404
nenhum resultado encontrado para sua busca.
// WIKI & REFERÊNCIAS
Guia de Cyber Security (PT-BR)
github.com/arthurspk/guiadecybersecurityCommon Ports Cheat Sheet — StationX
stationx.net/common-ports-cheat-sheetCommon Ports PDF — PacketLife (Archive)
packetlife.net — common-ports.pdfTop 1000 TCP/UDP Ports — Nmap Default
nullsec.us/top-1-000-tcp-and-udp-ports-nmap-defaultSpeedGuide — Port Database
speedguide.net/ports.phpHTTP Status Codes — Wikipedia
en.wikipedia.org — List_of_HTTP_status_codesProcess Library — Browse by Name
processlibrary.comFile Types — Executables Reference
fileinfo.com/filetypes/executableAwesome Industrial Protocols
github.com/Orange-Cyberdefense/awesome-industrial-protocolsChatGPT Cyber Security Prompts
github.com/DummyKitty/Cyber-Security-chatGPT-prompt// LINUX
Linux Man Pages
linux.die.net/manCrontab Guru — Visual Editor
crontab.guruLinux Notes & Cheatsheet — m0chan
m0chan.github.io — Linux-Notes-And-CheatsheetContas de Usuários Locais — CMD
postsinfo.blogspot.com — contas-usuarios-cmdSocat — Alternativa ao Netcat (Linux)
linux.die.net/man/1/socatGTFOBins — PHP Exploit
gtfobins.github.io/gtfobins/phpLinux Audit Logs Cheatsheet — SOCInvestigation
socinvestigation.com — linux-audit-logs-cheatsheetLinux Event Logs & Record Types
socinvestigation.com — linux-event-logsLinux Forensics Cheatsheet
fahmifj.github.io — linux-forensics-cheatsheetLocal Testing Server — MDN
developer.mozilla.org — local-testing-serverSudo PrivEsc — HackingArticles (PT)
hackingarticles.in — sudo-rights-privesc// OFFENSIVE
PowerUp.ps1 — PowerSploit PrivEsc
PowerShellMafia/PowerSploit — PowerUp.ps1Exploit-DB — Exploit #39161
exploit-db.com/exploits/39161Ncat.exe — Static Binary Windows x86
andrew-d/static-binaries — ncat.exeNishang — PowerShell Offense Framework
github.com/samratashok/nishangInvoke-PowerShellTcp.ps1 — Nishang
nishang/Shells/Invoke-PowerShellTcp.ps1Powercat — Alternativa Netcat para Windows
github.com/besimorhino/powercatReverse Shell Cheatsheet — SwisskyRepo
swisskyrepo.github.io — shell-reverse-cheatsheetBind Shell Cheatsheet — SwisskyRepo
swisskyrepo.github.io — shell-bind-cheatsheetPayloadsAllTheThings — Reverse Shell MD
PayloadsAllTheThings — Reverse Shell CheatsheetReverse Shell Cheat Sheet — HighOn.Coffee
highon.coffee — reverse-shell-cheat-sheetVX-Underground — Maior Coleção de Malware
vx-underground.orgCódigos-fonte, amostras e documentos de malware
TTPs — FireEye Red Team (Leaked)
achilleas.com.br/fireeye-ttpsMSBuild Bypass — Talos Blog
blog.talosintelligence.com — building-bypass-msbuildLOLBAS — Living Off The Land Binaries
lolbas-project.github.ioBinários Windows para execução privilegiada
LotL — Hiding in Plain Sight
attackiq.com — hiding-in-plain-sightBYOL — Bring Your Own Land
cloud.google.com — bring-your-own-landICMP Tunnel Backdoor — SpiderLabs
trustwave.com — backdoor-icmp-tunnelKali Tools — Referência
kali.org/toolsPacketstorm Security — Vulnerabilidades Recentes
packetstormsecurity.comDLL Hollowing — Deep Dive
secforce.com — dll-hollowingDLL Hijacking — Windows
wietzebeukema.nl — hijacking-dlls-in-windowsHijackLibs — DLL Hijack Reference
hijacklibs.netReflective DLL Injection — stephenfewer
github.com/stephenfewer/ReflectiveDLLInjectionWindows Kernel Exploitation — Intro
wetw0rk.github.io — windows-kernel-exploitationUnmanagedPowerShell — leechristensen
github.com/leechristensen/UnmanagedPowerShellPSInject — PowerShell em Qualquer Processo
github.com/EmpireProject/PSInjectPID Parent Spoofing — psgetsystem
