- by x32x01 ||
1. Recon Commands (Information Gathering)
whois example.comdig example.com +shortnslookup example.comsubfinder -d example.com
2. Port Scanning & Service Detection
nmap -sC -sV -T4 -Pn example.commasscan -p1-65535 192.168.1.0/24 --rate=1000
3. Web Vulnerability Scanning
nikto -h http://example.comsqlmap -u "http://example.com/index.php?id=1" --batch
4. File & Directory Bruteforcing
ffuf -u https://example.com/FUZZ -w /usr/share/wordlists/dirb/common.txtgobuster dir -u http://example.com -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt
5. Intercept & Modify Requests
burpsuitemitmproxy
6. Exploitation Frameworks
msfconsolesearchsploit wordpress
7. System & Network Monitoring
netstat -tulntcpdump -i eth0htop
---
8. Encoding, Hashing & Conversion
echo -n "admin" | base64echo -n "admin" | md5sumxxd -p input.bin
9. Useful Linux One-Liners for Hackers
find / -name "*.conf" 2>/dev/nullgrep -i "password" /var/www/html/*.php