# security / hacking

- [Domain Exploitation](/security/hacking/domain-exploitation.md)
- [Execution (TA0002)](/security/hacking/domain-exploitation/execution.md): The adversary is trying to run malicious code. https://attack.mitre.org/tactics/TA0002/
- [Persistence (TA0003)](/security/hacking/domain-exploitation/persistence.md): The adversary is trying to maintain their foothold. https://attack.mitre.org/tactics/TA0003/
- [Privilege Escalation (TA0004)](/security/hacking/domain-exploitation/privilege-escalation.md): The adversary is trying to gain higher-level permissions. https://attack.mitre.org/tactics/TA0004/
- [Defense Evasion (TA0005)](/security/hacking/domain-exploitation/defense-evasion.md): The adversary is trying to avoid being detected. https://attack.mitre.org/tactics/TA0005/
- [Credential Access (TA0006)](/security/hacking/domain-exploitation/credential-access.md): The adversary is trying to steal account names and passwords. https://attack.mitre.org/tactics/TA0006/
- [Discovery (TA0007)](/security/hacking/domain-exploitation/discovery.md): The adversary is trying to figure out your environment. https://attack.mitre.org/tactics/TA0007/
- [Lateral Movement (TA0008)](/security/hacking/domain-exploitation/lateral-movement.md): The adversary is trying to move through your environment. https://attack.mitre.org/tactics/TA0008/
- [Command and Control (TA0011)](/security/hacking/domain-exploitation/command-and-control.md): The adversary is trying to communicate with compromised systems to control them. https://attack.mitre.org/tactics/TA0011/
- [Impact (TA0040)](/security/hacking/domain-exploitation/impact.md): The adversary is trying to manipulate, interrupt, or destroy your systems and data. https://attack.mitre.org/tactics/TA0040/
- [Tools and Services](/security/hacking/tools-and-services.md)
- [Adobe Experience Manager (AEM)](/security/hacking/tools-and-services/adobe-experience-manager-aem.md)
- [amass](/security/hacking/tools-and-services/amass.md)
- [ike-scan](/security/hacking/tools-and-services/ike-scan.md)
- [jq](/security/hacking/tools-and-services/jq.md)
- [Shodan](/security/hacking/tools-and-services/shodan.md)
- [smbmap](/security/hacking/tools-and-services/smbmap.md)
- [tmux](/security/hacking/tools-and-services/tmux.md)
- [tshark](/security/hacking/tools-and-services/tshark.md)
- [Voice Over IP (VoIP)](/security/hacking/tools-and-services/voice-over-ip-voip.md)
- [One-Liners and Dirty Scripts](/security/hacking/one-liners-and-dirty-scripts.md): They don't have to be elegant, they just have to get the job done.
- [MSFvenom Cheatsheet](/security/hacking/msfvenom-cheetsheet.md): My various MSFvenom commands to generate shellcode, reverse shells, and meterpreter payloads that I end up using over, and over, and over, and over...
- [Web Application Hacking](/security/hacking/web-application-hacking.md)
- [Cross-Site Scripting (XSS)](/security/hacking/web-application-hacking/cross-site-scripting-xxs.md)
- [SQL Injection (SQLi)](/security/hacking/web-application-hacking/sql-injection-sqli.md)
- [OSCP / PWK - Random Tips and Tricks](/security/hacking/oscp-pwk-random-tips-and-tricks.md)
