Last active
October 30, 2024 09:50
-
-
Save cyberheartmi9/afa7579955b93e79a6f8fdb5d21924a1 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#notes | |
https://www.cnblogs.com/keepmoving1113/tag/OSCP/ | |
https://hausec.com/pentesting-cheatsheet/ | |
https://highon.coffee/blog/penetration-testing-tools-cheat-sheet | |
https://github.com/wwong99/pentest-notes/blob/master/oscp_resources/OSCP-Survival-Guide.md | |
https://noobsec.net/oscp-cheatsheet/ | |
https://www.netsecfocus.com/oscp/2019/03/29/The_Journey_to_Try_Harder-_TJNulls_Preparation_Guide_for_PWK_OSCP.html | |
https://www.reddit.com/r/oscp/comments/824v7z/oscp_exam_taking_fraud/ | |
https://github.com/OlivierLaflamme/Cheatsheet-God | |
https://johntuyen.com/personal/2019/05/25/personal-oscpcheatsheet.html | |
https://github.com/tbowman01/OSCP-PWK-Notes-Public | |
https://bitvijays.github.io/index.html | |
#OOB | |
https://omercitak.com/out-of-band-attacks-en/ | |
#SQL inj | |
https://medium.com/bugbountywriteup/out-of-band-oob-sql-injection-87b7c666548b | |
https://portswigger.net/web-security/sql-injection/cheat-sheet | |
#BOF | |
https://medium.com/@princerohit8800/buffer-overflow-exploiting-slmail-email-server-f90b27459911 | |
https://www.nccgroup.com/uk/about-us/newsroom-and-events/blogs/2016/june/writing-exploits-for-win32-systems-from-scratch/ | |
https://bufferoverflows.net/castripper-2-50-70-buffer-overflow-exploitation-mona-py-rop-chain/ | |
https://github.com/V1n1v131r4/OSCP-Buffer-Overflow | |
https://vulp3cula.gitbook.io/hackers-grimoire/exploitation/buffer-overflow | |
https://medium.com/@notsoshant/windows-exploitation-dealing-with-bad-characters-quickzip-exploit-472db5251ca6 | |
https://github.com/xChockax/Buffer-Overflow | |
#pviot | |
https://medium.com/@mkumarcyber/hacking-oscp-cheatsheet-ef63c43f919c | |
https://scund00r.com/all/oscp/2018/02/25/passing-oscp.html | |
https://sushant747.gitbooks.io/total-oscp-guide/content/port_forwarding_and_tunneling.html | |
https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets | |
https://0xdf.gitlab.io/2019/01/28/pwk-notes-tunneling-update1.html | |
https://cd6629.gitbook.io/oscp-notes/oscp-cheatsheet-unfinished | |
https://www.fireeye.com/blog/threat-research/2019/01/bypassing-network-restrictions-through-rdp-tunneling.html | |
https://www.puckiestyle.nl/pivot-with-chisel/ | |
https://www.offensive-security.com/metasploit-unleashed/proxytunnels/ | |
https://www.hackingarticles.in/comprehensive-guide-on-ssh-tunneling/ | |
https://github.com/deepzec/Win-PortFwd | |
https://www.howtoforge.com/port-forwarding-with-rinetd-on-debian-etch | |
https://www.hackingarticles.in/comprehensive-guide-to-port-redirection-using-rinetd/ | |
https://netsec.ws/?p=272 | |
https://medium.com/@rootbg/ssl-backend-behind-varnish-382dc7842123 | |
#priv esc | |
[ win ] | |
http://www.fuzzysecurity.com/tutorials/16.html | |
https://github.com/mubix/post-exploitation/wiki/Linux-Post-Exploitation-Command-List | |
https://tryhackme.com/room/windows10privesc | |
https://github.com/ohpe/juicy-potato | |
https://decoder.cloud/2020/05/11/no-more-juicypotato-old-story-welcome-roguepotato/ | |
[unix] | |
https://tryhackme.com/room/linuxprivesc | |
# SMB & netbios | |
https://www.hackercoolmagazine.com/smb-enumeration-with-kali-linux-enum4linuxacccheck-smbmap/ | |
https://www.hackingarticles.in/a-little-guide-to-smb-enumeration/ | |
