1. 👾 Welcome!
  2. HackTricks
  3. HackTricks Values & FAQ
  4. About the author
  5. 🤩 Generic Methodologies & Resources
  6. Pentesting Methodology
  7. External Recon Methodology
    1. Wide Source Code Search
    2. Github Dorks & Leaks
  8. Pentesting Network
    1. DHCPv6
    2. EIGRP Attacks
    3. GLBP & HSRP Attacks
    4. IDS and IPS Evasion
    5. Lateral VLAN Segmentation Bypass
    6. Network Protocols Explained (ESP)
    7. Nmap Summary (ESP)
    8. Pentesting IPv6
    9. Telecom Network Exploitation
    10. WebRTC DoS
    11. Spoofing LLMNR, NBT-NS, mDNS/DNS and WPAD and Relay Attacks
    12. Spoofing SSDP and UPnP Devices with EvilSSDP
  9. Pentesting Wifi
    1. Enable Nexmon Monitor And Injection On Android
    2. Evil Twin EAP-TLS
  10. Phishing Methodology
    1. Clipboard Hijacking
    2. Clone a Website
    3. Detecting Phishing
    4. Discord Invite Hijacking
    5. Homograph Attacks
    6. Mobile Phishing Malicious Apps
    7. Phishing Files & Documents
  11. Basic Forensic Methodology
    1. Baseline Monitoring
    2. Anti-Forensic Techniques
    3. Docker Forensics
    4. Image Acquisition & Mount
    5. Ios Backup Forensics
    6. Linux Forensics
    7. Malware Analysis
    8. Memory dump analysis
      1. Volatility - CheatSheet
    9. Partitions/File Systems/Carving
      1. File/Data Carving & Recovery Tools
    10. Pcap Inspection
      1. DNSCat pcap analysis
      2. Suricata & Iptables cheatsheet
      3. USB Keystrokes
      4. Wifi Pcap Analysis
      5. Wireshark tricks
    11. Specific Software/File-Type Tricks
      1. Decompile compiled python binaries (exe, elf) - Retreive from .pyc
      2. Browser Artifacts
      3. Deofuscation vbs (cscript.exe)
      4. Local Cloud Storage
      5. Office file analysis
      6. PDF File analysis
      7. PNG tricks
      8. Structural File Format Exploit Detection
      9. Video and Audio file analysis
      10. ZIPs tricks
    12. Windows Artifacts
      1. Interesting Windows Registry Keys
  12. Python Sandbox Escape & Pyscript
    1. Bypass Python sandboxes
      1. LOAD_NAME / LOAD_CONST opcode OOB Read
      2. Reportlab Xhtml2pdf Triple Brackets Expression Evaluation Rce Cve 2023 33733
    2. Class Pollution (Python's Prototype Pollution)
    3. Keras Model Deserialization Rce And Gadget Hunting
    4. Python Internal Read Gadgets
    5. Pyscript
    6. venv
    7. Web Requests
    8. Bruteforce hash (few chars)
    9. Basic Python
  13. Threat Modeling
  14. Blockchain & Crypto
  15. Lua Sandbox Escape
  16. 🧙‍♂️ Generic Hacking
  17. Archive Extraction Path Traversal
  18. Brute Force - CheatSheet
  19. Esim Javacard Exploitation
  20. Exfiltration
  21. Reverse Shells (Linux, Windows, MSFVenom)
    1. MSFVenom - CheatSheet
    2. Reverse Shells - Windows
    3. Reverse Shells - Linux
    4. Expose local to the internet
    5. Full TTYs
  22. Search Exploits
  23. Tunneling and Port Forwarding
  24. 🐧 Linux Hardening
  25. Checklist - Linux Privilege Escalation
  26. Linux Privilege Escalation
    1. Android Rooting Frameworks Manager Auth Bypass Syscall Hook
    2. Arbitrary File Write to Root
    3. Cisco - vmanage
    4. Containerd (ctr) Privilege Escalation
    5. D-Bus Enumeration & Command Injection Privilege Escalation
    6. Docker Security
      1. Abusing Docker Socket for Privilege Escalation
      2. AppArmor
      3. AuthZ& AuthN - Docker Access Authorization Plugin
      4. CGroups
