This list is a collection of various materials that I use every day in my work. It contain a lot of useful information gathered in one piece.
This is not a final and full version - I update it on an ongoing basis.
For whom?
It is intended for everyone and anyone - especially for system and network administrators, devops, pentesters or security researchers.
☑️ Todo
Add useful shell functions
Add one-liners for collection tools (eg. CLI Tools)
Generate book pdf format
The Book of Secret Knowledge (Chapters)
CLI Tools
▪️ Shells
🔸Oh My ZSH! - the best framework for managing your Zsh configuration. 🔸bash-it - framework for using, developing and maintaining shell scripts and custom commands for your daily work. 🔸Oh My Fish - the Fishshell framework.
▪️ Managers
🔸Midnight Commander - visual file manager, licensed under GNU General Public License. 🔸screen - full-screen window manager that multiplexes a physical terminal. 🔸tmux - terminal multiplexer, lets you switch easily between several programs in one terminal. 🔸tmux-cssh - sets a comfortable and easy to use functionality, clustering and synchronizing virtual tmux-sessions.
▪️ Network
🔸Curl - command line tool and library
for transferring data with URLs. 🔸HTTPie - a user-friendly HTTP client. 🔸wuzz - interactive cli tool for HTTP inspection. 🔸httpstat - visualizes curl statistics in a way of beauty and clarity. 🔸gnutls-cli - client program to set up a TLS connection to some other computer. 🔸nmap - free and open source (license) utility for network discovery and security auditing. 🔸hping - command-line oriented TCP/IP packet assembler/analyzer. 🔸mtr - functionality of the 'traceroute' and 'ping' programs in a single network diagnostic tool. 🔸masscan - the fastest Internet port scanner, spews SYN packets asynchronously. 🔸netcat - networking utility which reads and writes data across network connections, using the TCP/IP protocol. 🔸tcpdump - powerful command-line packet analyzer. 🔸tshark - dump and analyze network traffic (wireshark cli). 🔸bmon - monitoring and debugging tool to capture networking related statistics and prepare them visually. 🔸fierce - a DNS reconnaissance tool for locating non-contiguous IP space. 🔸sublist3r - fast subdomains enumeration tool for penetration testers. 🔸amass - tool obtains subdomain names by scraping data sources, crawling web archives and more. 🔸namebench - provides personalized DNS server recommendations based on your browsing history. 🔸Nemesis - packet manipulation CLI tool; craft and inject packets of several protocols. 🔸packetfu - a mid-level packet manipulation library for Ruby. 🔸Scapy - packet manipulation library; forge, send, decode, capture packets of a wide number of protocols. 🔸bombardier - fast cross-platform HTTP benchmarking tool written in Go. 🔸gobench - http/https load testing and benchmarking tool. 🔸Nipe - script to make Tor Network your default gateway. 🔸iptraf-ng - is a console-based network monitoring program for Linux that displays information about IP traffic. 🔸aria2 - is a lightweight multi-protocol & multi-source command-line download utility.
▪️ SSL/Security
🔸sslyze
- fast and powerful SSL/TLS server scanning library. 🔸sslscan - tests SSL/TLS enabled services to discover supported cipher suites. 🔸testssl.sh - testing TLS/SSL encryption anywhere on any port. 🔸spiped - is a utility for creating symmetrically encrypted and authenticated pipes between socket addresses.
▪️ Auditing Tools
🔸lynis - battle-tested security tool for systems running Linux, macOS, or Unix-based operating system. 🔸LinEnum - scripted Local Linux Enumeration & Privilege Escalation Checks. 🔸Rkhunter - scanner tool for Linux systems that scans backdoors, rootkits and local exploits on your systems.
▪️ System Diagnostics/Debuggers
🔸strace - diagnostic, debugging and instructional userspace utility for Linux. 🔸sysdig - system exploration and troubleshooting tool with first class support for containers. 🔸glances - cross-platform system monitoring tool written in Python. 🔸htop - interactive text-mode process viewer for Unix systems. It aims to be a better 'top'. 🔸atop - ASCII performance monitor. Includes statistics for CPU, memory, disk, swap, network, and processes. 🔸lsof - displays in its output information about files that are opened by processes. 🔸FlameGraph - stack trace visualizer. 🔸lsofgraph - small utility to convert Unix lsof output to a graph showing FIFO and UNIX interprocess communication.
