Home
Index
Expand All
Collapse All
-
CybeXRay OSCP Guides
-
Reconnaissance
Terminology
Built-in Tools
Adanced Searching
Specialized Search Enignes
Recon-ng
Maltego
-
Connection Tools
OpenVPN
telnet
ftp
ProFTPd (Vulnerable)
netcat
socat
tftp
ssh
xfreerdp
rdesktop
nfs
winexe
pth-winexe
-
Network Scanning
nmap
rustscan
traceroute
whois
arin
tcpdump
wireshark
-
Web,DNS & VHost Enumeration
nikto
curl & dns
dig
nsupdate
gobuster
dirsearch
ffuf
wfuzz
dnsrecon
dirb
sublist3r
burpsuite
cookies
cookie editor
wappalyzer
whatweb
wpscan
joomla version check
-
Cryptography
Weak RSA
Decryption using openssl
hydra
john the ripper
john custom rules
fcrackzip
hashcat & hashid
xxd - hex dump
base 64 decoding
openssl
mkpasswd
gpg
-
Databases
MySQL
SQLITE
Mongo
-
Samba
enum4linux
smbclient
smbmap
smbget
ms17-010
nmap script
-
Web Exploits
-
SQL Injection
Manual
Sqlmap
local file inclusion (LFI)
XML External Entities
LFI Into Log Poisoning
Cookie Forgery
PHP Cookie Grabber
XSS Cross Site Scripting
OWASP Top 10
Upload Vulnerabilities
-
Penetration Testing Tools
accesschk
crackmapexec
responder
evil-winrm
-
Impacket Toolkit
mssqlclient
psexec
GetNPUsers.py
secretsdump
GetUserSPNs
smbserver
kerbrute
-
Red Teaming
-
C2 Framework
C2 Introduction
Common C2 Frameworks
C2 Operation Basics
Command, Control & Conquer
Advanced C2 Setups
-
Weaponization
WSH
HTA
VBA
PSH
Delivery Techniques
-
Password Attacks
Offline Disctionary/Bruteforce
Rule Based
Online Dictionary (Hydra)
Password Spray Attack
Phishing
-
Python
wine
TCP Authentication Server
Simple Get Request
Virtual Environment
-
Metasploit
msfvenom
msfconsole
meterpreter
searchsploit
persistence
-
Custom Usages
samba username map
tomcat & coyote
-
Shells
Shell Beautify
Common Shell Payloads
Webshells
PHP Reverse Shell
Ruby Reverse Shell
Tmux
-
Prevelege Escalation
Linux
Windows
-
Windows Modular Refreshed
Passwords
Quick Wins
Abusing Service Misconfigurations
Abusing Dangerous Privileges
Abusing Vulnerable Software
Registry
Insecure GUI Apps
Start Up Apps
Tools of Trade
-
Linux Modular Refreshed
Service Exploits
Weak File Permissions
Sudo
Cron jobs
Capablities
SUID / SGID Executables
Passwords & Keys
NFS
Kernel Exploits
Privelege Escalation Scripts
Bypassing Windows Defender
-
Windows Commands
alternate data streams
finding
grepping in windows
processes
type
netstat
tree
Genral Commands
-
powershell
powershell general
powershell enumeration
powershell scripting
registry commands
gpedit commands
windows defender
groups & features
user add/modify
-
sysinternals
Intro & setup
file & disk utilities
network utilities
process utilities
security utilities (sysmon)
system information
miscellaneous
windows event logs
-
Linux Commands
Default Terminal Mapping
bash & zsh Shortcuts
Information Gathering
cronjob
ps
tree
netstat
ss
find
xfreerdp
ss
grep
dpkg
Ip address
-
Android
anbox & adb
-
Active Directory
Concepts
Hands on
Attacking Kerberos
Kerberoasting with Powershell
AS-REP Roasting
Pass the Ticket with mimikatz
Golden/Silver Ticket Attack
Kerberos Backdoor
Post Exploitation Basics
-
Tools
Rubeus
mimikatz
Powerview
Bloodhound
password_sprayer.py
runas
kekeo
winrs & PSSession
ForgeCert
ldapdomaindump
genric commands
Resources
-
Compromising AD Networks
Basics THM
-
Breaching Active Directory
OSINT & Phishing
NTLM Authenticated Services
LDAP Bind Credentials
Authentication Relays
Microsoft Deployment Toolkit
Configuration Files (Database)
-
Enumerating Active Directory
Credential Injection
Using MMC
Using CMD
Using Powershell
Using Bloodhound
Conclusion & Referneces
-
Lateral Movement & Pivoting
Spawning Process Remotely
Moving Laterally using WMI
Alternate Authentication
Abusing User Behaviour
Port Forwarding
-
Exploiting Active Directory
Permission Delegation
Kerberos Delegation
Automatic Relays
AD Users
GPOs
Certificates
Domain Trusts
Conclusion & Mitigations
-
Persisting Active Directory
Credentials
Tickets
Certificates
SID History
Group Membership
ACLs
GPOs
Conclusion & Mitigations
-
Credential Harvesting
Crdential Access
Local Windows Creds
LSASS
Windows Credential Manager
Domain Controller
LAPS
Other Attacks
Conclusion
-
Application Exploits
jenkins
unify
mongo db
ona-rce
-
Reverse Engineering
Windows x64 Assembly
Assembly Instrcutions
Memory Layout
Windows Reversing
Buffer Overflow GDB
Buffer Overflow Using ID & mona
radare2
-
Steganography
binwalk
steghide
exiftool
npiet
pdfinfo
stegcracker
-
Cyber Defense
MITRE
YARA
Intro to ISAC
Osquery
-
SIEM
general
Splunk
Sigma Rules
keywords in search
-
Forensics Tools
volatility (Memory)
Redline
Autopsy
KAPE
Investigating Windows
-
Windows Forensics-1 (Registry)
Windows Registry Basics
Data Aquisition/Collectors
Registry Viewing Tools
System Information & Accounts
Enumeration of Files/Folders
Evidence of Execution
External Devices/USB device
-
Windows Forensics 2 (Other Artifacts)
The FAT File System
The NTFS File System
Recovering Deleted Files
Evidence of Execution
File/Folder Knowledge
External Devices/USB device
-
Malware Analysis
Introduction
Strings
REMnux
-
Wiki Miscellaneous
General Ports Guide
Mail Server
SQL Basic Commands
XSS Polyglot
SQL
Linux Containers
Xerosploit Installation
StrongRoot
Network Connections in Kali
Rogue LDAP Server @Kali Machine
Port Forwarding
-
API Security
OAuth 2.0
OAuth Vulnerabilities
Phishing