Blogs
- https://secnhack.in/
- https://thehackernews.com/
- https://www.cisoadvisor.com.br/
- https://threatpost.com/
- https://cgreinhold.dev/
- https://snyk.io/blog/
- https://www.troyhunt.com/
- https://samy.pl/
- https://www.malwaretech.com/
- https://minutodaseguranca.blog.br/
- https://www.welivesecurity.com
- https://www.syhunt.com/pt/?n=News.2021-Leaks&key=lucy17 (Leaks Feed)
- https://eskelsen.medium.com/
- https://www.adico.me/
- https://mayfly277.github.io/
- https://www.kitploit.com/
- https://www.felipeprado1975.com/
- https://securityonline.info/
Youtubers
- https://youtube.com/LiveOverflowCTF
- https://youtube.com/c/DavidBombal/
- https://youtube.com/c/JohnHammond010/
- https://youtube.com/stokfredrik
- https://youtube.com/c/GabrielPato/
Github profiles
- https://github.com/carlospolop
- https://github.com/KingOfBugbounty
- https://github.com/helviojunior
- https://github.com/VitorOriel
VMs & Distros
- Kali: https://www.kali.org/
- Kali purple: https://gitlab.com/kalilinux/documentation/kali-purple?s=08
- Whonix | Navegação anônima - https://www.whonix.org/
- Tails | Navegação anônima - https://tails.boum.org/index.pt.html
- REMnux | Malware Analysis - https://remnux.org/ (doc tools https://docs.remnux.org, eg. https://docs.remnux.org/discover-the-tools/analyze+documents/pdf)
- Santoku | Distro focada em forense para mobile - https://santoku-linux.com/about-santoku/
- VMs com CVE exploitable - https://www.vulnmachines.com/about
Web Scanners
- https://gf.dev/toolbox/ | Canivete suiço para ambientes Web
- https://www.ssllabs.com/ssltest/ | Diversas verificações para sistemas Web
- https://hstspreload.org/ | Teste para HSTS simples e direto
- https://observatory.mozilla.org/ | Diversas verificações para sistemas Web
- https://securityheaders.com/ | Verificações focadas em HTTP Headers necessários
- https://www.securityscore.com.br/ | Scan que vai além do sistema web, consulta e-mails e portas associadas ao domínio
Vazamento de Senhas e Dados - Leaks - Threat Intelligence
- https://www.ransomlook.io/recent - Melhor site que está centralizando notícias de vários grupos e empresas afetadas.
- https://haveibeenpwned.com/ | Verificação de vazamento de senhas
- https://intelx.io/ | Consulta à base de dados de vazamentos
- http://pwndb2am4tzkvold.onion/ | Consulta à base de vazamentos
- http://xjypo5vzgmo7jca6b322dnqbsdnp3amd24ybx26x5nxbusccjkm4pwid.onion/ | Consulta à base de vazamentos (DeepSearch)
- http://ransomwr3tsydeii4q43vazm7wofla5ujdajquitomtd47cxjtfgwyyd.onion/| Ransomware Group Sites
- https://breached.vc/ | Antigo raidforums.com desativado - Forum com exposição de vazamentos
OSINT
- https://search.censys.io/ | Scan de IPs e portas
- https://www.shodan.io/ | Scan de IPs e portas
- https://wigle.net/ | Mapeamento mundial de redes wifi
- https://osintframework.com/ | Grande indexador de ferramentas e OSINT’s para reconhecimento e pentest
- https://gf.dev/whois-hosting | Descobrir caminhos de IPs de um site
- https://github.com/sherlock-project/sherlock | Busca de usuário em várias redes sociais públicas
- https://start.me/p/BnBb5v/jornadas-osint | Reune vários links OSINTs, buscadores de nicks, de imagens, de pessoas, etc
- https://www.osintessentials.com/
- https://www.whois.com/whois/site.com.br | Ferramenta recomendada de whois
- https://labs.tib.eu/geoestimation/ | Estimativa de localização de imagens
Steganography / Esteganografia
- https://www.aperisolve.com | Reune várias ferramentas de análise de imagem e uma única requisição web)
- HxD | Visualizador hexdecimal de arquivos)
- stegseek | Procura por palavras dentro de uma arquivo de imagem baseado em uma lista (rockyou, por exemplo)
- binwalk | Usado principalmente para extrair outros arquivos escondidos dentro de outros arquivos
- steghide | Inserir ou extrair outros arquivos inseridos e protegidos com senha em outros arquivos
- strings | Comando strings, ferramenta linux que analisa possíveis strings de arquivos, locais, etc
- exiftool | Comando/ferramenta linux que analisa as informações EXIF de um arquivo
