404>Bytes
04. MSSQL Metasploit
Initializing search
subrat243/404-Bytes
Home
Notes
Tools
Cheatsheet
Blog
Tags
404>Bytes
subrat243/404-Bytes
Home
Notes
Notes
Bash
Bash
01. Bash Shell Script
02. Variables
03. Passing Arguments
04. Executing Shell Command
05. Reading User Input
06. Bash trap Command
07. Bash Arrays
Ejpt v2
Ejpt v2
1. Assessment Methodologies
1. Assessment Methodologies
1. Assessment Methodologies Information Gathering
1. Assessment Methodologies Information Gathering
1. Introduction to Information gathering
1. Introduction to Information gathering
Introduction to Information gathering
2. Passive Information Gathering
2. Passive Information Gathering
01. Website Recon and Footprinting
02. WHOIS Enumeration
03. Website Footprinting With Netcraft
04. DNS Recon
05. WAF Enumeration with wafw00f
06. Subdomain Enumeration with Sublist3r and Subfinder
07. Google Dorks
08. Email Harvesting with theHarvester
09. Leaked Password Databases and Tools
3. Active Information Gathering
3. Active Information Gathering
01. DNS Zone Transfers
02. Host Discovery with Nmap
03. Port Scanning with Nmap
2. Assessment Methodologies Footprinting and Scanning
2. Assessment Methodologies Footprinting and Scanning
01. Mapping a Network
02. Port Scanning
3. Assessment Methodologies Enumeration
3. Assessment Methodologies Enumeration
00. Servers and Services
1. SMB
1. SMB
01. SMB Windows Discover & Mount
02. SMB Nmap Scripts
03. SMB SMBMap
04. SMB Samba Part 1
05. SMB Samba Part 2
06. SMB Samba Part 3
07. SMB Dictionary Attack
2. FTP
2. FTP
01. FTP
02. FTP Anonymous Login
3. SSH
3. SSH
01. SSH
02. SSH Dictionary Attack
4. HTTP
4. HTTP
01. HTTP IIS
02. HTTP IIS Nmap Script
03. HTTP Apache Enumeration
5. MYSQL
5. MYSQL
01. MySQL
02. MySQL Dictionary Attack
03. MSSQL Nmap Scripts
04. MSSQL Metasploit
Linux cli
Linux cli
00. Linux Shells and Shell Scripting
01. File Management and Manipulation
02. Files & Directory Permissions
03. Filtering Stuffs Using grep
04. Finding Stuffs
05. Distro Enumeration
06. Shells & Shell Configurations
07. Disk Usage
08. File Compression And Archiving
09. Managing Users And Groups With visudo
10. Networking Commands
11. Services And Process Management
12. SSH And SSH Security
13. Curl Fundamentals
14. UFW (Uncomplicated Firewall) Configuration
15. Clearing Logs And Tracks
16. Tmux Essentials
17. Cron Job
Metasploit
Metasploit
01. Metasploit The Basics Modules, Exploits & Payloads
02. Metasploit Understanding Metasploit File Structure
03. Metasploit Information Gathering Auxiliary Scanner
04. Metasploit Basic Exploitation vsftpd
05. Metasploit Exploitation
06. Metasploit More Examples
07. Metasploit Custom Payload with msfvenom
08. Metasploit Post Exploitation Privilege Escalation
09. Metasploit Writing a Custom Metasploit Module
10. Metasploit Writing Advanced Metasploit Modules
11. Metasploit Obfuscating Payloads
12. Metasploit Encrypting and Obfuscating a Payload using AES
13. Metasploit Wrapping Payload Inside a Legitimate Executable
14. Metasploit Customizing the Python Loader
15. Metasploit Bypassing Antivirus and EDR Systems
16. Metasploit Fileless Execution Techniques
17. Metasploit Persistence
18. Metasploit Automation for Post Exploitation
19. Metasploit Privilege Escalation
20. Metasploit Lab Environment
Nmap
Nmap
01. What is Nmap
02. Network Scanning
03. Nmap Host Discovery
04. Nmap OS and Service Version Scanning
05. Nmap TCP Connect and UDP Scan
06. Nmap TCP Connect, Stealth(SYN) and UDP Scan
07. Nmap Output and Verbosity
08. Nmap Inverse TCP Flag Scanning(FIN, XMAS & NULL)
09. Nmap Firewall Detection(ACK Probing)
10. Nmap Firewall Evasion(Decoys, MTU & Fragmentation)
11. Nmap Scan Timing & Performance
12. Nmap Nmap Scripting Engine
13. Nmap Banner Grabbing
14. Nmap FTP Enumeration
15. Nmap DNS Enumeration
16. Nmap SMTP Enumeration
17. Nmap HTTP Enumeration Detecting HTTP Methods
18. Nmap HTTP Enumeration Finding Hidden Files And Directories
19. Nmap HTTP Enumeration WAF Detection And Fingerprinting
20. Nmap SMB Enumeration
21. Nmap MySQL Enumeration
22. Nmap Vulnerability Scanning
Python
Python
01. Intro to Python
02. Printing & Variables
03. Data Types
04. Typecasting
Tryhackme
Tryhackme
Authentication Bypass & Logic Flaws (THM)
Command Injection (THM)
Cryptography and Hashing (THM)
Digital Forensics (THM)
IDOR (Insecure Direct Object Reference) (THM)
Linux Privilege Escalation (THM)
Race Conditions (THM)
SQL Injection (SQLi) (THM)
SSRF (Server-Side Request Forgery) (THM)
Security Operations Center (SOC) (THM)
Subdomain Enumeration (THM)
Windows Privilege Escalation (THM)
XSS (Cross Site Scripting) (THM)
cURL (THM)
Tools
Tools
Anonsurf
Arp-Scan
Browsh
DNSRecon
DNSenum
Dig
Dirb
Enum4linux
FFUF
Fierce
Fping
Git for Development
GitHub Dorking
Gobuster
Google Dorking
Hydra
John the Ripper
MacChanger
NMBLookup
Netcat
Netdiscover
Nethunter
PowerShell
Proxychains
RPCClient
SMBClient
SMBMap
SQL - MySQL
Social-Engineer Toolkit (SET)
Subfinder
Sublist3r
Tcpdump
Telnet
WSL
Wafw00f
Windows CLI
Wireshark
theHarvester
Cheatsheet
Cheatsheet
Blog
Blog
Archive
Archive
2026
2025
Categories
Categories
General
ftp
penetration-testing
Tags
04. MSSQL Metasploit
Back to top