https://www.hackingarticles.in/smb-penetration-testing-port-445/ | |
https://www.hackingarticles.in/3-ways-scan-eternal-blue-vulnerability-remote-pc/ | |
https://www.hackingarticles.in/password-crackingsmb/ | |
http://www.hackingarticles.in/netbios-and-smb-penetration-testing-on-windows/ | |
https://www.hackingarticles.in/penetration-testing-in-smb-protocol-using-metasploit/ | |
https://www.hackingarticles.in/multiple-ways-to-connect-remote-pc-using-smb-port/ | |
https://www.hackingarticles.in/hack-remote-windows-pc-using-dll-files-smb-delivery-exploit/ | |
#snmp | |
https://www.hackingarticles.in/snmp-lab-setup-and-penetration-testing/ | |
https://bond-o.medium.com/cisco-snmp-secrets-e4b731b19737 | |
https://oscp.infosecsanyam.in/untitled/snmp-enumeration | |
# FTP & telnet | |
https://www.hackercoolmagazine.com/hacking-ftp-telnet-and-ssh-metasploitable-tutorials/ | |
# AD Attack | |
Performing domain recon using PS | |
https://stealthbits.com/blog/performing-domain-reconnaissance-using-powershell/ | |
Attack mapping with bloodhound | |
https://stealthbits.com/blog/local-admin-mapping-bloodhound/ | |
Extracting passwd hashes | |
https://stealthbits.com/blog/extracting-password-hashes-from-the-ntds-dit-file/ | |
Pass-the-hash attacks with mimikatz | |
https://stealthbits.com/blog/passing-the-hash-with-mimikatz/ | |
https://www.youtube.com/watch?v=V3BkyAcYjPU&feature=emb_logo | |
https://github.com/incredibleindishell/Windows-AD-environment-related | |
https://github.com/cyberheartmi9/Active-Directory-Exploitation-Cheat-Sheet | |
https://blog.ropnop.com/practical-usage-of-ntlm-hashes/ | |
#antivirus ev | |
remote process memory injection | |
reflective dll injection | |
process hollowing | |
inline hooking | |
powershell in memory injection | |
https://medium.com/@benoit.sevens/arbitrary-code-guard-cd74c30f8dfe | |
https://medium.com/@ozan.unal/process-injection-techniques-bc6396929740 | |
https://www.elastic.co/blog/ten-process-injection-techniques-technical-survey-common-and-trending-process | |
https://medium.com/csg-govtech/process-injection-techniques-used-by-malware-1a34c078612c | |
https://blog.f-secure.com/memory-injection-like-a-boss/ | |
https://www.ired.team/offensive-security/code-injection-process-injection/reflective-dll-injection#resolving-import-address-table | |
https://www.ired.team/offensive-security/code-injection-process-injection/pe-injection-executing-pes-inside-remote-processes | |
#bypass powershell exe policy | |
https://blog.netspi.com/15-ways-to-bypass-the-powershell-execution-policy/ | |
#kerberoast attack | |
https://www.pentestpartners.com/security-blog/how-to-kerberoast-like-a-boss/ | |
https://www.secura.com/blog/kerberoasting-exploiting-kerberos-to-compromise-microsoft-active-directory | |
https://pentestlab.blog/2018/06/12/kerberoast/ | |
https://www.redteamsecure.com/research/guide-to-kerberoasting | |
https://github.com/nidem/kerberoast | |
https://dirkjanm.io/abusing-exchange-one-api-call-away-from-domain-admin/ | |
https://www.harmj0y.net/blog/powershell/kerberoasting-without-mimikatz/ | |
https://hausec.com/2017/10/21/domain-penetration-testing-using-bloodhound-crackmapexec-mimikatz-to-get-domain-admin/amp/ | |
#Zerologon | |
https://medium.com/@jayaye15/zerologon-exploit-cve-2020-1472-e70ca7cd610c | |
# Resource | |
http://strongcourage.github.io/2020/05/03/enum.html |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment