diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..eb794e1 --- /dev/null +++ b/.gitignore @@ -0,0 +1,3 @@ +# Disable reminder in prompt +ignoredirmessage + diff --git a/LICENSE.md b/LICENSE.md new file mode 100644 index 0000000..2fb2e74 --- /dev/null +++ b/LICENSE.md @@ -0,0 +1,675 @@ +### GNU GENERAL PUBLIC LICENSE + +Version 3, 29 June 2007 + +Copyright (C) 2007 Free Software Foundation, Inc. + + +Everyone is permitted to copy and distribute verbatim copies of this +license document, but changing it is not allowed. + +### Preamble + +The GNU General Public License is a free, copyleft license for +software and other kinds of works. + +The licenses for most software and other practical works are designed +to take away your freedom to share and change the works. By contrast, +the GNU General Public License is intended to guarantee your freedom +to share and change all versions of a program--to make sure it remains +free software for all its users. We, the Free Software Foundation, use +the GNU General Public License for most of our software; it applies +also to any other work released this way by its authors. You can apply +it to your programs, too. + +When we speak of free software, we are referring to freedom, not +price. Our General Public Licenses are designed to make sure that you +have the freedom to distribute copies of free software (and charge for +them if you wish), that you receive source code or can get it if you +want it, that you can change the software or use pieces of it in new +free programs, and that you know you can do these things. + +To protect your rights, we need to prevent others from denying you +these rights or asking you to surrender the rights. Therefore, you +have certain responsibilities if you distribute copies of the +software, or if you modify it: responsibilities to respect the freedom +of others. + +For example, if you distribute copies of such a program, whether +gratis or for a fee, you must pass on to the recipients the same +freedoms that you received. You must make sure that they, too, receive +or can get the source code. And you must show them these terms so they +know their rights. + +Developers that use the GNU GPL protect your rights with two steps: +(1) assert copyright on the software, and (2) offer you this License +giving you legal permission to copy, distribute and/or modify it. + +For the developers' and authors' protection, the GPL clearly explains +that there is no warranty for this free software. For both users' and +authors' sake, the GPL requires that modified versions be marked as +changed, so that their problems will not be attributed erroneously to +authors of previous versions. + +Some devices are designed to deny users access to install or run +modified versions of the software inside them, although the +manufacturer can do so. This is fundamentally incompatible with the +aim of protecting users' freedom to change the software. The +systematic pattern of such abuse occurs in the area of products for +individuals to use, which is precisely where it is most unacceptable. +Therefore, we have designed this version of the GPL to prohibit the +practice for those products. If such problems arise substantially in +other domains, we stand ready to extend this provision to those +domains in future versions of the GPL, as needed to protect the +freedom of users. + +Finally, every program is threatened constantly by software patents. +States should not allow patents to restrict development and use of +software on general-purpose computers, but in those that do, we wish +to avoid the special danger that patents applied to a free program +could make it effectively proprietary. To prevent this, the GPL +assures that patents cannot be used to render the program non-free. + +The precise terms and conditions for copying, distribution and +modification follow. + +### TERMS AND CONDITIONS + +#### 0. Definitions. + +"This License" refers to version 3 of the GNU General Public License. + +"Copyright" also means copyright-like laws that apply to other kinds +of works, such as semiconductor masks. + +"The Program" refers to any copyrightable work licensed under this +License. Each licensee is addressed as "you". "Licensees" and +"recipients" may be individuals or organizations. + +To "modify" a work means to copy from or adapt all or part of the work +in a fashion requiring copyright permission, other than the making of +an exact copy. The resulting work is called a "modified version" of +the earlier work or a work "based on" the earlier work. + +A "covered work" means either the unmodified Program or a work based +on the Program. + +To "propagate" a work means to do anything with it that, without +permission, would make you directly or secondarily liable for +infringement under applicable copyright law, except executing it on a +computer or modifying a private copy. Propagation includes copying, +distribution (with or without modification), making available to the +public, and in some countries other activities as well. + +To "convey" a work means any kind of propagation that enables other +parties to make or receive copies. Mere interaction with a user +through a computer network, with no transfer of a copy, is not +conveying. + +An interactive user interface displays "Appropriate Legal Notices" to +the extent that it includes a convenient and prominently visible +feature that (1) displays an appropriate copyright notice, and (2) +tells the user that there is no warranty for the work (except to the +extent that warranties are provided), that licensees may convey the +work under this License, and how to view a copy of this License. If +the interface presents a list of user commands or options, such as a +menu, a prominent item in the list meets this criterion. + +#### 1. Source Code. + +The "source code" for a work means the preferred form of the work for +making modifications to it. "Object code" means any non-source form of +a work. + +A "Standard Interface" means an interface that either is an official +standard defined by a recognized standards body, or, in the case of +interfaces specified for a particular programming language, one that +is widely used among developers working in that language. + +The "System Libraries" of an executable work include anything, other +than the work as a whole, that (a) is included in the normal form of +packaging a Major Component, but which is not part of that Major +Component, and (b) serves only to enable use of the work with that +Major Component, or to implement a Standard Interface for which an +implementation is available to the public in source code form. A +"Major Component", in this context, means a major essential component +(kernel, window system, and so on) of the specific operating system +(if any) on which the executable work runs, or a compiler used to +produce the work, or an object code interpreter used to run it. + +The "Corresponding Source" for a work in object code form means all +the source code needed to generate, install, and (for an executable +work) run the object code and to modify the work, including scripts to +control those activities. However, it does not include the work's +System Libraries, or general-purpose tools or generally available free +programs which are used unmodified in performing those activities but +which are not part of the work. For example, Corresponding Source +includes interface definition files associated with source files for +the work, and the source code for shared libraries and dynamically +linked subprograms that the work is specifically designed to require, +such as by intimate data communication or control flow between those +subprograms and other parts of the work. + +The Corresponding Source need not include anything that users can +regenerate automatically from other parts of the Corresponding Source. + +The Corresponding Source for a work in source code form is that same +work. + +#### 2. Basic Permissions. + +All rights granted under this License are granted for the term of +copyright on the Program, and are irrevocable provided the stated +conditions are met. This License explicitly affirms your unlimited +permission to run the unmodified Program. The output from running a +covered work is covered by this License only if the output, given its +content, constitutes a covered work. This License acknowledges your +rights of fair use or other equivalent, as provided by copyright law. + +You may make, run and propagate covered works that you do not convey, +without conditions so long as your license otherwise remains in force. +You may convey covered works to others for the sole purpose of having +them make modifications exclusively for you, or provide you with +facilities for running those works, provided that you comply with the +terms of this License in conveying all material for which you do not +control copyright. Those thus making or running the covered works for +you must do so exclusively on your behalf, under your direction and +control, on terms that prohibit them from making any copies of your +copyrighted material outside their relationship with you. + +Conveying under any other circumstances is permitted solely under the +conditions stated below. Sublicensing is not allowed; section 10 makes +it unnecessary. + +#### 3. Protecting Users' Legal Rights From Anti-Circumvention Law. + +No covered work shall be deemed part of an effective technological +measure under any applicable law fulfilling obligations under article +11 of the WIPO copyright treaty adopted on 20 December 1996, or +similar laws prohibiting or restricting circumvention of such +measures. + +When you convey a covered work, you waive any legal power to forbid +circumvention of technological measures to the extent such +circumvention is effected by exercising rights under this License with +respect to the covered work, and you disclaim any intention to limit +operation or modification of the work as a means of enforcing, against +the work's users, your or third parties' legal rights to forbid +circumvention of technological measures. + +#### 4. Conveying Verbatim Copies. + +You may convey verbatim copies of the Program's source code as you +receive it, in any medium, provided that you conspicuously and +appropriately publish on each copy an appropriate copyright notice; +keep intact all notices stating that this License and any +non-permissive terms added in accord with section 7 apply to the code; +keep intact all notices of the absence of any warranty; and give all +recipients a copy of this License along with the Program. + +You may charge any price or no price for each copy that you convey, +and you may offer support or warranty protection for a fee. + +#### 5. Conveying Modified Source Versions. + +You may convey a work based on the Program, or the modifications to +produce it from the Program, in the form of source code under the +terms of section 4, provided that you also meet all of these +conditions: + +- a) The work must carry prominent notices stating that you modified + it, and giving a relevant date. +- b) The work must carry prominent notices stating that it is + released under this License and any conditions added under + section 7. This requirement modifies the requirement in section 4 + to "keep intact all notices". +- c) You must license the entire work, as a whole, under this + License to anyone who comes into possession of a copy. This + License will therefore apply, along with any applicable section 7 + additional terms, to the whole of the work, and all its parts, + regardless of how they are packaged. This License gives no + permission to license the work in any other way, but it does not + invalidate such permission if you have separately received it. +- d) If the work has interactive user interfaces, each must display + Appropriate Legal Notices; however, if the Program has interactive + interfaces that do not display Appropriate Legal Notices, your + work need not make them do so. + +A compilation of a covered work with other separate and independent +works, which are not by their nature extensions of the covered work, +and which are not combined with it such as to form a larger program, +in or on a volume of a storage or distribution medium, is called an +"aggregate" if the compilation and its resulting copyright are not +used to limit the access or legal rights of the compilation's users +beyond what the individual works permit. Inclusion of a covered work +in an aggregate does not cause this License to apply to the other +parts of the aggregate. + +#### 6. Conveying Non-Source Forms. + +You may convey a covered work in object code form under the terms of +sections 4 and 5, provided that you also convey the machine-readable +Corresponding Source under the terms of this License, in one of these +ways: + +- a) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by the + Corresponding Source fixed on a durable physical medium + customarily used for software interchange. +- b) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by a + written offer, valid for at least three years and valid for as + long as you offer spare parts or customer support for that product + model, to give anyone who possesses the object code either (1) a + copy of the Corresponding Source for all the software in the + product that is covered by this License, on a durable physical + medium customarily used for software interchange, for a price no + more than your reasonable cost of physically performing this + conveying of source, or (2) access to copy the Corresponding + Source from a network server at no charge. +- c) Convey individual copies of the object code with a copy of the + written offer to provide the Corresponding Source. This + alternative is allowed only occasionally and noncommercially, and + only if you received the object code with such an offer, in accord + with subsection 6b. +- d) Convey the object code by offering access from a designated + place (gratis or for a charge), and offer equivalent access to the + Corresponding Source in the same way through the same place at no + further charge. You need not require recipients to copy the + Corresponding Source along with the object code. If the place to + copy the object code is a network server, the Corresponding Source + may be on a different server (operated by you or a third party) + that supports equivalent copying facilities, provided you maintain + clear directions next to the object code saying where to find the + Corresponding Source. Regardless of what server hosts the + Corresponding Source, you remain obligated to ensure that it is + available for as long as needed to satisfy these requirements. +- e) Convey the object code using peer-to-peer transmission, + provided you inform other peers where the object code and + Corresponding Source of the work are being offered to the general + public at no charge under subsection 6d. + +A separable portion of the object code, whose source code is excluded +from the Corresponding Source as a System Library, need not be +included in conveying the object code work. + +A "User Product" is either (1) a "consumer product", which means any +tangible personal property which is normally used for personal, +family, or household purposes, or (2) anything designed or sold for +incorporation into a dwelling. In determining whether a product is a +consumer product, doubtful cases shall be resolved in favor of +coverage. For a particular product received by a particular user, +"normally used" refers to a typical or common use of that class of +product, regardless of the status of the particular user or of the way +in which the particular user actually uses, or expects or is expected +to use, the product. A product is a consumer product regardless of +whether the product has substantial commercial, industrial or +non-consumer uses, unless such uses represent the only significant +mode of use of the product. + +"Installation Information" for a User Product means any methods, +procedures, authorization keys, or other information required to +install and execute modified versions of a covered work in that User +Product from a modified version of its Corresponding Source. The +information must suffice to ensure that the continued functioning of +the modified object code is in no case prevented or interfered with +solely because modification has been made. + +If you convey an object code work under this section in, or with, or +specifically for use in, a User Product, and the conveying occurs as +part of a transaction in which the right of possession and use of the +User Product is transferred to the recipient in perpetuity or for a +fixed term (regardless of how the transaction is characterized), the +Corresponding Source conveyed under this section must be accompanied +by the Installation Information. But this requirement does not apply +if neither you nor any third party retains the ability to install +modified object code on the User Product (for example, the work has +been installed in ROM). + +The requirement to provide Installation Information does not include a +requirement to continue to provide support service, warranty, or +updates for a work that has been modified or installed by the +recipient, or for the User Product in which it has been modified or +installed. Access to a network may be denied when the modification +itself materially and adversely affects the operation of the network +or violates the rules and protocols for communication across the +network. + +Corresponding Source conveyed, and Installation Information provided, +in accord with this section must be in a format that is publicly +documented (and with an implementation available to the public in +source code form), and must require no special password or key for +unpacking, reading or copying. + +#### 7. Additional Terms. + +"Additional permissions" are terms that supplement the terms of this +License by making exceptions from one or more of its conditions. +Additional permissions that are applicable to the entire Program shall +be treated as though they were included in this License, to the extent +that they are valid under applicable law. If additional permissions +apply only to part of the Program, that part may be used separately +under those permissions, but the entire Program remains governed by +this License without regard to the additional permissions. + +When you convey a copy of a covered work, you may at your option +remove any additional permissions from that copy, or from any part of +it. (Additional permissions may be written to require their own +removal in certain cases when you modify the work.) You may place +additional permissions on material, added by you to a covered work, +for which you have or can give appropriate copyright permission. + +Notwithstanding any other provision of this License, for material you +add to a covered work, you may (if authorized by the copyright holders +of that material) supplement the terms of this License with terms: + +- a) Disclaiming warranty or limiting liability differently from the + terms of sections 15 and 16 of this License; or +- b) Requiring preservation of specified reasonable legal notices or + author attributions in that material or in the Appropriate Legal + Notices displayed by works containing it; or +- c) Prohibiting misrepresentation of the origin of that material, + or requiring that modified versions of such material be marked in + reasonable ways as different from the original version; or +- d) Limiting the use for publicity purposes of names of licensors + or authors of the material; or +- e) Declining to grant rights under trademark law for use of some + trade names, trademarks, or service marks; or +- f) Requiring indemnification of licensors and authors of that + material by anyone who conveys the material (or modified versions + of it) with contractual assumptions of liability to the recipient, + for any liability that these contractual assumptions directly + impose on those licensors and authors. + +All other non-permissive additional terms are considered "further +restrictions" within the meaning of section 10. If the Program as you +received it, or any part of it, contains a notice stating that it is +governed by this License along with a term that is a further +restriction, you may remove that term. If a license document contains +a further restriction but permits relicensing or conveying under this +License, you may add to a covered work material governed by the terms +of that license document, provided that the further restriction does +not survive such relicensing or conveying. + +If you add terms to a covered work in accord with this section, you +must place, in the relevant source files, a statement of the +additional terms that apply to those files, or a notice indicating +where to find the applicable terms. + +Additional terms, permissive or non-permissive, may be stated in the +form of a separately written license, or stated as exceptions; the +above requirements apply either way. + +#### 8. Termination. + +You may not propagate or modify a covered work except as expressly +provided under this License. Any attempt otherwise to propagate or +modify it is void, and will automatically terminate your rights under +this License (including any patent licenses granted under the third +paragraph of section 11). + +However, if you cease all violation of this License, then your license +from a particular copyright holder is reinstated (a) provisionally, +unless and until the copyright holder explicitly and finally +terminates your license, and (b) permanently, if the copyright holder +fails to notify you of the violation by some reasonable means prior to +60 days after the cessation. + +Moreover, your license from a particular copyright holder is +reinstated permanently if the copyright holder notifies you of the +violation by some reasonable means, this is the first time you have +received notice of violation of this License (for any work) from that +copyright holder, and you cure the violation prior to 30 days after +your receipt of the notice. + +Termination of your rights under this section does not terminate the +licenses of parties who have received copies or rights from you under +this License. If your rights have been terminated and not permanently +reinstated, you do not qualify to receive new licenses for the same +material under section 10. + +#### 9. Acceptance Not Required for Having Copies. + +You are not required to accept this License in order to receive or run +a copy of the Program. Ancillary propagation of a covered work +occurring solely as a consequence of using peer-to-peer transmission +to receive a copy likewise does not require acceptance. However, +nothing other than this License grants you permission to propagate or +modify any covered work. These actions infringe copyright if you do +not accept this License. Therefore, by modifying or propagating a +covered work, you indicate your acceptance of this License to do so. + +#### 10. Automatic Licensing of Downstream Recipients. + +Each time you convey a covered work, the recipient automatically +receives a license from the original licensors, to run, modify and +propagate that work, subject to this License. You are not responsible +for enforcing compliance by third parties with this License. + +An "entity transaction" is a transaction transferring control of an +organization, or substantially all assets of one, or subdividing an +organization, or merging organizations. If propagation of a covered +work results from an entity transaction, each party to that +transaction who receives a copy of the work also receives whatever +licenses to the work the party's predecessor in interest had or could +give under the previous paragraph, plus a right to possession of the +Corresponding Source of the work from the predecessor in interest, if +the predecessor has it or can get it with reasonable efforts. + +You may not impose any further restrictions on the exercise of the +rights granted or affirmed under this License. For example, you may +not impose a license fee, royalty, or other charge for exercise of +rights granted under this License, and you may not initiate litigation +(including a cross-claim or counterclaim in a lawsuit) alleging that +any patent claim is infringed by making, using, selling, offering for +sale, or importing the Program or any portion of it. + +#### 11. Patents. + +A "contributor" is a copyright holder who authorizes use under this +License of the Program or a work on which the Program is based. The +work thus licensed is called the contributor's "contributor version". + +A contributor's "essential patent claims" are all patent claims owned +or controlled by the contributor, whether already acquired or +hereafter acquired, that would be infringed by some manner, permitted +by this License, of making, using, or selling its contributor version, +but do not include claims that would be infringed only as a +consequence of further modification of the contributor version. For +purposes of this definition, "control" includes the right to grant +patent sublicenses in a manner consistent with the requirements of +this License. + +Each contributor grants you a non-exclusive, worldwide, royalty-free +patent license under the contributor's essential patent claims, to +make, use, sell, offer for sale, import and otherwise run, modify and +propagate the contents of its contributor version. + +In the following three paragraphs, a "patent license" is any express +agreement or commitment, however denominated, not to enforce a patent +(such as an express permission to practice a patent or covenant not to +sue for patent infringement). To "grant" such a patent license to a +party means to make such an agreement or commitment not to enforce a +patent against the party. + +If you convey a covered work, knowingly relying on a patent license, +and the Corresponding Source of the work is not available for anyone +to copy, free of charge and under the terms of this License, through a +publicly available network server or other readily accessible means, +then you must either (1) cause the Corresponding Source to be so +available, or (2) arrange to deprive yourself of the benefit of the +patent license for this particular work, or (3) arrange, in a manner +consistent with the requirements of this License, to extend the patent +license to downstream recipients. "Knowingly relying" means you have +actual knowledge that, but for the patent license, your conveying the +covered work in a country, or your recipient's use of the covered work +in a country, would infringe one or more identifiable patents in that +country that you have reason to believe are valid. + +If, pursuant to or in connection with a single transaction or +arrangement, you convey, or propagate by procuring conveyance of, a +covered work, and grant a patent license to some of the parties +receiving the covered work authorizing them to use, propagate, modify +or convey a specific copy of the covered work, then the patent license +you grant is automatically extended to all recipients of the covered +work and works based on it. + +A patent license is "discriminatory" if it does not include within the +scope of its coverage, prohibits the exercise of, or is conditioned on +the non-exercise of one or more of the rights that are specifically +granted under this License. You may not convey a covered work if you +are a party to an arrangement with a third party that is in the +business of distributing software, under which you make payment to the +third party based on the extent of your activity of conveying the +work, and under which the third party grants, to any of the parties +who would receive the covered work from you, a discriminatory patent +license (a) in connection with copies of the covered work conveyed by +you (or copies made from those copies), or (b) primarily for and in +connection with specific products or compilations that contain the +covered work, unless you entered into that arrangement, or that patent +license was granted, prior to 28 March 2007. + +Nothing in this License shall be construed as excluding or limiting +any implied license or other defenses to infringement that may +otherwise be available to you under applicable patent law. + +#### 12. No Surrender of Others' Freedom. + +If conditions are imposed on you (whether by court order, agreement or +otherwise) that contradict the conditions of this License, they do not +excuse you from the conditions of this License. If you cannot convey a +covered work so as to satisfy simultaneously your obligations under +this License and any other pertinent obligations, then as a +consequence you may not convey it at all. For example, if you agree to +terms that obligate you to collect a royalty for further conveying +from those to whom you convey the Program, the only way you could +satisfy both those terms and this License would be to refrain entirely +from conveying the Program. + +#### 13. Use with the GNU Affero General Public License. + +Notwithstanding any other provision of this License, you have +permission to link or combine any covered work with a work licensed +under version 3 of the GNU Affero General Public License into a single +combined work, and to convey the resulting work. The terms of this +License will continue to apply to the part which is the covered work, +but the special requirements of the GNU Affero General Public License, +section 13, concerning interaction through a network will apply to the +combination as such. + +#### 14. Revised Versions of this License. + +The Free Software Foundation may publish revised and/or new versions +of the GNU General Public License from time to time. Such new versions +will be similar in spirit to the present version, but may differ in +detail to address new problems or concerns. + +Each version is given a distinguishing version number. If the Program +specifies that a certain numbered version of the GNU General Public +License "or any later version" applies to it, you have the option of +following the terms and conditions either of that numbered version or +of any later version published by the Free Software Foundation. If the +Program does not specify a version number of the GNU General Public +License, you may choose any version ever published by the Free +Software Foundation. + +If the Program specifies that a proxy can decide which future versions +of the GNU General Public License can be used, that proxy's public +statement of acceptance of a version permanently authorizes you to +choose that version for the Program. + +Later license versions may give you additional or different +permissions. However, no additional obligations are imposed on any +author or copyright holder as a result of your choosing to follow a +later version. + +#### 15. Disclaimer of Warranty. + +THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY +APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT +HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT +WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND +PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE +DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR +CORRECTION. + +#### 16. Limitation of Liability. + +IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR +CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, +INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES +ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT +NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR +LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM +TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER +PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. + +#### 17. Interpretation of Sections 15 and 16. + +If the disclaimer of warranty and limitation of liability provided +above cannot be given local legal effect according to their terms, +reviewing courts shall apply local law that most closely approximates +an absolute waiver of all civil liability in connection with the +Program, unless a warranty or assumption of liability accompanies a +copy of the Program in return for a fee. + +END OF TERMS AND CONDITIONS + +### How to Apply These Terms to Your New Programs + +If you develop a new program, and you want it to be of the greatest +possible use to the public, the best way to achieve this is to make it +free software which everyone can redistribute and change under these +terms. + +To do so, attach the following notices to the program. It is safest to +attach them to the start of each source file to most effectively state +the exclusion of warranty; and each file should have at least the +"copyright" line and a pointer to where the full notice is found. + + + Copyright (C) + + This program is free software: you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see . + +Also add information on how to contact you by electronic and paper +mail. + +If the program does terminal interaction, make it output a short +notice like this when it starts in an interactive mode: + + Copyright (C) + This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. + This is free software, and you are welcome to redistribute it + under certain conditions; type `show c' for details. + +The hypothetical commands \`show w' and \`show c' should show the +appropriate parts of the General Public License. Of course, your +program's commands might be different; for a GUI interface, you would +use an "about box". + +You should also get your employer (if you work as a programmer) or +school, if any, to sign a "copyright disclaimer" for the program, if +necessary. For more information on this, and how to apply and follow +the GNU GPL, see . + +The GNU General Public License does not permit incorporating your +program into proprietary programs. If your program is a subroutine +library, you may consider it more useful to permit linking proprietary +applications with the library. If this is what you want to do, use the +GNU Lesser General Public License instead of this License. But first, +please read . diff --git a/README.md b/README.md new file mode 100644 index 0000000..90ac1b9 --- /dev/null +++ b/README.md @@ -0,0 +1 @@ +My personal resource links diff --git a/development.md b/development.md new file mode 100644 index 0000000..01b19a4 --- /dev/null +++ b/development.md @@ -0,0 +1,6 @@ +### Bash + +[Parse bash arguments](https://stackoverflow.com/questions/192249/how-do-i-parse-command-line-arguments-in-bash) + + + diff --git a/docker.md b/docker.md new file mode 100644 index 0000000..8f0a233 --- /dev/null +++ b/docker.md @@ -0,0 +1,12 @@ +# docker setup +sudo bash -c "$(curl -LSsq https://get.docker.com)" +sudo usermod -aG docker ${USER:-$(whoami)} + +# docker containers + +docker pull node +docker pull mongo +docker pull ghost +docker pull nginx +docker pull lakruzz/jekyll-plus + diff --git a/go.md b/go.md new file mode 100644 index 0000000..7b88f1f --- /dev/null +++ b/go.md @@ -0,0 +1,5 @@ +## GoLang package list + +go install github.com/codeskyblue/gohttpserver@latest +go install github.com/cuonglm/gogi/cmd/gogi@latest + diff --git a/license/README.md b/license/README.md new file mode 100644 index 0000000..353788d --- /dev/null +++ b/license/README.md @@ -0,0 +1 @@ +### A collection of licenses diff --git a/license/agpl3.md b/license/agpl3.md new file mode 100644 index 0000000..22e0388 --- /dev/null +++ b/license/agpl3.md @@ -0,0 +1,662 @@ +``` +### GNU AFFERO GENERAL PUBLIC LICENSE + +Version 3, 19 November 2007 + +Copyright (C) 2007 Free Software Foundation, Inc. + + +Everyone is permitted to copy and distribute verbatim copies of this +license document, but changing it is not allowed. + +### Preamble + +The GNU Affero General Public License is a free, copyleft license for +software and other kinds of works, specifically designed to ensure +cooperation with the community in the case of network server software. + +The licenses for most software and other practical works are designed +to take away your freedom to share and change the works. By contrast, +our General Public Licenses are intended to guarantee your freedom to +share and change all versions of a program--to make sure it remains +free software for all its users. + +When we speak of free software, we are referring to freedom, not +price. Our General Public Licenses are designed to make sure that you +have the freedom to distribute copies of free software (and charge for +them if you wish), that you receive source code or can get it if you +want it, that you can change the software or use pieces of it in new +free programs, and that you know you can do these things. + +Developers that use our General Public Licenses protect your rights +with two steps: (1) assert copyright on the software, and (2) offer +you this License which gives you legal permission to copy, distribute +and/or modify the software. + +A secondary benefit of defending all users' freedom is that +improvements made in alternate versions of the program, if they +receive widespread use, become available for other developers to +incorporate. Many developers of free software are heartened and +encouraged by the resulting cooperation. However, in the case of +software used on network servers, this result may fail to come about. +The GNU General Public License permits making a modified version and +letting the public access it on a server without ever releasing its +source code to the public. + +The GNU Affero General Public License is designed specifically to +ensure that, in such cases, the modified source code becomes available +to the community. It requires the operator of a network server to +provide the source code of the modified version running there to the +users of that server. Therefore, public use of a modified version, on +a publicly accessible server, gives the public access to the source +code of the modified version. + +An older license, called the Affero General Public License and +published by Affero, was designed to accomplish similar goals. This is +a different license, not a version of the Affero GPL, but Affero has +released a new version of the Affero GPL which permits relicensing +under this license. + +The precise terms and conditions for copying, distribution and +modification follow. + +### TERMS AND CONDITIONS + +#### 0. Definitions. + +"This License" refers to version 3 of the GNU Affero General Public +License. + +"Copyright" also means copyright-like laws that apply to other kinds +of works, such as semiconductor masks. + +"The Program" refers to any copyrightable work licensed under this +License. Each licensee is addressed as "you". "Licensees" and +"recipients" may be individuals or organizations. + +To "modify" a work means to copy from or adapt all or part of the work +in a fashion requiring copyright permission, other than the making of +an exact copy. The resulting work is called a "modified version" of +the earlier work or a work "based on" the earlier work. + +A "covered work" means either the unmodified Program or a work based +on the Program. + +To "propagate" a work means to do anything with it that, without +permission, would make you directly or secondarily liable for +infringement under applicable copyright law, except executing it on a +computer or modifying a private copy. Propagation includes copying, +distribution (with or without modification), making available to the +public, and in some countries other activities as well. + +To "convey" a work means any kind of propagation that enables other +parties to make or receive copies. Mere interaction with a user +through a computer network, with no transfer of a copy, is not +conveying. + +An interactive user interface displays "Appropriate Legal Notices" to +the extent that it includes a convenient and prominently visible +feature that (1) displays an appropriate copyright notice, and (2) +tells the user that there is no warranty for the work (except to the +extent that warranties are provided), that licensees may convey the +work under this License, and how to view a copy of this License. If +the interface presents a list of user commands or options, such as a +menu, a prominent item in the list meets this criterion. + +#### 1. Source Code. + +The "source code" for a work means the preferred form of the work for +making modifications to it. "Object code" means any non-source form of +a work. + +A "Standard Interface" means an interface that either is an official +standard defined by a recognized standards body, or, in the case of +interfaces specified for a particular programming language, one that +is widely used among developers working in that language. + +The "System Libraries" of an executable work include anything, other +than the work as a whole, that (a) is included in the normal form of +packaging a Major Component, but which is not part of that Major +Component, and (b) serves only to enable use of the work with that +Major Component, or to implement a Standard Interface for which an +implementation is available to the public in source code form. A +"Major Component", in this context, means a major essential component +(kernel, window system, and so on) of the specific operating system +(if any) on which the executable work runs, or a compiler used to +produce the work, or an object code interpreter used to run it. + +The "Corresponding Source" for a work in object code form means all +the source code needed to generate, install, and (for an executable +work) run the object code and to modify the work, including scripts to +control those activities. However, it does not include the work's +System Libraries, or general-purpose tools or generally available free +programs which are used unmodified in performing those activities but +which are not part of the work. For example, Corresponding Source +includes interface definition files associated with source files for +the work, and the source code for shared libraries and dynamically +linked subprograms that the work is specifically designed to require, +such as by intimate data communication or control flow between those +subprograms and other parts of the work. + +The Corresponding Source need not include anything that users can +regenerate automatically from other parts of the Corresponding Source. + +The Corresponding Source for a work in source code form is that same +work. + +#### 2. Basic Permissions. + +All rights granted under this License are granted for the term of +copyright on the Program, and are irrevocable provided the stated +conditions are met. This License explicitly affirms your unlimited +permission to run the unmodified Program. The output from running a +covered work is covered by this License only if the output, given its +content, constitutes a covered work. This License acknowledges your +rights of fair use or other equivalent, as provided by copyright law. + +You may make, run and propagate covered works that you do not convey, +without conditions so long as your license otherwise remains in force. +You may convey covered works to others for the sole purpose of having +them make modifications exclusively for you, or provide you with +facilities for running those works, provided that you comply with the +terms of this License in conveying all material for which you do not +control copyright. Those thus making or running the covered works for +you must do so exclusively on your behalf, under your direction and +control, on terms that prohibit them from making any copies of your +copyrighted material outside their relationship with you. + +Conveying under any other circumstances is permitted solely under the +conditions stated below. Sublicensing is not allowed; section 10 makes +it unnecessary. + +#### 3. Protecting Users' Legal Rights From Anti-Circumvention Law. + +No covered work shall be deemed part of an effective technological +measure under any applicable law fulfilling obligations under article +11 of the WIPO copyright treaty adopted on 20 December 1996, or +similar laws prohibiting or restricting circumvention of such +measures. + +When you convey a covered work, you waive any legal power to forbid +circumvention of technological measures to the extent such +circumvention is effected by exercising rights under this License with +respect to the covered work, and you disclaim any intention to limit +operation or modification of the work as a means of enforcing, against +the work's users, your or third parties' legal rights to forbid +circumvention of technological measures. + +#### 4. Conveying Verbatim Copies. + +You may convey verbatim copies of the Program's source code as you +receive it, in any medium, provided that you conspicuously and +appropriately publish on each copy an appropriate copyright notice; +keep intact all notices stating that this License and any +non-permissive terms added in accord with section 7 apply to the code; +keep intact all notices of the absence of any warranty; and give all +recipients a copy of this License along with the Program. + +You may charge any price or no price for each copy that you convey, +and you may offer support or warranty protection for a fee. + +#### 5. Conveying Modified Source Versions. + +You may convey a work based on the Program, or the modifications to +produce it from the Program, in the form of source code under the +terms of section 4, provided that you also meet all of these +conditions: + +- a) The work must carry prominent notices stating that you modified + it, and giving a relevant date. +- b) The work must carry prominent notices