{"id":169,"date":"2022-12-17T22:42:28","date_gmt":"2022-12-17T22:42:28","guid":{"rendered":"https:\/\/infosecjake.net\/?p=169"},"modified":"2025-01-06T17:10:34","modified_gmt":"2025-01-06T17:10:34","slug":"useful-links-to-help-your-journey","status":"publish","type":"post","link":"https:\/\/infosecjake.net\/?p=169","title":{"rendered":"Useful Links to Help Your Journey"},"content":{"rendered":"\n<p>The below links are a collection of useful tools and sites that you can use for various purposes within the InfoSec realm. Each link will drop you down to a group of links under that section title. Page may periodically be updated. As the web constantly changes, some links may not work.<br><\/p>\n\n\n\n<p><a href=\"#Security-Forums\" title=\"\">Security Forums<\/a><\/p>\n\n\n\n<p><a href=\"#Tor-Onion-Links\" title=\"\">Tor Onion Links<\/a><\/p>\n\n\n\n<p><a href=\"#Security-Methodologies\" title=\"Security Methodologies\">Security Methodologies<\/a><\/p>\n\n\n\n<p><a href=\"#Training-Classes-Videos\" title=\"\">Training\/Classes\/Video<\/a><\/p>\n\n\n\n<p><a href=\"#Pentest-Tools\" title=\"\">Pentest Tools<\/a><\/p>\n\n\n\n<p><a href=\"#Pentest-Lab-VM's\" title=\"\">Pentest Lab ISO-VMs<\/a><\/p>\n\n\n\n<p><a href=\"#Metasploit\" title=\"\">Metasploit<\/a><\/p>\n\n\n\n<p><a href=\"#Net-Scanners\" title=\"\">Net Scanners<\/a><\/p>\n\n\n\n<p><a href=\"#MITM\" title=\"\">Man-in-the-middle attack<\/a><\/p>\n\n\n\n<p><a href=\"#Phase-1\" title=\"\">Phase 1 &#8211; Reconnaissance: Information Gathering before the Attack<\/a><\/p>\n\n\n\n<p><a href=\"#Phase-1.1\" title=\"\">Phase 1.1 &#8211; People and Orginizational<\/a><\/p>\n\n\n\n<p><a href=\"#Phase-1.2\" title=\"\">Phase 1.2 &#8211; Infastructure<\/a><\/p>\n\n\n\n<p><a href=\"#OSINT\" title=\"\">OSINT Tools<\/a><\/p>\n\n\n\n<p><a href=\"#Phase-2\" title=\"\">Phase 2 &#8211; Enumeration: Finding Attack Vectors<\/a><\/p>\n\n\n\n<p><a href=\"#Phase-3\" title=\"\">Phase 3 &#8211; Exploitation: Verifying Security Weaknesses<\/a><\/p>\n\n\n\n<p><a href=\"#Dump-Windows-Hashes\" title=\"\">Dump Windows Password Hashes<\/a><\/p>\n\n\n\n<p><a href=\"#Pass-The-Hash\" title=\"\">Windows Passhing The Hash<\/a><\/p>\n\n\n\n<p><a href=\"#Windows-Priv\" title=\"\">Windows Privilege Escalation<\/a><\/p>\n\n\n\n<p><a href=\"#Linux-Priv\" title=\"\">Linux Privilege Escalation<\/a><\/p>\n\n\n\n<p><a href=\"#Tunneling\" title=\"\">Tunneling &amp; Port Forwarding<\/a><\/p>\n\n\n\n<p><a href=\"#XSS\" title=\"\">XSS Cheat Codes<\/a><\/p>\n\n\n\n<p><a href=\"#WebShells\" title=\"\">WebShells<\/a><\/p>\n\n\n\n<p><a href=\"#SQLi\" title=\"\">SQLi General Resources<\/a><\/p>\n\n\n\n<p><a href=\"#MySQLi\" title=\"\">MySQLi Resources<\/a><\/p>\n\n\n\n<p><a href=\"#MSSQLi\" title=\"\">MSSQLi Resources<\/a><\/p>\n\n\n\n<p><a href=\"#Oracle-SQLi\" title=\"\">Oracle SQLi Resources<\/a><\/p>\n\n\n\n<p><a href=\"#Postgres-SQLi\" title=\"\">Postgres SQLi Resources<\/a><\/p>\n\n\n\n<p><a href=\"#SQLite\" title=\"\">SQLite Resources<\/a><\/p>\n\n\n\n<p><a href=\"#RFI\" title=\"\">RFI\/LFI Tutorials<\/a><\/p>\n\n\n\n<p><a href=\"#NASM\" title=\"\">NASM Tutorial<\/a><\/p>\n\n\n\n<p><a href=\"#Buffer-Overflow\" title=\"\">Buffer Overflow Tutorial<\/a><\/p>\n\n\n\n<p><a href=\"#ExDev\" title=\"\">Exploit Development<\/a><\/p>\n\n\n\n<p><a href=\"#Exploits-And-Shellcodes\" title=\"\">Exploits and Shellcodes<\/a><\/p>\n\n\n\n<p><a href=\"#ReverseEng\" title=\"\">Reverse Engineering<\/a><\/p>\n\n\n\n<p><a href=\"#OS-Cheat-Sheets\" title=\"\">OS Cheat Sheets and Script Syntax<\/a><\/p>\n\n\n\n<p><a href=\"#Password-Wordlists\" title=\"\">Password Wordlists, Hashes, Tools<\/a><\/p>\n\n\n\n<p><br><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>General Education<\/p>\n\n\n\n<p><a href=\"https:\/\/www.vpnmentor.com\/blog\/teachers-guide-to-cybersecurity\">https:\/\/www.vpnmentor.com\/blog\/teachers-guide-to-cybersecurity<\/a><\/p>\n\n\n\n<p id=\"Security-Forums\">Security Forums<\/p>\n\n\n\n<p><a href=\"http:\/\/securityoverride.org\/forum\/index.php\">http:\/\/securityoverride.org\/forum\/index.php<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.hackthissite.org\/forums\/index.php\">https:\/\/www.hackthissite.org\/forums\/index.php<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.ethicalhacker.net\/forums\/index.php\">https:\/\/www.ethicalhacker.net\/forums\/index.php<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/evilzone.org\/\">https:\/\/evilzone.org\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/forum.antichat.ru\/\">http:\/\/forum.antichat.ru\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/forum.xeksec.com\/\">https:\/\/forum.xeksec.com\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/rdot.org\/forum\/\">https:\/\/rdot.org\/forum\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/forum.zloy.bz\/\">https:\/\/forum.zloy.bz\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/forum.reverse4you.org\/\">https:\/\/forum.reverse4you.org\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/rstforums.com\/forum\/\">https:\/\/rstforums.com\/forum\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.truehackers.ru\/forum\/index.php\">http:\/\/www.truehackers.ru\/forum\/index.php<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/garage4hackers.com\/forum.php\">http:\/\/garage4hackers.com\/forum.php<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.hellboundhackers.org\/\">https:\/\/www.hellboundhackers.org\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.lockpicking101.com\/\">http:\/\/www.lockpicking101.com\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.xploitworld.com\/index.php\">https:\/\/www.xploitworld.com\/index.php<\/a><\/p>\n\n\n\n<p id=\"Tor-Onion-Links\">Tor Onion Links<\/p>\n\n\n\n<p><a href=\"http:\/\/www.hiddenwiki.info\/\">http:\/\/www.hiddenwiki.info\/<\/a><\/p>\n\n\n\n<p id=\"Security-Methodologies\">Security Methodologies<\/p>\n\n\n\n<p><a href=\"http:\/\/www.vulnerabilityassessment.co.uk\/Penetration%20Test.html\">http:\/\/www.vulnerabilityassessment.co.uk\/Penetration%20Test.