|
You are here |
blog.ropnop.com | ||
| | | | |
blog.stalkr.net
|
|
| | | | | If you like exploitation surely you've had your own reverse or connect-back shells. Set up a listening netcat, run the payload and boom: you... | |
| | | | |
artkond.com
|
|
| | | | | Pivoting guide for penetrations testers or red team members | |
| | | | |
cocomelonc.github.io
|
|
| | | | | [AI summary] A technical tutorial explaining reverse shells, including definitions, common ports, firewall circumvention, listener setup, various command-line examples (netcat, bash, python, C), and defense strategies. | |
| | | | |
zserge.com
|
|
| | | Trying to figure out how Linux containers work by implementing them from scratch in C. | ||