Home
NaosInfoSec
Cancel

Useful commands

Start listener For Linux sudo nc -nvlp 4444 For Windows sudo rlwrap nc -nvlp 443 Web service sudo python3 -m http.server 80 SMB service with python impacket sudo smbserver.py share . -sm...

HTB Squashed

Reconnaissance/Intelligence Gathering In this step we collect the target information available in public repositories or sources. We do everything passively. Scanning and enumeration Now it’s ...

fcrackzip

fcrackzip is a very nice tool to crack password protected files using dictionaries and brute force. To install we just need to run apt (for Ubuntu/Debian). $ sudo apt install fcrackzip To test h...

Tools for eth hacking

Here you can find a list of essentials tools for ethical hacking and CTFs. Git git-dumper Python uncompyle6 Javascript jsfuck Decoder-JSFuck Data conversion and languages cyber...

Decompile Python with Uncompyle6

uncompyle6 translates Python bytecode back into equivalent Python source code. It enables the possibility to create .py files using the compiled version .pyc. Install uncompyle6 It can be instal...

Mongod

Reconnaissance/Intelligence Gathering In this step we collect the target information available in public repositories or sources. We do everything passively. Scanning and enumeration Now it’s ti...

HTB Nibbles

This is the writeup for Nibbles machine from HTB. Scanning and enumeration Now it’s time to start the active scanning. As always, we define our TARGET and hosts file of our machine to facilita...

HTB Responder

In this machine we will experiment with SMB relay attacks using a remote file inclusion in a website and connecting through Windows remote management system. Scanning and enumeration Now it’s t...

HTB Redeemer

Scanning and enumeration Now it’s time to start the active scanning. As always, we define our TARGET and hosts file of our machine to facilitate the process. TARGET=10.129.73.196 echo "10.129....

HTB Late

Reconnaissance/Intelligence Gathering In this step we collect the target information available in public repositories or sources. We do everything passively. Scanning and enumeration Now it’s ...