O
O
OSCP Notes
Search
⌃K
Introduction
Port scanning
Passive Information Gathering
Ports enum:
Recon Tools
Tech Skills Needed
msfvenom
meterpreter commands
Web Apps
python scripts
Windows hacks
Port Forwarding
Reverse shells
Binary exploitation
Transfering Modules
Buffer Overflow
Cracking!
shellshock
Active Directory
Antivirus Evasion
Windows Priv Esc
Linux Priv Esc
Active Directory Case Studies
Pivoting
C program analysis
Misc
Steg
Memory Dump
Oracle exploitation:
Notes
default credentials
New Empire!
Scripts I built
Got creds? do this
How to add path variables
Good Passwords & Username file locations on kali
fcrackzip (crack common zip pass)
Extracting file from the target and analyze it with ltrace
Hack the box Write-ups
THM Offensive Security Path
Proving Ground
Cyber Sec Labs
Powered By
GitBook
Misc
Here are the articles in this section:
Steg
Memory Dump
Oracle exploitation:
Notes
default credentials
New Empire!
Scripts I built
Got creds? do this
How to add path variables
Good Passwords & Username file locations on kali
fcrackzip (crack common zip pass)
Extracting file from the target and analyze it with ltrace
Previous
case study 1
Next
Steg
Last modified
1yr ago