.nixtutor.com/linux/all-the-best-linux-cheat-sheets/[/url] [/li]
[/list]<blockquote>Tools: </blockquote>[list]
[li][url=http://www.sans.org/security-resources/sec560/netcat_cheat_sheet_v1.pdf]http://www.sans.org/security-resources/sec560/netcat_cheat_sheet_v1.pdf[/url] [/li]
[li][url=http://www.secguru.com/files/cheatsheet/nessusNMAPcheatSheet.pdf]http://www.secguru.com/files/cheatsheet/nessusNMAPcheatSheet.pdf[/url] [/li]
[li][url=http://sbdtools.googlecode.com/files/hping3_cheatsheet_v1.0-ENG.pdf]http://sbdtools.googlecode.com/files/hping3_cheatsheet_v1.0-ENG.pdf[/url] [/li]
[li][url=http://sbdtools.googlecode.com/files/Nmap5%20cheatsheet%20eng%20v1.pdf]http://sbdtools.googlecode.com/files/Nmap5%20cheatsheet%20eng%20v1.pdf[/url] [/li]
[li][url=http://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf]http://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf[/url] [/li]
[li][url=http://rmccurdy.com/scripts/Metasploit%20meterpreter%20cheat%20sheet%20reference.html]http://rmccurdy.com/scripts/Metasploit%20meterpreter%20cheat%20sheet%20reference.html[/url] [/li]
[li][url=http://h.ackack.net/cheat-sheets/netcat]http://h.ackack.net/cheat-sheets/netcat[/url] [/li]
[/list]
[hr]
Distros:[list]
[li][url=http://www.backtrack-linux.org/]http://www.backtrack-linux.org/[/url] [/li]
[li][url=http://www.matriux.com/]http://www.matriux.com/[/url] [/li]
[li][url=http://samurai.inguardians.com/]http://samurai.inguardians.com/[/url] [/li]
[li][url=http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project]http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project[/url] [/li]
[li][url=https://pentoo.ch/]https://pentoo.ch/[/url] [/li]
[li][url=http://www.hackfromacave.com/articles_and_adventures/katana_v2_release.html]http://www.hackfromacave.com/articles_and_adventures/katana_v2_release.html[/url] [/li]
[li][url=http://www.piotrbania.com/all/kon-boot/]http://www.piotrbania.com/all/kon-boot/[/url] [/li]
[li][url=http://www.linuxfromscratch.org/]http://www.linuxfromscratch.org/[/url] [/li]
[li][url=http://sumolinux.suntzudata.com/]http://sumolinux.suntzudata.com/[/url] [/li]
[li][url=http://blog.0x0e.org/2009/11/20/pentesting-with-an-ubuntu-box/#comments]http://blog.0x0e.org/2009/11/20/pentesting-with-an-ubuntu-box/#comments[/url] [/li]
[li][url=http://www.backbox.org/]http://www.backbox.org/[/url] [/li]
[/list]
[hr]
Labs:<blockquote>ISOs and VMs: </blockquote>     [list]
[li][url=http://sourceforge.net/projects/websecuritydojo/]http://sourceforge.net/projects/websecuritydojo/[/url] [/li]
[li][url=http://code.google.com/p/owaspbwa/wiki/ProjectSummary]http://code.google.com/p/owaspbwa/wiki/ProjectSummary[/url] [/li]
[li][url=http://heorot.net/livecds/]http://heorot.net/livecds/[/url] [/li]
[li][url=http://informatica.uv.es/%7Ecarlos/docencia/netinvm/]http://informatica.uv.es/~carlos/docencia/netinvm/[/url] [/li]
[li][url=http://www.bonsai-sec.com/en/research/moth.php]http://www.bonsai-sec.com/en/research/moth.php[/url] [/li]
[li][url=http://blog.metasploit.com/2010/05/introducing-metasploitable.html]http://blog.metasploit.com/2010/05/introducing-metasploitable.html[/url] [/li]
[li][url=http://pynstrom.net/holynix.php]http://pynstrom.net/holynix.php[/url] [/li]
[li][url=http://gnacktrack.co.uk/download.php]http://gnacktrack.co.uk/download.php[/url] [/li]
[li][url=http://sourceforge.net/projects/lampsecurity/files/]http://sourceforge.net/projects/lampsecurity/files/[/url] [/li]
[li][url=https://www.hacking-lab.com/news/newspage/livecd-v4.3-available.html]https://www.hacking-lab.com/news/newspage/livecd-v4.3-available.html[/url] [/li]
[li][url=http://sourceforge.net/projects/virtualhacking/files/]http://sourceforge.net/projects/virtualhacking/files/[/url] [/li]
[li][url=http://www.badstore.net/]http://www.badstore.net/[/url] [/li]
[li][url=http://www.irongeek.com/i.php?page=security/mutillidae-deliberately-vulnerable-php-owasp-top-10]http://www.irongeek.com/i.php?page=security/mutillidae-deliberately-vulnerable-php-owasp-top-10[/url] [/li]
[li][url=http://www.dvwa.co.uk/]http://www.dvwa.co.uk/[/url] [/li]
[li][url=http://sourceforge.net/projects/thebutterflytmp/]http://sourceforge.net/projects/thebutterflytmp/[/url] [/li]
[/list]<blockquote>Vulnerable Software: </blockquote>     [list]
[li][url=http://www.oldapps.com/]http://www.oldapps.com/[/url] [/li]
[li][url=http://www.oldversion.com/]http://www.oldversion.com/[/url] [/li]
[li][url=http://www.exploit-db.com/webapps/]http://www.exploit-db.com/webapps/[/url] [/li]
[li][url=http://code.google.com/p/wavsep/downloads/list]http://code.google.com/p/wavsep/downloads/list[/url] [/li]
[li][url=http://www.owasp.org/index.php/Owasp_SiteGenerator]http://www.owasp.org/index.php/Owasp_SiteGenerator[/url] [/li]
[li][url=http://www.mcafee.com/us/downloads/free-tools/hacmebooks.aspx]http://www.mcafee.com/us/downloads/free-tools/hacmebooks.aspx[/url] [/li]
[li][url=http://www.mcafee.com/us/downloads/free-tools/hacme-casino.aspx]http://www.mcafee.com/us/downloads/free-tools/hacme-casino.aspx[/url] [/li]
[li][url=http://www.mcafee.com/us/downloads/free-tools/hacmeshipping.aspx]http://www.mcafee.com/us/downloads/free-tools/hacmeshipping.aspx[/url] [/li]
[li][url=http://www.mcafee.com/us/downloads/free-tools/hacmetravel.aspx]http://www.mcafee.com/us/downloads/free-tools/hacmetravel.aspx[/url] [/li]
[/list]<blockquote>Test Sites: </blockquote>     [list]
[li][url=http://www.webscantest.com/]http://www.webscantest.com/[/url] [/li]
[li][url=http://crackme.cenzic.com/Kelev/view/home.php]http://crackme.cenzic.com/Kelev/view/home.php[/url] [/li]
[li][url=http://zero.webappsecurity.com/banklogin.asp?serviceName=FreebankCaastAccess&templateName=prod_sel.forte&source=Freebank&AD_REFERRING_URL=http://www.Freebank.com]http://zero.webappsecurity.com/banklogin.asp?serviceName=FreebankCaastAccess&templateName=prod_sel.forte&source=Freebank&AD_REFERRING_URL=http://www.Freebank.com[/url] [/li]
[li][url=http://testaspnet.vulnweb.com/]http://testaspnet.vulnweb.com/[/url] [/li]
[li][url=http://testasp.vulnweb.com/]http://testasp.vulnweb.com/[/url] [/li]
[li][url=http://testphp.vulnweb.com/]http://testphp.vulnweb.com/[/url] [/li]
[li][url=http://demo.testfire.net/]http://demo.testfire.net/[/url] [/li]
[li][url=http://hackme.ntobjectives.com/]http://hackme.ntobjectives.com/[/url] [/li]
[/list][/left]
« Última modificación: 24 de Octubre de 2014, 11:17:20 pm por papones »
Lease las normas del foro si es tan amable
http://www.auditoriaswireless.net/index.php/topic,3.0.html
Presentese  a la comunidad en el apartado del foro PRESENTACIONES