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.pentest-standard.org\/index.php\/Main_Page\">http:\/\/www.pentest-standard.org\/index.php\/Main_Page<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.owasp.org\/index.php\/Category:OWASP_Top_Ten_Project\">https:\/\/www.owasp.org\/index.php\/Category:OWASP_Top_Ten_Project<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/yehg.net\/lab\/pr0js\/misc\/wasarg_owasp-tgv4_with_ref.php\">http:\/\/yehg.net\/lab\/pr0js\/misc\/wasarg_owasp-tgv4_with_ref.php<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.social-engineer.org\/\">http:\/\/www.social-engineer.org\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/projects.webappsec.org\/w\/page\/13246927\/FrontPage\">http:\/\/projects.webappsec.org\/w\/page\/13246927\/FrontPage<\/a><\/p>\n\n\n\n<p id=\"Training-Classes-Video\">Training\/Classes\/Video<\/p>\n\n\n\n<p><a href=\"http:\/\/www.irongeek.com\/i.php?page=videos\/aide-winter-2011\">http:\/\/www.irongeek.com\/i.php?page=videos\/aide-winter-2011<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/lab.pentestit.ru\/pentestlabs\/3\">https:\/\/lab.pentestit.ru\/pentestlabs\/3<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/trailofbits.github.io\/ctf\/\">https:\/\/trailofbits.github.io\/ctf\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/ctf.forgottensec.com\/wiki\/?title=Main_Page\">http:\/\/ctf.forgottensec.com\/wiki\/?title=Main_Page<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/smashthestack.org\/\">http:\/\/smashthestack.org\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/ctf.hcesperer.org\/\">http:\/\/ctf.hcesperer.org\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.google.com\/calendar\/feeds\/noge7b1rg2dg4a8kcm1k68vbjg@group.calendar.google.com\/public\/basic\">https:\/\/www.google.com\/calendar\/feeds\/noge7b1rg2dg4a8kcm1k68vbjg@group.calendar.google.com\/public\/basic<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.google.com\/calendar\/embed?src=pe2ikdbe6b841od6e26ato0asc@group.calendar.google.com&amp;gsessionid=OK\">https:\/\/www.google.com\/calendar\/embed?src=pe2ikdbe6b841od6e26ato0asc@group.calendar.google.com&amp;gsessionid=OK<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/crypto.stanford.edu\/cs155\/\">https:\/\/crypto.stanford.edu\/cs155\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.offensive-security.com\/metasploit-unleashed\/\">https:\/\/www.offensive-security.com\/metasploit-unleashed\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.irongeek.com\/i.php?page=videos\/metasploit-class\">http:\/\/www.irongeek.com\/i.php?page=videos\/metasploit-class<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.securitytube.net\/\">http:\/\/www.securitytube.net\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/resources.infosecinstitute.com\/\">http:\/\/resources.infosecinstitute.com\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cs.fsu.edu\/~redwood\/OffensiveSecurity\/lectures.html\">https:\/\/www.cs.fsu.edu\/~redwood\/OffensiveSecurity\/lectures.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=kPxavpgos2I\">https:\/\/www.youtube.com\/watch?v=kPxavpgos2I<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.securitytube.net\/video\/7640\">http:\/\/www.securitytube.net\/video\/7640<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.securitytube.net\/video\/7735\">http:\/\/www.securitytube.net\/video\/7735<\/a><\/p>\n\n\n\n<p id=\"Pentest-Tools\">Pentest Tools<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/pwnwiki\/pwnwiki.github.io\">https:\/\/github.com\/pwnwiki\/pwnwiki.github.io<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/sbilly\/awesome-security\">https:\/\/github.com\/sbilly\/awesome-security<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/paragonie\/awesome-appsec\">https:\/\/github.com\/paragonie\/awesome-appsec<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/enaqx\/awesome-pentest\">https:\/\/github.com\/enaqx\/awesome-pentest<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/kahun\/awesome-sysadmin#security\">https:\/\/github.com\/kahun\/awesome-sysadmin#security<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/beefproject.com\/\">http:\/\/beefproject.com\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/xsser.03c8.net\/\">https:\/\/xsser.03c8.net\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/code.google.com\/p\/fuzzdb\/\">https:\/\/code.google.com\/p\/fuzzdb\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.owasp.org\/index.php\/Category:OWASP_Fuzzing_Code_Database#tab=Statements\">https:\/\/www.owasp.org\/index.php\/Category:OWASP_Fuzzing_Code_Database#tab=Statements<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/w3af.org\/\">http:\/\/w3af.org\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/code.google.com\/p\/skipfish\/\">https:\/\/code.google.com\/p\/skipfish\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.sans.org\/reading-room\/whitepapers\/testing\/fuzzing-approach-credentials-discovery-burp-intruder-33214\">https:\/\/www.sans.org\/reading-room\/whitepapers\/testing\/fuzzing-approach-credentials-discovery-burp-intruder-33214<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.securityninja.co.uk\/hacking\/burp-suite-tutorial-the-intruder-tool\/\">https:\/\/www.securityninja.co.uk\/hacking\/burp-suite-tutorial-the-intruder-tool\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.justanotherhacker.com\/projects\/graudit.html\">http:\/\/www.justanotherhacker.com\/projects\/graudit.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/packetstormsecurity.com\/files\/tags\/tool\">https:\/\/packetstormsecurity.com\/files\/tags\/tool<\/a><\/p>\n\n\n\n<p id=\"Pentest-Lab-VM's\">Pentest Lab ISO-VMs<\/p>\n\n\n\n<p><a href=\"http:\/\/www.amanhardikar.com\/mindmaps\/PracticeUrls.html\">http:\/\/www.amanhardikar.com\/mindmaps\/PracticeUrls.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.kali.org\/\">https:\/\/www.kali.org\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.owasp.org\/index.php\/OWASP_Web_Testing_Environment_Project\">https:\/\/www.owasp.org\/index.php\/OWASP_Web_Testing_Environment_Project<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/blackarch.org\/\">http:\/\/blackarch.org\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/code.google.com\/p\/owaspbwa\/\">https:\/\/code.google.com\/p\/owaspbwa\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.mavensecurity.com\/web_security_dojo\/\">https:\/\/www.mavensecurity.com\/web_security_dojo\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/hackingdojo.com\/dojo-media\/\">http:\/\/hackingdojo.com\/dojo-media\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/informatica.uv.es\/~carlos\/docencia\/netinvm\/\">http:\/\/informatica.uv.es\/~carlos\/docencia\/netinvm\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.bonsai-sec.com\/en\/research\/moth.php\">http:\/\/www.bonsai-sec.com\/en\/research\/moth.php<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/sourceforge.net\/projects\/metasploitable\/files\/Metasploitable2\/\">http:\/\/sourceforge.net\/projects\/metasploitable\/files\/Metasploitable2\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/sourceforge.net\/projects\/lampsecurity\/?source=navbar\">http:\/\/sourceforge.net\/projects\/lampsecurity\/?source=navbar<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.hacking-lab.com\/index.html\">https:\/\/www.hacking-lab.com\/index.