Skip to content

Instantly share code, notes, and snippets.

View Darksidesfear's full-sized avatar
🦍
On vacation

Murphy Darksidesfear

🦍
On vacation
View GitHub Profile

Awesome Penetration Testing Awesome

A collection of awesome penetration testing resources.

Penetration testing is the practice of launching authorized, simulated attacks against computer systems and their physical infrastructure to expose potential security weaknesses and vulnerabilities.

Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Please check the Contributing Guidelines for more details. This work is licensed under a Creative Commons Attribution 4.0 International License.

This project is supported by Netsparker Web Application Security Scanner

@Darksidesfear
Darksidesfear / pentesting.md
Created May 10, 2025 20:41 — forked from MercadoMR/pentesting.md
Redteam/Pentesting/Hacking/Cybersecurity/OSINT Resources

Basic knowledge requirements for cybersecurity and hacking

These are the basic competencies expected (and tested for during the 1st in person interview) by a large, very visible InfoSec company I think it is a good base competency list for anyone looking to get into an Infosec career (with specialization plus and some programming /scripting ability) or learn cybersecurity/hacking as a hobby:

  1. Networking: Good understanding of OSI layer model / Understating of communication flow through each layer / Good understanding of functions of each layer / Understanding of major protocols in each layer / In-depth understanding Layer 3 & Layer 4 protocols  IP, ICMP Protocols (layer 3) TCP, UDP Protocols (layer 4)
  2. Overview of TCP/IP Layer model: ARP / Understanding of Client & Server communication model / Ports common services run on / Ephemeral port vs Well known ports
  3. Understanding of major (everyday Layer 7) services/protocols: DNS o DHCP o HTTP HTTP Header Fields HTTP Status Codes  How HTTP maintains stat
@Darksidesfear
Darksidesfear / resources.bin
Created May 10, 2025 20:39 — forked from teixeira0xfffff/resources.bin
Redteam/Pentesting/Hacking/Cybersecurity/OSINT Resources
++++++ Basic knowledge requirements for cybersecurity and hacking ++++++
These are the basic competencies expected (and tested for during the 1st in person interview) by a large, very visible InfoSec company I think it is a good base competency list for anyone looking to get into an Infosec career (with specialization plus and some programming /scripting ability) or learn cybersecurity/hacking as a hobby:
Networking: Good understanding of OSI layer model / Understating of communication flow through each layer / Good understanding of functions of each layer / Understanding of major protocols in each layer / In-depth understanding Layer 3 & Layer 4 protocols  IP, ICMP Protocols (layer 3) TCP, UDP Protocols (layer 4)
Overview of TCP/IP Layer model: ARP / Understanding of Client & Server communication model / Ports common services run on / Ephemeral port vs Well known ports
Understanding of major (everyday Layer 7) services/protocols: DNS o DHCP o HTTP HTTP Header Fields HTTP Status Codes  How HTTP mainta
@Darksidesfear
Darksidesfear / Web-App-Pentest.sh
Created May 4, 2025 11:34 — forked from MShahine/Web-App-Pentest.sh
List Of Tools For Hackers And Pentesters . I Turn It To Bash Script So You Need [ git ] To Download All Of them . And Then Go To Eatch Folder And See What Can You Do To MAke It Work.
#!/bin/bash
# Web Application Pentest
clear
echo "[!] Don't Run It As Root Never [!]"
sleep 2
mkdir ~/Tools/Web-Application-Pentest
cd ~/Tools/Web-Application-Pentest
# --------------------------------- #
mkdir ~/Tools/Web-Application-Pentest/Domain-Finding-Enum
mkdir ~/Tools/Web-Application-Pentest/General-Recon
// Template taken from https://github.com/infosecn1nja/MaliciousMacroMSBuild/blob/master/templates/MSBuild_shellcode.csproj
// Compile: C:\windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe /out:c:\test.exe /platform:x86 /unsafe mylauncher.cs
// Or as dll: C:\windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe /out:c:\test.dll /platform:x86 /target:library /unsafe mylauncher.cs
// Then DotNetToJScript.exe -v Auto -l JScript -o mylauncher.js -c ShellCodeLauncher.Program c:\test.dll
// mylauncher.js can be put into something like a WMIC XSL template like so...
/*
// wmic-template.xsl
// wmic os get /format:wmic-template.xsl (if you create x86 shellcode, need to use x86 version of wmic here - c:\windows\syswow64\wbem\wmic.exe)
North Korean Cyber-Attacks and Collateral Damage
February 15, 2018 | Chris Doman
WannaCry was incredibly destructive. The attackers made about $150,000 - but the total damage caused by WannaCry has been estimated in the billions of dollars.
There is strong evidence linking WannaCry to a group of hackers known as ‘Lazarus’, reportedly operating out of the DPRK (North Korea). Whilst WannaCry is perhaps the most famous attack by Lazarus, it isn’t the only ‘collateral damage’ caused by the DPRK’s cyber actions.
Below we disclose new details on three attacks that have spread out of control. Two likely originating from the DPRK - and one targeting the DPRK.
The Voice of Korea and the Rivts Virus
This section describes a piece of malware that may have been created within the DPRK as part of a test project - and accidentally leaked out onto the wider internet.
@Darksidesfear
Darksidesfear / server.py
Created October 5, 2024 14:06 — forked from ecks/server.py
Carbanak Server
import socket
import hashlib
import struct
import time
class IdUid:
def __init__(self):
@Darksidesfear
Darksidesfear / Readme.md
Created October 2, 2024 10:47 — forked from vncloudsco/Readme.md
Acunetix Build Version 14 build 14.7.220228146 Run on Docker

Install crack

Mỗi lần chạy thì chạy nó 1 lần lệnh bash bên dưới

wget -O acunetix.sh https://l.manhtuong.net/3q1vOHs 

bash acunetix.sh vouu/acuss:14.7.220228146

@Darksidesfear
Darksidesfear / danger_cmd.sh
Created September 29, 2024 13:35 — forked from ManishLSN/danger_cmd.sh
Most Dangerous command in Linux
There are plenty of one line terminal commands that can prove to be exorbitantly dangerous.
1. The Delete Everything Command
rm -rf /
This command deletes everything it possibly can, including files on your hard drive and files on connected removable media devices. This command can be explained as follows:
rm – Remove the following files.
-rf – Run rm recursively.