Desconectado papones

  • Administrador
  • Trade Count: (0)
  • *****
  • Mensajes: 8513
  • Colaboraciones +195/-5
  • Sexo: Masculino
  • La paciencia la madre de la ciencia
    • Locos Por El Wifi
Re:Pentest-bookmarks-Medios Hacker-herramientas blog distribuciones
« Respuesta #2 en: 25 de Abril de 2012, 09:58:02 pm »
Código: [Seleccionar]
Exploitation Intro:If you'd like to get into exploit dev, these are really the guides and docs that will start you off in the right direction. Since Exploit dev is not my primary occupation this section could always use help. [list]
[li][url=http://myne-us.blogspot.com/2010/08/from-0x90-to-0x4c454554-journey-into.html]http://myne-us.blogspot.com/2010/08/from-0x90-to-0x4c454554-journey-into.html[/url] [/li]
[li][url=http://www.mgraziano.info/docs/stsi2010.pdf]http://www.mgraziano.info/docs/stsi2010.pdf[/url] [/li]
[li][url=http://www.abysssec.com/blog/2010/05/past-present-future-of-windows-exploitation/]http://www.abysssec.com/blog/2010/05/past-present-future-of-windows-exploitation/[/url] [/li]
[li][url=http://www.ethicalhacker.net/content/view/122/2/]http://www.ethicalhacker.net/content/view/122/2/[/url] [/li]
[li][url=http://code.google.com/p/it-sec-catalog/wiki/Exploitation]http://code.google.com/p/it-sec-catalog/wiki/Exploitation[/url] [/li]
[li][url=http://x9090.blogspot.com/2010/03/tutorial-exploit-writting-tutorial-from.html]http://x9090.blogspot.com/2010/03/tutorial-exploit-writting-tutorial-from.html[/url] [/li]
[li][url=http://ref.x86asm.net/index.html]http://ref.x86asm.net/index.html[/url] [/li]
[/list]
[hr]
Reverse Engineering & Malware:[list]
[li][url=http://www.woodmann.com/TiGa/idaseries.html]http://www.woodmann.com/TiGa/idaseries.html[/url] [/li]
[li][url=http://www.binary-auditing.com/]http://www.binary-auditing.com/[/url] [/li]
[li][url=http://visi.kenshoto.com/]http://visi.kenshoto.com/[/url] [/li]
[li][url=http://www.radare.org/y/]http://www.radare.org/y/[/url] [/li]
[li][url=http://www.offensivecomputing.net/]http://www.offensivecomputing.net/[/url] [/li]
[/list]
[hr]
Passwords and Hashes:[list]
[li][url=http://www.irongeek.com/i.php?page=videos/password-exploitation-class]http://www.irongeek.com/i.php?page=videos/password-exploitation-class[/url] [/li]
[li][url=http://cirt.net/passwords]http://cirt.net/passwords[/url] [/li]
[li][url=http://sinbadsecurity.blogspot.com/2008/10/ms-sql-server-password-recovery.html]http://sinbadsecurity.blogspot.com/2008/10/ms-sql-server-password-recovery.html[/url] [/li]
[li][url=http://www.foofus.net/%7Ejmk/medusa/medusa-smbnt.html]http://www.foofus.net/~jmk/medusa/medusa-smbnt.html[/url] [/li]
[li][url=http://www.foofus.net/?page_id=63]http://www.foofus.net/?page_id=63[/url] [/li]
[li][url=http://hashcrack.blogspot.com/]http://hashcrack.blogspot.com/[/url] [/li]
[li][url=http://www.nirsoft.net/articles/saved_password_location.html]http://www.nirsoft.net/articles/saved_password_location.html[/url] [/li]
[li][url=http://www.onlinehashcrack.com/]http://www.onlinehashcrack.com/[/url] [/li]
[li][url=http://www.md5this.com/list.php?]http://www.md5this.com/list.php?[/url] [/li]
[li][url=http://www.virus.org/default-password]http://www.virus.org/default-password[/url] [/li]
[li][url=http://www.phenoelit-us.org/dpl/dpl.html]http://www.phenoelit-us.org/dpl/dpl.html[/url] [/li]
[li][url=http://news.electricalchemy.net/2009/10/cracking-passwords-in-cloud.html]http://news.electricalchemy.net/2009/10/cracking-passwords-in-cloud.html[/url] [/li]
[/list]<blockquote>Wordlists: [list]
[li][url=http://contest.korelogic.com/wordlists.html]http://contest.korelogic.com/wordlists.html[/url] [/li]
[li][url=http://packetstormsecurity.org/Crackers/wordlists/]http://packetstormsecurity.org/Crackers/wordlists/[/url] [/li]
[li][url=http://www.skullsecurity.org/wiki/index.php/Passwords]http://www.skullsecurity.org/wiki/index.php/Passwords[/url] [/li]
[li][url=http://www.ericheitzman.com/passwd/passwords/]http://www.ericheitzman.com/passwd/passwords/[/url] [/li]
[/list]</blockquote><blockquote>Pass the Hash: [list]
[li][url=http://www.sans.org/reading_room/whitepapers/testing/pass-the-hash-attacks-tools-mitigation_33283]http://www.sans.org/reading_room/whitepapers/testing/pass-the-hash-attacks-tools-mitigation_33283[/url] [/li]
[li][url=http://www.sans.org/reading_room/whitepapers/testing/crack-pass-hash_33219]http://www.sans.org/reading_room/whitepapers/testing/crack-pass-hash_33219[/url] [/li]
[li][url=http://carnal0wnage.blogspot.com/2008/03/using-pash-hash-toolkit.html]http://carnal0wnage.blogspot.com/2008/03/using-pash-hash-toolkit.html[/url] [/li]
[/list]</blockquote>
[hr]
MiTM:[list]
[li][url=http://www.giac.org/certified_professionals/practicals/gsec/0810.php]http://www.giac.org/certified_professionals/practicals/gsec/0810.php[/url] [/li]
[li][url=http://www.linuxsecurity.com/docs/PDF/dsniff-n-mirror.pdf]http://www.linuxsecurity.com/docs/PDF/dsniff-n-mirror.pdf[/url] [/li]
[li][url=http://www.cs.uiuc.edu/class/sp08/cs498sh/slides/dsniff.pdf]http://www.cs.uiuc.edu/class/sp08/cs498sh/slides/dsniff.pdf[/url] [/li]
[li][url=http://www.techvibes.com/blog/a-hackers-story-let-me-tell-you-just-how-easily-i-can-steal-your-personal-data]http://www.techvibes.com/blog/a-hackers-story-let-me-tell-you-just-how-easily-i-can-steal-your-personal-data[/url] [/li]
[li][url=http://www.mindcenter.net/uploads/ECCE101.pdf]http://www.mindcenter.net/uploads/ECCE101.pdf[/url] [/li]
[li][url=http://toorcon.org/pres12/3.pdf]http://toorcon.org/pres12/3.pdf[/url] [/li]
[li][url=http://media.techtarget.com/searchUnifiedCommunications/downloads/Seven_Deadliest_UC_Attacks_Ch3.pdf]http://media.techtarget.com/searchUnifiedCommunications/downloads/Seven_Deadliest_UC_Attacks_Ch3.pdf[/url] [/li]
[li][url=http://packetstormsecurity.org/papers/wireless/cracking-air.pdf]http://packetstormsecurity.org/papers/wireless/cracking-air.pdf[/url] [/li]
[li][url=http://www.blackhat.com/presentations/bh-europe-03/bh-europe-03-valleri.pdf]http://www.blackhat.com/presentations/bh-europe-03/bh-europe-03-valleri.pdf[/url] [/li]
[li][url=http://www.oact.inaf.it/ws-ssri/Costa.pdf]http://www.oact.inaf.it/ws-ssri/Costa.pdf[/url] [/li]
[li][url=http://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-sam_bowne-hijacking_web_2.0.pdf]http://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-sam_bowne-hijacking_web_2.0.pdf[/url] [/li]
[li][url=http://mcafeeseminar.com/focus/downloads/Live_Hacking.pdf]http://mcafeeseminar.com/focus/downloads/Live_Hacking.pdf[/url] [/li]
[li][url=http://www.seanobriain.com/docs/PasstheParcel-MITMGuide.pdf]http://www.seanobriain.com/docs/PasstheParcel-MITMGuide.pdf[/url] [/li]
[li][url=http://www.more.net/sites/default/files/2010JohnStrandKeynote.pdf]http://www.more.net/sites/default/files/2010JohnStrandKeynote.pdf[/url] [/li]
[li][url=http://www.leetupload.com/database/Misc/Papers/Asta%20la%20Vista/18.Ettercap_Spoof.pdf]http://www.leetupload.com/database/Misc/Papers/Asta%20la%20Vista/18.Ettercap_Spoof.pdf[/url] [/li]
[li][url=http://bandwidthco.com/whitepapers/netforensics/arp/EtterCap%20ARP%20Spoofing%20&%20Beyond.pdf]http://bandwidthco.com/whitepapers/netforensics/arp/EtterCap%20ARP%20Spoofing%20&%20Beyond.pdf[/url] [/li]
[li][url=http://bandwidthco.com/whitepapers/netforensics/arp/Fun%20With%20EtterCap%20Filters.pdf]http://bandwidthco.com/whitepapers/netforensics/arp/Fun%20With%20EtterCap%20Filters.pdf[/url] [/li]
[li][url=http://www.iac.iastate.edu/iasg/libarchive/0910/The_Magic_of_Ettercap/The_Magic_of_Ettercap.pdf]http://www.iac.iastate.edu/iasg/libarchive/0910/The_Magic_of_Ettercap/The_Magic_of_Ettercap.pdf[/url] [/li]
[li][url=http://articles.manugarg.com/arp_spoofing.pdf]http://articles.manugarg.com/arp_spoofing.pdf[/url] [/li]
[li][url=http://academy.delmar.edu/Courses/ITSY2430/eBooks/Ettercap%28ManInTheMiddleAttack-tool%29.pdf]http://academy.delmar.edu/Courses/ITSY2430/eBooks/Ettercap(ManInTheMiddleAttack-tool).pdf[/url] [/li]
[li][url=http://www.ucci.it/docs/ICTSecurity-2004-26.pdf]http://www.ucci.it/docs/ICTSecurity-2004-26.pdf[/url] [/li]
[li][url=http://web.mac.com/opticrealm/iWeb/asurobot/My%20Cyber%20Attack%20Papers/My%20Cyber%20Attack%20Papers_files/ettercap_Nov_6_2005-1.pdf]http://web.mac.com/opticrealm/iWeb/asurobot/My%20Cyber%20Attack%20Papers/My%20Cyber%20Attack%20Papers_files/ettercap_Nov_6_2005-1.pdf[/url] [/li]
[li][url=http://blog.spiderlabs.com/2010/12/thicknet.html]http://blog.spiderlabs.com/2010/12/thicknet.html[/url] [/li]
[li][url=http://www.hackyeah.com/2010/10/ettercap-filters-with-metasploit-browser_autopwn/]http://www.hackyeah.com/2010/10/ettercap-filters-with-metasploit-browser_autopwn/[/url] [/li]
[li][url=http://www.go4expert.com/forums/showthread.php?t=11842]http://www.go4expert.com/forums/showthread.php?t=11842[/url] [/li]
[li][url=http://www.irongeek.com/i.php?page=security/ettercapfilter]http://www.irongeek.com/i.php?page=security/ettercapfilter[/url] [/li]
[li][url=http://openmaniak.com/ettercap_filter.php]http://openmaniak.com/ettercap_filter.php[/url] [/li]
[li][url=http://www.irongeek.com/i.php?page=videos/dns-spoofing-with-ettercap-pharming]http://www.irongeek.com/i.php?page=videos/dns-spoofing-with-ettercap-pharming[/url] [/li]
[li][url=http://www.irongeek.com/i.php?page=videos/ettercap-plugins-find-ip-gw-discover-isolate]http://www.irongeek.com/i.php?page=videos/ettercap-plugins-find-ip-gw-discover-isolate[/url] [/li]
[li][url=http://www.irongeek.com/i.php?page=videos/ettercapfiltervid1]http://www.irongeek.com/i.php?page=videos/ettercapfiltervid1[/url] [/li]
[li][url=http://spareclockcycles.org/2010/06/10/sergio-proxy-released/]http://spareclockcycles.org/2010/06/10/sergio-proxy-released/[/url] [/li]
[/list]
« Última modificación: 24 de Octubre de 2014, 11:18:44 pm por papones »
Lease las normas del foro si es tan amable
http://www.auditoriaswireless.net/index.php/topic,3.0.html
Presentese  a la comunidad en el apartado del foro PRESENTACIONES

