CPH:SEC CTF-Notes - Hackers Resources Galore
  • ADcheatsheet
  • Project tree
  • RTFnotes
  • WindowsRedTeamCheatSheet
  • How to pass the OSCP
  • Kerberos cheatsheet
  • Privilege Escalation & Post-Exploitation
  • Awesome-Hacking-Resources
    • Contribution Guidelines
    • Awesome Hacking Tools
  • Notes VA
    • Exploitation Cheat Sheet
    • Initial Enumeration
    • Linux Privilege Escalation
    • PenetrationTestingToolsCheatSheet
    • Web Enumeration
    • Windows Privilege Escalation
    • emailgrab
    • linux_priv_esc
    • openredirect
    • 24x7x365 SUPPORT http://www.captiongenerator.com/320492/Offsec-Student-Admins
    • oscp_playlist
    • Privilege Escalation & Post-Exploitation
    • smb_enum
    • whois-file-transfer
    • Windows / Linux Local Privilege Escalation Workshop
  • OSCP-Materials
  • SCADA PLC ICS Pentest PDFs
    • PLClinks
  • Web-CTF-Cheatsheet
  • audio
    • Decode SSTV
    • Spectrogram
  • binary-exploitation
    • Binary Exploitation with Buffer Overflow
    • Exploitation
    • Binary Exploitation with Format String
    • GOT Overriding
    • Exploitation
    • Binary Exploitation with Race Conditions
    • Binary Exploitation with Time Guessing
    • Exploitation
    • Binary Exploitation with ret2plt
    • Pwntools Cheat Sheet
    • Binary Exploitation
  • blockchain
    • Blockchain Pentesting
    • Interact with Ethereum using Foundry
    • Interact with Ethereum using Python
    • smart-contract
      • Ethereum Remix Extension in VS Code
      • Solidity Assembly
      • Create a Contract for Recovery Address
      • Explicit Conversion
      • Solidity Delegatecall Attack
      • DoS with Assembly Invalid Function
      • Solidity Overflow & Underflow
      • Create a Malicious Contract
      • Create a Malicious Contract for Destructing Contract
      • Create an Attack Contract
      • Solidity Storage Values Analysis
      • Inappropriate User Authorization
      • Web3.js Cheat Sheet
  • database
    • CouchDB Pentesting
    • InfluxDB Pentesting
    • MSSQL (Microsoft SQL) Pentesting
    • MongoDB Pentesting
    • MySQL Pentesting
    • Neo4j Pentesting
    • PostgreSQL Pentesting
    • Redis Pentesting
    • SQLite Pentesting
  • dns
    • DNS (Domain Name Systems) Pentesting
    • Enumeration
    • Subdomain Takeover
  • email
    • IMAP (Internet Message Access Protocol) Pentesting
    • POP (Post Office Protocol) Pentesting
    • Exploit DNS Zone Misconfiguration & BIND Config
    • SMTP (Simple Mail Transfer Protocol) Pentesting
  • game
    • FEN Manipulation
    • Minecraft Server Pentesting
    • WebAssembly Games Hacking
  • hardware
    • Firmware Analysis
    • Gerber Viewer
    • MQTT Pentesting
    • NETGEAR Pentesting
    • SAL Logic Analysis
    • linux
      • archive
        • 7z
        • Bzip2 & Bunzip2
        • Crack Zip Password
        • Gzip & Gunzip
        • Tar
        • Zip & Unzip
      • attack
        • Warning
      • backup
        • Extract Archives
      • container
        • Basic Flow
      • management
        • Add & Delete Groups in Linux
        • Add & Delete Users in Linux
        • File Transfer in Linux
        • File & Directory Ownership in Linux
        • File & Directory Permission in Linux
        • Shell Scripting
      • post-exploitation
        • Linux Backdoors
        • Linux Pivoting
