Red Team Notes
1.0.0
1.0.0
  • Introduction
  • PowerShell
    • find_files_by_name
    • powershell_web_access
    • enable_psremoting
    • powershell_sans_cheat
    • powerup_-_privilege_escalation
    • user_enumeration
    • powershell_-_quickies
    • constrained_language_breakout
    • powershell_-_get-system
    • domain_enumeration
    • powershell
    • random_powershell
  • mainframe
    • tso_commands
    • nmap_stuff_-_recon
  • Links and Random
    • Commands--mount-shares
    • Commands--responder
    • Commands--nac_testing
    • trash
    • Commands--nessus-openvas
    • Commands--named_pipes
    • ptx
    • Commands--mortar-shells
    • Redis-Cheatsheet
    • wifi_driver_stuff
    • bypassing_applocker_living_off_land
    • Commands--remote_and_local_file_inclusion
    • Commands--netcat-ftp
    • mimikatz
  • wifi-hacking
    • eaphammer
    • aircrack-ng_and_jtr_attack
    • new_page
    • cracking_wpa_attack
    • aircrack-ng
    • wifite
    • basics
    • hostapd
    • cowpatty_attack
    • rogue_access_point
    • cracking_wep_via_a_client_attack
    • handshake-via-pcap
    • clientless_wep_attack
    • fluxion
    • reaver
    • crack_wep
    • pyrit_attack
    • wep_shared_key_authentication_attack
  • mobile
    • qark
    • dex2jar
    • jd-gui
    • mobile
    • baby_steps
    • apktool
    • smali_and_baksmali
  • Cobalt-Strike
    • apache_rewrite_.htaccess
    • playbook
      • mail_and_smtp_enumeration-manipulation
      • lateral_movement
      • overpass_the_hash_with_rubeus-beacon_-_h
      • persistence
      • privilege_escalation
      • after_initial_access
    • situational_awareness_-_harmj0y
    • malleable
    • sid_hopping
    • generating_certificates
    • safety
    • random_commands
    • golden_ticket
    • go_daddy_domain
    • github_repos
    • malware_av_evasion
    • malware_av_evasion--main.go
    • c2_infrastructure
    • cobalt_strike_certificates
    • cpl_resource_runner_payload
  • Metasploit
    • nessus
    • network
    • meterpreter
  • Information Gathering Enumeration
    • 35 Searchsploit
    • 30 Find
    • 21 WinRM
    • 50 Gobuster
    • Enumeration by Port Number
    • 40 Active Directory
    • Linux Prevesc
    • pivoting
    • 20 Reconnoitre
    • Kerberos cheatsheet
    • 11 SMB Part 1
    • 00 ENUMERATION
    • 10 Nmap
    • 12-check-for-anonymous-smb
    • bruteforcing
    • 60 DNS Enumeration
    • 15 Firefox
  • Commands
    • rbash
    • tools-sources
    • tar
    • network-change-ip
    • sed_and_changing_files_for_malware_evasi
    • web_discovery
    • xxd
    • droopescan
    • c#
    • proxychains-admin-network
    • de-duplicate
    • privilege-escalation-windows_-_and_empir
    • ping_sweep
    • wget
    • snmp
    • custom-payloads
    • python
    • curl-wget
    • proxychains
    • goddi_-_domain_enumeration
    • nginx-bypass
    • outlook_and_owa
    • physical_hacking--rasperry_pi
    • have_a_shell
    • xml-xxe-xpath
    • xss-iframe
    • port-forward
    • physical_hacking
    • pack
    • client-side-iframe-attack
    • waf
    • laps
    • images-with-files-in-them
    • fresh-install
    • privilege-escalation-linux
    • masscan
    • arp-spoof
    • shellshock-squid
    • merlin
    • redis
    • get-browserdata
    • lateral_movement
    • smb-netbios-rpc
    • password-cracking
    • virtual-box_guest_additions
    • host_discovery-dns
    • certificate_tls_and_ssl
    • postgresql
    • physical_hacking--bash_bunny
    • powerview--new_page
    • mail_sniper
    • searchsploit
    • crackmapexec
    • user_agent
    • lolbins
    • files-inside-of-pictures
    • random_shellcode_-_scratch-pad
    • linux
    • ports
    • block-ip-iptables
    • httpscreenshot
    • dnscat
    • wp-scan
    • gather-gpp-creds
    • group-policy-decrypt-passwords
    • buffer-overflow
    • mac_address_change
    • sql
    • compiling-code
    • shell-for-buffer-overflow
    • hex_encode_command_line
    • spawn_a_better_shell_-_break_out_of_shit
    • nikto-proxy
    • osint
    • assembly
    • sshuttle
    • nmap_and_scanning
    • root_user_add
    • pass_the_hash
    • test-for-xxe
    • payloads
    • webdav
    • cut_commands
    • unicorn_scan
    • rdesktop_and_screen_for_linux
    • spooler_exploit
    • dns-zone-transfer
    • ssh
    • password-grep
  • reverse-shell-one-liners
    • ruby
    • c-language-reverse-shell
    • reverse_shell_one_liners
    • perl-reverse-shell-cgi-format
    • java_reverse_shell
    • python_reverse_shell
  • Bypass-Applocker
    • vbs_macro
    • pubprn.vbs
    • demiguise
    • mshta
    • regsvcs
    • regasm_2
    • bypass-uac
    • installutil
  • windows
    • uninstall_patches
    • passwords
    • powerview_3.0,_harmj0y
    • port_forward
    • powerview_acl_enum-abuse
    • powerview,_enumerate_groups-ac
    • search_4_loot
    • firewall
    • laps_abuse
    • enumeration
    • Windows
    • Windows_service_abuse
    • Windows Enumeration
  • mimikatz
    • mimikatz_list_modules
    • list_commands_in_module
    • mimikatz
    • remote_control_rpc
    • applocker_bypass_and_other_sn
    • mimikatz_-_start_and_stop_processes
    • base64_all_the_things
    • rdp
    • avoid_new_events
    • mimikatz_-_tokens
  • red-team
    • privilege_escalation_across_trusts
    • file_servers_and_files
    • lateral_movement
    • Commands--red_team
    • forest_enumeration
    • persistence_techniques
    • privilege_escalation
  • Start Procedure
    • Start-Procedure
  • Tools to add to Kali Linux
  • AD-notes
    • more-ad-notes
    • bloodhound
    • ad-notes-chirag
    • enumeration
    • pam_abuse
    • laps_abuse
    • domain_privilege_escalation
    • active_directory_one_liners
  • Setting up Kali Linux
    • Tools to add to Kali Linux
    • Items to Install in Kali
      • tmux
        • tmux_config
        • Setup_-_TMUX
        • tmux_cheat_sheet
      • crontab
      • rclone
      • Items_to_install_in_Kali
    • Tools to install
  • SQL
    • abusing_sql_server_trusts--privilege_escalation
    • abusing_sql_server_trusts
    • abusing_sql_server_trusts--post_exploitation_enumeration
    • 31 SQL
  • tools to install
  • command line
  • simple note
  • Enumeration
  • Tools to install on Windows
  • temp-readme
Powered by GitBook
On this page
  • Redis Cheatsheet
  • All the commands you need to know
  • Strings.
  • Lists.
  • A list is a series of ordered values.
  • Sets.
  • A set is similar to a list, except it does not have a specific order and each element may only appear once.
  • Sorted Sets
  • A sorted set is similar to a regular set, but now each value has an associated score.
  • This score is used to sort the elements in the set.
  • Hashes
  • Hashes are maps between string fields and string values, so they are the perfect data type to represent objects.
  • HyperLogLog
  • HyperLogLog uses randomization in order to provide an approximation of the number of unique elements in a set using just a constant, and small, amount of memory
  • Publication & Subscription
  • Other Commands

Was this helpful?

  1. Links and Random

Redis-Cheatsheet

Redis Cheatsheet

All the commands you need to know

redis-server /path/redis.conf # start redis with the related configuration file redis-cli # opens a redis prompt

Strings.

APPEND key value # append a value to a key BITCOUNT key [start end] # count set bits in a string SET key value # set value in key SETNX key value # set if not exist value in key SETRANGE key offset value # overwrite part of a string at key starting at the specified offset STRLEN key # get the length of the value stored in a key MSET key value [key value ...] # set multiple keys to multiple values MSETNX key value [key value ...] # set multiple keys to multiple values, only if none of the keys exist GET key # get value in key GETRANGE key value # get a substring value of a key and return its old value MGET key [key ...] # get the values of all the given keys INCR key # increment value in key INCRBY key increment # increment the integer value of a key by the given amount INCRBYFLOAT key increment # increment the float value of a key by the given amount DECR key # decrement the integer value of key by one DECRBY key decrement # decrement the integer value of a key by the given number DEL key # delete key

EXPIRE key 120 # key will be deleted in 120 seconds TTL key # returns the number of seconds until a key is deleted

Lists.

A list is a series of ordered values.

RPUSH key value [value ...] # put the new value at the end of the list RPUSHX key value # append a value to a list, only if the exists LPUSH key value [value ...] # put the new value at the start of the list LRANGE key start stop # give a subset of the list LINDEX key index # get an element from a list by its index LINSERT key BEFORE|AFTER pivot value # insert an element before or after another element in a list LLEN key # return the current length of the list LPOP key # remove the first element from the list and returns it LSET key index value # set the value of an element in a list by its index LTRIM key start stop # trim a list to the specified range RPOP key # remove the last element from the list and returns it RPOPLPUSH source destination # remove the last element in a list, prepend it to another list and return it BLPOP key [key ...] timeout # remove and get the first element in a list, or block until one is available BRPOP key [key ...] timeout # remove and get the last element in a list, or block until one is available

Sets.

A set is similar to a list, except it does not have a specific order and each element may only appear once.

SADD key member [member ...] # add the given value to the set SCARD key # get the number of members in a set SREM key member [member ...] # remove the given value from the set SISMEMBER myset value # test if the given value is in the set. SMEMBERS myset # return a list of all the members of this set SUNION key [key ...] # combine two or more sets and returns the list of all elements SINTER key [key ...] # intersect multiple sets SMOVE source destination member # move a member from one set to another SPOP key [count] # remove and return one or multiple random members from a set

Sorted Sets

A sorted set is similar to a regular set, but now each value has an associated score.

This score is used to sort the elements in the set.

ZADD key [NX|XX] [CH] [INCR] score member [score member ...] # add one or more members to a sorted set, or update its score if it already exists

ZCARD key # get the number of members in a sorted set ZCOUNT key min max # count the members in a sorted set with scores within the given values ZINCRBY key increment member # increment the score of a member in a sorted set ZRANGE key start stop [WITHSCORES] # returns a subset of the sorted set ZRANK key member # determine the index of a member in a sorted set ZREM key member [member ...] # remove one or more members from a sorted set ZREMRANGEBYRANK key start stop # remove all members in a sorted set within the given indexes ZREMRANGEBYSCORE key min max # remove all members in a sorted set, by index, with scores ordered from high to low ZSCORE key member # get the score associated with the given mmeber in a sorted set

ZRANGEBYSCORE key min max [WITHSCORES] [LIMIT offset count] # return a range of members in a sorted set, by score

Hashes

Hashes are maps between string fields and string values, so they are the perfect data type to represent objects.

HGET key field # get the value of a hash field HGETALL key # get all the fields and values in a hash HSET key field value # set the string value of a hash field HSETNX key field value # set the string value of a hash field, only if the field does not exists

HMSET key field value [field value ...] # set multiple fields at once

HINCRBY key field increment # increment value in hash by X HDEL key field [field ...] # delete one or more hash fields HEXISTS key field # determine if a hash field exists HKEYS key # get all the fields in a hash HLEN key # get all the fields in a hash HSTRLEN key field # get the length of the value of a hash field HVALS key # get all the values in a hash

HyperLogLog

HyperLogLog uses randomization in order to provide an approximation of the number of unique elements in a set using just a constant, and small, amount of memory

PFADD key element [element ...] # add the specified elements to the specified HyperLogLog PFCOUNT key [key ...] # return the approximated cardinality of the set(s) observed by the HyperLogLog at key's)

PFMERGE destkey sourcekey [sourcekey ...] # merge N HyperLogLogs into a single one

Publication & Subscription

PSUBSCRIBE pattern [pattern ...] # listen for messages published to channels matching the given patterns PUBSUB subcommand [argument [argument ...]] # inspect the state of the Pub/Sub subsystem PUBLISH channel message # post a message to a channel PUNSUBSCRIBE [pattern [pattern ...]] # stop listening for messages posted to channels matching the given patterns SUBSCRIBE channel [channel ...] # listen for messages published to the given channels UNSUBSCRIBE [channel [channel ...]] # stop listening for messages posted to the given channels

Other Commands

KEYS pattern # find all keys matching the given pattern

PreviousCommands--mortar-shellsNextwifi_driver_stuff

Last updated 3 years ago

Was this helpful?