My Docs
My BlogPython Data StructuresRepoFamily-Promise-Docs
Copy of Web-Dev-Hub-Docs
Copy of Web-Dev-Hub-Docs
  • Home
  • Navigation
  • Tools
    • Tools
      • Docker
      • G-Cloud & Firebase
      • Heroku
    • Showcase
      • Utilities
      • Continued
        • Page 3:
    • Downloads
    • How To Configure Ubuntu
    • REPL.IT Compilations
      • Part 2
    • Past Notes
      • Command Line Reference
    • Git
    • JavaScript
      • Interview Problems
      • General JavaScript Notes
      • jQuery
      • NodeJS
        • Node argv
        • NPM
        • Express
          • ExpressJS Overview
          • Sequelize
      • Regex
      • React
        • React Examples:
        • Redux
        • Redux Docs
          • Redux Resources
        • React Notes
    • My Bash Commands
    • Resources
      • Hosted Resources
      • Everything
      • React Resources
  • Programming Languages
    • Programming Languages
      • File System
      • Basics
      • PSEUDO Programing Languages
        • HTML
      • CSS
      • List Of Programming Languages By Type
      • Tools-Of-The-Trade
        • Linux
        • Docker
      • Git
      • Python
        • Pydrive:
        • Practice
        • Pipenv
        • Untitled
      • Bash
        • SED
      • CHEATSHEETS
      • Java
      • Bash Script
        • SSH Cheatsheet
      • Html
      • Markdown
      • CSS
      • SCSS
      • C & C++
      • Ruby
      • SQL
        • PostgreSQL
    • What is a Programming Language?
  • Python
    • Python
    • Install PIP
  • JavaScript
    • JavaScript
      • Jquery
    • Writing Files
    • JS-Leetcode
  • Web Development Frameworks & Libraries
    • GRAPHQL
    • React
    • Jquery
      • Prac
    • GATSBY
      • Untitled
      • Building with Components
      • Plugins, Themes, & Starters
      • GraphQL Concepts
  • Productivity
    • Productivity
      • Awesome Productivity Tools for Back-to-School
  • Misc
    • Misc
      • Experiments
  • GitGateway
    • Links
    • Bookmarks
  • Websites
    • Websites
    • Not My Websites:
  • Backend
    • Backend
  • Networking
    • Networks
  • Resources
    • Resources
    • Video Resources
  • General Knowledge
    • General Knowledge
    • Knowledge Bank
  • Finance
    • Finance
    • Finance Reference
    • Financial Trends
  • Science & Tech (Innovation)
    • Science & Tech
    • Articles
  • Reading
    • Reading
  • Social Media & Trends
    • Trends In Web Dev
    • FB-Dev-Open Source
      • Content Publishing
    • IG-API
  • Docs
    • Docs
    • Refactoring Guide
  • Code Editors & Tools
    • Vscode
      • Vscode Docs
      • How To Speed Up Vscode
  • Cool Stuff
    • Cool Observable Notebooks
  • Server-Side
    • GraphQL
      • Intro
    • Rest VS GraphQl
    • REST-API
    • Public APIs
  • WEB_DEV_TOOLS
    • Web Dev Tools
    • Cloudinary
    • Postman
      • Creating an API
      • Trouble Shooting Postman
    • Netlify
      • Facebook Graph API
      • Pandoc
      • Graph API
      • Troubleshooting
      • Examples
      • HTTPS (SSL)
      • Open Authoring
      • Netlify CMS
      • Git Gateway
  • DS_ALGOS_BRAINTEASERS
    • A Quick Guide to Big-O Notation, Memoization, Tabulation, and Sorting Algorithms by Example
  • Free-Stuff
    • Free Stuff
  • Job-Search
    • Job Search
    • Outreach
  • General Comp Sci
    • Principles behind the Agile Manifesto
  • Blockchain & Crypto
    • Blockchain Basics
      • Basics:
  • Data Structures & Interviewing
    • Data Structures
  • REACT_REVISITED
    • Modern React with Redux
      • React-Projects
  • WEBDEV-Bootcamp-Notes
    • 🏫Lambda
      • 1.1 - User Interface and Git
      • Page 2
      • Page 1
      • Page 3
      • Page 4
      • Page 5
      • Page 6
      • Page 7
      • Page 8
      • Page 9
      • Page 10
      • Page 11
      • Page 12
      • Page 13
      • Page 14
      • Page 15
      • CS-Python-Notes
        • Python
  • testing
    • Testing:
      • Configure Jest for Testing JavaScript Applications
      • install, configure, and script Cypress for JavaScript web applications
      • Test React Components with Jest and `react-testing-library`
      • Use testing library to evaluate any framework...
  • Medium-articles
    • My Articles
      • Python For JS Developers
      • JavaScript Programmer
      • Awesome Web Development Youtube Video Archive
      • Bash Commands That Save Me Time and Frustration
      • Git-Tricks
      • scrap
      • Medium Article
      • Everything You Need To Know About Relational Databases, SQL, PostgreSQL and Sequelize To Build…
      • Machine Learner
      • Here’s the expanded list:
      • The Complete JavaScript Reference Guide
      • This is really cool!
      • Web Development Interview Part 3💻
      • Mutability And Reference VS Privative Types in JavaScript
      • React
      • Super Simple Intro To HTML
      • Introduction to React for Complete Beginners
      • Web Developer Resource List Part 2
      • Front End Interview Questions Part 2
      • A List Of Tools For Improvement
      • Github Repositories That Will Teach You How To Code For Free!
      • Libraries
      • Machine Learner
      • Here’s the expanded list:
      • The Complete JavaScript Reference Guide
  • 🖲️AI
    • Pytorch
      • Documentation
  • 🎙️Audio
    • Audio
  • Cheatsheets
    • Page 17
    • Page 16
Powered by GitBook
On this page
  1. Tools
  2. Resources

Everything

PreviousHosted ResourcesNextReact Resources

Last updated 3 years ago

CLI Tools [TOC]

Shells

:small_orange_diamond: - is an sh-compatible shell that incorporates useful features from the Korn shell and C shell. :small_orange_diamond: - is a shell designed for interactive use, although it is also a powerful scripting language. :small_orange_diamond: - is a very powerful cross-platform shell, suitable for a huge range of uses. :small_orange_diamond: - is a framework for using, developing and maintaining shell scripts and custom commands. :small_orange_diamond: - is the best framework for managing your Zsh configuration. :small_orange_diamond: - the Fishshell framework. :small_orange_diamond: - the cross-shell prompt written in Rust. :small_orange_diamond: - is a fast reimplementation of Powerlevel9k ZSH theme.

Shell plugins

:small_orange_diamond: - tracks the folder you use the most and allow you to jump, without having to type the whole path. :small_orange_diamond: - is a general-purpose command-line fuzzy finder. :small_orange_diamond: - Fish-like autosuggestions for Zsh. :small_orange_diamond: - Fish shell like syntax highlighting for Zsh. :small_orange_diamond: - A list of frameworks, plugins, themes and tutorials for ZSH.

Managers

:small_orange_diamond: - is a visual file manager, licensed under GNU General Public License. :small_orange_diamond: - is a VIM-inspired filemanager for the console. :small_orange_diamond: - is a tiny, lightning fast, feature-packed file manager. :small_orange_diamond: - is a full-screen window manager that multiplexes a physical terminal. :small_orange_diamond: - is a terminal multiplexer, lets you switch easily between several programs in one terminal. :small_orange_diamond: - is a tool to set comfortable and easy to use functionality, clustering and synchronizing tmux-sessions.

Text editors

:small_orange_diamond: - is one of the most common text editors on Unix. :small_orange_diamond: - is a highly configurable text editor. :small_orange_diamond: - is an extensible, customizable, free/libre text editor, and more. :small_orange_diamond: - is a modern and intuitive terminal-based text editor. :small_orange_diamond: - is a free open source, powerful, extensible and usable code editor. :small_orange_diamond: - a community-driven Emacs distribution. :small_orange_diamond: - a community-driven vim distribution.

Files and directories

:small_orange_diamond: - is a simple, fast and user-friendly alternative to find. :small_orange_diamond: - is an easy to use, fast disk usage analyzer.

Network

:small_orange_diamond: - is an SSH and telnet client, developed originally by Simon Tatham. :small_orange_diamond: - is a SSH wrapper designed to keep a SSH session alive over a volatile connection. :small_orange_diamond: - enables mouse-scrolling and tmux commands inside the SSH session. :small_orange_diamond: - is a free and open source (license) utility for network discovery and security auditing. :small_orange_diamond: - is a fast single packet network scanner designed for Internet-wide network surveys. :small_orange_diamond: - to find all open ports faster than Nmap. :small_orange_diamond: - is the fastest Internet port scanner, spews SYN packets asynchronously. :small_orange_diamond: - is a faster and more efficient stateless SYN scanner and banner grabber. :small_orange_diamond: - is a command-line oriented TCP/IP packet assembler/analyzer. :small_orange_diamond: - is a tool that combines the functionality of the 'traceroute' and 'ping' programs in a single tool. :small_orange_diamond: - utility which combines the functions of the different network probes in one diagnostic tool. :small_orange_diamond: - utility which reads and writes data across network connections, using the TCP/IP protocol. :small_orange_diamond: - utility which transfers data between two objects. :small_orange_diamond: - is a powerful command-line packet analyzer. :small_orange_diamond: - is a tool that allows us to dump and analyze network traffic (wireshark cli). :small_orange_diamond: - is a simple terminal user-interface for tshark. :small_orange_diamond: - is like GNU grep applied to the network layer. :small_orange_diamond: - is a Swiss army knife for your daily Linux network plumbing if you will. :small_orange_diamond: - dump unix domain socket traffic. :small_orange_diamond: - is a packet capture solution which aims to quickly spool all packets to disk. :small_orange_diamond: - visualize packets in TUI. :small_orange_diamond: - is a monitoring and debugging tool to capture networking related statistics and prepare them visually. :small_orange_diamond: - is a console-based network monitoring program for Linux that displays information about IP traffic. :small_orange_diamond: - is a network traffic monitor for Linux and BSD. :small_orange_diamond: - is a tool for active measurements of the maximum achievable bandwidth on IP networks. :small_orange_diamond: - is a Network Performance Measurement Tool for TCP, UDP & HTTP. :small_orange_diamond: - is a Linux CLI based Ethernet and MPLS traffic testing tool. :small_orange_diamond: - is a IP address lookup service. :small_orange_diamond: - packet manipulation CLI tool; craft and inject packets of several protocols. :small_orange_diamond: - a mid-level packet manipulation library for Ruby. :small_orange_diamond: - packet manipulation library; forge, send, decode, capture packets of a wide number of protocols. :small_orange_diamond: - is a collection of Python classes for working with network protocols. :small_orange_diamond: - is a tool for SSH server auditing. :small_orange_diamond: - is a lightweight multi-protocol & multi-source command-line download utility. :small_orange_diamond: - observe the path of packets through the iptables chains. :small_orange_diamond: - a highly configurable tool to check for whatever you like against any number of hosts.

Network (DNS)

:small_orange_diamond: - is a DNS diagnostics and performance measurement tools. :small_orange_diamond: - is a DNS reconnaissance tool for locating non-contiguous IP space. :small_orange_diamond: - is a subdomain discovery tool that discovers valid subdomains for websites. :small_orange_diamond: - is a fast subdomains enumeration tool for penetration testers. :small_orange_diamond: - is tool that obtains subdomain names by scraping data sources, crawling web archives, and more. :small_orange_diamond: - provides personalized DNS server recommendations based on your browsing history. :small_orange_diamond: - is a high-performance DNS stub resolver for bulk lookups and reconnaissance. :small_orange_diamond: - is a tool to enumerate subdomains on a target domain through a wordlist. :small_orange_diamond: - DNS performance testing tools. :small_orange_diamond: - a flexible DNS proxy, with support for encrypted DNS protocols. :small_orange_diamond: - API client providing access to passive DNS database systems. :small_orange_diamond: - fast dns proxy, built to black-hole internet advertisements and malware servers.

Network (HTTP)

GUI Tools [TOC]

Web Tools [TOC]

Systems/Services [TOC]

Networks [TOC]

Containers/Orchestration [TOC]

Manuals/Howtos/Tutorials [TOC]

Inspiring Lists [TOC]

Blogs/Podcasts/Videos [TOC]

Hacking/Penetration Testing [TOC]

Your daily knowledge and news [TOC]

Other Cheat Sheets [TOC]

Build your own DNS Servers

Build your own Certificate Authority

Build your own System/Virtual Machine

DNS Servers list (privacy)

IP

URL

84.200.69.80

94.247.43.254

64.6.64.6

89.233.43.71

1.1.1.1

94.130.110.185

TOP Browser extensions

Extension name

Description

IPvFoo

Display the server IP address and HTTPS information across all page elements.

FoxyProxy

Simplifies configuring browsers to access proxy-servers.

HTTPS Everywhere

Automatically use HTTPS security on many sites.

uMatrix

Point & click to forbid/allow any class of requests made by your browser.

uBlock Origin

An efficient blocker: easy on memory and CPU footprint.

Session Buddy

Manage browser tabs and bookmarks with ease.

SuperSorter

Sort bookmarks recursively, delete duplicates, merge folders, and more.

Clear Cache

Clear your cache and browsing data.

d3coder

Encoding/Decoding plugin for various types of encoding.

Web Developer

Adds a toolbar button with various web developer tools.

ThreatPinch Lookup

Add threat intelligence hover tool tips.

TOP Burp extensions

Extension name

Description

Active Scan++

Extends Burp's active and passive scanning capabilities.

Autorize

Automatically detects authorization enforcement.

AuthMatrix

A simple matrix grid to define the desired levels of access privilege.

Logger++

Logs requests and responses for all Burp tools in a sortable table.

Bypass WAF

Adds headers useful for bypassing some WAF devices.

JSON Beautifier

Beautifies JSON content in the HTTP message viewer.

JSON Web Tokens

Enables Burp to decode and manipulate JSON web tokens.

CSP Auditor

Displays CSP headers for responses, and passively reports CSP weaknesses.

CSP-Bypass

Passively scans for CSP headers that contain known bypasses.

Hackvertor

Converts data using a tag-based configuration to apply various encoding.

HTML5 Auditor

Scans for usage of risky HTML5 features.

Software Vulnerability Scanner

Vulnerability scanner based on vulners.com audit API.

Turbo Intruder

Is a powerful bruteforcing tool.

Upload Scanner

Upload a number of different file types, laced with different forms of payload.

Hack Mozilla Firefox address bar

In Firefox's address bar, you can limit results by typing special characters before or after your term:

  • ^ - for matches in your browsing history

  • * - for matches in your bookmarks.

  • % - for matches in your currently open tabs.

  • # - for matches in page titles.

  • @ - for matches in web addresses.

Chrome hidden commands

  • chrome://chrome-urls - list of all commands

  • chrome://flags - enable experiments and development features

  • chrome://interstitials - errors and warnings

  • chrome://net-internals - network internals (events, dns, cache)

  • chrome://network-errors - network errors

  • chrome://net-export - start logging future network activity to a file

  • chrome://safe-browsing - safe browsing options

  • chrome://user-actions - record all user actions

  • chrome://restart - restart chrome

  • chrome://dino - ERR_INTERNET_DISCONNECTED...

  • cache:<website-address> - view the cached version of the web page

IP addresses can be shortened by dropping the zeroes:

http://1.0.0.1 → http://1.1
http://127.0.0.1 → http://127.1
http://192.168.0.1 → http://192.168.1

http://0xC0A80001 or http://3232235521 → 192.168.0.1
http://192.168.257 → 192.168.1.1
http://192.168.516 → 192.168.2.4

This bypasses WAF filters for SSRF, open-redirect, etc where any IP as input gets blacklisted.