github.com/decoder-it/psgetsystemDetecting .NET / Execute-Assembly Injection
medium.com — detecting-net-injection// BLUE TEAM
BlueTeam-Tools — Repositório A-poc
github.com/A-poc/BlueTeam-ToolsGoDefender — Anti-VM / Anti-Debug
github.com/EvilBytecode/GoDefenderAMSI — How It Helps (Microsoft)
learn.microsoft.com — how-amsi-helpsVisibilidade de scripts ofuscados
AMSI — Antimalware Scan Interface Portal
learn.microsoft.com — antimalware-scan-interface-portalWindows Event 4625 — Login Failure
ultimatewindowssecurity.com — event 4625Enciclopédia de eventos Windows
AD Threat Hunting — Account Lockouts
techcommunity.microsoft.com — AD-lockouts-huntingSysmon — Download & Docs
learn.microsoft.com — sysmonSysmon Config — SwiftOnSecurity
github.com/SwiftOnSecurity/sysmon-configSysmon Modular — olafhartong
github.com/olafhartong/sysmon-modularSysmonForLinux — Microsoft
github.com/microsoft/SysmonForLinuxWindows Event Types — Microsoft Docs
learn.microsoft.com — event-typesWevtutil — Event Log CLI
learn.microsoft.com — wevtutilGet-WinEvent — PowerShell 7.5
learn.microsoft.com — get-wineventDetect Malware C2 via DNS Status Codes
socinvestigation.com — detect-malware-c2-dnsDetecting C2 via Sysmon + Event Logs
ericconrad.com — detecting-c2RDP Lateral Movement — Event Logs
thedfirspot.com — rdp-event-logsRDP Lateral Movement — Artifacts
thedfirspot.com — rdp-artifactsDeepBlueCLI — Threat Hunting Event Logs
github.com/sans-blue-team/DeepBlueCLIMalware Archaeology — DFIR Cheat Sheets
malwarearchaeology.com/cheat-sheetsWindows Core Processes Mindmap
x.com — @SBousseaden mindmapXML Filtering — Windows Event Viewer
techcommunity.microsoft.com — xml-filteringSystem Informer (Process Hacker)
systeminformer.sourceforge.ioACE Strings — Windows Security
learn.microsoft.com — ace-stringsPrivilege Constants — Windows
learn.microsoft.com — privilege-constants// RED TEAM
Hacking Articles — Red Teaming
hackingarticles.in/red-teamingThreatFox — IoC Browse (Abuse.ch)
threatfox.abuse.ch/browseHomoglyph Attack Generator
irongeek.com/homoglyph-attack-generatorGoogle Advanced Search Operators
ahrefs.com — google-advanced-search-operatorstheHarvester — OSINT Recon Tool
pypi.org/project/theHarvesterGoogle Hacking Database — Exploit-DB
exploit-db.com/google-hacking-databaseGoogle Dork Cheatsheet — GitHub
github.com — Google-Dork-CheatsheetDorkSearch — Google Dorks Engine
dorksearch.comOneDorkForAll — Coleção de Dorks
github.com/SecShiv/OneDorkForAllGOAD — Game of Active Directory Lab
github.com/Orange-Cyberdefense/GOADOSCP Tricks 2023
github.com/rodolfomarianocy/OSCP-Tricks-2023Tricks Pentest Active Directory
github.com/rodolfomarianocy/Tricks-Pentest-Active-DirectoryCRTP Overview e Dicas (PT-BR)
medium.com — crtp-overviewOverview OSCP (PT-BR)
medium.com — overview-oscpHackTricks — Wiki Pentest
book.hacktricks.xyz/ptiRed.Team — Red Team Notes
ired.team0xdf Cheatsheets
0xdf.gitlab.io/cheatsheetsOCD Mindmaps — Orange Cyberdefense
orange-cyberdefense.github.io/ocd-mindmapsArsenal — Pentest Command Launcher
github.com/Orange-Cyberdefense/arsenalInventory, reminder e launcher para pentest
KeePwn — KeePass Red Team Tool
github.com/Orange-Cyberdefense/KeePwnRedTeam Tools — A-poc
github.com/A-poc/RedTeam-ToolsCobalt Strike 3.11 — Snake Eats Tail
cobaltstrike.com — snake-that-eats-its-tail// KERBEROS & ACTIVE DIRECTORY
Rubeus — GhostPack Kerberos Tool
github.com/GhostPack/RubeusKekeo to Rubeus — harmj0y Blog
blog.harmj0y.net — from-kekeo-to-rubeusRubeus Sigma Rule — Detection
SigmaHQ — proc_creation_win_hktl_rubeus.ymlNext-Gen Kerberos Attacks — Unit42
