Tags
Browse all tags from writeups, reviews, and articles. Click a tag to see the full index of content.
CVEs
CVE-2023-26402CVE-2023-326292CVE-2021-442281CVE-2022-09441CVE-2022-312141CVE-2022-377061CVE-2022-442681CVE-2022-45101CVE-2023-02971CVE-2023-13261CVE-2023-22551CVE-2023-237521CVE-2023-271631CVE-2023-27163-Maltrail1CVE-2023-302531CVE-2023-305471CVE-2023-323151CVE-2023-327841CVE-2023-366641CVE-2023-386461CVE-2023-409311CVE-2023-414251CVE-2023-42201CVE-2023-427931CVE-2023-490701CVE-2023-514671CVE-2024-206561CVE-2024-214131CVE-2024-216261CVE-2024-245901CVE-2024-320021CVE-2024-340701CVE-2024-45771
MITRE ATT&CK
Tools
Nmap41Netcat26Burp Suite16Hashcat12Wfuzz9Python5MCP4Evil-WinRM3Jupyter3Scikit-learn3BloodHound2Certipy2curl2Feroxbuster2Git2Impacket2jadx2John the Ripper2Pandas2Responder2RunasCs2Scapy2SQLite32Wireshark2APKTool1BACnet1capinfos1CrackMapExec1CyberChef1Depix1Docker1Dotnet1EtherNet/IP1Frida1Ghidra1Git Dumper1GPG1grpcui1grpcurl1JAD1KeePass1Linpeas1MemProcFS1MFTECmd1Modbus1NLTK1NumPy1OPC-UA1PECmd1Pidgin1pspy1psql1PuTTY1pwntools1PyCryptodome1Python dis1Python types1Reaver1Registry Explorer1S7comm1SageMath1Searchsploit1Shellbag Explorer1snmpwalk1SQLmap1Timeline Explorer1Volatility 31ysoserial.net1
Techniques
CVE Exploitation15Password Cracking13LFI5Password Reuse5Shell Upgrade5SQL Injection5Sudo Exploitation5Vhost Enumeration5Lateral Movement4AI Agent Tooling3Command Injection3SSTI3Arbitrary File Upload2Blind XSS2Brute Force2Credential Discovery2Database Enumeration2Default Credentials2File Upload Bypass2Filter Bypass2Kernel Exploitation2PCAP Analysis2Pre-Auth RCE2Protocol Analysis2SeImpersonate Abuse2Session Hijacking2Social Engineering2Source Code Analysis2SSRF2Text Classification2Timeline Reconstruction2XSS22FA Bypass1ADCS ESC71ADCS Exploitation1Adversarial Attacks1Adversary Emulation1AES Decryption1AI in Cybersecurity1AI Red Teaming1Algebraic Cryptanalysis1Android Forensics1Anomaly Detection1Ansible Vault Cracking1API Key Abuse1APK Decompilation1APK Reverse Engineering1Arbitrary File Read1AS-REP Roasting1Attack Simulation1Backup Analysis1Bash Pattern Matching1Binary Hijacking1Binary Reversing1Browser Forensics1Building Automation Exploitation1Bytecode Analysis1Classification1Cloud Security1Code Object Extraction1Compliance and Governance1Config File Enumeration1Container Escape1CRLF Injection1Cryptography1Data Loss Prevention1Data Poisoning1DCOM Exploitation1DCSync1Detection Engineering1Docker Container Escape1Docker Escape1Dynamic Instrumentation1Environment Variable Enumeration1Environment Variable Exploitation1Feature Engineering1Feature Extraction1Format String Injection1FTP Enumeration1Gap Analysis1GhostScript Exploitation1Git Clone Exploitation1Git Enumeration1Git External Protocol1Git Repository Abuse1Git Repository Enumeration1Grobner Basis1gRPC Enumeration1Hardcoded Credentials1ICS Exploitation1Identity and Access Control1IDOR1Image Deblurring1ImageMagick LFI1Impersonation1Information Disclosure1Internal Port Scanning1IoT and OT Security1JAR Decompilation1Java Deserialization1Joomla Exploitation1Jupyter Notebook RCE1JWT Forgery1LaTeX