Analyze Microsoft Office Files
One of the most common file formats used by bad actors is microsoft office files, knowing how to analyze them for malware is a critical skill.
Admin
These are taken from my own experience, and various sources around the internet. I hope they help you as much as they've helped me! I generally add or update these as I learn something new, and provide reference to original sources where appropriate.
One of the most common file formats used by bad actors is microsoft office files, knowing how to analyze them for malware is a critical skill.
Admin
Discover interesting paths on a web application or file system.
Admin
Critical skill for discovering services to attack.
Admin
NMap has been a dominate network scanning tool for a long time, knowing how to use it is critical.
Admin
Often we can discovery additional attack suface by enumerating subdomains, DNS records, and other network information.
Admin
Account Takeover Exploits
Admin
Active Directory Attacks
Admin
Brute Forcing Attacks
Admin
Cobalt Strike
Admin
Command Injection Attacks
Admin
CRLF Injection Attack
Admin
Attacks on Docker
Admin
GraphQL Exploitation
Admin
Insecure Deserialization Attacks
Admin
Insecure Direct Object Reference Attack
Admin
LaTeX Injection Attacks
Admin
LDAP Injection Attacks
Admin
API Key Leak Attacks
Admin
NoSQL Injection Attacks
Admin
OAuth Attacks
Admin
SAML Injection Attacks
Admin
Server-Side Request Forgery Attacks
Admin
Template Injection Attacks
Admin
Cassandra Injection tips
Admin
Hybrid Query Language Injection tips
Admin
MSSQL Injection tips
Admin
MySQL Injection tips
Admin
Oracle SQL Injection tips
Admin
PostgreSQL Injection tips
Admin
sqlite Injection tips
Admin
MSSQL Explitation and enumeration
Admin
A Set of strings to run through when manually testing for SQL injection
Admin
CORS Misconfiguration Exploit
Admin
CSRF Misconfiguration Exploit
Admin
CSV Injection Exploit
Admin
File Upload Exploits
Admin
HTTP Parameter Pollution Exploits
Admin
JWT Exploits
Admin
Open URL Redirection Exploit
Admin
Springboot Exploits
Admin
Tabnabbing Exploits
Admin
Type Juggling Exploits
Admin
Web Cache Deception Exploits
Admin
Web Socket Attacks
Admin
Cross Site Scripting Attacks
Admin
Wireless Penetration Testing
Admin
XPATH Injection Attacks
Admin
XSLT Injection Attacks
Admin
XML Enternal Entity Injection Attacks
Admin
AWS
Admin
AWS S3
Admin
Azure
Admin
Bash
Admin
Kubernetes
Admin
Linux Persistence Techniques
Admin
Linux Privilege Escalation Techniques
Admin
Network Pivoting Techniques
Admin
Windows - Download and execute methods
Admin
Koadic C3 C&C
Admin
Mimikatz
Admin
Windows Using Found Credentials
Admin
Windows Privilege Escalation
Admin
Insecure Source Code Management Leaks
Admin