1
1
<!-- Author : Rahul Indra -->
2
2
<!DOCTYPE html>
3
3
< html >
4
+
4
5
< head >
5
6
<!-- glitch CSS -->
6
- < link href ="assets/css/core/glitch.css " rel ="stylesheet ">
7
- < link href ="https://fonts.googleapis.com/css?family=Niramit " rel ="stylesheet ">
7
+ < link href ="assets/css/core/glitch.css " rel ="stylesheet ">
8
+ < link href ="https://fonts.googleapis.com/css?family=Niramit " rel ="stylesheet ">
8
9
< title > d4rks0c1ety</ title >
9
10
< link rel ="stylesheet " type ="text/css " href ="assets/css/core/dark.css ">
10
11
</ head >
12
+
11
13
< body >
12
- < script src ="assets/js/animate.js "> </ script >
13
- < header >
14
- < div class ="glitch ">
15
- < h1 > d4rks0c1ety</ h1 >
16
- < h1 > d4rks0c1ety</ h1 >
17
- < h1 > d4rks0c1ety</ h1 >
18
- </ div >
19
- < br > < br > < br >
20
- < p > CTF Team of IIEST Shibpur</ p >
21
- </ header >
22
-
23
- < h2 > Binary Exploitation</ h2 >
24
- < ul >
25
- < li > < a target ="_blank " href ="https://www.youtube.com/watch?v=iyAyN3GFM7A&list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN "> LiveOverflow Binary Hacking</ a > </ li >
26
- < li > < a target ="_blank " href ="https://github.com/hsfareed/Resources-for-learning-ethical-hacking "> Resources for Ethical Hacking</ a > </ li >
27
- < li > < a target ="_blank " href ="http://security.cs.rpi.edu/courses/binexp-spring2015/ "> Modern Binary Exploitation</ a > </ li >
28
- < li > < a target ="_blank " href ="https://www.youtube.com/playlist?list=PL038BE01D3BAEFDB0 "> Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration</ a > </ li >
29
- < li > < a target ="_blank " href ="https://www.youtube.com/playlist?list=PL8F8D45D6C1FFD177 "> Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration</ a > </ li >
30
- < li > < a target ="_blank " href ="http://www.opensecuritytraining.info/Training.html "> Advance Intel x86: Architecture, Assembly, Applications, & Alliteration</ a > </ li >
31
- < li > < a target ="_blank " href ="https://www.youtube.com/playlist?list=PLUFkSN0XLZ-nXcDG89jS9iqKBnNHmz7Qw "> Introduction to Reverse Engineering Software</ a > </ li >
32
-
33
-
34
- </ ul >
35
-
36
- < h2 > Web Hacking</ h2 >
37
- < ul >
38
- < li > < a target ="_blank " href ="https://www.hacker101.com/ " rel ="nofollow "> Hacker101-Web Hacking</ a > </ li >
39
- < li > < a target ="_blank " href ="https://leaksource.files.wordpress.com/2014/08/the-web-application-hackers-handbook.pdf " rel ="nofollow "> The Web Application Hacker's Handbook</ a > </ li >
40
- < li > < a target ="_blank " href ="https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents " rel ="nofollow "> OWASP Guide</ a > </ li >
41
- </ ul >
42
-
43
- < h2 > War Games</ h2 >
44
- < ul >
45
- < li > < a target ="_blank " href ="https://io.netgarage.org/ " rel ="nofollow "> IO Wargame</ a > </ li >
46
- < li > < a target ="_blank " href ="http://pwnable.kr/ " rel ="nofollow "> Pwnable KR</ a > </ li >
47
- < li > < a target ="_blank " href ="https://pwnable.tw/ " rel ="nofollow "> Pwnable TW</ a > </ li >
48
- < li > < a target ="_blank " href ="http://overthewire.org/wargames/ " rel ="nofollow "> OverTheWire</ a > </ li >
49
- < li > < a target ="_blank " href ="http://reversing.kr/ " rel ="nofollow "> Reversing KR</ a > </ li >
50
- < li > < a target ="_blank " href ="http://w3challs.com/ " rel ="nofollow "> W3Challs</ a > </ li >
51
- < li > < a target ="_blank " href ="https://www.hackthebox.eu/ " rel ="nofollow "> Hack the Box</ a > </ li >
