Main Index

0001-01-01

This is the main index of my Knowledge Management System.

This is not a complete index, and may be out of alphabetical order. Deal with it!

0-9, special characters
0-day
010 Editor
13x4 system
31337
3snake SSH credential stealer
7350ssharp SSH MiTM tool
7-Zip
A
account
Active Directory
activity cluster
ADCC
Administrator User
Adore rootkit
Advanced Encryption Standard (AES)
Advanced Persistent Threat (APT)
advapi32.dll
adversary
Africa
Aircrack-ng
Air Force
AIX
alert fatigue
algorithms
aliases
allow listing
Amateur Radio
AMSI
Android
ANSI
antenna
anti-analysis
anti-exploitation
anti-forensics
anti-malware
anti-sandbox
anti-tamper
anti-virus
Apache HTTP Server
API
APT28
arm bar
arm drag
ARP
artifact
Artificial Intelligence
ashi waza
ASLR
assassin choke
assembly language
assume breach model
at scale
attack surface
attack and defend CTF
attack systems (BJJ)
attribution
auditd
Australia
authentication
authenticity
autoconf
autoruns
autotools
availability
Azazel rootkit
Azure
B
back control (BJJ)
backdoor
backups
bandwidth
banking trojan
banner grabbing
Baret Yoshida
base64
base (BJJ)
bash
bdvl rootkit
benchmark (cybersecurity)
Benjamin Franklin
Berkeley R commands
Berkeley sockets
best practice
Bettercap
BERUK rootkit
bicep slicer
binary analysis
binary tree
bind shell
binutils
Bitcoin
black belt (BJJ)
Blackcat ransomware
black friday
black magic
blind spot
blockchain
blog
Bloodhound
bloom filter
blue team
board game
Bokbot malware
booter malware
botnet
bow and arrow choke
Boxing
BPF
Brazil
Brazilian Jiu Jitsu
breakout time
Brian Krebs
Broodsac malware
brute force
BSD
Buckshot Yankee
bug bounty
bug (computer)
build system
burneye
Burp Suite
Busybox
Bvp47
bypass (cybersecurity)
C
C programming language
cache
caddis
California
calisthenics
callback function
Camel Case
Canada
cantenna
Capture the Flag (CTF)
Carlos Gracie
Carlos Gracie Jr.
Catch Wrestling
cat paw grip
CCDC (CTF)
cd00r
Central Intelligence Agency (CIA)
cewl
ChaCha20
Chaos malware
chat
Chess
chest to chest (BJJ)
chest wrap (BJJ)
China
chisel
CIA triad
cipher
Cybersecurity and Infrastructure Security Agency (CISA)
Cisco Systems
Cisco Talos
ClamAV
clang
class (software)
click bait
clock choke
closed guard
cloud computing
CMake
cmd.exe
Cobalt Strike
code cave
code completion
code maintainability
code reuse
combat sport
command and control (C2)
command line
Common Gateway Interface (CGI)
Common Object File Format (COFF)
compiler
compression
computer network
computer programming
computer science
ComRAT
concatenation
configuration file
configuration management
consent
constant
consumer
container
containment
continent
copyright infringement
coral belt (BJJ)
core dump
country
Covenant
covert channel
COVID-19
cowrie
cppcheck
CPU
crackmes
CrackStation
credential
credential leak
credential stealer
Criminology
cron
CronRAT
cron persistence
cross compiler
cross platform
CrowdStrike
CrowdStrike Falcon
crucifix (BJJ)
cryptanalysis
crypter
cryptocurrency
cryptocurrency miner
cryptocurrency wallet
Cryptography
Cyber Threat Intelligence (CTI)
curl
curses
CVE
cwd
cyber
cyberattack
CyberChef
cyberespionage
cyber kill chain
cybersecurity
cyphertext
D
daemon
DanderSpritz
dangerous technique
Daniel J Bernstein
Daniel Miessler
Daniel Roberson
Dan Kaminsky
Dan Rather
dark arts
database
data retention policy
Data Science
data structure
DDoS
DDoSTF malware
dead box forensics
Debian
debugger
decentralized
deception
decompile
Decoy Dog malware
decryption
deep packet inspection
default insecure
default password
default setting
DEF CON
DEF CON group
Defense in Depth
defense system (BJJ)
DoS
Dennis Ritchie
Department of Defense
Department of Energy
Department of Homeland Security
detection
DevOps
DHCP
Diamorphine rootkit
diceware
dictionary attack
Didier Stevens
Digital Forensics
digital signature
Diicot APT group
directory
Discord
distributed computing
DLL
DLL injection
Digital Mobile Radio (DMR)
DNS
dnscat2
dnSpy
Docker
documentation
Domain Controller
domain generation algorithm (DGA)
domain name
domain specific language
dominant position (BJJ)
Dominique Bell
Donald Trump
dopamine
DOS
dotPeek
DoubleFantasy
double under guard pass
drilling (BJJ)
DropBox
dropper
dsniff
Dug Song
dumpbin.exe
DVR
DWARF
dynamic analysis
dynamic linker
dynamic obfuscation
E
Ebury
EDITOR
EDR
EDR evasion
EFnet
Egan Inoue
ELF
elfcore
ELF header
elfmaster
Emacs
email
embedded system
Emotet
encode
encrypt
endianness
England
Engle Jiu Jitsu
entropy
entry point
enumerate processes
enumerate users
environ file
environment
environment variable
equation
Equation Group
ERESI
Eric Zimmerman
Eric Zimmerman’s tools
espionage
EternalBlue
EtherPeek
EULA
Europe
evasion (network security)
EvE Online
evidence
evil-winrm
Excel
Executive Branch
exercise
exfiltration
explore2fs
exploits and 0-day as attribution
exponent
EXT4
ext4magic
extensible
Extreme Networks
Ezuri
F
F3EAD
Facebook
Fail2Ban
fallacy
false attribution
false negative
false positive
fartlek
FBI
FCC
fdisk
Federal Security Service
FERPA
ffuf
Fibonacci sequence
file carving
file command
file descriptor
file extension
file format
File Header (PE)
file infector
fileless malware
file magic
file manager
filename
filesystem
file transfer
file upload bug
FIN7
find command
finger
fingerprint
FireEye
firewall
FLOSS
flyspell
FOIA request
foremost
forensic analysis
forensic evidence
Forensic Science
format string vulnerability
four corners drill (BJJ)
fraction
frame (BJJ)
FreeBSD
Free Software Foundation
Freedom of Information Act
FTP
ftrace
function
function name randomization
fuzz testing
fuzzy hashing
FX (hacker)
G
game theory
gcc
gcore
gdb
GECOS
Gelsemium
Gentoo Linux
geolocation
Germany
GHCQ
Ghidra
gi
gid
giskismet
Git
GitHub
Gitlab
GNU project
Go
golden image
Google
googletest
gpg
gprof
GPRS
GMRS
GPS
GPU
Gracie family
graph theory
graphviz
grappling
grease the groove
GReAT
Greenbone Vulnerability Management
greetz
grep
GRU
grugq
gscript
guard
guard passing
GUI
gzip
H
hacker
hacker culture
HERT
hacker group
HackForums
hacking back
hacktivist
half guard
hand fighting
handle
hands on keyboard
hard-coded
hard-coded passwords
hardening
hash algorithm
hashcat
hash cracking
hasherezade
hashtag
HASSH
Hawaii
HD Moore
heap
heap overflow
Heartbleed
Helio Gracie
Hell’s Gate
Herbivore (SSH)
heuristic detection
hexadecimal
hexdump
hex editor
hidden files and directories
HiddenWasp
high ground
high ground (BJJ)
HildeGard
HISTFILE
history file
Hive Ransomware
HOME
homebrew
home directory
homefield advantage
honeypot
homoglyph obfuscation
Hong Kong
hooks
hop (networking)
Hopper disassembler
Houston
hping3
hostnamectl
HRTest
HTML
HTTP
HTTPS
hub note
hugo
human-readable
hydra
hyperlink
I
ICB
icesword webshell
ICMP
ICMP tunneling
IDE
identity theft
IEEE
ILSpy
Ilya Matveychikov
imphash
implant
Import Address Table
Incident Responder
Incident Response
Incident Response Plan
indicators of compromise
industrial espionage
inferior position
infinite loop
information security
initial access
init process
init system
injection
inode
input device
Instagram
instruction set
instrumentation
integer
IDE
intelligence
integrity
intelligence agency
interactive shell
interleaved textbook
Internet
internet-facing
internet of things
Internet Protocol
internet-wide scanning
interpreter
interprocess communication
interval notation
interval training
in the wild
intrusion
iOS
IP address
IP address obfuscation
IP camera
IPFire
IPfuscation
IPS
IPv4
IPv6
Iran
Iraq
IRC
IRIX
