Skip to content
0x1RIS Notes And Cheatsheets Hub
Exploitation Tools
Initializing search
Home
Introduction
Basics
Offensive Security Modules
Learning Resources
Programming Cheatsheets
0x1RIS Notes And Cheatsheets Hub
Home
Introduction
Introduction
Overview
About 0x1RIS
Methodology
Basics
Basics
Overview
Lab Setup
Linux
Windows
Android Basics
Networking
Cryptography
Scripting Essentials
DFIR Fundamentals
Reverse Engineering
Threat Modeling
Offensive Security Modules
Offensive Security Modules
Reconnaissance
Reconnaissance
Overview
Archive Analysis
Breach Databases
Cloud Assets
Code Repositories OSINT
DNS Enumeration
JS Analysis
OSINT Introduction
Port Scanning
Recon Case Studies
Recon Checklist
Screenshotting
Service Fingerprinting
Social Media OSINT
Subdomain Enumeration
Technology Detection
Vulnerability Guides
Vulnerability Guides
Overview
Misconfigurations
Vulnerability Checklist
Authentication Bypass
Authentication Bypass
Overview
Attack Vectors
Exploitation
Mitigations
Case Studies
Authorization Bypass
Authorization Bypass
Overview
Attack Vectors
Exploitation
Mitigations
Case Studies
Command Injection
Command Injection
Attack Vectors
Case Studies
Exploitation
Introduction
Mitigations
CSRF
CSRF
Case Studies
Exploitation
Introduction
Mitigations
Deserialization
Deserialization
Case Studies
Exploitation
Introduction
Mitigations
File Upload
File Upload
Bypasses
Case Studies
Exploitation
Introduction
Mitigations
HTTP Request Smuggling
HTTP Request Smuggling
Case Studies
Exploitation
Introduction
Mitigations
IDOR
IDOR
Case Studies
Exploitation
Introduction
Mitigations
LFI
LFI
Case Studies
Exploitation
Introduction
Mitigations
Open Redirect
Open Redirect
Exploitation
Introduction
Mitigations
Race Conditions
Race Conditions
Exploitation
Introduction
Mitigations
RCE
RCE
Case Studies
Exploitation
Introduction
Mitigations
RFI
RFI
Case Studies
Exploitation
Introduction
Mitigations
SQLi
SQLi
Advanced SQLi
Blind SQLi
Boolean-based
Case Studies
Error-based
Introduction
Time-based
Union-based
SSRF
SSRF
Case Studies
Exploitation
Introduction
Mitigations
Template Injection
Template Injection
Exploitation
Introduction
Mitigations
XSS
XSS
Blind XSS
Case Studies
DOM XSS
Introduction
Mutation XSS
Reflected XSS
Stored XSS
WAF Bypass
Exploitation Examples
Exploitation Examples
Overview
API Exploitation
Binary Exploitation
Binary Exploitation
Buffer Overflow
Format Strings
Heap Overflow
Introduction
Ret2libc
ROP
SROP
Use After Free
Binary Case Studies
Cloud Exploitation
IoT Attacks
Mobile Exploitation
Network Exploitation
Social Engineering
Web Exploitation
Wireless Attacks
Advanced Techniques
Advanced Techniques
Overview
Container Escapes
Evasion and Obfuscation
Heap Spraying
Kernel Exploits
Lateral Movement
Memory Corruption
MITM Attacks
Persistence Techniques
Sandbox Escapes
Privilege Escalation
Privilege Escalation
Docker
Escalation Checklist
Kubernetes
Linux
Windows
Payloads and Wordlists
Payloads and Wordlists
Overview
Payload Generation
Payloads Library
Payloads Library
Command Injection
Deserialization
LFI/RFI
RCE
Smuggling
SQLi
SSRF
Upload Bypass
XSS
Wordlists Collection
Wordlists Collection
Cloud Enumeration
Custom Wordlists
Directories
Fuzzing
Parameters
Passwords
Subdomains
Tools and Automation
Tools and Automation
Overview
Automation Scripts
Burp Tricks
Custom ReconX
Docker Tools
Exploitation Tools
Fuzzing Tools
Metasploit Tricks
Nmap Tricks
Post-Exploitation Tools
Recon Tools
Reporting Tools
Wireless Tools
ZAP Tricks
Active Directory
Active Directory
Overview
Enumeration
Kerberos Authentication
NTLM Authentication
Security Best Practices
Common Misconfigurations
Android Penetration Testing
Android Penetration Testing
Overview
Static Analysis
Dynamic Analysis
Network Testing
Instrumentation
Component Testing
Storage Testing
Reporting and Writeups
Reporting and Writeups
Overview
Bounty Tips
Bug Bounty Case Studies
Bug Report Template
Communication Tips
CTF Writeups
Disclosure Guidelines
Report Checklist
Writeup Examples
Learning Resources
Learning Resources
Overview
Blogs
Books
Certifications
Communities
Labs and Platforms
Newsletters
Podcasts
YouTube Channels
Programming Cheatsheets
Programming Cheatsheets
Overview
Bash
C
C++
Go
HTML/CSS
Java
JavaScript
Kotlin
PHP
PowerShell
Python
Regex
Rust
SQL
TypeScript
Home
Offensive Security Modules
Tools and Automation
Exploitation Tools
¶