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/sourceforge.net\/projects\/virtualhacking\/files\/\">http:\/\/sourceforge.net\/projects\/virtualhacking\/files\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.irongeek.com\/i.php?page=mutillidae\/mutillidae-deliberately-vulnerable-php-owasp-top-10\">http:\/\/www.irongeek.com\/i.php?page=mutillidae\/mutillidae-deliberately-vulnerable-php-owasp-top-10<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.dvwa.co.uk\/\">http:\/\/www.dvwa.co.uk\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/sourceforge.net\/projects\/thebutterflytmp\/\">http:\/\/sourceforge.net\/projects\/thebutterflytmp\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/magikh0e.ihtb.org\/pubPapers\/\">http:\/\/magikh0e.ihtb.org\/pubPapers\/<\/a><\/p>\n\n\n\n<p id=\"Metasploit\">Metasploit<\/p>\n\n\n\n<p><a href=\"http:\/\/resources.metasploit.com\/\">http:\/\/resources.metasploit.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/netsec.ws\/?p=262\">http:\/\/netsec.ws\/?p=262<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/seclists.org\/metasploit\/\">http:\/\/seclists.org\/metasploit\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.offensive-security.com\/metasploit-unleashed\/Introduction\/\">https:\/\/www.offensive-security.com\/metasploit-unleashed\/Introduction\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.offensive-security.com\/metasploit-unleashed\/Msfvenom\">http:\/\/www.offensive-security.com\/metasploit-unleashed\/Msfvenom<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/community.rapid7.com\/community\/metasploit\/\">https:\/\/community.rapid7.com\/community\/metasploit\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.securitytube.net\/video\/711?q=METASPLOIT\">http:\/\/www.securitytube.net\/video\/711?q=METASPLOIT<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/en.wikibooks.org\/wiki\/Metasploit\">https:\/\/en.wikibooks.org\/wiki\/Metasploit<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.sans.org\/security-resources\/sec560\/misc_tools_sheet_v1.pdf\">https:\/\/www.sans.org\/security-resources\/sec560\/misc_tools_sheet_v1.pdf<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/rmccurdy.com\/scripts\/Metasploit%20meterpreter%20cheat%20sheet%20reference.html\">http:\/\/rmccurdy.com\/scripts\/Metasploit%20meterpreter%20cheat%20sheet%20reference.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/rapid7\/metasploit-framework\/wiki\/Meterpreter\">https:\/\/github.com\/rapid7\/metasploit-framework\/wiki\/Meterpreter<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.blackhat.com\/presentations\/bh-dc-10\/Egypt\/BlackHat-DC-2010-Egypt-UAV-slides.pdf\">https:\/\/www.blackhat.com\/presentations\/bh-dc-10\/Egypt\/BlackHat-DC-2010-Egypt-UAV-slides.pdf<\/a><\/p>\n\n\n\n<p id=\"Net-Scanners\">Net Scanners<\/p>\n\n\n\n<p><a href=\"https:\/\/nmap.org\/\">https:\/\/nmap.org\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/nmap.org\/nsedoc\/\">https:\/\/nmap.org\/nsedoc\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.securitytube.net\/video\/931\">http:\/\/www.securitytube.net\/video\/931<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/nmap.org\/nsedoc\/\">https:\/\/nmap.org\/nsedoc\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.openvas.org\/\">http:\/\/www.openvas.org\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.tenable.com\/products\/nessus-vulnerability-scanner\">http:\/\/www.tenable.com\/products\/nessus-vulnerability-scanner<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.rapid7.com\/products\/nexpose\/compare-downloads.jsp\">https:\/\/www.rapid7.com\/products\/nexpose\/compare-downloads.jsp<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.inguardians.com\/research\/docs\/Skoudis_pentestsecrets.pdf\">http:\/\/www.inguardians.com\/research\/docs\/Skoudis_pentestsecrets.pdf<\/a><\/p>\n\n\n\n<p id=\"MITM\">Man-in-the-middle attack<\/p>\n\n\n\n<p><a href=\"http:\/\/www.linuxsecurity.com\/docs\/PDF\/dsniff-n-mirror.pdf\">http:\/\/www.linuxsecurity.com\/docs\/PDF\/dsniff-n-mirror.pdf<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/media.techtarget.com\/searchUnifiedCommunications\/downloads\/Seven_Deadliest_UC_Attacks_Ch3.pdf\">http:\/\/media.techtarget.com\/searchUnifiedCommunications\/downloads\/Seven_Deadliest_UC_Attacks_Ch3.pdf<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/packetstormsecurity.com\/papers\/wireless\/cracking-air.pdf\">https:\/\/packetstormsecurity.com\/papers\/wireless\/cracking-air.pdf<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.blackhat.com\/presentations\/bh-europe-03\/bh-europe-03-valleri.pdf\">https:\/\/www.blackhat.com\/presentations\/bh-europe-03\/bh-europe-03-valleri.pdf<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.defcon.org\/images\/defcon-17\/dc-17-presentations\/defcon-17-sam_bowne-hijacking_web_2.0.pdf\">https:\/\/www.defcon.org\/images\/defcon-17\/dc-17-presentations\/defcon-17-sam_bowne-hijacking_web_2.0.pdf<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.leetupload.com\/database\/Misc\/Papers\/Asta%20la%20Vista\/18.Ettercap_Spoof.pdf\">http:\/\/www.leetupload.com\/database\/Misc\/Papers\/Asta%20la%20Vista\/18.Ettercap_Spoof.pdf<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/bandwidthco.com\/nf.html\">http:\/\/bandwidthco.com\/nf.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/articles.manugarg.com\/arp_spoofing.pdf\">http:\/\/articles.manugarg.com\/arp_spoofing.pdf<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/academy.delmar.edu\/Courses\/ITSY2430\/eBooks\/Ettercap(ManInTheMiddleAttack-tool).pdf\">http:\/\/academy.delmar.edu\/Courses\/ITSY2430\/eBooks\/Ettercap(ManInTheMiddleAttack-tool).pdf<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.ucci.it\/docs\/ICTSecurity-2004-26.pdf_\">http:\/\/www.ucci.it\/docs\/ICTSecurity-2004-26.pdf_<\/a><\/p>\n\n\n\n<p id=\"Phase-1\">Phase 1 &#8211; Reconnaissance: Information Gathering before the Attack<\/p>\n\n\n\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Open-sourceintelligence\">https:\/\/en.wikipedia.org\/wiki\/Open-sourceintelligence<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.spylogic.net\/2009\/10\/enterprise-open-source-intelligence-gathering-part-1-social-networks\/\">http:\/\/www.spylogic.net\/2009\/10\/enterprise-open-source-intelligence-gathering-part-1-social-networks\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.spylogic.net\/2009\/10\/enterprise-open-source-intelligence-gathering-%E2%80%93-part-2-blogs-message-boards-and-metadata\/\">http:\/\/www.spylogic.net\/2009\/10\/enterprise-open-source-intelligence-gathering-%E2%80%93-part-2-blogs-message-boards-and-metadata\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.spylogic.net\/2009\/10\/enterprise-open-source-intelligence-gathering-part-3-monitoring\/\">http:\/\/www.spylogic.net\/2009\/10\/enterprise-open-source-intelligence-gathering-part-3-monitoring\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.slideshare.net\/Laramies\/tactical-information-gathering\">http:\/\/www.slideshare.net\/Laramies\/tactical-information-gathering<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.infond.fr\/2010\/05\/toturial-footprinting.html\">http:\/\/www.infond.fr\/2010\/05\/toturial-footprinting.html<\/a><\/p>\n\n\n\n<p id=\"Phase-1.1\">Phase 1.1 &#8211; People and Orginizational<\/p>\n\n\n\n<p><a href=\"http:\/\/www.spokeo.com\/\">http:\/\/www.spokeo.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.spoke.com\/\">http:\/\/www.spoke.com\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.xing.com\/\">https:\/\/www.xing.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.zoominfo.com\/\">http:\/\/www.zoominfo.com\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/pipl.com\/\">https:\/\/pipl.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.zabasearch.com\/\">http:\/\/www.zabasearch.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.searchbug.com\/\">http:\/\/www.searchbug.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/skipease.com\/\">http:\/\/skipease.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/addictomatic.com\/\">http:\/\/addictomatic.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/socialmention.com\/\">http:\/\/socialmention.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/entitycube.research.microsoft.com\/\">http:\/\/entitycube.research.microsoft.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.yasni.com\/\">http:\/\/www.yasni.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.glassdoor.com\/index.htm\">http:\/\/www.glassdoor.com\/index.htm<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/connect.data.com\/\">https:\/\/connect.data.com\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/searchwww.sec.gov\/EDGARFSClient\/jsp\/EDGAR_MainAccess.jsp\">https:\/\/searchwww.sec.gov\/EDGARFSClient\/jsp\/EDGAR_MainAccess.jsp<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.tineye.com\/\">https:\/\/www.tineye.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.peekyou.com\/_\">http:\/\/www.peekyou.com\/_<\/a><\/p>\n\n\n\n<p id=\"Phase-1.2\">Phase 1.2 &#8211; Infastructure<\/p>\n\n\n\n<p><a href=\"http:\/\/uptime.netcraft.com\/\">http:\/\/uptime.netcraft.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.shodanhq.com\/\">http:\/\/www.shodanhq.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.domaintools.com\/\">http:\/\/www.domaintools.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/centralops.net\/co\/\">http:\/\/centralops.net\/co\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/whois.webhosting.info\/\">http:\/\/whois.webhosting.info\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.ssllabs.com\/ssltest\/analyze.html\">https:\/\/www.ssllabs.com\/ssltest\/analyze.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.exploit-db.com\/google-hacking-database\/\">https:\/\/www.exploit-db.com\/google-hacking-database\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.my-ip-neighbors.com\/\">http:\/\/www.my-ip-neighbors.com\/<\/a><\/p>\n\n\n\n<p>Phase 1.2 &#8211; Tools<\/p>\n\n\n\n<p id=\"OSINT\">OSINT Tools<\/p>\n\n\n\n<p><a href=\"http:\/\/www.edge-security.com\/theharvester.php\">http:\/\/www.edge-security.com\/theharvester.php<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.edge-security.com\/metagoofil.php\">http:\/\/www.edge-security.com\/metagoofil.php<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.paterva.com\/web6\/\">http:\/\/www.paterva.com\/web6\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.sans.org\/reading-room\/whitepapers\/privacy\/document-metadata-silent-killer-32974\">https:\/\/www.sans.org\/reading-room\/whitepapers\/privacy\/document-metadata-silent-killer-32974<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.sno.phy.queensu.ca\/~phil\/exiftool\/\">http:\/\/www.sno.phy.queensu.ca\/~phil\/exiftool\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.darkoperator.com\/blog\/2009\/4\/24\/metadata-enumeration-with-foca.html\">http:\/\/www.darkoperator.com\/blog\/2009\/4\/24\/metadata-enumeration-with-foca.html<\/a><\/p>\n\n\n\n<p id=\"Phase-2\">Phase 2 &#8211; Enumeration: Finding Attack Vectors<\/p>\n\n\n\n<p><a href=\"http:\/\/securitysynapse.blogspot.be\/201308_01_archive.html\">http:\/\/securitysynapse.blogspot.be\/201308_01_archive.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/hackertarget.com\/attacking-wordpress\/\">https:\/\/hackertarget.com\/attacking-wordpress\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/code.google.com\/p\/pentest-bookmarks\/wiki\/BookmarksList\">https:\/\/code.google.com\/p\/pentest-bookmarks\/wiki\/BookmarksList<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.0daysecurity.com\/penetration-testing\/enumeration.html\">http:\/\/www.0daysecurity.com\/penetration-testing\/enumeration.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/n3ko1\/WrapMap\">https:\/\/github.com\/n3ko1\/WrapMap<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/cirt.net\/Nikto2\">https:\/\/cirt.net\/Nikto2<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.unixmen.com\/install-nikto-web-scanner-check-vulnerabilities\/\">http:\/\/www.unixmen.com\/install-nikto-web-scanner-check-vulnerabilities\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/seclist.us\/autoenum-nmap-enumeration-and-script-scan-automation-script.html\">http:\/\/seclist.us\/autoenum-nmap-enumeration-and-script-scan-automation-script.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/code.stephenmorley.org\/articles\/xampp-version-history-apache-mysql-php\/\">http:\/\/code.stephenmorley.org\/articles\/xampp-version-history-apache-mysql-php\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/carnal0wnage.attackresearch.com\/2007\/07\/over-in-lso-chat-we-were-talking-about.html\">http:\/\/carnal0wnage.attackresearch.com\/2007\/07\/over-in-lso-chat-we-were-talking-about.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.iodigitalsec.com\/windows-null-session-enumeration\/\">http:\/\/www.iodigitalsec.com\/windows-null-session-enumeration\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/pen-testing.sans.org\/blog\/2013\/07\/24\/plundering-windows-account-info-via-authenticated-smb-sessions\">https:\/\/pen-testing.sans.org\/blog\/2013\/07\/24\/plundering-windows-account-info-via-authenticated-smb-sessions<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/carnal0wnage.attackresearch.com\/2007\/07\/enumerating-user-accounts-on-linux-and.html\">http:\/\/carnal0wnage.attackresearch.com\/2007\/07\/enumerating-user-accounts-on-linux-and.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/isaudits\/autoenum\">https:\/\/github.com\/isaudits\/autoenum<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.webpronews.com\/snmp-enumeration-and-hacking-2003-09\">http:\/\/www.webpronews.com\/snmp-enumeration-and-hacking-2003-09<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/carnal0wnage.attackresearch.com\/2007\/07\/over-in-lso-chat-we-were-talking-about.html\">http:\/\/carnal0wnage.attackresearch.com\/2007\/07\/over-in-lso-chat-we-were-talking-about.