Back
Score 532
Matrix_2
unknowndevice64_1
Matrix_1
unknowndevice64_2
Matrix_3
Matrix_4
Linux Post Exploitation and Privilege escalation_2
Vulnerability Scanning with Nmap required in Penetration Testing
Windows Privilege Escalation techniques used and required in Penetration Testing
Client Attacks techniques used and required in Penetration Testing
Web Attacks techniques used and required in Penetration Testing
Password Attacks techniques used and required in Penetration Testing
Networking, Pivoting and Tunneling techniques used and required in Penetration Testing
The Metasploit Framework techniques used and required in Penetration Testing
Bypassing Antivirus Software techniques used and required in Penetration Testing
OSCP Course Layout
Reverse Shell Cheat Sheet used and required in Penetration Testing
Post Exploit Commands used and required in Penetration Testing
A list of the most useful msfvenom payloads from Metasploit
sctp_pty_backconnect.py
sctp_pty_bind.py
sctp_pty_shell_handler.py
tcp_pty_backconnect.py
tcp_pty_shell_handler.py
tcp_pty_bind.py
udp_pty_bind.py
udp_pty_backconnect.py
Cheatsheets used and required in Penetration Testing_1
Recon & Enumeration techniques used and required in Penetration Testing
Cracking used and required in Penetration Testing
winenum.bat
sshCHEATsheet used and required in Penetration Testing
rvshell_cheatsheet used and required in Penetration Testing
router_pentesting
John The Ripper Hash Formats used and required in Penetration Testing
IP, DNS Domain Enumeration Cheatsheet used and required in Penetration Testing
Linux Privilege Escalation used and required in Penetration Testing
Linux_Unix_BSD Post-Exploitation Command List used and required in Penetration Testing
Local Linux Enumeration n Privilege Escalation Cheatsheet used and required in Penetration Testing
Reverse shells one-liners used and required in Penetration Testing
Windows Privilege Escalation used and required in Penetration Testing
vBulletin 5.x 0day pre-auth RCE exploit
Create Own Free VPN/SOCK5 Proxy by Pivoting using SSH of Hacked Servers.
CVE: 2017-5638 - Apache Struts2 S2-045
HTTP Request Methods explained
How Write an XSS Cookie Stealer in JavaScript to Steal Passwords