Veerendra's Blog
  • Archive
  • Nuggets
  • Search
Home

My Bookmarks

6 min · Veerendra K | Suggest Changes
Table of Contents
  • Network
    • Blogs
      • Bluetooth
    • Github Projects
        • Wireless
        • DNS
        • Scan
  • Linux
    • Blogs
        • Boot
        • OS Development
        • Commands
        • Files
    • Github Projects
    • CheatSheets
  • Python
    • Blog
    • Github Projects
  • Security/Privacy
    • Blogs
          • Privacy
          • Reverse Engineering
    • Github Projects
  • Network#

    • Blogs#

      • Capturing Wireless LAN Packets on Ubuntu with tcpdump and Kismet
      • Linux Bridging
      • Phishing With a Rogue Wi-Fi Access Point
      • Fast DDoS analyzer with sflow/netflow/mirror support
      • China’s Man-on-the-Side Attack on GitHub
      • SSH testing tool checks the configuration of given server accessible over internet
      • Infinite possibilities with the Scapy Module
      • An Illustrated Guide to the Kaminsky DNS Vulnerability
      • A penetration tester’s guide to sub-domain enumeration
      • A source for pcap files and malware samples
      • Explanation of how https works
      • Daniels Networking Blog
      • Python for Network Engineers
      • Fuzzing proprietary protocols with Scapy, radamsa and a handful of PCAPs
      • How to Decrypt 802.11
      • Tutorials for Network Simulator “ns”
      • The First Few Milliseconds of an HTTPS Connection
      • HTTPS explained with carrier pigeons
      • How To Run Your Own Mail Server
      • Bettercap - MITM attack tool
      • Tcpdump Examples
      • Bluetooth#

        • BLEAH-A BLE scanner for “smart” devices hacking
        • Proxying Bluetooth devices for security analysis using btproxy
        • Nike+ FuelBand SE BLE Protocol Reversed
        • Ubertooth - Can sniff some data from Basic Rate (BR) Bluetooth Classic connections.
        • A Bluetooth LE interface for Python
    • Github Projects#

      • Wireless#
        • MITM WPA attacks
        • Framework for Rogue Wi-Fi Access Point Attack
        • FruityWiFi is a wireless network auditing tool.
        • Tool for sniffing unencrypted wireless probe requests from devices
        • [Rogue Access Point framework for Wi-Fi automatic association attacks and victim-customized phishing](Rogue Access Point framework for Wi-Fi automatic association attacks and victim-customized phishing)
        • This script creates a NATed or Bridged WiFi Access Point
        • Kick devices off your network by performing an ARP Spoof attack
        • A framework for wireless pentesting.
        • Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat
        • Bluetooth Proxy tool
      • DNS#
        • DNS over HTTPS
        • Analyze the security of any domain by finding all the information possible. Made in python
        • Domain name permutation engine for detecting typo squatting, phishing and corporate espionage
        • Selective DNS proxy forwarding based on DNS threat blocking providers intelligence
        • DNS Enumeration Script
        • Fast subdomains enumeration tool for penetration testers
        • Open redirect subdomains scanner
        • Analyze the security of any domain by finding all the information possible. Made in python
        • A set of tools for performing reconnaissance on domain names
      • Scan#
        • Scrapy, a fast high-level web crawling & scraping framework for Python
        • TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
        • Nikto web server scanner
        • Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq
        • A small TOR Onion Address harvester for checking if the address is available or not.
        • Tool for capturing and replaying live HTTP traffic into a test environment
        • netdiscover
        • Layer 2 network neighbourhood discovery tool that uses scapy
      • SSL/TLS layers for scapy the interactive packet manipulation tool
      • The python-based interactive packet manipulation program & library
      • Python wrapper for tshark, allowing python packet parsing using wireshark dissectors
      • Stores your data in ICMP ping packets
      • TCP/IP packet demultiplexer
      • Python binding of libnetfilter_conntrack
      • Nipe is a script to make Tor Network your default gateway
      • A reverse TCP tunnel let you access target behind NAT or firewall
      • A Tunnel which Turns UDP Traffic into Encrypted UDP/FakeTCP/ICMP Traffic by using Raw Socket
      • Search MAC Address
  • Linux#

