Zero Day Archives
  • What is Zero Day Archives?
  • Contributors
  • Wireless Security
    • Intro to WiFi Pentesting
      • WEP Networks
      • WPS
      • WPA-PSK Networks
      • WPA & WPA2 PSK
      • WPA2 & WPA3 Enterprise Networks
      • WPA2 & WPA3-APLess
  • Reverse Engineering
    • Reverse Engineering
      • Introduction to Software Reverse Engineering
        • Introduction to Capture the Flag (CTF) Competitions
        • What are PE & Elf Binaries
        • Assembly Language for Beginner Reverse Engineers
        • Memory Registers for x86-64 (64-bit) and x86 (32-bit)
        • Reversing Tools: Command-Line Utilities for Binary Analysis
        • Reversing ELF Binaries: Techniques and Tools
      • Disassembly & Debugging
        • GDB for Reverse Engineering
        • RADARE2 for Reverse Engineering
        • GHIDRA for Reverse Engineering
        • IDA Pro for Reverse Engineering
      • Binary Exploitation
        • Buffer Overflows
          • What are Buffer Overflows and Stack Protections?
          • Commonly Exploited C Functions and Their Secure Alternatives
          • Basic Buffer Overflow in x86-64 Using GDB
        • Cryptography
          • Understanding Ciphers and Identifying Common Patterns
          • Teaching XOR Operations in Binary Exploitation
        • Return Oriented Programming (ROP)
          • Practical Guide to Exploring and Identifying Return-Oriented Programming (ROP)
        • Cracking and Patching Binaries
          • Tactics, Tools, and Procedures for Cracking and Patching Binaries
        • Ret2Win Challenges
  • Malware Analysis
    • Malware Analysis
      • Static Analysis
  • Transporting Files to/from Victims
    • Transferring Files to/from High Value Targets
      • Linux
      • Windows
      • CrackMapExec (NetExec)
  • Penetration Testing against GIT Remote Repositories
    • Targeting GIT Repositories
      • Attacking GIT
  • Network Pivoting, Port Forwarding, and Tunneling
    • Pivoting
      • Ligolo-ng
        • Basic Pivoting
        • Setup Reverse Shells through Pivot
        • Transferring Files through Pivot
      • Pivoting: Using Remote Desktop
      • ProxyChains
      • Metasploit
    • SSH Tunneling
      • SSH Local Port Forwarding
      • SSH Dynamic Port Forwarding
      • Sshuttle over SSH
    • Port Fowarding
      • Chisel Port Forwarding
      • NetSH for Port Forwarding
      • Plink for Port Forwarding
      • SoCat
      • Metasploit: Port Forwarding
  • Anti-Virus Evasion
    • Anti-Virus Evasion
      • Evasion with Metasploit
      • Evasion wtih Shellter
      • Evasion with Virus Total
  • Public Exploit Research
    • Online Exploit Research & Methods
  • Password Attacks
    • Password Attacks
      • Identifying Hashes
        • Hash Identifier Tools
      • John The Ripper
        • Cracking Passwords with John
        • Convert to Hashes with John
        • NTLM vs NTLMv2 Hashes + CrackMapExec
      • Hashcat
        • Cracking Passwords with Hashcat
      • Hydra
        • Hydra for Network Services
        • Hydra for Web Services
      • Mutating Wordlists for John & Hashcat
        • Mutating Wordlists
  • Digital Forensics & Incident Response (DFIR)
    • Digital Forensics
  • Data Science
    • Data Science/AI
  • Software Defined Radio (SDR)
    • Software Defined Radio
  • Embedded Systems Programming
    • Field Programmable Gate Arrays (FPGAs)
  • Other Resources
    • Resources for Hackers
Powered by GitBook
On this page
  1. Other Resources

Resources for Hackers

PreviousField Programmable Gate Arrays (FPGAs)

Last updated 2 months ago

Essential Hacking Resources and Websites for Exploitation

This section highlights some of the most valuable hacking resources that offer tools, scripts, and techniques for exploitation, reverse shell creation, privilege escalation, and discovering vulnerabilities in real-world scenarios. These websites and tools are crucial for penetration testers looking to gain access, escalate privileges, and pivot through systems.

1. RevShellCreator

  • Link:

  • Purpose: RevShellCreator is a web-based tool that helps you generate reverse shells in multiple programming languages and formats (PHP, Python, Bash, etc.). This is especially useful for post-exploitation tasks, enabling attackers to set up reverse shells for remote access after compromising a machine.

2. ExploitDB (Exploit Database)

  • Link:

  • Purpose: ExploitDB is one of the largest repositories of public exploits and vulnerabilities. It provides detailed information on known vulnerabilities, proof-of-concept exploits, and exploit code. This resource is invaluable for penetration testers searching for existing vulnerabilities to exploit in systems or applications.

3. GTFOBins

  • Link:

  • Purpose: GTFOBins is a collection of Unix binaries that can be exploited for privilege escalation and bypassing security restrictions. This site provides detailed examples of how common binaries like find, nc, curl, and others can be used to escalate privileges, create reverse shells, or perform other malicious actions.

4. LOLBas (Living Off The Land Binaries)

  • Link:

  • Purpose: LOLBas is a resource focused on Windows binaries that can be leveraged to perform attacks without relying on external tools. These binaries can be used for privilege escalation, remote code execution, or even bypassing security restrictions. This project helps hackers live off the land by using legitimate tools for exploitation.

5. VirusTotal

  • Purpose: VirusTotal allows users to upload files and URLs to be scanned by multiple antivirus engines and static analysis tools. It's invaluable for malware analysis and testing whether a file will be detected by security products before using it in an attack.

6. SecLists

  • Purpose: SecLists is an extensive collection of wordlists for brute-force attacks, subdomain enumeration, password cracking, and more. This repository is essential for penetration testers looking to automate their testing process using predefined lists of data that can be used for fuzzing, scanning, and exploiting vulnerabilities.

7. PayloadsAllTheThings

  • Purpose: PayloadsAllTheThings is a massive collection of payloads for various attack vectors, including web application attacks, reverse shells, and more. It’s an excellent resource for crafting custom attack payloads for use during penetration tests.

8. Meyer Web

  • Purpose: Meyer Web is a personal blog and resource hub by Eric Meyer, offering deep insights into web technologies, CSS, and JavaScript. While not strictly a hacking-focused site, it provides valuable tips for penetration testers and web developers, especially for discovering HTML/CSS/JS vulnerabilities, and rendering issues that could lead to security flaws, especially with modern web applications.

Link:

Link:

Link:

Link:

https://www.revshells.com/
https://www.exploit-db.com/
https://gtfobins.github.io/
https://lolbas-project.github.io/
https://www.virustotal.com/
https://github.com/danielmiessler/SecLists
https://github.com/swisskyrepo/PayloadsAllTheThings
https://meyerweb.com/