Skip to content

danieldizzy/Security-Research-Tutorials

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 

Repository files navigation

Security-Research-Tutorials

Personal collection of tutorial resources that can be helpful in my quest to security research and web application hacking. Credit to BugCroud, most resources were from thier blog posts. Please let me know if you have any suggestions for resources that i should add to this list.

##Web applications:

XSS

### CSRF ### SQL Injection ### Remote Code/Command Execution ### XXE ### Other: ### Mobile Applications: #### Android ### iOS
  • [Setting Up a Mobile Pentesting Platform]
  • [iOS Application Security]
###Tutorials * [PentesterLab - PentesterLab provides vulnerable systems that can be used to test and understand vulnerabilities] * [Exploit Database](https://www.exploit-db.com/papers/)Papers on Newly Updated Exploits * [Hunting for Top Bounties] * ###Tools * [Burp Suite](https://portswigger.net/burp/) An integrated platform for performing security testing of web applications * [SQL Map](http://sqlmap.org/) An open source penetration tool that automates the process of detecting and exploiting SQL injection flaws and taing over of database servers [Tutorial] (http://www.binarytides.com/sqlmap-hacking-tutorial/) * [SQL Ninja] (http://sqlninja.sourceforge.net/) Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end [How To] (http://www.jedge.com/wordpress/sqlninja-sql-injection/) * [Hack Bar](https://addons.mozilla.org/en-us/firefox/addon/hackbar/)This Firefox toolbar will help you in testing sql injections, XSS holes and site security. * [Knock](https://github.com/guelfoweb/knock ) Enumerates subdomains on a target domain through a wordlist [How To] (http://www.securitytube.net/video/6549) * [The ZED Attack Proxy ZAP] (https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project) * [Ratproxy by Google ] (https://code.google.com/p/ratproxy/) [How To](http://www.daveperrett.com/articles/2010/09/24/security-testing-with-googles-ratproxy/) * [OWASP SKANDA Exploitation Framework] (http://www.chmag.in/owasp-skanda-ssrf-exploitation-framework/) * [man ascii] (unixhelp.ed.ac.uk/CGI/man-cgi?ascii+7) On most unices gives you the ASCII table with decimal, octal and hex codes for each character * [DNS Discovery](https://github.com/m0nad/DNS-Discovery) A multithreaded subdomain bruteforcer. * [Iron WASP](https://ironwasp.org/) free & open source security scanner * [WebSlayer](www.edge-security.com/webslayer.php) One of the best free tools available" ###Video Channels *[hacktivity](https://www.youtube.com/channel/UC71Pa-YHA32hYPKTRjZgbXw)

About

Personal collection of tutorial resources

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published