Skip to content

Khaotic Developments

Menu
  • Home
  • What I’m Following
  • Cheatsheets
  • Resources
  • Projects
    • UAC Extract
    • nSpector

Resources

General – Windows/AD – PWN – Web – Mobile – Password Cracking – Boot-2-Root/Wargames – Misc.

General

TitleLinkDescription
picoPrimerLink!Wonder what the shell is and how to use it? Maybe you haven’t thought about cryptography in ages and need a refresh? Revisit concepts you are familiar with or read something new to you in the picoPrimer. Authored by the picoCTF education team, the picoPrimer reviews cybersecurity principles used in our competition challenges. You do not need any additional software to read the picoPrimer or solve the challenges at the end of each chapter.
FuzzySecurityLink!Collection of security related topic by FuzzySecurity
Security and Pentesting ResourcesLink!A collection of online resources
0x00secLink!“The home of the Hacker”
Awesome HackingLink!A collection of various awesome lists for hackers, pentesters and security researchers
CTF 101Link!In this guide/wiki/handbook you’ll learn the techniques, thought processes, and methodologies you need to succeed in Capture the Flag competitions.
CTF Time Write-upsLink!A repository of write-ups for past CTFs hosted on ctftime.org
H4ckerLink!This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.

Windows/AD

TitleLinkDescription
Windows Command ListLink!This set of documentation describes the Windows Commands you can use to automate tasks by using scripts or scripting tools.
Active Directory Exploit CheatsheetLink!A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Active Directory Kill Chain Attack & DefenseLink!Attack and defend active directory using modern post exploitation adversary tradecraft activity
Awesome Windows Red TeamLink!A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams
Active Directory SecurityLink!ADSecurity.org (Active Directory Security) is a place where he (Sean Metcalf) shares Microsoft enterprise security guidance and information about current threats to enterprise networks & mitigation for these threats, Active Directory design and configuration tips, as well as leveraging PowerShell in an Active Directory environment.
Attacking Active DirectoryLink!Attacking Active Directory: 0 to 0.9
Post-Graduate AD StudiesLink!Readings to amp up your AD skills

Pwn

TitleLinkDescription
pwn.collegeLink!pwn.college is a first-stage education platform for students (and other interested parties) to learn about, and practice, core cybersecurity concepts in a hands-on fashion. It is designed to take a “white belt” in cybersecurity to becoming a “yellow belt”, able to approach (simple) CTFs and wargames.
ROP EmporiumLink!Learn return-oriented programming through a series of challenges designed to teach ROP techniques in isolation, with minimal reverse-engineering or bug hunting.
Interactive Beginner’s Guide to ROPLink!Vetie’s Guide on ROP – Includes an interactive console
Linux Kernel TeachingLink!This is a collection of lectures and labs Linux kernel topics. The lectures focus on theoretical and Linux kernel exploration.
NightmareLink!Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges
pwntools TutorialLink!This repository contains some basic tutorials for getting started with pwntools (and pwntools).
Libc DatabaseLink!libc database that allows version enumeration from a libc leak. Also includes the BuildID for use with One_Gadget
One_GadgetLink!The best tool for finding one gadget RCE in libc.so.6

Web

TitleLinkDescription
PortSwigger’s Web Security AcademyLink!Brought to you by the creators of BurpSuite & the author of The Web Application Hacker’s Handbook
PentesterLabLink!Excellent resource to learn Web Hacking
OWASP’s Web Security Testing GuideLink!The WSTG is a comprehensive guide to testing the security of web applications and web services.

Mobile

TitleLinkDescription
Mobile Application Penetration Testing Cheat SheetLink!The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
Android App Reverse Engineering 101Link!This workshop’s goal is to give you the foundations to begin reverse engineering Android applications.
OWASP Mobile Security Testing GuideLink!The MSTG is a comprehensive manual for mobile app security testing and reverse engineering for iOS and Android mobile security testers.

Password Cracking

TitleLinkDescription
One Rule to Rule Them All – Blog PostLink!
one Rule to Rule Them All – RuleLink!One rule to crack all passwords. or atleast we hope so.
J3rryBla4nks’ Password Cracking MethodologyLink!
Probable WordlistsLink!Wordlists sorted by probability originally created for password generation and testing – make sure your passwords aren’t popular!

Boot-2-Root/Wargames

TitleLinkDescription
HackTheBoxLink!Cyber Security Gamified
VulnHubLink!To provide materials that allows anyone to gain practical ‘hands-on’ experience in digital security, computer software & network administration.
TryHackMeLink!A site geared toward beginners in cybersecurity, complete with public walkthroughs for most machines.
picoGymLink!picoGym is a noncompetitive practice space where you can explore and solve challenges from previously released picoCTF competitions, find fresh never before revealed challenges, and build a knowledge base of cybersecurity skills in a safe environment.
Root-MeLink!Root Me allows everyone to test and improve their knowledge in computer security and hacking. Legal. Free. Realistic.
Exploit EducationLink!exploit.education provides a variety of resources that can be used to learn about vulnerability analysis, exploit development, software debugging, binary analysis, and general cyber security issues.
OverTheWireLink!The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games.
PWNABLE.KRLink!‘pwnable.kr’ is a non-commercial wargame site which provides various pwn challenges regarding system exploitation. the main purpose of pwnable.kr is ‘fun’.
crackmes.oneLink!This is a simple place where you can download crackmes to improve your reverse engineering skills.
TJNull’s Vulnerable Machines listLink!TJNull has curated a list of vulnerable machines from several platform to help practice for various certification.

Misc.

TitleLinkDescription
Crypto101Link!Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels.
CryptoHackLink!Learn about modern cryptography by solving a series of interactive puzzles and challenges. Get to know the ciphers and protocols that secure the digital world by breaking them.
Powershell for PentestersLink!A GitHub repo containing lessons for approaching powershell from the perspective of a pentester
How to Prepare to Take the Offensive Security Certified Professional (OSCP) ExamLink!
Introduction to Malware Analysis and Reverse EngineeringLink!This class will introduce the CS graduate students to malware concepts, malware analysis, and black-box reverse engineering techniques. The target audience is focused on computer science graduate students or undergraduate seniors without prior cyber security or malware experience. It is intended to introduce the students to types of malware, common attack recipes, some tools, and a wide array of malware analysis techniques.
Reverse Engineering 101Link!This workshop provides the fundamentals of reversing engineering (RE) Windows malware using a hands-on experience with RE tools and techniques.
HookbinLink!Hookbin is a free service that enables you to collect, parse, and view HTTP requests. Create your unique endpoints to inspect headers, body, query strings, cookies, uploaded files, and much more

Most Recent

  • Hack The Box: Timelapse August 20, 2022
  • Hack The Box: Late July 30, 2022
  • Hack The Box: Unicode May 7, 2022

Categories

CTF Write-Ups (2) General (9) Hack The Box Write-ups (63) RE (5)

Tags

#Android (1) #BSD (3) #Easy (37) #Linux (41) #Medium (25) #Other (2) #Windows (14)

Past Posts

Khaotic Developments 2023 . Powered by WordPress