added all
parent
60c3273b7e
commit
1783d353eb
28
README.md
28
README.md
|
@ -17,7 +17,33 @@ are welcome!
|
|||
|
||||
1. [Post-Exploitation](#post-exploitation)
|
||||
2. [Port Enumeration](#port-enumeration)
|
||||
2. [445 (smb/Samba)](#445-smbsamba)
|
||||
3. [445 (smb/Samba)](#445-smbsamba)
|
||||
4. [1433 (Microsoft SQL Server)](#1433-microsoft-sql-server)
|
||||
5. [SNMP](#snmp)
|
||||
6. [Microsoft Office Macros](#microsoft-office-macros)
|
||||
7. [Retrieving Network Service Hashes](#retrieving-network-service-hashes)
|
||||
8. [Windows Reverse Shells](#windows-reverse-shells)
|
||||
9. [Known Exploits](#known-exploits)
|
||||
10. [Excess](#excess)
|
||||
11. [Esoteric Languages](#esoteric-languages)
|
||||
13. [Steganography](#steganography)
|
||||
14. [Cryptography](#cryptography)
|
||||
15. [Networking](#networking)
|
||||
16. [PHP](#php)
|
||||
17. [PDF Files](#pdf-files)
|
||||
18. [Forensics](#forensics)
|
||||
19. [PNG File Forensics](#png-file-forensics)
|
||||
20. [APK Forensics](#apk-forensics)
|
||||
21. [Web](#web)
|
||||
22. [Reverse Engineering](#reverse-engineering)
|
||||
23. [PowerShell](#powerShell)
|
||||
24. [Windows Executables](#windows-executables)
|
||||
25. [Python Reversing](#python-reversing)
|
||||
26. [Binary Exploitation/pwn](#binary-exploitationpwn)
|
||||
27. [VisualBasicScript Reversing](#visualbasicscript-reversing)
|
||||
28. [Miscellaneous](#miscellaneous)
|
||||
29. [Jail Breaks](#jail-breaks)
|
||||
30. [Trivia](#trivia)
|
||||
|
||||
---------------
|
||||
|
||||
|
|
|
@ -0,0 +1,42 @@
|
|||
!_TAG_FILE_FORMAT 2 /extended format; --format=1 will not append ;" to lines/
|
||||
!_TAG_FILE_SORTED 1 /0=unsorted, 1=sorted, 2=foldcase/
|
||||
!_TAG_OUTPUT_FILESEP slash /slash or backslash/
|
||||
!_TAG_OUTPUT_MODE u-ctags /u-ctags or e-ctags/
|
||||
!_TAG_PROGRAM_AUTHOR Universal Ctags Team //
|
||||
!_TAG_PROGRAM_NAME Universal Ctags /Derived from Exuberant Ctags/
|
||||
!_TAG_PROGRAM_URL https://ctags.io/ /official site/
|
||||
!_TAG_PROGRAM_VERSION 0.0.0 /a3c87ab5/
|
||||
1433 (Microsoft SQL Server) README.md /^1433 (Microsoft SQL Server)$/;" s
|
||||
445 (smb/Samba) README.md /^445 (smb\/Samba)$/;" s
|
||||
APK Forensics README.md /^APK Forensics$/;" s
|
||||
Binary Exploitation/pwn README.md /^Binary Exploitation\/pwn$/;" s
|
||||
CTF-Katana README.md /^CTF-Katana$/;" c
|
||||
Cryptography README.md /^Cryptography$/;" s
|
||||
DO NOT FORGET TO JUST BRUTEFORCE JUST THE FIRST BYTE, OR TWO BYTES OR THREE BYTES. README.md /^# DO NOT FORGET TO JUST BRUTEFORCE JUST THE FIRST BYTE, OR TWO BYTES OR THREE BYTES.$/;" c
|
||||
Esoteric Languages README.md /^Esoteric Languages$/;" s
|
||||
Excess README.md /^Excess$/;" s
|
||||
Forensics README.md /^Forensics$/;" s
|
||||
IF YOU KNOW A DECENT CRIB (PLAINTEXT), USE CYBERCHEF TO HELP DETERMINE THE KEY README.md /^# IF YOU KNOW A DECENT CRIB (PLAINTEXT), USE CYBERCHEF TO HELP DETERMINE THE KEY$/;" c
|
||||
Jail Breaks README.md /^Jail Breaks$/;" s
|
||||
Known Exploits README.md /^Known Exploits$/;" s
|
||||
Microsoft Office Macros README.md /^Microsoft Office Macros$/;" s
|
||||
Miscellaneous README.md /^Miscellaneous$/;" s
|
||||
Networking README.md /^Networking$/;" s
|
||||
PDF Files README.md /^PDF Files$/;" s
|
||||
PHP README.md /^PHP$/;" s
|
||||
PNG File Forensics README.md /^PNG File Forensics$/;" s
|
||||
Port Enumeration README.md /^Port Enumeration$/;" c
|
||||
Post-Exploitation README.md /^Post-Exploitation$/;" c
|
||||
PowerShell README.md /^PowerShell$/;" s
|
||||
Python Reversing README.md /^Python Reversing$/;" s
|
||||
Retrieving Network Service Hashes README.md /^Retrieving Network Service Hashes$/;" s
|
||||
Reverse Engineering README.md /^Reverse Engineering$/;" s
|
||||
SNMP README.md /^SNMP$/;" s
|
||||
Steganography README.md /^Steganography$/;" s
|
||||
Table of Contents README.md /^# Table of Contents$/;" c
|
||||
Trivia README.md /^Trivia$/;" s
|
||||
VisualBasicScript Reversing README.md /^VisualBasicScript Reversing$/;" s
|
||||
WHEN GIVEN A FILE TO WORK WITH, DO NOT FORGET TO RUN THIS STEGHIDE WITH AN EMPTY PASSWORD! README.md /^# WHEN GIVEN A FILE TO WORK WITH, DO NOT FORGET TO RUN THIS STEGHIDE WITH AN EMPTY PASSWORD!$/;" c
|
||||
Web README.md /^Web$/;" s
|
||||
Windows Executables README.md /^Windows Executables$/;" s
|
||||
Windows Reverse Shells README.md /^Windows Reverse Shells$/;" s
|
Loading…
Reference in New Issue