🤑
hacking-methodology
Github
  • README
  • Reconnaissance
    • Web
    • Web attacks
      • CRLF Injection
      • IDOR
      • File Inclusion
      • File Upload
      • SSRF
      • CSRF
      • XSS
    • Databases
    • DBMS
      • MySQL
      • MSSQL
      • ORACLE
      • REDIS
      • MongoDB
      • SQLite
    • Windows
    • Other technologies
  • Privilege Escalation
    • Linux
      • Path Hijacking
      • Shared Library Misconfigurations
      • USBCreator D-Bus
    • Windows
      • Active Directory Enumeration
      • Services & Features
  • Binary Exploitation
    • Format String Vulnerability
  • Miscellaneous
    • Universal Tools and Resources
    • Methodology, Tricks & Common sense
  • Language Specific Exploits
    • Python
      • Data Model Parsing (pytorch / pickle)
Powered by GitBook
On this page
  • Wordlists
  • Useful websites
  • Browser extensions
  • Binaries
  • Docker
  • Tunneling and Listeners
  • Chisel
  • authbind
  • Active Directory
  • BloodHound
  • sssd
  • Miscellaneous
  • Reverse Engineering
  • Radare2 (R2)
  • Ghidra
  • GDB
  • dnSpy
  • Python executables
  • Android
  • Steganography
  • Git
  • Miscallenous
  1. Miscellaneous

Universal Tools and Resources

PreviousFormat String VulnerabilityNextMethodology, Tricks & Common sense

Last updated 1 day ago

Wordlists

  • used by Feroxbuster

Useful websites

Browser extensions

Binaries

Docker

Tunneling and Listeners

Chisel

############################# [SERVER] #############################
chisel server --port <port> --reverse

############################# [CLIENTS] #############################

# BASIC client
chisel client <server_ip_and_port> R:<listener_port>:<ip>:<forwarded_port>

# SOCKS PROXY
## Note that socks proxy will start a listener on port 1080
chisel client <server_ip_and_port> R:socks

Interaction

One can use FoxyProxy for the browser or proxychains on the command line to interact with the network.

authbind

authbind allows a program which does not or should not run as root to bind to low-numbered ports in a controlled way.

# Netcat
authbind nc -lvnp <port>

# Python
authbind python -m http.server

Active Directory

BloodHound

BloodHound is used to visualise AD environments and discover attack paths.

Ingestors

SharpHound

Data collector for BloodHound

bloodhound.py

Python based data collection tool for BloodHound This will run against the domain, so can one run it from a remote machine.

bloodhound-python -u <username> -p <password> -d <domain> -c All -ns <nameserver>                

sssd

sssd is an open source client for enterprise identity management. It allows for Linux machines to be joined into an Active Directory domain.

SSSD maintains a copy of the database at the path /var/lib/sss/secrets/secrets.ldb. The corresponding key is stored as a hidden file at the path /var/lib/sss/secrets/.secrets.mkey. By default, the key is only readable if you have root permissions.

Knowing this information one can take a look at those file (if they're present) and extract data from them. If data cannot be found in those files, one might try to go back one folder to /var/lib/sss where they might find some other files which can potentially reveal some info.

Miscellaneous

Reverse Engineering

Radare2 (R2)

r2 is a complete rewrite of radare. It provides a set of libraries, tools and plugins to ease reverse engineering tasks.

Ghidra

Open-source reverse engineering software developed by NSA

GDB

GNU Debugger

peda

Basic buffer overflow

dnSpy

Alternatives

These alternatives are for Linux, since dnSpy is for Windows only

Python executables

Python files can be packed and unpacked to and from a binary.

Android

Steganography

Git

Miscallenous

  • upx for packing and unpacking binaries.

    • Can be used to brute-force CTF flags in a binary.

is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. Single executable including both client and server.

Python Exploit Development Assistance for GDB

Used for disassembling .NET code

Use the to unpack the binary, then use to decompile .pyc files received from the unpacking process.

Click for better explanation and examples.

rockyou.txt
Sub-domains (1)
Sub-domains (2)
Directories (1)
Directories (2)
SNMP community strings
Reverse shell generator
Hashcat hash examples
Crackstation
WasmFiddle - C to Web Assembly
Requestly
FoxyProxy
Statically compiled binaries
SharpCollection - Pre-compiled binaries (windows)
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
Chisel
Documentation
Documentation
Releases
Documentation
More info
Evil-WinRM
PowerView
All Impacket scripts
Powermad
Rubeus Docs
Rubeus Release
SharpCollection - Pre-compiled binaries (windows)
mimikatz
VNC Password Decryptor
VNCDecrypt
Mimikatz in python
mRemoteNG Decryptor
Introduction
Manual
Ghidra GitHub
Ghidra CheatSheet
GitHub
Walkthrough and help
https://github.com/dnSpy/dnSpy
IlSpy
CodemerxDecompile
extractor
uncompyle6
this
jadx - Dex to Java decompiler
stegsolve
git-dumper
Angr / Claripy - Abstracted constraint-solving wrapper