- goblyn | Captura de metada em arquivo de um website files
- Artigo sobre importância dos metadados para a segurança: https://www.kaspersky.com.br/blog/office-documents-metadata/7192/
Web Tools
- https://gchq.github.io/CyberChef/ | Canivete suiço. Diversos ‘utils’, scrab, estractor, etc
- https://www.processlibrary.com/en/ | Busca de dlls e processos
- https://caniuse.com/ | Verificação de compatibilidade de browsers
- https://grabify.link/ | Encurtado de links com IP logger
- https://archive.org/web/ | Way back machine - Histórico das páginas antigas
- https://beautifier.io/ | Transforma um js minificado para legível
- https://bgp.he.net | BGP Check
- https://www.100security.com.br/rsg | Reverse shell generator
- https://report-uri.com/home/tools | CSP Analyse, CSP Builder, CSP Hash, Header Analyser, SRI HAsh, PEM Decoder
Tools
- https://beefproject.com/
- http://sqlmap.org/
- https://nmap.org/
- https://docs.microsoft.com/en-us/sysinternals/ | Canivete suiço de ferramentas de análise de ambiente
- https://github.com/globocom/huskyCI | Ferramenta feito pela Globo. Orquestrador de análise de código de repositório para rodar junto com um CI
- https://github.com/Genymobile/scrcpy | Solução para transmitir a tela do celular para o computador
- https://www.postman.com/ | Monta requisições Http sob demanda
- https://dbeaver.io/ | Conector com banco de dados universal
- https://github.com/Abdulrahman-Kamel/tokenScanner | Token Scanner - Passa um token para o scanner e ele identifica que tipo de token é de forma simples, informa do que se possivelmente trata o token e já passa uma url de como fazer o exploit e testar
Pentest & Recon
- https://www.kali.org/tools/sublist3r/ / https://github.com/aboul3la/Sublist3r | Procura por subdomínios. Exemplo
sublist3r -d kali.org
- https://github.com/six2dez/reconftw | Poderosa ferramenta de recon, utiliza 35 diretas + 24 outras ferramentas por baixo, entre elas o nuclei. Não obtive muitos resultados consistentes nos testes mas não descartar em um serviço de recon, porém não se basear só nele - executar diretamente os serviços que ele diz usar, no repo tem todas as referências
- https://github.com/Abdulrahman-Kamel/extract-comments | Extrai comentários das páginas - Bom se achar um crowler para pegar todas as urls de um domínio para depois passar como parâmetro
- https://github.com/hktalent/scan4all | Projeto com vulnerabilidades para testar ferramentas de scan
- https://github.com/Abdulrahman-Kamel/xssHeaders | Testa Blind XSS Headers - Tem que fazer um conta no site https://xsshunter.com/ para ter o profile no XssHunter.
- https://github.com/KingOfBugbounty/SecretFinder | Procura por possíveis chaves em arquivos HTML ou Js
- https://github.com/assetnote/kiterunner | Endpoint spider
- https://github.com/projectdiscovery/nuclei | Multitool para fazer o scanner de exploits
- https://github.com/skavngr/rapidscan | Multitool web vulnerability scanner
- https://github.com/t3l3machus/psudohash | Gerador de lista de senhas para orquestrar ataques de força bruta, baseado em uma string inicial
- https://github.com/EnableSecurity/wafw00f | Identificação de WAFs: wafw00f (W00f)
1
2- Exemplo comando kali >
wafw00f -a 'https://enderecosistemas.com.br'
Fuzz
Wfuzz
1
2
3- Enumera subdiretórios baseado em wordlist
- Exemplo => wfuzz -c -z file,/usr/share/wfuzz/wordlist/general/common.txt --hc 404 http://192.168.56.102/dvwa/FUZZ
- Tem que ter o "FUZZ" no final, não é só exemploffuf
1
- Comando exemplo => ffuf -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-big.txt -u http://198.211.107.250:1337/FUZZ --fs 169
Feroxbuster
1
2
3
4
5- Enumeração recursiva similar ao gobuster
- Repo: https://github.com/epi052/feroxbuster
- Comandos
`sudo apt install -y feroxbuster`
`feroxbuster -u https://some-example-site.com`
Browser plugins/extensions
- DotGit
- Link Gopher
- Http Header Live
- JS Beautifier
- KeyFinder
- Web scan
- Wappalyzer
- SingleFile | Salvar um site inteiro incluindo imagens, estilos, frames, fontes, etc. num único arquivo HTML.
