πŸ‘¨πŸ’»
πŸ‘¨πŸ’»
πŸ‘¨πŸ’»
πŸ‘¨πŸ’»
Hacking Notes
Search…
πŸ‘¨πŸ’»
πŸ‘¨πŸ’»
πŸ‘¨πŸ’»
πŸ‘¨πŸ’»
Hacking Notes
Hacking Notes
πŸ’…
One-Liners
βš”
Offensive
Exploit Workflow
Recon
Payloads
Websites
Password Attacks
Databases
Microsoft Windows Exploits
Social Engineering
Netcat & Socat
File Transfers
Metasploit
Priv Escalation
Pivoting
Certs and Secrets
Post Exploitation
NGROK
Misc.
πŸ›‘
Defensive
Defensive Notes
Windows Forensics
Linux Forensics
Network Forensics
Stego
Malware Analysis
Volatility
🌩
Cloud
Scope and Shared Responsibility
AWS CLI
Azure CLI
SaaS Attacks
PaaS
⌨
Programming
Programming Notes
Examples and Quick Scripts
Pwn
Python
C
PHP
Powered By GitBook
Certs and Secrets
how to generate and analyze certificates
Searching for key material (keymat) within many files.

Tools

sshgit
gitleaks (docker container)
wget -r (recursively download an exposed .git directory)

Git

git branch
git log
git checkout <commit hash> <deleted file/folder>
git show
Offensive - Previous
Pivoting
Next - Offensive
Post Exploitation
Last modified 1mo ago
Copy link
Contents
Tools
Git