Table of contents 👾 Welcome Useful Hacks About Author CTF, Labs for practice Hacking Resources ⚙ Useful Commands Linux basics Windows basics (editing) 🚀 Scripts Decompressor.sh Dictionary ("for" loop counter) 👽 Reconnaissense & Footprinting Ping & Discovery Port & Services FW / WAF Detection Technologies 🪟 Network Services Pentesting Vulnerability Detection Search Exploits 🦜 Enumeration SMB - tcp/139, 445 Login error - username enum (editing) 🔨 Cracking passwords Cracking hashes 🐝 Web Application Pentesting Spidering / Forced Browsing General Checks (editing) Web Attacks (editing) 🍪 Cookies (editing) 🐚 Shells Reverse Shell Generator Shell stabilization (Linux) Linux Shells PHP Reverse Shell Windows Shells Hoaxshell (evade M.Defender) 🧗♀ Privilege Escalation Tools and Methodology PrivEsc Linux PrivEsc SUDO SUID / GUID / Sticky Bit Capabilities Cron jobs Windows PrivEsc DLL hijacking (DLL path abuse) Unquoted service Path Token spoofing (Potato) Task schedule Windows AlwaysInstallElevated setup files (aka .msi files) Saved Credentials Registry Keys Unattend files 🕹 C2 GodGenesis