wheird

All duh links

OSCP
Other Links

SAM-Account-Type attribute - Win32 apps | Microsoft Docs

Search Filter Syntax - Win32 apps | Microsoft Docs

Computer class - Win32 apps | Microsoft Docs

Group class - Win32 apps | Microsoft Docs

Service Principal Name (SPN) - hackndo

SearchResult.GetDirectoryEntry Method (System.DirectoryServices) | Microsoft Docs

Kerberoast Attack Techniques | Cobalt

Kerberoasting Without Mimikatz – harmj0y

PowerSploit/PowerView.ps1 at dev · PowerShellMafia/PowerSploit · GitHub

Empire/Invoke-Kerberoast.ps1 at master · EmpireProject/Empire · GitHub

klist | Microsoft Docs

KerberosRequestorSecurityToken.GetRequest Method (System.IdentityModel.Tokens) | Microsoft Docs

KerberosRequestorSecurityToken Constructor (System.IdentityModel.Tokens) | Microsoft Docs

Active Directory Accounts | Microsoft Docs

Windows Server 2016 Functional Levels | Microsoft Docs

Kerberos Enhancements | Microsoft Docs

How to Use Command Line Arguments in a Bash Script - Baeldung on Linux

BashFAQ/082 - Greg's Wiki

Command Substitution (Bash Reference Manual)

The Double-Parentheses Construct

Advanced Bash-Scripting Guide

Introduction to Bash arrays | Opensource.com

bash - How do I reverse a for loop? - Unix & Linux Stack Exchange

How to write binary data in Bash

TCP Port Scanner in Bash

linux - How to join multiple lines of file names into one with custom delimiter? - Stack Overflow

command line - How to redirect stderr to a file - Ask Ubuntu

How to delete empty lines using sed command under Linux / UNIX - nixCraft

linux - How to remove all white spaces from a given text file - Stack Overflow

bash - sed Pattern to Insert Comma between double Quotes - Stack Overflow

bash - How do I delete the first n lines of an ascii file using shell commands? - Unix & Linux Stack Exchange

Breakout restricted shell environment rbash | MetaHackers.pro

netstat without netstat - Staaldraad

Can scripts run even when they are not set as executable? - Ask Ubuntu

sorting - Trying to cat the result of piped commands - Super User

sed - How to append a string at end of a specific line in a file in bash - Stack Overflow

Ln Command in Linux (Create Symbolic Links) | Linuxize

BloodHound with Kali Linux: 101 - Red Teaming Experiments

BloodHound Cypher Cheatsheet – root@Hausec

Exploit writing tutorial part 2 : Stack Based Overflows – jumping to shellcode | Corelan Team

mona.py – the manual | Corelan Team

c - return to lib_c buffer overflow exercise issue - Stack Overflow

c - How can one see content of stack with GDB? - Stack Overflow

How to print register values in GDB? - Stack Overflow

linux - Need help figuring out a remote buffer overflow - Stack Overflow

Guide to x86 Assembly

Microsoft Word - Return-to-libc.txt

Command line parameters · Issue #703 · eteran/edb-debugger

Defeating ASLR With a Leak

JonathanSalwan/ROPgadget: This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC and MIPS architectures.

unix - Finding environment variables with gdb, to exploit a buffer overflow - Information Security Stack Exchange

Bypassing ASLR – Part II – sploitF-U-N

Linux 32-bit Binary Exploitation - Part II Buffer Overflow ret2libc - Hacking Dream

eXploit – Beating ASLR and NX using ROP

Change active java version in Kali – Toedels

Back to Basics: DNS Enumeration. For aspiring penetration testers who… | by Samuel Whang | Medium

Pass-the-hash | PowerShell Empire

Transferring files to windows

Transferring Files from Linux to Windows (post-exploitation) - ropnop blog

linux - How do I find all files and directories writable by a specific user? - Server Fault

GuildFTP FTP Server Lets Remote Users Execute Arbitrary Code on the Server or Crash the Server - SecurityTracker

GuildFTPD Remote Buffer Overflow Vulnerability

Class: Net::FTP (Ruby 2.4.0)

Checking read and write access to an FTP server ~ SmeegeSec

Active vs. Passive FTP Simplified - Understanding FTP Ports

windows - how to view the content of a file in unix in ftp mode of DOS? - Stack Overflow

From a non interactive shell to an interactive one | Digital Notes | MyDear(root)Shell

How to Upgrade a Dumb Shell to a Fully Interactive Shell for More Flexibility « Null Byte :: WonderHowTo

Post-Exploitation Without A TTY | pentestmonkey

Upgrading Simple Shells to Fully Interactive TTYs - ropnop blog

internetwache/GitTools: A repository with 3 tools for pwn'ing websites with .git repositories available

Git - HackTricks

Installing Golang on Kali Linux – Rafe Hart

Building Go Applications for Different Operating Systems and Architectures | DigitalOcean

Go (Golang) GOOS and GOARCH · GitHub

Kerberoasting! | Hacker Noon

How to: Kerberoast like a boss | Pen Test Partners

Kerberoasting - From setup to cracking | by Mark Mo | Medium

Deep Dive into Kerberoasting Attack

Lexfo's security blog - CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 1/4)

c - gcc: Reduce libc required version - Stack Overflow

The TTY demystified

Ten process injection techniques: A technical survey of common and trending process injection techniques | Elastic Blog

error trying to exec `as’: execvp: No such file or directory – Mac Research

How to Add a Directory to PATH in Linux | Linuxize

PayloadsAllTheThings/Linux - Privilege Escalation.md at master · swisskyrepo/PayloadsAllTheThings · GitHub

GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Restricted Linux Shell Escaping Techniques | FireShell Security Team

GitHub - rapid7/ssh-badkeys: A collection of static SSH keys (public and private) that have made their way into software and hardware products.

ubuntu - How to open file with default program from command line? - Super User

c++ - Difference between static and shared libraries? - Stack Overflow

How to Delete Group in Linux (groupdel Command) | Linuxize

bash - Getting head to display all but the last line of a file: command substitution and standard I/O redirection - Stack Overflow

My metasploit module(s) not found/loading - Stack Overflow

Offensive Msfvenom: From Generating Shellcode to Creating Trojans | by PenTest-duck | Medium

MSFVenom Cheatsheet « Red Team Tutorials

metasploit - Auto execute meterpreter commands on session start - Information Security Stack Exchange

GitHub - shauntdergrigorian/cve-2006-6184: This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service or execute arbitrary code.

Payload Types - Metasploit Unleashed

Allied Telesyn AT-TFTP Server Filename Remote Buffer Overflow Vulnerability

Allied Telesyn TFTP (AT-TFTP) Server/Daemon 1.9 - Long Filename Overflow (Metasploit) - Windows remote Exploit

Modules and Locations - Metasploit Unleashed

How to add a module to Metasploit from Exploit-DB - kali null - Medium

Release 2.2.0 20200918 Zerologon encrypted · gentilkiwi/mimikatz · GitHub

module ~ sekurlsa · gentilkiwi/mimikatz Wiki · GitHub

module ~ lsadump · gentilkiwi/mimikatz Wiki · GitHub

Home · gentilkiwi/mimikatz Wiki · GitHub

Blog

security - How to dump the Windows SAM file while the system is running? - Super User

Persistence – Security Support Provider – Penetration Testing Lab

howto ~ open an issue · gentilkiwi/mimikatz Wiki · GitHub

Hacking Windows 10: How to Dump NTLM Hashes & Crack Windows Passwords « Null Byte :: WonderHowTo

How to Bypass Anti-Virus to Run Mimikatz - Black Hills Information Security

linux - How to automatically close netcat connection after data is sent? - Server Fault

111/TCP/UDP - Pentesting Portmapper - HackTricks

2049 - Pentesting NFS Service - HackTricks

NFS no_root_squash/no_all_squash misconfiguration PE - HackTricks

How To Find NFS Mounted Drives (Penetration Testing) – Hacking Tips & Tricks – Labs Walkthrough – Infosec Articles

OSCP Notes – Password Attacks – Securism

Kali Linux Revealed | Mastering the Penetration Testing Distribution

Learning the vi Editor/vi Reference - Wikibooks, open books for an open world

shell - linux wildcard usage in cp and mv - Stack Overflow

Lab of a Penetration Tester: Week of PowerShell Shells - Announcement and Day 1

DisplayFilters - The Wireshark Wiki

CaptureFilters - The Wireshark Wiki

tcpdump - reading tcp flags · GitHub

command line - move files matching a specific pattern - Ask Ubuntu

Smart Searching with GoogleDorking

Google Hacking Database (GHDB) - Google Dorks, OSINT, Recon

RFC 1034 - Domain names - concepts and facilities

shell - Bash cannot act as nobody and nogroup? - Unix & Linux Stack Exchange

How to unmount NFS when server is gone? - Ask Ubuntu

Script Language | Nmap Network Scanning

Reverse shells - The Portal of Knowledge

Get only PID from tasklist using cmd title - Stack Overflow

XSS Filter Evasion Cheat Sheet | OWASP

Msfconsole: cannot load such file -- bundler/setup - FIXED

buffer overflow - Bypass Full ASLR+DEP exploit mitigation - Information Security Stack Exchange

Code segment - Wikipedia

Upgrading Simple Shells to Fully Interactive TTYs - ropnop blog

RubyGems Basics - RubyGems Guides

language agnostic - What is a lambda (function)? - Stack Overflow

Quickstart — Requests 2.25.0 documentation

cpython/pty.py at 3.9 · python/cpython · GitHub

GitHub - spabinger/terminator-cheat-sheet: Cheat Sheet for Terminator

How to Compress and Extract Files Using the tar Command on Linux

openssh - How to make a SSH tunnel publicly accessible? - Super User

linux - Pseudo-terminal will not be allocated because stdin is not a terminal - Stack Overflow

7 Linux Grep OR, Grep AND, Grep NOT Operator Examples

GitHub - gajos112/OSCP: Materials for OSCP exam

GitHub - SecureAuthCorp/impacket: Impacket is a collection of Python classes for working with network protocols.

How To Use ZIP & 7zip To Encrypt/Decrypt and Password Protect Files/Folders in Linux | 2daygeek.com

encryption - 7-Zip command to create and extract a password-protected ZIP file on Windows? - Stack Overflow

Hacking/OSCP cheatsheet. Well, I was researching about OSCP and… | by Mkumarcyber | VIEH Group | Medium

OSCP-One-page-repo

John the Ripper - wordlist rules syntax

How-to - Cracking ZIP and RAR protected files with John the Ripper - Digital Forensic Science

Another "invalid byte sequence UTF-8" · Issue #190 · wpscanteam/wpscan · GitHub

Brute Force - CheatSheet - HackTricks

john-users - Re: Cracking Kerberos tickets obtained using Kerberoasting technique

passwords - "john --format=md5" caused "Unknown ciphertext format name requested" error - Information Security Stack Exchange

CrackStation - Online Password Hash Cracking - MD5, SHA1, Linux, Rainbow Tables, etc.

