seeu-inspace/easyg
GitHub: seeu-inspace/easyg
一款集成自动化侦察脚本与全面渗透测试笔记的个人知识库,涵盖从信息收集到 AI/Web3 安全的前沿攻防技术。
Stars: 270 | Forks: 47
```
███████╗ █████╗ ███████╗██╗ ██╗ ██████╗
██╔════╝██╔══██╗██╔════╝╚██╗ ██╔╝██╔════╝
█████╗ ███████║███████╗ ╚████╔╝ ██║ ███╗
██╔══╝ ██╔══██║╚════██║ ╚██╔╝ ██║ ██║
███████╗██║ ██║███████║ ██║ ╚██████╔╝
╚══════╝╚═╝ ╚═╝╚══════╝ ╚═╝ ╚═════╝
Made with <3 by Riccardo Malatesta (@seeu)
```
[](LICENSE)
[](https://github.com/ellerbrock/open-source-badges/)
EasyG 最初是我编写的一个脚本,用于在我的黑客攻击过程中自动化执行一些信息收集任务,[点击这里了解它的功能](tools/#easyg)。现在它的意义远不止于此。在这里,我收集了我发现的所有有趣的黑客资源:笔记、Payload、工具等等。
我尽可能链接到这些笔记的各种来源或灵感出处。这些笔记大部分来自:[PTS v4](https://blog.elearnsecurity.com/introducing-the-ptsv4-training-course.html)、[PortSwigger Web Security Academy](https://portswigger.net/web-security)、[PEN-200](https://www.offsec.com/courses/pen-200/)、[Proving Grounds](https://www.offsec.com/labs/individual/)、[Altered Security 的《攻击和防御 Active Directory 实验室 (CRTP)》](https://www.alteredsecurity.com/adlab)、[Patrick Collins](https://twitter.com/PatrickAlphaC) 和 [Updraft](https://updraft.cyfrin.io/)、[TryHackMe](https://tryhackme.com/)、[Learn Prompting](https://learnprompting.org/)、[Hack The Box](https://hackthebox.com/)、[PentesterLab](https://pentesterlab.com/)、[HackTricks](https://book.hacktricks.xyz/)、[Jhaddix](https://twitter.com/Jhaddix)、[The Cyber Mentor](https://www.thecybermentor.com/)、[Mantas Sabeckis](https://ott3rly.com/)、[NahamSec](https://www.youtube.com/@NahamSec)(以及 [NahamCon](https://www.nahamcon.com/))、InfoSec Twitter 以及许多其他了不起的人。
## 目录
- [资源](resources/#resources)
- [实用技巧](useful-tips/#useful-tips)
- [清单](check-lists/#check-lists)
- [Linux](linux/#linux)
- [工具](tools/#tools)
- [EasyG](tools/#easyg)
- [被动信息收集 (OSINT)](passive-information-gathering-osint/#passive-information-gathering-osint)
- [主动信息收集](active-information-gathering/#active-information-gathering)
- [内容发现](content-discovery/#content-discovery)
- [网络](networking/#networking)
- [源代码审查](source-code-review/#source-code-review)
- [漏洞扫描](vulnerability-scanning/#vulnerability-scanning)
- [Web 漏洞](web-vulnerabilities/#web-vulnerabilities)
- [客户端攻击](client-side-attacks/#client-side-attacks)
- [服务端攻击](server-side-attacks/#server-side-attacks)
- [厚客户端漏洞](thick-client-vulnerabilities/#thick-client-vulnerabilities)
- [系统攻击](system-attacks/#system-attacks)
- [端口转发和隧道](system-attacks/#port-redirection-and-tunneling)
- [Linux 权限提升](system-attacks/#linux-privilege-escalation)
- [Windows 权限提升](system-attacks/#windows-privilege-escalation)
- [Active Directory](active-directory/#active-directory)
- [移动端](mobile/#mobile)
- [云黑客攻击](cloud-hacking/#cloud-hacking)
- [AI / LLM 漏洞](ai-llm-vulnerabilities/#ai--llm-vulnerabilities)
- [Web3](web3/#web3)
标签:Cutter, ESC4, GitHub, Hacking, OSINT, Payload, Penetration Testing, Windows内核, 实时处理, 密码管理, 攻击向导, 漏洞分析, 白帽子, 笔记, 网络安全, 路径探测, 防御加固, 隐私保护, 黑客资源