Skip to content
MichalSzalkowski.com/security
Alias
Initializing search
MichalSzalkowski.com/security
Home
Binary
Binary
ret2libc - 32-bit Exploit
ret2libc - 64-bit Exploit
Binary exploit toolkit
Enumeration
Enumeration
Enumeration - ASN
Enumeration - DNS
Enumeration - Emails
Enumeration - Host
Enumeration - linux
Enumeration - Ports
Enumeration - Subdomain
Enumeration - vhost
Enumeration - Web - Fuzz
Enumeration - Web
Links
Links
Laboratory
Links
Linux
Linux
Alias
Bash
CTF
grep
Passswd & shaddow
Port forward
Reverse shell
Spawning shells
SUDO - library path
SUDO - preload
SUID / SGID
Tmux
Privilege escalation
Privilege escalation
0. System Information
1. Useful software
2. Processes
3.User
4.Cron
Services
6.Network
Other
Other
Other
Kali Docker
Pacu. iam__privesc_scan
Payloads
Payloads
Port
Port
Port 110 - pop
Port 111 - rpc
Port 2049 - nfs
Port 21 - ftp
Port 22 - ssh
Port 25 - smtp
Port 3306 - mysql
Port 445 - smb
Port 512 - rlogin
Port 5432 - psql
Port 5900 - vnc
Port 6379 - redis
Port 79 - finger
Port 873 - rsync
Port 88 - kerberos
Script
Script
Domain to IP
Domain to code status
Domain to page title
Get IPs from file
IP - geoiplookup.py - statistic
IP - geoiplookup.py
IP - geoiplookup.sh
Ip info
Python
Python server log
Target
Sso
Sso
OAuth 2.0 - Security
OAuth 2.0
SAML 2.0
Stego
Stego
Tools
Target
Target
Wordpress
Tool
Tool
American fuzzy lop
Amass
AutoRecon
Censys
cewl
Chkrootkit
crackmapexec
Curl
curlx.sh
Digbit
Dirb
DnsEnum
enum4linux
ffuf
Firefox
GHDB - Google hacking database
GIT Dumper
Gobuster
Hashcat
Host tracker
hping3
hydra
John
Linpeas.sh
MongoDB
Netcat
Ncrack
Nmap
PEASS-ng
PHP
ping
PRET
pwntools
RKhunter
Socat
Sqlmap
Tcpdump
Tweep
unicornscan
wgetx.sh
Wordpress check
WpScan
Xfreerdp
Tryhackme
Tryhackme
THM - Alfred
THM - attackingkerberos
THM - Brainpan-1
THM - Brainstorm
THM - Buffer Overflow - T7
THM - Buffer Overflow - T8
THM - Buffer Overflow - T9
THM - Game Zone
THM - gatekeeper
THM - HackPark
THM - Internal
THM - OSCP BOF Prep
THM - Overpass 2
Windows
Windows
Kerberos
PowerShell
Windows Privilege Escalation
Powershell - Revers Shell
Tool
Tool
bloodhound
evil-winrm
impacket
kerbrute
neo4j
nishang
RDP
Rubeus
Alias
alias ..='cd ..' alias ll='ls -la'