Hashing

Symmetric encryption

Asymmetric encryption

Encoding

One-liners [TOC]

Table of Contents

  • terminal

  • busybox

  • mount

  • fuser

  • lsof

  • ps

  • top

  • vmstat

  • iostat

  • strace

  • kill

  • find

  • diff

  • vimdiff

  • tail

  • cpulimit

  • pwdx

  • tr

  • chmod

  • who

  • last

  • screen

  • script

  • du

  • inotifywait

  • openssl

  • secure-delete

  • dd

  • gpg

  • system-other

  • curl

  • httpie

  • ssh

  • linux-dev

  • tcpdump

  • tcpick

  • ngrep

  • hping3

  • nmap

  • netcat

  • socat

  • p0f

  • gnutls-cli

  • netstat

  • rsync

  • host

  • dig

  • certbot

  • network-other

  • git

  • awk

  • sed

  • grep

  • perl

Reload shell without exit

exec $SHELL -l

Close shell keeping all subprocess running

disown -a && exit

Exit without saving shell history

kill -9 $$
unset HISTFILE && exit

Perform a branching conditional

true && echo success
false || echo failed

Pipe stdout and stderr to separate commands

some_command > >(/bin/cmd_for_stdout) 2> >(/bin/cmd_for_stderr)

Redirect stdout and stderr each to separate files and print both to the screen

(some_command 2>&1 1>&3 | tee errorlog ) 3>&1 1>&2 | tee stdoutlog

List of commands you use most often

history | \
awk '{CMD[$2]++;count++;}END { for (a in CMD)print CMD[a] " " CMD[a]/count*100 "% " a;}' | \
grep -v "./" | \
column -c3 -s " " -t | \
sort -nr | nl |  head -n 20

Sterilize bash history

function sterile() {

  history | awk '$2 != "history" { $1=""; print $0 }' | egrep -vi "\
curl\b+.*(-E|--cert)\b+.*\b*|\
curl\b+.*--pass\b+.*\b*|\
curl\b+.*(-U|--proxy-user).*:.*\b*|\
curl\b+.*(-u|--user).*:.*\b*
.*(-H|--header).*(token|auth.*)\b+.*|\
wget\b+.*--.*password\b+.*\b*|\
http.?://.+:.+@.*\
" > $HOME/histbuff; history -r $HOME/histbuff;

}

export PROMPT_COMMAND="sterile"

Quickly backup a file

cp filename{,.orig}

Empty a file (truncate to 0 size)

>filename

Delete all files in a folder that don't match a certain file extension

rm !(*.foo|*.bar|*.baz)

Pass multi-line string to a file

# cat  >filename ... - overwrite the file
# cat >>filename ... - append to a file
cat > filename << __EOF__
data data data
__EOF__

Edit a file on a remote host using vim

vim scp://user@host//etc/fstab

Create a directory and change into it at the same time

mkd() { mkdir -p "$@" && cd "$@"; }

Convert uppercase files to lowercase files

rename 'y/A-Z/a-z/' *

Print a row of characters across the terminal

printf "%`tput cols`s" | tr ' ' '#'

Show shell history without line numbers

history | cut -c 8-
fc -l -n 1 | sed 's/^\s*//'

Run command(s) after exit session

cat > /etc/profile << __EOF__
_after_logout() {

  username=$(whoami)

  for _pid in $(ps afx | grep sshd | grep "$username" | awk '{print $1}') ; do

    kill -9 $_pid

  done

}
trap _after_logout EXIT
__EOF__

Generate a sequence of numbers

for ((i=1; i<=10; i+=2)) ; do echo $i ; done
# alternative: seq 1 2 10

for ((i=5; i<=10; ++i)) ; do printf '%02d\n' $i ; done
# alternative: seq -w 5 10

for i in {1..10} ; do echo $i ; done

Simple Bash filewatching

unset MAIL; export MAILCHECK=1; export MAILPATH='$FILE_TO_WATCH?$MESSAGE'

Static HTTP web server

busybox httpd -p $PORT -h $HOME [-c httpd.conf]

Mount a temporary ram partition

mount -t tmpfs tmpfs /mnt -o size=64M
  • -t - filesystem type

  • -o - mount options

Remount a filesystem as read/write

mount -o remount,rw /

Show which processes use the files/directories

fuser /var/log/daemon.log
fuser -v /home/supervisor

Kills a process that is locking a file

fuser -ki filename
  • -i - interactive option

Kills a process that is locking a file with specific signal

fuser -k -HUP filename
  • --list-signals - list available signal names

Show what PID is listening on specific port

fuser -v 53/udp

Show all processes using the named filesystems or block device

fuser -mv /var/www

Show process that use internet connection at the moment

lsof -P -i -n

Show process that use specific port number

lsof -i tcp:443

Lists all listening ports together with the PID of the associated process

lsof -Pan -i tcp -i udp

List all open ports and their owning executables

lsof -i -P | grep -i "listen"

Show all open ports

lsof -Pnl -i

Show open ports (LISTEN)

lsof -Pni4 | grep LISTEN | column -t

List all files opened by a particular command

lsof -c "process"

View user activity per directory

lsof -u username -a +D /etc

Show 10 largest open files

lsof / | \
awk '{ if($7 > 1048576) print $7/1048576 "MB" " " $9 " " $1 }' | \
sort -n -u | tail | column -t

Show current working directory of a process

lsof -p <PID> | grep cwd

Show a 4-way scrollable process tree with full details

ps awwfux | less -S

Processes per user counter

ps hax -o user | sort | uniq -c | sort -r

Show all processes by name with main header

ps -lfC nginx

Find files that have been modified on your system in the past 60 minutes

find / -mmin 60 -type f

Find all files larger than 20M

find / -type f -size +20M

Find duplicate files (based on MD5 hash)

find -type f -exec md5sum '{}' ';' | sort | uniq --all-repeated=separate -w 33

Change permission only for files

cd /var/www/site && find . -type f -exec chmod 766 {} \;
cd /var/www/site && find . -type f -exec chmod 664 {} +

Change permission only for directories

cd /var/www/site && find . -type d -exec chmod g+x {} \;
cd /var/www/site && find . -type d -exec chmod g+rwx {} +

Find files and directories for specific user/group

# User:
find . -user <username> -print
find /etc -type f -user <username> -name "*.conf"

# Group:
find /opt -group <group>
find /etc -type f -group <group> -iname "*.conf"

Find files and directories for all without specific user/group

# User:
find . \! -user <username> -print

# Group:
find . \! -group <group>

Looking for files/directories that only have certain permission

# User
find . -user <username> -perm -u+rw # -rw-r--r--
find /home -user $(whoami) -perm 777 # -rwxrwxrwx

# Group:
find /home -type d -group <group> -perm 755 # -rwxr-xr-x

Delete older files than 60 days

find . -type f -mtime +60 -delete

Recursively remove all empty sub-directories from a directory

find . -depth  -type d  -empty -exec rmdir {} \;

How to find all hard links to a file

find </path/to/dir> -xdev -samefile filename

Recursively find the latest modified files

find . -type f -exec stat --format '%Y :%y %n' "{}" \; | sort -nr | cut -d: -f2- | head

Recursively find/replace of a string with sed

find . -not -path '*/\.git*' -type f -print0 | xargs -0 sed -i 's/foo/bar/g'

Recursively find/replace of a string in directories and file names

find . -depth -name '*test*' -execdir bash -c 'mv -v "$1" "${1//foo/bar}"' _ {} \;

Recursively find suid executables

find / \( -perm -4000 -o -perm -2000 \) -type f -exec ls -la {} \;

Use top to monitor only all processes with the specific string

top -p $(pgrep -d , <str>)
  • <str> - process containing string (eg. nginx, worker)


Show current system utilization (fields in kilobytes)

vmstat 2 20 -t -w
  • 2 - number of times with a defined time interval (delay)

  • 20 - each execution of the command (count)

  • -t - show timestamp

  • -w - wide output

  • -S M - output of the fields in megabytes instead of kilobytes

Show current system utilization will get refreshed every 5 seconds

vmstat 5 -w

Display report a summary of disk operations

vmstat -D

Display report of event counters and memory stats

vmstat -s

Display report about kernel objects stored in slab layer cache

vmstat -m

Show information about the CPU usage, and I/O statistics about all the partitions

iostat 2 10 -t -m
  • 2 - number of times with a defined time interval (delay)

  • 10 - each execution of the command (count)

  • -t - show timestamp

  • -m - fields in megabytes (-k - in kilobytes, default)

Show information only about the CPU utilization

iostat 2 10 -t -m -c

Show information only about the disk utilization

iostat 2 10 -t -m -d

Show information only about the LVM utilization

iostat -N

Track with child processes

# 1)
strace -f -p $(pidof glusterfsd)

# 2)
strace -f $(pidof php-fpm | sed 's/\([0-9]*\)/\-p \1/g')

Track process with 30 seconds limit

timeout 30 strace $(< /var/run/zabbix/zabbix_agentd.pid)

Track processes and redirect output to a file

ps auxw | grep '[a]pache' | awk '{print " -p " $2}' | \
xargs strace -o /tmp/strace-apache-proc.out

Track with print time spent in each syscall and limit length of print strings

ps auxw | grep '[i]init_policy' | awk '{print " -p " $2}' | \
xargs strace -f -e trace=network -T -s 10000

Track the open request of a network port

strace -f -e trace=bind nc -l 80

Track the open request of a network port (show TCP/UDP)

strace -f -e trace=network nc -lu 80

Kill a process running on port

kill -9 $(lsof -i :<port> | awk '{l=$2} END {print l}')

Compare two directory trees

diff <(cd directory1 && find | sort) <(cd directory2 && find | sort)

Compare output of two commands

diff <(cat /etc/passwd) <(cut -f2 /etc/passwd)

Highlight the exact differences, based on characters and words

vimdiff file1 file2

Compare two JSON files

vimdiff <(jq -S . A.json) <(jq -S . B.json)

Compare Hex dump

d(){ vimdiff <(f $1) <(f $2);};f(){ hexdump -C $1|cut -d' ' -f3-|tr -s ' ';}; d ~/bin1 ~/bin2

diffchar

Click F7 to switch between diff modes

Usefull vimdiff commands:

  • qa to exit all windows

  • :vertical resize 70 to resize window

  • set window width Ctrl+W [N columns]+(Shift+)<\>


Annotate tail -f with timestamps

tail -f file | while read ; do echo "$(date +%T.%N) $REPLY" ; done

Analyse an Apache access log for the most common IP addresses

tail -10000 access_log | awk '{print $1}' | sort | uniq -c | sort -n | tail

Analyse web server log and show only 5xx http codes

tail -n 100 -f /path/to/logfile | grep "HTTP/[1-2].[0-1]\" [5]"

System backup with exclude specific directories

cd /
tar -czvpf /mnt/system$(date +%d%m%Y%s).tgz --directory=/ \
--exclude=proc/* --exclude=sys/* --exclude=dev/* --exclude=mnt/* .

System backup with exclude specific directories (pigz)

cd /
tar cvpf /backup/snapshot-$(date +%d%m%Y%s).tgz --directory=/ \
--exclude=proc/* --exclude=sys/* --exclude=dev/* \
--exclude=mnt/* --exclude=tmp/* --use-compress-program=pigz .

System backup to file

dump -y -u -f /backup/system$(date +%d%m%Y%s).lzo /

Restore system from lzo file

cd /
restore -rf /backup/system$(date +%d%m%Y%s).lzo

Limit the cpu usage of a process

cpulimit -p pid -l 50

Show current working directory of a process

pwdx <pid>

Start a command on only one CPU core

taskset -c 0 <command>

Show directories in the PATH, one per line

tr : '\n' <<<$PATH

Remove executable bit from all files in the current directory

chmod -R -x+X *

Restore permission for /bin/chmod

# 1:
cp /bin/ls chmod.01
cp /bin/chmod chmod.01
./chmod.01 700 file

# 2:
/bin/busybox chmod 0700 /bin/chmod

# 3:
setfacl --set u::rwx,g::---,o::--- /bin/chmod

Find last reboot time

who -b

Detect a user sudo-su'd into the current shell

[[ $(who -m | awk '{ print $1 }') == $(whoami) ]] || echo "You are su-ed to $(whoami)"

Was the last reboot a panic?

(last -x -f $(ls -1t /var/log/wtmp* | head -2 | tail -1); last -x -f /var/log/wtmp) | \
grep -A1 reboot | head -2 | grep -q shutdown && echo "Expected reboot" || echo "Panic reboot"

Start screen in detached mode

screen -d -m <command>

Attach to an existing screen session

screen -r -d <pid>

Record and replay terminal session

### Record session
# 1)
script -t 2>~/session.time -a ~/session.log

# 2)
script --timing=session.time session.log

### Replay session
scriptreplay --timing=session.time session.log

Show 20 biggest directories with 'K M G'

du | \
sort -r -n | \
awk '{split("K M G",v); s=1; while($1>1024){$1/=1024; s++} print int($1)" "v[s]"\t"$2}' | \
head -n 20

Init tool everytime a file in a directory is modified

while true ; do inotifywait -r -e MODIFY dir/ && ls dir/ ; done;

Testing connection to the remote host

echo | openssl s_client -connect google.com:443 -showcerts

Testing connection to the remote host (debug mode)

echo | openssl s_client -connect google.com:443 -showcerts -tlsextdebug -status

Testing connection to the remote host (with SNI support)

echo | openssl s_client -showcerts -servername google.com -connect google.com:443

Testing connection to the remote host with specific ssl version

openssl s_client -tls1_2 -connect google.com:443

Testing connection to the remote host with specific ssl cipher

openssl s_client -cipher 'AES128-SHA' -connect google.com:443

Verify 0-RTT

_host="example.com"

cat > req.in << __EOF__
HEAD / HTTP/1.1
Host: $_host
Connection: close
__EOF__

openssl s_client -connect ${_host}:443 -tls1_3 -sess_out session.pem -ign_eof < req.in
openssl s_client -connect ${_host}:443 -tls1_3 -sess_in session.pem -early_data req.in

Generate private key without passphrase

# _len: 2048, 4096
( _fd="private.key" ; _len="2048" ; \
openssl genrsa -out ${_fd} ${_len} )

Generate private key with passphrase

# _ciph: des3, aes128, aes256
# _len: 2048, 4096
( _ciph="aes128" ; _fd="private.key" ; _len="2048" ; \
openssl genrsa -${_ciph} -out ${_fd} ${_len} )

Remove passphrase from private key

( _fd="private.key" ; _fd_unp="private_unp.key" ; \
openssl rsa -in ${_fd} -out ${_fd_unp} )

Encrypt existing private key with a passphrase

# _ciph: des3, aes128, aes256
( _ciph="aes128" ; _fd="private.key" ; _fd_pass="private_pass.key" ; \
openssl rsa -${_ciph} -in ${_fd} -out ${_fd_pass}

Check private key

( _fd="private.key" ; \
openssl rsa -check -in ${_fd} )

Get public key from private key

( _fd="private.key" ; _fd_pub="public.key" ; \
openssl rsa -pubout -in ${_fd} -out ${_fd_pub} )

Generate private key and CSR

( _fd="private.key" ; _fd_csr="request.csr" ; _len="2048" ; \
openssl req -out ${_fd_csr} -new -newkey rsa:${_len} -nodes -keyout ${_fd} )

Generate CSR

( _fd="private.key" ; _fd_csr="request.csr" ; \
openssl req -out ${_fd_csr} -new -key ${_fd} )

Generate CSR (metadata from existing certificate)

Where private.key is the existing private key. As you can see you do not generate this CSR from your certificate (public key). Also you do not generate the "same" CSR, just a new one to request a new certificate.

( _fd="private.key" ; _fd_csr="request.csr" ; _fd_crt="cert.crt" ; \
openssl x509 -x509toreq -in ${_fd_crt} -out ${_fd_csr} -signkey ${_fd} )

Generate CSR with -config param

( _fd="private.key" ; _fd_csr="request.csr" ; \
openssl req -new -sha256 -key ${_fd} -out ${_fd_csr} \
-config <(
cat << __EOF__
[req]
default_bits        = 2048
default_md          = sha256
prompt              = no
distinguished_name  = dn
req_extensions      = req_ext

[ dn ]
C   = "<two-letter ISO abbreviation for your country>"
ST  = "<state or province where your organisation is legally located>"
L   = "<city where your organisation is legally located>"
O   = "<legal name of your organisation>"
OU  = "<section of the organisation>"
CN  = "<fully qualified domain name>"

[ req_ext ]
subjectAltName = @alt_names

[ alt_names ]
DNS.1 = <fully qualified domain name>
DNS.2 = <next domain>
DNS.3 = <next domain>
__EOF__
))

Other values in [ dn ]:

countryName            = "DE"                     # C=
stateOrProvinceName    = "Hessen"                 # ST=
localityName           = "Keller"                 # L=
postalCode             = "424242"                 # L/postalcode=
postalAddress          = "Keller"                 # L/postaladdress=
streetAddress          = "Crater 1621"            # L/street=
organizationName       = "apfelboymschule"        # O=
organizationalUnitName = "IT Department"          # OU=
commonName             = "example.com"            # CN=
emailAddress           = "webmaster@example.com"  # CN/emailAddress=

Example of oids (you'll probably also have to make OpenSSL know about the new fields required for EV by adding the following under [new_oids]):

[req]
...
oid_section         = new_oids

[ new_oids ]
postalCode = 2.5.4.17
streetAddress = 2.5.4.9

Full example:

( _fd="private.key" ; _fd_csr="request.csr" ; \
openssl req -new -sha256 -key ${_fd} -out ${_fd_csr} \
-config <(
cat << __EOF__
[req]
default_bits        = 2048
default_md          = sha256
prompt              = no
distinguished_name  = dn
req_extensions      = req_ext
oid_section         = new_oids

[ new_oids ]
serialNumber = 2.5.4.5
streetAddress = 2.5.4.9
postalCode = 2.5.4.17
businessCategory = 2.5.4.15

[ dn ]
serialNumber=00001111
businessCategory=Private Organization
jurisdictionC=DE
C=DE
ST=Hessen
L=Keller
postalCode=424242
streetAddress=Crater 1621
O=AV Company
OU=IT
CN=example.com

[ req_ext ]
subjectAltName = @alt_names

[ alt_names ]
DNS.1 = example.com
__EOF__
))

For more information please look at these great explanations:

List available EC curves

openssl ecparam -list_curves

Print ECDSA private and public keys

( _fd="private.key" ; \
openssl ec -in ${_fd} -noout -text )

# For x25519 only extracting public key
( _fd="private.key" ; _fd_pub="public.key" ; \
openssl pkey -in ${_fd} -pubout -out ${_fd_pub} )

Generate ECDSA private key

# _curve: prime256v1, secp521r1, secp384r1
( _fd="private.key" ; _curve="prime256v1" ; \
openssl ecparam -out ${_fd} -name ${_curve} -genkey )

# _curve: X25519
( _fd="private.key" ; _curve="x25519" ; \
openssl genpkey -algorithm ${_curve} -out ${_fd} )

Generate private key and CSR (ECC)

# _curve: prime256v1, secp521r1, secp384r1
( _fd="domain.com.key" ; _fd_csr="domain.com.csr" ; _curve="prime256v1" ; \
openssl ecparam -out ${_fd} -name ${_curve} -genkey ; \
openssl req -new -key ${_fd} -out ${_fd_csr} -sha256 )

Generate self-signed certificate

# _len: 2048, 4096
( _fd="domain.key" ; _fd_out="domain.crt" ; _len="2048" ; _days="365" ; \
openssl req -newkey rsa:${_len} -nodes \
-keyout ${_fd} -x509 -days ${_days} -out ${_fd_out} )

Generate self-signed certificate from existing private key

# _len: 2048, 4096
( _fd="domain.key" ; _fd_out="domain.crt" ; _days="365" ; \
openssl req -key ${_fd} -nodes \
-x509 -days ${_days} -out ${_fd_out} )

Generate self-signed certificate from existing private key and csr

# _len: 2048, 4096
( _fd="domain.key" ; _fd_csr="domain.csr" ; _fd_out="domain.crt" ; _days="365" ; \
openssl x509 -signkey ${_fd} -nodes \
-in ${_fd_csr} -req -days ${_days} -out ${_fd_out} )

Generate DH public parameters

( _dh_size="2048" ; \
openssl dhparam -out /etc/nginx/ssl/dhparam_${_dh_size}.pem "$_dh_size" )

Display DH public parameters

openssl pkeyparam -in dhparam.pem -text

Extract private key from pfx

( _fd_pfx="cert.pfx" ; _fd_key="key.pem" ; \
openssl pkcs12 -in ${_fd_pfx} -nocerts -nodes -out ${_fd_key} )

Extract private key and certs from pfx

( _fd_pfx="cert.pfx" ; _fd_pem="key_certs.pem" ; \
openssl pkcs12 -in ${_fd_pfx} -nodes -out ${_fd_pem} )

Extract certs from p7b

# PKCS#7 file doesn't include private keys.
( _fd_p7b="cert.p7b" ; _fd_pem="cert.pem" ; \
openssl pkcs7 -inform DER -outform PEM -in ${_fd_p7b} -print_certs > ${_fd_pem})
# or:
openssl pkcs7 -print_certs -in -in ${_fd_p7b} -out ${_fd_pem})

