Not necessarily meant to be followed step by step, although it is recommended. Some steps are valid during all levels, others give way to better alternatives further on.
- http://adilapapaya.com/docs/shelljs/
- http://adilet.org/blog/your-ultimate-guide-to-interview-preparation/
- http://bonsaiden.github.io/JavaScript-Garden/#object.general
- http://codylindley.com/
- http://colormind.io/template/material-dashboard/
- http://disq.us/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
- http://drpete.co/?topic=25-point-website-usability-checklist
Taken from: rmusser01/Infosec_Reference
Enumeration is the key. (Linux) privilege escalation is all about:
Collect - Enumeration, more enumeration and some more enumeration.
Useful shts I use
β’ https://roadmap.sh [ROADMAP]
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<b>tildeverse</b><br><a href='https://tildeverse.org'><i>https://tildeverse.org</i></a><br> we're a loose association of like-minded tilde communities. if you're interested in learning about *nix (linux, unix, bsd, etc) come check out our member tildes and sign up | |
<b>aussietilde</b><br><a href='https://aussies.space'><i>https://aussies.space</i></a><br> aussies.space, otherwise known as aussietilde, is a shared, publicly accessible linux system, known as a tilde or pubnix. aussietilde is inspired by other tildes such as tilde.team, the major difference being that aussietilde is physically located in australia, meaning way faster loading times and way | |
<b>BREADPUNK | BREADPUNK</b><br><a href='https://breadpunk.club'><i>https://breadpunk.club</i></a><br>a collaborative bread-positive space | |
<b>Cosmic Voyage - Messages from Humanity's Stellar Diaspora</b><br><a href='https://cosmic.voyage'><i |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ββ¦ββ¦ β¦ ββ β¬ β¬βββ ββ ββββ¬ β¬ββββ¬ββ¬ β¬ β¦ββββββββββββ¬ β¬β¬βββββββββββ | |
βββββ¦β β β©ββ ββ β¬ β β©ββ ββ βββββ ββ¬β β β¦βββ€ ββββ ββ βββ¬ββ ββ€ βββ | |
β© β© β© βββββββββ βββββββββββββ΄ β΄ β©βββββββββββββββ΄βββββββββββ | |
// | |
()==========>>======================================-- | |
\\ | |
2FA Bypass |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Mostly older shit from '17-'20. Some good, some stale. Posting here for posterity. | |
Pulled from my private Workflowy repo. | |
====================================== | |
hackery (@Section31D) | |
- Penetration Testing/Assessment Workflow |