Desconectado papones

  • Administrador
  • Trade Count: (0)
  • *****
  • Mensajes: 8513
  • Colaboraciones +195/-5
  • Sexo: Masculino
  • La paciencia la madre de la ciencia
    • Locos Por El Wifi
Re:Pentest-bookmarks-Medios Hacker-herramientas blog distribuciones
« Respuesta #3 en: 25 de Abril de 2012, 09:58:51 pm »
Código: [Seleccionar]
Tools:<blockquote>OSINT:</blockquote> [list]
[li][url=http://www.edge-security.com/theHarvester.php]http://www.edge-security.com/theHarvester.php[/url] [/li]
[li][url=http://www.mavetju.org/unix/dnstracer-man.php]http://www.mavetju.org/unix/dnstracer-man.php[/url] [/li]
[li][url=http://www.paterva.com/web5/]http://www.paterva.com/web5/[/url] [/li]
[/list]<blockquote>Metadata:</blockquote> [list]
[li][url=http://www.sans.org/reading_room/whitepapers/privacy/document-metadata-silent-killer_32974]http://www.sans.org/reading_room/whitepapers/privacy/document-metadata-silent-killer_32974[/url] [/li]
[li][url=http://lcamtuf.coredump.cx/strikeout/]http://lcamtuf.coredump.cx/strikeout/[/url] [/li]
[li][url=http://www.sno.phy.queensu.ca/%7Ephil/exiftool/]http://www.sno.phy.queensu.ca/~phil/exiftool/[/url] [/li]
[li][url=http://www.edge-security.com/metagoofil.php]http://www.edge-security.com/metagoofil.php[/url] [/li]
[li][url=http://www.darkoperator.com/blog/2009/4/24/metadata-enumeration-with-foca.html]http://www.darkoperator.com/blog/2009/4/24/metadata-enumeration-with-foca.html[/url] [/li]
[/list]<blockquote>Google Hacking: [list]
[li][url=http://www.stachliu.com/index.php/resources/tools/google-hacking-diggity-project/]http://www.stachliu.com/index.php/resources/tools/google-hacking-diggity-project/[/url] [/li]
[li][url=http://midnightresearch.com/projects/search-engine-assessment-tool/#downloads]http://midnightresearch.com/projects/search-engine-assessment-tool/#downloads[/url] [/li]
[li][url=http://sqid.rubyforge.org/#next]http://sqid.rubyforge.org/#next[/url] [/li]
[li][url=http://voidnetwork.org/5ynL0rd/darkc0de/python_script/dorkScan.html]http://voidnetwork.org/5ynL0rd/darkc0de/python_script/dorkScan.html[/url] [/li]
[/list]</blockquote><blockquote>Web: [list]
[li][url=http://www.bindshell.net/tools/beef]http://www.bindshell.net/tools/beef[/url] [/li]
[li][url=http://blindelephant.sourceforge.net/]http://blindelephant.sourceforge.net/[/url] [/li]
[li][url=http://xsser.sourceforge.net/]http://xsser.sourceforge.net/[/url] [/li]
[li][url=http://sourceforge.net/projects/rips-scanner/]http://sourceforge.net/projects/rips-scanner/[/url] [/li]
[li][url=http://www.divineinvasion.net/authforce/]http://www.divineinvasion.net/authforce/[/url] [/li]
[li][url=http://andlabs.org/tools.html#sotf]http://andlabs.org/tools.html#sotf[/url] [/li]
[li][url=http://www.taddong.com/docs/Browser_Exploitation_for_Fun&Profit_Taddong-RaulSiles_Nov2010_v1.1.pdf]http://www.taddong.com/docs/Browser_Exploitation_for_Fun&Profit_Taddong-RaulSiles_Nov2010_v1.1.pdf[/url] [/li]
[li][url=http://carnal0wnage.blogspot.com/2007/07/using-sqid-sql-injection-digger-to-look.html]http://carnal0wnage.blogspot.com/2007/07/using-sqid-sql-injection-digger-to-look.html[/url] [/li]
[li][url=http://code.google.com/p/pinata-csrf-tool/]http://code.google.com/p/pinata-csrf-tool/[/url] [/li]
[li][url=http://xsser.sourceforge.net/#intro]http://xsser.sourceforge.net/#intro[/url] [/li]
[li][url=http://www.contextis.co.uk/resources/tools/clickjacking-tool/]http://www.contextis.co.uk/resources/tools/clickjacking-tool/[/url] [/li]
[li][url=http://packetstormsecurity.org/files/view/69896/unicode-fun.txt]http://packetstormsecurity.org/files/view/69896/unicode-fun.txt[/url] [/li]
[li][url=http://sourceforge.net/projects/ws-attacker/files/]http://sourceforge.net/projects/ws-attacker/files/[/url] [/li]
[li][url=https://github.com/koto/squid-imposter]https://github.com/koto/squid-imposter[/url] [/li]
[/list]<blockquote>Attack Strings:</blockquote> [list]
[li][url=http://code.google.com/p/fuzzdb/]http://code.google.com/p/fuzzdb/[/url] [/li]
[li][url=http://www.owasp.org/index.php/Category:OWASP_Fuzzing_Code_Database#tab=Statements]http://www.owasp.org/index.php/Category:OWASP_Fuzzing_Code_Database#tab=Statements[/url] [/li]
[/list]Shells: [list]
[li][url=http://sourceforge.net/projects/yokoso/]http://sourceforge.net/projects/yokoso/[/url] [/li]
[li][url=http://sourceforge.net/projects/ajaxshell/]http://sourceforge.net/projects/ajaxshell/[/url] [/li]
[/list]Scanners: [list]
[li][url=http://w3af.sourceforge.net/]http://w3af.sourceforge.net/[/url] [/li]
[li][url=http://code.google.com/p/skipfish/]http://code.google.com/p/skipfish/[/url] [/li]
[li][url=http://sqlmap.sourceforge.net/]http://sqlmap.sourceforge.net/[/url] [/li]
[li][url=http://sqid.rubyforge.org/#next]http://sqid.rubyforge.org/#next[/url] [/li]
[li][url=http://packetstormsecurity.org/UNIX/scanners/XSSscan.py.txt]http://packetstormsecurity.org/UNIX/scanners/XSSscan.py.txt[/url] [/li]
[li][url=http://code.google.com/p/fimap/wiki/WindowsAttack]http://code.google.com/p/fimap/wiki/WindowsAttack[/url] [/li]
[li][url=http://code.google.com/p/fm-fsf/]http://code.google.com/p/fm-fsf/[/url] [/li]
[/list]Proxies: <blockquote>Burp:</blockquote> [list]
[li][url=http://www.sans.org/reading_room/whitepapers/testing/fuzzing-approach-credentials-discovery-burp-intruder_33214]http://www.sans.org/reading_room/whitepapers/testing/fuzzing-approach-credentials-discovery-burp-intruder_33214[/url] [/li]
[li][url=http://www.gdssecurity.com/l/b/2010/08/10/constricting-the-web-the-gds-burp-api/]http://www.gdssecurity.com/l/b/2010/08/10/constricting-the-web-the-gds-burp-api/[/url] [/li]
[li][url=http://sourceforge.net/projects/belch/files/]http://sourceforge.net/projects/belch/files/[/url] [/li]
[li][url=http://www.securityninja.co.uk/application-security/burp-suite-tutorial-repeater-and-comparer-tools]http://www.securityninja.co.uk/application-security/burp-suite-tutorial-repeater-and-comparer-tools[/url] [/li]
[li][url=http://blog.ombrepixel.com/]http://blog.ombrepixel.com/[/url] [/li]
[li][url=http://andlabs.org/tools.html#dser]http://andlabs.org/tools.html#dser[/url] [/li]
[li][url=http://feoh.tistory.com/22]http://feoh.tistory.com/22[/url] [/li]
[/list]</blockquote>[list]
[li][url=http://www.sensepost.com/labs/tools/pentest/reduh]http://www.sensepost.com/labs/tools/pentest/reduh[/url] [/li]
[li][url=http://www.owasp.org/index.php/OWASP_WebScarab_NG_Project]http://www.owasp.org/index.php/OWASP_WebScarab_NG_Project[/url] [/li]
[li][url=http://intrepidusgroup.com/insight/mallory/]http://intrepidusgroup.com/insight/mallory/[/url] [/li]
[li][url=http://www.fiddler2.com/fiddler2/]http://www.fiddler2.com/fiddler2/[/url] [/li]
[li][url=http://websecuritytool.codeplex.com/documentation?referringTitle=Home]http://websecuritytool.codeplex.com/documentation?referringTitle=Home[/url] [/li]
[li][url=http://translate.google.com/translate?hl=en&sl=es&u=http://xss.codeplex.com/releases/view/43170&prev=/search%3Fq%3Dhttp://www.hackingeek.com/2010/08/x5s-encuentra-fallos-xss-lfi-rfi-en-tus.html%26hl%3Den&rurl=translate.google.com&twu=1]http://translate.google.com/translate?hl=en&sl=es&u=http://xss.codeplex.com/releases/view/43170&prev=/search%3Fq%3Dhttp://www.hackingeek.com/2010/08/x5s-encuentra-fallos-xss-lfi-rfi-en-tus.html%26hl%3Den&rurl=translate.google.com&twu=1[/url] [/li]
[/list]<blockquote>Social Engineering: [list]
[li][url=http://www.secmaniac.com/]http://www.secmaniac.com/[/url] [/li]
[/list]</blockquote><blockquote>Password: [list]
[li][url=http://nmap.org/ncrack/]http://nmap.org/ncrack/[/url] [/li]
[li][url=http://www.foofus.net/%7Ejmk/medusa/medusa.html]http://www.foofus.net/~jmk/medusa/medusa.html[/url] [/li]
[li][url=http://www.openwall.com/john/]http://www.openwall.com/john/[/url] [/li]
[li][url=http://ophcrack.sourceforge.net/]http://ophcrack.sourceforge.net/[/url] [/li]
[li][url=http://blog.0x3f.net/tool/keimpx-in-action/]http://blog.0x3f.net/tool/keimpx-in-action/[/url] [/li]
[li][url=http://code.google.com/p/keimpx/]http://code.google.com/p/keimpx/[/url] [/li]
[li][url=http://sourceforge.net/projects/hashkill/]http://sourceforge.net/projects/hashkill/[/url] [/li]
[/list]</blockquote><blockquote>Metasploit: </blockquote>[list]
[li][url=http://www.indepthdefense.com/2009/02/reverse-pivots-with-metasploit-how-not.html]http://www.indepthdefense.com/2009/02/reverse-pivots-with-metasploit-how-not.html[/url] [/li]
[li][url=http://code.google.com/p/msf-hack/wiki/WmapNikto]http://code.google.com/p/msf-hack/wiki/WmapNikto[/url] [/li]
[li][url=http://www.indepthdefense.com/2009/01/metasploit-visual-basic-payloads-in.html]http://www.indepthdefense.com/2009/01/metasploit-visual-basic-payloads-in.html[/url] [/li]
[li][url=http://seclists.org/metasploit/]http://seclists.org/metasploit/[/url] [/li]
[li][url=http://pauldotcom.com/2010/03/nessus-scanning-through-a-meta.html]http://pauldotcom.com/2010/03/nessus-scanning-through-a-meta.html[/url] [/li]
[li][url=http://meterpreter.illegalguy.hostzi.com/]http://meterpreter.illegalguy.hostzi.com/[/url] [/li]
[li][url=http://blog.metasploit.com/2010/03/automating-metasploit-console.html]http://blog.metasploit.com/2010/03/automating-metasploit-console.html[/url] [/li]
[li][url=http://www.workrobot.com/sansfire2009/561.html]http://www.workrobot.com/sansfire2009/561.html[/url] [/li]
[li][url=http://www.securitytube.net/video/711]http://www.securitytube.net/video/711[/url] [/li]
[li][url=http://en.wikibooks.org/wiki/Metasploit/MeterpreterClient#download]http://en.wikibooks.org/wiki/Metasploit/MeterpreterClient#download[/url] [/li]