    • Blogs#

      • Boot#
        • Run Levels & How to make init scripts
        • Realmode Assembly – Writing bootable stuff
        • Making scripts run at boot time with Debian
        • Writing a Bootloader
        • init script template
        • systemd, Beyond init-Youtube Talk
        • Analyzing the Linux boot process
        • [Write Simple OS from scratch [PDF]]({{ site.url }}/assets/os-dev.pdf)
      • OS Development#
        • The little book about OS development
        • How to Make a Computer Operating System
        • Let’s Write a Kernel
        • Information about the creation of operating systems
        • Writing OS in Rust
      • Commands#
        • htop explained visually with screenshot
        • Explain Shell
        • Learn VIM
        • 30 interesting commands for the Linux shell
        • An Introduction to Linux Permissions
        • 3 Ways to Permanently and Securely Delete
        • Two great uses for the cp command: Bash shortcuts
      • Files#
        • Understanding and generating the hash stored in /etc/shadow
        • What is setiud, setgid and sticky bit in Linux?
        • /proc/sys/net/ipv4
        • /proc/net/tcp and /proc/net/tcp6
        • /dev/null
        • /dev/full
        • /dev/random
        • /dev/urandom
        • /dev/zero
      • Warden.NET is an easy to use process management library for keeping track of processes on Windows.
      • [Android Internals[PDF]]({{ “/assets/android_internals.pdf " | absolute_url }})
      • A list of reading materials for BPF
      • How Linux CPU Usage Time and Percentage is calculated
      • Removing Your PDF Metadata & Protecting PDF Files
      • Linux Process Hunter
      • Linux Memory Managment Frequently Asked Questions
      • Attack Infrastructure Logging
      • Virtualization Internals
    • Github Projects#

      • A toolkit for creating efficient kernel tracing and manipulation programs
      • Tool for in-depth analysis of USB HID devices communication
      • From finding text to search and replace, from sorting to beautifying text and more
      • Programmable completion functions for bash
    • CheatSheets#

      • Bash
  • Python#

    • Blog#

      • How to recover lost Python source code if it’s still resident in-memory
      • Cpython Internals: Codewalk through the Python interpreter source codes [Youtube Playlist]
      • Problem Solving with Algorithms and Data Structures using Python
      • Natural Language Processing with Python
      • Python Anti-Patterns
      • Python Plays: Grand Theft Auto V
      • https://pythonprogramming.net/
      • Pythonic Data Structures and Algorithms
      • An automation tool that models a user’s actions on a terminal.
      • Regx in easy way
      • You Should Learn Regx
      • Let’s Build A Simple Interpreter
      • Python Excel Tutorial: The Definitive Guide
      • C++ Data Structures
      • [Scapy Docs [PDF]]({{ “/assets/scapydoc.pdf” | absolute_url }})
      • python-course.eu
    • Github Projects#

      • Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)
      • A public list of APIs from round the web.
      • A Python toolbox for building complex digital hardware
      • A collection of (mostly) technical things every software developer should know
      • What happens when…
      • Command and Rule over your Shell
      • Shutit-Automation framework for programmers
      • A general-purpose fuzzer
      • Minimal examples of data structures and algorithms in Python
      • Python By Examples
  • Security/Privacy#

    • Blogs#

      • Privacy#
        • What Is Intelligent Tracking Prevention and How Does It Work?
        • The Truth About Online Privacy: How Your Data is Collected, Shared, and Sold
        • What is Cookie Syncing and How Does it Work?
        • Webpage tracking only using CSS (and no JS)
      • How to Monitor Mobile App Traffic With Sniffers
      • Python for PenTesters
      • Intro to basic Disassembly & Reverse Engineering
      • Python for Pentesters-pentesteracademy
      • Start Your Own ISP
      • Details of the implementation of Spectre,
      • Attacking secure USB keys, behind the scene
      • How to Install Tripwire IDS (Intrusion Detection System) on Linux
      • Hacker101!
      • Four Ways to Bypass Android SSL Verification and Certificate Pinning
      • Tracing API calls in Burp with Frida
      • Open Source CyberSecurity - n0where.net
      • [Command Injection [PDF]]({{ “/assets/Command_Injection_Shell_Injection.pdf” | absolute_url }})
      • [Recon-ng Guid [PDF]]({{ “/assets/recon-ng-guide.pdf” | absolute_url }})
      • Android Applications Reversing 101
      • moveax.me
      • The New zANTI: Mobile Penetration & Security Analysis Toolkit
      • Reverse Engineering#
        • Reverse Engineering Basics
        • A Primer Guide to Reverse Engineering
        • Binary patching and intro to assembly with r2
    • Github Projects#

      • WhatsApp Discover
      • Mobile App Pentest cheat sheet
    © 2024 Veerendra's Blog Powered by Hugo & PaperMod