🤯
Hacker Mind
Ctrlk
  • Penetration Testing Notes
  • STUCK? Look at this :D
  • Buffer Overflow
  • Active Directory Recon
  • Payload
  • Exploit
  • Tradecraft
  • Metasploit
  • Privilege Escalation
  • Post Exploit
  • WiFi Pentesting
  • Hardware Hacking
  • Practice & Lab
Powered by GitBook
On this page

STUCK? Look at this :D

  1. https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets

  2. https://cheatsheet.haax.fr/network/pivot_techniques/

  3. https://book.hacktricks.xyz/linux-hardening/linux-privilege-escalation-checklist

  4. Youtube Playlist

  5. https://1drv.ms/o/s!AvE8WiTvcV0fiTOg87iHuKwTC7LZ?e=OwtODh

  6. https://book.hacktricks.xyz/windows-hardening/active-directory-methodology (Active Directory)

  7. https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse (Active Direcotry)

Tools

  1. PowerSploit --> https://github.com/PowerShellMafia/PowerSploit

  2. Chisel --> https://github.com/jpillora/chisel/releases

  3. Mimikatz --> https://github.com/gentilkiwi/mimikatz/releases

  4. BloodHound --> https://github.com/BloodHoundAD/BloodHound

  5. PEASS-ng (linPEAS & winPEAS) --> https://github.com/carlospolop/PEASS-ng

  6. PowerUP (privesc) --> https://github.com/PowerShellMafia/PowerSploit/tree/master/Privesc

  7. Windows PrivEsc Tools --> https://github.com/Tib3rius/Windows-PrivEsc-Tools

  8. Linux PrivEsc Tools --> https://github.com/Tib3rius/Linux-PrivEsc-Tools

  9. Explain command --> https://explainshell.com/

PreviousImport Nessus to MetasploitNextBuffer Overflow

Last updated 2 years ago