๐ฌ๐นHacking Templates
Reference : https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks/blob/main/handbooks/templates.md
Table of Contents
01 Information Gathering
02 Vulnerability Analysis
03 Web Application Analysis
Hypertext Markup Language (HTML)
Hypertext Markup Language (HTML) Injection
JavaScript (JS)
JavaScript (JS) Fetch Uniform Resource Locator (URL) and Base64 Encoding
JavaScript Object Notation (JSON)
JavaScript Object Notation (JSON) POST Request with Authentication
Python
Python Pickle Remote Code Execution (RCE)
Python Redirect for Server-Side Request Forgery (SSRF)
Python Web Request
Web Shells
Active Server Page Extended (ASPX)
Extensible Markup Language (XML)
Extensible Markup Language (XML) Hypertext Markup Language (HTTP) Request (XHR) in JavaScript (JS)
Payload
Forged Request
Simple Version
Extensible Markup Language (XML)
Extensible Markup Language (XML) External Entity (XXE)
Request
Content of .dtd
Cross-Site Scripting (XSS)
JavaScript (JS) to read Files on the System (.js)
Payload from Extensible Markup Language (XML) File
04 Database Assessment
05 Password Attacks
06 Wireless Attacks
07 Reverse Engineering
08 Exploitation Tools
09 Sniffing & Spoofing
10 Post Exploitation
YAML Ain't Markup Language (YAML)
Bad YAML Ain't Markup Language (YAML)
11 Forensics
12 Reporting Tools
13 Social Engineering Tools
Basics
C
Shell Option 1
Shell Option 2
Compiling
Secure Shell (SSH)
Secure Shell (SSH) Program Execution
Exploiting
Python
Skeleton Exploit Python Script
https://github.com/0xsyr0/Buffer_Overflow
Last updated
Was this helpful?