Advanced Search
Search Results
74 total results found
DNS
https://nip.io/ Wildcard DNS
Scanning
Links
Request Interception
Tools: BurpSuite Links: Requestbin: Interecepts HTTP Requests (useful for blind SSRF)
Exploitation
Links
HTTPD
Busybox HTTPD httpd [-ifv[v]] [-c CONFFILE] [-p [IP:]PORT] [-u USER[:GRP]] [-r REALM] [-h HOME] or httpd -d/-e/-m STRING Listen for incoming HTTP requests Options: -i Inetd mode -f Do not daemonize ...
Privilege Escalation
File Inclusion
Basic Rules Keep system and services, including web application frameworks, updated with the latest version. Turn off PHP errors to avoid leaking the path of the application and other potentially revealing information. A Web Application Firewall (WAF) is ...
Post-exploitation
Conversion
CyberChef: Encode/Decode string formats with recipes
RCE
Reverse Shell Generator: Generate reverse shells and listeners Reverse Shell Cheat Sheet: Some reverse shells by pentestmonkey
Tools
Exploitation
OWASP
OWASP Top10 OWASP Cheatsheets