Infodumps4All
  • 💻Intro
  • Resources
    • 🚀TODO section
      • OSINT FRAMEWORKS (TODO)
  • Recon
    • OSINT
    • Scanning and Enumeration
  • Not-So-Niche
    • Simple Network Management Protocol
    • Attacking VOIP
  • Attacking Active Directory
    • Active Directory - Technologies
      • Active Directory - Intro
      • Common Active Directory Network Technologies
      • Kerberos - Intro
    • Active Directory (Attacks)
      • Poisoning/Relay Attacks
  • Pwn College
    • Intro
    • White Belt
      • Program Misuse
        • Labs
      • Program Interaction
        • Labs
Powered by GitBook
On this page

Intro

NextTODO section

Last updated 1 year ago

Quick disclaimer

This is just a way for me to organize the resources I have found:

I in no way advocate for the malicious use of any of these techniques, tools, and software. I am not a writer, many sections of this gitbook may be paraphrased or copied from other resources. I do my best to cite the original sources of this material but general rule of thumb. "If it seems like it is professionally written, I did not write it"

Huge shoutout to HackTricks at and TCM Security at .

Many of the resources/techniques/etc listed in the following are from them, they are both objectively better resources then this.

Other quick notes

Many of these tools are written in python and the dependencies get messy quickly. I highly recommend setting up virtualenvs for each tool before installing the requirements.

## Installing virtualenv on Deb-Based systems

sudo apt update
sudo apt install virtualenv

## Installing virtualenv on Arch based systems

sudo pacman -Syu virtualenv

## Usage
## I normally will do this in the folder/repo that the project was installed in.
## BE CAREFUL DOING THIS AS A ROOT USER, running pip as root can cause permissions issues later down the line

cd <repo>
virtualenv <virtualenvName>
source <virtualenvName>/bin/activate
pip install -r <requirements>
https://book.hacktricks.xyz/welcome/readme
https://tcm-sec.com/
💻
Page cover image