Sinister Geek

Look at unknown and try to think of a familiar problem having the same or a similar unknown -" How to Solve It A New Aspect of Mathematical Method "

Friday, February 14, 2020

post exoploitation

1. https://docs.google.com/document/d/1ObQB6hmVvRPCgPTRZM5NMH034VDM-1N-EWPRz2770K4/edit?hl=en_US#heading=h.msosz9bb7mrp
2. https://docs.google.com/document/d/1U10isynOpQtrIK6ChuReu-K1WHTJm4fgG3joiuz43rw/edit?hl=en_US
3. https://docs.google.com/document/d/10AUm_zUdAQGgoHNo_eS0SO1K-24VVYnulUD2x3rJD3k/edit?hl=en_US
4. https://docs.google.com/document/d/1ZrDJMQkrp_YbU_9Ni9wMNF2m3nIPEA_kekqqqA2Ywto/edit
5. https://malicious.link/post/
6. https://awesomeopensource.com/projects/red-team
7. https://pentestlab.blog/2020/02/12/persistence-rid-hijacking/
8. https://rhinosecuritylabs.com/aws/hiding-cloudcobalt-strike-beacon-c2-using-amazon-apis/
9.  
at February 14, 2020 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Thursday, February 6, 2020

coll

https://www.exploit-db.com/papers/13045
https://www.fuzzysecurity.com/tutorials.html
https://www.cisco.com/c/en/us/td/docs/ios/12_2/12_2z/release/notes/rn3700zj.html
https://www.exumbraops.com/penetration-testing-102-windows-privilege-escalation-cheatsheet
 00000000000000000000000000000000000000000000000000
https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/
https://github.com/lamontns/pentest/blob/master/privilege-escalation/linux-privilege-escalation.md 
at February 06, 2020 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Monday, February 3, 2020

linux guide

1. https://gtfobins.github.io/
2. https://www.talktohacker.com/2014/08/download-free-collection-of-50-hacking.html
3. https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation
4. https://github.com/areyou1or0/Windows
https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/ 

5 https://www.rebootuser.com/?p=1623
6. https://gracefulsecurity.com/linux-privesc-abusing-suid/
at February 03, 2020 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Pages

  • OSCP start up!
  • Reading material
  • Assemlby language note
  • Reverse Engineering Notes
  • Forum..!
  • Basic understanding of database and SQL queries
  • Using adb to Unlock Pattern
  • Exploit Development!
  • Software Cracking Guide
  • Reverse Engineering .....!!

Search This Blog

Report Abuse

Blog Archive

  • ►  2022 (1)
    • ►  March (1)
  • ►  2021 (13)
    • ►  July (4)
    • ►  June (6)
    • ►  May (3)
  • ▼  2020 (65)
    • ►  December (6)
    • ►  November (1)
    • ►  October (2)
    • ►  September (4)
    • ►  August (3)
    • ►  July (2)
    • ►  June (8)
    • ►  May (8)
    • ►  April (6)
    • ►  March (9)
    • ▼  February (3)
      • post exoploitation
      • coll
      • linux guide
    • ►  January (13)
  • ►  2019 (10)
    • ►  December (10)
Picture Window theme. Theme images by johnwoodcock. Powered by Blogger.