Home
0LiVEr
Cancel

Pentesting Cheatsheets

Reconnaissance / Enumeration Extracting Live IPs from Nmap Scan nmap 10.1.1.1 --open -oG scan-results; cat scan-results | grep "/open" | cut -d " " -f 2 > exposed-services-ips Simple Port Kn...

Malware Analysis of Xworm

Xworm Xworm represents a form of malware, targeting Windows systems. Upon infection, it can compromise the security of the system, potentially leading to data theft or unauthorized remote access....

DUCTF 2021

Overly Permisive IAM resources

What are IAM Resources? The user, group, role, policy, and identity provider objects that are stored in IAM. As with other AWS services, you can add, edit, and remove resources from IAM. Done.

Stack-Based Buffer Overflow Linux x86

This is a walkthrough of the HTB Academy Module for Stack-Based Buffer Overflow on Linux x86. Buffer Overflow Introduction: Buffer overflows are among the most common security vulnerabiliti...

AWS IAM Exploitation

What is IAM? In AWS Identity and Access Management (IAM) is a web service that helps you securely control access to AWS resources. You use IAM to control who is authenticated (signed in) and auth...

HackTheBox