Main Page: Difference between revisions

From HackOps
Jump to navigation Jump to search
No edit summary
 
No edit summary
Line 1: Line 1:
<strong>MediaWiki has been installed.</strong>
<div style="text-align:center; font-size: 220%; font-weight: bold; margin-top: 20px;">
Welcome to HackOps.wiki
</div>


Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User's Guide] for information on using the wiki software.
<div style="text-align:center; font-size: 130%; color:#ff5555; margin-bottom: 30px;">
Offensive security knowledge. Structured, open, and alive.
</div>


== Getting started ==
<div style="text-align:center; font-size: 120%; margin-bottom: 15px;">
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]
👉 '''New to hacking? Start with the [[Introduction to Hacking]] guide.'''
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]
</div>
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]
 
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]
<div style="background:#1a1a1a; border: 1px solid #333; padding:1em; border-left: 4px solid #ff5555; margin-bottom: 20px; max-width: 800px; margin-left:auto; margin-right:auto;">
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]
 
<div style="text-align:center;">
'''Note:''' HackOps.wiki focuses exclusively on ''digital hacking within the context of ethical and offensive cybersecurity''. This includes topics such as penetration testing, privilege escalation, red teaming, and CTF-style learning.
</div>
 
<div style="text-align:center; margin-top:1em;">
''This wiki does not cover:''
</div>
 
<ul style="display: table; margin: 0 auto; text-align: left;">
  <li>Physical hacking (e.g. lockpicking)</li>
  <li>Psychological manipulation</li>
  <li>Life hacks or productivity tricks</li>
  <li>Any illegal or unauthorized activity</li>
</ul>
 
<div style="text-align:center; margin-top:1em;">
All content is intended for educational and ethical use in controlled environments.
</div>
 
</div>
 
</div>
----
 
== 🚀 Start Exploring ==
 
Explore the core topics of offensive security through structured categories. Each topic contains subcategories with related tools, methods, and use cases.
 
----
 
== 📂 Categories ==
 
{| class="wikitable" style="width:100%; text-align:center; background:#1c1c1c; color:#e0e0e0;"
! Section !! Description !! Entry Point
|-
| '''Reconnaissance''' || Enumeration, subdomain scanning, passive & active recon || [[Reconnaissance]]
|-
| '''Privilege Escalation''' || Linux/Windows escalation, SUID, Sudo, LPE tricks || [[Privilege Escalation]]
|-
| '''Web Exploitation''' || XSS, LFI, SSRF, SQLi, deserialization, auth bypasses || [[Web Exploitation]]
|-
| '''Payloads''' || Reverse shells, one-liners, EDR bypasses, command injection || [[Payloads]]
|-
| '''Red Team Tactics''' || C2 infrastructure, OPSEC, phishing simulation, evasion || [[Red Team Tactics]]
|-
| '''OSINT''' || Open Source Intelligence, person tracing, metadata mining || [[OSINT]]
|-
| '''CTF Walkthroughs''' || TryHackMe, Hack The Box, VulnHub, custom labs || [[CTF Walkthroughs]]
|}
 
----
 
== 🧠 Contribute ==
 
* [[How to Contribute]] – editing guide and structure 
* [[Sandbox]] – try out wiki editing here 
* [[Style Guide]] – maintain clarity and consistency
 
Have something valuable to share? HackOps.wiki is open for contribution. Make your edits count.
 
----
 
== 📎 Meta ==
 
* [[About HackOps.wiki]]
* [[Rules of Engagement]]
* [[Disclosure & Ethics]]
* [[Recent changes]]
* [[Random page]]
 
----
 
<div style="text-align:center; font-size:85%; color:#888; margin-top:30px;">
HackOps.wiki is a living archive of offensive security techniques.<br>
For educational and ethical simulation purposes only.
</div>

Revision as of 17:38, 8 May 2025

Welcome to HackOps.wiki

Offensive security knowledge. Structured, open, and alive.

👉 New to hacking? Start with the Introduction to Hacking guide.

Note: HackOps.wiki focuses exclusively on digital hacking within the context of ethical and offensive cybersecurity. This includes topics such as penetration testing, privilege escalation, red teaming, and CTF-style learning.

This wiki does not cover:

  • Physical hacking (e.g. lockpicking)
  • Psychological manipulation
  • Life hacks or productivity tricks
  • Any illegal or unauthorized activity

All content is intended for educational and ethical use in controlled environments.


🚀 Start Exploring

Explore the core topics of offensive security through structured categories. Each topic contains subcategories with related tools, methods, and use cases.


📂 Categories

Section Description Entry Point
Reconnaissance Enumeration, subdomain scanning, passive & active recon Reconnaissance
Privilege Escalation Linux/Windows escalation, SUID, Sudo, LPE tricks Privilege Escalation
Web Exploitation XSS, LFI, SSRF, SQLi, deserialization, auth bypasses Web Exploitation
Payloads Reverse shells, one-liners, EDR bypasses, command injection Payloads
Red Team Tactics C2 infrastructure, OPSEC, phishing simulation, evasion Red Team Tactics
OSINT Open Source Intelligence, person tracing, metadata mining OSINT
CTF Walkthroughs TryHackMe, Hack The Box, VulnHub, custom labs CTF Walkthroughs

🧠 Contribute

Have something valuable to share? HackOps.wiki is open for contribution. Make your edits count.


📎 Meta


HackOps.wiki is a living archive of offensive security techniques.
For educational and ethical simulation purposes only.