Pentest (DAST)
- https://www.zaproxy.org/ (scripts link)
- https://subgraph.com/vega/
- https://github.com/1N3/Sn1per/
- https://owasp.org/www-community/Vulnerability_Scanning_Tools | Lista de várias ferramentas pagas e free
Analisadores de tráfego
- https://portswigger.net/burp/
- https://www.charlesproxy.com/
- https://www.telerik.com/fiddler
- https://www.wireshark.org/
Mobile
- https://github.com/Genymobile/scrcpy | Solução para transmitir a tela do celular para o computador
- Santoku | Distro focada em forense para mobile - https://santoku-linux.com/about-santoku/
- https://www.youtube.com/watch?v=hFSuMySq2dA&ab_channel=HackingnaWeb | Como interceptar tráfego de app android, fazendo repack tranpondo seguraça compilação com certificado.
Listas
- https://github.com/nixawk/pentest-wiki | Indexador e guia para recon e pentests
- https://github.com/enaqx/awesome-pentest | Github para pentesters
- https://www.kali.org/tools/seclists | SecLists
1
2sudo apt install seclists
ls -lh /usr/share/seclists/ - https://github.com/danielmiessler/SecLists | Payloads
- https://github.com/swisskyrepo/PayloadsAllTheThings | Payload para quase tudo
- https://github.com/sindresorhus/awesome#security | Indexador de materiais para pentest, recon, etc
- https://github.com/carpedm20/awesome-hacking#readme | Indexador de materiais para pentest, recon, etc
- https://github.com/qazbnm456/awesome-web-security#readme | Indexador de materiais para pentest, recon, etc
- https://github.com/sbilly/awesome-security#web | Indexador de materiais para pentest, recon, etc
- https://www.routerpasswords.com/ | Lista de senhas padrões de dispositivos
- https://minutodaseguranca.blog.br/lista-completa-de-ferramentas-de-teste-de-penetracao-e-hacking/
Sobre API keys
- https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/API%20Key%20Leaks
- https://community.turgensec.com/finding-hidden-api-keys-how-to-use-them/
Sobre AWS
- Buckets: https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/AWS%20Amazon%20Bucket%20S3
- Security Check: https://awscheck.fyi/
Criptografia, Hash databases e crackers
- https://hashdecryption.com/
- https://emn178.github.io/online-tools/
- https://hashtoolkit.com/
- https://www.perturb.org/content/hashes/
- https://md5hashing.net/
- https://sha1.gromweb.com/
- https://www.boxentriq.com/code-breaking/cipher-identifier/ | Analisador de possível tipo de cifra utilizado
- https://www.openwall.com/john/ | John the Ripper password cracker
- https://crackstation.net/crackstation-wordlist-password-cracking-dictionary.htm | Base para download
Wordlists
Aplicação para validação de web scanners
Databases para verificação de vulnerabilidade de bibliotecas
- https://snyk.io/vuln
- https://ossindex.sonatype.org/
- https://cve.mitre.org/cve/search_cve_list.html
- https://www.nuget.org/packages/Audit.NET/ | Extensão para Visual Studio
- https://cve.circl.lu/ | CVE Search database
Verificação de DNS
E-mail Analysis
Malware Analysis
- https://app.any.run | Interactive Malware Analysis
- https://tria.ge/ | Malware analysis sandbox
- https://remnux.org/ | REMnux VM Malware Analysis Tools
- https://id-ransomware.malwarehunterteam.com/ | Identificar ransomware
Mapas mentais, diagramas e prototipação
Compartilhamento de arquivos e textos
Emissão de certificado Https baixo ou nenhum custo
CORS ByPass
- https://cors-anywhere.herokuapp.com/
- https://portswigger.net/research/exploiting-cors-misconfigurations-for-bitcoins-and-bounties
