A big bag of Fun. Educational purposes.
* MOBILE
* BOTNETS
grep word f1
sort | uniq -c
diff f1 f2
find -size f1
zcat f1 > f2
gzip -d file
bzip2 -d f1
tar -xvf file
nc localhost 30000
echo 4wcYUJFw0k0XLShlDzztnTBHiqxU3b3e | nc localhost 30000
openssl s_client -connect localhost:30001 -quiet
nmap -p 31000-32000 localhost
telnet localhost 3000
- Bulletproof SSL and TLS
- Reversing: Secrets of Reverse Engineering
- The Art of Memory Forensics
- The C Programming Language
- The Unix Programming Environment
- UNIX Network Programming
- Threat Modeling: Designing for Security
- The Tangled Web
- The Art of Exploitation
- The Art of Software Security Assessment
- Practical Packet Analysis
- Gray Hat Python
- Black Hat Python
- Violent Python
- Shellcoders Handbook
- Practice Malware Analysis
- Krebs Series on how to be in InfoSec: Thomas Ptacek, Bruce Schneier, Charlie Miller
- How to be a InfoSec Geek
- My Blog
Hi! I work on this project in my spare time, in addition to my primary job. I hope you enjoy using Gray Hacker Resources. If you do, please, become my patron 🤝.
Patreon | Bitcoin | Ethereum |
---|---|---|
Become a patron | 1FrPrQb6ACTkbSBAz9PduJWrDFfq41Ggb4 |
0x6aF39C917359897ae6969Ad682C14110afe1a0a1 |
This is your way make a clear statement: My work is valued.
I would appreciate your support! Thank you!
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
When making a reference to my work, please use my website.