unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Pentesting Domain Controllers Cheatsheet
DNSdig srv domaim.com @DC_IP#Query ldap servicedig +short srv _ldap._tcp.dc._msdcs.dc.domain.co...
2024-2-6 20:24:0 | 阅读: 10 |
收藏
|
Hacking Dream - www.hackingdream.net
auxiliary
dcerpc
ldapsearch
mcs
Web Penetration Testing with Curl Cheatsheet
In lot of scenarios, we usually don't have access to GUI access to web applications but in most of...
2024-2-6 13:30:0 | 阅读: 9 |
收藏
|
Hacking Dream - www.hackingdream.net
kl
faultactor
rpcrouter
php
digest
MSSQL Penetration Testing Using Python
Installation curl https://packages.microsoft.com/keys/microsoft.asc | sudo tee /etc/apt/trusted.gpg...
2024-2-5 23:5:0 | 阅读: 10 |
收藏
|
Hacking Dream - www.hackingdream.net
microsoft
odbc
msodbcsql18
library
lib64
Running your first Local LLM Model like ChatGPT without Coding
In the fast-paced world of artificial intelligence and machine learning, local LLM (Large Language...
2024-2-1 23:1:0 | 阅读: 13 |
收藏
|
Hacking Dream - www.hackingdream.net
llm
gpt
mistral
ollama
windows
Best Practices for Secure Coding: Writing Hack-Proof Applications
In the digital age, where cyber threats are becoming more sophisticated, the importance of secure c...
2024-2-1 14:0:0 | 阅读: 10 |
收藏
|
Hacking Dream - www.hackingdream.net
security
development
encryption
developers
Cybersecurity Trends 2024: What Experts Predict
As we approach 2024, the landscape of cybersecurity is evolving rapidly, influenced by both emergin...
2024-2-1 02:22:0 | 阅读: 12 |
收藏
|
Hacking Dream - www.hackingdream.net
security
threats
emerging
ensuring
Navigating the Threat Landscape: A Guide to Internet Viruses
In the digital era, the internet has become a pivotal part of our daily lives, serving as a gateway...
2024-1-30 22:19:0 | 阅读: 9 |
收藏
|
Hacking Dream - www.hackingdream.net
threats
viruses
software
malicious
How to Get Started in Ethical Hacking and Penetration Testing: A Beginner's Guide
Introduction:Embarking on your journey in Getting Started in Ethical Hacking and Penetration Testin...
2024-1-30 05:22:0 | 阅读: 5 |
收藏
|
Hacking Dream - www.hackingdream.net
ethical
security
career
Java JMX RMI Pentest Cheatsheet
RMI can be run on any nonstandard port and when RMI is running you will observer one more endpoint...
2023-11-20 19:53:0 | 阅读: 13 |
收藏
|
Hacking Dream - www.hackingdream.net
beanshooter
rmg
jmx
github
remote
Pentesting Oracle TNS listener/ Database - Chaeatsheet - Port 1521
#nmapnmap -Pn -sV -p1521 --script=oracle* 10.10.10.10#Check for service Version#Oracle Database...
2023-8-14 22:7:0 | 阅读: 39 |
收藏
|
Hacking Dream - www.hackingdream.net
odat
1521
auxiliary
nmap
database
SNMP Pentest Cheatsheet - Port 161
Basic info About SNMPPorts - 161,162,10161,10162/udp SNMP is a based on UDP, stateless protocol...
2023-8-14 22:4:0 | 阅读: 22 |
收藏
|
Hacking Dream - www.hackingdream.net
snmpwalk
mibs
nmap
pty
processes
Attacking and Pentesting VMWare ESXi Hosts
Before getting into the Attacking and Exploitation, it is recommended to know the difference betwe...
2023-8-11 21:6:0 | 阅读: 51 |
收藏
|
Hacking Dream - www.hackingdream.net
vcenter
902
vsphere
centralized
vms
Exploiting VulnServer - KSTET - Egg Hunting - Windows Binary Exploitation
Egg hunting in 32-bit Windows binary exploitation is a technique used to locate and exploit vulnera...
2023-6-1 05:47:0 | 阅读: 37 |
收藏
|
Hacking Dream - www.hackingdream.net
egg
shellcode
mona
x2b
x2a
Shellcodes for Binary Exploitation
Get shellcode of the binary using objdump objdump -d ./Exit.o|grep '[0-9a-f]:'|grep -v 'file'|cut...
2023-5-28 04:14:0 | 阅读: 31 |
收藏
|
Hacking Dream - www.hackingdream.net
objdump
xc0
x05
x89
x2f
64-bit Binary Exploitation Cheatsheet
X64 Exploit concepts#JMP RAX Final Exploit - `nops + shellcode + JUNK + JMP RAX`#JMP RSP - use...
2023-5-26 05:29:0 | 阅读: 40 |
收藏
|
Hacking Dream - www.hackingdream.net
nops
shellcode
junk
payload
ret2libc
32-bit Binary Exploitation Cheatshet
# Simple BOF # jmp_address - somewhere at the start of NOPSNOPS + shellcode + A*(EBP_offset-len(s...
2023-5-26 05:26:0 | 阅读: 24 |
收藏
|
Hacking Dream - www.hackingdream.net
payload
p32
python
binsh
bypass
Binary Exploitation Cheatsheet
Make sure to set a breakpoint and run the program before running below commands when trying from GD...
2023-5-26 05:21:0 | 阅读: 25 |
收藏
|
Hacking Dream - www.hackingdream.net
ropper
vuln
vmmap
serach
payload
IPMI Pentest Cheatsheet - Port 623
Intelligent Platform Management Interface (IPMI) is a hardware-based system management and monitori...
2023-4-24 23:39:0 | 阅读: 43 |
收藏
|
Hacking Dream - www.hackingdream.net
ipmi
ipmitool
lanplus
rakp
GDB Commands Cheatsheet
# Open a file with GDBgdb ./file#quitegdb -q .file#run the processrrun#run a processr 127...
2022-11-25 23:45:0 | 阅读: 27 |
收藏
|
www.hackingdream.net
var1
xb
disassemble
disassembly
readelf
Hacking and PenTesting Captive Portal Enabled Wireless Networks
Hello all, This is a simple cheat sheet for Hacking/Pentesting Captive Portals Enabled Wireless/Wi...
2022-8-2 23:4:0 | 阅读: 29 |
收藏
|
www.hackingdream.net
wlan0
dnsmasq
ifconfig
network
dhcp
Previous
2
3
4
5
6
7
8
9
Next