52
- < li > < a target ="_blank " href ="http://webhacking.kr/ " rel ="nofollow "> WebHacking KR</ a > </ li >
53
- </ ul >
54
-
14
+ < script src ="assets/js/animate.js "> </ script >
15
+ < header >
16
+ < div class ="glitch ">
17
+ < h1 > d4rks0c1ety</ h1 >
18
+ < h1 > d4rks0c1ety</ h1 >
19
+ < h1 > d4rks0c1ety</ h1 >
20
+ </ div >
21
+ < br > < br > < br >
22
+ < p > CTF Team of IIEST Shibpur</ p >
23
+ </ header >
24
+
25
+ < h2 > Binary Exploitation</ h2 >
26
+ < ul >
27
+ < li > < a target ="_blank "
28
+ href ="https://www.youtube.com/watch?v=iyAyN3GFM7A&list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN "> LiveOverflow Binary
29
+ Hacking</ a > </ li >
30
+ < li > < a target ="_blank " href ="https://github.com/hsfareed/Resources-for-learning-ethical-hacking "> Resources for
31
+ Ethical Hacking</ a > </ li >
32
+ < li > < a target ="_blank " href ="http://security.cs.rpi.edu/courses/binexp-spring2015/ "> Modern Binary Exploitation</ a >
33
+ </ li >
34
+ < li > < a target ="_blank " href ="https://www.youtube.com/playlist?list=PL038BE01D3BAEFDB0 "> Introductory Intel x86:
35
+ Architecture, Assembly, Applications, & Alliteration</ a > </ li >
36
+ < li > < a target ="_blank " href ="https://www.youtube.com/playlist?list=PL8F8D45D6C1FFD177 "> Intermediate Intel x86:
37
+ Architecture, Assembly, Applications, & Alliteration</ a > </ li >
38
+ < li > < a target ="_blank " href ="http://www.opensecuritytraining.info/Training.html "> Advance Intel x86: Architecture,
39
+ Assembly, Applications, & Alliteration</ a > </ li >
40
+ < li > < a target ="_blank " href ="https://www.youtube.com/playlist?list=PLUFkSN0XLZ-nXcDG89jS9iqKBnNHmz7Qw "> Introduction
41
+ to Reverse Engineering Software</ a > </ li >
42
+
43
+
44
+ </ ul >
45
+
46
+ < h2 > Web Hacking</ h2 >
47
+ < ul >
48
+ < li > < a target ="_blank " href ="https://www.hacker101.com/ " rel ="nofollow "> Hacker101-Web Hacking</ a > </ li >
49
+ < li > < a target ="_blank "
50
+ href ="https://leaksource.files.wordpress.com/2014/08/the-web-application-hackers-handbook.pdf "
51
+ rel ="nofollow "> The Web Application Hacker's Handbook</ a > </ li >
52
+ < li > < a target ="_blank " href ="https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents "
53
+ rel ="nofollow "> OWASP Guide</ a > </ li >
54
+ </ ul >
55
+
56
+ < h2 > War Games</ h2 >
57
+ < ul >
58
+ < li > < a target ="_blank " href ="https://io.netgarage.org/ " rel ="nofollow "> IO Wargame</ a > </ li >
59
+ < li > < a target ="_blank " href ="http://pwnable.kr/ " rel ="nofollow "> Pwnable KR</ a > </ li >
60
+ < li > < a target ="_blank " href ="https://pwnable.tw/ " rel ="nofollow "> Pwnable TW</ a > </ li >
61
+ < li > < a target ="_blank " href ="http://overthewire.org/wargames/ " rel ="nofollow "> OverTheWire</ a > </ li >
62
+ < li > < a target ="_blank " href ="http://reversing.kr/ " rel ="nofollow "> Reversing KR</ a > </ li >
63
+ < li > < a target ="_blank " href ="http://w3challs.com/ " rel ="nofollow "> W3Challs</ a > </ li >
64
+ < li > < a target ="_blank " href ="https://www.hackthebox.eu/ " rel ="nofollow "> Hack the Box</ a > </ li >
65
+ < li > < a target ="_blank " href ="http://webhacking.kr/ " rel ="nofollow "> WebHacking KR</ a > </ li >
66
+ </ ul >
67
+
55
68
<!-- flag : accessdenied{1_kn0w_abt_d4rks0c1ety_n0w} -->
56
69
57
70
</ body >
58
- </ html >
71
+
72
+ </ html >
0 commit comments