👨💻
👨💻
👨💻
👨💻
Hacking Notes
Search
⌃
K
👨💻
👨💻
👨💻
👨💻
Hacking Notes
Search
⌃
K
Hacking Notes
💅
One-Liners
⚔
Offensive
Exploit Workflow
Recon
Payloads
Websites
Password Attacks
Databases
Microsoft Windows Exploits
Social Engineering
Netcat & Socat
File Transfers
Metasploit
PS Empire
Priv Escalation
Post Exploitation
Pivoting
Certs and Secrets
NGROK
Misc.
🛡
Defensive
Defensive Notes
Windows Forensics
Linux Forensics
Network Forensics
Memory Forensics
Stego
Malware Analysis
Volatility
🌩
Cloud
Scope and Shared Responsibility
AWS CLI
Azure CLI
SaaS Attacks
PaaS
⌨
Programming
Programming Notes
Examples and Quick Scripts
PowerShell
Pwn
Python
C
PHP
Powered By
GitBook
Defensive Notes
Collection of defensive notes gathered throughout many years of CTFs and personal research
Most common bits used
Offensive - Previous
Misc.
Next - Defensive
Windows Forensics
Last modified
2yr ago