Skip to content

rikosintie/Links

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

Curated List of Links

Below are links for:

Python

Web Dev

  • Nick Janetakis Django - I mainly work with Flask, Rails, Phoenix, Bash, Docker, Ansible & Terraform. Also a @docker captain.

AI

The Difference Between ChatGPT and GPT-3 - In case you have been following along, and were confused about the difference between ChatGPT, which is a new demonstration of this type of technology, and GPT-3, which had already been in use in a variety of contexts.

Hacking

  • More car hacking! - Earlier this year, we were able to remotely unlock, start, locate, flash, and honk any remotely connected Honda, Nissan, Infiniti, and Acura vehicles, completely unauthorized, knowing only the VIN number of the car.
  • CRLF + XSS using GBK Encoding - $6000 with Microsoft Hall of Fame | Microsoft Firewall Bypass | CRLF to XSS | Microsoft Bug Bounty
  • haha google dork searches - An amazing set of queries. We also have funny search queries at so irishcasino. People are so weird.
  • Stowaway is a Multi-hop proxy tool for security researchers and pentesters
  • Pen Tester Cheatsheets - This is a collection of resources, scripts and easy to follow how-to's. I have been gathering (and continuing to gather) in preparation for the OSCP as well as for general pentesting. Feel free to use however you want!
  • Pyramid: Python scripts to evade EDRs - Pyramid is a set of Python scripts and module dependencies that can be used to evade EDRs. The main purpose of the tool is to perform offensive tasks by leveraging some Python evasion properties and looking as a legit Python application usage.
  • Getting in the Zone: dumping Active Directory DNS using adidnsdump - What not many people know however is that if Active Directory integrated DNS is used, any user can query all the DNS records by default. This blog introduces a tool to do this and describes a method to do this even for records normal users don’t have read rights for.
  • D(HE)ater - D(HE)ater is an attacking tool based on CPU heating in that it forces the ephemeral variant of Diffie-Hellman key exchange (DHE) in given cryptography protocols (e.g. TLS, SSH). It is performed without calculating a cryptographically correct ephemeral key on the client-side, but with a significant amount of calculation on the server-side. Based on this, a denial-of-service (DoS) attack can be initiated, called D(HE)at attack (CVE-2002-20001).

SQL

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published