irrational number
irssi
ISP
Israel
J
Japan
Java
JavaScript
Jean Jacques Machado
John Strand
John the Ripper
John Wayne sweep
Jordan
journalist
JSON
JSP
Juan Cespedes
Judo
judogi
Julian Assange
Jynx rootkit
K
Kaiji malware
Kaiten malware
Kali Linux
Karl Grindal
Kaspersky
Kelly Air Force Base
Ken Thompson
Kerberos
kernel
kernel32.dll
kettlebells
Kevin Mitnick
keyboard
keylogger
keystroke
keystroke latency attack
KGB
Kimura
kinit
kismet
kmatryoyshka
knee on belly
knowledge management system
known_hosts
known_hosts cracking
known plaintext attack
KrebsOnSecurity
Kurt Baumgartner
L
language server
lasso guard
Las Vegas
lateral movement
LDAP
LD_AUDIT
ldd
LD_PRELOAD
ld.so
leak
LeanPub
least privilege
Lebanon
leetspeak
legacy code
Leo Tolstoy
Levant
Levenshtein distance
libext2fs
libmagic
libnet
libpcap
libpreloadvaccine
libprocesshider
Libre Office
libtool
Linear Algebra
line drilling
linked list
linker
linker scripts
linter
Linus Torvalds
Linux
Linux distribution
Linux From Scratch
Linux Kernel
Linux malware
Linux Users Group
live forensics
living off the land
lizard squad
LKM
LKM rootkit
LNK file
load balancer
lockflow
Lockheed Martin
log files
logical operation
log rotation
log wiper
LOKI2
LOLbin
London
loops
loop unrolling
low-hanging fruit
low single takedown
LSASS
ltrace
Lua
M
MAC address
MACfuscation
machine learning
machine language
Mach-O
masochism and sadism in hacker culture
macOS
macOS malware
macro
Magecart
magic packet
magic stick
main function
major mode
malloc
malvuln project
malware
malware analysis
malware campaign
malware capabilities
malware classes
malware development
malware family
malware propagation
malware strain
malware triage
ManageEngine
Mandiant
man hour
man in the middle
man pages
manual analysis
markdown
martial art
Martin Roesch
mask attack
masochism
masscan
mass storage device
Mathematics
matryoshka obfuscation
Matt Graeber
Maya’s Veil
MD5
mean
Melbourne
MemFiles
memoir
memory corruption
memory forensics
memory management
Merlin C2
metadata
Metasploit
Meterpreter
method
Mexico
MFA
Michael Boelen
micro drilling
Microsoft
Microsoft ATA
Microsoft Defender
Microsoft Exchange
Microsoft Office
Microsoft Word
Middle East
midgetpack
midnight commander
Mike Schiffman
Mike Tyson
milestone
military
million dollar dream
mimikatz
mind map
MinGW
minidump
mining pool
minor mode
MIPS
Mirai
mIRC
mitigation
MITRE
MITRE ATT&CK
MMA
mobile device
mobile radio
mod_backdoor
modular malware
modular software
Monero
Moonlight Maze
Mossad
Motorola
mount (BJJ)
MPEG
MS-DOS
msfvenom
MSVC build system
multiplatform malware
multiplayer command and control
Murilo Santana
musl
mutex
mutt
Mylene Engle
MySQL
Mythic
N
named pipe
nanodump
NASA
nasm
NAT
NSA
Native API
NATO
natural language processing
ndiff
ne0nd0g
negative
Nessus
.NET
.NET assembly
NetBSD
netcat
Netflix
netstat
network equipment
network protocol
network security
network segment
network tap
NTP
neurotransmitter
Nevada
newsboat
NginRAT
nginx
NIC
NIDS
nikto
Nir Sofer
NirSoft
Nirvana fallacy
Nmap
NoaBot
nobody user
no gi
non-repudiation
North America
north south position
No Starch Press
Notepad
note taking
NSE
NtCreateProcess
ntdll.dll
NT header
ntoskrnl
ntpd
number
number line
O
obfuscation
objcopy
objdump
object
object file
Objective-C
object-oriented
objobf
older protocols
old malware
omoplata
omoplata crucifix
OneDrive
one-liner
OneNote
online learning
OpenBSD
OpenPGP
open source
OpenSSH
OpenSSL
OpenThread
OpenVAS
OpenWRT
operating system
OPSEC
OPNsense
Optional Header
Oracle
order of operations
organized crime
Org-Mode
Org-Roam
OSCP
OSINT
osoto gari
osquery
otto
Outlook
overhead press
ox-hugo
P
package
package manager
packer
Packer (Hashicorp)
packet
packet capture
Q
R
S
T
U
V
W
X
Y
Z

Links to this note