Miscellaneaous
UTILS
Unzip encrypted zips
zip2john file > zip.file john zip.file -wordlist:/wordlistPathusername-anarchy --input-file names.txt --select-format first,flast,first.last,firstl > usernames.txtKepass Master Password decode
keepass2john data.kdbx > hash.txtjohn -wordlist=/usr/share/wordlists/rockyou.txtDECODE BASE64
echo -n "cadena" | base64 -d; echo CRACK SHADOW TXT
unshadow passwd.txt shadow.txt > unshadowed.txtjohn --wordlist=/usr/share/wordlists/rockyou.txt unshadowed.txtCMD Lateral Movement
$user = "machineName\user"
$password = ConvertTo-SecureString "butterfly!#1" -AsPlainText -Force
$cred = New-Object System.Management.Automation.PSCredential($user, $password)
Invoke-Command -Credential $cred -ComputerName SNIPER -ScriptBlock { whoami }TTY Treatment

Upgrade Powershell to pty
Spawning Interactive Shells
CURL
Detect if CMD or Powershell is used
Compile an exploit
Run binaries in Linux
Web shell paths
Web Server
Default Webroot
Default Credentials Search

Automated wordlist generator
Last updated