Convert DER to PEM

( _fd_der="cert.crt" ; _fd_pem="cert.pem" ; \
openssl x509 -in ${_fd_der} -inform der -outform pem -out ${_fd_pem} )

Convert PEM to DER

( _fd_der="cert.crt" ; _fd_pem="cert.pem" ; \
openssl x509 -in ${_fd_pem} -outform der -out ${_fd_der} )

Verification of the private key

( _fd="private.key" ; \
openssl rsa -noout -text -in ${_fd} )

Verification of the public key

# 1)
( _fd="public.key" ; \
openssl pkey -noout -text -pubin -in ${_fd} )

# 2)
( _fd="private.key" ; \
openssl rsa -inform PEM -noout -in ${_fd} &> /dev/null ; \
if [ $? = 0 ] ; then echo -en "OK\n" ; fi )

Verification of the certificate

( _fd="certificate.crt" ; # format: pem, cer, crt \
openssl x509 -noout -text -in ${_fd} )

Verification of the CSR

( _fd_csr="request.csr" ; \
openssl req -text -noout -in ${_fd_csr} )

Check the private key and the certificate are match

(openssl rsa -noout -modulus -in private.key | openssl md5 ; \
openssl x509 -noout -modulus -in certificate.crt | openssl md5) | uniq

Check the private key and the CSR are match

(openssl rsa -noout -modulus -in private.key | openssl md5 ; \
openssl req -noout -modulus -in request.csr | openssl md5) | uniq

Secure delete with shred

shred -vfuz -n 10 file
shred --verbose --random-source=/dev/urandom -n 1 /dev/sda

Secure delete with scrub

scrub -p dod /dev/sda
scrub -p dod -r file

Secure delete with badblocks

badblocks -s -w -t random -v /dev/sda
badblocks -c 10240 -s -w -t random -v /dev/sda

Secure delete with secure-delete

srm -vz /tmp/file
sfill -vz /local
sdmem -v
swapoff /dev/sda5 && sswap -vz /dev/sda5

Show dd status every so often

dd <dd_params> status=progress
watch --interval 5 killall -USR1 dd

Redirect output to a file with dd

echo "string" | dd of=filename

Export public key

gpg --export --armor "<username>" > username.pkey
  • --export - export all keys from all keyrings or specific key

  • -a|--armor - create ASCII armored output

Encrypt file

gpg -e -r "<username>" dump.sql
  • -e|--encrypt - encrypt data

  • -r|--recipient - encrypt for specific

Decrypt file

gpg -o dump.sql -d dump.sql.gpg
  • -o|--output - use as output file

  • -d|--decrypt - decrypt data (default)

Search recipient

gpg --keyserver hkp://keyserver.ubuntu.com --search-keys "<username>"
  • --keyserver - set specific key server

  • --search-keys - search for keys on a key server

List all of the packets in an encrypted file

gpg --batch --list-packets archive.gpg
gpg2 --batch --list-packets archive.gpg

Reboot system from init

exec /sbin/init 6

Init system from single user mode

exec /sbin/init

Show current working directory of a process

readlink -f /proc/<PID>/cwd

Show actual pathname of the executed command

readlink -f /proc/<PID>/exe
curl -Iks https://www.google.com
  • -I - show response headers only

  • -k - insecure connection when using ssl

  • -s - silent mode (not display body)

curl -Iks --location -X GET -A "x-agent" https://www.google.com
  • --location - follow redirects

  • -X - set method

  • -A - set user-agent

curl -Iks --location -X GET -A "x-agent" --proxy http://127.0.0.1:16379 https://www.google.com
  • --proxy [socks5://|http://] - set proxy server

curl -o file.pdf -C - https://example.com/Aiju2goo0Ja2.pdf
  • -o - write output to file

  • -C - resume the transfer

Find your external IP address (external services)

curl ipinfo.io
curl ipinfo.io/ip
curl icanhazip.com
curl ifconfig.me/ip ; echo

Repeat URL request

# URL sequence substitution with a dummy query string:
curl -ks https://example.com/?[1-20]

# With shell 'for' loop:
for i in {1..20} ; do curl -ks https://example.com/ ; done

Check DNS and HTTP trace with headers for specific domains

### Set domains and external dns servers.
_domain_list=(google.com) ; _dns_list=("8.8.8.8" "1.1.1.1")

for _domain in "${_domain_list[@]}" ; do

  printf '=%.0s' {1..48}

  echo

  printf "[\\e[1;32m+\\e[m] resolve: %s\\n" "$_domain"

  for _dns in "${_dns_list[@]}" ; do

    # Resolve domain.
    host "${_domain}" "${_dns}"

    echo

  done

  for _proto in http https ; do

    printf "[\\e[1;32m+\\e[m] trace + headers: %s://%s\\n" "$_proto" "$_domain"

    # Get trace and http headers.
    curl -Iks -A "x-agent" --location "${_proto}://${_domain}"

    echo

  done

done

unset _domain_list _dns_list

http -p Hh https://www.google.com
  • -p - print request and response headers

    • H - request headers

    • B - request body

    • h - response headers

    • b - response body

http -p Hh https://www.google.com --follow --verify no
  • -F, --follow - follow redirects

  • --verify no - skip SSL verification

http -p Hh https://www.google.com --follow --verify no \
--proxy http:http://127.0.0.1:16379
  • --proxy [http:] - set proxy server

Escape Sequence

# Supported escape sequences:
~.  - terminate connection (and any multiplexed sessions)
~B  - send a BREAK to the remote system
~C  - open a command line
~R  - Request rekey (SSH protocol 2 only)
~^Z - suspend ssh
~#  - list forwarded connections
~&  - background ssh (when waiting for connections to terminate)
~?  - this message
~~  - send the escape character by typing it twice

Compare a remote file with a local file

ssh user@host cat /path/to/remotefile | diff /path/to/localfile -

SSH connection through host in the middle

ssh -t reachable_host ssh unreachable_host

Run command over SSH on remote host

cat > cmd.txt << __EOF__
cat /etc/hosts
__EOF__

ssh host -l user $(<cmd.txt)

Get public key from private key

ssh-keygen -y -f ~/.ssh/id_rsa

Get all fingerprints

ssh-keygen -l -f .ssh/known_hosts

SSH authentication with user password

ssh -o PreferredAuthentications=password -o PubkeyAuthentication=no user@remote_host

SSH authentication with publickey

ssh -o PreferredAuthentications=publickey -o PubkeyAuthentication=yes -i id_rsa user@remote_host

Simple recording SSH session

function _ssh_sesslog() {

  _sesdir="<path/to/session/logs>"

  mkdir -p "${_sesdir}" && \
  ssh $@ 2>&1 | tee -a "${_sesdir}/$(date +%Y%m%d).log"

}

# Alias:
alias ssh='_ssh_sesslog'

Using Keychain for SSH logins

### Delete all of ssh-agent's keys.
function _scl() {

  /usr/bin/keychain --clear

}

### Add key to keychain.
function _scg() {

  /usr/bin/keychain /path/to/private-key
  source "$HOME/.keychain/$HOSTNAME-sh"

}

SSH login without processing any login scripts

ssh -tt user@host bash

SSH local port forwarding

Example 1:

# Forwarding our local 2250 port to nmap.org:443 from localhost through localhost
host1> ssh -L 2250:nmap.org:443 localhost

# Connect to the service:
host1> curl -Iks --location -X GET https://localhost:2250

Example 2:

# Forwarding our local 9051 port to db.d.x:5432 from localhost through node.d.y
host1> ssh -nNT -L 9051:db.d.x:5432 node.d.y

# Connect to the service:
host1> psql -U db_user -d db_dev -p 9051 -h localhost
  • -n - redirects stdin from /dev/null

  • -N - do not execute a remote command

  • -T - disable pseudo-terminal allocation

SSH remote port forwarding

# Forwarding our local 9051 port to db.d.x:5432 from host2 through node.d.y
host1> ssh -nNT -R 9051:db.d.x:5432 node.d.y

# Connect to the service:
host2> psql -U postgres -d postgres -p 8000 -h localhost

Testing remote connection to port

timeout 1 bash -c "</dev/<proto>/<host>/<port>" >/dev/null 2>&1 ; echo $?
  • <proto - set protocol (tcp/udp)

  • <host> - set remote host

  • <port> - set destination port

Read and write to TCP or UDP sockets with common bash tools

exec 5<>/dev/tcp/<host>/<port>; cat <&5 & cat >&5; exec 5>&-

tcpdump -ne -i eth0 -Q in host 192.168.252.1 and port 443
  • -n - don't convert addresses (-nn will not resolve hostnames or ports)

  • -e - print the link-level headers

  • -i [iface|any] - set interface

  • -Q|-D [in|out|inout] - choose send/receive direction (-D - for old tcpdump versions)

  • host [ip|hostname] - set host, also [host not]

  • [and|or] - set logic

  • port [1-65535] - set port number, also [port not]

tcpdump -ne -i eth0 -Q in host 192.168.252.1 and port 443 -c 5 -w tcpdump.pcap
  • -c [num] - capture only num number of packets

  • -w [filename] - write packets to file, -r [filename] - reading from file

Capture all ICMP packets

tcpdump -nei eth0 icmp

Check protocol used (TCP or UDP) for service

tcpdump -nei eth0 tcp port 22 -vv -X | egrep "TCP|UDP"

Display ASCII text (to parse the output using grep or other)

tcpdump -i eth0 -A -s0 port 443

Grab everything between two keywords

tcpdump -i eth0 port 80 -X | sed -n -e '/username/,/=ldap/ p'

Grab user and pass ever plain http

tcpdump -i eth0  port http -l -A | egrep -i \
'pass=|pwd=|log=|login=|user=|username=|pw=|passw=|passwd=|password=|pass:|user:|username:|password:|login:|pass |user ' \
--color=auto --line-buffered -B20

Extract HTTP User Agent from HTTP request header

tcpdump -ei eth0 -nn -A -s1500 -l | grep "User-Agent:"

Capture only HTTP GET and POST packets

tcpdump -ei eth0 -s 0 -A -vv \
'tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x47455420' or 'tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x504f5354'

or simply:

tcpdump -ei eth0 -s 0 -v -n -l | egrep -i "POST /|GET /|Host:"

Rotate capture files

tcpdump -ei eth0 -w /tmp/capture-%H.pcap -G 3600 -C 200
  • -G <num> - pcap will be created every <num> seconds

  • -C <size> - close the current pcap and open a new one if is larger than <size>

Top hosts by packets

tcpdump -ei enp0s25 -nnn -t -c 200 | cut -f 1,2,3,4 -d '.' | sort | uniq -c | sort -nr | head -n 20

Excludes any RFC 1918 private address

tcpdump -nei eth0 'not (src net (10 or 172.16/12 or 192.168/16) and dst net (10 or 172.16/12 or 192.168/16))'

Analyse packets in real-time

while true ; do tcpick -a -C -r dump.pcap ; sleep 2 ; clear ; done

ngrep -d eth0 "www.domain.com" port 443
  • -d [iface|any] - set interface

  • [domain] - set hostname

  • port [1-65535] - set port number

ngrep -d eth0 "www.domain.com" src host 10.240.20.2 and port 443
  • (host [ip|hostname]) - filter by ip or hostname

  • (port [1-65535]) - filter by port number

ngrep -d eth0 -qt -O ngrep.pcap "www.domain.com" port 443
  • -q - quiet mode (only payloads)

  • -t - added timestamps

  • -O [filename] - save output to file, -I [filename] - reading from file

ngrep -d eth0 -qt 'HTTP' 'tcp'
  • HTTP - show http headers

  • tcp|udp - set protocol

  • [src|dst] host [ip|hostname] - set direction for specific node

ngrep -l -q -d eth0 -i "User-Agent: curl*"
  • -l - stdout line buffered

  • -i - case-insensitive search


hping3 -V -p 80 -s 5050 <scan_type> www.google.com
  • -V|--verbose - verbose mode

  • -p|--destport - set destination port

  • -s|--baseport - set source port

  • <scan_type> - set scan type

    • -F|--fin - set FIN flag, port open if no reply

    • -S|--syn - set SYN flag

    • -P|--push - set PUSH flag

    • -A|--ack - set ACK flag (use when ping is blocked, RST response back if the port is open)

    • -U|--urg - set URG flag

    • -Y|--ymas - set Y unused flag (0x80 - nullscan), port open if no reply

    • -M 0 -UPF - set TCP sequence number and scan type (URG+PUSH+FIN), port open if no reply

hping3 -V -c 1 -1 -C 8 www.google.com
  • -c [num] - packet count

  • -1 - set ICMP mode

  • -C|--icmptype [icmp-num] - set icmp type (default icmp-echo = 8)

hping3 -V -c 1000000 -d 120 -S -w 64 -p 80 --flood --rand-source <remote_host>
  • --flood - sent packets as fast as possible (don't show replies)

  • --rand-source - random source address mode

  • -d --data - data size

  • -w|--win - winsize (default 64)


Ping scans the network

nmap -sP 192.168.0.0/24

Show only open ports

nmap -F --open 192.168.0.0/24

Full TCP port scan using with service version detection

nmap -p 1-65535 -sV -sS -T4 192.168.0.0/24

Nmap scan and pass output to Nikto

nmap -p80,443 192.168.0.0/24 -oG - | nikto.pl -h -

Recon specific ip:service with Nmap NSE scripts stack

# Set variables:
_hosts="192.168.250.10"
_ports="80,443"

# Set Nmap NSE scripts stack:
_nmap_nse_scripts="+dns-brute,\
                   +http-auth-finder,\
                   +http-chrono,\
                   +http-cookie-flags,\
                   +http-cors,\
                   +http-cross-domain-policy,\
                   +http-csrf,\
                   +http-dombased-xss,\
                   +http-enum,\
                   +http-errors,\
                   +http-git,\
                   +http-grep,\
                   +http-internal-ip-disclosure,\
                   +http-jsonp-detection,\
                   +http-malware-host,\
                   +http-methods,\
                   +http-passwd,\
                   +http-phpself-xss,\
                   +http-php-version,\
                   +http-robots.txt,\
                   +http-sitemap-generator,\
                   +http-shellshock,\
                   +http-stored-xss,\
                   +http-title,\
                   +http-unsafe-output-escaping,\
                   +http-useragent-tester,\
                   +http-vhosts,\
                   +http-waf-detect,\
                   +http-waf-fingerprint,\
                   +http-xssed,\
                   +traceroute-geolocation.nse,\
                   +ssl-enum-ciphers,\
                   +whois-domain,\
                   +whois-ip"

# Set Nmap NSE script params:
_nmap_nse_scripts_args="dns-brute.domain=${_hosts},http-cross-domain-policy.domain-lookup=true,"
_nmap_nse_scripts_args+="http-waf-detect.aggro,http-waf-detect.detectBodyChanges,"
_nmap_nse_scripts_args+="http-waf-fingerprint.intensive=1"

# Perform scan:
nmap --script="$_nmap_nse_scripts" --script-args="$_nmap_nse_scripts_args" -p "$_ports" "$_hosts"

nc -kl 5000
  • -l - listen for an incoming connection

  • -k - listening after client has disconnected

  • >filename.out - save receive data to file (optional)

nc 192.168.0.1 5051 < filename.in
  • < filename.in - send data to remote host

nc -vz 10.240.30.3 5000
  • -v - verbose output

  • -z - scan for listening daemons

nc -vzu 10.240.30.3 1-65535
  • -u - scan only udp ports

Transfer data file (archive)

server> nc -l 5000 | tar xzvfp -
client> tar czvfp - /path/to/dir | nc 10.240.30.3 5000

Launch remote shell

# 1)
server> nc -l 5000 -e /bin/bash
client> nc 10.240.30.3 5000

# 2)
server> rm -f /tmp/f; mkfifo /tmp/f
server> cat /tmp/f | /bin/bash -i 2>&1 | nc -l 127.0.0.1 5000 > /tmp/f
client> nc 10.240.30.3 5000

Simple file server

while true ; do nc -l 5000 | tar -xvf - ; done

Simple minimal HTTP Server

while true ; do nc -l -p 1500 -c 'echo -e "HTTP/1.1 200 OK\n\n $(date)"' ; done

Simple HTTP Server

Restarts web server after each request - remove while condition for only single connection.

cat > index.html << __EOF__
<!doctype html>
    <head>
        <meta charset="utf-8">
        <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
        <title></title>
        <meta name="description" content="">
        <meta name="viewport" content="width=device-width, initial-scale=1">
    </head>
    <body>

    <p>

      Hello! It's a site.

