๐Ÿ‡ฌ๐Ÿ‡นHacking Templates

Reference : https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks/blob/main/handbooks/templates.md

Table of Contents

01 Information Gathering

02 Vulnerability Analysis

03 Web Application Analysis

Hypertext Markup Language (HTML)

Hypertext Markup Language (HTML) Injection

JavaScript (JS)

JavaScript (JS) Fetch Uniform Resource Locator (URL) and Base64 Encoding

JavaScript Object Notation (JSON)

JavaScript Object Notation (JSON) POST Request with Authentication

Python

Python Pickle Remote Code Execution (RCE)

Python Redirect for Server-Side Request Forgery (SSRF)

Python Web Request

Web Shells

Active Server Page Extended (ASPX)

Extensible Markup Language (XML)

Extensible Markup Language (XML) Hypertext Markup Language (HTTP) Request (XHR) in JavaScript (JS)

Payload

Forged Request

Simple Version

Extensible Markup Language (XML)

Extensible Markup Language (XML) External Entity (XXE)

Request

Content of .dtd

Cross-Site Scripting (XSS)

JavaScript (JS) to read Files on the System (.js)

Payload from Extensible Markup Language (XML) File

04 Database Assessment

05 Password Attacks

06 Wireless Attacks

07 Reverse Engineering

08 Exploitation Tools

09 Sniffing & Spoofing

10 Post Exploitation

YAML Ain't Markup Language (YAML)

Bad YAML Ain't Markup Language (YAML)

11 Forensics

12 Reporting Tools

13 Social Engineering Tools

Basics

C

Shell Option 1

Shell Option 2

Compiling

Secure Shell (SSH)

Secure Shell (SSH) Program Execution

Exploiting

Python

Skeleton Exploit Python Script

https://github.com/0xsyr0/Buffer_Overflow

Last updated

Was this helpful?