stating that it is + released under this License and any conditions added under + section 7. This requirement modifies the requirement in section 4 + to "keep intact all notices". +- c) You must license the entire work, as a whole, under this + License to anyone who comes into possession of a copy. This + License will therefore apply, along with any applicable section 7 + additional terms, to the whole of the work, and all its parts, + regardless of how they are packaged. This License gives no + permission to license the work in any other way, but it does not + invalidate such permission if you have separately received it. +- d) If the work has interactive user interfaces, each must display + Appropriate Legal Notices; however, if the Program has interactive + interfaces that do not display Appropriate Legal Notices, your + work need not make them do so. + +A compilation of a covered work with other separate and independent +works, which are not by their nature extensions of the covered work, +and which are not combined with it such as to form a larger program, +in or on a volume of a storage or distribution medium, is called an +"aggregate" if the compilation and its resulting copyright are not +used to limit the access or legal rights of the compilation's users +beyond what the individual works permit. Inclusion of a covered work +in an aggregate does not cause this License to apply to the other +parts of the aggregate. + +#### 6. Conveying Non-Source Forms. + +You may convey a covered work in object code form under the terms of +sections 4 and 5, provided that you also convey the machine-readable +Corresponding Source under the terms of this License, in one of these +ways: + +- a) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by the + Corresponding Source fixed on a durable physical medium + customarily used for software interchange. +- b) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by a + written offer, valid for at least three years and valid for as + long as you offer spare parts or customer support for that product + model, to give anyone who possesses the object code either (1) a + copy of the Corresponding Source for all the software in the + product that is covered by this License, on a durable physical + medium customarily used for software interchange, for a price no + more than your reasonable cost of physically performing this + conveying of source, or (2) access to copy the Corresponding + Source from a network server at no charge. +- c) Convey individual copies of the object code with a copy of the + written offer to provide the Corresponding Source. This + alternative is allowed only occasionally and noncommercially, and + only if you received the object code with such an offer, in accord + with subsection 6b. +- d) Convey the object code by offering access from a designated + place (gratis or for a charge), and offer equivalent access to the + Corresponding Source in the same way through the same place at no + further charge. You need not require recipients to copy the + Corresponding Source along with the object code. If the place to + copy the object code is a network server, the Corresponding Source + may be on a different server (operated by you or a third party) + that supports equivalent copying facilities, provided you maintain + clear directions next to the object code saying where to find the + Corresponding Source. Regardless of what server hosts the + Corresponding Source, you remain obligated to ensure that it is + available for as long as needed to satisfy these requirements. +- e) Convey the object code using peer-to-peer transmission, + provided you inform other peers where the object code and + Corresponding Source of the work are being offered to the general + public at no charge under subsection 6d. + +A separable portion of the object code, whose source code is excluded +from the Corresponding Source as a System Library, need not be +included in conveying the object code work. + +A "User Product" is either (1) a "consumer product", which means any +tangible personal property which is normally used for personal, +family, or household purposes, or (2) anything designed or sold for +incorporation into a dwelling. In determining whether a product is a +consumer product, doubtful cases shall be resolved in favor of +coverage. For a particular product received by a particular user, +"normally used" refers to a typical or common use of that class of +product, regardless of the status of the particular user or of the way +in which the particular user actually uses, or expects or is expected +to use, the product. A product is a consumer product regardless of +whether the product has substantial commercial, industrial or +non-consumer uses, unless such uses represent the only significant +mode of use of the product. + +"Installation Information" for a User Product means any methods, +procedures, authorization keys, or other information required to +install and execute modified versions of a covered work in that User +Product from a modified version of its Corresponding Source. The +information must suffice to ensure that the continued functioning of +the modified object code is in no case prevented or interfered with +solely because modification has been made. + +If you convey an object code work under this section in, or with, or +specifically for use in, a User Product, and the conveying occurs as +part of a transaction in which the right of possession and use of the +User Product is transferred to the recipient in perpetuity or for a +fixed term (regardless of how the transaction is characterized), the +Corresponding Source conveyed under this section must be accompanied +by the Installation Information. But this requirement does not apply +if neither you nor any third party retains the ability to install +modified object code on the User Product (for example, the work has +been installed in ROM). + +The requirement to provide Installation Information does not include a +requirement to continue to provide support service, warranty, or +updates for a work that has been modified or installed by the +recipient, or for the User Product in which it has been modified or +installed. Access to a network may be denied when the modification +itself materially and adversely affects the operation of the network +or violates the rules and protocols for communication across the +network. + +Corresponding Source conveyed, and Installation Information provided, +in accord with this section must be in a format that is publicly +documented (and with an implementation available to the public in +source code form), and must require no special password or key for +unpacking, reading or copying. + +#### 7. Additional Terms. + +"Additional permissions" are terms that supplement the terms of this +License by making exceptions from one or more of its conditions. +Additional permissions that are applicable to the entire Program shall +be treated as though they were included in this License, to the extent +that they are valid under applicable law. If additional permissions +apply only to part of the Program, that part may be used separately +under those permissions, but the entire Program remains governed by +this License without regard to the additional permissions. + +When you convey a copy of a covered work, you may at your option +remove any additional permissions from that copy, or from any part of +it. (Additional permissions may be written to require their own +removal in certain cases when you modify the work.) You may place +additional permissions on material, added by you to a covered work, +for which you have or can give appropriate copyright permission. + +Notwithstanding any other provision of this License, for material you +add to a covered work, you may (if authorized by the copyright holders +of that material) supplement the terms of this License with terms: + +- a) Disclaiming warranty or limiting liability differently from the + terms of sections 15 and 16 of this License; or +- b) Requiring preservation of specified reasonable legal notices or + author attributions in that material or in the Appropriate Legal + Notices displayed by works containing it; or +- c) Prohibiting misrepresentation of the origin of that material, + or requiring that modified versions of such material be marked in + reasonable ways as different from the original version; or +- d) Limiting the use for publicity purposes of names of licensors + or authors of the material; or +- e) Declining to grant rights under trademark law for use of some + trade names, trademarks, or service marks; or +- f) Requiring indemnification of licensors and authors of that + material by anyone who conveys the material (or modified versions + of it) with contractual assumptions of liability to the recipient, + for any liability that these contractual assumptions directly + impose on those licensors and authors. + +All other non-permissive additional terms are considered "further +restrictions" within the meaning of section 10. If the Program as you +received it, or any part of it, contains a notice stating that it is +governed by this License along with a term that is a further +restriction, you may remove that term. If a license document contains +a further restriction but permits relicensing or conveying under this +License, you may add to a covered work material governed by the terms +of that license document, provided that the further restriction does +not survive such relicensing or conveying. + +If you add terms to a covered work in accord with this section, you +must place, in the relevant source files, a statement of the +additional terms that apply to those files, or a notice indicating +where to find the applicable terms. + +Additional terms, permissive or non-permissive, may be stated in the +form of a separately written license, or stated as exceptions; the +above requirements apply either way. + +#### 8. Termination. + +You may not propagate or modify a covered work except as expressly +provided under this License. Any attempt otherwise to propagate or +modify it is void, and will automatically terminate your rights under +this License (including any patent licenses granted under the third +paragraph of section 11). + +However, if you cease all violation of this License, then your license +from a particular copyright holder is reinstated (a) provisionally, +unless and until the copyright holder explicitly and finally +terminates your license, and (b) permanently, if the copyright holder +fails to notify you of the violation by some reasonable means prior to +60 days after the cessation. + +Moreover, your license from a particular copyright holder is +reinstated permanently if the copyright holder notifies you of the +violation by some reasonable means, this is the first time you have +received notice of violation of this License (for any work) from that +copyright holder, and you cure the violation prior to 30 days after +your receipt of the notice. + +Termination of your rights under this section does not terminate the +licenses of parties who have received copies or rights from you under +this License. If your rights have been terminated and not permanently +reinstated, you do not qualify to receive new licenses for the same +material under section 10. + +#### 9. Acceptance Not Required for Having Copies. + +You are not required to accept this License in order to receive or run +a copy of the Program. Ancillary propagation of a covered work +occurring solely as a consequence of using peer-to-peer transmission +to receive a copy likewise does not require acceptance. However, +nothing other than this License grants you permission to propagate or +modify any covered work. These actions infringe copyright if you do +not accept this License. Therefore, by modifying or propagating a +covered work, you indicate your acceptance of this License to do so. + +#### 10. Automatic Licensing of Downstream Recipients. + +Each time you convey a covered work, the recipient automatically +receives a license from the original licensors, to run, modify and +propagate that work, subject to this License. You are not responsible +for enforcing compliance by third parties with this License. + +An "entity transaction" is a transaction transferring control of an +organization, or substantially all assets of one, or subdividing an +organization, or merging organizations. If propagation of a covered +work results from an entity transaction, each party to that +transaction who receives a copy of the work also receives whatever +licenses to the work the party's predecessor in interest had or could +give under the previous paragraph, plus a right to possession of the +Corresponding Source of the work from the predecessor in interest, if +the predecessor has it or can get it with reasonable efforts. + +You may not impose any further restrictions on the exercise of the +rights granted or affirmed under this License. For example, you may +not impose a license fee, royalty, or other charge for exercise of +rights granted under this License, and you may not initiate litigation +(including a cross-claim or counterclaim in a lawsuit) alleging that +any patent claim is infringed by making, using, selling, offering for +sale, or importing the Program or any portion of it. + +#### 11. Patents. + +A "contributor" is a copyright holder who authorizes use under this +License of the Program or a work on which the Program is based. The +work thus licensed is called the contributor's "contributor version". + +A contributor's "essential patent claims" are all patent claims owned +or controlled by the contributor, whether already acquired or +hereafter acquired, that would be infringed by some manner, permitted +by this License, of making, using, or selling its contributor version, +but do not include claims that would be infringed only as a +consequence of further modification of the contributor version. For +purposes of this definition, "control" includes the right to grant +patent sublicenses in a manner consistent with the requirements of +this License. + +Each contributor grants you a non-exclusive, worldwide, royalty-free +patent license under the contributor's essential patent claims, to +make, use, sell, offer for sale, import and otherwise run, modify and +propagate the contents of its contributor version. + +In the following three paragraphs, a "patent license" is any express +agreement or commitment, however denominated, not to enforce a patent +(such as an express permission to practice a patent or covenant not to +sue for patent infringement). To "grant" such a patent license to a +party means to make such an agreement or commitment not to enforce a +patent against the party. + +If you convey a covered work, knowingly relying on a patent license, +and the Corresponding Source of the work is not available for anyone +to copy, free of charge and under the terms of this License, through a +publicly available network server or other readily accessible means, +then you must either (1) cause the Corresponding Source to be so +available, or (2) arrange to deprive yourself of the benefit of the +patent license for this particular work, or (3) arrange, in a manner +consistent with the requirements of this License, to extend the patent +license to downstream recipients. "Knowingly relying" means you have +actual knowledge that, but for the patent license, your conveying the +covered work in a country, or your recipient's use of the covered work +in a country, would infringe one or more identifiable patents in that +country that you have reason to believe are valid. + +If, pursuant to or in connection with a single transaction or +arrangement, you convey, or propagate by procuring conveyance of, a +covered work, and grant a patent license to some of the parties +receiving the covered work authorizing them to use, propagate, modify +or convey a specific copy of the covered work, then the patent license +you grant is automatically extended to all recipients of the covered +work and works based on it. + +A patent license is "discriminatory" if it does not include within the +scope of its coverage, prohibits the exercise of, or is conditioned on +the non-exercise of one or more of the rights that are specifically +granted under this License. You may not convey a covered work if you +are a party to an arrangement with a third party that is in the +business of distributing software, under which you make payment to the +third party based on the extent of your activity of conveying the +work, and under which the third party grants, to any of the parties +who would receive the covered work from you, a discriminatory patent +license (a) in connection with copies of the covered work conveyed by +you (or copies made from those copies), or (b) primarily for and in +connection with specific products or compilations that contain the +covered work, unless you entered into that arrangement, or that patent +license was granted, prior to 28 March 2007. + +Nothing in this License shall be construed as excluding or limiting +any implied license or other defenses to infringement that may +otherwise be available to you under applicable patent law. + +#### 12. No Surrender of Others' Freedom. + +If conditions are imposed on you (whether by court order, agreement or +otherwise) that contradict the conditions of this License, they do not +excuse you from the conditions of this License. If you cannot convey a +covered work so as to satisfy simultaneously your obligations under +this License and any other pertinent obligations, then as a +consequence you may not convey it at all. For example, if you agree to +terms that obligate you to collect a royalty for further conveying +from those to whom you convey the Program, the only way you could +satisfy both those terms and this License would be to refrain entirely +from conveying the Program. + +#### 13. Remote Network Interaction; Use with the GNU General Public License. + +Notwithstanding any other provision of this License, if you modify the +Program, your modified version must prominently offer all users +interacting with it remotely through a computer network (if your +version supports such interaction) an opportunity to receive the +Corresponding Source of your version by providing access to the +Corresponding Source from a network server at no charge, through some +standard or customary means of facilitating copying of software. This +Corresponding Source shall include the Corresponding Source for any +work covered by version 3 of the GNU General Public License that is +incorporated pursuant to the following paragraph. + +Notwithstanding any other provision of this License, you have +permission to link or combine any covered work with a work licensed +under version 3 of the GNU General Public License into a single +combined work, and to convey the resulting work. The terms of this +License will continue to apply to the part which is the covered work, +but the work with which it is combined will remain governed by version +3 of the GNU General Public License. + +#### 14. Revised Versions of this License. + +The Free Software Foundation may publish revised and/or new versions +of the GNU Affero General Public License from time to time. Such new +versions will be similar in spirit to the present version, but may +differ in detail to address new problems or concerns. + +Each version is given a distinguishing version number. If the Program +specifies that a certain numbered version of the GNU Affero General +Public License "or any later version" applies to it, you have the +option of following the terms and conditions either of that numbered +version or of any later version published by the Free Software +Foundation. If the Program does not specify a version number of the +GNU Affero General Public License, you may choose any version ever +published by the Free Software Foundation. + +If the Program specifies that a proxy can decide which future versions +of the GNU Affero General Public License can be used, that proxy's +public statement of acceptance of a version permanently authorizes you +to choose that version for the Program. + +Later license versions may give you additional or different +permissions. However, no additional obligations are imposed on any +author or copyright holder as a result of your choosing to follow a +later version. + +#### 15. Disclaimer of Warranty. + +THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY +APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT +HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT +WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND +PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE +DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR +CORRECTION. + +#### 16. Limitation of Liability. + +IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR +CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, +INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES +ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT +NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR +LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM +TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER +PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. + +#### 17. Interpretation of Sections 15 and 16. + +If the disclaimer of warranty and limitation of liability provided +above cannot be given local legal effect according to their terms, +reviewing courts shall apply local law that most closely approximates +an absolute waiver of all civil liability in connection with the +Program, unless a warranty or assumption of liability accompanies a +copy of the Program in return for a fee. + +END OF TERMS AND CONDITIONS + +### How to Apply These Terms to Your New Programs + +If you develop a new program, and you want it to be of the greatest +possible use to the public, the best way to achieve this is to make it +free software which everyone can redistribute and change under these +terms. + +To do so, attach the following notices to the program. It is safest to +attach them to the start of each source file to most effectively state +the exclusion of warranty; and each file should have at least the +"copyright" line and a pointer to where the full notice is found. + + + Copyright (C) + + This program is free software: you can redistribute it and/or modify + it under the terms of the GNU Affero General Public License as + published by the Free Software Foundation, either version 3 of the + License, or (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Affero General Public License for more details. + + You should have received a copy of the GNU Affero General Public License + along with this program. If not, see . + +Also add information on how to contact you by electronic and paper +mail. + +If your software can interact with users remotely through a computer +network, you should also make sure that it provides a way for users to +get its source. For example, if your program is a web application, its +interface could display a "Source" link that leads users to an archive +of the code. There are many ways you could offer source, and different +solutions will be better for different programs; see section 13 for +the specific requirements. + +You should also get your employer (if you work as a programmer) or +school, if any, to sign a "copyright disclaimer" for the program, if +necessary. For more information on this, and how to apply and follow +the GNU AGPL, see . +``` diff --git a/license/fdl1.md b/license/fdl1.md new file mode 100644 index 0000000..97e5994 --- /dev/null +++ b/license/fdl1.md @@ -0,0 +1,447 @@ +``` +### GNU Free Documentation License + +Version 1.3, 3 November 2008 + +Copyright (C) 2000, 2001, 2002, 2007, 2008 Free Software Foundation, +Inc. + +Everyone is permitted to copy and distribute verbatim copies of this +license document, but changing it is not allowed. + +#### 0. PREAMBLE + +The purpose of this License is to make a manual, textbook, or other +functional and useful document "free" in the sense of freedom: to +assure everyone the effective freedom to copy and redistribute it, +with or without modifying it, either commercially or noncommercially. +Secondarily, this License preserves for the author and publisher a way +to get credit for their work, while not being considered responsible +for modifications made by others. + +This License is a kind of "copyleft", which means that derivative +works of the document must themselves be free in the same sense. It +complements the GNU General Public License, which is a copyleft +license designed for free software. + +We have designed this License in order to use it for manuals for free +software, because free software needs free documentation: a free +program should come with manuals providing the same freedoms that the +software does. But this License is not limited to software manuals; it +can be used for any textual work, regardless of subject matter or +whether it is published as a printed book. We recommend this License +principally for works whose purpose is instruction or reference. + +#### 1. APPLICABILITY AND DEFINITIONS + +This License applies to any manual or other work, in any medium, that +contains a notice placed by the copyright holder saying it can be +distributed under the terms of this License. Such a notice grants a +world-wide, royalty-free license, unlimited in duration, to use that +work under the conditions stated herein. The "Document", below, refers +to any such manual or work. Any member of the public is a licensee, +and is addressed as "you". You accept the license if you copy, modify +or distribute the work in a way requiring permission under copyright +law. + +A "Modified Version" of the Document means any work containing the +Document or a portion of it, either copied verbatim, or with +modifications and/or translated into another language. + +A "Secondary Section" is a named appendix or a front-matter section of +the Document that deals exclusively with the relationship of the +publishers or authors of the Document to the Document's overall +subject (or to related matters) and contains nothing that could fall +directly within that overall subject. (Thus, if the Document is in +part a textbook of mathematics, a Secondary Section may not explain +any mathematics.) The relationship could be a matter of historical +connection with the subject or with related matters, or of legal, +commercial, philosophical, ethical or political position regarding +them. + +The "Invariant Sections" are certain Secondary Sections whose titles +are designated, as being those of Invariant Sections, in the notice +that says that the Document is released under this License. If a +section does not fit the above definition of Secondary then it is not +allowed to be designated as Invariant. The Document may contain zero +Invariant Sections. If the Document does not identify any Invariant +Sections then there are none. + +The "Cover Texts" are certain short passages of text that are listed, +as Front-Cover Texts or Back-Cover Texts, in the notice that says that +the Document is released under this License. A Front-Cover Text may be +at most 5 words, and a Back-Cover Text may be at most 25 words. + +A "Transparent" copy of the Document means a machine-readable copy, +represented in a format whose specification is available to the +general public, that is suitable for revising the document +straightforwardly with generic text editors or (for images composed of +pixels) generic paint programs or (for drawings) some widely available +drawing editor, and that is suitable for input to text formatters or +for automatic translation to a variety of formats suitable for input +to text formatters. A copy made in an otherwise Transparent file +format whose markup, or absence of markup, has been arranged to thwart +or discourage subsequent modification by readers is not Transparent. +An image format is not Transparent if used for any substantial amount +of text. A copy that is not "Transparent" is called "Opaque". + +Examples of suitable formats for Transparent copies include plain +ASCII without markup, Texinfo input format, LaTeX input format, SGML +or XML using a publicly available DTD, and standard-conforming simple +HTML, PostScript or PDF designed for human modification. Examples of +transparent image formats include PNG, XCF and JPG. Opaque formats +include proprietary formats that can be read and edited only by +proprietary word processors, SGML or XML for which the DTD and/or +processing tools are not generally available, and the +machine-generated HTML, PostScript or PDF produced by some word +processors for output purposes only. + +The "Title Page" means, for a printed book, the title page itself, +plus such following pages as are needed to hold, legibly, the material +this License requires to appear in the title page. For works in +formats which do not have any title page as such, "Title Page" means +the text near the most prominent appearance of the work's title, +preceding the beginning of the body of the text. + +The "publisher" means any person or entity that distributes copies of +the Document to the public. + +A section "Entitled XYZ" means a named subunit of the Document whose +title either is precisely XYZ or contains XYZ in parentheses following +text that translates XYZ in another language. (Here XYZ stands for a +specific section name mentioned below, such as "Acknowledgements", +"Dedications", "Endorsements", or "History".) To "Preserve the Title" +of such a section when you modify the Document means that it remains a +section "Entitled XYZ" according to this definition. + +The Document may include Warranty Disclaimers next to the notice which +states that this License applies to the Document. These Warranty +Disclaimers are considered to be included by reference in this +License, but only as regards disclaiming warranties: any other +implication that these Warranty Disclaimers may have is void and has +no effect on the meaning of this License. + +#### 2. VERBATIM COPYING + +You may copy and distribute the Document in any medium, either +commercially or noncommercially, provided that this License, the +copyright notices, and the license notice saying this License applies +to the Document are reproduced in all copies, and that you add no +other conditions whatsoever to those of this License. You may not use +technical measures to obstruct or control the reading or further +copying of the copies you make or distribute. However, you may accept +compensation in exchange for copies. If you distribute a large enough +number of copies you must also follow the conditions in section 3. + +You may also lend copies, under the same conditions stated above, and +you may publicly display copies. + +#### 3. COPYING IN QUANTITY + +If you publish printed copies (or copies in media that commonly have +printed covers) of the Document, numbering more than 100, and the +Document's license notice requires Cover Texts, you must enclose the +copies in covers that carry, clearly and legibly, all these Cover +Texts: Front-Cover Texts on the front cover, and Back-Cover Texts on +the back cover. Both covers must also clearly and legibly identify you +as the publisher of these copies. The front cover must present the +full title with all words of the title equally prominent and visible. +You may add other material on the covers in addition. Copying with +changes limited to the covers, as long as they preserve the title of +the Document and satisfy these conditions, can be treated as verbatim +copying in other respects. + +If the required texts for either cover are too voluminous to fit +legibly, you should put the first ones listed (as many as fit +reasonably) on the actual cover, and continue the rest onto adjacent +pages. + +If you publish or distribute Opaque copies of the Document numbering +more than 100, you must either include a machine-readable Transparent +copy along with each Opaque copy, or state in or with each Opaque copy +a computer-network location from which the general network-using +public has access to download using public-standard network protocols +a complete Transparent copy of the Document, free of added material. +If you use the latter option, you must take reasonably prudent steps, +when you begin distribution of Opaque copies in quantity, to ensure +that this Transparent copy will remain thus accessible at the stated +location until at least one year after the last time you distribute an +Opaque copy (directly or through your agents or retailers) of that +edition to the public. + +It is requested, but not required, that you contact the authors of the +Document well before redistributing any large number of copies, to +give them a chance to provide you with an updated version of the +Document. + +#### 4. MODIFICATIONS + +You may copy and distribute a Modified Version of the Document under +the conditions of sections 2 and 3 above, provided that you release +the Modified Version under precisely this License, with the Modified +Version filling the role of the Document, thus licensing distribution +and modification of the Modified Version to whoever possesses a copy +of it. In addition, you must do these things in the Modified Version: + +- A. Use in the Title Page (and on the covers, if any) a title + distinct from that of the Document, and from those of previous + versions (which should, if there were any, be listed in the + History section of the Document). You may use the same title as a + previous version if the original publisher of that version + gives permission. +- B. List on the Title Page, as authors, one or more persons or + entities responsible for authorship of the modifications in the + Modified Version, together with at least five of the principal + authors of the Document (all of its principal authors, if it has + fewer than five), unless they release you from this requirement. +- C. State on the Title page the name of the publisher of the + Modified Version, as the publisher. +- D. Preserve all the copyright notices of the Document. +- E. Add an appropriate copyright notice for your modifications + adjacent to the other copyright notices. +- F. Include, immediately after the copyright notices, a license + notice giving the public permission to use the Modified Version + under the terms of this License, in the form shown in the + Addendum below. +- G. Preserve in that license notice the full lists of Invariant + Sections and required Cover Texts given in the Document's + license notice. +- H. Include an unaltered copy of this License. +- I. Preserve the section Entitled "History", Preserve its Title, + and add to it an item stating at least the title, year, new + authors, and publisher of the Modified Version as given on the + Title Page. If there is no section Entitled "History" in the + Document, create one stating the title, year, authors, and + publisher of the Document as given on its Title Page, then add an + item describing the Modified Version as stated in the + previous sentence. +- J. Preserve the network location, if any, given in the Document + for public access to a Transparent copy of the Document, and + likewise the network locations given in the Document for previous + versions it was based on. These may be placed in the "History" + section. You may omit a network location for a work that was + published at least four years before the Document itself, or if + the original publisher of the version it refers to + gives permission. +- K. For any section Entitled "Acknowledgements" or "Dedications", + Preserve the Title of the section, and preserve in the section all + the substance and tone of each of the contributor acknowledgements + and/or dedications given therein. +- L. Preserve all the Invariant Sections of the Document, unaltered + in their text and in their titles. Section numbers or the + equivalent are not considered part of the section titles. +- M. Delete any section Entitled "Endorsements". Such a section may + not be included in the Modified Version. +- N. Do not retitle any existing section to be Entitled + "Endorsements" or to conflict in title with any Invariant Section. +- O. Preserve any Warranty Disclaimers. + +If the Modified Version includes new front-matter sections or +appendices that qualify as Secondary Sections and contain no material +copied from the Document, you may at your option designate some or all +of these sections as invariant. To do this, add their titles to the +list of Invariant Sections in the Modified Version's license notice. +These titles must be distinct from any other section titles. + +You may add a section Entitled "Endorsements", provided it contains +nothing but endorsements of your Modified Version by various +parties—for example, statements of peer review or that the text has +been approved by an organization as the authoritative definition of a +standard. + +You may add a passage of up to five words as a Front-Cover Text, and a +passage of up to 25 words as a Back-Cover Text, to the end of the list +of Cover Texts in the Modified Version. Only one passage of +Front-Cover Text and one of Back-Cover Text may be added by (or +through arrangements made by) any one entity. If the Document already +includes a cover text for the same cover, previously added by you or +by arrangement made by the same entity you are acting on behalf of, +you may not add another; but you may replace the old one, on explicit +permission from the previous publisher that added the old one. + +The author(s) and publisher(s) of the Document do not by this License +give permission to use their names for publicity for or to assert or +imply endorsement of any Modified Version. + +#### 5. COMBINING DOCUMENTS + +You may combine the Document with other documents released under this +License, under the terms defined in section 4 above for modified +versions, provided that you include in the combination all of the +Invariant Sections of all of the original documents, unmodified, and +list them all as Invariant Sections of your combined work in its +license notice, and that you preserve all their Warranty Disclaimers. + +The combined work need only contain one copy of this License, and +multiple identical Invariant Sections may be replaced with a single +copy. If there are multiple Invariant Sections with the same name but +different contents, make the title of each such section unique by +adding at the end of it, in parentheses, the name of the original +author or publisher of that section if known, or else a unique number. +Make the same adjustment to the section titles in the list of +Invariant Sections in the license notice of the combined work. + +In the combination, you must combine any sections Entitled "History" +in the various original documents, forming one section Entitled +"History"; likewise combine any sections Entitled "Acknowledgements", +and any sections Entitled "Dedications". You must delete all sections +Entitled "Endorsements". + +#### 6. COLLECTIONS OF DOCUMENTS + +You may make a collection consisting of the Document and other +documents released under this License, and replace the individual +copies of this License in the various documents with a single copy +that is included in the collection, provided that you follow the rules +of this License for verbatim copying of each of the documents in all +other respects. + +You may extract a single document from such a collection, and +distribute it individually under this License, provided you insert a +copy of this License into the extracted document, and follow this +License in all other respects regarding verbatim copying of that +document. + +#### 7. AGGREGATION WITH INDEPENDENT WORKS + +A compilation of the Document or its derivatives with other separate +and independent documents or works, in or on a volume of a storage or +distribution medium, is called an "aggregate" if the copyright +resulting from the compilation is not used to limit the legal rights +of the compilation's users beyond what the individual works permit. +When the Document is included in an aggregate, this License does not +apply to the other works in the aggregate which are not themselves +derivative works of the Document. + +If the Cover Text requirement of section 3 is applicable to these +copies of the Document, then if the Document is less than one half of +the entire aggregate, the Document's Cover Texts may be placed on +covers that bracket the Document within the aggregate, or the +electronic equivalent of covers if the Document is in electronic form. +Otherwise they must appear on printed covers that bracket the whole +aggregate. + +#### 8. TRANSLATION + +Translation is considered a kind of modification, so you may +distribute translations of the Document under the terms of section 4. +Replacing Invariant Sections with translations requires special +permission from their copyright holders, but you may include +translations of some or all Invariant Sections in addition to the +original versions of these Invariant Sections. You may include a +translation of this License, and all the license notices in the +Document, and any Warranty Disclaimers, provided that you also include +the original English version of this License and the original versions +of those notices and disclaimers. In case of a disagreement between +the translation and the original version of this License or a notice +or disclaimer, the original version will prevail. + +If a section in the Document is Entitled "Acknowledgements", +"Dedications", or "History", the requirement (section 4) to Preserve +its Title (section 1) will typically require changing the actual +title. + +#### 9. TERMINATION + +You may not copy, modify, sublicense, or distribute the Document +except as expressly provided under this License. Any attempt otherwise +to copy, modify, sublicense, or distribute it is void, and will +automatically terminate your rights under this License. + +However, if you cease all violation of this License, then your license +from a particular copyright holder is reinstated (a) provisionally, +unless and until the copyright holder explicitly and finally +terminates your license, and (b) permanently, if the copyright holder +fails to notify you of the violation by some reasonable means prior to +60 days after the cessation. + +Moreover, your license from a particular copyright holder is +reinstated permanently if the copyright holder notifies you of the +violation by some reasonable means, this is the first time you have +received notice of violation of this License (for any work) from that +copyright holder, and you cure the violation prior to 30 days after +your receipt of the notice. + +Termination of your rights under this section does not terminate the +licenses of parties who have received copies or rights from you under +this License. If your rights have been terminated and not permanently +reinstated, receipt of a copy of some or all of the same material does +not give you any rights to use it. + +#### 10. FUTURE REVISIONS OF THIS LICENSE + +The Free Software Foundation may publish new, revised versions of the +GNU Free Documentation License from time to time. Such new versions +will be similar in spirit to the present version, but may differ in +detail to address new problems or concerns. See +. + +Each version of the License is given a distinguishing version number. +If the Document specifies that a particular numbered version of this +License "or any later version" applies to it, you have the option of +following the terms and conditions either of that specified version or +of any later version that has been published (not as a draft) by the +Free Software Foundation. If the Document does not specify a version +number of this License, you may choose any version ever published (not +as a draft) by the Free Software Foundation. If the Document specifies +that a proxy can decide which future versions of this License can be +used, that proxy's public statement of acceptance of a version +permanently authorizes you to choose that version for the Document. + +#### 11. RELICENSING + +"Massive Multiauthor Collaboration Site" (or "MMC Site") means any +World Wide Web server that publishes copyrightable works and also +provides prominent facilities for anybody to edit those works. A +public wiki that anybody can edit is an example of such a server. A +"Massive Multiauthor Collaboration" (or "MMC") contained in the site +means any set of copyrightable works thus published on the MMC site. + +"CC-BY-SA" means the Creative Commons Attribution-Share Alike 3.0 +license published by Creative Commons Corporation, a not-for-profit +corporation with a principal place of business in San Francisco, +California, as well as future copyleft versions of that license +published by that same organization. + +"Incorporate" means to publish or republish a Document, in whole or in +part, as part of another Document. + +An MMC is "eligible for relicensing" if it is licensed under this +License, and if all works that were first published under this License +somewhere other than this MMC, and subsequently incorporated in whole +or in part into the MMC, (1) had no cover texts or invariant sections, +and (2) were thus incorporated prior to November 1, 2008. + +The operator of an MMC Site may republish an MMC contained in the site +under CC-BY-SA on the same site at any time before August 1, 2009, +provided the MMC is eligible for relicensing. + +### ADDENDUM: How to use this License for your documents + +To