    </p>

    </body>
</html>
__EOF__
server> while : ; do \
(echo -ne "HTTP/1.1 200 OK\r\nContent-Length: $(wc -c <index.html)\r\n\r\n" ; cat index.html;) | \
nc -l -p 5000 \
; done
  • -p - port number

Simple HTTP Proxy (single connection)

#!/usr/bin/env bash

if [[ $# != 2 ]] ; then
  printf "%s\\n" \
         "usage: ./nc-proxy listen-port bk_host:bk_port"
fi

_listen_port="$1"
_bk_host=$(echo "$2" | cut -d ":" -f1)
_bk_port=$(echo "$2" | cut -d ":" -f2)

printf "  lport: %s\\nbk_host: %s\\nbk_port: %s\\n\\n" \
       "$_listen_port" "$_bk_host" "$_bk_port"

_tmp=$(mktemp -d)
_back="$_tmp/pipe.back"
_sent="$_tmp/pipe.sent"
_recv="$_tmp/pipe.recv"

trap 'rm -rf "$_tmp"' EXIT

mkfifo -m 0600 "$_back" "$_sent" "$_recv"

sed "s/^/=> /" <"$_sent" &
sed "s/^/<=  /" <"$_recv" &

nc -l -p "$_listen_port" <"$_back" | \
tee "$_sent" | \
nc "$_bk_host" "$_bk_port" | \
tee "$_recv" >"$_back"
server> chmod +x nc-proxy && ./nc-proxy 8080 192.168.252.10:8000
  lport: 8080
bk_host: 192.168.252.10
bk_port: 8000

client> http -p h 10.240.30.3:8080
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=31536000
Content-Length: 2748
Content-Type: text/html; charset=utf-8
Date: Sun, 01 Jul 2018 20:12:08 GMT
Last-Modified: Sun, 01 Apr 2018 21:53:37 GMT

Create a single-use TCP or UDP proxy

### TCP -> TCP
nc -l -p 2000 -c "nc [ip|hostname] 3000"

### TCP -> UDP
nc -l -p 2000 -c "nc -u [ip|hostname] 3000"

### UDP -> UDP
nc -l -u -p 2000 -c "nc -u [ip|hostname] 3000"

### UDP -> TCP
nc -l -u -p 2000 -c "nc [ip|hostname] 3000"

Testing connection to remote host (with SNI support)

gnutls-cli -p 443 google.com

Testing connection to remote host (without SNI support)

gnutls-cli --disable-sni -p 443 google.com

Testing remote connection to port

socat - TCP4:10.240.30.3:22
  • - - standard input (STDIO)

  • TCP4:<params> - set tcp4 connection with specific params

    • [hostname|ip] - set hostname/ip

    • [1-65535] - set port number

Redirecting TCP-traffic to a UNIX domain socket under Linux

socat TCP-LISTEN:1234,bind=127.0.0.1,reuseaddr,fork,su=nobody,range=127.0.0.0/8 UNIX-CLIENT:/tmp/foo
  • TCP-LISTEN:<params> - set tcp listen with specific params

    • [1-65535] - set port number

    • bind=[hostname|ip] - set bind hostname/ip

    • reuseaddr - allows other sockets to bind to an address

    • fork - keeps the parent process attempting to produce more connections

    • su=nobody - set user

    • range=[ip-range] - ip range

  • UNIX-CLIENT:<params> - communicates with the specified peer socket

    • filename - define socket


Set iface in promiscuous mode and dump traffic to the log file

p0f -i enp0s25 -p -d -o /dump/enp0s25.log
  • -i - listen on the specified interface

  • -p - set interface in promiscuous mode

  • -d - fork into background

  • -o - output file


Graph # of connections for each hosts

netstat -an | awk '/ESTABLISHED/ { split($5,ip,":"); if (ip[1] !~ /^$/) print ip[1] }' | \
sort | uniq -c | awk '{ printf("%s\t%s\t",$2,$1) ; for (i = 0; i < $1; i++) {printf("*")}; print "" }'

Monitor open connections for specific port including listen, count and sort it per IP

watch "netstat -plan | grep :443 | awk {'print \$5'} | cut -d: -f 1 | sort | uniq -c | sort -nk 1"

Grab banners from local IPv4 listening ports

netstat -nlt | grep 'tcp ' | grep -Eo "[1-9][0-9]*" | xargs -I {} sh -c "echo "" | nc -v -n -w1 127.0.0.1 {}"

Rsync remote data as root using sudo

rsync --rsync-path 'sudo rsync' username@hostname:/path/to/dir/ /local/

Resolves the domain name (using external dns server)

host google.com 9.9.9.9

Checks the domain administrator (SOA record)

host -t soa google.com 9.9.9.9

Resolves the domain name (short output)

dig google.com +short

Lookup NS record for specific domain

dig @9.9.9.9 google.com NS

Query only answer section

dig google.com +nocomments +noquestion +noauthority +noadditional +nostats

Query ALL DNS Records

dig google.com ANY +noall +answer

DNS Reverse Look-up

dig -x 172.217.16.14 +short

Generate multidomain certificate

certbot certonly -d example.com -d www.example.com

Generate wildcard certificate

certbot certonly --manual --preferred-challenges=dns -d example.com -d *.example.com

Generate certificate with 4096 bit private key

certbot certonly -d example.com -d www.example.com --rsa-key-size 4096

Get all subnets for specific AS (Autonomous system)

AS="AS32934"
whois -h whois.radb.net -- "-i origin ${AS}" | \
grep "^route:" | \
cut -d ":" -f2 | \
sed -e 's/^[ \t]//' | \
sort -n -t . -k 1,1 -k 2,2 -k 3,3 -k 4,4 | \
cut -d ":" -f2 | \
sed -e 's/^[ \t]/allow /' | \
sed 's/$/;/' | \
sed 's/allow  */subnet -> /g'

Resolves domain name from dns.google.com with curl and jq

_dname="google.com" ; curl -s "https://dns.google.com/resolve?name=${_dname}&type=A" | jq .

Log alias for a decent view of your repo

# 1)
git log --oneline --decorate --graph --all

# 2)
git log --graph \
--pretty=format:'%Cred%h%Creset -%C(yellow)%d%Creset %s %Cgreen(%cr) %C(bold blue)<%an>%Creset' \
--abbrev-commit

Static HTTP web server

# Python 3.x
python3 -m http.server 8000 --bind 127.0.0.1

# Python 2.x
python -m SimpleHTTPServer 8000

Static HTTP web server with SSL support

# Python 3.x
from http.server import HTTPServer, BaseHTTPRequestHandler
import ssl

httpd = HTTPServer(('localhost', 4443), BaseHTTPRequestHandler)

httpd.socket = ssl.wrap_socket (httpd.socket,
        keyfile="path/to/key.pem",
        certfile='path/to/cert.pem', server_side=True)

httpd.serve_forever()

# Python 2.x
import BaseHTTPServer, SimpleHTTPServer
import ssl

httpd = BaseHTTPServer.HTTPServer(('localhost', 4443),
        SimpleHTTPServer.SimpleHTTPRequestHandler)

httpd.socket = ssl.wrap_socket (httpd.socket,
        keyfile="path/tp/key.pem",
        certfile='path/to/cert.pem', server_side=True)

httpd.serve_forever()

Encode base64

python -m base64 -e <<< "sample string"

Decode base64

python -m base64 -d <<< "dGhpcyBpcyBlbmNvZGVkCg=="

Search for matching lines

# egrep foo
awk '/foo/' filename

Search non matching lines

# egrep -v foo
awk '!/foo/' filename

Print matching lines with numbers

# egrep -n foo
awk '/foo/{print FNR,$0}' filename

Print the last column

awk '{print $NF}' filename

Find all the lines longer than 80 characters

awk 'length($0)>80{print FNR,$0}' filename

Print only lines of less than 80 characters

awk 'length < 80' filename

Print double new lines a file

awk '1; { print "" }' filename

Print line numbers

awk '{ print FNR "\t" $0 }' filename
awk '{ printf("%5d : %s\n", NR, $0) }' filename   # in a fancy manner

Print line numbers for only non-blank lines

awk 'NF { $0=++a " :" $0 }; { print }' filename

Print the line and the next two (i=5) lines after the line matching regexp

awk '/foo/{i=5+1;}{if(i){i--; print;}}' filename

Print the lines starting at the line matching 'server {' until the line matching '}'

awk '/server {/,/}/' filename

Print multiple columns with separators

awk -F' ' '{print "ip:\t" $2 "\n port:\t" $3' filename

Remove empty lines

awk 'NF > 0' filename

# alternative:
awk NF filename

Delete trailing white space (spaces, tabs)

awk '{sub(/[ \t]*$/, "");print}' filename

Delete leading white space

awk '{sub(/^[ \t]+/, ""); print}' filename

Remove duplicate consecutive lines

# uniq
awk 'a !~ $0{print}; {a=$0}' filename

Remove duplicate entries in a file without sorting

awk '!x[$0]++' filename

Exclude multiple columns

awk '{$1=$3=""}1' filename

Substitute foo for bar on lines matching regexp

awk '/regexp/{gsub(/foo/, "bar")};{print}' filename

Add some characters at the beginning of matching lines

awk '/regexp/{sub(/^/, "++++"); print;next;}{print}' filename

Get the last hour of Apache logs

awk '/'$(date -d "1 hours ago" "+%d\\/%b\\/%Y:%H:%M")'/,/'$(date "+%d\\/%b\\/%Y:%H:%M")'/ { print $0 }' \
/var/log/httpd/access_log

Print a specific line from a file

sed -n 10p /path/to/file

Remove a specific line from a file

sed -i 10d /path/to/file
# alternative (BSD): sed -i'' 10d /path/to/file

Remove a range of lines from a file

sed -i <file> -re '<start>,<end>d'

Replace newline(s) with a space

sed ':a;N;$!ba;s/\n/ /g' /path/to/file

# cross-platform compatible syntax:
sed -e ':a' -e 'N' -e '$!ba' -e 's/\n/ /g' /path/to/file
  • :a create a label a

  • N append the next line to the pattern space

  • $! if not the last line, ba branch (go to) label a

  • s substitute, /\n/ regex for new line, / / by a space, /g global match (as many times as it can)

Alternatives:

# perl version (sed-like speed):
perl -p -e 's/\n/ /' /path/to/file

# bash version (slow):
while read line ; do printf "%s" "$line " ; done < file

Delete string +N next lines

sed '/start/,+4d' /path/to/file

Search for a "pattern" inside all files in the current directory

grep -rn "pattern"
grep -RnisI "pattern" *
fgrep "pattern" * -R

Show only for multiple patterns

grep 'INFO*'\''WARN' filename
grep 'INFO\|WARN' filename
grep -e INFO -e WARN filename
grep -E '(INFO|WARN)' filename
egrep "INFO|WARN" filename

Except multiple patterns

grep -vE '(error|critical|warning)' filename

Show data from file without comments

grep -v ^[[:space:]]*# filename

Show data from file without comments and new lines

egrep -v '#|^$' filename

Show strings with a dash/hyphen

grep -e -- filename
grep -- -- filename
grep "\-\-" filename

Remove blank lines from a file and save output to new file

grep . filename > newfilename

Search and replace (in place)

perl -i -pe's/SEARCH/REPLACE/' filename

Edit of *.conf files changing all foo to bar (and backup original)

perl -p -i.orig -e 's/\bfoo\b/bar/g' *.conf

Prints the first 20 lines from *.conf files

perl -pe 'exit if $. > 20' *.conf

Search lines 10 to 20

perl -ne 'print if 10 .. 20' filename

Delete first 10 lines (and backup original)

perl -i.orig -ne 'print unless 1 .. 10' filename

Delete all but lines between foo and bar (and backup original)

perl -i.orig -ne 'print unless /^foo$/ .. /^bar$/' filename

Reduce multiple blank lines to a single line

perl -p -i -00pe0 filename

Convert tabs to spaces (1t = 2sp)

perl -p -i -e 's/\t/  /g' filename

Read input from a file and report number of lines and characters

perl -lne '$i++; $in += length($_); END { print "$i lines, $in characters"; }' filename

Shell functions [TOC]

Table of Contents

  • Domain resolve

  • Get ASN

Domain resolve

# Dependencies:
#   - curl
#   - jq

function DomainResolve() {

  local _host="$1"

  local _curl_base="curl --request GET"
  local _timeout="15"

  _host_ip=$($_curl_base -ks -m "$_timeout" "https://dns.google.com/resolve?name=${_host}&type=A" | \
  jq '.Answer[0].data' | tr -d "\"" 2>/dev/null)

  if [[ -z "$_host_ip" ]] || [[ "$_host_ip" == "null" ]] ; then

    echo -en "Unsuccessful domain name resolution.\\n"

  else

    echo -en "$_host > $_host_ip\\n"

  fi

}

Example:

shell> DomainResolve nmap.org
nmap.org > 45.33.49.119

shell> DomainResolve nmap.org
Unsuccessful domain name resolution.

Get ASN

# Dependencies:
#   - curl

function GetASN() {

  local _ip="$1"

  local _curl_base="curl --request GET"
  local _timeout="15"

  _asn=$($_curl_base -ks -m "$_timeout" "http://ip-api.com/line/${_ip}?fields=as")

  _state=$(echo $?)

  if [[ -z "$_ip" ]] || [[ "$_ip" == "null" ]] || [[ "$_state" -ne 0 ]]; then

    echo -en "Unsuccessful ASN gathering.\\n"

  else

    echo -en "$_ip > $_asn\\n"

  fi

}

Example:

shell> GetASN 1.1.1.1
1.1.1.1 > AS13335 Cloudflare, Inc.

shell> GetASN 0.0.0.0
Unsuccessful ASN gathering.

:small_orange_diamond: - is a command line tool and library for transferring data with URLs. :small_orange_diamond: - is an alternative to the widely popular curl program, written in Golang. :small_orange_diamond: - is an user-friendly HTTP client. :small_orange_diamond: - is an interactive cli tool for HTTP inspection. :small_orange_diamond: - is a conformance testing tool for HTTP/2 implementation. :small_orange_diamond: - is a simple tool to help sysadmins to hardening their websites. :small_orange_diamond: - is a simple Swiss Army knife for http/https troubleshooting and profiling. :small_orange_diamond: - is a tool that visualizes curl statistics in a way of beauty and clarity. :small_orange_diamond: - is an interactive web server. :small_orange_diamond: - is a text browser for the World Wide Web. :small_orange_diamond: - is a fully interactive, real-time, and modern text-based browser. :small_orange_diamond: - a list of (almost) all headless web browsers in existence. :small_orange_diamond: - is a single-threaded command line tool for measuring the performance of HTTP web servers. :small_orange_diamond: - is an http load testing and benchmarking utility. :small_orange_diamond: - is a modern HTTP benchmarking tool capable of generating significant load. :small_orange_diamond: - is a constant throughput, correct latency recording variant of wrk. :small_orange_diamond: - is a constant throughput, correct latency recording variant of wrk. :small_orange_diamond: - is a fast cross-platform HTTP benchmarking tool written in Go. :small_orange_diamond: - http/https load testing and benchmarking tool. :small_orange_diamond: - HTTP load generator, ApacheBench (ab) replacement, formerly known as rakyll/boom. :small_orange_diamond: - is a script you can use to quickly smoke-test your web app deployment. :small_orange_diamond: - is a tool that simulates some Application Layer Denial of Service attacks by prolonging HTTP. :small_orange_diamond: - is a free and open source directory/file & DNS busting tool written in Go. :small_orange_diamond: - command-line reference-implementation client for SSL Labs APIs. :small_orange_diamond: - Mozilla HTTP Observatory cli version.

SSL

:small_orange_diamond: - is a robust, commercial-grade, and full-featured toolkit for the TLS and SSL protocols. :small_orange_diamond: - client program to set up a TLS connection to some other computer. :small_orange_diamond: - fast and powerful SSL/TLS server scanning library. :small_orange_diamond: - tests SSL/TLS enabled services to discover supported cipher suites. :small_orange_diamond: - testing TLS/SSL encryption anywhere on any port. :small_orange_diamond: - a very simple way to find out which SSL ciphersuites are supported by a target. :small_orange_diamond: - is a utility for creating symmetrically encrypted and authenticated pipes between socket addresses. :small_orange_diamond: - is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server. :small_orange_diamond: - simple zero-config tool to make locally trusted development certificates with any names you'd like. :small_orange_diamond: - tools to bootstrap CAs, certificate requests, and signed certificates. :small_orange_diamond: - is a security and reconnaissance tool to automatically monitor new subdomains. :small_orange_diamond: - open source tool to help you build a valid SSL certificate chain.

Security

:small_orange_diamond: - provides a flexible Mandatory Access Control (MAC) system built into the Linux kernel. :small_orange_diamond: - proactively protects the operating system and applications from external or internal threats. :small_orange_diamond: - Automated System Hardening Framework. :small_orange_diamond: - Security + DevOps: Automatic Server Hardening.

Auditing Tools

:small_orange_diamond: - actively monitoring all aspects of system activity with file integrity monitoring. :small_orange_diamond: - provides a way to track security-relevant information on your system. :small_orange_diamond: - is a security tool that can be use both as a security audit and intrusion detection system. :small_orange_diamond: - battle-tested security tool for systems running Linux, macOS, or Unix-based operating system. :small_orange_diamond: - scripted Local Linux Enumeration & Privilege Escalation Checks. :small_orange_diamond: - scanner tool for Linux systems that scans backdoors, rootkits and local exploits on your systems. :small_orange_diamond: - is a light-weight tool that helps to detect malware running on the system.

System Diagnostics/Debuggers

:small_orange_diamond: - diagnostic, debugging and instructional userspace utility for Linux. :small_orange_diamond: - is a performance analysis and troubleshooting tool. :small_orange_diamond: - is a library call tracer, used to trace calls made by programs to library functions. :small_orange_diamond: - is a friendly wrapper around ptrace. :small_orange_diamond: - performance analysis tools based on Linux perf_events (aka perf) and ftrace. :small_orange_diamond: - high-level tracing language for Linux eBPF. :small_orange_diamond: - system exploration and troubleshooting tool with first class support for containers. :small_orange_diamond: - is an instrumentation framework for building dynamic analysis tools. :small_orange_diamond: - high-performance multi-threaded malloc() implementation, plus some performance analysis tools. :small_orange_diamond: - cross-platform system monitoring tool written in Python. :small_orange_diamond: - interactive text-mode process viewer for Unix systems. It aims to be a better 'top'. :small_orange_diamond: - Linux resource monitor written in pure Bash. :small_orange_diamond: - a single executable for performance monitoring and data analysis. :small_orange_diamond: - ASCII performance monitor. Includes statistics for CPU, memory, disk, swap, network, and processes. :small_orange_diamond: - displays in its output information about files that are opened by processes. :small_orange_diamond: - stack trace visualizer. :small_orange_diamond: - convert Unix lsof output to a graph showing FIFO and UNIX interprocess communication. :small_orange_diamond: - is a lightweight tool for recording, replaying and debugging execution of applications. :small_orange_diamond: - a system performance analysis toolkit. :small_orange_diamond: - a command-line hex viewer.

Log Analyzers

:small_orange_diamond: - slice and dice log files on the command line. :small_orange_diamond: - log file navigator with search and automatic refresh. :small_orange_diamond: - real-time web log analyzer and interactive viewer that runs in a terminal. :small_orange_diamond: - real-time metrics for nginx server.

Databases

:small_orange_diamond: - universal command-line interface for SQL databases. :small_orange_diamond: - postgres CLI with autocompletion and syntax highlighting. :small_orange_diamond: - terminal client for MySQL with autocompletion and syntax highlighting. :small_orange_diamond: - SQLite CLI with autocompletion and syntax highlighting. :small_orange_diamond: - SQL Server CLI with autocompletion and syntax highlighting. :small_orange_diamond: - is a SQL powered operating system instrumentation, monitoring, and analytics framework. :small_orange_diamond: - sync data from one Postgres database to another. :small_orange_diamond: - a terminal client for redis with autocompletion and syntax highlighting.

TOR

:small_orange_diamond: - script to make Tor Network your default gateway. :small_orange_diamond: - a tool that lets you create multiple TOR instances with a load-balancing.

Messengers/IRC Clients

:small_orange_diamond: - is a free open source terminal based IRC client. :small_orange_diamond: - is an extremely extensible and lightweight IRC client.

