Ethical Hacking Bookmarks

My security bookmarks collection.

All that things I need to pass OSCP, i think =)

Contents

Security Blogs

Security Forums

Security Methodologies

Training/Classes/Video

Pentest Tools

Pentest Lab ISO-VMs

Metasploit

Net Scanners

Man-in-the-middle attack

Phase 1 – Reconnaissance: Information Gathering before the Attack

Phase 1.1 – People and Orginizational

Phase 1.2 – Infastructure

Phase 1.2 – Tools

Phase 2 – Enumeration: Finding Attack Vectors

Phase 3 – Exploitation: Verifying Security Weaknesses

Dump Windows Password Hashes

Windows Passhing The Hash

Windows Previlige Escalation

Linux Previlige Escalation

Tunneling & Port Forwarding

XSS Cheat Codes

WebShells

SQLi General Resources

MySQLi Resources

MSSQLi Resources

Oracle SQLi Resources

Postgres SQLi Resources

SQLite Resources

RFI/LFI Tutorials

NASM Tutorial

Buffer Overflow Tutorial

Exploit Development

Exploits and Shellcodes

Reverse Engineering

OS Cheat Sheets and Script Syntax

Passwords Wordlists, Hashes, Tools

InfoSec Hiring

IT Certifications

Books


Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s