💻
OSWE Everything
Ctrlk
💻
OSWE Everything
Ctrlk
  • Recon
    • General Information Gathering
    • Blackbox API Discovery
    • Working with Websockets
  • VULNERABILITIES
    • Cross Site Scripting
    • Insecure Deserialization
    • SQL Injection
    • XML External Entity (XXE)
    • JavaScript Prototype Pollution
    • Server Side Request Forgery (SSRF)
    • OS Command Injection
    • Server Side Template Injection
    • Authentication Bypass
    • Type Juggling [archived]
    • Insecure Defaults
    • Unsecure Random Function
    • Cross Origin Resource Sharing (CORS)
    • Client Side Request Forgery (CSRF)
    • Dangerous Functions
    • Path Traversal
  • Exploitation Options
    • OSWE Syllabus Table
    • Authorization Bypass Options
    • RCE Options
  • Exploit Writing
    • Cheatsheet
      • String escaper
      • Command line arguments
      • Requests and proxy
      • Useful scripts
    • XSS Catcher
    • My Own Skeleton Scripts
    • Skeleton Scripts
  • Code review
    • Downloading the code
    • Manual code review
    • Decompilation
    • Managing the application
    • Check periodically run files by Application [NEW]
  • Debbuging
    • Debbuging [NEW]
    • Remote Debbuging [NEW]
    • Payload creation [.NET]
    • Local mail server
    • Database Debugging
  • Preparation Machines
    • [HTB] Vault
    • [HTB] Arkham
    • Other HTB scripts
  • ADDITIONAL INFORMATION
    • Sources
    • RDP connection
    • Reverse Shells [NEW]
  • External Resources
    • Another OSWE Prep
    • WhiteBox Pentest
Powered by GitBook
On this page
  1. Exploit Writing

Cheatsheet

String escaperCommand line argumentsRequests and proxyUseful scripts
PreviousRCE OptionsNextString escaper