You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*[Scripting Language Syntax Comparison](os-agnostic/scripting/script-language-comparison.md)
87
96
*[SQL](os-agnostic/sql.md)
88
97
*[SSH & SCP](os-agnostic/ssh-and-scp.md)
89
98
*[Steganography](os-agnostic/steganography.md)
@@ -93,11 +102,11 @@ Always ensure you have **explicit** permission to access any computer system **b
93
102
94
103
*[Unsorted Notes](untitled.md)
95
104
96
-
## CTF Tools and Cheatsheets
105
+
## OSCP/CTF Tools and Cheatsheets
97
106
98
107
[List of outside sources](tools-cheatsheets.md)
99
108
100
109
101
110
102
-
If you like this content and would like to see more, please consider supporting me through Patreon at [https://www.patreon.com/zweilosec](https://www.patreon.com/zweilosec).
111
+
If you like this content and would like to see more, please consider [buying me a coffee](https://www.buymeacoffee.com/zweilosec)!
Copy file name to clipboardExpand all lines: linux-1/linux-redteam/README.md
+4
Original file line number
Diff line number
Diff line change
@@ -64,3 +64,7 @@ pretty print JSON text in console \([https://www.howtogeek.com/529219/how-to-par
64
64
65
65
`vi -c 'let $enc = &fileencoding | execute "!echo Encoding: $enc" | q'<file_to_check>` check encoding of a text file \(needed especially when doing crypto with python, or cracking passwords with `rockyou.txt` - _hint: needs latin encoding!_\) [https://vim.fandom.com/wiki/Bash\_file\_encoding\_alias](https://vim.fandom.com/wiki/Bash_file_encoding_alias) \(how to make an aliasfor the above command\)
66
66
67
+
68
+
69
+
If you like this content and would like to see more, please consider [buying me a coffee](https://www.buymeacoffee.com/zweilosec)!
Copy file name to clipboardExpand all lines: os-agnostic/network-hardware.md
+7-3
Original file line number
Diff line number
Diff line change
@@ -6,15 +6,19 @@ Hack Responsibly.
6
6
Always ensure you have **explicit** permission to access any computer system **before** using any of the techniques contained in these documents. You accept full responsibility for your actions by applying any knowledge gained here.
7
7
{% endhint %}
8
8
9
+
Not much here yet...please feel free to contribute at [https://www.github.com/zweilosec](https://github.com/zweilosec)
Copy file name to clipboardExpand all lines: os-agnostic/reverse-engineering-and-binary-exploitation/README.md
+5-1
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ Hack Responsibly.
6
6
Always ensure you have **explicit** permission to access any computer system **before** using any of the techniques contained in these documents. You accept full responsibility for your actions by applying any knowledge gained here.
7
7
{% endhint %}
8
8
9
-
## Binary Exploitation / Reverse Engineering
9
+
Not much here yet...please feel free to contribute at [https://www.github.com/zweilosec](https://github.com/zweilosec)
Copy file name to clipboardExpand all lines: web/subdomain-virtual-host-enumeration.md
+10
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,11 @@
1
1
# Subdomain/Virtual Host Enumeration
2
2
3
+
{% hint style="success" %}
4
+
Hack Responsibly.
5
+
6
+
Always ensure you have **explicit** permission to access any computer system **before** using any of the techniques contained in these documents. You accept full responsibility for your actions by applying any knowledge gained here.
Copy file name to clipboardExpand all lines: windows-1/powershell.md
+4
Original file line number
Diff line number
Diff line change
@@ -704,3 +704,7 @@ PowerShell reverse shell and exploit scripts: `nishang` To learn how to use this
704
704
*[https://0xdarkvortex.dev/index.php/2019/01/01/active-directory-penetration-dojo-ad-environment-enumeration-1/](https://0xdarkvortex.dev/index.php/2019/01/01/active-directory-penetration-dojo-ad-environment-enumeration-1/) - site down?
Copy file name to clipboardExpand all lines: windows-1/windows-redteam/getting-access.md
+5-1
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,8 @@ Hack Responsibly.
6
6
Always ensure you have **explicit** permission to access any computer system **before** using any of the techniques contained in these documents. You accept full responsibility for your actions by applying any knowledge gained here.
7
7
{% endhint %}
8
8
9
+
Not much here yet...please feel free to contribute at [https://www.github.com/zweilosec](https://github.com/zweilosec)
10
+
9
11
## **Reverse Shells**
10
12
11
13
TODO: description and methodology for each section \(as needed\); Fix code examples so they can be used for scripting
0 commit comments