▪️ Log Analyzers
🔸GoAccess - real-time web log analyzer and interactive viewer that runs in a terminal. 🔸ngxtop - real-time metrics for nginx server.
▪️ Databases
🔸usql - universal command-line interface for SQL databases. 🔸pgcli - postgres CLI with autocompletion and syntax highlighting. 🔸mycli - terminal client for MySQL with autocompletion and syntax highlighting.
▪️ Pentesting
🔸Metasploit - tool and framework for pentesting system, web and many more, contains a lot a ready to use exploit. 🔸Burp Suite - tool for testing Web application security, intercepting proxy to replay, inject, scan and fuzz HTTP requests. 🔸OWASP Zed Attack Proxy - intercepting proxy to replay, inject, scan and fuzz HTTP requests. 🔸Nikto2 - web server scanner which performs comprehensive tests against web servers for multiple items. 🔸sqlmap - tool that automates the process of detecting and exploiting SQL injection flaws.
▪️ Other
🔸incron - is an inode-based filesystem notification technology.
Web Tools
▪️ SSL/Security
🔸SSL Server Test - free online service performs a deep analysis of the configuration of any SSL web server. 🔸SSL Server Test (DEV) - free online service performs a deep analysis of the configuration of any SSL web server. 🔸ImmuniWeb® SSLScan - test SSL/TLS (PCI DSS, HIPAA and NIST). 🔸urlscan.io - service to scan and analyse websites. 🔸Report URI - monitoring security policies like CSP and HPKP. 🔸CSP Evaluator - allows developers and security experts to check if a Content Security Policy. 🔸Useless CSP - public list about CSP in some big players (might make them care a bit more). 🔸Why No HTTPS? - list of the world's top 100 websites by Alexa rank not automatically redirecting insecure requests. 🔸cipherli.st - strong ciphers for Apache, Nginx, Lighttpd and more. 🔸badssl.com - memorable site for testing clients against bad SSL configs. 🔸tlsfun.de - registered for various tests regarding the TLS/SSL protocol. 🔸Common CA Database - repository of information about CAs, and their root and intermediate certificates. 🔸CERTSTREAM - real-time certificate transparency log update stream. 🔸crt.sh - discovers certificates by continually monitoring all of the publicly known CT.
▪️ Privacy
🔸privacytools.io - provides knowledge and tools to protect your privacy against global mass surveillance. 🔸DNS Privacy Test Servers - DNS privacy recursive servers list (with a 'no logging' policy).
▪️ HTTP Headers
🔸Security Headers - analyse the HTTP response headers (with rating system to the results). 🔸Observatory by Mozilla - set of tools to analyze your website. 🔸Enable CORS - enable cross-origin resource sharing.
▪️ DNS
🔸ViewDNS - one source for free DNS related tools and information. 🔸DNSlytics - online investigation tool. 🔸DNS Spy - monitor, validate and verify your DNS configurations. 🔸Find subdomains online - find subdomains for security assessment penetration test. 🔸DNSdumpster - dns recon & research, find & lookup dns records. 🔸DNS Table online - search for DNS records by domain, IP, CIDR, ISP. 🔸PTRarchive.com - this site is responsible for the safekeeping of historical reverse DNS records. 🔸xip.ip - wildcard DNS for everyone.
▪️ Mail
🔸MX Toolbox - all of your MX record, DNS, blacklist and SMTP diagnostics in one integrated tool. 🔸blacklistalert - checks to see if your domain is on a Real Time Spam Blacklist. 🔸MultiRBL - complete IP check for sending Mailservers.
▪️ PGP Keyservers
🔸SKS OpenPGP Key server - includes a highly-efficient reconciliation algorithm for keeping the keyservers synchronized.
▪️ Mass scanners (search engines)
🔸Censys - platform that helps information security practitioners discover, monitor, and analyze devices. 🔸Shodan - the world's first search engine for Internet-connected devices. 🔸Shodan 2000 - if you use Shodan for everyday work, be sure to see it - looks for randomly generated data from Shodan. 🔸GreyNoise - mass scanner (such as Shodan and Censys). 🔸ZoomEye - search engine for cyberspace that lets the user find specific network components. 🔸FOFA - is a cyberspace search engine. 🔸onyphe - is a search engine for open-source and cyber threat intelligence data collected. 🔸binaryedge - it scan the entire internet space and create real-time threat intelligence streams and reports. 🔸hunter - lets you find email addresses in seconds and connect with the people that matter for your business. 🔸wigle - is a submission-based catalog of wireless networks. All the networks. Found by Everyone. 🔸PublicWWW - find any alphanumeric snippet, signature or keyword in the web pages HTML, JS and CSS code. 🔸IntelTechniques - this repository contains hundreds of online search utilities. 🔸GhostProject? - search by full email address or username. 🔸Buckets by Grayhatwarfar - database with public search for Open Amazon S3 Buckets and their contents. 🔸Vigilante.pw - the breached database directory. 🔸builtwith - find out what websites are built with.
