User Tools

Site Tools


ressources:start

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
ressources:start [2021/03/06 18:31] didzkovitchzressources:start [2021/05/11 18:25] (current) – [Crypto] didzkovitchz
Line 42: Line 42:
 ===== Sujet par sujet ===== ===== Sujet par sujet =====
  
-[[https://hakin9.org/how-i-hacked-my-xiaomi-miband-2-fitness-tracker%E2%80%8A-%E2%80%8Aa-step-by-step-linux-guide-by-andrey-nikishaev/|How I hacked my Xiaomi MiBand 2 fitness tracker — a step-by-step Linux guide by Andrey Nikishaev]]+==== Crypto ==== 
 + 
 +XOR : http://www.primenumbers.net/Renaud/fr/crypto/XOR.htm 
 + 
 +XOR : https://www.dcode.fr/chiffre-xor 
 + 
 +[[https://cryptohack.org/]] 
 + 
 +[[https://fr.wikipedia.org/wiki/Mode_d%27op%C3%A9ration_(cryptographie)]] 
 + 
 +[[https://www.google.com/search?client=firefox-b-d&q=Kerckhoffs%27s+principle]] 
 + 
 +[[http://wapiti.enic.fr/commun/ens/peda/options/ST/RIO/pub/exposes/exposesrio2005ttnfa2006/fritsch/html/protection.htm]] 
 + 
 +[[https://en.wikipedia.org/wiki/Cube_attack]] 
 + 
 +[[https://www.semanticscholar.org/topic/Cube-attack/453102]] 
 + 
 +[[https://www.boxentriq.com/code-breaking]] 
 + 
 +[[https://www.boxentriq.com/code-breaking/cipher-identifier]] 
 + 
 +[[https://www.dcode.fr/liste-outils#cryptography]] 
 + 
 +[[https://www.apprendre-en-ligne.net/crypto/tritheme/index.html]] Ave Maria 
 + 
 +[[https://twsteg.devsec.fr/]] 
 + 
 +[[https://www.irongeek.com/i.php?page=security/unicode-steganography-homoglyph-encoder]] Homoglyph 
 + 
 +[[https://gist.github.com/impiaaa/bc3377106a8bda51f4d8d3c995fcce6d]] Homoglyph 
 + 
 +[[https://codebeautify.org/base64-to-image-converter]] 
 + 
 +==== SQLi ==== 
 + 
 +[[https://portswigger.net/web-security/sql-injection]] 
 + 
 +[[http://pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet]] 
 + 
 +[[https://www.w3schools.com/sql/sql_injection.asp]] 
 + 
 +[[https://www.asafety.fr/mysql-injection-cheat-sheet/]] 
 + 
 +[[https://portswigger.net/web-security/sql-injection/cheat-sheet]] 
 + 
 +[[https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/]] 
 + 
 +==== Web ==== 
 + 
 + 
 +[[https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Template%20Injection]] 
 + 
 +[[https://www.onsecurity.io/blog/server-side-template-injection-with-jinja2/]] 
 + 
 +[[https://pequalsnp-team.github.io/cheatsheet/flask-jinja2-ssti]] 
 + 
 +[[https://medium.com/@nyomanpradipta120/ssti-in-flask-jinja2-20b068fdaeee]] 
 + 
 +==== Password cracking ==== 
 + 
 +[[https://erev0s.com/blog/cracking-etcshadow-john/]] 
 + 
 +==== Stego ==== 
 + 
 +[[https://pl.wikipedia.org/wiki/Plik:Printer_Steganography_Illustration.png]] 
 + 
 +[[https://arxiv.org/ftp/arxiv/papers/1201/1201.0397.pdf]] 
 + 
 +==== System ==== 
 + 
 + 
 +[[https://qastack.fr/server/29262/how-to-manage-my-ssh-known-hosts-file]] 
 + 
 +[[https://0xrick.github.io/hack-the-box/irked/]] 
 + 
 +[[https://initinfosec.com/writeups/htb/2020/01/31/irked-htb-writeup/#further-enumeration-for-privesc]] 
 + 
 +[[https://ranakhalil101.medium.com/hack-the-box-irked-writeup-w-o-metasploit-533da7a53b33]] 
 + 
 +[[https://www.hackingarticles.in/hack-the-box-irked-walkthrough/]] 
 + 
 +==== Recon ==== 
  
 [[https://medium.com/bugbountywriteup/whats-tools-i-use-for-my-recon-during-bugbounty-ec25f7f12e6d|What tools I use for my recon during #BugBounty]] [[https://medium.com/bugbountywriteup/whats-tools-i-use-for-my-recon-during-bugbounty-ec25f7f12e6d|What tools I use for my recon during #BugBounty]]
  
 [[https://www.sequoiacybersolutions.com/a-pentesters-guide-part-1-osint-passive-recon-and-discovery-of-assets/]] [[https://www.sequoiacybersolutions.com/a-pentesters-guide-part-1-osint-passive-recon-and-discovery-of-assets/]]
 +
 +==== Misc ====
 +
 +[[https://github.com/swisskyrepo/PayloadsAllTheThings]]
 +
 +[[https://0x90r00t.com/2016/02/22/internetwache-ctf-2016-reverse-90-the-cube-write-up/]]
 +
 +[[https://hakin9.org/how-i-hacked-my-xiaomi-miband-2-fitness-tracker%E2%80%8A-%E2%80%8Aa-step-by-step-linux-guide-by-andrey-nikishaev/|How I hacked my Xiaomi MiBand 2 fitness tracker — a step-by-step Linux guide by Andrey Nikishaev]]
  