      • privilege-escalation
        • Ansible Playbook Privilege Escalation
        • Apache Conf Privilege Escalation
        • Bash eq Privilege Escalation
        • Buffer Overflow Privilege Escalation
        • Chrome Remote Debugger Pentesting
        • Exploitation
        • Command Execution
        • Extract Passwords from Firefox Profile
        • OpenSSL Privilege Escalation
        • Exploitation
        • PolKit Privilege Escalation
        • Python Eval Code Execution
        • Python Jails Escape
        • Python Privilege Escalation
        • Python Yaml Privilege Escalation
        • Remote Code Execution with YAML
        • Reverse Shell
        • Find Credentials
        • Shared Library Hijacking
        • dirty_sock (CVE-2019-7304) Version < 2.37
        • Tar Wildcard Injection PrivEsc
        • Update-Motd Privilege Escalation
        • Linux Privilege Escalation
        • Exploitation
        • doas
          • Investigation
        • sudo
          • Sudo ClamAV Privilege Escalation
          • Sudo Dstat Privilege Escalation
          • Sudo Exiftool Privilege Escalation
          • Sudo Fail2ban Privilege Escalation
          • Sudo Git Privilege Escalation
          • Sudo Java Privilege Escalation
          • Sudo OpenVPN Privilege Escalation
          • Sudo Path Traversal Privilege Escalation
          • LD_PRELOAD, LD_LIBRARY_PATH Overwriting
          • Sudo Reboot Privilege Escalation
          • Sudo Screen Privilege Escalation
          • Sudo Service Privilege Escalation
          • Sudo Shutdown, Poweroff Privilege Escalation
          • Sudo Systemctl Privilege Escalation
          • Sudo Tee Privilege Escalation
          • Sudo Umount Privilege Escalation
          • Sudo Vim Privilege Escalation
          • Sudo Wall Privilege Escalation
          • Sudo Wget Privilege Escalation
          • Sudoedit Privilege Escalation
          • Sudo Privilege Escalation
      • protocol
        • Enumeration
  • machine-learning
    • Jupyter Notebook Pentesting
    • Orange Data Mining
    • Read HDF5 (H5) File
    • Load Model from PT
    • Read QASM
    • computer-vision
      • Image Analysis for Machine Learning
      • Swapping Pixels
      • Image Recognition Bypass for Machine Learning
    • data-processing
      • Find Optimal Number of Clusters
      • Data Manipulation for Machine Learning
      • PCA (Principal Component Analysis)
    • llm
      • Automation
      • LLM Prompt Injection
    • model
      • Adversarial Attack with FGSM (Fast Gradient Signed Method)
      • ML Model Analysis
      • Model Inversion Attack
  • malware
    • Online Scanner
    • Create Macro to Code Execution
    • Static Analysis
    • Malware Analysis
    • Checking Established Network
    • Malware Dynamic Analysis with REMnux
    • Malware Static Analysis
    • NPM Supply Chain Attack
    • Example
    • Splunk Pentesting
  • memory
    • Memory Forensics
  • misc
    • Brainfuck
    • Regular Expressions (Regex/RegExp)
  • network
    • ARP (Address Resolution Protocol) Spoofing
    • Apache Hadoop Pentesting
    • Enumeration
    • FastCGI Pentesting
    • Firewall
    • Honeypots
    • Attack Flow
    • Network Traffic Analysis (NTA)
    • Networking
    • ReDoS (Regular Expression Denial of Service)
    • Rsync Pentesting
    • Tor
    • Connect with grpcui
    • attack
      • Exploitation using Metasploit
      • Anonymize Traffic with Tor
      • DoS/DDoS Attack
    • bluetooth
      • BlueBorne
    • port-forwarding
      • Port Forwarding with Chisel
      • Reverse Connection
      • Port Forwarding with SSH
      • Port Forwarding with Socat
    • protocol
      • Enumeration
      • FTP (File Transfer Protocol) Pentesting
      • Enumeration
      • Communication
      • Enumeration
      • NFS (Network File System) Pentesting
      • Enumeration
      • Enumeration
      • RTSP (Real Time Streaming Protocol) Pentesting
      • Restricted Shell (rbash, rzsh) Bypass
      • SNMP (Simple Network Management Protocol) Pentesting
      • SSH (Secure Shell) Pentesting
      • TFTP (Trivial File Transfer Protocol) Pentesting
      • Telnet Pentesting
      • Enumeration
      • VNC (Virtual Network Computing) Pentesting
      • Connect
    • tool
      • Convert PuTTY Key to OpenSSH Key
      • Tshark Cheat Sheet
      • Wireshark Cheat Sheet
    • vpn
      • Enumeration
      • OpenVPN Troubleshooting
    • wifi
      • Exploitation
      • MITM (Man in the Middle) Attack
      • WiFi Hacking
      • WiFi Password Recovery
  • penbook
    • Active Directory mapping
    • Active information gathering
    • Arp-spoofing - Sniffing traffic
    • Attacking the user
    • Automated Vulnerability Scanners
    • Bash-scripting
    • Basics
    • Basics of linux
    • Basics of windows
    • The Basics of Assembly
    • Binary exploits
    • Broken Authentication or Session Management
    • Browser vulnerabilities
    • Buffer overflow (BOF)
    • Bypass File Upload Filtering
    • Bypassing antivirus
    • physical_access_to_machine
      • rubber-ducky
    • writeups
      • NSM hack challenge
      • SANS Holiday Hack 2016 - chris
      • vulnhub
        • kioptrix 1
        • kioptrix 2 (level 1.1)
        • Quaoar - written by chris
  • printer
    • IPP (Internet Printing Protocol) Pentesting
    • Raw Printing Pentesting
  • python-pty-shells
    • LICENCE
  • reconnaissance
    • Email Analysis
  • container
    • docker
      • Docker Engine API Pentesting
      • Docker Escape
      • Docker Registry Pentesting
      • Directory Traversal & Arbitrary Command Execution (CVE-2021-41091 )
      • Docker Pentesting
    • kubernetes
      • Kubernetes Pentesting
      • MicroK8s Pentesting
  • cryptography
    • algorithm
      • AES-CBC Bit Flipping Attack
      • PadBuster
      • AES-ECB Padding Attack
      • AES (Advanced Encryption Standard)
      • Decryption
      • Online Tools
      • Base32, Base64
      • Online Tools
      • Decrypt
      • Certificates
      • DES (Data Encryption Standard)
      • Diffie-Hellman Key Exchange
      • ECC (Elliptic Curve Cryptography)
      • ECDSA in Python
      • Decrypt
      • GPG (GNU Privacy Guard)
      • HMAC
      • KDBX Files
      • Exploitation
      • MD4, MD5
      • Online Tools
      • NTLM, NTLMv2
      • Decrypt
      • PGP (Pretty Good Privacy)
      • Decrypt
      • Decrypt
      • Decrypt
      • ROT13, ROT47
      • RPNG (Pseudo Random Number Generator) Guessing
      • RSA (Rivest Shamir Adleman)
      • Sample Attacks
      • SHA1, SHA256, SHA512
  • mobile
    • android
      • Android Pentesting
      • Connect to Android Device from PC using SSH
Powered by GitBook
On this page

Project tree

.

  • Everything-OSCP(./Everything-OSCP)

    • Checklists(./Everything-OSCP/Checklists)

    • Linux Post exploitation(./Everything-OSCP/Linux Post exploitation)

    • Windows buffer overflow(./Everything-OSCP/Windows buffer overflow)

    • Windows Post exploitation(./Everything-OSCP/Windows Post exploitation)

  • pentestbook(./pentestbook)

    • assets(./pentestbook/assets)

    • physical_access_to_machine(./pentestbook/physical_access_to_machine)

    • styles(./pentestbook/styles)

    • writeups(./pentestbook/writeups)

  • AwesomeXSS(./AwesomeXSS)

    • Database(./AwesomeXSS/Database)

  • resource-threat-hunting(./resource-threat-hunting)

  • Offensive-Security-OSCP-Cheatsheets(./Offensive-Security-OSCP-Cheatsheets)

    • ctfs-walkthroughs(./Offensive-Security-OSCP-Cheatsheets/ctfs-walkthroughs)

    • lab(./Offensive-Security-OSCP-Cheatsheets/lab)

    • memory-forensics(./Offensive-Security-OSCP-Cheatsheets/memory-forensics)

    • offensive-security(./Offensive-Security-OSCP-Cheatsheets/offensive-security)

    • offensive-security-experiments(./Offensive-Security-OSCP-Cheatsheets/offensive-security-experiments)

  • SCADA PLC ICS Pentest PDFs(./SCADA PLC ICS Pentest PDFs)

    • awesome-industrial-control-system-security(./SCADA PLC ICS Pentest PDFs/awesome-industrial-control-system-security)

  • PayloadsAllTheThings(./PayloadsAllTheThings)

    • AWS Amazon Bucket S3(./PayloadsAllTheThings/AWS Amazon Bucket S3)

    • Command Injection(./PayloadsAllTheThings/Command Injection)

    • CRLF Injection(./PayloadsAllTheThings/CRLF Injection)

    • CSRF Injection(./PayloadsAllTheThings/CSRF Injection)

    • CSV Injection(./PayloadsAllTheThings/CSV Injection)

    • CVE Exploits(./PayloadsAllTheThings/CVE Exploits)

    • Directory Traversal(./PayloadsAllTheThings/Directory Traversal)

    • SAML Injection(./PayloadsAllTheThings/SAML Injection)

    • File Inclusion(./PayloadsAllTheThings/File Inclusion)

    • GraphQL Injection(./PayloadsAllTheThings/GraphQL Injection)

    • Insecure Deserialization(./PayloadsAllTheThings/Insecure Deserialization)

    • Insecure Direct Object References(./PayloadsAllTheThings/Insecure Direct Object References)

    • Insecure Management Interface(./PayloadsAllTheThings/Insecure Management Interface)

    • Insecure Source Code Management(./PayloadsAllTheThings/Insecure Source Code Management)

    • JSON Web Token(./PayloadsAllTheThings/JSON Web Token)

    • LaTeX Injection(./PayloadsAllTheThings/LaTeX Injection)

    • LDAP Injection(./PayloadsAllTheThings/LDAP Injection)

    • Methodology and Resources(./PayloadsAllTheThings/Methodology and Resources)

    • NoSQL Injection(./PayloadsAllTheThings/NoSQL Injection)

    • OAuth(./PayloadsAllTheThings/OAuth)

    • Open Redirect(./PayloadsAllTheThings/Open Redirect)

    • Server Side Request Forgery(./PayloadsAllTheThings/Server Side Request Forgery)

    • Server Side Template Injection(./PayloadsAllTheThings/Server Side Template Injection)

    • SQL Injection(./PayloadsAllTheThings/SQL Injection)

    • _template_vuln(./PayloadsAllTheThings/_template_vuln)

    • Type Juggling(./PayloadsAllTheThings/Type Juggling)

    • Upload Insecure Files(./PayloadsAllTheThings/Upload Insecure Files)

    • Web Cache Deception(./PayloadsAllTheThings/Web Cache Deception)

    • Web Sockets(./PayloadsAllTheThings/Web Sockets)

    • XPATH Injection(./PayloadsAllTheThings/XPATH Injection)

    • XSS Injection(./PayloadsAllTheThings/XSS Injection)

    • XXE Injection(./PayloadsAllTheThings/XXE Injection)

  • Bypassing-Web-Application-Firewalls(./Bypassing-Web-Application-Firewalls)

  • Hydra-Cheatsheet(./Hydra-Cheatsheet)

  • Powershell-Cheatsheet(./Powershell-Cheatsheet)

  • Active-Directory-Fun(./Active-Directory-Fun)

  • oscp(./oscp)

    • recon_enum(./oscp/recon_enum)

    • reports(./oscp/reports)

    • templates(./oscp/templates)

  • xapax.github.io(./xapax.github.io)

    • css(./xapax.github.io/css)

    • img(./xapax.github.io/img)

    • js(./xapax.github.io/js)

    • reveng(./xapax.github.io/reveng)

  • Awesome-Hacking-Resources(./Awesome-Hacking-Resources)

  • Books(./Books)

  • Notes VA(./Notes VA)

    • lpeworkshop(./Notes VA/lpeworkshop)

  • OSCPRepo(./OSCPRepo)

    • CheetSheets(./OSCPRepo/CheetSheets)

    • Local Info Enum(./OSCPRepo/Local Info Enum)

    • PDFs&Documents(./OSCPRepo/PDFs&Documents)

    • Priv Esc Checks(./OSCPRepo/Priv Esc Checks)

    • Process&Methodology(./OSCPRepo/Process&Methodology)

    • Reporting(./OSCPRepo/Reporting)

    • Scanning&Recon(./OSCPRepo/Scanning&Recon)

    • Tools(./OSCPRepo/Tools)

    • KeepNotes(./OSCPRepo/KeepNotes)

    • lists(./OSCPRepo/lists)

    • scripts(./OSCPRepo/scripts)

  • OSCP-Materials-master(./OSCP-Materials-master)

    • Cheat Sheets(./OSCP-Materials-master/Cheat Sheets)

    • Linux Privilege Escalation and Post Exploitation(./OSCP-Materials-master/Linux Privilege Escalation and Post Exploitation)

    • Metasploit-Meterpreter-Msfvenom(./OSCP-Materials-master/Metasploit-Meterpreter-Msfvenom)

    • PASSWORD CRACKING and Usefull TOOLS and Commands(./OSCP-Materials-master/PASSWORD CRACKING and Usefull TOOLS and Commands)

    • SHELLCODE and Buffer Over Flow(./OSCP-Materials-master/SHELLCODE and Buffer Over Flow)

    • Understand Privilege Escalation(./OSCP-Materials-master/Understand Privilege Escalation)

    • Window Privilege Escalation and Post Exploitation(./OSCP-Materials-master/Window Privilege Escalation and Post Exploitation)

  • ctf(./ctf)

    • natas(./ctf/natas)

  • metasploit scripts(./metasploit scripts)

  • penbook(./penbook)

    • assets(./penbook/assets)

    • physical_access_to_machine(./penbook/physical_access_to_machine)

    • styles(./penbook/styles)

    • writeups(./penbook/writeups)

  • python-pty-shells-master(./python-pty-shells-master)

  • liodeus.github.io(./liodeus.github.io)

    • assets(./liodeus.github.io/assets)

    • _includes(./liodeus.github.io/_includes)

    • _layouts(./liodeus.github.io/_layouts)

    • _posts(./liodeus.github.io/_posts)

  • OSEP-Code-Snippets(./OSEP-Code-Snippets)

    • AppLocker Bypass PowerShell Runspace(./OSEP-Code-Snippets/AppLocker Bypass PowerShell Runspace)

    • Fileless Lateral Movement(./OSEP-Code-Snippets/Fileless Lateral Movement)

    • Linux Shellcode Encoder(./OSEP-Code-Snippets/Linux Shellcode Encoder)

    • Linux Shellcode Loaders(./OSEP-Code-Snippets/Linux Shellcode Loaders)

    • MiniDump(./OSEP-Code-Snippets/MiniDump)

    • MSSQL(./OSEP-Code-Snippets/MSSQL)

    • PrintSpoofer.NET(./OSEP-Code-Snippets/PrintSpoofer.NET)

    • ROT Shellcode Encoder(./OSEP-Code-Snippets/ROT Shellcode Encoder)

    • Sections Shellcode Process Injector(./OSEP-Code-Snippets/Sections Shellcode Process Injector)

    • Shellcode Process Hollowing(./OSEP-Code-Snippets/Shellcode Process Hollowing)

    • Shellcode Process Injector(./OSEP-Code-Snippets/Shellcode Process Injector)

    • Simple Shellcode Runner(./OSEP-Code-Snippets/Simple Shellcode Runner)

    • XOR Shellcode Encoder(./OSEP-Code-Snippets/XOR Shellcode Encoder)

  • pentest_notebook(./pentest_notebook)

    • Active Directory(./pentest_notebook/Active Directory)

    • Blue Team(./pentest_notebook/Blue Team)

    • Cheatsheets(./pentest_notebook/Cheatsheets)

    • Code snippets(./pentest_notebook/Code snippets)

    • Consultation(./pentest_notebook/Consultation)

    • DFIR(./pentest_notebook/DFIR)

    • Metasploit(./pentest_notebook/Metasploit)

    • Mind Maps(./pentest_notebook/Mind Maps)

    • Mobile Pentest(./pentest_notebook/Mobile Pentest)

    • Networking(./pentest_notebook/Networking)

    • Network Pentest(./pentest_notebook/Network Pentest)

    • Privilege Escalation(./pentest_notebook/Privilege Escalation)

    • SCREENSHOTS(./pentest_notebook/SCREENSHOTS)

    • Scripts(./pentest_notebook/Scripts)

    • Testing Checklists(./pentest_notebook/Testing Checklists)

    • VA SCAN CONFIG(./pentest_notebook/VA SCAN CONFIG)

    • Web Pentest(./pentest_notebook/Web Pentest)

    • WIFI Pentest(./pentest_notebook/WIFI Pentest)

  • Awesome-Advanced-Windows-Exploitation-References(./Awesome-Advanced-Windows-Exploitation-References)

  • Buffer_Overflow(./Buffer_Overflow)

    • Screenshots(./Buffer_Overflow/Screenshots)

  • Cheatsheet-God(./Cheatsheet-God)

  • Linux-Privilege-Escalation(./Linux-Privilege-Escalation)

  • MSF-Venom-Cheatsheet(./MSF-Venom-Cheatsheet)

  • OSCP-Exam-Report-Template(./OSCP-Exam-Report-Template)

  • Red-Team-Infrastructure-Wiki(./Red-Team-Infrastructure-Wiki)

    • images(./Red-Team-Infrastructure-Wiki/images)

  • security-cheatsheets(./security-cheatsheets)

  • Open-Source-Security-List-(./Open-Source-Security-List-)

  • awesome-mitre-attack(./awesome-mitre-attack)

  • escalationserver(./escalationserver)

    • AutoLocalPrivilegeEscalation(./escalationserver/AutoLocalPrivilegeEscalation)

    • BeRoot(./escalationserver/BeRoot)

    • JAWS(./escalationserver/JAWS)

    • kernelpop(./escalationserver/kernelpop)

    • linux-smart-enumeration(./escalationserver/linux-smart-enumeration)

    • mimikatz(./escalationserver/mimikatz)

    • Powerless(./escalationserver/Powerless)

    • PowerLessShell(./escalationserver/PowerLessShell)

    • PowerSploit(./escalationserver/PowerSploit)

    • Privesc(./escalationserver/Privesc)

    • PrivEsc(./escalationserver/PrivEsc)

    • pypykatz(./escalationserver/pypykatz)

  • pentest-book(./pentest-book)

    • exploitation(./pentest-book/exploitation)

    • enumeration(./pentest-book/enumeration)

    • img(./pentest-book/img)

    • mobile(./pentest-book/mobile)

    • others(./pentest-book/others)

    • post-exploitation(./pentest-book/post-exploitation)

    • recon(./pentest-book/recon)

    • sections(./pentest-book/sections)

  • pentest_compilation(./pentest_compilation)

    • Phishing(./pentest_compilation/Phishing)

    • PostExplotation(./pentest_compilation/PostExplotation)

    • Recon(./pentest_compilation/Recon)

    • Shells(./pentest_compilation/Shells)

    • WebVulnerabilities(./pentest_compilation/WebVulnerabilities)

  • PENTESTING-BIBLE(./PENTESTING-BIBLE)

    • 1-part-100-article(./PENTESTING-BIBLE/1-part-100-article)

    • 10-part-100-article(./PENTESTING-BIBLE/10-part-100-article)

    • 11-part-24-article(./PENTESTING-BIBLE/11-part-24-article)

    • 2-part-100-article(./PENTESTING-BIBLE/2-part-100-article)

    • 2(./PENTESTING-BIBLE/2)

    • 3-part-100-article(./PENTESTING-BIBLE/3-part-100-article)