      5. Docker --privileged
      6. Docker Breakout / Privilege Escalation
        1. release_agent exploit - Relative Paths to PIDs
        2. Docker release_agent cgroups escape
        3. Sensitive Mounts
      7. Namespaces
        1. CGroup Namespace
        2. IPC Namespace
        3. PID Namespace
        4. Mount Namespace
        5. Network Namespace
        6. Time Namespace
        7. User Namespace
        8. UTS Namespace
      8. Seccomp
      9. Weaponizing Distroless
    7. Escaping from Jails
    8. euid, ruid, suid
    9. Interesting Groups - Linux Privesc
      1. lxd/lxc Group - Privilege escalation
    10. Logstash
    11. ld.so privesc exploit example
    12. Linux Active Directory
    13. Linux Capabilities
    14. NFS no_root_squash/no_all_squash misconfiguration PE
    15. Node inspector/CEF debug abuse
    16. Payloads to execute
    17. RunC Privilege Escalation
    18. SELinux
    19. Socket Command Injection
    20. Splunk LPE and Persistence
    21. SSH Forward Agent exploitation
    22. Wildcards Spare tricks
  27. Useful Linux Commands
  28. Bypass Linux Restrictions
    1. Bypass FS protections: read-only / no-exec / Distroless
      1. DDexec / EverythingExec
  29. Linux Environment Variables
  30. Linux Post-Exploitation
    1. PAM - Pluggable Authentication Modules
  31. FreeIPA Pentesting
  32. 🍏 MacOS Hardening
  33. macOS Security & Privilege Escalation
    1. macOS Apps - Inspecting, debugging and Fuzzing
      1. Objects in memory
      2. Introduction to x64
      3. Introduction to ARM64v8
    2. macOS AppleFS
    3. macOS Bypassing Firewalls
    4. macOS Defensive Apps
    5. Macos Dyld Hijacking And Dyld Insert Libraries
    6. macOS GCD - Grand Central Dispatch
    7. macOS Kernel & System Extensions
      1. macOS IOKit
      2. macOS Kernel Extensions & Debugging
      3. macOS Kernel Vulnerabilities
      4. macOS System Extensions
    8. macOS Network Services & Protocols
    9. macOS File Extension & URL scheme app handlers
    10. macOS Files, Folders, Binaries & Memory
      1. macOS Bundles
      2. macOS Installers Abuse
      3. macOS Memory Dumping
      4. macOS Sensitive Locations & Interesting Daemons
      5. macOS Universal binaries & Mach-O Format
    11. macOS Objective-C
    12. macOS Privilege Escalation
    13. macOS Process Abuse
      1. macOS Dirty NIB
      2. macOS Chromium Injection
      3. macOS Electron Applications Injection
      4. macOS Function Hooking
      5. macOS IPC - Inter Process Communication
        1. macOS MIG - Mach Interface Generator
        2. macOS XPC
          1. macOS XPC Authorization
          2. macOS XPC Connecting Process Check
            1. macOS PID Reuse
            2. macOS xpc_connection_get_audit_token Attack
        3. macOS Thread Injection via Task port
      6. macOS Java Applications Injection
      7. macOS Library Injection
        1. macOS Dyld Hijacking & DYLD_INSERT_LIBRARIES
        2. macOS Dyld Process
      8. macOS Perl Applications Injection
      9. macOS Python Applications Injection
      10. macOS Ruby Applications Injection
      11. macOS .Net Applications Injection
    14. macOS Security Protections
      1. macOS Gatekeeper / Quarantine / XProtect
      2. macOS Launch/Environment Constraints & Trust Cache
      3. macOS Sandbox
        1. macOS Default Sandbox Debug
        2. macOS Sandbox Debug & Bypass
          1. macOS Office Sandbox Bypasses
      4. macOS Authorizations DB & Authd
