Skip to content

Instantly share code, notes, and snippets.

Avatar

Jefferson Kirkland numberwhun

View GitHub Profile
@numberwhun
numberwhun / 22 Hacking Sites To Practice Your Hacking Skills
Created Jul 14, 2016
22 Hacking Sites To Practice Your Hacking Skills
View 22 Hacking Sites To Practice Your Hacking Skills
Taken from: https://hackerlists.com/hacking-sites/
22 Hacking Sites, CTFs and Wargames To Practice Your Hacking Skills
InfoSec skills are in such high demand right now. As the world continues to turn everything into an app and connect even the most basic devices to the internet, the demand is only going to grow, so it’s no surprise everyone wants to learn hacking these days.
However, almost every day I come across a forum post where someone is asking where they should begin to learn hacking or how to practice hacking. I’ve compiled this list of some of the best hacking sites to hopefully be a valuable resource for those wondering how they can build and practice their hacking skill set. I hope you find this list helpful, and if you know of any other quality hacking sites, please let me know in the comments, so I can add them to the list.
1. CTF365 https://ctf365.com/
View gist:dc09b0a047fae106d773
Borrowed from: http://www.labnol.org/software/wget-command-examples/28750/
Wget is extremely powerful, but like with most other command line programs, the plethora of options it supports can be intimidating to new users. Thus what we have here are a collection of wget commands that you can use to accomplish common tasks from downloading single files to mirroring entire websites. It will help if you can read through the wget manual but for the busy souls, these commands are ready to execute.
1. Download a single file from the Internet
wget http://example.com/file.iso
2. Download a file but save it locally under a different name
wget ‐‐output-document=filename.html example.com
View PenTesting Tools
Information Gathering:
arping
bing-ip2hosts-0.2
chaosreader
darkstat
dmitry
dnstracer
dnswalk
enum4linux
frox
@numberwhun
numberwhun / Penetration Tester Links
Last active Jun 24, 2021
Penetration Tester Links
View Penetration Tester Links
@numberwhun
numberwhun / diabetes bg data links
Last active Jun 19, 2021
diabetes bg data links
View diabetes bg data links
View Passive WiFi Tracking
Passive WiFi Tracking
Posted February 26, 2014 by Edward
Borrowed from: http://edwardkeeble.com/2014/02/passive-wifi-tracking/
In the last year or so, there have been quite a few stories on the use of passive WiFi tracking by advertisers, retailers, and analytics startups. Most of these articles focus on the significant privacy and security concerns associated with this practice, but few of them get into the details of how the technology works. Having built a similar system for my project, Casual Encounters, I think I can explain some of the inner workings of these systems, how to avoid being tracked, and how, for research purposes or to determine their own level of exposure, someone could build such a system. I will state that I am by no means an expert on wireless networks, signal analysis, or anything of the sort, but I have conducted a fair bit of research and trial and error, and it works for me. Your mileage may vary; don’t try this at home; etc, etc.
Probe Requests
When a WiFi client (phone, laptop
@numberwhun
numberwhun / Ten_Immutable_Laws_Of_Security
Created Jun 22, 2016
Ten_Immutable_Laws_Of_Security
View Ten_Immutable_Laws_Of_Security
“Ten Immutable Laws Of Security”:
Law #1: If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore.
Law #2: If a bad guy can alter the operating system on your computer, it’s not your computer anymore.
Law #3: If a bad guy has unrestricted physical access to your computer, it’s not your computer anymore.
Law #4: If you allow a bad guy to run active content in your website, it’s not your website any more.
Law #5: Weak passwords trump strong security.
Law #6: A computer is only as secure as the administrator is trustworthy.
Law #7: Encrypted data is only as secure as its decryption key.
Law #8: An out-of-date antimalware scanner is only marginally better than no scanner at all.
View PenTesting_Links
@numberwhun
numberwhun / Malware Analysis Tips and other Pentesting Links
Last active Apr 3, 2021
Malware Analysis Tips and other Pentesting Links
View Malware Analysis Tips and other Pentesting Links
@numberwhun
numberwhun / Top 10 vulnerability scanners for hackers to find flaws, holes and bugs
Created Jul 18, 2016
Top 10 vulnerability scanners for hackers to find flaws, holes and bugs
View Top 10 vulnerability scanners for hackers to find flaws, holes and bugs
Top 10 vulnerability scanners for hackers to find flaws, holes and bugs
Hacking is an art of finding bugs and flaws in a perfect software which will allow cyber criminals to exploit it for their own malicious gains. Hackers are mostly able to spot the flaws and bugs on their own but sometimes it is worthwhile to use a automated software to find these bugs and holes. A vulnerability scanner is such a automated software which has specifically been written to find such flaw.
Vulnerability Scanner is a specialised software build with a sole purpose of helping security researchers, hackers, system admins and developers to find faults in a particular software, computer system, network and servers. A hacker or security researcher is complemented in his manual testing of software or computer by using such vulnerability scanner making the hackers assessment efficient.
This article brings out such top 10 vulnerability scanner tools available to help hackers and security researchers in their security testing mission.