Productivity

:small_orange_diamond: - task management system, todo list

Other

:small_orange_diamond: - tools for Linux/Unix sysadmins. :small_orange_diamond: - is an inode-based filesystem notification technology. :small_orange_diamond: - synchronizes local directories with remote targets (Live Syncing Daemon). :small_orange_diamond: - is a terminal based interface for viewing Git repositories. :small_orange_diamond: - text-mode interface for Git. :small_orange_diamond: - simplified and community-driven man pages. :small_orange_diamond: - easily create and extract .zip, .tar, .tar.gz, .tar.bz2, .tar.xz, .tar.lz4, .tar.sz, and .rar. :small_orange_diamond: - minimal CLI creator in JavaScript. :small_orange_diamond: - make JSON greppable! :small_orange_diamond: - binary editor written in Go.

Terminal emulators

:small_orange_diamond: - is a dropdown terminal made for the GNOME desktop environment. :small_orange_diamond: - is based on GNOME Terminal, useful features for sysadmins and other users. :small_orange_diamond: - is a GPU based terminal emulator that supports smooth scrolling and images. :small_orange_diamond: - is a fast, cross-platform, OpenGL terminal emulator.

Network

:small_orange_diamond: - is the world’s foremost and widely-used network protocol analyzer. :small_orange_diamond: - is a comprehensive network monitor tool. :small_orange_diamond: - is a graphical network monitoring solution. :small_orange_diamond: - is a networking utility for packet generation and built-in UDP/TCP/SSL client and servers. :small_orange_diamond: - is a packet crafter and traffic generator. :small_orange_diamond: - open source software to load test functional behavior and measure performance. :small_orange_diamond: - scalable user load testing tool written in Python.

Browsers

:small_orange_diamond: - protect your privacy and defend yourself against network surveillance and traffic analysis.

Password Managers

:small_orange_diamond: - store your passwords safely and auto-type them into your everyday websites and apps. :small_orange_diamond: - open source password manager with built-in sync.

Messengers/IRC Clients

:small_orange_diamond: - is an IRC client based on XChat. :small_orange_diamond: - is an easy to use and free chat client used by millions.

Messengers (end-to-end encryption)

:small_orange_diamond: - is an encrypted communications app. :small_orange_diamond: - secure messaging, file sharing, voice calls and video conferences. All protected with end-to-end encryption. :small_orange_diamond: - decentralized anonymous instant messenger on top of Tor Hidden Services. :small_orange_diamond: - an open network for secure, decentralized, real-time communication.

Text editors

:small_orange_diamond: - is a lightweight, cross-platform code editor known for its speed, ease of use. :small_orange_diamond: - an open-source and free source code editor developed by Microsoft. :small_orange_diamond: - a hackable text editor for the 21st Century.

Browsers

:small_orange_diamond: - test your browser's SSL implementation. :small_orange_diamond: - provides up-to-date browser support tables for support of front-end web technologies. :small_orange_diamond: - is your browser safe against tracking? :small_orange_diamond: - see what data is exposed from your browser. :small_orange_diamond: - it's all about Web Browser fingerprinting. :small_orange_diamond: - help a web server developer learn what real world TLS clients were capable of. :small_orange_diamond: - client test (incl TLSv1.3 information).

SSL/Security

:small_orange_diamond: - performs a deep analysis of the configuration of any SSL web server. :small_orange_diamond: - performs a deep analysis of the configuration of any SSL web server. :small_orange_diamond: - test SSL/TLS (PCI DSS, HIPAA and NIST). :small_orange_diamond: - scan your website for non-secure content. :small_orange_diamond: - analyze website security. :small_orange_diamond: - test your TLS server configuration (e.g. ciphers). :small_orange_diamond: - service to scan and analyse websites. :small_orange_diamond: - monitoring security policies like CSP and HPKP. :small_orange_diamond: - allows developers and security experts to check if a Content Security Policy. :small_orange_diamond: - public list about CSP in some big players (might make them care a bit more). :small_orange_diamond: - top 100 websites by Alexa rank not automatically redirecting insecure requests. :small_orange_diamond: - cipher suite search engine. :small_orange_diamond: - strong ciphers for Apache, Nginx, Lighttpd, and more.* :small_orange_diamond: - public Diffie-Hellman parameter service/tool. :small_orange_diamond: - memorable site for testing clients against bad SSL configs. :small_orange_diamond: - registered for various tests regarding the TLS/SSL protocol. :small_orange_diamond: - generate a CAA policy. :small_orange_diamond: - repository of information about CAs, and their root and intermediate certificates. :small_orange_diamond: - real-time certificate transparency log update stream. :small_orange_diamond: - discovers certificates by continually monitoring all of the publicly known CT. :small_orange_diamond: - deploy the security standards. :small_orange_diamond: - test TLS cipher suite compatibility. :small_orange_diamond: - this service helps you detect potentially malicious websites. :small_orange_diamond: - a proposed standard (generator) which allows websites to define security policies. :small_orange_diamond: - help you follow the Mozilla Server Side TLS configuration guidelines.

HTTP Headers & Web Linters

:small_orange_diamond: - analyse the HTTP response headers (with rating system to the results). :small_orange_diamond: - set of tools to analyze your website. :small_orange_diamond: - is a linting tool that will help you with your site's accessibility, speed, security, and more.

DNS

:small_orange_diamond: - one source for free DNS related tools and information. :small_orange_diamond: - is an advanced DNS lookup tool. :small_orange_diamond: - online DNS investigation tool. :small_orange_diamond: - monitor, validate and verify your DNS configurations. :small_orange_diamond: - helps you to control how your DNS works. :small_orange_diamond: - comprehensive DNS tester. :small_orange_diamond: - find subdomains for security assessment penetration test. :small_orange_diamond: - dns recon & research, find & lookup dns records. :small_orange_diamond: - search for DNS records by domain, IP, CIDR, ISP. :small_orange_diamond: - DNS and mail server health checker. :small_orange_diamond: - check the delegation of your domain. :small_orange_diamond: - check, trace and visualize delegation of your domain. :small_orange_diamond: - DS or DNSKEY records validator. :small_orange_diamond: - this site is responsible for the safekeeping of historical reverse DNS records. :small_orange_diamond: - wildcard DNS for everyone. :small_orange_diamond: - dead simple wildcard DNS for any IP Address. :small_orange_diamond: - one of the best DNS propagation checker (and not only). :small_orange_diamond: - DNS propagation checking tool. :small_orange_diamond: - quickly searching large DNS datasets.

Mail

:small_orange_diamond: - check an email domain for SMTP TLS support. :small_orange_diamond: - all of your MX record, DNS, blacklist and SMTP diagnostics in one integrated tool. :small_orange_diamond: - complete email test tools for email technicians. :small_orange_diamond: - checks to see if your domain is on a Real Time Spam Blacklist. :small_orange_diamond: - complete IP check for sending Mailservers. :small_orange_diamond: - checks mail authentication and scores messages with Spam Assassin.

Encoders/Decoders and Regex testing

:small_orange_diamond: - tool from above to either encode or decode a string of text. :small_orange_diamond: - the online translator for search queries on log data. :small_orange_diamond: - online regex tester and debugger: PHP, PCRE, Python, Golang and JavaScript. :small_orange_diamond: - online tool to learn, build, & test Regular Expressions (RegEx / RegExp). :small_orange_diamond: - online regex testing tool. :small_orange_diamond: - online regex testing tool + other tools. :small_orange_diamond: - a web app for encryption, encoding, compression and data analysis.

Net-tools

:small_orange_diamond: - detailed report about the site, helping you to make informed choices about their integrity.* :small_orange_diamond: - a global, open, distributed Internet measurement platform. :small_orange_diamond: - uses various sources to gather public information about IP numbers, domain names, host names, etc. :small_orange_diamond: - APIs for Security Companies, Researchers and Teams. :small_orange_diamond: - curl test, analyze HTTP Response Headers. :small_orange_diamond: - HTTP API tools, testers, encoders, converters, formatters, and other tools. :small_orange_diamond: - online Ping, Traceroute, DNS lookup, WHOIS and others. :small_orange_diamond: - network tools for webmasters, IT technicians & geeks. :small_orange_diamond: - search for any ASN, IP, Prefix or Resource name. :small_orange_diamond: - check BGP (RPKI) security of ISPs and other major Internet players. :small_orange_diamond: - provides online communication tools for people and groups working on liberatory social change. :small_orange_diamond: - analyze suspicious files and URLs to detect types of malware.

Privacy

:small_orange_diamond: - provides knowledge and tools to protect your privacy against global mass surveillance. :small_orange_diamond: - DNS privacy recursive servers list (with a 'no logging' policy).

Code parsers/playgrounds

:small_orange_diamond: - finds bugs in your shell scripts. :small_orange_diamond: - get interactive help texts for shell commands. :small_orange_diamond: - live pastebin for HTML, CSS & JavaScript, and more. :small_orange_diamond: - online code editor for web application development. :small_orange_diamond: - test your PHP code with this code tester. :small_orange_diamond: - an instant IDE to learn, build, collaborate, and host all in one place. :small_orange_diamond: - is an online tool for experimenting with the Varnish Cache VCL.

Performance

:small_orange_diamond: - analyze your site’s speed and make it faster. :small_orange_diamond: - test here the performance of any of your sites from across the globe. :small_orange_diamond: - analyze your site’s speed around the world. :small_orange_diamond: - run website latency tests across multiple geographic regions. :small_orange_diamond: - analyze your site’s speed and make it faster. :small_orange_diamond: - helps developers like you learn and apply the web's modern capabilities to your own sites and apps. :small_orange_diamond: - automated auditing, performance metrics, and best practices for the web.

Mass scanners (search engines)

:small_orange_diamond: - platform that helps information security practitioners discover, monitor, and analyze devices. :small_orange_diamond: - the world's first search engine for Internet-connected devices. :small_orange_diamond: - this tool looks for randomly generated data from Shodan. :small_orange_diamond: - mass scanner such as Shodan and Censys. :small_orange_diamond: - search engine for cyberspace that lets the user find specific network components. :small_orange_diamond: - tools to monitor and understand deep structure of the web. :small_orange_diamond: - is a cyberspace search engine. :small_orange_diamond: - is a search engine for open-source and cyber threat intelligence data collected. :small_orange_diamond: - is a search engine and data archive. :small_orange_diamond: - it scan the entire internet space and create real-time threat intelligence streams and reports. :small_orange_diamond: - Internet assets registry: networks, threats, web objects, etc. :small_orange_diamond: - is a submission-based catalog of wireless networks. All the networks. Found by Everyone. :small_orange_diamond: - find any alphanumeric snippet, signature or keyword in the web pages HTML, JS and CSS code. :small_orange_diamond: - this repository contains hundreds of online search utilities. :small_orange_diamond: - lets you find email addresses in seconds and connect with the people that matter for your business. :small_orange_diamond: - search by full email address or username. :small_orange_diamond: - was my email affected by data breach? :small_orange_diamond: - world's fastest and largest data breach search engine. :small_orange_diamond: - scans of malicious URLs, IPs, and domains, including port scans and web requests. :small_orange_diamond: - database with public search for Open Amazon S3 Buckets and their contents. :small_orange_diamond: - the breached database directory. :small_orange_diamond: - find out what websites are built with. :small_orange_diamond: - search the web's source code for technologies, across millions of sites. :small_orange_diamond: - search for sites, images, apps, softwares & more. :small_orange_diamond: - if a target has an open FTP site with accessible content it will be listed here. :small_orange_diamond: - focused on gathering information from free tools or resources. :small_orange_diamond: - is a service oriented to cybersecurity analysts for the advanced analysis of indicators of compromise. :small_orange_diamond: - is a collaboration of data found online in the form of a lookup. :small_orange_diamond: - to help everyday individuals secure their online life, avoiding getting hacked. :small_orange_diamond: - is the place to find the person behind the email address, social username or phone number. :small_orange_diamond: - is operated by a random swiss guy fighting malware for non-profit. :small_orange_diamond: - malware search engine. :small_orange_diamond: - monitors and tracks various malware families that are used to perpetrate cyber crimes. :small_orange_diamond: - find GitHub secrets in real time. :small_orange_diamond: - helping you find real world examples of functions, API's and libraries. :small_orange_diamond: - the world biggest directory of online surveillance security cameras. :small_orange_diamond: - contains great stuff like: security, hacking, reverse engineering, cryptography, programming etc. :small_orange_diamond: - is a great resources of datasets from Project Sonar. :small_orange_diamond: - the largest database of HTTP response headers.

Generators

:small_orange_diamond: - generate fake faces in one click - endless possibilities. :small_orange_diamond: - 100.000 AI generated faces. :small_orange_diamond: - your randomly generated identity. :small_orange_diamond: - open redirect/SSRF payload generator.

Passwords

:small_orange_diamond: - check if you have an account that has been compromised in a data breach. :small_orange_diamond: - is a hacked database search engine. :small_orange_diamond: - is a collaboration of data found online in the form of a lookup.

CVE/Exploits databases

:small_orange_diamond: - list of publicly known cybersecurity vulnerabilities. :small_orange_diamond: - CVE security vulnerability advanced database. :small_orange_diamond: - CVE compliant archive of public exploits and corresponding vulnerable software. :small_orange_diamond: - exploits market provides you the possibility to buy/sell zero-day exploits. :small_orange_diamond: - the exploit and tools database. :small_orange_diamond: - free vulnerability database. :small_orange_diamond: - is a database for vulnerabilities and their corresponding source code if available. :small_orange_diamond: - free API for CVE data.

Mobile apps scanners

:small_orange_diamond: - test security and privacy of mobile apps (iOS & Android). :small_orange_diamond: - free Mobile App Vulnerability Scanner for Android & iOS. :small_orange_diamond: - analyzes mobile application to identify vulnerabilities and potential weaknesses.

Private Search Engines

:small_orange_diamond: - the world's most private search engine. :small_orange_diamond: - a privacy-respecting, hackable metasearch engine. :small_orange_diamond: - the 1st real Dark Web search engine. :small_orange_diamond: - the search engine that respects your privacy. :small_orange_diamond: - the search engine that doesn't track you. :small_orange_diamond: - privacy safe web search :small_orange_diamond: - the search engine that anonymizes your searches. :small_orange_diamond: - the search engine that uses anonymous proxy and hidden Tor branches.

Secure Webmail Providers

:small_orange_diamond: - online email service, designed to provide maximum security and privacy. :small_orange_diamond: - is a Tor Hidden Service that allows anyone to send and receive emails anonymously. :small_orange_diamond: - is the world's most secure email service and amazingly easy to use. :small_orange_diamond: - is the world's largest secure email service, developed by CERN and MIT scientists. :small_orange_diamond: - private & encrypted email made easy.

Crypto

:small_orange_diamond: - it's open source and powered by public-key cryptography.

PGP Keyservers

:small_orange_diamond: - services for the SKS keyservers used by OpenPGP.

Operating Systems

:small_orange_diamond: - the most "Unix-like" Linux distribution. :small_orange_diamond: - multi-platform 4.4BSD-based UNIX-like operating system. :small_orange_diamond: - HardenedBSD aims to implement innovative exploit mitigation and security solutions. :small_orange_diamond: - Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments. :small_orange_diamond: - cyber security GNU/Linux environment. :small_orange_diamond: - penetration test and security assessment oriented Ubuntu-based Linux distribution. :small_orange_diamond: - is an Arch Linux-based penetration testing distribution for penetration testers. :small_orange_diamond: - is a security-focused livecd based on Gentoo. :small_orange_diamond: - Linux distro for intrusion detection, enterprise security monitoring, and log management. :small_orange_diamond: - is a live system that aims to preserve your privacy and anonymity. :small_orange_diamond: - OpenBSD router boilerplate. :small_orange_diamond: - is a security-oriented OS that uses Xen-based virtualization.

HTTP(s) Services

:small_orange_diamond: - HTTP accelerator designed for content-heavy dynamic web sites. :small_orange_diamond: - open source web and reverse proxy server that is similar to Apache, but very light weight. :small_orange_diamond: - is a dynamic web platform based on NGINX and LuaJIT. :small_orange_diamond: - a distribution of Nginx with some advanced features. :small_orange_diamond: - is an open source, HTTP/2-enabled web server with HTTPS by default. :small_orange_diamond: - the reliable, high performance TCP/HTTP load balancer.

DNS Services

:small_orange_diamond: - validating, recursive, and caching DNS resolver (with TLS). :small_orange_diamond: - caching full resolver implementation, including both a resolver library and a daemon. :small_orange_diamond: - is an open source authoritative DNS server, written in C++ and licensed under the GPL.

Other Services

:small_orange_diamond: - tiny free proxy server.

Security/hardening

:small_orange_diamond: - is a 501(c)(3) nonprofit organization and transit internet service provider (ISP). :small_orange_diamond: - the Pi-hole® is a DNS sinkhole that protects your devices from unwanted content. :small_orange_diamond: - malicious traffic detection system. :small_orange_diamond: - monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time. :small_orange_diamond: - secure and fast microVMs for serverless computing. :small_orange_diamond: - sets up a new server running your choice of WireGuard, OpenSSH, OpenVPN, and more.

Tools

:small_orange_diamond: - web visual tool to analyze large amounts of captured network traffic (PCAP analyzer). :small_orange_diamond: - IP address management (IPAM) and data center infrastructure management (DCIM) tool.

Labs

:small_orange_diamond: - learn automation by doing it. Right now, right here, in your browser.

Other

:small_orange_diamond: - home page of the Network Research Group (NRG).

CLI Tools

:small_orange_diamond: - container runtime sandbox. :small_orange_diamond: - top-like interface for container metrics.

Web Tools

:small_orange_diamond: - a collaborative project for the container ecosystem to assemble container-based system. :small_orange_diamond: - open source reverse proxy/load balancer provides easier integration with Docker and Let's encrypt. :small_orange_diamond: - The Cloud-Native API Gateway. :small_orange_diamond: - complete container management platform. :small_orange_diamond: - making Docker management easy. :small_orange_diamond: - automated nginx proxy for Docker containers using docker-gen.

Security

:small_orange_diamond: - checks for dozens of common best-practices around deploying Docker. :small_orange_diamond: - vulnerability scanner for containers, suitable for CI. :small_orange_diamond: - cloud native registry project that stores, signs, and scans content.

