Skip to content

Instantly share code, notes, and snippets.

View cptfrankdatank's full-sized avatar

@MobileFrank cptfrankdatank

View GitHub Profile
@cptfrankdatank
cptfrankdatank / get_ippsec_details.py
Created July 3, 2019 13:24 — forked from sminez/get_ippsec_details.py
Find examples of pen testing methods and tools in videos by Ippsec (as of 26th June 2019)
#!/usr/bin/env python3
"""
Script used to pull down the current video descriptions from ippsec's youtube channel.
The raw output still has a few HTML tags that need to be manually removed and there
also seem to be multiple duplicates of videos that have been removed in the output
saved as ippsec-details.txt
"""
import re
import sys
@cptfrankdatank
cptfrankdatank / all.txt
Created March 24, 2019 04:45 — forked from jhaddix/all.txt
all wordlists from every dns enumeration tool... ever. Please excuse the lewd entries =/
This file has been truncated, but you can view the full file.
.
..
........
@
*
*.*
*.*.*
🐎

How to pass the OSCP

  1. Recon
  2. Find vuln
  3. Exploit
  4. Document it

Recon

Unicornscans in cli, nmap in msfconsole to help store loot in database.

tmux cheatsheet

As configured in my dotfiles.

start new:

tmux

start new with session name: