The Hacker Recipes
CtrlK
GitHubTwitterExegolTools
  • Introduction
  • Active Directory
    • Reconnaissance
    • Movement
    • Persistence
  • Web services
    • Reconnaissance
    • Configuration
    • Accounts and sessions
    • User inputs
  • Systems & services
    • Reconnaissance
    • Initial access (protocols)
    • Initial access (phishing)
    • Privilege escalation
    • Pivoting
  • Evasion
    • (AV) Anti-Virus
    • 🛠️(EDR) Endpoint Detection and Response
  • 🛠️Physical
    • Locks
    • Networking
    • Machines
      • HID injection
      • Keylogging
      • BIOS security
      • Encryption
      • Airstrike attack
    • Super secret zones
  • 🛠️Intelligence gathering
    • CYBINT
    • OSINT
    • GEOINT
  • 🛠️RADIO
    • RFID
    • Bluetooth
    • Wi-Fi
    • Wireless keyboard/mouse
  • 🛠️mobile apps
    • Android
    • iOS
Powered by GitBook
On this page

Was this helpful?

  1. 🛠️Physical

Machines

HID injectionKeyloggingBIOS securityEncryptionAirstrike attack
PreviousNetwork Access ControlNextHID injection

Last updated 3 years ago

Was this helpful?