Injection1LDAP Enumeration1Leet Speak Reversal1LLM Security1Log4j Exploitation1Malware1Malware Detection1Memory Dump Analysis1Memory Forensics1Memory Manipulation1Memory Scanning1MITM Attack1Model Extraction1Model Training1MSSQL Exploitation1MSSQL RCE1Naive Bayes1Natural Language Processing1Network Forensics1Network Security1Network Security ML1NFS Enumeration1NTLM Hash Stealing1Object Introspection1PassTheCert1Password Hash Cracking1Password Policy Analysis1Password Spraying1Path Injection1PDF Embedding1PGP Signature Exploitation1PHP CGI Injection1PHP File Upload Bypass1Pickle Deserialization1PLC Interaction1Plugin Exploitation1Polynomial System Solving1Port Scan Detection1Port Tunneling1Prefetch Analysis1Pretext Development1Privilege Escalation Analysis1Probabilistic Models1Process Analysis1Process Injection1Prompt Injection1Purple Team Exercises1Python Format String1Python Import Hijacking1Redis Socket Abuse1Regex Bypass1Registry Forensics1Related Messages1Reverse Shell Analysis1Risk Management1RSA1SAM Hash Extraction1Sandbox Escape1SeDebugPrivilege Abuse1Sentiment Analysis1Shadow File Extraction1Shellbag Analysis1SMB Enumeration1SMS Phishing (Smishing)1SNMP Enumeration1Solar-PuTTY Decryption1Spam Detection1Spring Actuator Abuse1SQLite Analysis1SQLite Injection1SQLite Loadable Extensions1SSH Key Conversion1SSH Key Extraction1Staged Payload Reconstruction1Sudoers Modification1SUID Exploitation1Symlink Abuse1Template Injection1Threat Analysis1Threat Hunting1Traffic Analysis1ViewState Deserialization1Vishing1Visual Studio Build Events1Visual Studio Exploitation1Voice Cloning1Web Security1Webshell Upload1Whitespace Bypass1Wildcard Exploitation1Windows Defender Evasion1Wireless Network Exploitation1Wireless Security1WPS Attack1WriteSPN Abuse1WSL Exploitation1XMPP Enumeration1YAML Config Abuse1YARA Scanning1ZIP Symlink Attack1
Technologies
SSH31Python11Apache9Nginx8PHP8Active Directory4AI Agents4Gitea4MySQL4SQLite4Docker3Java3ADCS2Android2DFIR2Flask2Git2KeePass2Large Language Models2Machine Learning2MITRE ATT&CK2MSSQL2PostgreSQL2Visual Studio2.NET17-Zip1AES-ECB1AI Voice Synthesis1Apache Derby1Apache OFBiz1apport-cli1ASP.NET1Binwalk1Blazor1Browser DB1Chamilo LMS1ClearML1CLR/.NET Analysis1Deepfake Technology1Discord Webhooks1Dolibarr1EDR1Enlightenment1ERB1EVTX1Express1Firejail1Froxlor1FTP1Game Hacking1GhostScript1Gnuplot1Google SAIF1Grafana1gRPC1H2 Database1hMailServer1HTTP/HTTPS1IIS1ImageMagick1Industrial Control Systems1Intrusion Detection1Jabber/XMPP1Joomla1Jupyter1Laravel1LaTeX1LDAP1LibreOffice1Log4j1Maltrail1Metabase1MFT1Minecraft1Nagios XI1Naive Bayes1NFS1NIST Framework1NLP1Node.js1NSL-KDD Dataset1Openfire1OpenWrt1OSI and TCP/IP Models1OT Security1Outlook1PCAP1PCAP Format1PKI1Pluck CMS1Portainer1PowerShell Script1Prefetch1Process Memory1PWM1pyLoad1qpdf1Random Forest1Redis1Registry Hives1Request Tracker1Request-Baskets1Reverse Engineering1Roundcube1Ruby1Rust1SageMath1SIEM1SMS Spam Collection1SNMP1Spring Boot1SQLPad1Swagger1TCP Socket Server1TCP/IP1TeamCity1USN Journal1vm21WEBrick1Windows Memory Analysis1WonderCMS1WPA Supplicant1WSL1XAMPP1Zero Trust Architecture1