Learn The Shell is a collection of tips, tricks and cheatsheets to help you getting your tasks done using the command line interface.
Recent Cheatsheets
rdesktop
rdesktop luks
Luks reverse-shells
Reverse shells java
Java ruby
Ruby raspberrypi
Raspberry Pi go
Go certbot
Certbot python
Python interactsh
Interactsh imagemagick
ImageMagick ldap
ldap nuclei
Nuclei expect
Expect sudo
sudo tcpdump
tcpdump ffuf
ffuf - Fuzz Faster U Fool nmap
Nmap aws
AWS CLI postgres
PostgreSQL mysql
MySQL jq
Command-line JSON processor trufflehog
Trufflehog adb
Android Debug Bridge httpx
Httpx bash
Bash wget
Wget curl
curl nc
netcat rsync
rsync Recent Posts
Bind Shells: A Practical Guide
Published: at 05:19 PMIn continuation of the discussion on reverse shells, we now shift our focus to bind shells. Both methods offer remote access to systems, but while reverse shells require the target machine to connect back to the attacker's system, bind shells work the opposite way.
Reverse Shells: A Practical Guide
Published: at 10:51 PMIn the world of penetration testing, a reverse shell is a crucial concept. It allows an attacker to connect back to their own machine from a compromised target. Once connected, the attacker can execute commands on the target system, enabling various post-exploitation techniques.
Taking ffuf Fuzzing Further
Published: at 07:06 PMIn the second part of the guide, we’ll cover more advanced techniques, including the use of many wordlists in different fuzzing modes (such as clusterbomb, pitchfork, and sniper). How to leverage powerful matchers and filters. Additionally, we’ll explore scenarios, such as fuzzing POST requests with complex data structures like JSON, and how to work with HTTP headers.
Git Credential Management
Published: at 11:02 PMGit is the backbone of modern software development, helping developers manage and collaborate on code. When working with remote repositories, such as GitHub or GitLab, secure credential management becomes essential. Without proper management, you could find yourself constantly entering your username and password, which slows down your workflow and increases the risk of security issues.