Temporary mirror. Link back to it at your own risk!
Go to file
CPol d3fb573918
GITBOOK-4189: change request with no subject merged in GitBook
2023-12-13 23:28:49 +00:00
.gitbook/assets GITBOOK-4174: change request with no subject merged in GitBook 2023-12-04 09:33:43 +00:00
.github Update translate_in.yml 2023-11-06 12:58:51 +01:00
a.i.-exploiting/bra.i.nsmasher-presentation update twitter 2023-04-25 20:35:28 +02:00
backdoors GITBOOK-4148: change request with no subject merged in GitBook 2023-11-03 11:03:53 +00:00
blockchain/blockchain-and-crypto-currencies update twitter 2023-04-25 20:35:28 +02:00
c2 Update cobalt-strike.md 2023-02-17 12:42:27 -03:00
cryptography GITBOOK-4100: change request with no subject merged in GitBook 2023-09-28 15:09:34 +00:00
ctf-write-ups GITBOOK-3968: change request with no subject merged in GitBook 2023-06-06 22:57:49 +00:00
exploiting GITBOOK-4082: change request with no subject merged in GitBook 2023-09-13 23:27:12 +00:00
forensics/basic-forensic-methodology fix typo 2023-12-03 12:36:45 +01:00
generic-methodologies-and-resources GITBOOK-4184: change request with no subject merged in GitBook 2023-12-11 09:39:35 +00:00
linux-hardening hp 2023-12-04 16:57:41 +01:00
linux-unix/privilege-escalation update twitter 2023-04-25 20:35:28 +02:00
macos-hardening GITBOOK-4189: change request with no subject merged in GitBook 2023-12-13 23:28:49 +00:00
misc Merge pull request #716 from stoeps13/patch-1 2023-10-12 00:43:17 +02:00
mobile-pentesting GITBOOK-4184: change request with no subject merged in GitBook 2023-12-11 09:39:35 +00:00
network-services-pentesting hp 2023-12-04 16:57:41 +01:00
pentesting-web GITBOOK-4185: change request with no subject merged in GitBook 2023-12-11 10:10:20 +00:00
physical-attacks fix: typo in physical-attacks 2023-10-11 19:39:50 +03:00
radio-hacking update twitter 2023-04-25 20:35:28 +02:00
reversing intruder 2023-09-03 01:51:32 +02:00
stego Update stego-tricks.md - append to section "Some other image tools worth mentioning" 2023-10-17 16:33:53 -04:00
todo intruder 2023-09-03 01:51:32 +02:00
welcome Fix typo in hacktricks-values-and-faq.md 2023-11-03 00:43:38 -07:00
windows-hardening hp 2023-12-04 16:57:41 +01:00
.gitignore Update .gitignore 2023-06-25 15:55:55 +02:00
1911-pentesting-fox.md GITBOOK-3968: change request with no subject merged in GitBook 2023-06-06 22:57:49 +00:00
6881-udp-pentesting-bittorrent.md update twitter 2023-04-25 20:35:28 +02:00
LICENSE.md update twitter 2023-04-25 20:35:28 +02:00
README.md GITBOOK-4180: change request with no subject merged in GitBook 2023-12-05 11:51:09 +00:00
SUMMARY.md GITBOOK-4173: change request with no subject merged in GitBook 2023-12-04 09:24:40 +00:00
android-forensics.md update twitter 2023-04-25 20:35:28 +02:00
burp-suite.md update twitter 2023-04-25 20:35:28 +02:00
emails-vulns.md update twitter 2023-04-25 20:35:28 +02:00
interesting-http.md update twitter 2023-04-25 20:35:28 +02:00
online-platforms-with-api.md update twitter 2023-04-25 20:35:28 +02:00
other-web-tricks.md asd 2023-05-31 12:24:06 +02:00
pentesting-dns.md update twitter 2023-04-25 20:35:28 +02:00
post-exploitation.md update twitter 2023-04-25 20:35:28 +02:00
stealing-sensitive-information-disclosure-from-a-web.md GITBOOK-4048: change request with no subject merged in GitBook 2023-08-24 08:49:18 +00:00



Hacktricks logos & motion design by @ppiernacho.

{% hint style="success" %} Welcome to the wiki where you will find each hacking trick/technique/whatever I have learnt from CTFs, real life apps, reading researches, and news. {% endhint %}

To get started follow this page where you will find the typical flow that you should follow when pentesting one or more machines:

{% content-ref url="generic-methodologies-and-resources/pentesting-methodology.md" %} pentesting-methodology.md {% endcontent-ref %}

Platinum Sponsors

Your company could be here.

Corporate Sponsors

STM Cyber

STM Cyber is a great cybersecurity company whose slogan is HACK THE UNHACKABLE. They perform their own research and develop their own hacking tools to offer several valuable cybersecurity services like pentesting, Red teams and training.

You can check their blog in https://blog.stmcyber.com

STM Cyber also support cybersecurity open source projects like HackTricks :)


RootedCON is the most relevant cybersecurity event in Spain and one of the most important in Europe. With the mission of promoting technical knowledge, this congress is a boiling meeting point for technology and cybersecurity professionals in every discipline.

