Reverse Shell Cheat Sheet
Reverse Shell Cheat Sheet PAYLOAD ALL THE THINGS Summary Tools Reverse Shell Awk Automatic Reverse Shell Generator Bash TCP Bash UDP C Dart Golang Groovy Alternative 1 Groovy Java Alternative 1 Java Alternative 2 Java Lua Ncat Netcat OpenBsd Netcat BusyBox Netcat Traditional NodeJS OGNL OpenSSL Perl PHP Powershell Python Ruby Rust Socat Telnet War Meterpreter Shell Windows Staged reverse …
Read More
How to Setup Wireshark
- Cracking & Hacking
-
Aircrack-ng setup, How to Setup Wireshark, how to sniff wireless traffic, how to turn on a wifi adapter, network monitoring tool, network packet analysis, packet capture configuration, protocol analyzer setup, wireshark beginner tutorial, Wireshark installation
- November 14, 2024
How to Setup Wireshark To set up your laptop to capture and analyze wireless network traffic using Aircrack-ng’s airmon-ng and Wireshark, follow these steps: First Buy and Get the necessary equipment To capture and analyze wireless network traffic using tools like Aircrack-ng’s airmon-ng and Wireshark, it’s essential to have a compatible wireless network adapter that supports monitor mode and packet …
Read More
Wireshark Cheat Sheet
Wireshark Cheat Sheet Wireshark, whose old name is Ethereal; It is a program that can run in many operating systems such as Windows, Linux, MacOS or Solaris and can analyze all the traffic going to network cards connected to computer. Analyze over 750 protocols Can capture packets and save them to a file. Wireshark walkthrough the basics Wireshark user guide …
Read More
Linux Cheat Sheet
Linux Cheat Sheet Linux commands cheat sheet How to update/upgrade Linux: What does APT do? APT (Advanced Packaging Tool) is a set of core tools found inside the Debian operating system. It provides utilities for the installation and removal of software packages and dependencies on a system. apt is a subset of apt-get and apt-cache commands providing necessary commands for …
Read More
How to install Zenmap
How to install Zenmap Zenmap is the official graphical user interface (GUI) for Nmap, a widely used network scanning and security auditing tool. It simplifies Nmap’s functionalities, making them more accessible, especially for users who prefer a visual interface over command-line operations. Why Use Zenmap? User-Friendly Interface: Zenmap provides an intuitive GUI, allowing users to perform complex network scans without …
Read More
How to use theHarvester
How to use theHarvester What is theHarvester? theHarvester is an open-source intelligence (OSINT) tool designed to collect information such as email addresses, subdomains, IP addresses, and URLs from various public sources. It’s commonly used in the reconnaissance phase of penetration testing to map an organization’s external footprint. Why use theHarvester? Utilizing theHarvester enables security professionals to efficiently gather critical data …
Read More
How to Setup and Use Recon-ng
How to Setup and Use Recon-ng Setting up Recon-ng to install recon-ng you must have Python 3.6 or higher installed on your system, Please follow the instructions below to assist you in how to setup and use Recon-ng on your operating system. What is Recon-ng What is Recon-ng? Recon-ng is a web reconnaissance tool that automates information gathering to aid …
Read More
How to use BeEF
How to use BeEF BeEF (Browser Exploitation Framework) is a powerful penetration testing tool that focuses on exploiting web browsers. It is particularly useful for assessing the security of browser-based environments and understanding the risks posed by browser vulnerabilities. Here is a quick overview to help students understand how to use BeEF: What is BeEF? Purpose: BeEF is designed to …
Read More
How to Anonymously File Share
How to Anonymously File Share 📁 Anonymous File Sharing | How to Use Magic-Wormhole for Fast & Secure Transfers November 13, 2024 Looking for a way to send files quickly and anonymously without sharing your IP or username? Magic-Wormhole lets you securely transfer files between devices using a unique, one-time code. Here’s how you can get started! 🛠 Steps to Share Files Anonymously with Magic-Wormhole: Step 1: …
Read More
Kali Linux Basics: Cheat Sheet for Beginners
- Cracking & Hacking
-
cc cleaner, clear logs, clear tracks after hacking, cracking & Hacking, kali linux, kali linux cheat sheet, log cleaner, penetration testing, remove logs, shred clearing tracks, timestomp
- November 13, 2024
💻Kali Linux Basics: Cheat Sheet for Beginners November 05, 2024 Table of Contents 🧭 Navigation & Directory Management 📝 File Operations 🔍 Search for Files and Text 📦 Package Management with APT 🔒 Permissions and Ownership 📊 System Monitoring 🌐 Network Essentials 💾 File Compression and Archiving 🔧 Process Management ⏰ Scheduling with Cron 🔑 SSH & Remote Access 🧭 Navigation …
Read More