use this License in a document you have written, include a copy of +the License in the document and put the following copyright and +license notices just after the title page: + + Copyright (C) YEAR YOUR NAME. + Permission is granted to copy, distribute and/or modify this document + under the terms of the GNU Free Documentation License, Version 1.3 + or any later version published by the Free Software Foundation; + with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. + A copy of the license is included in the section entitled "GNU + Free Documentation License". + +If you have Invariant Sections, Front-Cover Texts and Back-Cover +Texts, replace the "with … Texts." line with this: + + with the Invariant Sections being LIST THEIR TITLES, with the + Front-Cover Texts being LIST, and with the Back-Cover Texts being LIST. + +If you have Invariant Sections without Cover Texts, or some other +combination of the three, merge those two alternatives to suit the +situation. + +If your document contains nontrivial examples of program code, we +recommend releasing these examples in parallel under your choice of +free software license, such as the GNU General Public License, to +permit their use in free software. +``` diff --git a/license/gpl3.md b/license/gpl3.md new file mode 100644 index 0000000..2fb2e74 --- /dev/null +++ b/license/gpl3.md @@ -0,0 +1,675 @@ +### GNU GENERAL PUBLIC LICENSE + +Version 3, 29 June 2007 + +Copyright (C) 2007 Free Software Foundation, Inc. + + +Everyone is permitted to copy and distribute verbatim copies of this +license document, but changing it is not allowed. + +### Preamble + +The GNU General Public License is a free, copyleft license for +software and other kinds of works. + +The licenses for most software and other practical works are designed +to take away your freedom to share and change the works. By contrast, +the GNU General Public License is intended to guarantee your freedom +to share and change all versions of a program--to make sure it remains +free software for all its users. We, the Free Software Foundation, use +the GNU General Public License for most of our software; it applies +also to any other work released this way by its authors. You can apply +it to your programs, too. + +When we speak of free software, we are referring to freedom, not +price. Our General Public Licenses are designed to make sure that you +have the freedom to distribute copies of free software (and charge for +them if you wish), that you receive source code or can get it if you +want it, that you can change the software or use pieces of it in new +free programs, and that you know you can do these things. + +To protect your rights, we need to prevent others from denying you +these rights or asking you to surrender the rights. Therefore, you +have certain responsibilities if you distribute copies of the +software, or if you modify it: responsibilities to respect the freedom +of others. + +For example, if you distribute copies of such a program, whether +gratis or for a fee, you must pass on to the recipients the same +freedoms that you received. You must make sure that they, too, receive +or can get the source code. And you must show them these terms so they +know their rights. + +Developers that use the GNU GPL protect your rights with two steps: +(1) assert copyright on the software, and (2) offer you this License +giving you legal permission to copy, distribute and/or modify it. + +For the developers' and authors' protection, the GPL clearly explains +that there is no warranty for this free software. For both users' and +authors' sake, the GPL requires that modified versions be marked as +changed, so that their problems will not be attributed erroneously to +authors of previous versions. + +Some devices are designed to deny users access to install or run +modified versions of the software inside them, although the +manufacturer can do so. This is fundamentally incompatible with the +aim of protecting users' freedom to change the software. The +systematic pattern of such abuse occurs in the area of products for +individuals to use, which is precisely where it is most unacceptable. +Therefore, we have designed this version of the GPL to prohibit the +practice for those products. If such problems arise substantially in +other domains, we stand ready to extend this provision to those +domains in future versions of the GPL, as needed to protect the +freedom of users. + +Finally, every program is threatened constantly by software patents. +States should not allow patents to restrict development and use of +software on general-purpose computers, but in those that do, we wish +to avoid the special danger that patents applied to a free program +could make it effectively proprietary. To prevent this, the GPL +assures that patents cannot be used to render the program non-free. + +The precise terms and conditions for copying, distribution and +modification follow. + +### TERMS AND CONDITIONS + +#### 0. Definitions. + +"This License" refers to version 3 of the GNU General Public License. + +"Copyright" also means copyright-like laws that apply to other kinds +of works, such as semiconductor masks. + +"The Program" refers to any copyrightable work licensed under this +License. Each licensee is addressed as "you". "Licensees" and +"recipients" may be individuals or organizations. + +To "modify" a work means to copy from or adapt all or part of the work +in a fashion requiring copyright permission, other than the making of +an exact copy. The resulting work is called a "modified version" of +the earlier work or a work "based on" the earlier work. + +A "covered work" means either the unmodified Program or a work based +on the Program. + +To "propagate" a work means to do anything with it that, without +permission, would make you directly or secondarily liable for +infringement under applicable copyright law, except executing it on a +computer or modifying a private copy. Propagation includes copying, +distribution (with or without modification), making available to the +public, and in some countries other activities as well. + +To "convey" a work means any kind of propagation that enables other +parties to make or receive copies. Mere interaction with a user +through a computer network, with no transfer of a copy, is not +conveying. + +An interactive user interface displays "Appropriate Legal Notices" to +the extent that it includes a convenient and prominently visible +feature that (1) displays an appropriate copyright notice, and (2) +tells the user that there is no warranty for the work (except to the +extent that warranties are provided), that licensees may convey the +work under this License, and how to view a copy of this License. If +the interface presents a list of user commands or options, such as a +menu, a prominent item in the list meets this criterion. + +#### 1. Source Code. + +The "source code" for a work means the preferred form of the work for +making modifications to it. "Object code" means any non-source form of +a work. + +A "Standard Interface" means an interface that either is an official +standard defined by a recognized standards body, or, in the case of +interfaces specified for a particular programming language, one that +is widely used among developers working in that language. + +The "System Libraries" of an executable work include anything, other +than the work as a whole, that (a) is included in the normal form of +packaging a Major Component, but which is not part of that Major +Component, and (b) serves only to enable use of the work with that +Major Component, or to implement a Standard Interface for which an +implementation is available to the public in source code form. A +"Major Component", in this context, means a major essential component +(kernel, window system, and so on) of the specific operating system +(if any) on which the executable work runs, or a compiler used to +produce the work, or an object code interpreter used to run it. + +The "Corresponding Source" for a work in object code form means all +the source code needed to generate, install, and (for an executable +work) run the object code and to modify the work, including scripts to +control those activities. However, it does not include the work's +System Libraries, or general-purpose tools or generally available free +programs which are used unmodified in performing those activities but +which are not part of the work. For example, Corresponding Source +includes interface definition files associated with source files for +the work, and the source code for shared libraries and dynamically +linked subprograms that the work is specifically designed to require, +such as by intimate data communication or control flow between those +subprograms and other parts of the work. + +The Corresponding Source need not include anything that users can +regenerate automatically from other parts of the Corresponding Source. + +The Corresponding Source for a work in source code form is that same +work. + +#### 2. Basic Permissions. + +All rights granted under this License are granted for the term of +copyright on the Program, and are irrevocable provided the stated +conditions are met. This License explicitly affirms your unlimited +permission to run the unmodified Program. The output from running a +covered work is covered by this License only if the output, given its +content, constitutes a covered work. This License acknowledges your +rights of fair use or other equivalent, as provided by copyright law. + +You may make, run and propagate covered works that you do not convey, +without conditions so long as your license otherwise remains in force. +You may convey covered works to others for the sole purpose of having +them make modifications exclusively for you, or provide you with +facilities for running those works, provided that you comply with the +terms of this License in conveying all material for which you do not +control copyright. Those thus making or running the covered works for +you must do so exclusively on your behalf, under your direction and +control, on terms that prohibit them from making any copies of your +copyrighted material outside their relationship with you. + +Conveying under any other circumstances is permitted solely under the +conditions stated below. Sublicensing is not allowed; section 10 makes +it unnecessary. + +#### 3. Protecting Users' Legal Rights From Anti-Circumvention Law. + +No covered work shall be deemed part of an effective technological +measure under any applicable law fulfilling obligations under article +11 of the WIPO copyright treaty adopted on 20 December 1996, or +similar laws prohibiting or restricting circumvention of such +measures. + +When you convey a covered work, you waive any legal power to forbid +circumvention of technological measures to the extent such +circumvention is effected by exercising rights under this License with +respect to the covered work, and you disclaim any intention to limit +operation or modification of the work as a means of enforcing, against +the work's users, your or third parties' legal rights to forbid +circumvention of technological measures. + +#### 4. Conveying Verbatim Copies. + +You may convey verbatim copies of the Program's source code as you +receive it, in any medium, provided that you conspicuously and +appropriately publish on each copy an appropriate copyright notice; +keep intact all notices stating that this License and any +non-permissive terms added in accord with section 7 apply to the code; +keep intact all notices of the absence of any warranty; and give all +recipients a copy of this License along with the Program. + +You may charge any price or no price for each copy that you convey, +and you may offer support or warranty protection for a fee. + +#### 5. Conveying Modified Source Versions. + +You may convey a work based on the Program, or the modifications to +produce it from the Program, in the form of source code under the +terms of section 4, provided that you also meet all of these +conditions: + +- a) The work must carry prominent notices stating that you modified + it, and giving a relevant date. +- b) The work must carry prominent notices stating that it is + released under this License and any conditions added under + section 7. This requirement modifies the requirement in section 4 + to "keep intact all notices". +- c) You must license the entire work, as a whole, under this + License to anyone who comes into possession of a copy. This + License will therefore apply, along with any applicable section 7 + additional terms, to the whole of the work, and all its parts, + regardless of how they are packaged. This License gives no + permission to license the work in any other way, but it does not + invalidate such permission if you have separately received it. +- d) If the work has interactive user interfaces, each must display + Appropriate Legal Notices; however, if the Program has interactive + interfaces that do not display Appropriate Legal Notices, your + work need not make them do so. + +A compilation of a covered work with other separate and independent +works, which are not by their nature extensions of the covered work, +and which are not combined with it such as to form a larger program, +in or on a volume of a storage or distribution medium, is called an +"aggregate" if the compilation and its resulting copyright are not +used to limit the access or legal rights of the compilation's users +beyond what the individual works permit. Inclusion of a covered work +in an aggregate does not cause this License to apply to the other +parts of the aggregate. + +#### 6. Conveying Non-Source Forms. + +You may convey a covered work in object code form under the terms of +sections 4 and 5, provided that you also convey the machine-readable +Corresponding Source under the terms of this License, in one of these +ways: + +- a) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by the + Corresponding Source fixed on a durable physical medium + customarily used for software interchange. +- b) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by a + written offer, valid for at least three years and valid for as + long as you offer spare parts or customer support for that product + model, to give anyone who possesses the object code either (1) a + copy of the Corresponding Source for all the software in the + product that is covered by this License, on a durable physical + medium customarily used for software interchange, for a price no + more than your reasonable cost of physically performing this + conveying of source, or (2) access to copy the Corresponding + Source from a network server at no charge. +- c) Convey individual copies of the object code with a copy of the + written offer to provide the Corresponding Source. This + alternative is allowed only occasionally and noncommercially, and + only if you received the object code with such an offer, in accord + with subsection 6b. +- d) Convey the object code by offering access from a designated + place (gratis or for a charge), and offer equivalent access to the + Corresponding Source in the same way through the same place at no + further charge. You need not require recipients to copy the + Corresponding Source along with the object code. If the place to + copy the object code is a network server, the Corresponding Source + may be on a different server (operated by you or a third party) + that supports equivalent copying facilities, provided you maintain + clear directions next to the object code saying where to find the + Corresponding Source. Regardless of what server hosts the + Corresponding Source, you remain obligated to ensure that it is + available for as long as needed to satisfy these requirements. +- e) Convey the object code using peer-to-peer transmission, + provided you inform other peers where the object code and + Corresponding Source of the work are being offered to the general + public at no charge under subsection 6d. + +A separable portion of the object code, whose source code is excluded +from the Corresponding Source as a System Library, need not be +included in conveying the object code work. + +A "User Product" is either (1) a "consumer product", which means any +tangible personal property which is normally used for personal, +family, or household purposes, or (2) anything designed or sold for +incorporation into a dwelling. In determining whether a product is a +consumer product, doubtful cases shall be resolved in favor of +coverage. For a particular product received by a particular user, +"normally used" refers to a typical or common use of that class of +product, regardless of the status of the particular user or of the way +in which the particular user actually uses, or expects or is expected +to use, the product. A product is a consumer product regardless of +whether the product has substantial commercial, industrial or +non-consumer uses, unless such uses represent the only significant +mode of use of the product. + +"Installation Information" for a User Product means any methods, +procedures, authorization keys, or other information required to +install and execute modified versions of a covered work in that User +Product from a modified version of its Corresponding Source. The +information must suffice to ensure that the continued functioning of +the modified object code is in no case prevented or interfered with +solely because modification has been made. + +If you convey an object code work under this section in, or with, or +specifically for use in, a User Product, and the conveying occurs as +part of a transaction in which the right of possession and use of the +User Product is transferred to the recipient in perpetuity or for a +fixed term (regardless of how the transaction is characterized), the +Corresponding Source conveyed under this section must be accompanied +by the Installation Information. But this requirement does not apply +if neither you nor any third party retains the ability to install +modified object code on the User Product (for example, the work has +been installed in ROM). + +The requirement to provide Installation Information does not include a +requirement to continue to provide support service, warranty, or +updates for a work that has been modified or installed by the +recipient, or for the User Product in which it has been modified or +installed. Access to a network may be denied when the modification +itself materially and adversely affects the operation of the network +or violates the rules and protocols for communication across the +network. + +Corresponding Source conveyed, and Installation Information provided, +in accord with this section must be in a format that is publicly +documented (and with an implementation available to the public in +source code form), and must require no special password or key for +unpacking, reading or copying. + +#### 7. Additional Terms. + +"Additional permissions" are terms that supplement the terms of this +License by making exceptions from one or more of its conditions. +Additional permissions that are applicable to the entire Program shall +be treated as though they were included in this License, to the extent +that they are valid under applicable law. If additional permissions +apply only to part of the Program, that part may be used separately +under those permissions, but the entire Program remains governed by +this License without regard to the additional permissions. + +When you convey a copy of a covered work, you may at your option +remove any additional permissions from that copy, or from any part of +it. (Additional permissions may be written to require their own +removal in certain cases when you modify the work.) You may place +additional permissions on material, added by you to a covered work, +for which you have or can give appropriate copyright permission. + +Notwithstanding any other provision of this License, for material you +add to a covered work, you may (if authorized by the copyright holders +of that material) supplement the terms of this License with terms: + +- a) Disclaiming warranty or limiting liability differently from the + terms of sections 15 and 16 of this License; or +- b) Requiring preservation of specified reasonable legal notices or + author attributions in that material or in the Appropriate Legal + Notices displayed by works containing it; or +- c) Prohibiting misrepresentation of the origin of that material, + or requiring that modified versions of such material be marked in + reasonable ways as different from the original version; or +- d) Limiting the use for publicity purposes of names of licensors + or authors of the material; or +- e) Declining to grant rights under trademark law for use of some + trade names, trademarks, or service marks; or +- f) Requiring indemnification of licensors and authors of that + material by anyone who conveys the material (or modified versions + of it) with contractual assumptions of liability to the recipient, + for any liability that these contractual assumptions directly + impose on those licensors and authors. + +All other non-permissive additional terms are considered "further +restrictions" within the meaning of section 10. If the Program as you +received it, or any part of it, contains a notice stating that it is +governed by this License along with a term that is a further +restriction, you may remove that term. If a license document contains +a further restriction but permits relicensing or conveying under this +License, you may add to a covered work material governed by the terms +of that license document, provided that the further restriction does +not survive such relicensing or conveying. + +If you add terms to a covered work in accord with this section, you +must place, in the relevant source files, a statement of the +additional terms that apply to those files, or a notice indicating +where to find the applicable terms. + +Additional terms, permissive or non-permissive, may be stated in the +form of a separately written license, or stated as exceptions; the +above requirements apply either way. + +#### 8. Termination. + +You may not propagate or modify a covered work except as expressly +provided under this License. Any attempt otherwise to propagate or +modify it is void, and will automatically terminate your rights under +this License (including any patent licenses granted under the third +paragraph of section 11). + +However, if you cease all violation of this License, then your license +from a particular copyright holder is reinstated (a) provisionally, +unless and until the copyright holder explicitly and finally +terminates your license, and (b) permanently, if the copyright holder +fails to notify you of the violation by some reasonable means prior to +60 days after the cessation. + +Moreover, your license from a particular copyright holder is +reinstated permanently if the copyright holder notifies you of the +violation by some reasonable means, this is the first time you have +received notice of violation of this License (for any work) from that +copyright holder, and you cure the violation prior to 30 days after +your receipt of the notice. + +Termination of your rights under this section does not terminate the +licenses of parties who have received copies or rights from you under +this License. If your rights have been terminated and not permanently +reinstated, you do not qualify to receive new licenses for the same +material under section 10. + +#### 9. Acceptance Not Required for Having Copies. + +You are not required to accept this License in order to receive or run +a copy of the Program. Ancillary propagation of a covered work +occurring solely as a consequence of using peer-to-peer transmission +to receive a copy likewise does not require acceptance. However, +nothing other than this License grants you permission to propagate or +modify any covered work. These actions infringe copyright if you do +not accept this License. Therefore, by modifying or propagating a +covered work, you indicate your acceptance of this License to do so. + +#### 10. Automatic Licensing of Downstream Recipients. + +Each time you convey a covered work, the recipient automatically +receives a license from the original licensors, to run, modify and +propagate that work, subject to this License. You are not responsible +for enforcing compliance by third parties with this License. + +An "entity transaction" is a transaction transferring control of an +organization, or substantially all assets of one, or subdividing an +organization, or merging organizations. If propagation of a covered +work results from an entity transaction, each party to that +transaction who receives a copy of the work also receives whatever +licenses to the work the party's predecessor in interest had or could +give under the previous paragraph, plus a right to possession of the +Corresponding Source of the work from the predecessor in interest, if +the predecessor has it or can get it with reasonable efforts. + +You may not impose any further restrictions on the exercise of the +rights granted or affirmed under this License. For example, you may +not impose a license fee, royalty, or other charge for exercise of +rights granted under this License, and you may not initiate litigation +(including a cross-claim or counterclaim in a lawsuit) alleging that +any patent claim is infringed by making, using, selling, offering for +sale, or importing the Program or any portion of it. + +#### 11. Patents. + +A "contributor" is a copyright holder who authorizes use under this +License of the Program or a work on which the Program is based. The +work thus licensed is called the contributor's "contributor version". + +A contributor's "essential patent claims" are all patent claims owned +or controlled by the contributor, whether already acquired or +hereafter acquired, that would be infringed by some manner, permitted +by this License, of making, using, or selling its contributor version, +but do not include claims that would be infringed only as a +consequence of further modification of the contributor version. For +purposes of this definition, "control" includes the right to grant +patent sublicenses in a manner consistent with the requirements of +this License. + +Each contributor grants you a non-exclusive, worldwide, royalty-free +patent license under the contributor's essential patent claims, to +make, use, sell, offer for sale, import and otherwise run, modify and +propagate the contents of its contributor version. + +In the following three paragraphs, a "patent license" is any express +agreement or commitment, however denominated, not to enforce a patent +(such as an express permission to practice a patent or covenant not to +sue for patent infringement). To "grant" such a patent license to a +party means to make such an agreement or commitment not to enforce a +patent against the party. + +If you convey a covered work, knowingly relying on a patent license, +and the Corresponding Source of the work is not available for anyone +to copy, free of charge and under the terms of this License, through a +publicly available network server or other readily accessible means, +then you must either (1) cause the Corresponding Source to be so +available, or (2) arrange to deprive yourself of the benefit of the +patent license for this particular work, or (3) arrange, in a manner +consistent with the requirements of this License, to extend the patent +license to downstream recipients. "Knowingly relying" means you have +actual knowledge that, but for the patent license, your conveying the +covered work in a country, or your recipient's use of the covered work +in a country, would infringe one or more identifiable patents in that +country that you have reason to believe are valid. + +If, pursuant to or in connection with a single transaction or +arrangement, you convey, or propagate by procuring conveyance of, a +covered work, and grant a patent license to some of the parties +receiving the covered work authorizing them to use, propagate, modify +or convey a specific copy of the covered work, then the patent license +you grant is automatically extended to all recipients of the covered +work and works based on it. + +A patent license is "discriminatory" if it does not include within the +scope of its coverage, prohibits the exercise of, or is conditioned on +the non-exercise of one or more of the rights that are specifically +granted under this License. You may not convey a covered work if you +are a party to an arrangement with a third party that is in the +business of distributing software, under which you make payment to the +third party based on the extent of your activity of conveying the +work, and under which the third party grants, to any of the parties +who would receive the covered work from you, a discriminatory patent +license (a) in connection with copies of the covered work conveyed by +you (or copies made from those copies), or (b) primarily for and in +connection with specific products or compilations that contain the +covered work, unless you entered into that arrangement, or that patent +license was granted, prior to 28 March 2007. + +Nothing in this License shall be construed as excluding or limiting +any implied license or other defenses to infringement that may +otherwise be available to you under applicable patent law. + +#### 12. No Surrender of Others' Freedom. + +If conditions are imposed on you (whether by court order, agreement or +otherwise) that contradict the conditions of this License, they do not +excuse you from the conditions of this License. If you cannot convey a +covered work so as to satisfy simultaneously your obligations under +this License and any other pertinent obligations, then as a +consequence you may not convey it at all. For example, if you agree to +terms that obligate you to collect a royalty for further conveying +from those to whom you convey the Program, the only way you could +satisfy both those terms and this License would be to refrain entirely +from conveying the Program. + +#### 13. Use with the GNU Affero General Public License. + +Notwithstanding any other provision of this License, you have +permission to link or combine any covered work with a work licensed +under version 3 of the GNU Affero General Public License into a single +combined work, and to convey the resulting work. The terms of this +License will continue to apply to the part which is the covered work, +but the special requirements of the GNU Affero General Public License, +section 13, concerning interaction through a network will apply to the +combination as such. + +#### 14. Revised Versions of this License. + +The Free Software Foundation may publish revised and/or new versions +of the GNU General Public License from time to time. Such new versions +will be similar in spirit to the present version, but may differ in +detail to address new problems or concerns. + +Each version is given a distinguishing version number. If the Program +specifies that a certain numbered version of the GNU General Public +License "or any later version" applies to it, you have the option of +following the terms and conditions either of that numbered version or +of any later version published by the Free Software Foundation. If the +Program does not specify a version number of the GNU General Public +License, you may choose any version ever published by the Free +Software Foundation. + +If the Program specifies that a proxy can decide which future versions +of the GNU General Public License can be used, that proxy's public +statement of acceptance of a version permanently authorizes you to +choose that version for the Program. + +Later license versions may give you additional or different +permissions. However, no additional obligations are imposed on any +author or copyright holder as a result of your choosing to follow a +later version. + +#### 15. Disclaimer of Warranty. + +THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY +APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT +HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT +WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND +PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE +DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR +CORRECTION. + +#### 16. Limitation of Liability. + +IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR +CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, +INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES +ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT +NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR +LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM +TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER +PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. + +#### 17. Interpretation of Sections 15 and 16. + +If the disclaimer of warranty and limitation of liability provided +above cannot be given local legal effect according to their terms, +reviewing courts shall apply local law that most closely approximates +an absolute waiver of all civil liability in connection with the +Program, unless a warranty or assumption of liability accompanies a +copy of the Program in return for a fee. + +END OF TERMS AND CONDITIONS + +### How to Apply These Terms to Your New Programs + +If you develop a new program, and you want it to be of the greatest +possible use to the public, the best way to achieve this is to make it +free software which everyone can redistribute and change under these +terms. + +To do so, attach the following notices to the program. It is safest to +attach them to the start of each source file to most effectively state +the exclusion of warranty; and each file should have at least the +"copyright" line and a pointer to where the full notice is found. + + + Copyright (C) + + This program is free software: you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see . + +Also add information on how to contact you by electronic and paper +mail. + +If the program does terminal interaction, make it output a short +notice like this when it starts in an interactive mode: + + Copyright (C) + This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. + This is free software, and you are welcome to redistribute it + under certain conditions; type `show c' for details. + +The hypothetical commands \`show w' and \`show c' should show the +appropriate parts of the General Public License. Of course, your +program's commands might be different; for a GUI interface, you would +use an "about box". + +You should also get your employer (if you work as a programmer) or +school, if any, to sign a "copyright disclaimer" for the program, if +necessary. For more information on this, and how to apply and follow +the GNU GPL, see . + +The GNU General Public License does not permit incorporating your +program into proprietary programs. If your program is a subroutine +library, you may consider it more useful to permit linking proprietary +applications with the library. If this is what you want to do, use the +GNU Lesser General Public License instead of this License. But first, +please read . diff --git a/license/lgpl.md b/license/lgpl.md new file mode 100644 index 0000000..41f13a7 --- /dev/null +++ b/license/lgpl.md @@ -0,0 +1,159 @@ +``` +### GNU LESSER GENERAL PUBLIC LICENSE + +Version 3, 29 June 2007 + +Copyright (C) 2007 Free Software Foundation, Inc. + + +Everyone is permitted to copy and distribute verbatim copies of this +license document, but changing it is not allowed. + +This version of the GNU Lesser General Public License incorporates the +terms and conditions of version 3 of the GNU General Public License, +supplemented by the additional permissions listed below. + +#### 0. Additional Definitions. + +As used herein, "this License" refers to version 3 of the GNU Lesser +General Public License, and the "GNU GPL" refers to version 3 of the +GNU General Public License. + +"The Library" refers to a covered work governed by this License, other +than an Application or a Combined Work as defined below. + +An "Application" is any work that makes use of an interface provided +by the Library, but which is not otherwise based on the Library. +Defining a subclass of a class defined by the Library is deemed a mode +of using an interface provided by the Library. + +A "Combined Work" is a work produced by combining or linking an +Application with the Library. The particular version of the Library +with which the Combined Work was made is also called the "Linked +Version". + +The "Minimal Corresponding Source" for a Combined Work means the +Corresponding Source for the Combined Work, excluding any source code +for portions of the Combined Work that, considered in isolation, are +based on the Application, and not on the Linked Version. + +The "Corresponding Application Code" for a Combined Work means the +object code and/or source code for the Application, including any data +and utility programs needed for reproducing the Combined Work from the +Application, but excluding the System Libraries of the Combined Work. + +#### 1. Exception to Section 3 of the GNU GPL. + +You may convey a covered work under sections 3 and 4 of this License +without being bound by section 3 of the GNU GPL. + +#### 2. Conveying Modified Versions. + +If you modify a copy of the Library, and, in your modifications, a +facility refers to a function or data to be supplied by an Application +that uses the facility (other than as an argument passed when the +facility is invoked), then you may convey a copy of the modified +version: + +- a) under this License, provided that you make a good faith effort + to ensure that, in the event an Application does not supply the + function or data, the facility still operates, and performs + whatever part of its purpose remains meaningful, or +- b) under the GNU GPL, with none of the additional permissions of + this License applicable to that copy. + +#### 3. Object Code Incorporating Material from Library Header Files. + +The object code form of an Application may incorporate material from a +header file that is part of the Library. You may convey such object +code under terms of your choice, provided that, if the incorporated +material is not limited to numerical parameters, data structure +layouts and accessors, or small macros, inline functions and templates +(ten or fewer lines in length), you do both of the following: + +- a) Give prominent notice with each copy of the object code that + the Library is used in it and that the Library and its use are + covered by this License. +- b) Accompany the object code with a copy of the GNU GPL and this + license document. + +#### 4. Combined Works. + +You may convey a Combined Work under terms of your choice that, taken +together, effectively do not restrict modification of the portions of +the Library contained in the Combined Work and reverse engineering for +debugging such modifications, if you also do each of the following: + +- a) Give prominent notice with each copy of the Combined Work that + the Library is used in it and that the Library and its use are + covered by this License. +- b) Accompany the Combined Work with a copy of the GNU GPL and this + license document. +- c) For a Combined Work that displays copyright notices during + execution, include the copyright notice for the Library among + these notices, as well as a reference directing the user to the + copies of the GNU GPL and this license document. +- d) Do one of the following: + - 0) Convey the Minimal Corresponding Source under the terms of + this License, and the Corresponding Application Code in a form + suitable for, and under terms that permit, the user to + recombine or relink the Application with a modified version of + the Linked Version to produce a modified Combined Work, in the + manner specified by section 6 of the GNU GPL for conveying + Corresponding Source. + - 1) Use a suitable shared library mechanism for linking with + the Library. A suitable mechanism is one that (a) uses at run + time a copy of the Library already present on the user's + computer system, and (b) will operate properly with a modified + version of the Library that is interface-compatible with the + Linked Version. +- e) Provide Installation Information, but only if you would + otherwise be required to provide such information under section 6 + of the GNU GPL, and only to the extent that such information is + necessary to install and execute a modified version of the + Combined Work produced by recombining or relinking the Application + with a modified version of the Linked Version. (If you use option + 4d0, the Installation Information must accompany the Minimal + Corresponding Source and Corresponding Application Code. If you + use option 4d1, you must provide the Installation Information in + the manner specified by section 6 of the GNU GPL for conveying + Corresponding Source.) + +#### 5. Combined Libraries. + +You may place library facilities that are a work based on the Library +side by side in a single library together with other library +facilities that are not Applications and are not covered by this +License, and convey such a combined library under terms of your +choice, if you do both of the following: + +- a) Accompany the combined library with a copy of the same work + based on the Library, uncombined with any other library + facilities, conveyed under the terms of this License. +- b) Give prominent notice with the combined library that part of it + is a work based on the Library, and explaining where to find the + accompanying uncombined form of the same work. + +#### 6. Revised Versions of the GNU Lesser General Public License. + +The Free Software Foundation may publish revised and/or new versions +of the GNU Lesser General Public License from time to time. Such new +versions will be similar in spirit to the present version, but may +differ in detail to address new problems or concerns. + +Each version is given a distinguishing version number. If the Library +as you received it specifies that a certain numbered version of the +GNU Lesser General Public License "or any later version" applies to +it, you have the option of following the terms and conditions either +of that published version or of any later version published by the +Free Software Foundation. If the Library as you received it does not +specify a version number of the GNU Lesser General Public License, you +may choose any version of the GNU Lesser General Public License ever +published by the Free Software Foundation. + +If the Library as you received it specifies that a proxy can decide +whether future versions of the GNU Lesser General Public License shall +apply, that proxy's public statement of acceptance of any version is +permanent authorization for you to choose that version for the +Library. +``` diff --git a/license/wtfpl.md b/license/wtfpl.md new file mode 100644 index 0000000..4228b6b --- /dev/null +++ b/license/wtfpl.md @@ -0,0 +1,14 @@ + DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE + Version 2, December 2004 + + Copyright (C) 2004 Sam Hocevar + + Everyone is permitted to copy and distribute verbatim or modified + copies of this license document, and changing it is allowed as long + as the name is changed. + + DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE + TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION + + 0. You just DO WHAT THE FUCK YOU WANT TO. + diff --git a/npm.md b/npm.md new file mode 100644 index 0000000..3accc62 --- /dev/null +++ b/npm.md @@ -0,0 +1,26 @@ +# npm package lists + +sudo npm install -g how2 +sudo npm install -g emoj +sudo npm install -g surge +sudo npm install -g wikit +sudo npm install -g vercel +sudo npm install -g lessmd +sudo npm install -g heroku +sudo npm install -g eslint +sudo npm install -g taskbook +sudo npm install -g prettier +sudo npm install -g @vue/cli +sudo npm install -g gitio-cli +sudo npm install -g now-config +sudo npm install -g speed-test +sudo npm install -g @angular/cli +sudo npm install -g auto-install +sudo npm install -g readme-md-generator +sudo npm install -g npm-check-updates +sudo npm install -g github-feed-cli + +## servers + +sudo npm install -g ghost-cli + diff --git a/osint.md b/osint.md new file mode 100644 index 0000000..8d133ca --- /dev/null +++ b/osint.md @@ -0,0 +1,4 @@ +# OpenSource intellegence tools - OSINT + +theHarvester - https://github.com/laramies/theHarvester +metagoofil - https://github.com/opsdisk/metagoofil diff --git a/shorturls.md b/shorturls.md new file mode 100644 index 0000000..6b3c74f --- /dev/null +++ b/shorturls.md @@ -0,0 +1,5 @@ +# My github short urls + +https://git.io/casjay - /casjay +https://git.io/casjaysdev - /casjaysdev + diff --git a/social.md b/social.md new file mode 100644 index 0000000..51ed735 --- /dev/null +++ b/social.md @@ -0,0 +1,19 @@ +# Social + +#### 4chan + +| 4chan url | name | +|:---|:---| +| `http://4chan.org/c` | `anime` | +| `http://4chan.org/b` | `random` | +| `http://4chan.org/diy` | `diy` | +| `http://4chan.org/g` | `tech` | + +#### reddit + +| reddit url | name | +|:---|:---| +| `http://reddit.com/r/unixporn` | `unixporn` | +| `http://reddit.com/r/wholesomememes` | `wholesomememes` | +| `http://reddit.com/r/explainlikeimfive` | `explainlikeim5` | +| `http://reddit.com/r/programmerhumor` | `programmerhumor` | diff --git a/the-book-of-secret-knowledge.md b/the-book-of-secret-knowledge.md new file mode 100644 index 0000000..4b6cca6 --- /dev/null +++ b/the-book-of-secret-knowledge.md @@ -0,0 +1,4266 @@ +

