| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374 |
- Lista:
- https://www.exploit-db.com/papers : Relacionado con las vulnerabilidades y como son explotadas por los ciberatacantes.
- Detectando un Movimiento lateral en SPLUNK: https://medium.com/threatpunter/detecting-lateral-movement-using-sysmon-and-splunk-318d3be141bc
- Burp Suite - Framework.
- 2. ZAP Proxy - Framework.
- 3. Dirsearch - HTTP bruteforcing.
- 4. Nmap - Port scanning.
- 5. Sublist3r - Subdomain discover
- 6. Amass - Subdomain discovery.
- 7. SQLmap - SQLi exploitation.
- 8. Metasploit - Framework.
- 9. WPscan - WordPress exploitation.
- 10. Nikto - Webserver scanning.
- 11. HTTPX - HTTP probing.
- 3. FFUF - HTTP probing.
- 14. Subfinder - Subdomain discovery.
- 15. Masscan - Mass IP and port scanner.
- 16. Lazy Recon - Subdomain discovery.
- 18. XSS Hunter - Blind XSS discovery.
- 19. Aquatone - HTTP based recon.
- 20. LinkFinder - Endpoint discovery through JS files
- 21. JS-Scan - Endpoint discovery through JS files
- 22 GAU - Historical attack surface mapping
- 23 Parameth - Bruteforce GET and POST parameters
- 24 truffleHog - Find credentials in GitHub commits
- Herameintas: uclei - YAML based template scanning.
- Feed de vulnerabilidades: https://inthewild.io/feed
- Identificación de brechas sobre Malawre o ransomware: https://www.binalyze.com/air --- Busqueda proactiva: https://cybermeisam.medium.com/blue-team-system-live-analysis-part-1-a-proactive-hunt-8258feb7cb14
- Detectar vulnerabilidades en Linux: https://betterprogramming.pub/3-tools-to-detect-linux-vulnerabilities-ec42122cc41b
- Catalogo de Vulnerabilidades Explotadas: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- Validación en el sistema: ((https://medium.com/@wondersome/reconnaissance-tools-for-hacking-d8404399d1f5))
- -----https://github.com/projectdiscovery/chaos-client
- -----https://github.com/aboul3la/Sublist3r : Enlistar servicios para explotar
- Tacticas blueTeam:
- ----https://www.kitploit.com/search/label/PowerShell
|