Home
AssassinUKG
Cancel

Getting Started in Cybersecurity - A Complete Roadmap

Starting a career in cybersecurity can feel overwhelming with the vast array of specializations, tools, and concepts to master. This comprehensive guide provides a structured roadmap for beginners ...

OSINT Investigation Methodology

Open Source Intelligence (OSINT) is the practice of collecting and analyzing publicly available information to produce actionable intelligence. This guide provides a structured methodology for cond...

Windows Privilege Escalation Techniques

Windows Privilege Escalation Techniques Privilege escalation is a critical phase in penetration testing where we attempt to gain higher-level permissions on a Windows system. This comprehensive gu...

Attacking AD

Attacking AD (HTB) Initial Enumeration Command Description nslookup ns1.inlanefreight.com Used to query the domain name system and discover the IP...

Powershell Obsfucation tricks with examples

Powershell Obsfucation tricks with examples Here is a list of obsfucation techniques. String encoding: This involves converting strings into a different format, such as base64 or hexadecimal, ...

Python Virtual Enviroment (with specific python version)

To create a Python 3 virtual environment with a specific version of Python, follow these steps: Install the virtualenv package using pip: pip install virtualenv Create a new virtual environme...

Bash Cheatsheet

Introduction This is a quick reference to getting started with Bash scripting. Learn bash in y minutes (learnxinyminutes.com) Bash Guide (mywiki.wooledge.org) Example #!/usr/bin/env bash ...

Sqlmap Cheatsheet

Burp + sqlmap Save a request in burp (right click > save to file) Run with sqlmap sqlmap -r sqlmap.txt --batch Generic -u "<URL>" -p "<PARAM TO TEST>" --user-agent=SQLMAP --r...

BugBounty Oneliners

Oneliner commands for bug bounty xss + urls katana -u "https://pestphp.com/" | cariddi | dalfox pipe --proxy http://127.0.0.1:8080 | tee -a pest_test_urls.txt cat pest_test_urls.txt | egrep -iv ...

Blog revamp

If you’re reading this, chances are you’re passionate about staying safe and secure online. In today’s world, cyber security is more important than ever. With so much of our lives taking place onli...