The Hacker Recipes
GitHub
Twitter
Exegol
Tools
Search
⌃
K
Links
Introduction
Active Directory
Reconnaissance
Movement
Persistence
Web services
Reconnaissance
Configuration
Accounts and sessions
User inputs
Systems & services
Reconnaissance
Initial access (protocols)
Initial access (phishing)
Privilege escalation
Windows
UNIX-like
SUDO
SUID/SGID binaries
🛠️ Capabilities
🛠️ Network secrets
🛠️ Living off the land
Pivoting
Evasion
(AV) Anti-Virus
🛠️ (EDR) Endpoint Detection and Response
🛠️ Physical
Locks
Networking
Machines
Super secret zones
🛠️ Intelligence gathering
CYBINT
OSINT
GEOINT
🛠️ RADIO
RFID
Bluetooth
Wi-Fi
Wireless keyboard/mouse
🛠️ mobile apps
Android
iOS
Powered By
GitBook
UNIX-like
linpeas
linux-smart-enumeration
Previous
🛠️ Living off the land
Next
SUDO
Last modified
2yr ago