Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit2f17122

Browse files
authored
Merge pull request#11 from sadn1ck/master
2020: Emergency Update
2 parentsfd50da2 +23b0f94 commit2f17122

16 files changed

+858
-669
lines changed

‎assets/img/portfolio/as_sir.jpg

-48 KB
Binary file not shown.

‎assets/img/portfolio/sk_sir.jpg

61.7 KB
Loading

‎assets/img/portfolio/thumbs/suri.png

320 KB
Loading

‎assets/img/team/MD.png

515 KB
Loading

‎assets/img/team/anik.png

216 KB
Loading

‎assets/img/team/arnab.png

612 KB
Loading

‎assets/img/team/arsh.png

148 KB
Loading

‎assets/img/team/dwai.png

307 KB
Loading

‎assets/img/team/nindo.png

879 KB
Loading

‎assets/img/team/shivam.png

146 KB
Loading

‎assets/img/team/srikant.png

320 KB
Loading

‎assets/img/team/suri.png

280 KB
Loading

‎assets/img/team/vivek.png

324 KB
Loading

‎d4rks0c1ety.html

Lines changed: 60 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -1,58 +1,72 @@
11
<!-- Author : Rahul Indra -->
22
<!DOCTYPE html>
33
<html>
4+
45
<head>
56
<!-- glitch CSS -->
6-
<linkhref="assets/css/core/glitch.css"rel="stylesheet">
7-
<linkhref="https://fonts.googleapis.com/css?family=Niramit"rel="stylesheet">
7+
<linkhref="assets/css/core/glitch.css"rel="stylesheet">
8+
<linkhref="https://fonts.googleapis.com/css?family=Niramit"rel="stylesheet">
89
<title>d4rks0c1ety</title>
910
<linkrel="stylesheet"type="text/css"href="assets/css/core/dark.css">
1011
</head>
12+
1113
<body>
12-
<scriptsrc="assets/js/animate.js"></script>
13-
<header>
14-
<divclass="glitch">
15-
<h1>d4rks0c1ety</h1>
16-
<h1>d4rks0c1ety</h1>
17-
<h1>d4rks0c1ety</h1>
18-
</div>
19-
<br><br><br>
20-
<p>CTF Team of IIEST Shibpur</p>
21-
</header>
22-
23-
<h2>Binary Exploitation</h2>
24-
<ul>
25-
<li><atarget="_blank"href="https://www.youtube.com/watch?v=iyAyN3GFM7A&list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN">LiveOverflow Binary Hacking</a></li>
26-
<li><atarget="_blank"href="https://github.com/hsfareed/Resources-for-learning-ethical-hacking">Resources for Ethical Hacking</a></li>
27-
<li><atarget="_blank"href="http://security.cs.rpi.edu/courses/binexp-spring2015/">Modern Binary Exploitation</a></li>
28-
<li><atarget="_blank"href="https://www.youtube.com/playlist?list=PL038BE01D3BAEFDB0">Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration</a></li>
29-
<li><atarget="_blank"href="https://www.youtube.com/playlist?list=PL8F8D45D6C1FFD177">Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration</a></li>
30-
<li><atarget="_blank"href="http://www.opensecuritytraining.info/Training.html">Advance Intel x86: Architecture, Assembly, Applications, & Alliteration</a></li>
31-
<li><atarget="_blank"href="https://www.youtube.com/playlist?list=PLUFkSN0XLZ-nXcDG89jS9iqKBnNHmz7Qw">Introduction to Reverse Engineering Software</a></li>
32-
33-
34-
</ul>
35-
36-
<h2>Web Hacking</h2>
37-
<ul>
38-
<li><atarget="_blank"href="https://www.hacker101.com/"rel="nofollow">Hacker101-Web Hacking</a></li>
39-
<li><atarget="_blank"href="https://leaksource.files.wordpress.com/2014/08/the-web-application-hackers-handbook.pdf"rel="nofollow">The Web Application Hacker's Handbook</a></li>
40-
<li><atarget="_blank"href="https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents"rel="nofollow">OWASP Guide</a></li>
41-
</ul>
42-
43-
<h2>War Games</h2>
44-
<ul>
45-
<li><atarget="_blank"href="https://io.netgarage.org/"rel="nofollow">IO Wargame</a></li>
46-
