- Introduction
- 1. Tools
❱
- 1.1. Virtual Machines
❱
- 1.1.1. Hypervisors
- 1.1.2. Snapshots
- 1.1.3. Shared Files on VMware
- 1.2. Kali Linux
❱
- 1.2.1. Kali on Hyper-V
- 1.2.2. kali-tweaks
- 1.2.3. SSH into Kali
- 1.3. Quick Windows Box
- 1.4. Build Tools
- 1.5. Ghidra
❱
- 1.5.1. Ghidra Issues?
- 1.6. Cyberchef
❱
- 1.6.1. Cyberchef example 1
- 1.6.2. Cyberchef example 2
- 1.7. Python
❱
- 1.7.1. Interactive Python
❱
- 1.7.1.1. Extending Colab
- 1.7.2. Single Line Scripts
- 1.7.3. Quick Webserver
- 1.8. VPNs
- 2. Fundamentals
❱
- 2.1. Character Encoding
- 2.2. Base64 Encoding
❱
- 2.2.1. HTTP Basic Authentication
- 2.3. Endianness
- 2.4. Handling bytes in Python
- 2.5. Python XOR
- 3. Passwords
❱
- 3.1. Password cracking
- 4. Binary Exploits
❱
- 4.1. Crafting Exploit Strings
- 4.2. Buffer Overflows
❱
- 4.2.1. Stack Organization
- 4.3. Quick Disassembly
- 4.4. Format String Exploit
- 5. Injections
❱
- 5.1. SQL Injections
- 5.2. Template Injections
- 6. C2 Frameworks
❱
- 6.1. Sliver
- 6.2. Sliver 2