Writeups Database

Tools Online

  • Criptoanalise
    • Cipher and codes
    • Substituition Cipher
    • Substituition Cipher (2)
  • Convert ASCII HEX BIN
    • Binary(Long) to ASCII
    • Base 32 Decode
  • Reverse text
  • Hash killer
  • Stego
  • Stego-Saurus
  • Morse Decode
  • Cisco VPN Password Decode
  • Cryptii
  • L33tspeak
  • ROT
  • XOR Cracker
  • RSA Calculator
  • De-Obfuscate JS
  • Brute Force
  • CyberChef
  • CTF-Tools

Decompiler

  • Java e APK Decompiler
  • Disassembler
  • Detect DTMF Tones
  • Show My Code
  • Cisco Type 5

Alphabet

  • Theban
  • Malachim

Exploits

  • PayloadsAllTheThings
  • Reverse Shell
  • GTFOBins

Writeups

  • Home
  • Binary Exploitation
  • Cryptography
  • Reversing
  • Programming
  • Networking
  • Steganography
  • Web Challenge
  • Forensics
  • Trivia

Login

  • Criar uma conta
  • Esqueceu seu usuário?
  • Esqueceu sua senha?

Reverse Shell Cheat Sheet

Detalhes
Categoria: Artigos
## Summary

* [Reverse Shell](#reverse-shell)
    * [Bash TCP](#bash-tcp)
    * [Bash UDP](#bash-udp)
    * [Socat](#socat)
    * [Perl](#perl)
    * [Python](#python)
    * [PHP](#php)
    * [Ruby](#ruby)
    * [Golang](#golang)
    * [Netcat Traditional](#netcat-traditional)
    * [Netcat OpenBsd](#netcat-openbsd)
    * [Ncat](#ncat)
    * [OpenSSL](#openssl)
    * [Powershell](#powershell)
    * [Awk](#awk)
    * [Java](#java)
    * [Java Alternative 1](#java-alternative-1)
    * [Java Alternative 2](#java-alternative-2)
    * [War](#war)
    * [Lua](#lua)
    * [NodeJS](#nodejs)
    * [Groovy](#groovy)
    * [Groovy Alternative 1](#groovy-alternative-1)
    * [C](#c)
* [Meterpreter Shell](#meterpreter-shell)
    * [Windows Staged reverse TCP](#windows-staged-reverse-tcp)
    * [Windows Stageless reverse TCP](#windows-stageless-reverse-tcp)
    * [Linux Staged reverse TCP](#linux-staged-reverse-tcp)
    * [Linux Stageless reverse TCP](#linux-stageless-reverse-tcp)
    * [Other platforms](#other-platforms)
* [Spawn TTY Shell](#spawn-tty-shell)
* [References](#references)

Leia mais...

File Inclusion - Path Traversal

Detalhes
Categoria: Artigos
# Local/Remote File Inclusion

The File Inclusion vulnerability allows an attacker to include a file, usually exploiting a "dynamic file inclusion" mechanisms implemented in the target application.

## Summary

* [Basic LFI](#basic-lfi)
* [Basic RFI](#basic-rfi)
* [LFI / RFI using wrappers](#lfi--rfi-using-wrappers)
  * [Wrapper php://filter](l#wrapper-phpfilter)
  * [Wrapper zip://](#wrapper-zip)
  * [Wrapper data://](#wrapper-data)
  * [Wrapper expect://](#wrapper-expect)
  * [Wrapper input://](#wrapper-input)
  * [Wrapper phar://](#wrapper-phar)
* [LFI to RCE via /proc/*/fd](#lfi-to-rce-via-procfd)
* [LFI to RCE via /proc/self/environ](#lfi-to-rce-via-procselfenviron)
* [LFI to RCE via upload](#lfi-to-rce-via-upload)
* [LFI to RCE via upload (race)](#lfi-to-rce-via-upload-race)
* [LFI to RCE via phpinfo()](#lfi-to-rce-via-phpinfo)
* [LFI to RCE via controlled log file](#lfi-to-rce-via-controlled-log-file)
* [LFI to RCE via PHP sessions](#lfi-to-rce-via-php-sessions)

Leia mais...

Exploit by ports

Detalhes
Categoria: Artigos

Ports

Exploring ports

Leia mais...

15 Ways to Bypass the PowerShell Execution Policy

Detalhes
Categoria: Artigos

By default PowerShell is configured to prevent the execution of PowerShell scripts on Windows systems. This can be a hurdle for penetration testers, sysadmins, and developers, but it doesn’t have to be. In this blog I’ll cover 15 ways to bypass the PowerShell execution policy without having local administrator rights on the system. I’m sure there are many techniques that I’ve missed (or simply don’t know about), but hopefully this cheat sheet will offer a good start for those who need it.

Leia mais...

  1. Msfvenon Cheat Sheet
  2. Volatility Retrieve-password
  3. attacking windows step by step
  4. tcpdump advanced filters

Pagina 1 de 6

  • 1
  • 2
  • 3
  • 4
  • ...
  • 6
  • Você está aqui:  
  • Pagina Principal

Voltar ao Topo

© 2026 Writeups Database