  
 ===== Chaines YouTube ===== ===== Chaines YouTube =====
  
-[[https://www.youtube.com/channel/UCORiHxa2K28pb7XhtgNiXYA|Allan Jay Dumanhug]]+[[https://www.youtube.com/channel/UCORiHxa2K28pb7XhtgNiXYA|Allan Jay Dumanhug]]\\ 
 +[[https://www.youtube.com/channel/UCkVtc364_5j-ZivYYBTmJOg/videos|Atomrace Planète-Photo-Web (FR)]]\\ 
 +[[https://www.youtube.com/channel/UCHQKXMjWXjG-g7O6rOQ0NoA|Bug Bounty Hunter]]\\ 
 +[[https://www.youtube.com/channel/UCNRM4GH-SD85WCSqeSb4xUA|Bug Bounty Public Disclosure]]\\ 
 +[[https://www.youtube.com/channel/UCZDyl7G-Lq-EMVO8PfDFp9g|Bug Bounty Reports Explained]]\\ 
 +[[https://www.youtube.com/channel/UCo1NHk_bgbAbDBc4JinrXww|Bugcrowd]]\\ 
 +[[https://www.youtube.com/channel/UCirPbvoHzD78Lnyll6YYUpg|buildwithpython]]\\ 
 +[[https://www.youtube.com/channel/UCVRJ6D343dX-x730MRP8tNw|cocadmin]]\\ 
 +[[https://www.youtube.com/user/Computerphile|Computerphile]]\\ 
 +[[https://www.youtube.com/user/cristivlad25|Cristi Vlad]]\\ 
 +[[https://www.youtube.com/channel/UCRv-wp0CWtW2J33NkTId62w|Cyber Academy]]\\ 
 +[[https://www.youtube.com/channel/UC3sccPO4v8YqCTn8sezZGTw|DC CyberSec]]\\ 
 +[[https://www.youtube.com/channel/UCv_EMNuUqCsNmR_TMig6ToA|Ethical Academy]]\\ 
 +[[https://www.youtube.com/channel/UCq9IyPMXiwD8yBFHkxmN8zg|Farah Hawa]]\\ 
 +[[https://www.youtube.com/channel/UCqjjGl7VrAW_yLZK3DoMZXw|Ghostlulz]]\\ 
 +[[https://www.youtube.com/channel/UCTLUi3oc1-a7dS-2-YgEKmA|Grant Collins]]\\ 
 +[[https://www.youtube.com/channel/UCG9xa9nBbv69D_C5x1P4Fkg|Hack IT]]\\ 
 +[[https://www.youtube.com/channel/UCKxHWvYXIfHRN_C2nUoGEjA|Hackdoor]]\\ 
 +[[https://www.youtube.com/channel/UCIypRy-YhVAS4Uf3pDJPYQg|HackersEra]]\\ 
 +[[https://www.youtube.com/channel/UC0ZTPkdxlAKf-V33tqXwi3Q|HackerSploit]]\\ 
 +[[https://www.youtube.com/channel/UCcG7QnotdjHePOYQRJL5fFA|HACKING BEGINS]]\\ 
 +[[https://www.youtube.com/channel/UCS82DNnKOhXHcGKxGzQvNSQ|Hacktify Cyber Security]]\\ 
 +[[https://www.youtube.com/user/RapidBug|InsiderPhD]]\\ 
 +[[https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA|IppSec]]\\ 
 +[[https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw|Loi Liang Yang]]\\ 
 +[[https://www.youtube.com/channel/UCCZDt7MuC3Hzs6IH4xODLBw|Nahamsec]]\\ 
 +[[https://www.youtube.com/channel/UCsKK7UIiYqvK35aWrCCgUUA|Netsec Explained]]\\ 
 +[[https://www.youtube.com/channel/UCkrHNhCGegTvXsXvsVmmOxw|Pentest School]]\\ 
 +[[https://www.youtube.com/channel/UC8nq3PX9coMiqgKH6fw-VCQ|Red Team Village]]\\ 
 +[[https://www.youtube.com/channel/UCES-77Ap8R40HA_zUksp5Bg|Santo Sec]]\\ 
 +[[https://www.youtube.com/channel/UCXCz2ZdxkXpFyHFJgMy-pJw|Semi Yulianto]]\\ 
 +[[https://www.youtube.com/channel/UCQN2DsjnYH60SFBIA6IkNwg|STÖK]]\\ 
 +[[https://www.youtube.com/channel/UC0jvF7_96zBs2DycRFqxxcA|Sunny Dimalu The Cyborg]]\\ 
 +[[https://www.youtube.com/channel/UCWx802DSUeAsZA2ECi_EchQ|Tech in the Province]]\\ 
 +[[https://www.youtube.com/channel/UCo-FxeWdXWlZo1N94yQJScQ|Techmotion]]\\ 
 +[[https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw|The Cyber Mentor]]\\ 
 +[[https://www.youtube.com/channel/UCkF_Vf7Esdwj9ZYmG_uRAqg|The Hacktivists]]\\ 
 +[[https://www.youtube.com/channel/UCjBhClJ59W4hfUly51i11hg|The XSS rat]]\\ 
 +[[https://www.youtube.com/channel/UCAVbvrLJJvJCqN5uPFiBdYw|Theboywhocode]]\\ 
 +[[https://www.youtube.com/user/vulnerability0lab|vulnerability0lab]]\\
ressources/start.1615051902.txt.gz · Last modified: 2021/03/06 18:31 by didzkovitchz