▪️ Net-tools
🔸Netcraft - detailed report about the site, helping you to make informed choices about their integrity. 🔸RIPE NCC - not-for-profit membership association, a Regional Internet Registry and the secretariat for the RIPE. 🔸Robtex - uses various sources to gather public information about IP numbers, domain names, host names, routes etc. 🔸Security Trails - APIs for Security Companies, Researchers and Teams. 🔸Online Curl - curl test, analyze HTTP Response Headers. 🔸Ping.eu - online Ping, Traceroute, DNS lookup, WHOIS and others. 🔸Network-Tools - network tools for webmasters, IT technicians & geeks. 🔸URL Encode/Decode - tool from above to either encode or decode a string of text. 🔸Uncoder - the online translator for search queries on log data. 🔸XSS String Encoder - for generating XSS code to check your input validation filters against XSS. 🔸RegExr - online tool to learn, build, & test Regular Expressions (RegEx / RegExp). 🔸Hardenize - deploy the security standards. 🔸VirusTotal - analyze suspicious files and URLs to detect types of malware.
▪️ Code parsers/playgrounds
🔸ShellCheck - finds bugs in your shell scripts. 🔸jsbin - live pastebin for HTML, CSS & JavaScript and more. 🔸PHP Sandbox - test your PHP code with this code tester.
▪️ Performance
🔸GTmetrix - analyze your site’s speed and make it faster. 🔸Sucuri loadtimetester - test here the
performance of any of your sites from across the globe.
▪️ Passwords
🔸Random.org - generate random passwords. 🔸Gotcha? - list of 1.4 billion accounts circulates around the Internet. 🔸have i been pwned? - check if you have an account that has been compromised in a data breach.
▪️ CVE
🔸CVE Mitre - list of publicly known cybersecurity vulnerabilities. 🔸CVE Details - CVE security vulnerability advanced database.
Manuals/Howtos/Tutorials
▪️ Bash
🔸pure-bash-bible - a collection of pure bash alternatives to external processes. 🔸The Bash Hackers Wiki - hold documentation of any kind about GNU Bash. 🔸Shell & Utilities - describes the commands and utilities offered to application programs by POSIX-conformant systems.
▪️ Programming
🔸F’Awk Yeah! - advanced sed and awk usage (Parsing for Pentesters 3).
▪️ Unix & Network
🔸nixCraft - linux and unix tutorials for new and seasoned sysadmin. 🔸TecMint - the ideal Linux blog for Sysadmins & Geeks. 🔸Omnisecu - Free Networking, System Administration and Security Tutorials. 🔸Unix Toolbox - collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users.
▪️ Security
🔸OWASP - worldwide not-for-profit charitable organization focused on improving the security of software. 🔸OWASP ASVS 3.0.1 - OWASP Application Security Verification Standard Project. 🔸OWASP ASVS 3.0.1 Web App - simple web app that helps developers understand the ASVS requirements. 🔸Offensive Security - true performance-based penetration testing training for over a decade. 🔸Hacking Articles - LRaj Chandel's Security & Hacking Blog. 🔸GTFOBins - list of Unix binaries that can be exploited by an attacker to bypass local security restrictions. 🔸AWS security tools - make your AWS cloud environment more secure. 🔸HTML5 Security Cheatsheet - a collection of HTML5 related XSS attack vectors. 🔸PTES - the penetration testing execution standard. 🔸ctf-tools - some setup scripts for security research tools. 🔸Guifre Ruiz Notes - collection of secuirty, system, network and pentest cheatsheets. 🔸Rawsec's CyberSecurity Inventory - an inventory of tools and resources about CyberSecurity. 🔸Application Security Wiki - is an initiative to provide all application security related resources at one place. 🔸The Illustrated TLS Connection - every byte of a TLS connection explained and reproduced.
▪️ Web Apps
🔸Mozilla Web Security - help operational teams with creating secure web applications.
