-
Notifications
You must be signed in to change notification settings - Fork 0
Home
Come here to discover where things are!
NOTE: Things are moving around a lot.
Design: Choosing when data should be reactive/non-reactive
- Python Scripts
- .NET Core
- Metasploit REST Endpoints: https://metasploit.help.rapid7.com/docs/rest-api-endpoints
- Setup tech stack containers
(Researching) New Architecture
Topics and articles covering the use of OSINT in a pen-test, the various types of OSINT, information gathering, etc. Trying to answer the questions:
- Is OSINT a worthy goal of CPAT?
- How is OSINT used in a penetration test?
- Could OSINT have any applications outside of a penetration test (ex: AppSec, DevSecOps)
Generic and thorough explanation of OSINT and information gathering. Very useful for defining object models for the application, and expanding on the pre-existing models.
http://www.pentest-standard.org/index.php/Intelligence_Gathering#General
PDF Scraping: https://github.com/pdfminer/pdfminer.six
Capturing Wireless Packets with "iw": https://sandilands.info/sgordon/capturing-wifi-in-monitor-mode-with-iw
Capturing 2G/3G/4G data
The CPAT project may not be able to take a deep-dive into gathering this type of data due to financial and/or legal limitations. However, a cursory entry point, could be demonstrated with means like those in this article.
JS-Sequence Diagrams