      5. macOS SIP
      6. macOS TCC
        1. macOS Apple Events
        2. macOS TCC Bypasses
          1. macOS Apple Scripts
        3. macOS TCC Payloads
      7. macOS Dangerous Entitlements & TCC perms
      8. macOS - AMFI - AppleMobileFileIntegrity
      9. macOS MACF - Mandatory Access Control Framework
      10. macOS Code Signing
      11. macOS FS Tricks
        1. macOS xattr-acls extra stuff
    15. macOS Users & External Accounts
  34. macOS Red Teaming
    1. macOS MDM
      1. Enrolling Devices in Other Organisations
      2. macOS Serial Number
    2. macOS Keychain
  35. macOS Useful Commands
  36. macOS Auto Start
  37. 🪟 Windows Hardening
  38. Authentication Credentials Uac And Efs
  39. Checklist - Local Windows Privilege Escalation
  40. Windows Local Privilege Escalation
    1. Abusing Auto Updaters And Ipc
    2. Arbitrary Kernel Rw Token Theft
    3. Dll Hijacking
    4. Abusing Tokens
    5. Access Tokens
    6. ACLs - DACLs/SACLs/ACEs
    7. AppendData/AddSubdirectory permission over service registry
    8. Create MSI with WIX
    9. COM Hijacking
    10. Dll Hijacking
      1. Writable Sys Path +Dll Hijacking Privesc
    11. DPAPI - Extracting Passwords
    12. From High Integrity to SYSTEM with Name Pipes
    13. Integrity Levels
    14. JuicyPotato
    15. Leaked Handle Exploitation
    16. MSI Wrapper
    17. Named Pipe Client Impersonation
    18. Privilege Escalation with Autoruns
    19. RoguePotato, PrintSpoofer, SharpEfsPotato, GodPotato
    20. SeDebug + SeImpersonate copy token
    21. SeImpersonate from High To System
    22. Windows C Payloads
  41. Active Directory Methodology
    1. Abusing Active Directory ACLs/ACEs
      1. BadSuccessor
      2. Shadow Credentials
    2. AD Certificates
      1. AD CS Account Persistence
      2. AD CS Domain Escalation
      3. AD CS Domain Persistence
      4. AD CS Certificate Theft
    3. Ad Certificates
    4. AD information in printers
    5. AD DNS Records
    6. Adws Enumeration
    7. ASREPRoast
    8. Badsuccessor Dmsa Migration Abuse
    9. BloodHound & Other AD Enum Tools
    10. Constrained Delegation
    11. Custom SSP
    12. DCShadow
    13. DCSync
    14. Diamond Ticket
    15. DSRM Credentials
    16. External Forest Domain - OneWay (Inbound) or bidirectional
    17. External Forest Domain - One-Way (Outbound)
    18. Golden Dmsa Gmsa
    19. Golden Ticket
    20. Kerberoast
    21. Kerberos Authentication
    22. Kerberos Double Hop Problem
    23. Lansweeper Security
    24. LAPS
    25. MSSQL AD Abuse
    26. Over Pass the Hash/Pass the Key
    27. Pass the Ticket
    28. Password Spraying / Brute Force
    29. PrintNightmare
    30. Force NTLM Privileged Authentication
    31. Privileged Groups
    32. RDP Sessions Abuse
    33. Resource-based Constrained Delegation
    34. Sccm Management Point Relay Sql Policy Secrets
    35. Security Descriptors
    36. SID-History Injection
    37. Silver Ticket
    38. Skeleton Key
    39. Timeroasting
    40. Unconstrained Delegation
  42. Windows Security Controls
    1. UAC - User Account Control
  43. NTLM
    1. Places to steal NTLM creds
  44. Lateral Movement
    1. AtExec / SchtasksExec
    2. DCOM Exec
    3. PsExec/Winexec/ScExec
    4. RDPexec
    5. SCMexec
    6. WinRM
    7. WmiExec
  45. Pivoting to the Cloud$$external:https://cloud.hacktricks.wiki/en/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/index.html$$