+ + Master + +

+ +

"Knowledge is powerful, be careful how you use it!"

+ +

A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools, and more.

+ +
+ +

+ + Pull Requests + + + MIT License + +

+ +

+ + + +

+ +
+ Created by + trimstray and + contributors +
+ +

+ +

+ + Looking for a job? +
+ No resume needed. Just prove you can code. +
+ triplebyte +
+
+ Clicking this helps fund this project +

+ +
+ +*** + +## :notebook_with_decorative_cover:  What is it? + +This repository is a collection of various materials and tools that I use every day in my work. It contains a lot of useful information gathered in one piece. It is an invaluable source of knowledge for me that I often look back on. + +## :restroom:  For whom? + +For everyone, really. Here everyone can find their favourite tastes. But to be perfectly honest, it is aimed towards System and Network administrators, DevOps, Pentesters, and Security Researchers. + +## :information_source:  Contributing + +If you find something which doesn't make sense, or something doesn't seem right, please make a pull request and please add valid and well-reasoned explanations about your changes or comments. + +A few simple rules for this project: + +- inviting and clear +- not tiring +- useful + +These below rules may be better: + +- easy to contribute to (Markdown + HTML ...) +- easy to find (simple TOC, maybe it's worth extending them?) + +Url marked **\*** is temporary unavailable. Please don't delete it without confirming that it has permanently expired. + +Before adding a pull request, please see the **[contributing guidelines](.github/CONTRIBUTING.md)**. You should also remember about this: + +```diff ++ This repository is not meant to contain everything but only good quality stuff. +``` + +All **suggestions/PR** are welcome! + +### Code Contributors + +This project exists thanks to all the people who contribute. + + + +### Financial Contributors + +

+ + + + + + +

+ +#### Individuals + +Become a financial contributor and help us sustain our community **[» contribute](https://opencollective.com/the-book-of-secret-knowledge/contribute)**. + +#### Organizations + +Support this project with your organization. Your logo will show up here with a link to your website **[» contribute](https://opencollective.com/the-book-of-secret-knowledge/contribute)**. + +## :gift_heart:  Support + +If this project is useful and important for you or if you really like _the-book-of-secret-knowledge_, you can bring **positive energy** by giving some **good words** or **supporting this project**. Thank you! + +## :newspaper:  RSS Feed & Updates + +GitHub exposes an [RSS/Atom](https://github.com/trimstray/the-book-of-secret-knowledge/commits.atom) feed of the commits, which may also be useful if you want to be kept informed about all changes. + +## :ballot_box_with_check:  ToDo + +- [ ] Add new stuff... +- [ ] Add useful shell functions +- [ ] Add one-liners for collection tools (eg. CLI Tools) +- [ ] Sort order in lists + +New items are also added on a regular basis. + +## :anger:  Table of Contents + +Only main chapters: + +- **[CLI Tools](#cli-tools-toc)** +- **[GUI Tools](#gui-tools-toc)** +- **[Web Tools](#web-tools-toc)** +- **[Systems/Services](#systemsservices-toc)** +- **[Networks](#networks-toc)** +- **[Containers/Orchestration](#containersorchestration-toc)** +- **[Manuals/Howtos/Tutorials](#manualshowtostutorials-toc)** +- **[Inspiring Lists](#inspiring-lists-toc)** +- **[Blogs/Podcasts/Videos](#blogspodcastsvideos-toc)** +- **[Hacking/Penetration Testing](#hackingpenetration-testing-toc)** +- **[Your daily knowledge and news](#your-daily-knowledge-and-news-toc)** +- **[Other Cheat Sheets](#other-cheat-sheets-toc)** +- **[One-liners](#one-liners-toc)** +- **[Shell functions](#shell-functions-toc)** + +## :trident:  The Book of Secret Knowledge (Chapters) + +#### CLI Tools  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: Shells + +

+  :small_orange_diamond: GNU Bash - is an sh-compatible shell that incorporates useful features from the Korn shell and C shell.
+  :small_orange_diamond: Zsh - is a shell designed for interactive use, although it is also a powerful scripting language.
+  :small_orange_diamond: tclsh - is a very powerful cross-platform shell, suitable for a huge range of uses.
+  :small_orange_diamond: bash-it - is a framework for using, developing and maintaining shell scripts and custom commands.
+  :small_orange_diamond: Oh My ZSH! - is the best framework for managing your Zsh configuration.
+  :small_orange_diamond: Oh My Fish - the Fishshell framework.
+  :small_orange_diamond: Starship - the cross-shell prompt written in Rust.
+  :small_orange_diamond: powerlevel10k - is a fast reimplementation of Powerlevel9k ZSH theme.
+

+ +##### :black_small_square: Shell plugins + +

+  :small_orange_diamond: z - tracks the folder you use the most and allow you to jump, without having to type the whole path.
+  :small_orange_diamond: fzf - is a general-purpose command-line fuzzy finder.
+  :small_orange_diamond: zsh-autosuggestions - Fish-like autosuggestions for Zsh.
+  :small_orange_diamond: zsh-syntax-highlighting - Fish shell like syntax highlighting for Zsh.
+

+ +##### :black_small_square: Managers + +

+  :small_orange_diamond: Midnight Commander - is a visual file manager, licensed under GNU General Public License.
+  :small_orange_diamond: ranger - is a VIM-inspired filemanager for the console.
+  :small_orange_diamond: nnn - is a tiny, lightning fast, feature-packed file manager.
+  :small_orange_diamond: screen - is a full-screen window manager that multiplexes a physical terminal.
+  :small_orange_diamond: tmux - is a terminal multiplexer, lets you switch easily between several programs in one terminal.
+  :small_orange_diamond: tmux-cssh - is a tool to set comfortable and easy to use functionality, clustering and synchronizing tmux-sessions.
+

+ +##### :black_small_square: Text editors + +

+  :small_orange_diamond: vi - is one of the most common text editors on Unix.
+  :small_orange_diamond: vim - is a highly configurable text editor.
+  :small_orange_diamond: emacs - is an extensible, customizable, free/libre text editor - and more.
+  :small_orange_diamond: micro - is a modern and intuitive terminal-based text editor.
+  :small_orange_diamond: neovim - is a free open source, powerful, extensible and usable code editor.
+  :small_orange_diamond: spacemacs - a community-driven Emacs distribution.
+

+ +##### :black_small_square: Files and directories + +

+  :small_orange_diamond: fd - is a simple, fast and user-friendly alternative to find.
+  :small_orange_diamond: ncdu - is an easy to use, fast disk usage analyzer.
+

+ +##### :black_small_square: Network + +

+  :small_orange_diamond: PuTTY - is an SSH and telnet client, developed originally by Simon Tatham.
+  :small_orange_diamond: nmap - is a free and open source (license) utility for network discovery and security auditing.
+  :small_orange_diamond: zmap - is a fast single packet network scanner designed for Internet-wide network surveys.
+  :small_orange_diamond: masscan - is the fastest Internet port scanner, spews SYN packets asynchronously.
+  :small_orange_diamond: pbscan - is a faster and more efficient stateless SYN scanner and banner grabber.
+  :small_orange_diamond: hping - is a command-line oriented TCP/IP packet assembler/analyzer.
+  :small_orange_diamond: mtr - is a tool that combines the functionality of the 'traceroute' and 'ping' programs in a single network diagnostic tool.
+  :small_orange_diamond: mylg - is an open source utility which combines the functions of the different network probes in one diagnostic tool.
+  :small_orange_diamond: netcat - is a networking utility which reads and writes data across network connections, using the TCP/IP protocol.
+  :small_orange_diamond: tcpdump - is a powerful command-line packet analyzer.
+  :small_orange_diamond: tshark - is a tool that allows us to dump and analyze network traffic (wireshark cli).
+  :small_orange_diamond: Termshark - is a simple terminal user-interface for tshark.
+  :small_orange_diamond: ngrep - is like GNU grep applied to the network layer.
+  :small_orange_diamond: netsniff-ng - is a Swiss army knife for your daily Linux network plumbing if you will.
+  :small_orange_diamond: sockdump - dump unix domain socket traffic.
+  :small_orange_diamond: stenographer - is a packet capture solution which aims to quickly spool all packets to disk.
+  :small_orange_diamond: tcpterm - visualize packets in TUI.
+  :small_orange_diamond: bmon - is a monitoring and debugging tool to capture networking related statistics and prepare them visually.
+  :small_orange_diamond: iptraf-ng - is a console-based network monitoring program for Linux that displays information about IP traffic.
+  :small_orange_diamond: vnstat - is a network traffic monitor for Linux and BSD.
+  :small_orange_diamond: iPerf3 - is a tool for active measurements of the maximum achievable bandwidth on IP networks.
+  :small_orange_diamond: ethr - is a Network Performance Measurement Tool for TCP, UDP & HTTP.
+  :small_orange_diamond: Etherate - is a Linux CLI based Ethernet and MPLS traffic testing tool.
+  :small_orange_diamond: echoip - is a IP address lookup service.
+  :small_orange_diamond: Nemesis - packet manipulation CLI tool; craft and inject packets of several protocols.
+  :small_orange_diamond: packetfu - a mid-level packet manipulation library for Ruby.
+  :small_orange_diamond: Scapy - packet manipulation library; forge, send, decode, capture packets of a wide number of protocols.
+  :small_orange_diamond: impacket - is a collection of Python classes for working with network protocols.
+  :small_orange_diamond: ssh-audit - is a tool for SSH server auditing.
+  :small_orange_diamond: aria2 - is a lightweight multi-protocol & multi-source command-line download utility.
+  :small_orange_diamond: iptables-tracer - observe the path of packets through the iptables chains.
+

+ +##### :black_small_square: Network (DNS) + +

+  :small_orange_diamond: dnsdiag - is a DNS diagnostics and performance measurement tools.
+  :small_orange_diamond: fierce - is a DNS reconnaissance tool for locating non-contiguous IP space.
+  :small_orange_diamond: subfinder - is a subdomain discovery tool that discovers valid subdomains for websites.
+  :small_orange_diamond: sublist3r - is a fast subdomains enumeration tool for penetration testers.
+  :small_orange_diamond: amass - is tool that obtains subdomain names by scraping data sources, crawling web archives and more.
+  :small_orange_diamond: namebench - provides personalized DNS server recommendations based on your browsing history.
+  :small_orange_diamond: massdns - is a high-performance DNS stub resolver for bulk lookups and reconnaissance.
+  :small_orange_diamond: knock - is a tool to enumerate subdomains on a target domain through a wordlist.
+  :small_orange_diamond: dnsperf - DNS performance testing tools.
+  :small_orange_diamond: dnscrypt-proxy 2 - a flexible DNS proxy, with support for encrypted DNS protocols.
+  :small_orange_diamond: dnsdbq - API client providing access to passive DNS database systems (pDNS at Farsight Security, CIRCL pDNS).
+  :small_orange_diamond: grimd - fast dns proxy, built to black-hole internet advertisements and malware servers.
+

+ +##### :black_small_square: Network (HTTP) + +

+  :small_orange_diamond: Curl - is a command line tool and library for transferring data with URLs.
+  :small_orange_diamond: kurly - is an alternative to the widely popular curl program, written in Golang.
+  :small_orange_diamond: HTTPie - is an user-friendly HTTP client.
+  :small_orange_diamond: wuzz - is an interactive cli tool for HTTP inspection.
+  :small_orange_diamond: h2spec - is a conformance testing tool for HTTP/2 implementation.
+  :small_orange_diamond: h2t - is a simple tool to help sysadmins to hardening their websites.
+  :small_orange_diamond: htrace.sh - is a simple Swiss Army knife for http/https troubleshooting and profiling.
+  :small_orange_diamond: httpstat - is a tool that visualizes curl statistics in a way of beauty and clarity.
+  :small_orange_diamond: httplab - is an interactive web server.
+  :small_orange_diamond: Lynx - is a text browser for the World Wide Web.
+  :small_orange_diamond: HeadlessBrowsers - a list of (almost) all headless web browsers in existence.
+  :small_orange_diamond: ab - is a single-threaded command line tool for measuring the performance of HTTP web servers.
+  :small_orange_diamond: siege - is an http load testing and benchmarking utility.
+  :small_orange_diamond: wrk - is a modern HTTP benchmarking tool capable of generating significant load.
+  :small_orange_diamond: wrk2 - is a constant throughput, correct latency recording variant of wrk.
+  :small_orange_diamond: vegeta - is a constant throughput, correct latency recording variant of wrk.
+  :small_orange_diamond: bombardier - is a fast cross-platform HTTP benchmarking tool written in Go.
+  :small_orange_diamond: gobench - http/https load testing and benchmarking tool.
+  :small_orange_diamond: hey - HTTP load generator, ApacheBench (ab) replacement, formerly known as rakyll/boom.
+  :small_orange_diamond: boom - is a script you can use to quickly smoke-test your web app deployment.
+  :small_orange_diamond: SlowHTTPTest - is a tool that simulates some Application Layer Denial of Service attacks by prolonging HTTP.
+  :small_orange_diamond: gobuster - is a free and open source directory/file & DNS busting tool written in Go.
+  :small_orange_diamond: ssllabs-scan - command-line reference-implementation client for SSL Labs APIs.
+  :small_orange_diamond: http-observatory - Mozilla HTTP Observatory cli version.
+

+ +##### :black_small_square: SSL + +

+  :small_orange_diamond: openssl - is a robust, commercial-grade, and full-featured toolkit for the TLS and SSL protocols.
+  :small_orange_diamond: gnutls-cli - client program to set up a TLS connection to some other computer.
+  :small_orange_diamond: sslyze + - fast and powerful SSL/TLS server scanning library.
+  :small_orange_diamond: sslscan - tests SSL/TLS enabled services to discover supported cipher suites.
+  :small_orange_diamond: testssl.sh - testing TLS/SSL encryption anywhere on any port.
+  :small_orange_diamond: cipherscan - a very simple way to find out which SSL ciphersuites are supported by a target.
+  :small_orange_diamond: spiped - is a utility for creating symmetrically encrypted and authenticated pipes between socket addresses.
+  :small_orange_diamond: Certbot - is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server.
+  :small_orange_diamond: mkcert - simple zero-config tool to make locally trusted development certificates with any names you'd like.
+  :small_orange_diamond: certstrap - tools to bootstrap CAs, certificate requests, and signed certificates.
+  :small_orange_diamond: Sublert - is a security and reconnaissance tool to automatically monitor new subdomains.
+  :small_orange_diamond: mkchain - open source tool to help you build a valid SSL certificate chain.
+

+ +##### :black_small_square: Security + +

+  :small_orange_diamond: SELinux - provides a flexible Mandatory Access Control (MAC) system built into the Linux kernel.
+  :small_orange_diamond: AppArmor - proactively protects the operating system and applications from external or internal threats.
+  :small_orange_diamond: grapheneX - Automated System Hardening Framework.
+  :small_orange_diamond: DevSec Hardening Framework - Security + DevOps: Automatic Server Hardening.
+

+ +##### :black_small_square: Auditing Tools + +

+  :small_orange_diamond: ossec - actively monitoring all aspects of system activity with file integrity monitoring.
+  :small_orange_diamond: auditd - provides a way to track security-relevant information on your system.
+  :small_orange_diamond: Tiger - is a security tool that can be use both as a security audit and intrusion detection system.
+  :small_orange_diamond: Lynis - battle-tested security tool for systems running Linux, macOS, or Unix-based operating system.
+  :small_orange_diamond: LinEnum - scripted Local Linux Enumeration & Privilege Escalation Checks.
+  :small_orange_diamond: Rkhunter - scanner tool for Linux systems that scans backdoors, rootkits and local exploits on your systems.
+  :small_orange_diamond: PE-sieve - is a light-weight tool that helps to detect malware running on the system.
+

+ +##### :black_small_square: System Diagnostics/Debuggers + +

+  :small_orange_diamond: strace - diagnostic, debugging and instructional userspace utility for Linux.
+  :small_orange_diamond: DTrace - is a performance analysis and troubleshooting tool.
+  :small_orange_diamond: ltrace - is a library call tracer, used to trace calls made by programs to library functions.
+  :small_orange_diamond: ptrace-burrito - is a friendly wrapper around ptrace.
+  :small_orange_diamond: perf-tools - performance analysis tools based on Linux perf_events (aka perf) and ftrace.
+  :small_orange_diamond: bpftrace - high-level tracing language for Linux eBPF.
+  :small_orange_diamond: sysdig - system exploration and troubleshooting tool with first class support for containers.
+  :small_orange_diamond: Valgrind - is an instrumentation framework for building dynamic analysis tools.
+  :small_orange_diamond: gperftools - high-performance multi-threaded malloc() implementation, plus some performance analysis tools.
+  :small_orange_diamond: glances - cross-platform system monitoring tool written in Python.
+  :small_orange_diamond: htop - interactive text-mode process viewer for Unix systems. It aims to be a better 'top'.
+  :small_orange_diamond: nmon - a single executable for performance monitoring and data analysis.
+  :small_orange_diamond: atop - ASCII performance monitor. Includes statistics for CPU, memory, disk, swap, network, and processes.
+  :small_orange_diamond: lsof - displays in its output information about files that are opened by processes.
+  :small_orange_diamond: FlameGraph - stack trace visualizer.
+  :small_orange_diamond: lsofgraph - small utility to convert Unix lsof output to a graph showing FIFO and UNIX interprocess communication.
+  :small_orange_diamond: rr - is a lightweight tool for recording, replaying and debugging execution of applications.
+  :small_orange_diamond: Performance Co-Pilot - a system performance analysis toolkit.
+  :small_orange_diamond: hexyl - a command-line hex viewer.
+

+ +##### :black_small_square: Log Analyzers + +

+  :small_orange_diamond: angle-grinder - slice and dice log files on the command line.
+  :small_orange_diamond: lnav - log file navigator with search and automatic refresh.
+  :small_orange_diamond: GoAccess - real-time web log analyzer and interactive viewer that runs in a terminal.
+  :small_orange_diamond: ngxtop - real-time metrics for nginx server.
+

+ +##### :black_small_square: Databases + +

+  :small_orange_diamond: usql - universal command-line interface for SQL databases.
+  :small_orange_diamond: pgcli - postgres CLI with autocompletion and syntax highlighting.
+  :small_orange_diamond: mycli - terminal client for MySQL with autocompletion and syntax highlighting.
+  :small_orange_diamond: litecli - SQLite CLI with autocompletion and syntax highlighting.
+  :small_orange_diamond: OSQuery - is a SQL powered operating system instrumentation, monitoring, and analytics framework.
+

+ +##### :black_small_square: TOR + +

+  :small_orange_diamond: Nipe - script to make Tor Network your default gateway.
+  :small_orange_diamond: multitor - a tool that lets you create multiple TOR instances with a load-balancing.
+

+ +##### :black_small_square: Messengers/IRC Clients + +

+  :small_orange_diamond: Irssi - is a free open source terminal based IRC client.
+  :small_orange_diamond: WeeChat - is an extremely extensible and lightweight IRC client.
+

+ +##### :black_small_square: Other + +

+  :small_orange_diamond: sysadmin-util - tools for Linux/Unix sysadmins.
+  :small_orange_diamond: incron - is an inode-based filesystem notification technology.
+  :small_orange_diamond: lsyncd - synchronizes local directories with remote targets (Live Syncing Daemon).
+  :small_orange_diamond: GRV - is a terminal based interface for viewing Git repositories.
+  :small_orange_diamond: Tig - text-mode interface for Git.
+  :small_orange_diamond: tldr - simplified and community-driven man pages.
+  :small_orange_diamond: archiver - easily create and extract .zip, .tar, .tar.gz, .tar.bz2, .tar.xz, .tar.lz4, .tar.sz, and .rar.
+  :small_orange_diamond: commander.js - minimal CLI creator in JavaScript.
+  :small_orange_diamond: gron - make JSON greppable!
+  :small_orange_diamond: bed - binary editor written in Go.
+

+ +#### GUI Tools  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: Terminal emulators + +

+  :small_orange_diamond: Guake - is a dropdown terminal made for the GNOME desktop environment.
+  :small_orange_diamond: Terminator - is based on GNOME Terminal, useful features for sysadmins and other users.
+  :small_orange_diamond: Kitty - is a GPU based terminal emulator that supports smooth scrolling and images.
+

+ +##### :black_small_square: Network + +

+  :small_orange_diamond: Wireshark - is the world’s foremost and widely-used network protocol analyzer.
+  :small_orange_diamond: Ettercap - is a comprehensive network monitor tool.
+  :small_orange_diamond: EtherApe - is a graphical network monitoring solution.
+  :small_orange_diamond: Packet Sender - is a networking utility for packet generation and built-in UDP/TCP/SSL client and servers.
+  :small_orange_diamond: Ostinato - is a packet crafter and traffic generator.
+  :small_orange_diamond: JMeter™ - open source software to load test functional behavior and measure performance.
+  :small_orange_diamond: locust - scalable user load testing tool written in Python.
+

+ +##### :black_small_square: Browsers + +

+  :small_orange_diamond: TOR Browser - protect your privacy and defend yourself against network surveillance and traffic analysis.
+

+ +##### :black_small_square: Password Managers + +

+  :small_orange_diamond: KeePassXC - store your passwords safely and auto-type them into your everyday websites and apps.
+  :small_orange_diamond: Enpass - password manager and secure wallet.
+

+ +##### :black_small_square: Messengers/IRC Clients + +

+  :small_orange_diamond: HexChat - is an IRC client based on XChat.
+  :small_orange_diamond: Pidgin - is an easy to use and free chat client used by millions.
+

+ +##### :black_small_square: Messengers (end-to-end encryption) + +

+  :small_orange_diamond: Signal - is an encrypted communications app.
+  :small_orange_diamond: Wire - secure messaging, file sharing, voice calls and video conferences. All protected with end-to-end encryption.
+  :small_orange_diamond: TorChat - decentralized anonymous instant messenger on top of Tor Hidden Services.
+  :small_orange_diamond: Matrix - an open network for secure, decentralized, real-time communication.
+

+ +##### :black_small_square: Text editors + +

+  :small_orange_diamond: Sublime Text - is a lightweight, cross-platform code editor known for its speed, ease of use.
+  :small_orange_diamond: Visual Studio Code - an open-source and free source code editor developed by Microsoft.
+  :small_orange_diamond: Atom - a hackable text editor for the 21st Century.
+

+ +#### Web Tools  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: Browsers + +

+  :small_orange_diamond: SSL/TLS Capabilities of Your Browser - test your browser's SSL implementation.
+  :small_orange_diamond: Can I use - provides up-to-date browser support tables for support of front-end web technologies.
+  :small_orange_diamond: Panopticlick 3.0 - is your browser safe against tracking?
+  :small_orange_diamond: Privacy Analyzer - see what data is exposed from your browser.
+  :small_orange_diamond: Web Browser Security - it's all about Web Browser fingerprinting.
+  :small_orange_diamond: How's My SSL? - help a web server developer learn what real world TLS clients were capable of.
+  :small_orange_diamond: sslClientInfo - client test (incl TLSv1.3 information).
+

+ +##### :black_small_square: SSL/Security + +

+  :small_orange_diamond: SSLLabs Server Test - free online service performs a deep analysis of the configuration of any SSL web server.
+  :small_orange_diamond: SSLLabs Server Test (DEV) - free online service performs a deep analysis of the configuration of any SSL web server.
+  :small_orange_diamond: ImmuniWeb® SSLScan - test SSL/TLS (PCI DSS, HIPAA and NIST).
+  :small_orange_diamond: SSL Check - scan your website for non-secure content.
+  :small_orange_diamond: CryptCheck - test your TLS server configuration (e.g. ciphers).
+  :small_orange_diamond: urlscan.io - service to scan and analyse websites.
+  :small_orange_diamond: Report URI - monitoring security policies like CSP and HPKP.
+  :small_orange_diamond: CSP Evaluator - allows developers and security experts to check if a Content Security Policy.
+  :small_orange_diamond: Useless CSP - public list about CSP in some big players (might make them care a bit more).
+  :small_orange_diamond: Why No HTTPS? - list of the world's top 100 websites by Alexa rank not automatically redirecting insecure requests.
+  :small_orange_diamond: TLS Cipher Suite Search
+  :small_orange_diamond: cipherli.st - strong ciphers for Apache, Nginx, Lighttpd and more.*
+  :small_orange_diamond: dhtool - public Diffie-Hellman parameter service/tool.
+  :small_orange_diamond: badssl.com - memorable site for testing clients against bad SSL configs.
+  :small_orange_diamond: tlsfun.de - registered for various tests regarding the TLS/SSL protocol.
+  :small_orange_diamond: CAA Record Helper - generate a CAA policy.
+  :small_orange_diamond: Common CA Database - repository of information about CAs, and their root and intermediate certificates.
+  :small_orange_diamond: CERTSTREAM - real-time certificate transparency log update stream.
+  :small_orange_diamond: crt.sh - discovers certificates by continually monitoring all of the publicly known CT.
+  :small_orange_diamond: Hardenize - deploy the security standards.
+  :small_orange_diamond: Cipher suite compatibility - test TLS cipher suite compatibility.
+  :small_orange_diamond: urlvoid - this service helps you detect potentially malicious websites.
+  :small_orange_diamond: security.txt - a proposed standard (generator) which allows websites to define security policies.
+  :small_orange_diamond: ssl-config-generator - help you follow the Mozilla Server Side TLS configuration guidelines.
+

+ +##### :black_small_square: HTTP Headers & Web Linters + +

+  :small_orange_diamond: Security Headers - analyse the HTTP response headers (with rating system to the results).
+  :small_orange_diamond: Observatory by Mozilla - set of tools to analyze your website.
+  :small_orange_diamond: webhint - is a linting tool that will help you with your site's accessibility, speed, security and more.
+

+ +##### :black_small_square: DNS + +

+  :small_orange_diamond: ViewDNS - one source for free DNS related tools and information.
+  :small_orange_diamond: DNSLookup - is an advanced DNS lookup tool.
+  :small_orange_diamond: DNSlytics - online DNS investigation tool.
+  :small_orange_diamond: DNS Spy - monitor, validate and verify your DNS configurations.
+  :small_orange_diamond: Zonemaster - helps you to control how your DNS works.
+  :small_orange_diamond: Leaf DNS - comprehensive DNS tester.
+  :small_orange_diamond: Find subdomains online - find subdomains for security assessment penetration test.
+  :small_orange_diamond: DNSdumpster - dns recon & research, find & lookup dns records.
+  :small_orange_diamond: DNS Table online - search for DNS records by domain, IP, CIDR, ISP.
+  :small_orange_diamond: intoDNS - DNS and mail server health checker.
+  :small_orange_diamond: DNS Bajaj - check the delegation of your domain.
+  :small_orange_diamond: BuddyDNS Delegation LAB - check, trace and visualize delegation of your domain.
+  :small_orange_diamond: dnssec-debugger - DS or DNSKEY records validator.
+  :small_orange_diamond: PTRarchive.com - this site is responsible for the safekeeping of historical reverse DNS records.
+  :small_orange_diamond: xip.io - wildcard DNS for everyone.
+  :small_orange_diamond: dnslookup (ceipam) - one of the best DNS propagation checker (and not only).
+  :small_orange_diamond: What's My DNS - DNS propagation checking tool.
+  :small_orange_diamond: DNSGrep - quickly searching large DNS datasets.
+ +

+ +##### :black_small_square: Mail + +

+  :small_orange_diamond: smtp-tls-checker - check an email domain for SMTP TLS support.
+  :small_orange_diamond: MX Toolbox - all of your MX record, DNS, blacklist and SMTP diagnostics in one integrated tool.
+  :small_orange_diamond: Secure Email - complete email test tools for email technicians.
+  :small_orange_diamond: blacklistalert - checks to see if your domain is on a Real Time Spam Blacklist.
+  :small_orange_diamond: MultiRBL - complete IP check for sending Mailservers.
+  :small_orange_diamond: DKIM SPF & Spam Assassin Validator - checks mail authentication and scores messages with Spam Assassin.
+

+ +##### :black_small_square: Encoders/Decoders and Regex testing + +

+  :small_orange_diamond: URL Encode/Decode - tool from above to either encode or decode a string of text.
+  :small_orange_diamond: Uncoder - the online translator for search queries on log data.
+  :small_orange_diamond: Regex101 - online regex tester and debugger: PHP, PCRE, Python, Golang and JavaScript.
+  :small_orange_diamond: RegExr - online tool to learn, build, & test Regular Expressions (RegEx / RegExp).
+  :small_orange_diamond: RegEx Testing - online regex testing tool.
+  :small_orange_diamond: RegEx Pal - online regex testing tool + other tools.
+  :small_orange_diamond: The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis.
+

+ +##### :black_small_square: Net-tools + +

+  :small_orange_diamond: Netcraft - detailed report about the site, helping you to make informed choices about their integrity.*
+  :small_orange_diamond: RIPE NCC Atlas - a global, open, distributed Internet measurement platform.
+  :small_orange_diamond: Robtex - uses various sources to gather public information about IP numbers, domain names, host names, routes etc.
+  :small_orange_diamond: Security Trails - APIs for Security Companies, Researchers and Teams.
+  :small_orange_diamond: Online Curl - curl test, analyze HTTP Response Headers.
+  :small_orange_diamond: Online Tools for Developers - HTTP API tools, testers, encoders, converters, formatters, and other tools.
+  :small_orange_diamond: Ping.eu - online Ping, Traceroute, DNS lookup, WHOIS and others.
+  :small_orange_diamond: Network-Tools - network tools for webmasters, IT technicians & geeks.
+  :small_orange_diamond: BGPview - search for any ASN, IP, Prefix or Resource name.
+  :small_orange_diamond: Riseup - provides online communication tools for people and groups working on liberatory social change.
+  :small_orange_diamond: VirusTotal - analyze suspicious files and URLs to detect types of malware.
+

+ +##### :black_small_square: Privacy + +

+  :small_orange_diamond: privacytools.io - provides knowledge and tools to protect your privacy against global mass surveillance.
+  :small_orange_diamond: DNS Privacy Test Servers - DNS privacy recursive servers list (with a 'no logging' policy).
+