Manuals/Tutorials/Best Practices

:small_orange_diamond: - a quick reference cheat sheet on Docker. :small_orange_diamond: - a curated list of Docker resources and projects. :small_orange_diamond: - learn and understand Docker technologies, with real DevOps practice! :small_orange_diamond: - is a collection of tutorials for learning how to use Docker with various tools. :small_orange_diamond: - various Dockerfiles I use on the desktop and on servers. :small_orange_diamond: - bootstrap Kubernetes the hard way on Google Cloud Platform. No scripts. :small_orange_diamond: - bootstrap Kubernetes the easy way on Google Cloud Platform. No scripts. :small_orange_diamond: - Kubernetes CheatSheets in A4. :small_orange_diamond: - kubernetes security notes and best practices. :small_orange_diamond: - checklists with best-practices for production-ready Kubernetes. :small_orange_diamond: - kubernetes security - best practice guide. :small_orange_diamond: - is a compilation of public failure/horror stories related to Kubernetes.

Shell/Command line

:small_orange_diamond: - is a collection of pure bash alternatives to external processes. :small_orange_diamond: - is a collection of pure POSIX sh alternatives to external processes. :small_orange_diamond: - is a guide to learn bash. :small_orange_diamond: - for those who wanna learn Bash. :small_orange_diamond: - hold documentation of any kind about GNU Bash. :small_orange_diamond: - describes the commands offered to application programs by POSIX-conformant systems. :small_orange_diamond: - master the command line, in one page. :small_orange_diamond: - a shell style guide for Google-originated open-source projects.

Text Editors

:small_orange_diamond: - great multi language vim guide.

Python

:small_orange_diamond: - a curated list of awesome Python frameworks, libraries, software and resources. :small_orange_diamond: - comprehensive Python cheatsheet. :small_orange_diamond: - basic reference for beginner and advanced developers.

Sed & Awk & Other

:small_orange_diamond: - advanced sed and awk usage (Parsing for Pentesters 3).

*nix & Network

:small_orange_diamond: - linux and unix tutorials for new and seasoned sysadmin. :small_orange_diamond: - the ideal Linux blog for Sysadmins & Geeks. :small_orange_diamond: - free Networking, System Administration and Security tutorials. :small_orange_diamond: - Linux tutorials and cheatsheets. Minimal examples. Mostly user-land CLI utilities. :small_orange_diamond: - learn the skills required to sysadmin. :small_orange_diamond: - Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users. :small_orange_diamond: - is a collection of lectures and labs Linux kernel topics. :small_orange_diamond: - explanation of everything you can see in htop/top on Linux. :small_orange_diamond: - tutorials on system administration in Fedora and CentOS. :small_orange_diamond: - a little book which introduces strace. :small_orange_diamond: - examples and hands-on labs for Linux tracing tools workshops. :small_orange_diamond: - a detailed document explaining and documenting HTTP/2. :small_orange_diamond: - a document describing the HTTP/3 and QUIC protocols. :small_orange_diamond: - an excellent introduction to the new HTTP/2 standard. :small_orange_diamond: - great stuff to learn network and system programming at a deeper level. :small_orange_diamond: - how to improve NGINX performance, security and other important things. :small_orange_diamond: - NGINX config generator on steroids. :small_orange_diamond: - is to help operational teams with the configuration of OpenSSH server and client. :small_orange_diamond: - is a relatively brief description of the SSH handshake. :small_orange_diamond: - you'll find some general information about BIND 9, ISC DHCP, and Kea DHCP. :small_orange_diamond: - a place to record notes while studying for Cisco's CCNP certification.

Microsoft

:small_orange_diamond: - attack and defend active directory using modern post exploitation activity.

Large-scale systems

:small_orange_diamond: - learn how to design large-scale systems. :small_orange_diamond: - best practices in building High Scalability, High Availability, High Stability, and more. :small_orange_diamond: - the basic architecture concepts.

System hardening

:small_orange_diamond: - secure configuration settings for over 100 technologies, available as a free PDF. :small_orange_diamond: - this walks you through the steps required to security harden CentOS. :small_orange_diamond: - great guide for hardening CentOS; familiar with OpenSCAP. :small_orange_diamond: - is a collection of security hardening guides, tools and other resources. :small_orange_diamond: - provides a high-level overview of hardening GNU/Linux systems. :small_orange_diamond: - how to harden Linux as much as possible for security and privacy.

Security & Privacy

:small_orange_diamond: - LRaj Chandel's Security & Hacking Blog. :small_orange_diamond: - make your AWS cloud environment more secure. :small_orange_diamond: - an inventory of tools and resources about CyberSecurity. :small_orange_diamond: - every byte of a TLS connection explained and reproduced. :small_orange_diamond: - SSL and TLS Deployment Best Practices by SSL Labs. :small_orange_diamond: - learn SELinux by doing. Solve Puzzles, show skillz. :small_orange_diamond: - everything you should know about certificates and PKI but are too afraid to ask. :small_orange_diamond: - a reference for subdomain enumeration techniques. :small_orange_diamond: - the comprehensive guide to quitting Google.

Web Apps

:small_orange_diamond: - worldwide not-for-profit charitable organization focused on improving the security of software. :small_orange_diamond: - OWASP Application Security Verification Standard Project. :small_orange_diamond: - simple web app that helps developers understand the ASVS requirements. :small_orange_diamond: - is a list of application security requirements or tests. :small_orange_diamond: - includes a "best practice" penetration testing framework. :small_orange_diamond: - this is the development version of the OWASP Developer Guide. :small_orange_diamond: - is a comprehensive open source guide to testing the security of web apps. :small_orange_diamond: - focuses specifically on the top ten vulnerabilities in API security. :small_orange_diamond: - help operational teams with creating secure web applications. :small_orange_diamond: - security bulletins that relate to Netflix Open Source. :small_orange_diamond: - security countermeasures when designing, testing, and releasing your API. :small_orange_diamond: - enable cross-origin resource sharing. :small_orange_diamond: - is an initiative to provide all application security related resources at one place. :small_orange_diamond: - reverse proxy related attacks; it is a result of analysis of various proxies. :small_orange_diamond: - great series about malicious payloads. :small_orange_diamond: - show you how to compromise websites by using esoteric web features. :small_orange_diamond: - as a source of sensitive information about web application. :small_orange_diamond: - great blog about cybersec and pentests. :small_orange_diamond: - this paper will take a close look at cookie security. :small_orange_diamond: - help you keep secrets (API keys, db credentials, certificates) out of source code.

All-in-one

:small_orange_diamond: - all cheat sheets. :small_orange_diamond: - massive cheat sheets documentation. :small_orange_diamond: - this is a modest collection of cheatsheets. :small_orange_diamond: - combines multiple API documentations in a fast, organized, and searchable interface. :small_orange_diamond: - the only cheat sheet you need. :small_orange_diamond: - collection of cheat sheets about bash, vim and networking.

Ebooks

:small_orange_diamond: - list of free learning resources in many languages.

Other

:small_orange_diamond: - the steps below could be followed to find vulnerabilities and exploits. :small_orange_diamond: - $50 million CTF from Hackerone - writeup. :small_orange_diamond: - an archive of low-level CTF challenges developed over the years. :small_orange_diamond: - collection of some hints and useful links for the beginners. :small_orange_diamond: - it's time for web servers to handle ten thousand clients simultaneously, don't you think? :small_orange_diamond: - great story about the Maximum Transmission Unit. :small_orange_diamond: - like dtrace's don't really provide methods to see what programs are blocking on. :small_orange_diamond: - this is the story of a long journey regarding the implementation of SSL. :small_orange_diamond: - some drawings about programming and unix world, zines about systems & debugging tools. :small_orange_diamond: - this great repository is focused on hash collisions exploitation. :small_orange_diamond: - animation of the SHA-256 hash function in your terminal. :small_orange_diamond: - after 3072 hours of manipulating BGP, Job Snijders has succeeded in drawing a Nyancat. :small_orange_diamond: - playing battleships over BGP. :small_orange_diamond: - you type google.com into your browser and press enter? :small_orange_diamond: - based on the 'What happens when...' repository. :small_orange_diamond: - great tutorial explain how HTTPS works in the real world. :small_orange_diamond: - how we spent two weeks hunting an NFS bug in the Linux kernel. :small_orange_diamond: - postmortem on the database outage of January 31 2017 with the lessons we learned. :small_orange_diamond: - if you want to be a hacker, keep reading. :small_orange_diamond: - should help to estimate costs of certain operations in CPU clocks. :small_orange_diamond: - writing a sqlite clone from scratch in C. :small_orange_diamond: - great resource to understand how computers work under the hood. :small_orange_diamond: - working with 154 million records on Azure Table Storage. :small_orange_diamond: - shows the 500 most powerful commercially available computer systems known to us. :small_orange_diamond: - any "black magic" or hours of frustration like desktop components do. :small_orange_diamond: - 3D visualizations of the CERN computing environments (and more). :small_orange_diamond: - evaluate how fucked your database is with this handy website. :small_orange_diamond: - everything is a DNS Problem... :small_orange_diamond: - you know what the problem is, but you cannot solve it? :small_orange_diamond: - how did ransomware successfully hijack hundreds of domain controllers? :small_orange_diamond: - how HTTPS works ...in a comic! :small_orange_diamond: - a fun and colorful explanation of how DNS works. :small_orange_diamond: - your postgresql.conf documentation and recommendations.

SysOps/DevOps

:small_orange_diamond: - amazingly awesome open source sysadmin resources. :small_orange_diamond: - awesome command-line frameworks, toolkits, guides and gizmos. :small_orange_diamond: - finding text to search and replace, sorting to beautifying, and more. :small_orange_diamond: - collection of tools developed by other researchers to process network traces. :small_orange_diamond: - a curated list of awesome projects related to eBPF. :small_orange_diamond: - where some of the network sysctl variables fit into the Linux/Kernel network flow. :small_orange_diamond: - list of awesome PostgreSQL software, libraries, tools and resources. :small_orange_diamond: - a quick reminder of all SQL queries and examples on how to use them. :small_orange_diamond: - list of Free Software network services and web applications which can be hosted locally. :small_orange_diamond: - huge list of apps sorted by category, as a reference for those looking for packages. :small_orange_diamond: - build the best interview map. :small_orange_diamond: - DevOps Guide from basic to advanced with Interview Questions and Notes. :small_orange_diamond: - it is a great list of periodical magazines about FreeBSD and other important things. :small_orange_diamond: - contains interview questions on various DevOps and SRE related topics.

Developers

:small_orange_diamond: - roadmaps, articles and resources to help you choose your path, learn and improve. :small_orange_diamond: - the perfect Front-End Checklist for modern websites and meticulous developers. :small_orange_diamond: - Front-End Performance Checklist that runs faster than the others. :small_orange_diamond: - what are magic methods? They're everything in object-oriented Python. :small_orange_diamond: - a collection of surprising Python snippets and lesser-known features. :small_orange_diamond: - a list of books and articles for the discerning web developer to read. :small_orange_diamond: - a guide to understand the importance of commit messages.

Security/Pentesting

:small_orange_diamond: - a curated list of Web Security materials and resources. :small_orange_diamond: - a curated list of hacking environments where you can train your cyber skills. :small_orange_diamond: - an authoritative list of awesome devsecops tools. :small_orange_diamond: - is a curated list of amazingly awesome OSINT. :small_orange_diamond: - tips and tutorials on Bug Bounty Hunting and Web App Security. :small_orange_diamond: - a curated list of Awesome Threat Intelligence resources. :small_orange_diamond: - a collection of open source and commercial tools that aid in red team operations. :small_orange_diamond: - a curated list of amazingly awesome Burp Extensions. :small_orange_diamond: - list of a Free Security and Hacking eBooks. :small_orange_diamond: - top 100 Hacking & Security E-Books. :small_orange_diamond: - curated list of privacy respecting services and software. :small_orange_diamond: - list of awesome reverse engineering resources. :small_orange_diamond: - a collection of resources for linux reverse engineering. :small_orange_diamond: - a list of Reverse Engineering articles, books, and papers. :small_orange_diamond: - a curated list of awesome web-app firewall (WAF) stuff. :small_orange_diamond: - interesting, funny, and depressing search queries to plug into shodan.io. :small_orange_diamond: - a curated list of the most common and most interesting robots.txt disallowed directories. :small_orange_diamond: - is a small course on exploiting and defending neural networks. :small_orange_diamond: - why you probably shouldn't use a wildcard certificate. :small_orange_diamond: - which is what every third-party "VPN provider" does. :small_orange_diamond: - a curated list of awesome YARA rules, tools, and people. :small_orange_diamond: - guide to securing and improving privacy on macOS. :small_orange_diamond: - macOS Security Compliance Project. :small_orange_diamond: - is a collected list of awesome security talks. :small_orange_diamond: - list of movies every hacker & cyberpunk must watch. :small_orange_diamond: - materials used whilst taking Prof. Dan Boneh Stanford Crypto course. :small_orange_diamond: - library to learn and practice Offensive and Defensive Cryptography.

Other

:small_orange_diamond: - over 3,000 free cheat sheets, revision aids and quick references. :small_orange_diamond: - static analysis tools for all programming languages. :small_orange_diamond: - path to a free self-taught education in Computer Science. :small_orange_diamond: - is a collection of postmortems (config errors, hardware failures, and more). :small_orange_diamond: - build your own (insert technology here). :small_orange_diamond: - is a curated list of project-based tutorials in C. :small_orange_diamond: - various README templates & tips on writing high-quality documentation. :small_orange_diamond: - free software that works great, and also happens to be open-source Python. :small_orange_diamond: - a topic-centric list of HQ open datasets. :small_orange_diamond: - a curated list of all machine learning algorithms and concepts.

SysOps/DevOps

:small_orange_diamond: - very interesting presentation of Varnish by Mattias Geniar. :small_orange_diamond: - talks about the chaotic and vibrant world of microservices at Netflix.

Developers

:small_orange_diamond: - compare a simple C app with the compiled machine code of that program.

Geeky Persons

:small_orange_diamond: - is an industry expert in computing performance and cloud computing. :small_orange_diamond: - is a IT security engineer at Google. :small_orange_diamond: - white hat hacker, computer security expert. :small_orange_diamond: - developer, sysadmin, blogger, podcaster and public speaker. :small_orange_diamond: - software developer and systems administrator for Stack Exchange. :small_orange_diamond: - security researcher, speaker and founder of securityheaders.com and report-uri.com. :small_orange_diamond: - The Washington Post and now an Independent investigative journalist. :small_orange_diamond: - is an internationally renowned security technologist, called a "security guru". :small_orange_diamond: - advocate of practical learning, Chrissy also takes part in bug bounty programs. :small_orange_diamond: - is a hacker at heart who works as a senior penetration tester. :small_orange_diamond: - cybersecurity expert and writer. :small_orange_diamond: - is an American privacy and security researcher, computer hacker. :small_orange_diamond: - is a security advocate at AlienVault, a blogger event speaker and industry commentator. :small_orange_diamond: - public speaker and independent computer security analyst. :small_orange_diamond: - detection engineer at ESET. :small_orange_diamond: - web security expert known for public education and outreach on security topics. :small_orange_diamond: - sysadmin specializing in building high availability cloud environments. :small_orange_diamond: - IT security expert.

Geeky Blogs

:small_orange_diamond: - the Linux security blog about auditing, hardening and compliance by Michael Boelen. :small_orange_diamond: - trainings, howtos, checklists, security tools, and more. :small_orange_diamond: - collection of useful incantations for wizards, be you computer wizards, magicians, or whatever. :small_orange_diamond: - is the only non-profit, independent and volunteer led publication in the information security space. :small_orange_diamond: - security news that informs and inspires.

Geeky Vendor Blogs

:small_orange_diamond: - conversations and interviews related to Cyber Exposure, and more. :small_orange_diamond: - threat news room, giving you news, opinion, advice and research on computer security issues. :small_orange_diamond: - blog featuring the latest news, trends and insights on current security issues. :small_orange_diamond: - security blog aims to provide insider news about cybersecurity. :small_orange_diamond: - latest news, and trends about cybersecurity. :small_orange_diamond: - about web app security vulns and top tips from our team of web security. :small_orange_diamond: - news on emerging threats and practical advice to simplify threat detection. :small_orange_diamond: - where CISOs and IT Admins come to learn about industry trends, IT security, and more.

Geeky Cybersecurity Podcasts

:small_orange_diamond: - is a weekly information security podcast featuring news and in-depth interviews. :small_orange_diamond: - stories, and focus on the ideas about cybersecurity. :small_orange_diamond: - conversations and interviews related to Cyber Exposure, and more. :small_orange_diamond: - podcast by Geoff White about cybercrimes. :small_orange_diamond: - featuring stories from a wide range of Infosec people (Whitehat, Greyhat and Blackhat). :small_orange_diamond: - true stories from the dark side of the Internet. :small_orange_diamond: - is the investigative curiosity that helps people be successful in OSINT. :small_orange_diamond: - the latest information security and hacking news.

Geeky Cybersecurity Video Blogs

:small_orange_diamond: - offensive, binary exploitation, web app security, hardening, red team, blue team. :small_orange_diamond: - a lot more advanced topics than what is typically offered in paid online courses - but for free. :small_orange_diamond: - the important information regarding our internet security. :small_orange_diamond: - talks, interviews, and article about cybersecurity.

Best Personal Twitter Accounts

:small_orange_diamond: - a white-hat hacker/pentester. Intergalactic Minesweeper Champion 1990. :small_orange_diamond: - Co-Founder @ITSPmagazine, at the intersection of IT security and society. :small_orange_diamond: - Linux Evangelist. Malwares. Kernel Dev. Security Enthusiast. :small_orange_diamond: - an InfoSec Professional and Tech Geek. :small_orange_diamond: - CRO at F-Secure, Reverse Engineer, TED Speaker, Supervillain. :small_orange_diamond: - often referred to as ESR, is an American software developer, and open-source software advocate. :small_orange_diamond: - security researcher/programmer, @DragonSectorCTF founder/player, technical streamer. :small_orange_diamond: - Security Researcher & Cyber Observer. :small_orange_diamond: - programmer, malware analyst. Author of PEbear, PEsieve, libPeConv. :small_orange_diamond: - tinkerer, cypherpunk, hacker. :small_orange_diamond: - independent hacker and researcher. :small_orange_diamond: - systems security, industrial safety, sysadmin, author of decentsecurity.com. :small_orange_diamond: - is one of just seven people with the authority to restore the DNS root keys. :small_orange_diamond: - is a famous "grey hat" hacker, security researcher, creator of the MySpace "Samy" worm. :small_orange_diamond: - founder & CTO of Security Weekly podcast network. :small_orange_diamond: - @SecurityBSides co-founder. :small_orange_diamond: - Security Researcher. :small_orange_diamond: - a cryptographer and professor at Johns Hopkins University.