  46. Stealing Windows Credentials
    1. Windows Credentials Protections
    2. Mimikatz
    3. WTS Impersonator
  47. Basic Win CMD for Pentesters
  48. Basic PowerShell for Pentesters
    1. PowerView/SharpView
  49. Antivirus (AV) Bypass
  50. Cobalt Strike
  51. Mythic
  52. 📱 Mobile Pentesting
  53. Android APK Checklist
  54. Android Applications Pentesting
    1. Accessibility Services Abuse
    2. Android Anti Instrumentation And Ssl Pinning Bypass
    3. Android Applications Basics
    4. Android Task Hijacking
    5. ADB Commands
    6. APK decompilers
    7. AVD - Android Virtual Device
    8. Bypass Biometric Authentication (Android)
    9. content:// protocol
    10. Drozer Tutorial
      1. Exploiting Content Providers
    11. Exploiting a debuggeable application
    12. Flutter
    13. Frida Tutorial
      1. Frida Tutorial 1
      2. Frida Tutorial 2
      3. Frida Tutorial 3
      4. Objection Tutorial
    14. Google CTF 2018 - Shall We Play a Game?
    15. Insecure In App Update Rce
    16. Install Burp Certificate
    17. Intent Injection
    18. Make APK Accept CA Certificate
    19. Manual DeObfuscation
    20. React Native Application
    21. Reversing Native Libraries
    22. Shizuku Privileged Api
    23. Smali - Decompiling, Modifying, Compiling
    24. Spoofing your location in Play Store
    25. Tapjacking
    26. Webview Attacks
  55. iOS Pentesting Checklist
  56. iOS Pentesting
    1. Air Keyboard Remote Input Injection
    2. iOS App Extensions
    3. iOS Basics
    4. iOS Basic Testing Operations
    5. iOS Burp Suite Configuration
    6. iOS Custom URI Handlers / Deeplinks / Custom Schemes
    7. iOS Extracting Entitlements From Compiled Application
    8. iOS Frida Configuration
    9. iOS Hooking With Objection
    10. iOS Pentesting withuot Jailbreak
    11. iOS Protocol Handlers
    12. iOS Serialisation and Encoding
    13. iOS Testing Environment
    14. iOS UIActivity Sharing
    15. iOS Universal Links
    16. iOS UIPasteboard
    17. iOS WebViews
  57. Cordova Apps
  58. Xamarin Apps
  59. 👽 Network Services Pentesting
  60. Pentesting JDWP - Java Debug Wire Protocol
  61. Pentesting Printers$$external:http://hacking-printers.net/wiki/index.php/Main_Page$$
  62. Pentesting SAP
  63. Pentesting VoIP
    1. Basic VoIP Protocols
      1. SIP (Session Initiation Protocol)
  64. Pentesting Remote GdbServer
  65. 7/tcp/udp - Pentesting Echo
  66. 21 - Pentesting FTP
    1. FTP Bounce attack - Scan
    2. FTP Bounce - Download 2ºFTP file
  67. 22 - Pentesting SSH/SFTP
  68. 23 - Pentesting Telnet
  69. 25,465,587 - Pentesting SMTP/s
    1. SMTP Smuggling
    2. SMTP - Commands
  70. 43 - Pentesting WHOIS
  71. 49 - Pentesting TACACS+
  72. 53 - Pentesting DNS
  73. 69/UDP TFTP/Bittorrent-tracker
  74. 79 - Pentesting Finger
  75. 80,443 - Pentesting Web Methodology
    1. 403 & 401 Bypasses
    2. AEM - Adobe Experience Cloud
    3. Angular
    4. Apache
    5. Artifactory Hacking guide
    6. Bolt CMS
    7. Buckets
      1. Firebase Database
    8. CGI
    9. Django
    10. DotNetNuke (DNN)
    11. Drupal
      1. Drupal RCE
    12. Electron Desktop Apps
      1. Electron contextIsolation RCE via preload code
      2. Electron contextIsolation RCE via Electron internal code
      3. Electron contextIsolation RCE via IPC
    13. Flask
    14. Git
    15. Golang
    16. Grafana
    17. GraphQL
    18. H2 - Java SQL database
    19. IIS - Internet Information Services
    20. ImageMagick Security
    21. Ispconfig
    22. JBOSS
    23. Jira & Confluence
    24. Joomla
    25. JSP
    26. Laravel
    27. Microsoft Sharepoint
    28. Moodle
    29. NextJS
    30. Nginx
    31. NodeJS Express
    32. Sitecore
    33. PHP Tricks
      1. PHP - Useful Functions & disable_functions/open_basedir bypass
        1. disable_functions bypass - php-fpm/FastCGI
        2. disable_functions bypass - dl function
        3. disable_functions bypass - PHP 7.0-7.4 (-nix only)
        4. disable_functions bypass - Imagick <= 3.3.0 PHP >= 5.4 Exploit
        5. disable_functions - PHP 5.x Shellshock Exploit
        6. disable_functions - PHP 5.2.4 ionCube extension Exploit
        7. disable_functions bypass - PHP <= 5.2.9 on windows
        8. disable_functions bypass - PHP 5.2.4 and 5.2.5 PHP cURL
        9. disable_functions bypass - PHP safe_mode bypass via proc_open() and custom environment Exploit
