Skip to content

Daemon-AT4/Ethical_Hacking-Cheatsheets

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

25 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation


╔═══════════════════════════════════════════════════════════════════════════════╗
β•‘  β–ˆβ–ˆβ•—  β–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•—  β–ˆβ–ˆβ•—    β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•—  β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—                β•‘
β•‘  β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•”β•    β•šβ•β•β–ˆβ–ˆβ•”β•β•β•β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•β•β•                β•‘
β•‘  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•        β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—                  β•‘
β•‘  β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•—        β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•                  β•‘
β•‘  β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•—       β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—                β•‘
β•‘  β•šβ•β•  β•šβ•β•β•šβ•β•  β•šβ•β• β•šβ•β•β•β•β•β•β•šβ•β•  β•šβ•β•       β•šβ•β•   β•šβ•β•  β•šβ•β•β•šβ•β•β•β•β•β•β•                β•‘
β•‘                                                                               β•‘
β•‘  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•—      β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—                          β•‘
β•‘  β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•β•β•β•šβ•β•β–ˆβ–ˆβ•”β•β•β•                          β•‘
β•‘  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—     β–ˆβ–ˆβ•‘                             β•‘
β•‘  β–ˆβ–ˆβ•”β•β•β•β• β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•     β–ˆβ–ˆβ•‘                             β•‘
β•‘  β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘ β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•‘                             β•‘
β•‘  β•šβ•β•     β•šβ•β•β•β•β•β•β•β•šβ•β•  β•šβ•β•β•šβ•β•  β•šβ•β•β•β•β•šβ•β•β•β•β•β•β•   β•šβ•β•                             β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

Cybersecurity Ethical Hacking Active Directory Penetration Testing

GitHub Status Access


[SYSTEM] Status: ONLINE | Access Level: PUBLIC | Protocol: SECURE

[WARNING] Execute with caution. Unauthorized access is prohibited. For educational purposes only.


⚑ >_ System.Initialize()

>>> Initializing Hack_The_Planet.exe...
>>> Loading cheatsheet_database.db...
>>> Connection established...
>>> Welcome, Netrunner.

Hacking Cheat Sheets Database - A curated collection of commands, techniques, and references for penetration testing operations. Built by a hacker, for hackers.

[TARGET_AUDIENCE] Red Teamers β€’ Pentesters β€’ CTF Players β€’ Security Researchers

All guides were created by 00xNetrunner and were originally stored in an Obsidian vault.
They have been reformatted for GitHub using Claude Code.

πŸ“‚ >_ Directory.Traverse()

Access Sector Description
🏰 Active Directory LDAP Kerberos BloodHound
πŸ” Cryptography GPG Keys Encryption
πŸ” Enumeration Nmap FFUF Recon
πŸ’₯ Exploitation Metasploit Payloads
πŸ“¦ Hack The Box Academy Machine Guides
🐧 Linux Shell Perms Commands
πŸ“ Misc Utils Docs References
πŸ”‘ Password Attacks Cracking Spraying
πŸ›‘οΈ Purple Team Defense Offense Manuals
🌐 Web HTTP cURL Injections

🏰 Active Directory


> Loading module: AD_Exploitation.dll...

> Status: READY

Tool Description Tags
🩸 BloodHound (Python) Remote AD enumeration ingestor ingestor python
πŸ”΄ BloodyAD AD privilege escalation framework priv-esc ldap
πŸ” Certipy AD CS exploitation toolkit adcs certificates
🐍 Impacket Python toolkit for Windows protocols smb kerberos rpc
πŸ“„ RBCD Resource-based delegation attacks delegation kerberos
πŸ• SharpHound BloodHound C# collector collector windows

πŸ” Cryptography

> Loading module: Crypto_Utils.dll...
> Status: READY
Tool Description Tags
πŸ”’ GPG Cheat Sheet PGP/GPG encryption reference pgp encryption

πŸ” Enumeration


> Loading module: Net_Recon.dll...