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.iodigitalsec.com\/windows-null-session-enumeration\/\">http:\/\/www.iodigitalsec.com\/windows-null-session-enumeration\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/pen-testing.sans.org\/blog\/2013\/07\/24\/plundering-windows-account-info-via-authenticated-smb-sessions\">http:\/\/pen-testing.sans.org\/blog\/2013\/07\/24\/plundering-windows-account-info-via-authenticated-smb-sessions<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/carnal0wnage.attackresearch.com\/2007\/07\/enumerating-user-accounts-on-linux-and.html\">http:\/\/carnal0wnage.attackresearch.com\/2007\/07\/enumerating-user-accounts-on-linux-and.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.madirish.net\/59\">http:\/\/www.madirish.net\/59<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.enye-sec.org\/en\/papers\/web_vuln-en.txt_\">http:\/\/www.enye-sec.org\/en\/papers\/web_vuln-en.txt_<\/a><\/p>\n\n\n\n<p id=\"Phase-3\">Phase 3 &#8211; Exploitation: Verifying Security Weaknesses<\/p>\n\n\n\n<p><a href=\"http:\/\/pwnwiki.io\">http:\/\/pwnwiki.io<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/download.vulnhub.com\/pentesterlab\/phpinclude_and_post_exploitation.pdf\">http:\/\/download.vulnhub.com\/pentesterlab\/phpinclude_and_post_exploitation.pdf<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/ru.scribd.com\/doc\/245679444\/hak5-org-OSXPost-Exploitation-copy-20130228-pdf#scribd\">http:\/\/ru.scribd.com\/doc\/245679444\/hak5-org-OSXPost-Exploitation-copy-20130228-pdf#scribd<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/cyberwar.nl\/d\/hak5.org_LinuxUnixBSDPost-ExploitationCommandList_copy-20130228.pdf\">https:\/\/cyberwar.nl\/d\/hak5.org_LinuxUnixBSDPost-ExploitationCommandList_copy-20130228.pdf<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.yumpu.com\/en\/document\/view\/14963680\/from-sqli-to-shell_\">https:\/\/www.yumpu.com\/en\/document\/view\/14963680\/from-sqli-to-shell_<\/a><\/p>\n\n\n\n<p id=\"Dump-Windows-Hashes\">Dump Windows Password Hashes<\/p>\n\n\n\n<p><a href=\"http:\/\/bernardodamele.blogspot.com\/2011\/12\/dump-windows-password-hashes.html\">http:\/\/bernardodamele.blogspot.com\/2011\/12\/dump-windows-password-hashes.html<\/a><\/p>\n\n\n\n<p id=\"Pass-The-Hash\">Windows Passhing The Hash<\/p>\n\n\n\n<p><a href=\"https:\/\/www.kali.org\/penetration-testing\/passing-hash-remote-desktop\/\">https:\/\/www.kali.org\/penetration-testing\/passing-hash-remote-desktop\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.kali.org\/kali-monday\/pass-the-hash-toolkit-winexe-updates\/\">https:\/\/www.kali.org\/kali-monday\/pass-the-hash-toolkit-winexe-updates\/<\/a><\/p>\n\n\n\n<p id=\"Windows-Priv\">Windows Privilege Escalation<\/p>\n\n\n\n<p><a href=\"https:\/\/labs.mwrinfosecurity.com\/system\/assets\/760\/original\/Windows_Services_-All_roads_lead_to_SYSTEM.pdf(https:\/\/labs.mwrinfosecurity.com\/system\/assets\/760\/original\/WindowsServices-_All_roads_lead_to_SYSTEM.pdf)_\">https:\/\/labs.mwrinfosecurity.com\/system\/assets\/760\/original\/Windows_Services_-All_roads_lead_to_SYSTEM.pdf(https:\/\/labs.mwrinfosecurity.com\/system\/assets\/760\/original\/WindowsServices-_All_roads_lead_to_SYSTEM.pdf)_<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/travisaltman.com\/windows-privilege-escalation-via-weak-service-permissions\/\">http:\/\/travisaltman.com\/windows-privilege-escalation-via-weak-service-permissions\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/0xdeafbeef\/PSSecSnapshot\">https:\/\/github.com\/0xdeafbeef\/PSSecSnapshot<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/it-ovid.blogspot.com\/2012\/02\/windows-privilege-escalation.html\">http:\/\/it-ovid.blogspot.com\/2012\/02\/windows-privilege-escalation.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.fuzzysecurity.com\/tutorials\/16.html\">http:\/\/www.fuzzysecurity.com\/tutorials\/16.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.youtube.com\/watch?v=kMG8IsCohHA\">http:\/\/www.youtube.com\/watch?v=kMG8IsCohHA<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.youtube.com\/watch?v=8xJaaQlpBo\">http:\/\/www.youtube.com\/watch?v=8xJaaQlpBo<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.greyhathacker.net\/?p=738\">http:\/\/www.greyhathacker.net\/?p=738<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/bernardodamele.blogspot.ru\/2011\/12\/dump-windows-password-hashes.html\">http:\/\/bernardodamele.blogspot.ru\/2011\/12\/dump-windows-password-hashes.html<\/a><\/p>\n\n\n\n<p id=\"Linux-Priv\">Linux Privilege Escalation<\/p>\n\n\n\n<p><a href=\"http:\/\/incolumitas.com\/wp-content\/uploads\/2012\/12\/blackhats_view.pdf\">http:\/\/incolumitas.com\/wp-content\/uploads\/2012\/12\/blackhats_view.pdf<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/blog.g0tmi1k.com\/2011\/08\/basic-linux-privilege-escalation.html\">http:\/\/blog.g0tmi1k.com\/2011\/08\/basic-linux-privilege-escalation.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/pentestmonkey.net\/tools\/audit\/unix-privesc-check\">http:\/\/pentestmonkey.net\/tools\/audit\/unix-privesc-check<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.rebootuser.com\/?page_id=1721\">http:\/\/www.rebootuser.com\/?page_id=1721<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.rebootuser.com\/?p=1758\">http:\/\/www.rebootuser.com\/?p=1758<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.rebootuser.com\/?p=1623\">http:\/\/www.rebootuser.com\/?p=1623<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/insidetrust.blogspot.nl\/2011\/04\/quick-guide-to-linux-privilege.html\">http:\/\/insidetrust.blogspot.nl\/2011\/04\/quick-guide-to-linux-privilege.html<\/a><\/p>\n\n\n\n<p id=\"Tunneling\">Tunneling &amp; Port Forwarding<\/p>\n\n\n\n<p><a href=\"https:\/\/www.sans.org\/reading-room\/whitepapers\/testing\/tunneling-pivoting-web-application-penetration-testing-36117\">https:\/\/www.sans.org\/reading-room\/whitepapers\/testing\/tunneling-pivoting-web-application-penetration-testing-36117<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/highon.coffee\/blog\/reverse-shell-cheat-sheet\/\">https:\/\/highon.coffee\/blog\/reverse-shell-cheat-sheet\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/highon.coffee\/blog\/ssh-meterpreter-pivoting-techniques\/\">https:\/\/highon.coffee\/blog\/ssh-meterpreter-pivoting-techniques\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/staff.washington.edu\/corey\/fw\/ssh-port-forwarding.html\">http:\/\/staff.washington.edu\/corey\/fw\/ssh-port-forwarding.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/pentestmonkey.net\/cheat-sheet\/shells\/reverse-shell-cheat-sheet\">http:\/\/pentestmonkey.net\/cheat-sheet\/shells\/reverse-shell-cheat-sheet<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/magikh0e.ihtb.org\/pubPapers\/ssh_gymnastics_tunneling.html\">http:\/\/magikh0e.ihtb.org\/pubPapers\/ssh_gymnastics_tunneling.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.debianadmin.com\/howto-use-ssh-local-and-remote-port-forwarding.html\">http:\/\/www.debianadmin.com\/howto-use-ssh-local-and-remote-port-forwarding.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.danscourses.com\/Network-Penetration-Testing\/metasploit-pivoting.html\">http:\/\/www.danscourses.com\/Network-Penetration-Testing\/metasploit-pivoting.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/carnal0wnage.attackresearch.com\/2007\/09\/using-metasploit-to-pivot-through_06.html\">http:\/\/carnal0wnage.attackresearch.com\/2007\/09\/using-metasploit-to-pivot-through_06.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.offensive-security.com\/metasploit-unleashed\/Portfwd\">http:\/\/www.offensive-security.com\/metasploit-unleashed\/Portfwd<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.offensive-security.com\/metasploit-unleashed\/Pivoting\">http:\/\/www.offensive-security.com\/metasploit-unleashed\/Pivoting<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.howtoforge.com\/reverse-ssh-tunneling\">http:\/\/www.howtoforge.com\/reverse-ssh-tunneling<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/ftp.acc.umu.se\/pub\/putty\/putty-0.57\/htmldoc\/Chapter7.htmla_\">http:\/\/ftp.acc.umu.se\/pub\/putty\/putty-0.57\/htmldoc\/Chapter7.htmla_<\/a><\/p>\n\n\n\n<p id=\"XSS\">XSS Cheat Codes<\/p>\n\n\n\n<p><a href=\"http:\/\/www.xenuser.org\/xss-cheat-sheet\/\">http:\/\/www.xenuser.org\/xss-cheat-sheet\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/gist.github.com\/sseffa\/11031135\">https:\/\/gist.github.com\/sseffa\/11031135<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/html5sec.org\/\">https:\/\/html5sec.org\/<\/a><\/p>\n\n\n\n<p id=\"WebShells\">WebShells<\/p>\n\n\n\n<p><a href=\"http:\/\/www.r57shell.net\/\">http:\/\/www.r57shell.net\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/b374k\/b374k\">https:\/\/github.com\/b374k\/b374k<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/epinna\/weevely3\">https:\/\/github.com\/epinna\/weevely3<\/a><\/p>\n\n\n\n<p id=\"SQLi\">SQLi General Resources<\/p>\n\n\n\n<p><a href=\"http:\/\/www.w3schools.com\/sql\/sqlinjection.asp\">http:\/\/www.w3schools.com\/sql\/sqlinjection.asp<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/sqlzoo.net\/hack\/\">http:\/\/sqlzoo.net\/hack\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/information.rapid7.com\/rs\/rapid7\/images\/R7%20SQL_Injection_Cheat_Sheet.v1.pdf\">https:\/\/information.rapid7.com\/rs\/rapid7\/images\/R7%20SQL_Injection_Cheat_Sheet.v1.pdf<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/websec.ca\/kb\/sql_injection\">http:\/\/websec.ca\/kb\/sql_injection<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/ferruh.mavituna.com\/sql-injection-cheatsheet-oku\/\">http:\/\/ferruh.mavituna.com\/sql-injection-cheatsheet-oku\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.unixwiz.net\/techtips\/sql-injection.html\">http:\/\/www.unixwiz.net\/techtips\/sql-injection.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.sqlinjectionwiki.com\/\">http:\/\/www.sqlinjectionwiki.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/sqlmap.org\/\">http:\/\/sqlmap.org\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/packetstorm.sigterm.no\/papers\/cheatsheets\/sqlmap-cheatsheet-1.0-SDB.pdf\">https:\/\/packetstorm.sigterm.no\/papers\/cheatsheets\/sqlmap-cheatsheet-1.0-SDB.pdf<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.owasp.org\/index.php\/SQL_Injection_Prevention_Cheat_Sheet\">https:\/\/www.owasp.org\/index.php\/SQL_Injection_Prevention_Cheat_Sheet<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/bobby-tables.com\/\">http:\/\/bobby-tables.com\/<\/a><\/p>\n\n\n\n<p id=\"MySQLi\">MySQLi Resources<\/p>\n\n\n\n<p><a href=\"http:\/\/pentestmonkey.net\/cheat-sheet\/sql-injection\/mysql-sql-injection-cheat-sheet\">http:\/\/pentestmonkey.net\/cheat-sheet\/sql-injection\/mysql-sql-injection-cheat-sheet<\/a><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-reiners-weblog wp-block-embed-reiners-weblog\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"yNq3eBL5ZZ\"><a href=\"https:\/\/websec.wordpress.com\/2010\/12\/04\/sqli-filter-evasion-cheat-sheet-mysql\/\">SQLi filter evasion cheat sheet&nbsp;(MySQL)<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;SQLi filter evasion cheat sheet&nbsp;(MySQL)&#8221; &#8212; Reiners&#039; Weblog\" src=\"https:\/\/websec.wordpress.com\/2010\/12\/04\/sqli-filter-evasion-cheat-sheet-mysql\/embed\/#?secret=Z6XFgoJsye#?secret=yNq3eBL5ZZ\" data-secret=\"yNq3eBL5ZZ\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><a href=\"http:\/\/resources.infosecinstitute.com\/backdoor-sql-injection\/\">http:\/\/resources.infosecinstitute.com\/backdoor-sql-injection\/<\/a><\/p>\n\n\n\n<p id=\"MSSQLi\">MSSQLi Resources<\/p>\n\n\n\n<p><a href=\"http:\/\/evilsql.com\/main\/page2.php\">http:\/\/evilsql.com\/main\/page2.php<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/pentestmonkey.net\/cheat-sheet\/sql-injection\/mssql-sql-injection-cheat-sheet\">http:\/\/pentestmonkey.net\/cheat-sheet\/sql-injection\/mssql-sql-injection-cheat-sheet<\/a><\/p>\n\n\n\n<p id=\"Oracle-SQLi\">Oracle SQLi Resources<\/p>\n\n\n\n<p><a href=\"http:\/\/pentestmonkey.net\/cheat-sheet\/sql-injection\/oracle-sql-injection-cheat-sheet\">http:\/\/pentestmonkey.net\/cheat-sheet\/sql-injection\/oracle-sql-injection-cheat-sheet<\/a><\/p>\n\n\n\n<p id=\"Postgres-SQLi\">Postgres SQLi Resources<\/p>\n\n\n\n<p><a href=\"http:\/\/pentestmonkey.net\/cheat-sheet\/sql-injection\/postgres-sql-injection-cheat-sheet\">http:\/\/pentestmonkey.net\/cheat-sheet\/sql-injection\/postgres-sql-injection-cheat-sheet<\/a><\/p>\n\n\n\n<p id=\"SQLite\">SQLite Resources<\/p>\n\n\n\n<p><a href=\"https:\/\/sites.google.com\/site\/0x7674\/home\/sqlite3injectioncheatsheet\">https:\/\/sites.google.com\/site\/0x7674\/home\/sqlite3injectioncheatsheet<\/a><\/p>\n\n\n\n<p id=\"RFI\">RFI\/LFI Tutorials<\/p>\n\n\n\n<p><a href=\"https:\/\/evilzone.org\/tutorials\/remote-file-inclusion%28rfi%29\/\">https:\/\/evilzone.org\/tutorials\/remote-file-inclusion%28rfi%29\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.hackersonlineclub.com\/lfi-rfi\">http:\/\/www.hackersonlineclub.com\/lfi-rfi<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/0xzoidberg.wordpress.com\/category\/security\/lfi-rfi\/\">https:\/\/0xzoidberg.wordpress.com\/category\/security\/lfi-rfi\/<\/a><\/p>\n\n\n\n<p id=\"NASM\">NASM Tutorial<\/p>\n\n\n\n<p><a href=\"http:\/\/ccm.net\/faq\/1559-compiling-an-assembly-program-with-nasm\">http:\/\/ccm.net\/faq\/1559-compiling-an-assembly-program-with-nasm<\/a><\/p>\n\n\n\n<p id=\"Buffer-Overflow\">Buffer Overflow Tutorial<\/p>\n\n\n\n<p><a href=\"http:\/\/www.madirish.net\/142\">http:\/\/www.madirish.net\/142<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/n01g3l.tumblr.com\/post\/49036035399\/linux-crossfire-v1-90-buffer-overflow\">http:\/\/n01g3l.tumblr.com\/post\/49036035399\/linux-crossfire-v1-90-buffer-overflow<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/resources.infosecinstitute.com\/author\/nikhil-kumar\/\">http:\/\/resources.infosecinstitute.com\/author\/nikhil-kumar\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.frequency.com\/video\/athcon-hack-in-paris-demo-1\/40181156\">http:\/\/www.frequency.com\/video\/athcon-hack-in-paris-demo-1\/40181156<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.savevid.com\/video\/athcon-hack-in-paris-demo-2.html\">http:\/\/www.savevid.com\/video\/athcon-hack-in-paris-demo-2.