🤑
hacking-methodology
Github
  • README
  • Reconnaissance
    • Web
    • Web attacks
      • CRLF Injection
      • IDOR
      • File Inclusion
      • File Upload
      • SSRF
      • CSRF
      • XSS
    • Databases
    • DBMS
      • MySQL
      • MSSQL
      • ORACLE
      • REDIS
      • MongoDB
      • SQLite
    • Windows
    • Other technologies
  • Privilege Escalation
    • Linux
      • Path Hijacking
      • Shared Library Misconfigurations
      • USBCreator D-Bus
    • Windows
      • Active Directory Enumeration
      • Services & Features
  • Binary Exploitation
    • Format String Vulnerability
  • Miscellaneous
    • Universal Tools and Resources
    • Methodology, Tricks & Common sense
  • Language Specific Exploits
    • Python
      • Data Model Parsing (pytorch / pickle)
Powered by GitBook
On this page

README

NextWeb

Last updated 1 month ago

This site serves as a foundation for penetration testing methodology. More sophisticated attacks and techniques will not be covered here, as they are already well-documented on , and I don’t want to reinvent the wheel. Instead, this site focuses on basic enumeration commands, interesting and unique exploits or vulnerabilities I’ve encountered, and notes to help navigate rabbit holes or enhance what I call the "hacker mindset."

This is not a finished site. I will keep on adding information that I believe to be useful. Again, these are surface-level notes that are useful. Do not rely on them too much!

DISCLAIMER

This guide and its material is intended to be used for educational and informational purposes only!

HackTricks