<li><atarget="_blank"href="http://pwnable.kr/"rel="nofollow">Pwnable KR</a></li>
47-
<li><atarget="_blank"href="https://pwnable.tw/"rel="nofollow">Pwnable TW</a></li>
48-
<li><atarget="_blank"href="http://overthewire.org/wargames/"rel="nofollow">OverTheWire</a></li>
49-
<li><atarget="_blank"href="http://reversing.kr/"rel="nofollow">Reversing KR</a></li>
50-
<li><atarget="_blank"href="http://w3challs.com/"rel="nofollow">W3Challs</a></li>
51-
<li><atarget="_blank"href="https://www.hackthebox.eu/"rel="nofollow">Hack the Box</a></li>
52-
<li><atarget="_blank"href="http://webhacking.kr/"rel="nofollow">WebHacking KR</a></li>
53-
</ul>
54-
14+
<scriptsrc="assets/js/animate.js"></script>
15+
<header>
16+
<divclass="glitch">
17+
<h1>d4rks0c1ety</h1>
18+
<h1>d4rks0c1ety</h1>
19+
<h1>d4rks0c1ety</h1>
20+
</div>
21+
<br><br><br>
22+
<p>CTF Team of IIEST Shibpur</p>
23+
</header>
24+
25+
<h2>Binary Exploitation</h2>
26+
<ul>
27+
<li><atarget="_blank"
28+
href="https://www.youtube.com/watch?v=iyAyN3GFM7A&list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN">LiveOverflow Binary
29+
Hacking</a></li>
30+
<li><atarget="_blank"href="https://github.com/hsfareed/Resources-for-learning-ethical-hacking">Resources for
31+
Ethical Hacking</a></li>
32+
<li><atarget="_blank"href="http://security.cs.rpi.edu/courses/binexp-spring2015/">Modern Binary Exploitation</a>
33+
</li>
34+
<li><atarget="_blank"href="https://www.youtube.com/playlist?list=PL038BE01D3BAEFDB0">Introductory Intel x86:
35+
Architecture, Assembly, Applications, & Alliteration</a></li>
36+
<li><atarget="_blank"href="https://www.youtube.com/playlist?list=PL8F8D45D6C1FFD177">Intermediate Intel x86:
37+
Architecture, Assembly, Applications, & Alliteration</a></li>
38+
<li><atarget="_blank"href="http://www.opensecuritytraining.info/Training.html">Advance Intel x86: Architecture,
39+
Assembly, Applications, & Alliteration</a></li>
40+
<li><atarget="_blank"href="https://www.youtube.com/playlist?list=PLUFkSN0XLZ-nXcDG89jS9iqKBnNHmz7Qw">Introduction
41+
to Reverse Engineering Software</a></li>
42+
43+
44+
</ul>
45+
46+
<h2>Web Hacking</h2>
47+
<ul>
48+
<li><atarget="_blank"href="https://www.hacker101.com/"rel="nofollow">Hacker101-Web Hacking</a></li>
49+
<li><atarget="_blank"
50+
href="https://leaksource.files.wordpress.com/2014/08/the-web-application-hackers-handbook.pdf"
51+
rel="nofollow">The Web Application Hacker's Handbook</a></li>
52+
<li><atarget="_blank"href="https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents"
53+
rel="nofollow">OWASP Guide</a></li>
54+
</ul>
55+
56+
<h2>War Games</h2>
57+
<ul>
58+
<li><atarget="_blank"href="https://io.netgarage.org/"rel="nofollow">IO Wargame</a></li>
59+
<li><atarget="_blank"href="http://pwnable.kr/"rel="nofollow">Pwnable KR</a></li>
60+
<li><atarget="_blank"href="https://pwnable.tw/"rel="nofollow">Pwnable TW</a></li>
61+
<li><atarget="_blank"href="http://overthewire.org/wargames/"rel="nofollow">OverTheWire</a></li>
62+
<li><atarget="_blank"href="http://reversing.kr/"rel="nofollow">Reversing KR</a></li>
63+
<li><atarget="_blank"href="http://w3challs.com/"rel="nofollow">W3Challs</a></li>
64+
<li><atarget="_blank"href="https://www.hackthebox.eu/"rel="nofollow">Hack the Box</a></li>
65+
<li><atarget="_blank"href="http://webhacking.kr/"rel="nofollow">WebHacking KR</a></li>
66+
</ul>
67+
5568
<!-- flag : accessdenied{1_kn0w_abt_d4rks0c1ety_n0w} -->
5669

5770
</body>
58-
</html>
71+
72+
</html>

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp