# Generic Methodologies & Resources

- [Pentesting Methodology](/hacktricks/generic-methodologies-and-resources/pentesting-methodology.md)
- [External Recon Methodology](/hacktricks/generic-methodologies-and-resources/external-recon-methodology.md)
- [Wide Source Code Search](/hacktricks/generic-methodologies-and-resources/external-recon-methodology/wide-source-code-search.md)
- [Github Dorks & Leaks](/hacktricks/generic-methodologies-and-resources/external-recon-methodology/github-leaked-secrets.md)
- [Pentesting Network](/hacktricks/generic-methodologies-and-resources/pentesting-network.md)
- [DHCPv6](/hacktricks/generic-methodologies-and-resources/pentesting-network/dhcpv6.md)
- [EIGRP Attacks](/hacktricks/generic-methodologies-and-resources/pentesting-network/eigrp-attacks.md)
- [GLBP & HSRP Attacks](/hacktricks/generic-methodologies-and-resources/pentesting-network/glbp-and-hsrp-attacks.md)
- [IDS and IPS Evasion](/hacktricks/generic-methodologies-and-resources/pentesting-network/ids-evasion.md)
- [Lateral VLAN Segmentation Bypass](/hacktricks/generic-methodologies-and-resources/pentesting-network/lateral-vlan-segmentation-bypass.md)
- [Network Protocols Explained (ESP)](/hacktricks/generic-methodologies-and-resources/pentesting-network/network-protocols-explained-esp.md)
- [Nmap Summary (ESP)](/hacktricks/generic-methodologies-and-resources/pentesting-network/nmap-summary-esp.md)
- [Pentesting IPv6](/hacktricks/generic-methodologies-and-resources/pentesting-network/pentesting-ipv6.md)
- [WebRTC DoS](/hacktricks/generic-methodologies-and-resources/pentesting-network/webrtc-dos.md)
- [Spoofing LLMNR, NBT-NS, mDNS/DNS and WPAD and Relay Attacks](/hacktricks/generic-methodologies-and-resources/pentesting-network/spoofing-llmnr-nbt-ns-mdns-dns-and-wpad-and-relay-attacks.md)
- [Spoofing SSDP and UPnP Devices with EvilSSDP](/hacktricks/generic-methodologies-and-resources/pentesting-network/spoofing-ssdp-and-upnp-devices.md)
- [Pentesting Wifi](/hacktricks/generic-methodologies-and-resources/pentesting-wifi.md)
- [Evil Twin EAP-TLS](/hacktricks/generic-methodologies-and-resources/pentesting-wifi/evil-twin-eap-tls.md)
- [Phishing Methodology](/hacktricks/generic-methodologies-and-resources/phishing-methodology.md)
- [Clone a Website](/hacktricks/generic-methodologies-and-resources/phishing-methodology/clone-a-website.md)
- [Detecting Phishing](/hacktricks/generic-methodologies-and-resources/phishing-methodology/detecting-phising.md)
- [Phishing Files & Documents](/hacktricks/generic-methodologies-and-resources/phishing-methodology/phishing-documents.md)
- [Basic Forensic Methodology](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology.md)
- [Baseline Monitoring](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/file-integrity-monitoring.md)
- [Anti-Forensic Techniques](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/anti-forensic-techniques.md)
- [Docker Forensics](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/docker-forensics.md)
- [Image Acquisition & Mount](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/image-acquisition-and-mount.md)
- [Linux Forensics](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/linux-forensics.md)
- [Malware Analysis](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/malware-analysis.md)
- [Memory dump analysis](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/memory-dump-analysis.md)
- [Volatility - CheatSheet](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/memory-dump-analysis/volatility-cheatsheet.md)
- [Partitions/File Systems/Carving](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/partitions-file-systems-carving.md)
- [File/Data Carving & Recovery Tools](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/partitions-file-systems-carving/file-data-carving-recovery-tools.md)
- [Pcap Inspection](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/pcap-inspection.md)
- [DNSCat pcap analysis](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/pcap-inspection/dnscat-exfiltration.md)
- [Suricata & Iptables cheatsheet](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/pcap-inspection/suricata-and-iptables-cheatsheet.md)
- [USB Keystrokes](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/pcap-inspection/usb-keystrokes.md)
- [Wifi Pcap Analysis](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/pcap-inspection/wifi-pcap-analysis.md)
- [Wireshark tricks](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/pcap-inspection/wireshark-tricks.md)
- [Specific Software/File-Type Tricks](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks.md)
- [Decompile compiled python binaries (exe, elf) - Retreive from .pyc](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/.pyc.md)
- [Browser Artifacts](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/browser-artifacts.md)
- [Deofuscation vbs (cscript.exe)](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/desofuscation-vbs-cscript.exe.md)
- [Local Cloud Storage](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/local-cloud-storage.md)
- [Office file analysis](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/office-file-analysis.md)
- [PDF File analysis](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/pdf-file-analysis.md)
- [PNG tricks](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/png-tricks.md)
- [Video and Audio file analysis](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/video-and-audio-file-analysis.md)
- [ZIPs tricks](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/zips-tricks.md)
- [Windows Artifacts](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/windows-forensics.md)
- [Interesting Windows Registry Keys](/hacktricks/generic-methodologies-and-resources/basic-forensic-methodology/windows-forensics/interesting-windows-registry-keys.md)
- [Brute Force - CheatSheet](/hacktricks/generic-methodologies-and-resources/brute-force.md)
- [Python Sandbox Escape & Pyscript](/hacktricks/generic-methodologies-and-resources/python.md)
- [Bypass Python sandboxes](/hacktricks/generic-methodologies-and-resources/python/bypass-python-sandboxes.md)
- [LOAD\_NAME / LOAD\_CONST opcode OOB Read](/hacktricks/generic-methodologies-and-resources/python/bypass-python-sandboxes/load_name-load_const-opcode-oob-read.md)
- [Class Pollution (Python's Prototype Pollution)](/hacktricks/generic-methodologies-and-resources/python/class-pollution-pythons-prototype-pollution.md)
- [Python Internal Read Gadgets](/hacktricks/generic-methodologies-and-resources/python/python-internal-read-gadgets.md)
- [Pyscript](/hacktricks/generic-methodologies-and-resources/python/pyscript.md)
- [venv](/hacktricks/generic-methodologies-and-resources/python/venv.md)
- [Web Requests](/hacktricks/generic-methodologies-and-resources/python/web-requests.md)
- [Bruteforce hash (few chars)](/hacktricks/generic-methodologies-and-resources/python/bruteforce-hash-few-chars.md)
- [Basic Python](/hacktricks/generic-methodologies-and-resources/python/basic-python.md)
- [Exfiltration](/hacktricks/generic-methodologies-and-resources/exfiltration.md)
- [Tunneling and Port Forwarding](/hacktricks/generic-methodologies-and-resources/tunneling-and-port-forwarding.md)
- [Threat Modeling](/hacktricks/generic-methodologies-and-resources/threat-modeling.md)
- [Search Exploits](/hacktricks/generic-methodologies-and-resources/search-exploits.md)
- [Reverse Shells (Linux, Windows, MSFVenom)](/hacktricks/generic-methodologies-and-resources/reverse-shells.md)
- [MSFVenom - CheatSheet](/hacktricks/generic-methodologies-and-resources/reverse-shells/msfvenom.md)
- [Reverse Shells - Windows](/hacktricks/generic-methodologies-and-resources/reverse-shells/windows.md)
- [Reverse Shells - Linux](/hacktricks/generic-methodologies-and-resources/reverse-shells/linux.md)
- [Full TTYs](/hacktricks/generic-methodologies-and-resources/reverse-shells/full-ttys.md)
