Drop here to delete.
°F
°C
Palo Alto, California, United States
Save
Show Link Bar
Search
Your Links
(No results)
Categories
Similar Boards
Suggest a Link
Xuan Bin Ng
Boards you may like
Education
by Stacy Reed
Web Design Resources
by creativecatlady
Gaming
by NoCanDo
Learn / Study / Improve
by Geccher
Fullstack Developer
by Chris Klanac
The Best Of Quora
by Sparkle Osteen
Suggest links for this board!
Thank you for the suggestion
Select category
Windows Forensic
Eventlogs
Web exploitation
Command Injection
XXE
SQLInjection
Local file inclusion
Reconnaissance
NMAP
SQLMAP
NIKTO
Weaponize
OS Exploitation
Blackhat
Command and Control
Download and execute
Lateral Movement
SMB-Relay
Pass the hash
Post-exploitation
Linux Privilege Escalation
Command list
Windows Privilege Escalation
Credentials dump
Stealth & Persistency
Metasploit
Powershell Attacks
Submit
Suggest another
Xuan Bin Ng
Pentest Kungfu
Share
0
Follow
You must be logged in to view the contents of this board.
Log In
Sign Up
Windows Forensic
Pin
Tool Analysis Result Sheet
jpcertcc.github.io
Windows Forensic
Eventlogs
Pin
Event-o-Pedia EventID 528 - Successful Logon [Win XP]
eventopedia.cloudapp.net
Eventlogs
Web exploitation
Pin
Web exploitation
Command Injection
Pin
[PentesterLab] Web for Pentester - FINAL
evernote.com
Command Injection
XXE
Pin
Gaining Filesystem Access via Blind OOB XXE
evernote.com
Hiding in Plain Sight: XXE Vulnerability in HP Project & Portfolio Mgmt Center - Rhino ...
rhinosecuritylabs.com
XXE
phonexicum.github.io
XXE
SQLInjection
Pin
Exploiting Timed Based RCE
evernote.com
Red Team Tales 0x01: From MSSQL to RCE - Tarlogic Security - Cyber Security and Ethical...
evernote.com
Vulnerability analysis, Security Papers, Exploit Tutorials - Part 12975
exploit-db.com
Basic Union Based Injection
securityidiots.com
Advanced SQL injection to operating system full control
blackhat.com
SQL Injection Cheat Sheet | Netsparker
netsparker.com
5 more
SQLInjection
Local file inclusion
Pin
Web App Penetration Testing - Local File Inclusion (LFI)
exploit-db.com
Local file inclusion
Reconnaissance
Pin
Reconnaissance
NMAP
Pin
Scanning for network vulnerabilities using nmap - Blah, Cloud.
blah.cloud
NMAP
SQLMAP
Pin
Usage · sqlmapproject/sqlmap Wiki · GitHub
github.com
From SQL Injection To 0wnage Using SQLMap » Checkmate
niiconsulting.com
SQLMAP
NIKTO
Pin
Nikto v2.1.5 - The Manual
cirt.net
NIKTO
Weaponize
Pin
Powershell -Enc AV bypass
github.com
Weaponize
OS Exploitation
Pin
OS Exploitation
Blackhat
Pin
bh-usa-07-moore_and_valsmith-WP.pdf
PDF
Blackhat
Command and Control
Pin
Command and Control
Download and execute
Pin
Windows oneliners to download remote payload and execute arbitrary code – arno0x0x
arno0x0x.wordpress.com
Download and execute
Lateral Movement
Pin
Lateral Movement
SMB-Relay
Pin
Executing SMB Relay Attacks via SQL Server using Metasploit
blog.netspi.com
Effective NTLM / SMB Relaying · Rob 'mubix' Fuller
room362.com
Bettercap - Capturing NTLM Hashes
securitynewspaper.com
SMB Attacks Through Directory Traversal
blog.netspi.com
Windows 7 and SMB Relay Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Resea...
carnal0wnage.attackresearch.com
4ARMED - Penetration Testing and Cyber Security Services
4armed.com
5 more
SMB-Relay
Pass the hash
Pin
Still Passing the Hash 15 Years Later: WMIS: The Missing Piece of the Ownage Puzzle
passing-the-hash.blogspot.sg
PSExec | To Shell And Back: Adventures In Pentesting
toshellandback.com
Pass-the-Hash Is Dead: Long Live LocalAccountTokenFilterPolicy – harmj0y
harmj0y.net
Kerberos Golden Tickets are Now More Golden » Active Directory Security
adsecurity.org
Practical Usage of NTLM Hashes
blog.ropnop.com
Practical guide to NTLM Relaying in 2017 (A.K.A getting a foothold in under 5 minutes) ...
byt3bl33d3r.github.io
3 more
Pass the hash
Post-exploitation
Pin
Post-exploitation
Linux Privilege Escalation
Pin
Attack and Defend: Linux Privilege Escalation Techniques of 2016
pen-testing.sans.org
Linux Privilege Escalation
Command list
Pin
Linux Post Exploitation Command List · mubix/post-exploitation Wiki · GitHub
github.com
Command list
Windows Privilege Escalation
Pin
FuzzySecurity | Windows Privilege Escalation Fundamentals
fuzzysecurity.com
intercept_apis_dll_redirection.pdf
dl.packetstormsecurity.net
Windows Privilege Escalation
Credentials dump
Pin
ZN17_Kheirkhabarov_Hunting_for_Credentials_Dumping_in_Windows_Environment.pdf
2017.zeronights.org
Credentials dump
Stealth & Persistency
Pin
Userland Persistence with Scheduled Tasks and COM Handler Hijacking | enigma0x3
enigma0x3.net
FuzzySecurity | Windows Userland Persistence Fundamentals
fuzzysecurity.com
huntresslabs/evading-autoruns
github.com
Stealth & Persistency
Metasploit
Pin
Converting Metasploit Module to Stand Alone
netsec.ws
From metasploit module to python standalone with the help of wireshark | TheWeakestLink
theweakestlink.es
Metasploit
Powershell Attacks
Pin
increased-use-of-powershell-in-attacks-16-en.pdf
PDF
jaredhaight/PSAttack
Powershell tools with AV evasion
github.com
Powershell Attacks
0
Comment
Comments or thoughts?
Submit
Cancel
Current length is 500 out of maximum 500 characters.
Log In
or
Sign Up
Email a link to this board
Here is a board on Papaly (Pentest Kungfu) with a collection of links you might be interested in: https://papaly.com/xuanbinng/cEQaN/Pentest-Kungfu
Send
Share this board on Facebook
Pentest Kungfu
papaly.com
Windows Forensic, Web exploitation, Reconnaissance, Weaponize, Installation, OS Exploitation, + 5 more
Share on Facebook
Share this board on Twitter
Pentest Kungfu board on #Papaly: papaly.com/c/EQaN
100
characters remaining
Share on Twitter
Importing from file
Updating your information
Establishing secure connection
test
Notice label will go here
Pentest Kungfu
Windows Forensic
Eventlogs
Web exploitation
Command Injection
XXE
SQLInjection
Local file inclusion
Reconnaissance
NMAP
SQLMAP
NIKTO
Weaponize
OS Exploitation
Blackhat
Command and Control
Download and execute
Lateral Movement
SMB-Relay
Pass the hash
Post-exploitation
Linux Privilege Escalation
Command list
Windows Privilege Escalation
Credentials dump
Stealth & Persistency
Metasploit
Powershell Attacks
Powershell tools with AV evasion