d4Rk's 1337 h4x0r guide
About me
Search…
Introduction
Reconnaissance
Recon
OSINT
Enumeration
Network discovery
Port scanning
Webserver scanning
Exploit detection
Fuzzing
Process monitoring
Exploitation
Shells
Passwords
Web
SQL injection (SQLi)
Cross site scripting (XSS)
File inclusions (LFI, RFI)
Cross site request forgery (CSRF)
XML external entity (XXE)
Cross origin resource sharing (CORS)
Server-side request forgery (SSRF)
Clickjacking
File uploads
Host header attacks
Logic flaws
HTTP Request smuggling
Template injection
Buffer overflow
Misc
Privilege escalation
Linux
Windows
Post exploitation
Loot
Pivoting
Standalone Tools
Services
TCP
UDP
Misc
File transfer
Overview
Wget
Pure-FTPd
TFTP
VBScript: Wget clone
Misc
Bash
Burp Suite
Crypto
Ebowla
Firefox extensions
Impacket
Memory forensics
Metasploit Framework (MSF)
MITM
Msfvenom
Pass the Hash (PTH)
PowerShell
PowerShell on Linux
Wireshark
Wordlists and dictionaries
Bug Bounty
Platforms
Tools
Powered By
GitBook
Web
Here are the articles in this section:
SQL injection (SQLi)
Cross site scripting (XSS)
File inclusions (LFI, RFI)
Cross site request forgery (CSRF)
XML external entity (XXE)
Cross origin resource sharing (CORS)
Server-side request forgery (SSRF)
Clickjacking
File uploads
Host header attacks
Logic flaws
HTTP Request smuggling
Template injection
Previous
Passwords & credentials
Next
SQL injection (SQLi)
Copy link