▪️ Other
🔸CTF Series : Vulnerable Machines - the steps below could be followed to find vulnerabilities and exploits. 🔸How to start RE/malware analysis? - collection of some hints and useful links for the beginners. 🔸LZone Cheat Sheets - all cheat sheets. 🔸Dan’s Cheat Sheets’s - massive cheat sheets documentation. 🔸The C10K problem - it's time for web servers to handle ten thousand clients simultaneously, don't you think? 🔸Bank Grade Security - when companies say they have "Bank Grade Security" they imply that it is a good thing. 🔸HTTPS on Stack Overflow - this is the story of a long journey regarding the implementation of SSL. 🔸Julia's Drawings - some drawings about programming and unix world, zines about systems & debugging tools. 🔸DEF CON Media Server - great stuff from DEFCON 26. 🔸BGP Meets Cat - after 3072 hours of manipulating BGP, Job Snijders has succeeded in drawing a Nyancat. 🔸HTTPS in the real world - great tutorial explain how HTTPS works in the real world.
Blogs
🔸Brendan Gregg's Blog - Brendan Gregg is an industry expert in computing performance and cloud computing. 🔸Gynvael "GynDream" Coldwind - Gynvael is a IT security engineer at Google. 🔸Michał "lcamtuf" Zalewski - "white hat" hacker, computer security expert. 🔸Mattias Geniar - developer, Sysadmin, Blogger, Podcaster and Public Speaker. 🔸Nick Craver - Software Developer and Systems Administrator for Stack Exchange. 🔸Robert Penz - IT security Expert. 🔸Scott Helme - Security Researcher, international speaker and founder of securityheaders.com and report-uri.com. 🔸Kacper Szurek - Detection Engineer at ESET. 🔸Troy Hunt - Microsoft Regional Director and Microsoft Most Valuable Professional for Developer Security. 🔸Linux Audit - the Linux security blog about Auditing, Hardening and Compliance by Michael Boelen. 🔸
Linux Security Expert - trainings, howtos, checklists, security tools and more. 🔸The Grymoire - collection of useful incantations for wizards, be you computer wizards, magicians, or whatever. 🔸raymii.org - linux/unix sysadmin specializing in building high availability cloud environments.
▪️ A piece of history
🔸How to Do Things at ARL - how to configure modems, scan images, record CD-ROMs, and other useful techniques.
Systems/Services
▪️ Systems
🔸Slackware - the most "Unix-like" Linux distribution. 🔸OpenBSD - multi-platform 4.4BSD-based UNIX-like operating system. 🔸HardenedBSD - HardenedBSD aims to implement innovative exploit mitigation and security solutions. 🔸Kali Linux - Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments. 🔸Backbox Linux - penetration test and security assessment oriented Ubuntu-based Linux distribution.
▪️ HTTP(s) Services
🔸Varnish HTTP Cache - HTTP accelerator designed for content-heavy dynamic web sites. 🔸Nginx - open source web and reverse proxy server that is similar to Apache, but very light weight.
▪️ Security/hardening
🔸Emerald Onion - seattle-based encrypted-transit internet service provider. 🔸Unbound - validating, recursive, and caching DNS resolver (with TLS). 🔸Knot Resolver - caching full resolver implementation, including both a resolver library and a daemon. 🔸Vulnreport - open-source pentesting management and automation platform by Salesforce Product Security.
Networks
▪️ Tools
🔸CapAnalysis - web visual tool to analyze large amounts of captured network traffic (PCAP analyzer).
▪️ Labs
🔸NRE Labs - learn automation by doing it. Right now, right here, in your browser.
Awesome Lists
🔸Awesome Sysadmin - amazingly awesome open source sysadmin resources. 🔸Awesome Shell - awesome command-line frameworks, toolkits, guides and gizmos. 🔸Awesome Hacking - awesome lists for hackers, pentesters and security researchers. 🔸Awesome Hacking Resources - collection of hacking/penetration testing resources to make you better. 🔸Hacking Cheat Sheet - author hacking and pentesting notes. 🔸Movies for Hackers - list of movies every hacker & cyberpunk must watch. 🔸Awesome Pentest - collection of awesome penetration testing resources, tools and other shiny things. 🔸Awesome Pcaptools - collection of tools developed by other researchers to process network traces. 🔸SecLists - collection of multiple types of lists used during security assessments, collected in one place. 🔸Command-line-text-processing - from finding text to search and replace, from sorting to beautifying text and more. 🔸Awesome Scalability - best practices in building High Scalability, High Availability, High Stability and more. 🔸Awesome Postgres - list of awesome PostgreSQL software, libraries, tools and resources. 🔸Free Security eBooks - list of a Free Security and Hacking eBooks.