How to Identify and Crack Hashes « Null Byte :: WonderHowTo

Identifying and Cracking Hashes. During a penetration test or a simple… | by Mr. Robot | InfoSec Adventures | Medium

LM, NTLM, Net-NTLMv2, oh my!. A Pentester’s Guide to Windows Hashes | by Péter Gombos | Medium

Cracking Wordpress Passwords with Hashcat - WPSec

Project 12: Cracking Linux Password Hashes with Hashcat (15 pts.)

Test WordPress Logins With Hydra on Kali Linux - LinuxConfig.org

Hydra – Brute Force Techniques « Red Team Tutorials

How to Brute Force Websites & Online Forms Using Hydra | Infinite Logins

Hydra using Proxy

How to Set and Unset Local, User and System Wide Environment Variables in Linux

Tomcat - HackTricks

Cipher Identifier (online tool) | Boxentriq

unix - Why does exec-ing gtar hang my Perl program? - Stack Overflow

Exploiting jQuery-File-Upload 9.22.0

Blueimp's jQuery File Upload 9.22.0 - Arbitrary File Upload Exploit - PHP webapps Exploit

jQuery-File-Upload 9.22.0 - Arbitrary File Upload - PHP webapps Exploit

Practical Usage of NTLM Hashes - ropnop blog

110,995 - Pentesting POP - HackTricks

POP3 Commands | The Electric Toolbox Blog

Playing with the Ports Redirection -

jpillora/chisel: A fast TCP/UDP tunnel over HTTP

Tunneling with Chisel and SSF | 0xdf hacks stuff

ssh - How to chain SOCKS proxies? - Super User

Linux Post Exploitation Command List · mubix/post-exploitation Wiki · GitHub

Find Files Based On Their Permissions | Tutonics

Day 26: The Complete List of Windows Post-Exploitation Commands (No Powershell) | by Z3R0 | Medium

How do you loop through each line in a text file using a windows batch file? - Stack Overflow

networking - What is Windows command to convert machine name to ip address and vice versa? - Super User

command line - See available drives from Windows CLI? - Super User

Post Exploitation on Windows – Offensive Security

How to enable Remote Desktop using Command Prompt on Windows 10 • Pureinfotech

TFTPy — TFTPy 0.6.3 documentation

PowerTip: Use PowerShell to Multiply Strings | Scripting Blog

Stack Class (System.Collections) | Microsoft Docs

about_Assignment_Operators - PowerShell | Microsoft Docs

PowerShell Remove item [0] from an array - Stack Overflow

PowerShell Encoding & Decoding (Base64) – Active Directory Security

How to Check your PowerShell Version (All the Ways!)

Find PowerShell Version in Windows

https://raw.githubusercontent.com/antonioCoco/ConPtyShell/master/Invoke-ConPtyShell.ps1

Windows XP SP0/SP1 Privilege Escalation to System Tutorial

Windows - Rowbot's PenTest Notes

WindowsPost-Exploitation.pdf

juicy-potato/CLSID at master · ohpe/juicy-potato · GitHub

GitHub - itm4n/FullPowers: Recover the default privilege set of a LOCAL/NETWORK SERVICE account

Privileged Accounts and Token Privileges - HackTricks

HackTricks

GitHub - itm4n/PrintSpoofer: Abusing Impersonation Privileges on Windows 10 and Server 2019

PrintSpoofer - Abusing Impersonation Privileges on Windows 10 and Server 2019 | PS C:\Users\itm4n> _

Privilege Escalation Abusing Tokens - HackTricks

GitHub - SecWiki/windows-kernel-exploits: windows-kernel-exploits Windows平台提权漏洞集合

FuzzySecurity | Windows Privilege Escalation Fundamentals

Windows Kernel Exploits – Penetration Testing Lab

windows services - How do you run CMD.exe under the Local System Account? - Stack Overflow

winPEAS wont output color : oscp

turbo/zero2hero: C implementation of the file-less UAC exploit

Bypassing default UAC settings manually | Ivan's IT learning blog

OSCP Notes – Privilege Escalation (Linux) – Securism

John J Hacking

Editing /etc/passwd File for Privilege Escalation

GTFOBins

How to Install an Older Kernel on Ubuntu · seagullbird

bwbwbwbw/linux-exploit-binaries

Kabot/Unix-Privilege-Escalation-Exploits-Pack: Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.

Privilege escalation with Docker. How to gain root from an unprivileged… | by Keiran Smith | Medium

Docker Daemon - Local Privilege Escalation (Metasploit) - Linux local Exploit

Linux Privilege Escalation - HackTricks

Basic Linux Privilege Escalation

(Ubuntu) setuid bash doesn't work - Server Fault

Linux Privilege Escalation | Mil0

Using ^ to match beginning of line in Python regex - Stack Overflow

pydsplit/pydsplit.py at master · rzwck/pydsplit · GitHub

python - pip: no module named _internal - Stack Overflow

python - TypeError: 'module' object is not callable - Stack Overflow

python - `from ... import` vs `import .` - Stack Overflow

How to Find Path Information in Python

introspection - How do I look inside a Python object? - Stack Overflow

How to check if a python module has been imported? - Stack Overflow

Debian / Ubuntu: Fatal error: Python.h: No such file or Directory - nixCraft

GitHub - opsxcq/exploit-CVE-2017-7494: SambaCry exploit and vulnerable container (CVE-2017-7494)

How to convert a decimal number into hexadecimal with zero padding in Python

Process escape sequences in a string in Python - Stack Overflow

Eval really is dangerous | Ned Batchelder

'property' object has no attribute '__getitem__' Error · Issue #14 · Rhynorater/CVE-2018-15473-Exploit

How to check version of python modules? - Stack Overflow

Regex Tutorial—From Regex 101 to Advanced Regex

Regular-Expressions.info - Regex Tutorial, Examples and Reference - Regexp Patterns

Multiple Methods to Bypass Restricted Shell

A way escape rbash - Programmer Sought

Escape from rbash to bash shell

rbash escape - rbash restricted shell-escape - hackNos

How to Escape Restricted Shell Environments on Linux « Null Byte :: WonderHowTo

Reverse Shell Cheat Sheet | pentestmonkey

PayloadsAllTheThings/Reverse Shell Cheatsheet.md at master · swisskyrepo/PayloadsAllTheThings · GitHub

Reverse shell payloads. All possible payload lists for reverse… | by Pravinrp | Medium

PayloadsAllTheThings/Reverse Shell Cheatsheet.md at master · swisskyrepo/PayloadsAllTheThings · GitHub

Linux bash reverse shell with piping - Stack Overflow

Reverse Shell Cheat Sheet

flozz/p0wny-shell: Single-file PHP shell

besimorhino/powercat: netshell features all in version 2 powershell

WordPress Plugin : Reverse Shell

penetration test - Reverse PHP shell disconnecting when netcat listener - Information Security Stack Exchange

Run a Powershell script from PHP - IT Droplets

Documentation

How to create a file in Ruby - Stack Overflow

Module: Ping (Ruby 1.8.6)

Rubular: a Ruby regular expression editor

C Program to test shellcode · GitHub

Shellcode in C program - Stack Overflow

Memory Injection like a Boss - F-Secure Blog

windows - How does process migration work in Meterpreter - Information Security Stack Exchange

The “Poor Man’s Process Migration” in Windows |

Linux/x86 - execve(/bin/sh) - 28 bytes

ShellShocked - A quick demo of how easy it is to exploit - Surevine

Microsoft Word - SMB Access from Linux.docx

GitHub - irgoncalves/smbclient_cheatsheet: Useful commands/tricks using smbclient/nmap in a pentesting/auditing/redteaming

Impacket Guide: SMB/MSRPC

Samba is_known_pipename() Code Execution ≈ Packet Storm

Mounting samba shares from a unix client - SambaWiki

PWK Notes: SMB Enumeration Checklist [Updated] | 0xdf hacks stuff

A Little Guide to SMB Enumeration

139,445 - Pentesting SMB - HackTricks

Make a network drive available over the internet? - Super User

samba - SMB protocol min max values available? - Unix & Linux Stack Exchange

SMTP Commands and Response Codes Guide | Mailtrap Blog

Postfix Shellshock PoC Testing · GitHub

ubuntu - How to check postfix server using telnet - Server Fault

161,162,10161,10162/udp - Pentesting SNMP - HackTricks

files - Sort based on the third column - Unix & Linux Stack Exchange

bash - Sort filenames without leading zeros - Stack Overflow

sorting - Bash/Linux Sort by 3rd column using custom field seperator - Stack Overflow

Usage · sqlmapproject/sqlmap Wiki · GitHub

How to inject a part of cookie using sqlmap - Stack Overflow

MySQL UDF Exploitation

GitHub - mysqludf/lib_mysqludf_sys: A UDF library with functions to interact with the operating system. These functions allow you to interact with the execution environment in which MySQL runs.

MySQL :: MySQL 8.0 Reference Manual :: 4.5.1.5 Executing SQL Statements from a Text File

MySQL :: MySQL 8.0 Reference Manual :: 13.7.4.2 DROP FUNCTION Statement for User-Defined Functions

SQL Server List Tables: How to Show All Tables | Tutorial by Chartio

mysql - What does # mean in sql? - Stack Overflow

Basic of SQL for SQL Injection part 2

SQL injection UNION attacks | Web Security Academy

Identifying Your Oracle Database Software Release

Get current user name : Current_User « User Previliege « Oracle PL / SQL

How to List All Tables in Oracle | Tutorial by Chartio

sql - How do I list all the columns in a table? - Stack Overflow

sql - Union 'expression must have same datatype as corresponding expression' - Stack Overflow

MariaDB – Navigating your way around a MySQL Database – CodingBee

Leveraging a shell from SQL injection - Information Security Stack Exchange

MySQL UDF Exploitation | 🔐Blog of Osanda

MySQL SQL Injection Cheat Sheet | pentestmonkey

Reading and Writing Files | NetSPI SQL Injection Wiki

SQL injection vulnerability: SQLi basics, simple injection with UNION

Exploiting SQL injection with no space | by Gupta Bless | Medium

Time based Blind Injection

MySQL :: Security in MySQL :: 4.1 Account User Names and Passwords

exploit/timeclock.py at master · timip/exploit

What is the order that Linux's dynamic linker searches paths in? - Unix & Linux Stack Exchange

penetration test - MongoDB Nosql injection in python code - Information Security Stack Exchange

ssh unable to negotiate - no matching key exchange method found - Unix & Linux Stack Exchange

security - How to create a restricted SSH user for port forwarding? - Ask Ubuntu

UNIX / Linux : How to lock or disable an user account – The Geek Diary

SSH keeps skipping my pubkey and asking for a password - Unix & Linux Stack Exchange

encryption - How do you test a public/private DSA keypair? - Stack Overflow

pWnOS

GitHub - g0tmi1k/debian-ssh: Debian OpenSSL Predictable PRNG (CVE-2008-0166)

visual studio - How to install build tools for v141_xp for VC 2017? - Stack Overflow

Abusing HTTP PUT

JSP Vulnerabilities and Fixes for Developers | Lucideus

Common Attacks on JSP Pages | Securing Servlets and JSPs in Sun Java System Application Server, Part 2 | InformIT

File Inclusion Vulnerabilities - Metasploit Unleashed

Where are Apache file access logs stored? - Unix & Linux Stack Exchange

Path Traversal Cheat Sheet: Linux | GracefulSecurity

web application - Remote File Include - commands running on attack box? - Information Security Stack Exchange

Local File Inclusion (LFI) Explained, Examples & How to Test

How to show disabled functions in PHP

Using Curl commands with Webdav | QED42

Exploiting Put Method. Seems like a boring topic? But mind… | by Asfiya $ha!kh | Medium

Attacking webservers via .htaccess - Just Another Hacker

epi052/feroxbuster: A fast, simple, recursive content discovery tool written in Rust.

Whitelist: pWnOS 1.0

pWnOS - vulnhub walkthrough - NetOSec

Gobuster Cheatsheet « Red Team Tutorials

Web App Security Testing With Browsers - DZone DevOps

How can I decode this JavaScript code? - Stack Overflow

Default-Credentials/Apache-Tomcat-Default-Passwords.mdown at master · netbiosX/Default-Credentials

Loot Windows · Total OSCP Guide

process/WindowsPipes.php at 5.x · symfony/process · GitHub

FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines - Microsoft Security

Office 365 Advanced Threat Protection defense for corporate networks against recent Office exploit attacks - Microsoft Security

Named Pipes - Win32 apps | Microsoft Docs

Juicy Potato (abusing the golden privileges) | juicy-potato

Juicy Potato (abusing the golden privileges) | juicy-potato

network scanners - Is there a nmap command to get the top # most common ports? - Information Security Stack Exchange

GitHub - ohpe/juicy-potato: A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.

How to Manually Exploit EternalBlue on Windows Server Using MS17-010 Python Exploit « Null Byte :: WonderHowTo

GitHub - worawit/MS17-010: MS17-010

HTB: Legacy | 0xdf hacks stuff

https://raw.githubusercontent.com/jivoi/pentest/master/exploit_win/ms08-067.py

hash - Understanding Windows local password hashes (NTLM) - Information Security Stack Exchange

ASP File Extension - What is an .asp file and how do I open it?

Net view | Microsoft Docs

windows - list network shares from command prompt - Super User

GitHub - emilyanncr/Windows-Post-Exploitation: Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!

Anonymous FTP | Infinite Logins

Windows Command Prompt: dir + what option shows only Directories and not files? - Super User

How do I tell what version and edition of Windows is on the filesystem? - Super User

fingerprinting - How to find Windows version from the file on a remote system - Information Security Stack Exchange

pentesting-notes/get-windows-version.md at master · NeuronAddict/pentesting-notes · GitHub

Kernel Versions

List Hard Drives using Command Prompt and PowerShell

Windows: List files and their permissions (access) in command line - Super User

icacls | Microsoft Docs

Net view | Microsoft Docs

batch file - PSEXEC - "The Handle is invalid" When running the command as System User - Stack Overflow

GitHub - risksense/zerologon: Exploit for zerologon cve-2020-1472

GitHub - maaaaz/impacket-examples-windows: The great impacket example scripts compiled for Windows

Remotely enable Remote Desktop under Windows XP

Enabling Remote Desktop Protocol From the Command Line

Enable remote desktop from command line (CMD)

Passing the Hash with Remote Desktop | Kali Linux

windows - RDP service not displayed under services for remote computer - Server Fault

Passing the Hash with Remote Desktop | Kali Linux Blog

Add user to group from command line (CMD)

How to Create an Admin User Account Using CMD Prompt (Windows) « Operating Systems :: WonderHowTo

MSSQL RCE and Reverse Shell xp_cmdshell – Cyber Security | Penetration Test | Malware Analysis

How to Execute Command Line Commands Using T-SQL - TurboFuture - Technology

Full MSSQL Injection PWNage

sql server - Select nth result from a query - Stack Overflow

PayloadsAllTheThings/MSSQL Injection.md at master · swisskyrepo/PayloadsAllTheThings

Get MDF File Location in SQL Server 2014 and Up to 2019 Versions

Abbreviate PathName ''C:Program FilesMicrosoft SQL ServerMSSQLBackup'' – SQLServerCentral

How to move SQL database files (MDF and LDF) to another location

File Locations - SQL Server | Microsoft Docs

MDF File Location in SQL Server 2014, 2016, & 2017

tempdb database - SQL Server | Microsoft Docs

File Locations - SQL Server | Microsoft Docs

Step By Step MSSQL Union Based Injection

MSSQL Injection Cheat Sheet | pentestmonkey

How to Enable / Disable Xp_cmdShell in SQL SERVER? TIP #82 – SQLServerCentral

Check if “xp_cmdshell” is enabled? | Gaurav Lal

How to Execute Command Line Commands Using T-SQL - TurboFuture - Technology

Pentest-Notes/3-command-execution.md at master · SofianeHamlaoui/Pentest-Notes

Red Team Tales 0x01: From MSSQL to RCE - Tarlogic Security - Cyber Security and Ethical hacking

PayloadsAllTheThings/MSSQL Injection.md at master · swisskyrepo/PayloadsAllTheThings

Working with the SQL Server command line (sqlcmd)

How to gain access to system account the most powerful account in Windows. | Alien Eyes

Finding writable files in a directory in a windows command line

Collection of PowerShell one-liners for red teamers and penetration testers to use at various stages of testing.

for /d - Loop through directory - Windows CMD - SS64.com

How to make the echo command without new line in Windows

echo | Microsoft Docs

cmd.exe - Windows Command to get all information/properties of a file - Super User

How can I execute a Windows command line in background? - Super User

windows - Explain the output of ICACLS.EXE, line by line, item by item - Super User

samratashok/nishang: Nishang - Offensive PowerShell for red team, penetration testing and offensive security.

powershell_scripts/ps_encoder.py at master · darkoperator/powershell_scripts

command line - Get DOS path instead of Windows path - Stack Overflow

How to Exploit MS17-010 Eternal Blue without Metasploit

AppLocker Bypass – Regsvr32 – Penetration Testing Lab

C0:7E:01:8C:93:EB:D0:FD:E3:CD:74:32:9F:AF:FA:6F:40:FD:8E:1C:05:E3:79:41:6C:77:CD:EF:3E:04:11:12: Exploiting MS17-010 EternalBlue Vulnerability

Path Traversal Cheat Sheet: Windows | GracefulSecurity

https://raw.githubusercontent.com/soffensive/windowsblindread/master/windows-files.txt

PowerShell Remoting from Linux to Windows - Quickbreach Blog

Hackplayers/evil-winrm: The ultimate WinRM shell for hacking/pentesting

How To Install And Use Evil WinRM In Kali Linux - ethicalhackingguru.com

Offensive Security

Offensive Security Forums

Offensive Security Support Portal

OSCP Certification Exam Guide - Offensive Security

OSCP Exam Guide – Offensive Security Support Portal

Proctoring Tool Student Manual – Offensive Security Support Portal

PWK Network Introduction Guide - Offensive Security

sample-penetration-testing-report.pdf

Other random links
Top

Aggressor Script Tutorial and Reference

Sleep 2.1 Manual

Adding Easy GUIs to Aggressor Scripts

GitHub - bluscreenofjeff/AggressorScripts: Aggressor scripts for use with Cobalt Strike 3.0+

AggressorScripts/forcecheckin.cna at master · bluscreenofjeff/AggressorScripts

Aggressor Script Tutorial and Reference

https://www.cobaltstrike.com/aggressor-script/default.cna

Build your first app  |  Android Developers

Start another activity  |  Android Developers

How does Modem code talk to Android code - Stack Overflow

Install Arch-linux on Raspberry Pi From Windows – Untangled

Assembly - Introduction - Tutorialspoint

Reverse Engineering for Beginners

Forum - BIOS Modding: Introduction and Preparations

C-VisualStudio2019.pdf

GitHub - microsoft/Windows-driver-samples: This repo contains driver samples prepared for use with Microsoft Visual Studio and the Windows Driver Kit (WDK). It contains both Universal Windows Driver and desktop-only driver samples.

C Programming - Wikibooks, open books for an open world

Program for Decimal to Binary Conversion - GeeksforGeeks

zevlg/xlockmore

screensaver.c/screensaver.c at master · itchyny/screensaver.c

c++ - How to convert a command-line argument to int? - Stack Overflow

c++ - Dereferencing a pointer to an array? - Stack Overflow

c++ - Programmatically access CPU fan on a laptop? (Windows) - Stack Overflow

C Program for ID3 Tagging - GeeksforGeeks

MDM9645 - The iPhone Wiki

How to Build Your Own Rogue GSM BTS for Fun and Profit

0x7678 Security LABS : OsmocomBB+OpenBTS+GSM={Calypso Chipset/Motorola C123} *USB+2.5mm Jack

Home - FreeSWITCH

WikiStart - OsmocomBB - Open Source Mobile Communications

Open Source ASN.1 Compiler: asn1c 0.9.28

ICS 311 #3: Growth of Functions and Asymptotic Concepts

Databases by Title: A

ACM Digital Library

Home | IEEE Computer Society Digital Library

A Collaborative Project Management Architecture

How to compare arrays in C#? - Stack Overflow

Sudoku Creation and Grading

c# - ThreadStart with parameters - Stack Overflow

Threading in C# - Part 2 - Basic Synchronization

c# - The calling thread cannot access this object because a different thread owns it - Stack Overflow

Walkthrough: Persisting an Object using C# | Microsoft Docs

event handling - Execute code when a WPF closes - Stack Overflow

GitHub - freeCodeCamp/freeCodeCamp: The https://freeCodeCamp.org open source codebase and curriculum. Learn to code for free together with millions of people.

GitHub - firstcontributions/first-contributions: 🚀✨ Help beginners to contribute to open source projects

GitHub - jwasham/coding-interview-university: A complete computer science study plan to become a software engineer.

TopCoder Statistics

ABC: Always Be Coding – Always Be Coding – Medium

Community - Competitive Programming - Tutorials

GitHub - kamranahmedse/developer-roadmap: Roadmap to becoming a web developer in 2018

Top 99 Java Project Ideas for Final Year (Get Help) | Lovelycoding.org

sockets - Fastest way to scan ports with Java - Stack Overflow

Trail: Custom Networking (The Java™ Tutorials)

A Gentle Introduction to Algorithm Complexity Analysis

t540p_w540_hmm_en_sp40a26003_01.pdf

Web Hacking 101 by Peter Yaworski [Leanpub PDF/iPad/Kindle]

M.2 SSD on W540 20BGCT01WW - Lenovo Community

Running PowerShell Scripts Is as Easy as 1-2-3

Directory listing of http://docs.alexomar.com/biblioteca

Netcraft - Search Web by Domain

Home · Security-Onion-Solutions/security-onion Wiki · GitHub

Cox Certified Cable Modems

How to: Create a Recovery Drive for reinstalling Windows 10 - Microsoft Community

Microsoft HUP - Register to purchase Microsoft Office Professional Plus 2016 at a discounted rate through the Home Use Program

Blue Screen of Jeff

A Deep Dive into Cobalt Strike Malleable C2 | - Threat Express

Malleable Command and Control Language - Cobalt Strike

How to Write Malleable C2 Profiles for Cobalt Strike

SSLKEYLOGFILE · Everything curl

Decrypting TLS Browser Traffic With Wireshark – The Easy Way! | Jim Shaver

GitHub - dnSpy/dnSpy: .NET debugger and assembly editor

OllyDbg v1.10

x64dbg

Download Debugging Tools for Windows - WinDbg - Windows drivers | Microsoft Docs

Immunity Debugger

Steel Strength - Safe Guard Safe Co.

Bonbo 10Pcs Flanged Ball Bearings ID 3/4" x OD 1-3/8" for Lawn Mower, Wheelbarrows, Carts, Hand Trucks Wheel Alternative to 532009040, AM118315, AM127304, 10513, 251210 Etc, Deep Groove Ball Bearing: Amazon.com: Industrial & Scientific

IRWIN Drill Bit, Cobalt, Reduced Shank, 1/2-Inch x 6-Inch (3016032) - - Amazon.com

Chain drive with vertical shaft????

Everbilt 3/4 in. x 48 in. Plain Round Rod-800427 - The Home Depot

Metals Depot

Everbilt 1/4 in. x 12 in. Plain Square Bar-800727 - The Home Depot

Fulterer FR5210 Full Extension Easy Close Slide 22" 400113 | CabinetParts.com

Value Line Soft Close Full Extension Slide 22" VLS-22-SC | CabinetParts.com

Pull Out Keyboard Trays | Hardwaretree.com

Selby Furniture Hardware H116P - Selby Solid Brass Flip-Top Table Hinge - EACH (Polished Brass) - The Hardware Hut

Butler Tray Table Hinge Solid Brushed Brass | hardwaretree.com

encryption - How can I encrypt a file? - Unix & Linux Stack Exchange

xprism's BIOS collection - Google Drive

Opening an issue from code - GitHub Docs

Contributing to Processing with Pull Requests · processing/processing Wiki · GitHub

The beginner’s guide to contributing to a GitHub project – Rob Allen's DevNotes

Adding an existing project to GitHub using the command line - GitHub Docs

CUDA Zone | NVIDIA Developer

T-3 Series Independent Squat Stand | V2

Titan Fitness 86" Barbell Solid 2" Olympic Plates Weight Bar Bench Press Chrome

Titan Fitness Flat Weight Bench 1,000 lb Rated Capacity w/ Handle & Wheels

Titan 260 lb Set of Olympic Bumper Plates Benchpress Strength Training Power

Indy Econ Squat Rack Stand For Strength and Conditioning Training

CAP Barbell 300-lb Olympic Set (Includes 7' Bar) - Walmart.com

CAP Barbell Rubber Olympic Bumper Plate, Single - Walmart.com

ZENY Pair of Adjustable Barbell Rack Stand Squat Bench Press Home GYM Weight Liftting Fitness Exercise - Walmart.com

Buy Bumper Plate Set - 370 lbs - A - Black Rubber. It provides a great assortment of all weight plates. Most popular weight plate set for home gym. Ship free.

DIY Floating Shelves - The Home Depot

Stainable wood filler.....NOT!

Kevin Jantzer » DIY Adjustable Standing Desk

Craftsman 9.5 AMP 1 3/4 HP Fixed Base Router

Build a MOTORIZED monitor lift (on a budget!) - YouTube

775 12V DC Motor Oblate D Style Axle Mini Generator DIY High Torque & Bearing | eBay

The Lifting Rods – Matt Cremona

Calculate torque/power needed to lift a 4 kg load | Physics Forums

Have you lost hot water pressure through your entire house?

Lancaster Archery Supply: Archery Equipment, Archery Supplies & Archery Products

Easton Gamegetter XX75 Aluminum Arrows

Gold Tip Warrior Fletched Arrow (Vanes)

Gold Tip Hunter - 400 - Shafts - 1dz - Bowhunters Supply Store

Victory VForce 245 Sport V6 Arrow Shaft

Best HVAC Colleges and Schools | College Choice

HVAR_AAS_TE_2017-2018.pdf

Your Customized Textbook List | The Ferris State University Bookstore

CodingBat Java

Tree Traversals (Inorder, Preorder and Postorder) - GeeksforGeeks

A Guide To Parsing: Algorithms And Terminology

GitHub - ZacharyConlyn/Bankers-Algorithm-Solver: A recursive, Java implementation of the Banker's Algorithm with a text file as input

Bankers-Algorithm-Solver/Banker.java at master · ZacharyConlyn/Bankers-Algorithm-Solver · GitHub

parsing - Recursive Descent Parser in Java - Stack Overflow

Creating and Reading Directories (The Java™ Tutorials > Essential Classes > Basic I/O)

Synchronization (The Java™ Tutorials > Essential Classes > Concurrency)

Java 8 Concurrency Tutorial: Threads and Executors

Why should I uninstall older versions of Java from my system?

