Wicked Security
search
⌘Ctrlk
Wicked Security
  • Likhith Cv
  • Pentesting
    • DevSecOps
    • x86_Shell_Coding
    • Mobile Security
    • Docker Basics
    • Cloud
  • Active Directory
    • Active Directory
  • How to Take POCs
    • Network
  • OSINT
    • OSINT - Open Source Intelligence
  • Cheat-Sheet
    • Text Processing Cheat-Sheet
    • Cheat-Sheet Powershell
  • Privilege Escalation
    • Windows
    • Linux
  • Exploits
    • Exploits Links/Binaries
  • Wireless
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Likhith Cv

This Blog consists of Pentesting Cheatsheets, Commands, Red Teaming Tactics, methodology, etc

This Page is under development

Frequently used websites for reference

LogoWADComswadcoms.github.iochevron-right
LogoHackTricks - HackTricksbook.hacktricks.xyzchevron-right
LogoLOLBASlolbas-project.github.iochevron-right
LogoGTFOBinsgtfobins.github.iochevron-right
LogoWhat is ired.team notes? | Red Team Noteswww.ired.teamchevron-right

LogoUsing Credentials to Own Windows Boxes - Part 1 (from Kali)ropnop blogchevron-right
LogoUsing Credentials to Own Windows Boxes - Part 2 (PSExec and Services)ropnop blogchevron-right
LogoUsing Credentials to Own Windows Boxes - Part 3 (WMI and WinRM)ropnop blogchevron-right

NextDevSecOpschevron-right

Last updated 4 years ago