+ +##### :black_small_square: Code parsers/playgrounds + +

+  :small_orange_diamond: ShellCheck - finds bugs in your shell scripts.
+  :small_orange_diamond: explainshell - get interactive help texts for shell commands.
+  :small_orange_diamond: jsbin - live pastebin for HTML, CSS & JavaScript and more.
+  :small_orange_diamond: CodeSandbox - online code editor for web application development. Supports React, Vue, Angular, CxJS, Dojo, etc.
+  :small_orange_diamond: PHP Sandbox - test your PHP code with this code tester.
+  :small_orange_diamond: Repl.it - an instant IDE to learn, build, collaborate, and host all in one place.
+

+ +##### :black_small_square: Performance + +

+  :small_orange_diamond: GTmetrix - analyze your site’s speed and make it faster.
+  :small_orange_diamond: Sucuri loadtimetester - test here the +performance of any of your sites from across the globe.
+  :small_orange_diamond: Pingdom Tools - analyze your site’s speed around the world.
+  :small_orange_diamond: PingMe.io - run website latency tests across multiple geographic regions.
+  :small_orange_diamond: PageSpeed Insights - analyze your site’s speed and make it faster.
+  :small_orange_diamond: web.dev - helps developers like you learn and apply the web's modern capabilities to your own sites and apps.
+  :small_orange_diamond: Lighthouse - automated auditing, performance metrics, and best practices for the web.
+

+ +##### :black_small_square: Mass scanners (search engines) + +

+  :small_orange_diamond: Censys - platform that helps information security practitioners discover, monitor, and analyze devices.
+  :small_orange_diamond: Shodan - the world's first search engine for Internet-connected devices.
+  :small_orange_diamond: Shodan 2000 - do you use Shodan for everyday work? This tool looks for randomly generated data from Shodan.
+  :small_orange_diamond: GreyNoise - mass scanner such as Shodan and Censys.
+  :small_orange_diamond: ZoomEye - search engine for cyberspace that lets the user find specific network components.
+  :small_orange_diamond: netograph - tools to monitor and understand deep structure of the web.
+  :small_orange_diamond: FOFA - is a cyberspace search engine.
+  :small_orange_diamond: onyphe - is a search engine for open-source and cyber threat intelligence data collected.
+  :small_orange_diamond: IntelligenceX - is a search engine and data archive.
+  :small_orange_diamond: binaryedge - it scan the entire internet space and create real-time threat intelligence streams and reports.
+  :small_orange_diamond: wigle - is a submission-based catalog of wireless networks. All the networks. Found by Everyone.
+  :small_orange_diamond: PublicWWW - find any alphanumeric snippet, signature or keyword in the web pages HTML, JS and CSS code.
+  :small_orange_diamond: IntelTechniques - this repository contains hundreds of online search utilities.
+  :small_orange_diamond: hunter - lets you find email addresses in seconds and connect with the people that matter for your business.
+  :small_orange_diamond: GhostProject? - search by full email address or username.
+  :small_orange_diamond: databreaches - was my email affected by data breach?
+  :small_orange_diamond: We Leak Info - world's fastest and largest data breach search engine.
+  :small_orange_diamond: Pulsedive - scans of malicious URLs, IPs, and domains, including port scans and web requests.
+  :small_orange_diamond: scylla - db dumps and more.
+  :small_orange_diamond: Buckets by Grayhatwarfar - database with public search for Open Amazon S3 Buckets and their contents.
+  :small_orange_diamond: Vigilante.pw - the breached database directory.
+  :small_orange_diamond: builtwith - find out what websites are built with.
+  :small_orange_diamond: NerdyData - search the web's source code for technologies, across millions of sites.
+  :small_orange_diamond: Mamont's open FTP Index - if a target has an open FTP site with accessible content it will be listed here.
+  :small_orange_diamond: OSINT Framework - focused on gathering information from free tools or resources.
+  :small_orange_diamond: maltiverse - is a service oriented to cybersecurity analysts for the advanced analysis of indicators of compromise.
+  :small_orange_diamond: Leaked Source - is a collaboration of data found online in the form of a lookup.
+  :small_orange_diamond: We Leak Info - to help everyday individuals secure their online life, avoiding getting hacked.
+  :small_orange_diamond: pipl - is the place to find the person behind the email address, social username or phone number.
+  :small_orange_diamond: abuse.ch - is operated by a random swiss guy fighting malware for non-profit.
+  :small_orange_diamond: malc0de - malware search engine.
+  :small_orange_diamond: Cybercrime Tracker - monitors and tracks various malware families that are used to perpetrate cyber crimes.
+  :small_orange_diamond: shhgit - find GitHub secrets in real time.
+  :small_orange_diamond: searchcode - helping you find real world examples of functions, API's and libraries.
+  :small_orange_diamond: Insecam - the world biggest directory of online surveillance security cameras.
+  :small_orange_diamond: index-of - contains great stuff like: security, hacking, reverse engineering, cryptography, programming etc.
+  :small_orange_diamond: Rapid7 Labs Open Data - is a great resources of datasets from Project Sonar.
+ +

+ +##### :black_small_square: Generators + +

+  :small_orange_diamond: thispersondoesnotexist - generate fake faces in one click - endless possibilities.
+  :small_orange_diamond: AI Generated Photos - 100.000 AI generated faces.
+  :small_orange_diamond: fakeface - fake faces browser.
+  :small_orange_diamond: Intigriti Redirector - open redirect/SSRF payload generator.
+

+ +##### :black_small_square: Passwords + +

+  :small_orange_diamond: have i been pwned? - check if you have an account that has been compromised in a data breach.
+  :small_orange_diamond: dehashed - is a hacked database search engine.
+  :small_orange_diamond: Leaked Source - is a collaboration of data found online in the form of a lookup.
+

+ +##### :black_small_square: CVE/Exploits databases + +

+  :small_orange_diamond: CVE Mitre - list of publicly known cybersecurity vulnerabilities.
+  :small_orange_diamond: CVE Details - CVE security vulnerability advanced database.
+  :small_orange_diamond: Exploit DB - CVE compliant archive of public exploits and corresponding vulnerable software.
+  :small_orange_diamond: 0day.today - exploits market provides you the possibility to buy zero-day exploits and also to sell 0day exploits.
+  :small_orange_diamond: sploitus - the exploit and tools database.
+  :small_orange_diamond: cxsecurity - free vulnerability database.
+  :small_orange_diamond: Vulncode-DB - is a database for vulnerabilities and their corresponding source code if available.
+  :small_orange_diamond: cveapi - free API for CVE data.
+

+ +##### :black_small_square: Mobile apps scanners + +

+  :small_orange_diamond: ImmuniWeb® Mobile App Scanner - test security and privacy of mobile apps (iOS & Android).
+  :small_orange_diamond: Quixxi - free Mobile App Vulnerability Scanner for Android & iOS.
+  :small_orange_diamond: Ostorlab - analyzes mobile application to identify vulnerabilities and potential weaknesses.
+

+ +##### :black_small_square: Private Search Engines + +

+  :small_orange_diamond: Startpage - the world's most private search engine.
+  :small_orange_diamond: searX - a privacy-respecting, hackable metasearch engine.
+  :small_orange_diamond: darksearch - the 1st real Dark Web search engine.
+  :small_orange_diamond: Qwant - the search engine that respects your privacy.
+

+ +##### :black_small_square: Secure Webmail Providers + +

+  :small_orange_diamond: CounterMail - is a secure and easy to use online email service, designed to provide maximum security and privacy.
+  :small_orange_diamond: Mail2Tor - is a Tor Hidden Service that allows anyone to send and receive emails anonymously.
+  :small_orange_diamond: Tutanota - is the world's most secure email service and amazingly easy to use.
+  :small_orange_diamond: Protonmail - is the world's largest secure email service, developed by CERN and MIT scientists.
+  :small_orange_diamond: Startmail - private & encrypted email made easy.
+

+ +##### :black_small_square: Crypto + +

+  :small_orange_diamond: Keybase - it's open source and powered by public-key cryptography.
+

+ +##### :black_small_square: PGP Keyservers + +

+  :small_orange_diamond: SKS OpenPGP Key server - services for the SKS keyservers used by OpenPGP.
+

+ +#### Systems/Services  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: Operating Systems + +

+  :small_orange_diamond: Slackware - the most "Unix-like" Linux distribution.
+  :small_orange_diamond: OpenBSD - multi-platform 4.4BSD-based UNIX-like operating system.
+  :small_orange_diamond: HardenedBSD - HardenedBSD aims to implement innovative exploit mitigation and security solutions.
+  :small_orange_diamond: Kali Linux - Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.
+  :small_orange_diamond: Parrot Security OS - cyber security GNU/Linux environment.
+  :small_orange_diamond: Backbox Linux - penetration test and security assessment oriented Ubuntu-based Linux distribution.
+  :small_orange_diamond: BlackArch - is an Arch Linux-based penetration testing distribution for penetration testers and security researchers.
+  :small_orange_diamond: Pentoo - is a security-focused livecd based on Gentoo.
+  :small_orange_diamond: Security Onion - Linux distro for intrusion detection, enterprise security monitoring, and log management.
+  :small_orange_diamond: Tails - is a live system that aims to preserve your privacy and anonymity.
+  :small_orange_diamond: vedetta - OpenBSD router boilerplate.
+

+ +##### :black_small_square: HTTP(s) Services + +

+  :small_orange_diamond: Varnish Cache - HTTP accelerator designed for content-heavy dynamic web sites.
+  :small_orange_diamond: Nginx - open source web and reverse proxy server that is similar to Apache, but very light weight.
+  :small_orange_diamond: OpenResty - is a dynamic web platform based on NGINX and LuaJIT.
+  :small_orange_diamond: Tengine - a distribution of Nginx with some advanced features.
+  :small_orange_diamond: Caddy Server - is an open source, HTTP/2-enabled web server with HTTPS by default.
+  :small_orange_diamond: HAProxy - the reliable, high performance TCP/HTTP load balancer.
+

+ +##### :black_small_square: DNS Services + +

+  :small_orange_diamond: Unbound - validating, recursive, and caching DNS resolver (with TLS).
+  :small_orange_diamond: Knot Resolver - caching full resolver implementation, including both a resolver library and a daemon.
+  :small_orange_diamond: PowerDNS - is an open source authoritative DNS server, written in C++ and licensed under the GPL.
+

+ +##### :black_small_square: Other Services + +

+  :small_orange_diamond: 3proxy - tiny free proxy server.
+

+ +##### :black_small_square: Security/hardening + +

+  :small_orange_diamond: Emerald Onion - is a 501(c)(3) nonprofit organization and transit internet service provider (ISP) based in Seattle.
+  :small_orange_diamond: pi-hole - the Pi-hole® is a DNS sinkhole that protects your devices from unwanted content.
+  :small_orange_diamond: maltrail - malicious traffic detection system.
+  :small_orange_diamond: security_monkey - monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.
+  :small_orange_diamond: firecracker - secure and fast microVMs for serverless computing.
+  :small_orange_diamond: streisand - sets up a new server running your choice of WireGuard, OpenSSH, OpenVPN, Shadowsocks, and more.
+

+ +#### Networks  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: Tools + +

+  :small_orange_diamond: CapAnalysis - web visual tool to analyze large amounts of captured network traffic (PCAP analyzer).
+  :small_orange_diamond: netbox - IP address management (IPAM) and data center infrastructure management (DCIM) tool.
+

+ +##### :black_small_square: Labs + +

+  :small_orange_diamond: NRE Labs - learn automation by doing it. Right now, right here, in your browser.
+

+ +##### :black_small_square: Other + +

+  :small_orange_diamond: LBNL's Network Research Group - home page of the Network Research Group (NRG); tools, talks, papers and more.
+

+ +#### Containers/Orchestration  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: CLI Tools + +

+  :small_orange_diamond: gvisor - container runtime sandbox.
+  :small_orange_diamond: ctop - top-like interface for container metrics.
+  :small_orange_diamond: docker-bench-security - is a script that checks for dozens of common best-practices around deploying Docker.
+

+ +##### :black_small_square: Web Tools + +

+  :small_orange_diamond: Moby - a collaborative project for the container ecosystem to assemble container-based system.
+  :small_orange_diamond: Traefik - open source reverse proxy/load balancer provides easier integration with Docker and Let's encrypt.
+  :small_orange_diamond: kong - The Cloud-Native API Gateway.
+  :small_orange_diamond: rancher - complete container management platform.
+  :small_orange_diamond: portainer - making Docker management easy.
+  :small_orange_diamond: nginx-proxy - automated nginx proxy for Docker containers using docker-gen.
+

+ +##### :black_small_square: Manuals/Tutorials/Best Practices + +

+  :small_orange_diamond: docker-cheat-sheet - a quick reference cheat sheet on Docker.
+  :small_orange_diamond: awesome-docker - a curated list of Docker resources and projects.
+  :small_orange_diamond: docker_practice - learn and understand Docker technologies, with real DevOps practice!
+  :small_orange_diamond: labs + - is a collection of tutorials for learning how to use Docker with various tools.
+  :small_orange_diamond: dockerfiles - various Dockerfiles I use on the desktop and on servers.
+  :small_orange_diamond: kubernetes-the-hard-way - bootstrap Kubernetes the hard way on Google Cloud Platform. No scripts.
+  :small_orange_diamond: kubernetes-the-easy-way - bootstrap Kubernetes the easy way on Google Cloud Platform. No scripts.
+  :small_orange_diamond: cheatsheet-kubernetes-A4 - Kubernetes CheatSheets in A4.
+  :small_orange_diamond: k8s-security - kubernetes security notes and best practices.
+  :small_orange_diamond: kubernetes-production-best-practices - checklists with best-practices for production-ready Kubernetes.
+  :small_orange_diamond: kubernetes-production-best-practices - kubernetes security - best practice guide.
+  :small_orange_diamond: kubernetes-failure-stories - is a compilation of public failure/horror stories related to Kubernetes.
+

+ +#### Manuals/Howtos/Tutorials  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: Shell/Command line + +

+  :small_orange_diamond: pure-bash-bible - is a collection of pure bash alternatives to external processes.
+  :small_orange_diamond: pure-sh-bible - is a collection of pure POSIX sh alternatives to external processes.
+  :small_orange_diamond: bash-guide - is a guide to learn bash.
+  :small_orange_diamond: bash-handbook - for those who wanna learn Bash.
+  :small_orange_diamond: The Bash Hackers Wiki - hold documentation of any kind about GNU Bash.
+  :small_orange_diamond: Shell & Utilities - describes the commands and utilities offered to application programs by POSIX-conformant systems.
+  :small_orange_diamond: the-art-of-command-line - master the command line, in one page.
+  :small_orange_diamond: Shell Style Guide - a shell style guide for Google-originated open-source projects.
+

+ +##### :black_small_square: Text Editors + +

+  :small_orange_diamond: Vim Cheat Sheet - great multi language vim guide.
+

+ +##### :black_small_square: Python + +

+  :small_orange_diamond: Awesome Python - a curated list of awesome Python frameworks, libraries, software and resources.
+  :small_orange_diamond: python-cheatsheet - comprehensive Python cheatsheet.
+  :small_orange_diamond: pythoncheatsheet.org - basic reference for beginner and advanced developers.
+

+ +##### :black_small_square: Sed & Awk & Other + +

+  :small_orange_diamond: F’Awk Yeah! - advanced sed and awk usage (Parsing for Pentesters 3).
+

+ +##### :black_small_square: \*nix & Network + +

+  :small_orange_diamond: nixCraft - linux and unix tutorials for new and seasoned sysadmin.
+  :small_orange_diamond: TecMint - the ideal Linux blog for Sysadmins & Geeks.
+  :small_orange_diamond: Omnisecu - free Networking, System Administration and Security tutorials.
+  :small_orange_diamond: linux-cheat - Linux tutorials and cheatsheets. Minimal examples. Mostly user-land CLI utilities.
+  :small_orange_diamond: Unix Toolbox - collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users.
+  :small_orange_diamond: Linux Kernel Teaching - is a collection of lectures and labs Linux kernel topics.
+  :small_orange_diamond: htop explained - explanation of everything you can see in htop/top on Linux.
+  :small_orange_diamond: Linux Guide and Hints - tutorials on system administration in Fedora and CentOS.
+  :small_orange_diamond: strace-little-book - a little book which introduces strace.
+  :small_orange_diamond: http2-explained - a detailed document explaining and documenting HTTP/2.
+  :small_orange_diamond: http3-explained - a document describing the HTTP/3 and QUIC protocols.
+  :small_orange_diamond: HTTP/2 in Action - an excellent introduction to the new HTTP/2 standard.
+  :small_orange_diamond: Let's code a TCP/IP stack - great stuff to learn network and system programming at a deeper level.
+  :small_orange_diamond: Nginx Admin's Handbook - describes how to improve NGINX performance, security and other important things.
+  :small_orange_diamond: nginxconfig.io - NGINX config generator on steroids.
+  :small_orange_diamond: openssh guideline - is to help operational teams with the configuration of OpenSSH server and client.
+  :small_orange_diamond: SSH Handshake Explained - is a relatively brief description of the SSH handshake.
+  :small_orange_diamond: PacketLife.net - a place to record notes while studying for Cisco's CCNP certification.
+

+ +##### :black_small_square: Microsoft + +

+  :small_orange_diamond: AD-Attack-Defense - attack and defend active directory using modern post exploitation adversary tradecraft activity.
+

+ +##### :black_small_square: Large-scale systems + +

+  :small_orange_diamond: The System Design Primer - learn how to design large-scale systems.
+  :small_orange_diamond: Awesome Scalability - best practices in building High Scalability, High Availability, High Stability and more.
+  :small_orange_diamond: Web Architecture 101 - the basic architecture concepts.
+

+ +##### :black_small_square: System hardening + +

+  :small_orange_diamond: CIS Benchmarks - are secure configuration settings for over 100 technologies, available as a free PDF download.
+  :small_orange_diamond: Security Harden CentOS 7 - this walks you through the steps required to security harden CentOS.
+  :small_orange_diamond: CentOS 7 Server Hardening Guide - great guide for hardening CentOS; familiar with OpenSCAP.
+  :small_orange_diamond: awesome-security-hardening - is a collection of security hardening guides, tools and other resources.
+  :small_orange_diamond: The Practical Linux Hardening Guide - provides a high-level overview of hardening GNU/Linux systems.
+

+ +##### :black_small_square: Security & Privacy + +

+  :small_orange_diamond: Hacking Articles - LRaj Chandel's Security & Hacking Blog.
+  :small_orange_diamond: AWS security tools - make your AWS cloud environment more secure.
+  :small_orange_diamond: Rawsec's CyberSecurity Inventory - an inventory of tools and resources about CyberSecurity.
+  :small_orange_diamond: The Illustrated TLS Connection - every byte of a TLS connection explained and reproduced.
+  :small_orange_diamond: SSL Research - SSL and TLS Deployment Best Practices by SSL Labs.
+  :small_orange_diamond: SELinux Game - learn SELinux by doing. Solve Puzzles, show skillz.
+  :small_orange_diamond: Certificates and PKI - everything you should know about certificates and PKI but are too afraid to ask.
+  :small_orange_diamond: The Art of Subdomain Enumeration - a reference for subdomain enumeration techniques.
+  :small_orange_diamond: Quitting Google - the comprehensive guide to quitting Google.
+

+ +##### :black_small_square: Web Apps + +

+  :small_orange_diamond: OWASP - worldwide not-for-profit charitable organization focused on improving the security of software.
+  :small_orange_diamond: OWASP ASVS 3.0.1 - OWASP Application Security Verification Standard Project.
+  :small_orange_diamond: OWASP ASVS 3.0.1 Web App - simple web app that helps developers understand the ASVS requirements.
+  :small_orange_diamond: OWASP ASVS 4.0 - is a list of application security requirements or tests.
+  :small_orange_diamond: OWASP Testing Guide v4 - includes a "best practice" penetration testing framework.
+  :small_orange_diamond: OWASP Dev Guide - this is the development version of the OWASP Developer Guide.
+  :small_orange_diamond: OWASP API Security Project - focuses specifically on the top ten vulnerabilities in API security.
+  :small_orange_diamond: Mozilla Web Security - help operational teams with creating secure web applications.
+  :small_orange_diamond: security-bulletins - security bulletins that relate to Netflix Open Source.
+  :small_orange_diamond: API-Security-Checklist - security countermeasures when designing, testing, and releasing your API.
+  :small_orange_diamond: Enable CORS - enable cross-origin resource sharing.
+  :small_orange_diamond: Application Security Wiki - is an initiative to provide all application security related resources at one place.
+  :small_orange_diamond: Weird Proxies - reverse proxy related attacks; it is a result of analysis of various reverse proxies, cache proxies, etc.
+  :small_orange_diamond: Webshells - great series about malicious payloads.
+  :small_orange_diamond: Practical Web Cache Poisoning - show you how to compromise websites by using esoteric web features.
+  :small_orange_diamond: Hidden directories and files - as a source of sensitive information about web application.
+  :small_orange_diamond: Explosive blog - great blog about cybersec and pentests.
+  :small_orange_diamond: Security Cookies - this paper will take a close look at cookie security.
+  :small_orange_diamond: APISecurityBestPractices - help you keep secrets (API keys, db credentials, certificates) out of source code.
+

+ +##### :black_small_square: All-in-one + +

+  :small_orange_diamond: LZone Cheat Sheets - all cheat sheets.
+  :small_orange_diamond: Dan’s Cheat Sheets’s - massive cheat sheets documentation.
+  :small_orange_diamond: Rico's cheatsheets - this is a modest collection of cheatsheets.
+  :small_orange_diamond: DevDocs API - combines multiple API documentations in a fast, organized, and searchable interface.
+

+ +##### :black_small_square: Other + +

+  :small_orange_diamond: CTF Series : Vulnerable Machines - the steps below could be followed to find vulnerabilities and exploits.
+  :small_orange_diamond: 50M_CTF_Writeup - $50 million CTF from Hackerone - writeup.
+  :small_orange_diamond: ctf-tasks - an archive of low-level CTF challenges developed over the years.
+  :small_orange_diamond: How to start RE/malware analysis? - collection of some hints and useful links for the beginners.
+  :small_orange_diamond: The C10K problem - it's time for web servers to handle ten thousand clients simultaneously, don't you think?
+  :small_orange_diamond: How 1500 bytes became the MTU of the internet - great story about the Maximum Transmission Unit.
+  :small_orange_diamond: poor man's profiler - sampling tools like dtrace's don't really provide methods to see what programs are blocking on.
+  :small_orange_diamond: HTTPS on Stack Overflow - this is the story of a long journey regarding the implementation of SSL.
+  :small_orange_diamond: Julia's Drawings - some drawings about programming and unix world, zines about systems & debugging tools.
+  :small_orange_diamond: Hash collisions - this great repository is focused on hash collisions exploitation.
+  :small_orange_diamond: BGP Meets Cat - after 3072 hours of manipulating BGP, Job Snijders has succeeded in drawing a Nyancat.
+  :small_orange_diamond: bgp-battleships - playing battleships over BGP.
+  :small_orange_diamond: What happens when... - you type google.com into your browser and press enter?
+  :small_orange_diamond: how-web-works - based on the 'What happens when...' repository.
+  :small_orange_diamond: HTTPS in the real world - great tutorial explain how HTTPS works in the real world.
+  :small_orange_diamond: Gitlab and NFS bug - how we spent two weeks hunting an NFS bug in the Linux kernel.
+  :small_orange_diamond: Gitlab melts down - postmortem on the database outage of January 31 2017 with the lessons we learned.
+  :small_orange_diamond: How To Become A Hacker - if you want to be a hacker, keep reading.
+  :small_orange_diamond: Operation Costs in CPU - an infographics which should help to estimate costs of certain operations in CPU clocks.
+  :small_orange_diamond: Let's Build a Simple Database - writing a sqlite clone from scratch in C.
+  :small_orange_diamond: simple-computer - great resource to understand how computers work under the hood.
+  :small_orange_diamond: The story of "Have I been pwned?" - working with 154 million records on Azure Table Storage.
+  :small_orange_diamond: TOP500 Supercomputers - shows the 500 most powerful commercially available computer systems known to us.
+  :small_orange_diamond: How to build a 8 GPU password cracker - any "black magic" or hours of frustration like desktop components do.
+  :small_orange_diamond: CERN Data Centre - 3D visualizations of the CERN computing environments (and more).
+  :small_orange_diamond: How fucked is my database - evaluate how fucked your database is with this handy website.
+  :small_orange_diamond: Five Whys - you know what the problem is, but you cannot solve it?
+  :small_orange_diamond: howhttps.works - how HTTPS works ...in a comic!
+  :small_orange_diamond: howdns.works - a fun and colorful explanation of how DNS works.
+  :small_orange_diamond: POSTGRESQLCO.NF - your postgresql.conf documentation and recommendations.
+

+ +#### Inspiring Lists  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: SysOps/DevOps + +

+  :small_orange_diamond: Awesome Sysadmin - amazingly awesome open source sysadmin resources.
+  :small_orange_diamond: Awesome Shell - awesome command-line frameworks, toolkits, guides and gizmos.
+  :small_orange_diamond: Command-line-text-processing - from finding text to search and replace, from sorting to beautifying text and more.
+  :small_orange_diamond: Awesome Pcaptools - collection of tools developed by other researchers to process network traces.
+  :small_orange_diamond: awesome-ebpf - a curated list of awesome projects related to eBPF.
+  :small_orange_diamond: Linux Network Performance - learn where some of the network sysctl variables fit into the Linux/Kernel network flow.
+  :small_orange_diamond: Awesome Postgres - list of awesome PostgreSQL software, libraries, tools and resources.
+  :small_orange_diamond: quick-SQL-cheatsheet - a quick reminder of all SQL queries and examples on how to use them.
+  :small_orange_diamond: Awesome-Selfhosted - list of Free Software network services and web applications which can be hosted locally.
+  :small_orange_diamond: List of applications - huge collection of applications sorted by category, as a reference for those looking for packages.
+  :small_orange_diamond: CS-Interview-Knowledge-Map - build the best interview map.
+  :small_orange_diamond: DevOps-Guide - DevOps Guide from basic to advanced with Interview Questions and Notes.
+  :small_orange_diamond: FreeBSD Journal - it is a great list of periodical magazines about FreeBSD and other important things.
+  :small_orange_diamond: devops-interview-questions - contains interview questions on various DevOps and SRE related topics.

+ +##### :black_small_square: Developers + +

+  :small_orange_diamond: Web Developer Roadmap - roadmaps, articles and resources to help you choose your path, learn and improve.
+  :small_orange_diamond: Front-End-Checklist - the perfect Front-End Checklist for modern websites and meticulous developers.
+  :small_orange_diamond: Front-End-Performance-Checklist - the only Front-End Performance Checklist that runs faster than the others.
+  :small_orange_diamond: Python's Magic Methods - what are magic methods? They're everything in object-oriented Python.
+  :small_orange_diamond: wtfpython - a collection of surprising Python snippets and lesser-known features.
+  :small_orange_diamond: js-dev-reads - a list of books and articles for the discerning web developer to read.
+  :small_orange_diamond: Commit messages guide - a guide to understand the importance of commit messages.
+

+ +##### :black_small_square: Security/Pentesting + +

+  :small_orange_diamond: Awesome Web Security - a curated list of Web Security materials and resources.
+  :small_orange_diamond: awesome-cyber-skills - a curated list of hacking environments where you can train your cyber skills.
+  :small_orange_diamond: awesome-devsecops - an authoritative list of awesome devsecops tools.
+  :small_orange_diamond: awesome-osint - is a curated list of amazingly awesome OSINT.
+  :small_orange_diamond: awesome-threat-intelligence - a curated list of Awesome Threat Intelligence resources.
+  :small_orange_diamond: Red-Teaming-Toolkit - a collection of open source and commercial tools that aid in red team operations.
+  :small_orange_diamond: awesome-burp-extensions - a curated list of amazingly awesome Burp Extensions.
+  :small_orange_diamond: Free Security eBooks - list of a Free Security and Hacking eBooks.
+  :small_orange_diamond: Hacking-Security-Ebooks - top 100 Hacking & Security E-Books.
+  :small_orange_diamond: privacy-respecting - curated list of privacy respecting services and software.
+  :small_orange_diamond: reverse-engineering - list of awesome reverse engineering resources.
+  :small_orange_diamond: linux-re-101 - a collection of resources for linux reverse engineering.
+  :small_orange_diamond: reverseengineering-reading-list - a list of Reverse Engineering articles, books, and papers.
+  :small_orange_diamond: Awesome-WAF - a curated list of awesome web-app firewall (WAF) stuff.
+  :small_orange_diamond: awesome-shodan-queries - interesting, funny, and depressing search queries to plug into shodan.io.
+  :small_orange_diamond: RobotsDisallowed - a curated list of the most common and most interesting robots.txt disallowed directories.
+  :small_orange_diamond: HackingNeuralNetworks - is a small course on exploiting and defending neural networks.
+  :small_orange_diamond: wildcard-certificates - why you probably shouldn't use a wildcard certificate.
+  :small_orange_diamond: Don't use VPN services - which is what every third-party "VPN provider" does.
+  :small_orange_diamond: awesome-yara - a curated list of awesome YARA rules, tools, and people.
+  :small_orange_diamond: macOS-Security-and-Privacy-Guide - guide to securing and improving privacy on macOS.
+  :small_orange_diamond: awesome-sec-talks - is a collected list of awesome security talks.
+  :small_orange_diamond: Movies for Hackers - list of movies every hacker & cyberpunk must watch.
+

+ +##### :black_small_square: Other + +

+  :small_orange_diamond: Cheatography - over 3,000 free cheat sheets, revision aids and quick references.
+  :small_orange_diamond: awesome-static-analysis - static analysis tools for all programming languages.
+  :small_orange_diamond: computer-science - path to a free self-taught education in Computer Science.
+  :small_orange_diamond: post-mortems - is a collection of postmortems (config errors, hardware failures, and more).
+  :small_orange_diamond: build-your-own-x - build your own (insert technology here).
+  :small_orange_diamond: Project-Based-Tutorials-in-C - is a curated list of project-based tutorials in C.
+  :small_orange_diamond: The-Documentation-Compendium - various README templates & tips on writing high-quality documentation.
+  :small_orange_diamond: awesome-python-applications - free software that works great, and also happens to be open-source Python.
+  :small_orange_diamond: awesome-public-datasets - a topic-centric list of HQ open datasets.
+

+ +#### Blogs/Podcasts/Videos  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: SysOps/DevOps + +

+  :small_orange_diamond: Varnish for PHP developers - very interesting presentation of Varnish by Mattias Geniar.
+  :small_orange_diamond: A Netflix Guide to Microservices - Josh Evans talks about the chaotic and vibrant world of microservices at Netflix.
+

+ +##### :black_small_square: Developers + +

+  :small_orange_diamond: Comparing C to machine language - compare a simple C program with the compiled machine code of that program.
+

+ +##### :black_small_square: Geeky Persons + +

+  :small_orange_diamond: Brendan Gregg's Blog - is an industry expert in computing performance and cloud computing.
+  :small_orange_diamond: Gynvael "GynDream" Coldwind - is a IT security engineer at Google.
+  :small_orange_diamond: Michał "lcamtuf" Zalewski - white hat hacker, computer security expert.
+  :small_orange_diamond: Mattias Geniar - developer, sysadmin, blogger, podcaster and public speaker.
+  :small_orange_diamond: Nick Craver - software developer and systems administrator for Stack Exchange.
+  :small_orange_diamond: Scott Helme - security researcher, international speaker and founder of securityheaders.com and report-uri.com.
+  :small_orange_diamond: Brian Krebs - The Washington Post and now an Independent investigative journalist.
+  :small_orange_diamond: Bruce Schneier - is an internationally renowned security technologist, called a "security guru".
+  :small_orange_diamond: Chrissy Morgan - advocate of practical learning, Chrissy also takes part in bug bounty programs.
+  :small_orange_diamond: Andy Gill - is a hacker at heart who works as a senior penetration tester.
+  :small_orange_diamond: Daniel Miessler - cybersecurity expert and writer.
+  :small_orange_diamond: Samy Kamkar - is an American privacy and security researcher, computer hacker.
+  :small_orange_diamond: Javvad Malik - is a security advocate at AlienVault, a blogger event speaker and industry commentator.
+  :small_orange_diamond: Graham Cluley - public speaker and independent computer security analyst.
+  :small_orange_diamond: Kacper Szurek - detection engineer at ESET.
+  :small_orange_diamond: Troy Hunt - web security expert known for public education and outreach on security topics.
+  :small_orange_diamond: raymii.org - sysadmin specializing in building high availability cloud environments.
+  :small_orange_diamond: Robert Penz - IT security expert.
+

