Skip to main content
Link
Menu
Expand
(external link)
Document
Search
Copy
Copied
1 - Enumeration
nmap
NFS
RPC
SMB
MSSQL
SNMP
FTP
SSH
SMTP
MySQL
LDAP
DNS
Web Servers
Kerberos
Brute Forcing
I'm Stuck
OSINT
2 - Exploit
Beloved Shells
Buffer Overflow
File Inclusion
Generating Shellcode
Public Exploits
SQLi Exploits
XSS
3 - Post-Exploit
Active Directory
After Linux Foothold
After Windows Foothold
File Transfers
Kerberos
Port Forwarding, Mirroring
Steganography
Upgrading Shell
4 - Web_Application
Specific Labs
Essential Skills Labs
Mystery Labs
Practice Test
THM_Client-Side_What's Your Name
THM_RequestS_El Bandito
Authentication and Session
Authentication Vulnerabilties
JWT - JSON Web Tokens
OAuth authentication
Client-Side
Clickjacking
CORS - Cross-Origin Resource Sharing
Injection
Server-Side
HTTP and Infrastructure
API and Modern
Caching and Browser Edge
Access Control and Logic
5 - Unsorted Security
Abusing Macros
Abusing PATH
Abusing Windows Library
AD Methodology Notes
AD TCM
Antivirus Evasion
Burp Suite Notes
Checklist to Run Every Time
6 - Misc THM Notes
Credentials Harvesting
Persisting Active Directory
DevSecOps
CI CD and Build Security
Container Hardening
Container Vulnerabilities
Dependency Management
Infrastructure as Code
Kubernetes
Misc
SOC Level 1
chrisgrigsby.com
Search Security Notes
← chrisgrigsby.com
2 - Exploit
XSS
XSS
Cheatsheet
from notchxor.