
Security Knowledge Base Binaries
Type to start searching
    • Home
      • Bounties
      • Guides
      • References
        • Preparation
        • Enumeration
        • preparation
        • Lab Setup
        • Notes
        • Practice
        • Tools
          • Cheatsheets
          • Exploits
          • Share files
          • TTY
          • Web
          • Windows
            • Network
            • Vulnerability
            • Windows local
      • Aws s3
      • Aws
      • Azuer
      • Binaries
      • Common web files
      • Leaked datasets
      • Passwords
      • Word-lists
      • References
      • Cheatsheet
      • Important issues
      • y Tools
      • z References
      • Tools
      • z References
      • Practice Resources
      • Write-ups
        • CronOS
        • Bank
        • Bastard
        • Beep
        • Grandpa
        • Lame
        • Popcorn
            • Network
            • WebServices
            • Phpbash
            • Goodies
              • 05 UsersGroups
              • LinEnum
            • PrevEsc
            • Network
            • EternalBlue
            • Network
            • WebServices
            • Goodies
          • Log
            • Network
            • OtherServices
            • WebServices
            • 01 Joomla
            • 02 Binary
            • Goodies
              • 01 Host
              • 02 FileSystem
              • 03 Processes
              • 04 Applications
              • 05 UsersGroups
              • 06 Network
              • 07 ScheduledJobs
              • LinEnum
          • Log
            • Network
            • OtherServices
            • WebServices
            • Goodies
              • 01 Host
              • 02 FileSystem
              • 03 Processes
              • 04 Applications
              • 05 UsersGroups
              • 06 Network
              • 07 ScheduledJobs
              • LinEnum
          • Log
            • Network
            • OtherServices
            • WebServices
            • Unreal
            • Goodies
              • 01 Host
              • 02 FileSystem
              • 03 Processes
              • 04 Applications
              • 05 UsersGroups
              • 06 Network
              • 07 ScheduledJobs
              • LinEnum
            • Network
            • WebServices
            • Tomcat
            • Goodies
              • 01 Host
          • Log
            • Network
            • OtherServices
            • WebServices
            • Pfsense
            • Goodies
              • 01 Host
              • 02 FileSystem
              • 03 Processes
              • 04 Applications
              • 05 UsersGroups
              • 06 Network
              • 07 ScheduledJobs
              • LinEnum
          • Log
            • Network
            • OtherServices
            • WebServices
            • Oracle
            • Goodies
              • 01 Host
              • 02 FileSystem
              • 03 Processes
              • 04 Applications
              • 05 UsersGroups
              • 06 Network
              • 07 ScheduledJobs
              • LinEnum
        • Log
          • Network
          • OtherServices
          • WebServices
          • Goodies
            • 01 Host
            • 02 FileSystem
            • 03 Processes
            • 04 Applications
            • 05 UsersGroups
            • 06 Network
            • 07 ScheduledJobs
            • LinEnum
        • Tools
        • 0 cheatsheet
        • Cheatsheet
        • MySQL-Root to System-Root
        • Tools
        • Cheatsheet
        • 01. Roles and Permissions
        • 01. Enumeration
        • 03. Exploitation
        • 04. Command Execution
        • 04. Privilege Escalation
        • 05. Lateral Movement
        • 06. Persistence
        • 09. Defence
        • 10. New References
        • Imprtant Locations
        • SQL Injection
        • Tools
      • Cheatsheet
      • CTFs
      • Important Files
      • Tools
      • References
      • Cheetshet
      • FCC
      • Protocols
      • Tools
      • References
        • Test Conditions
        • ATMs
        • Automobile
        • Bluetooth
        • Cameras
        • Locks
        • Printers
        • Ships
        • UEFI
        • Glitching
        • Side Channel
      • Cheatsheet
      • Buffer Overflow
      • Fuzzing
      • Lateral Movement
      • Memory Protection
      • OS Linux Specific
      • Payloads
      • Practice
      • Metasploit
      • y Tool SilentTrinity
      • Tools
      • References
      • Kerberos
      • References
      • GO
      • Java
      • Javascript
      • NodeJS
      • PHP
      • Python
      • Rails
      • Regex
      • Rust
      • Analysis
      • Antivirus
      • Attack Patterns
      • Collections
      • Downloaders
      • Fileless Attacks
      • Defense
      • Tools
      • References
      • Cheetsheet
      • Domain Fronting
      • Port Forwarding
      • Port Scanning
      • Traffic Analysis
      • Vulnerability Scanning
      • Wireless
      • x Defense
      • y Tools Netstat
      • Nmap
      • Tools
      • References
        • Android
        • IOS
        • Cheatsheet
        • Important Files / Folders
        • Important issues
        • Kernel Exploitation
        • Privilege Escalation
        • Wildcards
        • Defense
          • Iptables
          • Netcat (NC)
          • tcpdump
          • VI
        • Defense
        • Cheatsheet
        • Active Directory
        • Windows API
        • Events
        • HyperV
        • Important Endpoints
        • Important Files
        • Important issues
        • Important Processes
        • Important Registry Locations
        • Kernel Exploitation
        • Privilege Escalation
        • WMI
        • Defense Bypass
        • Defense
        • Tools
        • References
          • Hashes and Credentials
          • Using Credentials
          • Cheatsheet
          • Collections
          • Modules
          • Resources
      • Tools
      • References
      • Cheetsheet
      • Tools
      • References
      • Citrix 1494
      • DHCP
      • DNS 53
      • FTP 21
      • Finger 79
      • HTTP HTTPS 80,443
      • IMAP 143,993
      • IRC 8067
      • LDAP 389
      • Memcache
      • Modbus 502
      • MySQL 3306
      • NFS 2049
      • NTP 123
      • References
      • POP3 110
      • PPTP L2TP VPN 500,1723
      • Portmapper 111
      • RDP 3389
      • RPC 445
      • SIP 5060
      • SMB Samba NetBIOS 135 139,445
      • SMTP 25
      • SNMP 161
      • SQL Server 1433,1434
      • SSH 22
      • TFTP 69
      • Telnet 23
      • Tor 9001,9030
      • VNC 5900
      • WebDev
      • X11 6000
      • Rlogin 513
      • References
      • 0 cheatsheet
      • Defense
      • Practice
      • Tools
      • References
        • ELF
        • GDB
        • Lab Setup
        • ARM
        • C / C++
        • .NET
        • Go
        • Java
        • Mobile App
        • PE Files
        • Tools
        • VBA
        • Defense
      • Rfid nfc
      • RaspberryPi
      • SDR
      • Reverse Shell
      • Memorize the 8086 opcodes
      • C++
      • ICMP Shells
      • Java
      • Linux
      • PHP
      • Python
      • Tools
      • Pentesting Process
      • Vulnerable Desktop Applications
      • Vulnerable Server Applications
      • Vulnerable Web Applications
      • Cheatsheet
      • Client Side Attacks
      • CMS
      • Discovery
      • Sharepoint
      • SSL/TLS
      • Defense Bypass
      • Defense
      • Tools
      • References
        • Change Password
        • Forgot Password
        • Login
        • Registration
        • Remember Me
        • Command injection
        • CRLF
        • CSRF
        • LFI / RFI
        • Open Redirect
        • PUT
        • SQL Injection
        • SSRF
        • XSS

    Binaries

    • Nmap: https://github.com/andrew-d/static-binaries/blob/master/binaries/linux/x86_64/
    Previous Azuer
    Next Common web files
    powered by MkDocs and Material for MkDocs