[li][url=http://milo2012.wordpress.com/2009/09/27/xlsinjector/]http://milo2012.wordpress.com/2009/09/27/xlsinjector/[/url] [/li]
[li][url=http://www.fastandeasyhacking.com/]http://www.fastandeasyhacking.com/[/url] [/li]
[li][url=http://trac.happypacket.net/]http://trac.happypacket.net/[/url] [/li]
[li][url=http://www.blackhat.com/presentations/bh-dc-10/Ames_Colin/BlackHat-DC-2010-colin-david-neurosurgery-with-meterpreter-wp.pdf]http://www.blackhat.com/presentations/bh-dc-10/Ames_Colin/BlackHat-DC-2010-colin-david-neurosurgery-with-meterpreter-wp.pdf[/url] [/li]
[li][url=http://www.blackhat.com/presentations/bh-dc-10/Egypt/BlackHat-DC-2010-Egypt-UAV-slides.pdf]http://www.blackhat.com/presentations/bh-dc-10/Egypt/BlackHat-DC-2010-Egypt-UAV-slides.pdf[/url] [/li]
[/list]<blockquote>MSF Exploits or Easy: </blockquote>[list]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=12204]http://www.nessus.org/plugins/index.php?view=single&id=12204[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=11413]http://www.nessus.org/plugins/index.php?view=single&id=11413[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=18021]http://www.nessus.org/plugins/index.php?view=single&id=18021[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=26918]http://www.nessus.org/plugins/index.php?view=single&id=26918[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=34821]http://www.nessus.org/plugins/index.php?view=single&id=34821[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=22194]http://www.nessus.org/plugins/index.php?view=single&id=22194[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=34476]http://www.nessus.org/plugins/index.php?view=single&id=34476[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=25168]http://www.nessus.org/plugins/index.php?view=single&id=25168[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=19408]http://www.nessus.org/plugins/index.php?view=single&id=19408[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=21564]http://www.nessus.org/plugins/index.php?view=single&id=21564[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=10862]http://www.nessus.org/plugins/index.php?view=single&id=10862[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=26925]http://www.nessus.org/plugins/index.php?view=single&id=26925[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=29314]http://www.nessus.org/plugins/index.php?view=single&id=29314[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=23643]http://www.nessus.org/plugins/index.php?view=single&id=23643[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=12052]http://www.nessus.org/plugins/index.php?view=single&id=12052[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=12052]http://www.nessus.org/plugins/index.php?view=single&id=12052[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=34477]http://www.nessus.org/plugins/index.php?view=single&id=34477[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=15962]http://www.nessus.org/plugins/index.php?view=single&id=15962[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=42106]http://www.nessus.org/plugins/index.php?view=single&id=42106[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=15456]http://www.nessus.org/plugins/index.php?view=single&id=15456[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=21689]http://www.nessus.org/plugins/index.php?view=single&id=21689[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=12205]http://www.nessus.org/plugins/index.php?view=single&id=12205[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=22182]http://www.nessus.org/plugins/index.php?view=single&id=22182[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=26919]http://www.nessus.org/plugins/index.php?view=single&id=26919[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=26921]http://www.nessus.org/plugins/index.php?view=single&id=26921[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=21696]http://www.nessus.org/plugins/index.php?view=single&id=21696[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=40887]http://www.nessus.org/plugins/index.php?view=single&id=40887[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=10404]http://www.nessus.org/plugins/index.php?view=single&id=10404[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=18027]http://www.nessus.org/plugins/index.php?view=single&id=18027[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=19402]http://www.nessus.org/plugins/index.php?view=single&id=19402[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=11790]http://www.nessus.org/plugins/index.php?view=single&id=11790[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=12209]http://www.nessus.org/plugins/index.php?view=single&id=12209[/url] [/li]
[li][url=http://www.nessus.org/plugins/index.php?view=single&id=10673]http://www.nessus.org/plugins/index.php?view=single&id=10673[/url] [/li]
[/list]
« Última modificación: 24 de Octubre de 2014, 11:18:58 pm por papones »
Lease las normas del foro si es tan amable
http://www.auditoriaswireless.net/index.php/topic,3.0.html
Presentese  a la comunidad en el apartado del foro PRESENTACIONES

Desconectado papones

  • Administrador
  • Trade Count: (0)
  • *****
  • Mensajes: 8513
  • Colaboraciones +195/-5
  • Sexo: Masculino
  • La paciencia la madre de la ciencia
    • Locos Por El Wifi
Re:Pentest-bookmarks-Medios Hacker-herramientas blog distribuciones
« Respuesta #4 en: 25 de Abril de 2012, 10:03:54 pm »
Código: [Seleccionar]
NSE: [list]
[li][url=http://www.securitytube.net/video/931]http://www.securitytube.net/video/931[/url] [/li]
[li][url=http://nmap.org/nsedoc/]http://nmap.org/nsedoc/[/url] [/li]
[/list]<blockquote>Net Scanners and Scripts: </blockquote>[list]
[li][url=http://nmap.org/]http://nmap.org/[/url] [/li]
[li][url=http://asturio.gmxhome.de/software/sambascan2/i.html]http://asturio.gmxhome.de/software/sambascan2/i.html[/url] [/li]
[li][url=http://www.softperfect.com/products/networkscanner/]http://www.softperfect.com/products/networkscanner/[/url] [/li]
[li][url=http://www.openvas.org/]http://www.openvas.org/[/url] [/li]
[li][url=http://tenable.com/products/nessus]http://tenable.com/products/nessus[/url] [/li]
[li][url=http://www.rapid7.com/vulnerability-scanner.jsp]http://www.rapid7.com/vulnerability-scanner.jsp[/url] [/li]
[li][url=http://www.eeye.com/products/retina/community]http://www.eeye.com/products/retina/community[/url] [/li]
[/list]<blockquote>Post Exploitation: </blockquote>[list]
[li][url=http://www.awarenetwork.org/home/rattle/source/python/exe2bat.py]http://www.awarenetwork.org/home/rattle/source/python/exe2bat.py[/url] [/li]
[li][url=http://www.phx2600.org/archive/2008/08/29/metacab/]http://www.phx2600.org/archive/2008/08/29/metacab/[/url] [/li]
[li][url=http://www.room362.com/blog/2011/9/6/post-exploitation-command-lists.html]http://www.room362.com/blog/2011/9/6/post-exploitation-command-lists.html[/url] [/li]
[/list]<blockquote>Netcat: </blockquote>[list]
[li][url=http://readlist.com/lists/insecure.org/nmap-dev/1/7779.html]http://readlist.com/lists/insecure.org/nmap-dev/1/7779.html[/url] [/li]
[li][url=http://www.radarhack.com/tutorial/ads.pdf]http://www.radarhack.com/tutorial/ads.pdf[/url] [/li]
[li][url=http://www.infosecwriters.com/text_resources/pdf/Netcat_for_the_Masses_DDebeer.pdf]http://www.infosecwriters.com/text_resources/pdf/Netcat_for_the_Masses_DDebeer.pdf[/url] [/li]
[li][url=http://www.sans.org/security-resources/sec560/netcat_cheat_sheet_v1.pdf]http://www.sans.org/security-resources/sec560/netcat_cheat_sheet_v1.pdf[/url] [/li]
[li][url=http://www.dest-unreach.org/socat/]http://www.dest-unreach.org/socat/[/url] [/li]
[li][url=http://www.antionline.com/archive/index.php/t-230603.html]http://www.antionline.com/archive/index.php/t-230603.html[/url] [/li]
[li][url=http://technotales.wordpress.com/2009/06/14/netcat-tricks/]http://technotales.wordpress.com/2009/06/14/netcat-tricks/[/url] [/li]
[li][url=http://seclists.org/nmap-dev/2009/q1/581]http://seclists.org/nmap-dev/2009/q1/581[/url] [/li]
[li][url=http://www.terminally-incoherent.com/blog/2007/08/07/few-useful-netcat-tricks/]http://www.terminally-incoherent.com/blog/2007/08/07/few-useful-netcat-tricks/[/url] [/li]
[li][url=http://www.inguardians.com/research/docs/Skoudis_pentestsecrets.pdf]http://www.inguardians.com/research/docs/Skoudis_pentestsecrets.pdf[/url] [/li]
[li][url=http://gse-compliance.blogspot.com/2008/07/netcat.html]http://gse-compliance.blogspot.com/2008/07/netcat.html[/url] [/li]
[/list]<blockquote>Source Inspection: </blockquote>[list]
[li][url=http://www.justanotherhacker.com/projects/graudit.html]http://www.justanotherhacker.com/projects/graudit.html[/url] [/li]
[li][url=http://code.google.com/p/javasnoop/]http://code.google.com/p/javasnoop/[/url] [/li]
[/list]<blockquote>Firefox Addons: </blockquote>[list]
[li][url=https://addons.mozilla.org/id/firefox/collections/byrned/pentesting/?page=8]https://addons.mozilla.org/id/firefox/collections/byrned/pentesting/?page=8[/url] [/li]
[li][url=https://addons.mozilla.org/en-US/firefox/addon/osvdb/]https://addons.mozilla.org/en-US/firefox/addon/osvdb/[/url] [/li]
[li][url=https://addons.mozilla.org/en-US/firefox/addon/packet-storm-search-plugin/]https://addons.mozilla.org/en-US/firefox/addon/packet-storm-search-plugin/[/url] [/li]
[li][url=https://addons.mozilla.org/en-US/firefox/addon/default-passwords-cirtne-58786/]https://addons.mozilla.org/en-US/firefox/addon/default-passwords-cirtne-58786/[/url] [/li]
[li][url=https://addons.mozilla.org/en-US/firefox/addon/offsec-exploit-db-search/]https://addons.mozilla.org/en-US/firefox/addon/offsec-exploit-db-search/[/url] [/li]
[li][url=https://addons.mozilla.org/en-US/firefox/addon/oval-repository-search-plugin/]https://addons.mozilla.org/en-US/firefox/addon/oval-repository-search-plugin/[/url] [/li]
[li][url=https://addons.mozilla.org/en-US/firefox/addon/cve-dictionary-search-plugin/]https://addons.mozilla.org/en-US/firefox/addon/cve-dictionary-search-plugin/[/url] [/li]
[li][url=https://addons.mozilla.org/en-US/firefox/addon/hackbar/]https://addons.mozilla.org/en-US/firefox/addon/hackbar/[/url] [/li]
[/list]<blockquote>Tool Listings: </blockquote>[list]
[li][url=http://packetstormsecurity.org/files/tags/tool]http://packetstormsecurity.org/files/tags/tool[/url] [/li]
[li][url=http://tools.securitytube.net/index.php?title=Main_Page]http://tools.securitytube.net/index.php?title=Main_Page[/url] [/li]
[/list]
[hr]
Training/Classes:<blockquote>Sec/Hacking: </blockquote>[list]
[li][url=http://pentest.cryptocity.net/]http://pentest.cryptocity.net/[/url] [/li]
[li][url=http://www.irongeek.com/i.php?page=videos/network-sniffers-class]http://www.irongeek.com/i.php?page=videos/network-sniffers-class[/url] [/li]
[li][url=http://samsclass.info/124/124_Sum09.shtml]http://samsclass.info/124/124_Sum09.shtml[/url] [/li]
[li][url=http://www.cs.ucsb.edu/%7Evigna/courses/cs279/]http://www.cs.ucsb.edu/~vigna/courses/cs279/[/url] [/li]
[li][url=http://crypto.stanford.edu/cs142/]http://crypto.stanford.edu/cs142/[/url] [/li]
[li][url=http://crypto.stanford.edu/cs155/]http://crypto.stanford.edu/cs155/[/url] [/li]
[li][url=http://cseweb.ucsd.edu/classes/wi09/cse227/]http://cseweb.ucsd.edu/classes/wi09/cse227/[/url] [/li]
[li][url=http://www-inst.eecs.berkeley.edu/%7Ecs161/sp11/]http://www-inst.eecs.berkeley.edu/~cs161/sp11/[/url] [/li]
[li][url=http://security.ucla.edu/pages/Security_Talks]http://security.ucla.edu/pages/Security_Talks[/url] [/li]
[li][url=http://www.cs.rpi.edu/academics/courses/spring10/csci4971/]http://www.cs.rpi.edu/academics/courses/spring10/csci4971/[/url] [/li]
[li][url=http://cr.yp.to/2004-494.html]http://cr.yp.to/2004-494.html[/url] [/li]
[li][url=http://www.ece.cmu.edu/%7Edbrumley/courses/18732-f09/]http://www.ece.cmu.edu/~dbrumley/courses/18732-f09/[/url] [/li]
[li][url=https://noppa.tkk.fi/noppa/kurssi/t-110.6220/luennot]https://noppa.tkk.fi/noppa/kurssi/t-110.6220/luennot[/url] [/li]
[li][url=http://stuff.mit.edu/iap/2009/#websecurity]http://stuff.mit.edu/iap/2009/#websecurity[/url] [/li]
[/list]<blockquote>Metasploit: </blockquote>[list]
[li][url=http://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_Training]http://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_Training[/url] [/li]
[li][url=http://www.irongeek.com/i.php?page=videos/metasploit-class]http://www.irongeek.com/i.php?page=videos/metasploit-class[/url] [/li]
[li][url=http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,6158.0/]http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,6158.0/[/url] [/li]

[li][url=http://www.ustream.tv/recorded/13396511]http://www.ustream.tv/recorded/13396511[/url] [/li]
[li][url=http://www.ustream.tv/recorded/13397426]http://www.ustream.tv/recorded/13397426[/url] [/li]
[li][url=http://www.ustream.tv/recorded/13398740]http://www.ustream.tv/recorded/13398740[/url] [/li]
[/list]<blockquote>Programming: <blockquote>Python: </blockquote></blockquote>[list]
[li][url=http://code.google.com/edu/languages/google-python-class/index.html]http://code.google.com/edu/languages/google-python-class/index.html[/url] [/li]
[li][url=http://www.swaroopch.com/notes/Python_en:Table_of_Contents]http://www.swaroopch.com/notes/Python_en:Table_of_Contents[/url] [/li]
[li][url=http://www.thenewboston.com/?cat=40&pOpen=tutorial]http://www.thenewboston.com/?cat=40&pOpen=tutorial[/url] [/li]
[li][url=http://showmedo.com/videotutorials/python]http://showmedo.com/videotutorials/python[/url] [/li]
[li][url=http://www.catonmat.net/blog/learning-python-programming-language-through-video-lectures/]http://www.catonmat.net/blog/learning-python-programming-language-through-video-lectures/[/url] [/li]
[/list]<blockquote>Ruby: </blockquote>[list]
[li][url=http://www.tekniqal.com/]http://www.tekniqal.com/[/url] [/li]
[/list]<blockquote>Other Misc: </blockquote>[list]
[li][url=http://www.cs.sjtu.edu.cn/%7Ekzhu/cs490/]http://www.cs.sjtu.edu.cn/~kzhu/cs490/[/url] [/li]
[li][url=https://noppa.tkk.fi/noppa/kurssi/t-110.6220/luennot/]https://noppa.tkk.fi/noppa/kurssi/t-110.6220/luennot/[/url] [/li]
[li][url=http://i-web.i.u-tokyo.ac.jp/edu/training/ss/lecture/new-documents/Lectures/]http://i-web.i.u-tokyo.ac.jp/edu/training/ss/lecture/new-documents/Lectures/[/url] [/li]
[li][url=http://resources.infosecinstitute.com/]http://resources.infosecinstitute.com/[/url] [/li]
[li][url=http://vimeo.com/user2720399]http://vimeo.com/user2720399[/url] [/li]
[/list]
« Última modificación: 24 de Octubre de 2014, 11:19:13 pm por papones »
Lease las normas del foro si es tan amable
http://www.auditoriaswireless.net/index.php/topic,3.0.html
Presentese  a la comunidad en el apartado del foro PRESENTACIONES

Desconectado papones

  • Administrador
  • Trade Count: (0)
  • *****
  • Mensajes: 8513
  • Colaboraciones +195/-5
  • Sexo: Masculino
  • La paciencia la madre de la ciencia
    • Locos Por El Wifi
Re:Pentest-bookmarks-Medios Hacker-herramientas blog distribuciones
« Respuesta #5 en: 25 de Abril de 2012, 10:05:16 pm »
Código: [Seleccionar]
Web Vectors<blockquote>SQLi: </blockquote>[list]
[li][url=http://pentestmonkey.net/blog/mssql-sql-injection-cheat-sheet/]http://pentestmonkey.net/blog/mssql-sql-injection-cheat-sheet/[/url] [/li]
[li][url=http://isc.sans.edu/diary.html?storyid=9397]http://isc.sans.edu/diary.html?storyid=9397[/url] [/li]
[li][url=http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/]http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/[/url] [/li]
[li][url=http://www.evilsql.com/main/index.php]http://www.evilsql.com/main/index.php[/url] [/li]
[li][url=http://xd-blog.com.ar/descargas/manuales/bugs/full-mssql-injection-pwnage.html]http://xd-blog.com.ar/descargas/manuales/bugs/full-mssql-injection-pwnage.html[/url] [/li]
[li][url=http://securityoverride.com/articles.php?article_id=1&article=The_Complete_Guide_to_SQL_Injections]http://securityoverride.com/articles.php?article_id=1&article=The_Complete_Guide_to_SQL_Injections[/url] [/li]
[li][url=http://websec.wordpress.com/2010/03/19/exploiting-hard-filtered-sql-injections/]http://websec.wordpress.com/2010/03/19/exploiting-hard-filtered-sql-injections/[/url] [/li]
[li][url=http://sqlzoo.net/hack/]http://sqlzoo.net/hack/[/url] [/li]
[li][url=http://www.sqlteam.com/article/sql-server-versions]http://www.sqlteam.com/article/sql-server-versions[/url] [/li]
[li][url=http://www.krazl.com/blog/?p=3]http://www.krazl.com/blog/?p=3[/url] [/li]
[li][url=http://www.owasp.org/index.php/Testing_for_MS_Access]http://www.owasp.org/index.php/Testing_for_MS_Access[/url] [/li]
[li][url=http://web.archive.org/web/20101112061524/http://seclists.org/pen-test/2003/May/0074.html]http://web.archive.org/web/20101112061524/http://seclists.org/pen-test/2003/May/0074.html[/url] [/li]
[li][url=http://web.archive.org/web/20080822123152/http://www.webapptest.org/ms-access-sql-injection-cheat-sheet-EN.html]http://web.archive.org/web/20080822123152/http://www.webapptest.org/ms-access-sql-injection-cheat-sheet-EN.html[/url] [/li]
[li][url=http://www.youtube.com/watch?v=WkHkryIoLD0#]http://www.youtube.com/watch?v=WkHkryIoLD0#[/url] [/li]
[li][url=http://layerone.info/archives/2009/Joe%20McCray%20-%20Advanced%20SQL%20Injection%20-%20L1%202009.pdf]http://layerone.info/archives/2009/Joe%20McCray%20-%20Advanced%20SQL%20Injection%20-%20L1%202009.pdf[/url] [/li]