        10. disable_functions bypass - PHP Perl Extension Safe_mode Bypass Exploit
        11. disable_functions bypass - PHP 5.2.3 - Win32std ext Protections Bypass
        12. disable_functions bypass - PHP 5.2 - FOpen Exploit
        13. disable_functions bypass - via mem
        14. disable_functions bypass - mod_cgi
        15. disable_functions bypass - PHP 4 >= 4.2.0, PHP 5 pcntl_exec
      2. Php Rce Abusing Object Creation New Usd Get A Usd Get B
      3. PHP SSRF
    34. PrestaShop
    35. Python
    36. Rocket Chat
    37. Ruby Tricks
    38. Special HTTP headers$$external:network-services-pentesting/pentesting-web/special-http-headers.md$$
    39. Source code Review / SAST Tools
    40. Special Http Headers
    41. Spring Actuators
    42. Symfony
    43. Tomcat
    44. Uncovering CloudFlare
    45. Vuejs
    46. VMWare (ESX, VCenter...)
    47. Web API Pentesting
    48. WebDav
    49. Werkzeug / Flask Debug
    50. Wordpress
  76. 88tcp/udp - Pentesting Kerberos
    1. Harvesting tickets from Windows
    2. Harvesting tickets from Linux
  77. 110,995 - Pentesting POP
  78. 111/TCP/UDP - Pentesting Portmapper
  79. 113 - Pentesting Ident
  80. 123/udp - Pentesting NTP
  81. 135, 593 - Pentesting MSRPC
  82. 137,138,139 - Pentesting NetBios
  83. 139,445 - Pentesting SMB
    1. Ksmbd Attack Surface And Fuzzing Syzkaller
    2. rpcclient enumeration
  84. 143,993 - Pentesting IMAP
  85. 161,162,10161,10162/udp - Pentesting SNMP
    1. Cisco SNMP
    2. SNMP RCE
  86. 194,6667,6660-7000 - Pentesting IRC
  87. 264 - Pentesting Check Point FireWall-1
  88. 389, 636, 3268, 3269 - Pentesting LDAP
  89. 500/udp - Pentesting IPsec/IKE VPN
  90. 502 - Pentesting Modbus
  91. 512 - Pentesting Rexec
  92. 513 - Pentesting Rlogin
  93. 514 - Pentesting Rsh
  94. 515 - Pentesting Line Printer Daemon (LPD)
  95. 548 - Pentesting Apple Filing Protocol (AFP)
  96. 554,8554 - Pentesting RTSP
  97. 623/UDP/TCP - IPMI
  98. 631 - Internet Printing Protocol(IPP)
  99. 700 - Pentesting EPP
  100. 873 - Pentesting Rsync
  101. 1026 - Pentesting Rusersd
  102. 1080 - Pentesting Socks
  103. 1098/1099/1050 - Pentesting Java RMI - RMI-IIOP
  104. 1414 - Pentesting IBM MQ
  105. 1433 - Pentesting MSSQL - Microsoft SQL Server
    1. Types of MSSQL Users
  106. 1521,1522-1529 - Pentesting Oracle TNS Listener
  107. 1723 - Pentesting PPTP
  108. 1883 - Pentesting MQTT (Mosquitto)
  109. 2049 - Pentesting NFS Service
  110. 2301,2381 - Pentesting Compaq/HP Insight Manager
  111. 2375, 2376 Pentesting Docker
  112. 3128 - Pentesting Squid
  113. 3260 - Pentesting ISCSI
  114. 3299 - Pentesting SAPRouter
  115. 3306 - Pentesting Mysql
  116. 3389 - Pentesting RDP
  117. 3632 - Pentesting distcc
  118. 3690 - Pentesting Subversion (svn server)
  119. 3702/UDP - Pentesting WS-Discovery
  120. 4369 - Pentesting Erlang Port Mapper Daemon (epmd)
  121. 4786 - Cisco Smart Install
  122. 4840 - OPC Unified Architecture
  123. 5000 - Pentesting Docker Registry
  124. 5353/UDP Multicast DNS (mDNS) and DNS-SD
  125. 5432,5433 - Pentesting Postgresql
  126. 5439 - Pentesting Redshift
  127. 5555 - Android Debug Bridge
  128. 5601 - Pentesting Kibana
  129. 5671,5672 - Pentesting AMQP
  130. 5800,5801,5900,5901 - Pentesting VNC
  131. 5984,6984 - Pentesting CouchDB
  132. 5985,5986 - Pentesting WinRM
  133. 5985,5986 - Pentesting OMI
  134. 6000 - Pentesting X11
  135. 6379 - Pentesting Redis
  136. 8009 - Pentesting Apache JServ Protocol (AJP)
  137. 8086 - Pentesting InfluxDB
  138. 8089 - Pentesting Splunkd
  139. 8333,18333,38333,18444 - Pentesting Bitcoin
  140. 9000 - Pentesting FastCGI
  141. 9001 - Pentesting HSQLDB
  142. 9042/9160 - Pentesting Cassandra
  143. 9100 - Pentesting Raw Printing (JetDirect, AppSocket, PDL-datastream)
  144. 9200 - Pentesting Elasticsearch
  145. 10000 - Pentesting Network Data Management Protocol (ndmp)
  146. 11211 - Pentesting Memcache
    1. Memcache Commands
  147. 15672 - Pentesting RabbitMQ Management
  148. 24007,24008,24009,49152 - Pentesting GlusterFS
  149. 27017,27018 - Pentesting MongoDB
  150. 44134 - Pentesting Tiller (Helm)
  151. 44818/UDP/TCP - Pentesting EthernetIP
  152. 47808/udp - Pentesting BACNet
  153. 50030,50060,50070,50075,50090 - Pentesting Hadoop
  154. 🕸️ Pentesting Web
  155. Less Code Injection Ssrf
  156. Web Vulnerabilities Methodology
  157. Reflecting Techniques - PoCs and Polygloths CheatSheet
    1. Web Vulns List
  158. 2FA/MFA/OTP Bypass
  159. Account Takeover
  160. Browser Extension Pentesting Methodology
    1. BrowExt - ClickJacking
    2. BrowExt - permissions & host_permissions
    3. BrowExt - XSS Example
  161. Bypass Payment Process
  162. Captcha Bypass
  163. Cache Poisoning and Cache Deception
    1. Cache Poisoning via URL discrepancies
    2. Cache Poisoning to DoS
  164. Clickjacking
  165. Client Side Template Injection (CSTI)
  166. Client Side Path Traversal
  167. Command Injection
  168. Content Security Policy (CSP) Bypass
    1. CSP bypass: self + 'unsafe-inline' with Iframes
  169. Cookies Hacking
    1. Cookie Tossing
    2. Cookie Jar Overflow
    3. Cookie Bomb
  170. CORS - Misconfigurations & Bypass
  171. CRLF (%0D%0A) Injection
  172. CSRF (Cross Site Request Forgery)
  173. Dangling Markup - HTML scriptless injection
    1. SS-Leaks
  174. DApps - Decentralized Applications
  175. Dependency Confusion
  176. Deserialization
    1. NodeJS - __proto__ & prototype Pollution
      1. Client Side Prototype Pollution
      2. Express Prototype Pollution Gadgets
      3. Prototype Pollution to RCE
    2. Java JSF ViewState (.faces) Deserialization
    3. Java DNS Deserialization, GadgetProbe and Java Deserialization Scanner
    4. Basic Java Deserialization (ObjectInputStream, readObject)
    5. PHP - Deserialization + Autoload Classes
    6. CommonsCollection1 Payload - Java Transformers to Rutime exec() and Thread Sleep
    7. Basic .Net deserialization (ObjectDataProvider gadget, ExpandedWrapper, and Json.Net)
    8. Exploiting __VIEWSTATE knowing the secrets
    9. Exploiting __VIEWSTATE without knowing the secrets
    10. Python Yaml Deserialization
    11. JNDI - Java Naming and Directory Interface & Log4Shell
    12. Ruby Json Pollution
    13. Ruby Class Pollution
  177. Domain/Subdomain takeover
  178. Email Injections
  179. File Inclusion/Path traversal
    1. phar:// deserialization
    2. LFI2RCE via PHP Filters
    3. LFI2RCE via Nginx temp files
    4. LFI2RCE via PHP_SESSION_UPLOAD_PROGRESS
    5. LFI2RCE via Segmentation Fault
    6. LFI2RCE via phpinfo()
    7. LFI2RCE Via temp file uploads
    8. LFI2RCE via Eternal waiting
    9. LFI2RCE Via compress.zlib + PHP_STREAM_PREFER_STUDIO + Path Disclosure
  180. File Upload
    1. PDF Upload - XXE and CORS bypass
  181. Formula/CSV/Doc/LaTeX/GhostScript Injection
  182. gRPC-Web Pentest
  183. HTTP Connection Contamination
  184. HTTP Connection Request Smuggling
  185. HTTP Request Smuggling / HTTP Desync Attack
    1. Browser HTTP Request Smuggling
    2. Request Smuggling in HTTP/2 Downgrades
  186. HTTP Response Smuggling / Desync
  187. Upgrade Header Smuggling
  188. hop-by-hop headers
  189. IDOR
  190. JWT Vulnerabilities (Json Web Tokens)
  191. JSON, XML and YAML Hacking
  192. LDAP Injection
  193. Login Bypass
    1. Login bypass List
  194. NoSQL injection
  195. OAuth to Account takeover
  196. Open Redirect
  197. ORM Injection
  198. Parameter Pollution | JSON Injection
  199. Phone Number Injections
  200. PostMessage Vulnerabilities
    1. Blocking main page to steal postmessage
    2. Bypassing SOP with Iframes - 1
    3. Bypassing SOP with Iframes - 2
    4. Steal postmessage modifying iframe location
  201. Proxy / WAF Protections Bypass
  202. Race Condition
  203. Rate Limit Bypass
  204. Registration & Takeover Vulnerabilities
  205. Regular expression Denial of Service - ReDoS
  206. Reset/Forgotten Password Bypass
  207. Reverse Tab Nabbing
  208. RSQL Injection
  209. SAML Attacks
    1. SAML Basics
  210. Server Side Inclusion/Edge Side Inclusion Injection
  211. SQL Injection
    1. MS Access SQL Injection
    2. MSSQL Injection
    3. MySQL injection
      1. MySQL File priv to SSRF/RCE
    4. Oracle injection
    5. Cypher Injection (neo4j)
    6. Sqlmap
    7. PostgreSQL injection
      1. dblink/lo_import data exfiltration
      2. PL/pgSQL Password Bruteforce
      3. Network - Privesc, Port Scanner and NTLM chanllenge response disclosure
      4. Big Binary Files Upload (PostgreSQL)
      5. RCE with PostgreSQL Languages
      6. RCE with PostgreSQL Extensions
    8. SQLMap - CheatSheet
      1. Second Order Injection - SQLMap
  212. SSRF (Server Side Request Forgery)
    1. URL Format Bypass
    2. SSRF Vulnerable Platforms
    3. Cloud SSRF
  213. SSTI (Server Side Template Injection)
    1. EL - Expression Language
    2. Jinja2 SSTI
  214. Timing Attacks
  215. Unicode Injection
    1. Unicode Normalization
  216. UUID Insecurities
  217. WebSocket Attacks
  218. Web Tool - WFuzz
  219. XPATH injection
  220. XS Search
  221. XSLT Server Side Injection (Extensible Stylesheet Language Transformations)
  222. XXE - XEE - XML External Entity
  223. XSS (Cross Site Scripting)
    1. Abusing Service Workers
    2. Chrome Cache to XSS
    3. Debugging Client Side JS
    4. Dom Clobbering
    5. DOM Invader
    6. DOM XSS
    7. Iframes in XSS, CSP and SOP
    8. Integer Overflow
    9. JS Hoisting
    10. Misc JS Tricks & Relevant Info
    11. PDF Injection
    12. Server Side XSS (Dynamic PDF)
    13. Shadow DOM
    14. SOME - Same Origin Method Execution
    15. Sniff Leak
    16. Steal Info JS
    17. XSS in Markdown
  224. XSSI (Cross-Site Script Inclusion)
  225. XS-Search/XS-Leaks
    1. Connection Pool Examples
    2. Connection Pool by Destination Example
    3. Cookie Bomb + Onerror XS Leak
    4. URL Max Length - Client Side
    5. performance.now example
    6. performance.now + Force heavy task
    7. Event Loop Blocking + Lazy images
    8. JavaScript Execution XS Leak
    9. CSS Injection
      1. CSS Injection Code
  226. Iframe Traps
  227. ⛈️ Cloud Security
  228. Pentesting Kubernetes$$external:https://cloud.hacktricks.wiki/en/pentesting-cloud/kubernetes-security/index.html$$
  229. Pentesting Cloud (AWS, GCP, Az...)$$external:https://cloud.hacktricks.wiki/en/pentesting-cloud/pentesting-cloud-methodology.html$$
  230. Pentesting CI/CD (Github, Jenkins, Terraform...)$$external:https://cloud.hacktricks.wiki/en/pentesting-ci-cd/pentesting-ci-cd-methodology.html$$
  231. 😎 Hardware/Physical Access
  232. Physical Attacks
  233. Escaping from KIOSKs
  234. Firmware Analysis
    1. Bootloader testing
    2. Firmware Integrity
  235. 🎯 Binary Exploitation
  236. Basic Stack Binary Exploitation Methodology
    1. ELF Basic Information
    2. Exploiting Tools
      1. PwnTools
  237. Stack Overflow
    1. Pointer Redirecting
    2. Ret2win
      1. Ret2win - arm64
    3. Stack Shellcode
      1. Stack Shellcode - arm64
    4. Stack Pivoting - EBP2Ret - EBP chaining
    5. Uninitialized Variables
  238. ROP - Return Oriented Programing
    1. BROP - Blind Return Oriented Programming
    2. Ret2csu
    3. Ret2dlresolve
    4. Ret2esp / Ret2reg
    5. Ret2lib
      1. Leaking libc address with ROP
        1. Leaking libc - template
      2. One Gadget
      3. Ret2lib + Printf leak - arm64
    6. Ret2syscall
      1. Ret2syscall - ARM64
    7. Ret2vDSO
    8. SROP - Sigreturn-Oriented Programming
      1. SROP - ARM64
    9. Synology Encrypted Archive Decryption