+ +##### :black_small_square: Geeky Blogs + +

+  :small_orange_diamond: Linux Audit - the Linux security blog about auditing, hardening and compliance by Michael Boelen.
+  :small_orange_diamond: +Linux Security Expert - trainings, howtos, checklists, security tools and more.
+  :small_orange_diamond: The Grymoire - collection of useful incantations for wizards, be you computer wizards, magicians, or whatever.
+  :small_orange_diamond: Secjuice - is the only non-profit, independent and volunteer led publication in the information security space.
+  :small_orange_diamond: Decipher - security news that informs and inspires.
+

+ +##### :black_small_square: Geeky Vendor Blogs + +

+  :small_orange_diamond: Tenable Podcast - conversations and interviews related to Cyber Exposure, and more.
+  :small_orange_diamond: Sophos - threat news room, giving you news, opinion, advice and research on computer security issues.
+  :small_orange_diamond: Tripwire State of Security - blog featuring the latest news, trends and insights on current information security issues.
+  :small_orange_diamond: Malwarebytes Labs Blog - security blog aims to provide insider news about cybersecurity.
+  :small_orange_diamond: TrustedSec - latest news, and trends about cybersecurity.
+  :small_orange_diamond: PortSwigger Web Security Blog - about web app security vulns and top tips from our team of web security.
+  :small_orange_diamond: AT&T Cybersecurity blog - news on emerging threats and practical advice to simplify threat detection.
+  :small_orange_diamond: Thycotic - where CISOs and IT Admins come to learn about industry trends, IT security, data breaches, and more.
+

+ +##### :black_small_square: Geeky Cybersecurity Podcasts + +

+  :small_orange_diamond: Risky Business - is a weekly information security podcast featuring news and in-depth interviews.
+  :small_orange_diamond: Cyber, by Motherboard - stories, and focus on the ideas about cybersecurity.
+  :small_orange_diamond: Tenable Podcast - conversations and interviews related to Cyber Exposure, and more.
+  :small_orange_diamond: +Cybercrime Investigations - podcast by Geoff White about cybercrimes.
+  :small_orange_diamond: The many hats club - featuring stories from a wide range of Infosec people (Whitehat, Greyhat and Blackhat).
+  :small_orange_diamond: Darknet Diaries - true stories from the dark side of the Internet.
+  :small_orange_diamond: OSINTCurious Webcasts - is the investigative curiosity that helps people be successful in OSINT.
+  :small_orange_diamond: Security Weekly - the latest information security and hacking news.
+

+ +##### :black_small_square: Geeky Cybersecurity Video Blogs + +

+  :small_orange_diamond: rev3rse security - offensive, binary exploitation, web application security, vulnerability, hardening, red team, blue team.
+  :small_orange_diamond: LiveOverflow - a lot more advanced topics than what is typically offered in paid online courses - but for free.
+  :small_orange_diamond: J4vv4D - the important information regarding our internet security.
+  :small_orange_diamond: +CyberTalks - talks, interviews, and article about cybersecurity.
+

+ +##### :black_small_square: Best Personal Twitter Accounts + +

+  :small_orange_diamond: @blackroomsec - a white-hat hacker/pentester. Intergalactic Minesweeper Champion 1990.
+  :small_orange_diamond: @MarcoCiappelli - Co-Founder @ITSPmagazine, at the intersection of IT security and society.
+  :small_orange_diamond: @binitamshah - Linux Evangelist. Malwares. Kernel Dev. Security Enthusiast.
+  :small_orange_diamond: @joe_carson - an InfoSec Professional and Tech Geek.
+  :small_orange_diamond: @mikko - CRO at F-Secure, Reverse Engineer, TED Speaker, Supervillain.
+  :small_orange_diamond: @esrtweet - often referred to as ESR, is an American software developer, and open-source software advocate.
+  :small_orange_diamond: @gynvael - security researcher/programmer, @DragonSectorCTF founder/player, technical streamer.
+  :small_orange_diamond: @x0rz - Security Researcher & Cyber Observer.
+  :small_orange_diamond: @hasherezade - programmer, malware analyst. Author of PEbear, PEsieve, libPeConv.
+  :small_orange_diamond: @TinkerSec - tinkerer, cypherpunk, hacker.
+  :small_orange_diamond: @alisaesage - independent hacker and researcher.
+  :small_orange_diamond: @SwiftOnSecurity - systems security, industrial safety, sysadmin, author of decentsecurity.com.
+  :small_orange_diamond: @dakami - chief scientist at White Ops, is one of just seven people with the authority to restore the DNS root keys.
+  :small_orange_diamond: @samykamkar - is a famous "grey hat" hacker, security researcher, creator of the MySpace "Samy" worm.
+  :small_orange_diamond: @securityweekly - founder & CTO of Security Weekly podcast network.
+  :small_orange_diamond: @jack_daniel - @SecurityBSides co-founder.
+  :small_orange_diamond: @thegrugq - Security Researcher.
+  :small_orange_diamond: @matthew_d_green - a cryptographer and professor at Johns Hopkins University.
+

+ +##### :black_small_square: Best Commercial Twitter Accounts + +

+  :small_orange_diamond: @haveibeenpwned - check if you have an account that has been compromised in a data breach.
+  :small_orange_diamond: @bugcrowd - trusted by more of the Fortune 500 than any other crowdsourced security platform.
+  :small_orange_diamond: @Malwarebytes - most trusted security company. Unmatched threat visibility.
+  :small_orange_diamond: @sansforensics - the world's leading Digital Forensics and Incident Response provider.
+  :small_orange_diamond: @attcyber - AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, and more.
+  :small_orange_diamond: @TheManyHatsClub - an information security focused podcast and group of individuals from all walks of life.
+  :small_orange_diamond: @hedgehogsec - Hedgehog Cyber. Gibraltar and Manchester's top boutique information security firm.
+  :small_orange_diamond: @NCSC - the National Cyber Security Centre. Helping to make the UK the safest place to live and work online.
+  :small_orange_diamond: @Synacktiv - IT security experts.
+

+ +##### :black_small_square: A piece of history + +

+  :small_orange_diamond: How to Do Things at ARL - how to configure modems, scan images, record CD-ROMs, and other useful techniques.*
+

+ +##### :black_small_square: Other + +

+  :small_orange_diamond: Diffie-Hellman Key Exchange (short version) - how Diffie-Hellman Key Exchange worked.
+

+ +#### Hacking/Penetration Testing  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: Pentesters arsenal tools + +

+  :small_orange_diamond: Sandcat Browser - a penetration-oriented browser with plenty of advanced functionality already built in.
+  :small_orange_diamond: Metasploit - tool and framework for pentesting system, web and many more, contains a lot a ready to use exploit.
+  :small_orange_diamond: Burp Suite - tool for testing web application security, intercepting proxy to replay, inject, scan and fuzz HTTP requests.
+  :small_orange_diamond: OWASP Zed Attack Proxy - intercepting proxy to replay, inject, scan and fuzz HTTP requests.
+  :small_orange_diamond: w3af - is a Web Application Attack and Audit Framework.
+  :small_orange_diamond: mitmproxy - an interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
+  :small_orange_diamond: Nikto2 - web server scanner which performs comprehensive tests against web servers for multiple items.
+  :small_orange_diamond: sqlmap - tool that automates the process of detecting and exploiting SQL injection flaws.
+  :small_orange_diamond: Recon-ng - is a full-featured Web Reconnaissance framework written in Python.
+  :small_orange_diamond: AutoRecon - is a network reconnaissance tool which performs automated enumeration of services.
+  :small_orange_diamond: Faraday - an Integrated Multiuser Pentest Environment.
+  :small_orange_diamond: Photon - incredibly fast crawler designed for OSINT.
+  :small_orange_diamond: XSStrike - most advanced XSS detection suite.
+  :small_orange_diamond: Sn1per - automated pentest framework for offensive security experts.
+  :small_orange_diamond: vuls - is an agent-less vulnerability scanner for Linux, FreeBSD, and other.
+  :small_orange_diamond: aquatone - a tool for domain flyovers.
+  :small_orange_diamond: BillCipher - information gathering tool for a website or IP address.
+  :small_orange_diamond: WhatWaf - detect and bypass web application firewalls and protection systems.
+  :small_orange_diamond: Corsy - CORS misconfiguration scanner.
+  :small_orange_diamond: Raccoon - is a high performance offensive security tool for reconnaissance and vulnerability scanning.
+  :small_orange_diamond: dirhunt - find web directories without bruteforce.
+  :small_orange_diamond: John The Ripper - is a fast password cracker, currently available for many flavors of Unix, Windows, and other.
+  :small_orange_diamond: hashcat - world's fastest and most advanced password recovery utility.
+  :small_orange_diamond: p0f - is a tool to identify the players behind any incidental TCP/IP communications.
+  :small_orange_diamond: ssh_scan - a prototype SSH configuration and policy scanner.
+  :small_orange_diamond: LeakLooker - find open databases - powered by Binaryedge.io
+  :small_orange_diamond: exploitdb - searchable archive from The Exploit Database.
+  :small_orange_diamond: getsploit - is a command line utility for searching and downloading exploits.
+  :small_orange_diamond: ctf-tools - some setup scripts for security research tools.
+  :small_orange_diamond: pwntools - CTF framework and exploit development library.
+  :small_orange_diamond: security-tools - collection of small security tools created mostly in Python. CTFs, pentests and so on.
+  :small_orange_diamond: pentestpackage - is a package of Pentest scripts.
+  :small_orange_diamond: python-pentest-tools - python tools for penetration testers.
+  :small_orange_diamond: fuzzdb - dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
+  :small_orange_diamond: syzkaller - is an unsupervised, coverage-guided kernel fuzzer.
+  :small_orange_diamond: pwndbg - exploit development and reverse engineering with GDB made easy.
+  :small_orange_diamond: GDB PEDA - Python Exploit Development Assistance for GDB.
+  :small_orange_diamond: IDA - multi-processor disassembler and debugger useful for reverse engineering malware.
+  :small_orange_diamond: radare2 - framework for reverse-engineering and analyzing binaries.
+  :small_orange_diamond: routersploit - exploitation framework for embedded devices.
+  :small_orange_diamond: Ghidra - is a software reverse engineering (SRE) framework.
+  :small_orange_diamond: Vulnreport - open-source pentesting management and automation platform by Salesforce Product Security.
+  :small_orange_diamond: Mentalist - is a graphical tool for custom wordlist generation.
+  :small_orange_diamond: archerysec - vulnerability assessment and management helps to perform scans and manage vulnerabilities.
+  :small_orange_diamond: Osmedeus - fully automated offensive security tool for reconnaissance and vulnerability scanning.
+  :small_orange_diamond: beef - the browser exploitation framework project.
+  :small_orange_diamond: AutoSploit - automated mass exploiter.
+  :small_orange_diamond: SUDO_KILLER - is a tool to identify and exploit sudo rules' misconfigurations and vulnerabilities.
+  :small_orange_diamond: yara - the pattern matching swiss knife.
+  :small_orange_diamond: mimikatz - a little tool to play with Windows security.
+  :small_orange_diamond: OWASP Threat Dragon - is a tool used to create threat model diagrams and to record possible threats.
+

+ +##### :black_small_square: Pentests bookmarks collection + +

+  :small_orange_diamond: PTES - the penetration testing execution standard.
+  :small_orange_diamond: Pentests MindMap - amazing mind map with vulnerable apps and systems.
+  :small_orange_diamond: WebApps Security Tests MindMap - incredible mind map for WebApps security tests.
+  :small_orange_diamond: Brute XSS - master the art of Cross Site Scripting.
+  :small_orange_diamond: XSS cheat sheet - contains many vectors that can help you bypass WAFs and filters.
+  :small_orange_diamond: Offensive Security Bookmarks - security bookmarks collection, all things that author need to pass OSCP.
+  :small_orange_diamond: Awesome Pentest Cheat Sheets - collection of the cheat sheets useful for pentesting.
+  :small_orange_diamond: Awesome Hacking by HackWithGithub - awesome lists for hackers, pentesters and security researchers.
+  :small_orange_diamond: Awesome Hacking by carpedm20 - a curated list of awesome hacking tutorials, tools and resources.
+  :small_orange_diamond: Awesome Hacking Resources - collection of hacking/penetration testing resources to make you better.
+  :small_orange_diamond: Awesome Pentest - collection of awesome penetration testing resources, tools and other shiny things.
+  :small_orange_diamond: Awesome-Hacking-Tools - is a curated list of awesome Hacking Tools.
+  :small_orange_diamond: Hacking Cheat Sheet - author hacking and pentesting notes.
+  :small_orange_diamond: blackhat-arsenal-tools - official Black Hat arsenal security tools repository.
+  :small_orange_diamond: Penetration Testing and WebApp Cheat Sheets - the complete list of Infosec related cheat sheets.
+  :small_orange_diamond: Cyber Security Resources - includes thousands of cybersecurity-related references and resources.
+  :small_orange_diamond: Pentest Bookmarks - there are a LOT of pentesting blogs.
+  :small_orange_diamond: Cheatsheet-God - Penetration Testing Reference Bank - OSCP/PTP & PTX Cheatsheet.
+  :small_orange_diamond: ThreatHunter-Playbook - to aid the development of techniques and hypothesis for hunting campaigns.
+  :small_orange_diamond: Beginner-Network-Pentesting - notes for beginner network pentesting course.
+  :small_orange_diamond: OSCPRepo - is a list of resources that author have been gathering in preparation for the OSCP.
+  :small_orange_diamond: PayloadsAllTheThings - a list of useful payloads and bypass for Web Application Security and Pentest/CTF.
+  :small_orange_diamond: payloads - git all the Payloads! A collection of web attack payloads.
+  :small_orange_diamond: command-injection-payload-list - command injection payload list.
+  :small_orange_diamond: AwesomeXSS - is a collection of Awesome XSS resources.
+  :small_orange_diamond: php-webshells - common php webshells.
+  :small_orange_diamond: Pentesting Tools Cheat Sheet - a quick reference high level overview for typical penetration testing engagements.
+  :small_orange_diamond: OWASP Cheat Sheet Series - is a collection of high value information on specific application security topics.
+  :small_orange_diamond: OWASP dependency-check - is an open source solution the OWASP Top 10 2013 entry.
+  :small_orange_diamond: OWASP ProActive Controls - OWASP Top 10 Proactive Controls 2018.
+  :small_orange_diamond: PENTESTING-BIBLE - hacking & penetration testing & red team & cyber security & computer science resources.
+  :small_orange_diamond: pentest-wiki - is a free online security knowledge library for pentesters/researchers.
+  :small_orange_diamond: DEF CON Media Server - great stuff from DEFCON.
+  :small_orange_diamond: Awesome Malware Analysis - a curated list of awesome malware analysis tools and resources.
+  :small_orange_diamond: SQL Injection Cheat Sheet - detailed technical information about the many different variants of the SQL Injection.
+  :small_orange_diamond: Entersoft Knowledge Base - great and detailed reference about vulnerabilities.
+  :small_orange_diamond: HTML5 Security Cheatsheet - a collection of HTML5 related XSS attack vectors.
+  :small_orange_diamond: XSS String Encoder - for generating XSS code to check your input validation filters against XSS.
+  :small_orange_diamond: GTFOBins - list of Unix binaries that can be exploited by an attacker to bypass local security restrictions.
+  :small_orange_diamond: Guifre Ruiz Notes - collection of security, system, network and pentest cheatsheets.
+  :small_orange_diamond: SSRF Tips - a collection of SSRF Tips.
+  :small_orange_diamond: shell-storm repo CTF - great archive of CTFs.
+  :small_orange_diamond: ctf - CTF (Capture The Flag) writeups, code snippets, notes, scripts.
+  :small_orange_diamond: My-CTF-Web-Challenges - collection of CTF Web challenges.
+  :small_orange_diamond: MSTG - The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security testing.
+  :small_orange_diamond: Internal-Pentest-Playbook - notes on the most common things for an Internal Network Penetration Test.
+  :small_orange_diamond: KeyHacks - shows quick ways in which API keys leaked by a bug bounty program can be checked.
+  :small_orange_diamond: securitum/research - various Proof of Concepts of security research performed by Securitum.
+  :small_orange_diamond: public-pentesting-reports - is a list of public penetration test reports released by several consulting security groups.
+  :small_orange_diamond: hackso.me - a great journey into security.
+

+ +##### :black_small_square: Backdoors/exploits + +

+  :small_orange_diamond: PHP-backdoors - a collection of PHP backdoors. For educational or testing purposes only.
+

+ +##### :black_small_square: Wordlists and Weak passwords + +

+  :small_orange_diamond: Weakpass - for any kind of bruteforce find wordlists or unleash the power of them all at once!
+  :small_orange_diamond: Hashes.org - is a free online hash resolving service incorporating many unparalleled techniques.
+  :small_orange_diamond: SecLists - collection of multiple types of lists used during security assessments, collected in one place.
+  :small_orange_diamond: Probable-Wordlists - sorted by probability originally created for password generation and testing.
+  :small_orange_diamond: skullsecurity passwords - password dictionaries and leaked passwords repository.
+  :small_orange_diamond: Polish PREMIUM Dictionary - official dictionary created by the team on the forum bezpieka.org.* 1
+  :small_orange_diamond:
statistically-likely-usernames - wordlists for creating statistically likely username lists for use in password attacks.
+

+ +##### :black_small_square: Bounty platforms + +

+  :small_orange_diamond: YesWeHack - bug bounty platform with infosec jobs.
+  :small_orange_diamond: Openbugbounty - allows any security researcher reporting a vulnerability on any website.
+  :small_orange_diamond: hackerone - global hacker community to surface the most relevant security issues.
+  :small_orange_diamond: bugcrowd - crowdsourced cybersecurity for the enterprise.
+  :small_orange_diamond: Crowdshield - crowdsourced security & bug bounty management.
+  :small_orange_diamond: Synack - crowdsourced security & bug bounty programs, crowd security intelligence platform and more.
+  :small_orange_diamond: Hacktrophy - bug bounty platform.
+

+ +##### :black_small_square: Web Training Apps (local installation) + +

+  :small_orange_diamond: OWASP-VWAD - comprehensive and well maintained registry of all known vulnerable web applications.
+  :small_orange_diamond: DVWA - PHP/MySQL web application that is damn vulnerable.
+  :small_orange_diamond: metasploitable2 - vulnerable web application amongst security researchers.
+  :small_orange_diamond: metasploitable3 - is a VM that is built from the ground up with a large amount of security vulnerabilities.
+  :small_orange_diamond: DSVW - is a deliberately vulnerable web application written in under 100 lines of code.
+  :small_orange_diamond: OWASP Mutillidae II - free, open source, deliberately vulnerable web-application.
+  :small_orange_diamond: OWASP Juice Shop Project - the most bug-free vulnerable application in existence.
+  :small_orange_diamond: OWASP Node js Goat Project - OWASP Top 10 security risks apply to web applications developed using Node.js.
+  :small_orange_diamond: juicy-ctf - run Capture the Flags and Security Trainings with OWASP Juice Shop.
+  :small_orange_diamond: SecurityShepherd - web and mobile application security training platform.
+  :small_orange_diamond: Security Ninjas - open source application security training program.
+  :small_orange_diamond: hackazon - a modern vulnerable web app.
+  :small_orange_diamond: dvna - damn vulnerable NodeJS application.
+  :small_orange_diamond: django-DefectDojo - is an open-source application vulnerability correlation and security orchestration tool.
+  :small_orange_diamond: Google Gruyere - web application exploits and defenses.
+  :small_orange_diamond: Bodhi - is a playground focused on learning the exploitation of client-side web vulnerabilities.
+  :small_orange_diamond: Websploit - single vm lab with the purpose of combining several vulnerable appliations in one environment.
+  :small_orange_diamond: vulhub - pre-built Vulnerable Environments based on docker-compose.
+  :small_orange_diamond: CloudGoat 2 - the new & improved "Vulnerable by Design" +AWS deployment tool.
+  :small_orange_diamond: secDevLabs - is a laboratory for learning secure web development in a practical manner.
+  :small_orange_diamond: CORS-vulnerable-Lab - sample vulnerable code and its exploit code.
+  :small_orange_diamond: RootTheBox - a Game of Hackers (CTF Scoreboard & Game Manager).
+

+ +##### :black_small_square: Labs (ethical hacking platforms/trainings/CTFs) + +

+  :small_orange_diamond: Offensive Security - true performance-based penetration testing training for over a decade.
+  :small_orange_diamond: Hack The Box - online platform allowing you to test your penetration testing skills.
+  :small_orange_diamond: Hacking-Lab - online ethical hacking, computer network and security challenge platform.
+  :small_orange_diamond: pwnable.kr - non-commercial wargame site which provides various pwn challenges regarding system exploitation.
+  :small_orange_diamond: Pwnable.tw - is a wargame site for hackers to test and expand their binary exploiting skills.
+  :small_orange_diamond: picoCTF - is a free computer security game targeted at middle and high school students.
+  :small_orange_diamond: CTFlearn - is an online platform built to help ethical hackers learn and practice their cybersecurity knowledge and skills.
+  :small_orange_diamond: ctftime - CTF archive and a place, where you can get some another CTF-related info.
+  :small_orange_diamond: Silesia Security Lab - high quality security testing services.
+  :small_orange_diamond: Practical Pentest Labs - pentest lab, take your Hacking skills to the next level.
+  :small_orange_diamond: Root Me - the fast, easy, and affordable way to train your hacking skills.
+  :small_orange_diamond: rozwal.to - a great platform to train your pentesting skills.
+  :small_orange_diamond: TryHackMe - learning Cyber Security made easy.
+  :small_orange_diamond: hackxor - is a realistic web application hacking game, designed to help players of all abilities develop their skills.
+  :small_orange_diamond: Hack Yourself First - it's full of nasty app sec holes.
+  :small_orange_diamond: OverTheWire - can help you to learn and practice security concepts in the form of fun-filled games.
+  :small_orange_diamond: Wizard Labs - is an online Penetration Testing Lab.
+  :small_orange_diamond: PentesterLab - provides vulnerable systems that can be used to test and understand vulnerabilities.
+  :small_orange_diamond: RingZer0 - tons of challenges designed to test and improve your hacking skills.
+  :small_orange_diamond: try2hack - several security-oriented challenges for your entertainment.
+  :small_orange_diamond: Ubeeri - preconfigured lab environments.
+  :small_orange_diamond: Pentestit - emulate IT infrastructures of real companies for legal pen testing and improving penetration testing skills.
+  :small_orange_diamond: Microcorruption - reversal challenges done in the web interface.
+  :small_orange_diamond: Crackmes - download crackmes to help improve your reverse engineering skills.
+  :small_orange_diamond: DomGoat - DOM XSS security learning and practicing platform.
+  :small_orange_diamond: Stereotyped Challenges - upgrade your web hacking techniques today!
+  :small_orange_diamond: Vulnhub - allows anyone to gain practical 'hands-on' experience in digital security.
+  :small_orange_diamond: W3Challs - is a penetration testing training platform, which offers various computer challenges.
+  :small_orange_diamond: RingZer0 CTF - offers you tons of challenges designed to test and improve your hacking skills.
+  :small_orange_diamond: Hack.me - a platform where you can build, host and share vulnerable web apps for educational and research purposes.
+  :small_orange_diamond: HackThis! - discover how hacks, dumps and defacements are performed and secure your website against hackers.
+  :small_orange_diamond: Enigma Group WebApp Training - these challenges cover the exploits listed in the OWASP Top 10 Project.
+  :small_orange_diamond: Reverse Engineering Challenges - challenges, exercises, problems and tasks - by level, by type, and more.
+  :small_orange_diamond: 0x00sec - the home of the Hacker - Malware, Reverse Engineering, and Computer Science.
+  :small_orange_diamond: We Chall - there are exist a lots of different challenge types.
+  :small_orange_diamond: Hacker Gateway - is the go-to place for hackers who want to test their skills.
+  :small_orange_diamond: Hacker101 - is a free class for web security.
+  :small_orange_diamond: contained.af - a stupid game for learning about containers, capabilities, and syscalls.
+  :small_orange_diamond: flAWS challenge! - a series of levels you'll learn about common mistakes and gotchas when using AWS.
+  :small_orange_diamond: CyberSec WTF - provides web hacking challenges derived from bounty write-ups.
+  :small_orange_diamond: CTF Challenge - CTF Web App challenges.
+  :small_orange_diamond: gCTF - most of the challenges used in the Google CTF 2017.
+  :small_orange_diamond: Hack This Site - is a free, safe and legal training ground for hackers.
+  :small_orange_diamond: Attack & Defense - is a browser-based cloud labs.
+

+ +##### :black_small_square: CTF platforms + +

+  :small_orange_diamond: fbctf - platform to host Capture the Flag competitions.
+  :small_orange_diamond: ctfscoreboard - scoreboard for Capture The Flag competitions.
+

+ +##### :black_small_square: Other resources + +

+  :small_orange_diamond: Bugcrowd University - open source education content for the researcher community.
+  :small_orange_diamond: OSCPRepo - a list of resources and scripts that I have been gathering in preparation for the OSCP.
+  :small_orange_diamond: OWASP Top 10: Real-World Examples - test your web apps with real-world examples (two-part series).
+  :small_orange_diamond: phrack.org - an awesome collection of articles from several respected hackers and other thinkers.
+

+ +#### Your daily knowledge and news  [[TOC]](#anger-table-of-contents) + +##### :black_small_square: RSS Readers + +

+  :small_orange_diamond: Feedly - organize, read and share what matters to you.
+  :small_orange_diamond: Inoreader - similar to feedly with a support for filtering what you fetch from rss.
+

+ +##### :black_small_square: IRC Channels + +

+  :small_orange_diamond: #hackerspaces - hackerspace IRC channels.
+

+ +##### :black_small_square: Security + +

+  :small_orange_diamond: The Hacker News - leading news source dedicated to promoting awareness for security experts and hackers.
+  :small_orange_diamond: Latest Hacking News - provides the latest hacking news, exploits and vulnerabilities for ethical hackers.
+  :small_orange_diamond: Security Newsletter - security news as a weekly digest (email notifications).
+  :small_orange_diamond: Google Online Security Blog - the latest news and insights from Google on security and safety on the Internet.
+  :small_orange_diamond: Qualys Blog - expert network security guidance and news.
+  :small_orange_diamond: DARKReading - connecting the Information Security Community.
+  :small_orange_diamond: Darknet - latest hacking tools, hacker news, cybersecurity best practices, ethical hacking & pen-testing.
+  :small_orange_diamond: publiclyDisclosed - public disclosure watcher who keeps you up to date about the recently disclosed bugs.
+  :small_orange_diamond: Reddit - Hacking - a subreddit dedicated to hacking and hackers.
+  :small_orange_diamond: Packet Storm - information security services, news, files, tools, exploits, advisories and whitepapers.
+  :small_orange_diamond: Sekurak - about security, penetration tests, vulnerabilities and many others (PL/EN).
+  :small_orange_diamond: nf.sec - basic aspects and mechanisms of Linux operating system security (PL).
+

+ +##### :black_small_square: Other/All-in-one + +

+  :small_orange_diamond: Changelog - is a community of hackers; news & podcasts for developers and hackers.
+

+ +#### Other Cheat Sheets  [[TOC]](#anger-table-of-contents) + +###### Build your own DNS Servers + +

+  :small_orange_diamond: Unbound DNS Tutorial - a validating, recursive, and caching DNS server.
+  :small_orange_diamond: Knot Resolver on Fedora - how to get faster and more secure DNS resolution with Knot Resolver on Fedora.
+  :small_orange_diamond: DNS-over-HTTPS - tutorial to setup your own DNS-over-HTTPS (DoH) server.
+  :small_orange_diamond: dns-over-https - a cartoon intro to DNS over HTTPS.
+  :small_orange_diamond: DNS-over-TLS - following to your DoH server, setup your DNS-over-TLS (DoT) server.
+  :small_orange_diamond: DNS Servers - how (and why) i run my own DNS Servers.
+

+ +###### Build your own Certificate Authority + +

+  :small_orange_diamond: OpenSSL Certificate Authority - build your own certificate authority (CA) using the OpenSSL command-line tools.
+  :small_orange_diamond: step-ca Certificate Authority - build your own certificate authority (CA) using open source step-ca.
+

+ +###### Build your own System/Virtual Machine + +

+  :small_orange_diamond: os-tutorial - how to create an OS from scratch.
+  :small_orange_diamond: Write your Own Virtual Machine - how to write your own virtual machine (VM).
+  :small_orange_diamond: x86 Bare Metal Examples - dozens of minimal operating systems to learn x86 system programming.
+  :small_orange_diamond: simple-computer - the scott CPU from "But How Do It Know?" by J. Clark Scott.
+

+ +###### DNS Servers list (privacy) + +| IP | URL | +| :--- | :--- | +| **`84.200.69.80`** | [dns.watch](https://dns.watch/) | +| **`94.247.43.254`** | [opennic.org](https://www.opennic.org/) | +| **`64.6.64.6`** | [verisign.com](https://www.verisign.com/en_US/security-services/public-dns/index.xhtml) | +| **`89.233.43.71`** | [censurfridns.dk](https://blog.uncensoreddns.org/) | +| **`1.1.1.1`** | [cloudflare.com](https://1.1.1.1/) | +| **`94.130.110.185`** | [dnsprivacy.at](https://dnsprivacy.at/) | + +###### TOP Browser extensions + +| Extension name | Description | +| :--- | :--- | +| **`IPvFoo`** | Display the server IP address and HTTPS information across all page elements. | +| **`FoxyProxy`** | Simplifies configuring browsers to access proxy-servers. | +| **`HTTPS Everywhere`** | Automatically use HTTPS security on many sites. | +| **`uMatrix`** | Point & click to forbid/allow any class of requests made by your browser. | +| **`uBlock Origin`** | An efficient blocker: easy on memory and CPU footprint. | +| **`Session Buddy`** | Manage browser tabs and bookmarks with ease. | +| **`SuperSorter`** | Sort bookmarks recursively, delete duplicates, merge folders and more. | +| **`Clear Cache`** | Clear your cache and browsing data. | +| **`d3coder`** | Encoding/Decoding plugin for various types of encoding. | +| **`Web Developer`** | Adds a toolbar button with various web developer tools. | +| **`ThreatPinch Lookup`** | Add threat intelligence hover tool tips. | + +###### TOP Burp extensions + +| Extension name | Description | +| :--- | :--- | +| **`Autorize`** | Automatically detects authorization enforcement. | +| **`Reflection`** | An efficient blocker: easy on memory and CPU footprint. | +| **`Logger++`** | Logs requests and responses for all Burp tools in a sortable table. | +| **`Bypass WAF`** | Adds headers useful for bypassing some WAF devices. | +| **`JSON Beautifier`** | Beautifies JSON content in the HTTP message viewer. | +| **`JSON Web Tokens`** | Enables Burp to decode and manipulate JSON web tokens. | +| **`CSP Auditor`** | Displays CSP headers for responses, and passively reports CSP weaknesses. | +| **`CSP-Bypass`** | Passively scans for CSP headers that contain known bypasses. | +| **`Hackvertor`** | Converts data using a tag-based configuration to apply various encoding. | +| **`Active Scan++`** | Extends Burp's active and passive scanning capabilities. | +| **`HTML5 Auditor`** | Scans for usage of risky HTML5 features. | +| **`Software Vulnerability Scanner`** | Software vulnerability scanner based on Vulners.com audit API. | + +###### Hack Mozilla Firefox addressbar + +In Firefox's addressbar, you can limit results by typing special characters before or after your term: + +- `^` - for matches in your browsing history +- `*` - for matches in your bookmarks. +- `%` - for matches in your currently open tabs. +- `#` - for matches in page titles. +- `@` - for matches in web addresses. + +###### Bypass WAFs by Shortening IP Address (by [0xInfection](https://twitter.com/0xInfection)) + +IP addresses can be shortened by dropping the zeroes: + +``` +http://1.0.0.1 → http://1.1 +http://127.0.0.1 → http://127.1 +http://192.168.0.1 → http://192.168.1 + +http://0xC0A80001 or http://3232235521 → 192.168.0.1 +http://192.168.257 → 192.168.1.1 +http://192.168.516 → 192.168.2.4 +``` + + > This bypasses WAF filters for SSRF, open-redirect, etc where any IP as input gets blacklisted. + +For more information please see [How to Obscure Any URL](http://www.pc-help.org/obscure.htm) and [Magic IP Address Shortcuts](https://stuff-things.net/2014/09/25/magic-ip-address-shortcuts/). + +#### One-liners  [[TOC]](#anger-table-of-contents) + +##### Table of Contents + + * [terminal](#tool-terminal) + * [busybox](#tool-busybox) + * [mount](#tool-mount) + * [fuser](#tool-fuser) + * [lsof](#tool-lsof) + * [ps](#tool-ps) + * [top](#tool-top) + * [vmstat](#tool-vmstat) + * [iostat](#tool-iostat) + * [strace](#tool-strace) + * [kill](#tool-kill) + * [find](#tool-find) + * [diff](#tool-diff) + * [vimdiff](#tool-vimdiff) + * [tail](#tool-tail) + * [cpulimit](#tool-cpulimit) + * [pwdx](#tool-pwdx) + * [tr](#tool-tr) + * [chmod](#tool-chmod) + * [who](#tool-who) + * [last](#tool-last) + * [screen](#tool-screen) + * [script](#tool-script) + * [du](#tool-du) + * [inotifywait](#tool-inotifywait) + * [openssl](#tool-openssl) + * [secure-delete](#tool-secure-delete) + * [dd](#tool-dd) + * [gpg](#tool-gpg) + * [system-other](#tool-system-other) + * [curl](#tool-curl) + * [httpie](#tool-httpie) + * [ssh](#tool-ssh) + * [linux-dev](#tool-linux-dev) + * [tcpdump](#tool-tcpdump) + * [tcpick](#tool-tcpick) + * [ngrep](#tool-ngrep) + * [hping3](#tool-hping3) + * [nmap](#tool-nmap) + * [netcat](#tool-netcat) + * [socat](#tool-socat) + * [p0f](#tool-p0f) + * [gnutls-cli](#tool-gnutls-cli) + * [netstat](#tool-netstat) + * [rsync](#tool-rsync) + * [host](#tool-host) + * [dig](#tool-dig) + * [certbot](#tool-certbot) + * [network-other](#tool-network-other) + * [git](#tool-git) + * [awk](#tool-awk) + * [sed](#tool-sed) + * [grep](#tool-grep) + * [perl](#tool-perl) + +##### Tool: [terminal](https://en.wikipedia.org/wiki/Linux_console) + +###### Reload shell without exit + +```bash +exec $SHELL -l +``` + +###### Close shell keeping all subprocess running + +```bash +disown -a && exit +``` + +###### Exit without saving shell history + +```bash +kill -9 $$ +unset HISTFILE && exit +``` + +###### Perform a branching conditional + +```bash +true && echo success +false || echo failed +``` + +###### Pipe stdout and stderr to separate commands + +```bash +some_command > >(/bin/cmd_for_stdout) 2> >(/bin/cmd_for_stderr) +``` + +###### Redirect stdout and stderr each to separate files and print both to the screen + +```bash +(some_command 2>&1 1>&3 | tee errorlog ) 3>&1 1>&2 | tee stdoutlog +``` + +###### List of commands you use most often + +```bash +history | \ +awk '{CMD[$2]++;count++;}END { for (a in CMD)print CMD[a] " " CMD[a]/count*100 "% " a;}' | \ +grep -v "./" | \ +column -c3 -s " " -t | \ +sort -nr | nl | head -n 20 +``` + +###### Sterilize bash history + +```bash +function sterile() { + + history | awk '$2 != "history" { $1=""; print $0 }' | egrep -vi "\ +curl\b+.*(-E|--cert)\b+.*\b*|\ +curl\b+.*--pass\b+.*\b*|\ +curl\b+.*(-U|--proxy-user).*:.*\b*|\ +curl\b+.*(-u|--user).*:.*\b* +.*(-H|--header).*(token|auth.*)\b+.*|\ +wget\b+.*--.*password\b+.*\b*|\ +http.?://.+:.+@.*\ +" > $HOME/histbuff; history -r $HOME/histbuff; + +} + +export PROMPT_COMMAND="sterile" +``` + + > Look also: [A naive utility to censor credentials in command history](https://github.com/lbonanomi/go/blob/master/revisionist.go). + +###### Quickly backup a file + +```bash +cp filename{,.orig} +``` + +###### Empty a file (truncate to 0 size) + +```bash +>filename +``` + +###### Delete all files in a folder that don't match a certain file extension + +```bash +rm !(*.foo|*.bar|*.baz) +``` + +###### Pass multi-line string to a file + +```bash +# cat >filename ... - overwrite the file +# cat >>filename ... - append to a file +cat > filename << __EOF__ +data data data +__EOF__ +``` + +###### Edit a file on a remote host using vim + +```bash +vim scp://user@host//etc/fstab +``` + +###### Create a directory and change into it at the same time + +```bash +mkd() { mkdir -p "$@" && cd "$@"; } +``` + +###### Convert uppercase files to lowercase files + +```bash +rename 'y/A-Z/a-z/' * +``` + +###### Print a row of characters across the terminal + +```bash +printf "%`tput cols`s" | tr ' ' '#' +``` + +###### Show shell history without line numbers + +```bash +history | cut -c 8- +fc -l -n 1 | sed 's/^\s*//' +``` + +###### Run command(s) after exit session + +```bash +cat > /etc/profile << __EOF__ +_after_logout() { + + username=$(whoami) + + for _pid in $(ps afx | grep sshd | grep "$username" | awk '{print $1}') ; do + + kill -9 $_pid + + done + +} +trap _after_logout EXIT +__EOF__ +``` + +###### Generate a sequence of numbers + +```bash +for ((i=1; i<=10; i+=2)) ; do echo $i ; done +# alternative: seq 1 2 10 + +for ((i=5; i<=10; ++i)) ; do printf '%02d\n' $i ; done +# alternative: seq -w 5 10 + +for i in {1..10} ; do echo $i ; done +``` + +###### Simple Bash filewatching + +```bash +unset MAIL; export MAILCHECK=1; export MAILPATH='$FILE_TO_WATCH?$MESSAGE' +``` + +--- + +##### Tool: [busybox](https://www.busybox.net/) + +###### Static HTTP web server + +```bash +busybox httpd -p $PORT -h $HOME [-c httpd.conf] +``` + +___ + +##### Tool: [mount](https://en.wikipedia.org/wiki/Mount_(Unix)) + +###### Mount a temporary ram partition + +```bash +mount -t tmpfs tmpfs /mnt -o size=64M +``` + + * `-t` - filesystem type + * `-o` - mount options + +###### Remount a filesystem as read/write + +```bash +mount -o remount,rw / +``` + +___ + +##### Tool: [fuser](https://en.wikipedia.org/wiki/Fuser_(Unix)) + +###### Show which processes use the files/directories + +```bash +fuser /var/log/daemon.log +fuser -v /home/supervisor +``` + +###### Kills a process that is locking a file + +```bash +fuser -ki filename +``` + + * `-i` - interactive option + +###### Kills a process that is locking a file with specific signal + +```bash +fuser -k -HUP filename +``` + + * `--list-signals` - list available signal names + +###### Show what PID is listening on specific port + +```bash +fuser -v 53/udp +``` + +###### Show all processes using the named filesystems or block device + +```bash +fuser -mv /var/www +``` + +___ + +##### Tool: [lsof](https://en.wikipedia.org/wiki/Lsof) + +###### Show process that use internet connection at the moment + +```bash +lsof -P -i -n +``` + +###### Show process that use specific port number + +```bash +lsof -i tcp:443 +``` + +###### Lists all listening ports together with the PID of the associated process + +```bash +lsof -Pan -i tcp -i udp +``` + +###### List all open ports and their owning executables + +```bash +lsof -i -P | grep -i "listen" +``` + +###### Show all open ports + +```bash +lsof -Pnl -i +``` + +###### Show open ports (LISTEN) + +```bash +lsof -Pni4 | grep LISTEN | column -t +``` + +###### List all files opened by a particular command + +```bash +lsof -c "process" +``` + +###### View user activity per directory + +```bash +lsof -u username -a +D /etc +``` + +###### Show 10 largest open files + +```bash +lsof / | \ +awk '{ if($7 > 1048576) print $7/1048576 "MB" " " $9 " " $1 }' | \ +sort -n -u | tail | column -t +``` + +###### Show current working directory of a process + +```bash +lsof -p | grep cwd +``` + +___ + +##### Tool: [ps](https://en.wikipedia.org/wiki/Ps_(Unix)) + +###### Show a 4-way scrollable process tree with full details + +```bash +ps awwfux | less -S +``` + +###### Processes per user counter + +```bash +ps hax -o user | sort | uniq -c | sort -r +``` + +###### Show all processes by name with main header + +```bash +ps -lfC nginx +``` + +___ + +##### Tool: [find](https://en.wikipedia.org/wiki/Find_(Unix)) + +###### Find files that have been modified on your system in the past 60 minutes + +```bash +find / -mmin 60 -type f +``` + +###### Find all files larger than 20M + +```bash +find / -type f -size +20M +``` + +###### Find duplicate files (based on MD5 hash) + +```bash +find -type f -exec md5sum '{}' ';' | sort | uniq --all-repeated=separate -w 33 +``` + +###### Change permission only for files + +```bash +cd /var/www/site && find . -type f -exec chmod 766 {} \; +cd /var/www/site && find . -type f -exec chmod 664 {} + +``` + +###### Change permission only for directories + +```bash +cd /var/www/site && find . -type d -exec chmod g+x {} \; +cd /var/www/site && find . -type d -exec chmod g+rwx {} + +``` + +###### Find files and directories for specific user/group + +```bash +# User: +find . -user -print +find /etc -type f -user -name "*.conf" + +# Group: +find /opt -group +find /etc -type f -group -iname "*.conf" +``` + +###### Find files and directories for all without specific user/group + +```bash +# User: +find . \! -user -print + +# Group: +find . \! -group +``` + +###### Looking for files/directories that only have certain permission + +```bash +# User +find . -user -perm -u+rw # -rw-r--r-- +find /home -user $(whoami) -perm 777 # -rwxrwxrwx + +# Group: +find /home -type d -group -perm 755 # -rwxr-xr-x +``` + +###### Delete older files than 60 days + +```bash +find . -type f -mtime +60 -delete +``` + +###### Recursively remove all empty sub-directories from a directory + +```bash +find . -depth -type d -empty -exec rmdir {} \; +``` + +###### How to find all hard links to a file + +```bash +find -xdev -samefile filename +``` + +###### Recursively find the latest modified files + +```bash +find . -type f -exec stat --format '%Y :%y %n' "{}" \; | sort -nr | cut -d: -f2- | head +``` + +###### Recursively find/replace of a string with sed + +```bash +find . -not -path '*/\.git*' -type f -print0 | xargs -0 sed -i 's/foo/bar/g' +``` + +###### Recursively find/replace of a string in directories and file names + +```bash +find . -depth -name '*test*' -execdir bash -c 'mv -v "$1" "${1//foo/bar}"' _ {} \; +``` + +###### Recursively find suid executables + +```bash +find / \( -perm -4000 -o -perm -2000 \) -type f -exec ls -la {} \; +``` + +___ + +##### Tool: [top](https://en.wikipedia.org/wiki/Top_(software)) + +###### Use top to monitor only all processes with the specific string + +```bash +top -p $(pgrep -d , ) +``` + + * `` - process containing string (eg. nginx, worker) + +___ + +##### Tool: [vmstat](https://en.wikipedia.org/wiki/Vmstat) + +###### Show current system utilization (fields in kilobytes) + +```bash +vmstat 2 20 -t -w +``` + + * `2` - number of times with a defined time interval (delay) + * `20` - each execution of the command (count) + * `-t` - show timestamp + * `-w` - wide output + * `-S M` - output of the fields in megabytes instead of kilobytes + +###### Show current system utilization will get refreshed every 5 seconds + +```bash +vmstat 5 -w +``` + +###### Display report a summary of disk operations + +```bash +vmstat -D +``` + +###### Display report of event counters and memory stats + +```bash +vmstat -s +``` + +###### Display report about kernel objects stored in slab layer cache + +```bash +vmstat -m +``` + +##### Tool: [iostat](https://en.wikipedia.org/wiki/Iostat) + +###### Show information about the CPU usage, and I/O statistics about all the partitions + +```bash +iostat 2 10 -t -m +``` + + * `2` - number of times with a defined time interval (delay) + * `10` - each execution of the command (count) + * `-t` - show timestamp + * `-m` - fields in megabytes (`-k` - in kilobytes, default) + +###### Show information only about the CPU utilization + +```bash +iostat 2 10 -t -m -c +``` + +###### Show information only about the disk utilization + +```bash +iostat 2 10 -t -m -d +``` + +###### Show information only about the LVM utilization + +```bash +iostat -N +``` + +___ + +##### Tool: [strace](https://en.wikipedia.org/wiki/Strace) + +###### Track with child processes + +```bash +# 1) +strace -f -p $(pidof glusterfsd) + +# 2) +strace -f $(pidof php-fpm | sed 's/\([0-9]*\)/\-p \1/g') +``` + +###### Track process with 30 seconds limit + +```bash +timeout 30 strace $(< /var/run/zabbix/zabbix_agentd.pid) +``` + +###### Track processes and redirect output to a file + +```bash +ps auxw | grep '[a]pache' | awk '{print " -p " $2}' | \ +xargs strace -o /tmp/strace-apache-proc.out +``` + +###### Track with print time spent in each syscall and limit length of print strings + +```bash +ps auxw | grep '[i]init_policy' | awk '{print " -p " $2}' | \ +xargs strace -f -e trace=network -T -s 10000 +``` + +###### Track the open request of a network port + +```bash +strace -f -e trace=bind nc -l 80 +``` + +###### Track the open request of a network port (show TCP/UDP) + +```bash +strace -f -e trace=network nc -lu 80 +``` + +___ + +##### Tool: [kill](https://en.wikipedia.org/wiki/Kill_(command)) + +###### Kill a process running on port + +```bash +kill -9 $(lsof -i : | awk '{l=$2} END {print l}') +``` + +___ + +##### Tool: [diff](https://en.wikipedia.org/wiki/Diff) + +###### Compare two directory trees + +```bash +diff <(cd directory1 && find | sort) <(cd directory2 && find | sort) +``` + +###### Compare output of two commands + +```bash +diff <(cat /etc/passwd) <(cut -f2 /etc/passwd) +``` + +___ + +##### Tool: [vimdiff](http://vimdoc.sourceforge.net/htmldoc/diff.html) + +###### Highlight the exact differences, based on characters and words + +```bash +vimdiff file1 file2 +``` +###### Compare two JSON files + +```bash +vimdiff <(jq -S . A.json) <(jq -S . B.json) +``` + +###### Compare Hex dump +```bash +d(){ vimdiff <(f $1) <(f $2);};f(){ hexdump -C $1|cut -d' ' -f3-|tr -s ' ';}; d ~/bin1 ~/bin2 +``` + +###### diffchar + +Save [diffchar](https://raw.githubusercontent.com/vim-scripts/diffchar.vim/master/plugin/diffchar.vim) @ `~/.vim/plugins` + +Click `F7` to switch between diff modes + +Usefull `vimdiff` commands: + +* `qa` to exit all windows +* `:vertical resize 70` to resize window +* set window width `Ctrl+W [N columns]+(Shift+)<\>` + +___ + +##### Tool: [tail](https://en.wikipedia.org/wiki/Tail_(Unix)) + +###### Annotate tail -f with timestamps + +```bash +tail -f file | while read ; do echo "$(date +%T.%N) $REPLY" ; done +``` + +###### Analyse an Apache access log for the most common IP addresses + +```bash +tail -10000 access_log | awk '{print $1}' | sort | uniq -c | sort -n | tail +``` + +###### Analyse web server log and show only 5xx http codes + +```bash +tail -n 100 -f /path/to/logfile | grep "HTTP/[1-2].[0-1]\" [5]" +``` + +___ + +##### Tool: [tar](https://en.wikipedia.org/wiki/Tar_(computing)) + +###### System backup with exclude specific directories + +```bash +cd / +tar -czvpf /mnt/system$(date +%d%m%Y%s).tgz --directory=/ \ +--exclude=proc/* --exclude=sys/* --exclude=dev/* --exclude=mnt/* . +``` + +###### System backup with exclude specific directories (pigz) + +```bash +cd / +tar cvpf /backup/snapshot-$(date +%d%m%Y%s).tgz --directory=/ \ +--exclude=proc/* --exclude=sys/* --exclude=dev/* \ +--exclude=mnt/* --exclude=tmp/* --use-compress-program=pigz . +``` + +___ + +##### Tool: [dump](https://en.wikipedia.org/wiki/Dump_(program)) + +###### System backup to file + +```bash +dump -y -u -f /backup/system$(date +%d%m%Y%s).lzo / +``` + +###### Restore system from lzo file + +```bash +cd / +restore -rf /backup/system$(date +%d%m%Y%s).lzo +``` + +___ + +##### Tool: [cpulimit](http://cpulimit.sourceforge.net/) + +###### Limit the cpu usage of a process + +```bash +cpulimit -p pid -l 50 +``` + +___ + +##### Tool: [pwdx](https://www.cyberciti.biz/faq/unix-linux-pwdx-command-examples-usage-syntax/) + +###### Show current working directory of a process + +```bash +pwdx +``` + +___ + +##### Tool: [taskset](https://www.cyberciti.biz/faq/taskset-cpu-affinity-command/) + +###### Start a command on only one CPU core + +```bash +taskset -c 0 +``` + +___ + +##### Tool: [tr](https://en.wikipedia.org/wiki/Tr_(Unix)) + +###### Show directories in the PATH, one per line + +```bash +tr : '\n' <<<$PATH +``` + +___ + +##### Tool: [chmod](https://en.wikipedia.org/wiki/Chmod) + +###### Remove executable bit from all files in the current directory + +```bash +chmod -R -x+X * +``` + +###### Restore permission for /bin/chmod + +```bash +# 1: +cp /bin/ls chmod.01 +cp /bin/chmod chmod.01 +./chmod.01 700 file + +# 2: +/bin/busybox chmod 0700 /bin/chmod + +# 3: +setfacl --set u::rwx,g::---,o::--- /bin/chmod +``` + +___ + +##### Tool: [who](https://en.wikipedia.org/wiki/Who_(Unix)) + +###### Find last reboot time + +```bash +who -b +``` + +###### Detect a user sudo-su'd into the current shell + +```bash +[[ $(who -m | awk '{ print $1 }') == $(whoami) ]] || echo "You are su-ed to $(whoami)" +``` + +___ + +##### Tool: [last](https://www.howtoforge.com/linux-last-command/) + +###### Was the last reboot a panic? + +```bash +(last -x -f $(ls -1t /var/log/wtmp* | head -2 | tail -1); last -x -f /var/log/wtmp) | \ +grep -A1 reboot | head -2 | grep -q shutdown && echo "Expected reboot" || echo "Panic reboot" +``` + +___ + +##### Tool: [screen](https://en.wikipedia.org/wiki/GNU_Screen) + +###### Start screen in detached mode + +```bash +screen -d -m +``` + +###### Attach to an existing screen session + +```bash +screen -r -d +``` + +___ + +##### Tool: [script](https://en.wikipedia.org/wiki/Script_(Unix)) + +###### Record and replay terminal session + +```bash +### Record session +# 1) +script -t 2>~/session.time -a ~/session.log + +# 2) +script --timing=session.time session.log + +### Replay session +scriptreplay --timing=session.time session.log +``` + +___ + +##### Tool: [du](https://en.wikipedia.org/wiki/GNU_Screen) + +###### Show 20 biggest directories with 'K M G' + +```bash +du | \ +sort -r -n | \ +awk '{split("K M G",v); s=1; while($1>1024){$1/=1024; s++} print int($1)" "v[s]"\t"$2}' | \ +head -n 20 +``` + +___ + +##### Tool: [inotifywait](https://en.wikipedia.org/wiki/GNU_Screen) + +###### Init tool everytime a file in a directory is modified + +```bash +while true ; do inotifywait -r -e MODIFY dir/ && ls dir/ ; done; +``` + +___ + +##### Tool: [openssl](https://www.openssl.org/) + +###### Testing connection to the remote host + +```bash +echo | openssl s_client -connect google.com:443 -showcerts +``` + +###### Testing connection to the remote host (debug mode) + +```bash +echo | openssl s_client -connect google.com:443 -showcerts -tlsextdebug -status +``` + +###### Testing connection to the remote host (with SNI support) + +```bash +echo | openssl s_client -showcerts -servername google.com -connect google.com:443 +``` + +###### Testing connection to the remote host with specific ssl version + +```bash +openssl s_client -tls1_2 -connect google.com:443 +``` + +###### Testing connection to the remote host with specific ssl cipher + +```bash +openssl s_client -cipher 'AES128-SHA' -connect google.com:443 +``` + +###### Verify 0-RTT + +```bash +_host="example.com" + +cat > req.in << __EOF__ +HEAD / HTTP/1.1 +Host: $_host +Connection: close +__EOF__ + +openssl s_client -connect ${_host}:443 -tls1_3 -sess_out session.pem -ign_eof < req.in +openssl s_client -connect ${_host}:443 -tls1_3 -sess_in session.pem -early_data req.in +``` + +###### Generate private key without passphrase + +```bash +# _len: 2048, 4096 +( _fd="private.key" ; _len="4096" ; \ +openssl genrsa -out ${_fd} ${_len} ) +``` + +###### Generate private key with passphrase + +```bash +# _ciph: des3, aes128, aes256 +# _len: 2048, 4096 +( _ciph="aes128" ; _fd="private.key" ; _len="4096" ; \ +openssl genrsa -${_ciph} -out ${_fd} ${_len} ) +``` + +###### Remove passphrase from private key + +```bash +( _fd="private.key" ; _fd_unp="private_unp.key" ; \ +openssl rsa -in ${_fd} -out ${_fd_unp} ) +``` + +###### Encrypt existing private key with a passphrase + +```bash +# _ciph: des3, aes128, aes256 +( _ciph="aes128" ; _fd="private.key" ; _fd_pass="private_pass.key" ; \ +openssl rsa -${_ciph} -in ${_fd} -out ${_fd_pass} +``` + +###### Check private key + +```bash +( _fd="private.key" ; \ +openssl rsa -check -in ${_fd} ) +``` + +###### Get public key from private key + +```bash +( _fd="private.key" ; _fd_pub="public.key" ; \ +openssl rsa -pubout -in ${_fd} -out ${_fd_pub} ) +``` + +###### Generate private key and CSR + +```bash +( _fd="private.key" ; _fd_csr="request.csr" ; _len="4096" ; \ +openssl req -out ${_fd_csr} -new -newkey rsa:${_len} -nodes -keyout ${_fd} ) +``` + +###### Generate CSR + +```bash +( _fd="private.key" ; _fd_csr="request.csr" ; \ +openssl req -out ${_fd_csr} -new -key ${_fd} ) +``` + +###### Generate CSR (metadata from existing certificate) + + > Where `private.key` is the existing private key. As you can see you do not generate this CSR from your certificate (public key). Also you do not generate the "same" CSR, just a new one to request a new certificate. + +```bash +( _fd="private.key" ; _fd_csr="request.csr" ; _fd_crt="cert.crt" ; \ +openssl x509 -x509toreq -in ${_fd_crt} -out ${_fd_csr} -signkey ${_fd} ) +``` + +###### Generate CSR with -config param + +```bash +( _fd="private.key" ; _fd_csr="request.csr" ; \ +openssl req -new -sha256 -key ${_fd} -out ${_fd_csr} \ +-config <( +cat << __EOF__ +[req] +default_bits = 2048 +default_md = sha256 +prompt = no +distinguished_name = dn +req_extensions = req_ext + +[ dn ] +C = "" +ST = "" +L = "" +O = "" +OU = "
" +CN = "" + +[ req_ext ] +subjectAltName = @alt_names + +[ alt_names ] +DNS.1 = +DNS.2 = +DNS.3 = +__EOF__ +)) +``` + +Other values in `[ dn ]`: + + > Look at this great explanation: [How to create multidomain certificates using config files](https://apfelboymchen.net/gnu/notes/openssl%20multidomain%20with%20config%20files.html) + +``` +countryName = "DE" # C= +stateOrProvinceName = "Hessen" # ST= +localityName = "Keller" # L= +postalCode = "424242" # L/postalcode= +streetAddress = "Crater 1621" # L/street= +organizationName = "apfelboymschule" # O= +organizationalUnitName = "IT Department" # OU= +commonName = "example.com" # CN= +emailAddress = "webmaster@example.com" # CN/emailAddress= +``` + +###### List available EC curves + +```bash +openssl ecparam -list_curves +``` + +###### Generate ECDSA private key + +```bash +# _curve: prime256v1, secp521r1, secp384r1 +( _fd="private.key" ; _curve="prime256v1" ; \ +openssl ecparam -out ${_fd} -name ${_curve} -genkey ) + +# _curve: X25519 +( _fd="private.key" ; _curve="x25519" ; \ +openssl genpkey -algorithm ${_curve} -out ${_fd} ) +``` + +###### Print ECDSA private and public keys + +```bash +( _fd="private.key" ; \ +openssl ec -in ${_fd} -noout -text ) + +# For x25519 only extracting public key +( _fd="private.key" ; _fd_pub="public.key" ; \ +openssl pkey -in ${_fd} -pubout -out ${_fd_pub} ) +``` + +###### Generate private key with CSR (ECC) + +```bash +# _curve: prime256v1, secp521r1, secp384r1 +( _fd="domain.com.key" ; _fd_csr="domain.com.csr" ; _curve="prime256v1" ; \ +openssl ecparam -out ${_fd} -name ${_curve} -genkey ; \ +openssl req -new -key ${_fd} -out ${_fd_csr} -sha256 ) +``` + +###### Generate self-signed certificate + +```bash +# _len: 2048, 4096 +( _fd="domain.key" ; _fd_out="domain.crt" ; _len="4096" ; _days="365" ; \ +openssl req -newkey rsa:${_len} -nodes \ +-keyout ${_fd} -x509 -days ${_days} -out ${_fd_out} ) +``` + +###### Generate self-signed certificate from existing private key + +```bash +# _len: 2048, 4096 +( _fd="domain.key" ; _fd_out="domain.crt" ; _days="365" ; \ +openssl req -key ${_fd} -nodes \ +-x509 -days ${_days} -out ${_fd_out} ) +``` + +###### Generate self-signed certificate from existing private key and csr + +```bash +# _len: 2048, 4096 +( _fd="domain.key" ; _fd_csr="domain.csr" ; _fd_out="domain.crt" ; _days="365" ; \ +openssl x509 -signkey ${_fd} -nodes \ +-in ${_fd_csr} -req -days ${_days} -out ${_fd_out} ) +``` + +###### Generate DH public parameters + +```bash +( _dh_size="2048" ; \ +openssl dhparam -out /etc/nginx/ssl/dhparam_${_dh_size}.pem "$_dh_size" ) +``` + +###### Display DH public parameters + +```bash +openssl pkeyparam -in dhparam.pem -text +``` + +###### Extract private key from pfx + +```bash +( _fd_pfx="cert.pfx" ; _fd_key="key.pem" ; \ +openssl pkcs12 -in ${_fd_pfx} -nocerts -nodes -out ${_fd_key} ) +``` + +###### Extract private key and certs from pfx + +```bash +( _fd_pfx="cert.pfx" ; _fd_pem="key_certs.pem" ; \ +openssl pkcs12 -in ${_fd_pfx} -nodes -out ${_fd_pem} ) +``` + +###### Convert DER to PEM + +```bash +( _fd_der="cert.crt" ; _fd_pem="cert.pem" ; \ +openssl x509 -in ${_fd_der} -inform der -outform pem -out ${_fd_pem} ) +``` + +###### Convert PEM to DER + +```bash +( _fd_der="cert.crt" ; _fd_pem="cert.pem" ; \ +openssl x509 -in ${_fd_pem} -outform der -out ${_fd_der} ) +``` + +###### Verification of the private key + +```bash +( _fd="private.key" ; \ +openssl rsa -noout -text -in ${_fd} ) +``` + +###### Verification of the public key + +```bash +# 1) +( _fd="public.key" ; \ +openssl pkey -noout -text -pubin -in ${_fd} ) + +# 2) +( _fd="private.key" ; \ +openssl rsa -inform PEM -noout -in ${_fd} &> /dev/null ; \ +if [ $? = 0 ] ; then echo -en "OK\n" ; fi ) +``` + +###### Verification of the certificate + +```bash +( _fd="certificate.crt" ; # format: pem, cer, crt \ +openssl x509 -noout -text -in ${_fd} ) +``` + +###### Verification of the CSR + +```bash +( _fd_csr="request.csr" ; \ +openssl req -text -noout -in ${_fd_csr} ) +``` + +###### Check whether the private key and the certificate match + +```bash +(openssl rsa -noout -modulus -in private.key | openssl md5 ; \ +openssl x509 -noout -modulus -in certificate.crt | openssl md5) | uniq +``` + +###### Check whether the private key and the CSR match + +```bash +(openssl rsa -noout -modulus -in private.key | openssl md5 ; \ +openssl req -noout -modulus -in request.csr | openssl md5) | uniq +``` + +___ + +##### Tool: [secure-delete](https://wiki.archlinux.org/index.php/Securely_wipe_disk) + +###### Secure delete with shred + +```bash +shred -vfuz -n 10 file +shred --verbose --random-source=/dev/urandom -n 1 /dev/sda +``` + +###### Secure delete with scrub + +```bash +scrub -p dod /dev/sda +scrub -p dod -r file +``` + +###### Secure delete with badblocks + +```bash +badblocks -s -w -t random -v /dev/sda +badblocks -c 10240 -s -w -t random -v /dev/sda +``` + +###### Secure delete with secure-delete + +```bash +srm -vz /tmp/file +sfill -vz /local +sdmem -v +swapoff /dev/sda5 && sswap -vz /dev/sda5 +``` + +___ + +##### Tool: [dd](https://en.wikipedia.org/wiki/Dd_(Unix)) + +###### Show dd status every so often + +```bash +dd status=progress +watch --interval 5 killall -USR1 dd +``` + +###### Redirect output to a file with dd + +```bash +echo "string" | dd of=filename +``` + +___ + +##### Tool: [gpg](https://www.gnupg.org/) + +###### Export public key + +```bash +gpg --export --armor "" > username.pkey +``` + + * `--export` - export all keys from all keyrings or specific key + * `-a|--armor` - create ASCII armored output + +###### Encrypt file + +```bash +gpg -e -r "" dump.sql +``` + + * `-e|--encrypt` - encrypt data + * `-r|--recipient` - encrypt for specific + +###### Decrypt file + +```bash +gpg -o dump.sql -d dump.sql.gpg +``` + + * `-o|--output` - use as output file + * `-d|--decrypt` - decrypt data (default) + +###### Search recipient + +```bash +gpg --keyserver hkp://keyserver.ubuntu.com --search-keys "" +``` + + * `--keyserver` - set specific key server + * `--search-keys` - search for keys on a key server + +###### List all of the packets in an encrypted file + +```bash +gpg --batch --list-packets archive.gpg +gpg2 --batch --list-packets archive.gpg +``` + +___ + +##### Tool: [system-other](https://github.com/trimstray/the-book-of-secret-knowledge#tool-system-other) + +###### Reboot system from init + +```bash +exec /sbin/init 6 +``` + +###### Init system from single user mode + +```bash +exec /sbin/init +``` + +###### Show current working directory of a process + +```bash +readlink -f /proc//cwd +``` + +###### Show actual pathname of the executed command + +```bash +readlink -f /proc//exe +``` + +##### Tool: [curl](https://curl.haxx.se) + +```bash +curl -Iks https://www.google.com +``` + + * `-I` - show response headers only + * `-k` - insecure connection when using ssl + * `-s` - silent mode (not display body) + +```bash +curl -Iks --location -X GET -A "x-agent" https://www.google.com +``` + + * `--location` - follow redirects + * `-X` - set method + * `-A` - set user-agent + +```bash +curl -Iks --location -X GET -A "x-agent" --proxy http://127.0.0.1:16379 https://www.google.com +``` + + * `--proxy [socks5://|http://]` - set proxy server + +```bash +curl -o file.pdf -C - https://example.com/Aiju2goo0Ja2.pdf +``` + + * `-o` - write output to file + * `-C` - resume the transfer + +###### Find your external IP address (external services) + +```bash +curl ipinfo.io +curl ipinfo.io/ip +curl icanhazip.com +curl ifconfig.me/ip ; echo +``` + +###### Repeat URL request + +```bash +# URL sequence substitution with a dummy query string: +curl -ks https://example.com/?[1-20] + +# With shell 'for' loop: +for i in {1..20} ; do curl -ks https://example.com/ ; done +``` + +###### Check DNS and HTTP trace with headers for specific domains + +```bash +### Set domains and external dns servers. +_domain_list=(google.com) ; _dns_list=("8.8.8.8" "1.1.1.1") + +for _domain in "${_domain_list[@]}" ; do + + printf '=%.0s' {1..48} + + echo + + printf "[\\e[1;32m+\\e[m] resolve: %s\\n" "$_domain" + + for _dns in "${_dns_list[@]}" ; do + + # Resolve domain. + host "${_domain}" "${_dns}" + + echo + + done + + for _proto in http https ; do + + printf "[\\e[1;32m+\\e[m] trace + headers: %s://%s\\n" "$_proto" "$_domain" + + # Get trace and http headers. + curl -Iks -A "x-agent" --location "${_proto}://${_domain}" + + echo + + done + +done + +unset _domain_list _dns_list +``` + +___ + +##### Tool: [httpie](https://httpie.org/) + +```bash +http -p Hh https://www.google.com +``` + + * `-p` - print request and response headers + * `H` - request headers + * `B` - request body + * `h` - response headers + * `b` - response body + +```bash +http -p Hh https://www.google.com --follow --verify no +``` + + * `-F, --follow` - follow redirects + * `--verify no` - skip SSL verification + +```bash +http -p Hh https://www.google.com --follow --verify no \ +--proxy http:http://127.0.0.1:16379 +``` + + * `--proxy [http:]` - set proxy server + +##### Tool: [ssh](https://www.openssh.com/) + +###### Escape Sequence + +``` +# Supported escape sequences: +~. - terminate connection (and any multiplexed sessions) +~B - send a BREAK to the remote system +~C - open a command line +~R - Request rekey (SSH protocol 2 only) +~^Z - suspend ssh +~# - list forwarded connections +~& - background ssh (when waiting for connections to terminate) +~? - this message +~~ - send the escape character by typing it twice +``` + +###### Compare a remote file with a local file + +```bash +ssh user@host cat /path/to/remotefile | diff /path/to/localfile - +``` + +###### SSH connection through host in the middle + +```bash +ssh -t reachable_host ssh unreachable_host +``` + +###### Run command over SSH on remote host + +```bash +cat > cmd.txt << __EOF__ +cat /etc/hosts +__EOF__ + +ssh host -l user $(&1 | tee -a "${_sesdir}/$(date +%Y%m%d).log" + +} + +# Alias: +alias ssh='_ssh_sesslog' +``` + +###### Using Keychain for SSH logins + +```bash +### Delete all of ssh-agent's keys. +function _scl() { + + /usr/bin/keychain --clear + +} + +### Add key to keychain. +function _scg() { + + /usr/bin/keychain /path/to/private-key + source "$HOME/.keychain/$HOSTNAME-sh" + +} +``` + +###### SSH login without processing any login scripts + +```bash +ssh -tt user@host bash +``` + +###### SSH local port forwarding + +Example 1: + +```bash +# Forwarding our local 2250 port to nmap.org:443 from localhost through localhost +host1> ssh -L 2250:nmap.org:443 localhost + +# Connect to the service: +host1> curl -Iks --location -X GET https://localhost:2250 +``` + +Example 2: + +```bash +# Forwarding our local 9051 port to db.d.x:5432 from localhost through node.d.y +host1> ssh -nNT -L 9051:db.d.x:5432 node.d.y + +# Connect to the service: +host1> psql -U db_user -d db_dev -p 9051 -h localhost +``` + + * `-n` - redirects stdin from `/dev/null` + * `-N` - do not execute a remote command + * `-T` - disable pseudo-terminal allocation + +###### SSH remote port forwarding + +```bash +# Forwarding our local 9051 port to db.d.x:5432 from host2 through node.d.y +host1> ssh -nNT -R 9051:db.d.x:5432 node.d.y + +# Connect to the service: +host2> psql -U postgres -d postgres -p 8000 -h localhost +``` + +___ + +##### Tool: [linux-dev](https://www.tldp.org/LDP/abs/html/devref1.html) + +###### Testing remote connection to port + +```bash +timeout 1 bash -c "//" >/dev/null 2>&1 ; echo $? +``` + + * `` - set remote host + * `` - set destination port + +###### Read and write to TCP or UDP sockets with common bash tools + +```bash +exec 5<>/dev/tcp//; cat <&5 & cat >&5; exec 5>&- +``` + +___ + +##### Tool: [tcpdump](http://www.tcpdump.org/) + +###### Filter incoming (on interface) traffic (specific ) + +```bash +tcpdump -ne -i eth0 -Q in host 192.168.252.1 and port 443 +``` + + * `-n` - don't convert addresses (`-nn` will not resolve hostnames or ports) + * `-e` - print the link-level headers + * `-i [iface|any]` - set interface + * `-Q|-D [in|out|inout]` - choose send/receive direction (`-D` - for old tcpdump versions) + * `host [ip|hostname]` - set host, also `[host not]` + * `[and|or]` - set logic + * `port [1-65535]` - set port number, also `[port not]` + +###### Filter incoming (on interface) traffic (specific ) and write to a file + +```bash +tcpdump -ne -i eth0 -Q in host 192.168.252.1 and port 443 -c 5 -w tcpdump.pcap +``` + + * `-c [num]` - capture only num number of packets + * `-w [filename]` - write packets to file, `-r [filename]` - reading from file + +###### Capture all ICMP packets + +```bash +tcpdump -nei eth0 icmp +``` + +###### Check protocol used (TCP or UDP) for service + +```bash +tcpdump -nei eth0 tcp port 22 -vv -X | egrep "TCP|UDP" +``` + +###### Display ASCII text (to parse the output using grep or other) + +```bash +tcpdump -i eth0 -A -s0 port 443 +``` + +###### Grab everything between two keywords + +```bash +tcpdump -i eth0 port 80 -X | sed -n -e '/username/,/=ldap/ p' +``` + +###### Grab user and pass ever plain http + +```bash +tcpdump -i eth0 port http -l -A | egrep -i \ +'pass=|pwd=|log=|login=|user=|username=|pw=|passw=|passwd=|password=|pass:|user:|username:|password:|login:|pass |user ' \ +--color=auto --line-buffered -B20 +``` + +###### Extract HTTP User Agent from HTTP request header + +```bash +tcpdump -ei eth0 -nn -A -s1500 -l | grep "User-Agent:" +``` + +###### Capture only HTTP GET and POST packets + +```bash +tcpdump -ei eth0 -s 0 -A -vv \ +'tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x47455420' or 'tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x504f5354' +``` + +or simply: + +```bash +tcpdump -ei eth0 -s 0 -v -n -l | egrep -i "POST /|GET /|Host:" +``` + +###### Rotate capture files + +```bash +tcpdump -ei eth0 -w /tmp/capture-%H.pcap -G 3600 -C 200 +``` + + * `-G ` - pcap will be created every `` seconds + * `-C ` - close the current pcap and open a new one if is larger than `` + +###### Top hosts by packets + +```bash +tcpdump -ei enp0s25 -nnn -t -c 200 | cut -f 1,2,3,4 -d '.' | sort | uniq -c | sort -nr | head -n 20 +``` + +###### Excludes any RFC 1918 private address + +```bash +tcpdump -nei eth0 'not (src net (10 or 172.16/12 or 192.168/16) and dst net (10 or 172.16/12 or 192.168/16))' +``` + +___ + +##### Tool: [tcpick](http://tcpick.sourceforge.net/) + +###### Analyse packets in real-time + +```bash +while true ; do tcpick -a -C -r dump.pcap ; sleep 2 ; clear ; done +``` + +___ + +##### Tool: [ngrep](http://ngrep.sourceforge.net/usage.html) + +```bash +ngrep -d eth0 "www.domain.com" port 443 +``` + + * `-d [iface|any]` - set interface + * `[domain]` - set hostname + * `port [1-65535]` - set port number + +```bash +ngrep -d eth0 "www.domain.com" src host 10.240.20.2 and port 443 +``` + + * `(host [ip|hostname])` - filter by ip or hostname + * `(port [1-65535])` - filter by port number + +```bash +ngrep -d eth0 -qt -O ngrep.pcap "www.domain.com" port 443 +``` + + * `-q` - quiet mode (only payloads) + * `-t` - added timestamps + * `-O [filename]` - save output to file, `-I [filename]` - reading from file + +```bash +ngrep -d eth0 -qt 'HTTP' 'tcp' +``` + + * `HTTP` - show http headers + * `tcp|udp` - set protocol + * `[src|dst] host [ip|hostname]` - set direction for specific node + +```bash +ngrep -l -q -d eth0 -i "User-Agent: curl*" +``` + + * `-l` - stdout line buffered + * `-i` - case-insensitive search + +___ + +##### Tool: [hping3](http://www.hping.org/) + +```bash +hping3 -V -p 80 -s 5050 www.google.com +``` + + * `-V|--verbose` - verbose mode + * `-p|--destport` - set destination port + * `-s|--baseport` - set source port + * `` - set scan type + * `-F|--fin` - set FIN flag, port open if no reply + * `-S|--syn` - set SYN flag + * `-P|--push` - set PUSH flag + * `-A|--ack` - set ACK flag (use when ping is blocked, RST response back if the port is open) + * `-U|--urg` - set URG flag + * `-Y|--ymas` - set Y unused flag (0x80 - nullscan), port open if no reply + * `-M 0 -UPF` - set TCP sequence number and scan type (URG+PUSH+FIN), port open if no reply + +```bash +hping3 -V -c 1 -1 -C 8 www.google.com +``` + + * `-c [num]` - packet count + * `-1` - set ICMP mode + * `-C|--icmptype [icmp-num]` - set icmp type (default icmp-echo = 8) + +```bash +hping3 -V -c 1000000 -d 120 -S -w 64 -p 80 --flood --rand-source +``` + + * `--flood` - sent packets as fast as possible (don't show replies) + * `--rand-source` - random source address mode + * `-d --data` - data size + * `-w|--win` - winsize (default 64) + +___ + +##### Tool: [nmap](https://nmap.org/) + +###### Ping scans the network + +```bash +nmap -sP 192.168.0.0/24 +``` + +###### Show only open ports + +```bash +nmap -F --open 192.168.0.0/24 +``` + +###### Full TCP port scan using with service version detection + +```bash +nmap -p 1-65535 -sV -sS -T4 192.168.0.0/24 +``` + +###### Nmap scan and pass output to Nikto + +```bash +nmap -p80,443 192.168.0.0/24 -oG - | nikto.pl -h - +``` + +###### Recon specific ip:service with Nmap NSE scripts stack + +```bash +# Set variables: +_hosts="192.168.250.10" +_ports="80,443" + +# Set Nmap NSE scripts stack: +_nmap_nse_scripts="+dns-brute,\ + +http-auth-finder,\ + +http-chrono,\ + +http-cookie-flags,\ + +http-cors,\ + +http-cross-domain-policy,\ + +http-csrf,\ + +http-dombased-xss,\ + +http-enum,\ + +http-errors,\ + +http-git,\ + +http-grep,\ + +http-internal-ip-disclosure,\ + +http-jsonp-detection,\ + +http-malware-host,\ + +http-methods,\ + +http-passwd,\ + +http-phpself-xss,\ + +http-php-version,\ + +http-robots.txt,\ + +http-sitemap-generator,\ + +http-shellshock,\ + +http-stored-xss,\ + +http-title,\ + +http-unsafe-output-escaping,\ + +http-useragent-tester,\ + +http-vhosts,\ + +http-waf-detect,\ + +http-waf-fingerprint,\ + +http-xssed,\ + +traceroute-geolocation.nse,\ + +ssl-enum-ciphers,\ + +whois-domain,\ + +whois-ip" + +# Set Nmap NSE script params: +_nmap_nse_scripts_args="dns-brute.domain=${_hosts},http-cross-domain-policy.domain-lookup=true," +_nmap_nse_scripts_args+="http-waf-detect.aggro,http-waf-detect.detectBodyChanges," +_nmap_nse_scripts_args+="http-waf-fingerprint.intensive=1" + +# Perform scan: +nmap --script="$_nmap_nse_scripts" --script-args="$_nmap_nse_scripts_args" -p "$_ports" "$_hosts" +``` + +___ + +##### Tool: [netcat](http://netcat.sourceforge.net/) + +```bash +nc -kl 5000 +``` + + * `-l` - listen for an incoming connection + * `-k` - listening after client has disconnected + * `>filename.out` - save receive data to file (optional) + +```bash +nc 192.168.0.1 5051 < filename.in +``` + + * `< filename.in` - send data to remote host + +```bash +nc -vz 10.240.30.3 5000 +``` + + * `-v` - verbose output + * `-z` - scan for listening daemons + +```bash +nc -vzu 10.240.30.3 1-65535 +``` + + * `-u` - scan only udp ports + +###### Transfer data file (archive) + +```bash +server> nc -l 5000 | tar xzvfp - +client> tar czvfp - /path/to/dir | nc 10.240.30.3 5000 +``` + +###### Launch remote shell + +```bash +# 1) +server> nc -l 5000 -e /bin/bash +client> nc 10.240.30.3 5000 + +# 2) +server> rm -f /tmp/f; mkfifo /tmp/f +server> cat /tmp/f | /bin/bash -i 2>&1 | nc -l 127.0.0.1 5000 > /tmp/f +client> nc 10.240.30.3 5000 +``` + +###### Simple file server + +```bash +while true ; do nc -l 5000 | tar -xvf - ; done +``` + +###### Simple minimal HTTP Server + +```bash +while true ; do nc -l -p 1500 -c 'echo -e "HTTP/1.1 200 OK\n\n $(date)"' ; done +``` + +###### Simple HTTP Server + + > Restarts web server after each request - remove `while` condition for only single connection. + +```bash +cat > index.html << __EOF__ + + + + + + + + + + +