[li][url=http://sla.ckers.org/forum/read.php?24,33903]http://sla.ckers.org/forum/read.php?24,33903[/url] [/li]
[li][url=http://websec.files.wordpress.com/2010/11/sqli2.pdf]http://websec.files.wordpress.com/2010/11/sqli2.pdf[/url] [/li]
[li][url=http://old.justinshattuck.com/2007/01/18/mysql-injection-cheat-sheet/]http://old.justinshattuck.com/2007/01/18/mysql-injection-cheat-sheet/[/url] [/li]
[li][url=http://ha.ckers.org/sqlinjection/]http://ha.ckers.org/sqlinjection/[/url] [/li]
[li][url=http://lab.mediaservice.net/notes_more.php?id=MSSQL]http://lab.mediaservice.net/notes_more.php?id=MSSQL[/url] [/li]
[/list]<blockquote>Upload Tricks: </blockquote>[list]
[li][url=http://www.google.com/#hl=en&q=bypassing+upload+file+type&start=40&sa=N&fp=a2bb30ecf4f91972]http://www.google.com/#hl=en&q=bypassing+upload+file+type&start=40&sa=N&fp=a2bb30ecf4f91972[/url] [/li]
[li][url=http://blog.skeptikal.org/2009/11/adobe-responds-sort-of.html]http://blog.skeptikal.org/2009/11/adobe-responds-sort-of.html[/url] [/li]
[li][url=http://blog.insicdesigns.com/2009/01/secure-file-upload-in-php-web-applications/]http://blog.insicdesigns.com/2009/01/secure-file-upload-in-php-web-applications/[/url] [/li]
[li][url=http://perishablepress.com/press/2006/01/10/stupid-htaccess-tricks/]http://perishablepress.com/press/2006/01/10/stupid-htaccess-tricks/[/url] [/li]
[li][url=http://ex.ploit.net/f20/tricks-tips-bypassing-image-uploaders-t3hmadhatt3r-38/]http://ex.ploit.net/f20/tricks-tips-bypassing-image-uploaders-t3hmadhatt3r-38/[/url] [/li]
[li][url=http://www.ravenphpscripts.com/article2974.html]http://www.ravenphpscripts.com/article2974.html[/url] [/li]
[li][url=http://www.acunetix.com/cross-site-scripting/scanner.htm]http://www.acunetix.com/cross-site-scripting/scanner.htm[/url] [/li]
[li][url=http://www.vupen.com/english/advisories/2009/3634]http://www.vupen.com/english/advisories/2009/3634[/url] [/li]
[li][url=http://msdn.microsoft.com/en-us/library/aa478971.aspx]http://msdn.microsoft.com/en-us/library/aa478971.aspx[/url] [/li]
[li][url=http://dev.tangocms.org/issues/237]http://dev.tangocms.org/issues/237[/url] [/li]
[li][url=http://seclists.org/fulldisclosure/2006/Jun/508]http://seclists.org/fulldisclosure/2006/Jun/508[/url] [/li]
[li][url=http://www.gnucitizen.org/blog/cross-site-file-upload-attacks/]http://www.gnucitizen.org/blog/cross-site-file-upload-attacks/[/url] [/li]
[li][url=http://www.ipolicynetworks.com/technology/files/TikiWiki_jhot.php_Script_File_Upload_Security_Bypass_Vulnerability.html]http://www.ipolicynetworks.com/technology/files/TikiWiki_jhot.php_Script_File_Upload_Security_Bypass_Vulnerability.html[/url] [/li]
[li][url=http://shsc.info/FileUploadSecurity]http://shsc.info/FileUploadSecurity[/url] [/li]
[/list]<blockquote>LFI/RFI: </blockquote>[list]
[li][url=http://pastie.org/840199]http://pastie.org/840199[/url] [/li]
[li][url=http://websec.wordpress.com/2010/02/22/exploiting-php-file-inclusion-overview/]http://websec.wordpress.com/2010/02/22/exploiting-php-file-inclusion-overview/[/url] [/li]
[li][url=http://www.notsosecure.com/folder2/2010/08/20/lfi-code-exec-remote-root/?utm_source=twitterfeed&utm_medium=twitter]http://www.notsosecure.com/folder2/2010/08/20/lfi-code-exec-remote-root/?utm_source=twitterfeed&utm_medium=twitter[/url] [/li]
[li][url=http://labs.neohapsis.com/2008/07/21/local-file-inclusion-%E2%80%93-tricks-of-the-trade/]http://labs.neohapsis.com/2008/07/21/local-file-inclusion-%E2%80%93-tricks-of-the-trade/[/url] [/li]
[li][url=http://www.digininja.org/blog/when_all_you_can_do_is_read.php]http://www.digininja.org/blog/when_all_you_can_do_is_read.php[/url] [/li]
[/list]<blockquote>XSS: </blockquote>[list]
[li][url=http://www.infosecwriters.com/hhworld/hh8/csstut.htm]http://www.infosecwriters.com/hhworld/hh8/csstut.htm[/url] [/li]
[li][url=http://www.technicalinfo.net/papers/CSS.html]http://www.technicalinfo.net/papers/CSS.html[/url] [/li]
[li][url=http://msmvps.com/blogs/alunj/archive/2010/07/07/1773441.aspx]http://msmvps.com/blogs/alunj/archive/2010/07/07/1773441.aspx[/url] [/li]
[li][url=http://forum.intern0t.net/web-hacking-war-games/112-cross-site-scripting-attack-defense-guide.html]http://forum.intern0t.net/web-hacking-war-games/112-cross-site-scripting-attack-defense-guide.html[/url] [/li]
[li][url=https://media.blackhat.com/bh-eu-10/presentations/Lindsay_Nava/BlackHat-EU-2010-Lindsay-Nava-IE8-XSS-Filters-slides.pdf]https://media.blackhat.com/bh-eu-10/presentations/Lindsay_Nava/BlackHat-EU-2010-Lindsay-Nava-IE8-XSS-Filters-slides.pdf[/url] [/li]
[li][url=http://sirdarckcat.blogspot.com/2009/08/our-favorite-xss-filters-and-how-to.html]http://sirdarckcat.blogspot.com/2009/08/our-favorite-xss-filters-and-how-to.html[/url] [/li]
[li][url=http://www.securityaegis.com/filter-evasion-houdini-on-the-wire/]http://www.securityaegis.com/filter-evasion-houdini-on-the-wire/[/url] [/li]
[li][url=http://heideri.ch/jso/#javascript]http://heideri.ch/jso/#javascript[/url] [/li]
[li][url=http://www.reddit.com/r/xss/]http://www.reddit.com/r/xss/[/url] [/li]
[li][url=http://sla.ckers.org/forum/list.php?2]http://sla.ckers.org/forum/list.php?2[/url] [/li]
[/list]<blockquote>Coldfusion: </blockquote>[list]
[li][url=http://www.gnucitizen.org/blog/coldfusion-directory-traversal-faq-cve-2010-2861/]http://www.gnucitizen.org/blog/coldfusion-directory-traversal-faq-cve-2010-2861/[/url] [/li]
[li][url=http://zastita.com/02114/Attacking_ColdFusion..html]http://zastita.com/02114/Attacking_ColdFusion..html[/url] [/li]
[li][url=http://www.nosec.org/2010/0809/629.html]http://www.nosec.org/2010/0809/629.html[/url] [/li]
[li][url=http://h30507.www3.hp.com/t5/Following-the-White-Rabbit-A/Adobe-ColdFusion-s-Directory-Traversal-Disaster/ba-p/81964]http://h30507.www3.hp.com/t5/Following-the-White-Rabbit-A/Adobe-ColdFusion-s-Directory-Traversal-Disaster/ba-p/81964[/url] [/li]
[li][url=http://cfunited.com/2009/files/presentations/254_ShlomyGantz_August2009_HackProofingColdFusion.pdf]http://cfunited.com/2009/files/presentations/254_ShlomyGantz_August2009_HackProofingColdFusion.pdf[/url] [/li]
[/list]<blockquote>Sharepoint: </blockquote>[list]
[li][url=http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,6131.msg32678/#msg32678]http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,6131.msg32678/#msg32678[/url] [/li]
[/list]<blockquote>Lotus: </blockquote>[list]
[li][url=http://blog.ombrepixel.com/post/2009/05/06/Lotus-Notes/Domino-Security]http://blog.ombrepixel.com/post/2009/05/06/Lotus-Notes/Domino-Security[/url] [/li]
[li][url=http://seclists.org/pen-test/2002/Nov/43]http://seclists.org/pen-test/2002/Nov/43[/url] [/li]
[li][url=http://www.sectechno.com/2010/07/12/hacking-lotus-domino/?]http://www.sectechno.com/2010/07/12/hacking-lotus-domino/?[/url] [/li]
[/list]<blockquote>JBoss: </blockquote>[list]
[li][url=http://www.nruns.com/_downloads/Whitepaper-Hacking-jBoss-using-a-Browser.pdf]http://www.nruns.com/_downloads/Whitepaper-Hacking-jBoss-using-a-Browser.pdf[/url] [/li]
[li][url=http://blog.mindedsecurity.com/2010/04/good-bye-critical-jboss-0day.html]http://blog.mindedsecurity.com/2010/04/good-bye-critical-jboss-0day.html[/url] [/li]
[/list]<blockquote>VMWare Web: </blockquote>[list]
[li][url=http://www.metasploit.com/modules/auxiliary/scanner/http/vmware_server_dir_trav]http://www.metasploit.com/modules/auxiliary/scanner/http/vmware_server_dir_trav[/url] [/li]
[/list]<blockquote>Oracle App Servers: </blockquote>[list]
[li][url=http://www.hideaway.net/2007/07/hacking-oracle-application-servers.html]http://www.hideaway.net/2007/07/hacking-oracle-application-servers.html[/url] [/li]
[li][url=http://www.owasp.org/index.php/Testing_for_Oracle]http://www.owasp.org/index.php/Testing_for_Oracle[/url] [/li]
[li][url=http://www.ngssoftware.com/services/software-products/internet-security/orascan.aspx]http://www.ngssoftware.com/services/software-products/internet-security/orascan.aspx[/url] [/li]
[li][url=http://www.ngssoftware.com/services/software-products/Database-Security/NGSSQuirreLOracle.aspx]http://www.ngssoftware.com/services/software-products/Database-Security/NGSSQuirreLOracle.aspx[/url] [/li]
[li][url=http://www.ngssoftware.com/papers/hpoas.pdf]http://www.ngssoftware.com/papers/hpoas.pdf[/url] [/li]
[/list]<blockquote>SAP: </blockquote>[list]
[li][url=http://www.onapsis.com/research.html#bizploit]http://www.onapsis.com/research.html#bizploit[/url] [/li]
[li][url=http://marc.info/?l=john-users&m=121444075820309&w=2]http://marc.info/?l=john-users&m=121444075820309&w=2[/url] [/li]
[li][url=http://www.phenoelit-us.org/whatSAP/index.html]http://www.phenoelit-us.org/whatSAP/index.html[/url] [/li]
[/list]
« Última modificación: 24 de Octubre de 2014, 11:19:25 pm por papones »
Lease las normas del foro si es tan amable
http://www.auditoriaswireless.net/index.php/topic,3.0.html
Presentese  a la comunidad en el apartado del foro PRESENTACIONES