unit42.paloaltonetworks.com — next-gen-kerberosAS-REP Roasting com Impacket
securitynik.com — as-rep-roastingKerberoasting Revisited — harmj0y
blog.harmj0y.net — kerberoasting-revisitedAtaque em Kerberos (PT-BR)
cipher.com — ataque-em-kerberosAlwaysInstallElevated — PrivEsc
juggernaut-sec.com — alwaysinstallelevatedSeatbelt — GhostPack Enumeration
github.com/GhostPack/SeatbeltJAWS — Windows PrivEsc Script
github.com/411Hall/JAWSWindows SEH — Structured Exception Handling
limbioliong.wordpress.com — windows-seh// PRIVILEGE ESCALATION
HackTricks — Linux PrivEsc Checklist
book.hacktricks.wiki — linux-privesc-checklistHackTricks — Windows PrivEsc Checklist
book.hacktricks.wiki — windows-privesc-checklistPayloadsAllTheThings — Linux PrivEsc
PayloadsAllTheThings — Linux-Privilege-EscalationPayloadsAllTheThings — Windows PrivEsc
PayloadsAllTheThings — Windows-Privilege-EscalationPEASS-ng — WinPEAS / LinPEAS
github.com/peass-ng/PEASS-ngWinPEAS — Windows Enum
peass-ng/tree/master/winPEASLinEnum — Linux Enumeration Script
github.com/rebootuser/LinEnumLinuxPrivChecker
github.com/sleventyeleven/linuxprivcheckerLinux Smart Enumeration — diego-treitos
github.com/diego-treitos/linux-smart-enumerationPayloadsAllTheThings — Repo Completo
github.com/swisskyrepo/PayloadsAllTheThings// ETW — EVENT TRACING FOR WINDOWS
ETW — About Event Tracing (Microsoft)
learn.microsoft.com — about-event-tracingETW Introduction & Overview (Archive)
web.archive.org — etw-introduction-overviewETW Beginners Guide — bmcder
bmcder.com — guide-to-etwSilkETW — Threat Hunting com ETW (HELK)
medium.com — threat-hunting-etw-silketwExplicação detalhada — usar como consulta
EtwExplorer — Visualizar Metadados ETW
github.com/zodiacon/EtwExplorerWEPExplorer — Infos sobre Provedores ETW
github.com/0xeb/WinTools — WEPExplorerETW Providers Docs — Win7/10 — repnz
github.com/repnz/etw-providers-docsWell-Known Event Providers .NET
learn.microsoft.com — well-known-event-providersETW Links Collection — alexander-hanel
gist.github.com/alexander-hanel — etw-linksMicrosoft-Windows-Threat-Intelligence — jsecurity101
jsecurity101.medium.com — uncovering-windows-events// OSINT & RECON
URLScan.io — URL Scanner
urlscan.ioOSINT4ALL — Start.me
start.me/p/L1rEYQ/osint4allGOOSint — OSINT Search Engine
goosint.comBlackbird — Social Media OSINT
github.com/p1ngul1n0/blackbirdViewDNS.info
viewdns.infoDNSlytics — DNS Analytics
dnslytics.comDNSDumpster — DNS Recon
dnsdumpster.comSecurityTrails — DNS / IP History
securitytrails.comShodan.io — IoT Search Engine
shodan.ioShodan Exposure — Brasil
exposure.shodan.io/#/BRCensys — Internet Search
platform.censys.io/searchFOFA — Cyberspace Search Engine
en.fofa.infoGreyNoise Visualizer
viz.greynoise.ioOSINT.sh — WHOIS History
osint.sh/whoishistoryOSINT.sh — Reverse IP
osint.sh/reverseipOSINT.sh — Domain / IP Lookup
osint.sh/domainHaveIBeenPwned — Credential Check
haveibeenpwned.comWappalyzer — Technology Fingerprint
wappalyzer.com/lookupWHOIS — DomainTools
whois.domaintools.comWho.is — WHOIS Lookup
who.isWhoisMind — Registro de Domínio
whoismind.comWhoxy — WHOIS History
whoxy.comIANA — Root Domain DB
iana.org/domains/root/dbNERD — IP Reputation
nerd.cesnet.cz/nerd/ipsPulseDive — Threat Intelligence
pulsedive.comSock Puppets em OSINT
hackingarticles.in — sock-puppets-osintGoogle Apps Toolbox — DNS / MX
toolbox.googleapps.comDNStwist — Phishing Domain Detection
github.com/elceef/dnstwistDriftnet.io
driftnet.ioAware Online — Website Search Tool
aware-online.com — website-search-tool// THREAT INTELLIGENCE