Best Commercial Twitter Accounts

:small_orange_diamond: - check if you have an account that has been compromised in a data breach. :small_orange_diamond: - trusted by more of the Fortune 500 than any other crowdsourced security platform. :small_orange_diamond: - most trusted security company. Unmatched threat visibility. :small_orange_diamond: - the world's leading Digital Forensics and Incident Response provider. :small_orange_diamond: - AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, and more. :small_orange_diamond: - an information security focused podcast and group of individuals from all walks of life. :small_orange_diamond: - Hedgehog Cyber. Gibraltar and Manchester's top boutique information security firm. :small_orange_diamond: - the National Cyber Security Centre. Helping to make the UK the safest place to live and work online. :small_orange_diamond: - IT security experts.

A piece of history

:small_orange_diamond: - how to configure modems, scan images, record CD-ROMs, and other.*

Other

:small_orange_diamond: - how Diffie-Hellman Key Exchange worked.

Pentesters arsenal tools

:small_orange_diamond: - a penetration-oriented browser with plenty of advanced functionality already built in. :small_orange_diamond: - tool and framework for pentesting system, web and many more, contains a lot a ready to use exploit. :small_orange_diamond: - tool for testing web app security, intercepting proxy to replay, inject, scan and fuzz. :small_orange_diamond: - intercepting proxy to replay, inject, scan and fuzz HTTP requests. :small_orange_diamond: - is a Web Application Attack and Audit Framework. :small_orange_diamond: - an interactive TLS-capable intercepting HTTP proxy for penetration testers. :small_orange_diamond: - web server scanner which performs comprehensive tests against web servers for multiple items. :small_orange_diamond: - tool that automates the process of detecting and exploiting SQL injection flaws. :small_orange_diamond: - is a full-featured Web Reconnaissance framework written in Python. :small_orange_diamond: - is a network reconnaissance tool which performs automated enumeration of services. :small_orange_diamond: - an Integrated Multiuser Pentest Environment. :small_orange_diamond: - incredibly fast crawler designed for OSINT. :small_orange_diamond: - most advanced XSS detection suite. :small_orange_diamond: - automated pentest framework for offensive security experts. :small_orange_diamond: - is an agent-less vulnerability scanner for Linux, FreeBSD, and other. :small_orange_diamond: - is a general purpose network security scanner with an extensible plugin system. :small_orange_diamond: - a tool for domain flyovers. :small_orange_diamond: - information gathering tool for a website or IP address. :small_orange_diamond: - detect and bypass web application firewalls and protection systems. :small_orange_diamond: - CORS misconfiguration scanner. :small_orange_diamond: - is a high performance offensive security tool for reconnaissance and vulnerability scanning. :small_orange_diamond: - find web directories without bruteforce. :small_orange_diamond: - is a fast password cracker, currently available for many flavors of Unix, Windows, and other. :small_orange_diamond: - world's fastest and most advanced password recovery utility. :small_orange_diamond: - is a tool to identify the players behind any incidental TCP/IP communications. :small_orange_diamond: - a prototype SSH configuration and policy scanner. :small_orange_diamond: - find open databases - powered by Binaryedge.io :small_orange_diamond: - searchable archive from The Exploit Database. :small_orange_diamond: - is a command line utility for searching and downloading exploits. :small_orange_diamond: - some setup scripts for security research tools. :small_orange_diamond: - CTF framework and exploit development library. :small_orange_diamond: - collection of small security tools created mostly in Python. CTFs, pentests and so on. :small_orange_diamond: - is a package of Pentest scripts. :small_orange_diamond: - python tools for penetration testers. :small_orange_diamond: - dictionary of attack patterns and primitives for black-box application fault injection. :small_orange_diamond: - is a free software fuzzer maintained by Google. :small_orange_diamond: - is AFL with community patches. :small_orange_diamond: - is an unsupervised, coverage-guided kernel fuzzer. :small_orange_diamond: - exploit development and reverse engineering with GDB made easy. :small_orange_diamond: - Python Exploit Development Assistance for GDB. :small_orange_diamond: - multi-processor disassembler and debugger useful for reverse engineering malware. :small_orange_diamond: - framework for reverse-engineering and analyzing binaries. :small_orange_diamond: - exploitation framework for embedded devices. :small_orange_diamond: - is a software reverse engineering (SRE) framework. :small_orange_diamond: - is an SRE platform integrating Ghidra's decompiler. :small_orange_diamond: - open-source pentesting management and automation platform by Salesforce Product Security. :small_orange_diamond: - is a graphical tool for custom wordlist generation. :small_orange_diamond: - vulnerability assessment and management helps to perform scans and manage vulnerabilities. :small_orange_diamond: - fully automated offensive security tool for reconnaissance and vulnerability scanning. :small_orange_diamond: - the browser exploitation framework project. :small_orange_diamond: - automated mass exploiter. :small_orange_diamond: - is a tool to identify and exploit sudo rules' misconfigurations and vulnerabilities. :small_orange_diamond: - the pattern matching swiss knife. :small_orange_diamond: - a little tool to play with Windows security. :small_orange_diamond: - hunt down social media accounts by username across social networks. :small_orange_diamond: - is a tool used to create threat model diagrams and to record possible threats.

Pentests bookmarks collection

:small_orange_diamond: - the penetration testing execution standard. :small_orange_diamond: - amazing mind map with vulnerable apps and systems. :small_orange_diamond: - incredible mind map for WebApps security tests. :small_orange_diamond: - master the art of Cross Site Scripting. :small_orange_diamond: - contains many vectors that can help you bypass WAFs and filters. :small_orange_diamond: - security bookmarks collection, all things that author need to pass OSCP. :small_orange_diamond: - collection of the cheat sheets useful for pentesting. :small_orange_diamond: - awesome lists for hackers, pentesters and security researchers. :small_orange_diamond: - a curated list of awesome hacking tutorials, tools and resources. :small_orange_diamond: - collection of hacking/penetration testing resources to make you better. :small_orange_diamond: - collection of awesome penetration testing resources, tools and other shiny things. :small_orange_diamond: - is a curated list of awesome Hacking Tools. :small_orange_diamond: - author hacking and pentesting notes. :small_orange_diamond: - official Black Hat arsenal security tools repository. :small_orange_diamond: - the complete list of Infosec related cheat sheets. :small_orange_diamond: - includes thousands of cybersecurity-related references and resources. :small_orange_diamond: - there are a LOT of pentesting blogs. :small_orange_diamond: - Penetration Testing Reference Bank - OSCP/PTP & PTX Cheatsheet. :small_orange_diamond: - to aid the development of techniques and hypothesis for hunting campaigns. :small_orange_diamond: - notes for beginner network pentesting course. :small_orange_diamond: - is a list of resources that author have been gathering in preparation for the OSCP. :small_orange_diamond: - a list of useful payloads and bypass for Web Application Security and Pentest/CTF. :small_orange_diamond: - git all the Payloads! A collection of web attack payloads. :small_orange_diamond: - command injection payload list. :small_orange_diamond: - great search queries to plug into Shodan. :small_orange_diamond: - is a collection of Awesome XSS resources. :small_orange_diamond: - common php webshells. :small_orange_diamond: - a quick reference high level overview for typical penetration testing. :small_orange_diamond: - is a collection of high value information on specific application security topics. :small_orange_diamond: - is an open source solution the OWASP Top 10 2013 entry. :small_orange_diamond: - OWASP Top 10 Proactive Controls 2018. :small_orange_diamond: - hacking & penetration testing & red team & cyber security resources. :small_orange_diamond: - is a free online security knowledge library for pentesters/researchers. :small_orange_diamond: - great stuff from DEFCON. :small_orange_diamond: - a curated list of awesome malware analysis tools and resources. :small_orange_diamond: - detailed technical stuff about the many different variants of the SQL Injection. :small_orange_diamond: - great and detailed reference about vulnerabilities. :small_orange_diamond: - a collection of HTML5 related XSS attack vectors. :small_orange_diamond: - for generating XSS code to check your input validation filters against XSS. :small_orange_diamond: - list of Unix binaries that can be exploited by an attacker to bypass local security restrictions. :small_orange_diamond: - collection of security, system, network and pentest cheatsheets. :small_orange_diamond: - a collection of SSRF Tips. :small_orange_diamond: - great archive of CTFs. :small_orange_diamond: - CTF (Capture The Flag) writeups, code snippets, notes, scripts. :small_orange_diamond: - collection of CTF Web challenges. :small_orange_diamond: - The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security testing. :small_orange_diamond: - notes on the most common things for an Internal Network Penetration Test. :small_orange_diamond: - shows quick ways in which API keys leaked by a bug bounty program can be checked. :small_orange_diamond: - various Proof of Concepts of security research performed by Securitum. :small_orange_diamond: - is a list of public pentest reports released by several consulting security groups. :small_orange_diamond: - is a comprehensive curated list of available Bug Bounty. :small_orange_diamond: - is a list of bug bounty write-ups. :small_orange_diamond: - is a curated list of bugbounty writeups. :small_orange_diamond: - list of bug bounty writeups (2012-2020). :small_orange_diamond: - a great journey into security.

Backdoors/exploits

:small_orange_diamond: - a collection of PHP backdoors. For educational or testing purposes only.

Wordlists and Weak passwords

:small_orange_diamond: - for any kind of bruteforce find wordlists or unleash the power of them all at once! :small_orange_diamond: - is a free online hash resolving service incorporating many unparalleled techniques. :small_orange_diamond: - collection of multiple types of lists used during security assessments, collected in one place. :small_orange_diamond: - sorted by probability originally created for password generation and testing. :small_orange_diamond: - password dictionaries and leaked passwords repository. :small_orange_diamond: - official dictionary created by the team on the forum bezpieka.org.* - wordlists for creating statistically likely username lists.

Bounty platforms

:small_orange_diamond: - bug bounty platform with infosec jobs. :small_orange_diamond: - allows any security researcher reporting a vulnerability on any website. :small_orange_diamond: - global hacker community to surface the most relevant security issues. :small_orange_diamond: - crowdsourced cybersecurity for the enterprise. :small_orange_diamond: - crowdsourced security & bug bounty management. :small_orange_diamond: - crowdsourced security & bug bounty programs, crowd security intelligence platform, and more. :small_orange_diamond: - bug bounty platform.

Web Training Apps (local installation)

:small_orange_diamond: - comprehensive and well maintained registry of all known vulnerable web applications. :small_orange_diamond: - PHP/MySQL web application that is damn vulnerable. :small_orange_diamond: - vulnerable web application amongst security researchers. :small_orange_diamond: - is a VM that is built from the ground up with a large amount of security vulnerabilities. :small_orange_diamond: - is a deliberately vulnerable web application written in under 100 lines of code. :small_orange_diamond: - free, open source, deliberately vulnerable web-application. :small_orange_diamond: - the most bug-free vulnerable application in existence. :small_orange_diamond: - OWASP Top 10 security risks apply to web apps developed using Node.js. :small_orange_diamond: - run Capture the Flags and Security Trainings with OWASP Juice Shop. :small_orange_diamond: - web and mobile application security training platform. :small_orange_diamond: - open source application security training program. :small_orange_diamond: - a modern vulnerable web app. :small_orange_diamond: - damn vulnerable NodeJS application. :small_orange_diamond: - is an open-source application vulnerability correlation and security orchestration tool. :small_orange_diamond: - web application exploits and defenses. :small_orange_diamond: - is a playground focused on learning the exploitation of client-side web vulnerabilities. :small_orange_diamond: - single vm lab with the purpose of combining several vulnerable appliations in one environment. :small_orange_diamond: - pre-built Vulnerable Environments based on docker-compose. :small_orange_diamond: - the new & improved "Vulnerable by Design" AWS deployment tool. :small_orange_diamond: - is a laboratory for learning secure web development in a practical manner. :small_orange_diamond: - sample vulnerable code and its exploit code. :small_orange_diamond: - a Game of Hackers (CTF Scoreboard & Game Manager). :small_orange_diamond: - application security training (OWASP Top Web & Api).

Labs (ethical hacking platforms/trainings/CTFs)

:small_orange_diamond: - true performance-based penetration testing training for over a decade. :small_orange_diamond: - online platform allowing you to test your penetration testing skills. :small_orange_diamond: - online ethical hacking, computer network and security challenge platform. :small_orange_diamond: - non-commercial wargame site which provides various pwn challenges. :small_orange_diamond: - is a wargame site for hackers to test and expand their binary exploiting skills. :small_orange_diamond: - is a free computer security game targeted at middle and high school students. :small_orange_diamond: - is an online platform built to help ethical hackers learn and practice their cybersecurity knowledge. :small_orange_diamond: - CTF archive and a place, where you can get some another CTF-related info. :small_orange_diamond: - high quality security testing services. :small_orange_diamond: - pentest lab, take your Hacking skills to the next level. :small_orange_diamond: - the fast, easy, and affordable way to train your hacking skills. :small_orange_diamond: - a great platform to train your pentesting skills. :small_orange_diamond: - learning Cyber Security made easy. :small_orange_diamond: - is a realistic web application hacking game, designed to help players of all abilities develop their skills. :small_orange_diamond: - it's full of nasty app sec holes. :small_orange_diamond: - can help you to learn and practice security concepts in the form of fun-filled games. :small_orange_diamond: - is an online Penetration Testing Lab. :small_orange_diamond: - provides vulnerable systems that can be used to test and understand vulnerabilities. :small_orange_diamond: - tons of challenges designed to test and improve your hacking skills. :small_orange_diamond: - several security-oriented challenges for your entertainment. :small_orange_diamond: - preconfigured lab environments. :small_orange_diamond: - emulate IT infrastructures of real companies for legal pen testing and improving pentest skills. :small_orange_diamond: - reversal challenges done in the web interface. :small_orange_diamond: - download crackmes to help improve your reverse engineering skills. :small_orange_diamond: - DOM XSS security learning and practicing platform. :small_orange_diamond: - upgrade your web hacking techniques today! :small_orange_diamond: - allows anyone to gain practical 'hands-on' experience in digital security. :small_orange_diamond: - is a penetration testing training platform, which offers various computer challenges. :small_orange_diamond: - offers you tons of challenges designed to test and improve your hacking skills. :small_orange_diamond: - a platform where you can build, host and share vulnerable web apps for educational purposes. :small_orange_diamond: - discover how hacks, dumps and defacements are performed and secure your website. :small_orange_diamond: - these challenges cover the exploits listed in the OWASP Top 10 Project. :small_orange_diamond: - challenges, exercises, problems and tasks - by level, by type, and more. :small_orange_diamond: - the home of the Hacker - Malware, Reverse Engineering, and Computer Science. :small_orange_diamond: - there are exist a lots of different challenge types. :small_orange_diamond: - is the go-to place for hackers who want to test their skills. :small_orange_diamond: - is a free class for web security. :small_orange_diamond: - a stupid game for learning about containers, capabilities, and syscalls. :small_orange_diamond: - a series of levels you'll learn about common mistakes and gotchas when using AWS. :small_orange_diamond: - provides web hacking challenges derived from bounty write-ups. :small_orange_diamond: - CTF Web App challenges. :small_orange_diamond: - most of the challenges used in the Google CTF 2017. :small_orange_diamond: - is a free, safe and legal training ground for hackers. :small_orange_diamond: - is a browser-based cloud labs. :small_orange_diamond: - a fun platform for learning modern cryptography. :small_orange_diamond: - the cryptopals crypto challenges.

CTF platforms

:small_orange_diamond: - platform to host Capture the Flag competitions. :small_orange_diamond: - scoreboard for Capture The Flag competitions.

Other resources

:small_orange_diamond: - open source education content for the researcher community. :small_orange_diamond: - a list of resources and scripts that I have been gathering in preparation for the OSCP. :small_orange_diamond: - test your web apps with real-world examples (two-part series). :small_orange_diamond: - an awesome collection of articles from several respected hackers and other thinkers. :small_orange_diamond: - compilation of resources from TCM's Udemy Course.

RSS Readers

:small_orange_diamond: - organize, read and share what matters to you. :small_orange_diamond: - similar to feedly with a support for filtering what you fetch from rss.

IRC Channels

:small_orange_diamond: - hackerspace IRC channels.

Security

:small_orange_diamond: - leading news source dedicated to promoting awareness for security experts and hackers. :small_orange_diamond: - provides the latest hacking news, exploits and vulnerabilities for ethical hackers. :small_orange_diamond: - security news as a weekly digest (email notifications). :small_orange_diamond: - the latest news and insights from Google on security and safety on the Internet. :small_orange_diamond: - expert network security guidance and news. :small_orange_diamond: - connecting the Information Security Community. :small_orange_diamond: - latest hacking tools, hacker news, cybersecurity best practices, ethical hacking & pen-testing. :small_orange_diamond: - public disclosure watcher who keeps you up to date about the recently disclosed bugs. :small_orange_diamond: - a subreddit dedicated to hacking and hackers. :small_orange_diamond: - information security services, news, files, tools, exploits, advisories and whitepapers. :small_orange_diamond: - about security, penetration tests, vulnerabilities and many others (PL/EN). :small_orange_diamond: - basic aspects and mechanisms of Linux operating system security (PL).

Other/All-in-one

:small_orange_diamond: - is a community of hackers; news & podcasts for developers and hackers.

:small_orange_diamond: - a validating, recursive, and caching DNS server. :small_orange_diamond: - how to get faster and more secure DNS resolution with Knot Resolver on Fedora. :small_orange_diamond: - tutorial to setup your own DNS-over-HTTPS (DoH) server. :small_orange_diamond: - a cartoon intro to DNS over HTTPS. :small_orange_diamond: - following to your DoH server, setup your DNS-over-TLS (DoT) server. :small_orange_diamond: - how (and why) i run my own DNS Servers.

:small_orange_diamond: - build your own certificate authority (CA) using the OpenSSL tools. :small_orange_diamond: - build your own certificate authority (CA) using open source step-ca.

:small_orange_diamond: - how to create an OS from scratch. :small_orange_diamond: - how to write your own virtual machine (VM). :small_orange_diamond: - dozens of minimal operating systems to learn x86 system programming. :small_orange_diamond: - the scott CPU from "But How Do It Know?" by J. Clark Scott. :small_orange_diamond: - the little book about OS development.

Bypass WAFs by Shortening IP Address (by )

For more information please see and .

Hashing, encryption and encoding (by )

plaintext hash hash plaintext

plaintext ciphertext plaintext ciphertext ( shared key)

plaintext ciphertext plaintext ciphertext ( public key, private key)

text encoded text encoded

Tool:

Look also: .