    10. Windows Seh Overflow
  239. Array Indexing
  240. Chrome Exploiting
  241. Integer Overflow
  242. Format Strings
    1. Format Strings - Arbitrary Read Example
    2. Format Strings Template
  243. Libc Heap
    1. Bins & Memory Allocations
    2. Heap Memory Functions
      1. free
      2. malloc & sysmalloc
      3. unlink
      4. Heap Functions Security Checks
    3. Use After Free
      1. First Fit
    4. Double Free
    5. Overwriting a freed chunk
    6. Heap Overflow
    7. Unlink Attack
    8. Fast Bin Attack
    9. Unsorted Bin Attack
    10. Large Bin Attack
    11. Tcache Bin Attack
    12. Off by one overflow
    13. House of Spirit
    14. House of Lore | Small bin Attack
    15. House of Einherjar
    16. House of Force
    17. House of Orange
    18. House of Rabbit
    19. House of Roman
  244. Common Binary Exploitation Protections & Bypasses
    1. ASLR
      1. Ret2plt
      2. Ret2ret & Reo2pop
    2. CET & Shadow Stack
    3. Libc Protections
    4. Memory Tagging Extension (MTE)
    5. No-exec / NX
    6. PIE
      1. BF Addresses in the Stack
    7. Relro
    8. Stack Canaries
      1. BF Forked & Threaded Stack Canaries
      2. Print Stack Canary
  245. Write What Where 2 Exec
    1. Aw2exec Sips Icc Profile
    2. WWW2Exec - atexit()
    3. WWW2Exec - .dtors & .fini_array
    4. WWW2Exec - GOT/PLT
    5. WWW2Exec - __malloc_hook & __free_hook
  246. Common Exploiting Problems
  247. Windows Exploiting (Basic Guide - OSCP lvl)
  248. iOS Exploiting
  249. 🤖 AI
  250. AI Security
    1. Ai Assisted Fuzzing And Vulnerability Discovery
    2. AI Security Methodology
    3. AI MCP Security
    4. AI Model Data Preparation
    5. AI Models RCE
    6. AI Prompts
    7. AI Risk Frameworks
    8. AI Supervised Learning Algorithms
    9. AI Unsupervised Learning Algorithms
    10. AI Reinforcement Learning Algorithms
    11. LLM Training
      1. 0. Basic LLM Concepts
      2. 1. Tokenizing
      3. 2. Data Sampling
      4. 3. Token Embeddings
      5. 4. Attention Mechanisms
      6. 5. LLM Architecture
      7. 6. Pre-training & Loading models
      8. 7.0. LoRA Improvements in fine-tuning
      9. 7.1. Fine-Tuning for Classification
      10. 7.2. Fine-Tuning to follow instructions
  251. 🔩 Reversing
  252. Reversing Tools & Basic Methods
    1. Angr
      1. Angr - Examples
    2. Z3 - Satisfiability Modulo Theories (SMT)
    3. Cheat Engine
    4. Blobrunner
  253. Common API used in Malware
  254. Word Macros
  255. 🔮 Crypto & Stego
  256. Cryptographic/Compression Algorithms
    1. Unpacking binaries
  257. Certificates
  258. Cipher Block Chaining CBC-MAC
  259. Crypto CTFs Tricks
  260. Electronic Code Book (ECB)
  261. Hash Length Extension Attack
  262. Padding Oracle
  263. RC4 - Encrypt&Decrypt
  264. Stego Tricks
  265. Esoteric languages
  266. Blockchain & Crypto Currencies
  267. ✍️ TODO
  268. Interesting Http
  269. Rust Basics
  270. More Tools
  271. Hardware Hacking
    1. Fault Injection Attacks
    2. I2C
    3. Side Channel Analysis
    4. UART
    5. Radio
    6. JTAG
    7. SPI
  272. Industrial Control Systems Hacking
    1. Modbus Protocol
  273. Radio Hacking
    1. Maxiprox Mobile Cloner
    2. Pentesting RFID
    3. Infrared
    4. Sub-GHz RF
    5. iButton
    6. Flipper Zero
      1. FZ - NFC
      2. FZ - Sub-GHz
      3. FZ - Infrared
      4. FZ - iButton
      5. FZ - 125kHz RFID
    7. Proxmark 3
    8. FISSURE - The RF Framework
    9. Low-Power Wide Area Network
    10. Pentesting BLE - Bluetooth Low Energy
  274. Test LLMs
  275. Burp Suite
  276. Other Web Tricks
  277. Interesting HTTP$$external:todo/interesting-http.md$$
  278. Android Forensics
  279. Online Platforms with API
  280. Stealing Sensitive Information Disclosure from a Web
  281. Post Exploitation
  282. Investment Terms
  283. Cookies Policy