Skip to main content

Recently Updated Pages

Stabilize a Shell

Privilege Escalation

As soon you was able to get a shell on the target you can spawn a stabilized bash shell python -...

Updated 3 years ago by Togoboi

WinLin PEAS

Privilege Escalation

linPEAS LinPEAS is a script that search for possible paths to escalate privileges on Linux/Unix*...

Updated 3 years ago by Togoboi

Windows Vulnerabilities

Privilege Escalation

Printspoofer PrintSpoofer exploit that can be used to escalate service user permissions on Windo...

Updated 3 years ago by Togoboi

SUID PrivEsc Python

Privilege Escalation

SUID PrivEsc Python Some files has Permissions to be executed by any user with full permissions ...

Updated 3 years ago by Togoboi

Get the fuck out

Privilege Escalation

GTFOBins GTFOBins is a curated list of Unix binaries that can be used to bypass local security r...

Updated 3 years ago by Togoboi

WP Scan

Scanning

Sometimes your target has running a WordPress website running on their end. There is also a too...

Updated 3 years ago by Togoboi

NMAP

Scanning

NMAP in general NMAP is a free open source “Network Mapper” for network exploration or security ...

Updated 3 years ago by Togoboi

Nikto

Scanning

Nikto Nikto is a perl based security testing tool and this means it will run on most operating s...

Updated 3 years ago by Togoboi

FTP & SAMBA

Scanning

FTP Sometimes anonymous login is allowed on a FTP server. ftp <server/ip> During the login you...

Updated 3 years ago by Togoboi

Enum4Linux

Scanning

Enum4linux is a tool for enumerating information from Windows and Samba systems and is capable of...

Updated 3 years ago by Togoboi

GoBuster

Scanning

GoBuster scans the most common directories which are used on a WebApp / Website. To run this scan...

Updated 3 years ago by Togoboi

SSH Tunneling

Brute Force

Sometimes it can be that a target network is in another subnet and you are not able to access it ...

Updated 3 years ago by Togoboi

John the Ripper

Brute Force

John in general John the Ripper (JTR) is a fast, free and open-source password cracker.We will u...

Updated 3 years ago by Togoboi

Hydra

Brute Force

Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very fas...

Updated 3 years ago by Togoboi

URLs

BookStack Hosting

https://www.warpconduit.net/2019/11/16/installing-bookstack-wiki-on-cpanel-shared-hosting/ https...

Updated 3 years ago by Togoboi

Plesk Preparations

BookStack Hosting

Create a SSH account Create an SSH account before you try to connect. Go to your domain and clic...

Updated 3 years ago by Togoboi

BookStack Installation

BookStack Hosting

SSH into your cPanel server using your login credentials. Make sure you are in your home directo...

Updated 3 years ago by Togoboi

Nessus

Scanning

Nessus vulnerability scanner is exactly what you think is it’s! A vulnerability scanner!It uses t...

Updated 3 years ago by Togoboi

BurpSuite

Brute Force

BurpSuite is a tool which normally is used for Web Application Analysis. But it has some tools wh...

Updated 3 years ago by Togoboi

Installation guide CentOS

Splunk CTF

At my workplace I'm managing a course for apprentices inside the organization. As we are working ...

Updated 3 years ago by Togoboi