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Save @ ~/.vim/plugins

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Filter incoming (on interface) traffic (specific )

Filter incoming (on interface) traffic (specific ) and write to a file

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

Tool:

▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
➡️
⛔
➡️
🔑
➡️
⬅️
🔑
⬅️
🔑
➡️
🔑
➡️
⬅️
〽️
⬅️
🔑
〽️
➡️
⬅️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
▪️
GNU Bash
Zsh
tclsh
bash-it
Oh My ZSH!
Oh My Fish
Starship
powerlevel10k
z
fzf
zsh-autosuggestions
zsh-syntax-highlighting
Awesome ZSH Plugins
Midnight Commander
ranger
nnn
screen
tmux
tmux-cssh
vi
vim
emacs
micro
neovim
spacemacs
spacevim
fd
ncdu
PuTTY
Mosh
Eternal Terminal
nmap
zmap
Rust Scan
masscan
pbscan
hping
mtr
mylg
netcat
socat
tcpdump
tshark
Termshark
ngrep
netsniff-ng
sockdump
stenographer
tcpterm
bmon
iptraf-ng
vnstat
iPerf3
ethr
Etherate
echoip
Nemesis
packetfu
Scapy
impacket
ssh-audit
aria2
iptables-tracer
inception
dnsdiag
fierce
subfinder
sublist3r
amass
namebench
massdns
knock
dnsperf
dnscrypt-proxy 2
dnsdbq
grimd
curl
kurly
HTTPie
wuzz
h2spec
h2t
htrace.sh
httpstat
httplab
Lynx
Browsh
HeadlessBrowsers
ab
siege
wrk
wrk2
vegeta
bombardier
gobench
hey
boom
SlowHTTPTest
gobuster
ssllabs-scan
http-observatory
openssl
gnutls-cli
sslyze
sslscan
testssl.sh
cipherscan
spiped
Certbot
mkcert
certstrap
Sublert
mkchain
SELinux
AppArmor
grapheneX
DevSec Hardening Framework
ossec
auditd
Tiger
Lynis
LinEnum
Rkhunter
PE-sieve
strace
DTrace
ltrace
ptrace-burrito
perf-tools
bpftrace
sysdig
Valgrind
gperftools
glances
htop
bashtop
nmon
atop
lsof
FlameGraph
lsofgraph
rr
Performance Co-Pilot
hexyl
angle-grinder
lnav
GoAccess
ngxtop
usql
pgcli
mycli
litecli
mssql-cli
OSQuery
pgsync
iredis
Nipe
multitor
Irssi
WeeChat
taskwarrior
sysadmin-util
incron
lsyncd
GRV
Tig
tldr
archiver
commander.js
gron
bed
Guake
Terminator
Kitty
Alacritty
Wireshark
Ettercap
EtherApe
Packet Sender
Ostinato
JMeter™
locust
TOR Browser
KeePassXC
Bitwarden
HexChat
Pidgin
Signal
Wire
TorChat
Matrix
Sublime Text
Visual Studio Code
Atom
SSL/TLS Capabilities of Your Browser
Can I use
Panopticlick 3.0
Privacy Analyzer
Web Browser Security
How's My SSL?
sslClientInfo
SSLLabs Server Test
SSLLabs Server Test (DEV)
ImmuniWeb® SSLScan
SSL Check
SSL Scanner
CryptCheck
urlscan.io
Report URI
CSP Evaluator
Useless CSP
Why No HTTPS?
TLS Cipher Suite Search
cipherli.st
dhtool
badssl.com
tlsfun.de
CAA Record Helper
Common CA Database
CERTSTREAM
crt.sh
Hardenize
Cipher suite compatibility
urlvoid
security.txt
ssl-config-generator
Security Headers
Observatory by Mozilla
webhint
ViewDNS
DNSLookup
DNSlytics
DNS Spy
Zonemaster
Leaf DNS
Find subdomains online
DNSdumpster
DNS Table online
intoDNS
DNS Bajaj
BuddyDNS Delegation LAB
dnssec-debugger
PTRarchive.com
xip.io
nip.io
dnslookup (ceipam)
What's My DNS
DNSGrep
smtp-tls-checker
MX Toolbox
Secure Email
blacklistalert
MultiRBL
DKIM SPF & Spam Assassin Validator
URL Encode/Decode
Uncoder
Regex101
RegExr
RegEx Testing
RegEx Pal
The Cyber Swiss Army Knife
Netcraft
RIPE NCC Atlas
Robtex
Security Trails
Online Curl
Online Tools for Developers
Ping.eu
Network-Tools
BGPview
Is BGP safe yet?
Riseup
VirusTotal
privacytools.io
DNS Privacy Test Servers
ShellCheck
explainshell
jsbin
CodeSandbox
PHP Sandbox
Repl.it
vclFiddle
GTmetrix
Sucuri loadtimetester
Pingdom Tools
PingMe.io
PageSpeed Insights
web.dev
Lighthouse
Censys
Shodan
Shodan 2000
GreyNoise
ZoomEye
netograph
FOFA
onyphe
IntelligenceX
binaryedge
Spyse
wigle
PublicWWW
IntelTechniques
hunter
GhostProject?
databreaches
We Leak Info
Pulsedive
Buckets by Grayhatwarfar
Vigilante.pw
builtwith
NerdyData
zorexeye
Mamont's open FTP Index
OSINT Framework
maltiverse
Leaked Source
We Leak Info
pipl
abuse.ch
malc0de
Cybercrime Tracker
shhgit
searchcode
Insecam
index-of
Rapid7 Labs Open Data
Common Response Headers
thispersondoesnotexist
AI Generated Photos
fakenamegenerator
Intigriti Redirector
have i been pwned?
dehashed
Leaked Source
CVE Mitre
CVE Details
Exploit DB
0day.today
sploitus
cxsecurity
Vulncode-DB
cveapi
ImmuniWeb® Mobile App Scanner
Quixxi
Ostorlab
Startpage
searX
darksearch
Qwant
DuckDuckGo
Swisscows
Disconnect
MetaGer
CounterMail
Mail2Tor
Tutanota
Protonmail
Startmail
Keybase
SKS OpenPGP Key server
Slackware
OpenBSD
HardenedBSD
Kali Linux
Parrot Security OS
Backbox Linux
BlackArch
Pentoo
Security Onion
Tails
vedetta
Qubes OS
Varnish Cache
Nginx
OpenResty
Tengine
Caddy Server
HAProxy
Unbound
Knot Resolver
PowerDNS
3proxy
Emerald Onion
pi-hole
maltrail
security_monkey
firecracker
streisand
CapAnalysis
netbox
NRE Labs
LBNL's Network Research Group
gvisor
ctop
Moby
Traefik
kong
rancher
portainer
nginx-proxy
docker-bench-security
trivy
Harbor
docker-cheat-sheet
awesome-docker
docker_practice
labs
dockerfiles
kubernetes-the-hard-way
kubernetes-the-easy-way
cheatsheet-kubernetes-A4
k8s-security
kubernetes-production-best-practices
kubernetes-production-best-practices
kubernetes-failure-stories
pure-bash-bible
pure-sh-bible
bash-guide
bash-handbook
The Bash Hackers Wiki
Shell & Utilities
the-art-of-command-line
Shell Style Guide
Vim Cheat Sheet
Awesome Python
python-cheatsheet
pythoncheatsheet.org
F’Awk Yeah!
nixCraft
TecMint
Omnisecu
linux-cheat
linuxupskillchallenge
Unix Toolbox
Linux Kernel Teaching
htop explained
Linux Guide and Hints
strace-little-book
linux-tracing-workshop
http2-explained
http3-explained
HTTP/2 in Action
Let's code a TCP/IP stack
Nginx Admin's Handbook
nginxconfig.io
openssh guideline
SSH Handshake Explained
ISC's Knowledgebase
PacketLife.net
AD-Attack-Defense
The System Design Primer
Awesome Scalability
Web Architecture 101
CIS Benchmarks
Security Harden CentOS 7
CentOS 7 Server Hardening Guide
awesome-security-hardening
The Practical Linux Hardening Guide
Linux Hardening Guide
Hacking Articles
AWS security tools
Rawsec's CyberSecurity Inventory
The Illustrated TLS Connection
SSL Research
SELinux Game
Certificates and PKI
The Art of Subdomain Enumeration
Quitting Google
OWASP
OWASP ASVS 3.0.1
OWASP ASVS 3.0.1 Web App
OWASP ASVS 4.0
OWASP Testing Guide v4
OWASP Dev Guide
OWASP WSTG
OWASP API Security Project
Mozilla Web Security
security-bulletins
API-Security-Checklist
Enable CORS
Application Security Wiki
Weird Proxies
Webshells
Practical Web Cache Poisoning
Hidden directories and files
Explosive blog
Security Cookies
APISecurityBestPractices
LZone Cheat Sheets
Dan’s Cheat Sheets’s
Rico's cheatsheets
DevDocs API
cheat.sh
gnulinux.guru
free-programming-books
CTF Series : Vulnerable Machines
50M_CTF_Writeup
ctf-tasks
How to start RE/malware analysis?
The C10K problem
How 1500 bytes became the MTU of the internet
poor man's profiler
HTTPS on Stack Overflow
Julia's Drawings
Hash collisions
sha256-animation
BGP Meets Cat
bgp-battleships
What happens when...
how-web-works
HTTPS in the real world
Gitlab and NFS bug
Gitlab melts down
How To Become A Hacker
Operation Costs in CPU
Let's Build a Simple Database
simple-computer
The story of "Have I been pwned?"
TOP500 Supercomputers
How to build a 8 GPU password cracker
CERN Data Centre
How fucked is my database
Linux Troubleshooting 101 , 2016 Edition
Five Whys
Maersk, me & notPetya
howhttps.works
howdns.works
POSTGRESQLCO.NF
Awesome Sysadmin
Awesome Shell
Command-line-text-processing
Awesome Pcaptools
awesome-ebpf
Linux Network Performance
Awesome Postgres
quick-SQL-cheatsheet
Awesome-Selfhosted
List of applications
CS-Interview-Knowledge-Map
DevOps-Guide
FreeBSD Journal
devops-interview-questions
Web Developer Roadmap
Front-End-Checklist
Front-End-Performance-Checklist
Python's Magic Methods
wtfpython
js-dev-reads
Commit messages guide
Awesome Web Security
awesome-cyber-skills
awesome-devsecops
awesome-osint
HolyTips
awesome-threat-intelligence
Red-Teaming-Toolkit
awesome-burp-extensions
Free Security eBooks
Hacking-Security-Ebooks
privacy-respecting
reverse-engineering
linux-re-101
reverseengineering-reading-list
Awesome-WAF
awesome-shodan-queries
RobotsDisallowed
HackingNeuralNetworks
wildcard-certificates
Don't use VPN services
awesome-yara
macOS-Security-and-Privacy-Guide
macos_security
awesome-sec-talks
Movies for Hackers
Cryptography_1
Crypton
Cheatography
awesome-static-analysis
computer-science
post-mortems
build-your-own-x
Project-Based-Tutorials-in-C
The-Documentation-Compendium
awesome-python-applications
awesome-public-datasets
machine-learning-algorithms
Varnish for PHP developers
A Netflix Guide to Microservices
Comparing C to machine lang
Brendan Gregg's Blog
Gynvael "GynDream" Coldwind
Michał "lcamtuf" Zalewski
Mattias Geniar
Nick Craver
Scott Helme
Brian Krebs
Bruce Schneier
Chrissy Morgan
Andy Gill
Daniel Miessler
Samy Kamkar
Javvad Malik
Graham Cluley
Kacper Szurek
Troy Hunt
raymii.org
Robert Penz
Linux Audit
Linux Security Expert
The Grymoire
Secjuice
Decipher
Tenable Podcast
Sophos
Tripwire State of Security
Malwarebytes Labs Blog
TrustedSec
PortSwigger Web Security Blog
AT&T Cybersecurity blog
Thycotic
Risky Business
Cyber, by Motherboard
Tenable Podcast
Cybercrime Investigations
The many hats club
Darknet Diaries
OSINTCurious Webcasts
Security Weekly
rev3rse security
LiveOverflow
J4vv4D
CyberTalks
@blackroomsec
@MarcoCiappelli
@binitamshah
@joe_carson
@mikko
@esrtweet
@gynvael
@x0rz
@hasherezade
@TinkerSec
@alisaesage
@SwiftOnSecurity
@dakami
@samykamkar
@securityweekly
@jack_daniel
@thegrugq
@matthew_d_green
@haveibeenpwned
@bugcrowd
@Malwarebytes
@sansforensics
@attcyber
@TheManyHatsClub
@hedgehogsec
@NCSC
@Synacktiv
How to Do Things at ARL
Diffie-Hellman Key Exchange (short version)
Sandcat Browser
Metasploit
Burp Suite
OWASP Zed Attack Proxy
w3af
mitmproxy
Nikto2
sqlmap
Recon-ng
AutoRecon
Faraday
Photon
XSStrike
Sn1per
vuls
tsunami
aquatone
BillCipher
WhatWaf
Corsy
Raccoon
dirhunt
John The Ripper
hashcat
p0f
ssh_scan
LeakLooker
exploitdb
getsploit
ctf-tools
pwntools
security-tools
pentestpackage
python-pentest-tools
fuzzdb
AFL
AFL++
syzkaller
pwndbg
GDB PEDA
IDA
radare2
routersploit
Ghidra
Cutter
Vulnreport
Mentalist
archerysec
Osmedeus
beef
AutoSploit
SUDO_KILLER
yara
mimikatz
sherlock
OWASP Threat Dragon
PTES
Pentests MindMap
WebApps Security Tests MindMap
Brute XSS
XSS cheat sheet
Offensive Security Bookmarks
Awesome Pentest Cheat Sheets
Awesome Hacking by HackWithGithub
Awesome Hacking by carpedm20
Awesome Hacking Resources
Awesome Pentest
Awesome-Hacking-Tools
Hacking Cheat Sheet
blackhat-arsenal-tools
Penetration Testing and WebApp Cheat Sheets
Cyber Security Resources
Pentest Bookmarks
Cheatsheet-God
ThreatHunter-Playbook
Beginner-Network-Pentesting
OSCPRepo
PayloadsAllTheThings
payloads
command-injection-payload-list
Awesome Shodan Search Queries
AwesomeXSS
php-webshells
Pentesting Tools Cheat Sheet
OWASP Cheat Sheet Series
OWASP dependency-check
OWASP ProActive Controls
PENTESTING-BIBLE
pentest-wiki
DEF CON Media Server
Awesome Malware Analysis
SQL Injection Cheat Sheet
Entersoft Knowledge Base
HTML5 Security Cheatsheet
XSS String Encoder
GTFOBins
Guifre Ruiz Notes
SSRF Tips
shell-storm repo CTF
ctf
My-CTF-Web-Challenges
MSTG
Internal-Pentest-Playbook
KeyHacks
securitum/research
public-pentesting-reports
awesome-bug-bounty
bug-bounty-reference
Awesome-Bugbounty-Writeups
Bug bounty writeups
hackso.me
PHP-backdoors
Weakpass
Hashes.org
SecLists
Probable-Wordlists
skullsecurity passwords
Polish PREMIUM Dictionary
1
:small_orange_diamond:
statistically-likely-usernames
YesWeHack
Openbugbounty
hackerone
bugcrowd
Crowdshield
Synack
Hacktrophy
OWASP-VWAD
DVWA
metasploitable2
metasploitable3
DSVW
OWASP Mutillidae II
OWASP Juice Shop Project
OWASP Node js Goat Project
juicy-ctf
SecurityShepherd
Security Ninjas
hackazon
dvna
django-DefectDojo
Google Gruyere
Bodhi
Websploit
vulhub
CloudGoat 2
secDevLabs
CORS-vulnerable-Lab
RootTheBox
KONTRA
Offensive Security
Hack The Box
Hacking-Lab
pwnable.kr
Pwnable.tw
picoCTF
CTFlearn
ctftime
Silesia Security Lab
Practical Pentest Labs
Root Me
rozwal.to
TryHackMe
hackxor
Hack Yourself First
OverTheWire
Wizard Labs
PentesterLab
RingZer0
try2hack
Ubeeri
Pentestit
Microcorruption
Crackmes
DomGoat
Stereotyped Challenges
Vulnhub
W3Challs
RingZer0 CTF
Hack.me
HackThis!
Enigma Group WebApp Training
Reverse Engineering Challenges
0x00sec
We Chall
Hacker Gateway
Hacker101
contained.af
flAWS challenge!
CyberSec WTF
CTF Challenge
gCTF
Hack This Site
Attack & Defense
Cryptohack
Cryptopals
fbctf
ctfscoreboard
Bugcrowd University
OSCPRepo
OWASP Top 10: Real-World Examples
phrack.org
Practical-Ethical-Hacking-Resources
Feedly
Inoreader
#hackerspaces
The Hacker News
Latest Hacking News
Security Newsletter
Google Online Security Blog
Qualys Blog
DARKReading
Darknet
publiclyDisclosed
Reddit - Hacking
Packet Storm
Sekurak
nf.sec
Changelog
Unbound DNS Tutorial
Knot Resolver on Fedora
DNS-over-HTTPS
dns-over-https
DNS-over-TLS
DNS Servers
OpenSSL Certificate Authority
step-ca Certificate Authority
os-tutorial
Write your Own Virtual Machine
x86 Bare Metal Examples
simple-computer
littleosbook
0xInfection
How to Obscure Any URL
Magic IP Address Shortcuts
Michal Špaček
terminal
A naive utility to censor credentials in command history
busybox
mount
fuser
lsof
ps
find
top
vmstat
iostat
strace
kill
diff
vimdiff
diffchar
tail
tar
dump
cpulimit
pwdx
taskset
tr
chmod
who
last
screen
script
du
inotifywait
openssl
RFC 5280
How to create multidomain certificates using config files
Generate a multi domains certificate using config files
Your OpenSSL CSR command is out of date
OpenSSL example configuration file
Object Identifiers (OIDs)
openssl objects.txt
secure-delete
dd
gpg
system-other
curl
httpie
ssh
linux-dev
tcpdump
ip:port
ip:port
tcpick
ngrep
hping3
nmap
netcat
gnutls-cli
socat
p0f
netstat
rsync
host
dig
certbot
network-other
git
python
awk
sed
grep
perl
dns.watch
opennic.org
verisign.com
censurfridns.dk
cloudflare.com
dnsprivacy.at