www.thehacker.recipes Open in urlscan Pro
2606:4700::6812:375  Public Scan

Submitted URL: http://www.thehacker.recipes/
Effective URL: https://www.thehacker.recipes/
Submission: On August 14 via manual from SG — Scanned from ES

Form analysis 0 forms found in the DOM

Text Content

The Hacker Recipes
GitHubTwitterExegolTools

Search
⌃K

Links
Introduction
Active Directory
Reconnaissance

Movement

Persistence

Web services
Reconnaissance

Configuration

Accounts and sessions

User inputs

Systems & services
Reconnaissance

Initial access (protocols)

Initial access (phishing)
Privilege escalation

Pivoting

Evasion
(AV) Anti-Virus

🛠️ (EDR) Endpoint Detection and Response
🛠️ Physical
Locks
Networking

Machines

Super secret zones

🛠️ Intelligence gathering
CYBINT

OSINT
GEOINT
🛠️ RADIO
RFID

Bluetooth
Wi-Fi

Wireless keyboard/mouse
🛠️ mobile apps
Android

iOS

Powered By GitBook
This project is aimed at providing technical guides on various hacking topics.
The most advanced topics are Active Directory and Web services. Other topics
will be added. The ultimate goal is centralize all hacking techniques
👀
Cheatsheets are huge resources, but they sometimes lack simplicity or on the
contrary they don't give enough context or explanation. This is not a
cheatsheets project. Everything here will be verified, tested, and not only
copy-pasted from I don't know where.
This project is not the only one around focusing on providing ethical hacking
guides. You should also take a look at hacktricks and ired.team.
Keep in mind that these guides are maintained by non-omniscient security
enthusiasts in their spare time. You will probably find things missing or
mistakes and writing all this takes time.
📣
Please feel free to contribute, give feedback/suggestions or reach out to me on
Twitter (@_nwodtuhs), Discord (@nwodtuhs), IRL or whatever you feel appropriate.
Almost every tool mentioned in theses notes is in Exegol.
SPONSORS

I work at Capgemini and thank them for allocating some time to develop and
maintain The Hacker Recipes! Visit Capgemini website at
https://www.capgemini.com/.

Last modified 11d ago
Was this page helpful?

CookiesThis site uses cookies to deliver its service and to analyse traffic. By
browsing this site, you accept the cookie policy.
Reject all


Introduction
Active Directory
Reconnaissance

Movement

Persistence

Web services
Reconnaissance

Configuration

Accounts and sessions

User inputs

Systems & services
Reconnaissance

Initial access (protocols)

Initial access (phishing)
Privilege escalation

Pivoting

Evasion
(AV) Anti-Virus

🛠️ (EDR) Endpoint Detection and Response
🛠️ Physical
Locks
Networking

Machines

Super secret zones

🛠️ Intelligence gathering
CYBINT

OSINT
GEOINT
🛠️ RADIO
RFID

Bluetooth
Wi-Fi

Wireless keyboard/mouse
🛠️ mobile apps
Android

iOS

Powered By GitBook