🔸Bounty Factory - European bug bounty platform based on the legislation and rules in force in European countries. 🔸Openbugbounty - allows any security researcher reporting a vulnerability on any website. 🔸hackerone - global hacker community to surface the most relevant security issues. 🔸bugcrowd - crowdsourced cybersecurity for the enterprise. 🔸Crowdshield - crowdsourced Security & Bug Bounty Management.
▪️ Web Training Apps (local installation)
🔸OWASP-VWAD - comprehensive and well maintained registry of all known vulnerable web applications. 🔸Metasploitable 2 - vulnerable web application amongst security researchers. 🔸DVWA - PHP/MySQL web application that is damn vulnerable. 🔸OWASP Mutillidae II - free, open source, deliberately vulnerable web-application. 🔸OWASP Juice Shop Project - the most bug-free vulnerable application in existence. 🔸OWASP WebGoat Project - insecure web application maintained by OWASP designed to teach web app security. 🔸Security Ninjas - open source application security training program. 🔸hackazon - a modern vulnerable web app. 🔸dvna - damn vulnerable NodeJS application. 🔸Google Gruyere - web application exploits and defenses. 🔸Bodhi - is a playground focused on learning the exploitation of client-side web vulnerabilities.
▪️ Labs (ethical hacking platforms)
🔸Hack The Box - online platform allowing you to test your penetration testing skills. 🔸Hacking-Lab - online ethical hacking, computer network and security challenge platform. 🔸pwnable.kr - non-commercial wargame site which provides various pwn challenges regarding system exploitation. 🔸Pwnable.tw - is a wargame site for hackers to test and expand their binary exploiting skills. 🔸Silesia Security Lab - high quality security testing services. 🔸Practical Pentest Labs - pentest lab, take your Hacking skills to the next level. 🔸Root Me - the fast, easy, and affordable way to train your hacking skills. 🔸rozwal.to - a great platform to train your pentesting skills. 🔸TryHackMe - learning Cyber Security made easy. 🔸OverTheWire - can help you to learn and practice security concepts in the form of fun-filled games.
Your daily knowledge and news
▪️ RSS Readers
🔸Feedly - organize, read and share what matters to you.
▪️ Security
🔸Google Online Security Blog - the latest news and insights from Google on security and safety on the Internet. 🔸Qualys Blog - expert network security guidance and news. 🔸DARKReading - connecting the Information Security Community. 🔸publiclyDisclosed - public disclosure watcher who keeps you up to date about the recently disclosed bugs. 🔸0day.today - exploits market provides you the possibility to buy zero-day exploits and also to sell 0day exploits. 🔸Exploit-DB - the exploit database: exploits, shellcode, 0days, remote exploits, local exploits, web Apps and more. 🔸sploitus - the exploit and tools database. 🔸Packet Storm - information security services, news, files, tools, exploits, aAdvisories and whitepapers. 🔸Sekurak - about security, penetration tests, vulnerabilities and many others (PL/EN). 🔸nf.sec - basic aspects and mechanisms of Linux operating system securit (PL).
🔸Unbound DNS Tutorial - a validating, recursive, and caching DNS server. 🔸Knot Resolver on Fedora - how to get faster and more secure DNS resolution with Knot Resolver on Fedora. 🔸DNS-over-HTTPS - tutorial to setup your own DNS-over-HTTPS (DoH) server. 🔸DNS Servers - how (and why) i run my own DNS Servers. 🔸DNS Privacy Server - running your own DoT or DoH server this page provides some ideas.
( _fd="private.key"; _fd_csr="request.csr"; \
openssl req -new -sha256 -key ${_fd} -out ${_fd_csr} \
-config <(cat <<-EOF[req]default_bits = 2048prompt = nodefault_md = sha256req_extensions = req_extdistinguished_name = dn[ dn ]C=<two-letter ISO abbreviation for your country>ST=<state or province where your organization is legally located>L=<city where your organization is legally located>O=<legal name of your organization>OU=<section of the organization>CN=<fully qualified domain name>[ req_ext ]subjectAltName = @alt_names[ alt_names ]DNS.1 = <fully qualified domain name>DNS.2 = <next domain>DNS.3 = <next domain>EOF))