MITRE ATT&CK — Enterprise Pre
attack.mitre.org/matrices/enterprise/preAPT Search — ETDA
apt.etda.or.th — aptsearchThreatActors TTPs — crocodyli
github.com/crocodyli/ThreatActors-TTPsRansomware.live — Atividade por Setor
ransomware.live/activity/ManufacturingRansom-DB.com
ransom-db.comRansomware Diaries Vol.1 — Analyst1
analyst1.com — ransomware-diaries-volume-1VirusTotal — File / URL Analysis
virustotal.comVirusScan Jotti
virusscan.jotti.orgMaltiverse — Intelligence Panel
maltiverse.com/intelligence/panelMalpedia — Malware Knowledge Base
malpedia.caad.fkie.fraunhofer.deYARAify — Abuse.ch YARA Scanner
yaraify.abuse.ch/scanMalwareBazaar — Abuse.ch
bazaar.abuse.chURLhaus — Abuse.ch
urlhaus.abuse.chTalos Intelligence — Cisco
talosintelligence.comMalware Traffic Analysis
malware-traffic-analysis.netC2 Tracker — JMousqueton
github.com/JMousqueton/C2-TrackerMaTKAP — CTI Monster
matkap.cti.monsterCyber Threat Intelligence — Start.me
start.me/p/wMrA5z/cyber-threat-intelligenceWar Heatmap
warheatmap.appTarlogic Blog — Security Research
tarlogic.com/blogEric Conrad Blog
ericconrad.comGoogle Cloud Threat Intelligence Blog
cloud.google.com — threat-intelligenceOWASP — Automated Threats to Web Apps
owasp.org — automated-threatsAlerta Guardião 2 — Ciberaventuras (BR)
ciberaventuras.com.br — Alerta-Guardiao-2// THREAT HUNTING
HuntBook — Predefender
huntbook.predefender.comDefender Advanced Hunting Queries
github.com/francoisfried/Defender-Advanced-Hunting-QueriesCyberThreatHunting — A3sal0n Hunts
github.com/A3sal0n/CyberThreatHuntingHunting Malware — Critical Processes
detect-respond.blogspot.com — critical-processDeepBlueCLI — PowerShell Threat Hunting
github.com/sans-blue-team/DeepBlueCLIDeepBlueCLI — Artigo Explicativo
medium.com — deepbluecli-explainedKQL — Hunting Cyber Threats (LinkedIn)
linkedin.com — kql-cyber-threat-huntingKQL — Beginners Guide (LinkedIn)
linkedin.com — kql-beginners-guideKQL Intro — YouTube
youtube.com — KQL intro videoStart.me — Threat Intelligence Hub
start.me/p/n78Kpw/startpageSplunk Cheat Sheet — StationX
stationx.net/splunk-cheat-sheet// TOOLS & UTILITÁRIOS
CyberChef — Swiss Army Knife
gchq.github.io/CyberChefRegex101 — RegEx Tester
regex101.comCrackStation — Hash Cracking
crackstation.netMD5 Hashing.net
md5hashing.netMD5 Decrypt.net
md5decrypt.netMD5.gromweb.com
md5.gromweb.comHashes.com — Hash Decrypt
hashes.com/en/decrypt/hashSHA1 Encrypt/Decrypt — 10015.io
10015.io/tools/sha1-encrypt-decryptAnyCript — Crypto Tools
anycript.comWannaBrowser — Headless URL Preview
wannabrowser.netURL2PNG — Screenshot de URLs
url2png.comURLVoid — URL Reputation Check
urlvoid.comCheckPhish — Phishing Detection
checkphish.bolster.aiPhishTank — Phishing Database
phishtank.orgMX Toolbox — Email / MX Lookup
mxtoolbox.comMHA — Message Header Analyzer
mha.azurewebsites.netIANA — Message Headers Reference
iana.org — message-headersWireshark — TrickBot Tutorial (Unit42)
unit42.paloaltonetworks.com — trickbot-wiresharkWireshark Cheat Sheet — Comparitech
comparitech.com — wireshark-cheat-sheetOleTools — Análise Arquivos OLE2/Office
github.com/decalage2/oletoolsPacote Python para arquivos Microsoft OLE2
dnSpy — .NET Debugger / Decompiler
github.com/dnSpy/dnSpyNmap — Download (inclui Netcat para Windows)
nmap.org/download.htmlMicrosoft Threat Modeling Tool
learn.microsoft.com — threat-modeling-toolWindows CLR — Common Language Runtime
learn.microsoft.com — clrLSASS — Wikipedia
en.wikipedia.org — LSASSBuyNumber.io — Número Telegram Anônimo
buynumber.ioInferi.club
inferi.club