Skip to content
View zumaroc's full-sized avatar
Block or Report

Block or report zumaroc

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
zumaroc/README.md

Hi there 👋

This repo contains PWK contents for Zroc CyberSec Hub (It's open to the Public).

PWK One-Liners: Our Collection of the Best One-Liners (Curated content using PWK Guide v1.1.6.)

  1. The Essential Tools
  2. Passive Information Gathering
  3. Active Information Gathering
  4. Vulnerability Scanning with Nmap
  5. Buffer Overflows ESP: (Extended Stack Pointer) vs EIP ( Extended Instruction Pointer )
  6. Windows Buffer Overflows Exploitation
  7. Linux Buffer Overflow Exploitation
  8. Public Exploits - "Never run an exploit without reviewing its source code/inner workings."
  9. File Transfers
  10. Privilege Escalation - “Think Like a Network Administrator.”
  11. Client-Side Attacks
  12. Web Application Attacks
  13. Password Attacks
  14. Port Redirection and Tunneling
  15. The Metasploit Framework
  16. Bypassing Antivirus Software

Popular repositories

  1. zumaroc zumaroc Public

    Public repo with curated PWK contents.

    7 5

  2. intro-to-security-research intro-to-security-research Public

    PDF for the Intro to Security Research - Red Team Hacking

    5 1

  3. pen-testing-active-directory pen-testing-active-directory Public

    Understand, analyze and practice threats and attacks in a modern Active Directory (AD) environment.

    4

  4. soc-analyst soc-analyst Public