added all

pull/34/head
mr-zero 2020-10-01 04:54:44 +05:30
parent 60c3273b7e
commit 1783d353eb
2 changed files with 141 additions and 73 deletions

View File

@ -17,7 +17,33 @@ are welcome!
1. [Post-Exploitation](#post-exploitation)
2. [Port Enumeration](#port-enumeration)
2. [445 (smb/Samba)](#445-smbsamba)
3. [445 (smb/Samba)](#445-smbsamba)
4. [1433 (Microsoft SQL Server)](#1433-microsoft-sql-server)
5. [SNMP](#snmp)
6. [Microsoft Office Macros](#microsoft-office-macros)
7. [Retrieving Network Service Hashes](#retrieving-network-service-hashes)
8. [Windows Reverse Shells](#windows-reverse-shells)
9. [Known Exploits](#known-exploits)
10. [Excess](#excess)
11. [Esoteric Languages](#esoteric-languages)
13. [Steganography](#steganography)
14. [Cryptography](#cryptography)
15. [Networking](#networking)
16. [PHP](#php)
17. [PDF Files](#pdf-files)
18. [Forensics](#forensics)
19. [PNG File Forensics](#png-file-forensics)
20. [APK Forensics](#apk-forensics)
21. [Web](#web)
22. [Reverse Engineering](#reverse-engineering)
23. [PowerShell](#powerShell)
24. [Windows Executables](#windows-executables)
25. [Python Reversing](#python-reversing)
26. [Binary Exploitation/pwn](#binary-exploitationpwn)
27. [VisualBasicScript Reversing](#visualbasicscript-reversing)
28. [Miscellaneous](#miscellaneous)
29. [Jail Breaks](#jail-breaks)
30. [Trivia](#trivia)
---------------

42
tags Normal file
View File

@ -0,0 +1,42 @@
!_TAG_FILE_FORMAT 2 /extended format; --format=1 will not append ;" to lines/
!_TAG_FILE_SORTED 1 /0=unsorted, 1=sorted, 2=foldcase/
!_TAG_OUTPUT_FILESEP slash /slash or backslash/
!_TAG_OUTPUT_MODE u-ctags /u-ctags or e-ctags/
!_TAG_PROGRAM_AUTHOR Universal Ctags Team //
!_TAG_PROGRAM_NAME Universal Ctags /Derived from Exuberant Ctags/
!_TAG_PROGRAM_URL https://ctags.io/ /official site/
!_TAG_PROGRAM_VERSION 0.0.0 /a3c87ab5/
1433 (Microsoft SQL Server) README.md /^1433 (Microsoft SQL Server)$/;" s
445 (smb/Samba) README.md /^445 (smb\/Samba)$/;" s
APK Forensics README.md /^APK Forensics$/;" s
Binary Exploitation/pwn README.md /^Binary Exploitation\/pwn$/;" s
CTF-Katana README.md /^CTF-Katana$/;" c
Cryptography README.md /^Cryptography$/;" s
DO NOT FORGET TO JUST BRUTEFORCE JUST THE FIRST BYTE, OR TWO BYTES OR THREE BYTES. README.md /^# DO NOT FORGET TO JUST BRUTEFORCE JUST THE FIRST BYTE, OR TWO BYTES OR THREE BYTES.$/;" c
Esoteric Languages README.md /^Esoteric Languages$/;" s
Excess README.md /^Excess$/;" s
Forensics README.md /^Forensics$/;" s
IF YOU KNOW A DECENT CRIB (PLAINTEXT), USE CYBERCHEF TO HELP DETERMINE THE KEY README.md /^# IF YOU KNOW A DECENT CRIB (PLAINTEXT), USE CYBERCHEF TO HELP DETERMINE THE KEY$/;" c
Jail Breaks README.md /^Jail Breaks$/;" s
Known Exploits README.md /^Known Exploits$/;" s
Microsoft Office Macros README.md /^Microsoft Office Macros$/;" s
Miscellaneous README.md /^Miscellaneous$/;" s
Networking README.md /^Networking$/;" s
PDF Files README.md /^PDF Files$/;" s
PHP README.md /^PHP$/;" s
PNG File Forensics README.md /^PNG File Forensics$/;" s
Port Enumeration README.md /^Port Enumeration$/;" c
Post-Exploitation README.md /^Post-Exploitation$/;" c
PowerShell README.md /^PowerShell$/;" s
Python Reversing README.md /^Python Reversing$/;" s
Retrieving Network Service Hashes README.md /^Retrieving Network Service Hashes$/;" s
Reverse Engineering README.md /^Reverse Engineering$/;" s
SNMP README.md /^SNMP$/;" s
Steganography README.md /^Steganography$/;" s
Table of Contents README.md /^# Table of Contents$/;" c
Trivia README.md /^Trivia$/;" s
VisualBasicScript Reversing README.md /^VisualBasicScript Reversing$/;" s
WHEN GIVEN A FILE TO WORK WITH, DO NOT FORGET TO RUN THIS STEGHIDE WITH AN EMPTY PASSWORD! README.md /^# WHEN GIVEN A FILE TO WORK WITH, DO NOT FORGET TO RUN THIS STEGHIDE WITH AN EMPTY PASSWORD!$/;" c
Web README.md /^Web$/;" s
Windows Executables README.md /^Windows Executables$/;" s
Windows Reverse Shells README.md /^Windows Reverse Shells$/;" s