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.frequency.com\/video\/athcon-hack-in-paris-demo-3\/11306148\">http:\/\/www.frequency.com\/video\/athcon-hack-in-paris-demo-3\/11306148<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/tehaurum.wordpress.com\/2015\/06\/22\/exploit-development-stack-buffer-overflow\/\">https:\/\/tehaurum.wordpress.com\/2015\/06\/22\/exploit-development-stack-buffer-overflow\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/proactivedefender.blogspot.ru\/2013\/05\/understanding-buffer-overflows.html\">http:\/\/proactivedefender.blogspot.ru\/2013\/05\/understanding-buffer-overflows.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/forum.reverse4you.org\/showthread.php?t=1371\">https:\/\/forum.reverse4you.org\/showthread.php?t=1371<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/grey-corner.blogspot.com\/2010\/01\/beginning-stack-based-buffer-overflow.html\">http:\/\/grey-corner.blogspot.com\/2010\/01\/beginning-stack-based-buffer-overflow.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/grey-corner.blogspot.com\/2010\/01\/seh-stack-based-windows-buffer-overflow.html\">http:\/\/grey-corner.blogspot.com\/2010\/01\/seh-stack-based-windows-buffer-overflow.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/grey-corner.blogspot.com\/2010\/01\/windows-buffer-overflow-tutorial.html\">http:\/\/grey-corner.blogspot.com\/2010\/01\/windows-buffer-overflow-tutorial.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/grey-corner.blogspot.com\/2010\/01\/heap-spray-exploit-tutorial-internet.html\">http:\/\/grey-corner.blogspot.com\/2010\/01\/heap-spray-exploit-tutorial-internet.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/grey-corner.blogspot.com\/2010\/02\/windows-buffer-overflow-tutorial.html\">http:\/\/grey-corner.blogspot.com\/2010\/02\/windows-buffer-overflow-tutorial.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/thepcn3rd.blogspot.ru\/2015\/07\/freeftpd-108-seh-stack-based-overflow.html\">http:\/\/thepcn3rd.blogspot.ru\/2015\/07\/freeftpd-108-seh-stack-based-overflow.html<\/a><\/p>\n\n\n\n<p id=\"ExDev\">Exploit Development<\/p>\n\n\n\n<p><a href=\"https:\/\/www.corelan.be\/index.php\/articles\/\">https:\/\/www.corelan.be\/index.php\/articles\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.fuzzysecurity.com\/tutorials.html\">http:\/\/www.fuzzysecurity.com\/tutorials.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/code.google.com\/p\/it-sec-catalog\/wiki\/Exploitation\">https:\/\/code.google.com\/p\/it-sec-catalog\/wiki\/Exploitation<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.myne-us.com\/2010\/08\/from-0x90-to-0x4c454554-journey-into.html\">http:\/\/www.myne-us.com\/2010\/08\/from-0x90-to-0x4c454554-journey-into.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.ethicalhacker.net\/columns\/heffner\/smashing-the-modern-stack-for-fun-and-profit\">https:\/\/www.ethicalhacker.net\/columns\/heffner\/smashing-the-modern-stack-for-fun-and-profit<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/x9090.blogspot.ru\/2010\/03\/tutorial-exploit-writting-tutorial-from.html\">http:\/\/x9090.blogspot.ru\/2010\/03\/tutorial-exploit-writting-tutorial-from.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/ref.x86asm.net\/index.html\">http:\/\/ref.x86asm.net\/index.html<\/a><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-sploitf-u-n wp-block-embed-sploitf-u-n\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"mQdFIWpr51\"><a href=\"https:\/\/sploitfun.wordpress.com\/2015\/06\/26\/linux-x86-exploit-development-tutorial-series\/\">Linux (x86) Exploit Development&nbsp;Series<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;Linux (x86) Exploit Development&nbsp;Series&#8221; &#8212; sploitF-U-N\" src=\"https:\/\/sploitfun.wordpress.com\/2015\/06\/26\/linux-x86-exploit-development-tutorial-series\/embed\/#?secret=nXTekAeeku#?secret=mQdFIWpr51\" data-secret=\"mQdFIWpr51\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><a href=\"https:\/\/forum.reverse4you.org\/showthread.php?t=1371\">https:\/\/forum.reverse4you.org\/showthread.php?t=1371<\/a><\/p>\n\n\n\n<p id=\"Exploits-And-Shellcodes\">Exploits and Shellcodes<\/p>\n\n\n\n<p><a href=\"https:\/\/www.exploit-db.com\/\">https:\/\/www.exploit-db.com\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/packetstormsecurity.com\/\">https:\/\/packetstormsecurity.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.securityfocus.com\/bid\">http:\/\/www.securityfocus.com\/bid<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/nvd.nist.gov\/\">https:\/\/nvd.nist.gov\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/osvdb.org\/\">http:\/\/osvdb.org\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.secdocs.org\/\">http:\/\/www.secdocs.org\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.cvedetails.com\/\">http:\/\/www.cvedetails.com\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/cve.mitre.org\/\">https:\/\/cve.mitre.org\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.windowsexploits.com\/\">http:\/\/www.windowsexploits.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/farlight.org\/index.html?type=shellcode\">http:\/\/farlight.org\/index.html?type=shellcode<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/shell-storm.org\/shellcode\/\">http:\/\/shell-storm.org\/shellcode\/<\/a><\/p>\n\n\n\n<p id=\"ReverseEng\">Reverse Engineering<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cyberguerrilla.org\/blog\/what-the-blackhats-dont-want-you-to-know-series\/\">https:\/\/www.cyberguerrilla.org\/blog\/what-the-blackhats-dont-want-you-to-know-series\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/fumalwareanalysis.blogspot.ru\/p\/malware-analysis-tutorials-reverse.html\">http:\/\/fumalwareanalysis.blogspot.ru\/p\/malware-analysis-tutorials-reverse.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.woodmann.com\/TiGa\/idaseries.html\">http:\/\/www.woodmann.com\/TiGa\/idaseries.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/visi.kenshoto.com\/viki\/MainPage\">http:\/\/visi.kenshoto.com\/viki\/MainPage<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.radare.org\/r\/\">http:\/\/www.radare.org\/r\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.offensivecomputing.net\/\">http:\/\/www.offensivecomputing.net\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.oldapps.com\/\">http:\/\/www.oldapps.