Main Page: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
< | <div style="text-align:center; font-size: 220%; font-weight: bold; margin-top: 20px;"> | ||
Welcome to HackOps.wiki | |||
</div> | |||
<div style="text-align:center; font-size: 130%; color:#ff5555; margin-bottom: 30px;"> | |||
Offensive security knowledge. Structured, open, and alive. | |||
</div> | |||
== | <div style="text-align:center; font-size: 120%; margin-bottom: 15px;"> | ||
👉 '''New to hacking? Start with the [[Introduction to Hacking]] guide.''' | |||
</div> | |||
* [ | <div style="background:#1a1a1a; border: 1px solid #333; padding:1em; border-left: 4px solid #ff5555; margin-bottom: 20px; max-width: 800px; margin-left:auto; margin-right:auto;"> | ||
* [ | |||
<div style="text-align:center;"> | |||
'''Note:''' HackOps.wiki focuses exclusively on ''digital hacking within the context of ethical and offensive cybersecurity''. This includes topics such as penetration testing, privilege escalation, red teaming, and CTF-style learning. | |||
</div> | |||
<div style="text-align:center; margin-top:1em;"> | |||
''This wiki does not cover:'' | |||
</div> | |||
<ul style="display: table; margin: 0 auto; text-align: left;"> | |||
<li>Physical hacking (e.g. lockpicking)</li> | |||
<li>Psychological manipulation</li> | |||
<li>Life hacks or productivity tricks</li> | |||
<li>Any illegal or unauthorized activity</li> | |||
</ul> | |||
<div style="text-align:center; margin-top:1em;"> | |||
All content is intended for educational and ethical use in controlled environments. | |||
</div> | |||
</div> | |||
</div> | |||
---- | |||
== 🚀 Start Exploring == | |||
Explore the core topics of offensive security through structured categories. Each topic contains subcategories with related tools, methods, and use cases. | |||
---- | |||
== 📂 Categories == | |||
{| class="wikitable" style="width:100%; text-align:center; background:#1c1c1c; color:#e0e0e0;" | |||
! Section !! Description !! Entry Point | |||
|- | |||
| '''Reconnaissance''' || Enumeration, subdomain scanning, passive & active recon || [[Reconnaissance]] | |||
|- | |||
| '''Privilege Escalation''' || Linux/Windows escalation, SUID, Sudo, LPE tricks || [[Privilege Escalation]] | |||
|- | |||
| '''Web Exploitation''' || XSS, LFI, SSRF, SQLi, deserialization, auth bypasses || [[Web Exploitation]] | |||
|- | |||
| '''Payloads''' || Reverse shells, one-liners, EDR bypasses, command injection || [[Payloads]] | |||
|- | |||
| '''Red Team Tactics''' || C2 infrastructure, OPSEC, phishing simulation, evasion || [[Red Team Tactics]] | |||
|- | |||
| '''OSINT''' || Open Source Intelligence, person tracing, metadata mining || [[OSINT]] | |||
|- | |||
| '''CTF Walkthroughs''' || TryHackMe, Hack The Box, VulnHub, custom labs || [[CTF Walkthroughs]] | |||
|} | |||
---- | |||
== 🧠 Contribute == | |||
* [[How to Contribute]] – editing guide and structure | |||
* [[Sandbox]] – try out wiki editing here | |||
* [[Style Guide]] – maintain clarity and consistency | |||
Have something valuable to share? HackOps.wiki is open for contribution. Make your edits count. | |||
---- | |||
== 📎 Meta == | |||
* [[About HackOps.wiki]] | |||
* [[Rules of Engagement]] | |||
* [[Disclosure & Ethics]] | |||
* [[Recent changes]] | |||
* [[Random page]] | |||
---- | |||
<div style="text-align:center; font-size:85%; color:#888; margin-top:30px;"> | |||
HackOps.wiki is a living archive of offensive security techniques.<br> | |||
For educational and ethical simulation purposes only. | |||
</div> |
Revision as of 17:38, 8 May 2025
Welcome to HackOps.wiki
Offensive security knowledge. Structured, open, and alive.
👉 New to hacking? Start with the Introduction to Hacking guide.
Note: HackOps.wiki focuses exclusively on digital hacking within the context of ethical and offensive cybersecurity. This includes topics such as penetration testing, privilege escalation, red teaming, and CTF-style learning.
This wiki does not cover:
- Physical hacking (e.g. lockpicking)
- Psychological manipulation
- Life hacks or productivity tricks
- Any illegal or unauthorized activity
All content is intended for educational and ethical use in controlled environments.
🚀 Start Exploring
Explore the core topics of offensive security through structured categories. Each topic contains subcategories with related tools, methods, and use cases.
📂 Categories
Section | Description | Entry Point |
---|---|---|
Reconnaissance | Enumeration, subdomain scanning, passive & active recon | Reconnaissance |
Privilege Escalation | Linux/Windows escalation, SUID, Sudo, LPE tricks | Privilege Escalation |
Web Exploitation | XSS, LFI, SSRF, SQLi, deserialization, auth bypasses | Web Exploitation |
Payloads | Reverse shells, one-liners, EDR bypasses, command injection | Payloads |
Red Team Tactics | C2 infrastructure, OPSEC, phishing simulation, evasion | Red Team Tactics |
OSINT | Open Source Intelligence, person tracing, metadata mining | OSINT |
CTF Walkthroughs | TryHackMe, Hack The Box, VulnHub, custom labs | CTF Walkthroughs |
🧠 Contribute
- How to Contribute – editing guide and structure
- Sandbox – try out wiki editing here
- Style Guide – maintain clarity and consistency
Have something valuable to share? HackOps.wiki is open for contribution. Make your edits count.
📎 Meta
HackOps.wiki is a living archive of offensive security techniques.
For educational and ethical simulation purposes only.