Desconectado papones

  • Administrador
  • Trade Count: (0)
  • *****
  • Mensajes: 8513
  • Colaboraciones +195/-5
  • Sexo: Masculino
  • La paciencia la madre de la ciencia
    • Locos Por El Wifi
Re:Pentest-bookmarks-Medios Hacker-herramientas blog distribuciones
« Respuesta #6 en: 25 de Abril de 2012, 10:12:29 pm »
Código: [Seleccionar]
Wireless:[list]
[li][url=http://code.google.com/p/pyrit/]http://code.google.com/p/pyrit/[/url] [/li]
[/list]
[hr]
Capture the Flag/Wargames:[list]
[li][url=http://intruded.net/]http://intruded.net/[/url] [/li]
[li][url=http://smashthestack.org/]http://smashthestack.org/[/url] [/li]
[li][url=http://flack.hkpco.kr/]http://flack.hkpco.kr/[/url] [/li]
[li][url=http://ctf.hcesperer.org/]http://ctf.hcesperer.org/[/url] [/li]
[li][url=http://ictf.cs.ucsb.edu/]http://ictf.cs.ucsb.edu/[/url] [/li]
[li][url=http://capture.thefl.ag/calendar/]http://capture.thefl.ag/calendar/[/url] [/li]
[/list]
[hr]
Conferences:[list]
[li][url=https://www.google.com/calendar/embed?src=pe2ikdbe6b841od6e26ato0asc@group.calendar.google.com&gsessionid=OK]https://www.google.com/calendar/embed?src=pe2ikdbe6b841od6e26ato0asc@group.calendar.google.com&gsessionid=OK[/url] [/li]
[/list]
[hr]
Misc/Unsorted:[list]
[li][url=http://www.ikkisoft.com/stuff/SMH_XSS.txt]http://www.ikkisoft.com/stuff/SMH_XSS.txt[/url] [/li]
[li][url=http://securestate.blogspot.com/2010/08/xfs-101-cross-frame-scripting-explained.html?utm_source=twitterfeed&utm_medium=twitter]http://securestate.blogspot.com/2010/08/xfs-101-cross-frame-scripting-explained.html?utm_source=twitterfeed&utm_medium=twitter[/url] [/li]
[li][url=http://whatthefuckismyinformationsecuritystrategy.com/]http://whatthefuckismyinformationsecuritystrategy.com/[/url] [/li]
[li][url=http://video.google.com/videoplay?docid=4379894308228900017&q=owasp#]http://video.google.com/videoplay?docid=4379894308228900017&q=owasp#[/url] [/li]
[li][url=http://video.google.com/videoplay?docid=4994651985041179755&ei=_1k4TKj-PI-cqAPioJnKDA&q=deepsec#]http://video.google.com/videoplay?docid=4994651985041179755&ei=_1k4TKj-PI-cqAPioJnKDA&q=deepsec#[/url] [/li]
[li][url=http://www.sensepost.com/blog/4552.html]http://www.sensepost.com/blog/4552.html[/url] [/li]
[li][url=http://blog.zenone.org/2009/03/pci-compliance-disable-sslv2-and-weak.html]http://blog.zenone.org/2009/03/pci-compliance-disable-sslv2-and-weak.html[/url] [/li]
[li][url=http://threatpost.com/en_us/blogs/hd-moore-metasploit-exploitation-and-art-pen-testing-040210]http://threatpost.com/en_us/blogs/hd-moore-metasploit-exploitation-and-art-pen-testing-040210[/url] [/li]
[li][url=http://carnal0wnage.attackresearch.com/node/410]http://carnal0wnage.attackresearch.com/node/410[/url] [/li]
[li][url=http://www.cs.ucsb.edu/%7Eadoupe/static/black-box-scanners-dimva2010.pdf]http://www.cs.ucsb.edu/~adoupe/static/black-box-scanners-dimva2010.pdf[/url] [/li]
[li][url=http://www.spy-hunter.com/Database_Pen_Testing_ISSA_March_25_V2.pdf]http://www.spy-hunter.com/Database_Pen_Testing_ISSA_March_25_V2.pdf[/url] [/li]
[li][url=http://perishablepress.com/press/2006/01/10/stupid-htaccess-tricks/]http://perishablepress.com/press/2006/01/10/stupid-htaccess-tricks/[/url][/li]
[/list]



     [color=limegreen][size=7]Se termino la lista [/size][/color] :cheesy: :cry: :cheesy:


     [color=orange][size=6][font=andale mono]FUENTE[/font][/size][/color]    [url=http://code.google.com/p/pentest-bookmarks/]http://code.google.com/p/pentest-bookmarks/[/url]
« Última modificación: 24 de Octubre de 2014, 11:19:43 pm por papones »
Lease las normas del foro si es tan amable
http://www.auditoriaswireless.net/index.php/topic,3.0.html
Presentese  a la comunidad en el apartado del foro PRESENTACIONES


Share me

Digg  Facebook  SlashDot  Delicious  Technorati  Twitter  Google  Yahoo
Smf

 

Dumpper All V.x.x

DUMPPER WPS PENTESTING