πŸ§‘β€πŸ’»
B00t2R00t
search
⌘Ctrlk
πŸ§‘β€πŸ’»
B00t2R00t
  • README
  • LICENSE
  • Active Directory Penetration Testing
  • Artificial Intelligence (AI) Penetration Testing
  • TODO LATER:
  • CVE
  • Cloud Penetration Testing
  • Data Lake Penetration Testing
  • Exploit Development
  • Methodology
  • Network Penetration Testing
  • Pivoting
  • Web Application Penetration Testing
  • Wireless Penetration Testing
  • Miscellaneous
    • Backup File Interaction
    • Credential Harvesting
    • File Transfer
    • Formatting
    • Neat Tricks
    • Reverse Shells
    • Shell Stabilization
    • Wordlist Creation
      • Active Directory Usernames
      • One liner command for creating IIS extensions to test against a server with burp intruder
      • Linux passwd file username wordlist creation
      • MaskProcessor
  • Privilege Escalation
  • Red Teaming
  • Tools
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Miscellaneous

Wordlist Creation

Active Directory Usernameschevron-rightOne liner command for creating IIS extensions to test against a server with burp intruderchevron-rightLinux passwd file username wordlist creationchevron-rightMaskProcessorchevron-right
PreviousTTYchevron-leftNextActive Directory Usernameschevron-right

Last updated 8 months ago