{% embed url="https://www.rootedcon.com/" %}


Intigriti is the Europe's #1 ethical hacking and bug bounty platform.

Bug bounty tip: sign up for Intigriti, a premium bug bounty platform created by hackers, for hackers! Join us at https://go.intigriti.com/hacktricks today, and start earning bounties up to $100,000!

{% embed url="https://go.intigriti.com/hacktricks" %}


Use Trickest to easily build and automate workflows powered by the world's most advanced community tools.

Get Access Today:

{% embed url="https://trickest.com/?utm_campaign=hacktrics&utm_medium=banner&utm_source=hacktricks" %}


Stay a step ahead in the cybersecurity game.

Intruder makes vulnerability management easy. Keep track of your attack surface, see where your company is vulnerable, and prioritize issues that leave your systems most exposed so you can focus on what matters most.

Run thousands of checks with a single platform that covers your entire tech stack from internal infrastructure to web apps, APIs and cloud systems. Integrate seamlessly with AWS, GCP, Azure and streamline DevOps so your team can implement fixes faster.

Intruder never rests. Round-the-clock protection monitors your systems 24/7. Want to learn more? Visit their site and take it for a spin with a free trial.

{% embed url="https://www.intruder.io/?utm_campaign=hacktricks&utm_source=referral" %}


Join HackenProof Discord server to communicate with experienced hackers and bug bounty hunters!

Hacking Insights
Engage with content that delves into the thrill and challenges of hacking

Real-Time Hack News
Keep up-to-date with fast-paced hacking world through real-time news and insights

Latest Announcements
Stay informed with the newest bug bounties launching and crucial platform updates

Join us on Discord and start collaborating with top hackers today!


WebSec is a professional cybersecurity company based in Amsterdam which helps protecting businesses all over the world against the latest cybersecurity threats by providing offensive-security services with a modern approach.

WebSec is an all-in-one security company which means they do it all; Pentesting, Security Audits, Awareness Trainings, Phishing Campagnes, Code Review, Exploit Development, Security Experts Outsourcing and much more.

Another cool thing about WebSec is that unlike the industry average WebSec is very confident in their skills, to such an extent that they guarantee the best quality results, it states on their website "If we can't hack it, You don't pay it!". For more info take a look at their website and blog!

In addition to the above WebSec is also a committed supporter of HackTricks.

{% embed url="https://www.youtube.com/watch?v=Zq2JycGDCPM" %}


DragonJAR is a leading offensive cybersecurity company located in Colombia. DragonJAR offers comprehensive offensive cybersecurity services, such as pentesting in various areas and practically any technology, Red Team attack simulations, physical security testing, stress testing, social engineering, source code security review, and cybersecurity training. Additionally, they organize the DragonJAR Security Conference, an international cybersecurity congress that has been held for over a decade, becoming a showcase for the latest security research in Spanish and of great relevance in the region.

DragonJAR es una empresa líder en ciberseguridad ofensiva ubicada en Colombia, DragonJAR ofrece servicios integrales de seguridad informática ofensiva, como pentesting en diversas áreas y prácticamente cualquier tecnología, simulaciones de ataque Red Team, pruebas de seguridad física, pruebas de estrés, ingeniería social, revisión de seguridad en código fuente y capacitación en seguridad informática. Asimismo, organiza la DragonJAR Security Conference, un congreso internacional de seguridad informática que se ha realizado durante más de una década, convirtiéndose en el escaparate para las últimas investigaciones de seguridad en español y de gran relevancia en la región.


Copyright © Carlos Polop 2023. Except where otherwise specified (the external information copied into the book belongs to the original authors), the text on HACK TRICKS by Carlos Polop is licensed under the Attribution-NonCommercial 4.0 International (CC BY-NC 4.0).
If you want to use it with commercial purposes, contact me.


{% hint style="danger" %} This book, 'HackTricks,' is intended for educational and informational purposes only. The content within this book is provided on an 'as is' basis, and the authors and publishers make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability, or availability of the information, products, services, or related graphics contained within this book. Any reliance you place on such information is therefore strictly at your own risk.

The authors and publishers shall in no event be liable for any loss or damage, including without limitation, indirect or consequential loss or damage, or any loss or damage whatsoever arising from loss of data or profits arising out of, or in connection with, the use of this book.

Furthermore, the techniques and tips described in this book are provided for educational and informational purposes only, and should not be used for any illegal or malicious activities. The authors and publishers do not condone or support any illegal or unethical activities, and any use of the information contained within this book is at the user's own risk and discretion.

The user is solely responsible for any actions taken based on the information contained within this book, and should always seek professional advice and assistance when attempting to implement any of the techniques or tips described herein.

By using this book, the user agrees to release the authors and publishers from any and all liability and responsibility for any damages, losses, or harm that may result from the use of this book or any of the information contained within it. {% endhint %}

☁️ HackTricks Cloud ☁️ -🐦 Twitter 🐦 - 🎙️ Twitch 🎙️ - 🎥 Youtube 🎥