Reverse Tabnabbing
- https://owasp.org/www-community/attacks/Reverse_Tabnabbing
- https://github.com/OWASP/www-community/blob/master/pages/attacks/Reverse_Tabnabbing.md
Third party libraries
- https://deps.dev/ | Mais simples de ver quais vulnerabildiade uma determinada versão de uma biblioteca tem diretamente, por exemplo https://deps.dev/npm/jquery/2.2.1
- https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity
- https://www.srihash.org/
CSP
- https://csper.io/evaluator | Avaliador para CSP
- https://csper.io/generator/ | Gerador de CSP
- https://developer.mozilla.org/pt-BR/docs/Web/HTTP/CSP
Lax vs Strict
https://blog.benpri.me/blog/2019/05/13/samesite-cookies-in-practice/
CTF - Security Games & Learning
- https://tryhackme.com/room/ohsint
- https://xss-game.appspot.com | XSS Game
- https://overthewire.org/wargames/natas/natas0.html | Natas: Web Hacking
- https://overthewire.org/wargames/bandit/bandit0.html | Bandit: Linux SSH Enviroment Hacking
I Know What You Download
https://iknowwhatyoudownload.com/en/peer/
Regras de boas práticas para desenvolvimento do Sonar
https://rules.sonarsource.com/csharp
CheatSheets e prevenções
Geral | - | OWASP cheatsheetseries link |
XSS | - | Portswigger XSS cheatsheet link |
XSS | - | OWASP XSS cheatsheet link |
DOM XSS | - | OWASP DOM XSS cheatsheet link |
XSS | - | PayloadsAllTheThings payloads link |
Markdown XSS | - | https://github.com/cujanovic/Markdown-XSS-Payloads/blob/master/Markdown-XSS-Payloads.txt |
SQLi | - | Portswigger SQLi cheatsheet link |
SQLi | - | Netsparker SQLi cheatsheet link |
Privilege Escalation | - | https://github.com/Ignitetechnologies/Privilege-Escalation/ |
Burp | - | https://github.com/Ignitetechnologies/BurpSuite-For-Pentester |
Malware | - | https://github.com/malwares |
Sniping Insecure Cookies with XSS
Angular template injection
- https://portswigger.net/research/xss-without-html-client-side-template-injection-with-angularjs
- Procurar por ‘ng-app’.
- https://www.youtube.com/watch?v=19gqZU953pY
Web Cache Deception
- http://omergil.blogspot.com/2017/02/web-cache-deception-attack.html
- Examples for some of the past vulnerable pages:
1
2
3- https://www.paypal.com/myaccount/home/attack.css
- https://www.paypal.com/myaccount/settings/notifications/attack.css
- https://history.paypal.com/cgi-bin/webscr/attack.css?cmd=_history-details
Services
- https://www.kvstore.io/ | a simple key/value API based storage service
- https://nordvpn.com/ | VPN para comunicação segura - Pago
.Net
- https://github.com/pwntester/ysoserial.net | Exploit unsafe .NET object deserialization
Calcular nível de vulnerabilidades
- https://www.owasp-risk-rating.com/
- https://www.first.org/cvss/calculator/3.0
- https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
Coleção de relatórios de pentestes
- https://github.com/juliocesarfort/public-pentesting-reports
- https://github.com/hmaverickadams/TCM-Security-Sample-Pentest-Report/tree/master
Eventos
Eventos/Conferências Brasileiras de SI
- https://www.h2hc.com.br/
- https://bhack.com.br
- https://www.ysts.org/
- https://www.roadsec.com.br/
- https://www.mindthesec.com.br/
- https://www.cybersecuritysummit.com.br/
- https://nullbyte-con.org/
- https://speakfy.io/ | Site que concentra eventos de SI:
Security Awareness
Personal Security Checklist
Cofre de senhas
Phishing
- https://phishingquiz.withgoogle.com/ | Quiz do Google
- https://github.com/mrd0x/BITB | Browser inside a Browser - https://mrd0x.com/browser-in-the-browser-phishing-attack/
