hackache
search
⌘Ctrlk
hackache
  • cube[ Hackache ]
  • arrow-progressMetodología
  • linuxLINUX
    • Enumeración
    • Linux
    • Port fordwarding
    • Privilege Escalation
    • Python
    • Reverse Shell
    • Setup
    • Shell interactiva estable
    • Shells
    • Webshell
  • windowsWINDOWS
    • Windows
    • Active Directory
    • Enumeración
    • Privilege Escalation
    • Reverse Shell
    • Transferencia de archivos
  • spider-black-widowvulnerabilities/ATTACKS
    • Vulnerabilities/Attacks
  • databaseDatabases
  • hiveBlockchain
  • globe-pointerCMS
  • binary-lockCryptography
  • microchipHardware
  • helmet-battlePayloads
  • code-simpleProgramming
  • book-bookmarkResources
  • arrow-up-right-and-arrow-down-left-from-centerReversing
  • servicestackServices
  • screwdriver-wrenchTools
  • diamonds-4Various
    • Attacking Applications Connecting to Services
    • ColdFusion
    • Gitlab
    • LDAP
    • osTicket
    • PRTG Network Monitor
    • Splunk
    • Thick Client Applications
    • Web Mass Assignment
  • serverWebservers
  • square-listWordlists
  • cubeHack The Box
    • Academy
    • Challenges
    • CTF
    • Machines
    • Pro Labs
    • Sherlocks
  • OverTheWire
  • Vulnyx
    • Machines
  • DOCKER LABS
    • Machines
  • The Hackers Labs
    • Machines
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. diamonds-4Various

Thick Client Applications

hashtag
Information Gathering

https://ntcore.com/explorer-suite/arrow-up-right

https://github.com/horsicq/Detect-It-Easyarrow-up-right

https://learn.microsoft.com/en-us/sysinternals/downloads/procmonarrow-up-right

https://learn.microsoft.com/en-us/sysinternals/downloads/stringsarrow-up-right

hashtag
Client Side attacks

  • dnspy

  • frida

  • ghidra

  • ida

  • jadx

  • ollydbg

  • radare2

  • x64dbg

hashtag
Network Side Attacks

  • wireshark

  • tcpdump

  • tcpview

  • burpsuite

PreviousSplunkchevron-leftNextWeb Mass Assignmentchevron-right

Last updated 4 months ago

  • Information Gathering
  • Client Side attacks
  • Network Side Attacks