+ + Hello! It's a site. + +

+ + + +__EOF__ +``` + +```bash +server> while : ; do \ +(echo -ne "HTTP/1.1 200 OK\r\nContent-Length: $(wc -c /" <"$_sent" & +sed "s/^/<= /" <"$_recv" & + +nc -l -p "$_listen_port" <"$_back" | \ +tee "$_sent" | \ +nc "$_bk_host" "$_bk_port" | \ +tee "$_recv" >"$_back" +``` + +```bash +server> chmod +x nc-proxy && ./nc-proxy 8080 192.168.252.10:8000 + lport: 8080 +bk_host: 192.168.252.10 +bk_port: 8000 + +client> http -p h 10.240.30.3:8080 +HTTP/1.1 200 OK +Accept-Ranges: bytes +Cache-Control: max-age=31536000 +Content-Length: 2748 +Content-Type: text/html; charset=utf-8 +Date: Sun, 01 Jul 2018 20:12:08 GMT +Last-Modified: Sun, 01 Apr 2018 21:53:37 GMT +``` + +###### Create a single-use TCP or UDP proxy + +```bash +### TCP -> TCP +nc -l -p 2000 -c "nc [ip|hostname] 3000" + +### TCP -> UDP +nc -l -p 2000 -c "nc -u [ip|hostname] 3000" + +### UDP -> UDP +nc -l -u -p 2000 -c "nc -u [ip|hostname] 3000" + +### UDP -> TCP +nc -l -u -p 2000 -c "nc [ip|hostname] 3000" +``` + +___ + +##### Tool: [gnutls-cli](https://gnutls.org/manual/html_node/gnutls_002dcli-Invocation.html) + +###### Testing connection to remote host (with SNI support) + +```bash +gnutls-cli -p 443 google.com +``` + +###### Testing connection to remote host (without SNI support) + +```bash +gnutls-cli --disable-sni -p 443 google.com +``` + +___ + +##### Tool: [socat](http://www.dest-unreach.org/socat/doc/socat.html) + +###### Testing remote connection to port + +```bash +socat - TCP4:10.240.30.3:22 +``` + + * `-` - standard input (STDIO) + * `TCP4:` - set tcp4 connection with specific params + * `[hostname|ip]` - set hostname/ip + * `[1-65535]` - set port number + +###### Redirecting TCP-traffic to a UNIX domain socket under Linux + +```bash +socat TCP-LISTEN:1234,bind=127.0.0.1,reuseaddr,fork,su=nobody,range=127.0.0.0/8 UNIX-CLIENT:/tmp/foo +``` + + * `TCP-LISTEN:` - set tcp listen with specific params + * `[1-65535]` - set port number + * `bind=[hostname|ip]` - set bind hostname/ip + * `reuseaddr` - allows other sockets to bind to an address + * `fork` - keeps the parent process attempting to produce more connections + * `su=nobody` - set user + * `range=[ip-range]` - ip range + * `UNIX-CLIENT:` - communicates with the specified peer socket + * `filename` - define socket + +___ + +##### Tool: [p0f](http://lcamtuf.coredump.cx/p0f3/) + +###### Set iface in promiscuous mode and dump traffic to the log file + +```bash +p0f -i enp0s25 -p -d -o /dump/enp0s25.log +``` + + * `-i` - listen on the specified interface + * `-p` - set interface in promiscuous mode + * `-d` - fork into background + * `-o` - output file + +___ + +##### Tool: [netstat](https://en.wikipedia.org/wiki/Netstat) + +###### Graph # of connections for each hosts + +```bash +netstat -an | awk '/ESTABLISHED/ { split($5,ip,":"); if (ip[1] !~ /^$/) print ip[1] }' | \ +sort | uniq -c | awk '{ printf("%s\t%s\t",$2,$1) ; for (i = 0; i < $1; i++) {printf("*")}; print "" }' +``` + +###### Monitor open connections for specific port including listen, count and sort it per IP + +```bash +watch "netstat -plan | grep :443 | awk {'print \$5'} | cut -d: -f 1 | sort | uniq -c | sort -nk 1" +``` + +###### Grab banners from local IPv4 listening ports + +```bash +netstat -nlt | grep 'tcp ' | grep -Eo "[1-9][0-9]*" | xargs -I {} sh -c "echo "" | nc -v -n -w1 127.0.0.1 {}" +``` + +___ + +##### Tool: [rsync](https://en.wikipedia.org/wiki/Rsync) + +###### Rsync remote data as root using sudo + +```bash +rsync --rsync-path 'sudo rsync' username@hostname:/path/to/dir/ /local/ +``` + +___ + +##### Tool: [host](https://en.wikipedia.org/wiki/Host_(Unix)) + +###### Resolves the domain name (using external dns server) + +```bash +host google.com 9.9.9.9 +``` + +###### Checks the domain administrator (SOA record) + +```bash +host -t soa google.com 9.9.9.9 +``` + +___ + +##### Tool: [dig](https://en.wikipedia.org/wiki/Dig_(command)) + +###### Resolves the domain name (short output) + +```bash +dig google.com +short +``` + +###### Lookup NS record for specific domain + +```bash +dig @9.9.9.9 google.com NS +``` + +###### Query only answer section + +```bash +dig google.com +nocomments +noquestion +noauthority +noadditional +nostats +``` + +###### Query ALL DNS Records + +```bash +dig google.com ANY +noall +answer +``` + +###### DNS Reverse Look-up + +```bash +dig -x 172.217.16.14 +short +``` + +___ + +##### Tool: [certbot](https://certbot.eff.org/) + +###### Generate multidomain certificate + +```bash +certbot certonly -d example.com -d www.example.com +``` + +###### Generate wildcard certificate + +```bash +certbot certonly --manual --preferred-challenges=dns -d example.com -d *.example.com +``` + +###### Generate certificate with 4096 bit private key + +```bash +certbot certonly -d example.com -d www.example.com --rsa-key-size 4096 +``` + +___ + +##### Tool: [network-other](https://github.com/trimstray/the-book-of-secret-knowledge#tool-network-other) + +###### Get all subnets for specific AS (Autonomous system) + +```bash +AS="AS32934" +whois -h whois.radb.net -- "-i origin ${AS}" | \ +grep "^route:" | \ +cut -d ":" -f2 | \ +sed -e 's/^[ \t]//' | \ +sort -n -t . -k 1,1 -k 2,2 -k 3,3 -k 4,4 | \ +cut -d ":" -f2 | \ +sed -e 's/^[ \t]/allow /' | \ +sed 's/$/;/' | \ +sed 's/allow */subnet -> /g' +``` + +###### Resolves domain name from dns.google.com with curl and jq + +```bash +_dname="google.com" ; curl -s "https://dns.google.com/resolve?name=${_dname}&type=A" | jq . +``` + +##### Tool: [git](https://git-scm.com/) + +###### Log alias for a decent view of your repo + +```bash +# 1) +git log --oneline --decorate --graph --all + +# 2) +git log --graph \ +--pretty=format:'%Cred%h%Creset -%C(yellow)%d%Creset %s %Cgreen(%cr) %C(bold blue)<%an>%Creset' \ +--abbrev-commit +``` + +___ + +##### Tool: [python](https://www.python.org/) + +###### Static HTTP web server + +```bash +# Python 3.x +python3 -m http.server 8000 --bind 127.0.0.1 + +# Python 2.x +python -m SimpleHTTPServer 8000 +``` + +###### Static HTTP web server with SSL support + +```bash +# Python 3.x +from http.server import HTTPServer, BaseHTTPRequestHandler +import ssl + +httpd = HTTPServer(('localhost', 4443), BaseHTTPRequestHandler) + +httpd.socket = ssl.wrap_socket (httpd.socket, + keyfile="path/to/key.pem", + certfile='path/to/cert.pem', server_side=True) + +httpd.serve_forever() + +# Python 2.x +import BaseHTTPServer, SimpleHTTPServer +import ssl + +httpd = BaseHTTPServer.HTTPServer(('localhost', 4443), + SimpleHTTPServer.SimpleHTTPRequestHandler) + +httpd.socket = ssl.wrap_socket (httpd.socket, + keyfile="path/tp/key.pem", + certfile='path/to/cert.pem', server_side=True) + +httpd.serve_forever() +``` + +###### Encode base64 + +```bash +python -m base64 -e <<< "sample string" +``` + +###### Decode base64 + +```bash +python -m base64 -d <<< "dGhpcyBpcyBlbmNvZGVkCg==" +``` + +##### Tool: [awk](http://www.grymoire.com/Unix/Awk.html) + +###### Search for matching lines + +```bash +# egrep foo +awk '/foo/' filename +``` + +###### Search non matching lines + +```bash +# egrep -v foo +awk '!/foo/' filename +``` + +###### Print matching lines with numbers + +```bash +# egrep -n foo +awk '/foo/{print FNR,$0}' filename +``` + +###### Print the last column + +```bash +awk '{print $NF}' filename +``` + +###### Find all the lines longer than 80 characters + +```bash +awk 'length($0)>80{print FNR,$0}' filename +``` + +###### Print only lines of less than 80 characters + +```bash +awk 'length < 80 filename +``` + +###### Print double new lines a file + +```bash +awk '1; { print "" }' filename +``` + +###### Print line numbers + +```bash +awk '{ print FNR "\t" $0 }' filename +awk '{ printf("%5d : %s\n", NR, $0) }' filename # in a fancy manner +``` + +###### Print line numbers for only non-blank lines + +```bash +awk 'NF { $0=++a " :" $0 }; { print }' filename +``` + +###### Print the line and the next two (i=5) lines after the line matching regexp + +```bash +awk '/foo/{i=5+1;}{if(i){i--; print;}}' filename +``` + +###### Print the lines starting at the line matching 'server {' until the line matching '}' + +```bash +awk '/server {/,/}/' filename +``` + +###### Print multiple columns with separators + +```bash +awk -F' ' '{print "ip:\t" $2 "\n port:\t" $3' filename +``` + +###### Remove empty lines + +```bash +awk 'NF > 0' filename + +# alternative: +awk NF filename +``` + +###### Delete trailing white space (spaces, tabs) + +```bash +awk '{sub(/[ \t]*$/, "");print}' filename +``` + +###### Delete leading white space + +```bash +awk '{sub(/^[ \t]+/, ""); print}' filename +``` + +###### Remove duplicate consecutive lines + +```bash +# uniq +awk 'a !~ $0{print}; {a=$0}' filename +``` + +###### Remove duplicate entries in a file without sorting + +```bash +awk '!x[$0]++' filename +``` + +###### Exclude multiple columns + +```bash +awk '{$1=$3=""}1' filename +``` + +###### Substitute foo for bar on lines matching regexp + +```bash +awk '/regexp/{gsub(/foo/, "bar")};{print}' filename +``` + +###### Add some characters at the beginning of matching lines + +```bash +awk '/regexp/{sub(/^/, "++++"); print;next;}{print}' filename +``` + +###### Get the last hour of Apache logs + +```bash +awk '/'$(date -d "1 hours ago" "+%d\\/%b\\/%Y:%H:%M")'/,/'$(date "+%d\\/%b\\/%Y:%H:%M")'/ { print $0 }' \ +/var/log/httpd/access_log +``` + +___ + +##### Tool: [sed](http://www.grymoire.com/Unix/Sed.html) + +###### Print a specific line from a file + +```bash +sed -n 10p /path/to/file +``` + +###### Remove a specific line from a file + +```bash +sed -i 10d /path/to/file +# alternative (BSD): sed -i'' 10d /path/to/file +``` + +###### Remove a range of lines from a file + +```bash +sed -i -re ',d' +``` + +###### Replace newline(s) with a space + +```bash +sed ':a;N;$!ba;s/\n/ /g' /path/to/file + +# cross-platform compatible syntax: +sed -e ':a' -e 'N' -e '$!ba' -e 's/\n/ /g' /path/to/file +``` + +- `:a` create a label `a` +- `N` append the next line to the pattern space +- `$!` if not the last line, ba branch (go to) label `a` +- `s` substitute, `/\n/` regex for new line, `/ /` by a space, `/g` global match (as many times as it can) + +Alternatives: + +```bash +# perl version (sed-like speed): +perl -p -e 's/\n/ /' /path/to/file + +# bash version (slow): +while read line ; do printf "%s" "$line " ; done < file +``` + +###### Delete string +N next lines + +```bash +sed '/start/,+4d' /path/to/file +``` + +___ + +##### Tool: [grep](http://www.grymoire.com/Unix/Grep.html) + +###### Search for a "pattern" inside all files in the current directory + +```bash +grep -rn "pattern" +grep -RnisI "pattern" * +fgrep "pattern" * -R +``` + +###### Show only for multiple patterns + +```bash +grep 'INFO*'\''WARN' filename +grep 'INFO\|WARN' filename +grep -e INFO -e WARN filename +grep -E '(INFO|WARN)' filename +egrep "INFO|WARN" filename +``` + +###### Except multiple patterns + +```bash +grep -vE '(error|critical|warning)' filename +``` + +###### Show data from file without comments + +```bash +grep -v ^[[:space:]]*# filename +``` + +###### Show data from file without comments and new lines + +```bash +egrep -v '#|^$' filename +``` + +###### Show strings with a dash/hyphen + +```bash +grep -e -- filename +grep -- -- filename +grep "\-\-" filename +``` + +###### Remove blank lines from a file and save output to new file + +```bash +grep . filename > newfilename +``` + +##### Tool: [perl](https://www.perl.org/) + +###### Search and replace (in place) + +```bash +perl -i -pe's/SEARCH/REPLACE/' filename +``` + +###### Edit of `*.conf` files changing all foo to bar (and backup original) + +```bash +perl -p -i.orig -e 's/\bfoo\b/bar/g' *.conf +``` + +###### Prints the first 20 lines from `*.conf` files + +```bash +perl -pe 'exit if $. > 20' *.conf +``` + +###### Search lines 10 to 20 + +```bash +perl -ne 'print if 10 .. 20' filename +``` + +###### Delete first 10 lines (and backup original) + +```bash +perl -i.orig -ne 'print unless 1 .. 10' filename +``` + +###### Delete all but lines between foo and bar (and backup original) + +```bash +perl -i.orig -ne 'print unless /^foo$/ .. /^bar$/' filename +``` + +###### Reduce multiple blank lines to a single line + +```bash +perl -p -i -00pe0 filename +``` + +###### Convert tabs to spaces (1t = 2sp) + +```bash +perl -p -i -e 's/\t/ /g' filename +``` + +###### Read input from a file and report number of lines and characters + +```bash +perl -lne '$i++; $in += length($_); END { print "$i lines, $in characters"; }' filename +``` + +#### Shell functions  [[TOC]](#anger-table-of-contents) + +##### Table of Contents + +- [Domain resolve](#domain-resolve) +- [Get ASN](#get-asn) + +###### Domain resolve + +```bash +# Dependencies: +# - curl +# - jq + +function DomainResolve() { + + local _host="$1" + + local _curl_base="curl --request GET" + local _timeout="15" + + _host_ip=$($_curl_base -ks -m "$_timeout" "https://dns.google.com/resolve?name=${_host}&type=A" | \ + jq '.Answer[0].data' | tr -d "\"" 2>/dev/null) + + if [[ -z "$_host_ip" ]] || [[ "$_host_ip" == "null" ]] ; then + + echo -en "Unsuccessful domain name resolution.\\n" + + else + + echo -en "$_host > $_host_ip\\n" + + fi + +} +``` + +Example: + +```bash +shell> DomainResolve nmap.org +nmap.org > 45.33.49.119 + +shell> DomainResolve nmap.org +Unsuccessful domain name resolution. +``` + +###### Get ASN + +```bash +# Dependencies: +# - curl + +function GetASN() { + + local _ip="$1" + + local _curl_base="curl --request GET" + local _timeout="15" + + _asn=$($_curl_base -ks -m "$_timeout" "http://ip-api.com/line/${_ip}?fields=as") + + _state=$(echo $?) + + if [[ -z "$_ip" ]] || [[ "$_ip" == "null" ]] || [[ "$_state" -ne 0 ]]; then + + echo -en "Unsuccessful ASN gathering.\\n" + + else + + echo -en "$_ip > $_asn\\n" + + fi + +} +``` + +Example: + +```bash +shell> GetASN 1.1.1.1 +1.1.1.1 > AS13335 Cloudflare, Inc. + +shell> GetASN 0.0.0.0 +Unsuccessful ASN gathering. +``` diff --git a/theming.md b/theming.md new file mode 100644 index 0000000..92fe75b --- /dev/null +++ b/theming.md @@ -0,0 +1,6 @@ +### theming resources + +https://is.gd/xghhO5 - theming engine for chrome +https://is.gd/9hu5UO - theming engine for firefox +https://github.com/StylishThemes - dark themes for sites + diff --git a/version.txt b/version.txt new file mode 100644 index 0000000..218c382 --- /dev/null +++ b/version.txt @@ -0,0 +1 @@ +202201121529-git diff --git a/webdev.md b/webdev.md new file mode 100644 index 0000000..e0c4312 --- /dev/null +++ b/webdev.md @@ -0,0 +1,6 @@ +### JS Projects + +https://github.com/WebDevSimplified +https://github.com/adrianhajdin +https://github.com/CodingGarden +