Tag: hacking
All the articles with the tag "hacking".
-
Port Forwarding & Pivoting Cheatsheet
Quick notes for HTB, CTFs, tunneling, data exfiltration and exposing internal services
-
Windows Privilege Escalation Cheatsheet
Fast techniques, tools, and commands for HTB, CTFs and OSCP-like environments
-
Linux Privilege Escalation Cheatsheet
Fast techniques, tools, and commands for HTB, CTFs and OSCP-like environments
-
Web Exploitation Cheatsheet
SQLi, RCE, LFI/RFI, File Uploads, Deserialization, SSTI, Auth bypass and manual exploitation for HTB, CTFs and real-world pentests
-
Web Attack Surface & Enumeration Cheatsheet
Discovery, fingerprinting, content discovery, parameter fuzzing, virtual hosts and technology mapping for HTB, CTFs and real-world pentests
-
BurpSuite Repeater/Intruder Power Tips
Advanced workflows, payload tricks, bypass techniques and hidden features for HTB, CTFs and real-world web exploitation
-
Reverse Shells & Web Shells Cheatsheet
Quick shells for HTB/CTFs: reverse shells, bind shells, web shells, upgrades and fallback techniques