πŸ§‘β€πŸ’»
B00t2R00t
search
⌘Ctrlk
πŸ§‘β€πŸ’»
B00t2R00t
  • README
  • LICENSE
  • Active Directory Penetration Testing
  • Artificial Intelligence (AI) Penetration Testing
  • TODO LATER:
  • CVE
  • Cloud Penetration Testing
  • Data Lake Penetration Testing
  • Exploit Development
  • Methodology
  • Network Penetration Testing
  • Pivoting
  • Web Application Penetration Testing
  • Wireless Penetration Testing
  • Miscellaneous
    • Backup File Interaction
    • Credential Harvesting
    • File Transfer
    • Formatting
    • Neat Tricks
      • Blind Attacks
      • Password Recovery from Images
      • heck for writeable shares within SMB
      • Command Injection Bypasses
      • Cross-Compilation
      • Docker Container Creation and Deployment
      • Drives Enumeration
      • Dumping User Profiles from an SMB share
      • Fix System Tray in RDP
      • GPG file decryption
      • Hidden Files
      • Hosts File
      • Java Application Archive Analysis (JAR)
      • Joomla CMS <= 4.2.8 CVE-2023-23752 Information Disclosure
      • Kill Processes
      • Linux enumeration scripts output formatting command
      • Magic Bytes Bypass
      • Malicious image file crafting
      • Nginx web server command execution module
      • Port Knocking
      • Powershell Credentials Object Creation
      • PuTTYgen key generator for creating pairs of public and private SSH keys.
      • Public DS_Store file
      • Python Input() Injection
      • QR Code scanning and generating in Kali Linux
      • Breaking out of restricted Bash (rbash) CLI in SSH
      • Search for patterns within compressed files
      • Strings
      • Use 64-bit powershell script on 32-bit PC
      • Wordlist Generation
    • Reverse Shells
    • Shell Stabilization
    • Wordlist Creation
  • Privilege Escalation
  • Red Teaming
  • Tools
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Miscellaneous

Neat Tricks

Blind Attackschevron-rightPassword Recovery from Imageschevron-rightheck for writeable shares within SMBchevron-rightCommand Injection Bypasseschevron-rightCross-Compilationchevron-rightDocker Container Creation and Deploymentchevron-rightDrives Enumerationchevron-rightDumping User Profiles from an SMB sharechevron-rightFix System Tray in RDPchevron-rightGPG file decryptionchevron-rightHidden Fileschevron-rightHosts Filechevron-rightJava Application Archive Analysis (JAR)chevron-rightJoomla CMS <= 4.2.8 CVE-2023-23752 Information Disclosurechevron-rightKill Processeschevron-rightLinux enumeration scripts output formatting commandchevron-rightMagic Bytes Bypasschevron-rightMalicious image file craftingchevron-rightNginx web server command execution modulechevron-rightPort Knockingchevron-rightPowershell Credentials Object Creationchevron-rightPuTTYgen key generator for creating pairs of public and private SSH keys.chevron-rightPublic DS_Store filechevron-rightPython Input() Injectionchevron-rightQR Code scanning and generating in Kali Linuxchevron-rightBreaking out of restricted Bash (rbash) CLI in SSHchevron-rightSearch for patterns within compressed fileschevron-rightStringschevron-rightUse 64-bit powershell script on 32-bit PCchevron-rightWordlist Generationchevron-right
PreviousXML File Readabilitychevron-leftNextBlind Attackschevron-right

Last updated 8 months ago