Defender's Notes
search
⌘Ctrlk
Defender's Notes
  • Welcome!
  • Methodology
  • Ethical Hacking
  • Resources/Blogs/Conferences/Labs
  • Writing Vulnerability Reports
  • Linux Tips
  • Certifications
  • Bug Bounty
  • Python
  • PenTesting
    • Recon
    • Network Scanning
    • Reverse Shell Payloads
    • API Security Testing
    • 53 - DNS
    • 21 - ftp
    • 139,445 - SMB
    • 111,2049 - rcpbind
    • Authentication
    • Scripting
    • OSINT
    • Cloud Security
    • Reverse Engineering
    • Password
    • Proxy Chain
    • Steganography
    • Buffer Overflow
  • Windows
    • Recon
    • Golden/Silver Ticket
    • PowerShell for Beginners
    • Windows Priv Escalate
    • Kerberos Attack
  • Web Pentesting
    • 80,443,8080 - Recon
    • Resources
    • Web Vulnerabilities
    • OWASP Top 10 2017
    • OOB
    • Java
    • Python Web Security
  • Linux
    • Upgrading shell
    • Linux Priv Escalate
  • Binary Security
    • AOT
  • Hardware Security
    • Wi-fi
    • Radio
  • Mobile Security
    • Android
    • SMS
  • Videos
    • IppSec Videos
    • The Cyber Mentor
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. PenTesting

Scripting

Hackers Arise - Python scripting for hackers part 1: https://www.hackers-arise.com/post/2018/01/08/python-scripting-for-hackers-part-1-getting-startedarrow-up-right

Hackers Arise - BASH: Scripting Basics https://www.hackers-arise.com/post/2016/11/11/linux-for-hackers-part-7-bash-scripting-basicsarrow-up-right

PreviousAuthenticationchevron-leftNextOSINTchevron-right

Last updated 5 years ago