Compiling Exploits

Identifying if C code is for Windows or Linux

Build Exploit GCC

GCC Compile 32Bit Exploit on 64Bit Kali

Compile Windows .exe on Linux

SUID Binary

SUID C Shell for /bin/bash

SUID C Shell for /bin/sh

Building the SUID Shell binary

TTY Shells

Python TTY Shell Trick

Spawn Interactive sh shell

Spawn Perl TTY Shell

Spawn Ruby TTY Shell

Spawn Lua TTY Shell

Spawn TTY Shell from Vi

Spawn TTY Shell NMAP

Metasploit Cheat Sheet

Meterpreter Payloads

Windows reverse meterpreter payload

Windows VNC Meterpreter payload

Linux Reverse Meterpreter payload

Meterpreter Cheat Sheet

Common Metasploit Modules

Remote Windows Metasploit Modules (exploits)

Local Windows Metasploit Modules (exploits)

Auxilary Metasploit Modules

Metasploit Powershell Modules

Post Exploit Windows Metasploit Modules




Love podcasts or audiobooks? Learn on the go with our new app.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


More from Medium

GitLab Runner setup and registration on an Ubuntu or Debian distribution

Love, Code, and Robot — Explore robots in the world of code

Linux distribution: deepin 20.6 version planning

Cloud Hypervisor + GDB + Arm64 Part 2: Using `gdbstub`