Table of Contents

Ressources

Retour

Veille

Korben

Zdnet sécurité

Bleepingcomputer

The Hacker News

https://www.jesuisundev.com/veille-technologique-rester-a-jour-sans-devenir-tare/

+ LinkedIn…

+ agrégateur de flux rss comme netvibes

Général

Hacking Articles - Raj Chandel's Blog

Bug Bounty Cheat Sheet (Neelakandan-A)

Hackndo

Liens vers d'autres sites : Vulnhub ~~ Vulnhub ~~ Copie de la page "Resources" de Vulnhub

Cybrary (formations vidéo gratuites)

A Detailed Guide on OSCP Preparation – From Newbie to OSCP

Hakluke’s Ultimate OSCP Guide: Part 1 — Is OSCP for you? Some things you should know before you start

Corelan Team

CheatSheet diverses et variées

Sujet par sujet

Crypto

XOR : http://www.primenumbers.net/Renaud/fr/crypto/XOR.htm

XOR : https://www.dcode.fr/chiffre-xor

https://cryptohack.org/

https://fr.wikipedia.org/wiki/Mode_d%27op%C3%A9ration_(cryptographie)

https://www.google.com/search?client=firefox-b-d&q=Kerckhoffs%27s+principle

http://wapiti.enic.fr/commun/ens/peda/options/ST/RIO/pub/exposes/exposesrio2005ttnfa2006/fritsch/html/protection.htm

https://en.wikipedia.org/wiki/Cube_attack

https://www.semanticscholar.org/topic/Cube-attack/453102

https://www.boxentriq.com/code-breaking

https://www.boxentriq.com/code-breaking/cipher-identifier

https://www.dcode.fr/liste-outils#cryptography

https://www.apprendre-en-ligne.net/crypto/tritheme/index.html Ave Maria

https://twsteg.devsec.fr/

https://www.irongeek.com/i.php?page=security/unicode-steganography-homoglyph-encoder Homoglyph

https://gist.github.com/impiaaa/bc3377106a8bda51f4d8d3c995fcce6d Homoglyph

https://codebeautify.org/base64-to-image-converter

SQLi

https://portswigger.net/web-security/sql-injection

http://pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet

https://www.w3schools.com/sql/sql_injection.asp

https://www.asafety.fr/mysql-injection-cheat-sheet/

https://portswigger.net/web-security/sql-injection/cheat-sheet

https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/

Web

https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Template%20Injection

https://www.onsecurity.io/blog/server-side-template-injection-with-jinja2/

https://pequalsnp-team.github.io/cheatsheet/flask-jinja2-ssti

https://medium.com/@nyomanpradipta120/ssti-in-flask-jinja2-20b068fdaeee

Password cracking

https://erev0s.com/blog/cracking-etcshadow-john/

Stego

https://pl.wikipedia.org/wiki/Plik:Printer_Steganography_Illustration.png

https://arxiv.org/ftp/arxiv/papers/1201/1201.0397.pdf

System

https://qastack.fr/server/29262/how-to-manage-my-ssh-known-hosts-file

https://0xrick.github.io/hack-the-box/irked/

https://initinfosec.com/writeups/htb/2020/01/31/irked-htb-writeup/#further-enumeration-for-privesc

https://ranakhalil101.medium.com/hack-the-box-irked-writeup-w-o-metasploit-533da7a53b33

https://www.hackingarticles.in/hack-the-box-irked-walkthrough/

Recon

What tools I use for my recon during #BugBounty

https://www.sequoiacybersolutions.com/a-pentesters-guide-part-1-osint-passive-recon-and-discovery-of-assets/

Misc

https://github.com/swisskyrepo/PayloadsAllTheThings

https://0x90r00t.com/2016/02/22/internetwache-ctf-2016-reverse-90-the-cube-write-up/

How I hacked my Xiaomi MiBand 2 fitness tracker — a step-by-step Linux guide by Andrey Nikishaev

Chaines YouTube

Allan Jay Dumanhug
Atomrace Planète-Photo-Web (FR)
Bug Bounty Hunter
Bug Bounty Public Disclosure
Bug Bounty Reports Explained
Bugcrowd
buildwithpython
cocadmin
Computerphile
Cristi Vlad
Cyber Academy
DC CyberSec
Ethical Academy
Farah Hawa
Ghostlulz
Grant Collins
Hack IT
Hackdoor
HackersEra
HackerSploit
HACKING BEGINS
Hacktify Cyber Security
InsiderPhD
IppSec
Loi Liang Yang
Nahamsec
Netsec Explained
Pentest School
Red Team Village
Santo Sec
Semi Yulianto
STÖK
Sunny Dimalu The Cyborg
Tech in the Province
Techmotion
The Cyber Mentor
The Hacktivists
The XSS rat
Theboywhocode
vulnerability0lab