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.oldversion.com\/\">http:\/\/www.oldversion.com\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.exploit-db.com\/webapps\/\">https:\/\/www.exploit-db.com\/webapps\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.mcafee.com\/us\/downloads\/free-tools\/hacmebooks.aspx\">http:\/\/www.mcafee.com\/us\/downloads\/free-tools\/hacmebooks.aspx<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.mcafee.com\/us\/downloads\/free-tools\/hacme-casino.aspx\">http:\/\/www.mcafee.com\/us\/downloads\/free-tools\/hacme-casino.aspx<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.mcafee.com\/us\/downloads\/free-tools\/hacmeshipping.aspx\">http:\/\/www.mcafee.com\/us\/downloads\/free-tools\/hacmeshipping.aspx<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.mcafee.com\/us\/downloads\/free-tools\/hacmetravel.aspx\">http:\/\/www.mcafee.com\/us\/downloads\/free-tools\/hacmetravel.aspx<\/a><\/p>\n\n\n\n<p id=\"OS-Cheat-Sheets\">OS Cheat Sheets and Script Syntax<\/p>\n\n\n\n<p><a href=\"https:\/\/www.owasp.org\/index.php\/CheatSheets\">https:\/\/www.owasp.org\/index.php\/CheatSheets<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.cheat-sheets.org\/\">http:\/\/www.cheat-sheets.org\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/ss64.com\/nt\/\">http:\/\/ss64.com\/nt\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/rstforums.com\/forum\/22324-hacking-tools-windows.rst\">https:\/\/rstforums.com\/forum\/22324-hacking-tools-windows.rst<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/IPv4subnettingreference\">https:\/\/en.wikipedia.org\/wiki\/IPv4subnettingreference<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.nixtutor.com\/linux\/all-the-best-linux-cheat-sheets\/\">http:\/\/www.nixtutor.com\/linux\/all-the-best-linux-cheat-sheets\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/shelldorado.com\/shelltips\/beginner.html\">http:\/\/shelldorado.com\/shelltips\/beginner.html<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/mywiki.wooledge.org\/BashPitfalls\">http:\/\/mywiki.wooledge.org\/BashPitfalls<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.iana.org\/assignments\/service-names-port-numbers\/service-names-port-numbers.xhtml\">https:\/\/www.iana.org\/assignments\/service-names-port-numbers\/service-names-port-numbers.xhtml<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.robvanderwoude.com\/ntadmincommands.php\">http:\/\/www.robvanderwoude.com\/ntadmincommands.php<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.sans.org\/security-resources\/sec560\/netcatcheatsheetv1.pdf\">https:\/\/www.sans.org\/security-resources\/sec560\/netcatcheatsheetv1.pdf<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/countuponsecurity.files.wordpress.com\/2015\/06\/jtr-cheatsheetimg.png\">https:\/\/countuponsecurity.files.wordpress.com\/2015\/06\/jtr-cheatsheetimg.png<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/danielmiessler.com\/study\/tcpdump\/\">https:\/\/danielmiessler.com\/study\/tcpdump\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.infosecwriters.com\/Papers\/nessusNMAPcheatSheet.pdf\">http:\/\/www.infosecwriters.com\/Papers\/nessusNMAPcheatSheet.pdf<\/a><\/p>\n\n\n\n<p id=\"Password-Wordlists\">Passwords Wordlists, Hashes, Tools<\/p>\n\n\n\n<p><a href=\"http:\/\/www.irongeek.com\/i.php?page=videos\/password-exploitation-class\">http:\/\/www.irongeek.com\/i.php?page=videos\/password-exploitation-class<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/cirt.net\/passwords\">https:\/\/cirt.net\/passwords<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/h.foofus.net\/?pageid=55\">http:\/\/h.foofus.net\/?pageid=55<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/foofus.net\/?pageid=63\">http:\/\/foofus.net\/?pageid=63<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/hashcrack.blogspot.ru\/\">http:\/\/hashcrack.blogspot.ru\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.onlinehashcrack.com\/\">http:\/\/www.onlinehashcrack.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.md5this.com\/\">http:\/\/www.md5this.com\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/contest-2010.korelogic.com\/wordlists.html\">http:\/\/contest-2010.korelogic.com\/wordlists.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/packetstormsecurity.com\/Crackers\/wordlists\/\">https:\/\/packetstormsecurity.com\/Crackers\/wordlists\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/hqsoftwarecollection.blogspot.in\/p\/36gn-wordlist.html\">http:\/\/hqsoftwarecollection.blogspot.in\/p\/36gn-wordlist.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/wiki.skullsecurity.org\/Passwords\">https:\/\/wiki.skullsecurity.org\/Passwords<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.sans.org\/reading-room\/whitepapers\/testing\/pass-the-hash-attacks-tools-mitigation-33283\">https:\/\/www.sans.org\/reading-room\/whitepapers\/testing\/pass-the-hash-attacks-tools-mitigation-33283<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.sans.org\/reading-room\/whitepapers\/testing\/crack-pass-hash-33219\">https:\/\/www.sans.org\/reading-room\/whitepapers\/testing\/crack-pass-hash-33219<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/nmap.org\/ncrack\/\">https:\/\/nmap.org\/ncrack\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.openwall.com\/john\/\">http:\/\/www.openwall.com\/john\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/ophcrack.sourceforge.net\/\">http:\/\/ophcrack.sourceforge.net\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/inquisb.github.io\/keimpx\/\">https:\/\/inquisb.github.io\/keimpx\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/null-byte.wonderhowto.com\/how-to\/hack-like-pro-crack-passwords-part-3-using-hashcat-0156543\/_\">http:\/\/null-byte.wonderhowto.com\/how-to\/hack-like-pro-crack-passwords-part-3-using-hashcat-0156543\/_<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The below links are a collection of useful tools and sites that you can use for various purposes within the<\/p>\n<p><a href=\"https:\/\/infosecjake.net\/?p=169\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\">Useful Links to Help Your Journey<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":173,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-169","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-posts"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/infosecjake.net\/wp-content\/uploads\/2022\/12\/pexels-junior-teixeira-2047905-scaled.jpg","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/posts\/169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosecjake.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=169"}],"version-history":[{"count":5,"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/posts\/169\/revisions"}],"predecessor-version":[{"id":513,"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/posts\/169\/revisions\/513"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/media\/173"}],"wp:attachment":[{"href":"https:\/\/infosecjake.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosecjake.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosecjake.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}