Below are links for:
- Linux Operating System - Crash Course for Beginners - Learn the basics of the Linux Operating System in this crash course for beginners. Linux is a clone of the UNIX operating system, so understanding one is understanding the other. The goal is for you to get a full understanding of how the Linux OS works. If you're still using Windows or Mac OS, you can still learn Linux using a virtual machine.
- The Complete Linux Course: Beginner to Power User! - This 7+ hour Ubuntu Linux tutorial will take you from beginner to power user. It covers installation, command line, administrative privileges, app development, server hosting, GitHub, and much more!
- The Complete Linux Course: Beginner to Power User! - If you want to get started using Linux, you will LOVE this course! This 7+ hour Ubuntu Linux tutorial will take you from beginner to power user. We will cover installation, command line, administrative privileges, app development, server hosting, GitHub, and much more!
- Linux Command Line Full course: Beginners to Experts. Bash Command Line Tutorials - Bash is a Unix shell and command language written by Brian Fox for the GNU Project as a free software replacement for the Bourne shell. First released in 1989, it has been used widely as the default login shell for most Linux distributions.
- Linux File System/Structure Explained! - Ever get confused where to find things in Linux and where programs get installed? I'll explain what all the folders are for, and what's in them!
- Linux for Ethical Hackers (Kali Linux Tutorial) - In this course, you will learn the basics of Kali Linux. The course covers installation, using the terminal / command line, bash scripting, tools and features for ethical hacking, and more. The course focuses on Kali Linux but much of the content applies to other versions of Linux as well.
- Twitter Thread on Aliases
- Find anything you need with fzf, the Linux fuzzy finder tool - I'm thankful for the Linux fuzzy finder tool because it superpowers the command line by making it fast to find whatever I'm looking for.
- A Powerline style prompt for your shell
- Remove weak ciphers from Cisco IOS deviecs
- Remove weak ciphers from Aruba CX devices
- Remove weak ciphers from Aruba Procurve devices
- Checking Browser Cipher Suites - The team at the "Distributed Computing & Security (DCSec) Research Group" of the Leibniz Universität Hannover have created a web page that pulls all of the cipher suites out of your browser - Cipher Suites Supported by Your Browser (ordered by preference). A big thank you to the team that created this site!
- Checking Server Cipher Suites with Nmap - Last night I was reading Testing for Weak SSL/TLS Ciphers on the OWASP site and found an nmap script that gives you a quick and dirty way to check ciphers.
- DSA vs. RSA Encryption - Which Works Best for File Transfers? - This guide deeply discusses the core differences between RSA and DSA algorithms for secure file transfers. Learn about DSA vs. RSA encryption & decryption.
- Introduction to DevOps and Site Reliability Engineering - Edx Course
- Learn Docker, from the beginning, part I - I should say I’m writing a lot of these articles for me and my own understanding and to have fun in the process 😃. I also hope that it can be useful for you as well.
- Nick Janetakis Django - I mainly work with Flask, Rails, Phoenix, Bash, Docker, Ansible & Terraform. Also a @docker captain.
The Difference Between ChatGPT and GPT-3 - In case you have been following along, and were confused about the difference between ChatGPT, which is a new demonstration of this type of technology, and GPT-3, which had already been in use in a variety of contexts.
- More car hacking! - Earlier this year, we were able to remotely unlock, start, locate, flash, and honk any remotely connected Honda, Nissan, Infiniti, and Acura vehicles, completely unauthorized, knowing only the VIN number of the car.
- CRLF + XSS using GBK Encoding - $6000 with Microsoft Hall of Fame | Microsoft Firewall Bypass | CRLF to XSS | Microsoft Bug Bounty
- haha google dork searches - An amazing set of queries. We also have funny search queries at so irishcasino. People are so weird.
- Stowaway is a Multi-hop proxy tool for security researchers and pentesters
- Pen Tester Cheatsheets - This is a collection of resources, scripts and easy to follow how-to's. I have been gathering (and continuing to gather) in preparation for the OSCP as well as for general pentesting. Feel free to use however you want!
- Pyramid: Python scripts to evade EDRs - Pyramid is a set of Python scripts and module dependencies that can be used to evade EDRs. The main purpose of the tool is to perform offensive tasks by leveraging some Python evasion properties and looking as a legit Python application usage.
- Getting in the Zone: dumping Active Directory DNS using adidnsdump - What not many people know however is that if Active Directory integrated DNS is used, any user can query all the DNS records by default. This blog introduces a tool to do this and describes a method to do this even for records normal users don’t have read rights for.
- D(HE)ater - D(HE)ater is an attacking tool based on CPU heating in that it forces the ephemeral variant of Diffie-Hellman key exchange (DHE) in given cryptography protocols (e.g. TLS, SSH). It is performed without calculating a cryptographically correct ephemeral key on the client-side, but with a significant amount of calculation on the server-side. Based on this, a denial-of-service (DoS) attack can be initiated, called D(HE)at attack (CVE-2002-20001).
- Introduction to Databases and SQL Querying - Free - Query a database, Create Tables and Databases and be proficient with basic SQL querying