- https://getgophish.com/ | Gerenciamento de campanhas de phishing
- https://github.com/thewhiteh4t/seeker | Criação de phishing que colate localização de GPS precisas
IA geradore de perfis que não existem
Critérios de segurança no código
Guides
Red e Blue Team Tools List
https://github.com/A-poc/RedTeam-Tools
https://github.com/A-poc/BlueTeam-Tools
HackTricks
https://book.hacktricks.xyz
The National Cyber Security Centre
https://www.ncsc.gov.uk/
CTO Security Checklist/Guide
https://www.goldfiglabs.com/guide/saas-cto-security-checklist/
OWASP Top 10 controle proativos
https://owasp.org/www-project-proactive-controls/
IoT Security
https://www.bekk.christmas/post/2021/14/segment-your-home-network-today
Bugbounty Tips
https://github.com/KingOfBugbounty/KingOfBugBountyTips
Verificação de assinaturas de arquivos
https://www.garykessler.net/library/file_sigs.html
Analisando mensagens HTTP com Burp Suite e FoxyProxy
https://luan-cf-bnu.medium.com/analisando-mensagens-http-com-burp-suite-e-foxyproxy-9fb0a32d6fa4
4 coisas que todo relatório deve ter
https://rhinosecuritylabs.com/penetration-testing/four-things-every-penetration-test-report/
Focar nos itens importantes do guide, como e o que utilizar
https://www.apriorit.com/dev-blog/622-qa-web-application-pen-testing-owasp-checklist
Security Design Guidelines for Web Services
https://msdn.microsoft.com/en-us/library/ff649737.aspx
Sobre HSTS
https://www.troyhunt.com/understanding-http-strict-transport
12 Discas contra DDoS
https://blog.4linux.com.br/12-metodos-para-prevenir-ddos/
Como implementar corretamente o Salt
https://crackstation.net/hashing-security.htm
Dicas para quem programa em .Net
https://cheatsheetseries.owasp.org/cheatsheets/DotNet_Security_Cheat_Sheet.html (Tópico ‘ASP NET Web Forms Guidance’, sobre CSRF e ViewState)
Comunicação segura: Jitsi, Signal ou Wire
https://thehackernews.com/2020/04/zoom-cybersecurity-hacking.html
For everything else that requires sharing sensitive information, there are more secure options like self-hosted Jitsi, Signal and Wire.
WCF: Dicas de client
https://www.oreilly.com/library/view/programming-wcf-services/9781449382476/ch01s13.html
Fundamentos do GC
https://docs.microsoft.com/en-us/dotnet/standard/garbage-collection/fundamentals?redirectedfrom=MSDN#background_server_garbage_collection
CVE-2021-44228 - Log4j
1 | https://youtu.be/7qoPDq41xhQ |
Livros
The Code Book: The Secrets Behind Codebreaking
The Art of Deception (Kevin Mitnick)
Cursos, certificados e conteúdos gratuítos
- Cursos Grátis: https://codered.eccouncil.org/ (Ethical Hacking Essentials [EHE])
- Threat Hunting: https://elearning.securityblue.team/home/courses/free-courses/introduction-to-threat-hunting
- Darkweb Operations: https://elearning.securityblue.team/home/courses/free-courses/introduction-to-dark-web-operations
- Digital Forensics: https://elearning.securityblue.team/home/courses/free-courses/introduction-to-digital-forensics
- OSINT: https://elearning.securityblue.team/home/courses/free-courses/introduction-to-osint
- Network Analysis: https://elearning.securityblue.team/home/courses/free-courses/introduction-to-network-analysis
- Cyber Threat Intelligence 101: https://arcx.io/courses/cyber-threat-intelligence-101
1 | Great Free Cyber Security Courses |
𝗙𝗿𝗲𝗲 𝗩𝗶𝗱𝗲𝗼𝘀: ISO 27001, SOC 2, and PCI DSS Full Framework Reviews
1 | 𝟭. 𝗜𝗦𝗢 𝟮𝟳𝟬𝟬𝟭 𝗙𝘂𝗹𝗹 𝗙𝗿𝗮𝗺𝗲𝘄𝗼𝗿𝗸 𝗥𝗲𝘃𝗶𝗲𝘄 (https://youtu.be/Ou8cFdjMYWw?si=TeTT47YGVYCzCb3n) |