Skip to content
CTF Docs
fcrackzip
xanhacks/ctf-docs
Welcome
OSINT
Android
Bugbounty
Crypto
Malware
Others
Pentest
Programming
Pwn
Reverse
Web
CTF Docs
xanhacks/ctf-docs
Welcome
OSINT
OSINT
SOCMINT
Android
Android
Android - All in one
adb cheatsheet
Frida cheatsheet
Root an AVD Device
Bugbounty
Bugbounty
Enumeration
Easy reports
Crypto
Crypto
Introduction to cryptography
Diffie hellman
Diffie hellman
Introduction to Diffie-Hellman
Modular arithmetic
Modular arithmetic
Introduction
Quadratic residue
Chinese remainder theorem
Rsa
Rsa
Introduction to RSA
Small primes
Same modulus - Bezout identity
Same modulus - k approximation
Very small exponent
Sum of primes
Wiener's attack
Hastad’s Broadcast Attack
Malware
Malware
Anti-Virus Evasion
Malware Detection
Anti reverse
Anti reverse
Compiler options
File format
Hide strings
C2
C2
Command & Control
Empire
Others
Others
Others
Tmux cheatsheet
Vim cheatsheet
Windows introduction
Linux
Linux
Arch Linux installation
Linux advanced
Commands
Commands
find
socat
stat
xargs
Pentest
Pentest
Reverse shell
Services
Tips
Windows
Active directory
Active directory
Introduction to AD
Introduction to Kerberos
AD Enumeration
AD Exploitation
Networks
Networks
Proxy & Port forwarding
Server listeners
Networks tricks
Privesc
Privesc
Linux Privesc
Windows Privesc
Tools
Tools
fcrackzip
Hydra
John The Ripper
Metasploit / Meterpreter
Nmap
WPScan
Wifi
Wifi
Introduction to Wi-Fi
Wi-Fi channels
Wi-Fi Attacks
Wi-Fi Exploitation
Programming
Programming
C#
Go
Javascript
Python
Python
Introduction
Security
Pwn
Pwn
Introduction to x86 Assembly
Binary protections
gdb cheatsheet
Mona
Pwntools cheatsheet
Buffer overflow
Buffer overflow
Call a function with arguments - 32 bits
Bypassing a Static Canary
ROP 64 bits - execve syscall
Ret2libc 64 bits (NX & ASLR)
Format string
Format string
Introduction - Format string
Leak the stack
Overwrite GOT function address
Heap
Heap
Introduction - Heap
Shellcode
Shellcode
Introduction
Shellcoding
Exploitation
Reverse
Reverse
Stripped binary
Assembly
Assembly
Introduction to x86 assembly
Web
Web
Authentication enumeration / bruteforce
PHP vulnerabilities
SQL Injection
Wordpress
Burpsuite
Burpsuite
Intruder tab
Others
Proxy tab
Target tab
Clientside
Clientside
Introduction
CSRF - Cross Site Request Forgery
XSS - Cross Site Scripting
CORS Misconfiguration
fcrackzip
fcrackzip -D -p /opt/rockyou.txt -u
8702
.zip
Back to top