SpellBook

    • <- Back to main page
    • Welcome!
      • Bug Bounty Dorks
      • DNS
      • Public S3 Buckets
      • Source Code
      • Subdomain Enumeration
      • Port Scan
      • Web Assets Enumeration
          • Basic HTTP Auth
          • Blind SQL I
          • Code Injection
          • Csrf
          • File Upload
          • Graph Ql
          • ID Or
          • JWT
          • Lfi
          • Oauth
          • Pdf Generation Injection
          • Saml
          • SQL Injection
          • Ssrf
          • Template Injection ( Ssti)
          • Websocket
          • Xss
          • Xxe
          • Cache Poisoning
          • Crlf Injection
          • Hosts Header Attacks
          • Ldap Injection
          • Mongodb Injection
          • Padding Oracles
          • Request Smuggling
          • Session Puzzling
          • Ssi Injection
          • Tls ( Ssl) Attacks
          • Xpath Injection
          • Xslt Injection
          • Drupal
          • Git Lab
          • Jenkins
          • Joomla
          • Nexus Repository Manager
          • Prtg
          • Splunk
          • Tomcat
          • Word Press
            • Asp. Net
            • Introduction
            • Php
            • Python
          • Decompilation Tools
          • Iis Installation
          • Prototype Pollution
          • Type Juggling
        • HTTP Common Sense
        • HTTP S Exfiltration Server
        • Scripts
        • Webshells
      • 110,995 Tcp POP3
      • 1151 Tcp Oracle Db
      • 143,993 Tcp IMAP
      • 1433 Tcp Mssql
      • 161,162,10161,10162 UDP SNMP
      • 2049 Tcp Nfs
      • 21 Tcp FTP
      • 25,465,587 Tcp SMTP
      • 27017 Tcp Mongodb
      • 3306 Tcp My SQL
      • 4222 Tcp NAT S
      • 445 Tcp Smb
      • 623 UDP IP Mi
      • 873 Tcp Rsync
      • Default Credentials
      • R Services
      • Rdp
      • Smb
      • Timeroasting
      • Win Rm
      • Applocker
      • Defender
      • Firewall
      • Powershell
      • Restriced Shell
          • Dirty Pipe
          • Logrotate
          • Netfilter
          • Sudo Cve
          • Adm
          • Docker
          • Lxc
        • Credential Search
        • Crontab
        • Enumeration
        • Kubernetes
        • Nfs
        • Path Injection
        • Python Library Hijack
        • Sudo
          • Always Install Elevated
          • DNS Admins
          • Event Log Readers
          • Print Operators
          • Se Backup Privilege
          • Se Debug Privilege
          • Se Impersonate Privilege
          • Se Restore Privilege
          • Server Operators
          • Se Take Ownership Privilege
        • Credential Looting
        • Dpapi
        • Enumeration
        • Print Nightmare
        • Uac Bypass
        • User Interactions
      • Dump Lsass
      • Dump Sam
      • Kerberos Keytab Linux
      • Kerberos Kirbi Windows
      • Laps
      • Virtual Disks
      • Network Hosts
      • Password Policy
      • Ping Sweep
      • User Enumeration
      • Chisel
      • Dnscat2
      • Ligolo Ng
      • Metasploit
      • Port Forward
      • SSH
      • Adcs Attacks
      • Bloodhound
      • Dacl Abuse
      • Dcsync
      • Enumeration
      • Impacket *Exec
      • Kerberoasting
      • Kerberos
      • No Pac
      • Ntlm Relay
      • Password Spray From Linux
      • Password Spray From Windows
      • Rdp Session Hijacking
      • Relay Potato
      • Runas
      • Edge Cases
      • Encrypted Transfer
      • Linux Target
      • Nginx
      • Rdp
      • Windows Target
      • Win Rm
      • Interactive Shell
      • Python Eval Bypass
      • Tips and Setup
      • Hashcat
      • Hash ID
      • John
      • Cewl
      • Metasploit
      • Node Js
      • Open Ssl
      • Powershell
      • Sed
      • Shell Fu
      • SQL Syntax
      • Sqlmap

    Decompilation Tools

    • Dotpeek (Windows)
    • FernFlower
    • JD-GUI ( Windows)

    .NET#

    Better use windows for this. ilSPY is a little too unstable

    Dotpeek (Windows)#

    https://www.jetbrains.com/decompiler/

    Java#

    FernFlower#

    Tool to decompile java archive. Install guide:

    git clone https://github.com/JetBrains/fernflower.git
    cd fernflower
    ./gradlew build
    cd build/libs

    Usage:

    mkdir src
    java -jar fernflower.jar app.jar src
    cd src
    jar -xf app.jar

    JD-GUI ( Windows)#

    https://java-decompiler.github.io/ https://www.java.com/en/download/

    Backward Python Iis Installation Forward
    • Dotpeek (Windows)
    • FernFlower
    • JD-GUI ( Windows)