๐Ÿณ
Swayam's Blog
CtrlK
LinkedinGithub
  • ๐Ÿซšroot@Swayam's Blog
  • ๐Ÿ•บAbout Me
  • ๐Ÿ› ๏ธProjects
    • CurveLock
    • ShadowChain
  • ๐ŸžMalware Analysis
    • Basic Malware Analysis
      • LAB Network Setup
      • Basic Static Analysis
      • Basic Dynamic Analysis
      • Advanced Dynamic Analysis
      • Advanced Static Analysis
      • Identifying Anti analysis techniques
      • Binary Patching
      • Shellcode Analysis
      • Malware.unknown.exe.Malz
      • Challenge-Sillyputty
      • Bind_shell RAT Analysis
      • Malicious Powershell Script
      • Malicious HTA(HTML Applications)
      • Phishing Excel Embedded Malware
      • Reversing Csharp And DotNET Framework
      • YARA rules
      • Automating Malware Analysis
    • MASM 64 Bit Assembly
      • Introduction
      • Data and Operations
      • Memory Organization
      • Constants And Data Types
      • Procedures
      • Arithmetic
      • Low Level Control Structures
      • Advanced Arithmetic
      • Numeric Conversion
      • Table Lookups
      • SIMD Instructions
      • Bit Manipulation
      • MASM Macros
      • String Instructions
  • ๐Ÿ‘จโ€๐Ÿ’ปMalware/Exploit Development
    • EDR Internals
      • Introduction
      • Function Hooking Dlls
      • Process & Thread Notifications
      • Object Notifications
      • Image & Registry Notifications
      • Filesystem Minifilter Drivers
      • Network Filter Drivers
      • Event Tracing For Windows
      • Antimalware Scan Interface
      • Early Launch Antimalware Drivers
      • Auxiliary Sources
    • Driver Development
  • ๐Ÿ“–Notes And Cheatsheets
    • OSCP / Application Security
      • OS stuff
        • Footprinting
        • Nmap
        • Shells
        • Metasploit
        • Windows Buffer Overflow
        • Windows
        • Windows Privilege Escalation
        • Linux Commands
        • Linux Privilege Escalation
        • Password Cracking
        • Pivoting And Tunneling
        • Macos
      • General Introduction
        • Basic Tools
        • Basic Networking
      • WebApps
        • Attacking Common Applications
        • Attacking Common Services
        • Broken Authentication
        • Burp Proxy
        • Common Apps
        • Command Injection
        • ffuf Fuzzing
        • File Inclusion
        • File Transfer
        • File Upload
        • Javascript Deobfuscation
        • Password Attacks
        • SQLi
        • Web attacks
        • Web Information Gathering
        • Wordpress
        • Brute Forcing
        • HTTP Curl
      • Active Directory
    • Wireless Attacks
    • Red Teaming
    • BloodHound
    • Pentesting
    • ADCS
Powered by GitBook
On this page
  1. ๐Ÿ“–Notes And Cheatsheets
  2. OSCP / Application Security

OS stuff

FootprintingNmapShellsMetasploitWindows Buffer OverflowWindowsWindows Privilege EscalationLinux CommandsLinux Privilege EscalationPassword CrackingPivoting And TunnelingMacos
PreviousOSCP / Application SecurityNextFootprinting