Musing A - Java Stuff

CMSC 335 Information

Cave Strategy

Different ways of Reading a text file in Java - GeeksforGeeks

Trail: Custom Networking: Table of Contents (The Java™ Tutorials)

Java Tutorials Learning Paths

Runtime (Java Platform SE 7 )

Process (Java Platform SE 8 )

Trail: The Reflection API (The Java™ Tutorials)

Priority Queues

Java Integer compareTo() method - GeeksforGeeks

Time Complexity of Java PriorityQueue (heap) insertion of n elements? - Stack Overflow

Time Complexity of Java Collections | Baeldung

Merge Sort in Java | Baeldung

Iterative Merge Sort - GeeksforGeeks

How to create custom exceptions in Java

Check whether an array is sorted in Java - Techie Delight

Java For Complete Beginners - formatted strings

java - Flip Image with Graphics2D - Stack Overflow

Java: How To Create Your Own Bot Interface

JsonParser (Java(TM) EE 8 Specification APIs)

JsonObject (Java(TM) EE 7 Specification APIs)

How to parse JSON in Java - GeeksforGeeks

Java read json and write json example - JSON.simple tutorial

java - Parse JSON file using GSON - Stack Overflow

Java API for JSON Processing

The Java Community Process(SM) Program - JSRs: Java Specification Requests - detail JSR# 353

JSON Syntax

VirtualBox/Setting up a Virtual Machine/Mac OS X - Wikibooks, open books for an open world

Xor decimal string in vbscript and convert to hex

sevagas /macro_pack GitHub

danielbohannon / Invoke-Objuscation Github

Obfuscating macros

MIT Subject Listing & Schedule IAP/Spring 2020

Online Textbooks | MIT OpenCourseWare | Free Online Course Materials

Design and Manufacturing I | Mechanical Engineering | MIT OpenCourseWare

Cross-compiling C programs for MS Windows

Split zip file and reassemble to unzip

Download all the dependencies for a package

Cross Compile to windows from linux

Network address translation - Wikipedia

OpenBSD PF: Network Address Translation

nat - Is a brute force UDP hole punch possible if both external IPs, and both internal ports are known to each client? - Network Engineering Stack Exchange

Hole punching (networking) - Wikipedia

UDP hole punching - Wikipedia

TCP hole punching - Wikipedia

Epictetus | Internet Encyclopedia of Philosophy

c - Make parent wait for all child processes to finish - Stack Overflow

C Program to test shellcode · GitHub

C Program to test shellcode · GitHub

Code Signing and binary info

Remote Pi

DirecTV Now Linux - AT&T Community

Raspberry Pi Distance Sensor: How to setup the HC-SR04 - Pi My Life Up

Raspberry Pi Chromium: Learn How to Install Chromium OS

Raspberry Pi Motion Sensor using a PIR Sensor - Pi My Life Up

Build a Raspberry Pi Security Camera Network - Pi My Life Up

Raspberry Pi Port Forwarding & Dynamic DNS - Pi My Life Up

Ghidra reverse engineering example

BitLocker basic deployment (Windows 10) | Microsoft Docs

MBR2GPT | Microsoft Docs

How to Safely Download Torrents (with Pictures) - wikiHow

The best free torrent client 2019 | TechRadar

matroska - Remove embedded subtitles from an .mkv file? - Super User

How to Change the Frame Rate in VLC? - Avi Player Q&A

QEMU

Running Hyper-V and VMware Workstation on Windows 8.x - IVOBEERENS.nl

Powering on a vm in VMware Workstation on Windows 10 host where Credential Guard/Device Guard is enabled fails with BSOD (2146361)

Build 14295: VMware Workstation Pro 12 thinks Hyper-V is installed

Raspberry Pi Emulation for Windows with QEMU | PCsteps.com

virtual machine - Cannot run VM in VMWare on Windows 10 due to Hyper-V - Super User

Microsoft Office professional plus 2016 on more than one computer - Microsoft Community

Microsoft HUP - Learn more about the Home Use Program

Is ESXi Really Free? Let's put it to the Test

Getting started

Hello World -- Your first program - C# Programming Guide | Microsoft Docs

Create a C++ console app project | Microsoft Docs

Publishing Xamarin.iOS apps to the App Store - Xamarin | Microsoft Docs

Create a LAN Segment for a Virtual Machine

Using VMware Workstation Pro - VMware Workstation Pro 16.0

Download VMware Workstation Pro - My VMware

How to resolve "This virtual machine appears to be in use" error in VMware Workstation | TinkerTry IT @ Home

How to Create a VPN Server on Your Windows Computer Without Installing Any Software

6 open source tools for making your own VPN | Opensource.com

Browser Extensions - Mozilla | MDN

How to configure multiple websites with Apache web server | Opensource.com

Host Mutilple Sites on One Server Using Apache | Liquid Web

Intel® Driver & Support Assistant FAQ

windows - Enforcing lock screen after idle time via GPO - Server Fault

Reset Windows updates - Microsoft Community

Windows Update We couldn't connect to the update service. - Microsoft Community

Windows Update We couldn't connect to the update service. - Microsoft Community

Desktop app technologies - Windows applications | Microsoft Docs

Microsoft · GitHub

C#

Cannot Access SMB Network Shares after Windows 10 1709 Upgrade | Windows OS Hub

GitHub - rasta-mouse/Watson: Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities

.NET documentation | Microsoft Docs

.NET API browser | Microsoft Docs

GitHub - bitsadmin/nopowershell: PowerShell rebuilt in C# for Red Teaming purposes

Windows Management Using C# Programming

Download a Windows 10 virtual machine - Windows app development

How to permanently disable Windows Defender Real Time Protection with GPO? - Stack Overflow

How do I scroll in tmux? - Super User

Create Windows service from executable

How do I enable services on a Windows computer via a command line?

How to start and stop service manually on Windows 10

Any examples of creating a windows service in C/C++?(No GUI)

Microsoft Complete Service Sample

command line - Ifconfig does not show my IP - Ask Ubuntu

mitmproxy - an interactive HTTPS proxy

mitmproxy/mitmproxy: An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.

Everything you can do with Voice Control on iPhone and iPad | iMore

Managing Multiple Versions of Python on Ubuntu 18.04