> Status: READY

Tool Description Tags
🎯 FFUF Web fuzzing utility web-fuzzing discovery
πŸ–₯️ NetExec Network execution tool smb network
⚑ RustScan Fast port scanner port-scan rust
πŸ” Shodan Internet-connected device search engine osint recon iot

πŸ’₯ Exploitation


> Loading module: Exploit_Framework.dll...
> Status: ARMED

Tool Description Tags
πŸ’€ Metasploit Framework Exploitation framework msfconsole exploits

πŸ“¦ Hack The Box (HTB)


> Loading module: Training_Data.db...
> Status: READY

Guide Description
πŸš€ Getting Started Guide HTB Platform Introduction
🏒 Introduction to Active Directory AD Fundamentals
πŸͺŸ Windows Fundamentals Windows Basics
πŸ“‘ Network Traffic Analysis Packet Analysis
πŸ—ΊοΈ Nmap Network Enumeration Network Scanning
🎭 Metasploit Framework Usage MSF Usage
πŸ¦€ CrackMapExec Network Pentesting
πŸ’Ύ Stack-Based Buffer Overflows (Win x86) BOF Exploitation
πŸ’‰ SQL Injection Fundamentals SQLi Attacks
πŸ“‚ File Inclusion LFI/RFI Attacks
πŸ“€ File Transfers Data Exfiltration
🌐 Web Requests HTTP/HTTPS
πŸ”“ JavaScript Deobfuscation JS Analysis

🐧 Linux


> Loading module: Nix_Shell.so...
> Status: READY

Tool Description Tags
πŸ” Chmod File permissions reference permissions
πŸ’» TTY Shell Shell stabilization techniques shell tty

πŸ“ Misc


> Loading module: Utilities.dll...
> Status: READY

Tool Description Tags
πŸ“‚ SMBServer Impacket SMB server for file transfer smb transfer impacket
🧽 Sponge Pipe buffer utility pipe buffer
πŸ”’ OpenSSL SSL/TLS toolkit ssl certs
πŸ“ Overleaf Archive LaTeX documentation latex

πŸ”‘ Password Attacks


> Loading module: Hash_Crack.dll...
> Status: READY

Tool Description Tags
πŸ‘‘ John the Ripper Password cracker jtr cracking
🎯 General Password Attacks Attack methodology methodology

πŸ›‘οΈ Purple Team


> Loading module: Blue_Red_Ops.dll...
> Status: READY

Resource Description Tags
πŸ“˜ Purple Team Field Manual (PTFM) Complete reference manual manual reference

🌐 Web


> Loading module: HTTP_Exploit.dll...
> Status: READY

Tool Description Tags
πŸŒ€ cURL Exploitation HTTP client & API testing api recon

πŸ‘€ >_ Author.Info()


╔══════════════════════════════════════════════════════════════╗
β•‘                     [ NETRUNNER PROFILE ]                    β•‘
╠══════════════════════════════════════════════════════════════╣
β•‘  HANDLE      :  0xNetrunner                                  β•‘
β•‘  CLASS       :  4th Year Ethical Hacking Student             β•‘
β•‘  SPECIALTY   :  Penetration Testing | Red Team Ops           β•‘
β•‘  STATUS      :  Active                                       β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

GitHub


πŸ“œ >_ Credits.Log()

{

  "author": "0xNetrunner",
  "status": "4th Year Ethical Hacking Student",
  "external_sources": [
    "Hack The Box (HTB)",
    "Tim Bryant (PTFM)",
    "SpecterOps"

  ],

  "license": "Educational Use",
  "acknowledgment": "ACKNOWLEDGED"

}

⚠️ >_ Disclaimer.Read()


[!] LEGAL NOTICE

These resources are provided for EDUCATIONAL PURPOSES and AUTHORIZED
SECURITY TESTING only. Always obtain proper authorization before
testing systems you do not own.
 
The author assumes no liability for misuse of this information.
Hack responsibly. Stay legal. Stay ethical.



╔═══════════════════════════════════════════════════════════════╗
β•‘                  [ END OF TRANSMISSION ]                      β•‘
β•‘                                                               β•‘
β•‘              "The future is already here β€”                    β•‘
β•‘               it's just not evenly distributed."              β•‘
β•‘                                        - William Gibson       β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

Made with Hack The Planet