    • 4-part-100-article(./PENTESTING-BIBLE/4-part-100-article)

    • 5-part-100-article(./PENTESTING-BIBLE/5-part-100-article)

    • 6-part-100-article(./PENTESTING-BIBLE/6-part-100-article)

    • 7-part-100-article(./PENTESTING-BIBLE/7-part-100-article)

    • 8-part-100-article(./PENTESTING-BIBLE/8-part-100-article)

    • 9-part-100-article(./PENTESTING-BIBLE/9-part-100-article)

    • latest_articles(./PENTESTING-BIBLE/latest_articles)

    • new(./PENTESTING-BIBLE/new)

  • amr-git-dot.github.io(./amr-git-dot.github.io)

    • _includes(./amr-git-dot.github.io/_includes)

    • _layouts(./amr-git-dot.github.io/_layouts)

    • _pages(./amr-git-dot.github.io/_pages)

    • _sass(./amr-git-dot.github.io/_sass)

    • assets(./amr-git-dot.github.io/assets)

    • _data(./amr-git-dot.github.io/_data)

    • _posts(./amr-git-dot.github.io/_posts)

  • zer1t0.gitlab.io(./zer1t0.gitlab.io)

    • archetypes(./zer1t0.gitlab.io/archetypes)

    • content(./zer1t0.gitlab.io/content)

    • layouts(./zer1t0.gitlab.io/layouts)

    • static(./zer1t0.gitlab.io/static)

  • Active-Directory-Exploitation-Cheat-Sheet(./Active-Directory-Exploitation-Cheat-Sheet)

  • OSEP(./OSEP)

    • Bypass_Defender(./OSEP/Bypass_Defender)

    • Lateral_Movement(./OSEP/Lateral_Movement)

    • MSSQL(./OSEP/MSSQL)

    • Payloads(./OSEP/Payloads)

  • Pentest-Everything(./Pentest-Everything)

    • to-do-wip(./Pentest-Everything/to-do-wip)

    • writeups(./Pentest-Everything/writeups)

    • everything(./Pentest-Everything/everything)

    • resources(./Pentest-Everything/resources)

    • wip-osint(./Pentest-Everything/wip-osint)

  • RedTeaming_CheatSheet(./RedTeaming_CheatSheet)

    • cloud(./RedTeaming_CheatSheet/cloud)

    • coding(./RedTeaming_CheatSheet/coding)

    • infrastructure(./RedTeaming_CheatSheet/infrastructure)

    • windows-ad(./RedTeaming_CheatSheet/windows-ad)

  • tbhm(./tbhm)

    • v4(./tbhm/v4)

  • pronotes(./pronotes)

  • oscp-pre-preparation-plan-and-notes(./oscp-pre-preparation-plan-and-notes)

  • active-directory-pentest(./active-directory-pentest)

  • AD-Attack-Defense(./AD-Attack-Defense)

  • Security-Reference-Guide(./Security-Reference-Guide)

    • blue-defense(./Security-Reference-Guide/blue-defense)

    • code-tools(./Security-Reference-Guide/code-tools)

    • cyber-intelligence(./Security-Reference-Guide/cyber-intelligence)

    • dfir-digital-forensics-and-incident-response(./Security-Reference-Guide/dfir-digital-forensics-and-incident-response)

    • grey-privacy-tor-opsec(./Security-Reference-Guide/grey-privacy-tor-opsec)

    • red-offensive(./Security-Reference-Guide/red-offensive)

    • security-logging(./Security-Reference-Guide/security-logging)

    • training(./Security-Reference-Guide/training)

    • web-app-hacking(./Security-Reference-Guide/web-app-hacking)

  • port-forwarding(./port-forwarding)

  • Checklists(./Checklists)

  • Windows-Privilege-Escalation(./Windows-Privilege-Escalation)

  • Web-CTF-Cheatsheet(./Web-CTF-Cheatsheet)

    • scripts(./Web-CTF-Cheatsheet/scripts)

PreviousADcheatsheetNextRTFnotes

Last updated 1 year ago