👨💻
👨💻
👨💻
👨💻
Hacking Notes
Search
⌃
K
👨💻
👨💻
👨💻
👨💻
Hacking Notes
Search
⌃
K
Hacking Notes
💅
One-Liners
⚔
Offensive
Exploit Workflow
Recon
OSINT
DNS
Layer 2 Config and Analysis
Port Scanning and Discovery
Port Attacks
Link it all together
Payloads
Websites
Password Attacks
Databases
Microsoft Windows Exploits
Social Engineering
Netcat & Socat
File Transfers
Metasploit
PS Empire
Priv Escalation
Post Exploitation
Pivoting
Certs and Secrets
NGROK
Misc.
🛡
Defensive
Defensive Notes
Windows Forensics
Linux Forensics
Network Forensics
Memory Forensics
Stego
Malware Analysis
Volatility
🌩
Cloud
Scope and Shared Responsibility
AWS CLI
Azure CLI
SaaS Attacks
PaaS
⌨
Programming
Programming Notes
Examples and Quick Scripts
PowerShell
Pwn
Python
C
PHP
Powered By
GitBook
Comment on page
Recon
Recon scripts and details
OSINT
DNS
Layer 2 Config and Analysis
Port Scanning and Discovery
Port Attacks
Offensive - Previous
Exploit Workflow
Next
OSINT
Last modified
2yr ago